summaryrefslogtreecommitdiffstats
path: root/dependencies/pkg/mod/github.com/ssgreg/journald@v1.0.0/write_msg.go
blob: fe9e15e9abf901f4fed5790f27acf8fc748da2af (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
// +build !go1.9

package journald

import (
	"net"
	"syscall"
	"unsafe"

	"golang.org/x/sys/unix"
)

// Go implementation of sendmsg (UnixConn.WriteMsgUnix) is not suitable
// for systemd's Journal in case of sending file descriptors. It always
// sends a dummy data byte, but journal does not expect to get it:
//
// n = recvmsg(fd, &msghdr, MSG_DONTWAIT|MSG_CMSG_CLOEXEC);
// ...
// if (n > 0 && n_fds == 0)
//     server_process_native_message(...);
// else if (n == 0 && n_fds == 1)
//     server_process_native_file(...);
// else if (n_fds > 0)
//     log_warning("Got too many file descriptors via native socket. Ignoring.");
//
// So we get a warning message (the last line) instead of the new log
// entry.
//
func writeMsgUnix(c *net.UnixConn, oob []byte, addr *net.UnixAddr) (oobn int, err error) {
	ptr, salen := sockaddr(addr)

	var msg syscall.Msghdr
	msg.Name = (*byte)(ptr)
	msg.Namelen = uint32(salen)
	msg.Control = (*byte)(unsafe.Pointer(&oob[0]))
	msg.SetControllen(len(oob))

	f, err := c.File()
	if err != nil {
		return 0, err
	}
	defer f.Close()

	_, n, errno := syscall.Syscall(unix.SYS_SENDMSG, f.Fd(), uintptr(unsafe.Pointer(&msg)), 0)
	if errno != 0 {
		return int(n), errno
	}

	return int(n), nil
}