]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/log.c
dbus: add service D-Bus property "Sockets"
[thirdparty/systemd.git] / src / log.c
CommitLineData
d6c9574f 1/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
5899f3b7 2
a7334b09
LP
3/***
4 This file is part of systemd.
5
6 Copyright 2010 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20***/
21
5899f3b7
LP
22#include <stdarg.h>
23#include <stdio.h>
c9b97d2a 24#include <errno.h>
16801e90
LP
25#include <unistd.h>
26#include <fcntl.h>
27#include <sys/socket.h>
28#include <sys/un.h>
5899f3b7
LP
29
30#include "log.h"
16801e90
LP
31#include "util.h"
32#include "macro.h"
5899f3b7 33
16801e90 34#define SYSLOG_TIMEOUT_USEC (5*USEC_PER_SEC)
16801e90
LP
35
36static LogTarget log_target = LOG_TARGET_CONSOLE;
bbe63281 37static int log_max_level = LOG_INFO;
16801e90 38
843d2643 39static int console_fd = STDERR_FILENO;
16801e90
LP
40static int syslog_fd = -1;
41static int kmsg_fd = -1;
42
c31e1495
LP
43static bool syslog_is_stream = false;
44
bbe63281
LP
45static bool show_color = false;
46static bool show_location = false;
47
35b8ca3a 48/* Akin to glibc's __abort_msg; which is private and we hence cannot
185986c6
LP
49 * use here. */
50static char *log_abort_msg = NULL;
51
843d2643
LP
52void log_close_console(void) {
53
54 if (console_fd < 0)
55 return;
16801e90 56
c8513d54
LP
57 if (getpid() == 1) {
58 if (console_fd >= 3)
59 close_nointr_nofail(console_fd);
60
843d2643 61 console_fd = -1;
16801e90
LP
62 }
63}
64
843d2643 65static int log_open_console(void) {
16801e90 66
843d2643 67 if (console_fd >= 0)
16801e90 68 return 0;
843d2643
LP
69
70 if (getpid() == 1) {
71
72 if ((console_fd = open_terminal("/dev/console", O_WRONLY|O_NOCTTY|O_CLOEXEC)) < 0) {
73 log_error("Failed to open /dev/console for logging: %s", strerror(-console_fd));
74 return console_fd;
75 }
76
35b8ca3a 77 log_debug("Successfully opened /dev/console for logging.");
843d2643
LP
78 } else
79 console_fd = STDERR_FILENO;
80
81 return 0;
82}
83
84void log_close_kmsg(void) {
85
86 if (kmsg_fd < 0)
87 return;
88
89 close_nointr_nofail(kmsg_fd);
90 kmsg_fd = -1;
91}
92
93static int log_open_kmsg(void) {
16801e90
LP
94
95 if (kmsg_fd >= 0)
96 return 0;
97
c9b80453 98 if ((kmsg_fd = open("/dev/kmsg", O_WRONLY|O_NOCTTY|O_CLOEXEC)) < 0) {
31a7034d 99 log_error("Failed to open /dev/kmsg for logging: %s", strerror(errno));
16801e90 100 return -errno;
c9b80453 101 }
16801e90 102
35b8ca3a 103 log_debug("Successfully opened /dev/kmsg for logging.");
0dae83f9 104
16801e90
LP
105 return 0;
106}
107
108void log_close_syslog(void) {
109
843d2643
LP
110 if (syslog_fd < 0)
111 return;
112
113 close_nointr_nofail(syslog_fd);
114 syslog_fd = -1;
16801e90
LP
115}
116
c31e1495
LP
117static int create_log_socket(int type) {
118 struct timeval tv;
119 int fd;
120
121 if ((fd = socket(AF_UNIX, type|SOCK_CLOEXEC, 0)) < 0)
122 return -errno;
123
124 /* Make sure we don't block for more than 5s when talking to
125 * syslog */
126 timeval_store(&tv, SYSLOG_TIMEOUT_USEC);
127 if (setsockopt(fd, SOL_SOCKET, SO_SNDTIMEO, &tv, sizeof(tv)) < 0) {
128 close_nointr_nofail(fd);
129 return -errno;
130 }
131
132 return fd;
133}
134
843d2643 135static int log_open_syslog(void) {
16801e90
LP
136 union {
137 struct sockaddr sa;
138 struct sockaddr_un un;
139 } sa;
16801e90
LP
140 int r;
141
16801e90
LP
142 if (syslog_fd >= 0)
143 return 0;
144
16801e90
LP
145 zero(sa);
146 sa.un.sun_family = AF_UNIX;
147 strncpy(sa.un.sun_path, "/dev/log", sizeof(sa.un.sun_path));
148
c31e1495 149 if ((syslog_fd = create_log_socket(SOCK_DGRAM)) < 0) {
16801e90 150 r = -errno;
843d2643 151 goto fail;
16801e90
LP
152 }
153
c31e1495
LP
154 if (connect(syslog_fd, &sa.sa, sizeof(sa)) < 0) {
155 close_nointr_nofail(syslog_fd);
156
157 /* Some legacy syslog systems still use stream
158 * sockets. They really shouldn't. But what can we
159 * do... */
160 if ((syslog_fd = create_log_socket(SOCK_STREAM)) < 0) {
161 r = -errno;
162 goto fail;
163 }
164
165 if (connect(syslog_fd, &sa.sa, sizeof(sa)) < 0) {
166 r = -errno;
167 goto fail;
168 }
169
170 syslog_is_stream = true;
171 } else
172 syslog_is_stream = false;
173
35b8ca3a 174 log_debug("Successfully opened syslog for logging.");
0dae83f9 175
16801e90 176 return 0;
843d2643
LP
177
178fail:
179 log_close_syslog();
31a7034d 180 log_debug("Failed to open syslog for logging: %s", strerror(-r));
843d2643
LP
181 return r;
182}
183
184int log_open(void) {
185 int r;
186
187 /* If we don't use the console we close it here, to not get
188 * killed by SAK. If we don't use syslog we close it here so
189 * that we are not confused by somebody deleting the socket in
190 * the fs. If we don't use /dev/kmsg we still keep it open,
191 * because there is no reason to close it. */
192
9fae33d2
LP
193 if (log_target == LOG_TARGET_NULL) {
194 log_close_syslog();
195 log_close_console();
196 return 0;
197 }
198
bb7df0da
LP
199 if (log_target != LOG_TARGET_AUTO ||
200 getpid() == 1 ||
f41c094c 201 isatty(STDERR_FILENO) <= 0) {
bb7df0da
LP
202
203 if (log_target == LOG_TARGET_AUTO ||
204 log_target == LOG_TARGET_SYSLOG_OR_KMSG ||
205 log_target == LOG_TARGET_SYSLOG)
206 if ((r = log_open_syslog()) >= 0) {
207 log_close_console();
208 return r;
209 }
210 if (log_target == LOG_TARGET_AUTO ||
211 log_target == LOG_TARGET_SYSLOG_OR_KMSG ||
212 log_target == LOG_TARGET_KMSG)
213 if ((r = log_open_kmsg()) >= 0) {
214 log_close_syslog();
215 log_close_console();
216 return r;
217 }
218 }
843d2643
LP
219
220 log_close_syslog();
dcdf86bb
LP
221
222 /* Get the real /dev/console if we are PID=1, hence reopen */
223 log_close_console();
843d2643 224 return log_open_console();
16801e90
LP
225}
226
227void log_set_target(LogTarget target) {
228 assert(target >= 0);
229 assert(target < _LOG_TARGET_MAX);
230
231 log_target = target;
232}
233
234void log_set_max_level(int level) {
235 assert((level & LOG_PRIMASK) == level);
236
237 log_max_level = level;
238}
239
843d2643 240static int write_to_console(
5899f3b7
LP
241 int level,
242 const char*file,
243 int line,
244 const char *func,
843d2643 245 const char *buffer) {
5899f3b7 246
843d2643
LP
247 char location[64];
248 struct iovec iovec[5];
249 unsigned n = 0;
250 bool highlight;
5899f3b7 251
843d2643
LP
252 if (console_fd < 0)
253 return 0;
254
255 snprintf(location, sizeof(location), "(%s:%u) ", file, line);
256 char_array_0(location);
257
bbe63281 258 highlight = LOG_PRI(level) <= LOG_ERR && show_color;
843d2643
LP
259
260 zero(iovec);
bbe63281
LP
261 if (show_location)
262 IOVEC_SET_STRING(iovec[n++], location);
843d2643 263 if (highlight)
61cbdc4b 264 IOVEC_SET_STRING(iovec[n++], ANSI_HIGHLIGHT_ON);
843d2643
LP
265 IOVEC_SET_STRING(iovec[n++], buffer);
266 if (highlight)
61cbdc4b 267 IOVEC_SET_STRING(iovec[n++], ANSI_HIGHLIGHT_OFF);
843d2643
LP
268 IOVEC_SET_STRING(iovec[n++], "\n");
269
270 if (writev(console_fd, iovec, n) < 0)
271 return -errno;
5899f3b7 272
843d2643 273 return 1;
16801e90 274}
5899f3b7 275
16801e90
LP
276static int write_to_syslog(
277 int level,
278 const char*file,
279 int line,
280 const char *func,
843d2643 281 const char *buffer) {
16801e90
LP
282
283 char header_priority[16], header_time[64], header_pid[16];
16801e90
LP
284 struct iovec iovec[5];
285 struct msghdr msghdr;
286 time_t t;
287 struct tm *tm;
288
289 if (syslog_fd < 0)
843d2643 290 return 0;
16801e90
LP
291
292 snprintf(header_priority, sizeof(header_priority), "<%i>", LOG_MAKEPRI(LOG_DAEMON, LOG_PRI(level)));
293 char_array_0(header_priority);
294
295 t = (time_t) (now(CLOCK_REALTIME) / USEC_PER_SEC);
296 if (!(tm = localtime(&t)))
297 return -EINVAL;
298
299 if (strftime(header_time, sizeof(header_time), "%h %e %T ", tm) <= 0)
300 return -EINVAL;
301
bb00e604 302 snprintf(header_pid, sizeof(header_pid), "[%lu]: ", (unsigned long) getpid());
16801e90
LP
303 char_array_0(header_pid);
304
16801e90
LP
305 zero(iovec);
306 IOVEC_SET_STRING(iovec[0], header_priority);
307 IOVEC_SET_STRING(iovec[1], header_time);
5b6319dc 308 IOVEC_SET_STRING(iovec[2], program_invocation_short_name);
16801e90
LP
309 IOVEC_SET_STRING(iovec[3], header_pid);
310 IOVEC_SET_STRING(iovec[4], buffer);
311
c899f8c6 312 /* When using syslog via SOCK_STREAM separate the messages by NUL chars */
c31e1495
LP
313 if (syslog_is_stream)
314 iovec[4].iov_len++;
315
16801e90
LP
316 zero(msghdr);
317 msghdr.msg_iov = iovec;
318 msghdr.msg_iovlen = ELEMENTSOF(iovec);
319
c31e1495
LP
320 for (;;) {
321 ssize_t n;
322
323 if ((n = sendmsg(syslog_fd, &msghdr, MSG_NOSIGNAL)) < 0)
324 return -errno;
325
326 if (!syslog_is_stream ||
327 (size_t) n >= IOVEC_TOTAL_SIZE(iovec, ELEMENTSOF(iovec)))
328 break;
329
330 IOVEC_INCREMENT(iovec, ELEMENTSOF(iovec), n);
331 }
16801e90 332
843d2643 333 return 1;
16801e90
LP
334}
335
336static int write_to_kmsg(
337 int level,
338 const char*file,
339 int line,
340 const char *func,
843d2643 341 const char *buffer) {
16801e90
LP
342
343 char header_priority[16], header_pid[16];
16801e90
LP
344 struct iovec iovec[5];
345
346 if (kmsg_fd < 0)
843d2643 347 return 0;
16801e90
LP
348
349 snprintf(header_priority, sizeof(header_priority), "<%i>", LOG_PRI(level));
350 char_array_0(header_priority);
351
bb00e604 352 snprintf(header_pid, sizeof(header_pid), "[%lu]: ", (unsigned long) getpid());
16801e90
LP
353 char_array_0(header_pid);
354
16801e90
LP
355 zero(iovec);
356 IOVEC_SET_STRING(iovec[0], header_priority);
5b6319dc 357 IOVEC_SET_STRING(iovec[1], program_invocation_short_name);
16801e90
LP
358 IOVEC_SET_STRING(iovec[2], header_pid);
359 IOVEC_SET_STRING(iovec[3], buffer);
843d2643 360 IOVEC_SET_STRING(iovec[4], "\n");
16801e90
LP
361
362 if (writev(kmsg_fd, iovec, ELEMENTSOF(iovec)) < 0)
363 return -errno;
364
843d2643 365 return 1;
16801e90
LP
366}
367
843d2643
LP
368static int log_dispatch(
369 int level,
370 const char*file,
371 int line,
372 const char *func,
9726b29e 373 char *buffer) {
843d2643 374
9726b29e 375 int r = 0;
843d2643 376
9fae33d2
LP
377 if (log_target == LOG_TARGET_NULL)
378 return 0;
379
9726b29e
LP
380 do {
381 char *e;
9499b235 382 int k = 0;
843d2643 383
9726b29e 384 buffer += strspn(buffer, NEWLINE);
843d2643 385
9726b29e
LP
386 if (buffer[0] == 0)
387 break;
843d2643 388
9726b29e
LP
389 if ((e = strpbrk(buffer, NEWLINE)))
390 *(e++) = 0;
843d2643 391
bb7df0da
LP
392 if (log_target == LOG_TARGET_AUTO ||
393 log_target == LOG_TARGET_SYSLOG_OR_KMSG ||
9726b29e
LP
394 log_target == LOG_TARGET_SYSLOG) {
395
9499b235 396 if ((k = write_to_syslog(level, file, line, func, buffer)) < 0) {
9726b29e
LP
397 log_close_syslog();
398 log_open_kmsg();
9499b235 399 } else if (k > 0)
9726b29e
LP
400 r++;
401 }
402
9499b235 403 if (k <= 0 &&
bb7df0da
LP
404 (log_target == LOG_TARGET_AUTO ||
405 log_target == LOG_TARGET_SYSLOG_OR_KMSG ||
9499b235 406 log_target == LOG_TARGET_KMSG)) {
9726b29e 407
9499b235 408 if ((k = write_to_kmsg(level, file, line, func, buffer)) < 0) {
9726b29e
LP
409 log_close_kmsg();
410 log_open_console();
9499b235 411 } else if (k > 0)
9726b29e
LP
412 r++;
413 }
414
9499b235
LP
415 if (k <= 0 &&
416 (k = write_to_console(level, file, line, func, buffer)) < 0)
9726b29e
LP
417 return k;
418
419 buffer = e;
420 } while (buffer);
421
422 return r;
843d2643
LP
423}
424
2149e37c
LP
425int log_dump_internal(
426 int level,
427 const char*file,
428 int line,
429 const char *func,
430 char *buffer) {
431
432 int saved_errno, r;
433
434 /* This modifies the buffer... */
435
436 if (_likely_(LOG_PRI(level) > log_max_level))
437 return 0;
438
439 saved_errno = errno;
440 r = log_dispatch(level, file, line, func, buffer);
441 errno = saved_errno;
442
443 return r;
444}
445
843d2643 446int log_meta(
16801e90
LP
447 int level,
448 const char*file,
449 int line,
450 const char *func,
451 const char *format, ...) {
452
addab137 453 char buffer[LINE_MAX];
843d2643
LP
454 int saved_errno, r;
455 va_list ap;
16801e90 456
93a46b0b 457 if (_likely_(LOG_PRI(level) > log_max_level))
843d2643 458 return 0;
16801e90
LP
459
460 saved_errno = errno;
843d2643
LP
461
462 va_start(ap, format);
463 vsnprintf(buffer, sizeof(buffer), format, ap);
464 va_end(ap);
465
466 char_array_0(buffer);
467
468 r = log_dispatch(level, file, line, func, buffer);
185986c6 469 errno = saved_errno;
843d2643
LP
470
471 return r;
185986c6 472}
16801e90 473
185986c6
LP
474void log_assert(
475 const char*file,
476 int line,
477 const char *func,
478 const char *format, ...) {
479
addab137 480 static char buffer[LINE_MAX];
185986c6 481 int saved_errno = errno;
843d2643 482 va_list ap;
185986c6
LP
483
484 va_start(ap, format);
485 vsnprintf(buffer, sizeof(buffer), format, ap);
486 va_end(ap);
487
488 char_array_0(buffer);
489 log_abort_msg = buffer;
490
843d2643 491 log_dispatch(LOG_CRIT, file, line, func, buffer);
185986c6 492 abort();
5899f3b7 493
185986c6 494 /* If the user chose to ignore this SIGABRT, we are happy to go on, as if nothing happened. */
c9b97d2a 495 errno = saved_errno;
5899f3b7 496}
34f0e866
LP
497
498int log_set_target_from_string(const char *e) {
499 LogTarget t;
500
501 if ((t = log_target_from_string(e)) < 0)
502 return -EINVAL;
503
504 log_set_target(t);
505 return 0;
506}
507
508int log_set_max_level_from_string(const char *e) {
509 int t;
510
511 if ((t = log_level_from_string(e)) < 0)
512 return -EINVAL;
513
514 log_set_max_level(t);
515 return 0;
516}
517
518void log_parse_environment(void) {
519 const char *e;
520
521 if ((e = getenv("SYSTEMD_LOG_TARGET")))
522 if (log_set_target_from_string(e) < 0)
523 log_warning("Failed to parse log target %s. Ignoring.", e);
524
525 if ((e = getenv("SYSTEMD_LOG_LEVEL")))
526 if (log_set_max_level_from_string(e) < 0)
527 log_warning("Failed to parse log level %s. Ignoring.", e);
bbe63281 528
541d6159 529 if ((e = getenv("SYSTEMD_LOG_COLOR")))
bbe63281
LP
530 if (log_show_color_from_string(e) < 0)
531 log_warning("Failed to parse bool %s. Ignoring.", e);
532
dcdf86bb 533 if ((e = getenv("SYSTEMD_LOG_LOCATION")))
bbe63281
LP
534 if (log_show_location_from_string(e) < 0)
535 log_warning("Failed to parse bool %s. Ignoring.", e);
34f0e866
LP
536}
537
1adf1049
LP
538LogTarget log_get_target(void) {
539 return log_target;
540}
541
542int log_get_max_level(void) {
543 return log_max_level;
544}
545
bbe63281
LP
546void log_show_color(bool b) {
547 show_color = b;
548}
549
550void log_show_location(bool b) {
551 show_location = b;
552}
553
554int log_show_color_from_string(const char *e) {
555 int t;
556
557 if ((t = parse_boolean(e)) < 0)
558 return -EINVAL;
559
560 log_show_color(t);
561 return 0;
562}
563
564int log_show_location_from_string(const char *e) {
565 int t;
566
567 if ((t = parse_boolean(e)) < 0)
568 return -EINVAL;
569
570 log_show_location(t);
571 return 0;
572}
573
34f0e866
LP
574static const char *const log_target_table[] = {
575 [LOG_TARGET_CONSOLE] = "console",
576 [LOG_TARGET_SYSLOG] = "syslog",
577 [LOG_TARGET_KMSG] = "kmsg",
843d2643 578 [LOG_TARGET_SYSLOG_OR_KMSG] = "syslog-or-kmsg",
bb7df0da
LP
579 [LOG_TARGET_NULL] = "null",
580 [LOG_TARGET_AUTO] = "auto"
34f0e866
LP
581};
582
583DEFINE_STRING_TABLE_LOOKUP(log_target, LogTarget);