1 /* $NetBSD: syslogd.c,v 1.53 2002/05/25 14:46:01 wiz Exp $ */ 2 3 /* 4 * Copyright (c) 1983, 1988, 1993, 1994 5 * The Regents of the University of California. All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 3. All advertising materials mentioning features or use of this software 16 * must display the following acknowledgement: 17 * This product includes software developed by the University of 18 * California, Berkeley and its contributors. 19 * 4. Neither the name of the University nor the names of its contributors 20 * may be used to endorse or promote products derived from this software 21 * without specific prior written permission. 22 * 23 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 26 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33 * SUCH DAMAGE. 34 */ 35 36 #include <sys/cdefs.h> 37 #ifndef lint 38 __COPYRIGHT("@(#) Copyright (c) 1983, 1988, 1993, 1994\n\ 39 The Regents of the University of California. All rights reserved.\n"); 40 #endif /* not lint */ 41 42 #ifndef lint 43 #if 0 44 static char sccsid[] = "@(#)syslogd.c 8.3 (Berkeley) 4/4/94"; 45 #else 46 __RCSID("$NetBSD: syslogd.c,v 1.53 2002/05/25 14:46:01 wiz Exp $"); 47 #endif 48 #endif /* not lint */ 49 50 /* 51 * syslogd -- log system messages 52 * 53 * This program implements a system log. It takes a series of lines. 54 * Each line may have a priority, signified as "<n>" as 55 * the first characters of the line. If this is 56 * not present, a default priority is used. 57 * 58 * To kill syslogd, send a signal 15 (terminate). A signal 1 (hup) will 59 * cause it to reread its configuration file. 60 * 61 * Defined Constants: 62 * 63 * MAXLINE -- the maximimum line length that can be handled. 64 * DEFUPRI -- the default priority for user messages 65 * DEFSPRI -- the default priority for kernel messages 66 * 67 * Author: Eric Allman 68 * extensive changes by Ralph Campbell 69 * more extensive changes by Eric Allman (again) 70 */ 71 72 #define MAXLINE 1024 /* maximum line length */ 73 #define MAXSVLINE 120 /* maximum saved line length */ 74 #define DEFUPRI (LOG_USER|LOG_NOTICE) 75 #define DEFSPRI (LOG_KERN|LOG_CRIT) 76 #define TIMERINTVL 30 /* interval for checking flush, mark */ 77 #define TTYMSGTIME 1 /* timeout passed to ttymsg */ 78 79 #include <sys/param.h> 80 #include <sys/socket.h> 81 #include <sys/sysctl.h> 82 #include <sys/types.h> 83 #include <sys/un.h> 84 #include <sys/wait.h> 85 86 #include <ctype.h> 87 #include <errno.h> 88 #include <fcntl.h> 89 #include <grp.h> 90 #include <locale.h> 91 #include <netdb.h> 92 #include <poll.h> 93 #include <pwd.h> 94 #include <signal.h> 95 #include <stdarg.h> 96 #include <stdio.h> 97 #include <stdlib.h> 98 #include <string.h> 99 #include <unistd.h> 100 #include <util.h> 101 #include <utmp.h> 102 103 #include "pathnames.h" 104 105 #define SYSLOG_NAMES 106 #include <sys/syslog.h> 107 108 #ifdef LIBWRAP 109 #include <tcpd.h> 110 111 int allow_severity = LOG_AUTH|LOG_INFO; 112 int deny_severity = LOG_AUTH|LOG_WARNING; 113 #endif 114 115 char *ConfFile = _PATH_LOGCONF; 116 char ctty[] = _PATH_CONSOLE; 117 118 #define FDMASK(fd) (1 << (fd)) 119 120 #define dprintf if (Debug) printf 121 122 #define MAXUNAMES 20 /* maximum number of user names */ 123 124 /* 125 * Flags to logmsg(). 126 */ 127 128 #define IGN_CONS 0x001 /* don't print on console */ 129 #define SYNC_FILE 0x002 /* do fsync on file after printing */ 130 #define ADDDATE 0x004 /* add a date to the message */ 131 #define MARK 0x008 /* this message is a mark */ 132 133 /* 134 * This structure represents the files that will have log 135 * copies printed. 136 */ 137 138 struct filed { 139 struct filed *f_next; /* next in linked list */ 140 short f_type; /* entry type, see below */ 141 short f_file; /* file descriptor */ 142 time_t f_time; /* time this was last written */ 143 u_char f_pmask[LOG_NFACILITIES+1]; /* priority mask */ 144 union { 145 char f_uname[MAXUNAMES][UT_NAMESIZE+1]; 146 struct { 147 char f_hname[MAXHOSTNAMELEN+1]; 148 struct addrinfo *f_addr; 149 } f_forw; /* forwarding address */ 150 char f_fname[MAXPATHLEN]; 151 } f_un; 152 char f_prevline[MAXSVLINE]; /* last message logged */ 153 char f_lasttime[16]; /* time of last occurrence */ 154 char f_prevhost[MAXHOSTNAMELEN+1]; /* host from which recd. */ 155 int f_prevpri; /* pri of f_prevline */ 156 int f_prevlen; /* length of f_prevline */ 157 int f_prevcount; /* repetition cnt of prevline */ 158 int f_repeatcount; /* number of "repeated" msgs */ 159 }; 160 161 /* 162 * Intervals at which we flush out "message repeated" messages, 163 * in seconds after previous message is logged. After each flush, 164 * we move to the next interval until we reach the largest. 165 */ 166 int repeatinterval[] = { 30, 120, 600 }; /* # of secs before flush */ 167 #define MAXREPEAT ((sizeof(repeatinterval) / sizeof(repeatinterval[0])) - 1) 168 #define REPEATTIME(f) ((f)->f_time + repeatinterval[(f)->f_repeatcount]) 169 #define BACKOFF(f) { if (++(f)->f_repeatcount > MAXREPEAT) \ 170 (f)->f_repeatcount = MAXREPEAT; \ 171 } 172 173 /* values for f_type */ 174 #define F_UNUSED 0 /* unused entry */ 175 #define F_FILE 1 /* regular file */ 176 #define F_TTY 2 /* terminal */ 177 #define F_CONSOLE 3 /* console terminal */ 178 #define F_FORW 4 /* remote machine */ 179 #define F_USERS 5 /* list of users */ 180 #define F_WALL 6 /* everyone logged on */ 181 182 char *TypeNames[7] = { 183 "UNUSED", "FILE", "TTY", "CONSOLE", 184 "FORW", "USERS", "WALL" 185 }; 186 187 struct filed *Files; 188 struct filed consfile; 189 190 int Debug; /* debug flag */ 191 int daemonized = 0; /* we are not daemonized yet */ 192 char LocalHostName[MAXHOSTNAMELEN+1]; /* our hostname */ 193 char *LocalDomain; /* our local domain name */ 194 int *finet = NULL; /* Internet datagram sockets */ 195 int Initialized = 0; /* set when we have initialized ourselves */ 196 int MarkInterval = 20 * 60; /* interval between marks in seconds */ 197 int MarkSeq = 0; /* mark sequence number */ 198 int SecureMode = 0; /* listen only on unix domain socks */ 199 int UseNameService = 1; /* make domain name queries */ 200 int NumForwards = 0; /* number of forwarding actions in conf file */ 201 char **LogPaths; /* array of pathnames to read messages from */ 202 203 void cfline(char *, struct filed *); 204 char *cvthname(struct sockaddr_storage *); 205 int decode(const char *, CODE *); 206 void die(int); 207 void domark(int); 208 void fprintlog(struct filed *, int, char *); 209 int getmsgbufsize(void); 210 int* socksetup(int); 211 void init(int); 212 void logerror(const char *, ...); 213 void logmsg(int, char *, char *, int); 214 void printline(char *, char *); 215 void printsys(char *); 216 void reapchild(int); 217 void usage(void); 218 void wallmsg(struct filed *, struct iovec *); 219 int main(int, char *[]); 220 void logpath_add(char ***, int *, int *, char *); 221 void logpath_fileadd(char ***, int *, int *, char *); 222 223 int 224 main(int argc, char *argv[]) 225 { 226 int ch, *funix, i, j, fklog, len, linesize; 227 int *nfinetix, nfklogix, nfunixbaseix, nfds; 228 int funixsize = 0, funixmaxsize = 0; 229 struct sockaddr_un sunx, fromunix; 230 struct sockaddr_storage frominet; 231 char *p, *line, **pp; 232 struct pollfd *readfds; 233 uid_t uid = 0; 234 gid_t gid = 0; 235 char *user = NULL; 236 char *group = NULL; 237 char *root = "/"; 238 char *endp; 239 struct group *gr; 240 struct passwd *pw; 241 242 243 (void)setlocale(LC_ALL, ""); 244 245 while ((ch = getopt(argc, argv, "dnsf:m:p:P:u:g:t:")) != -1) 246 switch(ch) { 247 case 'd': /* debug */ 248 Debug++; 249 break; 250 case 'f': /* configuration file */ 251 ConfFile = optarg; 252 break; 253 case 'g': 254 group = optarg; 255 if (*group == '\0') 256 usage(); 257 break; 258 case 'm': /* mark interval */ 259 MarkInterval = atoi(optarg) * 60; 260 break; 261 case 'n': /* turn off DNS queries */ 262 UseNameService = 0; 263 break; 264 case 'p': /* path */ 265 logpath_add(&LogPaths, &funixsize, 266 &funixmaxsize, optarg); 267 break; 268 case 'P': /* file of paths */ 269 logpath_fileadd(&LogPaths, &funixsize, 270 &funixmaxsize, optarg); 271 break; 272 case 's': /* no network listen mode */ 273 SecureMode++; 274 break; 275 case 't': 276 root = optarg; 277 if (*root == '\0') 278 usage(); 279 break; 280 case 'u': 281 user = optarg; 282 if (*user == '\0') 283 usage(); 284 break; 285 case '?': 286 default: 287 usage(); 288 } 289 if ((argc -= optind) != 0) 290 usage(); 291 292 setlinebuf(stdout); 293 294 if (user != NULL) { 295 if (isdigit((unsigned char)*user)) { 296 uid = (uid_t)strtoul(user, &endp, 0); 297 if (*endp != '\0') 298 goto getuser; 299 } else { 300 getuser: 301 if ((pw = getpwnam(user)) != NULL) { 302 uid = pw->pw_uid; 303 } else { 304 errno = 0; 305 logerror("Cannot find user `%s'", user); 306 die (0); 307 } 308 } 309 } 310 311 if (group != NULL) { 312 if (isdigit((unsigned char)*group)) { 313 gid = (gid_t)strtoul(group, &endp, 0); 314 if (*endp != '\0') 315 goto getgroup; 316 } else { 317 getgroup: 318 if ((gr = getgrnam(group)) != NULL) { 319 gid = gr->gr_gid; 320 } else { 321 errno = 0; 322 logerror("Cannot find group `%s'", group); 323 die(0); 324 } 325 } 326 } 327 328 if (access (root, F_OK | R_OK)) { 329 logerror("Cannot access `%s'", root); 330 die (0); 331 } 332 333 consfile.f_type = F_CONSOLE; 334 (void)strcpy(consfile.f_un.f_fname, ctty); 335 (void)gethostname(LocalHostName, sizeof(LocalHostName)); 336 LocalHostName[sizeof(LocalHostName) - 1] = '\0'; 337 if ((p = strchr(LocalHostName, '.')) != NULL) { 338 *p++ = '\0'; 339 LocalDomain = p; 340 } else 341 LocalDomain = ""; 342 linesize = getmsgbufsize(); 343 if (linesize < MAXLINE) 344 linesize = MAXLINE; 345 linesize++; 346 line = malloc(linesize); 347 if (line == NULL) { 348 logerror("Couldn't allocate line buffer"); 349 die(0); 350 } 351 (void)signal(SIGTERM, die); 352 (void)signal(SIGINT, Debug ? die : SIG_IGN); 353 (void)signal(SIGQUIT, Debug ? die : SIG_IGN); 354 (void)signal(SIGCHLD, reapchild); 355 (void)signal(SIGALRM, domark); 356 (void)alarm(TIMERINTVL); 357 358 #ifndef SUN_LEN 359 #define SUN_LEN(unp) (strlen((unp)->sun_path) + 2) 360 #endif 361 if (funixsize == 0) 362 logpath_add(&LogPaths, &funixsize, 363 &funixmaxsize, _PATH_LOG); 364 funix = (int *)malloc(sizeof(int) * funixsize); 365 if (funix == NULL) { 366 logerror("Couldn't allocate funix descriptors"); 367 die(0); 368 } 369 for (j = 0, pp = LogPaths; *pp; pp++, j++) { 370 dprintf("Making unix dgram socket `%s'\n", *pp); 371 unlink(*pp); 372 memset(&sunx, 0, sizeof(sunx)); 373 sunx.sun_family = AF_LOCAL; 374 (void)strncpy(sunx.sun_path, *pp, sizeof(sunx.sun_path)); 375 funix[j] = socket(AF_LOCAL, SOCK_DGRAM, 0); 376 if (funix[j] < 0 || bind(funix[j], 377 (struct sockaddr *)&sunx, SUN_LEN(&sunx)) < 0 || 378 chmod(*pp, 0666) < 0) { 379 logerror("Cannot create `%s'", *pp); 380 die(0); 381 } 382 dprintf("Listening on unix dgram socket `%s'\n", *pp); 383 } 384 385 init(0); 386 387 if ((fklog = open(_PATH_KLOG, O_RDONLY, 0)) < 0) { 388 dprintf("Can't open `%s' (%d)\n", _PATH_KLOG, errno); 389 } else { 390 dprintf("Listening on kernel log `%s'\n", _PATH_KLOG); 391 } 392 393 dprintf("Off & running....\n"); 394 395 (void)signal(SIGHUP, init); 396 397 /* setup pollfd set. */ 398 readfds = (struct pollfd *)malloc(sizeof(struct pollfd) * 399 (funixsize + (finet ? *finet : 0) + 1)); 400 if (readfds == NULL) { 401 logerror("Couldn't allocate pollfds"); 402 die(0); 403 } 404 nfds = 0; 405 if (fklog >= 0) { 406 nfklogix = nfds++; 407 readfds[nfklogix].fd = fklog; 408 readfds[nfklogix].events = POLLIN | POLLPRI; 409 } 410 if (finet && !SecureMode) { 411 nfinetix = malloc(*finet * sizeof(*nfinetix)); 412 for (j = 0; j < *finet; j++) { 413 nfinetix[j] = nfds++; 414 readfds[nfinetix[j]].fd = finet[j+1]; 415 readfds[nfinetix[j]].events = POLLIN | POLLPRI; 416 } 417 } 418 nfunixbaseix = nfds; 419 for (j = 0, pp = LogPaths; *pp; pp++) { 420 readfds[nfds].fd = funix[j++]; 421 readfds[nfds++].events = POLLIN | POLLPRI; 422 } 423 424 /* 425 * All files are open, we can drop privileges and chroot 426 */ 427 dprintf("Attempt to chroot to `%s'\n", root); 428 if (chroot(root)) { 429 logerror("Failed to chroot to `%s'", root); 430 die(0); 431 } 432 dprintf("Attempt to set GID/EGID to `%d'\n", gid); 433 if (setgid(gid) || setegid(gid)) { 434 logerror("Failed to set gid to `%d'", gid); 435 die(0); 436 } 437 dprintf("Attempt to set UID/EUID to `%d'\n", uid); 438 if (setuid(uid) || seteuid(uid)) { 439 logerror("Failed to set uid to `%d'", uid); 440 die(0); 441 } 442 443 /* 444 * We cannot detach from the terminal before we are sure we won't 445 * have a fatal error, because error message would not go to the 446 * terminal and would not be logged because syslogd dies. 447 * All die() calls are behind us, we can call daemon() 448 */ 449 if (!Debug) { 450 (void)daemon(0, 0); 451 daemonized = 1; 452 453 /* tuck my process id away, if i'm not in debug mode */ 454 pidfile(NULL); 455 } 456 457 for (;;) { 458 int rv; 459 460 rv = poll(readfds, nfds, INFTIM); 461 if (rv == 0) 462 continue; 463 if (rv < 0) { 464 if (errno != EINTR) 465 logerror("poll() failed"); 466 continue; 467 } 468 dprintf("Got a message (%d)\n", rv); 469 if (fklog >= 0 && 470 (readfds[nfklogix].revents & (POLLIN | POLLPRI))) { 471 dprintf("Kernel log active\n"); 472 i = read(fklog, line, linesize - 1); 473 if (i > 0) { 474 line[i] = '\0'; 475 printsys(line); 476 } else if (i < 0 && errno != EINTR) { 477 logerror("klog failed"); 478 fklog = -1; 479 } 480 } 481 for (j = 0, pp = LogPaths; *pp; pp++, j++) { 482 if ((readfds[nfunixbaseix + j].revents & 483 (POLLIN | POLLPRI)) == 0) 484 continue; 485 486 dprintf("Unix socket (%s) active\n", *pp); 487 len = sizeof(fromunix); 488 i = recvfrom(funix[j], line, MAXLINE, 0, 489 (struct sockaddr *)&fromunix, &len); 490 if (i > 0) { 491 line[i] = '\0'; 492 printline(LocalHostName, line); 493 } else if (i < 0 && errno != EINTR) { 494 logerror("recvfrom() unix `%s'", *pp); 495 } 496 } 497 if (finet && !SecureMode) { 498 for (j = 0; j < *finet; j++) { 499 if (readfds[nfinetix[j]].revents & 500 (POLLIN | POLLPRI)) { 501 #ifdef LIBWRAP 502 struct request_info req; 503 #endif 504 int reject = 0; 505 506 dprintf("inet socket active\n"); 507 508 #ifdef LIBWRAP 509 request_init(&req, RQ_DAEMON, "syslogd", 510 RQ_FILE, finet[j + 1], NULL); 511 fromhost(&req); 512 reject = !hosts_access(&req); 513 if (reject) 514 dprintf("access denied\n"); 515 #endif 516 517 len = sizeof(frominet); 518 i = recvfrom(finet[j+1], line, MAXLINE, 519 0, (struct sockaddr *)&frominet, 520 &len); 521 if (i == 0 || (i < 0 && errno == EINTR)) 522 continue; 523 else if (i < 0) { 524 logerror("recvfrom inet"); 525 continue; 526 } 527 528 line[i] = '\0'; 529 if (!reject) 530 printline(cvthname(&frominet), 531 line); 532 } 533 } 534 } 535 } 536 } 537 538 void 539 usage(void) 540 { 541 542 (void)fprintf(stderr, 543 "usage: %s [-dns] [-f config_file] [-g group] [-m mark_interval]\n" 544 "\t[-P file_list] [-p log_socket [-p log_socket2 ...]]\n" 545 "\t[-t chroot_dir] [-u user]\n", getprogname()); 546 exit(1); 547 } 548 549 /* 550 * given a pointer to an array of char *'s, a pointer to it's current 551 * size and current allocated max size, and a new char * to add, add 552 * it, update everything as necessary, possibly allocating a new array 553 */ 554 void 555 logpath_add(char ***lp, int *szp, int *maxszp, char *new) 556 { 557 558 dprintf("Adding `%s' to the %p logpath list\n", new, *lp); 559 if (*szp == *maxszp) { 560 if (*maxszp == 0) { 561 *maxszp = 4; /* start of with enough for now */ 562 *lp = NULL; 563 } else 564 *maxszp *= 2; 565 *lp = realloc(*lp, sizeof(char *) * (*maxszp + 1)); 566 if (*lp == NULL) { 567 logerror("Couldn't allocate line buffer"); 568 die(0); 569 } 570 } 571 if (((*lp)[(*szp)++] = strdup(new)) == NULL) { 572 logerror("Couldn't allocate logpath"); 573 die(0); 574 } 575 (*lp)[(*szp)] = NULL; /* always keep it NULL terminated */ 576 } 577 578 /* do a file of log sockets */ 579 void 580 logpath_fileadd(char ***lp, int *szp, int *maxszp, char *file) 581 { 582 FILE *fp; 583 char *line; 584 size_t len; 585 586 fp = fopen(file, "r"); 587 if (fp == NULL) { 588 logerror("Could not open socket file list `%s'", file); 589 die(0); 590 } 591 592 while ((line = fgetln(fp, &len))) { 593 line[len - 1] = 0; 594 logpath_add(lp, szp, maxszp, line); 595 } 596 fclose(fp); 597 } 598 599 /* 600 * Take a raw input line, decode the message, and print the message 601 * on the appropriate log files. 602 */ 603 void 604 printline(char *hname, char *msg) 605 { 606 int c, pri; 607 char *p, *q, line[MAXLINE + 1]; 608 609 /* test for special codes */ 610 pri = DEFUPRI; 611 p = msg; 612 if (*p == '<') { 613 pri = 0; 614 while (isdigit(*++p)) 615 pri = 10 * pri + (*p - '0'); 616 if (*p == '>') 617 ++p; 618 } 619 if (pri &~ (LOG_FACMASK|LOG_PRIMASK)) 620 pri = DEFUPRI; 621 622 /* don't allow users to log kernel messages */ 623 if (LOG_FAC(pri) == LOG_KERN) 624 pri = LOG_MAKEPRI(LOG_USER, LOG_PRI(pri)); 625 626 q = line; 627 628 while ((c = *p++) != '\0' && 629 q < &line[sizeof(line) - 2]) { 630 c &= 0177; 631 if (iscntrl(c)) 632 if (c == '\n') 633 *q++ = ' '; 634 else if (c == '\t') 635 *q++ = '\t'; 636 else { 637 *q++ = '^'; 638 *q++ = c ^ 0100; 639 } 640 else 641 *q++ = c; 642 } 643 *q = '\0'; 644 645 logmsg(pri, line, hname, 0); 646 } 647 648 /* 649 * Take a raw input line from /dev/klog, split and format similar to syslog(). 650 */ 651 void 652 printsys(char *msg) 653 { 654 int c, pri, flags; 655 char *lp, *p, *q, line[MAXLINE + 1]; 656 657 (void)strcpy(line, _PATH_UNIX); 658 (void)strcat(line, ": "); 659 lp = line + strlen(line); 660 for (p = msg; *p != '\0'; ) { 661 flags = SYNC_FILE | ADDDATE; /* fsync file after write */ 662 pri = DEFSPRI; 663 if (*p == '<') { 664 pri = 0; 665 while (isdigit(*++p)) 666 pri = 10 * pri + (*p - '0'); 667 if (*p == '>') 668 ++p; 669 } else { 670 /* kernel printf's come out on console */ 671 flags |= IGN_CONS; 672 } 673 if (pri &~ (LOG_FACMASK|LOG_PRIMASK)) 674 pri = DEFSPRI; 675 q = lp; 676 while (*p != '\0' && (c = *p++) != '\n' && 677 q < &line[MAXLINE]) 678 *q++ = c; 679 *q = '\0'; 680 logmsg(pri, line, LocalHostName, flags); 681 } 682 } 683 684 time_t now; 685 686 /* 687 * Log a message to the appropriate log files, users, etc. based on 688 * the priority. 689 */ 690 void 691 logmsg(int pri, char *msg, char *from, int flags) 692 { 693 struct filed *f; 694 int fac, msglen, omask, prilev; 695 char *timestamp; 696 697 dprintf("logmsg: pri 0%o, flags 0x%x, from %s, msg %s\n", 698 pri, flags, from, msg); 699 700 omask = sigblock(sigmask(SIGHUP)|sigmask(SIGALRM)); 701 702 /* 703 * Check to see if msg looks non-standard. 704 */ 705 msglen = strlen(msg); 706 if (msglen < 16 || msg[3] != ' ' || msg[6] != ' ' || 707 msg[9] != ':' || msg[12] != ':' || msg[15] != ' ') 708 flags |= ADDDATE; 709 710 (void)time(&now); 711 if (flags & ADDDATE) 712 timestamp = ctime(&now) + 4; 713 else { 714 timestamp = msg; 715 msg += 16; 716 msglen -= 16; 717 } 718 719 /* extract facility and priority level */ 720 if (flags & MARK) 721 fac = LOG_NFACILITIES; 722 else 723 fac = LOG_FAC(pri); 724 prilev = LOG_PRI(pri); 725 726 /* log the message to the particular outputs */ 727 if (!Initialized) { 728 f = &consfile; 729 f->f_file = open(ctty, O_WRONLY, 0); 730 731 if (f->f_file >= 0) { 732 fprintlog(f, flags, msg); 733 (void)close(f->f_file); 734 } 735 (void)sigsetmask(omask); 736 return; 737 } 738 for (f = Files; f; f = f->f_next) { 739 /* skip messages that are incorrect priority */ 740 if (f->f_pmask[fac] < prilev || 741 f->f_pmask[fac] == INTERNAL_NOPRI) 742 continue; 743 744 if (f->f_type == F_CONSOLE && (flags & IGN_CONS)) 745 continue; 746 747 /* don't output marks to recently written files */ 748 if ((flags & MARK) && (now - f->f_time) < MarkInterval / 2) 749 continue; 750 751 /* 752 * suppress duplicate lines to this file 753 */ 754 if ((flags & MARK) == 0 && msglen == f->f_prevlen && 755 !strcmp(msg, f->f_prevline) && 756 !strcmp(from, f->f_prevhost)) { 757 (void)strncpy(f->f_lasttime, timestamp, 15); 758 f->f_prevcount++; 759 dprintf("Msg repeated %d times, %ld sec of %d\n", 760 f->f_prevcount, (long)(now - f->f_time), 761 repeatinterval[f->f_repeatcount]); 762 /* 763 * If domark would have logged this by now, 764 * flush it now (so we don't hold isolated messages), 765 * but back off so we'll flush less often 766 * in the future. 767 */ 768 if (now > REPEATTIME(f)) { 769 fprintlog(f, flags, (char *)NULL); 770 BACKOFF(f); 771 } 772 } else { 773 /* new line, save it */ 774 if (f->f_prevcount) 775 fprintlog(f, 0, (char *)NULL); 776 f->f_repeatcount = 0; 777 f->f_prevpri = pri; 778 (void)strncpy(f->f_lasttime, timestamp, 15); 779 (void)strncpy(f->f_prevhost, from, 780 sizeof(f->f_prevhost)); 781 if (msglen < MAXSVLINE) { 782 f->f_prevlen = msglen; 783 (void)strcpy(f->f_prevline, msg); 784 fprintlog(f, flags, (char *)NULL); 785 } else { 786 f->f_prevline[0] = 0; 787 f->f_prevlen = 0; 788 fprintlog(f, flags, msg); 789 } 790 } 791 } 792 (void)sigsetmask(omask); 793 } 794 795 void 796 fprintlog(struct filed *f, int flags, char *msg) 797 { 798 struct iovec iov[6]; 799 struct iovec *v; 800 struct addrinfo *r; 801 int j, l, lsent; 802 char line[MAXLINE + 1], repbuf[80], greetings[200]; 803 804 v = iov; 805 if (f->f_type == F_WALL) { 806 v->iov_base = greetings; 807 v->iov_len = snprintf(greetings, sizeof greetings, 808 "\r\n\7Message from syslogd@%s at %.24s ...\r\n", 809 f->f_prevhost, ctime(&now)); 810 v++; 811 v->iov_base = ""; 812 v->iov_len = 0; 813 v++; 814 } else { 815 v->iov_base = f->f_lasttime; 816 v->iov_len = 15; 817 v++; 818 v->iov_base = " "; 819 v->iov_len = 1; 820 v++; 821 } 822 v->iov_base = f->f_prevhost; 823 v->iov_len = strlen(v->iov_base); 824 v++; 825 v->iov_base = " "; 826 v->iov_len = 1; 827 v++; 828 829 if (msg) { 830 v->iov_base = msg; 831 v->iov_len = strlen(msg); 832 } else if (f->f_prevcount > 1) { 833 v->iov_base = repbuf; 834 v->iov_len = snprintf(repbuf, sizeof repbuf, 835 "last message repeated %d times", f->f_prevcount); 836 } else { 837 v->iov_base = f->f_prevline; 838 v->iov_len = f->f_prevlen; 839 } 840 v++; 841 842 dprintf("Logging to %s", TypeNames[f->f_type]); 843 f->f_time = now; 844 845 switch (f->f_type) { 846 case F_UNUSED: 847 dprintf("\n"); 848 break; 849 850 case F_FORW: 851 dprintf(" %s\n", f->f_un.f_forw.f_hname); 852 /* 853 * check for local vs remote messages 854 * (from FreeBSD PR#bin/7055) 855 */ 856 if (strcmp(f->f_prevhost, LocalHostName)) { 857 l = snprintf(line, sizeof(line) - 1, 858 "<%d>%.15s [%s]: %s", 859 f->f_prevpri, (char *) iov[0].iov_base, 860 f->f_prevhost, (char *) iov[4].iov_base); 861 } else { 862 l = snprintf(line, sizeof(line) - 1, "<%d>%.15s %s", 863 f->f_prevpri, (char *) iov[0].iov_base, 864 (char *) iov[4].iov_base); 865 } 866 if (l > MAXLINE) 867 l = MAXLINE; 868 if (finet) { 869 for (r = f->f_un.f_forw.f_addr; r; r = r->ai_next) { 870 for (j = 0; j < *finet; j++) { 871 #if 0 872 /* 873 * should we check AF first, or just 874 * trial and error? FWD 875 */ 876 if (r->ai_family == 877 address_family_of(finet[j+1])) 878 #endif 879 lsent = sendto(finet[j+1], line, l, 0, 880 r->ai_addr, r->ai_addrlen); 881 if (lsent == l) 882 break; 883 } 884 } 885 if (lsent != l) { 886 f->f_type = F_UNUSED; 887 logerror("sendto() failed"); 888 } 889 } 890 break; 891 892 case F_CONSOLE: 893 if (flags & IGN_CONS) { 894 dprintf(" (ignored)\n"); 895 break; 896 } 897 /* FALLTHROUGH */ 898 899 case F_TTY: 900 case F_FILE: 901 dprintf(" %s\n", f->f_un.f_fname); 902 if (f->f_type != F_FILE) { 903 v->iov_base = "\r\n"; 904 v->iov_len = 2; 905 } else { 906 v->iov_base = "\n"; 907 v->iov_len = 1; 908 } 909 again: 910 if (writev(f->f_file, iov, 6) < 0) { 911 int e = errno; 912 (void)close(f->f_file); 913 /* 914 * Check for errors on TTY's due to loss of tty 915 */ 916 if ((e == EIO || e == EBADF) && f->f_type != F_FILE) { 917 f->f_file = open(f->f_un.f_fname, 918 O_WRONLY|O_APPEND, 0); 919 if (f->f_file < 0) { 920 f->f_type = F_UNUSED; 921 logerror(f->f_un.f_fname); 922 } else 923 goto again; 924 } else { 925 f->f_type = F_UNUSED; 926 errno = e; 927 logerror(f->f_un.f_fname); 928 } 929 } else if (flags & SYNC_FILE) 930 (void)fsync(f->f_file); 931 break; 932 933 case F_USERS: 934 case F_WALL: 935 dprintf("\n"); 936 v->iov_base = "\r\n"; 937 v->iov_len = 2; 938 wallmsg(f, iov); 939 break; 940 } 941 f->f_prevcount = 0; 942 } 943 944 /* 945 * WALLMSG -- Write a message to the world at large 946 * 947 * Write the specified message to either the entire 948 * world, or a list of approved users. 949 */ 950 void 951 wallmsg(struct filed *f, struct iovec *iov) 952 { 953 static int reenter; /* avoid calling ourselves */ 954 FILE *uf; 955 struct utmp ut; 956 int i; 957 char *p; 958 char line[sizeof(ut.ut_line) + 1]; 959 960 if (reenter++) 961 return; 962 if ((uf = fopen(_PATH_UTMP, "r")) == NULL) { 963 logerror(_PATH_UTMP); 964 reenter = 0; 965 return; 966 } 967 /* NOSTRICT */ 968 while (fread((char *)&ut, sizeof(ut), 1, uf) == 1) { 969 if (ut.ut_name[0] == '\0') 970 continue; 971 strncpy(line, ut.ut_line, sizeof(ut.ut_line)); 972 line[sizeof(ut.ut_line)] = '\0'; 973 if (f->f_type == F_WALL) { 974 if ((p = ttymsg(iov, 6, line, TTYMSGTIME)) != NULL) { 975 errno = 0; /* already in msg */ 976 logerror(p); 977 } 978 continue; 979 } 980 /* should we send the message to this user? */ 981 for (i = 0; i < MAXUNAMES; i++) { 982 if (!f->f_un.f_uname[i][0]) 983 break; 984 if (!strncmp(f->f_un.f_uname[i], ut.ut_name, 985 UT_NAMESIZE)) { 986 if ((p = ttymsg(iov, 6, line, TTYMSGTIME)) 987 != NULL) { 988 errno = 0; /* already in msg */ 989 logerror(p); 990 } 991 break; 992 } 993 } 994 } 995 (void)fclose(uf); 996 reenter = 0; 997 } 998 999 void 1000 reapchild(int signo) 1001 { 1002 union wait status; 1003 1004 while (wait3((int *)&status, WNOHANG, (struct rusage *)NULL) > 0) 1005 ; 1006 } 1007 1008 /* 1009 * Return a printable representation of a host address. 1010 */ 1011 char * 1012 cvthname(struct sockaddr_storage *f) 1013 { 1014 int error; 1015 char *p; 1016 #ifdef KAME_SCOPEID 1017 const int niflag = NI_DGRAM | NI_WITHSCOPEID; 1018 #else 1019 const int niflag = NI_DGRAM; 1020 #endif 1021 static char host[NI_MAXHOST], ip[NI_MAXHOST]; 1022 1023 error = getnameinfo((struct sockaddr*)f, ((struct sockaddr*)f)->sa_len, 1024 ip, sizeof ip, NULL, 0, NI_NUMERICHOST|niflag); 1025 1026 dprintf("cvthname(%s)\n", ip); 1027 1028 if (error) { 1029 dprintf("Malformed from address %s\n", gai_strerror(error)); 1030 return ("???"); 1031 } 1032 1033 if (!UseNameService) 1034 return (ip); 1035 1036 error = getnameinfo((struct sockaddr*)f, ((struct sockaddr*)f)->sa_len, 1037 host, sizeof host, NULL, 0, niflag); 1038 if (error) { 1039 dprintf("Host name for your address (%s) unknown\n", ip); 1040 return (ip); 1041 } 1042 if ((p = strchr(host, '.')) && strcmp(p + 1, LocalDomain) == 0) 1043 *p = '\0'; 1044 return (host); 1045 } 1046 1047 void 1048 domark(int signo) 1049 { 1050 struct filed *f; 1051 1052 now = time((time_t *)NULL); 1053 MarkSeq += TIMERINTVL; 1054 if (MarkSeq >= MarkInterval) { 1055 logmsg(LOG_INFO, "-- MARK --", LocalHostName, ADDDATE|MARK); 1056 MarkSeq = 0; 1057 } 1058 1059 for (f = Files; f; f = f->f_next) { 1060 if (f->f_prevcount && now >= REPEATTIME(f)) { 1061 dprintf("Flush %s: repeated %d times, %d sec.\n", 1062 TypeNames[f->f_type], f->f_prevcount, 1063 repeatinterval[f->f_repeatcount]); 1064 fprintlog(f, 0, (char *)NULL); 1065 BACKOFF(f); 1066 } 1067 } 1068 (void)alarm(TIMERINTVL); 1069 } 1070 1071 /* 1072 * Print syslogd errors some place. 1073 */ 1074 void 1075 logerror(const char *fmt, ...) 1076 { 1077 va_list ap; 1078 char tmpbuf[BUFSIZ]; 1079 char buf[BUFSIZ]; 1080 1081 va_start(ap, fmt); 1082 1083 (void)vsnprintf(tmpbuf, sizeof(tmpbuf), fmt, ap); 1084 1085 va_end(ap); 1086 1087 if (errno) 1088 (void)snprintf(buf, sizeof(buf), "syslogd: %s: %s", 1089 tmpbuf, strerror(errno)); 1090 else 1091 (void)snprintf(buf, sizeof(buf), "syslogd: %s", tmpbuf); 1092 1093 if (daemonized) 1094 logmsg(LOG_SYSLOG|LOG_ERR, buf, LocalHostName, ADDDATE); 1095 if (!daemonized && Debug) 1096 dprintf("%s\n", buf); 1097 if (!daemonized && !Debug) 1098 printf("%s\n", buf); 1099 1100 return; 1101 } 1102 1103 void 1104 die(int signo) 1105 { 1106 struct filed *f; 1107 char **p; 1108 1109 for (f = Files; f != NULL; f = f->f_next) { 1110 /* flush any pending output */ 1111 if (f->f_prevcount) 1112 fprintlog(f, 0, (char *)NULL); 1113 } 1114 errno = 0; 1115 if (signo) 1116 logerror("Exiting on signal %d", signo); 1117 else 1118 logerror("Fatal error, exiting"); 1119 for (p = LogPaths; p && *p; p++) 1120 unlink(*p); 1121 exit(0); 1122 } 1123 1124 /* 1125 * INIT -- Initialize syslogd from configuration table 1126 */ 1127 void 1128 init(int signo) 1129 { 1130 int i; 1131 FILE *cf; 1132 struct filed *f, *next, **nextp; 1133 char *p; 1134 char cline[LINE_MAX]; 1135 1136 dprintf("init\n"); 1137 1138 /* 1139 * Close all open log files. 1140 */ 1141 Initialized = 0; 1142 for (f = Files; f != NULL; f = next) { 1143 /* flush any pending output */ 1144 if (f->f_prevcount) 1145 fprintlog(f, 0, (char *)NULL); 1146 1147 switch (f->f_type) { 1148 case F_FILE: 1149 case F_TTY: 1150 case F_CONSOLE: 1151 (void)close(f->f_file); 1152 break; 1153 case F_FORW: 1154 if (f->f_un.f_forw.f_addr) 1155 freeaddrinfo(f->f_un.f_forw.f_addr); 1156 break; 1157 } 1158 next = f->f_next; 1159 free((char *)f); 1160 } 1161 Files = NULL; 1162 nextp = &Files; 1163 1164 /* 1165 * Close all open sockets 1166 */ 1167 1168 if (finet) { 1169 for (i = 0; i < *finet; i++) { 1170 if (close(finet[i+1]) < 0) { 1171 logerror("close() failed"); 1172 die(0); 1173 } 1174 } 1175 } 1176 1177 /* 1178 * Reset counter of forwarding actions 1179 */ 1180 1181 NumForwards=0; 1182 1183 /* open the configuration file */ 1184 if ((cf = fopen(ConfFile, "r")) == NULL) { 1185 dprintf("Cannot open `%s'\n", ConfFile); 1186 *nextp = (struct filed *)calloc(1, sizeof(*f)); 1187 cfline("*.ERR\t/dev/console", *nextp); 1188 (*nextp)->f_next = (struct filed *)calloc(1, sizeof(*f)); 1189 cfline("*.PANIC\t*", (*nextp)->f_next); 1190 Initialized = 1; 1191 return; 1192 } 1193 1194 /* 1195 * Foreach line in the conf table, open that file. 1196 */ 1197 f = NULL; 1198 while (fgets(cline, sizeof(cline), cf) != NULL) { 1199 /* 1200 * check for end-of-section, comments, strip off trailing 1201 * spaces and newline character. 1202 */ 1203 for (p = cline; isspace(*p); ++p) 1204 continue; 1205 if (*p == '\0' || *p == '#') 1206 continue; 1207 for (p = strchr(cline, '\0'); isspace(*--p);) 1208 continue; 1209 *++p = '\0'; 1210 f = (struct filed *)calloc(1, sizeof(*f)); 1211 *nextp = f; 1212 nextp = &f->f_next; 1213 cfline(cline, f); 1214 } 1215 1216 /* close the configuration file */ 1217 (void)fclose(cf); 1218 1219 Initialized = 1; 1220 1221 if (Debug) { 1222 for (f = Files; f; f = f->f_next) { 1223 for (i = 0; i <= LOG_NFACILITIES; i++) 1224 if (f->f_pmask[i] == INTERNAL_NOPRI) 1225 printf("X "); 1226 else 1227 printf("%d ", f->f_pmask[i]); 1228 printf("%s: ", TypeNames[f->f_type]); 1229 switch (f->f_type) { 1230 case F_FILE: 1231 case F_TTY: 1232 case F_CONSOLE: 1233 printf("%s", f->f_un.f_fname); 1234 break; 1235 1236 case F_FORW: 1237 printf("%s", f->f_un.f_forw.f_hname); 1238 break; 1239 1240 case F_USERS: 1241 for (i = 0; 1242 i < MAXUNAMES && *f->f_un.f_uname[i]; i++) 1243 printf("%s, ", f->f_un.f_uname[i]); 1244 break; 1245 } 1246 printf("\n"); 1247 } 1248 } 1249 1250 finet = socksetup(PF_UNSPEC); 1251 if (finet) { 1252 if (SecureMode) { 1253 for (i = 0; i < *finet; i++) { 1254 if (shutdown(finet[i+1], SHUT_RD) < 0) { 1255 logerror("shutdown() failed"); 1256 die(0); 1257 } 1258 } 1259 } else 1260 dprintf("Listening on inet and/or inet6 socket\n"); 1261 dprintf("Sending on inet and/or inet6 socket\n"); 1262 } 1263 1264 logmsg(LOG_SYSLOG|LOG_INFO, "syslogd: restart", LocalHostName, ADDDATE); 1265 dprintf("syslogd: restarted\n"); 1266 } 1267 1268 /* 1269 * Crack a configuration file line 1270 */ 1271 void 1272 cfline(char *line, struct filed *f) 1273 { 1274 struct addrinfo hints, *res; 1275 int error, i, pri; 1276 char *bp, *p, *q; 1277 char buf[MAXLINE]; 1278 int sp_err; 1279 1280 dprintf("cfline(%s)\n", line); 1281 1282 errno = 0; /* keep strerror() stuff out of logerror messages */ 1283 1284 /* clear out file entry */ 1285 memset(f, 0, sizeof(*f)); 1286 for (i = 0; i <= LOG_NFACILITIES; i++) 1287 f->f_pmask[i] = INTERNAL_NOPRI; 1288 1289 /* 1290 * There should not be any space before the log facility. 1291 * Check this is okay, complain and fix if it is not. 1292 */ 1293 q = line; 1294 if (isblank((unsigned char)*line)) { 1295 errno = 0; 1296 logerror( 1297 "Warning: `%s' space or tab before the log facility", 1298 line); 1299 /* Fix: strip all spaces/tabs before the log facility */ 1300 while (*q++ && isblank((unsigned char)*q)); 1301 line = q; 1302 } 1303 1304 /* 1305 * q is now at the first char of the log facility 1306 * There should be at least one tab after the log facility 1307 * Check this is okay, and complain and fix if it is not. 1308 */ 1309 q = line + strlen(line); 1310 while (!isblank((unsigned char)*q) && (q != line)) 1311 q--; 1312 if ((q == line) && strlen(line)) { 1313 /* No tabs or space in a non empty line: complain */ 1314 errno = 0; 1315 logerror( 1316 "Error: `%s' log facility or log target missing", 1317 line); 1318 } 1319 1320 /* q is at the end of the blank between the two fields */ 1321 sp_err = 0; 1322 while (isblank((unsigned char)*q) && (q != line)) 1323 if (*q-- == ' ') 1324 sp_err = 1; 1325 1326 if (sp_err) { 1327 /* 1328 * A space somewhere between the log facility 1329 * and the log target: complain 1330 */ 1331 errno = 0; 1332 logerror( 1333 "Warning: `%s' space found where tab is expected", 1334 line); 1335 /* ... and fix the problem: replace all spaces by tabs */ 1336 while (*++q && isblank((unsigned char)*q)) 1337 if (*q == ' ') 1338 *q='\t'; 1339 } 1340 1341 /* scan through the list of selectors */ 1342 for (p = line; *p && *p != '\t';) { 1343 1344 /* find the end of this facility name list */ 1345 for (q = p; *q && *q != '\t' && *q++ != '.'; ) 1346 continue; 1347 1348 /* collect priority name */ 1349 for (bp = buf; *q && !strchr("\t,;", *q); ) 1350 *bp++ = *q++; 1351 *bp = '\0'; 1352 1353 /* skip cruft */ 1354 while (strchr(", ;", *q)) 1355 q++; 1356 1357 /* decode priority name */ 1358 if (*buf == '*') 1359 pri = LOG_PRIMASK + 1; 1360 else { 1361 pri = decode(buf, prioritynames); 1362 if (pri < 0) { 1363 errno = 0; 1364 logerror("Unknown priority name `%s'", buf); 1365 return; 1366 } 1367 } 1368 1369 /* scan facilities */ 1370 while (*p && !strchr("\t.;", *p)) { 1371 for (bp = buf; *p && !strchr("\t,;.", *p); ) 1372 *bp++ = *p++; 1373 *bp = '\0'; 1374 if (*buf == '*') 1375 for (i = 0; i < LOG_NFACILITIES; i++) 1376 f->f_pmask[i] = pri; 1377 else { 1378 i = decode(buf, facilitynames); 1379 if (i < 0) { 1380 errno = 0; 1381 logerror("Unknown facility name `%s'", 1382 buf); 1383 return; 1384 } 1385 f->f_pmask[i >> 3] = pri; 1386 } 1387 while (*p == ',' || *p == ' ') 1388 p++; 1389 } 1390 1391 p = q; 1392 } 1393 1394 /* skip to action part */ 1395 sp_err = 0; 1396 while ((*p == '\t') || (*p == ' ')) 1397 p++; 1398 1399 switch (*p) 1400 { 1401 case '@': 1402 (void)strcpy(f->f_un.f_forw.f_hname, ++p); 1403 memset(&hints, 0, sizeof(hints)); 1404 hints.ai_family = AF_UNSPEC; 1405 hints.ai_socktype = SOCK_DGRAM; 1406 hints.ai_protocol = 0; 1407 error = getaddrinfo(f->f_un.f_forw.f_hname, "syslog", &hints, 1408 &res); 1409 if (error) { 1410 logerror(gai_strerror(error)); 1411 break; 1412 } 1413 f->f_un.f_forw.f_addr = res; 1414 f->f_type = F_FORW; 1415 NumForwards++; 1416 break; 1417 1418 case '/': 1419 (void)strcpy(f->f_un.f_fname, p); 1420 if ((f->f_file = open(p, O_WRONLY|O_APPEND, 0)) < 0) { 1421 f->f_type = F_UNUSED; 1422 logerror(p); 1423 break; 1424 } 1425 if (isatty(f->f_file)) 1426 f->f_type = F_TTY; 1427 else 1428 f->f_type = F_FILE; 1429 if (strcmp(p, ctty) == 0) 1430 f->f_type = F_CONSOLE; 1431 break; 1432 1433 case '*': 1434 f->f_type = F_WALL; 1435 break; 1436 1437 default: 1438 for (i = 0; i < MAXUNAMES && *p; i++) { 1439 for (q = p; *q && *q != ','; ) 1440 q++; 1441 (void)strncpy(f->f_un.f_uname[i], p, UT_NAMESIZE); 1442 if ((q - p) > UT_NAMESIZE) 1443 f->f_un.f_uname[i][UT_NAMESIZE] = '\0'; 1444 else 1445 f->f_un.f_uname[i][q - p] = '\0'; 1446 while (*q == ',' || *q == ' ') 1447 q++; 1448 p = q; 1449 } 1450 f->f_type = F_USERS; 1451 break; 1452 } 1453 } 1454 1455 1456 /* 1457 * Decode a symbolic name to a numeric value 1458 */ 1459 int 1460 decode(const char *name, CODE *codetab) 1461 { 1462 CODE *c; 1463 char *p, buf[40]; 1464 1465 if (isdigit(*name)) 1466 return (atoi(name)); 1467 1468 for (p = buf; *name && p < &buf[sizeof(buf) - 1]; p++, name++) { 1469 if (isupper(*name)) 1470 *p = tolower(*name); 1471 else 1472 *p = *name; 1473 } 1474 *p = '\0'; 1475 for (c = codetab; c->c_name; c++) 1476 if (!strcmp(buf, c->c_name)) 1477 return (c->c_val); 1478 1479 return (-1); 1480 } 1481 1482 /* 1483 * Retrieve the size of the kernel message buffer, via sysctl. 1484 */ 1485 int 1486 getmsgbufsize(void) 1487 { 1488 int msgbufsize, mib[2]; 1489 size_t size; 1490 1491 mib[0] = CTL_KERN; 1492 mib[1] = KERN_MSGBUFSIZE; 1493 size = sizeof msgbufsize; 1494 if (sysctl(mib, 2, &msgbufsize, &size, NULL, 0) == -1) { 1495 dprintf("Couldn't get kern.msgbufsize\n"); 1496 return (0); 1497 } 1498 return (msgbufsize); 1499 } 1500 1501 int * 1502 socksetup(int af) 1503 { 1504 struct addrinfo hints, *res, *r; 1505 int error, maxs, *s, *socks; 1506 1507 if(SecureMode && !NumForwards) 1508 return(NULL); 1509 1510 memset(&hints, 0, sizeof(hints)); 1511 hints.ai_flags = AI_PASSIVE; 1512 hints.ai_family = af; 1513 hints.ai_socktype = SOCK_DGRAM; 1514 error = getaddrinfo(NULL, "syslog", &hints, &res); 1515 if (error) { 1516 logerror(gai_strerror(error)); 1517 errno = 0; 1518 die(0); 1519 } 1520 1521 /* Count max number of sockets we may open */ 1522 for (maxs = 0, r = res; r; r = r->ai_next, maxs++) 1523 continue; 1524 socks = malloc ((maxs+1) * sizeof(int)); 1525 if (!socks) { 1526 logerror("Couldn't allocate memory for sockets"); 1527 die(0); 1528 } 1529 1530 *socks = 0; /* num of sockets counter at start of array */ 1531 s = socks+1; 1532 for (r = res; r; r = r->ai_next) { 1533 *s = socket(r->ai_family, r->ai_socktype, r->ai_protocol); 1534 if (*s < 0) { 1535 logerror("socket() failed"); 1536 continue; 1537 } 1538 if (!SecureMode && bind(*s, r->ai_addr, r->ai_addrlen) < 0) { 1539 logerror("bind() failed"); 1540 close (*s); 1541 continue; 1542 } 1543 1544 *socks = *socks + 1; 1545 s++; 1546 } 1547 1548 if (*socks == 0) { 1549 free (socks); 1550 if(Debug) 1551 return(NULL); 1552 else 1553 die(0); 1554 } 1555 if (res) 1556 freeaddrinfo(res); 1557 1558 return(socks); 1559 } 1560