1 /* $NetBSD: syslog.c,v 1.55 2015/10/26 11:44:30 roy Exp $ */ 2 3 /* 4 * Copyright (c) 1983, 1988, 1993 5 * The Regents of the University of California. All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 3. Neither the name of the University nor the names of its contributors 16 * may be used to endorse or promote products derived from this software 17 * without specific prior written permission. 18 * 19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 22 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 29 * SUCH DAMAGE. 30 */ 31 32 #include <sys/cdefs.h> 33 #if defined(LIBC_SCCS) && !defined(lint) 34 #if 0 35 static char sccsid[] = "@(#)syslog.c 8.5 (Berkeley) 4/29/95"; 36 #else 37 __RCSID("$NetBSD: syslog.c,v 1.55 2015/10/26 11:44:30 roy Exp $"); 38 #endif 39 #endif /* LIBC_SCCS and not lint */ 40 41 #include "namespace.h" 42 #include <sys/types.h> 43 #include <sys/param.h> 44 #include <sys/socket.h> 45 #include <sys/syslog.h> 46 #include <sys/uio.h> 47 #include <sys/un.h> 48 #include <netdb.h> 49 50 #include <errno.h> 51 #include <fcntl.h> 52 #include <paths.h> 53 #include <stdarg.h> 54 #include <stdio.h> 55 #include <stdlib.h> 56 #include <string.h> 57 #include <time.h> 58 #include <unistd.h> 59 #include "reentrant.h" 60 #include "extern.h" 61 62 #ifdef __weak_alias 63 __weak_alias(closelog,_closelog) 64 __weak_alias(openlog,_openlog) 65 __weak_alias(setlogmask,_setlogmask) 66 __weak_alias(syslog,_syslog) 67 __weak_alias(vsyslog,_vsyslog) 68 __weak_alias(syslogp,_syslogp) 69 __weak_alias(vsyslogp,_vsyslogp) 70 #endif 71 72 static struct syslog_data sdata = SYSLOG_DATA_INIT; 73 74 static void openlog_unlocked_r(const char *, int, int, 75 struct syslog_data *); 76 static void disconnectlog_r(struct syslog_data *); 77 static void connectlog_r(struct syslog_data *); 78 79 #define LOG_SIGNAL_SAFE (int)0x80000000 80 81 82 #ifdef _REENTRANT 83 static mutex_t syslog_mutex = MUTEX_INITIALIZER; 84 #endif 85 86 /* 87 * syslog, vsyslog -- 88 * print message on log file; output is intended for syslogd(8). 89 */ 90 void 91 syslog(int pri, const char *fmt, ...) 92 { 93 va_list ap; 94 95 va_start(ap, fmt); 96 vsyslog(pri, fmt, ap); 97 va_end(ap); 98 } 99 100 void 101 vsyslog(int pri, const char *fmt, va_list ap) 102 { 103 vsyslog_r(pri, &sdata, fmt, ap); 104 } 105 106 /* 107 * syslogp, vsyslogp -- 108 * like syslog but take additional arguments for MSGID and SD 109 */ 110 void 111 syslogp(int pri, const char *msgid, const char *sdfmt, const char *msgfmt, ...) 112 { 113 va_list ap; 114 115 va_start(ap, msgfmt); 116 vsyslogp(pri, msgid, sdfmt, msgfmt, ap); 117 va_end(ap); 118 } 119 120 void 121 vsyslogp(int pri, const char *msgid, const char *sdfmt, const char *msgfmt, va_list ap) 122 { 123 vsyslogp_r(pri, &sdata, msgid, sdfmt, msgfmt, ap); 124 } 125 126 void 127 openlog(const char *ident, int logstat, int logfac) 128 { 129 openlog_r(ident, logstat, logfac, &sdata); 130 } 131 132 void 133 closelog(void) 134 { 135 closelog_r(&sdata); 136 } 137 138 /* setlogmask -- set the log mask level */ 139 int 140 setlogmask(int pmask) 141 { 142 return setlogmask_r(pmask, &sdata); 143 } 144 145 /* Reentrant version of syslog, i.e. syslog_r() */ 146 147 void 148 syslog_r(int pri, struct syslog_data *data, const char *fmt, ...) 149 { 150 va_list ap; 151 152 va_start(ap, fmt); 153 vsyslog_r(pri, data, fmt, ap); 154 va_end(ap); 155 } 156 157 void 158 syslogp_r(int pri, struct syslog_data *data, const char *msgid, 159 const char *sdfmt, const char *msgfmt, ...) 160 { 161 va_list ap; 162 163 va_start(ap, msgfmt); 164 vsyslogp_r(pri, data, msgid, sdfmt, msgfmt, ap); 165 va_end(ap); 166 } 167 168 void 169 syslog_ss(int pri, struct syslog_data *data, const char *fmt, ...) 170 { 171 va_list ap; 172 173 va_start(ap, fmt); 174 vsyslog_r(pri | LOG_SIGNAL_SAFE, data, fmt, ap); 175 va_end(ap); 176 } 177 178 void 179 syslogp_ss(int pri, struct syslog_data *data, const char *msgid, 180 const char *sdfmt, const char *msgfmt, ...) 181 { 182 va_list ap; 183 184 va_start(ap, msgfmt); 185 vsyslogp_r(pri | LOG_SIGNAL_SAFE, data, msgid, sdfmt, msgfmt, ap); 186 va_end(ap); 187 } 188 189 void 190 vsyslog_ss(int pri, struct syslog_data *data, const char *fmt, va_list ap) 191 { 192 vsyslog_r(pri | LOG_SIGNAL_SAFE, data, fmt, ap); 193 } 194 195 void 196 vsyslogp_ss(int pri, struct syslog_data *data, const char *msgid, 197 const char *sdfmt, const char *msgfmt, va_list ap) 198 { 199 vsyslogp_r(pri | LOG_SIGNAL_SAFE, data, msgid, sdfmt, msgfmt, ap); 200 } 201 202 203 void 204 vsyslog_r(int pri, struct syslog_data *data, const char *fmt, va_list ap) 205 { 206 vsyslogp_r(pri, data, NULL, NULL, fmt, ap); 207 } 208 209 void 210 vsyslogp_r(int pri, struct syslog_data *data, const char *msgid, 211 const char *sdfmt, const char *msgfmt, va_list ap) 212 { 213 static const char BRCOSP[] = "]: "; 214 static const char CRLF[] = "\r\n"; 215 size_t cnt, prlen, tries; 216 char ch, *p, *t; 217 struct timeval tv; 218 struct tm tmnow; 219 time_t now; 220 int fd, saved_errno; 221 #define TBUF_LEN 2048 222 #define FMT_LEN 1024 223 #define MAXTRIES 10 224 char tbuf[TBUF_LEN], fmt_cpy[FMT_LEN], fmt_cat[FMT_LEN] = ""; 225 size_t tbuf_left, fmt_left, msgsdlen; 226 char *fmt = fmt_cat; 227 int signal_safe = pri & LOG_SIGNAL_SAFE; 228 struct iovec iov[7]; /* prog + [ + pid + ]: + fmt + crlf */ 229 int opened, iovcnt; 230 231 pri &= ~LOG_SIGNAL_SAFE; 232 233 #define INTERNALLOG LOG_ERR|LOG_CONS|LOG_PERROR|LOG_PID 234 /* Check for invalid bits. */ 235 if (pri & ~(LOG_PRIMASK|LOG_FACMASK)) { 236 syslog_r(INTERNALLOG | signal_safe, data, 237 "syslog_r: unknown facility/priority: %x", pri); 238 pri &= LOG_PRIMASK|LOG_FACMASK; 239 } 240 241 /* Check priority against setlogmask values. */ 242 if (!(LOG_MASK(LOG_PRI(pri)) & data->log_mask)) 243 return; 244 245 saved_errno = errno; 246 247 /* Set default facility if none specified. */ 248 if ((pri & LOG_FACMASK) == 0) 249 pri |= data->log_fac; 250 251 /* Build the message. */ 252 p = tbuf; 253 tbuf_left = TBUF_LEN; 254 255 #define DEC() \ 256 do { \ 257 if (prlen >= tbuf_left) \ 258 prlen = tbuf_left - 1; \ 259 p += prlen; \ 260 tbuf_left -= prlen; \ 261 } while (/*CONSTCOND*/0) 262 263 prlen = snprintf_ss(p, tbuf_left, "<%d>1 ", pri); 264 DEC(); 265 266 if (!signal_safe && (gettimeofday(&tv, NULL) != -1)) { 267 /* strftime() implies tzset(), localtime_r() doesn't. */ 268 tzset(); 269 now = (time_t) tv.tv_sec; 270 localtime_r(&now, &tmnow); 271 272 prlen = strftime(p, tbuf_left, "%FT%T", &tmnow); 273 DEC(); 274 prlen = snprintf(p, tbuf_left, ".%06ld", (long)tv.tv_usec); 275 DEC(); 276 prlen = strftime(p, tbuf_left-1, "%z", &tmnow); 277 /* strftime gives eg. "+0200", but we need "+02:00" */ 278 if (prlen == 5) { 279 p[prlen+1] = p[prlen]; 280 p[prlen] = p[prlen-1]; 281 p[prlen-1] = p[prlen-2]; 282 p[prlen-2] = ':'; 283 prlen += 1; 284 } 285 } else { 286 prlen = snprintf_ss(p, tbuf_left, "-"); 287 #if 0 288 /* 289 * if gmtime_r() was signal-safe we could output 290 * the UTC-time: 291 */ 292 gmtime_r(&now, &tmnow); 293 prlen = strftime(p, tbuf_left, "%FT%TZ", &tmnow); 294 #endif 295 } 296 297 if (data == &sdata) 298 mutex_lock(&syslog_mutex); 299 300 if (data->log_hostname[0] == '\0' && gethostname(data->log_hostname, 301 sizeof(data->log_hostname)) == -1) { 302 /* can this really happen? */ 303 data->log_hostname[0] = '-'; 304 data->log_hostname[1] = '\0'; 305 } 306 307 DEC(); 308 prlen = snprintf_ss(p, tbuf_left, " %s ", data->log_hostname); 309 310 if (data->log_tag == NULL) 311 data->log_tag = getprogname(); 312 313 DEC(); 314 prlen = snprintf_ss(p, tbuf_left, "%s ", 315 data->log_tag ? data->log_tag : "-"); 316 317 if (data == &sdata) 318 mutex_unlock(&syslog_mutex); 319 320 if (data->log_stat & (LOG_PERROR|LOG_CONS)) { 321 iovcnt = 0; 322 iov[iovcnt].iov_base = p; 323 iov[iovcnt].iov_len = prlen - 1; 324 iovcnt++; 325 } 326 DEC(); 327 328 if (data->log_stat & LOG_PID) { 329 prlen = snprintf_ss(p, tbuf_left, "%d ", getpid()); 330 if (data->log_stat & (LOG_PERROR|LOG_CONS)) { 331 iov[iovcnt].iov_base = __UNCONST("["); 332 iov[iovcnt].iov_len = 1; 333 iovcnt++; 334 iov[iovcnt].iov_base = p; 335 iov[iovcnt].iov_len = prlen - 1; 336 iovcnt++; 337 iov[iovcnt].iov_base = __UNCONST(BRCOSP); 338 iov[iovcnt].iov_len = 3; 339 iovcnt++; 340 } 341 } else { 342 prlen = snprintf_ss(p, tbuf_left, "- "); 343 if (data->log_stat & (LOG_PERROR|LOG_CONS)) { 344 iov[iovcnt].iov_base = __UNCONST(BRCOSP + 1); 345 iov[iovcnt].iov_len = 2; 346 iovcnt++; 347 } 348 } 349 DEC(); 350 351 /* 352 * concat the format strings, then use one vsnprintf() 353 */ 354 if (msgid != NULL && *msgid != '\0') { 355 strlcat(fmt_cat, msgid, FMT_LEN); 356 strlcat(fmt_cat, " ", FMT_LEN); 357 } else 358 strlcat(fmt_cat, "- ", FMT_LEN); 359 360 if (sdfmt != NULL && *sdfmt != '\0') { 361 strlcat(fmt_cat, sdfmt, FMT_LEN); 362 } else 363 strlcat(fmt_cat, "-", FMT_LEN); 364 365 if (data->log_stat & (LOG_PERROR|LOG_CONS)) 366 msgsdlen = strlen(fmt_cat) + 1; 367 else 368 msgsdlen = 0; /* XXX: GCC */ 369 370 if (msgfmt != NULL && *msgfmt != '\0') { 371 strlcat(fmt_cat, " ", FMT_LEN); 372 strlcat(fmt_cat, msgfmt, FMT_LEN); 373 } 374 375 /* 376 * We wouldn't need this mess if printf handled %m, or if 377 * strerror() had been invented before syslog(). 378 */ 379 for (t = fmt_cpy, fmt_left = FMT_LEN; (ch = *fmt) != '\0'; ++fmt) { 380 if (ch == '%' && fmt[1] == 'm') { 381 const char *s; 382 383 if (signal_safe || (s = strerror(saved_errno)) == NULL) 384 prlen = snprintf_ss(t, fmt_left, "Error %d", 385 saved_errno); 386 else 387 prlen = strlcpy(t, s, fmt_left); 388 if (prlen >= fmt_left) 389 prlen = fmt_left - 1; 390 t += prlen; 391 fmt++; 392 fmt_left -= prlen; 393 } else if (ch == '%' && fmt[1] == '%' && fmt_left > 2) { 394 *t++ = '%'; 395 *t++ = '%'; 396 fmt++; 397 fmt_left -= 2; 398 } else { 399 if (fmt_left > 1) { 400 *t++ = ch; 401 fmt_left--; 402 } 403 } 404 } 405 *t = '\0'; 406 407 if (signal_safe) 408 prlen = vsnprintf_ss(p, tbuf_left, fmt_cpy, ap); 409 else 410 prlen = vsnprintf(p, tbuf_left, fmt_cpy, ap); 411 412 if (data->log_stat & (LOG_PERROR|LOG_CONS)) { 413 iov[iovcnt].iov_base = p + msgsdlen; 414 iov[iovcnt].iov_len = prlen - msgsdlen; 415 iovcnt++; 416 } 417 418 DEC(); 419 cnt = p - tbuf; 420 421 /* Output to stderr if requested. */ 422 if (data->log_stat & LOG_PERROR) { 423 iov[iovcnt].iov_base = __UNCONST(CRLF + 1); 424 iov[iovcnt].iov_len = 1; 425 (void)writev(STDERR_FILENO, iov, iovcnt + 1); 426 } 427 428 /* Get connected, output the message to the local logger. */ 429 if (data == &sdata) 430 mutex_lock(&syslog_mutex); 431 opened = !data->log_opened; 432 if (opened) 433 openlog_unlocked_r(data->log_tag, data->log_stat, 0, data); 434 connectlog_r(data); 435 436 /* 437 * If the send() failed, there are two likely scenarios: 438 * 1) syslogd was restarted 439 * 2) /dev/log is out of socket buffer space 440 * We attempt to reconnect to /dev/log to take care of 441 * case #1 and keep send()ing data to cover case #2 442 * to give syslogd a chance to empty its socket buffer. 443 */ 444 for (tries = 0; tries < MAXTRIES; tries++) { 445 if (send(data->log_file, tbuf, cnt, 0) != -1) 446 break; 447 if (errno != ENOBUFS) { 448 disconnectlog_r(data); 449 connectlog_r(data); 450 } else 451 (void)usleep(1); 452 } 453 454 /* 455 * Output the message to the console; try not to block 456 * as a blocking console should not stop other processes. 457 * Make sure the error reported is the one from the syslogd failure. 458 */ 459 if (tries == MAXTRIES && (data->log_stat & LOG_CONS) && 460 (fd = open(_PATH_CONSOLE, 461 O_WRONLY | O_NONBLOCK | O_CLOEXEC, 0)) >= 0) { 462 iov[iovcnt].iov_base = __UNCONST(CRLF); 463 iov[iovcnt].iov_len = 2; 464 (void)writev(fd, iov, iovcnt + 1); 465 (void)close(fd); 466 } 467 468 if (data == &sdata) 469 mutex_unlock(&syslog_mutex); 470 471 if (data != &sdata && opened) { 472 /* preserve log tag */ 473 const char *ident = data->log_tag; 474 closelog_r(data); 475 data->log_tag = ident; 476 } 477 } 478 479 static void 480 disconnectlog_r(struct syslog_data *data) 481 { 482 /* 483 * If the user closed the FD and opened another in the same slot, 484 * that's their problem. They should close it before calling on 485 * system services. 486 */ 487 if (data->log_file != -1) { 488 (void)close(data->log_file); 489 data->log_file = -1; 490 } 491 data->log_connected = 0; /* retry connect */ 492 } 493 494 static void 495 connectlog_r(struct syslog_data *data) 496 { 497 /* AF_UNIX address of local logger */ 498 static const struct sockaddr_un sun = { 499 .sun_family = AF_LOCAL, 500 .sun_len = sizeof(sun), 501 .sun_path = _PATH_LOG, 502 }; 503 504 if (data->log_file == -1 || fcntl(data->log_file, F_GETFL, 0) == -1) { 505 if ((data->log_file = socket(AF_UNIX, SOCK_DGRAM | SOCK_CLOEXEC, 506 0)) == -1) 507 return; 508 data->log_connected = 0; 509 } 510 if (!data->log_connected) { 511 if (connect(data->log_file, 512 (const struct sockaddr *)(const void *)&sun, 513 (socklen_t)sizeof(sun)) == -1) { 514 (void)close(data->log_file); 515 data->log_file = -1; 516 } else 517 data->log_connected = 1; 518 } 519 } 520 521 static void 522 openlog_unlocked_r(const char *ident, int logstat, int logfac, 523 struct syslog_data *data) 524 { 525 if (ident != NULL) 526 data->log_tag = ident; 527 data->log_stat = logstat; 528 if (logfac != 0 && (logfac &~ LOG_FACMASK) == 0) 529 data->log_fac = logfac; 530 531 if (data->log_stat & LOG_NDELAY) /* open immediately */ 532 connectlog_r(data); 533 534 data->log_opened = 1; 535 } 536 537 void 538 openlog_r(const char *ident, int logstat, int logfac, struct syslog_data *data) 539 { 540 if (data == &sdata) 541 mutex_lock(&syslog_mutex); 542 openlog_unlocked_r(ident, logstat, logfac, data); 543 if (data == &sdata) 544 mutex_unlock(&syslog_mutex); 545 } 546 547 void 548 closelog_r(struct syslog_data *data) 549 { 550 if (data == &sdata) 551 mutex_lock(&syslog_mutex); 552 (void)close(data->log_file); 553 data->log_file = -1; 554 data->log_connected = 0; 555 data->log_tag = NULL; 556 if (data == &sdata) 557 mutex_unlock(&syslog_mutex); 558 } 559 560 int 561 setlogmask_r(int pmask, struct syslog_data *data) 562 { 563 int omask; 564 565 omask = data->log_mask; 566 if (pmask != 0) 567 data->log_mask = pmask; 568 return omask; 569 } 570