1 /*-*- Mode: C; c-basic-offset: 8 -*-*/
4 This file is part of systemd.
6 Copyright 2010 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
27 #include <sys/socket.h>
34 #define SYSLOG_TIMEOUT_USEC (5*USEC_PER_SEC)
35 #define LOG_BUFFER_MAX 1024
37 static LogTarget log_target = LOG_TARGET_CONSOLE;
38 static int log_max_level = LOG_DEBUG;
40 static int console_fd = STDERR_FILENO;
41 static int syslog_fd = -1;
42 static int kmsg_fd = -1;
44 /* Akin to glibc's __abort_msg; which is private and we hance cannot
46 static char *log_abort_msg = NULL;
48 void log_close_console(void) {
55 close_nointr_nofail(console_fd);
61 static int log_open_console(void) {
68 if ((console_fd = open_terminal("/dev/console", O_WRONLY|O_NOCTTY|O_CLOEXEC)) < 0) {
69 log_error("Failed to open /dev/console for logging: %s", strerror(-console_fd));
73 log_info("Succesfully opened /dev/console for logging.");
75 console_fd = STDERR_FILENO;
80 void log_close_kmsg(void) {
85 close_nointr_nofail(kmsg_fd);
89 static int log_open_kmsg(void) {
94 if ((kmsg_fd = open("/dev/kmsg", O_WRONLY|O_NOCTTY|O_CLOEXEC)) < 0) {
95 log_info("Failed to open /dev/kmsg for logging: %s", strerror(errno));
99 log_info("Succesfully opened /dev/kmsg for logging.");
104 void log_close_syslog(void) {
109 close_nointr_nofail(syslog_fd);
113 static int log_open_syslog(void) {
116 struct sockaddr_un un;
124 if ((syslog_fd = socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0)) < 0) {
129 /* Make sure we don't block for more than 5s when talking to
131 timeval_store(&tv, SYSLOG_TIMEOUT_USEC);
132 if (setsockopt(syslog_fd, SOL_SOCKET, SO_SNDTIMEO, &tv, sizeof(tv)) < 0) {
138 sa.un.sun_family = AF_UNIX;
139 strncpy(sa.un.sun_path, "/dev/log", sizeof(sa.un.sun_path));
141 if (connect(syslog_fd, &sa.sa, sizeof(sa)) < 0) {
146 log_info("Succesfully opened syslog for logging.");
152 log_info("Failed to open syslog for logging: %s", strerror(-r));
159 /* If we don't use the console we close it here, to not get
160 * killed by SAK. If we don't use syslog we close it here so
161 * that we are not confused by somebody deleting the socket in
162 * the fs. If we don't use /dev/kmsg we still keep it open,
163 * because there is no reason to close it. */
165 if (log_target == LOG_TARGET_SYSLOG_OR_KMSG ||
166 log_target == LOG_TARGET_SYSLOG)
167 if ((r = log_open_syslog()) >= 0) {
172 if (log_target == LOG_TARGET_SYSLOG_OR_KMSG ||
173 log_target == LOG_TARGET_KMSG)
174 if ((r = log_open_kmsg()) >= 0) {
181 return log_open_console();
184 void log_set_target(LogTarget target) {
186 assert(target < _LOG_TARGET_MAX);
191 void log_set_max_level(int level) {
192 assert((level & LOG_PRIMASK) == level);
194 log_max_level = level;
197 static int write_to_console(
202 const char *buffer) {
205 struct iovec iovec[5];
212 snprintf(location, sizeof(location), "(%s:%u) ", file, line);
213 char_array_0(location);
215 highlight = LOG_PRI(level) <= LOG_ERR;
218 IOVEC_SET_STRING(iovec[n++], location);
220 IOVEC_SET_STRING(iovec[n++], "\x1B[1;31m");
221 IOVEC_SET_STRING(iovec[n++], buffer);
223 IOVEC_SET_STRING(iovec[n++], "\x1B[0m");
224 IOVEC_SET_STRING(iovec[n++], "\n");
226 if (writev(console_fd, iovec, n) < 0)
232 static int write_to_syslog(
237 const char *buffer) {
239 char header_priority[16], header_time[64], header_pid[16];
240 struct iovec iovec[5];
241 struct msghdr msghdr;
248 snprintf(header_priority, sizeof(header_priority), "<%i>", LOG_MAKEPRI(LOG_DAEMON, LOG_PRI(level)));
249 char_array_0(header_priority);
251 t = (time_t) (now(CLOCK_REALTIME) / USEC_PER_SEC);
252 if (!(tm = localtime(&t)))
255 if (strftime(header_time, sizeof(header_time), "%h %e %T ", tm) <= 0)
258 snprintf(header_pid, sizeof(header_pid), "[%llu]: ", (unsigned long long) getpid());
259 char_array_0(header_pid);
262 IOVEC_SET_STRING(iovec[0], header_priority);
263 IOVEC_SET_STRING(iovec[1], header_time);
264 IOVEC_SET_STRING(iovec[2], __progname);
265 IOVEC_SET_STRING(iovec[3], header_pid);
266 IOVEC_SET_STRING(iovec[4], buffer);
269 msghdr.msg_iov = iovec;
270 msghdr.msg_iovlen = ELEMENTSOF(iovec);
272 if (sendmsg(syslog_fd, &msghdr, 0) < 0)
278 static int write_to_kmsg(
283 const char *buffer) {
285 char header_priority[16], header_pid[16];
286 struct iovec iovec[5];
291 snprintf(header_priority, sizeof(header_priority), "<%i>", LOG_PRI(level));
292 char_array_0(header_priority);
294 snprintf(header_pid, sizeof(header_pid), "[%llu]: ", (unsigned long long) getpid());
295 char_array_0(header_pid);
298 IOVEC_SET_STRING(iovec[0], header_priority);
299 IOVEC_SET_STRING(iovec[1], __progname);
300 IOVEC_SET_STRING(iovec[2], header_pid);
301 IOVEC_SET_STRING(iovec[3], buffer);
302 IOVEC_SET_STRING(iovec[4], "\n");
304 if (writev(kmsg_fd, iovec, ELEMENTSOF(iovec)) < 0)
310 static int log_dispatch(
323 buffer += strspn(buffer, NEWLINE);
328 if ((e = strpbrk(buffer, NEWLINE)))
331 if (log_target == LOG_TARGET_SYSLOG_OR_KMSG ||
332 log_target == LOG_TARGET_SYSLOG) {
334 if ((r = write_to_syslog(level, file, line, func, buffer)) < 0) {
341 if (log_target == LOG_TARGET_SYSLOG_OR_KMSG ||
342 log_target == LOG_TARGET_KMSG) {
344 if ((r = write_to_kmsg(level, file, line, func, buffer)) < 0) {
351 if ((k = write_to_console(level, file, line, func, buffer)) < 0)
360 int log_dump_internal(
369 /* This modifies the buffer... */
371 if (_likely_(LOG_PRI(level) > log_max_level))
375 r = log_dispatch(level, file, line, func, buffer);
386 const char *format, ...) {
388 char buffer[LOG_BUFFER_MAX];
392 if (_likely_(LOG_PRI(level) > log_max_level))
397 va_start(ap, format);
398 vsnprintf(buffer, sizeof(buffer), format, ap);
401 char_array_0(buffer);
403 r = log_dispatch(level, file, line, func, buffer);
413 const char *format, ...) {
415 static char buffer[LOG_BUFFER_MAX];
416 int saved_errno = errno;
419 va_start(ap, format);
420 vsnprintf(buffer, sizeof(buffer), format, ap);
423 char_array_0(buffer);
424 log_abort_msg = buffer;
426 log_dispatch(LOG_CRIT, file, line, func, buffer);
429 /* If the user chose to ignore this SIGABRT, we are happy to go on, as if nothing happened. */
433 int log_set_target_from_string(const char *e) {
436 if ((t = log_target_from_string(e)) < 0)
443 int log_set_max_level_from_string(const char *e) {
446 if ((t = log_level_from_string(e)) < 0)
449 log_set_max_level(t);
453 void log_parse_environment(void) {
456 if ((e = getenv("SYSTEMD_LOG_TARGET")))
457 if (log_set_target_from_string(e) < 0)
458 log_warning("Failed to parse log target %s. Ignoring.", e);
460 if ((e = getenv("SYSTEMD_LOG_LEVEL")))
461 if (log_set_max_level_from_string(e) < 0)
462 log_warning("Failed to parse log level %s. Ignoring.", e);
465 LogTarget log_get_target(void) {
469 int log_get_max_level(void) {
470 return log_max_level;
473 static const char *const log_target_table[] = {
474 [LOG_TARGET_CONSOLE] = "console",
475 [LOG_TARGET_SYSLOG] = "syslog",
476 [LOG_TARGET_KMSG] = "kmsg",
477 [LOG_TARGET_SYSLOG_OR_KMSG] = "syslog-or-kmsg",
480 DEFINE_STRING_TABLE_LOOKUP(log_target, LogTarget);