syslogd.c revision 1.58 1 /* $NetBSD: syslogd.c,v 1.58 2003/05/14 23:53:09 itojun Exp $ */
2
3 /*
4 * Copyright (c) 1983, 1988, 1993, 1994
5 * The Regents of the University of California. All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. All advertising materials mentioning features or use of this software
16 * must display the following acknowledgement:
17 * This product includes software developed by the University of
18 * California, Berkeley and its contributors.
19 * 4. Neither the name of the University nor the names of its contributors
20 * may be used to endorse or promote products derived from this software
21 * without specific prior written permission.
22 *
23 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * SUCH DAMAGE.
34 */
35
36 #include <sys/cdefs.h>
37 #ifndef lint
38 __COPYRIGHT("@(#) Copyright (c) 1983, 1988, 1993, 1994\n\
39 The Regents of the University of California. All rights reserved.\n");
40 #endif /* not lint */
41
42 #ifndef lint
43 #if 0
44 static char sccsid[] = "@(#)syslogd.c 8.3 (Berkeley) 4/4/94";
45 #else
46 __RCSID("$NetBSD: syslogd.c,v 1.58 2003/05/14 23:53:09 itojun Exp $");
47 #endif
48 #endif /* not lint */
49
50 /*
51 * syslogd -- log system messages
52 *
53 * This program implements a system log. It takes a series of lines.
54 * Each line may have a priority, signified as "<n>" as
55 * the first characters of the line. If this is
56 * not present, a default priority is used.
57 *
58 * To kill syslogd, send a signal 15 (terminate). A signal 1 (hup) will
59 * cause it to reread its configuration file.
60 *
61 * Defined Constants:
62 *
63 * MAXLINE -- the maximimum line length that can be handled.
64 * DEFUPRI -- the default priority for user messages
65 * DEFSPRI -- the default priority for kernel messages
66 *
67 * Author: Eric Allman
68 * extensive changes by Ralph Campbell
69 * more extensive changes by Eric Allman (again)
70 */
71
72 #define MAXLINE 1024 /* maximum line length */
73 #define MAXSVLINE 120 /* maximum saved line length */
74 #define DEFUPRI (LOG_USER|LOG_NOTICE)
75 #define DEFSPRI (LOG_KERN|LOG_CRIT)
76 #define TIMERINTVL 30 /* interval for checking flush, mark */
77 #define TTYMSGTIME 1 /* timeout passed to ttymsg */
78
79 #include <sys/param.h>
80 #include <sys/socket.h>
81 #include <sys/sysctl.h>
82 #include <sys/types.h>
83 #include <sys/un.h>
84 #include <sys/wait.h>
85
86 #include <netinet/in.h>
87
88 #include <ctype.h>
89 #include <errno.h>
90 #include <fcntl.h>
91 #include <grp.h>
92 #include <locale.h>
93 #include <netdb.h>
94 #include <poll.h>
95 #include <pwd.h>
96 #include <signal.h>
97 #include <stdarg.h>
98 #include <stdio.h>
99 #include <stdlib.h>
100 #include <string.h>
101 #include <unistd.h>
102 #include <util.h>
103
104 #include "utmpentry.h"
105 #include "pathnames.h"
106
107 #define SYSLOG_NAMES
108 #include <sys/syslog.h>
109
110 #ifdef LIBWRAP
111 #include <tcpd.h>
112
113 int allow_severity = LOG_AUTH|LOG_INFO;
114 int deny_severity = LOG_AUTH|LOG_WARNING;
115 #endif
116
117 char *ConfFile = _PATH_LOGCONF;
118 char ctty[] = _PATH_CONSOLE;
119
120 #define FDMASK(fd) (1 << (fd))
121
122 #define dprintf if (Debug) printf
123
124 #define MAXUNAMES 20 /* maximum number of user names */
125
126 /*
127 * Flags to logmsg().
128 */
129
130 #define IGN_CONS 0x001 /* don't print on console */
131 #define SYNC_FILE 0x002 /* do fsync on file after printing */
132 #define ADDDATE 0x004 /* add a date to the message */
133 #define MARK 0x008 /* this message is a mark */
134
135 /*
136 * This structure represents the files that will have log
137 * copies printed.
138 */
139
140 struct filed {
141 struct filed *f_next; /* next in linked list */
142 short f_type; /* entry type, see below */
143 short f_file; /* file descriptor */
144 time_t f_time; /* time this was last written */
145 u_char f_pmask[LOG_NFACILITIES+1]; /* priority mask */
146 union {
147 char f_uname[MAXUNAMES][UT_NAMESIZE+1];
148 struct {
149 char f_hname[MAXHOSTNAMELEN+1];
150 struct addrinfo *f_addr;
151 } f_forw; /* forwarding address */
152 char f_fname[MAXPATHLEN];
153 } f_un;
154 char f_prevline[MAXSVLINE]; /* last message logged */
155 char f_lasttime[16]; /* time of last occurrence */
156 char f_prevhost[MAXHOSTNAMELEN+1]; /* host from which recd. */
157 int f_prevpri; /* pri of f_prevline */
158 int f_prevlen; /* length of f_prevline */
159 int f_prevcount; /* repetition cnt of prevline */
160 int f_repeatcount; /* number of "repeated" msgs */
161 };
162
163 /*
164 * Intervals at which we flush out "message repeated" messages,
165 * in seconds after previous message is logged. After each flush,
166 * we move to the next interval until we reach the largest.
167 */
168 int repeatinterval[] = { 30, 120, 600 }; /* # of secs before flush */
169 #define MAXREPEAT ((sizeof(repeatinterval) / sizeof(repeatinterval[0])) - 1)
170 #define REPEATTIME(f) ((f)->f_time + repeatinterval[(f)->f_repeatcount])
171 #define BACKOFF(f) { if (++(f)->f_repeatcount > MAXREPEAT) \
172 (f)->f_repeatcount = MAXREPEAT; \
173 }
174
175 /* values for f_type */
176 #define F_UNUSED 0 /* unused entry */
177 #define F_FILE 1 /* regular file */
178 #define F_TTY 2 /* terminal */
179 #define F_CONSOLE 3 /* console terminal */
180 #define F_FORW 4 /* remote machine */
181 #define F_USERS 5 /* list of users */
182 #define F_WALL 6 /* everyone logged on */
183
184 char *TypeNames[7] = {
185 "UNUSED", "FILE", "TTY", "CONSOLE",
186 "FORW", "USERS", "WALL"
187 };
188
189 struct filed *Files;
190 struct filed consfile;
191
192 int Debug; /* debug flag */
193 int daemonized = 0; /* we are not daemonized yet */
194 char LocalHostName[MAXHOSTNAMELEN+1]; /* our hostname */
195 char *LocalDomain; /* our local domain name */
196 int *finet = NULL; /* Internet datagram sockets */
197 int Initialized = 0; /* set when we have initialized ourselves */
198 int MarkInterval = 20 * 60; /* interval between marks in seconds */
199 int MarkSeq = 0; /* mark sequence number */
200 int SecureMode = 0; /* listen only on unix domain socks */
201 int UseNameService = 1; /* make domain name queries */
202 int NumForwards = 0; /* number of forwarding actions in conf file */
203 char **LogPaths; /* array of pathnames to read messages from */
204
205 void cfline(char *, struct filed *);
206 char *cvthname(struct sockaddr_storage *);
207 int decode(const char *, CODE *);
208 void die(int);
209 void domark(int);
210 void fprintlog(struct filed *, int, char *);
211 int getmsgbufsize(void);
212 int* socksetup(int);
213 void init(int);
214 void logerror(const char *, ...);
215 void logmsg(int, char *, char *, int);
216 void printline(char *, char *);
217 void printsys(char *);
218 void reapchild(int);
219 void usage(void);
220 void wallmsg(struct filed *, struct iovec *);
221 int main(int, char *[]);
222 void logpath_add(char ***, int *, int *, char *);
223 void logpath_fileadd(char ***, int *, int *, char *);
224
225 int
226 main(int argc, char *argv[])
227 {
228 int ch, *funix, i, j, fklog, len, linesize;
229 int *nfinetix, nfklogix, nfunixbaseix, nfds;
230 int funixsize = 0, funixmaxsize = 0;
231 struct sockaddr_un sunx, fromunix;
232 struct sockaddr_storage frominet;
233 char *p, *line, **pp;
234 struct pollfd *readfds;
235 uid_t uid = 0;
236 gid_t gid = 0;
237 char *user = NULL;
238 char *group = NULL;
239 char *root = "/";
240 char *endp;
241 struct group *gr;
242 struct passwd *pw;
243 unsigned long l;
244
245 (void)setlocale(LC_ALL, "");
246
247 while ((ch = getopt(argc, argv, "dnsf:m:p:P:u:g:t:")) != -1)
248 switch(ch) {
249 case 'd': /* debug */
250 Debug++;
251 break;
252 case 'f': /* configuration file */
253 ConfFile = optarg;
254 break;
255 case 'g':
256 group = optarg;
257 if (*group == '\0')
258 usage();
259 break;
260 case 'm': /* mark interval */
261 MarkInterval = atoi(optarg) * 60;
262 break;
263 case 'n': /* turn off DNS queries */
264 UseNameService = 0;
265 break;
266 case 'p': /* path */
267 logpath_add(&LogPaths, &funixsize,
268 &funixmaxsize, optarg);
269 break;
270 case 'P': /* file of paths */
271 logpath_fileadd(&LogPaths, &funixsize,
272 &funixmaxsize, optarg);
273 break;
274 case 's': /* no network listen mode */
275 SecureMode++;
276 break;
277 case 't':
278 root = optarg;
279 if (*root == '\0')
280 usage();
281 break;
282 case 'u':
283 user = optarg;
284 if (*user == '\0')
285 usage();
286 break;
287 case '?':
288 default:
289 usage();
290 }
291 if ((argc -= optind) != 0)
292 usage();
293
294 setlinebuf(stdout);
295
296 if (user != NULL) {
297 if (isdigit((unsigned char)*user)) {
298 errno = 0;
299 endp = NULL;
300 l = strtoul(user, &endp, 0);
301 if (errno || *endp != '\0')
302 goto getuser;
303 uid = (uid_t)l;
304 if (uid != l) {
305 errno = 0;
306 logerror("UID out of range");
307 die(0);
308 }
309 } else {
310 getuser:
311 if ((pw = getpwnam(user)) != NULL) {
312 uid = pw->pw_uid;
313 } else {
314 errno = 0;
315 logerror("Cannot find user `%s'", user);
316 die (0);
317 }
318 }
319 }
320
321 if (group != NULL) {
322 if (isdigit((unsigned char)*group)) {
323 errno = 0;
324 endp = NULL;
325 l = strtoul(group, &endp, 0);
326 if (errno || *endp != '\0')
327 goto getgroup;
328 gid = (gid_t)l;
329 if (gid != l) {
330 errno = 0;
331 logerror("GID out of range");
332 die(0);
333 }
334 } else {
335 getgroup:
336 if ((gr = getgrnam(group)) != NULL) {
337 gid = gr->gr_gid;
338 } else {
339 errno = 0;
340 logerror("Cannot find group `%s'", group);
341 die(0);
342 }
343 }
344 }
345
346 if (access (root, F_OK | R_OK)) {
347 logerror("Cannot access `%s'", root);
348 die (0);
349 }
350
351 consfile.f_type = F_CONSOLE;
352 (void)strlcpy(consfile.f_un.f_fname, ctty,
353 sizeof(consfile.f_un.f_fname));
354 (void)gethostname(LocalHostName, sizeof(LocalHostName));
355 LocalHostName[sizeof(LocalHostName) - 1] = '\0';
356 if ((p = strchr(LocalHostName, '.')) != NULL) {
357 *p++ = '\0';
358 LocalDomain = p;
359 } else
360 LocalDomain = "";
361 linesize = getmsgbufsize();
362 if (linesize < MAXLINE)
363 linesize = MAXLINE;
364 linesize++;
365 line = malloc(linesize);
366 if (line == NULL) {
367 logerror("Couldn't allocate line buffer");
368 die(0);
369 }
370 (void)signal(SIGTERM, die);
371 (void)signal(SIGINT, Debug ? die : SIG_IGN);
372 (void)signal(SIGQUIT, Debug ? die : SIG_IGN);
373 (void)signal(SIGCHLD, reapchild);
374 (void)signal(SIGALRM, domark);
375 (void)alarm(TIMERINTVL);
376
377 #ifndef SUN_LEN
378 #define SUN_LEN(unp) (strlen((unp)->sun_path) + 2)
379 #endif
380 if (funixsize == 0)
381 logpath_add(&LogPaths, &funixsize,
382 &funixmaxsize, _PATH_LOG);
383 funix = (int *)malloc(sizeof(int) * funixsize);
384 if (funix == NULL) {
385 logerror("Couldn't allocate funix descriptors");
386 die(0);
387 }
388 for (j = 0, pp = LogPaths; *pp; pp++, j++) {
389 dprintf("Making unix dgram socket `%s'\n", *pp);
390 unlink(*pp);
391 memset(&sunx, 0, sizeof(sunx));
392 sunx.sun_family = AF_LOCAL;
393 (void)strncpy(sunx.sun_path, *pp, sizeof(sunx.sun_path));
394 funix[j] = socket(AF_LOCAL, SOCK_DGRAM, 0);
395 if (funix[j] < 0 || bind(funix[j],
396 (struct sockaddr *)&sunx, SUN_LEN(&sunx)) < 0 ||
397 chmod(*pp, 0666) < 0) {
398 logerror("Cannot create `%s'", *pp);
399 die(0);
400 }
401 dprintf("Listening on unix dgram socket `%s'\n", *pp);
402 }
403
404 init(0);
405
406 if ((fklog = open(_PATH_KLOG, O_RDONLY, 0)) < 0) {
407 dprintf("Can't open `%s' (%d)\n", _PATH_KLOG, errno);
408 } else {
409 dprintf("Listening on kernel log `%s'\n", _PATH_KLOG);
410 }
411
412 dprintf("Off & running....\n");
413
414 (void)signal(SIGHUP, init);
415
416 /* setup pollfd set. */
417 readfds = (struct pollfd *)malloc(sizeof(struct pollfd) *
418 (funixsize + (finet ? *finet : 0) + 1));
419 if (readfds == NULL) {
420 logerror("Couldn't allocate pollfds");
421 die(0);
422 }
423 nfds = 0;
424 if (fklog >= 0) {
425 nfklogix = nfds++;
426 readfds[nfklogix].fd = fklog;
427 readfds[nfklogix].events = POLLIN | POLLPRI;
428 }
429 if (finet && !SecureMode) {
430 nfinetix = malloc(*finet * sizeof(*nfinetix));
431 for (j = 0; j < *finet; j++) {
432 nfinetix[j] = nfds++;
433 readfds[nfinetix[j]].fd = finet[j+1];
434 readfds[nfinetix[j]].events = POLLIN | POLLPRI;
435 }
436 }
437 nfunixbaseix = nfds;
438 for (j = 0, pp = LogPaths; *pp; pp++) {
439 readfds[nfds].fd = funix[j++];
440 readfds[nfds++].events = POLLIN | POLLPRI;
441 }
442
443 /*
444 * All files are open, we can drop privileges and chroot
445 */
446 dprintf("Attempt to chroot to `%s'\n", root);
447 if (chroot(root)) {
448 logerror("Failed to chroot to `%s'", root);
449 die(0);
450 }
451 dprintf("Attempt to set GID/EGID to `%d'\n", gid);
452 if (setgid(gid) || setegid(gid)) {
453 logerror("Failed to set gid to `%d'", gid);
454 die(0);
455 }
456 dprintf("Attempt to set UID/EUID to `%d'\n", uid);
457 if (setuid(uid) || seteuid(uid)) {
458 logerror("Failed to set uid to `%d'", uid);
459 die(0);
460 }
461
462 /*
463 * We cannot detach from the terminal before we are sure we won't
464 * have a fatal error, because error message would not go to the
465 * terminal and would not be logged because syslogd dies.
466 * All die() calls are behind us, we can call daemon()
467 */
468 if (!Debug) {
469 (void)daemon(0, 0);
470 daemonized = 1;
471
472 /* tuck my process id away, if i'm not in debug mode */
473 pidfile(NULL);
474 }
475
476 for (;;) {
477 int rv;
478
479 rv = poll(readfds, nfds, INFTIM);
480 if (rv == 0)
481 continue;
482 if (rv < 0) {
483 if (errno != EINTR)
484 logerror("poll() failed");
485 continue;
486 }
487 dprintf("Got a message (%d)\n", rv);
488 if (fklog >= 0 &&
489 (readfds[nfklogix].revents & (POLLIN | POLLPRI))) {
490 dprintf("Kernel log active\n");
491 i = read(fklog, line, linesize - 1);
492 if (i > 0) {
493 line[i] = '\0';
494 printsys(line);
495 } else if (i < 0 && errno != EINTR) {
496 logerror("klog failed");
497 fklog = -1;
498 }
499 }
500 for (j = 0, pp = LogPaths; *pp; pp++, j++) {
501 if ((readfds[nfunixbaseix + j].revents &
502 (POLLIN | POLLPRI)) == 0)
503 continue;
504
505 dprintf("Unix socket (%s) active\n", *pp);
506 len = sizeof(fromunix);
507 i = recvfrom(funix[j], line, MAXLINE, 0,
508 (struct sockaddr *)&fromunix, &len);
509 if (i > 0) {
510 line[i] = '\0';
511 printline(LocalHostName, line);
512 } else if (i < 0 && errno != EINTR) {
513 logerror("recvfrom() unix `%s'", *pp);
514 }
515 }
516 if (finet && !SecureMode) {
517 for (j = 0; j < *finet; j++) {
518 if (readfds[nfinetix[j]].revents &
519 (POLLIN | POLLPRI)) {
520 #ifdef LIBWRAP
521 struct request_info req;
522 #endif
523 int reject = 0;
524
525 dprintf("inet socket active\n");
526
527 #ifdef LIBWRAP
528 request_init(&req, RQ_DAEMON, "syslogd",
529 RQ_FILE, finet[j + 1], NULL);
530 fromhost(&req);
531 reject = !hosts_access(&req);
532 if (reject)
533 dprintf("access denied\n");
534 #endif
535
536 len = sizeof(frominet);
537 i = recvfrom(finet[j+1], line, MAXLINE,
538 0, (struct sockaddr *)&frominet,
539 &len);
540 if (i == 0 || (i < 0 && errno == EINTR))
541 continue;
542 else if (i < 0) {
543 logerror("recvfrom inet");
544 continue;
545 }
546
547 line[i] = '\0';
548 if (!reject)
549 printline(cvthname(&frominet),
550 line);
551 }
552 }
553 }
554 }
555 }
556
557 void
558 usage(void)
559 {
560
561 (void)fprintf(stderr,
562 "usage: %s [-dns] [-f config_file] [-g group] [-m mark_interval]\n"
563 "\t[-P file_list] [-p log_socket [-p log_socket2 ...]]\n"
564 "\t[-t chroot_dir] [-u user]\n", getprogname());
565 exit(1);
566 }
567
568 /*
569 * given a pointer to an array of char *'s, a pointer to it's current
570 * size and current allocated max size, and a new char * to add, add
571 * it, update everything as necessary, possibly allocating a new array
572 */
573 void
574 logpath_add(char ***lp, int *szp, int *maxszp, char *new)
575 {
576
577 dprintf("Adding `%s' to the %p logpath list\n", new, *lp);
578 if (*szp == *maxszp) {
579 if (*maxszp == 0) {
580 *maxszp = 4; /* start of with enough for now */
581 *lp = NULL;
582 } else
583 *maxszp *= 2;
584 *lp = realloc(*lp, sizeof(char *) * (*maxszp + 1));
585 if (*lp == NULL) {
586 logerror("Couldn't allocate line buffer");
587 die(0);
588 }
589 }
590 if (((*lp)[(*szp)++] = strdup(new)) == NULL) {
591 logerror("Couldn't allocate logpath");
592 die(0);
593 }
594 (*lp)[(*szp)] = NULL; /* always keep it NULL terminated */
595 }
596
597 /* do a file of log sockets */
598 void
599 logpath_fileadd(char ***lp, int *szp, int *maxszp, char *file)
600 {
601 FILE *fp;
602 char *line;
603 size_t len;
604
605 fp = fopen(file, "r");
606 if (fp == NULL) {
607 logerror("Could not open socket file list `%s'", file);
608 die(0);
609 }
610
611 while ((line = fgetln(fp, &len))) {
612 line[len - 1] = 0;
613 logpath_add(lp, szp, maxszp, line);
614 }
615 fclose(fp);
616 }
617
618 /*
619 * Take a raw input line, decode the message, and print the message
620 * on the appropriate log files.
621 */
622 void
623 printline(char *hname, char *msg)
624 {
625 int c, pri;
626 char *p, *q, line[MAXLINE + 1];
627
628 /* test for special codes */
629 pri = DEFUPRI;
630 p = msg;
631 if (*p == '<') {
632 pri = 0;
633 while (isdigit(*++p))
634 pri = 10 * pri + (*p - '0');
635 if (*p == '>')
636 ++p;
637 }
638 if (pri &~ (LOG_FACMASK|LOG_PRIMASK))
639 pri = DEFUPRI;
640
641 /* don't allow users to log kernel messages */
642 if (LOG_FAC(pri) == LOG_KERN)
643 pri = LOG_MAKEPRI(LOG_USER, LOG_PRI(pri));
644
645 q = line;
646
647 while ((c = *p++) != '\0' &&
648 q < &line[sizeof(line) - 2]) {
649 c &= 0177;
650 if (iscntrl(c))
651 if (c == '\n')
652 *q++ = ' ';
653 else if (c == '\t')
654 *q++ = '\t';
655 else {
656 *q++ = '^';
657 *q++ = c ^ 0100;
658 }
659 else
660 *q++ = c;
661 }
662 *q = '\0';
663
664 logmsg(pri, line, hname, 0);
665 }
666
667 /*
668 * Take a raw input line from /dev/klog, split and format similar to syslog().
669 */
670 void
671 printsys(char *msg)
672 {
673 int c, pri, flags;
674 char *lp, *p, *q, line[MAXLINE + 1];
675
676 (void)strlcpy(line, _PATH_UNIX, sizeof(line));
677 (void)strlcat(line, ": ", sizeof(line));
678 lp = line + strlen(line);
679 for (p = msg; *p != '\0'; ) {
680 flags = SYNC_FILE | ADDDATE; /* fsync file after write */
681 pri = DEFSPRI;
682 if (*p == '<') {
683 pri = 0;
684 while (isdigit(*++p))
685 pri = 10 * pri + (*p - '0');
686 if (*p == '>')
687 ++p;
688 } else {
689 /* kernel printf's come out on console */
690 flags |= IGN_CONS;
691 }
692 if (pri &~ (LOG_FACMASK|LOG_PRIMASK))
693 pri = DEFSPRI;
694 q = lp;
695 while (*p != '\0' && (c = *p++) != '\n' &&
696 q < &line[MAXLINE])
697 *q++ = c;
698 *q = '\0';
699 logmsg(pri, line, LocalHostName, flags);
700 }
701 }
702
703 time_t now;
704
705 /*
706 * Log a message to the appropriate log files, users, etc. based on
707 * the priority.
708 */
709 void
710 logmsg(int pri, char *msg, char *from, int flags)
711 {
712 struct filed *f;
713 int fac, msglen, omask, prilev;
714 char *timestamp;
715
716 dprintf("logmsg: pri 0%o, flags 0x%x, from %s, msg %s\n",
717 pri, flags, from, msg);
718
719 omask = sigblock(sigmask(SIGHUP)|sigmask(SIGALRM));
720
721 /*
722 * Check to see if msg looks non-standard.
723 */
724 msglen = strlen(msg);
725 if (msglen < 16 || msg[3] != ' ' || msg[6] != ' ' ||
726 msg[9] != ':' || msg[12] != ':' || msg[15] != ' ')
727 flags |= ADDDATE;
728
729 (void)time(&now);
730 if (flags & ADDDATE)
731 timestamp = ctime(&now) + 4;
732 else {
733 timestamp = msg;
734 msg += 16;
735 msglen -= 16;
736 }
737
738 /* extract facility and priority level */
739 if (flags & MARK)
740 fac = LOG_NFACILITIES;
741 else
742 fac = LOG_FAC(pri);
743 prilev = LOG_PRI(pri);
744
745 /* log the message to the particular outputs */
746 if (!Initialized) {
747 f = &consfile;
748 f->f_file = open(ctty, O_WRONLY, 0);
749
750 if (f->f_file >= 0) {
751 fprintlog(f, flags, msg);
752 (void)close(f->f_file);
753 }
754 (void)sigsetmask(omask);
755 return;
756 }
757 for (f = Files; f; f = f->f_next) {
758 /* skip messages that are incorrect priority */
759 if (f->f_pmask[fac] < prilev ||
760 f->f_pmask[fac] == INTERNAL_NOPRI)
761 continue;
762
763 if (f->f_type == F_CONSOLE && (flags & IGN_CONS))
764 continue;
765
766 /* don't output marks to recently written files */
767 if ((flags & MARK) && (now - f->f_time) < MarkInterval / 2)
768 continue;
769
770 /*
771 * suppress duplicate lines to this file
772 */
773 if ((flags & MARK) == 0 && msglen == f->f_prevlen &&
774 !strcmp(msg, f->f_prevline) &&
775 !strcmp(from, f->f_prevhost)) {
776 (void)strncpy(f->f_lasttime, timestamp, 15);
777 f->f_prevcount++;
778 dprintf("Msg repeated %d times, %ld sec of %d\n",
779 f->f_prevcount, (long)(now - f->f_time),
780 repeatinterval[f->f_repeatcount]);
781 /*
782 * If domark would have logged this by now,
783 * flush it now (so we don't hold isolated messages),
784 * but back off so we'll flush less often
785 * in the future.
786 */
787 if (now > REPEATTIME(f)) {
788 fprintlog(f, flags, (char *)NULL);
789 BACKOFF(f);
790 }
791 } else {
792 /* new line, save it */
793 if (f->f_prevcount)
794 fprintlog(f, 0, (char *)NULL);
795 f->f_repeatcount = 0;
796 f->f_prevpri = pri;
797 (void)strncpy(f->f_lasttime, timestamp, 15);
798 (void)strncpy(f->f_prevhost, from,
799 sizeof(f->f_prevhost));
800 if (msglen < MAXSVLINE) {
801 f->f_prevlen = msglen;
802 (void)strlcpy(f->f_prevline, msg,
803 sizeof(f->f_prevline));
804 fprintlog(f, flags, (char *)NULL);
805 } else {
806 f->f_prevline[0] = 0;
807 f->f_prevlen = 0;
808 fprintlog(f, flags, msg);
809 }
810 }
811 }
812 (void)sigsetmask(omask);
813 }
814
815 void
816 fprintlog(struct filed *f, int flags, char *msg)
817 {
818 struct iovec iov[6];
819 struct iovec *v;
820 struct addrinfo *r;
821 int j, l, lsent;
822 char line[MAXLINE + 1], repbuf[80], greetings[200];
823
824 v = iov;
825 if (f->f_type == F_WALL) {
826 v->iov_base = greetings;
827 v->iov_len = snprintf(greetings, sizeof greetings,
828 "\r\n\7Message from syslogd@%s at %.24s ...\r\n",
829 f->f_prevhost, ctime(&now));
830 v++;
831 v->iov_base = "";
832 v->iov_len = 0;
833 v++;
834 } else {
835 v->iov_base = f->f_lasttime;
836 v->iov_len = 15;
837 v++;
838 v->iov_base = " ";
839 v->iov_len = 1;
840 v++;
841 }
842 v->iov_base = f->f_prevhost;
843 v->iov_len = strlen(v->iov_base);
844 v++;
845 v->iov_base = " ";
846 v->iov_len = 1;
847 v++;
848
849 if (msg) {
850 v->iov_base = msg;
851 v->iov_len = strlen(msg);
852 } else if (f->f_prevcount > 1) {
853 v->iov_base = repbuf;
854 v->iov_len = snprintf(repbuf, sizeof repbuf,
855 "last message repeated %d times", f->f_prevcount);
856 } else {
857 v->iov_base = f->f_prevline;
858 v->iov_len = f->f_prevlen;
859 }
860 v++;
861
862 dprintf("Logging to %s", TypeNames[f->f_type]);
863 f->f_time = now;
864
865 switch (f->f_type) {
866 case F_UNUSED:
867 dprintf("\n");
868 break;
869
870 case F_FORW:
871 dprintf(" %s\n", f->f_un.f_forw.f_hname);
872 /*
873 * check for local vs remote messages
874 * (from FreeBSD PR#bin/7055)
875 */
876 if (strcmp(f->f_prevhost, LocalHostName)) {
877 l = snprintf(line, sizeof(line) - 1,
878 "<%d>%.15s [%s]: %s",
879 f->f_prevpri, (char *) iov[0].iov_base,
880 f->f_prevhost, (char *) iov[4].iov_base);
881 } else {
882 l = snprintf(line, sizeof(line) - 1, "<%d>%.15s %s",
883 f->f_prevpri, (char *) iov[0].iov_base,
884 (char *) iov[4].iov_base);
885 }
886 if (l > MAXLINE)
887 l = MAXLINE;
888 if (finet) {
889 for (r = f->f_un.f_forw.f_addr; r; r = r->ai_next) {
890 for (j = 0; j < *finet; j++) {
891 #if 0
892 /*
893 * should we check AF first, or just
894 * trial and error? FWD
895 */
896 if (r->ai_family ==
897 address_family_of(finet[j+1]))
898 #endif
899 lsent = sendto(finet[j+1], line, l, 0,
900 r->ai_addr, r->ai_addrlen);
901 if (lsent == l)
902 break;
903 }
904 }
905 if (lsent != l) {
906 f->f_type = F_UNUSED;
907 logerror("sendto() failed");
908 }
909 }
910 break;
911
912 case F_CONSOLE:
913 if (flags & IGN_CONS) {
914 dprintf(" (ignored)\n");
915 break;
916 }
917 /* FALLTHROUGH */
918
919 case F_TTY:
920 case F_FILE:
921 dprintf(" %s\n", f->f_un.f_fname);
922 if (f->f_type != F_FILE) {
923 v->iov_base = "\r\n";
924 v->iov_len = 2;
925 } else {
926 v->iov_base = "\n";
927 v->iov_len = 1;
928 }
929 again:
930 if (writev(f->f_file, iov, 6) < 0) {
931 int e = errno;
932 (void)close(f->f_file);
933 /*
934 * Check for errors on TTY's due to loss of tty
935 */
936 if ((e == EIO || e == EBADF) && f->f_type != F_FILE) {
937 f->f_file = open(f->f_un.f_fname,
938 O_WRONLY|O_APPEND, 0);
939 if (f->f_file < 0) {
940 f->f_type = F_UNUSED;
941 logerror(f->f_un.f_fname);
942 } else
943 goto again;
944 } else {
945 f->f_type = F_UNUSED;
946 errno = e;
947 logerror(f->f_un.f_fname);
948 }
949 } else if (flags & SYNC_FILE)
950 (void)fsync(f->f_file);
951 break;
952
953 case F_USERS:
954 case F_WALL:
955 dprintf("\n");
956 v->iov_base = "\r\n";
957 v->iov_len = 2;
958 wallmsg(f, iov);
959 break;
960 }
961 f->f_prevcount = 0;
962 }
963
964 /*
965 * WALLMSG -- Write a message to the world at large
966 *
967 * Write the specified message to either the entire
968 * world, or a list of approved users.
969 */
970 void
971 wallmsg(struct filed *f, struct iovec *iov)
972 {
973 static int reenter; /* avoid calling ourselves */
974 int i;
975 char *p;
976 static struct utmpentry *ohead = NULL;
977 struct utmpentry *ep;
978
979 if (reenter++)
980 return;
981
982 (void)getutentries(NULL, &ep);
983 if (ep != ohead) {
984 freeutentries(ohead);
985 ohead = ep;
986 }
987 /* NOSTRICT */
988 for (; ep; ep = ep->next) {
989 if (f->f_type == F_WALL) {
990 if ((p = ttymsg(iov, 6, ep->line, TTYMSGTIME))
991 != NULL) {
992 errno = 0; /* already in msg */
993 logerror(p);
994 }
995 continue;
996 }
997 /* should we send the message to this user? */
998 for (i = 0; i < MAXUNAMES; i++) {
999 if (!f->f_un.f_uname[i][0])
1000 break;
1001 if (strcmp(f->f_un.f_uname[i], ep->name) == 0) {
1002 if ((p = ttymsg(iov, 6, ep->line, TTYMSGTIME))
1003 != NULL) {
1004 errno = 0; /* already in msg */
1005 logerror(p);
1006 }
1007 break;
1008 }
1009 }
1010 }
1011 reenter = 0;
1012 }
1013
1014 void
1015 reapchild(int signo)
1016 {
1017 union wait status;
1018
1019 while (wait3((int *)&status, WNOHANG, (struct rusage *)NULL) > 0)
1020 ;
1021 }
1022
1023 /*
1024 * Return a printable representation of a host address.
1025 */
1026 char *
1027 cvthname(struct sockaddr_storage *f)
1028 {
1029 int error;
1030 char *p;
1031 const int niflag = NI_DGRAM;
1032 static char host[NI_MAXHOST], ip[NI_MAXHOST];
1033
1034 error = getnameinfo((struct sockaddr*)f, ((struct sockaddr*)f)->sa_len,
1035 ip, sizeof ip, NULL, 0, NI_NUMERICHOST|niflag);
1036
1037 dprintf("cvthname(%s)\n", ip);
1038
1039 if (error) {
1040 dprintf("Malformed from address %s\n", gai_strerror(error));
1041 return ("???");
1042 }
1043
1044 if (!UseNameService)
1045 return (ip);
1046
1047 error = getnameinfo((struct sockaddr*)f, ((struct sockaddr*)f)->sa_len,
1048 host, sizeof host, NULL, 0, niflag);
1049 if (error) {
1050 dprintf("Host name for your address (%s) unknown\n", ip);
1051 return (ip);
1052 }
1053 if ((p = strchr(host, '.')) && strcmp(p + 1, LocalDomain) == 0)
1054 *p = '\0';
1055 return (host);
1056 }
1057
1058 void
1059 domark(int signo)
1060 {
1061 struct filed *f;
1062
1063 now = time((time_t *)NULL);
1064 MarkSeq += TIMERINTVL;
1065 if (MarkSeq >= MarkInterval) {
1066 logmsg(LOG_INFO, "-- MARK --", LocalHostName, ADDDATE|MARK);
1067 MarkSeq = 0;
1068 }
1069
1070 for (f = Files; f; f = f->f_next) {
1071 if (f->f_prevcount && now >= REPEATTIME(f)) {
1072 dprintf("Flush %s: repeated %d times, %d sec.\n",
1073 TypeNames[f->f_type], f->f_prevcount,
1074 repeatinterval[f->f_repeatcount]);
1075 fprintlog(f, 0, (char *)NULL);
1076 BACKOFF(f);
1077 }
1078 }
1079 (void)alarm(TIMERINTVL);
1080 }
1081
1082 /*
1083 * Print syslogd errors some place.
1084 */
1085 void
1086 logerror(const char *fmt, ...)
1087 {
1088 va_list ap;
1089 char tmpbuf[BUFSIZ];
1090 char buf[BUFSIZ];
1091
1092 va_start(ap, fmt);
1093
1094 (void)vsnprintf(tmpbuf, sizeof(tmpbuf), fmt, ap);
1095
1096 va_end(ap);
1097
1098 if (errno)
1099 (void)snprintf(buf, sizeof(buf), "syslogd: %s: %s",
1100 tmpbuf, strerror(errno));
1101 else
1102 (void)snprintf(buf, sizeof(buf), "syslogd: %s", tmpbuf);
1103
1104 if (daemonized)
1105 logmsg(LOG_SYSLOG|LOG_ERR, buf, LocalHostName, ADDDATE);
1106 if (!daemonized && Debug)
1107 dprintf("%s\n", buf);
1108 if (!daemonized && !Debug)
1109 printf("%s\n", buf);
1110
1111 return;
1112 }
1113
1114 void
1115 die(int signo)
1116 {
1117 struct filed *f;
1118 char **p;
1119
1120 for (f = Files; f != NULL; f = f->f_next) {
1121 /* flush any pending output */
1122 if (f->f_prevcount)
1123 fprintlog(f, 0, (char *)NULL);
1124 }
1125 errno = 0;
1126 if (signo)
1127 logerror("Exiting on signal %d", signo);
1128 else
1129 logerror("Fatal error, exiting");
1130 for (p = LogPaths; p && *p; p++)
1131 unlink(*p);
1132 exit(0);
1133 }
1134
1135 /*
1136 * INIT -- Initialize syslogd from configuration table
1137 */
1138 void
1139 init(int signo)
1140 {
1141 int i;
1142 FILE *cf;
1143 struct filed *f, *next, **nextp;
1144 char *p;
1145 char cline[LINE_MAX];
1146
1147 dprintf("init\n");
1148
1149 /*
1150 * Close all open log files.
1151 */
1152 Initialized = 0;
1153 for (f = Files; f != NULL; f = next) {
1154 /* flush any pending output */
1155 if (f->f_prevcount)
1156 fprintlog(f, 0, (char *)NULL);
1157
1158 switch (f->f_type) {
1159 case F_FILE:
1160 case F_TTY:
1161 case F_CONSOLE:
1162 (void)close(f->f_file);
1163 break;
1164 case F_FORW:
1165 if (f->f_un.f_forw.f_addr)
1166 freeaddrinfo(f->f_un.f_forw.f_addr);
1167 break;
1168 }
1169 next = f->f_next;
1170 free((char *)f);
1171 }
1172 Files = NULL;
1173 nextp = &Files;
1174
1175 /*
1176 * Close all open sockets
1177 */
1178
1179 if (finet) {
1180 for (i = 0; i < *finet; i++) {
1181 if (close(finet[i+1]) < 0) {
1182 logerror("close() failed");
1183 die(0);
1184 }
1185 }
1186 }
1187
1188 /*
1189 * Reset counter of forwarding actions
1190 */
1191
1192 NumForwards=0;
1193
1194 /* open the configuration file */
1195 if ((cf = fopen(ConfFile, "r")) == NULL) {
1196 dprintf("Cannot open `%s'\n", ConfFile);
1197 *nextp = (struct filed *)calloc(1, sizeof(*f));
1198 cfline("*.ERR\t/dev/console", *nextp);
1199 (*nextp)->f_next = (struct filed *)calloc(1, sizeof(*f));
1200 cfline("*.PANIC\t*", (*nextp)->f_next);
1201 Initialized = 1;
1202 return;
1203 }
1204
1205 /*
1206 * Foreach line in the conf table, open that file.
1207 */
1208 f = NULL;
1209 while (fgets(cline, sizeof(cline), cf) != NULL) {
1210 /*
1211 * check for end-of-section, comments, strip off trailing
1212 * spaces and newline character.
1213 */
1214 for (p = cline; isspace(*p); ++p)
1215 continue;
1216 if (*p == '\0' || *p == '#')
1217 continue;
1218 for (p = strchr(cline, '\0'); isspace(*--p);)
1219 continue;
1220 *++p = '\0';
1221 f = (struct filed *)calloc(1, sizeof(*f));
1222 *nextp = f;
1223 nextp = &f->f_next;
1224 cfline(cline, f);
1225 }
1226
1227 /* close the configuration file */
1228 (void)fclose(cf);
1229
1230 Initialized = 1;
1231
1232 if (Debug) {
1233 for (f = Files; f; f = f->f_next) {
1234 for (i = 0; i <= LOG_NFACILITIES; i++)
1235 if (f->f_pmask[i] == INTERNAL_NOPRI)
1236 printf("X ");
1237 else
1238 printf("%d ", f->f_pmask[i]);
1239 printf("%s: ", TypeNames[f->f_type]);
1240 switch (f->f_type) {
1241 case F_FILE:
1242 case F_TTY:
1243 case F_CONSOLE:
1244 printf("%s", f->f_un.f_fname);
1245 break;
1246
1247 case F_FORW:
1248 printf("%s", f->f_un.f_forw.f_hname);
1249 break;
1250
1251 case F_USERS:
1252 for (i = 0;
1253 i < MAXUNAMES && *f->f_un.f_uname[i]; i++)
1254 printf("%s, ", f->f_un.f_uname[i]);
1255 break;
1256 }
1257 printf("\n");
1258 }
1259 }
1260
1261 finet = socksetup(PF_UNSPEC);
1262 if (finet) {
1263 if (SecureMode) {
1264 for (i = 0; i < *finet; i++) {
1265 if (shutdown(finet[i+1], SHUT_RD) < 0) {
1266 logerror("shutdown() failed");
1267 die(0);
1268 }
1269 }
1270 } else
1271 dprintf("Listening on inet and/or inet6 socket\n");
1272 dprintf("Sending on inet and/or inet6 socket\n");
1273 }
1274
1275 logmsg(LOG_SYSLOG|LOG_INFO, "syslogd: restart", LocalHostName, ADDDATE);
1276 dprintf("syslogd: restarted\n");
1277 }
1278
1279 /*
1280 * Crack a configuration file line
1281 */
1282 void
1283 cfline(char *line, struct filed *f)
1284 {
1285 struct addrinfo hints, *res;
1286 int error, i, pri;
1287 char *bp, *p, *q;
1288 char buf[MAXLINE];
1289 int sp_err;
1290
1291 dprintf("cfline(%s)\n", line);
1292
1293 errno = 0; /* keep strerror() stuff out of logerror messages */
1294
1295 /* clear out file entry */
1296 memset(f, 0, sizeof(*f));
1297 for (i = 0; i <= LOG_NFACILITIES; i++)
1298 f->f_pmask[i] = INTERNAL_NOPRI;
1299
1300 /*
1301 * There should not be any space before the log facility.
1302 * Check this is okay, complain and fix if it is not.
1303 */
1304 q = line;
1305 if (isblank((unsigned char)*line)) {
1306 errno = 0;
1307 logerror(
1308 "Warning: `%s' space or tab before the log facility",
1309 line);
1310 /* Fix: strip all spaces/tabs before the log facility */
1311 while (*q++ && isblank((unsigned char)*q));
1312 line = q;
1313 }
1314
1315 /*
1316 * q is now at the first char of the log facility
1317 * There should be at least one tab after the log facility
1318 * Check this is okay, and complain and fix if it is not.
1319 */
1320 q = line + strlen(line);
1321 while (!isblank((unsigned char)*q) && (q != line))
1322 q--;
1323 if ((q == line) && strlen(line)) {
1324 /* No tabs or space in a non empty line: complain */
1325 errno = 0;
1326 logerror(
1327 "Error: `%s' log facility or log target missing",
1328 line);
1329 }
1330
1331 /* q is at the end of the blank between the two fields */
1332 sp_err = 0;
1333 while (isblank((unsigned char)*q) && (q != line))
1334 if (*q-- == ' ')
1335 sp_err = 1;
1336
1337 if (sp_err) {
1338 /*
1339 * A space somewhere between the log facility
1340 * and the log target: complain
1341 */
1342 errno = 0;
1343 logerror(
1344 "Warning: `%s' space found where tab is expected",
1345 line);
1346 /* ... and fix the problem: replace all spaces by tabs */
1347 while (*++q && isblank((unsigned char)*q))
1348 if (*q == ' ')
1349 *q='\t';
1350 }
1351
1352 /* scan through the list of selectors */
1353 for (p = line; *p && *p != '\t';) {
1354
1355 /* find the end of this facility name list */
1356 for (q = p; *q && *q != '\t' && *q++ != '.'; )
1357 continue;
1358
1359 /* collect priority name */
1360 for (bp = buf; *q && !strchr("\t,;", *q); )
1361 *bp++ = *q++;
1362 *bp = '\0';
1363
1364 /* skip cruft */
1365 while (strchr(", ;", *q))
1366 q++;
1367
1368 /* decode priority name */
1369 if (*buf == '*')
1370 pri = LOG_PRIMASK + 1;
1371 else {
1372 pri = decode(buf, prioritynames);
1373 if (pri < 0) {
1374 errno = 0;
1375 logerror("Unknown priority name `%s'", buf);
1376 return;
1377 }
1378 }
1379
1380 /* scan facilities */
1381 while (*p && !strchr("\t.;", *p)) {
1382 for (bp = buf; *p && !strchr("\t,;.", *p); )
1383 *bp++ = *p++;
1384 *bp = '\0';
1385 if (*buf == '*')
1386 for (i = 0; i < LOG_NFACILITIES; i++)
1387 f->f_pmask[i] = pri;
1388 else {
1389 i = decode(buf, facilitynames);
1390 if (i < 0) {
1391 errno = 0;
1392 logerror("Unknown facility name `%s'",
1393 buf);
1394 return;
1395 }
1396 f->f_pmask[i >> 3] = pri;
1397 }
1398 while (*p == ',' || *p == ' ')
1399 p++;
1400 }
1401
1402 p = q;
1403 }
1404
1405 /* skip to action part */
1406 sp_err = 0;
1407 while ((*p == '\t') || (*p == ' '))
1408 p++;
1409
1410 switch (*p)
1411 {
1412 case '@':
1413 (void)strlcpy(f->f_un.f_forw.f_hname, ++p,
1414 sizeof(f->f_un.f_forw.f_hname));
1415 memset(&hints, 0, sizeof(hints));
1416 hints.ai_family = AF_UNSPEC;
1417 hints.ai_socktype = SOCK_DGRAM;
1418 hints.ai_protocol = 0;
1419 error = getaddrinfo(f->f_un.f_forw.f_hname, "syslog", &hints,
1420 &res);
1421 if (error) {
1422 logerror(gai_strerror(error));
1423 break;
1424 }
1425 f->f_un.f_forw.f_addr = res;
1426 f->f_type = F_FORW;
1427 NumForwards++;
1428 break;
1429
1430 case '/':
1431 (void)strlcpy(f->f_un.f_fname, p, sizeof(f->f_un.f_fname));
1432 if ((f->f_file = open(p, O_WRONLY|O_APPEND, 0)) < 0) {
1433 f->f_type = F_UNUSED;
1434 logerror(p);
1435 break;
1436 }
1437 if (isatty(f->f_file))
1438 f->f_type = F_TTY;
1439 else
1440 f->f_type = F_FILE;
1441 if (strcmp(p, ctty) == 0)
1442 f->f_type = F_CONSOLE;
1443 break;
1444
1445 case '*':
1446 f->f_type = F_WALL;
1447 break;
1448
1449 default:
1450 for (i = 0; i < MAXUNAMES && *p; i++) {
1451 for (q = p; *q && *q != ','; )
1452 q++;
1453 (void)strncpy(f->f_un.f_uname[i], p, UT_NAMESIZE);
1454 if ((q - p) > UT_NAMESIZE)
1455 f->f_un.f_uname[i][UT_NAMESIZE] = '\0';
1456 else
1457 f->f_un.f_uname[i][q - p] = '\0';
1458 while (*q == ',' || *q == ' ')
1459 q++;
1460 p = q;
1461 }
1462 f->f_type = F_USERS;
1463 break;
1464 }
1465 }
1466
1467
1468 /*
1469 * Decode a symbolic name to a numeric value
1470 */
1471 int
1472 decode(const char *name, CODE *codetab)
1473 {
1474 CODE *c;
1475 char *p, buf[40];
1476
1477 if (isdigit(*name))
1478 return (atoi(name));
1479
1480 for (p = buf; *name && p < &buf[sizeof(buf) - 1]; p++, name++) {
1481 if (isupper(*name))
1482 *p = tolower(*name);
1483 else
1484 *p = *name;
1485 }
1486 *p = '\0';
1487 for (c = codetab; c->c_name; c++)
1488 if (!strcmp(buf, c->c_name))
1489 return (c->c_val);
1490
1491 return (-1);
1492 }
1493
1494 /*
1495 * Retrieve the size of the kernel message buffer, via sysctl.
1496 */
1497 int
1498 getmsgbufsize(void)
1499 {
1500 int msgbufsize, mib[2];
1501 size_t size;
1502
1503 mib[0] = CTL_KERN;
1504 mib[1] = KERN_MSGBUFSIZE;
1505 size = sizeof msgbufsize;
1506 if (sysctl(mib, 2, &msgbufsize, &size, NULL, 0) == -1) {
1507 dprintf("Couldn't get kern.msgbufsize\n");
1508 return (0);
1509 }
1510 return (msgbufsize);
1511 }
1512
1513 int *
1514 socksetup(int af)
1515 {
1516 struct addrinfo hints, *res, *r;
1517 int error, maxs, *s, *socks;
1518 const int on = 1;
1519
1520 if(SecureMode && !NumForwards)
1521 return(NULL);
1522
1523 memset(&hints, 0, sizeof(hints));
1524 hints.ai_flags = AI_PASSIVE;
1525 hints.ai_family = af;
1526 hints.ai_socktype = SOCK_DGRAM;
1527 error = getaddrinfo(NULL, "syslog", &hints, &res);
1528 if (error) {
1529 logerror(gai_strerror(error));
1530 errno = 0;
1531 die(0);
1532 }
1533
1534 /* Count max number of sockets we may open */
1535 for (maxs = 0, r = res; r; r = r->ai_next, maxs++)
1536 continue;
1537 socks = malloc((maxs+1) * sizeof(int));
1538 if (!socks) {
1539 logerror("Couldn't allocate memory for sockets");
1540 die(0);
1541 }
1542
1543 *socks = 0; /* num of sockets counter at start of array */
1544 s = socks + 1;
1545 for (r = res; r; r = r->ai_next) {
1546 *s = socket(r->ai_family, r->ai_socktype, r->ai_protocol);
1547 if (*s < 0) {
1548 logerror("socket() failed");
1549 continue;
1550 }
1551 if (r->ai_family == AF_INET6 && setsockopt(*s, IPPROTO_IPV6,
1552 IPV6_V6ONLY, &on, sizeof(on)) < 0) {
1553 logerror("setsockopt(IPV6_V6ONLY) failed");
1554 close(*s);
1555 continue;
1556 }
1557 if (!SecureMode && bind(*s, r->ai_addr, r->ai_addrlen) < 0) {
1558 logerror("bind() failed");
1559 close (*s);
1560 continue;
1561 }
1562
1563 *socks = *socks + 1;
1564 s++;
1565 }
1566
1567 if (*socks == 0) {
1568 free (socks);
1569 if(Debug)
1570 return(NULL);
1571 else
1572 die(0);
1573 }
1574 if (res)
1575 freeaddrinfo(res);
1576
1577 return(socks);
1578 }
1579