| /* $OpenBSD: syslog.c,v 1.28 2005/08/08 08:05:34 espie Exp $ */ |
| /* |
| * Copyright (c) 1983, 1988, 1993 |
| * The Regents of the University of California. All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * 3. Neither the name of the University nor the names of its contributors |
| * may be used to endorse or promote products derived from this software |
| * without specific prior written permission. |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND |
| * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE |
| * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
| * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
| * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
| * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| * SUCH DAMAGE. |
| */ |
| |
| #include <sys/types.h> |
| #include <sys/socket.h> |
| #include <sys/uio.h> |
| #include <syslog.h> |
| #include <sys/un.h> |
| #include <netdb.h> |
| |
| #include <errno.h> |
| #include <fcntl.h> |
| #include <paths.h> |
| #include <stdio.h> |
| #include <string.h> |
| #include <time.h> |
| #include <unistd.h> |
| #include <stdarg.h> |
| |
| static struct syslog_data sdata = SYSLOG_DATA_INIT; |
| |
| extern const char *__progname; /* Program name, from crt0. */ |
| |
| static void disconnectlog_r(struct syslog_data *); /* disconnect from syslogd */ |
| static void connectlog_r(struct syslog_data *); /* (re)connect to syslogd */ |
| |
| /* |
| * syslog, vsyslog -- |
| * print message on log file; output is intended for syslogd(8). |
| */ |
| void |
| syslog(int pri, const char *fmt, ...) |
| { |
| va_list ap; |
| |
| va_start(ap, fmt); |
| vsyslog(pri, fmt, ap); |
| va_end(ap); |
| } |
| |
| void |
| vsyslog(int pri, const char *fmt, va_list ap) |
| { |
| vsyslog_r(pri, &sdata, fmt, ap); |
| } |
| |
| void |
| openlog(const char *ident, int logstat, int logfac) |
| { |
| openlog_r(ident, logstat, logfac, &sdata); |
| } |
| |
| void |
| closelog(void) |
| { |
| closelog_r(&sdata); |
| } |
| |
| /* setlogmask -- set the log mask level */ |
| int |
| setlogmask(int pmask) |
| { |
| return setlogmask_r(pmask, &sdata); |
| } |
| |
| /* Reentrant version of syslog, i.e. syslog_r() */ |
| |
| void |
| syslog_r(int pri, struct syslog_data *data, const char *fmt, ...) |
| { |
| va_list ap; |
| |
| va_start(ap, fmt); |
| vsyslog_r(pri, data, fmt, ap); |
| va_end(ap); |
| } |
| |
| void |
| vsyslog_r(int pri, struct syslog_data *data, const char *fmt, va_list ap) |
| { |
| int cnt; |
| char ch, *p, *t; |
| time_t now; |
| int fd, saved_errno, error; |
| #define TBUF_LEN 2048 |
| #define FMT_LEN 1024 |
| char *stdp = NULL, tbuf[TBUF_LEN], fmt_cpy[FMT_LEN]; |
| int tbuf_left, fmt_left, prlen; |
| |
| #define INTERNALLOG LOG_ERR|LOG_CONS|LOG_PERROR|LOG_PID |
| /* Check for invalid bits. */ |
| if (pri & ~(LOG_PRIMASK|LOG_FACMASK)) { |
| if (data == &sdata) { |
| syslog(INTERNALLOG, |
| "syslog: unknown facility/priority: %x", pri); |
| } else { |
| syslog_r(INTERNALLOG, data, |
| "syslog_r: unknown facility/priority: %x", pri); |
| } |
| pri &= LOG_PRIMASK|LOG_FACMASK; |
| } |
| |
| /* Check priority against setlogmask values. */ |
| if (!(LOG_MASK(LOG_PRI(pri)) & data->log_mask)) |
| return; |
| |
| saved_errno = errno; |
| |
| /* Set default facility if none specified. */ |
| if ((pri & LOG_FACMASK) == 0) |
| pri |= data->log_fac; |
| |
| /* If we have been called through syslog(), no need for reentrancy. */ |
| if (data == &sdata) |
| (void)time(&now); |
| |
| p = tbuf; |
| tbuf_left = TBUF_LEN; |
| |
| #define DEC() \ |
| do { \ |
| if (prlen < 0) \ |
| prlen = 0; \ |
| if (prlen >= tbuf_left) \ |
| prlen = tbuf_left - 1; \ |
| p += prlen; \ |
| tbuf_left -= prlen; \ |
| } while (0) |
| |
| prlen = snprintf(p, tbuf_left, "<%d>", pri); |
| DEC(); |
| |
| /* |
| * syslogd will expand time automagically for reentrant case, and |
| * for normal case, just do like before |
| */ |
| if (data == &sdata) { |
| prlen = strftime(p, tbuf_left, "%h %e %T ", localtime(&now)); |
| DEC(); |
| } |
| |
| if (data->log_stat & LOG_PERROR) |
| stdp = p; |
| if (data->log_tag == NULL) |
| data->log_tag = __progname; |
| if (data->log_tag != NULL) { |
| prlen = snprintf(p, tbuf_left, "%s", data->log_tag); |
| DEC(); |
| } |
| if (data->log_stat & LOG_PID) { |
| prlen = snprintf(p, tbuf_left, "[%ld]", (long)getpid()); |
| DEC(); |
| } |
| if (data->log_tag != NULL) { |
| if (tbuf_left > 1) { |
| *p++ = ':'; |
| tbuf_left--; |
| } |
| if (tbuf_left > 1) { |
| *p++ = ' '; |
| tbuf_left--; |
| } |
| } |
| |
| /* strerror() is not reentrant */ |
| |
| for (t = fmt_cpy, fmt_left = FMT_LEN; (ch = *fmt); ++fmt) { |
| if (ch == '%' && fmt[1] == 'm') { |
| ++fmt; |
| if (data == &sdata) { |
| prlen = snprintf(t, fmt_left, "%s", |
| strerror(saved_errno)); |
| } else { |
| prlen = snprintf(t, fmt_left, "Error %d", |
| saved_errno); |
| } |
| if (prlen < 0) |
| prlen = 0; |
| if (prlen >= fmt_left) |
| prlen = fmt_left - 1; |
| t += prlen; |
| fmt_left -= prlen; |
| } else if (ch == '%' && fmt[1] == '%' && fmt_left > 2) { |
| *t++ = '%'; |
| *t++ = '%'; |
| fmt++; |
| fmt_left -= 2; |
| } else { |
| if (fmt_left > 1) { |
| *t++ = ch; |
| fmt_left--; |
| } |
| } |
| } |
| *t = '\0'; |
| |
| prlen = vsnprintf(p, tbuf_left, fmt_cpy, ap); |
| DEC(); |
| cnt = p - tbuf; |
| |
| /* Output to stderr if requested. */ |
| if (data->log_stat & LOG_PERROR) { |
| struct iovec iov[2]; |
| |
| iov[0].iov_base = stdp; |
| iov[0].iov_len = cnt - (stdp - tbuf); |
| iov[1].iov_base = "\n"; |
| iov[1].iov_len = 1; |
| (void)writev(STDERR_FILENO, iov, 2); |
| } |
| |
| /* Get connected, output the message to the local logger. */ |
| if (!data->opened) |
| openlog_r(data->log_tag, data->log_stat, 0, data); |
| connectlog_r(data); |
| |
| /* |
| * If the send() failed, there are two likely scenarios: |
| * 1) syslogd was restarted |
| * 2) /dev/log is out of socket buffer space |
| * We attempt to reconnect to /dev/log to take care of |
| * case #1 and keep send()ing data to cover case #2 |
| * to give syslogd a chance to empty its socket buffer. |
| */ |
| if ((error = send(data->log_file, tbuf, cnt, 0)) < 0) { |
| if (errno != ENOBUFS) { |
| disconnectlog_r(data); |
| connectlog_r(data); |
| } |
| do { |
| usleep(1); |
| if ((error = send(data->log_file, tbuf, cnt, 0)) >= 0) |
| break; |
| } while (errno == ENOBUFS); |
| } |
| |
| /* |
| * Output the message to the console; try not to block |
| * as a blocking console should not stop other processes. |
| * Make sure the error reported is the one from the syslogd failure. |
| */ |
| if (error == -1 && (data->log_stat & LOG_CONS) && |
| (fd = open(_PATH_CONSOLE, O_WRONLY|O_NONBLOCK, 0)) >= 0) { |
| struct iovec iov[2]; |
| |
| p = strchr(tbuf, '>') + 1; |
| iov[0].iov_base = p; |
| iov[0].iov_len = cnt - (p - tbuf); |
| iov[1].iov_base = "\r\n"; |
| iov[1].iov_len = 2; |
| (void)writev(fd, iov, 2); |
| (void)close(fd); |
| } |
| |
| if (data != &sdata) |
| closelog_r(data); |
| } |
| |
| static void |
| disconnectlog_r(struct syslog_data *data) |
| { |
| /* |
| * If the user closed the FD and opened another in the same slot, |
| * that's their problem. They should close it before calling on |
| * system services. |
| */ |
| if (data->log_file != -1) { |
| close(data->log_file); |
| data->log_file = -1; |
| } |
| data->connected = 0; /* retry connect */ |
| } |
| |
| static void |
| connectlog_r(struct syslog_data *data) |
| { |
| union { |
| struct sockaddr syslogAddr; |
| struct sockaddr_un syslogAddrUn; |
| } u; |
| |
| #define SyslogAddr u.syslogAddrUn |
| |
| if (data->log_file == -1) { |
| if ((data->log_file = socket(AF_UNIX, SOCK_DGRAM, 0)) == -1) |
| return; |
| (void)fcntl(data->log_file, F_SETFD, 1); |
| } |
| if (data->log_file != -1 && !data->connected) { |
| memset(&SyslogAddr, '\0', sizeof(SyslogAddr)); |
| #if 0 |
| /* BIONIC: no sun_len field to fill on Linux */ |
| SyslogAddr.sun_len = sizeof(SyslogAddr); |
| #endif |
| SyslogAddr.sun_family = AF_UNIX; |
| strlcpy(SyslogAddr.sun_path, _PATH_LOG, |
| sizeof(SyslogAddr.sun_path)); |
| if (connect(data->log_file, &u.syslogAddr, |
| sizeof(SyslogAddr)) == -1) { |
| (void)close(data->log_file); |
| data->log_file = -1; |
| } else |
| data->connected = 1; |
| } |
| } |
| |
| void |
| openlog_r(const char *ident, int logstat, int logfac, struct syslog_data *data) |
| { |
| if (ident != NULL) |
| data->log_tag = ident; |
| data->log_stat = logstat; |
| if (logfac != 0 && (logfac &~ LOG_FACMASK) == 0) |
| data->log_fac = logfac; |
| |
| if (data->log_stat & LOG_NDELAY) /* open immediately */ |
| connectlog_r(data); |
| |
| data->opened = 1; /* ident and facility has been set */ |
| } |
| |
| void |
| closelog_r(struct syslog_data *data) |
| { |
| (void)close(data->log_file); |
| data->log_file = -1; |
| data->connected = 0; |
| data->log_tag = NULL; |
| } |
| |
| /* setlogmask -- set the log mask level */ |
| int |
| setlogmask_r(int pmask, struct syslog_data *data) |
| { |
| int omask; |
| |
| omask = data->log_mask; |
| if (pmask != 0) |
| data->log_mask = pmask; |
| return (omask); |
| } |