1 /* $NetBSD: syslogd.c,v 1.65 2004/03/06 20:29:25 itojun Exp $ */ 2 3 /* 4 * Copyright (c) 1983, 1988, 1993, 1994 5 * The Regents of the University of California. All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 3. Neither the name of the University nor the names of its contributors 16 * may be used to endorse or promote products derived from this software 17 * without specific prior written permission. 18 * 19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 22 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 29 * SUCH DAMAGE. 30 */ 31 32 #include <sys/cdefs.h> 33 #ifndef lint 34 __COPYRIGHT("@(#) Copyright (c) 1983, 1988, 1993, 1994\n\ 35 The Regents of the University of California. All rights reserved.\n"); 36 #endif /* not lint */ 37 38 #ifndef lint 39 #if 0 40 static char sccsid[] = "@(#)syslogd.c 8.3 (Berkeley) 4/4/94"; 41 #else 42 __RCSID("$NetBSD: syslogd.c,v 1.65 2004/03/06 20:29:25 itojun Exp $"); 43 #endif 44 #endif /* not lint */ 45 46 /* 47 * syslogd -- log system messages 48 * 49 * This program implements a system log. It takes a series of lines. 50 * Each line may have a priority, signified as "<n>" as 51 * the first characters of the line. If this is 52 * not present, a default priority is used. 53 * 54 * To kill syslogd, send a signal 15 (terminate). A signal 1 (hup) will 55 * cause it to reread its configuration file. 56 * 57 * Defined Constants: 58 * 59 * MAXLINE -- the maximimum line length that can be handled. 60 * DEFUPRI -- the default priority for user messages 61 * DEFSPRI -- the default priority for kernel messages 62 * 63 * Author: Eric Allman 64 * extensive changes by Ralph Campbell 65 * more extensive changes by Eric Allman (again) 66 */ 67 68 #define MAXLINE 1024 /* maximum line length */ 69 #define MAXSVLINE 120 /* maximum saved line length */ 70 #define DEFUPRI (LOG_USER|LOG_NOTICE) 71 #define DEFSPRI (LOG_KERN|LOG_CRIT) 72 #define TIMERINTVL 30 /* interval for checking flush, mark */ 73 #define TTYMSGTIME 1 /* timeout passed to ttymsg */ 74 75 #include <sys/param.h> 76 #include <sys/socket.h> 77 #include <sys/sysctl.h> 78 #include <sys/types.h> 79 #include <sys/un.h> 80 #include <sys/wait.h> 81 82 #include <netinet/in.h> 83 84 #include <ctype.h> 85 #include <errno.h> 86 #include <fcntl.h> 87 #include <grp.h> 88 #include <locale.h> 89 #include <netdb.h> 90 #include <poll.h> 91 #include <pwd.h> 92 #include <signal.h> 93 #include <stdarg.h> 94 #include <stdio.h> 95 #include <stdlib.h> 96 #include <string.h> 97 #include <unistd.h> 98 #include <util.h> 99 100 #include "utmpentry.h" 101 #include "pathnames.h" 102 103 #define SYSLOG_NAMES 104 #include <sys/syslog.h> 105 106 #ifdef LIBWRAP 107 #include <tcpd.h> 108 109 int allow_severity = LOG_AUTH|LOG_INFO; 110 int deny_severity = LOG_AUTH|LOG_WARNING; 111 #endif 112 113 char *ConfFile = _PATH_LOGCONF; 114 char ctty[] = _PATH_CONSOLE; 115 116 #define FDMASK(fd) (1 << (fd)) 117 118 #define dprintf if (Debug) printf 119 120 #define MAXUNAMES 20 /* maximum number of user names */ 121 122 /* 123 * Flags to logmsg(). 124 */ 125 126 #define IGN_CONS 0x001 /* don't print on console */ 127 #define SYNC_FILE 0x002 /* do fsync on file after printing */ 128 #define ADDDATE 0x004 /* add a date to the message */ 129 #define MARK 0x008 /* this message is a mark */ 130 131 /* 132 * This structure represents the files that will have log 133 * copies printed. 134 */ 135 136 struct filed { 137 struct filed *f_next; /* next in linked list */ 138 short f_type; /* entry type, see below */ 139 short f_file; /* file descriptor */ 140 time_t f_time; /* time this was last written */ 141 u_char f_pmask[LOG_NFACILITIES+1]; /* priority mask */ 142 union { 143 char f_uname[MAXUNAMES][UT_NAMESIZE+1]; 144 struct { 145 char f_hname[MAXHOSTNAMELEN+1]; 146 struct addrinfo *f_addr; 147 } f_forw; /* forwarding address */ 148 char f_fname[MAXPATHLEN]; 149 } f_un; 150 char f_prevline[MAXSVLINE]; /* last message logged */ 151 char f_lasttime[16]; /* time of last occurrence */ 152 char f_prevhost[MAXHOSTNAMELEN+1]; /* host from which recd. */ 153 int f_prevpri; /* pri of f_prevline */ 154 int f_prevlen; /* length of f_prevline */ 155 int f_prevcount; /* repetition cnt of prevline */ 156 int f_repeatcount; /* number of "repeated" msgs */ 157 }; 158 159 /* 160 * Intervals at which we flush out "message repeated" messages, 161 * in seconds after previous message is logged. After each flush, 162 * we move to the next interval until we reach the largest. 163 */ 164 int repeatinterval[] = { 30, 120, 600 }; /* # of secs before flush */ 165 #define MAXREPEAT ((sizeof(repeatinterval) / sizeof(repeatinterval[0])) - 1) 166 #define REPEATTIME(f) ((f)->f_time + repeatinterval[(f)->f_repeatcount]) 167 #define BACKOFF(f) { if (++(f)->f_repeatcount > MAXREPEAT) \ 168 (f)->f_repeatcount = MAXREPEAT; \ 169 } 170 171 /* values for f_type */ 172 #define F_UNUSED 0 /* unused entry */ 173 #define F_FILE 1 /* regular file */ 174 #define F_TTY 2 /* terminal */ 175 #define F_CONSOLE 3 /* console terminal */ 176 #define F_FORW 4 /* remote machine */ 177 #define F_USERS 5 /* list of users */ 178 #define F_WALL 6 /* everyone logged on */ 179 180 char *TypeNames[7] = { 181 "UNUSED", "FILE", "TTY", "CONSOLE", 182 "FORW", "USERS", "WALL" 183 }; 184 185 struct filed *Files; 186 struct filed consfile; 187 188 int Debug; /* debug flag */ 189 int daemonized = 0; /* we are not daemonized yet */ 190 char LocalHostName[MAXHOSTNAMELEN+1]; /* our hostname */ 191 char *LocalDomain; /* our local domain name */ 192 int *finet = NULL; /* Internet datagram sockets */ 193 int Initialized = 0; /* set when we have initialized ourselves */ 194 int MarkInterval = 20 * 60; /* interval between marks in seconds */ 195 int MarkSeq = 0; /* mark sequence number */ 196 int SecureMode = 0; /* listen only on unix domain socks */ 197 int UseNameService = 1; /* make domain name queries */ 198 int NumForwards = 0; /* number of forwarding actions in conf file */ 199 char **LogPaths; /* array of pathnames to read messages from */ 200 int NoRepeat = 0; /* disable "repeated"; log always */ 201 volatile sig_atomic_t gothup = 0; /* got SIGHUP */ 202 203 void cfline(char *, struct filed *); 204 char *cvthname(struct sockaddr_storage *); 205 int decode(const char *, CODE *); 206 void die(int); 207 void domark(int); 208 void fprintlog(struct filed *, int, char *); 209 int getmsgbufsize(void); 210 int* socksetup(int); 211 void init(void); 212 void logerror(const char *, ...); 213 void logmsg(int, char *, char *, int); 214 void printline(char *, char *); 215 void printsys(char *); 216 void sighup(int); 217 void reapchild(int); 218 void usage(void); 219 void wallmsg(struct filed *, struct iovec *); 220 int main(int, char *[]); 221 void logpath_add(char ***, int *, int *, char *); 222 void logpath_fileadd(char ***, int *, int *, char *); 223 224 int 225 main(int argc, char *argv[]) 226 { 227 int ch, *funix, i, j, fklog, len, linesize; 228 int *nfinetix, nfklogix, nfunixbaseix, nfds; 229 int funixsize = 0, funixmaxsize = 0; 230 struct sockaddr_un sunx, fromunix; 231 struct sockaddr_storage frominet; 232 char *p, *line, **pp; 233 struct pollfd *readfds; 234 uid_t uid = 0; 235 gid_t gid = 0; 236 char *user = NULL; 237 char *group = NULL; 238 char *root = "/"; 239 char *endp; 240 struct group *gr; 241 struct passwd *pw; 242 unsigned long l; 243 244 (void)setlocale(LC_ALL, ""); 245 246 while ((ch = getopt(argc, argv, "dnsf:m:p:P:ru:g:t:")) != -1) 247 switch(ch) { 248 case 'd': /* debug */ 249 Debug++; 250 break; 251 case 'f': /* configuration file */ 252 ConfFile = optarg; 253 break; 254 case 'g': 255 group = optarg; 256 if (*group == '\0') 257 usage(); 258 break; 259 case 'm': /* mark interval */ 260 MarkInterval = atoi(optarg) * 60; 261 break; 262 case 'n': /* turn off DNS queries */ 263 UseNameService = 0; 264 break; 265 case 'p': /* path */ 266 logpath_add(&LogPaths, &funixsize, 267 &funixmaxsize, optarg); 268 break; 269 case 'P': /* file of paths */ 270 logpath_fileadd(&LogPaths, &funixsize, 271 &funixmaxsize, optarg); 272 break; 273 case 'r': /* disable "repeated" compression */ 274 NoRepeat++; 275 break; 276 case 's': /* no network listen mode */ 277 SecureMode++; 278 break; 279 case 't': 280 root = optarg; 281 if (*root == '\0') 282 usage(); 283 break; 284 case 'u': 285 user = optarg; 286 if (*user == '\0') 287 usage(); 288 break; 289 default: 290 usage(); 291 } 292 if ((argc -= optind) != 0) 293 usage(); 294 295 setlinebuf(stdout); 296 297 if (user != NULL) { 298 if (isdigit((unsigned char)*user)) { 299 errno = 0; 300 endp = NULL; 301 l = strtoul(user, &endp, 0); 302 if (errno || *endp != '\0') 303 goto getuser; 304 uid = (uid_t)l; 305 if (uid != l) { 306 errno = 0; 307 logerror("UID out of range"); 308 die(0); 309 } 310 } else { 311 getuser: 312 if ((pw = getpwnam(user)) != NULL) { 313 uid = pw->pw_uid; 314 } else { 315 errno = 0; 316 logerror("Cannot find user `%s'", user); 317 die (0); 318 } 319 } 320 } 321 322 if (group != NULL) { 323 if (isdigit((unsigned char)*group)) { 324 errno = 0; 325 endp = NULL; 326 l = strtoul(group, &endp, 0); 327 if (errno || *endp != '\0') 328 goto getgroup; 329 gid = (gid_t)l; 330 if (gid != l) { 331 errno = 0; 332 logerror("GID out of range"); 333 die(0); 334 } 335 } else { 336 getgroup: 337 if ((gr = getgrnam(group)) != NULL) { 338 gid = gr->gr_gid; 339 } else { 340 errno = 0; 341 logerror("Cannot find group `%s'", group); 342 die(0); 343 } 344 } 345 } 346 347 if (access (root, F_OK | R_OK)) { 348 logerror("Cannot access `%s'", root); 349 die (0); 350 } 351 352 consfile.f_type = F_CONSOLE; 353 (void)strlcpy(consfile.f_un.f_fname, ctty, 354 sizeof(consfile.f_un.f_fname)); 355 (void)gethostname(LocalHostName, sizeof(LocalHostName)); 356 LocalHostName[sizeof(LocalHostName) - 1] = '\0'; 357 if ((p = strchr(LocalHostName, '.')) != NULL) { 358 *p++ = '\0'; 359 LocalDomain = p; 360 } else 361 LocalDomain = ""; 362 linesize = getmsgbufsize(); 363 if (linesize < MAXLINE) 364 linesize = MAXLINE; 365 linesize++; 366 line = malloc(linesize); 367 if (line == NULL) { 368 logerror("Couldn't allocate line buffer"); 369 die(0); 370 } 371 (void)signal(SIGTERM, die); 372 (void)signal(SIGINT, Debug ? die : SIG_IGN); 373 (void)signal(SIGQUIT, Debug ? die : SIG_IGN); 374 (void)signal(SIGCHLD, reapchild); 375 (void)signal(SIGALRM, domark); 376 (void)alarm(TIMERINTVL); 377 378 #ifndef SUN_LEN 379 #define SUN_LEN(unp) (strlen((unp)->sun_path) + 2) 380 #endif 381 if (funixsize == 0) 382 logpath_add(&LogPaths, &funixsize, 383 &funixmaxsize, _PATH_LOG); 384 funix = (int *)malloc(sizeof(int) * funixsize); 385 if (funix == NULL) { 386 logerror("Couldn't allocate funix descriptors"); 387 die(0); 388 } 389 for (j = 0, pp = LogPaths; *pp; pp++, j++) { 390 dprintf("Making unix dgram socket `%s'\n", *pp); 391 unlink(*pp); 392 memset(&sunx, 0, sizeof(sunx)); 393 sunx.sun_family = AF_LOCAL; 394 (void)strncpy(sunx.sun_path, *pp, sizeof(sunx.sun_path)); 395 funix[j] = socket(AF_LOCAL, SOCK_DGRAM, 0); 396 if (funix[j] < 0 || bind(funix[j], 397 (struct sockaddr *)&sunx, SUN_LEN(&sunx)) < 0 || 398 chmod(*pp, 0666) < 0) { 399 logerror("Cannot create `%s'", *pp); 400 die(0); 401 } 402 dprintf("Listening on unix dgram socket `%s'\n", *pp); 403 } 404 405 init(); 406 407 if ((fklog = open(_PATH_KLOG, O_RDONLY, 0)) < 0) { 408 dprintf("Can't open `%s' (%d)\n", _PATH_KLOG, errno); 409 } else { 410 dprintf("Listening on kernel log `%s'\n", _PATH_KLOG); 411 } 412 413 dprintf("Off & running....\n"); 414 415 (void)signal(SIGHUP, sighup); 416 417 /* setup pollfd set. */ 418 readfds = (struct pollfd *)malloc(sizeof(struct pollfd) * 419 (funixsize + (finet ? *finet : 0) + 1)); 420 if (readfds == NULL) { 421 logerror("Couldn't allocate pollfds"); 422 die(0); 423 } 424 nfds = 0; 425 if (fklog >= 0) { 426 nfklogix = nfds++; 427 readfds[nfklogix].fd = fklog; 428 readfds[nfklogix].events = POLLIN | POLLPRI; 429 } 430 if (finet && !SecureMode) { 431 nfinetix = malloc(*finet * sizeof(*nfinetix)); 432 for (j = 0; j < *finet; j++) { 433 nfinetix[j] = nfds++; 434 readfds[nfinetix[j]].fd = finet[j+1]; 435 readfds[nfinetix[j]].events = POLLIN | POLLPRI; 436 } 437 } 438 nfunixbaseix = nfds; 439 for (j = 0, pp = LogPaths; *pp; pp++) { 440 readfds[nfds].fd = funix[j++]; 441 readfds[nfds++].events = POLLIN | POLLPRI; 442 } 443 444 /* 445 * All files are open, we can drop privileges and chroot 446 */ 447 dprintf("Attempt to chroot to `%s'\n", root); 448 if (chroot(root)) { 449 logerror("Failed to chroot to `%s'", root); 450 die(0); 451 } 452 dprintf("Attempt to set GID/EGID to `%d'\n", gid); 453 if (setgid(gid) || setegid(gid)) { 454 logerror("Failed to set gid to `%d'", gid); 455 die(0); 456 } 457 dprintf("Attempt to set UID/EUID to `%d'\n", uid); 458 if (setuid(uid) || seteuid(uid)) { 459 logerror("Failed to set uid to `%d'", uid); 460 die(0); 461 } 462 463 /* 464 * We cannot detach from the terminal before we are sure we won't 465 * have a fatal error, because error message would not go to the 466 * terminal and would not be logged because syslogd dies. 467 * All die() calls are behind us, we can call daemon() 468 */ 469 if (!Debug) { 470 (void)daemon(0, 0); 471 daemonized = 1; 472 473 /* tuck my process id away, if i'm not in debug mode */ 474 pidfile(NULL); 475 } 476 477 for (;;) { 478 int rv; 479 480 rv = poll(readfds, nfds, INFTIM); 481 if (rv == 0) 482 continue; 483 if (rv < 0) { 484 if (errno != EINTR) 485 logerror("poll() failed"); 486 if (gothup) { 487 init(); 488 gothup = 0; 489 } 490 continue; 491 } 492 dprintf("Got a message (%d)\n", rv); 493 if (fklog >= 0 && 494 (readfds[nfklogix].revents & (POLLIN | POLLPRI))) { 495 dprintf("Kernel log active\n"); 496 i = read(fklog, line, linesize - 1); 497 if (i > 0) { 498 line[i] = '\0'; 499 printsys(line); 500 } else if (i < 0 && errno != EINTR) { 501 logerror("klog failed"); 502 fklog = -1; 503 } 504 } 505 for (j = 0, pp = LogPaths; *pp; pp++, j++) { 506 if ((readfds[nfunixbaseix + j].revents & 507 (POLLIN | POLLPRI)) == 0) 508 continue; 509 510 dprintf("Unix socket (%s) active\n", *pp); 511 len = sizeof(fromunix); 512 i = recvfrom(funix[j], line, MAXLINE, 0, 513 (struct sockaddr *)&fromunix, &len); 514 if (i > 0) { 515 line[i] = '\0'; 516 printline(LocalHostName, line); 517 } else if (i < 0 && errno != EINTR) { 518 logerror("recvfrom() unix `%s'", *pp); 519 } 520 } 521 if (finet && !SecureMode) { 522 for (j = 0; j < *finet; j++) { 523 if (readfds[nfinetix[j]].revents & 524 (POLLIN | POLLPRI)) { 525 #ifdef LIBWRAP 526 struct request_info req; 527 #endif 528 int reject = 0; 529 530 dprintf("inet socket active\n"); 531 532 #ifdef LIBWRAP 533 request_init(&req, RQ_DAEMON, "syslogd", 534 RQ_FILE, finet[j + 1], NULL); 535 fromhost(&req); 536 reject = !hosts_access(&req); 537 if (reject) 538 dprintf("access denied\n"); 539 #endif 540 541 len = sizeof(frominet); 542 i = recvfrom(finet[j+1], line, MAXLINE, 543 0, (struct sockaddr *)&frominet, 544 &len); 545 if (i == 0 || (i < 0 && errno == EINTR)) 546 continue; 547 else if (i < 0) { 548 logerror("recvfrom inet"); 549 continue; 550 } 551 552 line[i] = '\0'; 553 if (!reject) 554 printline(cvthname(&frominet), 555 line); 556 } 557 } 558 } 559 } 560 } 561 562 void 563 usage(void) 564 { 565 566 (void)fprintf(stderr, 567 "usage: %s [-dnrs] [-f config_file] [-g group] [-m mark_interval]\n" 568 "\t[-P file_list] [-p log_socket [-p log_socket2 ...]]\n" 569 "\t[-t chroot_dir] [-u user]\n", getprogname()); 570 exit(1); 571 } 572 573 /* 574 * given a pointer to an array of char *'s, a pointer to it's current 575 * size and current allocated max size, and a new char * to add, add 576 * it, update everything as necessary, possibly allocating a new array 577 */ 578 void 579 logpath_add(char ***lp, int *szp, int *maxszp, char *new) 580 { 581 char **nlp; 582 int newmaxsz; 583 584 dprintf("Adding `%s' to the %p logpath list\n", new, *lp); 585 if (*szp == *maxszp) { 586 if (*maxszp == 0) { 587 newmaxsz = 4; /* start of with enough for now */ 588 *lp = NULL; 589 } else 590 newmaxsz = *maxszp * 2; 591 nlp = realloc(*lp, sizeof(char *) * (newmaxsz + 1)); 592 if (nlp == NULL) { 593 logerror("Couldn't allocate line buffer"); 594 die(0); 595 } 596 *lp = nlp; 597 *maxszp = newmaxsz; 598 } 599 if (((*lp)[(*szp)++] = strdup(new)) == NULL) { 600 logerror("Couldn't allocate logpath"); 601 die(0); 602 } 603 (*lp)[(*szp)] = NULL; /* always keep it NULL terminated */ 604 } 605 606 /* do a file of log sockets */ 607 void 608 logpath_fileadd(char ***lp, int *szp, int *maxszp, char *file) 609 { 610 FILE *fp; 611 char *line; 612 size_t len; 613 614 fp = fopen(file, "r"); 615 if (fp == NULL) { 616 logerror("Could not open socket file list `%s'", file); 617 die(0); 618 } 619 620 while ((line = fgetln(fp, &len))) { 621 line[len - 1] = 0; 622 logpath_add(lp, szp, maxszp, line); 623 } 624 fclose(fp); 625 } 626 627 /* 628 * Take a raw input line, decode the message, and print the message 629 * on the appropriate log files. 630 */ 631 void 632 printline(char *hname, char *msg) 633 { 634 int c, pri; 635 char *p, *q, line[MAXLINE + 1]; 636 637 /* test for special codes */ 638 pri = DEFUPRI; 639 p = msg; 640 if (*p == '<') { 641 pri = 0; 642 while (isdigit(*++p)) 643 pri = 10 * pri + (*p - '0'); 644 if (*p == '>') 645 ++p; 646 } 647 if (pri &~ (LOG_FACMASK|LOG_PRIMASK)) 648 pri = DEFUPRI; 649 650 /* don't allow users to log kernel messages */ 651 if (LOG_FAC(pri) == LOG_KERN) 652 pri = LOG_MAKEPRI(LOG_USER, LOG_PRI(pri)); 653 654 q = line; 655 656 while ((c = *p++) != '\0' && 657 q < &line[sizeof(line) - 2]) { 658 c &= 0177; 659 if (iscntrl(c)) 660 if (c == '\n') 661 *q++ = ' '; 662 else if (c == '\t') 663 *q++ = '\t'; 664 else { 665 *q++ = '^'; 666 *q++ = c ^ 0100; 667 } 668 else 669 *q++ = c; 670 } 671 *q = '\0'; 672 673 logmsg(pri, line, hname, 0); 674 } 675 676 /* 677 * Take a raw input line from /dev/klog, split and format similar to syslog(). 678 */ 679 void 680 printsys(char *msg) 681 { 682 int c, pri, flags; 683 char *lp, *p, *q, line[MAXLINE + 1]; 684 685 (void)strlcpy(line, _PATH_UNIX, sizeof(line)); 686 (void)strlcat(line, ": ", sizeof(line)); 687 lp = line + strlen(line); 688 for (p = msg; *p != '\0'; ) { 689 flags = SYNC_FILE | ADDDATE; /* fsync file after write */ 690 pri = DEFSPRI; 691 if (*p == '<') { 692 pri = 0; 693 while (isdigit(*++p)) 694 pri = 10 * pri + (*p - '0'); 695 if (*p == '>') 696 ++p; 697 } else { 698 /* kernel printf's come out on console */ 699 flags |= IGN_CONS; 700 } 701 if (pri &~ (LOG_FACMASK|LOG_PRIMASK)) 702 pri = DEFSPRI; 703 q = lp; 704 while (*p != '\0' && (c = *p++) != '\n' && 705 q < &line[MAXLINE]) 706 *q++ = c; 707 *q = '\0'; 708 logmsg(pri, line, LocalHostName, flags); 709 } 710 } 711 712 time_t now; 713 714 /* 715 * Log a message to the appropriate log files, users, etc. based on 716 * the priority. 717 */ 718 void 719 logmsg(int pri, char *msg, char *from, int flags) 720 { 721 struct filed *f; 722 int fac, msglen, omask, prilev; 723 char *timestamp; 724 725 dprintf("logmsg: pri 0%o, flags 0x%x, from %s, msg %s\n", 726 pri, flags, from, msg); 727 728 omask = sigblock(sigmask(SIGHUP)|sigmask(SIGALRM)); 729 730 /* 731 * Check to see if msg looks non-standard. 732 */ 733 msglen = strlen(msg); 734 if (msglen < 16 || msg[3] != ' ' || msg[6] != ' ' || 735 msg[9] != ':' || msg[12] != ':' || msg[15] != ' ') 736 flags |= ADDDATE; 737 738 (void)time(&now); 739 if (flags & ADDDATE) 740 timestamp = ctime(&now) + 4; 741 else { 742 timestamp = msg; 743 msg += 16; 744 msglen -= 16; 745 } 746 747 /* extract facility and priority level */ 748 if (flags & MARK) 749 fac = LOG_NFACILITIES; 750 else 751 fac = LOG_FAC(pri); 752 prilev = LOG_PRI(pri); 753 754 /* log the message to the particular outputs */ 755 if (!Initialized) { 756 f = &consfile; 757 f->f_file = open(ctty, O_WRONLY, 0); 758 759 if (f->f_file >= 0) { 760 fprintlog(f, flags, msg); 761 (void)close(f->f_file); 762 } 763 (void)sigsetmask(omask); 764 return; 765 } 766 for (f = Files; f; f = f->f_next) { 767 /* skip messages that are incorrect priority */ 768 if (f->f_pmask[fac] < prilev || 769 f->f_pmask[fac] == INTERNAL_NOPRI) 770 continue; 771 772 if (f->f_type == F_CONSOLE && (flags & IGN_CONS)) 773 continue; 774 775 /* don't output marks to recently written files */ 776 if ((flags & MARK) && (now - f->f_time) < MarkInterval / 2) 777 continue; 778 779 /* 780 * suppress duplicate lines to this file unless NoRepeat 781 */ 782 if ((flags & MARK) == 0 && msglen == f->f_prevlen && 783 !NoRepeat && 784 !strcmp(msg, f->f_prevline) && 785 !strcmp(from, f->f_prevhost)) { 786 (void)strncpy(f->f_lasttime, timestamp, 15); 787 f->f_prevcount++; 788 dprintf("Msg repeated %d times, %ld sec of %d\n", 789 f->f_prevcount, (long)(now - f->f_time), 790 repeatinterval[f->f_repeatcount]); 791 /* 792 * If domark would have logged this by now, 793 * flush it now (so we don't hold isolated messages), 794 * but back off so we'll flush less often 795 * in the future. 796 */ 797 if (now > REPEATTIME(f)) { 798 fprintlog(f, flags, (char *)NULL); 799 BACKOFF(f); 800 } 801 } else { 802 /* new line, save it */ 803 if (f->f_prevcount) 804 fprintlog(f, 0, (char *)NULL); 805 f->f_repeatcount = 0; 806 f->f_prevpri = pri; 807 (void)strncpy(f->f_lasttime, timestamp, 15); 808 (void)strncpy(f->f_prevhost, from, 809 sizeof(f->f_prevhost)); 810 if (msglen < MAXSVLINE) { 811 f->f_prevlen = msglen; 812 (void)strlcpy(f->f_prevline, msg, 813 sizeof(f->f_prevline)); 814 fprintlog(f, flags, (char *)NULL); 815 } else { 816 f->f_prevline[0] = 0; 817 f->f_prevlen = 0; 818 fprintlog(f, flags, msg); 819 } 820 } 821 } 822 (void)sigsetmask(omask); 823 } 824 825 void 826 fprintlog(struct filed *f, int flags, char *msg) 827 { 828 struct iovec iov[6]; 829 struct iovec *v; 830 struct addrinfo *r; 831 int j, l, lsent; 832 char line[MAXLINE + 1], repbuf[80], greetings[200]; 833 834 v = iov; 835 if (f->f_type == F_WALL) { 836 v->iov_base = greetings; 837 v->iov_len = snprintf(greetings, sizeof greetings, 838 "\r\n\7Message from syslogd@%s at %.24s ...\r\n", 839 f->f_prevhost, ctime(&now)); 840 v++; 841 v->iov_base = ""; 842 v->iov_len = 0; 843 v++; 844 } else { 845 v->iov_base = f->f_lasttime; 846 v->iov_len = 15; 847 v++; 848 v->iov_base = " "; 849 v->iov_len = 1; 850 v++; 851 } 852 v->iov_base = f->f_prevhost; 853 v->iov_len = strlen(v->iov_base); 854 v++; 855 v->iov_base = " "; 856 v->iov_len = 1; 857 v++; 858 859 if (msg) { 860 v->iov_base = msg; 861 v->iov_len = strlen(msg); 862 } else if (f->f_prevcount > 1) { 863 v->iov_base = repbuf; 864 v->iov_len = snprintf(repbuf, sizeof repbuf, 865 "last message repeated %d times", f->f_prevcount); 866 } else { 867 v->iov_base = f->f_prevline; 868 v->iov_len = f->f_prevlen; 869 } 870 v++; 871 872 dprintf("Logging to %s", TypeNames[f->f_type]); 873 f->f_time = now; 874 875 switch (f->f_type) { 876 case F_UNUSED: 877 dprintf("\n"); 878 break; 879 880 case F_FORW: 881 dprintf(" %s\n", f->f_un.f_forw.f_hname); 882 /* 883 * check for local vs remote messages 884 * (from FreeBSD PR#bin/7055) 885 */ 886 if (strcmp(f->f_prevhost, LocalHostName)) { 887 l = snprintf(line, sizeof(line) - 1, 888 "<%d>%.15s [%s]: %s", 889 f->f_prevpri, (char *) iov[0].iov_base, 890 f->f_prevhost, (char *) iov[4].iov_base); 891 } else { 892 l = snprintf(line, sizeof(line) - 1, "<%d>%.15s %s", 893 f->f_prevpri, (char *) iov[0].iov_base, 894 (char *) iov[4].iov_base); 895 } 896 if (l > MAXLINE) 897 l = MAXLINE; 898 if (finet) { 899 for (r = f->f_un.f_forw.f_addr; r; r = r->ai_next) { 900 for (j = 0; j < *finet; j++) { 901 #if 0 902 /* 903 * should we check AF first, or just 904 * trial and error? FWD 905 */ 906 if (r->ai_family == 907 address_family_of(finet[j+1])) 908 #endif 909 lsent = sendto(finet[j+1], line, l, 0, 910 r->ai_addr, r->ai_addrlen); 911 if (lsent == l) 912 break; 913 } 914 } 915 if (lsent != l) { 916 f->f_type = F_UNUSED; 917 logerror("sendto() failed"); 918 } 919 } 920 break; 921 922 case F_CONSOLE: 923 if (flags & IGN_CONS) { 924 dprintf(" (ignored)\n"); 925 break; 926 } 927 /* FALLTHROUGH */ 928 929 case F_TTY: 930 case F_FILE: 931 dprintf(" %s\n", f->f_un.f_fname); 932 if (f->f_type != F_FILE) { 933 v->iov_base = "\r\n"; 934 v->iov_len = 2; 935 } else { 936 v->iov_base = "\n"; 937 v->iov_len = 1; 938 } 939 again: 940 if (writev(f->f_file, iov, 6) < 0) { 941 int e = errno; 942 (void)close(f->f_file); 943 /* 944 * Check for errors on TTY's due to loss of tty 945 */ 946 if ((e == EIO || e == EBADF) && f->f_type != F_FILE) { 947 f->f_file = open(f->f_un.f_fname, 948 O_WRONLY|O_APPEND, 0); 949 if (f->f_file < 0) { 950 f->f_type = F_UNUSED; 951 logerror(f->f_un.f_fname); 952 } else 953 goto again; 954 } else { 955 f->f_type = F_UNUSED; 956 errno = e; 957 logerror(f->f_un.f_fname); 958 } 959 } else if (flags & SYNC_FILE) 960 (void)fsync(f->f_file); 961 break; 962 963 case F_USERS: 964 case F_WALL: 965 dprintf("\n"); 966 v->iov_base = "\r\n"; 967 v->iov_len = 2; 968 wallmsg(f, iov); 969 break; 970 } 971 f->f_prevcount = 0; 972 } 973 974 /* 975 * WALLMSG -- Write a message to the world at large 976 * 977 * Write the specified message to either the entire 978 * world, or a list of approved users. 979 */ 980 void 981 wallmsg(struct filed *f, struct iovec *iov) 982 { 983 static int reenter; /* avoid calling ourselves */ 984 int i; 985 char *p; 986 static struct utmpentry *ohead = NULL; 987 struct utmpentry *ep; 988 989 if (reenter++) 990 return; 991 992 (void)getutentries(NULL, &ep); 993 if (ep != ohead) { 994 freeutentries(ohead); 995 ohead = ep; 996 } 997 /* NOSTRICT */ 998 for (; ep; ep = ep->next) { 999 if (f->f_type == F_WALL) { 1000 if ((p = ttymsg(iov, 6, ep->line, TTYMSGTIME)) 1001 != NULL) { 1002 errno = 0; /* already in msg */ 1003 logerror(p); 1004 } 1005 continue; 1006 } 1007 /* should we send the message to this user? */ 1008 for (i = 0; i < MAXUNAMES; i++) { 1009 if (!f->f_un.f_uname[i][0]) 1010 break; 1011 if (strcmp(f->f_un.f_uname[i], ep->name) == 0) { 1012 if ((p = ttymsg(iov, 6, ep->line, TTYMSGTIME)) 1013 != NULL) { 1014 errno = 0; /* already in msg */ 1015 logerror(p); 1016 } 1017 break; 1018 } 1019 } 1020 } 1021 reenter = 0; 1022 } 1023 1024 void 1025 sighup(int signo) 1026 { 1027 1028 gothup = 1; 1029 } 1030 1031 void 1032 reapchild(int signo) 1033 { 1034 union wait status; 1035 1036 while (wait3((int *)&status, WNOHANG, (struct rusage *)NULL) > 0) 1037 ; 1038 } 1039 1040 /* 1041 * Return a printable representation of a host address. 1042 */ 1043 char * 1044 cvthname(struct sockaddr_storage *f) 1045 { 1046 int error; 1047 char *p; 1048 const int niflag = NI_DGRAM; 1049 static char host[NI_MAXHOST], ip[NI_MAXHOST]; 1050 1051 error = getnameinfo((struct sockaddr*)f, ((struct sockaddr*)f)->sa_len, 1052 ip, sizeof ip, NULL, 0, NI_NUMERICHOST|niflag); 1053 1054 dprintf("cvthname(%s)\n", ip); 1055 1056 if (error) { 1057 dprintf("Malformed from address %s\n", gai_strerror(error)); 1058 return ("???"); 1059 } 1060 1061 if (!UseNameService) 1062 return (ip); 1063 1064 error = getnameinfo((struct sockaddr*)f, ((struct sockaddr*)f)->sa_len, 1065 host, sizeof host, NULL, 0, niflag); 1066 if (error) { 1067 dprintf("Host name for your address (%s) unknown\n", ip); 1068 return (ip); 1069 } 1070 if ((p = strchr(host, '.')) && strcmp(p + 1, LocalDomain) == 0) 1071 *p = '\0'; 1072 return (host); 1073 } 1074 1075 void 1076 domark(int signo) 1077 { 1078 struct filed *f; 1079 1080 now = time((time_t *)NULL); 1081 MarkSeq += TIMERINTVL; 1082 if (MarkSeq >= MarkInterval) { 1083 logmsg(LOG_INFO, "-- MARK --", LocalHostName, ADDDATE|MARK); 1084 MarkSeq = 0; 1085 } 1086 1087 for (f = Files; f; f = f->f_next) { 1088 if (f->f_prevcount && now >= REPEATTIME(f)) { 1089 dprintf("Flush %s: repeated %d times, %d sec.\n", 1090 TypeNames[f->f_type], f->f_prevcount, 1091 repeatinterval[f->f_repeatcount]); 1092 fprintlog(f, 0, (char *)NULL); 1093 BACKOFF(f); 1094 } 1095 } 1096 (void)alarm(TIMERINTVL); 1097 } 1098 1099 /* 1100 * Print syslogd errors some place. 1101 */ 1102 void 1103 logerror(const char *fmt, ...) 1104 { 1105 va_list ap; 1106 char tmpbuf[BUFSIZ]; 1107 char buf[BUFSIZ]; 1108 1109 va_start(ap, fmt); 1110 1111 (void)vsnprintf(tmpbuf, sizeof(tmpbuf), fmt, ap); 1112 1113 va_end(ap); 1114 1115 if (errno) 1116 (void)snprintf(buf, sizeof(buf), "syslogd: %s: %s", 1117 tmpbuf, strerror(errno)); 1118 else 1119 (void)snprintf(buf, sizeof(buf), "syslogd: %s", tmpbuf); 1120 1121 if (daemonized) 1122 logmsg(LOG_SYSLOG|LOG_ERR, buf, LocalHostName, ADDDATE); 1123 if (!daemonized && Debug) 1124 dprintf("%s\n", buf); 1125 if (!daemonized && !Debug) 1126 printf("%s\n", buf); 1127 1128 return; 1129 } 1130 1131 void 1132 die(int signo) 1133 { 1134 struct filed *f; 1135 char **p; 1136 1137 for (f = Files; f != NULL; f = f->f_next) { 1138 /* flush any pending output */ 1139 if (f->f_prevcount) 1140 fprintlog(f, 0, (char *)NULL); 1141 } 1142 errno = 0; 1143 if (signo) 1144 logerror("Exiting on signal %d", signo); 1145 else 1146 logerror("Fatal error, exiting"); 1147 for (p = LogPaths; p && *p; p++) 1148 unlink(*p); 1149 exit(0); 1150 } 1151 1152 /* 1153 * INIT -- Initialize syslogd from configuration table 1154 */ 1155 void 1156 init(void) 1157 { 1158 int i; 1159 FILE *cf; 1160 struct filed *f, *next, **nextp; 1161 char *p; 1162 char cline[LINE_MAX]; 1163 1164 dprintf("init\n"); 1165 1166 /* 1167 * Close all open log files. 1168 */ 1169 Initialized = 0; 1170 for (f = Files; f != NULL; f = next) { 1171 /* flush any pending output */ 1172 if (f->f_prevcount) 1173 fprintlog(f, 0, (char *)NULL); 1174 1175 switch (f->f_type) { 1176 case F_FILE: 1177 case F_TTY: 1178 case F_CONSOLE: 1179 (void)close(f->f_file); 1180 break; 1181 case F_FORW: 1182 if (f->f_un.f_forw.f_addr) 1183 freeaddrinfo(f->f_un.f_forw.f_addr); 1184 break; 1185 } 1186 next = f->f_next; 1187 free((char *)f); 1188 } 1189 Files = NULL; 1190 nextp = &Files; 1191 1192 /* 1193 * Close all open sockets 1194 */ 1195 1196 if (finet) { 1197 for (i = 0; i < *finet; i++) { 1198 if (close(finet[i+1]) < 0) { 1199 logerror("close() failed"); 1200 die(0); 1201 } 1202 } 1203 } 1204 1205 /* 1206 * Reset counter of forwarding actions 1207 */ 1208 1209 NumForwards=0; 1210 1211 /* open the configuration file */ 1212 if ((cf = fopen(ConfFile, "r")) == NULL) { 1213 dprintf("Cannot open `%s'\n", ConfFile); 1214 *nextp = (struct filed *)calloc(1, sizeof(*f)); 1215 cfline("*.ERR\t/dev/console", *nextp); 1216 (*nextp)->f_next = (struct filed *)calloc(1, sizeof(*f)); 1217 cfline("*.PANIC\t*", (*nextp)->f_next); 1218 Initialized = 1; 1219 return; 1220 } 1221 1222 /* 1223 * Foreach line in the conf table, open that file. 1224 */ 1225 f = NULL; 1226 while (fgets(cline, sizeof(cline), cf) != NULL) { 1227 /* 1228 * check for end-of-section, comments, strip off trailing 1229 * spaces and newline character. 1230 */ 1231 for (p = cline; isspace(*p); ++p) 1232 continue; 1233 if (*p == '\0' || *p == '#') 1234 continue; 1235 for (p = strchr(cline, '\0'); isspace(*--p);) 1236 continue; 1237 *++p = '\0'; 1238 f = (struct filed *)calloc(1, sizeof(*f)); 1239 *nextp = f; 1240 nextp = &f->f_next; 1241 cfline(cline, f); 1242 } 1243 1244 /* close the configuration file */ 1245 (void)fclose(cf); 1246 1247 Initialized = 1; 1248 1249 if (Debug) { 1250 for (f = Files; f; f = f->f_next) { 1251 for (i = 0; i <= LOG_NFACILITIES; i++) 1252 if (f->f_pmask[i] == INTERNAL_NOPRI) 1253 printf("X "); 1254 else 1255 printf("%d ", f->f_pmask[i]); 1256 printf("%s: ", TypeNames[f->f_type]); 1257 switch (f->f_type) { 1258 case F_FILE: 1259 case F_TTY: 1260 case F_CONSOLE: 1261 printf("%s", f->f_un.f_fname); 1262 break; 1263 1264 case F_FORW: 1265 printf("%s", f->f_un.f_forw.f_hname); 1266 break; 1267 1268 case F_USERS: 1269 for (i = 0; 1270 i < MAXUNAMES && *f->f_un.f_uname[i]; i++) 1271 printf("%s, ", f->f_un.f_uname[i]); 1272 break; 1273 } 1274 printf("\n"); 1275 } 1276 } 1277 1278 finet = socksetup(PF_UNSPEC); 1279 if (finet) { 1280 if (SecureMode) { 1281 for (i = 0; i < *finet; i++) { 1282 if (shutdown(finet[i+1], SHUT_RD) < 0) { 1283 logerror("shutdown() failed"); 1284 die(0); 1285 } 1286 } 1287 } else 1288 dprintf("Listening on inet and/or inet6 socket\n"); 1289 dprintf("Sending on inet and/or inet6 socket\n"); 1290 } 1291 1292 logmsg(LOG_SYSLOG|LOG_INFO, "syslogd: restart", LocalHostName, ADDDATE); 1293 dprintf("syslogd: restarted\n"); 1294 } 1295 1296 /* 1297 * Crack a configuration file line 1298 */ 1299 void 1300 cfline(char *line, struct filed *f) 1301 { 1302 struct addrinfo hints, *res; 1303 int error, i, pri; 1304 char *bp, *p, *q; 1305 char buf[MAXLINE]; 1306 int sp_err; 1307 1308 dprintf("cfline(%s)\n", line); 1309 1310 errno = 0; /* keep strerror() stuff out of logerror messages */ 1311 1312 /* clear out file entry */ 1313 memset(f, 0, sizeof(*f)); 1314 for (i = 0; i <= LOG_NFACILITIES; i++) 1315 f->f_pmask[i] = INTERNAL_NOPRI; 1316 1317 /* 1318 * There should not be any space before the log facility. 1319 * Check this is okay, complain and fix if it is not. 1320 */ 1321 q = line; 1322 if (isblank((unsigned char)*line)) { 1323 errno = 0; 1324 logerror( 1325 "Warning: `%s' space or tab before the log facility", 1326 line); 1327 /* Fix: strip all spaces/tabs before the log facility */ 1328 while (*q++ && isblank((unsigned char)*q)); 1329 line = q; 1330 } 1331 1332 /* 1333 * q is now at the first char of the log facility 1334 * There should be at least one tab after the log facility 1335 * Check this is okay, and complain and fix if it is not. 1336 */ 1337 q = line + strlen(line); 1338 while (!isblank((unsigned char)*q) && (q != line)) 1339 q--; 1340 if ((q == line) && strlen(line)) { 1341 /* No tabs or space in a non empty line: complain */ 1342 errno = 0; 1343 logerror( 1344 "Error: `%s' log facility or log target missing", 1345 line); 1346 } 1347 1348 /* q is at the end of the blank between the two fields */ 1349 sp_err = 0; 1350 while (isblank((unsigned char)*q) && (q != line)) 1351 if (*q-- == ' ') 1352 sp_err = 1; 1353 1354 if (sp_err) { 1355 /* 1356 * A space somewhere between the log facility 1357 * and the log target: complain 1358 */ 1359 errno = 0; 1360 logerror( 1361 "Warning: `%s' space found where tab is expected", 1362 line); 1363 /* ... and fix the problem: replace all spaces by tabs */ 1364 while (*++q && isblank((unsigned char)*q)) 1365 if (*q == ' ') 1366 *q='\t'; 1367 } 1368 1369 /* scan through the list of selectors */ 1370 for (p = line; *p && *p != '\t';) { 1371 1372 /* find the end of this facility name list */ 1373 for (q = p; *q && *q != '\t' && *q++ != '.'; ) 1374 continue; 1375 1376 /* collect priority name */ 1377 for (bp = buf; *q && !strchr("\t,;", *q); ) 1378 *bp++ = *q++; 1379 *bp = '\0'; 1380 1381 /* skip cruft */ 1382 while (strchr(", ;", *q)) 1383 q++; 1384 1385 /* decode priority name */ 1386 if (*buf == '*') 1387 pri = LOG_PRIMASK + 1; 1388 else { 1389 pri = decode(buf, prioritynames); 1390 if (pri < 0) { 1391 errno = 0; 1392 logerror("Unknown priority name `%s'", buf); 1393 return; 1394 } 1395 } 1396 1397 /* scan facilities */ 1398 while (*p && !strchr("\t.;", *p)) { 1399 for (bp = buf; *p && !strchr("\t,;.", *p); ) 1400 *bp++ = *p++; 1401 *bp = '\0'; 1402 if (*buf == '*') 1403 for (i = 0; i < LOG_NFACILITIES; i++) 1404 f->f_pmask[i] = pri; 1405 else { 1406 i = decode(buf, facilitynames); 1407 if (i < 0) { 1408 errno = 0; 1409 logerror("Unknown facility name `%s'", 1410 buf); 1411 return; 1412 } 1413 f->f_pmask[i >> 3] = pri; 1414 } 1415 while (*p == ',' || *p == ' ') 1416 p++; 1417 } 1418 1419 p = q; 1420 } 1421 1422 /* skip to action part */ 1423 sp_err = 0; 1424 while ((*p == '\t') || (*p == ' ')) 1425 p++; 1426 1427 switch (*p) 1428 { 1429 case '@': 1430 (void)strlcpy(f->f_un.f_forw.f_hname, ++p, 1431 sizeof(f->f_un.f_forw.f_hname)); 1432 memset(&hints, 0, sizeof(hints)); 1433 hints.ai_family = AF_UNSPEC; 1434 hints.ai_socktype = SOCK_DGRAM; 1435 hints.ai_protocol = 0; 1436 error = getaddrinfo(f->f_un.f_forw.f_hname, "syslog", &hints, 1437 &res); 1438 if (error) { 1439 logerror(gai_strerror(error)); 1440 break; 1441 } 1442 f->f_un.f_forw.f_addr = res; 1443 f->f_type = F_FORW; 1444 NumForwards++; 1445 break; 1446 1447 case '/': 1448 (void)strlcpy(f->f_un.f_fname, p, sizeof(f->f_un.f_fname)); 1449 if ((f->f_file = open(p, O_WRONLY|O_APPEND, 0)) < 0) { 1450 f->f_type = F_UNUSED; 1451 logerror(p); 1452 break; 1453 } 1454 if (isatty(f->f_file)) 1455 f->f_type = F_TTY; 1456 else 1457 f->f_type = F_FILE; 1458 if (strcmp(p, ctty) == 0) 1459 f->f_type = F_CONSOLE; 1460 break; 1461 1462 case '*': 1463 f->f_type = F_WALL; 1464 break; 1465 1466 default: 1467 for (i = 0; i < MAXUNAMES && *p; i++) { 1468 for (q = p; *q && *q != ','; ) 1469 q++; 1470 (void)strncpy(f->f_un.f_uname[i], p, UT_NAMESIZE); 1471 if ((q - p) > UT_NAMESIZE) 1472 f->f_un.f_uname[i][UT_NAMESIZE] = '\0'; 1473 else 1474 f->f_un.f_uname[i][q - p] = '\0'; 1475 while (*q == ',' || *q == ' ') 1476 q++; 1477 p = q; 1478 } 1479 f->f_type = F_USERS; 1480 break; 1481 } 1482 } 1483 1484 1485 /* 1486 * Decode a symbolic name to a numeric value 1487 */ 1488 int 1489 decode(const char *name, CODE *codetab) 1490 { 1491 CODE *c; 1492 char *p, buf[40]; 1493 1494 if (isdigit(*name)) 1495 return (atoi(name)); 1496 1497 for (p = buf; *name && p < &buf[sizeof(buf) - 1]; p++, name++) { 1498 if (isupper(*name)) 1499 *p = tolower(*name); 1500 else 1501 *p = *name; 1502 } 1503 *p = '\0'; 1504 for (c = codetab; c->c_name; c++) 1505 if (!strcmp(buf, c->c_name)) 1506 return (c->c_val); 1507 1508 return (-1); 1509 } 1510 1511 /* 1512 * Retrieve the size of the kernel message buffer, via sysctl. 1513 */ 1514 int 1515 getmsgbufsize(void) 1516 { 1517 int msgbufsize, mib[2]; 1518 size_t size; 1519 1520 mib[0] = CTL_KERN; 1521 mib[1] = KERN_MSGBUFSIZE; 1522 size = sizeof msgbufsize; 1523 if (sysctl(mib, 2, &msgbufsize, &size, NULL, 0) == -1) { 1524 dprintf("Couldn't get kern.msgbufsize\n"); 1525 return (0); 1526 } 1527 return (msgbufsize); 1528 } 1529 1530 int * 1531 socksetup(int af) 1532 { 1533 struct addrinfo hints, *res, *r; 1534 int error, maxs, *s, *socks; 1535 const int on = 1; 1536 1537 if(SecureMode && !NumForwards) 1538 return(NULL); 1539 1540 memset(&hints, 0, sizeof(hints)); 1541 hints.ai_flags = AI_PASSIVE; 1542 hints.ai_family = af; 1543 hints.ai_socktype = SOCK_DGRAM; 1544 error = getaddrinfo(NULL, "syslog", &hints, &res); 1545 if (error) { 1546 logerror(gai_strerror(error)); 1547 errno = 0; 1548 die(0); 1549 } 1550 1551 /* Count max number of sockets we may open */ 1552 for (maxs = 0, r = res; r; r = r->ai_next, maxs++) 1553 continue; 1554 socks = malloc((maxs+1) * sizeof(int)); 1555 if (!socks) { 1556 logerror("Couldn't allocate memory for sockets"); 1557 die(0); 1558 } 1559 1560 *socks = 0; /* num of sockets counter at start of array */ 1561 s = socks + 1; 1562 for (r = res; r; r = r->ai_next) { 1563 *s = socket(r->ai_family, r->ai_socktype, r->ai_protocol); 1564 if (*s < 0) { 1565 logerror("socket() failed"); 1566 continue; 1567 } 1568 if (r->ai_family == AF_INET6 && setsockopt(*s, IPPROTO_IPV6, 1569 IPV6_V6ONLY, &on, sizeof(on)) < 0) { 1570 logerror("setsockopt(IPV6_V6ONLY) failed"); 1571 close(*s); 1572 continue; 1573 } 1574 if (!SecureMode && bind(*s, r->ai_addr, r->ai_addrlen) < 0) { 1575 logerror("bind() failed"); 1576 close (*s); 1577 continue; 1578 } 1579 1580 *socks = *socks + 1; 1581 s++; 1582 } 1583 1584 if (*socks == 0) { 1585 free (socks); 1586 if(Debug) 1587 return(NULL); 1588 else 1589 die(0); 1590 } 1591 if (res) 1592 freeaddrinfo(res); 1593 1594 return(socks); 1595 } 1596