passt: Relicense to GPL 2.0, or any later version
In practical terms, passt doesn't benefit from the additional
protection offered by the AGPL over the GPL, because it's not
suitable to be executed over a computer network.
Further, restricting the distribution under the version 3 of the GPL
wouldn't provide any practical advantage either, as long as the passt
codebase is concerned, and might cause unnecessary compatibility
dilemmas.
Change licensing terms to the GNU General Public License Version 2,
or any later version, with written permission from all current and
past contributors, namely: myself, David Gibson, Laine Stump, Andrea
Bolognani, Paul Holzinger, Richard W.M. Jones, Chris Kuhn, Florian
Weimer, Giuseppe Scrivano, Stefan Hajnoczi, and Vasiliy Ulyanov.
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
2023-04-05 20:11:44 +02:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-or-later
|
2022-09-24 09:53:15 +02:00
|
|
|
|
|
|
|
/* PASST - Plug A Simple Socket Transport
|
|
|
|
* for qemu/UNIX domain socket mode
|
|
|
|
*
|
|
|
|
* PASTA - Pack A Subtle Tap Abstraction
|
|
|
|
* for network namespace/tap device mode
|
|
|
|
*
|
|
|
|
* log.c - Logging functions
|
|
|
|
*
|
|
|
|
* Copyright (c) 2020-2022 Red Hat GmbH
|
|
|
|
* Author: Stefano Brivio <sbrivio@redhat.com>
|
|
|
|
*/
|
|
|
|
|
2022-10-06 14:51:04 +02:00
|
|
|
#include <arpa/inet.h>
|
|
|
|
#include <limits.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <fcntl.h>
|
2022-09-24 09:53:15 +02:00
|
|
|
#include <stdio.h>
|
2022-10-06 14:51:04 +02:00
|
|
|
#include <stdint.h>
|
2022-09-24 09:53:15 +02:00
|
|
|
#include <stdlib.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <time.h>
|
|
|
|
#include <syslog.h>
|
|
|
|
#include <stdarg.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
|
|
|
|
#include "log.h"
|
2022-10-06 14:51:04 +02:00
|
|
|
#include "util.h"
|
|
|
|
#include "passt.h"
|
2022-09-24 09:53:15 +02:00
|
|
|
|
2022-10-06 14:51:04 +02:00
|
|
|
static int log_sock = -1; /* Optional socket to system logger */
|
|
|
|
static char log_ident[BUFSIZ]; /* Identifier string for openlog() */
|
2024-06-14 19:00:27 +02:00
|
|
|
static int log_mask; /* Current log priority mask */
|
2022-10-06 14:51:04 +02:00
|
|
|
static int log_opt; /* Options for openlog() */
|
|
|
|
|
|
|
|
static int log_file = -1; /* Optional log file descriptor */
|
|
|
|
static size_t log_size; /* Maximum log file size in bytes */
|
|
|
|
static size_t log_written; /* Currently used bytes in log file */
|
|
|
|
static size_t log_cut_size; /* Bytes to cut at start on rotation */
|
|
|
|
static char log_header[BUFSIZ]; /* File header, written back on cuts */
|
|
|
|
|
|
|
|
static time_t log_start; /* Start timestamp */
|
2024-06-14 19:00:27 +02:00
|
|
|
|
2022-10-06 14:51:04 +02:00
|
|
|
int log_trace; /* --trace mode enabled */
|
2024-06-14 19:00:27 +02:00
|
|
|
bool log_conf_parsed; /* Logging options already parsed */
|
2022-09-24 09:53:15 +02:00
|
|
|
|
2023-10-13 06:50:30 +02:00
|
|
|
void vlogmsg(int pri, const char *format, va_list ap)
|
2023-10-13 06:50:28 +02:00
|
|
|
{
|
log: setlogmask(0) can actually result in a system call, don't use it
Before commit 32d07f5e59f2 ("passt, pasta: Completely avoid dynamic
memory allocation"), we didn't store the current log mask in a
variable, and we fetched it using setlogmask(0) wherever needed.
But after that commit, we can use our log_mask copy instead. And we
should: with recent glibc versions, setlogmask(0) actually results in
a system call, which causes a substantial overhead with high transfer
rates: we use setlogmask(0) even to decide we don't want to print
debug messages.
Now that we rely on log_mask in early stages, before setlogmask() is
called, we need to initialise that variable to the special LOG_EMERG
mask value right away: define LOG_EARLY to make this clearer, and,
while at it, group conditions in vlogmsg() into something more terse.
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
2024-02-02 00:22:16 +01:00
|
|
|
bool debug_print = (log_mask & LOG_MASK(LOG_DEBUG)) && log_file == -1;
|
2023-10-13 06:50:28 +02:00
|
|
|
struct timespec tp;
|
|
|
|
|
log: setlogmask(0) can actually result in a system call, don't use it
Before commit 32d07f5e59f2 ("passt, pasta: Completely avoid dynamic
memory allocation"), we didn't store the current log mask in a
variable, and we fetched it using setlogmask(0) wherever needed.
But after that commit, we can use our log_mask copy instead. And we
should: with recent glibc versions, setlogmask(0) actually results in
a system call, which causes a substantial overhead with high transfer
rates: we use setlogmask(0) even to decide we don't want to print
debug messages.
Now that we rely on log_mask in early stages, before setlogmask() is
called, we need to initialise that variable to the special LOG_EMERG
mask value right away: define LOG_EARLY to make this clearer, and,
while at it, group conditions in vlogmsg() into something more terse.
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
2024-02-02 00:22:16 +01:00
|
|
|
if (debug_print) {
|
2023-10-13 06:50:28 +02:00
|
|
|
clock_gettime(CLOCK_REALTIME, &tp);
|
2024-06-05 02:42:42 +02:00
|
|
|
fprintf(stderr, "%lli.%04lli: ",
|
2023-10-13 06:50:28 +02:00
|
|
|
(long long int)tp.tv_sec - log_start,
|
|
|
|
(long long int)tp.tv_nsec / (100L * 1000));
|
|
|
|
}
|
|
|
|
|
2024-06-14 19:00:27 +02:00
|
|
|
if ((log_mask & LOG_MASK(LOG_PRI(pri))) || !log_conf_parsed) {
|
2023-10-13 06:50:30 +02:00
|
|
|
va_list ap2;
|
|
|
|
|
|
|
|
va_copy(ap2, ap); /* Don't clobber ap, we need it again */
|
2023-10-13 06:50:28 +02:00
|
|
|
if (log_file != -1)
|
2023-10-13 06:50:30 +02:00
|
|
|
logfile_write(pri, format, ap2);
|
log: setlogmask(0) can actually result in a system call, don't use it
Before commit 32d07f5e59f2 ("passt, pasta: Completely avoid dynamic
memory allocation"), we didn't store the current log mask in a
variable, and we fetched it using setlogmask(0) wherever needed.
But after that commit, we can use our log_mask copy instead. And we
should: with recent glibc versions, setlogmask(0) actually results in
a system call, which causes a substantial overhead with high transfer
rates: we use setlogmask(0) even to decide we don't want to print
debug messages.
Now that we rely on log_mask in early stages, before setlogmask() is
called, we need to initialise that variable to the special LOG_EMERG
mask value right away: define LOG_EARLY to make this clearer, and,
while at it, group conditions in vlogmsg() into something more terse.
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
2024-02-02 00:22:16 +01:00
|
|
|
else if (!(log_mask & LOG_MASK(LOG_DEBUG)))
|
2023-10-13 06:50:30 +02:00
|
|
|
passt_vsyslog(pri, format, ap2);
|
2023-11-07 12:17:07 +01:00
|
|
|
|
|
|
|
va_end(ap2);
|
2023-10-13 06:50:28 +02:00
|
|
|
}
|
|
|
|
|
2024-06-14 19:00:27 +02:00
|
|
|
if (debug_print || (!log_conf_parsed && !(log_opt & LOG_PERROR))) {
|
2024-06-05 02:42:42 +02:00
|
|
|
(void)vfprintf(stderr, format, ap);
|
2023-10-13 06:50:28 +02:00
|
|
|
if (format[strlen(format)] != '\n')
|
2024-06-05 02:42:42 +02:00
|
|
|
fprintf(stderr, "\n");
|
2023-10-13 06:50:28 +02:00
|
|
|
}
|
2022-09-24 09:53:15 +02:00
|
|
|
}
|
|
|
|
|
2023-10-13 06:50:30 +02:00
|
|
|
void logmsg(int pri, const char *format, ...)
|
|
|
|
{
|
|
|
|
va_list ap;
|
|
|
|
|
|
|
|
va_start(ap, format);
|
|
|
|
vlogmsg(pri, format, ap);
|
|
|
|
va_end(ap);
|
|
|
|
}
|
|
|
|
|
2022-10-06 14:51:04 +02:00
|
|
|
/* Prefixes for log file messages, indexed by priority */
|
|
|
|
const char *logfile_prefix[] = {
|
|
|
|
NULL, NULL, NULL, /* Unused: LOG_EMERG, LOG_ALERT, LOG_CRIT */
|
|
|
|
"ERROR: ",
|
|
|
|
"WARNING: ",
|
|
|
|
NULL, /* Unused: LOG_NOTICE */
|
|
|
|
"info: ",
|
|
|
|
" ", /* LOG_DEBUG */
|
|
|
|
};
|
|
|
|
|
2022-10-06 14:59:26 +02:00
|
|
|
/**
|
|
|
|
* trace_init() - Set log_trace depending on trace (debug) mode
|
|
|
|
* @enable: Tracing debug mode enabled if non-zero
|
|
|
|
*/
|
2022-09-24 09:53:15 +02:00
|
|
|
void trace_init(int enable)
|
|
|
|
{
|
|
|
|
log_trace = enable;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2023-02-23 18:32:20 +01:00
|
|
|
* __openlog() - Non-optional openlog() implementation, for custom vsyslog()
|
2022-09-24 09:53:15 +02:00
|
|
|
* @ident: openlog() identity (program name)
|
|
|
|
* @option: openlog() options
|
|
|
|
* @facility: openlog() facility (LOG_DAEMON)
|
|
|
|
*/
|
|
|
|
void __openlog(const char *ident, int option, int facility)
|
|
|
|
{
|
|
|
|
struct timespec tp;
|
|
|
|
|
|
|
|
clock_gettime(CLOCK_REALTIME, &tp);
|
2022-10-06 14:51:04 +02:00
|
|
|
log_start = tp.tv_sec;
|
2022-09-24 09:53:15 +02:00
|
|
|
|
|
|
|
if (log_sock < 0) {
|
|
|
|
struct sockaddr_un a = { .sun_family = AF_UNIX, };
|
|
|
|
|
|
|
|
log_sock = socket(AF_UNIX, SOCK_DGRAM | SOCK_CLOEXEC, 0);
|
|
|
|
if (log_sock < 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
strncpy(a.sun_path, _PATH_LOG, sizeof(a.sun_path));
|
|
|
|
if (connect(log_sock, (const struct sockaddr *)&a, sizeof(a))) {
|
|
|
|
close(log_sock);
|
|
|
|
log_sock = -1;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
log_mask |= facility;
|
|
|
|
strncpy(log_ident, ident, sizeof(log_ident) - 1);
|
|
|
|
log_opt = option;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* __setlogmask() - setlogmask() wrapper, to allow custom vsyslog()
|
|
|
|
* @mask: Same as setlogmask() mask
|
|
|
|
*/
|
|
|
|
void __setlogmask(int mask)
|
|
|
|
{
|
|
|
|
log_mask = mask;
|
|
|
|
setlogmask(mask);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* passt_vsyslog() - vsyslog() implementation not using heap memory
|
|
|
|
* @pri: Facility and level map, same as priority for vsyslog()
|
|
|
|
* @format: Same as vsyslog() format
|
|
|
|
* @ap: Same as vsyslog() ap
|
|
|
|
*/
|
|
|
|
void passt_vsyslog(int pri, const char *format, va_list ap)
|
|
|
|
{
|
2023-02-23 18:32:20 +01:00
|
|
|
int prefix_len, n;
|
2022-09-24 09:53:15 +02:00
|
|
|
char buf[BUFSIZ];
|
|
|
|
|
2023-02-23 18:32:20 +01:00
|
|
|
/* Send without timestamp, the system logger should add it */
|
|
|
|
n = prefix_len = snprintf(buf, BUFSIZ, "<%i> %s: ", pri, log_ident);
|
2022-09-24 09:53:15 +02:00
|
|
|
|
|
|
|
n += vsnprintf(buf + n, BUFSIZ - n, format, ap);
|
|
|
|
|
|
|
|
if (format[strlen(format)] != '\n')
|
|
|
|
n += snprintf(buf + n, BUFSIZ - n, "\n");
|
|
|
|
|
|
|
|
if (log_opt & LOG_PERROR)
|
2023-02-23 18:32:20 +01:00
|
|
|
fprintf(stderr, "%s", buf + prefix_len);
|
2022-09-24 09:53:15 +02:00
|
|
|
|
passt, log: Call __openlog() earlier, log to stderr until we detach
Paul reports that, with commit 15001b39ef1d ("conf: set the log level
much earlier"), early messages aren't reported to standard error
anymore.
The reason is that, once the log mask is changed from LOG_EARLY, we
don't force logging to stderr, and this mechanism was abused to have
early errors on stderr. Now that we drop LOG_EARLY earlier on, this
doesn't work anymore.
Call __openlog() as soon as we know the mode we're running as, using
LOG_PERROR. Then, once we detach, if we're not running from an
interactive terminal and logging to standard error is not forced,
drop LOG_PERROR from the options.
While at it, check if the standard error descriptor refers to a
terminal, instead of checking standard output: if the user redirects
standard output to /dev/null, they might still want to see messages
from standard error.
Further, make sure we don't print messages to standard error reporting
that we couldn't log to the system logger, if we didn't open a
connection yet. That's expected.
Reported-by: Paul Holzinger <pholzing@redhat.com>
Fixes: 15001b39ef1d ("conf: set the log level much earlier")
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
2024-03-12 23:22:45 +01:00
|
|
|
if (log_sock >= 0 && send(log_sock, buf, n, 0) != n)
|
2022-09-24 09:53:15 +02:00
|
|
|
fprintf(stderr, "Failed to send %i bytes to syslog\n", n);
|
|
|
|
}
|
2022-10-06 14:51:04 +02:00
|
|
|
|
|
|
|
/**
|
2022-10-10 10:35:47 +02:00
|
|
|
* logfile_init() - Open log file and write header with PID, version, path
|
2022-10-06 14:51:04 +02:00
|
|
|
* @name: Identifier for header: passt or pasta
|
|
|
|
* @path: Path to log file
|
|
|
|
* @size: Maximum size of log file: log_cut_size is calculatd here
|
|
|
|
*/
|
|
|
|
void logfile_init(const char *name, const char *path, size_t size)
|
|
|
|
{
|
|
|
|
char nl = '\n', exe[PATH_MAX] = { 0 };
|
|
|
|
int n;
|
|
|
|
|
|
|
|
if (readlink("/proc/self/exe", exe, PATH_MAX - 1) < 0) {
|
|
|
|
perror("readlink /proc/self/exe");
|
|
|
|
exit(EXIT_FAILURE);
|
|
|
|
}
|
|
|
|
|
|
|
|
log_file = open(path, O_CREAT | O_TRUNC | O_APPEND | O_RDWR | O_CLOEXEC,
|
|
|
|
S_IRUSR | S_IWUSR);
|
2023-02-15 09:24:37 +01:00
|
|
|
if (log_file == -1)
|
|
|
|
die("Couldn't open log file %s: %s", path, strerror(errno));
|
2022-10-06 14:51:04 +02:00
|
|
|
|
|
|
|
log_size = size ? size : LOGFILE_SIZE_DEFAULT;
|
|
|
|
|
2022-10-10 10:35:47 +02:00
|
|
|
n = snprintf(log_header, sizeof(log_header), "%s " VERSION ": %s (%i)",
|
2022-10-06 14:51:04 +02:00
|
|
|
name, exe, getpid());
|
|
|
|
|
|
|
|
if (write(log_file, log_header, n) <= 0 ||
|
|
|
|
write(log_file, &nl, 1) <= 0) {
|
|
|
|
perror("Couldn't write to log file\n");
|
|
|
|
exit(EXIT_FAILURE);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* For FALLOC_FL_COLLAPSE_RANGE: VFS block size can be up to one page */
|
|
|
|
log_cut_size = ROUND_UP(log_size * LOGFILE_CUT_RATIO / 100, PAGE_SIZE);
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef FALLOC_FL_COLLAPSE_RANGE
|
|
|
|
/**
|
|
|
|
* logfile_rotate_fallocate() - Write header, set log_written after fallocate()
|
|
|
|
* @fd: Log file descriptor
|
2024-01-16 01:50:32 +01:00
|
|
|
* @now: Current timestamp
|
2022-10-06 14:51:04 +02:00
|
|
|
*
|
2024-04-11 17:34:04 +02:00
|
|
|
* #syscalls lseek ppc64le:_llseek ppc64:_llseek arm:_llseek
|
2022-10-06 14:51:04 +02:00
|
|
|
*/
|
2024-01-16 01:50:32 +01:00
|
|
|
static void logfile_rotate_fallocate(int fd, const struct timespec *now)
|
2022-10-06 14:51:04 +02:00
|
|
|
{
|
2024-01-15 07:39:43 +01:00
|
|
|
char buf[BUFSIZ];
|
|
|
|
const char *nl;
|
2022-10-06 14:51:04 +02:00
|
|
|
int n;
|
|
|
|
|
|
|
|
if (lseek(fd, 0, SEEK_SET) == -1)
|
|
|
|
return;
|
|
|
|
if (read(fd, buf, BUFSIZ) == -1)
|
|
|
|
return;
|
|
|
|
|
|
|
|
n = snprintf(buf, BUFSIZ,
|
2023-03-10 23:15:35 +01:00
|
|
|
"%s - log truncated at %lli.%04lli", log_header,
|
2024-01-16 01:50:32 +01:00
|
|
|
(long long int)(now->tv_sec - log_start),
|
|
|
|
(long long int)(now->tv_nsec / (100L * 1000)));
|
2022-10-06 14:51:04 +02:00
|
|
|
|
|
|
|
/* Avoid partial lines by padding the header with spaces */
|
|
|
|
nl = memchr(buf + n + 1, '\n', BUFSIZ - n - 1);
|
|
|
|
if (nl)
|
|
|
|
memset(buf + n, ' ', nl - (buf + n));
|
|
|
|
|
|
|
|
if (lseek(fd, 0, SEEK_SET) == -1)
|
|
|
|
return;
|
|
|
|
if (write(fd, buf, BUFSIZ) == -1)
|
|
|
|
return;
|
|
|
|
|
|
|
|
log_written -= log_cut_size;
|
|
|
|
}
|
|
|
|
#endif /* FALLOC_FL_COLLAPSE_RANGE */
|
|
|
|
|
|
|
|
/**
|
|
|
|
* logfile_rotate_move() - Fallback: move recent entries toward start, then cut
|
|
|
|
* @fd: Log file descriptor
|
2024-01-16 01:50:32 +01:00
|
|
|
* @now: Current timestamp
|
2022-10-06 14:51:04 +02:00
|
|
|
*
|
2024-04-11 17:34:04 +02:00
|
|
|
* #syscalls lseek ppc64le:_llseek ppc64:_llseek arm:_llseek
|
2022-10-06 14:51:04 +02:00
|
|
|
* #syscalls ftruncate
|
|
|
|
*/
|
2024-01-16 01:50:32 +01:00
|
|
|
static void logfile_rotate_move(int fd, const struct timespec *now)
|
2022-10-06 14:51:04 +02:00
|
|
|
{
|
|
|
|
int header_len, write_offset, end, discard, n;
|
2024-01-15 07:39:43 +01:00
|
|
|
char buf[BUFSIZ];
|
|
|
|
const char *nl;
|
2022-10-06 14:51:04 +02:00
|
|
|
|
|
|
|
header_len = snprintf(buf, BUFSIZ,
|
2023-03-10 23:15:35 +01:00
|
|
|
"%s - log truncated at %lli.%04lli\n", log_header,
|
2024-01-16 01:50:32 +01:00
|
|
|
(long long int)(now->tv_sec - log_start),
|
|
|
|
(long long int)(now->tv_nsec / (100L * 1000)));
|
2022-10-06 14:51:04 +02:00
|
|
|
if (lseek(fd, 0, SEEK_SET) == -1)
|
|
|
|
return;
|
|
|
|
if (write(fd, buf, header_len) == -1)
|
|
|
|
return;
|
|
|
|
|
|
|
|
end = write_offset = header_len;
|
|
|
|
discard = log_cut_size + header_len;
|
|
|
|
|
|
|
|
/* Try to cut cleanly at newline */
|
|
|
|
if (lseek(fd, discard, SEEK_SET) == -1)
|
|
|
|
goto out;
|
|
|
|
if ((n = read(fd, buf, BUFSIZ)) <= 0)
|
|
|
|
goto out;
|
|
|
|
if ((nl = memchr(buf, '\n', n)))
|
|
|
|
discard += (nl - buf) + 1;
|
|
|
|
|
|
|
|
/* Go to first block to be moved */
|
|
|
|
if (lseek(fd, discard, SEEK_SET) == -1)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
while ((n = read(fd, buf, BUFSIZ)) > 0) {
|
|
|
|
end = header_len;
|
|
|
|
|
|
|
|
if (lseek(fd, write_offset, SEEK_SET) == -1)
|
|
|
|
goto out;
|
|
|
|
if ((n = write(fd, buf, n)) == -1)
|
|
|
|
goto out;
|
|
|
|
write_offset += n;
|
|
|
|
|
|
|
|
if ((n = lseek(fd, 0, SEEK_CUR)) == -1)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
if (lseek(fd, discard - header_len, SEEK_CUR) == -1)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
end = n;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
if (ftruncate(fd, end))
|
|
|
|
return;
|
|
|
|
|
|
|
|
log_written = end;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* logfile_rotate() - "Rotate" log file once it's full
|
|
|
|
* @fd: Log file descriptor
|
2024-01-16 01:50:32 +01:00
|
|
|
* @now: Current timestamp
|
2022-10-06 14:51:04 +02:00
|
|
|
*
|
|
|
|
* Return: 0 on success, negative error code on failure
|
|
|
|
*
|
|
|
|
* #syscalls fcntl
|
|
|
|
*
|
|
|
|
* fallocate() passed as EXTRA_SYSCALL only if FALLOC_FL_COLLAPSE_RANGE is there
|
|
|
|
*/
|
2024-01-16 01:50:32 +01:00
|
|
|
static int logfile_rotate(int fd, const struct timespec *now)
|
2022-10-06 14:51:04 +02:00
|
|
|
{
|
|
|
|
if (fcntl(fd, F_SETFL, O_RDWR /* Drop O_APPEND: explicit lseek() */))
|
|
|
|
return -errno;
|
|
|
|
|
|
|
|
#ifdef FALLOC_FL_COLLAPSE_RANGE
|
|
|
|
/* Only for Linux >= 3.15, extent-based ext4 or XFS, glibc >= 2.18 */
|
|
|
|
if (!fallocate(fd, FALLOC_FL_COLLAPSE_RANGE, 0, log_cut_size))
|
2024-01-16 01:50:32 +01:00
|
|
|
logfile_rotate_fallocate(fd, now);
|
2022-10-06 14:51:04 +02:00
|
|
|
else
|
|
|
|
#endif
|
2024-01-16 01:50:32 +01:00
|
|
|
logfile_rotate_move(fd, now);
|
2022-10-06 14:51:04 +02:00
|
|
|
|
|
|
|
if (fcntl(fd, F_SETFL, O_RDWR | O_APPEND))
|
|
|
|
return -errno;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* logfile_write() - Write entry to log file, trigger rotation if full
|
|
|
|
* @pri: Facility and level map, same as priority for vsyslog()
|
|
|
|
* @format: Same as vsyslog() format
|
|
|
|
* @ap: Same as vsyslog() ap
|
|
|
|
*/
|
|
|
|
void logfile_write(int pri, const char *format, va_list ap)
|
|
|
|
{
|
2024-01-16 01:50:32 +01:00
|
|
|
struct timespec now;
|
2022-10-06 14:51:04 +02:00
|
|
|
char buf[BUFSIZ];
|
|
|
|
int n;
|
|
|
|
|
2024-01-16 01:50:32 +01:00
|
|
|
if (clock_gettime(CLOCK_REALTIME, &now))
|
2022-10-06 14:51:04 +02:00
|
|
|
return;
|
|
|
|
|
2023-03-10 23:15:35 +01:00
|
|
|
n = snprintf(buf, BUFSIZ, "%lli.%04lli: %s",
|
2024-01-16 01:50:32 +01:00
|
|
|
(long long int)(now.tv_sec - log_start),
|
|
|
|
(long long int)(now.tv_nsec / (100L * 1000)),
|
2022-10-06 14:51:04 +02:00
|
|
|
logfile_prefix[pri]);
|
|
|
|
|
|
|
|
n += vsnprintf(buf + n, BUFSIZ - n, format, ap);
|
|
|
|
|
|
|
|
if (format[strlen(format)] != '\n')
|
|
|
|
n += snprintf(buf + n, BUFSIZ - n, "\n");
|
|
|
|
|
2024-01-16 01:50:32 +01:00
|
|
|
if ((log_written + n >= log_size) && logfile_rotate(log_file, &now))
|
2022-10-06 14:51:04 +02:00
|
|
|
return;
|
|
|
|
|
|
|
|
if ((n = write(log_file, buf, n)) >= 0)
|
|
|
|
log_written += n;
|
|
|
|
}
|