| /* |
| * Copyright 2012-2014 Google Inc. All rights reserved. |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| /* |
| * A program that reads log messages from stdin, processes them, and writes |
| * them to /dev/kmsg (usually) or stdout (if LOGOS_DEBUG=1). |
| * |
| * Features: |
| * - limits the number of log message bytes per second. |
| * - writes only entire lines at a time in a single syscall, to keep the |
| * kernel from overlapping messages from other threads/instances. |
| * - cleans up control characters (ie. chars < 32). |
| * - makes sure output lines are in "facility: message" format. |
| * - doesn't rely on syslogd. |
| * - suppresses logging of MAC addresses. |
| * - suppresses logging of filenames of personal media. |
| */ |
| #include <assert.h> |
| #include <ctype.h> |
| #include <errno.h> |
| #include <fcntl.h> |
| #include <signal.h> |
| #include <stdio.h> |
| #include <string.h> |
| #include <stdint.h> |
| #include <stdlib.h> |
| #include <sys/uio.h> |
| #include <sys/stat.h> |
| #include <sys/types.h> |
| #include <time.h> |
| #include <unistd.h> |
| #ifndef COMPILE_FOR_HOST |
| #include <stacktrace.h> |
| #endif // COMPILE_FOR_HOST |
| |
| #include "utils.h" |
| |
| |
| // Total size of kernel log buffer. |
| // We use CONFIG_PRINTK_PERSIST in the kernel to keep our log buffer across |
| // reboots, then configure the kernel buffer to be extra large, then dump |
| // *both* kernel and userspace messages into it. This gives us a clearly |
| // timestamped log of all events across the whole system. |
| // The kernel log buffer size is actually set by the log_buf_len kernel |
| // parameter; if you change it to be <= BURST_LOG_SIZE, please change it |
| // here too. |
| #define BURST_LOG_SIZE (10*1000LL*1000LL) |
| |
| // Maximum bytes to log per day. |
| // This limit reflects our server-side quota (and is also enforced server |
| // side). We need to know it client-side in order to calculate the right |
| // default bucket size so we never run into the server-side quota |
| // unexpectedly. |
| #define DAILY_LOG_SIZE (100*1000LL*1000LL) |
| |
| // Amount of time between system-wide log uploads. |
| // (The system might actually upload more of than this, which is harmless. |
| // If it uploads less often, we risk an overflow, because we're calculating |
| // our bucket sizes based on this amount.) |
| #define SECS_PER_BURST 300 |
| |
| // Amount of time in daily bucket. |
| // (That is, DAILY_LOG_SIZE is a limit reflecting this many seconds.) |
| #define SECS_PER_DAY (24*60*60) |
| |
| // Worst-case number of programs bursting out of control at once |
| #define MAX_BURSTING_APPS 10 |
| |
| // Worst-case number of programs maxing out the daily byte counter |
| #define MAX_DAILY_APPS 20 |
| |
| // Default bytes per burst period |
| #define DEFAULT_BYTES_PER_BURST (BURST_LOG_SIZE / MAX_BURSTING_APPS) |
| |
| // Default bytes per day |
| #define DEFAULT_BYTES_PER_DAY (DAILY_LOG_SIZE / MAX_DAILY_APPS) |
| |
| // This is arbitrary. It matters more when using syslogd (which |
| // has pretty strict limits) but we could make this arbitrarily large |
| // if we really wanted to allow obscenely long lines. Anything larger |
| // than th minimum bucket size makes no sense, of course. |
| #define MAX_LINE_LENGTH 768 |
| |
| |
| enum BucketIds { |
| B_BURST = 0, // fast, small bucket (per-cycle limit; allows bursts) |
| B_DAILY, // slow, big bucket (per-day limit) |
| B_WARNING, // slow, small bucket (warns if you've made a burst) |
| NUM_BUCKETS |
| }; |
| |
| |
| enum BucketType { |
| BT_INFORMATIONAL = 0, |
| BT_MANDATORY = 1, |
| }; |
| |
| |
| struct Bucket { |
| char *name; // short name of this bucket |
| char *msg_start; // message when bucket is first exceeded |
| char *msg_end; // message when bucket has some space again |
| enum BucketType type; // controls whether this bucket causes drops |
| ssize_t max_bytes; // maximum bytes in this bucket when it's full |
| ssize_t fill_rate; // bytes added to this bucket per sec when not full |
| ssize_t available; // bytes currently in this bucket (<= max_bytes) |
| int num_skipped; // number of messages skipped because of this bucket |
| } buckets[NUM_BUCKETS] = { |
| // B_BURST |
| { |
| "burst", |
| "W: burst limit: dropping messages to prevent overflow (%d bytes/sec).", |
| "W: burst limit: %d messages were dropped.", |
| BT_MANDATORY, |
| 0, 0, 0, 0, |
| }, |
| // B_DAILY |
| { |
| "daily", |
| "W: daily limit: dropping messages (%d bytes/sec).", |
| "W: daily limit: %d messages were dropped.", |
| BT_MANDATORY, |
| 0, 0, 0, 0, |
| }, |
| // B_WARNING |
| { |
| "warning", |
| "I: burst notice: this log rate is unsustainable (%d bytes/sec).", |
| "I: burst notice: %d messages would have been dropped.", |
| BT_INFORMATIONAL, |
| 0, 0, 0, 0, |
| }, |
| }; |
| |
| |
| static int debug = 0, want_unlimited_mode = 0, unlimited_mode = 0; |
| static char **g_argv = NULL; |
| |
| |
| // Returns 1 if 's' starts with 'contains' (which is null terminated). |
| static int startswith(const void *s, const char *contains) { |
| return strncasecmp(s, contains, strlen(contains)) == 0; |
| } |
| |
| |
| // However, we want to allow short-term bursts of more bytes, with a lower |
| // average when taken over the course of a longer time period. So we |
| // actually need two token buckets: a "burst" bucket (to control short term |
| // burstiness so we don't overflow the local buffer) and a "daily" bucket |
| // (to control the long term average so we don't overflow the remote |
| // server's quota). |
| static void init_buckets(ssize_t bytes_per_burst, ssize_t bytes_per_day) { |
| // Divide by 2 is just in case we go two cycles between successful log |
| // uploads; we want to allow for 2x the buffer usage in that case. |
| // Note that this algorithm still isn't perfect: if your program times |
| // things exactly right, it could have a full bucket at the beginning |
| // of a cycle, empty it out, then it would refill at fill_rate throughout |
| // the cycle, allowing more than max_bytes to be written during a given |
| // cycle. I hope this is sufficiently rare that we don't have to pessimize |
| // the bucket sizes just to deal with this almost-never occurrence, but it's |
| // still worrisome that the condition can exist at all. |
| // |
| // We initialize buckets with available > 0 to allow for bursts |
| // of messages at startup time (which is a common time to want to log |
| // logs of stuff). |
| buckets[B_BURST].max_bytes = bytes_per_burst / 2; |
| buckets[B_BURST].fill_rate = buckets[B_BURST].max_bytes / SECS_PER_BURST; |
| buckets[B_BURST].available = buckets[B_BURST].max_bytes / 2; |
| |
| // max_bytes divide by 2 not needed here because not affected by uploads. |
| buckets[B_DAILY].max_bytes = bytes_per_day; |
| buckets[B_DAILY].fill_rate = buckets[B_DAILY].max_bytes / SECS_PER_DAY; |
| buckets[B_DAILY].available = buckets[B_DAILY].max_bytes / 2; |
| |
| // The warning bucket goes off if you would have emptied the slow (daily) |
| // bucket, had it been as small as the burst bucket. Basically, this |
| // triggers a message when you are relying on the short term "burst" |
| // feature, giving you early warning that if you keep this up, you will |
| // eventually exceed the daily bucket and your bandwidth will be cut. |
| // It doesn't actually prevent you from writing anything though. |
| buckets[B_WARNING].max_bytes = buckets[B_BURST].max_bytes; |
| buckets[B_WARNING].fill_rate = buckets[B_DAILY].fill_rate; |
| buckets[B_WARNING].available = buckets[B_BURST].available; |
| } |
| |
| |
| static void _flush_unlimited(uint8_t *header, ssize_t headerlen, |
| const uint8_t *buf, ssize_t len) { |
| ssize_t total = headerlen + len + 1; |
| struct iovec iov[] = { |
| { header, headerlen }, |
| { (uint8_t *)buf, len }, |
| { "\n", 1 }, |
| }; |
| uint8_t lvl; |
| |
| assert(headerlen > 3); |
| assert(header[0] == '<'); |
| assert(header[2] == '>'); |
| |
| if (startswith(buf, "weird:") || |
| startswith(buf, "fatal:") || |
| startswith(buf, "critical:")) { |
| lvl = '2'; |
| } else if (startswith(buf, "e:") || |
| startswith(buf, "error:")) { |
| lvl = '3'; |
| } else if (startswith(buf, "w:") || |
| startswith(buf, "warning:")) { |
| lvl = '4'; |
| } else if (startswith(buf, "n:") || |
| startswith(buf, "notice:")) { |
| lvl = '5'; |
| } else if (startswith(buf, "i:") || |
| startswith(buf, "info:")) { |
| lvl = '6'; |
| } else { |
| // default is debug |
| lvl = '7'; |
| } |
| header[1] = lvl; // header starts with <x>; replace the x |
| |
| ssize_t wrote = writev(1, iov, sizeof(iov)/sizeof(iov[0])); |
| if (wrote >= 0 && wrote < total) { |
| // should never happen because stdout should be non-blocking |
| fprintf(stderr, "WEIRD: logos: writev(%zd) returned %zd\n", total, wrote); |
| // not fatal |
| } else if (wrote < 0) { |
| perror("logos: writev"); |
| // not fatal |
| } |
| } |
| |
| |
| // Returns the kernel monotonic timestamp in milliseconds. |
| static long long mstime(void) { |
| struct timespec ts; |
| if (clock_gettime(CLOCK_MONOTONIC, &ts) < 0) { |
| perror("logos: clock_gettime"); |
| exit(7); // really should never happen, so don't try to recover |
| } |
| return ts.tv_sec * 1000LL + ts.tv_nsec / 1000000; |
| } |
| |
| |
| static long long last_add_time; |
| static int skipping, backoff = 10*1000 / 2; |
| static void maybe_fill_buckets(void) { |
| long long now = mstime(), tdiff; |
| int i; |
| |
| if (!last_add_time) { |
| // buckets always start out half-full, particularly because programs tend |
| // to spew a lot of content at startup. Also, last_add_time gets |
| // reset to 0 when we enable/disable unlimited_mode, so the buckets |
| // refill. |
| last_add_time = now; |
| for (i = 0; i < NUM_BUCKETS; i++) { |
| buckets[i].available = buckets[i].max_bytes / 2; |
| } |
| } else { |
| tdiff = now - last_add_time; |
| |
| // only update last_add_time if we added any bytes. Otherwise there's |
| // an edge case where if bytes_per_millisecond is < 1.0 and there's |
| // a message every millisecond, we'd never add to the bucket. |
| // |
| // Also, if we had to start dropping messages, wait for a minimal |
| // filling of the bucket so we don't just constantly toggle between |
| // empty/nonempty. It's more useful to show fewer uninterrupted bursts |
| // of messages than just one message here and there. |
| if ((!skipping && tdiff >= 1000) || (skipping && tdiff >= backoff)) { |
| for (int i = 0; i < NUM_BUCKETS; i++) { |
| long long add = tdiff * buckets[i].fill_rate / 1000; |
| assert(add >= 0); |
| buckets[i].available += add; |
| if (buckets[i].available > buckets[i].max_bytes) { |
| buckets[i].available = buckets[i].max_bytes; |
| } |
| } |
| last_add_time = now; |
| } |
| } |
| } |
| |
| |
| static int all_buckets_have_room(uint8_t *header, ssize_t headerlen, |
| ssize_t total) { |
| int all_ok = 1, now_skipping = 0; |
| for (int i = 0; i < NUM_BUCKETS; i++) { |
| if (buckets[i].available >= total || unlimited_mode) { |
| if (buckets[i].num_skipped) { |
| char tmp[1024]; |
| ssize_t n = snprintf(tmp, sizeof(tmp), |
| buckets[i].msg_end, buckets[i].num_skipped); |
| _flush_unlimited(header, headerlen, (uint8_t *)tmp, n); |
| buckets[i].num_skipped = 0; |
| } |
| // in unlimited_mode this could go negative; that's ok |
| buckets[i].available -= total; |
| } else { |
| if (!buckets[i].num_skipped) { |
| char tmp[1024]; |
| ssize_t n = snprintf(tmp, sizeof(tmp), |
| buckets[i].msg_start, buckets[i].fill_rate); |
| _flush_unlimited(header, headerlen, (uint8_t *)tmp, n); |
| buckets[i].available = 0; |
| if (!now_skipping && !skipping) backoff *= 2; |
| if (backoff > 120*1000) backoff = 120*1000; |
| } |
| now_skipping = 1; |
| buckets[i].num_skipped++; |
| switch (buckets[i].type) { |
| case BT_MANDATORY: |
| all_ok = 0; |
| break; |
| case BT_INFORMATIONAL: |
| break; |
| } |
| } |
| } |
| skipping = now_skipping; |
| return all_ok; |
| } |
| |
| |
| // This implements the rate limiting using a token bucket algorithm. |
| static void _flush_ratelimited(uint8_t *header, ssize_t headerlen, |
| uint8_t *buf, ssize_t len) { |
| ssize_t total = headerlen + len + 1; |
| |
| if (debug) { |
| char buf[1024], *p = buf; |
| assert(sizeof(buf) >= 100 * NUM_BUCKETS); |
| p += sprintf(p, "logos: "); |
| for (int i = 0; i < NUM_BUCKETS; i++) { |
| p += sprintf(p, "%s=%zd ", buckets[i].name, buckets[i].available); |
| assert(p < buf + sizeof(buf)); |
| assert(p < buf + 100*(i+1)); |
| } |
| p += sprintf(p, "want=%zd\n", total); |
| fputs(buf, stderr); |
| } |
| |
| maybe_fill_buckets(); |
| |
| if (all_buckets_have_room(header, headerlen, total)) { |
| _flush_unlimited(header, headerlen, buf, len); |
| } |
| } |
| |
| |
| // This SIGHUP handler is needed for the unit test, but it may occasionally |
| // be useful in real life too, in case rate limiting kicks in and you really |
| // want to see what's going on this instant. |
| static void refill_ratelimiter(int sig) { |
| last_add_time = 0; |
| } |
| |
| |
| // SIGUSR1 disables the rate limit entirely, for debugging on test devices |
| static void disable_ratelimit(int sig) { |
| want_unlimited_mode = 1; |
| } |
| |
| |
| // SIGUSR2 does the opposite of SIGUSR1. We could make SIGUSR1 a toggle |
| // instead, but this way you can just do 'pkill -USR1 logos' and make sure |
| // all the processes have log limits disabled, where a toggle would leave you |
| // uncertain. |
| static void enable_ratelimit(int sig) { |
| want_unlimited_mode = 0; |
| } |
| |
| |
| // strlen is not async-safe, supply one which is. |
| static size_t my_strlen(const char *string) { |
| size_t i; |
| for (i = 0; string[i] != '\0'; ++i); |
| return i; |
| } |
| |
| // We don't have a way to babysit logos externally, as it is in |
| // a pipe from some other process. Make it try again if it fails. |
| static void rejuvinate_process(int sig) { |
| char *restart = "<2>logos: restarting on fatal signal\n"; |
| char *giveup = "<2>logos: Cannot find logos binary to exec\n"; |
| size_t unused __attribute__((unused)); |
| unused = write(1, restart, my_strlen(restart)); |
| |
| // execvp is not async-signal safe, so check likely paths. |
| execve("/bin/logos", g_argv, environ); |
| execve("/usr/bin/logos", g_argv, environ); |
| execve("/sbin/logos", g_argv, environ); |
| execve("/usr/sbin/logos", g_argv, environ); |
| unused = write(1, giveup, my_strlen(giveup)); |
| exit(99); |
| } |
| |
| // Return a malloc()ed buffer that's a copy of buf, with a terminating |
| // nul and control characters replaced by printable characters. |
| static uint8_t *fix_buf(uint8_t *buf, ssize_t len) { |
| uint8_t *outbuf = malloc(len * 8 + 1), *inp, *outp; |
| if (!outbuf) { |
| perror("logos: allocating memory"); |
| return NULL; |
| } |
| for (inp = buf, outp = outbuf; inp < buf + len; inp++) { |
| if (*inp >= 32 || *inp == '\n') { |
| *outp++ = *inp; |
| } else if (*inp == '\t') { |
| // align tabs (ignoring prefixes etc) for nicer-looking output |
| do { |
| *outp++ = ' '; |
| } while ((outp - outbuf) % 8 != 0); |
| |
| } else if (*inp == '\r') { |
| // just ignore CR characters |
| } else { |
| snprintf((char *)outp, 5, "\\x%02x", (int)*inp); |
| outp += 4; |
| } |
| } |
| *outp = '\0'; |
| return outbuf; |
| } |
| |
| |
| static void flush(uint8_t *header, ssize_t headerlen, |
| uint8_t *buf, ssize_t len) { |
| // We can assume the header doesn't have any invalid bytes in it since |
| // it'll tend to be a hardcoded string. We also pass through chars >= |
| // 128 without validating that they're correct utf-8, just in case seeing |
| // the verbatim values helps someone sometime. |
| uint8_t *p; |
| for (p = buf; p < buf + len; p++) { |
| if (*p < 32 && *p != '\n') { |
| p = fix_buf(buf, len); |
| if (p) { |
| _flush_ratelimited(header, headerlen, p, strlen((char *)p)); |
| free(p); |
| } |
| return; |
| } |
| } |
| // if we get here, there were no special characters |
| _flush_ratelimited(header, headerlen, buf, len); |
| } |
| |
| |
| static int is_mac_address(const uint8_t *s, char sep) { |
| if ((s[2] == sep) && (s[5] == sep) && (s[8] == sep) && |
| (s[11] == sep) && (s[14] == sep) && |
| isxdigit(s[0]) && isxdigit(s[1]) && |
| isxdigit(s[3]) && isxdigit(s[4]) && |
| isxdigit(s[6]) && isxdigit(s[7]) && |
| isxdigit(s[9]) && isxdigit(s[10]) && |
| isxdigit(s[12]) && isxdigit(s[13]) && |
| isxdigit(s[15]) && isxdigit(s[16])) { |
| return 1; |
| } |
| |
| return 0; |
| } |
| |
| |
| static void blot_out_mac_address(uint8_t *s) { |
| s[12] = 'X'; |
| s[13] = 'X'; |
| s[15] = 'X'; |
| s[16] = 'X'; |
| } |
| |
| |
| /* |
| * search for text patterns which look like MAC addresses, |
| * and cross out the last two bytes with 'X' characters. |
| * Ex: f8:8f:ca:00:00:01 and f8-8f-ca-00-00-01 |
| */ |
| #define MAC_ADDR_LEN 17 |
| static void suppress_mac_addresses(uint8_t *line, ssize_t len, char sep) { |
| uint8_t *s = line; |
| |
| while (len >= MAC_ADDR_LEN) { |
| if (is_mac_address(s, sep)) { |
| blot_out_mac_address(s); |
| s += MAC_ADDR_LEN; |
| len -= MAC_ADDR_LEN; |
| } else { |
| s += 1; |
| len -= 1; |
| } |
| } |
| } |
| |
| |
| /* |
| * Return true for a character which we expect to terminate a |
| * media filename. |
| */ |
| static int is_filename_terminator(char c) { |
| switch(c) { |
| case ' ': |
| case '\'': |
| case '"': |
| return 1; |
| } |
| |
| return 0; |
| } |
| |
| /* |
| * search for text patterns which look like filenames of |
| * personal media, and cross out the filename portion with |
| * 'X' characters. |
| */ |
| static void suppress_media_filenames(uint8_t *line, ssize_t len, |
| const char *path) { |
| uint8_t *s = line; |
| ssize_t pathlen = strlen(path); |
| |
| while (len > pathlen) { |
| if (strncmp((char *)s, path, pathlen) == 0) { |
| /* Found a filename, blot it out. */ |
| s += pathlen; |
| len -= pathlen; |
| while (len > 0 && !is_filename_terminator(*s)) { |
| *s++ = 'X'; |
| len--; |
| } |
| } else { |
| s += 1; |
| len -= 1; |
| } |
| } |
| } |
| |
| |
| static void usage(void) { |
| fprintf(stderr, |
| "Usage: [LOGOS_DEBUG=1] logos <facilityname> [bytes/burst] [bytes/day]\n" |
| " Copies logs from stdin to /dev/kmsg, formatting them to be\n" |
| " suitable for /dev/kmsg. If LOGOS_DEBUG is >= 1, writes to\n" |
| " stdout instead.\n" |
| " \n" |
| " Default bytes/burst = %ld - use 0 (for default) if possible.\n" |
| " Default bytes/day = %ld - use 0 (for default) if possible.\n" |
| " Signals:\n" |
| " SIGHUP: refill the token buckets once.\n" |
| " SIGUSR1: disable rate limiting.\n" |
| " SIGUSR2: re-enable rate limiting.\n" |
| " Example: pkill -USR1 logos -- disables rate limit on all logos.\n", |
| (long)DEFAULT_BYTES_PER_BURST, (long)DEFAULT_BYTES_PER_DAY); |
| exit(99); |
| } |
| |
| int main(int argc, char **argv) { |
| static uint8_t overlong_warning[] = |
| "W: previous log line was split. Use shorter lines."; |
| static uint8_t now_unlimited[] = |
| "W: SIGUSR1: rate limit disabled."; |
| static uint8_t now_limited[] = |
| "W: SIGUSR2: rate limit re-enabled."; |
| const char *disable_limits_file = "/config/disable-log-limits"; |
| uint8_t buf[MAX_LINE_LENGTH], *header; |
| ssize_t used = 0, got, headerlen; |
| int overlong = 0; |
| |
| { |
| char *p = getenv("LOGOS_DEBUG"); |
| if (p) { |
| debug = atoi(p); |
| } |
| } |
| |
| if (argc < 2 || argc > 4) { |
| usage(); |
| } |
| |
| // remove underscores form the facility name |
| strip_underscores(argv[1]); |
| if (strlen(argv[1]) == 0) { |
| fprintf(stderr, "logos: facility name was empty, or all underscores.\n"); |
| return 1; |
| } |
| |
| #ifndef COMPILE_FOR_HOST |
| stacktrace_setup(); |
| #endif // COMPILE_FOR_HOST |
| g_argv = argv; |
| signal(SIGHUP, refill_ratelimiter); |
| signal(SIGUSR1, disable_ratelimit); |
| signal(SIGUSR2, enable_ratelimit); |
| signal(SIGILL, rejuvinate_process); |
| signal(SIGBUS, rejuvinate_process); |
| signal(SIGSEGV, rejuvinate_process); |
| |
| headerlen = 3 + strlen(argv[1]) + 1 + 1; // <x>, fac, :, space |
| header = malloc(headerlen + 1); |
| if (!header) { |
| perror("logos: allocating memory"); |
| return 5; |
| } |
| snprintf((char *)header, headerlen + 1, "<x>%s: ", argv[1]); |
| |
| ssize_t bytes_per_burst = DEFAULT_BYTES_PER_BURST; |
| if (argc > 2) { |
| bytes_per_burst = atoll(argv[2]); |
| } |
| if (!bytes_per_burst) { |
| bytes_per_burst = DEFAULT_BYTES_PER_BURST; |
| } |
| if (bytes_per_burst < SECS_PER_BURST * 2) { |
| fprintf(stderr, "logos: bytes-per-burst (%s) must be an int >= %d\n", |
| argv[2], (int)SECS_PER_BURST * 2); |
| return 6; |
| } |
| |
| ssize_t bytes_per_day = 0; |
| if (argc > 3) { |
| bytes_per_day = atoll(argv[3]); |
| } |
| if (!bytes_per_day) { |
| bytes_per_day = DEFAULT_BYTES_PER_DAY; |
| } |
| if (bytes_per_day < SECS_PER_DAY) { |
| fprintf(stderr, "logos: bytes-per-day (%s) must be an int >= %d\n", |
| argv[2], (int)SECS_PER_DAY); |
| return 6; |
| } |
| init_buckets(bytes_per_burst, bytes_per_day); |
| |
| struct stat fst; |
| if (stat(disable_limits_file, &fst) == 0) { |
| want_unlimited_mode = 1; |
| } |
| |
| if (!debug) { |
| int fd = open("/dev/kmsg", O_WRONLY); |
| if (fd < 0) { |
| perror("logos: /dev/kmsg"); |
| return 3; |
| } |
| dup2(fd, 1); // make it stdout |
| dup2(fd, 2); // and stderr too |
| close(fd); |
| |
| // Chdir to / so that we don't prevent filesystems from unmounting just |
| // because we happened to be in that directory while starting a long-running |
| // task. |
| if (chdir("/") != 0) { |
| perror("logos: chdir /"); |
| return 3; |
| } |
| } |
| |
| while (1) { |
| if (unlimited_mode != want_unlimited_mode) { |
| // we delay setting these variables until this point, in order to avoid |
| // race conditions caused by changing unlimited_mode and last_add_time |
| // inside a signal handler. |
| unlimited_mode = want_unlimited_mode; |
| last_add_time = 0; |
| if (unlimited_mode) { |
| _flush_unlimited(header, headerlen, |
| now_unlimited, strlen((char *)now_unlimited)); |
| } else { |
| _flush_unlimited(header, headerlen, |
| now_limited, strlen((char *)now_limited)); |
| } |
| } |
| if (used == sizeof(buf)) { |
| flush(header, headerlen, buf, used); |
| overlong = 1; |
| used = 0; |
| } |
| got = read(0, buf + used, sizeof(buf) - used); |
| if (got == 0) { |
| flush(header, headerlen, buf, used); |
| goto done; |
| } else if (got < 0) { |
| if (errno != EINTR && errno != EAGAIN) { |
| flush(header, headerlen, buf, used); |
| return 1; |
| } |
| } else { |
| uint8_t *start = buf, *next = buf + used, *end = buf + used + got, *p; |
| while ((p = memchr(next, '\n', end - next)) != NULL) { |
| ssize_t linelen = p - start; |
| suppress_mac_addresses(start, linelen, ':'); |
| suppress_mac_addresses(start, linelen, '-'); |
| suppress_media_filenames(start, linelen, "/var/media/pictures/"); |
| suppress_media_filenames(start, linelen, "/var/media/videos/"); |
| flush(header, headerlen, start, linelen); |
| if (overlong) { |
| // that flush() was the first newline after buffer length |
| // exceeded, which means the end of the overly long line. Let's |
| // print a warning about it. |
| flush(header, headerlen, |
| overlong_warning, strlen((char *)overlong_warning)); |
| overlong = 0; |
| } |
| start = next = p + 1; |
| } |
| used = end - start; |
| memmove(buf, start, used); |
| } |
| } |
| |
| done: |
| free(header); |
| return 0; |
| } |