1 /* $NetBSD: syslog.c,v 1.46 2008/12/10 15:20:04 christos Exp $ */ 2 3 /* 4 * Copyright (c) 1983, 1988, 1993 5 * The Regents of the University of California. All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 3. Neither the name of the University nor the names of its contributors 16 * may be used to endorse or promote products derived from this software 17 * without specific prior written permission. 18 * 19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 22 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 29 * SUCH DAMAGE. 30 */ 31 32 #include <sys/cdefs.h> 33 #if defined(LIBC_SCCS) && !defined(lint) 34 #if 0 35 static char sccsid[] = "@(#)syslog.c 8.5 (Berkeley) 4/29/95"; 36 #else 37 __RCSID("$NetBSD: syslog.c,v 1.46 2008/12/10 15:20:04 christos Exp $"); 38 #endif 39 #endif /* LIBC_SCCS and not lint */ 40 41 #include "namespace.h" 42 #include <sys/types.h> 43 #include <sys/param.h> 44 #include <sys/socket.h> 45 #include <sys/syslog.h> 46 #include <sys/uio.h> 47 #include <sys/un.h> 48 #include <netdb.h> 49 50 #include <errno.h> 51 #include <fcntl.h> 52 #include <paths.h> 53 #include <stdarg.h> 54 #include <stdio.h> 55 #include <stdlib.h> 56 #include <string.h> 57 #include <time.h> 58 #include <unistd.h> 59 #include "reentrant.h" 60 #include "extern.h" 61 62 #ifdef __weak_alias 63 __weak_alias(closelog,_closelog) 64 __weak_alias(openlog,_openlog) 65 __weak_alias(setlogmask,_setlogmask) 66 __weak_alias(syslog,_syslog) 67 __weak_alias(vsyslog,_vsyslog) 68 __weak_alias(syslogp,_syslogp) 69 __weak_alias(vsyslogp,_vsyslogp) 70 71 __weak_alias(closelog_r,_closelog_r) 72 __weak_alias(openlog_r,_openlog_r) 73 __weak_alias(setlogmask_r,_setlogmask_r) 74 __weak_alias(syslog_r,_syslog_r) 75 __weak_alias(vsyslog_r,_vsyslog_r) 76 __weak_alias(syslog_ss,_syslog_ss) 77 __weak_alias(vsyslog_ss,_vsyslog_ss) 78 __weak_alias(syslogp_r,_syslogp_r) 79 __weak_alias(vsyslogp_r,_vsyslogp_r) 80 __weak_alias(syslogp_ss,_syslogp_ss) 81 __weak_alias(vsyslogp_ss,_vsyslogp_ss) 82 #endif 83 84 static struct syslog_data sdata = SYSLOG_DATA_INIT; 85 86 static void openlog_unlocked_r(const char *, int, int, 87 struct syslog_data *); 88 static void disconnectlog_r(struct syslog_data *); 89 static void connectlog_r(struct syslog_data *); 90 91 #define LOG_SIGNAL_SAFE (int)0x80000000 92 93 94 #ifdef _REENTRANT 95 static mutex_t syslog_mutex = MUTEX_INITIALIZER; 96 #endif 97 98 static char hostname[MAXHOSTNAMELEN]; 99 100 /* 101 * syslog, vsyslog -- 102 * print message on log file; output is intended for syslogd(8). 103 */ 104 void 105 syslog(int pri, const char *fmt, ...) 106 { 107 va_list ap; 108 109 va_start(ap, fmt); 110 vsyslog(pri, fmt, ap); 111 va_end(ap); 112 } 113 114 void 115 vsyslog(int pri, const char *fmt, va_list ap) 116 { 117 vsyslog_r(pri, &sdata, fmt, ap); 118 } 119 120 /* 121 * syslogp, vsyslogp -- 122 * like syslog but take additional arguments for MSGID and SD 123 */ 124 void 125 syslogp(int pri, const char *msgid, const char *sdfmt, const char *msgfmt, ...) 126 { 127 va_list ap; 128 129 va_start(ap, msgfmt); 130 vsyslogp(pri, msgid, sdfmt, msgfmt, ap); 131 va_end(ap); 132 } 133 134 void 135 vsyslogp(int pri, const char *msgid, const char *sdfmt, const char *msgfmt, va_list ap) 136 { 137 vsyslogp_r(pri, &sdata, msgid, sdfmt, msgfmt, ap); 138 } 139 140 void 141 openlog(const char *ident, int logstat, int logfac) 142 { 143 openlog_r(ident, logstat, logfac, &sdata); 144 } 145 146 void 147 closelog(void) 148 { 149 closelog_r(&sdata); 150 } 151 152 /* setlogmask -- set the log mask level */ 153 int 154 setlogmask(int pmask) 155 { 156 return setlogmask_r(pmask, &sdata); 157 } 158 159 /* Reentrant version of syslog, i.e. syslog_r() */ 160 161 void 162 syslog_r(int pri, struct syslog_data *data, const char *fmt, ...) 163 { 164 va_list ap; 165 166 va_start(ap, fmt); 167 vsyslog_r(pri, data, fmt, ap); 168 va_end(ap); 169 } 170 171 void 172 syslogp_r(int pri, struct syslog_data *data, const char *msgid, 173 const char *sdfmt, const char *msgfmt, ...) 174 { 175 va_list ap; 176 177 va_start(ap, msgfmt); 178 vsyslogp_r(pri, data, msgid, sdfmt, msgfmt, ap); 179 va_end(ap); 180 } 181 182 void 183 syslog_ss(int pri, struct syslog_data *data, const char *fmt, ...) 184 { 185 va_list ap; 186 187 va_start(ap, fmt); 188 vsyslog_r(pri | LOG_SIGNAL_SAFE, data, fmt, ap); 189 va_end(ap); 190 } 191 192 void 193 syslogp_ss(int pri, struct syslog_data *data, const char *msgid, 194 const char *sdfmt, const char *msgfmt, ...) 195 { 196 va_list ap; 197 198 va_start(ap, msgfmt); 199 vsyslogp_r(pri | LOG_SIGNAL_SAFE, data, msgid, sdfmt, msgfmt, ap); 200 va_end(ap); 201 } 202 203 void 204 vsyslog_ss(int pri, struct syslog_data *data, const char *fmt, va_list ap) 205 { 206 vsyslog_r(pri | LOG_SIGNAL_SAFE, data, fmt, ap); 207 } 208 209 void 210 vsyslogp_ss(int pri, struct syslog_data *data, const char *msgid, 211 const char *sdfmt, const char *msgfmt, va_list ap) 212 { 213 vsyslogp_r(pri | LOG_SIGNAL_SAFE, data, msgid, sdfmt, msgfmt, ap); 214 } 215 216 217 void 218 vsyslog_r(int pri, struct syslog_data *data, const char *fmt, va_list ap) 219 { 220 vsyslogp_r(pri, data, NULL, NULL, fmt, ap); 221 } 222 223 void 224 vsyslogp_r(int pri, struct syslog_data *data, const char *msgid, 225 const char *sdfmt, const char *msgfmt, va_list ap) 226 { 227 size_t cnt, prlen, tries; 228 char ch, *p, *t; 229 struct timeval tv; 230 struct tm tmnow; 231 time_t now; 232 int fd, saved_errno; 233 #define TBUF_LEN 2048 234 #define FMT_LEN 1024 235 #define MAXTRIES 10 236 char *stdp = NULL; /* pacify gcc */ 237 char tbuf[TBUF_LEN], fmt_cpy[FMT_LEN], fmt_cat[FMT_LEN] = ""; 238 size_t tbuf_left, fmt_left; 239 char *fmt = fmt_cat; 240 int signal_safe = pri & LOG_SIGNAL_SAFE; 241 int opened; 242 243 pri &= ~LOG_SIGNAL_SAFE; 244 245 #define INTERNALLOG LOG_ERR|LOG_CONS|LOG_PERROR|LOG_PID 246 /* Check for invalid bits. */ 247 if (pri & ~(LOG_PRIMASK|LOG_FACMASK)) { 248 syslog_r(INTERNALLOG | signal_safe, data, 249 "syslog_r: unknown facility/priority: %x", pri); 250 pri &= LOG_PRIMASK|LOG_FACMASK; 251 } 252 253 /* Check priority against setlogmask values. */ 254 if (!(LOG_MASK(LOG_PRI(pri)) & data->log_mask)) 255 return; 256 257 saved_errno = errno; 258 259 /* Set default facility if none specified. */ 260 if ((pri & LOG_FACMASK) == 0) 261 pri |= data->log_fac; 262 263 /* Build the message. */ 264 p = tbuf; 265 tbuf_left = TBUF_LEN; 266 267 #define DEC() \ 268 do { \ 269 if (prlen >= tbuf_left) \ 270 prlen = tbuf_left - 1; \ 271 p += prlen; \ 272 tbuf_left -= prlen; \ 273 } while (/*CONSTCOND*/0) 274 275 prlen = snprintf_ss(p, tbuf_left, "<%d>1 ", pri); 276 DEC(); 277 278 if (!signal_safe && (gettimeofday(&tv, NULL) != -1)) { 279 /* strftime() implies tzset(), localtime_r() doesn't. */ 280 tzset(); 281 now = (time_t) tv.tv_sec; 282 localtime_r(&now, &tmnow); 283 284 prlen = strftime(p, tbuf_left, "%FT%T", &tmnow); 285 DEC(); 286 prlen = snprintf(p, tbuf_left, ".%06ld", tv.tv_usec); 287 DEC(); 288 prlen = strftime(p, tbuf_left-1, "%z", &tmnow); 289 /* strftime gives eg. "+0200", but we need "+02:00" */ 290 if (prlen == 5) { 291 p[prlen+1] = p[prlen]; 292 p[prlen] = p[prlen-1]; 293 p[prlen-1] = p[prlen-2]; 294 p[prlen-2] = ':'; 295 prlen += 1; 296 } 297 } else { 298 prlen = snprintf_ss(p, tbuf_left, "-"); 299 300 /* if gmtime_r() was signal-safe we could output the UTC-time: 301 gmtime_r(&now, &tmnow); 302 prlen = strftime(p, tbuf_left, "%FT%TZ", &tmnow); 303 */ 304 } 305 DEC(); 306 prlen = snprintf_ss(p, tbuf_left, " %s ", hostname); 307 DEC(); 308 309 if (data->log_stat & LOG_PERROR) 310 stdp = p; 311 if (data->log_tag == NULL) 312 data->log_tag = getprogname(); 313 314 prlen = snprintf_ss(p, tbuf_left, "%s ", 315 data->log_tag ? data->log_tag : "-"); 316 DEC(); 317 318 if (data->log_stat & LOG_PID) 319 prlen = snprintf_ss(p, tbuf_left, "%d ", getpid()); 320 else 321 prlen = snprintf_ss(p, tbuf_left, "- "); 322 DEC(); 323 324 /* 325 * concat the format strings, then use one vsnprintf() 326 */ 327 if (msgid != NULL && *msgid != '\0') { 328 strlcat(fmt_cat, msgid, FMT_LEN); 329 strlcat(fmt_cat, " ", FMT_LEN); 330 } else 331 strlcat(fmt_cat, "- ", FMT_LEN); 332 333 if (sdfmt != NULL && *sdfmt != '\0') { 334 strlcat(fmt_cat, sdfmt, FMT_LEN); 335 } else 336 strlcat(fmt_cat, "-", FMT_LEN); 337 338 if (msgfmt != NULL && *msgfmt != '\0') { 339 strlcat(fmt_cat, " ", FMT_LEN); 340 strlcat(fmt_cat, msgfmt, FMT_LEN); 341 } 342 343 /* 344 * We wouldn't need this mess if printf handled %m, or if 345 * strerror() had been invented before syslog(). 346 */ 347 for (t = fmt_cpy, fmt_left = FMT_LEN; (ch = *fmt) != '\0'; ++fmt) { 348 if (ch == '%' && fmt[1] == 'm') { 349 char ebuf[128]; 350 ++fmt; 351 if (signal_safe || 352 strerror_r(saved_errno, ebuf, sizeof(ebuf))) 353 prlen = snprintf_ss(t, fmt_left, "Error %d", 354 saved_errno); 355 else 356 prlen = snprintf_ss(t, fmt_left, "%s", ebuf); 357 if (prlen >= fmt_left) 358 prlen = fmt_left - 1; 359 t += prlen; 360 fmt_left -= prlen; 361 } else if (ch == '%' && fmt[1] == '%' && fmt_left > 2) { 362 *t++ = '%'; 363 *t++ = '%'; 364 fmt++; 365 fmt_left -= 2; 366 } else { 367 if (fmt_left > 1) { 368 *t++ = ch; 369 fmt_left--; 370 } 371 } 372 } 373 *t = '\0'; 374 375 if (signal_safe) 376 prlen = vsnprintf_ss(p, tbuf_left, fmt_cpy, ap); 377 else 378 prlen = vsnprintf(p, tbuf_left, fmt_cpy, ap); 379 DEC(); 380 cnt = p - tbuf; 381 382 /* Output to stderr if requested. */ 383 if (data->log_stat & LOG_PERROR) { 384 struct iovec iov[2]; 385 386 iov[0].iov_base = stdp; 387 iov[0].iov_len = cnt - (stdp - tbuf); 388 iov[1].iov_base = __UNCONST("\n"); 389 iov[1].iov_len = 1; 390 (void)writev(STDERR_FILENO, iov, 2); 391 } 392 393 /* Get connected, output the message to the local logger. */ 394 if (data == &sdata) 395 mutex_lock(&syslog_mutex); 396 opened = !data->opened; 397 if (opened) 398 openlog_unlocked_r(data->log_tag, data->log_stat, 0, data); 399 connectlog_r(data); 400 401 /* 402 * If the send() failed, there are two likely scenarios: 403 * 1) syslogd was restarted 404 * 2) /dev/log is out of socket buffer space 405 * We attempt to reconnect to /dev/log to take care of 406 * case #1 and keep send()ing data to cover case #2 407 * to give syslogd a chance to empty its socket buffer. 408 */ 409 for (tries = 0; tries < MAXTRIES; tries++) { 410 if (send(data->log_file, tbuf, cnt, 0) != -1) 411 break; 412 if (errno != ENOBUFS) { 413 disconnectlog_r(data); 414 connectlog_r(data); 415 } else 416 (void)usleep(1); 417 } 418 419 /* 420 * Output the message to the console; try not to block 421 * as a blocking console should not stop other processes. 422 * Make sure the error reported is the one from the syslogd failure. 423 */ 424 if (tries == MAXTRIES && (data->log_stat & LOG_CONS) && 425 (fd = open(_PATH_CONSOLE, O_WRONLY|O_NONBLOCK, 0)) >= 0 && 426 (p = strchr(tbuf, '>')) != NULL) { 427 struct iovec iov[2]; 428 iov[0].iov_base = ++p; 429 iov[0].iov_len = cnt - (p - tbuf); 430 iov[1].iov_base = __UNCONST("\r\n"); 431 iov[1].iov_len = 2; 432 (void)writev(fd, iov, 2); 433 (void)close(fd); 434 } 435 436 if (data == &sdata) 437 mutex_unlock(&syslog_mutex); 438 439 if (data != &sdata && opened) { 440 /* preserve log tag */ 441 const char *ident = data->log_tag; 442 closelog_r(data); 443 data->log_tag = ident; 444 } 445 } 446 447 static void 448 disconnectlog_r(struct syslog_data *data) 449 { 450 /* 451 * If the user closed the FD and opened another in the same slot, 452 * that's their problem. They should close it before calling on 453 * system services. 454 */ 455 if (data->log_file != -1) { 456 (void)close(data->log_file); 457 data->log_file = -1; 458 } 459 data->connected = 0; /* retry connect */ 460 } 461 462 static void 463 connectlog_r(struct syslog_data *data) 464 { 465 /* AF_UNIX address of local logger */ 466 static const struct sockaddr_un sun = { 467 .sun_family = AF_LOCAL, 468 .sun_len = sizeof(sun), 469 .sun_path = _PATH_LOG, 470 }; 471 472 if (data->log_file == -1 || fcntl(data->log_file, F_GETFL, 0) == -1) { 473 if ((data->log_file = socket(AF_UNIX, SOCK_DGRAM, 0)) == -1) 474 return; 475 (void)fcntl(data->log_file, F_SETFD, FD_CLOEXEC); 476 data->connected = 0; 477 } 478 if (!data->connected) { 479 if (connect(data->log_file, 480 (const struct sockaddr *)(const void *)&sun, 481 sizeof(sun)) == -1) { 482 (void)close(data->log_file); 483 data->log_file = -1; 484 } else 485 data->connected = 1; 486 } 487 } 488 489 static void 490 openlog_unlocked_r(const char *ident, int logstat, int logfac, 491 struct syslog_data *data) 492 { 493 if (ident != NULL) 494 data->log_tag = ident; 495 data->log_stat = logstat; 496 if (logfac != 0 && (logfac &~ LOG_FACMASK) == 0) 497 data->log_fac = logfac; 498 499 if (data->log_stat & LOG_NDELAY) /* open immediately */ 500 connectlog_r(data); 501 502 /* We could cache this, but then it might change */ 503 if (gethostname(hostname, sizeof(hostname)) == -1 504 || hostname[0] == '\0') { 505 /* can this really happen? */ 506 hostname[0] = '-'; 507 hostname[1] = '\0'; 508 } 509 data->opened = 1; 510 } 511 512 void 513 openlog_r(const char *ident, int logstat, int logfac, struct syslog_data *data) 514 { 515 if (data == &sdata) 516 mutex_lock(&syslog_mutex); 517 openlog_unlocked_r(ident, logstat, logfac, data); 518 if (data == &sdata) 519 mutex_unlock(&syslog_mutex); 520 } 521 522 void 523 closelog_r(struct syslog_data *data) 524 { 525 if (data == &sdata) 526 mutex_lock(&syslog_mutex); 527 (void)close(data->log_file); 528 data->log_file = -1; 529 data->connected = 0; 530 data->log_tag = NULL; 531 if (data == &sdata) 532 mutex_unlock(&syslog_mutex); 533 } 534 535 int 536 setlogmask_r(int pmask, struct syslog_data *data) 537 { 538 int omask; 539 540 omask = data->log_mask; 541 if (pmask != 0) 542 data->log_mask = pmask; 543 return omask; 544 } 545