File: | build-scan/../src/journal-remote/journal-remote.c |
Warning: | line 184, column 34 4th function call argument is an uninitialized value |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
1 | /* SPDX-License-Identifier: LGPL-2.1+ */ | |||
2 | ||||
3 | #include <errno(*__errno_location ()).h> | |||
4 | #include <fcntl.h> | |||
5 | #include <stdio.h> | |||
6 | #include <stdlib.h> | |||
7 | #include <string.h> | |||
8 | #include <sys/prctl.h> | |||
9 | #include <sys/socket.h> | |||
10 | #include <stdint.h> | |||
11 | ||||
12 | #include "sd-daemon.h" | |||
13 | ||||
14 | #include "alloc-util.h" | |||
15 | #include "def.h" | |||
16 | #include "escape.h" | |||
17 | #include "fd-util.h" | |||
18 | #include "journal-file.h" | |||
19 | #include "journal-remote-write.h" | |||
20 | #include "journal-remote.h" | |||
21 | #include "journald-native.h" | |||
22 | #include "macro.h" | |||
23 | #include "parse-util.h" | |||
24 | #include "process-util.h" | |||
25 | #include "socket-util.h" | |||
26 | #include "stdio-util.h" | |||
27 | #include "string-util.h" | |||
28 | #include "strv.h" | |||
29 | ||||
30 | #define REMOTE_JOURNAL_PATH"/var/log/journal/remote" "/var/log/journal/remote" | |||
31 | ||||
32 | #define filename_escape(s)xescape((s), "/ ") xescape((s), "/ ") | |||
33 | ||||
34 | static int open_output(RemoteServer *s, Writer *w, const char* host) { | |||
35 | _cleanup_free___attribute__((cleanup(freep))) char *_filename = NULL((void*)0); | |||
36 | const char *filename; | |||
37 | int r; | |||
38 | ||||
39 | switch (s->split_mode) { | |||
40 | case JOURNAL_WRITE_SPLIT_NONE: | |||
41 | filename = s->output; | |||
42 | break; | |||
43 | ||||
44 | case JOURNAL_WRITE_SPLIT_HOST: { | |||
45 | _cleanup_free___attribute__((cleanup(freep))) char *name; | |||
46 | ||||
47 | assert(host)do { if ((__builtin_expect(!!(!(host)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("host"), "../src/journal-remote/journal-remote.c" , 47, __PRETTY_FUNCTION__); } while (0); | |||
48 | ||||
49 | name = filename_escape(host)xescape((host), "/ "); | |||
50 | if (!name) | |||
51 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/journal-remote/journal-remote.c" , 51, __func__); | |||
52 | ||||
53 | r = asprintf(&_filename, "%s/remote-%s.journal", s->output, name); | |||
54 | if (r < 0) | |||
55 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/journal-remote/journal-remote.c" , 55, __func__); | |||
56 | ||||
57 | filename = _filename; | |||
58 | break; | |||
59 | } | |||
60 | ||||
61 | default: | |||
62 | assert_not_reached("what?")do { log_assert_failed_unreachable_realm(LOG_REALM_SYSTEMD, ( "what?"), "../src/journal-remote/journal-remote.c", 62, __PRETTY_FUNCTION__ ); } while (0); | |||
63 | } | |||
64 | ||||
65 | r = journal_file_open_reliably(filename, | |||
66 | O_RDWR02|O_CREAT0100, 0640, | |||
67 | s->compress, (uint64_t) -1, s->seal, | |||
68 | &w->metrics, | |||
69 | w->mmap, NULL((void*)0), | |||
70 | NULL((void*)0), &w->journal); | |||
71 | if (r < 0) | |||
72 | return log_error_errno(r, "Failed to open output journal %s: %m", filename)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 72, __func__, "Failed to open output journal %s: %m" , filename) : -abs(_e); }); | |||
73 | ||||
74 | log_debug("Opened output file %s", w->journal->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 74, __func__, "Opened output file %s" , w->journal->path) : -abs(_e); }); | |||
75 | return 0; | |||
76 | } | |||
77 | ||||
78 | /********************************************************************** | |||
79 | ********************************************************************** | |||
80 | **********************************************************************/ | |||
81 | ||||
82 | static int init_writer_hashmap(RemoteServer *s) { | |||
83 | static const struct hash_ops* const hash_ops[] = { | |||
84 | [JOURNAL_WRITE_SPLIT_NONE] = NULL((void*)0), | |||
85 | [JOURNAL_WRITE_SPLIT_HOST] = &string_hash_ops, | |||
86 | }; | |||
87 | ||||
88 | assert(s)do { if ((__builtin_expect(!!(!(s)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("s"), "../src/journal-remote/journal-remote.c" , 88, __PRETTY_FUNCTION__); } while (0); | |||
89 | assert(s->split_mode >= 0 && s->split_mode < (int) ELEMENTSOF(hash_ops))do { if ((__builtin_expect(!!(!(s->split_mode >= 0 && s->split_mode < (int) __extension__ (__builtin_choose_expr ( !__builtin_types_compatible_p(typeof(hash_ops), typeof(& *(hash_ops))), sizeof(hash_ops)/sizeof((hash_ops)[0]), ((void )0))))),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("s->split_mode >= 0 && s->split_mode < (int) ELEMENTSOF(hash_ops)" ), "../src/journal-remote/journal-remote.c", 89, __PRETTY_FUNCTION__ ); } while (0); | |||
90 | ||||
91 | s->writers = hashmap_new(hash_ops[s->split_mode])internal_hashmap_new(hash_ops[s->split_mode] ); | |||
92 | if (!s->writers) | |||
93 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/journal-remote/journal-remote.c" , 93, __func__); | |||
94 | ||||
95 | return 0; | |||
96 | } | |||
97 | ||||
98 | int journal_remote_get_writer(RemoteServer *s, const char *host, Writer **writer) { | |||
99 | _cleanup_(writer_unrefp)__attribute__((cleanup(writer_unrefp))) Writer *w = NULL((void*)0); | |||
100 | const void *key; | |||
101 | int r; | |||
102 | ||||
103 | switch(s->split_mode) { | |||
104 | case JOURNAL_WRITE_SPLIT_NONE: | |||
105 | key = "one and only"; | |||
106 | break; | |||
107 | ||||
108 | case JOURNAL_WRITE_SPLIT_HOST: | |||
109 | assert(host)do { if ((__builtin_expect(!!(!(host)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("host"), "../src/journal-remote/journal-remote.c" , 109, __PRETTY_FUNCTION__); } while (0); | |||
110 | key = host; | |||
111 | break; | |||
112 | ||||
113 | default: | |||
114 | assert_not_reached("what split mode?")do { log_assert_failed_unreachable_realm(LOG_REALM_SYSTEMD, ( "what split mode?"), "../src/journal-remote/journal-remote.c" , 114, __PRETTY_FUNCTION__); } while (0); | |||
115 | } | |||
116 | ||||
117 | w = hashmap_get(s->writers, key); | |||
118 | if (w) | |||
119 | writer_ref(w); | |||
120 | else { | |||
121 | w = writer_new(s); | |||
122 | if (!w) | |||
123 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/journal-remote/journal-remote.c" , 123, __func__); | |||
124 | ||||
125 | if (s->split_mode == JOURNAL_WRITE_SPLIT_HOST) { | |||
126 | w->hashmap_key = strdup(key); | |||
127 | if (!w->hashmap_key) | |||
128 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/journal-remote/journal-remote.c" , 128, __func__); | |||
129 | } | |||
130 | ||||
131 | r = open_output(s, w, host); | |||
132 | if (r < 0) | |||
133 | return r; | |||
134 | ||||
135 | r = hashmap_put(s->writers, w->hashmap_key ?: key, w); | |||
136 | if (r < 0) | |||
137 | return r; | |||
138 | } | |||
139 | ||||
140 | *writer = TAKE_PTR(w)({ typeof(w) _ptr_ = (w); (w) = ((void*)0); _ptr_; }); | |||
141 | ||||
142 | return 0; | |||
143 | } | |||
144 | ||||
145 | /********************************************************************** | |||
146 | ********************************************************************** | |||
147 | **********************************************************************/ | |||
148 | ||||
149 | /* This should go away as soon as µhttpd allows state to be passed around. */ | |||
150 | RemoteServer *journal_remote_server_global; | |||
151 | ||||
152 | static int dispatch_raw_source_event(sd_event_source *event, | |||
153 | int fd, | |||
154 | uint32_t revents, | |||
155 | void *userdata); | |||
156 | static int dispatch_raw_source_until_block(sd_event_source *event, | |||
157 | void *userdata); | |||
158 | static int dispatch_blocking_source_event(sd_event_source *event, | |||
159 | void *userdata); | |||
160 | static int dispatch_raw_connection_event(sd_event_source *event, | |||
161 | int fd, | |||
162 | uint32_t revents, | |||
163 | void *userdata); | |||
164 | ||||
165 | static int get_source_for_fd(RemoteServer *s, | |||
166 | int fd, char *name, RemoteSource **source) { | |||
167 | Writer *writer; | |||
168 | int r; | |||
169 | ||||
170 | /* This takes ownership of name, but only on success. */ | |||
171 | ||||
172 | assert(fd >= 0)do { if ((__builtin_expect(!!(!(fd >= 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fd >= 0"), "../src/journal-remote/journal-remote.c" , 172, __PRETTY_FUNCTION__); } while (0); | |||
173 | assert(source)do { if ((__builtin_expect(!!(!(source)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("source"), "../src/journal-remote/journal-remote.c" , 173, __PRETTY_FUNCTION__); } while (0); | |||
174 | ||||
175 | if (!GREEDY_REALLOC0(s->sources, s->sources_size, fd + 1)greedy_realloc0((void**) &(s->sources), &(s->sources_size ), (fd + 1), sizeof((s->sources)[0]))) | |||
176 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/journal-remote/journal-remote.c" , 176, __func__); | |||
177 | ||||
178 | r = journal_remote_get_writer(s, name, &writer); | |||
179 | if (r < 0) | |||
180 | return log_warning_errno(r, "Failed to get writer for source %s: %m",({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 181, __func__, "Failed to get writer for source %s: %m" , name) : -abs(_e); }) | |||
181 | name)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 181, __func__, "Failed to get writer for source %s: %m" , name) : -abs(_e); }); | |||
182 | ||||
183 | if (s->sources[fd] == NULL((void*)0)) { | |||
184 | s->sources[fd] = source_new(fd, false0, name, writer); | |||
| ||||
185 | if (!s->sources[fd]) { | |||
186 | writer_unref(writer); | |||
187 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/journal-remote/journal-remote.c" , 187, __func__); | |||
188 | } | |||
189 | ||||
190 | s->active++; | |||
191 | } | |||
192 | ||||
193 | *source = s->sources[fd]; | |||
194 | return 0; | |||
195 | } | |||
196 | ||||
197 | static int remove_source(RemoteServer *s, int fd) { | |||
198 | RemoteSource *source; | |||
199 | ||||
200 | assert(s)do { if ((__builtin_expect(!!(!(s)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("s"), "../src/journal-remote/journal-remote.c" , 200, __PRETTY_FUNCTION__); } while (0); | |||
201 | assert(fd >= 0 && fd < (ssize_t) s->sources_size)do { if ((__builtin_expect(!!(!(fd >= 0 && fd < (ssize_t) s->sources_size)),0))) log_assert_failed_realm( LOG_REALM_SYSTEMD, ("fd >= 0 && fd < (ssize_t) s->sources_size" ), "../src/journal-remote/journal-remote.c", 201, __PRETTY_FUNCTION__ ); } while (0); | |||
202 | ||||
203 | source = s->sources[fd]; | |||
204 | if (source) { | |||
205 | /* this closes fd too */ | |||
206 | source_free(source); | |||
207 | s->sources[fd] = NULL((void*)0); | |||
208 | s->active--; | |||
209 | } | |||
210 | ||||
211 | return 0; | |||
212 | } | |||
213 | ||||
214 | int journal_remote_add_source(RemoteServer *s, int fd, char* name, bool_Bool own_name) { | |||
215 | RemoteSource *source = NULL((void*)0); | |||
216 | int r; | |||
217 | ||||
218 | /* This takes ownership of name, even on failure, if own_name is true. */ | |||
219 | ||||
220 | assert(s)do { if ((__builtin_expect(!!(!(s)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("s"), "../src/journal-remote/journal-remote.c" , 220, __PRETTY_FUNCTION__); } while (0); | |||
221 | assert(fd >= 0)do { if ((__builtin_expect(!!(!(fd >= 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fd >= 0"), "../src/journal-remote/journal-remote.c" , 221, __PRETTY_FUNCTION__); } while (0); | |||
222 | assert(name)do { if ((__builtin_expect(!!(!(name)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("name"), "../src/journal-remote/journal-remote.c" , 222, __PRETTY_FUNCTION__); } while (0); | |||
223 | ||||
224 | if (!own_name
| |||
225 | name = strdup(name); | |||
226 | if (!name) | |||
227 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/journal-remote/journal-remote.c" , 227, __func__); | |||
228 | } | |||
229 | ||||
230 | r = get_source_for_fd(s, fd, name, &source); | |||
231 | if (r < 0) { | |||
232 | log_error_errno(r, "Failed to create source for fd:%d (%s): %m",({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 233, __func__, "Failed to create source for fd:%d (%s): %m" , fd, name) : -abs(_e); }) | |||
233 | fd, name)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 233, __func__, "Failed to create source for fd:%d (%s): %m" , fd, name) : -abs(_e); }); | |||
234 | free(name); | |||
235 | return r; | |||
236 | } | |||
237 | ||||
238 | r = sd_event_add_io(s->events, &source->event, | |||
239 | fd, EPOLLINEPOLLIN|EPOLLRDHUPEPOLLRDHUP|EPOLLPRIEPOLLPRI, | |||
240 | dispatch_raw_source_event, source); | |||
241 | if (r == 0) { | |||
242 | /* Add additional source for buffer processing. It will be | |||
243 | * enabled later. */ | |||
244 | r = sd_event_add_defer(s->events, &source->buffer_event, | |||
245 | dispatch_raw_source_until_block, source); | |||
246 | if (r == 0) | |||
247 | sd_event_source_set_enabled(source->buffer_event, SD_EVENT_OFF); | |||
248 | } else if (r == -EPERM1) { | |||
249 | log_debug("Falling back to sd_event_add_defer for fd:%d (%s)", fd, name)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 249, __func__, "Falling back to sd_event_add_defer for fd:%d (%s)" , fd, name) : -abs(_e); }); | |||
250 | r = sd_event_add_defer(s->events, &source->event, | |||
251 | dispatch_blocking_source_event, source); | |||
252 | if (r == 0) | |||
253 | sd_event_source_set_enabled(source->event, SD_EVENT_ON); | |||
254 | } | |||
255 | if (r < 0) { | |||
256 | log_error_errno(r, "Failed to register event source for fd:%d: %m",({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 257, __func__, "Failed to register event source for fd:%d: %m" , fd) : -abs(_e); }) | |||
257 | fd)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 257, __func__, "Failed to register event source for fd:%d: %m" , fd) : -abs(_e); }); | |||
258 | goto error; | |||
259 | } | |||
260 | ||||
261 | r = sd_event_source_set_description(source->event, name); | |||
262 | if (r < 0) { | |||
263 | log_error_errno(r, "Failed to set source name for fd:%d: %m", fd)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 263, __func__, "Failed to set source name for fd:%d: %m" , fd) : -abs(_e); }); | |||
264 | goto error; | |||
265 | } | |||
266 | ||||
267 | return 1; /* work to do */ | |||
268 | ||||
269 | error: | |||
270 | remove_source(s, fd); | |||
271 | return r; | |||
272 | } | |||
273 | ||||
274 | int journal_remote_add_raw_socket(RemoteServer *s, int fd) { | |||
275 | int r; | |||
276 | _cleanup_close___attribute__((cleanup(closep))) int fd_ = fd; | |||
277 | char name[STRLEN("raw-socket-")(sizeof("""raw-socket-""") - 1) + DECIMAL_STR_MAX(int)(2+(sizeof(int) <= 1 ? 3 : sizeof(int) <= 2 ? 5 : sizeof (int) <= 4 ? 10 : sizeof(int) <= 8 ? 20 : sizeof(int[-2 *(sizeof(int) > 8)]))) + 1]; | |||
278 | ||||
279 | assert(fd >= 0)do { if ((__builtin_expect(!!(!(fd >= 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fd >= 0"), "../src/journal-remote/journal-remote.c" , 279, __PRETTY_FUNCTION__); } while (0); | |||
280 | ||||
281 | r = sd_event_add_io(s->events, &s->listen_event, | |||
282 | fd, EPOLLINEPOLLIN, | |||
283 | dispatch_raw_connection_event, s); | |||
284 | if (r < 0) | |||
285 | return r; | |||
286 | ||||
287 | xsprintf(name, "raw-socket-%d", fd)do { if ((__builtin_expect(!!(!(((size_t) snprintf(name, __extension__ (__builtin_choose_expr( !__builtin_types_compatible_p(typeof (name), typeof(&*(name))), sizeof(name)/sizeof((name)[0]) , ((void)0))), "raw-socket-%d", fd) < (__extension__ (__builtin_choose_expr ( !__builtin_types_compatible_p(typeof(name), typeof(&*(name ))), sizeof(name)/sizeof((name)[0]), ((void)0))))))),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("xsprintf: " "name" "[] must be big enough" ), "../src/journal-remote/journal-remote.c", 287, __PRETTY_FUNCTION__ ); } while (0); | |||
288 | ||||
289 | r = sd_event_source_set_description(s->listen_event, name); | |||
290 | if (r < 0) | |||
291 | return r; | |||
292 | ||||
293 | fd_ = -1; | |||
294 | s->active++; | |||
295 | return 0; | |||
296 | } | |||
297 | ||||
298 | /********************************************************************** | |||
299 | ********************************************************************** | |||
300 | **********************************************************************/ | |||
301 | ||||
302 | int journal_remote_server_init( | |||
303 | RemoteServer *s, | |||
304 | const char *output, | |||
305 | JournalWriteSplitMode split_mode, | |||
306 | bool_Bool compress, | |||
307 | bool_Bool seal) { | |||
308 | ||||
309 | int r; | |||
310 | ||||
311 | assert(s)do { if ((__builtin_expect(!!(!(s)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("s"), "../src/journal-remote/journal-remote.c" , 311, __PRETTY_FUNCTION__); } while (0); | |||
312 | ||||
313 | assert(journal_remote_server_global == NULL)do { if ((__builtin_expect(!!(!(journal_remote_server_global == ((void*)0))),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("journal_remote_server_global == NULL"), "../src/journal-remote/journal-remote.c" , 313, __PRETTY_FUNCTION__); } while (0); | |||
314 | journal_remote_server_global = s; | |||
315 | ||||
316 | s->split_mode = split_mode; | |||
317 | s->compress = compress; | |||
318 | s->seal = seal; | |||
319 | ||||
320 | if (output) | |||
321 | s->output = output; | |||
322 | else if (split_mode == JOURNAL_WRITE_SPLIT_NONE) | |||
323 | s->output = REMOTE_JOURNAL_PATH"/var/log/journal/remote" "/remote.journal"; | |||
324 | else if (split_mode == JOURNAL_WRITE_SPLIT_HOST) | |||
325 | s->output = REMOTE_JOURNAL_PATH"/var/log/journal/remote"; | |||
326 | else | |||
327 | assert_not_reached("bad split mode")do { log_assert_failed_unreachable_realm(LOG_REALM_SYSTEMD, ( "bad split mode"), "../src/journal-remote/journal-remote.c", 327 , __PRETTY_FUNCTION__); } while (0); | |||
328 | ||||
329 | r = sd_event_default(&s->events); | |||
330 | if (r < 0) | |||
331 | return log_error_errno(r, "Failed to allocate event loop: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 331, __func__, "Failed to allocate event loop: %m" ) : -abs(_e); }); | |||
332 | ||||
333 | r = init_writer_hashmap(s); | |||
334 | if (r < 0) | |||
335 | return r; | |||
336 | ||||
337 | return 0; | |||
338 | } | |||
339 | ||||
340 | #if HAVE_MICROHTTPD1 | |||
341 | static void MHDDaemonWrapper_free(MHDDaemonWrapper *d) { | |||
342 | MHD_stop_daemon(d->daemon); | |||
343 | sd_event_source_unref(d->io_event); | |||
344 | sd_event_source_unref(d->timer_event); | |||
345 | free(d); | |||
346 | } | |||
347 | #endif | |||
348 | ||||
349 | RemoteServer* journal_remote_server_destroy(RemoteServer *s) { | |||
350 | size_t i; | |||
351 | ||||
352 | #if HAVE_MICROHTTPD1 | |||
353 | hashmap_free_with_destructor(s->daemons, MHDDaemonWrapper_free)({ ({ void *_item; while ((_item = hashmap_steal_first(s-> daemons))) MHDDaemonWrapper_free(_item); }); hashmap_free(s-> daemons); }); | |||
354 | #endif | |||
355 | ||||
356 | assert(s->sources_size == 0 || s->sources)do { if ((__builtin_expect(!!(!(s->sources_size == 0 || s-> sources)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("s->sources_size == 0 || s->sources" ), "../src/journal-remote/journal-remote.c", 356, __PRETTY_FUNCTION__ ); } while (0); | |||
357 | for (i = 0; i < s->sources_size; i++) | |||
358 | remove_source(s, i); | |||
359 | free(s->sources); | |||
360 | ||||
361 | writer_unref(s->_single_writer); | |||
362 | hashmap_free(s->writers); | |||
363 | ||||
364 | sd_event_source_unref(s->sigterm_event); | |||
365 | sd_event_source_unref(s->sigint_event); | |||
366 | sd_event_source_unref(s->listen_event); | |||
367 | sd_event_unref(s->events); | |||
368 | ||||
369 | if (s == journal_remote_server_global) | |||
370 | journal_remote_server_global = NULL((void*)0); | |||
371 | ||||
372 | /* fds that we're listening on remain open... */ | |||
373 | return NULL((void*)0); | |||
374 | } | |||
375 | ||||
376 | /********************************************************************** | |||
377 | ********************************************************************** | |||
378 | **********************************************************************/ | |||
379 | ||||
380 | int journal_remote_handle_raw_source( | |||
381 | sd_event_source *event, | |||
382 | int fd, | |||
383 | uint32_t revents, | |||
384 | RemoteServer *s) { | |||
385 | ||||
386 | RemoteSource *source; | |||
387 | int r; | |||
388 | ||||
389 | /* Returns 1 if there might be more data pending, | |||
390 | * 0 if data is currently exhausted, negative on error. | |||
391 | */ | |||
392 | ||||
393 | assert(fd >= 0 && fd < (ssize_t) s->sources_size)do { if ((__builtin_expect(!!(!(fd >= 0 && fd < (ssize_t) s->sources_size)),0))) log_assert_failed_realm( LOG_REALM_SYSTEMD, ("fd >= 0 && fd < (ssize_t) s->sources_size" ), "../src/journal-remote/journal-remote.c", 393, __PRETTY_FUNCTION__ ); } while (0); | |||
394 | source = s->sources[fd]; | |||
395 | assert(source->importer.fd == fd)do { if ((__builtin_expect(!!(!(source->importer.fd == fd) ),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("source->importer.fd == fd" ), "../src/journal-remote/journal-remote.c", 395, __PRETTY_FUNCTION__ ); } while (0); | |||
396 | ||||
397 | r = process_source(source, s->compress, s->seal); | |||
398 | if (journal_importer_eof(&source->importer)) { | |||
399 | size_t remaining; | |||
400 | ||||
401 | log_debug("EOF reached with source %s (fd=%d)",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 402, __func__, "EOF reached with source %s (fd=%d)" , source->importer.name, source->importer.fd) : -abs(_e ); }) | |||
402 | source->importer.name, source->importer.fd)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 402, __func__, "EOF reached with source %s (fd=%d)" , source->importer.name, source->importer.fd) : -abs(_e ); }); | |||
403 | ||||
404 | remaining = journal_importer_bytes_remaining(&source->importer); | |||
405 | if (remaining > 0) | |||
406 | log_notice("Premature EOF. %zu bytes lost.", remaining)({ int _level = (((5))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 406, __func__, "Premature EOF. %zu bytes lost." , remaining) : -abs(_e); }); | |||
407 | remove_source(s, source->importer.fd); | |||
408 | log_debug("%zu active sources remaining", s->active)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 408, __func__, "%zu active sources remaining" , s->active) : -abs(_e); }); | |||
409 | return 0; | |||
410 | } else if (r == -E2BIG7) { | |||
411 | log_notice("Entry with too many fields, skipped")({ int _level = (((5))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 411, __func__, "Entry with too many fields, skipped" ) : -abs(_e); }); | |||
412 | return 1; | |||
413 | } else if (r == -ENOBUFS105) { | |||
414 | log_notice("Entry too big, skipped")({ int _level = (((5))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 414, __func__, "Entry too big, skipped" ) : -abs(_e); }); | |||
415 | return 1; | |||
416 | } else if (r == -EAGAIN11) { | |||
417 | return 0; | |||
418 | } else if (r < 0) { | |||
419 | log_debug_errno(r, "Closing connection: %m")({ int _level = ((7)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 419, __func__, "Closing connection: %m" ) : -abs(_e); }); | |||
420 | remove_source(s, fd); | |||
421 | return 0; | |||
422 | } else | |||
423 | return 1; | |||
424 | } | |||
425 | ||||
426 | static int dispatch_raw_source_until_block(sd_event_source *event, | |||
427 | void *userdata) { | |||
428 | RemoteSource *source = userdata; | |||
429 | int r; | |||
430 | ||||
431 | /* Make sure event stays around even if source is destroyed */ | |||
432 | sd_event_source_ref(event); | |||
433 | ||||
434 | r = journal_remote_handle_raw_source(event, source->importer.fd, EPOLLINEPOLLIN, journal_remote_server_global); | |||
435 | if (r != 1) | |||
436 | /* No more data for now */ | |||
437 | sd_event_source_set_enabled(event, SD_EVENT_OFF); | |||
438 | ||||
439 | sd_event_source_unref(event); | |||
440 | ||||
441 | return r; | |||
442 | } | |||
443 | ||||
444 | static int dispatch_raw_source_event(sd_event_source *event, | |||
445 | int fd, | |||
446 | uint32_t revents, | |||
447 | void *userdata) { | |||
448 | RemoteSource *source = userdata; | |||
449 | int r; | |||
450 | ||||
451 | assert(source->event)do { if ((__builtin_expect(!!(!(source->event)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("source->event"), "../src/journal-remote/journal-remote.c" , 451, __PRETTY_FUNCTION__); } while (0); | |||
452 | assert(source->buffer_event)do { if ((__builtin_expect(!!(!(source->buffer_event)),0)) ) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("source->buffer_event" ), "../src/journal-remote/journal-remote.c", 452, __PRETTY_FUNCTION__ ); } while (0); | |||
453 | ||||
454 | r = journal_remote_handle_raw_source(event, fd, EPOLLINEPOLLIN, journal_remote_server_global); | |||
455 | if (r == 1) | |||
456 | /* Might have more data. We need to rerun the handler | |||
457 | * until we are sure the buffer is exhausted. */ | |||
458 | sd_event_source_set_enabled(source->buffer_event, SD_EVENT_ON); | |||
459 | ||||
460 | return r; | |||
461 | } | |||
462 | ||||
463 | static int dispatch_blocking_source_event(sd_event_source *event, | |||
464 | void *userdata) { | |||
465 | RemoteSource *source = userdata; | |||
466 | ||||
467 | return journal_remote_handle_raw_source(event, source->importer.fd, EPOLLINEPOLLIN, journal_remote_server_global); | |||
468 | } | |||
469 | ||||
470 | static int accept_connection(const char* type, int fd, | |||
471 | SocketAddress *addr, char **hostname) { | |||
472 | int fd2, r; | |||
473 | ||||
474 | log_debug("Accepting new %s connection on fd:%d", type, fd)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 474, __func__, "Accepting new %s connection on fd:%d" , type, fd) : -abs(_e); }); | |||
475 | fd2 = accept4(fd, &addr->sockaddr.sa, &addr->size, SOCK_NONBLOCKSOCK_NONBLOCK|SOCK_CLOEXECSOCK_CLOEXEC); | |||
476 | if (fd2 < 0) | |||
477 | return log_error_errno(errno, "accept() on fd:%d failed: %m", fd)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/journal-remote/journal-remote.c" , 477, __func__, "accept() on fd:%d failed: %m", fd) : -abs(_e ); }); | |||
478 | ||||
479 | switch(socket_address_family(addr)((addr)->sockaddr.sa.sa_family)) { | |||
480 | case AF_INET2: | |||
481 | case AF_INET610: { | |||
482 | _cleanup_free___attribute__((cleanup(freep))) char *a = NULL((void*)0); | |||
483 | char *b; | |||
484 | ||||
485 | r = socket_address_print(addr, &a); | |||
486 | if (r < 0) { | |||
487 | log_error_errno(r, "socket_address_print(): %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 487, __func__, "socket_address_print(): %m" ) : -abs(_e); }); | |||
488 | close(fd2); | |||
489 | return r; | |||
490 | } | |||
491 | ||||
492 | r = socknameinfo_pretty(&addr->sockaddr, addr->size, &b); | |||
493 | if (r < 0) { | |||
494 | log_error_errno(r, "Resolving hostname failed: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 494, __func__, "Resolving hostname failed: %m" ) : -abs(_e); }); | |||
495 | close(fd2); | |||
496 | return r; | |||
497 | } | |||
498 | ||||
499 | log_debug("Accepted %s %s connection from %s",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 502, __func__, "Accepted %s %s connection from %s" , type, ((addr)->sockaddr.sa.sa_family) == 2 ? "IP" : "IPv6" , a) : -abs(_e); }) | |||
500 | type,({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 502, __func__, "Accepted %s %s connection from %s" , type, ((addr)->sockaddr.sa.sa_family) == 2 ? "IP" : "IPv6" , a) : -abs(_e); }) | |||
501 | socket_address_family(addr) == AF_INET ? "IP" : "IPv6",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 502, __func__, "Accepted %s %s connection from %s" , type, ((addr)->sockaddr.sa.sa_family) == 2 ? "IP" : "IPv6" , a) : -abs(_e); }) | |||
502 | a)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 502, __func__, "Accepted %s %s connection from %s" , type, ((addr)->sockaddr.sa.sa_family) == 2 ? "IP" : "IPv6" , a) : -abs(_e); }); | |||
503 | ||||
504 | *hostname = b; | |||
505 | ||||
506 | return fd2; | |||
507 | }; | |||
508 | default: | |||
509 | log_error("Rejected %s connection with unsupported family %d",({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 510, __func__, "Rejected %s connection with unsupported family %d" , type, ((addr)->sockaddr.sa.sa_family)) : -abs(_e); }) | |||
510 | type, socket_address_family(addr))({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/journal-remote/journal-remote.c", 510, __func__, "Rejected %s connection with unsupported family %d" , type, ((addr)->sockaddr.sa.sa_family)) : -abs(_e); }); | |||
511 | close(fd2); | |||
512 | ||||
513 | return -EINVAL22; | |||
514 | } | |||
515 | } | |||
516 | ||||
517 | static int dispatch_raw_connection_event(sd_event_source *event, | |||
518 | int fd, | |||
519 | uint32_t revents, | |||
520 | void *userdata) { | |||
521 | RemoteServer *s = userdata; | |||
522 | int fd2; | |||
523 | SocketAddress addr = { | |||
524 | .size = sizeof(union sockaddr_union), | |||
525 | .type = SOCK_STREAMSOCK_STREAM, | |||
526 | }; | |||
527 | char *hostname = NULL((void*)0); | |||
528 | ||||
529 | fd2 = accept_connection("raw", fd, &addr, &hostname); | |||
530 | if (fd2
| |||
| ||||
531 | return fd2; | |||
532 | ||||
533 | return journal_remote_add_source(s, fd2, hostname, true1); | |||
534 | } |