1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45#include "libbb.h"
46#include "common_bufsiz.h"
47#include <sys/ipc.h>
48#include <sys/sem.h>
49#include <sys/shm.h>
50
51#define DEBUG 0
52
53
54enum { KEY_ID = 0x414e4547 };
55
56struct shbuf_ds {
57 int32_t size;
58 int32_t tail;
59 char data[1];
60};
61
62static const struct sembuf init_sem[3] = {
63 {0, -1, IPC_NOWAIT | SEM_UNDO},
64 {1, 0}, {0, +1, SEM_UNDO}
65};
66
67struct globals {
68 struct sembuf SMrup[1];
69 struct sembuf SMrdn[2];
70 struct shbuf_ds *shbuf;
71} FIX_ALIASING;
72#define G (*(struct globals*)bb_common_bufsiz1)
73#define SMrup (G.SMrup)
74#define SMrdn (G.SMrdn)
75#define shbuf (G.shbuf)
76#define INIT_G() do { \
77 setup_common_bufsiz(); \
78 memcpy(SMrup, init_sem, sizeof(init_sem)); \
79} while (0)
80
81#if 0
82static void error_exit(const char *str) NORETURN;
83static void error_exit(const char *str)
84{
85
86 shmdt(shbuf);
87 bb_perror_msg_and_die(str);
88}
89#else
90
91# define error_exit(str) bb_simple_perror_msg_and_die(str)
92#endif
93
94
95
96
97static void sem_up(int semid)
98{
99 if (semop(semid, SMrup, 1) == -1)
100 error_exit("semop[SMrup]");
101}
102
103static void interrupted(int sig)
104{
105
106 kill_myself_with_sig(sig);
107}
108
109int logread_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
110int logread_main(int argc UNUSED_PARAM, char **argv)
111{
112 unsigned cur;
113 int log_semid;
114 int log_shmid;
115 int follow = getopt32(argv, "fF");
116
117 INIT_G();
118
119 log_shmid = shmget(KEY_ID, 0, 0);
120 if (log_shmid == -1)
121 bb_perror_msg_and_die("can't %s syslogd buffer", "find");
122
123
124 shbuf = shmat(log_shmid, NULL, SHM_RDONLY);
125 if (shbuf == NULL)
126 bb_perror_msg_and_die("can't %s syslogd buffer", "access");
127
128 log_semid = semget(KEY_ID, 0, 0);
129 if (log_semid == -1)
130 error_exit("can't get access to semaphores for syslogd buffer");
131
132 bb_signals(BB_FATAL_SIGS, interrupted);
133
134
135
136 cur = shbuf->tail;
137
138
139 do {
140 unsigned shbuf_size;
141 unsigned shbuf_tail;
142 const char *shbuf_data;
143#if ENABLE_FEATURE_LOGREAD_REDUCED_LOCKING
144 int i;
145 int len_first_part;
146 int len_total = len_total;
147 char *copy = copy;
148#endif
149 if (semop(log_semid, SMrdn, 2) == -1)
150 error_exit("semop[SMrdn]");
151
152
153 shbuf_size = shbuf->size;
154 shbuf_tail = shbuf->tail;
155 shbuf_data = shbuf->data;
156
157 if (DEBUG)
158 printf("cur:%u tail:%u size:%u\n",
159 cur, shbuf_tail, shbuf_size);
160
161 if (!(follow & 1)) {
162
163
164
165 follow >>= 1;
166
167
168
169 cur += strlen(shbuf_data + cur);
170 if (cur >= shbuf_size) {
171 cur = strnlen(shbuf_data, shbuf_tail);
172 if (cur == shbuf_tail)
173 goto unlock;
174 }
175
176 cur++;
177 if (cur >= shbuf_size)
178 cur = 0;
179 } else {
180 if (cur == shbuf_tail) {
181 sem_up(log_semid);
182 fflush_all();
183 sleep1();
184 continue;
185 }
186 }
187
188
189#if ENABLE_FEATURE_LOGREAD_REDUCED_LOCKING
190 len_first_part = len_total = shbuf_tail - cur;
191 if (len_total < 0) {
192
193
194
195 len_total += shbuf_size;
196 }
197 copy = xmalloc(len_total + 1);
198 if (len_first_part < 0) {
199
200 len_first_part = shbuf_size - cur;
201 memcpy(copy + len_first_part, shbuf_data, shbuf_tail);
202 }
203 memcpy(copy, shbuf_data + cur, len_first_part);
204 copy[len_total] = '\0';
205 cur = shbuf_tail;
206#else
207 while (cur != shbuf_tail) {
208 fputs_stdout(shbuf_data + cur);
209 cur += strlen(shbuf_data + cur) + 1;
210 if (cur >= shbuf_size)
211 cur = 0;
212 }
213#endif
214 unlock:
215
216 sem_up(log_semid);
217
218#if ENABLE_FEATURE_LOGREAD_REDUCED_LOCKING
219 for (i = 0; i < len_total; i += strlen(copy + i) + 1) {
220 fputs_stdout(copy + i);
221 }
222 free(copy);
223#endif
224 fflush_all();
225 } while (follow);
226
227
228
229 fflush_stdout_and_exit(EXIT_SUCCESS);
230}
231