1 /*-*- Mode: C; c-basic-offset: 8 -*-*/
4 This file is part of systemd.
6 Copyright 2010 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
27 #include <sys/socket.h>
34 #define SYSLOG_TIMEOUT_USEC (5*USEC_PER_SEC)
35 #define LOG_BUFFER_MAX 1024
37 static LogTarget log_target = LOG_TARGET_CONSOLE;
38 static int log_max_level = LOG_DEBUG;
40 static int console_fd = STDERR_FILENO;
41 static int syslog_fd = -1;
42 static int kmsg_fd = -1;
44 /* Akin to glibc's __abort_msg; which is private and we hance cannot
46 static char *log_abort_msg = NULL;
48 void log_close_console(void) {
55 close_nointr_nofail(console_fd);
61 static int log_open_console(void) {
68 if ((console_fd = open_terminal("/dev/console", O_WRONLY|O_NOCTTY|O_CLOEXEC)) < 0) {
69 log_error("Failed to open /dev/console for logging: %s", strerror(-console_fd));
73 log_info("Succesfully opened /dev/console for logging.");
75 console_fd = STDERR_FILENO;
80 void log_close_kmsg(void) {
85 close_nointr_nofail(kmsg_fd);
89 static int log_open_kmsg(void) {
94 if ((kmsg_fd = open("/dev/kmsg", O_WRONLY|O_NOCTTY|O_CLOEXEC)) < 0) {
95 log_info("Failed to open /dev/kmsg for logging: %s", strerror(errno));
99 log_info("Succesfully opened /dev/kmsg for logging.");
104 void log_close_syslog(void) {
109 close_nointr_nofail(syslog_fd);
113 static int log_open_syslog(void) {
116 struct sockaddr_un un;
124 if ((syslog_fd = socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0)) < 0) {
129 /* Make sure we don't block for more than 5s when talking to
131 timeval_store(&tv, SYSLOG_TIMEOUT_USEC);
132 if (setsockopt(syslog_fd, SOL_SOCKET, SO_SNDTIMEO, &tv, sizeof(tv)) < 0) {
138 sa.un.sun_family = AF_UNIX;
139 strncpy(sa.un.sun_path, "/dev/log", sizeof(sa.un.sun_path));
141 if (connect(syslog_fd, &sa.sa, sizeof(sa)) < 0) {
146 log_info("Succesfully opened syslog for logging.");
152 log_info("Failed to open syslog for logging: %s", strerror(-r));
159 /* If we don't use the console we close it here, to not get
160 * killed by SAK. If we don't use syslog we close it here so
161 * that we are not confused by somebody deleting the socket in
162 * the fs. If we don't use /dev/kmsg we still keep it open,
163 * because there is no reason to close it. */
165 if (log_target == LOG_TARGET_SYSLOG_OR_KMSG ||
166 log_target == LOG_TARGET_SYSLOG)
167 if ((r = log_open_syslog()) >= 0) {
172 if (log_target == LOG_TARGET_SYSLOG_OR_KMSG ||
173 log_target == LOG_TARGET_KMSG)
174 if ((r = log_open_kmsg()) >= 0) {
181 return log_open_console();
184 void log_set_target(LogTarget target) {
186 assert(target < _LOG_TARGET_MAX);
191 void log_set_max_level(int level) {
192 assert((level & LOG_PRIMASK) == level);
194 log_max_level = level;
197 static int write_to_console(
202 const char *buffer) {
205 struct iovec iovec[5];
212 snprintf(location, sizeof(location), "(%s:%u) ", file, line);
213 char_array_0(location);
215 highlight = LOG_PRI(level) <= LOG_ERR;
218 IOVEC_SET_STRING(iovec[n++], location);
220 IOVEC_SET_STRING(iovec[n++], "\x1B[1;31m");
221 IOVEC_SET_STRING(iovec[n++], buffer);
223 IOVEC_SET_STRING(iovec[n++], "\x1B[0m");
224 IOVEC_SET_STRING(iovec[n++], "\n");
226 if (writev(console_fd, iovec, n) < 0)
232 static int write_to_syslog(
237 const char *buffer) {
239 char header_priority[16], header_time[64], header_pid[16];
240 struct iovec iovec[5];
241 struct msghdr msghdr;
248 snprintf(header_priority, sizeof(header_priority), "<%i>", LOG_MAKEPRI(LOG_DAEMON, LOG_PRI(level)));
249 char_array_0(header_priority);
251 t = (time_t) (now(CLOCK_REALTIME) / USEC_PER_SEC);
252 if (!(tm = localtime(&t)))
255 if (strftime(header_time, sizeof(header_time), "%h %e %T ", tm) <= 0)
258 snprintf(header_pid, sizeof(header_pid), "[%llu]: ", (unsigned long long) getpid());
259 char_array_0(header_pid);
262 IOVEC_SET_STRING(iovec[0], header_priority);
263 IOVEC_SET_STRING(iovec[1], header_time);
264 IOVEC_SET_STRING(iovec[2], __progname);
265 IOVEC_SET_STRING(iovec[3], header_pid);
266 IOVEC_SET_STRING(iovec[4], buffer);
269 msghdr.msg_iov = iovec;
270 msghdr.msg_iovlen = ELEMENTSOF(iovec);
272 if (sendmsg(syslog_fd, &msghdr, 0) < 0)
278 static int write_to_kmsg(
283 const char *buffer) {
285 char header_priority[16], header_pid[16];
286 struct iovec iovec[5];
291 snprintf(header_priority, sizeof(header_priority), "<%i>", LOG_PRI(level));
292 char_array_0(header_priority);
294 snprintf(header_pid, sizeof(header_pid), "[%llu]: ", (unsigned long long) getpid());
295 char_array_0(header_pid);
298 IOVEC_SET_STRING(iovec[0], header_priority);
299 IOVEC_SET_STRING(iovec[1], __progname);
300 IOVEC_SET_STRING(iovec[2], header_pid);
301 IOVEC_SET_STRING(iovec[3], buffer);
302 IOVEC_SET_STRING(iovec[4], "\n");
304 if (writev(kmsg_fd, iovec, ELEMENTSOF(iovec)) < 0)
310 static int log_dispatch(
315 const char *buffer) {
319 if (log_target == LOG_TARGET_SYSLOG_OR_KMSG ||
320 log_target == LOG_TARGET_SYSLOG) {
322 if ((r = write_to_syslog(level, file, line, func, buffer)) < 0) {
329 if (log_target == LOG_TARGET_SYSLOG_OR_KMSG ||
330 log_target == LOG_TARGET_KMSG) {
332 if ((r = write_to_kmsg(level, file, line, func, buffer)) < 0) {
339 return write_to_console(level, file, line, func, buffer);
347 const char *format, ...) {
349 char buffer[LOG_BUFFER_MAX];
353 if (_likely(LOG_PRI(level) > log_max_level))
358 va_start(ap, format);
359 vsnprintf(buffer, sizeof(buffer), format, ap);
362 char_array_0(buffer);
364 r = log_dispatch(level, file, line, func, buffer);
374 const char *format, ...) {
376 static char buffer[LOG_BUFFER_MAX];
377 int saved_errno = errno;
380 va_start(ap, format);
381 vsnprintf(buffer, sizeof(buffer), format, ap);
384 char_array_0(buffer);
385 log_abort_msg = buffer;
387 log_dispatch(LOG_CRIT, file, line, func, buffer);
390 /* If the user chose to ignore this SIGABRT, we are happy to go on, as if nothing happened. */
394 int log_set_target_from_string(const char *e) {
397 if ((t = log_target_from_string(e)) < 0)
404 int log_set_max_level_from_string(const char *e) {
407 if ((t = log_level_from_string(e)) < 0)
410 log_set_max_level(t);
414 void log_parse_environment(void) {
417 if ((e = getenv("SYSTEMD_LOG_TARGET")))
418 if (log_set_target_from_string(e) < 0)
419 log_warning("Failed to parse log target %s. Ignoring.", e);
421 if ((e = getenv("SYSTEMD_LOG_LEVEL")))
422 if (log_set_max_level_from_string(e) < 0)
423 log_warning("Failed to parse log level %s. Ignoring.", e);
426 LogTarget log_get_target(void) {
430 int log_get_max_level(void) {
431 return log_max_level;
434 static const char *const log_target_table[] = {
435 [LOG_TARGET_CONSOLE] = "console",
436 [LOG_TARGET_SYSLOG] = "syslog",
437 [LOG_TARGET_KMSG] = "kmsg",
438 [LOG_TARGET_SYSLOG_OR_KMSG] = "syslog-or-kmsg",
441 DEFINE_STRING_TABLE_LOOKUP(log_target, LogTarget);