syslog.c revision 1.49 1 1.49 christos /* $NetBSD: syslog.c,v 1.49 2011/10/15 23:00:01 christos Exp $ */
2 1.6 cgd
3 1.1 cgd /*
4 1.6 cgd * Copyright (c) 1983, 1988, 1993
5 1.6 cgd * The Regents of the University of California. All rights reserved.
6 1.1 cgd *
7 1.1 cgd * Redistribution and use in source and binary forms, with or without
8 1.1 cgd * modification, are permitted provided that the following conditions
9 1.1 cgd * are met:
10 1.1 cgd * 1. Redistributions of source code must retain the above copyright
11 1.1 cgd * notice, this list of conditions and the following disclaimer.
12 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
13 1.1 cgd * notice, this list of conditions and the following disclaimer in the
14 1.1 cgd * documentation and/or other materials provided with the distribution.
15 1.30 agc * 3. Neither the name of the University nor the names of its contributors
16 1.1 cgd * may be used to endorse or promote products derived from this software
17 1.1 cgd * without specific prior written permission.
18 1.1 cgd *
19 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 1.1 cgd * SUCH DAMAGE.
30 1.1 cgd */
31 1.1 cgd
32 1.11 christos #include <sys/cdefs.h>
33 1.1 cgd #if defined(LIBC_SCCS) && !defined(lint)
34 1.6 cgd #if 0
35 1.13 perry static char sccsid[] = "@(#)syslog.c 8.5 (Berkeley) 4/29/95";
36 1.6 cgd #else
37 1.49 christos __RCSID("$NetBSD: syslog.c,v 1.49 2011/10/15 23:00:01 christos Exp $");
38 1.6 cgd #endif
39 1.1 cgd #endif /* LIBC_SCCS and not lint */
40 1.1 cgd
41 1.12 jtc #include "namespace.h"
42 1.1 cgd #include <sys/types.h>
43 1.43 christos #include <sys/param.h>
44 1.1 cgd #include <sys/socket.h>
45 1.1 cgd #include <sys/syslog.h>
46 1.1 cgd #include <sys/uio.h>
47 1.21 is #include <sys/un.h>
48 1.1 cgd #include <netdb.h>
49 1.2 glass
50 1.2 glass #include <errno.h>
51 1.2 glass #include <fcntl.h>
52 1.2 glass #include <paths.h>
53 1.28 wiz #include <stdarg.h>
54 1.2 glass #include <stdio.h>
55 1.26 cgd #include <stdlib.h>
56 1.1 cgd #include <string.h>
57 1.2 glass #include <time.h>
58 1.2 glass #include <unistd.h>
59 1.20 kleink #include "reentrant.h"
60 1.39 christos #include "extern.h"
61 1.2 glass
62 1.12 jtc #ifdef __weak_alias
63 1.24 mycroft __weak_alias(closelog,_closelog)
64 1.24 mycroft __weak_alias(openlog,_openlog)
65 1.24 mycroft __weak_alias(setlogmask,_setlogmask)
66 1.24 mycroft __weak_alias(syslog,_syslog)
67 1.24 mycroft __weak_alias(vsyslog,_vsyslog)
68 1.43 christos __weak_alias(syslogp,_syslogp)
69 1.43 christos __weak_alias(vsyslogp,_vsyslogp)
70 1.32 christos
71 1.32 christos __weak_alias(closelog_r,_closelog_r)
72 1.32 christos __weak_alias(openlog_r,_openlog_r)
73 1.32 christos __weak_alias(setlogmask_r,_setlogmask_r)
74 1.32 christos __weak_alias(syslog_r,_syslog_r)
75 1.32 christos __weak_alias(vsyslog_r,_vsyslog_r)
76 1.38 christos __weak_alias(syslog_ss,_syslog_ss)
77 1.38 christos __weak_alias(vsyslog_ss,_vsyslog_ss)
78 1.43 christos __weak_alias(syslogp_r,_syslogp_r)
79 1.43 christos __weak_alias(vsyslogp_r,_vsyslogp_r)
80 1.43 christos __weak_alias(syslogp_ss,_syslogp_ss)
81 1.43 christos __weak_alias(vsyslogp_ss,_vsyslogp_ss)
82 1.1 cgd #endif
83 1.1 cgd
84 1.32 christos static struct syslog_data sdata = SYSLOG_DATA_INIT;
85 1.1 cgd
86 1.32 christos static void openlog_unlocked_r(const char *, int, int,
87 1.32 christos struct syslog_data *);
88 1.32 christos static void disconnectlog_r(struct syslog_data *);
89 1.32 christos static void connectlog_r(struct syslog_data *);
90 1.34 christos
91 1.34 christos #define LOG_SIGNAL_SAFE (int)0x80000000
92 1.43 christos
93 1.20 kleink
94 1.29 thorpej #ifdef _REENTRANT
95 1.20 kleink static mutex_t syslog_mutex = MUTEX_INITIALIZER;
96 1.20 kleink #endif
97 1.20 kleink
98 1.43 christos static char hostname[MAXHOSTNAMELEN];
99 1.43 christos
100 1.1 cgd /*
101 1.1 cgd * syslog, vsyslog --
102 1.1 cgd * print message on log file; output is intended for syslogd(8).
103 1.1 cgd */
104 1.1 cgd void
105 1.1 cgd syslog(int pri, const char *fmt, ...)
106 1.1 cgd {
107 1.1 cgd va_list ap;
108 1.1 cgd
109 1.1 cgd va_start(ap, fmt);
110 1.1 cgd vsyslog(pri, fmt, ap);
111 1.1 cgd va_end(ap);
112 1.1 cgd }
113 1.1 cgd
114 1.1 cgd void
115 1.32 christos vsyslog(int pri, const char *fmt, va_list ap)
116 1.32 christos {
117 1.32 christos vsyslog_r(pri, &sdata, fmt, ap);
118 1.32 christos }
119 1.32 christos
120 1.43 christos /*
121 1.43 christos * syslogp, vsyslogp --
122 1.43 christos * like syslog but take additional arguments for MSGID and SD
123 1.43 christos */
124 1.43 christos void
125 1.43 christos syslogp(int pri, const char *msgid, const char *sdfmt, const char *msgfmt, ...)
126 1.43 christos {
127 1.43 christos va_list ap;
128 1.43 christos
129 1.43 christos va_start(ap, msgfmt);
130 1.43 christos vsyslogp(pri, msgid, sdfmt, msgfmt, ap);
131 1.43 christos va_end(ap);
132 1.43 christos }
133 1.43 christos
134 1.43 christos void
135 1.43 christos vsyslogp(int pri, const char *msgid, const char *sdfmt, const char *msgfmt, va_list ap)
136 1.43 christos {
137 1.43 christos vsyslogp_r(pri, &sdata, msgid, sdfmt, msgfmt, ap);
138 1.43 christos }
139 1.43 christos
140 1.32 christos void
141 1.32 christos openlog(const char *ident, int logstat, int logfac)
142 1.1 cgd {
143 1.32 christos openlog_r(ident, logstat, logfac, &sdata);
144 1.32 christos }
145 1.32 christos
146 1.32 christos void
147 1.32 christos closelog(void)
148 1.32 christos {
149 1.32 christos closelog_r(&sdata);
150 1.32 christos }
151 1.32 christos
152 1.32 christos /* setlogmask -- set the log mask level */
153 1.32 christos int
154 1.32 christos setlogmask(int pmask)
155 1.32 christos {
156 1.32 christos return setlogmask_r(pmask, &sdata);
157 1.32 christos }
158 1.32 christos
159 1.32 christos /* Reentrant version of syslog, i.e. syslog_r() */
160 1.32 christos
161 1.32 christos void
162 1.32 christos syslog_r(int pri, struct syslog_data *data, const char *fmt, ...)
163 1.32 christos {
164 1.32 christos va_list ap;
165 1.32 christos
166 1.32 christos va_start(ap, fmt);
167 1.32 christos vsyslog_r(pri, data, fmt, ap);
168 1.32 christos va_end(ap);
169 1.32 christos }
170 1.32 christos
171 1.32 christos void
172 1.43 christos syslogp_r(int pri, struct syslog_data *data, const char *msgid,
173 1.43 christos const char *sdfmt, const char *msgfmt, ...)
174 1.43 christos {
175 1.43 christos va_list ap;
176 1.43 christos
177 1.43 christos va_start(ap, msgfmt);
178 1.43 christos vsyslogp_r(pri, data, msgid, sdfmt, msgfmt, ap);
179 1.43 christos va_end(ap);
180 1.43 christos }
181 1.43 christos
182 1.43 christos void
183 1.34 christos syslog_ss(int pri, struct syslog_data *data, const char *fmt, ...)
184 1.34 christos {
185 1.34 christos va_list ap;
186 1.34 christos
187 1.34 christos va_start(ap, fmt);
188 1.34 christos vsyslog_r(pri | LOG_SIGNAL_SAFE, data, fmt, ap);
189 1.34 christos va_end(ap);
190 1.34 christos }
191 1.34 christos
192 1.34 christos void
193 1.43 christos syslogp_ss(int pri, struct syslog_data *data, const char *msgid,
194 1.43 christos const char *sdfmt, const char *msgfmt, ...)
195 1.43 christos {
196 1.43 christos va_list ap;
197 1.43 christos
198 1.43 christos va_start(ap, msgfmt);
199 1.43 christos vsyslogp_r(pri | LOG_SIGNAL_SAFE, data, msgid, sdfmt, msgfmt, ap);
200 1.43 christos va_end(ap);
201 1.43 christos }
202 1.43 christos
203 1.43 christos void
204 1.34 christos vsyslog_ss(int pri, struct syslog_data *data, const char *fmt, va_list ap)
205 1.34 christos {
206 1.34 christos vsyslog_r(pri | LOG_SIGNAL_SAFE, data, fmt, ap);
207 1.34 christos }
208 1.34 christos
209 1.34 christos void
210 1.43 christos vsyslogp_ss(int pri, struct syslog_data *data, const char *msgid,
211 1.43 christos const char *sdfmt, const char *msgfmt, va_list ap)
212 1.43 christos {
213 1.43 christos vsyslogp_r(pri | LOG_SIGNAL_SAFE, data, msgid, sdfmt, msgfmt, ap);
214 1.43 christos }
215 1.43 christos
216 1.43 christos
217 1.43 christos void
218 1.32 christos vsyslog_r(int pri, struct syslog_data *data, const char *fmt, va_list ap)
219 1.32 christos {
220 1.43 christos vsyslogp_r(pri, data, NULL, NULL, fmt, ap);
221 1.43 christos }
222 1.43 christos
223 1.43 christos void
224 1.43 christos vsyslogp_r(int pri, struct syslog_data *data, const char *msgid,
225 1.43 christos const char *sdfmt, const char *msgfmt, va_list ap)
226 1.43 christos {
227 1.48 christos static const char BRCOSP[] = "]: ";
228 1.48 christos static const char CRLF[] = "\r\n";
229 1.40 christos size_t cnt, prlen, tries;
230 1.14 perry char ch, *p, *t;
231 1.43 christos struct timeval tv;
232 1.43 christos struct tm tmnow;
233 1.2 glass time_t now;
234 1.32 christos int fd, saved_errno;
235 1.43 christos #define TBUF_LEN 2048
236 1.43 christos #define FMT_LEN 1024
237 1.40 christos #define MAXTRIES 10
238 1.43 christos char tbuf[TBUF_LEN], fmt_cpy[FMT_LEN], fmt_cat[FMT_LEN] = "";
239 1.48 christos size_t tbuf_left, fmt_left, msgsdlen;
240 1.43 christos char *fmt = fmt_cat;
241 1.34 christos int signal_safe = pri & LOG_SIGNAL_SAFE;
242 1.48 christos struct iovec iov[7]; /* prog + [ + pid + ]: + fmt + crlf */
243 1.48 christos int opened, iovcnt;
244 1.34 christos
245 1.35 christos pri &= ~LOG_SIGNAL_SAFE;
246 1.2 glass
247 1.43 christos #define INTERNALLOG LOG_ERR|LOG_CONS|LOG_PERROR|LOG_PID
248 1.2 glass /* Check for invalid bits. */
249 1.2 glass if (pri & ~(LOG_PRIMASK|LOG_FACMASK)) {
250 1.34 christos syslog_r(INTERNALLOG | signal_safe, data,
251 1.34 christos "syslog_r: unknown facility/priority: %x", pri);
252 1.2 glass pri &= LOG_PRIMASK|LOG_FACMASK;
253 1.2 glass }
254 1.1 cgd
255 1.2 glass /* Check priority against setlogmask values. */
256 1.32 christos if (!(LOG_MASK(LOG_PRI(pri)) & data->log_mask))
257 1.1 cgd return;
258 1.1 cgd
259 1.1 cgd saved_errno = errno;
260 1.1 cgd
261 1.6 cgd /* Set default facility if none specified. */
262 1.1 cgd if ((pri & LOG_FACMASK) == 0)
263 1.32 christos pri |= data->log_fac;
264 1.1 cgd
265 1.6 cgd /* Build the message. */
266 1.43 christos p = tbuf;
267 1.43 christos tbuf_left = TBUF_LEN;
268 1.9 jtc
269 1.43 christos #define DEC() \
270 1.19 christos do { \
271 1.19 christos if (prlen >= tbuf_left) \
272 1.19 christos prlen = tbuf_left - 1; \
273 1.19 christos p += prlen; \
274 1.19 christos tbuf_left -= prlen; \
275 1.32 christos } while (/*CONSTCOND*/0)
276 1.10 mycroft
277 1.43 christos prlen = snprintf_ss(p, tbuf_left, "<%d>1 ", pri);
278 1.9 jtc DEC();
279 1.9 jtc
280 1.43 christos if (!signal_safe && (gettimeofday(&tv, NULL) != -1)) {
281 1.32 christos /* strftime() implies tzset(), localtime_r() doesn't. */
282 1.32 christos tzset();
283 1.43 christos now = (time_t) tv.tv_sec;
284 1.43 christos localtime_r(&now, &tmnow);
285 1.43 christos
286 1.43 christos prlen = strftime(p, tbuf_left, "%FT%T", &tmnow);
287 1.43 christos DEC();
288 1.47 christos prlen = snprintf(p, tbuf_left, ".%06ld", (long)tv.tv_usec);
289 1.32 christos DEC();
290 1.43 christos prlen = strftime(p, tbuf_left-1, "%z", &tmnow);
291 1.43 christos /* strftime gives eg. "+0200", but we need "+02:00" */
292 1.43 christos if (prlen == 5) {
293 1.43 christos p[prlen+1] = p[prlen];
294 1.43 christos p[prlen] = p[prlen-1];
295 1.43 christos p[prlen-1] = p[prlen-2];
296 1.43 christos p[prlen-2] = ':';
297 1.43 christos prlen += 1;
298 1.43 christos }
299 1.43 christos } else {
300 1.43 christos prlen = snprintf_ss(p, tbuf_left, "-");
301 1.43 christos
302 1.43 christos /* if gmtime_r() was signal-safe we could output the UTC-time:
303 1.43 christos gmtime_r(&now, &tmnow);
304 1.43 christos prlen = strftime(p, tbuf_left, "%FT%TZ", &tmnow);
305 1.43 christos */
306 1.32 christos }
307 1.43 christos DEC();
308 1.43 christos prlen = snprintf_ss(p, tbuf_left, " %s ", hostname);
309 1.43 christos DEC();
310 1.9 jtc
311 1.32 christos if (data->log_tag == NULL)
312 1.32 christos data->log_tag = getprogname();
313 1.43 christos
314 1.43 christos prlen = snprintf_ss(p, tbuf_left, "%s ",
315 1.43 christos data->log_tag ? data->log_tag : "-");
316 1.48 christos if (data->log_stat & (LOG_PERROR|LOG_CONS)) {
317 1.48 christos iovcnt = 0;
318 1.48 christos iov[iovcnt].iov_base = p;
319 1.48 christos iov[iovcnt].iov_len = prlen - 1;
320 1.48 christos iovcnt++;
321 1.48 christos }
322 1.43 christos DEC();
323 1.43 christos
324 1.48 christos if (data->log_stat & LOG_PID) {
325 1.43 christos prlen = snprintf_ss(p, tbuf_left, "%d ", getpid());
326 1.48 christos if (data->log_stat & (LOG_PERROR|LOG_CONS)) {
327 1.48 christos iov[iovcnt].iov_base = __UNCONST("[");
328 1.48 christos iov[iovcnt].iov_len = 1;
329 1.48 christos iovcnt++;
330 1.48 christos iov[iovcnt].iov_base = p;
331 1.48 christos iov[iovcnt].iov_len = prlen - 1;
332 1.48 christos iovcnt++;
333 1.48 christos iov[iovcnt].iov_base = __UNCONST(BRCOSP);
334 1.48 christos iov[iovcnt].iov_len = 3;
335 1.48 christos iovcnt++;
336 1.48 christos }
337 1.48 christos } else {
338 1.43 christos prlen = snprintf_ss(p, tbuf_left, "- ");
339 1.48 christos if (data->log_stat & (LOG_PERROR|LOG_CONS)) {
340 1.48 christos iov[iovcnt].iov_base = __UNCONST(BRCOSP + 1);
341 1.48 christos iov[iovcnt].iov_len = 2;
342 1.48 christos iovcnt++;
343 1.48 christos }
344 1.48 christos }
345 1.43 christos DEC();
346 1.43 christos
347 1.43 christos /*
348 1.43 christos * concat the format strings, then use one vsnprintf()
349 1.43 christos */
350 1.43 christos if (msgid != NULL && *msgid != '\0') {
351 1.43 christos strlcat(fmt_cat, msgid, FMT_LEN);
352 1.43 christos strlcat(fmt_cat, " ", FMT_LEN);
353 1.43 christos } else
354 1.43 christos strlcat(fmt_cat, "- ", FMT_LEN);
355 1.43 christos
356 1.43 christos if (sdfmt != NULL && *sdfmt != '\0') {
357 1.43 christos strlcat(fmt_cat, sdfmt, FMT_LEN);
358 1.43 christos } else
359 1.43 christos strlcat(fmt_cat, "-", FMT_LEN);
360 1.43 christos
361 1.48 christos if (data->log_stat & (LOG_PERROR|LOG_CONS))
362 1.48 christos msgsdlen = strlen(fmt_cat) + 1;
363 1.48 christos else
364 1.48 christos msgsdlen = 0; /* XXX: GCC */
365 1.48 christos
366 1.43 christos if (msgfmt != NULL && *msgfmt != '\0') {
367 1.43 christos strlcat(fmt_cat, " ", FMT_LEN);
368 1.43 christos strlcat(fmt_cat, msgfmt, FMT_LEN);
369 1.1 cgd }
370 1.1 cgd
371 1.43 christos /*
372 1.43 christos * We wouldn't need this mess if printf handled %m, or if
373 1.9 jtc * strerror() had been invented before syslog().
374 1.9 jtc */
375 1.11 christos for (t = fmt_cpy, fmt_left = FMT_LEN; (ch = *fmt) != '\0'; ++fmt) {
376 1.6 cgd if (ch == '%' && fmt[1] == 'm') {
377 1.32 christos char ebuf[128];
378 1.6 cgd ++fmt;
379 1.34 christos if (signal_safe ||
380 1.33 christos strerror_r(saved_errno, ebuf, sizeof(ebuf)))
381 1.43 christos prlen = snprintf_ss(t, fmt_left, "Error %d",
382 1.32 christos saved_errno);
383 1.32 christos else
384 1.34 christos prlen = snprintf_ss(t, fmt_left, "%s", ebuf);
385 1.10 mycroft if (prlen >= fmt_left)
386 1.10 mycroft prlen = fmt_left - 1;
387 1.10 mycroft t += prlen;
388 1.10 mycroft fmt_left -= prlen;
389 1.32 christos } else if (ch == '%' && fmt[1] == '%' && fmt_left > 2) {
390 1.32 christos *t++ = '%';
391 1.32 christos *t++ = '%';
392 1.32 christos fmt++;
393 1.32 christos fmt_left -= 2;
394 1.9 jtc } else {
395 1.10 mycroft if (fmt_left > 1) {
396 1.9 jtc *t++ = ch;
397 1.10 mycroft fmt_left--;
398 1.9 jtc }
399 1.9 jtc }
400 1.9 jtc }
401 1.6 cgd *t = '\0';
402 1.1 cgd
403 1.34 christos if (signal_safe)
404 1.34 christos prlen = vsnprintf_ss(p, tbuf_left, fmt_cpy, ap);
405 1.34 christos else
406 1.34 christos prlen = vsnprintf(p, tbuf_left, fmt_cpy, ap);
407 1.48 christos
408 1.48 christos if (data->log_stat & (LOG_PERROR|LOG_CONS)) {
409 1.48 christos iov[iovcnt].iov_base = p + msgsdlen;
410 1.48 christos iov[iovcnt].iov_len = prlen - msgsdlen;
411 1.48 christos iovcnt++;
412 1.48 christos }
413 1.48 christos
414 1.9 jtc DEC();
415 1.6 cgd cnt = p - tbuf;
416 1.1 cgd
417 1.6 cgd /* Output to stderr if requested. */
418 1.32 christos if (data->log_stat & LOG_PERROR) {
419 1.48 christos iov[iovcnt].iov_base = __UNCONST(CRLF + 1);
420 1.48 christos iov[iovcnt].iov_len = 1;
421 1.48 christos (void)writev(STDERR_FILENO, iov, iovcnt + 1);
422 1.1 cgd }
423 1.1 cgd
424 1.6 cgd /* Get connected, output the message to the local logger. */
425 1.32 christos if (data == &sdata)
426 1.32 christos mutex_lock(&syslog_mutex);
427 1.42 dogcow opened = !data->opened;
428 1.42 dogcow if (opened)
429 1.32 christos openlog_unlocked_r(data->log_tag, data->log_stat, 0, data);
430 1.32 christos connectlog_r(data);
431 1.32 christos
432 1.27 atatat /*
433 1.32 christos * If the send() failed, there are two likely scenarios:
434 1.32 christos * 1) syslogd was restarted
435 1.32 christos * 2) /dev/log is out of socket buffer space
436 1.32 christos * We attempt to reconnect to /dev/log to take care of
437 1.32 christos * case #1 and keep send()ing data to cover case #2
438 1.32 christos * to give syslogd a chance to empty its socket buffer.
439 1.27 atatat */
440 1.40 christos for (tries = 0; tries < MAXTRIES; tries++) {
441 1.40 christos if (send(data->log_file, tbuf, cnt, 0) != -1)
442 1.40 christos break;
443 1.32 christos if (errno != ENOBUFS) {
444 1.32 christos disconnectlog_r(data);
445 1.32 christos connectlog_r(data);
446 1.40 christos } else
447 1.40 christos (void)usleep(1);
448 1.27 atatat }
449 1.1 cgd
450 1.1 cgd /*
451 1.32 christos * Output the message to the console; try not to block
452 1.32 christos * as a blocking console should not stop other processes.
453 1.32 christos * Make sure the error reported is the one from the syslogd failure.
454 1.1 cgd */
455 1.40 christos if (tries == MAXTRIES && (data->log_stat & LOG_CONS) &&
456 1.48 christos (fd = open(_PATH_CONSOLE, O_WRONLY|O_NONBLOCK, 0)) >= 0) {
457 1.48 christos iov[iovcnt].iov_base = __UNCONST(CRLF);
458 1.48 christos iov[iovcnt].iov_len = 2;
459 1.48 christos (void)writev(fd, iov, iovcnt + 1);
460 1.1 cgd (void)close(fd);
461 1.1 cgd }
462 1.40 christos
463 1.40 christos if (data == &sdata)
464 1.40 christos mutex_unlock(&syslog_mutex);
465 1.40 christos
466 1.41 christos if (data != &sdata && opened) {
467 1.41 christos /* preserve log tag */
468 1.41 christos const char *ident = data->log_tag;
469 1.32 christos closelog_r(data);
470 1.41 christos data->log_tag = ident;
471 1.41 christos }
472 1.1 cgd }
473 1.1 cgd
474 1.32 christos static void
475 1.32 christos disconnectlog_r(struct syslog_data *data)
476 1.32 christos {
477 1.32 christos /*
478 1.32 christos * If the user closed the FD and opened another in the same slot,
479 1.32 christos * that's their problem. They should close it before calling on
480 1.32 christos * system services.
481 1.32 christos */
482 1.32 christos if (data->log_file != -1) {
483 1.32 christos (void)close(data->log_file);
484 1.32 christos data->log_file = -1;
485 1.32 christos }
486 1.32 christos data->connected = 0; /* retry connect */
487 1.32 christos }
488 1.1 cgd
489 1.20 kleink static void
490 1.32 christos connectlog_r(struct syslog_data *data)
491 1.1 cgd {
492 1.32 christos /* AF_UNIX address of local logger */
493 1.32 christos static const struct sockaddr_un sun = {
494 1.32 christos .sun_family = AF_LOCAL,
495 1.32 christos .sun_len = sizeof(sun),
496 1.32 christos .sun_path = _PATH_LOG,
497 1.32 christos };
498 1.20 kleink
499 1.36 christos if (data->log_file == -1 || fcntl(data->log_file, F_GETFL, 0) == -1) {
500 1.49 christos if ((data->log_file = socket(AF_UNIX, SOCK_DGRAM | SOCK_CLOEXEC,
501 1.49 christos 0)) == -1)
502 1.32 christos return;
503 1.36 christos data->connected = 0;
504 1.1 cgd }
505 1.36 christos if (!data->connected) {
506 1.32 christos if (connect(data->log_file,
507 1.32 christos (const struct sockaddr *)(const void *)&sun,
508 1.32 christos sizeof(sun)) == -1) {
509 1.32 christos (void)close(data->log_file);
510 1.32 christos data->log_file = -1;
511 1.43 christos } else
512 1.32 christos data->connected = 1;
513 1.17 thorpej }
514 1.1 cgd }
515 1.1 cgd
516 1.32 christos static void
517 1.32 christos openlog_unlocked_r(const char *ident, int logstat, int logfac,
518 1.32 christos struct syslog_data *data)
519 1.20 kleink {
520 1.32 christos if (ident != NULL)
521 1.32 christos data->log_tag = ident;
522 1.32 christos data->log_stat = logstat;
523 1.32 christos if (logfac != 0 && (logfac &~ LOG_FACMASK) == 0)
524 1.32 christos data->log_fac = logfac;
525 1.20 kleink
526 1.32 christos if (data->log_stat & LOG_NDELAY) /* open immediately */
527 1.32 christos connectlog_r(data);
528 1.41 christos
529 1.43 christos /* We could cache this, but then it might change */
530 1.46 christos if (gethostname(hostname, sizeof(hostname)) == -1
531 1.46 christos || hostname[0] == '\0') {
532 1.46 christos /* can this really happen? */
533 1.46 christos hostname[0] = '-';
534 1.46 christos hostname[1] = '\0';
535 1.46 christos }
536 1.41 christos data->opened = 1;
537 1.20 kleink }
538 1.20 kleink
539 1.32 christos void
540 1.32 christos openlog_r(const char *ident, int logstat, int logfac, struct syslog_data *data)
541 1.1 cgd {
542 1.32 christos if (data == &sdata)
543 1.32 christos mutex_lock(&syslog_mutex);
544 1.32 christos openlog_unlocked_r(ident, logstat, logfac, data);
545 1.32 christos if (data == &sdata)
546 1.32 christos mutex_unlock(&syslog_mutex);
547 1.20 kleink }
548 1.20 kleink
549 1.20 kleink void
550 1.32 christos closelog_r(struct syslog_data *data)
551 1.20 kleink {
552 1.32 christos if (data == &sdata)
553 1.32 christos mutex_lock(&syslog_mutex);
554 1.32 christos (void)close(data->log_file);
555 1.32 christos data->log_file = -1;
556 1.32 christos data->connected = 0;
557 1.32 christos data->log_tag = NULL;
558 1.32 christos if (data == &sdata)
559 1.32 christos mutex_unlock(&syslog_mutex);
560 1.1 cgd }
561 1.1 cgd
562 1.2 glass int
563 1.32 christos setlogmask_r(int pmask, struct syslog_data *data)
564 1.1 cgd {
565 1.1 cgd int omask;
566 1.1 cgd
567 1.32 christos omask = data->log_mask;
568 1.1 cgd if (pmask != 0)
569 1.32 christos data->log_mask = pmask;
570 1.32 christos return omask;
571 1.1 cgd }
572