1 /* $NetBSD: syslogd.c,v 1.42 2000/09/18 13:04:53 sommerfeld Exp $ */ 2 3 /* 4 * Copyright (c) 1983, 1988, 1993, 1994 5 * The Regents of the University of California. All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 3. All advertising materials mentioning features or use of this software 16 * must display the following acknowledgement: 17 * This product includes software developed by the University of 18 * California, Berkeley and its contributors. 19 * 4. Neither the name of the University nor the names of its contributors 20 * may be used to endorse or promote products derived from this software 21 * without specific prior written permission. 22 * 23 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 26 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33 * SUCH DAMAGE. 34 */ 35 36 #include <sys/cdefs.h> 37 #ifndef lint 38 __COPYRIGHT("@(#) Copyright (c) 1983, 1988, 1993, 1994\n\ 39 The Regents of the University of California. All rights reserved.\n"); 40 #endif /* not lint */ 41 42 #ifndef lint 43 #if 0 44 static char sccsid[] = "@(#)syslogd.c 8.3 (Berkeley) 4/4/94"; 45 #else 46 __RCSID("$NetBSD: syslogd.c,v 1.42 2000/09/18 13:04:53 sommerfeld Exp $"); 47 #endif 48 #endif /* not lint */ 49 50 /* 51 * syslogd -- log system messages 52 * 53 * This program implements a system log. It takes a series of lines. 54 * Each line may have a priority, signified as "<n>" as 55 * the first characters of the line. If this is 56 * not present, a default priority is used. 57 * 58 * To kill syslogd, send a signal 15 (terminate). A signal 1 (hup) will 59 * cause it to reread its configuration file. 60 * 61 * Defined Constants: 62 * 63 * MAXLINE -- the maximimum line length that can be handled. 64 * DEFUPRI -- the default priority for user messages 65 * DEFSPRI -- the default priority for kernel messages 66 * 67 * Author: Eric Allman 68 * extensive changes by Ralph Campbell 69 * more extensive changes by Eric Allman (again) 70 */ 71 72 #define MAXLINE 1024 /* maximum line length */ 73 #define MAXSVLINE 120 /* maximum saved line length */ 74 #define DEFUPRI (LOG_USER|LOG_NOTICE) 75 #define DEFSPRI (LOG_KERN|LOG_CRIT) 76 #define TIMERINTVL 30 /* interval for checking flush, mark */ 77 #define TTYMSGTIME 1 /* timeout passed to ttymsg */ 78 79 #include <sys/param.h> 80 #include <sys/ioctl.h> 81 #include <sys/stat.h> 82 #include <sys/wait.h> 83 #include <sys/socket.h> 84 #include <sys/msgbuf.h> 85 #include <sys/uio.h> 86 #include <sys/poll.h> 87 #include <sys/un.h> 88 #include <sys/time.h> 89 #include <sys/resource.h> 90 #include <sys/sysctl.h> 91 92 #include <netinet/in.h> 93 #include <netdb.h> 94 #include <arpa/inet.h> 95 96 #include <ctype.h> 97 #include <errno.h> 98 #include <fcntl.h> 99 #include <locale.h> 100 #include <setjmp.h> 101 #include <signal.h> 102 #include <stdio.h> 103 #include <stdlib.h> 104 #include <string.h> 105 #include <unistd.h> 106 #include <utmp.h> 107 #include <util.h> 108 #include "pathnames.h" 109 110 #define SYSLOG_NAMES 111 #include <sys/syslog.h> 112 113 char *ConfFile = _PATH_LOGCONF; 114 char ctty[] = _PATH_CONSOLE; 115 116 #define FDMASK(fd) (1 << (fd)) 117 118 #define dprintf if (Debug) printf 119 120 #define MAXUNAMES 20 /* maximum number of user names */ 121 122 /* 123 * Flags to logmsg(). 124 */ 125 126 #define IGN_CONS 0x001 /* don't print on console */ 127 #define SYNC_FILE 0x002 /* do fsync on file after printing */ 128 #define ADDDATE 0x004 /* add a date to the message */ 129 #define MARK 0x008 /* this message is a mark */ 130 131 /* 132 * This structure represents the files that will have log 133 * copies printed. 134 */ 135 136 struct filed { 137 struct filed *f_next; /* next in linked list */ 138 short f_type; /* entry type, see below */ 139 short f_file; /* file descriptor */ 140 time_t f_time; /* time this was last written */ 141 u_char f_pmask[LOG_NFACILITIES+1]; /* priority mask */ 142 union { 143 char f_uname[MAXUNAMES][UT_NAMESIZE+1]; 144 struct { 145 char f_hname[MAXHOSTNAMELEN+1]; 146 struct addrinfo *f_addr; 147 } f_forw; /* forwarding address */ 148 char f_fname[MAXPATHLEN]; 149 } f_un; 150 char f_prevline[MAXSVLINE]; /* last message logged */ 151 char f_lasttime[16]; /* time of last occurrence */ 152 char f_prevhost[MAXHOSTNAMELEN+1]; /* host from which recd. */ 153 int f_prevpri; /* pri of f_prevline */ 154 int f_prevlen; /* length of f_prevline */ 155 int f_prevcount; /* repetition cnt of prevline */ 156 int f_repeatcount; /* number of "repeated" msgs */ 157 }; 158 159 /* 160 * Intervals at which we flush out "message repeated" messages, 161 * in seconds after previous message is logged. After each flush, 162 * we move to the next interval until we reach the largest. 163 */ 164 int repeatinterval[] = { 30, 120, 600 }; /* # of secs before flush */ 165 #define MAXREPEAT ((sizeof(repeatinterval) / sizeof(repeatinterval[0])) - 1) 166 #define REPEATTIME(f) ((f)->f_time + repeatinterval[(f)->f_repeatcount]) 167 #define BACKOFF(f) { if (++(f)->f_repeatcount > MAXREPEAT) \ 168 (f)->f_repeatcount = MAXREPEAT; \ 169 } 170 171 /* values for f_type */ 172 #define F_UNUSED 0 /* unused entry */ 173 #define F_FILE 1 /* regular file */ 174 #define F_TTY 2 /* terminal */ 175 #define F_CONSOLE 3 /* console terminal */ 176 #define F_FORW 4 /* remote machine */ 177 #define F_USERS 5 /* list of users */ 178 #define F_WALL 6 /* everyone logged on */ 179 180 char *TypeNames[7] = { 181 "UNUSED", "FILE", "TTY", "CONSOLE", 182 "FORW", "USERS", "WALL" 183 }; 184 185 struct filed *Files; 186 struct filed consfile; 187 188 int Debug; /* debug flag */ 189 char LocalHostName[MAXHOSTNAMELEN+1]; /* our hostname */ 190 char *LocalDomain; /* our local domain name */ 191 int *finet = NULL; /* Internet datagram sockets */ 192 int Initialized = 0; /* set when we have initialized ourselves */ 193 int MarkInterval = 20 * 60; /* interval between marks in seconds */ 194 int MarkSeq = 0; /* mark sequence number */ 195 int SecureMode = 0; /* listen only on unix domain socks */ 196 int NumForwards = 0; /* number of forwarding actions in conf file */ 197 char **LogPaths; /* array of pathnames to read messages from */ 198 199 void cfline __P((char *, struct filed *)); 200 char *cvthname __P((struct sockaddr_storage *)); 201 int decode __P((const char *, CODE *)); 202 void die __P((int)); 203 void domark __P((int)); 204 void fprintlog __P((struct filed *, int, char *)); 205 int getmsgbufsize __P((void)); 206 int* socksetup __P((int)); 207 void init __P((int)); 208 void logerror __P((char *)); 209 void logmsg __P((int, char *, char *, int)); 210 void printline __P((char *, char *)); 211 void printsys __P((char *)); 212 void reapchild __P((int)); 213 void usage __P((void)); 214 void wallmsg __P((struct filed *, struct iovec *)); 215 int main __P((int, char *[])); 216 void logpath_add __P((char ***, int *, int *, char *)); 217 void logpath_fileadd __P((char ***, int *, int *, char *)); 218 219 int 220 main(argc, argv) 221 int argc; 222 char *argv[]; 223 { 224 int ch, *funix, i, j, fklog, len, linesize; 225 int *nfinetix, nfklogix, nfunixbaseix, nfds; 226 int funixsize = 0, funixmaxsize = 0; 227 struct sockaddr_un sunx, fromunix; 228 struct sockaddr_storage frominet; 229 char *p, *line, **pp; 230 struct pollfd *readfds; 231 232 (void)setlocale(LC_ALL, ""); 233 234 while ((ch = getopt(argc, argv, "dsf:m:p:P:")) != -1) 235 switch(ch) { 236 case 'd': /* debug */ 237 Debug++; 238 break; 239 case 'f': /* configuration file */ 240 ConfFile = optarg; 241 break; 242 case 'm': /* mark interval */ 243 MarkInterval = atoi(optarg) * 60; 244 break; 245 case 'p': /* path */ 246 logpath_add(&LogPaths, &funixsize, 247 &funixmaxsize, optarg); 248 break; 249 case 'P': /* file of paths */ 250 logpath_fileadd(&LogPaths, &funixsize, 251 &funixmaxsize, optarg); 252 break; 253 case 's': /* no network listen mode */ 254 SecureMode++; 255 break; 256 case '?': 257 default: 258 usage(); 259 } 260 if ((argc -= optind) != 0) 261 usage(); 262 263 if (!Debug) 264 (void)daemon(0, 0); 265 else 266 setlinebuf(stdout); 267 268 consfile.f_type = F_CONSOLE; 269 (void)strcpy(consfile.f_un.f_fname, ctty); 270 (void)gethostname(LocalHostName, sizeof(LocalHostName)); 271 LocalHostName[sizeof(LocalHostName) - 1] = '\0'; 272 if ((p = strchr(LocalHostName, '.')) != NULL) { 273 *p++ = '\0'; 274 LocalDomain = p; 275 } else 276 LocalDomain = ""; 277 linesize = getmsgbufsize(); 278 if (linesize < MAXLINE) 279 linesize = MAXLINE; 280 linesize++; 281 line = malloc(linesize); 282 if (line == NULL) { 283 logerror("couldn't allocate line buffer"); 284 die(0); 285 } 286 (void)signal(SIGTERM, die); 287 (void)signal(SIGINT, Debug ? die : SIG_IGN); 288 (void)signal(SIGQUIT, Debug ? die : SIG_IGN); 289 (void)signal(SIGCHLD, reapchild); 290 (void)signal(SIGALRM, domark); 291 (void)alarm(TIMERINTVL); 292 293 #ifndef SUN_LEN 294 #define SUN_LEN(unp) (strlen((unp)->sun_path) + 2) 295 #endif 296 if (funixsize == 0) 297 logpath_add(&LogPaths, &funixsize, 298 &funixmaxsize, _PATH_LOG); 299 funix = (int *)malloc(sizeof(int) * funixsize); 300 if (funix == NULL) { 301 logerror("couldn't allocate funix descriptors"); 302 die(0); 303 } 304 for (j = 0, pp = LogPaths; *pp; pp++, j++) { 305 dprintf("making unix dgram socket %s\n", *pp); 306 unlink(*pp); 307 memset(&sunx, 0, sizeof(sunx)); 308 sunx.sun_family = AF_LOCAL; 309 (void)strncpy(sunx.sun_path, *pp, sizeof(sunx.sun_path)); 310 funix[j] = socket(AF_LOCAL, SOCK_DGRAM, 0); 311 if (funix[j] < 0 || bind(funix[j], 312 (struct sockaddr *)&sunx, SUN_LEN(&sunx)) < 0 || 313 chmod(*pp, 0666) < 0) { 314 int serrno = errno; 315 (void)snprintf(line, sizeof line, 316 "cannot create %s", *pp); 317 errno = serrno; 318 logerror(line); 319 errno = serrno; 320 dprintf("cannot create %s (%d)\n", *pp, errno); 321 die(0); 322 } 323 dprintf("listening on unix dgram socket %s\n", *pp); 324 } 325 326 init(0); 327 328 if ((fklog = open(_PATH_KLOG, O_RDONLY, 0)) < 0) { 329 dprintf("can't open %s (%d)\n", _PATH_KLOG, errno); 330 } else { 331 dprintf("listening on kernel log %s\n", _PATH_KLOG); 332 } 333 334 /* tuck my process id away, if i'm not in debug mode */ 335 if (Debug == 0) 336 pidfile(NULL); 337 338 dprintf("off & running....\n"); 339 340 (void)signal(SIGHUP, init); 341 342 /* setup pollfd set. */ 343 readfds = (struct pollfd *)malloc(sizeof(struct pollfd) * 344 (funixsize + (finet ? *finet : 0) + 1)); 345 if (readfds == NULL) { 346 logerror("couldn't allocate pollfds"); 347 die(0); 348 } 349 nfds = 0; 350 if (fklog >= 0) { 351 nfklogix = nfds++; 352 readfds[nfklogix].fd = fklog; 353 readfds[nfklogix].events = POLLIN | POLLPRI; 354 } 355 if (finet && !SecureMode) { 356 nfinetix = malloc(*finet * sizeof(*nfinetix)); 357 for (j = 0; j < *finet; j++) { 358 nfinetix[j] = nfds++; 359 readfds[nfinetix[j]].fd = finet[j+1]; 360 readfds[nfinetix[j]].events = POLLIN | POLLPRI; 361 } 362 } 363 nfunixbaseix = nfds; 364 for (j = 0, pp = LogPaths; *pp; pp++) { 365 readfds[nfds].fd = funix[j++]; 366 readfds[nfds++].events = POLLIN | POLLPRI; 367 } 368 369 for (;;) { 370 int rv; 371 372 rv = poll(readfds, nfds, INFTIM); 373 if (rv == 0) 374 continue; 375 if (rv < 0) { 376 if (errno != EINTR) 377 logerror("poll"); 378 continue; 379 } 380 dprintf("got a message (%d)\n", rv); 381 if (fklog >= 0 && 382 (readfds[nfklogix].revents & (POLLIN | POLLPRI))) { 383 dprintf("kernel log active\n"); 384 i = read(fklog, line, linesize - 1); 385 if (i > 0) { 386 line[i] = '\0'; 387 printsys(line); 388 } else if (i < 0 && errno != EINTR) { 389 logerror("klog"); 390 fklog = -1; 391 } 392 } 393 for (j = 0, pp = LogPaths; *pp; pp++, j++) { 394 if ((readfds[nfunixbaseix + j].revents & 395 (POLLIN | POLLPRI)) == 0) 396 continue; 397 398 dprintf("unix socket (%s) active\n", *pp); 399 len = sizeof(fromunix); 400 i = recvfrom(funix[j], line, MAXLINE, 0, 401 (struct sockaddr *)&fromunix, &len); 402 if (i > 0) { 403 line[i] = '\0'; 404 printline(LocalHostName, line); 405 } else if (i < 0 && errno != EINTR) { 406 char buf[MAXPATHLEN]; 407 int serrno = errno; 408 409 (void)snprintf(buf, sizeof buf, 410 "recvfrom unix %s", *pp); 411 errno = serrno; 412 logerror(buf); 413 } 414 } 415 if (finet && !SecureMode) { 416 for (j = 0; j < *finet; j++) { 417 if (readfds[nfinetix[j]].revents & 418 (POLLIN | POLLPRI)) { 419 dprintf("inet socket active\n"); 420 len = sizeof(frominet); 421 i = recvfrom(finet[j+1], line, MAXLINE, 422 0, (struct sockaddr *)&frominet, 423 &len); 424 if (i > 0) { 425 line[i] = '\0'; 426 printline(cvthname(&frominet), 427 line); 428 } else if (i < 0 && errno != EINTR) 429 logerror("recvfrom inet"); 430 } 431 } 432 } 433 } 434 } 435 436 void 437 usage() 438 { 439 extern char *__progname; 440 441 (void)fprintf(stderr, 442 "usage: %s [-ds] [-f conffile] [-m markinterval] [-P logpathfile] [-p logpath1] [-p logpath2 ..]\n", 443 __progname); 444 exit(1); 445 } 446 447 /* 448 * given a pointer to an array of char *'s, a pointer to it's current 449 * size and current allocated max size, and a new char * to add, add 450 * it, update everything as necessary, possibly allocating a new array 451 */ 452 void 453 logpath_add(lp, szp, maxszp, new) 454 char ***lp; 455 int *szp; 456 int *maxszp; 457 char *new; 458 { 459 460 dprintf("adding %s to the %p logpath list\n", new, *lp); 461 if (*szp == *maxszp) { 462 if (*maxszp == 0) { 463 *maxszp = 4; /* start of with enough for now */ 464 *lp = NULL; 465 } 466 else 467 *maxszp *= 2; 468 *lp = realloc(*lp, sizeof(char *) * (*maxszp + 1)); 469 if (*lp == NULL) { 470 logerror("couldn't allocate line buffer"); 471 die(0); 472 } 473 } 474 (*lp)[(*szp)++] = new; 475 (*lp)[(*szp)] = NULL; /* always keep it NULL terminated */ 476 } 477 478 /* do a file of log sockets */ 479 void 480 logpath_fileadd(lp, szp, maxszp, file) 481 char ***lp; 482 int *szp; 483 int *maxszp; 484 char *file; 485 { 486 FILE *fp; 487 char *line; 488 size_t len; 489 490 fp = fopen(file, "r"); 491 if (fp == NULL) { 492 int serrno = errno; 493 494 dprintf("can't open %s (%d)\n", file, errno); 495 errno = serrno; 496 logerror("could not open socket file list"); 497 die(0); 498 } 499 500 while ((line = fgetln(fp, &len))) { 501 line[len - 1] = 0; 502 logpath_add(lp, szp, maxszp, line); 503 } 504 fclose(fp); 505 } 506 507 /* 508 * Take a raw input line, decode the message, and print the message 509 * on the appropriate log files. 510 */ 511 void 512 printline(hname, msg) 513 char *hname; 514 char *msg; 515 { 516 int c, pri; 517 char *p, *q, line[MAXLINE + 1]; 518 519 /* test for special codes */ 520 pri = DEFUPRI; 521 p = msg; 522 if (*p == '<') { 523 pri = 0; 524 while (isdigit(*++p)) 525 pri = 10 * pri + (*p - '0'); 526 if (*p == '>') 527 ++p; 528 } 529 if (pri &~ (LOG_FACMASK|LOG_PRIMASK)) 530 pri = DEFUPRI; 531 532 /* don't allow users to log kernel messages */ 533 if (LOG_FAC(pri) == LOG_KERN) 534 pri = LOG_MAKEPRI(LOG_USER, LOG_PRI(pri)); 535 536 q = line; 537 538 while ((c = *p++) != '\0' && 539 q < &line[sizeof(line) - 2]) { 540 c &= 0177; 541 if (iscntrl(c)) 542 if (c == '\n') 543 *q++ = ' '; 544 else if (c == '\t') 545 *q++ = '\t'; 546 else { 547 *q++ = '^'; 548 *q++ = c ^ 0100; 549 } 550 else 551 *q++ = c; 552 } 553 *q = '\0'; 554 555 logmsg(pri, line, hname, 0); 556 } 557 558 /* 559 * Take a raw input line from /dev/klog, split and format similar to syslog(). 560 */ 561 void 562 printsys(msg) 563 char *msg; 564 { 565 int c, pri, flags; 566 char *lp, *p, *q, line[MAXLINE + 1]; 567 568 (void)strcpy(line, _PATH_UNIX); 569 (void)strcat(line, ": "); 570 lp = line + strlen(line); 571 for (p = msg; *p != '\0'; ) { 572 flags = SYNC_FILE | ADDDATE; /* fsync file after write */ 573 pri = DEFSPRI; 574 if (*p == '<') { 575 pri = 0; 576 while (isdigit(*++p)) 577 pri = 10 * pri + (*p - '0'); 578 if (*p == '>') 579 ++p; 580 } else { 581 /* kernel printf's come out on console */ 582 flags |= IGN_CONS; 583 } 584 if (pri &~ (LOG_FACMASK|LOG_PRIMASK)) 585 pri = DEFSPRI; 586 q = lp; 587 while (*p != '\0' && (c = *p++) != '\n' && 588 q < &line[MAXLINE]) 589 *q++ = c; 590 *q = '\0'; 591 logmsg(pri, line, LocalHostName, flags); 592 } 593 } 594 595 time_t now; 596 597 /* 598 * Log a message to the appropriate log files, users, etc. based on 599 * the priority. 600 */ 601 void 602 logmsg(pri, msg, from, flags) 603 int pri; 604 char *msg, *from; 605 int flags; 606 { 607 struct filed *f; 608 int fac, msglen, omask, prilev; 609 char *timestamp; 610 611 dprintf("logmsg: pri 0%o, flags 0x%x, from %s, msg %s\n", 612 pri, flags, from, msg); 613 614 omask = sigblock(sigmask(SIGHUP)|sigmask(SIGALRM)); 615 616 /* 617 * Check to see if msg looks non-standard. 618 */ 619 msglen = strlen(msg); 620 if (msglen < 16 || msg[3] != ' ' || msg[6] != ' ' || 621 msg[9] != ':' || msg[12] != ':' || msg[15] != ' ') 622 flags |= ADDDATE; 623 624 (void)time(&now); 625 if (flags & ADDDATE) 626 timestamp = ctime(&now) + 4; 627 else { 628 timestamp = msg; 629 msg += 16; 630 msglen -= 16; 631 } 632 633 /* extract facility and priority level */ 634 if (flags & MARK) 635 fac = LOG_NFACILITIES; 636 else 637 fac = LOG_FAC(pri); 638 prilev = LOG_PRI(pri); 639 640 /* log the message to the particular outputs */ 641 if (!Initialized) { 642 f = &consfile; 643 f->f_file = open(ctty, O_WRONLY, 0); 644 645 if (f->f_file >= 0) { 646 fprintlog(f, flags, msg); 647 (void)close(f->f_file); 648 } 649 (void)sigsetmask(omask); 650 return; 651 } 652 for (f = Files; f; f = f->f_next) { 653 /* skip messages that are incorrect priority */ 654 if (f->f_pmask[fac] < prilev || 655 f->f_pmask[fac] == INTERNAL_NOPRI) 656 continue; 657 658 if (f->f_type == F_CONSOLE && (flags & IGN_CONS)) 659 continue; 660 661 /* don't output marks to recently written files */ 662 if ((flags & MARK) && (now - f->f_time) < MarkInterval / 2) 663 continue; 664 665 /* 666 * suppress duplicate lines to this file 667 */ 668 if ((flags & MARK) == 0 && msglen == f->f_prevlen && 669 !strcmp(msg, f->f_prevline) && 670 !strcmp(from, f->f_prevhost)) { 671 (void)strncpy(f->f_lasttime, timestamp, 15); 672 f->f_prevcount++; 673 dprintf("msg repeated %d times, %ld sec of %d\n", 674 f->f_prevcount, (long)(now - f->f_time), 675 repeatinterval[f->f_repeatcount]); 676 /* 677 * If domark would have logged this by now, 678 * flush it now (so we don't hold isolated messages), 679 * but back off so we'll flush less often 680 * in the future. 681 */ 682 if (now > REPEATTIME(f)) { 683 fprintlog(f, flags, (char *)NULL); 684 BACKOFF(f); 685 } 686 } else { 687 /* new line, save it */ 688 if (f->f_prevcount) 689 fprintlog(f, 0, (char *)NULL); 690 f->f_repeatcount = 0; 691 f->f_prevpri = pri; 692 (void)strncpy(f->f_lasttime, timestamp, 15); 693 (void)strncpy(f->f_prevhost, from, 694 sizeof(f->f_prevhost)); 695 if (msglen < MAXSVLINE) { 696 f->f_prevlen = msglen; 697 (void)strcpy(f->f_prevline, msg); 698 fprintlog(f, flags, (char *)NULL); 699 } else { 700 f->f_prevline[0] = 0; 701 f->f_prevlen = 0; 702 fprintlog(f, flags, msg); 703 } 704 } 705 } 706 (void)sigsetmask(omask); 707 } 708 709 void 710 fprintlog(f, flags, msg) 711 struct filed *f; 712 int flags; 713 char *msg; 714 { 715 struct iovec iov[6]; 716 struct iovec *v; 717 struct addrinfo *r; 718 int j, l, lsent; 719 char line[MAXLINE + 1], repbuf[80], greetings[200]; 720 721 v = iov; 722 if (f->f_type == F_WALL) { 723 v->iov_base = greetings; 724 v->iov_len = snprintf(greetings, sizeof greetings, 725 "\r\n\7Message from syslogd@%s at %.24s ...\r\n", 726 f->f_prevhost, ctime(&now)); 727 v++; 728 v->iov_base = ""; 729 v->iov_len = 0; 730 v++; 731 } else { 732 v->iov_base = f->f_lasttime; 733 v->iov_len = 15; 734 v++; 735 v->iov_base = " "; 736 v->iov_len = 1; 737 v++; 738 } 739 v->iov_base = f->f_prevhost; 740 v->iov_len = strlen(v->iov_base); 741 v++; 742 v->iov_base = " "; 743 v->iov_len = 1; 744 v++; 745 746 if (msg) { 747 v->iov_base = msg; 748 v->iov_len = strlen(msg); 749 } else if (f->f_prevcount > 1) { 750 v->iov_base = repbuf; 751 v->iov_len = snprintf(repbuf, sizeof repbuf, 752 "last message repeated %d times", f->f_prevcount); 753 } else { 754 v->iov_base = f->f_prevline; 755 v->iov_len = f->f_prevlen; 756 } 757 v++; 758 759 dprintf("Logging to %s", TypeNames[f->f_type]); 760 f->f_time = now; 761 762 switch (f->f_type) { 763 case F_UNUSED: 764 dprintf("\n"); 765 break; 766 767 case F_FORW: 768 dprintf(" %s\n", f->f_un.f_forw.f_hname); 769 /* 770 * check for local vs remote messages 771 * (from FreeBSD PR#bin/7055) 772 */ 773 if (strcmp(f->f_prevhost, LocalHostName)) { 774 l = snprintf(line, sizeof(line) - 1, 775 "<%d>%.15s [%s]: %s", 776 f->f_prevpri, (char *) iov[0].iov_base, 777 f->f_prevhost, (char *) iov[4].iov_base); 778 } else { 779 l = snprintf(line, sizeof(line) - 1, "<%d>%.15s %s", 780 f->f_prevpri, (char *) iov[0].iov_base, 781 (char *) iov[4].iov_base); 782 } 783 if (l > MAXLINE) 784 l = MAXLINE; 785 if (finet) { 786 for (r = f->f_un.f_forw.f_addr; r; r = r->ai_next) { 787 for (j = 0; j < *finet; j++) { 788 #if 0 789 /* 790 * should we check AF first, or just 791 * trial and error? FWD 792 */ 793 if (r->ai_family == 794 address_family_of(finet[j+1])) 795 #endif 796 lsent = sendto(finet[j+1], line, l, 0, 797 r->ai_addr, r->ai_addrlen); 798 if (lsent == l) 799 break; 800 } 801 } 802 if (lsent != l) { 803 f->f_type = F_UNUSED; 804 logerror("sendto"); 805 } 806 } 807 break; 808 809 case F_CONSOLE: 810 if (flags & IGN_CONS) { 811 dprintf(" (ignored)\n"); 812 break; 813 } 814 /* FALLTHROUGH */ 815 816 case F_TTY: 817 case F_FILE: 818 dprintf(" %s\n", f->f_un.f_fname); 819 if (f->f_type != F_FILE) { 820 v->iov_base = "\r\n"; 821 v->iov_len = 2; 822 } else { 823 v->iov_base = "\n"; 824 v->iov_len = 1; 825 } 826 again: 827 if (writev(f->f_file, iov, 6) < 0) { 828 int e = errno; 829 (void)close(f->f_file); 830 /* 831 * Check for errors on TTY's due to loss of tty 832 */ 833 if ((e == EIO || e == EBADF) && f->f_type != F_FILE) { 834 f->f_file = open(f->f_un.f_fname, 835 O_WRONLY|O_APPEND, 0); 836 if (f->f_file < 0) { 837 f->f_type = F_UNUSED; 838 logerror(f->f_un.f_fname); 839 } else 840 goto again; 841 } else { 842 f->f_type = F_UNUSED; 843 errno = e; 844 logerror(f->f_un.f_fname); 845 } 846 } else if (flags & SYNC_FILE) 847 (void)fsync(f->f_file); 848 break; 849 850 case F_USERS: 851 case F_WALL: 852 dprintf("\n"); 853 v->iov_base = "\r\n"; 854 v->iov_len = 2; 855 wallmsg(f, iov); 856 break; 857 } 858 f->f_prevcount = 0; 859 } 860 861 /* 862 * WALLMSG -- Write a message to the world at large 863 * 864 * Write the specified message to either the entire 865 * world, or a list of approved users. 866 */ 867 void 868 wallmsg(f, iov) 869 struct filed *f; 870 struct iovec *iov; 871 { 872 static int reenter; /* avoid calling ourselves */ 873 FILE *uf; 874 struct utmp ut; 875 int i; 876 char *p; 877 char line[sizeof(ut.ut_line) + 1]; 878 879 if (reenter++) 880 return; 881 if ((uf = fopen(_PATH_UTMP, "r")) == NULL) { 882 logerror(_PATH_UTMP); 883 reenter = 0; 884 return; 885 } 886 /* NOSTRICT */ 887 while (fread((char *)&ut, sizeof(ut), 1, uf) == 1) { 888 if (ut.ut_name[0] == '\0') 889 continue; 890 strncpy(line, ut.ut_line, sizeof(ut.ut_line)); 891 line[sizeof(ut.ut_line)] = '\0'; 892 if (f->f_type == F_WALL) { 893 if ((p = ttymsg(iov, 6, line, TTYMSGTIME)) != NULL) { 894 errno = 0; /* already in msg */ 895 logerror(p); 896 } 897 continue; 898 } 899 /* should we send the message to this user? */ 900 for (i = 0; i < MAXUNAMES; i++) { 901 if (!f->f_un.f_uname[i][0]) 902 break; 903 if (!strncmp(f->f_un.f_uname[i], ut.ut_name, 904 UT_NAMESIZE)) { 905 if ((p = ttymsg(iov, 6, line, TTYMSGTIME)) 906 != NULL) { 907 errno = 0; /* already in msg */ 908 logerror(p); 909 } 910 break; 911 } 912 } 913 } 914 (void)fclose(uf); 915 reenter = 0; 916 } 917 918 void 919 reapchild(signo) 920 int signo; 921 { 922 union wait status; 923 924 while (wait3((int *)&status, WNOHANG, (struct rusage *)NULL) > 0) 925 ; 926 } 927 928 /* 929 * Return a printable representation of a host address. 930 */ 931 char * 932 cvthname(f) 933 struct sockaddr_storage *f; 934 { 935 int error; 936 char *p; 937 #ifdef KAME_SCOPEID 938 const int niflag = NI_DGRAM | NI_WITHSCOPEID; 939 #else 940 const int niflag = NI_DGRAM; 941 #endif 942 static char host[NI_MAXHOST], ip[NI_MAXHOST]; 943 944 error = getnameinfo((struct sockaddr*)f, ((struct sockaddr*)f)->sa_len, 945 ip, sizeof ip, NULL, 0, NI_NUMERICHOST|niflag); 946 947 dprintf("cvthname(%s)\n", ip); 948 949 if (error) { 950 dprintf("Malformed from address %s\n", gai_strerror(error)); 951 return ("???"); 952 } 953 954 error = getnameinfo((struct sockaddr*)f, ((struct sockaddr*)f)->sa_len, 955 host, sizeof host, NULL, 0, niflag); 956 if (error) { 957 dprintf("Host name for your address (%s) unknown\n", ip); 958 return (ip); 959 } 960 if ((p = strchr(host, '.')) && strcmp(p + 1, LocalDomain) == 0) 961 *p = '\0'; 962 return (host); 963 } 964 965 void 966 domark(signo) 967 int signo; 968 { 969 struct filed *f; 970 971 now = time((time_t *)NULL); 972 MarkSeq += TIMERINTVL; 973 if (MarkSeq >= MarkInterval) { 974 logmsg(LOG_INFO, "-- MARK --", LocalHostName, ADDDATE|MARK); 975 MarkSeq = 0; 976 } 977 978 for (f = Files; f; f = f->f_next) { 979 if (f->f_prevcount && now >= REPEATTIME(f)) { 980 dprintf("flush %s: repeated %d times, %d sec.\n", 981 TypeNames[f->f_type], f->f_prevcount, 982 repeatinterval[f->f_repeatcount]); 983 fprintlog(f, 0, (char *)NULL); 984 BACKOFF(f); 985 } 986 } 987 (void)alarm(TIMERINTVL); 988 } 989 990 /* 991 * Print syslogd errors some place. 992 */ 993 void 994 logerror(type) 995 char *type; 996 { 997 char buf[100]; 998 999 if (errno) 1000 (void)snprintf(buf, 1001 sizeof(buf), "syslogd: %s: %s", type, strerror(errno)); 1002 else 1003 (void)snprintf(buf, sizeof(buf), "syslogd: %s", type); 1004 errno = 0; 1005 dprintf("%s\n", buf); 1006 logmsg(LOG_SYSLOG|LOG_ERR, buf, LocalHostName, ADDDATE); 1007 } 1008 1009 void 1010 die(signo) 1011 int signo; 1012 { 1013 struct filed *f; 1014 char buf[100], **p; 1015 1016 for (f = Files; f != NULL; f = f->f_next) { 1017 /* flush any pending output */ 1018 if (f->f_prevcount) 1019 fprintlog(f, 0, (char *)NULL); 1020 } 1021 if (signo) { 1022 dprintf("syslogd: exiting on signal %d\n", signo); 1023 (void)snprintf(buf, sizeof buf, "exiting on signal %d", signo); 1024 errno = 0; 1025 logerror(buf); 1026 } 1027 for (p = LogPaths; p && *p; p++) 1028 unlink(*p); 1029 exit(0); 1030 } 1031 1032 /* 1033 * INIT -- Initialize syslogd from configuration table 1034 */ 1035 void 1036 init(signo) 1037 int signo; 1038 { 1039 int i; 1040 FILE *cf; 1041 struct filed *f, *next, **nextp; 1042 char *p; 1043 char cline[LINE_MAX]; 1044 1045 dprintf("init\n"); 1046 1047 /* 1048 * Close all open log files. 1049 */ 1050 Initialized = 0; 1051 for (f = Files; f != NULL; f = next) { 1052 /* flush any pending output */ 1053 if (f->f_prevcount) 1054 fprintlog(f, 0, (char *)NULL); 1055 1056 switch (f->f_type) { 1057 case F_FILE: 1058 case F_TTY: 1059 case F_CONSOLE: 1060 (void)close(f->f_file); 1061 break; 1062 } 1063 next = f->f_next; 1064 free((char *)f); 1065 } 1066 Files = NULL; 1067 nextp = &Files; 1068 1069 /* 1070 * Close all open sockets 1071 */ 1072 1073 if (finet) { 1074 for (i = 0; i < *finet; i++) { 1075 if (close(finet[i+1]) < 0) { 1076 logerror("close"); 1077 die(0); 1078 } 1079 } 1080 } 1081 1082 /* 1083 * Reset counter of forwarding actions 1084 */ 1085 1086 NumForwards=0; 1087 1088 /* open the configuration file */ 1089 if ((cf = fopen(ConfFile, "r")) == NULL) { 1090 dprintf("cannot open %s\n", ConfFile); 1091 *nextp = (struct filed *)calloc(1, sizeof(*f)); 1092 cfline("*.ERR\t/dev/console", *nextp); 1093 (*nextp)->f_next = (struct filed *)calloc(1, sizeof(*f)); 1094 cfline("*.PANIC\t*", (*nextp)->f_next); 1095 Initialized = 1; 1096 return; 1097 } 1098 1099 /* 1100 * Foreach line in the conf table, open that file. 1101 */ 1102 f = NULL; 1103 while (fgets(cline, sizeof(cline), cf) != NULL) { 1104 /* 1105 * check for end-of-section, comments, strip off trailing 1106 * spaces and newline character. 1107 */ 1108 for (p = cline; isspace(*p); ++p) 1109 continue; 1110 if (*p == '\0' || *p == '#') 1111 continue; 1112 for (p = strchr(cline, '\0'); isspace(*--p);) 1113 continue; 1114 *++p = '\0'; 1115 f = (struct filed *)calloc(1, sizeof(*f)); 1116 *nextp = f; 1117 nextp = &f->f_next; 1118 cfline(cline, f); 1119 } 1120 1121 /* close the configuration file */ 1122 (void)fclose(cf); 1123 1124 Initialized = 1; 1125 1126 if (Debug) { 1127 for (f = Files; f; f = f->f_next) { 1128 for (i = 0; i <= LOG_NFACILITIES; i++) 1129 if (f->f_pmask[i] == INTERNAL_NOPRI) 1130 printf("X "); 1131 else 1132 printf("%d ", f->f_pmask[i]); 1133 printf("%s: ", TypeNames[f->f_type]); 1134 switch (f->f_type) { 1135 case F_FILE: 1136 case F_TTY: 1137 case F_CONSOLE: 1138 printf("%s", f->f_un.f_fname); 1139 break; 1140 1141 case F_FORW: 1142 printf("%s", f->f_un.f_forw.f_hname); 1143 break; 1144 1145 case F_USERS: 1146 for (i = 0; 1147 i < MAXUNAMES && *f->f_un.f_uname[i]; i++) 1148 printf("%s, ", f->f_un.f_uname[i]); 1149 break; 1150 } 1151 printf("\n"); 1152 } 1153 } 1154 1155 finet = socksetup(PF_UNSPEC); 1156 if (finet) { 1157 if (SecureMode) { 1158 for (i = 0; i < *finet; i++) { 1159 if (shutdown(finet[i+1], SHUT_RD) < 0) { 1160 logerror("shutdown"); 1161 die(0); 1162 } 1163 } 1164 } else 1165 dprintf("listening on inet and/or inet6 socket\n"); 1166 dprintf("sending on inet and/or inet6 socket\n"); 1167 } 1168 1169 logmsg(LOG_SYSLOG|LOG_INFO, "syslogd: restart", LocalHostName, ADDDATE); 1170 dprintf("syslogd: restarted\n"); 1171 } 1172 1173 /* 1174 * Crack a configuration file line 1175 */ 1176 void 1177 cfline(line, f) 1178 char *line; 1179 struct filed *f; 1180 { 1181 struct addrinfo hints, *res; 1182 int error, i, pri; 1183 char *bp, *p, *q; 1184 char buf[MAXLINE], ebuf[100]; 1185 1186 dprintf("cfline(%s)\n", line); 1187 1188 errno = 0; /* keep strerror() stuff out of logerror messages */ 1189 1190 /* clear out file entry */ 1191 memset(f, 0, sizeof(*f)); 1192 for (i = 0; i <= LOG_NFACILITIES; i++) 1193 f->f_pmask[i] = INTERNAL_NOPRI; 1194 1195 /* scan through the list of selectors */ 1196 for (p = line; *p && *p != '\t';) { 1197 1198 /* find the end of this facility name list */ 1199 for (q = p; *q && *q != '\t' && *q++ != '.'; ) 1200 continue; 1201 1202 /* collect priority name */ 1203 for (bp = buf; *q && !strchr("\t,;", *q); ) 1204 *bp++ = *q++; 1205 *bp = '\0'; 1206 1207 /* skip cruft */ 1208 while (strchr(", ;", *q)) 1209 q++; 1210 1211 /* decode priority name */ 1212 if (*buf == '*') 1213 pri = LOG_PRIMASK + 1; 1214 else { 1215 pri = decode(buf, prioritynames); 1216 if (pri < 0) { 1217 (void)snprintf(ebuf, sizeof ebuf, 1218 "unknown priority name \"%s\"", buf); 1219 logerror(ebuf); 1220 return; 1221 } 1222 } 1223 1224 /* scan facilities */ 1225 while (*p && !strchr("\t.;", *p)) { 1226 for (bp = buf; *p && !strchr("\t,;.", *p); ) 1227 *bp++ = *p++; 1228 *bp = '\0'; 1229 if (*buf == '*') 1230 for (i = 0; i < LOG_NFACILITIES; i++) 1231 f->f_pmask[i] = pri; 1232 else { 1233 i = decode(buf, facilitynames); 1234 if (i < 0) { 1235 (void)snprintf(ebuf, sizeof ebuf, 1236 "unknown facility name \"%s\"", 1237 buf); 1238 logerror(ebuf); 1239 return; 1240 } 1241 f->f_pmask[i >> 3] = pri; 1242 } 1243 while (*p == ',' || *p == ' ') 1244 p++; 1245 } 1246 1247 p = q; 1248 } 1249 1250 /* skip to action part */ 1251 while (*p == '\t') 1252 p++; 1253 1254 switch (*p) 1255 { 1256 case '@': 1257 (void)strcpy(f->f_un.f_forw.f_hname, ++p); 1258 memset(&hints, 0, sizeof(hints)); 1259 hints.ai_family = AF_UNSPEC; 1260 hints.ai_socktype = SOCK_DGRAM; 1261 hints.ai_protocol = 0; 1262 error = getaddrinfo(f->f_un.f_forw.f_hname, "syslog", &hints, 1263 &res); 1264 if (error) { 1265 logerror(gai_strerror(error)); 1266 break; 1267 } 1268 f->f_un.f_forw.f_addr = res; 1269 f->f_type = F_FORW; 1270 NumForwards++; 1271 break; 1272 1273 case '/': 1274 (void)strcpy(f->f_un.f_fname, p); 1275 if ((f->f_file = open(p, O_WRONLY|O_APPEND, 0)) < 0) { 1276 f->f_type = F_UNUSED; 1277 logerror(p); 1278 break; 1279 } 1280 if (isatty(f->f_file)) 1281 f->f_type = F_TTY; 1282 else 1283 f->f_type = F_FILE; 1284 if (strcmp(p, ctty) == 0) 1285 f->f_type = F_CONSOLE; 1286 break; 1287 1288 case '*': 1289 f->f_type = F_WALL; 1290 break; 1291 1292 default: 1293 for (i = 0; i < MAXUNAMES && *p; i++) { 1294 for (q = p; *q && *q != ','; ) 1295 q++; 1296 (void)strncpy(f->f_un.f_uname[i], p, UT_NAMESIZE); 1297 if ((q - p) > UT_NAMESIZE) 1298 f->f_un.f_uname[i][UT_NAMESIZE] = '\0'; 1299 else 1300 f->f_un.f_uname[i][q - p] = '\0'; 1301 while (*q == ',' || *q == ' ') 1302 q++; 1303 p = q; 1304 } 1305 f->f_type = F_USERS; 1306 break; 1307 } 1308 } 1309 1310 1311 /* 1312 * Decode a symbolic name to a numeric value 1313 */ 1314 int 1315 decode(name, codetab) 1316 const char *name; 1317 CODE *codetab; 1318 { 1319 CODE *c; 1320 char *p, buf[40]; 1321 1322 if (isdigit(*name)) 1323 return (atoi(name)); 1324 1325 for (p = buf; *name && p < &buf[sizeof(buf) - 1]; p++, name++) { 1326 if (isupper(*name)) 1327 *p = tolower(*name); 1328 else 1329 *p = *name; 1330 } 1331 *p = '\0'; 1332 for (c = codetab; c->c_name; c++) 1333 if (!strcmp(buf, c->c_name)) 1334 return (c->c_val); 1335 1336 return (-1); 1337 } 1338 1339 /* 1340 * Retrieve the size of the kernel message buffer, via sysctl. 1341 */ 1342 int 1343 getmsgbufsize() 1344 { 1345 int msgbufsize, mib[2]; 1346 size_t size; 1347 1348 mib[0] = CTL_KERN; 1349 mib[1] = KERN_MSGBUFSIZE; 1350 size = sizeof msgbufsize; 1351 if (sysctl(mib, 2, &msgbufsize, &size, NULL, 0) == -1) { 1352 dprintf("couldn't get kern.msgbufsize\n"); 1353 return (0); 1354 } 1355 return (msgbufsize); 1356 } 1357 1358 int * 1359 socksetup(af) 1360 int af; 1361 { 1362 struct addrinfo hints, *res, *r; 1363 int error, maxs, *s, *socks; 1364 1365 if(SecureMode && !NumForwards) 1366 return(NULL); 1367 1368 memset(&hints, 0, sizeof(hints)); 1369 hints.ai_flags = AI_PASSIVE; 1370 hints.ai_family = af; 1371 hints.ai_socktype = SOCK_DGRAM; 1372 error = getaddrinfo(NULL, "syslog", &hints, &res); 1373 if (error) { 1374 logerror(gai_strerror(error)); 1375 errno = 0; 1376 die(0); 1377 } 1378 1379 /* Count max number of sockets we may open */ 1380 for (maxs = 0, r = res; r; r = r->ai_next, maxs++) 1381 continue; 1382 socks = malloc ((maxs+1) * sizeof(int)); 1383 if (!socks) { 1384 logerror("couldn't allocate memory for sockets"); 1385 die(0); 1386 } 1387 1388 *socks = 0; /* num of sockets counter at start of array */ 1389 s = socks+1; 1390 for (r = res; r; r = r->ai_next) { 1391 *s = socket(r->ai_family, r->ai_socktype, r->ai_protocol); 1392 if (*s < 0) { 1393 logerror("socket"); 1394 continue; 1395 } 1396 if (!SecureMode && bind(*s, r->ai_addr, r->ai_addrlen) < 0) { 1397 close (*s); 1398 logerror("bind"); 1399 continue; 1400 } 1401 1402 *socks = *socks + 1; 1403 s++; 1404 } 1405 1406 if (*socks == 0) { 1407 free (socks); 1408 if(Debug) 1409 return(NULL); 1410 else 1411 die(0); 1412 } 1413 if (res) 1414 freeaddrinfo(res); 1415 1416 return(socks); 1417 } 1418