syslog.c revision 1.50.2.1 1 /* $NetBSD: syslog.c,v 1.50.2.1 2012/11/20 03:00:42 tls Exp $ */
2
3 /*
4 * Copyright (c) 1983, 1988, 1993
5 * The Regents of the University of California. All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the University nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32 #include <sys/cdefs.h>
33 #if defined(LIBC_SCCS) && !defined(lint)
34 #if 0
35 static char sccsid[] = "@(#)syslog.c 8.5 (Berkeley) 4/29/95";
36 #else
37 __RCSID("$NetBSD: syslog.c,v 1.50.2.1 2012/11/20 03:00:42 tls Exp $");
38 #endif
39 #endif /* LIBC_SCCS and not lint */
40
41 #include "namespace.h"
42 #include <sys/types.h>
43 #include <sys/param.h>
44 #include <sys/socket.h>
45 #include <sys/syslog.h>
46 #include <sys/uio.h>
47 #include <sys/un.h>
48 #include <netdb.h>
49
50 #include <errno.h>
51 #include <fcntl.h>
52 #include <paths.h>
53 #include <stdarg.h>
54 #include <stdio.h>
55 #include <stdlib.h>
56 #include <string.h>
57 #include <time.h>
58 #include <unistd.h>
59 #include "reentrant.h"
60 #include "extern.h"
61
62 #ifdef __weak_alias
63 __weak_alias(closelog,_closelog)
64 __weak_alias(openlog,_openlog)
65 __weak_alias(setlogmask,_setlogmask)
66 __weak_alias(syslog,_syslog)
67 __weak_alias(vsyslog,_vsyslog)
68 __weak_alias(syslogp,_syslogp)
69 __weak_alias(vsyslogp,_vsyslogp)
70 #endif
71
72 static struct syslog_data sdata = SYSLOG_DATA_INIT;
73
74 static void openlog_unlocked_r(const char *, int, int,
75 struct syslog_data *);
76 static void disconnectlog_r(struct syslog_data *);
77 static void connectlog_r(struct syslog_data *);
78
79 #define LOG_SIGNAL_SAFE (int)0x80000000
80
81
82 #ifdef _REENTRANT
83 static mutex_t syslog_mutex = MUTEX_INITIALIZER;
84 #endif
85
86 /*
87 * syslog, vsyslog --
88 * print message on log file; output is intended for syslogd(8).
89 */
90 void
91 syslog(int pri, const char *fmt, ...)
92 {
93 va_list ap;
94
95 va_start(ap, fmt);
96 vsyslog(pri, fmt, ap);
97 va_end(ap);
98 }
99
100 void
101 vsyslog(int pri, const char *fmt, va_list ap)
102 {
103 vsyslog_r(pri, &sdata, fmt, ap);
104 }
105
106 /*
107 * syslogp, vsyslogp --
108 * like syslog but take additional arguments for MSGID and SD
109 */
110 void
111 syslogp(int pri, const char *msgid, const char *sdfmt, const char *msgfmt, ...)
112 {
113 va_list ap;
114
115 va_start(ap, msgfmt);
116 vsyslogp(pri, msgid, sdfmt, msgfmt, ap);
117 va_end(ap);
118 }
119
120 void
121 vsyslogp(int pri, const char *msgid, const char *sdfmt, const char *msgfmt, va_list ap)
122 {
123 vsyslogp_r(pri, &sdata, msgid, sdfmt, msgfmt, ap);
124 }
125
126 void
127 openlog(const char *ident, int logstat, int logfac)
128 {
129 openlog_r(ident, logstat, logfac, &sdata);
130 }
131
132 void
133 closelog(void)
134 {
135 closelog_r(&sdata);
136 }
137
138 /* setlogmask -- set the log mask level */
139 int
140 setlogmask(int pmask)
141 {
142 return setlogmask_r(pmask, &sdata);
143 }
144
145 /* Reentrant version of syslog, i.e. syslog_r() */
146
147 void
148 syslog_r(int pri, struct syslog_data *data, const char *fmt, ...)
149 {
150 va_list ap;
151
152 va_start(ap, fmt);
153 vsyslog_r(pri, data, fmt, ap);
154 va_end(ap);
155 }
156
157 void
158 syslogp_r(int pri, struct syslog_data *data, const char *msgid,
159 const char *sdfmt, const char *msgfmt, ...)
160 {
161 va_list ap;
162
163 va_start(ap, msgfmt);
164 vsyslogp_r(pri, data, msgid, sdfmt, msgfmt, ap);
165 va_end(ap);
166 }
167
168 void
169 syslog_ss(int pri, struct syslog_data *data, const char *fmt, ...)
170 {
171 va_list ap;
172
173 va_start(ap, fmt);
174 vsyslog_r(pri | LOG_SIGNAL_SAFE, data, fmt, ap);
175 va_end(ap);
176 }
177
178 void
179 syslogp_ss(int pri, struct syslog_data *data, const char *msgid,
180 const char *sdfmt, const char *msgfmt, ...)
181 {
182 va_list ap;
183
184 va_start(ap, msgfmt);
185 vsyslogp_r(pri | LOG_SIGNAL_SAFE, data, msgid, sdfmt, msgfmt, ap);
186 va_end(ap);
187 }
188
189 void
190 vsyslog_ss(int pri, struct syslog_data *data, const char *fmt, va_list ap)
191 {
192 vsyslog_r(pri | LOG_SIGNAL_SAFE, data, fmt, ap);
193 }
194
195 void
196 vsyslogp_ss(int pri, struct syslog_data *data, const char *msgid,
197 const char *sdfmt, const char *msgfmt, va_list ap)
198 {
199 vsyslogp_r(pri | LOG_SIGNAL_SAFE, data, msgid, sdfmt, msgfmt, ap);
200 }
201
202
203 void
204 vsyslog_r(int pri, struct syslog_data *data, const char *fmt, va_list ap)
205 {
206 vsyslogp_r(pri, data, NULL, NULL, fmt, ap);
207 }
208
209 void
210 vsyslogp_r(int pri, struct syslog_data *data, const char *msgid,
211 const char *sdfmt, const char *msgfmt, va_list ap)
212 {
213 static const char BRCOSP[] = "]: ";
214 static const char CRLF[] = "\r\n";
215 size_t cnt, prlen, tries;
216 char ch, *p, *t;
217 struct timeval tv;
218 struct tm tmnow;
219 time_t now;
220 int fd, saved_errno;
221 #define TBUF_LEN 2048
222 #define FMT_LEN 1024
223 #define MAXTRIES 10
224 char tbuf[TBUF_LEN], fmt_cpy[FMT_LEN], fmt_cat[FMT_LEN] = "";
225 size_t tbuf_left, fmt_left, msgsdlen;
226 char *fmt = fmt_cat;
227 int signal_safe = pri & LOG_SIGNAL_SAFE;
228 struct iovec iov[7]; /* prog + [ + pid + ]: + fmt + crlf */
229 int opened, iovcnt;
230
231 pri &= ~LOG_SIGNAL_SAFE;
232
233 #define INTERNALLOG LOG_ERR|LOG_CONS|LOG_PERROR|LOG_PID
234 /* Check for invalid bits. */
235 if (pri & ~(LOG_PRIMASK|LOG_FACMASK)) {
236 syslog_r(INTERNALLOG | signal_safe, data,
237 "syslog_r: unknown facility/priority: %x", pri);
238 pri &= LOG_PRIMASK|LOG_FACMASK;
239 }
240
241 /* Check priority against setlogmask values. */
242 if (!(LOG_MASK(LOG_PRI(pri)) & data->log_mask))
243 return;
244
245 saved_errno = errno;
246
247 /* Set default facility if none specified. */
248 if ((pri & LOG_FACMASK) == 0)
249 pri |= data->log_fac;
250
251 /* Build the message. */
252 p = tbuf;
253 tbuf_left = TBUF_LEN;
254
255 #define DEC() \
256 do { \
257 if (prlen >= tbuf_left) \
258 prlen = tbuf_left - 1; \
259 p += prlen; \
260 tbuf_left -= prlen; \
261 } while (/*CONSTCOND*/0)
262
263 prlen = snprintf_ss(p, tbuf_left, "<%d>1 ", pri);
264 DEC();
265
266 if (!signal_safe && (gettimeofday(&tv, NULL) != -1)) {
267 /* strftime() implies tzset(), localtime_r() doesn't. */
268 tzset();
269 now = (time_t) tv.tv_sec;
270 localtime_r(&now, &tmnow);
271
272 prlen = strftime(p, tbuf_left, "%FT%T", &tmnow);
273 DEC();
274 prlen = snprintf(p, tbuf_left, ".%06ld", (long)tv.tv_usec);
275 DEC();
276 prlen = strftime(p, tbuf_left-1, "%z", &tmnow);
277 /* strftime gives eg. "+0200", but we need "+02:00" */
278 if (prlen == 5) {
279 p[prlen+1] = p[prlen];
280 p[prlen] = p[prlen-1];
281 p[prlen-1] = p[prlen-2];
282 p[prlen-2] = ':';
283 prlen += 1;
284 }
285 } else {
286 prlen = snprintf_ss(p, tbuf_left, "-");
287 #if 0
288 /*
289 * if gmtime_r() was signal-safe we could output
290 * the UTC-time:
291 */
292 gmtime_r(&now, &tmnow);
293 prlen = strftime(p, tbuf_left, "%FT%TZ", &tmnow);
294 #endif
295 }
296
297 if (data == &sdata)
298 mutex_lock(&syslog_mutex);
299
300 if (data->log_hostname[0] == '\0' && gethostname(data->log_hostname,
301 sizeof(data->log_hostname)) == -1) {
302 /* can this really happen? */
303 data->log_hostname[0] = '-';
304 data->log_hostname[1] = '\0';
305 }
306
307 DEC();
308 prlen = snprintf_ss(p, tbuf_left, " %s ", data->log_hostname);
309
310 if (data->log_tag == NULL)
311 data->log_tag = getprogname();
312
313 DEC();
314 prlen = snprintf_ss(p, tbuf_left, "%s ",
315 data->log_tag ? data->log_tag : "-");
316
317 if (data == &sdata)
318 mutex_unlock(&syslog_mutex);
319
320 if (data->log_stat & (LOG_PERROR|LOG_CONS)) {
321 iovcnt = 0;
322 iov[iovcnt].iov_base = p;
323 iov[iovcnt].iov_len = prlen - 1;
324 iovcnt++;
325 }
326 DEC();
327
328 if (data->log_stat & LOG_PID) {
329 prlen = snprintf_ss(p, tbuf_left, "%d ", getpid());
330 if (data->log_stat & (LOG_PERROR|LOG_CONS)) {
331 iov[iovcnt].iov_base = __UNCONST("[");
332 iov[iovcnt].iov_len = 1;
333 iovcnt++;
334 iov[iovcnt].iov_base = p;
335 iov[iovcnt].iov_len = prlen - 1;
336 iovcnt++;
337 iov[iovcnt].iov_base = __UNCONST(BRCOSP);
338 iov[iovcnt].iov_len = 3;
339 iovcnt++;
340 }
341 } else {
342 prlen = snprintf_ss(p, tbuf_left, "- ");
343 if (data->log_stat & (LOG_PERROR|LOG_CONS)) {
344 iov[iovcnt].iov_base = __UNCONST(BRCOSP + 1);
345 iov[iovcnt].iov_len = 2;
346 iovcnt++;
347 }
348 }
349 DEC();
350
351 /*
352 * concat the format strings, then use one vsnprintf()
353 */
354 if (msgid != NULL && *msgid != '\0') {
355 strlcat(fmt_cat, msgid, FMT_LEN);
356 strlcat(fmt_cat, " ", FMT_LEN);
357 } else
358 strlcat(fmt_cat, "- ", FMT_LEN);
359
360 if (sdfmt != NULL && *sdfmt != '\0') {
361 strlcat(fmt_cat, sdfmt, FMT_LEN);
362 } else
363 strlcat(fmt_cat, "-", FMT_LEN);
364
365 if (data->log_stat & (LOG_PERROR|LOG_CONS))
366 msgsdlen = strlen(fmt_cat) + 1;
367 else
368 msgsdlen = 0; /* XXX: GCC */
369
370 if (msgfmt != NULL && *msgfmt != '\0') {
371 strlcat(fmt_cat, " ", FMT_LEN);
372 strlcat(fmt_cat, msgfmt, FMT_LEN);
373 }
374
375 /*
376 * We wouldn't need this mess if printf handled %m, or if
377 * strerror() had been invented before syslog().
378 */
379 for (t = fmt_cpy, fmt_left = FMT_LEN; (ch = *fmt) != '\0'; ++fmt) {
380 if (ch == '%' && fmt[1] == 'm') {
381 char ebuf[128];
382 ++fmt;
383 if (signal_safe ||
384 strerror_r(saved_errno, ebuf, sizeof(ebuf)))
385 prlen = snprintf_ss(t, fmt_left, "Error %d",
386 saved_errno);
387 else
388 prlen = snprintf_ss(t, fmt_left, "%s", ebuf);
389 if (prlen >= fmt_left)
390 prlen = fmt_left - 1;
391 t += prlen;
392 fmt_left -= prlen;
393 } else if (ch == '%' && fmt[1] == '%' && fmt_left > 2) {
394 *t++ = '%';
395 *t++ = '%';
396 fmt++;
397 fmt_left -= 2;
398 } else {
399 if (fmt_left > 1) {
400 *t++ = ch;
401 fmt_left--;
402 }
403 }
404 }
405 *t = '\0';
406
407 if (signal_safe)
408 prlen = vsnprintf_ss(p, tbuf_left, fmt_cpy, ap);
409 else
410 prlen = vsnprintf(p, tbuf_left, fmt_cpy, ap);
411
412 if (data->log_stat & (LOG_PERROR|LOG_CONS)) {
413 iov[iovcnt].iov_base = p + msgsdlen;
414 iov[iovcnt].iov_len = prlen - msgsdlen;
415 iovcnt++;
416 }
417
418 DEC();
419 cnt = p - tbuf;
420
421 /* Output to stderr if requested. */
422 if (data->log_stat & LOG_PERROR) {
423 iov[iovcnt].iov_base = __UNCONST(CRLF + 1);
424 iov[iovcnt].iov_len = 1;
425 (void)writev(STDERR_FILENO, iov, iovcnt + 1);
426 }
427
428 /* Get connected, output the message to the local logger. */
429 if (data == &sdata)
430 mutex_lock(&syslog_mutex);
431 opened = !data->log_opened;
432 if (opened)
433 openlog_unlocked_r(data->log_tag, data->log_stat, 0, data);
434 connectlog_r(data);
435
436 /*
437 * If the send() failed, there are two likely scenarios:
438 * 1) syslogd was restarted
439 * 2) /dev/log is out of socket buffer space
440 * We attempt to reconnect to /dev/log to take care of
441 * case #1 and keep send()ing data to cover case #2
442 * to give syslogd a chance to empty its socket buffer.
443 */
444 for (tries = 0; tries < MAXTRIES; tries++) {
445 if (send(data->log_file, tbuf, cnt, 0) != -1)
446 break;
447 if (errno != ENOBUFS) {
448 disconnectlog_r(data);
449 connectlog_r(data);
450 } else
451 (void)usleep(1);
452 }
453
454 /*
455 * Output the message to the console; try not to block
456 * as a blocking console should not stop other processes.
457 * Make sure the error reported is the one from the syslogd failure.
458 */
459 if (tries == MAXTRIES && (data->log_stat & LOG_CONS) &&
460 (fd = open(_PATH_CONSOLE, O_WRONLY|O_NONBLOCK, 0)) >= 0) {
461 iov[iovcnt].iov_base = __UNCONST(CRLF);
462 iov[iovcnt].iov_len = 2;
463 (void)writev(fd, iov, iovcnt + 1);
464 (void)close(fd);
465 }
466
467 if (data == &sdata)
468 mutex_unlock(&syslog_mutex);
469
470 if (data != &sdata && opened) {
471 /* preserve log tag */
472 const char *ident = data->log_tag;
473 closelog_r(data);
474 data->log_tag = ident;
475 }
476 }
477
478 static void
479 disconnectlog_r(struct syslog_data *data)
480 {
481 /*
482 * If the user closed the FD and opened another in the same slot,
483 * that's their problem. They should close it before calling on
484 * system services.
485 */
486 if (data->log_file != -1) {
487 (void)close(data->log_file);
488 data->log_file = -1;
489 }
490 data->log_connected = 0; /* retry connect */
491 }
492
493 static void
494 connectlog_r(struct syslog_data *data)
495 {
496 /* AF_UNIX address of local logger */
497 static const struct sockaddr_un sun = {
498 .sun_family = AF_LOCAL,
499 .sun_len = sizeof(sun),
500 .sun_path = _PATH_LOG,
501 };
502
503 if (data->log_file == -1 || fcntl(data->log_file, F_GETFL, 0) == -1) {
504 if ((data->log_file = socket(AF_UNIX, SOCK_DGRAM | SOCK_CLOEXEC,
505 0)) == -1)
506 return;
507 data->log_connected = 0;
508 }
509 if (!data->log_connected) {
510 if (connect(data->log_file,
511 (const struct sockaddr *)(const void *)&sun,
512 (socklen_t)sizeof(sun)) == -1) {
513 (void)close(data->log_file);
514 data->log_file = -1;
515 } else
516 data->log_connected = 1;
517 }
518 }
519
520 static void
521 openlog_unlocked_r(const char *ident, int logstat, int logfac,
522 struct syslog_data *data)
523 {
524 if (ident != NULL)
525 data->log_tag = ident;
526 data->log_stat = logstat;
527 if (logfac != 0 && (logfac &~ LOG_FACMASK) == 0)
528 data->log_fac = logfac;
529
530 if (data->log_stat & LOG_NDELAY) /* open immediately */
531 connectlog_r(data);
532
533 data->log_opened = 1;
534 }
535
536 void
537 openlog_r(const char *ident, int logstat, int logfac, struct syslog_data *data)
538 {
539 if (data == &sdata)
540 mutex_lock(&syslog_mutex);
541 openlog_unlocked_r(ident, logstat, logfac, data);
542 if (data == &sdata)
543 mutex_unlock(&syslog_mutex);
544 }
545
546 void
547 closelog_r(struct syslog_data *data)
548 {
549 if (data == &sdata)
550 mutex_lock(&syslog_mutex);
551 (void)close(data->log_file);
552 data->log_file = -1;
553 data->log_connected = 0;
554 data->log_tag = NULL;
555 if (data == &sdata)
556 mutex_unlock(&syslog_mutex);
557 }
558
559 int
560 setlogmask_r(int pmask, struct syslog_data *data)
561 {
562 int omask;
563
564 omask = data->log_mask;
565 if (pmask != 0)
566 data->log_mask = pmask;
567 return omask;
568 }
569