syslog.c revision 1.55 1 1.55 roy /* $NetBSD: syslog.c,v 1.55 2015/10/26 11:44:30 roy Exp $ */
2 1.6 cgd
3 1.1 cgd /*
4 1.6 cgd * Copyright (c) 1983, 1988, 1993
5 1.6 cgd * The Regents of the University of California. All rights reserved.
6 1.1 cgd *
7 1.1 cgd * Redistribution and use in source and binary forms, with or without
8 1.1 cgd * modification, are permitted provided that the following conditions
9 1.1 cgd * are met:
10 1.1 cgd * 1. Redistributions of source code must retain the above copyright
11 1.1 cgd * notice, this list of conditions and the following disclaimer.
12 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
13 1.1 cgd * notice, this list of conditions and the following disclaimer in the
14 1.1 cgd * documentation and/or other materials provided with the distribution.
15 1.30 agc * 3. Neither the name of the University nor the names of its contributors
16 1.1 cgd * may be used to endorse or promote products derived from this software
17 1.1 cgd * without specific prior written permission.
18 1.1 cgd *
19 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 1.1 cgd * SUCH DAMAGE.
30 1.1 cgd */
31 1.1 cgd
32 1.11 christos #include <sys/cdefs.h>
33 1.1 cgd #if defined(LIBC_SCCS) && !defined(lint)
34 1.6 cgd #if 0
35 1.13 perry static char sccsid[] = "@(#)syslog.c 8.5 (Berkeley) 4/29/95";
36 1.6 cgd #else
37 1.55 roy __RCSID("$NetBSD: syslog.c,v 1.55 2015/10/26 11:44:30 roy Exp $");
38 1.6 cgd #endif
39 1.1 cgd #endif /* LIBC_SCCS and not lint */
40 1.1 cgd
41 1.12 jtc #include "namespace.h"
42 1.1 cgd #include <sys/types.h>
43 1.43 christos #include <sys/param.h>
44 1.1 cgd #include <sys/socket.h>
45 1.1 cgd #include <sys/syslog.h>
46 1.1 cgd #include <sys/uio.h>
47 1.21 is #include <sys/un.h>
48 1.1 cgd #include <netdb.h>
49 1.2 glass
50 1.2 glass #include <errno.h>
51 1.2 glass #include <fcntl.h>
52 1.2 glass #include <paths.h>
53 1.28 wiz #include <stdarg.h>
54 1.2 glass #include <stdio.h>
55 1.26 cgd #include <stdlib.h>
56 1.1 cgd #include <string.h>
57 1.2 glass #include <time.h>
58 1.2 glass #include <unistd.h>
59 1.20 kleink #include "reentrant.h"
60 1.39 christos #include "extern.h"
61 1.2 glass
62 1.12 jtc #ifdef __weak_alias
63 1.24 mycroft __weak_alias(closelog,_closelog)
64 1.24 mycroft __weak_alias(openlog,_openlog)
65 1.24 mycroft __weak_alias(setlogmask,_setlogmask)
66 1.24 mycroft __weak_alias(syslog,_syslog)
67 1.24 mycroft __weak_alias(vsyslog,_vsyslog)
68 1.43 christos __weak_alias(syslogp,_syslogp)
69 1.43 christos __weak_alias(vsyslogp,_vsyslogp)
70 1.1 cgd #endif
71 1.1 cgd
72 1.32 christos static struct syslog_data sdata = SYSLOG_DATA_INIT;
73 1.1 cgd
74 1.32 christos static void openlog_unlocked_r(const char *, int, int,
75 1.32 christos struct syslog_data *);
76 1.32 christos static void disconnectlog_r(struct syslog_data *);
77 1.32 christos static void connectlog_r(struct syslog_data *);
78 1.34 christos
79 1.34 christos #define LOG_SIGNAL_SAFE (int)0x80000000
80 1.43 christos
81 1.20 kleink
82 1.29 thorpej #ifdef _REENTRANT
83 1.20 kleink static mutex_t syslog_mutex = MUTEX_INITIALIZER;
84 1.20 kleink #endif
85 1.20 kleink
86 1.1 cgd /*
87 1.1 cgd * syslog, vsyslog --
88 1.1 cgd * print message on log file; output is intended for syslogd(8).
89 1.1 cgd */
90 1.1 cgd void
91 1.1 cgd syslog(int pri, const char *fmt, ...)
92 1.1 cgd {
93 1.1 cgd va_list ap;
94 1.1 cgd
95 1.1 cgd va_start(ap, fmt);
96 1.1 cgd vsyslog(pri, fmt, ap);
97 1.1 cgd va_end(ap);
98 1.1 cgd }
99 1.1 cgd
100 1.1 cgd void
101 1.32 christos vsyslog(int pri, const char *fmt, va_list ap)
102 1.32 christos {
103 1.32 christos vsyslog_r(pri, &sdata, fmt, ap);
104 1.32 christos }
105 1.32 christos
106 1.43 christos /*
107 1.43 christos * syslogp, vsyslogp --
108 1.43 christos * like syslog but take additional arguments for MSGID and SD
109 1.43 christos */
110 1.43 christos void
111 1.43 christos syslogp(int pri, const char *msgid, const char *sdfmt, const char *msgfmt, ...)
112 1.43 christos {
113 1.43 christos va_list ap;
114 1.43 christos
115 1.43 christos va_start(ap, msgfmt);
116 1.43 christos vsyslogp(pri, msgid, sdfmt, msgfmt, ap);
117 1.43 christos va_end(ap);
118 1.43 christos }
119 1.43 christos
120 1.43 christos void
121 1.43 christos vsyslogp(int pri, const char *msgid, const char *sdfmt, const char *msgfmt, va_list ap)
122 1.43 christos {
123 1.43 christos vsyslogp_r(pri, &sdata, msgid, sdfmt, msgfmt, ap);
124 1.43 christos }
125 1.43 christos
126 1.32 christos void
127 1.32 christos openlog(const char *ident, int logstat, int logfac)
128 1.1 cgd {
129 1.32 christos openlog_r(ident, logstat, logfac, &sdata);
130 1.32 christos }
131 1.32 christos
132 1.32 christos void
133 1.32 christos closelog(void)
134 1.32 christos {
135 1.32 christos closelog_r(&sdata);
136 1.32 christos }
137 1.32 christos
138 1.32 christos /* setlogmask -- set the log mask level */
139 1.32 christos int
140 1.32 christos setlogmask(int pmask)
141 1.32 christos {
142 1.32 christos return setlogmask_r(pmask, &sdata);
143 1.32 christos }
144 1.32 christos
145 1.32 christos /* Reentrant version of syslog, i.e. syslog_r() */
146 1.32 christos
147 1.32 christos void
148 1.32 christos syslog_r(int pri, struct syslog_data *data, const char *fmt, ...)
149 1.32 christos {
150 1.32 christos va_list ap;
151 1.32 christos
152 1.32 christos va_start(ap, fmt);
153 1.32 christos vsyslog_r(pri, data, fmt, ap);
154 1.32 christos va_end(ap);
155 1.32 christos }
156 1.32 christos
157 1.32 christos void
158 1.43 christos syslogp_r(int pri, struct syslog_data *data, const char *msgid,
159 1.43 christos const char *sdfmt, const char *msgfmt, ...)
160 1.43 christos {
161 1.43 christos va_list ap;
162 1.43 christos
163 1.43 christos va_start(ap, msgfmt);
164 1.43 christos vsyslogp_r(pri, data, msgid, sdfmt, msgfmt, ap);
165 1.43 christos va_end(ap);
166 1.43 christos }
167 1.43 christos
168 1.43 christos void
169 1.34 christos syslog_ss(int pri, struct syslog_data *data, const char *fmt, ...)
170 1.34 christos {
171 1.34 christos va_list ap;
172 1.34 christos
173 1.34 christos va_start(ap, fmt);
174 1.34 christos vsyslog_r(pri | LOG_SIGNAL_SAFE, data, fmt, ap);
175 1.34 christos va_end(ap);
176 1.34 christos }
177 1.34 christos
178 1.34 christos void
179 1.43 christos syslogp_ss(int pri, struct syslog_data *data, const char *msgid,
180 1.43 christos const char *sdfmt, const char *msgfmt, ...)
181 1.43 christos {
182 1.43 christos va_list ap;
183 1.43 christos
184 1.43 christos va_start(ap, msgfmt);
185 1.43 christos vsyslogp_r(pri | LOG_SIGNAL_SAFE, data, msgid, sdfmt, msgfmt, ap);
186 1.43 christos va_end(ap);
187 1.43 christos }
188 1.43 christos
189 1.43 christos void
190 1.34 christos vsyslog_ss(int pri, struct syslog_data *data, const char *fmt, va_list ap)
191 1.34 christos {
192 1.34 christos vsyslog_r(pri | LOG_SIGNAL_SAFE, data, fmt, ap);
193 1.34 christos }
194 1.34 christos
195 1.34 christos void
196 1.43 christos vsyslogp_ss(int pri, struct syslog_data *data, const char *msgid,
197 1.43 christos const char *sdfmt, const char *msgfmt, va_list ap)
198 1.43 christos {
199 1.43 christos vsyslogp_r(pri | LOG_SIGNAL_SAFE, data, msgid, sdfmt, msgfmt, ap);
200 1.43 christos }
201 1.43 christos
202 1.43 christos
203 1.43 christos void
204 1.32 christos vsyslog_r(int pri, struct syslog_data *data, const char *fmt, va_list ap)
205 1.32 christos {
206 1.43 christos vsyslogp_r(pri, data, NULL, NULL, fmt, ap);
207 1.43 christos }
208 1.43 christos
209 1.43 christos void
210 1.43 christos vsyslogp_r(int pri, struct syslog_data *data, const char *msgid,
211 1.43 christos const char *sdfmt, const char *msgfmt, va_list ap)
212 1.43 christos {
213 1.48 christos static const char BRCOSP[] = "]: ";
214 1.48 christos static const char CRLF[] = "\r\n";
215 1.40 christos size_t cnt, prlen, tries;
216 1.14 perry char ch, *p, *t;
217 1.43 christos struct timeval tv;
218 1.43 christos struct tm tmnow;
219 1.2 glass time_t now;
220 1.32 christos int fd, saved_errno;
221 1.43 christos #define TBUF_LEN 2048
222 1.43 christos #define FMT_LEN 1024
223 1.40 christos #define MAXTRIES 10
224 1.43 christos char tbuf[TBUF_LEN], fmt_cpy[FMT_LEN], fmt_cat[FMT_LEN] = "";
225 1.48 christos size_t tbuf_left, fmt_left, msgsdlen;
226 1.43 christos char *fmt = fmt_cat;
227 1.34 christos int signal_safe = pri & LOG_SIGNAL_SAFE;
228 1.48 christos struct iovec iov[7]; /* prog + [ + pid + ]: + fmt + crlf */
229 1.48 christos int opened, iovcnt;
230 1.34 christos
231 1.35 christos pri &= ~LOG_SIGNAL_SAFE;
232 1.2 glass
233 1.43 christos #define INTERNALLOG LOG_ERR|LOG_CONS|LOG_PERROR|LOG_PID
234 1.2 glass /* Check for invalid bits. */
235 1.2 glass if (pri & ~(LOG_PRIMASK|LOG_FACMASK)) {
236 1.34 christos syslog_r(INTERNALLOG | signal_safe, data,
237 1.34 christos "syslog_r: unknown facility/priority: %x", pri);
238 1.2 glass pri &= LOG_PRIMASK|LOG_FACMASK;
239 1.2 glass }
240 1.1 cgd
241 1.2 glass /* Check priority against setlogmask values. */
242 1.32 christos if (!(LOG_MASK(LOG_PRI(pri)) & data->log_mask))
243 1.1 cgd return;
244 1.1 cgd
245 1.1 cgd saved_errno = errno;
246 1.1 cgd
247 1.6 cgd /* Set default facility if none specified. */
248 1.1 cgd if ((pri & LOG_FACMASK) == 0)
249 1.32 christos pri |= data->log_fac;
250 1.1 cgd
251 1.6 cgd /* Build the message. */
252 1.43 christos p = tbuf;
253 1.43 christos tbuf_left = TBUF_LEN;
254 1.9 jtc
255 1.43 christos #define DEC() \
256 1.19 christos do { \
257 1.19 christos if (prlen >= tbuf_left) \
258 1.19 christos prlen = tbuf_left - 1; \
259 1.19 christos p += prlen; \
260 1.19 christos tbuf_left -= prlen; \
261 1.32 christos } while (/*CONSTCOND*/0)
262 1.10 mycroft
263 1.43 christos prlen = snprintf_ss(p, tbuf_left, "<%d>1 ", pri);
264 1.9 jtc DEC();
265 1.9 jtc
266 1.43 christos if (!signal_safe && (gettimeofday(&tv, NULL) != -1)) {
267 1.32 christos /* strftime() implies tzset(), localtime_r() doesn't. */
268 1.32 christos tzset();
269 1.43 christos now = (time_t) tv.tv_sec;
270 1.43 christos localtime_r(&now, &tmnow);
271 1.43 christos
272 1.43 christos prlen = strftime(p, tbuf_left, "%FT%T", &tmnow);
273 1.43 christos DEC();
274 1.47 christos prlen = snprintf(p, tbuf_left, ".%06ld", (long)tv.tv_usec);
275 1.32 christos DEC();
276 1.43 christos prlen = strftime(p, tbuf_left-1, "%z", &tmnow);
277 1.43 christos /* strftime gives eg. "+0200", but we need "+02:00" */
278 1.43 christos if (prlen == 5) {
279 1.43 christos p[prlen+1] = p[prlen];
280 1.43 christos p[prlen] = p[prlen-1];
281 1.43 christos p[prlen-1] = p[prlen-2];
282 1.43 christos p[prlen-2] = ':';
283 1.43 christos prlen += 1;
284 1.43 christos }
285 1.43 christos } else {
286 1.43 christos prlen = snprintf_ss(p, tbuf_left, "-");
287 1.52 christos #if 0
288 1.52 christos /*
289 1.52 christos * if gmtime_r() was signal-safe we could output
290 1.52 christos * the UTC-time:
291 1.52 christos */
292 1.43 christos gmtime_r(&now, &tmnow);
293 1.43 christos prlen = strftime(p, tbuf_left, "%FT%TZ", &tmnow);
294 1.52 christos #endif
295 1.32 christos }
296 1.51 christos
297 1.52 christos if (data == &sdata)
298 1.52 christos mutex_lock(&syslog_mutex);
299 1.52 christos
300 1.51 christos if (data->log_hostname[0] == '\0' && gethostname(data->log_hostname,
301 1.51 christos sizeof(data->log_hostname)) == -1) {
302 1.51 christos /* can this really happen? */
303 1.51 christos data->log_hostname[0] = '-';
304 1.51 christos data->log_hostname[1] = '\0';
305 1.51 christos }
306 1.51 christos
307 1.43 christos DEC();
308 1.51 christos prlen = snprintf_ss(p, tbuf_left, " %s ", data->log_hostname);
309 1.9 jtc
310 1.32 christos if (data->log_tag == NULL)
311 1.32 christos data->log_tag = getprogname();
312 1.43 christos
313 1.51 christos DEC();
314 1.43 christos prlen = snprintf_ss(p, tbuf_left, "%s ",
315 1.43 christos data->log_tag ? data->log_tag : "-");
316 1.52 christos
317 1.52 christos if (data == &sdata)
318 1.52 christos mutex_unlock(&syslog_mutex);
319 1.52 christos
320 1.48 christos if (data->log_stat & (LOG_PERROR|LOG_CONS)) {
321 1.48 christos iovcnt = 0;
322 1.48 christos iov[iovcnt].iov_base = p;
323 1.48 christos iov[iovcnt].iov_len = prlen - 1;
324 1.48 christos iovcnt++;
325 1.48 christos }
326 1.43 christos DEC();
327 1.43 christos
328 1.48 christos if (data->log_stat & LOG_PID) {
329 1.43 christos prlen = snprintf_ss(p, tbuf_left, "%d ", getpid());
330 1.48 christos if (data->log_stat & (LOG_PERROR|LOG_CONS)) {
331 1.48 christos iov[iovcnt].iov_base = __UNCONST("[");
332 1.48 christos iov[iovcnt].iov_len = 1;
333 1.48 christos iovcnt++;
334 1.48 christos iov[iovcnt].iov_base = p;
335 1.48 christos iov[iovcnt].iov_len = prlen - 1;
336 1.48 christos iovcnt++;
337 1.48 christos iov[iovcnt].iov_base = __UNCONST(BRCOSP);
338 1.48 christos iov[iovcnt].iov_len = 3;
339 1.48 christos iovcnt++;
340 1.48 christos }
341 1.48 christos } else {
342 1.43 christos prlen = snprintf_ss(p, tbuf_left, "- ");
343 1.48 christos if (data->log_stat & (LOG_PERROR|LOG_CONS)) {
344 1.48 christos iov[iovcnt].iov_base = __UNCONST(BRCOSP + 1);
345 1.48 christos iov[iovcnt].iov_len = 2;
346 1.48 christos iovcnt++;
347 1.48 christos }
348 1.48 christos }
349 1.43 christos DEC();
350 1.43 christos
351 1.43 christos /*
352 1.43 christos * concat the format strings, then use one vsnprintf()
353 1.43 christos */
354 1.43 christos if (msgid != NULL && *msgid != '\0') {
355 1.43 christos strlcat(fmt_cat, msgid, FMT_LEN);
356 1.43 christos strlcat(fmt_cat, " ", FMT_LEN);
357 1.43 christos } else
358 1.43 christos strlcat(fmt_cat, "- ", FMT_LEN);
359 1.43 christos
360 1.43 christos if (sdfmt != NULL && *sdfmt != '\0') {
361 1.43 christos strlcat(fmt_cat, sdfmt, FMT_LEN);
362 1.43 christos } else
363 1.43 christos strlcat(fmt_cat, "-", FMT_LEN);
364 1.43 christos
365 1.48 christos if (data->log_stat & (LOG_PERROR|LOG_CONS))
366 1.48 christos msgsdlen = strlen(fmt_cat) + 1;
367 1.48 christos else
368 1.48 christos msgsdlen = 0; /* XXX: GCC */
369 1.48 christos
370 1.43 christos if (msgfmt != NULL && *msgfmt != '\0') {
371 1.43 christos strlcat(fmt_cat, " ", FMT_LEN);
372 1.43 christos strlcat(fmt_cat, msgfmt, FMT_LEN);
373 1.1 cgd }
374 1.1 cgd
375 1.43 christos /*
376 1.43 christos * We wouldn't need this mess if printf handled %m, or if
377 1.9 jtc * strerror() had been invented before syslog().
378 1.9 jtc */
379 1.11 christos for (t = fmt_cpy, fmt_left = FMT_LEN; (ch = *fmt) != '\0'; ++fmt) {
380 1.6 cgd if (ch == '%' && fmt[1] == 'm') {
381 1.55 roy const char *s;
382 1.55 roy
383 1.55 roy if (signal_safe || (s = strerror(saved_errno)) == NULL)
384 1.43 christos prlen = snprintf_ss(t, fmt_left, "Error %d",
385 1.32 christos saved_errno);
386 1.32 christos else
387 1.55 roy prlen = strlcpy(t, s, fmt_left);
388 1.10 mycroft if (prlen >= fmt_left)
389 1.10 mycroft prlen = fmt_left - 1;
390 1.10 mycroft t += prlen;
391 1.55 roy fmt++;
392 1.10 mycroft fmt_left -= prlen;
393 1.32 christos } else if (ch == '%' && fmt[1] == '%' && fmt_left > 2) {
394 1.32 christos *t++ = '%';
395 1.32 christos *t++ = '%';
396 1.32 christos fmt++;
397 1.32 christos fmt_left -= 2;
398 1.9 jtc } else {
399 1.10 mycroft if (fmt_left > 1) {
400 1.9 jtc *t++ = ch;
401 1.10 mycroft fmt_left--;
402 1.9 jtc }
403 1.9 jtc }
404 1.9 jtc }
405 1.6 cgd *t = '\0';
406 1.1 cgd
407 1.34 christos if (signal_safe)
408 1.34 christos prlen = vsnprintf_ss(p, tbuf_left, fmt_cpy, ap);
409 1.34 christos else
410 1.34 christos prlen = vsnprintf(p, tbuf_left, fmt_cpy, ap);
411 1.48 christos
412 1.48 christos if (data->log_stat & (LOG_PERROR|LOG_CONS)) {
413 1.48 christos iov[iovcnt].iov_base = p + msgsdlen;
414 1.48 christos iov[iovcnt].iov_len = prlen - msgsdlen;
415 1.48 christos iovcnt++;
416 1.48 christos }
417 1.48 christos
418 1.9 jtc DEC();
419 1.6 cgd cnt = p - tbuf;
420 1.1 cgd
421 1.6 cgd /* Output to stderr if requested. */
422 1.32 christos if (data->log_stat & LOG_PERROR) {
423 1.48 christos iov[iovcnt].iov_base = __UNCONST(CRLF + 1);
424 1.48 christos iov[iovcnt].iov_len = 1;
425 1.48 christos (void)writev(STDERR_FILENO, iov, iovcnt + 1);
426 1.1 cgd }
427 1.1 cgd
428 1.6 cgd /* Get connected, output the message to the local logger. */
429 1.32 christos if (data == &sdata)
430 1.32 christos mutex_lock(&syslog_mutex);
431 1.51 christos opened = !data->log_opened;
432 1.42 dogcow if (opened)
433 1.32 christos openlog_unlocked_r(data->log_tag, data->log_stat, 0, data);
434 1.32 christos connectlog_r(data);
435 1.32 christos
436 1.27 atatat /*
437 1.32 christos * If the send() failed, there are two likely scenarios:
438 1.32 christos * 1) syslogd was restarted
439 1.32 christos * 2) /dev/log is out of socket buffer space
440 1.32 christos * We attempt to reconnect to /dev/log to take care of
441 1.32 christos * case #1 and keep send()ing data to cover case #2
442 1.32 christos * to give syslogd a chance to empty its socket buffer.
443 1.27 atatat */
444 1.40 christos for (tries = 0; tries < MAXTRIES; tries++) {
445 1.40 christos if (send(data->log_file, tbuf, cnt, 0) != -1)
446 1.40 christos break;
447 1.32 christos if (errno != ENOBUFS) {
448 1.32 christos disconnectlog_r(data);
449 1.32 christos connectlog_r(data);
450 1.40 christos } else
451 1.40 christos (void)usleep(1);
452 1.27 atatat }
453 1.1 cgd
454 1.1 cgd /*
455 1.32 christos * Output the message to the console; try not to block
456 1.32 christos * as a blocking console should not stop other processes.
457 1.32 christos * Make sure the error reported is the one from the syslogd failure.
458 1.1 cgd */
459 1.40 christos if (tries == MAXTRIES && (data->log_stat & LOG_CONS) &&
460 1.54 christos (fd = open(_PATH_CONSOLE,
461 1.54 christos O_WRONLY | O_NONBLOCK | O_CLOEXEC, 0)) >= 0) {
462 1.48 christos iov[iovcnt].iov_base = __UNCONST(CRLF);
463 1.48 christos iov[iovcnt].iov_len = 2;
464 1.48 christos (void)writev(fd, iov, iovcnt + 1);
465 1.1 cgd (void)close(fd);
466 1.1 cgd }
467 1.40 christos
468 1.40 christos if (data == &sdata)
469 1.40 christos mutex_unlock(&syslog_mutex);
470 1.40 christos
471 1.41 christos if (data != &sdata && opened) {
472 1.41 christos /* preserve log tag */
473 1.41 christos const char *ident = data->log_tag;
474 1.32 christos closelog_r(data);
475 1.41 christos data->log_tag = ident;
476 1.41 christos }
477 1.1 cgd }
478 1.1 cgd
479 1.32 christos static void
480 1.32 christos disconnectlog_r(struct syslog_data *data)
481 1.32 christos {
482 1.32 christos /*
483 1.32 christos * If the user closed the FD and opened another in the same slot,
484 1.32 christos * that's their problem. They should close it before calling on
485 1.32 christos * system services.
486 1.32 christos */
487 1.32 christos if (data->log_file != -1) {
488 1.32 christos (void)close(data->log_file);
489 1.32 christos data->log_file = -1;
490 1.32 christos }
491 1.51 christos data->log_connected = 0; /* retry connect */
492 1.32 christos }
493 1.1 cgd
494 1.20 kleink static void
495 1.32 christos connectlog_r(struct syslog_data *data)
496 1.1 cgd {
497 1.32 christos /* AF_UNIX address of local logger */
498 1.32 christos static const struct sockaddr_un sun = {
499 1.32 christos .sun_family = AF_LOCAL,
500 1.32 christos .sun_len = sizeof(sun),
501 1.32 christos .sun_path = _PATH_LOG,
502 1.32 christos };
503 1.20 kleink
504 1.36 christos if (data->log_file == -1 || fcntl(data->log_file, F_GETFL, 0) == -1) {
505 1.49 christos if ((data->log_file = socket(AF_UNIX, SOCK_DGRAM | SOCK_CLOEXEC,
506 1.49 christos 0)) == -1)
507 1.32 christos return;
508 1.51 christos data->log_connected = 0;
509 1.1 cgd }
510 1.51 christos if (!data->log_connected) {
511 1.32 christos if (connect(data->log_file,
512 1.32 christos (const struct sockaddr *)(const void *)&sun,
513 1.50 christos (socklen_t)sizeof(sun)) == -1) {
514 1.32 christos (void)close(data->log_file);
515 1.32 christos data->log_file = -1;
516 1.43 christos } else
517 1.51 christos data->log_connected = 1;
518 1.17 thorpej }
519 1.1 cgd }
520 1.1 cgd
521 1.32 christos static void
522 1.32 christos openlog_unlocked_r(const char *ident, int logstat, int logfac,
523 1.32 christos struct syslog_data *data)
524 1.20 kleink {
525 1.32 christos if (ident != NULL)
526 1.32 christos data->log_tag = ident;
527 1.32 christos data->log_stat = logstat;
528 1.32 christos if (logfac != 0 && (logfac &~ LOG_FACMASK) == 0)
529 1.32 christos data->log_fac = logfac;
530 1.20 kleink
531 1.32 christos if (data->log_stat & LOG_NDELAY) /* open immediately */
532 1.32 christos connectlog_r(data);
533 1.41 christos
534 1.51 christos data->log_opened = 1;
535 1.20 kleink }
536 1.20 kleink
537 1.32 christos void
538 1.32 christos openlog_r(const char *ident, int logstat, int logfac, struct syslog_data *data)
539 1.1 cgd {
540 1.32 christos if (data == &sdata)
541 1.32 christos mutex_lock(&syslog_mutex);
542 1.32 christos openlog_unlocked_r(ident, logstat, logfac, data);
543 1.32 christos if (data == &sdata)
544 1.32 christos mutex_unlock(&syslog_mutex);
545 1.20 kleink }
546 1.20 kleink
547 1.20 kleink void
548 1.32 christos closelog_r(struct syslog_data *data)
549 1.20 kleink {
550 1.32 christos if (data == &sdata)
551 1.32 christos mutex_lock(&syslog_mutex);
552 1.32 christos (void)close(data->log_file);
553 1.32 christos data->log_file = -1;
554 1.51 christos data->log_connected = 0;
555 1.32 christos data->log_tag = NULL;
556 1.32 christos if (data == &sdata)
557 1.32 christos mutex_unlock(&syslog_mutex);
558 1.1 cgd }
559 1.1 cgd
560 1.2 glass int
561 1.32 christos setlogmask_r(int pmask, struct syslog_data *data)
562 1.1 cgd {
563 1.1 cgd int omask;
564 1.1 cgd
565 1.32 christos omask = data->log_mask;
566 1.1 cgd if (pmask != 0)
567 1.32 christos data->log_mask = pmask;
568 1.32 christos return omask;
569 1.1 cgd }
570