e4ccf5a138
Change-Id: I8e846872c30a712fbc05c8da59ffa1cec1be31a4
368 lines
8.9 KiB
C
368 lines
8.9 KiB
C
/* $OpenBSD: syslog.c,v 1.28 2005/08/08 08:05:34 espie Exp $ */
|
|
/*
|
|
* Copyright (c) 1983, 1988, 1993
|
|
* The Regents of the University of California. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. Neither the name of the University nor the names of its contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/uio.h>
|
|
#include <syslog.h>
|
|
#include <sys/un.h>
|
|
#include <netdb.h>
|
|
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
#include <paths.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <time.h>
|
|
#include <unistd.h>
|
|
#include <stdarg.h>
|
|
|
|
static struct syslog_data sdata = SYSLOG_DATA_INIT;
|
|
|
|
extern const char *__progname; /* Program name, from crt0. */
|
|
|
|
static void disconnectlog_r(struct syslog_data *); /* disconnect from syslogd */
|
|
static void connectlog_r(struct syslog_data *); /* (re)connect to syslogd */
|
|
|
|
/*
|
|
* syslog, vsyslog --
|
|
* print message on log file; output is intended for syslogd(8).
|
|
*/
|
|
void
|
|
syslog(int pri, const char *fmt, ...)
|
|
{
|
|
va_list ap;
|
|
|
|
va_start(ap, fmt);
|
|
vsyslog(pri, fmt, ap);
|
|
va_end(ap);
|
|
}
|
|
|
|
void
|
|
vsyslog(int pri, const char *fmt, va_list ap)
|
|
{
|
|
vsyslog_r(pri, &sdata, fmt, ap);
|
|
}
|
|
|
|
void
|
|
openlog(const char *ident, int logstat, int logfac)
|
|
{
|
|
openlog_r(ident, logstat, logfac, &sdata);
|
|
}
|
|
|
|
void
|
|
closelog(void)
|
|
{
|
|
closelog_r(&sdata);
|
|
}
|
|
|
|
/* setlogmask -- set the log mask level */
|
|
int
|
|
setlogmask(int pmask)
|
|
{
|
|
return setlogmask_r(pmask, &sdata);
|
|
}
|
|
|
|
/* Reentrant version of syslog, i.e. syslog_r() */
|
|
|
|
void
|
|
syslog_r(int pri, struct syslog_data *data, const char *fmt, ...)
|
|
{
|
|
va_list ap;
|
|
|
|
va_start(ap, fmt);
|
|
vsyslog_r(pri, data, fmt, ap);
|
|
va_end(ap);
|
|
}
|
|
|
|
void
|
|
vsyslog_r(int pri, struct syslog_data *data, const char *fmt, va_list ap)
|
|
{
|
|
int cnt;
|
|
char ch, *p, *t;
|
|
time_t now;
|
|
int fd, saved_errno, error;
|
|
#define TBUF_LEN 2048
|
|
#define FMT_LEN 1024
|
|
char *stdp = NULL, tbuf[TBUF_LEN], fmt_cpy[FMT_LEN];
|
|
int tbuf_left, fmt_left, prlen;
|
|
|
|
#define INTERNALLOG LOG_ERR|LOG_CONS|LOG_PERROR|LOG_PID
|
|
/* Check for invalid bits. */
|
|
if (pri & ~(LOG_PRIMASK|LOG_FACMASK)) {
|
|
if (data == &sdata) {
|
|
syslog(INTERNALLOG,
|
|
"syslog: unknown facility/priority: %x", pri);
|
|
} else {
|
|
syslog_r(INTERNALLOG, data,
|
|
"syslog_r: unknown facility/priority: %x", pri);
|
|
}
|
|
pri &= LOG_PRIMASK|LOG_FACMASK;
|
|
}
|
|
|
|
/* Check priority against setlogmask values. */
|
|
if (!(LOG_MASK(LOG_PRI(pri)) & data->log_mask))
|
|
return;
|
|
|
|
saved_errno = errno;
|
|
|
|
/* Set default facility if none specified. */
|
|
if ((pri & LOG_FACMASK) == 0)
|
|
pri |= data->log_fac;
|
|
|
|
/* If we have been called through syslog(), no need for reentrancy. */
|
|
if (data == &sdata)
|
|
(void)time(&now);
|
|
|
|
p = tbuf;
|
|
tbuf_left = TBUF_LEN;
|
|
|
|
#define DEC() \
|
|
do { \
|
|
if (prlen < 0) \
|
|
prlen = 0; \
|
|
if (prlen >= tbuf_left) \
|
|
prlen = tbuf_left - 1; \
|
|
p += prlen; \
|
|
tbuf_left -= prlen; \
|
|
} while (0)
|
|
|
|
prlen = snprintf(p, tbuf_left, "<%d>", pri);
|
|
DEC();
|
|
|
|
/*
|
|
* syslogd will expand time automagically for reentrant case, and
|
|
* for normal case, just do like before
|
|
*/
|
|
if (data == &sdata) {
|
|
prlen = strftime(p, tbuf_left, "%h %e %T ", localtime(&now));
|
|
DEC();
|
|
}
|
|
|
|
if (data->log_stat & LOG_PERROR)
|
|
stdp = p;
|
|
if (data->log_tag == NULL)
|
|
data->log_tag = __progname;
|
|
if (data->log_tag != NULL) {
|
|
prlen = snprintf(p, tbuf_left, "%s", data->log_tag);
|
|
DEC();
|
|
}
|
|
if (data->log_stat & LOG_PID) {
|
|
prlen = snprintf(p, tbuf_left, "[%ld]", (long)getpid());
|
|
DEC();
|
|
}
|
|
if (data->log_tag != NULL) {
|
|
if (tbuf_left > 1) {
|
|
*p++ = ':';
|
|
tbuf_left--;
|
|
}
|
|
if (tbuf_left > 1) {
|
|
*p++ = ' ';
|
|
tbuf_left--;
|
|
}
|
|
}
|
|
|
|
/* strerror() is not reentrant */
|
|
|
|
for (t = fmt_cpy, fmt_left = FMT_LEN; (ch = *fmt); ++fmt) {
|
|
if (ch == '%' && fmt[1] == 'm') {
|
|
++fmt;
|
|
if (data == &sdata) {
|
|
prlen = snprintf(t, fmt_left, "%s",
|
|
strerror(saved_errno));
|
|
} else {
|
|
prlen = snprintf(t, fmt_left, "Error %d",
|
|
saved_errno);
|
|
}
|
|
if (prlen < 0)
|
|
prlen = 0;
|
|
if (prlen >= fmt_left)
|
|
prlen = fmt_left - 1;
|
|
t += prlen;
|
|
fmt_left -= prlen;
|
|
} else if (ch == '%' && fmt[1] == '%' && fmt_left > 2) {
|
|
*t++ = '%';
|
|
*t++ = '%';
|
|
fmt++;
|
|
fmt_left -= 2;
|
|
} else {
|
|
if (fmt_left > 1) {
|
|
*t++ = ch;
|
|
fmt_left--;
|
|
}
|
|
}
|
|
}
|
|
*t = '\0';
|
|
|
|
prlen = vsnprintf(p, tbuf_left, fmt_cpy, ap);
|
|
DEC();
|
|
cnt = p - tbuf;
|
|
|
|
/* Output to stderr if requested. */
|
|
if (data->log_stat & LOG_PERROR) {
|
|
struct iovec iov[2];
|
|
|
|
iov[0].iov_base = stdp;
|
|
iov[0].iov_len = cnt - (stdp - tbuf);
|
|
iov[1].iov_base = "\n";
|
|
iov[1].iov_len = 1;
|
|
(void)writev(STDERR_FILENO, iov, 2);
|
|
}
|
|
|
|
/* Get connected, output the message to the local logger. */
|
|
if (!data->opened)
|
|
openlog_r(data->log_tag, data->log_stat, 0, data);
|
|
connectlog_r(data);
|
|
|
|
/*
|
|
* If the send() failed, there are two likely scenarios:
|
|
* 1) syslogd was restarted
|
|
* 2) /dev/log is out of socket buffer space
|
|
* We attempt to reconnect to /dev/log to take care of
|
|
* case #1 and keep send()ing data to cover case #2
|
|
* to give syslogd a chance to empty its socket buffer.
|
|
*/
|
|
if ((error = send(data->log_file, tbuf, cnt, 0)) < 0) {
|
|
if (errno != ENOBUFS) {
|
|
disconnectlog_r(data);
|
|
connectlog_r(data);
|
|
}
|
|
do {
|
|
usleep(1);
|
|
if ((error = send(data->log_file, tbuf, cnt, 0)) >= 0)
|
|
break;
|
|
} while (errno == ENOBUFS);
|
|
}
|
|
|
|
/*
|
|
* Output the message to the console; try not to block
|
|
* as a blocking console should not stop other processes.
|
|
* Make sure the error reported is the one from the syslogd failure.
|
|
*/
|
|
if (error == -1 && (data->log_stat & LOG_CONS) &&
|
|
(fd = open(_PATH_CONSOLE, O_WRONLY|O_NONBLOCK, 0)) >= 0) {
|
|
struct iovec iov[2];
|
|
|
|
p = strchr(tbuf, '>') + 1;
|
|
iov[0].iov_base = p;
|
|
iov[0].iov_len = cnt - (p - tbuf);
|
|
iov[1].iov_base = "\r\n";
|
|
iov[1].iov_len = 2;
|
|
(void)writev(fd, iov, 2);
|
|
(void)close(fd);
|
|
}
|
|
|
|
if (data != &sdata)
|
|
closelog_r(data);
|
|
}
|
|
|
|
static void
|
|
disconnectlog_r(struct syslog_data *data)
|
|
{
|
|
/*
|
|
* If the user closed the FD and opened another in the same slot,
|
|
* that's their problem. They should close it before calling on
|
|
* system services.
|
|
*/
|
|
if (data->log_file != -1) {
|
|
close(data->log_file);
|
|
data->log_file = -1;
|
|
}
|
|
data->connected = 0; /* retry connect */
|
|
}
|
|
|
|
static void
|
|
connectlog_r(struct syslog_data *data)
|
|
{
|
|
union {
|
|
struct sockaddr syslogAddr;
|
|
struct sockaddr_un syslogAddrUn;
|
|
} u;
|
|
|
|
#define SyslogAddr u.syslogAddrUn
|
|
|
|
if (data->log_file == -1) {
|
|
if ((data->log_file = socket(AF_UNIX, SOCK_DGRAM, 0)) == -1)
|
|
return;
|
|
(void)fcntl(data->log_file, F_SETFD, 1);
|
|
}
|
|
if (data->log_file != -1 && !data->connected) {
|
|
memset(&SyslogAddr, '\0', sizeof(SyslogAddr));
|
|
#if 0
|
|
/* BIONIC: no sun_len field to fill on Linux */
|
|
SyslogAddr.sun_len = sizeof(SyslogAddr);
|
|
#endif
|
|
SyslogAddr.sun_family = AF_UNIX;
|
|
strlcpy(SyslogAddr.sun_path, _PATH_LOG,
|
|
sizeof(SyslogAddr.sun_path));
|
|
if (connect(data->log_file, &u.syslogAddr,
|
|
sizeof(SyslogAddr)) == -1) {
|
|
(void)close(data->log_file);
|
|
data->log_file = -1;
|
|
} else
|
|
data->connected = 1;
|
|
}
|
|
}
|
|
|
|
void
|
|
openlog_r(const char *ident, int logstat, int logfac, struct syslog_data *data)
|
|
{
|
|
if (ident != NULL)
|
|
data->log_tag = ident;
|
|
data->log_stat = logstat;
|
|
if (logfac != 0 && (logfac &~ LOG_FACMASK) == 0)
|
|
data->log_fac = logfac;
|
|
|
|
if (data->log_stat & LOG_NDELAY) /* open immediately */
|
|
connectlog_r(data);
|
|
|
|
data->opened = 1; /* ident and facility has been set */
|
|
}
|
|
|
|
void
|
|
closelog_r(struct syslog_data *data)
|
|
{
|
|
(void)close(data->log_file);
|
|
data->log_file = -1;
|
|
data->connected = 0;
|
|
data->log_tag = NULL;
|
|
}
|
|
|
|
/* setlogmask -- set the log mask level */
|
|
int
|
|
setlogmask_r(int pmask, struct syslog_data *data)
|
|
{
|
|
int omask;
|
|
|
|
omask = data->log_mask;
|
|
if (pmask != 0)
|
|
data->log_mask = pmask;
|
|
return (omask);
|
|
}
|