2 * Copyright (C) 2013 Felix Fietkau <nbd@openwrt.org>
3 * Copyright (C) 2013 John Crispin <blogic@openwrt.org>
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU Lesser General Public License version 2.1
7 * as published by the Free Software Foundation
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
15 #include <sys/types.h>
23 #include <sys/types.h>
24 #include <sys/socket.h>
29 #include <libubox/ustream.h>
30 #include <libubox/blobmsg_json.h>
31 #include <libubox/usock.h>
32 #include <libubox/uloop.h>
36 #define LOGD_CONNECT_RETRY 10
53 static const struct blobmsg_policy log_policy
[] = {
54 [LOG_MSG
] = { .name
= "msg", .type
= BLOBMSG_TYPE_STRING
},
55 [LOG_ID
] = { .name
= "id", .type
= BLOBMSG_TYPE_INT32
},
56 [LOG_PRIO
] = { .name
= "priority", .type
= BLOBMSG_TYPE_INT32
},
57 [LOG_SOURCE
] = { .name
= "source", .type
= BLOBMSG_TYPE_INT32
},
58 [LOG_TIME
] = { .name
= "time", .type
= BLOBMSG_TYPE_INT64
},
61 static struct uloop_timeout retry
;
62 static struct uloop_fd sender
;
63 static regex_t regexp_preg
;
64 static const char *log_file
, *log_ip
, *log_port
, *log_prefix
, *pid_file
, *hostname
, *regexp_pattern
;
65 static int log_type
= LOG_STDOUT
;
66 static int log_size
, log_udp
, log_follow
, log_trailer_null
= 0;
67 static int log_timestamp
;
68 static int logd_conn_tries
= LOGD_CONNECT_RETRY
;
70 static const char* getcodetext(int value
, CODE
*codetable
) {
74 for (i
= codetable
; i
->c_val
!= -1; i
++)
75 if (i
->c_val
== value
)
80 static void log_handle_reconnect(struct uloop_timeout
*timeout
)
82 sender
.fd
= usock((log_udp
) ? (USOCK_UDP
) : (USOCK_TCP
), log_ip
, log_port
);
84 fprintf(stderr
, "failed to connect: %m\n");
85 uloop_timeout_set(&retry
, 1000);
87 uloop_fd_add(&sender
, ULOOP_READ
);
88 syslog(LOG_INFO
, "Logread connected to %s:%s\n", log_ip
, log_port
);
92 static void log_handle_fd(struct uloop_fd
*u
, unsigned int events
)
98 uloop_timeout_set(&retry
, 1000);
102 static int log_notify(struct blob_attr
*msg
)
104 struct blob_attr
*tb
[__LOG_MAX
];
106 char buf
[LOG_LINE_SIZE
+ 128];
117 blobmsg_parse(log_policy
, ARRAY_SIZE(log_policy
), tb
, blob_data(msg
), blob_len(msg
));
118 if (!tb
[LOG_ID
] || !tb
[LOG_PRIO
] || !tb
[LOG_SOURCE
] || !tb
[LOG_TIME
] || !tb
[LOG_MSG
])
121 if ((log_type
== LOG_FILE
) && log_size
&& (!stat(log_file
, &s
)) && (s
.st_size
> log_size
)) {
122 char *old
= malloc(strlen(log_file
) + 5);
126 sprintf(old
, "%s.old", log_file
);
127 rename(log_file
, old
);
130 sender
.fd
= open(log_file
, O_CREAT
| O_WRONLY
| O_APPEND
, 0600);
132 fprintf(stderr
, "failed to open %s: %m\n", log_file
);
137 m
= blobmsg_get_string(tb
[LOG_MSG
]);
138 if (regexp_pattern
&&
139 regexec(®exp_preg
, m
, 0, NULL
, 0) == REG_NOMATCH
)
141 t
= blobmsg_get_u64(tb
[LOG_TIME
]) / 1000;
143 t_ms
= blobmsg_get_u64(tb
[LOG_TIME
]) % 1000;
144 snprintf(buf_ts
, sizeof(buf_ts
), "[%lu.%03u] ",
145 (unsigned long)t
, t_ms
);
148 p
= blobmsg_get_u32(tb
[LOG_PRIO
]);
149 c
[strlen(c
) - 1] = '\0';
151 if (log_type
== LOG_NET
) {
154 snprintf(buf
, sizeof(buf
), "<%u>", p
);
155 strncat(buf
, c
+ 4, 16);
157 strncat(buf
, buf_ts
, sizeof(buf
) - strlen(buf
) - 1);
160 strncat(buf
, hostname
, sizeof(buf
) - strlen(buf
) - 1);
161 strncat(buf
, " ", sizeof(buf
) - strlen(buf
) - 1);
164 strncat(buf
, log_prefix
, sizeof(buf
) - strlen(buf
) - 1);
165 strncat(buf
, ": ", sizeof(buf
) - strlen(buf
) - 1);
167 if (blobmsg_get_u32(tb
[LOG_SOURCE
]) == SOURCE_KLOG
)
168 strncat(buf
, "kernel: ", sizeof(buf
) - strlen(buf
) - 1);
169 strncat(buf
, m
, sizeof(buf
) - strlen(buf
) - 1);
171 err
= write(sender
.fd
, buf
, strlen(buf
));
173 size_t buflen
= strlen(buf
);
174 if (!log_trailer_null
)
176 err
= send(sender
.fd
, buf
, buflen
+ 1, 0);
180 syslog(LOG_INFO
, "failed to send log data to %s:%s via %s\n",
181 log_ip
, log_port
, (log_udp
) ? ("udp") : ("tcp"));
182 uloop_fd_delete(&sender
);
185 uloop_timeout_set(&retry
, 1000);
188 snprintf(buf
, sizeof(buf
), "%s %s%s.%s%s %s\n",
189 c
, log_timestamp
? buf_ts
: "",
190 getcodetext(LOG_FAC(p
) << 3, facilitynames
),
191 getcodetext(LOG_PRI(p
), prioritynames
),
192 (blobmsg_get_u32(tb
[LOG_SOURCE
])) ? ("") : (" kernel:"), m
);
193 ret
= write(sender
.fd
, buf
, strlen(buf
));
196 if (log_type
== LOG_FILE
)
202 static int usage(const char *prog
)
204 fprintf(stderr
, "Usage: %s [options]\n"
206 " -s <path> Path to ubus socket\n"
207 " -l <count> Got only the last 'count' messages\n"
208 " -e <pattern> Filter messages with a regexp\n"
209 " -r <server> <port> Stream message to a server\n"
210 " -F <file> Log file\n"
211 " -S <bytes> Log size\n"
212 " -p <file> PID file\n"
213 " -h <hostname> Add hostname to the message\n"
214 " -P <prefix> Prefix custom text to streamed messages\n"
215 " -f Follow log messages\n"
216 " -u Use UDP as the protocol\n"
217 " -t Add an extra timestamp\n"
218 " -0 Use \\0 instead of \\n as trailer when using TCP\n"
223 static void logread_fd_data_cb(struct ustream
*s
, int bytes
)
229 a
= (void*) ustream_get_read_buf(s
, &len
);
230 if (len
< sizeof(*a
))
233 cur_len
= blob_len(a
) + sizeof(*a
);
238 ustream_consume(s
, cur_len
);
242 static void logread_fd_state_cb(struct ustream
*s
)
245 logd_conn_tries
= LOGD_CONNECT_RETRY
;
249 static void logread_fd_cb(struct ubus_request
*req
, int fd
)
251 static struct ustream_fd test_fd
;
253 memset(&test_fd
, 0, sizeof(test_fd
));
255 test_fd
.stream
.notify_read
= logread_fd_data_cb
;
256 test_fd
.stream
.notify_state
= logread_fd_state_cb
;
257 ustream_fd_init(&test_fd
, fd
);
260 static void logread_setup_output(void)
262 if (sender
.fd
|| sender
.cb
)
265 if (log_ip
&& log_port
) {
266 openlog("logread", LOG_PID
, LOG_DAEMON
);
268 sender
.cb
= log_handle_fd
;
269 retry
.cb
= log_handle_reconnect
;
270 uloop_timeout_set(&retry
, 1000);
271 } else if (log_file
) {
273 sender
.fd
= open(log_file
, O_CREAT
| O_WRONLY
| O_APPEND
, 0600);
275 fprintf(stderr
, "failed to open %s: %m\n", log_file
);
279 sender
.fd
= STDOUT_FILENO
;
283 int main(int argc
, char **argv
)
285 struct ubus_context
*ctx
;
287 const char *ubus_socket
= NULL
;
288 int ch
, ret
, lines
= 0;
289 static struct blob_buf b
;
291 signal(SIGPIPE
, SIG_IGN
);
293 while ((ch
= getopt(argc
, argv
, "u0fcs:l:r:F:p:S:P:h:e:t")) != -1) {
299 log_trailer_null
= 1;
302 ubus_socket
= optarg
;
306 log_port
= argv
[optind
++];
321 lines
= atoi(optarg
);
324 log_size
= atoi(optarg
);
333 if (!regcomp(®exp_preg
, optarg
, REG_NOSUB
)) {
334 regexp_pattern
= optarg
;
346 ctx
= ubus_connect(ubus_socket
);
348 fprintf(stderr
, "Failed to connect to ubus\n");
353 if (log_follow
&& pid_file
) {
354 FILE *fp
= fopen(pid_file
, "w+");
356 fprintf(fp
, "%d", getpid());
361 blob_buf_init(&b
, 0);
362 blobmsg_add_u8(&b
, "stream", 1);
363 blobmsg_add_u8(&b
, "oneshot", !log_follow
);
365 blobmsg_add_u32(&b
, "lines", lines
);
367 blobmsg_add_u32(&b
, "lines", 0);
369 /* ugly ugly ugly ... we need a real reconnect logic */
371 struct ubus_request req
= { 0 };
373 ret
= ubus_lookup_id(ctx
, "log", &id
);
375 fprintf(stderr
, "Failed to find log object: %s\n", ubus_strerror(ret
));
380 logread_setup_output();
382 ubus_invoke_async(ctx
, id
, "read", b
.head
, &req
);
383 req
.fd_cb
= logread_fd_cb
;
384 ubus_complete_request_async(ctx
, &req
);
388 } while (logd_conn_tries
--);
393 if (log_follow
&& pid_file
)