passt: Relicense to GPL 2.0, or any later version
In practical terms, passt doesn't benefit from the additional
protection offered by the AGPL over the GPL, because it's not
suitable to be executed over a computer network.
Further, restricting the distribution under the version 3 of the GPL
wouldn't provide any practical advantage either, as long as the passt
codebase is concerned, and might cause unnecessary compatibility
dilemmas.
Change licensing terms to the GNU General Public License Version 2,
or any later version, with written permission from all current and
past contributors, namely: myself, David Gibson, Laine Stump, Andrea
Bolognani, Paul Holzinger, Richard W.M. Jones, Chris Kuhn, Florian
Weimer, Giuseppe Scrivano, Stefan Hajnoczi, and Vasiliy Ulyanov.
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
2023-04-05 18:11:44 +00:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-or-later
|
2022-09-24 07:53:15 +00:00
|
|
|
|
|
|
|
/* PASST - Plug A Simple Socket Transport
|
|
|
|
* for qemu/UNIX domain socket mode
|
|
|
|
*
|
|
|
|
* PASTA - Pack A Subtle Tap Abstraction
|
|
|
|
* for network namespace/tap device mode
|
|
|
|
*
|
|
|
|
* log.c - Logging functions
|
|
|
|
*
|
|
|
|
* Copyright (c) 2020-2022 Red Hat GmbH
|
|
|
|
* Author: Stefano Brivio <sbrivio@redhat.com>
|
|
|
|
*/
|
|
|
|
|
2022-10-06 12:51:04 +00:00
|
|
|
#include <arpa/inet.h>
|
|
|
|
#include <limits.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <fcntl.h>
|
2022-09-24 07:53:15 +00:00
|
|
|
#include <stdio.h>
|
2022-10-06 12:51:04 +00:00
|
|
|
#include <stdint.h>
|
2022-09-24 07:53:15 +00:00
|
|
|
#include <stdlib.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <time.h>
|
|
|
|
#include <syslog.h>
|
|
|
|
#include <stdarg.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
|
|
|
|
#include "log.h"
|
2022-10-06 12:51:04 +00:00
|
|
|
#include "util.h"
|
|
|
|
#include "passt.h"
|
2022-09-24 07:53:15 +00:00
|
|
|
|
2022-10-06 12:51:04 +00:00
|
|
|
static int log_sock = -1; /* Optional socket to system logger */
|
|
|
|
static char log_ident[BUFSIZ]; /* Identifier string for openlog() */
|
2024-06-14 17:00:27 +00:00
|
|
|
static int log_mask; /* Current log priority mask */
|
2022-10-06 12:51:04 +00:00
|
|
|
|
|
|
|
static int log_file = -1; /* Optional log file descriptor */
|
|
|
|
static size_t log_size; /* Maximum log file size in bytes */
|
|
|
|
static size_t log_written; /* Currently used bytes in log file */
|
|
|
|
static size_t log_cut_size; /* Bytes to cut at start on rotation */
|
|
|
|
static char log_header[BUFSIZ]; /* File header, written back on cuts */
|
|
|
|
|
|
|
|
static time_t log_start; /* Start timestamp */
|
2024-06-14 17:00:27 +00:00
|
|
|
|
2022-10-06 12:51:04 +00:00
|
|
|
int log_trace; /* --trace mode enabled */
|
2024-06-14 17:00:27 +00:00
|
|
|
bool log_conf_parsed; /* Logging options already parsed */
|
log, passt: Always print to stderr before initialisation is complete
After commit 15001b39ef1d ("conf: set the log level much earlier"), we
had a phase during initialisation when messages wouldn't be printed to
standard error anymore.
Commit f67238aa864d ("passt, log: Call __openlog() earlier, log to
stderr until we detach") fixed that, but only for the case where no
log files are given.
If a log file is configured, vlogmsg() will not call passt_vsyslog(),
but during initialisation, LOG_PERROR is set, so to avoid duplicated
prints (which would result from passt_vsyslog() printing to stderr),
we don't call fprintf() from vlogmsg() either.
This is getting a bit too complicated. Instead of abusing LOG_PERROR,
define an internal logging flag that clearly represents that we're not
done with the initialisation phase yet.
If this flag is not set, make sure we always print to stderr, if the
log mask matches.
Reported-by: Yalan Zhang <yalzhang@redhat.com>
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
2024-06-14 20:47:51 +00:00
|
|
|
bool log_runtime; /* Daemonised, or ready in foreground */
|
2022-09-24 07:53:15 +00:00
|
|
|
|
2023-10-13 04:50:30 +00:00
|
|
|
void vlogmsg(int pri, const char *format, va_list ap)
|
2023-10-13 04:50:28 +00:00
|
|
|
{
|
log: setlogmask(0) can actually result in a system call, don't use it
Before commit 32d07f5e59f2 ("passt, pasta: Completely avoid dynamic
memory allocation"), we didn't store the current log mask in a
variable, and we fetched it using setlogmask(0) wherever needed.
But after that commit, we can use our log_mask copy instead. And we
should: with recent glibc versions, setlogmask(0) actually results in
a system call, which causes a substantial overhead with high transfer
rates: we use setlogmask(0) even to decide we don't want to print
debug messages.
Now that we rely on log_mask in early stages, before setlogmask() is
called, we need to initialise that variable to the special LOG_EMERG
mask value right away: define LOG_EARLY to make this clearer, and,
while at it, group conditions in vlogmsg() into something more terse.
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
2024-02-01 23:22:16 +00:00
|
|
|
bool debug_print = (log_mask & LOG_MASK(LOG_DEBUG)) && log_file == -1;
|
2023-10-13 04:50:28 +00:00
|
|
|
struct timespec tp;
|
|
|
|
|
log: setlogmask(0) can actually result in a system call, don't use it
Before commit 32d07f5e59f2 ("passt, pasta: Completely avoid dynamic
memory allocation"), we didn't store the current log mask in a
variable, and we fetched it using setlogmask(0) wherever needed.
But after that commit, we can use our log_mask copy instead. And we
should: with recent glibc versions, setlogmask(0) actually results in
a system call, which causes a substantial overhead with high transfer
rates: we use setlogmask(0) even to decide we don't want to print
debug messages.
Now that we rely on log_mask in early stages, before setlogmask() is
called, we need to initialise that variable to the special LOG_EMERG
mask value right away: define LOG_EARLY to make this clearer, and,
while at it, group conditions in vlogmsg() into something more terse.
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
2024-02-01 23:22:16 +00:00
|
|
|
if (debug_print) {
|
2023-10-13 04:50:28 +00:00
|
|
|
clock_gettime(CLOCK_REALTIME, &tp);
|
2024-06-05 00:42:42 +00:00
|
|
|
fprintf(stderr, "%lli.%04lli: ",
|
2023-10-13 04:50:28 +00:00
|
|
|
(long long int)tp.tv_sec - log_start,
|
|
|
|
(long long int)tp.tv_nsec / (100L * 1000));
|
|
|
|
}
|
|
|
|
|
2024-06-14 17:00:27 +00:00
|
|
|
if ((log_mask & LOG_MASK(LOG_PRI(pri))) || !log_conf_parsed) {
|
2023-10-13 04:50:30 +00:00
|
|
|
va_list ap2;
|
|
|
|
|
|
|
|
va_copy(ap2, ap); /* Don't clobber ap, we need it again */
|
2023-10-13 04:50:28 +00:00
|
|
|
if (log_file != -1)
|
2023-10-13 04:50:30 +00:00
|
|
|
logfile_write(pri, format, ap2);
|
log: setlogmask(0) can actually result in a system call, don't use it
Before commit 32d07f5e59f2 ("passt, pasta: Completely avoid dynamic
memory allocation"), we didn't store the current log mask in a
variable, and we fetched it using setlogmask(0) wherever needed.
But after that commit, we can use our log_mask copy instead. And we
should: with recent glibc versions, setlogmask(0) actually results in
a system call, which causes a substantial overhead with high transfer
rates: we use setlogmask(0) even to decide we don't want to print
debug messages.
Now that we rely on log_mask in early stages, before setlogmask() is
called, we need to initialise that variable to the special LOG_EMERG
mask value right away: define LOG_EARLY to make this clearer, and,
while at it, group conditions in vlogmsg() into something more terse.
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
2024-02-01 23:22:16 +00:00
|
|
|
else if (!(log_mask & LOG_MASK(LOG_DEBUG)))
|
2023-10-13 04:50:30 +00:00
|
|
|
passt_vsyslog(pri, format, ap2);
|
2023-11-07 11:17:07 +00:00
|
|
|
|
|
|
|
va_end(ap2);
|
2023-10-13 04:50:28 +00:00
|
|
|
}
|
|
|
|
|
log, passt: Always print to stderr before initialisation is complete
After commit 15001b39ef1d ("conf: set the log level much earlier"), we
had a phase during initialisation when messages wouldn't be printed to
standard error anymore.
Commit f67238aa864d ("passt, log: Call __openlog() earlier, log to
stderr until we detach") fixed that, but only for the case where no
log files are given.
If a log file is configured, vlogmsg() will not call passt_vsyslog(),
but during initialisation, LOG_PERROR is set, so to avoid duplicated
prints (which would result from passt_vsyslog() printing to stderr),
we don't call fprintf() from vlogmsg() either.
This is getting a bit too complicated. Instead of abusing LOG_PERROR,
define an internal logging flag that clearly represents that we're not
done with the initialisation phase yet.
If this flag is not set, make sure we always print to stderr, if the
log mask matches.
Reported-by: Yalan Zhang <yalzhang@redhat.com>
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
2024-06-14 20:47:51 +00:00
|
|
|
if (debug_print || !log_conf_parsed ||
|
|
|
|
(!log_runtime && (log_mask & LOG_MASK(LOG_PRI(pri))))) {
|
2024-06-05 00:42:42 +00:00
|
|
|
(void)vfprintf(stderr, format, ap);
|
2023-10-13 04:50:28 +00:00
|
|
|
if (format[strlen(format)] != '\n')
|
2024-06-05 00:42:42 +00:00
|
|
|
fprintf(stderr, "\n");
|
2023-10-13 04:50:28 +00:00
|
|
|
}
|
2022-09-24 07:53:15 +00:00
|
|
|
}
|
|
|
|
|
2024-06-14 22:25:23 +00:00
|
|
|
/**
|
|
|
|
* logmsg() - vlogmsg() wrapper for variable argument lists
|
|
|
|
* @pri: Facility and level map, same as priority for vsyslog()
|
|
|
|
* @format: Message
|
|
|
|
*/
|
2023-10-13 04:50:30 +00:00
|
|
|
void logmsg(int pri, const char *format, ...)
|
|
|
|
{
|
|
|
|
va_list ap;
|
|
|
|
|
|
|
|
va_start(ap, format);
|
|
|
|
vlogmsg(pri, format, ap);
|
|
|
|
va_end(ap);
|
|
|
|
}
|
|
|
|
|
2024-06-14 22:25:23 +00:00
|
|
|
/**
|
|
|
|
* logmsg_perror() - vlogmsg() wrapper with perror()-like functionality
|
|
|
|
* @pri: Facility and level map, same as priority for vsyslog()
|
|
|
|
* @format: Message
|
|
|
|
*/
|
|
|
|
void logmsg_perror(int pri, const char *format, ...)
|
|
|
|
{
|
|
|
|
int errno_copy = errno;
|
|
|
|
va_list ap;
|
|
|
|
|
|
|
|
va_start(ap, format);
|
|
|
|
vlogmsg(pri, format, ap);
|
|
|
|
va_end(ap);
|
|
|
|
|
|
|
|
logmsg(pri, ": %s", strerror(errno_copy));
|
|
|
|
}
|
|
|
|
|
2022-10-06 12:51:04 +00:00
|
|
|
/* Prefixes for log file messages, indexed by priority */
|
|
|
|
const char *logfile_prefix[] = {
|
|
|
|
NULL, NULL, NULL, /* Unused: LOG_EMERG, LOG_ALERT, LOG_CRIT */
|
|
|
|
"ERROR: ",
|
|
|
|
"WARNING: ",
|
|
|
|
NULL, /* Unused: LOG_NOTICE */
|
|
|
|
"info: ",
|
|
|
|
" ", /* LOG_DEBUG */
|
|
|
|
};
|
|
|
|
|
2022-10-06 12:59:26 +00:00
|
|
|
/**
|
|
|
|
* trace_init() - Set log_trace depending on trace (debug) mode
|
|
|
|
* @enable: Tracing debug mode enabled if non-zero
|
|
|
|
*/
|
2022-09-24 07:53:15 +00:00
|
|
|
void trace_init(int enable)
|
|
|
|
{
|
|
|
|
log_trace = enable;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2023-02-23 17:32:20 +00:00
|
|
|
* __openlog() - Non-optional openlog() implementation, for custom vsyslog()
|
2022-09-24 07:53:15 +00:00
|
|
|
* @ident: openlog() identity (program name)
|
log, passt: Always print to stderr before initialisation is complete
After commit 15001b39ef1d ("conf: set the log level much earlier"), we
had a phase during initialisation when messages wouldn't be printed to
standard error anymore.
Commit f67238aa864d ("passt, log: Call __openlog() earlier, log to
stderr until we detach") fixed that, but only for the case where no
log files are given.
If a log file is configured, vlogmsg() will not call passt_vsyslog(),
but during initialisation, LOG_PERROR is set, so to avoid duplicated
prints (which would result from passt_vsyslog() printing to stderr),
we don't call fprintf() from vlogmsg() either.
This is getting a bit too complicated. Instead of abusing LOG_PERROR,
define an internal logging flag that clearly represents that we're not
done with the initialisation phase yet.
If this flag is not set, make sure we always print to stderr, if the
log mask matches.
Reported-by: Yalan Zhang <yalzhang@redhat.com>
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
2024-06-14 20:47:51 +00:00
|
|
|
* @option: openlog() options, unused
|
2022-09-24 07:53:15 +00:00
|
|
|
* @facility: openlog() facility (LOG_DAEMON)
|
|
|
|
*/
|
|
|
|
void __openlog(const char *ident, int option, int facility)
|
|
|
|
{
|
|
|
|
struct timespec tp;
|
|
|
|
|
log, passt: Always print to stderr before initialisation is complete
After commit 15001b39ef1d ("conf: set the log level much earlier"), we
had a phase during initialisation when messages wouldn't be printed to
standard error anymore.
Commit f67238aa864d ("passt, log: Call __openlog() earlier, log to
stderr until we detach") fixed that, but only for the case where no
log files are given.
If a log file is configured, vlogmsg() will not call passt_vsyslog(),
but during initialisation, LOG_PERROR is set, so to avoid duplicated
prints (which would result from passt_vsyslog() printing to stderr),
we don't call fprintf() from vlogmsg() either.
This is getting a bit too complicated. Instead of abusing LOG_PERROR,
define an internal logging flag that clearly represents that we're not
done with the initialisation phase yet.
If this flag is not set, make sure we always print to stderr, if the
log mask matches.
Reported-by: Yalan Zhang <yalzhang@redhat.com>
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
2024-06-14 20:47:51 +00:00
|
|
|
(void)option;
|
|
|
|
|
2022-09-24 07:53:15 +00:00
|
|
|
clock_gettime(CLOCK_REALTIME, &tp);
|
2022-10-06 12:51:04 +00:00
|
|
|
log_start = tp.tv_sec;
|
2022-09-24 07:53:15 +00:00
|
|
|
|
|
|
|
if (log_sock < 0) {
|
|
|
|
struct sockaddr_un a = { .sun_family = AF_UNIX, };
|
|
|
|
|
|
|
|
log_sock = socket(AF_UNIX, SOCK_DGRAM | SOCK_CLOEXEC, 0);
|
|
|
|
if (log_sock < 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
strncpy(a.sun_path, _PATH_LOG, sizeof(a.sun_path));
|
|
|
|
if (connect(log_sock, (const struct sockaddr *)&a, sizeof(a))) {
|
|
|
|
close(log_sock);
|
|
|
|
log_sock = -1;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
log_mask |= facility;
|
|
|
|
strncpy(log_ident, ident, sizeof(log_ident) - 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* __setlogmask() - setlogmask() wrapper, to allow custom vsyslog()
|
|
|
|
* @mask: Same as setlogmask() mask
|
|
|
|
*/
|
|
|
|
void __setlogmask(int mask)
|
|
|
|
{
|
|
|
|
log_mask = mask;
|
|
|
|
setlogmask(mask);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* passt_vsyslog() - vsyslog() implementation not using heap memory
|
|
|
|
* @pri: Facility and level map, same as priority for vsyslog()
|
|
|
|
* @format: Same as vsyslog() format
|
|
|
|
* @ap: Same as vsyslog() ap
|
|
|
|
*/
|
|
|
|
void passt_vsyslog(int pri, const char *format, va_list ap)
|
|
|
|
{
|
|
|
|
char buf[BUFSIZ];
|
log, passt: Always print to stderr before initialisation is complete
After commit 15001b39ef1d ("conf: set the log level much earlier"), we
had a phase during initialisation when messages wouldn't be printed to
standard error anymore.
Commit f67238aa864d ("passt, log: Call __openlog() earlier, log to
stderr until we detach") fixed that, but only for the case where no
log files are given.
If a log file is configured, vlogmsg() will not call passt_vsyslog(),
but during initialisation, LOG_PERROR is set, so to avoid duplicated
prints (which would result from passt_vsyslog() printing to stderr),
we don't call fprintf() from vlogmsg() either.
This is getting a bit too complicated. Instead of abusing LOG_PERROR,
define an internal logging flag that clearly represents that we're not
done with the initialisation phase yet.
If this flag is not set, make sure we always print to stderr, if the
log mask matches.
Reported-by: Yalan Zhang <yalzhang@redhat.com>
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
2024-06-14 20:47:51 +00:00
|
|
|
int n;
|
2022-09-24 07:53:15 +00:00
|
|
|
|
2023-02-23 17:32:20 +00:00
|
|
|
/* Send without timestamp, the system logger should add it */
|
log, passt: Always print to stderr before initialisation is complete
After commit 15001b39ef1d ("conf: set the log level much earlier"), we
had a phase during initialisation when messages wouldn't be printed to
standard error anymore.
Commit f67238aa864d ("passt, log: Call __openlog() earlier, log to
stderr until we detach") fixed that, but only for the case where no
log files are given.
If a log file is configured, vlogmsg() will not call passt_vsyslog(),
but during initialisation, LOG_PERROR is set, so to avoid duplicated
prints (which would result from passt_vsyslog() printing to stderr),
we don't call fprintf() from vlogmsg() either.
This is getting a bit too complicated. Instead of abusing LOG_PERROR,
define an internal logging flag that clearly represents that we're not
done with the initialisation phase yet.
If this flag is not set, make sure we always print to stderr, if the
log mask matches.
Reported-by: Yalan Zhang <yalzhang@redhat.com>
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
2024-06-14 20:47:51 +00:00
|
|
|
n = snprintf(buf, BUFSIZ, "<%i> %s: ", pri, log_ident);
|
2022-09-24 07:53:15 +00:00
|
|
|
|
|
|
|
n += vsnprintf(buf + n, BUFSIZ - n, format, ap);
|
|
|
|
|
|
|
|
if (format[strlen(format)] != '\n')
|
|
|
|
n += snprintf(buf + n, BUFSIZ - n, "\n");
|
|
|
|
|
2024-06-20 14:59:29 +00:00
|
|
|
if (log_sock >= 0 && send(log_sock, buf, n, 0) != n && !log_runtime)
|
2022-09-24 07:53:15 +00:00
|
|
|
fprintf(stderr, "Failed to send %i bytes to syslog\n", n);
|
|
|
|
}
|
2022-10-06 12:51:04 +00:00
|
|
|
|
|
|
|
/**
|
2022-10-10 08:35:47 +00:00
|
|
|
* logfile_init() - Open log file and write header with PID, version, path
|
2022-10-06 12:51:04 +00:00
|
|
|
* @name: Identifier for header: passt or pasta
|
|
|
|
* @path: Path to log file
|
|
|
|
* @size: Maximum size of log file: log_cut_size is calculatd here
|
|
|
|
*/
|
|
|
|
void logfile_init(const char *name, const char *path, size_t size)
|
|
|
|
{
|
|
|
|
char nl = '\n', exe[PATH_MAX] = { 0 };
|
|
|
|
int n;
|
|
|
|
|
2024-06-14 22:37:11 +00:00
|
|
|
if (readlink("/proc/self/exe", exe, PATH_MAX - 1) < 0)
|
|
|
|
die_perror("Failed to read own /proc/self/exe link");
|
2022-10-06 12:51:04 +00:00
|
|
|
|
|
|
|
log_file = open(path, O_CREAT | O_TRUNC | O_APPEND | O_RDWR | O_CLOEXEC,
|
|
|
|
S_IRUSR | S_IWUSR);
|
2023-02-15 08:24:37 +00:00
|
|
|
if (log_file == -1)
|
2024-06-17 09:55:04 +00:00
|
|
|
die_perror("Couldn't open log file %s", path);
|
2022-10-06 12:51:04 +00:00
|
|
|
|
|
|
|
log_size = size ? size : LOGFILE_SIZE_DEFAULT;
|
|
|
|
|
2022-10-10 08:35:47 +00:00
|
|
|
n = snprintf(log_header, sizeof(log_header), "%s " VERSION ": %s (%i)",
|
2022-10-06 12:51:04 +00:00
|
|
|
name, exe, getpid());
|
|
|
|
|
|
|
|
if (write(log_file, log_header, n) <= 0 ||
|
2024-06-14 22:37:11 +00:00
|
|
|
write(log_file, &nl, 1) <= 0)
|
|
|
|
die_perror("Couldn't write to log file");
|
2022-10-06 12:51:04 +00:00
|
|
|
|
|
|
|
/* For FALLOC_FL_COLLAPSE_RANGE: VFS block size can be up to one page */
|
|
|
|
log_cut_size = ROUND_UP(log_size * LOGFILE_CUT_RATIO / 100, PAGE_SIZE);
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef FALLOC_FL_COLLAPSE_RANGE
|
|
|
|
/**
|
|
|
|
* logfile_rotate_fallocate() - Write header, set log_written after fallocate()
|
|
|
|
* @fd: Log file descriptor
|
2024-01-16 00:50:32 +00:00
|
|
|
* @now: Current timestamp
|
2022-10-06 12:51:04 +00:00
|
|
|
*
|
2024-04-11 15:34:04 +00:00
|
|
|
* #syscalls lseek ppc64le:_llseek ppc64:_llseek arm:_llseek
|
2022-10-06 12:51:04 +00:00
|
|
|
*/
|
2024-01-16 00:50:32 +00:00
|
|
|
static void logfile_rotate_fallocate(int fd, const struct timespec *now)
|
2022-10-06 12:51:04 +00:00
|
|
|
{
|
2024-01-15 06:39:43 +00:00
|
|
|
char buf[BUFSIZ];
|
|
|
|
const char *nl;
|
2022-10-06 12:51:04 +00:00
|
|
|
int n;
|
|
|
|
|
|
|
|
if (lseek(fd, 0, SEEK_SET) == -1)
|
|
|
|
return;
|
|
|
|
if (read(fd, buf, BUFSIZ) == -1)
|
|
|
|
return;
|
|
|
|
|
|
|
|
n = snprintf(buf, BUFSIZ,
|
2023-03-10 22:15:35 +00:00
|
|
|
"%s - log truncated at %lli.%04lli", log_header,
|
2024-01-16 00:50:32 +00:00
|
|
|
(long long int)(now->tv_sec - log_start),
|
|
|
|
(long long int)(now->tv_nsec / (100L * 1000)));
|
2022-10-06 12:51:04 +00:00
|
|
|
|
|
|
|
/* Avoid partial lines by padding the header with spaces */
|
|
|
|
nl = memchr(buf + n + 1, '\n', BUFSIZ - n - 1);
|
|
|
|
if (nl)
|
|
|
|
memset(buf + n, ' ', nl - (buf + n));
|
|
|
|
|
|
|
|
if (lseek(fd, 0, SEEK_SET) == -1)
|
|
|
|
return;
|
|
|
|
if (write(fd, buf, BUFSIZ) == -1)
|
|
|
|
return;
|
|
|
|
|
|
|
|
log_written -= log_cut_size;
|
|
|
|
}
|
|
|
|
#endif /* FALLOC_FL_COLLAPSE_RANGE */
|
|
|
|
|
|
|
|
/**
|
|
|
|
* logfile_rotate_move() - Fallback: move recent entries toward start, then cut
|
|
|
|
* @fd: Log file descriptor
|
2024-01-16 00:50:32 +00:00
|
|
|
* @now: Current timestamp
|
2022-10-06 12:51:04 +00:00
|
|
|
*
|
2024-04-11 15:34:04 +00:00
|
|
|
* #syscalls lseek ppc64le:_llseek ppc64:_llseek arm:_llseek
|
2022-10-06 12:51:04 +00:00
|
|
|
* #syscalls ftruncate
|
|
|
|
*/
|
2024-01-16 00:50:32 +00:00
|
|
|
static void logfile_rotate_move(int fd, const struct timespec *now)
|
2022-10-06 12:51:04 +00:00
|
|
|
{
|
|
|
|
int header_len, write_offset, end, discard, n;
|
2024-01-15 06:39:43 +00:00
|
|
|
char buf[BUFSIZ];
|
|
|
|
const char *nl;
|
2022-10-06 12:51:04 +00:00
|
|
|
|
|
|
|
header_len = snprintf(buf, BUFSIZ,
|
2023-03-10 22:15:35 +00:00
|
|
|
"%s - log truncated at %lli.%04lli\n", log_header,
|
2024-01-16 00:50:32 +00:00
|
|
|
(long long int)(now->tv_sec - log_start),
|
|
|
|
(long long int)(now->tv_nsec / (100L * 1000)));
|
2022-10-06 12:51:04 +00:00
|
|
|
if (lseek(fd, 0, SEEK_SET) == -1)
|
|
|
|
return;
|
|
|
|
if (write(fd, buf, header_len) == -1)
|
|
|
|
return;
|
|
|
|
|
|
|
|
end = write_offset = header_len;
|
|
|
|
discard = log_cut_size + header_len;
|
|
|
|
|
|
|
|
/* Try to cut cleanly at newline */
|
|
|
|
if (lseek(fd, discard, SEEK_SET) == -1)
|
|
|
|
goto out;
|
|
|
|
if ((n = read(fd, buf, BUFSIZ)) <= 0)
|
|
|
|
goto out;
|
|
|
|
if ((nl = memchr(buf, '\n', n)))
|
|
|
|
discard += (nl - buf) + 1;
|
|
|
|
|
|
|
|
/* Go to first block to be moved */
|
|
|
|
if (lseek(fd, discard, SEEK_SET) == -1)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
while ((n = read(fd, buf, BUFSIZ)) > 0) {
|
|
|
|
end = header_len;
|
|
|
|
|
|
|
|
if (lseek(fd, write_offset, SEEK_SET) == -1)
|
|
|
|
goto out;
|
|
|
|
if ((n = write(fd, buf, n)) == -1)
|
|
|
|
goto out;
|
|
|
|
write_offset += n;
|
|
|
|
|
|
|
|
if ((n = lseek(fd, 0, SEEK_CUR)) == -1)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
if (lseek(fd, discard - header_len, SEEK_CUR) == -1)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
end = n;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
if (ftruncate(fd, end))
|
|
|
|
return;
|
|
|
|
|
|
|
|
log_written = end;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* logfile_rotate() - "Rotate" log file once it's full
|
|
|
|
* @fd: Log file descriptor
|
2024-01-16 00:50:32 +00:00
|
|
|
* @now: Current timestamp
|
2022-10-06 12:51:04 +00:00
|
|
|
*
|
|
|
|
* Return: 0 on success, negative error code on failure
|
|
|
|
*
|
|
|
|
* #syscalls fcntl
|
|
|
|
*
|
|
|
|
* fallocate() passed as EXTRA_SYSCALL only if FALLOC_FL_COLLAPSE_RANGE is there
|
|
|
|
*/
|
2024-01-16 00:50:32 +00:00
|
|
|
static int logfile_rotate(int fd, const struct timespec *now)
|
2022-10-06 12:51:04 +00:00
|
|
|
{
|
|
|
|
if (fcntl(fd, F_SETFL, O_RDWR /* Drop O_APPEND: explicit lseek() */))
|
|
|
|
return -errno;
|
|
|
|
|
|
|
|
#ifdef FALLOC_FL_COLLAPSE_RANGE
|
|
|
|
/* Only for Linux >= 3.15, extent-based ext4 or XFS, glibc >= 2.18 */
|
|
|
|
if (!fallocate(fd, FALLOC_FL_COLLAPSE_RANGE, 0, log_cut_size))
|
2024-01-16 00:50:32 +00:00
|
|
|
logfile_rotate_fallocate(fd, now);
|
2022-10-06 12:51:04 +00:00
|
|
|
else
|
|
|
|
#endif
|
2024-01-16 00:50:32 +00:00
|
|
|
logfile_rotate_move(fd, now);
|
2022-10-06 12:51:04 +00:00
|
|
|
|
|
|
|
if (fcntl(fd, F_SETFL, O_RDWR | O_APPEND))
|
|
|
|
return -errno;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* logfile_write() - Write entry to log file, trigger rotation if full
|
|
|
|
* @pri: Facility and level map, same as priority for vsyslog()
|
|
|
|
* @format: Same as vsyslog() format
|
|
|
|
* @ap: Same as vsyslog() ap
|
|
|
|
*/
|
|
|
|
void logfile_write(int pri, const char *format, va_list ap)
|
|
|
|
{
|
2024-01-16 00:50:32 +00:00
|
|
|
struct timespec now;
|
2022-10-06 12:51:04 +00:00
|
|
|
char buf[BUFSIZ];
|
|
|
|
int n;
|
|
|
|
|
2024-01-16 00:50:32 +00:00
|
|
|
if (clock_gettime(CLOCK_REALTIME, &now))
|
2022-10-06 12:51:04 +00:00
|
|
|
return;
|
|
|
|
|
2023-03-10 22:15:35 +00:00
|
|
|
n = snprintf(buf, BUFSIZ, "%lli.%04lli: %s",
|
2024-01-16 00:50:32 +00:00
|
|
|
(long long int)(now.tv_sec - log_start),
|
|
|
|
(long long int)(now.tv_nsec / (100L * 1000)),
|
2022-10-06 12:51:04 +00:00
|
|
|
logfile_prefix[pri]);
|
|
|
|
|
|
|
|
n += vsnprintf(buf + n, BUFSIZ - n, format, ap);
|
|
|
|
|
|
|
|
if (format[strlen(format)] != '\n')
|
|
|
|
n += snprintf(buf + n, BUFSIZ - n, "\n");
|
|
|
|
|
2024-01-16 00:50:32 +00:00
|
|
|
if ((log_written + n >= log_size) && logfile_rotate(log_file, &now))
|
2022-10-06 12:51:04 +00:00
|
|
|
return;
|
|
|
|
|
|
|
|
if ((n = write(log_file, buf, n)) >= 0)
|
|
|
|
log_written += n;
|
|
|
|
}
|