xref: /freebsd/lib/libc/gen/syslog.3 (revision 4d846d26)
1.\" Copyright (c) 1985, 1991, 1993
2.\"	The Regents of the University of California.  All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\"    notice, this list of conditions and the following disclaimer.
9.\" 2. Redistributions in binary form must reproduce the above copyright
10.\"    notice, this list of conditions and the following disclaimer in the
11.\"    documentation and/or other materials provided with the distribution.
12.\" 3. Neither the name of the University nor the names of its contributors
13.\"    may be used to endorse or promote products derived from this software
14.\"    without specific prior written permission.
15.\"
16.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
17.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
20.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26.\" SUCH DAMAGE.
27.\"
28.\"     @(#)syslog.3	8.1 (Berkeley) 6/4/93
29.\" $FreeBSD$
30.\"
31.Dd May 13, 2021
32.Dt SYSLOG 3
33.Os
34.Sh NAME
35.Nm syslog ,
36.Nm vsyslog ,
37.Nm openlog ,
38.Nm closelog ,
39.Nm setlogmask
40.Nd control system log
41.Sh LIBRARY
42.Lb libc
43.Sh SYNOPSIS
44.In syslog.h
45.Ft void
46.Fn syslog "int priority" "const char *message" "..."
47.Ft void
48.Fn openlog "const char *ident" "int logopt" "int facility"
49.Ft void
50.Fn closelog void
51.Ft int
52.Fn setlogmask "int maskpri"
53.In syslog.h
54.In stdarg.h
55.Ft void
56.Fn vsyslog "int priority" "const char *message" "va_list args"
57.Sh DESCRIPTION
58The
59.Fn syslog
60function
61writes
62.Fa message
63to the system message logger.
64The message is then written to the system console, log files,
65logged-in users, or forwarded to other machines as appropriate.
66(See
67.Xr syslogd 8 . )
68.Pp
69The message is identical to a
70.Xr printf 3
71format string, except that
72.Ql %m
73is replaced by the current error
74message.
75(As denoted by the global variable
76.Va errno ;
77see
78.Xr strerror 3 . )
79A trailing newline is added if none is present.
80.Pp
81The
82.Fn vsyslog
83function
84is an alternate form in which the arguments have already been captured
85using the variable-length argument facilities of
86.Xr stdarg 3 .
87.Pp
88The message is tagged with
89.Fa priority .
90Priorities are encoded as a
91.Fa facility
92and a
93.Em level .
94The facility describes the part of the system
95generating the message.
96The level is selected from the following
97.Em ordered
98(high to low) list:
99.Bl -tag -width LOG_AUTHPRIV
100.It Dv LOG_EMERG
101A panic condition.
102This is normally broadcast to all users.
103.It Dv LOG_ALERT
104A condition that should be corrected immediately, such as a corrupted
105system database.
106.It Dv LOG_CRIT
107Critical conditions, e.g., hard device errors.
108.It Dv LOG_ERR
109Errors.
110.It Dv LOG_WARNING
111Warning messages.
112.It Dv LOG_NOTICE
113Conditions that are not error conditions,
114but should possibly be handled specially.
115.It Dv LOG_INFO
116Informational messages.
117.It Dv LOG_DEBUG
118Messages that contain information
119normally of use only when debugging a program.
120.El
121.Pp
122The
123.Fn openlog
124function
125provides for more specialized processing of the messages sent
126by
127.Fn syslog
128and
129.Fn vsyslog .
130The
131.Fa ident
132argument
133is a string that will be prepended to every message.
134The
135.Fa logopt
136argument
137is a bit field specifying logging options, which is formed by
138.Tn OR Ns 'ing
139one or more of the following values:
140.Bl -tag -width LOG_AUTHPRIV
141.It Dv LOG_CONS
142If
143.Fn syslog
144cannot pass the message to
145.Xr syslogd 8
146it will attempt to write the message to the console
147.Pq Dq Pa /dev/console .
148.It Dv LOG_NDELAY
149Open the connection to
150.Xr syslogd 8
151immediately.
152Normally the open is delayed until the first message is logged.
153Useful for programs that need to manage the order in which file
154descriptors are allocated.
155.It Dv LOG_PERROR
156Write the message to standard error output as well to the system log.
157.It Dv LOG_PID
158Log the process id with each message: useful for identifying
159instantiations of daemons.
160On
161.Fx ,
162this option is enabled by default and cannot be disabled.
163.El
164.Pp
165The
166.Fa facility
167argument encodes a default facility to be assigned to all messages
168that do not have an explicit facility encoded:
169.Bl -tag -width LOG_AUTHPRIV
170.It Dv LOG_AUTH
171The authorization system:
172.Xr login 1 ,
173.Xr su 1 ,
174.Xr getty 8 ,
175etc.
176.It Dv LOG_AUTHPRIV
177The same as
178.Dv LOG_AUTH ,
179but logged to a file readable only by
180selected individuals.
181.It Dv LOG_CONSOLE
182Messages written to
183.Pa /dev/console
184by the kernel console output driver.
185.It Dv LOG_CRON
186The cron daemon:
187.Xr cron 8 .
188.It Dv LOG_DAEMON
189System daemons, such as
190.Xr routed 8 ,
191that are not provided for explicitly by other facilities.
192.It Dv LOG_FTP
193The file transfer protocol daemons:
194.Xr ftpd 8 ,
195.Xr tftpd 8 .
196.It Dv LOG_KERN
197Messages generated by the kernel.
198These cannot be generated by any user processes.
199.It Dv LOG_LPR
200The line printer spooling system:
201.Xr lpr 1 ,
202.Xr lpc 8 ,
203.Xr lpd 8 ,
204etc.
205.It Dv LOG_MAIL
206The mail system.
207.It Dv LOG_NEWS
208The network news system.
209.It Dv LOG_NTP
210The network time protocol system.
211.It Dv LOG_SECURITY
212Security subsystems, such as
213.Xr ipfw 4 .
214.It Dv LOG_SYSLOG
215Messages generated internally by
216.Xr syslogd 8 .
217.It Dv LOG_USER
218Messages generated by random user processes.
219This is the default facility identifier if none is specified.
220.It Dv LOG_UUCP
221The uucp system.
222.It Dv LOG_LOCAL0
223Reserved for local use.
224Similarly for
225.Dv LOG_LOCAL1
226through
227.Dv LOG_LOCAL7 .
228.El
229.Pp
230The
231.Fn closelog
232function
233can be used to close the log file.
234.Pp
235The
236.Fn setlogmask
237function
238sets the log priority mask to
239.Fa maskpri
240and returns the previous mask.
241Calls to
242.Fn syslog
243with a priority not set in
244.Fa maskpri
245are rejected.
246The mask for an individual priority
247.Fa pri
248is calculated by the macro
249.Fn LOG_MASK pri ;
250the mask for all priorities up to and including
251.Fa toppri
252is given by the macro
253.Fn LOG_UPTO toppri ; .
254The default allows all priorities to be logged.
255.Sh RETURN VALUES
256The routines
257.Fn closelog ,
258.Fn openlog ,
259.Fn syslog
260and
261.Fn vsyslog
262return no value.
263.Pp
264The routine
265.Fn setlogmask
266always returns the previous log mask level.
267.Sh EXAMPLES
268.Bd -literal -offset indent -compact
269syslog(LOG_ALERT, "who: internal error 23");
270
271openlog("ftpd", LOG_PID | LOG_NDELAY, LOG_FTP);
272
273setlogmask(LOG_UPTO(LOG_ERR));
274
275syslog(LOG_INFO, "Connection from host %d", CallingHost);
276
277syslog(LOG_ERR|LOG_LOCAL2, "foobar error: %m");
278.Ed
279.Sh SEE ALSO
280.Xr logger 1 ,
281.Xr syslogd 8
282.Sh HISTORY
283These
284functions appeared in
285.Bx 4.2 .
286.Sh BUGS
287Never pass a string with user-supplied data as a format without using
288.Ql %s .
289An attacker can put format specifiers in the string to mangle your stack,
290leading to a possible security hole.
291This holds true even if the string was built using a function like
292.Fn snprintf ,
293as the resulting string may still contain user-supplied conversion specifiers
294for later interpolation by
295.Fn syslog .
296.Pp
297Always use the proper secure idiom:
298.Pp
299.Dl syslog(priority, \*q%s\*q, string);
300