2000-02-09 01:28:47 +05:30
|
|
|
/* vi: set sw=4 ts=4: */
|
1999-11-25 13:00:46 +05:30
|
|
|
/*
|
|
|
|
* Mini syslogd implementation for busybox
|
|
|
|
*
|
2001-10-24 10:30:29 +05:30
|
|
|
* Copyright (C) 1999,2000 by Lineo, inc. and Erik Andersen
|
|
|
|
* Copyright (C) 1999,2000,2001 by Erik Andersen <andersee@debian.org>
|
1999-11-25 13:00:46 +05:30
|
|
|
*
|
2000-04-19 05:21:51 +05:30
|
|
|
* Copyright (C) 2000 by Karl M. Hegbloom <karlheg@debian.org>
|
|
|
|
*
|
2001-03-13 04:21:50 +05:30
|
|
|
* "circular buffer" Copyright (C) 2001 by Gennady Feldman <gfeldman@cachier.com>
|
|
|
|
*
|
2001-03-13 05:11:34 +05:30
|
|
|
* Maintainer: Gennady Feldman <gena01@cachier.com> as of Mar 12, 2001
|
|
|
|
*
|
1999-11-25 13:00:46 +05:30
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
*
|
|
|
|
*/
|
1999-11-24 14:34:33 +05:30
|
|
|
|
2000-06-19 23:18:02 +05:30
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
2000-04-04 23:44:25 +05:30
|
|
|
#include <ctype.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <netdb.h>
|
|
|
|
#include <paths.h>
|
|
|
|
#include <signal.h>
|
1999-12-06 03:47:02 +05:30
|
|
|
#include <stdarg.h>
|
2000-06-19 23:18:02 +05:30
|
|
|
#include <time.h>
|
2001-01-27 13:54:39 +05:30
|
|
|
#include <string.h>
|
2000-06-19 23:18:02 +05:30
|
|
|
#include <unistd.h>
|
1999-11-24 14:34:33 +05:30
|
|
|
#include <sys/socket.h>
|
2000-04-04 23:44:25 +05:30
|
|
|
#include <sys/types.h>
|
1999-11-24 14:34:33 +05:30
|
|
|
#include <sys/un.h>
|
2000-04-20 01:32:50 +05:30
|
|
|
#include <sys/param.h>
|
2000-06-19 23:18:02 +05:30
|
|
|
|
2001-02-20 11:44:08 +05:30
|
|
|
#include "busybox.h"
|
1999-12-03 14:49:54 +05:30
|
|
|
|
1999-11-25 13:00:46 +05:30
|
|
|
/* SYSLOG_NAMES defined to pull some extra junk from syslog.h */
|
|
|
|
#define SYSLOG_NAMES
|
|
|
|
#include <sys/syslog.h>
|
2000-07-21 05:11:24 +05:30
|
|
|
#include <sys/uio.h>
|
1999-11-25 13:00:46 +05:30
|
|
|
|
|
|
|
/* Path for the file where all log messages are written */
|
2000-04-04 23:44:25 +05:30
|
|
|
#define __LOG_FILE "/var/log/messages"
|
1999-11-25 13:00:46 +05:30
|
|
|
|
2000-04-04 23:44:25 +05:30
|
|
|
/* Path to the unix socket */
|
2001-07-07 00:58:07 +05:30
|
|
|
static char lfile[BUFSIZ];
|
1999-11-25 13:00:46 +05:30
|
|
|
|
2000-02-09 01:28:47 +05:30
|
|
|
static char *logFilePath = __LOG_FILE;
|
|
|
|
|
1999-11-25 13:00:46 +05:30
|
|
|
/* interval between marks in seconds */
|
2000-02-09 01:28:47 +05:30
|
|
|
static int MarkInterval = 20 * 60;
|
|
|
|
|
1999-11-25 13:00:46 +05:30
|
|
|
/* localhost's name */
|
|
|
|
static char LocalHostName[32];
|
1999-11-24 14:34:33 +05:30
|
|
|
|
2001-10-24 10:30:29 +05:30
|
|
|
#ifdef CONFIG_FEATURE_REMOTE_LOG
|
2000-07-21 05:11:24 +05:30
|
|
|
#include <netinet/in.h>
|
|
|
|
/* udp socket for logging to remote host */
|
2000-12-09 01:22:01 +05:30
|
|
|
static int remotefd = -1;
|
2000-07-21 05:11:24 +05:30
|
|
|
/* where do we log? */
|
|
|
|
static char *RemoteHost;
|
|
|
|
/* what port to log to? */
|
2000-12-09 01:22:01 +05:30
|
|
|
static int RemotePort = 514;
|
2000-07-21 05:11:24 +05:30
|
|
|
/* To remote log or not to remote log, that is the question. */
|
2000-12-09 01:22:01 +05:30
|
|
|
static int doRemoteLog = FALSE;
|
2000-12-11 21:54:16 +05:30
|
|
|
static int local_logging = FALSE;
|
2000-07-21 05:11:24 +05:30
|
|
|
#endif
|
|
|
|
|
2001-03-13 04:21:50 +05:30
|
|
|
/* circular buffer variables/structures */
|
2001-10-24 10:30:29 +05:30
|
|
|
#ifdef CONFIG_FEATURE_IPC_SYSLOG
|
2001-03-13 04:21:50 +05:30
|
|
|
|
2001-10-26 21:39:09 +05:30
|
|
|
#if __GNU_LIBRARY__ < 5
|
|
|
|
#error Sorry. Looks like you are using libc5.
|
|
|
|
#error libc5 shm support isnt good enough.
|
|
|
|
#error Please disable CONFIG_FEATURE_IPC_SYSLOG
|
|
|
|
#endif
|
|
|
|
|
2001-03-13 04:21:50 +05:30
|
|
|
#include <sys/ipc.h>
|
|
|
|
#include <sys/sem.h>
|
|
|
|
#include <sys/shm.h>
|
|
|
|
|
|
|
|
/* our shared key */
|
|
|
|
static const long KEY_ID = 0x414e4547; /*"GENA"*/
|
|
|
|
|
|
|
|
// Semaphore operation structures
|
|
|
|
static struct shbuf_ds {
|
|
|
|
int size; // size of data written
|
|
|
|
int head; // start of message list
|
|
|
|
int tail; // end of message list
|
|
|
|
char data[1]; // data/messages
|
|
|
|
} *buf = NULL; // shared memory pointer
|
|
|
|
|
|
|
|
static struct sembuf SMwup[1] = {{1, -1, IPC_NOWAIT}}; // set SMwup
|
|
|
|
static struct sembuf SMwdn[3] = {{0, 0}, {1, 0}, {1, +1}}; // set SMwdn
|
|
|
|
|
|
|
|
static int shmid = -1; // ipc shared memory id
|
|
|
|
static int s_semid = -1; // ipc semaphore id
|
|
|
|
int data_size = 16000; // data size
|
|
|
|
int shm_size = 16000 + sizeof(*buf); // our buffer size
|
|
|
|
static int circular_logging = FALSE;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* sem_up - up()'s a semaphore.
|
|
|
|
*/
|
|
|
|
static inline void sem_up(int semid)
|
|
|
|
{
|
|
|
|
if ( semop(semid, SMwup, 1) == -1 )
|
|
|
|
perror_msg_and_die("semop[SMwup]");
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* sem_down - down()'s a semaphore
|
|
|
|
*/
|
|
|
|
static inline void sem_down(int semid)
|
|
|
|
{
|
2001-04-06 02:25:17 +05:30
|
|
|
if ( semop(semid, SMwdn, 3) == -1 )
|
2001-03-13 04:21:50 +05:30
|
|
|
perror_msg_and_die("semop[SMwdn]");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void ipcsyslog_cleanup(void){
|
|
|
|
printf("Exiting Syslogd!\n");
|
|
|
|
if (shmid != -1)
|
|
|
|
shmdt(buf);
|
|
|
|
|
|
|
|
if (shmid != -1)
|
|
|
|
shmctl(shmid, IPC_RMID, NULL);
|
|
|
|
if (s_semid != -1)
|
|
|
|
semctl(s_semid, 0, IPC_RMID, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
void ipcsyslog_init(void){
|
|
|
|
if (buf == NULL){
|
|
|
|
if ((shmid = shmget(KEY_ID, shm_size, IPC_CREAT | 1023)) == -1)
|
|
|
|
perror_msg_and_die("shmget");
|
|
|
|
|
|
|
|
|
|
|
|
if ((buf = shmat(shmid, NULL, 0)) == NULL)
|
|
|
|
perror_msg_and_die("shmat");
|
|
|
|
|
|
|
|
|
|
|
|
buf->size=data_size;
|
|
|
|
buf->head=buf->tail=0;
|
|
|
|
|
|
|
|
// we'll trust the OS to set initial semval to 0 (let's hope)
|
|
|
|
if ((s_semid = semget(KEY_ID, 2, IPC_CREAT | IPC_EXCL | 1023)) == -1){
|
|
|
|
if (errno == EEXIST){
|
|
|
|
if ((s_semid = semget(KEY_ID, 2, 0)) == -1)
|
|
|
|
perror_msg_and_die("semget");
|
|
|
|
}else
|
|
|
|
perror_msg_and_die("semget");
|
|
|
|
}
|
|
|
|
}else{
|
|
|
|
printf("Buffer already allocated just grab the semaphore?");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* write message to buffer */
|
|
|
|
void circ_message(const char *msg){
|
|
|
|
int l=strlen(msg)+1; /* count the whole message w/ '\0' included */
|
|
|
|
|
|
|
|
sem_down(s_semid);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Circular Buffer Algorithm:
|
|
|
|
* --------------------------
|
|
|
|
*
|
|
|
|
* Start-off w/ empty buffer of specific size SHM_SIZ
|
|
|
|
* Start filling it up w/ messages. I use '\0' as separator to break up messages.
|
|
|
|
* This is also very handy since we can do printf on message.
|
|
|
|
*
|
|
|
|
* Once the buffer is full we need to get rid of the first message in buffer and
|
|
|
|
* insert the new message. (Note: if the message being added is >1 message then
|
|
|
|
* we will need to "remove" >1 old message from the buffer). The way this is done
|
|
|
|
* is the following:
|
|
|
|
* When we reach the end of the buffer we set a mark and start from the beginning.
|
|
|
|
* Now what about the beginning and end of the buffer? Well we have the "head"
|
|
|
|
* index/pointer which is the starting point for the messages and we have "tail"
|
|
|
|
* index/pointer which is the ending point for the messages. When we "display" the
|
|
|
|
* messages we start from the beginning and continue until we reach "tail". If we
|
|
|
|
* reach end of buffer, then we just start from the beginning (offset 0). "head" and
|
|
|
|
* "tail" are actually offsets from the beginning of the buffer.
|
|
|
|
*
|
|
|
|
* Note: This algorithm uses Linux IPC mechanism w/ shared memory and semaphores to provide
|
|
|
|
* a threasafe way of handling shared memory operations.
|
|
|
|
*/
|
|
|
|
if ( (buf->tail + l) < buf->size ){
|
|
|
|
/* before we append the message we need to check the HEAD so that we won't
|
|
|
|
overwrite any of the message that we still need and adjust HEAD to point
|
|
|
|
to the next message! */
|
|
|
|
if ( buf->tail < buf->head){
|
|
|
|
if ( (buf->tail + l) >= buf->head ){
|
|
|
|
/* we need to move the HEAD to point to the next message
|
|
|
|
* Theoretically we have enough room to add the whole message to the
|
|
|
|
* buffer, because of the first outer IF statement, so we don't have
|
|
|
|
* to worry about overflows here!
|
|
|
|
*/
|
|
|
|
int k= buf->tail + l - buf->head; /* we need to know how many bytes
|
|
|
|
we are overwriting to make
|
|
|
|
enough room */
|
|
|
|
char *c=memchr(buf->data+buf->head + k,'\0',buf->size - (buf->head + k));
|
|
|
|
if (c != NULL) {/* do a sanity check just in case! */
|
|
|
|
buf->head = c - buf->data + 1; /* we need to convert pointer to
|
|
|
|
offset + skip the '\0' since
|
|
|
|
we need to point to the beginning
|
|
|
|
of the next message */
|
|
|
|
/* Note: HEAD is only used to "retrieve" messages, it's not used
|
|
|
|
when writing messages into our buffer */
|
|
|
|
}else{ /* show an error message to know we messed up? */
|
|
|
|
printf("Weird! Can't find the terminator token??? \n");
|
|
|
|
buf->head=0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} /* in other cases no overflows have been done yet, so we don't care! */
|
|
|
|
|
|
|
|
/* we should be ok to append the message now */
|
|
|
|
strncpy(buf->data + buf->tail,msg,l); /* append our message */
|
|
|
|
buf->tail+=l; /* count full message w/ '\0' terminating char */
|
|
|
|
}else{
|
|
|
|
/* we need to break up the message and "circle" it around */
|
|
|
|
char *c;
|
|
|
|
int k=buf->tail + l - buf->size; /* count # of bytes we don't fit */
|
|
|
|
|
|
|
|
/* We need to move HEAD! This is always the case since we are going
|
|
|
|
* to "circle" the message.
|
|
|
|
*/
|
|
|
|
c=memchr(buf->data + k ,'\0', buf->size - k);
|
|
|
|
|
|
|
|
if (c != NULL) /* if we don't have '\0'??? weird!!! */{
|
|
|
|
/* move head pointer*/
|
|
|
|
buf->head=c-buf->data+1;
|
|
|
|
|
|
|
|
/* now write the first part of the message */
|
|
|
|
strncpy(buf->data + buf->tail, msg, l - k - 1);
|
|
|
|
|
|
|
|
/* ALWAYS terminate end of buffer w/ '\0' */
|
|
|
|
buf->data[buf->size-1]='\0';
|
|
|
|
|
|
|
|
/* now write out the rest of the string to the beginning of the buffer */
|
|
|
|
strcpy(buf->data, &msg[l-k-1]);
|
|
|
|
|
|
|
|
/* we need to place the TAIL at the end of the message */
|
|
|
|
buf->tail = k + 1;
|
|
|
|
}else{
|
|
|
|
printf("Weird! Can't find the terminator token from the beginning??? \n");
|
|
|
|
buf->head = buf->tail = 0; /* reset buffer, since it's probably corrupted */
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
sem_up(s_semid);
|
|
|
|
}
|
|
|
|
#endif
|
2000-03-21 07:01:24 +05:30
|
|
|
/* Note: There is also a function called "message()" in init.c */
|
2000-04-04 23:44:25 +05:30
|
|
|
/* Print a message to the log file. */
|
2000-04-19 05:21:51 +05:30
|
|
|
static void message (char *fmt, ...) __attribute__ ((format (printf, 1, 2)));
|
|
|
|
static void message (char *fmt, ...)
|
1999-11-25 13:00:46 +05:30
|
|
|
{
|
2000-02-09 01:28:47 +05:30
|
|
|
int fd;
|
2000-04-20 00:22:56 +05:30
|
|
|
struct flock fl;
|
2000-02-09 01:28:47 +05:30
|
|
|
va_list arguments;
|
|
|
|
|
2000-04-20 00:22:56 +05:30
|
|
|
fl.l_whence = SEEK_SET;
|
|
|
|
fl.l_start = 0;
|
|
|
|
fl.l_len = 1;
|
|
|
|
|
2001-10-24 10:30:29 +05:30
|
|
|
#ifdef CONFIG_FEATURE_IPC_SYSLOG
|
2001-12-21 04:43:26 +05:30
|
|
|
if ((circular_logging) && (buf != NULL)){
|
2001-03-13 04:21:50 +05:30
|
|
|
char b[1024];
|
|
|
|
va_start (arguments, fmt);
|
|
|
|
vsprintf (b, fmt, arguments);
|
|
|
|
va_end (arguments);
|
|
|
|
circ_message(b);
|
|
|
|
|
|
|
|
}else
|
|
|
|
#endif
|
2000-04-19 05:21:51 +05:30
|
|
|
if ((fd = device_open (logFilePath,
|
|
|
|
O_WRONLY | O_CREAT | O_NOCTTY | O_APPEND |
|
|
|
|
O_NONBLOCK)) >= 0) {
|
2000-04-20 00:22:56 +05:30
|
|
|
fl.l_type = F_WRLCK;
|
|
|
|
fcntl (fd, F_SETLKW, &fl);
|
2000-04-19 05:21:51 +05:30
|
|
|
va_start (arguments, fmt);
|
|
|
|
vdprintf (fd, fmt, arguments);
|
|
|
|
va_end (arguments);
|
2000-04-20 00:22:56 +05:30
|
|
|
fl.l_type = F_UNLCK;
|
|
|
|
fcntl (fd, F_SETLKW, &fl);
|
2000-04-19 05:21:51 +05:30
|
|
|
close (fd);
|
1999-11-25 13:00:46 +05:30
|
|
|
} else {
|
2000-02-09 01:28:47 +05:30
|
|
|
/* Always send console messages to /dev/console so people will see them. */
|
2000-04-19 05:21:51 +05:30
|
|
|
if ((fd = device_open (_PATH_CONSOLE,
|
|
|
|
O_WRONLY | O_NOCTTY | O_NONBLOCK)) >= 0) {
|
|
|
|
va_start (arguments, fmt);
|
|
|
|
vdprintf (fd, fmt, arguments);
|
|
|
|
va_end (arguments);
|
|
|
|
close (fd);
|
2000-02-09 01:28:47 +05:30
|
|
|
} else {
|
2000-04-19 05:21:51 +05:30
|
|
|
fprintf (stderr, "Bummer, can't print: ");
|
|
|
|
va_start (arguments, fmt);
|
|
|
|
vfprintf (stderr, fmt, arguments);
|
|
|
|
fflush (stderr);
|
|
|
|
va_end (arguments);
|
2000-02-09 01:28:47 +05:30
|
|
|
}
|
1999-11-25 13:00:46 +05:30
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-04-19 05:21:51 +05:30
|
|
|
static void logMessage (int pri, char *msg)
|
1999-11-25 13:00:46 +05:30
|
|
|
{
|
2000-02-09 01:28:47 +05:30
|
|
|
time_t now;
|
|
|
|
char *timestamp;
|
2000-02-12 03:25:04 +05:30
|
|
|
static char res[20] = "";
|
2000-02-09 01:28:47 +05:30
|
|
|
CODE *c_pri, *c_fac;
|
|
|
|
|
2000-02-12 03:25:04 +05:30
|
|
|
if (pri != 0) {
|
|
|
|
for (c_fac = facilitynames;
|
2000-12-09 01:22:01 +05:30
|
|
|
c_fac->c_name && !(c_fac->c_val == LOG_FAC(pri) << 3); c_fac++);
|
2000-02-12 03:25:04 +05:30
|
|
|
for (c_pri = prioritynames;
|
2000-12-09 01:22:01 +05:30
|
|
|
c_pri->c_name && !(c_pri->c_val == LOG_PRI(pri)); c_pri++);
|
2000-12-12 01:43:37 +05:30
|
|
|
if (c_fac->c_name == NULL || c_pri->c_name == NULL)
|
2000-02-12 03:25:04 +05:30
|
|
|
snprintf(res, sizeof(res), "<%d>", pri);
|
|
|
|
else
|
|
|
|
snprintf(res, sizeof(res), "%s.%s", c_fac->c_name, c_pri->c_name);
|
|
|
|
}
|
2000-02-09 01:28:47 +05:30
|
|
|
|
|
|
|
if (strlen(msg) < 16 || msg[3] != ' ' || msg[6] != ' ' ||
|
2000-12-09 01:22:01 +05:30
|
|
|
msg[9] != ':' || msg[12] != ':' || msg[15] != ' ') {
|
2000-02-09 01:28:47 +05:30
|
|
|
time(&now);
|
|
|
|
timestamp = ctime(&now) + 4;
|
|
|
|
timestamp[15] = '\0';
|
|
|
|
} else {
|
|
|
|
timestamp = msg;
|
|
|
|
timestamp[15] = '\0';
|
|
|
|
msg += 16;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* todo: supress duplicates */
|
|
|
|
|
2001-10-24 10:30:29 +05:30
|
|
|
#ifdef CONFIG_FEATURE_REMOTE_LOG
|
2000-07-21 05:11:24 +05:30
|
|
|
/* send message to remote logger */
|
2000-12-09 01:22:01 +05:30
|
|
|
if ( -1 != remotefd){
|
2001-01-24 04:00:04 +05:30
|
|
|
static const int IOV_COUNT = 2;
|
2000-12-09 01:22:01 +05:30
|
|
|
struct iovec iov[IOV_COUNT];
|
|
|
|
struct iovec *v = iov;
|
|
|
|
|
2001-07-17 06:42:36 +05:30
|
|
|
memset(&res, 0, sizeof(res));
|
2000-12-09 01:22:01 +05:30
|
|
|
snprintf(res, sizeof(res), "<%d>", pri);
|
|
|
|
v->iov_base = res ;
|
|
|
|
v->iov_len = strlen(res);
|
|
|
|
v++;
|
|
|
|
|
|
|
|
v->iov_base = msg;
|
|
|
|
v->iov_len = strlen(msg);
|
|
|
|
|
|
|
|
if ( -1 == writev(remotefd,iov, IOV_COUNT)){
|
2002-03-20 15:22:45 +05:30
|
|
|
error_msg_and_die("syslogd: cannot write to remote file handle on "
|
2001-02-01 00:30:21 +05:30
|
|
|
"%s:%d",RemoteHost,RemotePort);
|
2000-12-09 01:22:01 +05:30
|
|
|
}
|
|
|
|
}
|
2001-12-21 04:43:26 +05:30
|
|
|
if (local_logging)
|
2000-07-21 05:11:24 +05:30
|
|
|
#endif
|
2000-12-09 01:22:01 +05:30
|
|
|
/* now spew out the message to wherever it is supposed to go */
|
|
|
|
message("%s %s %s %s\n", timestamp, LocalHostName, res, msg);
|
2000-12-09 01:11:21 +05:30
|
|
|
|
2000-07-21 05:11:24 +05:30
|
|
|
|
1999-11-24 14:34:33 +05:30
|
|
|
}
|
|
|
|
|
1999-11-25 13:00:46 +05:30
|
|
|
static void quit_signal(int sig)
|
|
|
|
{
|
2001-05-07 23:25:05 +05:30
|
|
|
logMessage(LOG_SYSLOG | LOG_INFO, "System log daemon exiting.");
|
2000-04-04 23:44:25 +05:30
|
|
|
unlink(lfile);
|
2001-10-24 10:30:29 +05:30
|
|
|
#ifdef CONFIG_FEATURE_IPC_SYSLOG
|
2001-03-13 04:21:50 +05:30
|
|
|
ipcsyslog_cleanup();
|
|
|
|
#endif
|
|
|
|
|
2000-02-09 01:28:47 +05:30
|
|
|
exit(TRUE);
|
1999-11-25 13:00:46 +05:30
|
|
|
}
|
1999-11-24 14:34:33 +05:30
|
|
|
|
1999-11-25 13:00:46 +05:30
|
|
|
static void domark(int sig)
|
|
|
|
{
|
2000-02-09 01:28:47 +05:30
|
|
|
if (MarkInterval > 0) {
|
|
|
|
logMessage(LOG_SYSLOG | LOG_INFO, "-- MARK --");
|
|
|
|
alarm(MarkInterval);
|
|
|
|
}
|
1999-11-25 13:00:46 +05:30
|
|
|
}
|
|
|
|
|
2001-07-02 23:02:40 +05:30
|
|
|
/* This must be a #define, since when DODEBUG and BUFFERS_GO_IN_BSS are
|
|
|
|
* enabled, we otherwise get a "storage size isn't constant error. */
|
|
|
|
#define BUFSIZE 1023
|
2000-06-19 23:18:02 +05:30
|
|
|
static int serveConnection (int conn)
|
2000-06-08 02:38:25 +05:30
|
|
|
{
|
2001-10-24 10:30:29 +05:30
|
|
|
RESERVE_CONFIG_BUFFER(tmpbuf, BUFSIZE + 1);
|
2000-06-08 02:38:25 +05:30
|
|
|
int n_read;
|
2001-08-14 23:02:23 +05:30
|
|
|
char *p = tmpbuf;
|
2000-06-08 02:38:25 +05:30
|
|
|
|
2001-03-28 01:47:58 +05:30
|
|
|
n_read = read (conn, tmpbuf, BUFSIZE );
|
|
|
|
|
2001-08-14 23:02:23 +05:30
|
|
|
while (p < tmpbuf + n_read) {
|
2000-06-08 02:38:25 +05:30
|
|
|
|
|
|
|
int pri = (LOG_USER | LOG_NOTICE);
|
|
|
|
char line[ BUFSIZE + 1 ];
|
|
|
|
unsigned char c;
|
|
|
|
|
2001-08-14 23:02:23 +05:30
|
|
|
char *q = line;
|
2000-06-08 02:38:25 +05:30
|
|
|
|
2001-03-23 22:38:21 +05:30
|
|
|
tmpbuf[ n_read - 1 ] = '\0';
|
2000-06-08 02:38:25 +05:30
|
|
|
|
|
|
|
while (p && (c = *p) && q < &line[ sizeof (line) - 1 ]) {
|
|
|
|
if (c == '<') {
|
|
|
|
/* Parse the magic priority number. */
|
|
|
|
pri = 0;
|
|
|
|
while (isdigit (*(++p))) {
|
|
|
|
pri = 10 * pri + (*p - '0');
|
|
|
|
}
|
2000-07-21 05:11:24 +05:30
|
|
|
if (pri & ~(LOG_FACMASK | LOG_PRIMASK)){
|
2000-06-08 02:38:25 +05:30
|
|
|
pri = (LOG_USER | LOG_NOTICE);
|
2000-07-21 05:11:24 +05:30
|
|
|
}
|
2000-06-08 02:38:25 +05:30
|
|
|
} else if (c == '\n') {
|
|
|
|
*q++ = ' ';
|
|
|
|
} else if (iscntrl (c) && (c < 0177)) {
|
|
|
|
*q++ = '^';
|
|
|
|
*q++ = c ^ 0100;
|
|
|
|
} else {
|
|
|
|
*q++ = c;
|
|
|
|
}
|
|
|
|
p++;
|
|
|
|
}
|
|
|
|
*q = '\0';
|
2001-08-14 23:02:23 +05:30
|
|
|
p++;
|
2000-06-08 02:38:25 +05:30
|
|
|
/* Now log it */
|
|
|
|
logMessage (pri, line);
|
|
|
|
}
|
2001-10-24 10:30:29 +05:30
|
|
|
RELEASE_CONFIG_BUFFER (tmpbuf);
|
2001-03-28 01:47:58 +05:30
|
|
|
return n_read;
|
2000-06-08 02:38:25 +05:30
|
|
|
}
|
|
|
|
|
2000-07-21 05:11:24 +05:30
|
|
|
|
2001-10-24 10:30:29 +05:30
|
|
|
#ifdef CONFIG_FEATURE_REMOTE_LOG
|
2000-07-21 05:11:24 +05:30
|
|
|
static void init_RemoteLog (void){
|
|
|
|
|
|
|
|
struct sockaddr_in remoteaddr;
|
|
|
|
struct hostent *hostinfo;
|
|
|
|
int len = sizeof(remoteaddr);
|
|
|
|
|
2001-07-17 06:42:36 +05:30
|
|
|
memset(&remoteaddr, 0, len);
|
2001-03-28 01:47:58 +05:30
|
|
|
|
2000-07-21 05:11:24 +05:30
|
|
|
remotefd = socket(AF_INET, SOCK_DGRAM, 0);
|
|
|
|
|
|
|
|
if (remotefd < 0) {
|
2001-02-01 00:30:21 +05:30
|
|
|
error_msg_and_die("syslogd: cannot create socket");
|
2000-07-21 05:11:24 +05:30
|
|
|
}
|
|
|
|
|
2001-05-16 21:10:51 +05:30
|
|
|
hostinfo = xgethostbyname(RemoteHost);
|
2000-07-21 05:11:24 +05:30
|
|
|
|
|
|
|
remoteaddr.sin_family = AF_INET;
|
|
|
|
remoteaddr.sin_addr = *(struct in_addr *) *hostinfo->h_addr_list;
|
|
|
|
remoteaddr.sin_port = htons(RemotePort);
|
|
|
|
|
|
|
|
/*
|
|
|
|
Since we are using UDP sockets, connect just sets the default host and port
|
|
|
|
for future operations
|
|
|
|
*/
|
|
|
|
if ( 0 != (connect(remotefd, (struct sockaddr *) &remoteaddr, len))){
|
2001-02-01 00:30:21 +05:30
|
|
|
error_msg_and_die("syslogd: cannot connect to remote host %s:%d", RemoteHost, RemotePort);
|
2000-07-21 05:11:24 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2000-04-04 23:44:25 +05:30
|
|
|
static void doSyslogd (void) __attribute__ ((noreturn));
|
|
|
|
static void doSyslogd (void)
|
1999-11-25 13:00:46 +05:30
|
|
|
{
|
2000-02-09 01:28:47 +05:30
|
|
|
struct sockaddr_un sunx;
|
2000-04-21 06:56:49 +05:30
|
|
|
socklen_t addrLength;
|
|
|
|
|
2000-04-19 05:21:51 +05:30
|
|
|
|
2000-04-04 23:44:25 +05:30
|
|
|
int sock_fd;
|
2000-04-19 05:21:51 +05:30
|
|
|
fd_set fds;
|
|
|
|
|
|
|
|
/* Set up signal handlers. */
|
2000-04-04 23:44:25 +05:30
|
|
|
signal (SIGINT, quit_signal);
|
|
|
|
signal (SIGTERM, quit_signal);
|
|
|
|
signal (SIGQUIT, quit_signal);
|
|
|
|
signal (SIGHUP, SIG_IGN);
|
2000-09-13 19:44:29 +05:30
|
|
|
signal (SIGCHLD, SIG_IGN);
|
|
|
|
#ifdef SIGCLD
|
2000-04-20 00:22:56 +05:30
|
|
|
signal (SIGCLD, SIG_IGN);
|
2000-09-13 19:44:29 +05:30
|
|
|
#endif
|
2000-04-04 23:44:25 +05:30
|
|
|
signal (SIGALRM, domark);
|
|
|
|
alarm (MarkInterval);
|
|
|
|
|
2000-04-19 05:21:51 +05:30
|
|
|
/* Create the syslog file so realpath() can work. */
|
2001-05-03 12:31:41 +05:30
|
|
|
if (realpath (_PATH_LOG, lfile) != NULL)
|
|
|
|
unlink (lfile);
|
2000-04-04 23:44:25 +05:30
|
|
|
|
2000-04-19 05:21:51 +05:30
|
|
|
memset (&sunx, 0, sizeof (sunx));
|
2000-04-04 23:44:25 +05:30
|
|
|
sunx.sun_family = AF_UNIX;
|
2000-04-19 05:21:51 +05:30
|
|
|
strncpy (sunx.sun_path, lfile, sizeof (sunx.sun_path));
|
|
|
|
if ((sock_fd = socket (AF_UNIX, SOCK_STREAM, 0)) < 0)
|
2001-05-03 12:31:41 +05:30
|
|
|
perror_msg_and_die ("Couldn't get file descriptor for socket " _PATH_LOG);
|
1999-11-24 14:34:33 +05:30
|
|
|
|
2000-04-04 23:44:25 +05:30
|
|
|
addrLength = sizeof (sunx.sun_family) + strlen (sunx.sun_path);
|
2000-04-19 05:21:51 +05:30
|
|
|
if ((bind (sock_fd, (struct sockaddr *) &sunx, addrLength)) || (listen (sock_fd, 5)))
|
2000-12-18 09:27:16 +05:30
|
|
|
perror_msg_and_die ("Could not connect to socket " _PATH_LOG);
|
1999-11-24 14:34:33 +05:30
|
|
|
|
2000-04-19 05:21:51 +05:30
|
|
|
if (chmod (lfile, 0666) < 0)
|
2000-12-18 09:27:16 +05:30
|
|
|
perror_msg_and_die ("Could not set permission on " _PATH_LOG);
|
2000-02-09 01:28:47 +05:30
|
|
|
|
2000-04-19 05:21:51 +05:30
|
|
|
FD_ZERO (&fds);
|
|
|
|
FD_SET (sock_fd, &fds);
|
2000-04-04 23:44:25 +05:30
|
|
|
|
2001-10-24 10:30:29 +05:30
|
|
|
#ifdef CONFIG_FEATURE_IPC_SYSLOG
|
2001-12-21 04:43:26 +05:30
|
|
|
if (circular_logging ){
|
2001-04-06 02:25:17 +05:30
|
|
|
ipcsyslog_init();
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2001-10-24 10:30:29 +05:30
|
|
|
#ifdef CONFIG_FEATURE_REMOTE_LOG
|
2001-12-21 04:43:26 +05:30
|
|
|
if (doRemoteLog){
|
2000-07-21 05:11:24 +05:30
|
|
|
init_RemoteLog();
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2001-05-07 23:25:05 +05:30
|
|
|
logMessage (LOG_SYSLOG | LOG_INFO, "syslogd started: " BB_BANNER);
|
2000-04-04 23:44:25 +05:30
|
|
|
|
|
|
|
for (;;) {
|
2000-04-19 05:21:51 +05:30
|
|
|
|
|
|
|
fd_set readfds;
|
|
|
|
int n_ready;
|
|
|
|
int fd;
|
|
|
|
|
|
|
|
memcpy (&readfds, &fds, sizeof (fds));
|
2000-04-04 23:44:25 +05:30
|
|
|
|
|
|
|
if ((n_ready = select (FD_SETSIZE, &readfds, NULL, NULL, NULL)) < 0) {
|
|
|
|
if (errno == EINTR) continue; /* alarm may have happened. */
|
2000-12-18 09:27:16 +05:30
|
|
|
perror_msg_and_die ("select error");
|
2000-04-04 23:44:25 +05:30
|
|
|
}
|
|
|
|
|
2000-04-19 05:21:51 +05:30
|
|
|
for (fd = 0; (n_ready > 0) && (fd < FD_SETSIZE); fd++) {
|
2000-04-04 23:44:25 +05:30
|
|
|
if (FD_ISSET (fd, &readfds)) {
|
2000-04-20 00:22:56 +05:30
|
|
|
|
2000-04-19 05:21:51 +05:30
|
|
|
--n_ready;
|
2000-04-20 00:22:56 +05:30
|
|
|
|
2000-04-04 23:44:25 +05:30
|
|
|
if (fd == sock_fd) {
|
2000-04-20 00:22:56 +05:30
|
|
|
int conn;
|
|
|
|
|
2001-03-13 01:21:09 +05:30
|
|
|
//printf("New Connection request.\n");
|
2000-04-19 05:21:51 +05:30
|
|
|
if ((conn = accept (sock_fd, (struct sockaddr *) &sunx, &addrLength)) < 0) {
|
2000-12-18 09:27:16 +05:30
|
|
|
perror_msg_and_die ("accept error");
|
2000-02-09 01:28:47 +05:30
|
|
|
}
|
2000-04-19 05:21:51 +05:30
|
|
|
|
2001-03-13 01:21:09 +05:30
|
|
|
FD_SET(conn, &fds);
|
|
|
|
//printf("conn: %i, set_size: %i\n",conn,FD_SETSIZE);
|
2001-03-28 01:47:58 +05:30
|
|
|
} else {
|
2001-03-13 01:21:09 +05:30
|
|
|
//printf("Serving connection: %i\n",fd);
|
2001-03-28 01:47:58 +05:30
|
|
|
if ( serveConnection(fd) <= 0 ) {
|
|
|
|
close (fd);
|
|
|
|
FD_CLR(fd, &fds);
|
|
|
|
}
|
2001-03-13 01:21:09 +05:30
|
|
|
} /* fd == sock_fd */
|
|
|
|
}/* FD_ISSET() */
|
|
|
|
}/* for */
|
|
|
|
} /* for main loop */
|
1999-11-24 14:34:33 +05:30
|
|
|
}
|
|
|
|
|
1999-11-25 13:00:46 +05:30
|
|
|
extern int syslogd_main(int argc, char **argv)
|
|
|
|
{
|
2001-03-30 03:28:33 +05:30
|
|
|
int opt;
|
2000-02-09 01:28:47 +05:30
|
|
|
int doFork = TRUE;
|
|
|
|
|
|
|
|
char *p;
|
|
|
|
|
2000-12-11 22:18:50 +05:30
|
|
|
/* do normal option parsing */
|
2001-03-13 04:21:50 +05:30
|
|
|
while ((opt = getopt(argc, argv, "m:nO:R:LC")) > 0) {
|
2000-12-11 22:18:50 +05:30
|
|
|
switch (opt) {
|
2000-02-09 01:28:47 +05:30
|
|
|
case 'm':
|
2000-12-11 22:18:50 +05:30
|
|
|
MarkInterval = atoi(optarg) * 60;
|
2000-02-09 01:28:47 +05:30
|
|
|
break;
|
|
|
|
case 'n':
|
|
|
|
doFork = FALSE;
|
|
|
|
break;
|
|
|
|
case 'O':
|
2001-11-12 22:27:27 +05:30
|
|
|
logFilePath = xstrdup(optarg);
|
2000-02-09 01:28:47 +05:30
|
|
|
break;
|
2001-10-24 10:30:29 +05:30
|
|
|
#ifdef CONFIG_FEATURE_REMOTE_LOG
|
2000-07-21 05:11:24 +05:30
|
|
|
case 'R':
|
2001-11-12 22:27:27 +05:30
|
|
|
RemoteHost = xstrdup(optarg);
|
2000-12-11 22:18:50 +05:30
|
|
|
if ( (p = strchr(RemoteHost, ':'))){
|
|
|
|
RemotePort = atoi(p+1);
|
|
|
|
*p = '\0';
|
2001-03-28 01:47:58 +05:30
|
|
|
}
|
2000-12-11 22:18:50 +05:30
|
|
|
doRemoteLog = TRUE;
|
|
|
|
break;
|
2000-12-11 21:54:16 +05:30
|
|
|
case 'L':
|
|
|
|
local_logging = TRUE;
|
2000-12-09 01:22:01 +05:30
|
|
|
break;
|
2001-03-13 04:21:50 +05:30
|
|
|
#endif
|
2001-10-24 10:30:29 +05:30
|
|
|
#ifdef CONFIG_FEATURE_IPC_SYSLOG
|
2001-03-13 04:21:50 +05:30
|
|
|
case 'C':
|
|
|
|
circular_logging = TRUE;
|
|
|
|
break;
|
2000-07-21 05:11:24 +05:30
|
|
|
#endif
|
2000-02-09 01:28:47 +05:30
|
|
|
default:
|
2001-02-15 02:53:06 +05:30
|
|
|
show_usage();
|
1999-11-25 13:00:46 +05:30
|
|
|
}
|
|
|
|
}
|
2000-02-09 01:28:47 +05:30
|
|
|
|
2001-10-24 10:30:29 +05:30
|
|
|
#ifdef CONFIG_FEATURE_REMOTE_LOG
|
2000-12-12 00:58:29 +05:30
|
|
|
/* If they have not specified remote logging, then log locally */
|
2001-12-21 04:43:26 +05:30
|
|
|
if (! doRemoteLog)
|
2000-12-12 00:58:29 +05:30
|
|
|
local_logging = TRUE;
|
|
|
|
#endif
|
|
|
|
|
2001-03-13 04:21:50 +05:30
|
|
|
|
2000-02-09 01:28:47 +05:30
|
|
|
/* Store away localhost's name before the fork */
|
|
|
|
gethostname(LocalHostName, sizeof(LocalHostName));
|
|
|
|
if ((p = strchr(LocalHostName, '.'))) {
|
|
|
|
*p++ = '\0';
|
|
|
|
}
|
|
|
|
|
2000-04-04 23:44:25 +05:30
|
|
|
umask(0);
|
|
|
|
|
2001-12-21 04:43:26 +05:30
|
|
|
if (doFork) {
|
2001-10-28 10:42:20 +05:30
|
|
|
#if !defined(__UCLIBC__) || defined(__UCLIBC_HAS_MMU__)
|
2001-03-30 03:28:33 +05:30
|
|
|
if (daemon(0, 1) < 0)
|
|
|
|
perror_msg_and_die("daemon");
|
2001-10-28 10:42:20 +05:30
|
|
|
#else
|
|
|
|
error_msg_and_die("daemon not supported");
|
|
|
|
#endif
|
1999-11-25 13:00:46 +05:30
|
|
|
}
|
2001-03-30 03:28:33 +05:30
|
|
|
doSyslogd();
|
1999-12-03 14:49:54 +05:30
|
|
|
|
2000-12-01 08:25:13 +05:30
|
|
|
return EXIT_SUCCESS;
|
1999-11-25 13:00:46 +05:30
|
|
|
}
|
2000-04-04 23:44:25 +05:30
|
|
|
|
|
|
|
/*
|
2000-04-20 00:22:56 +05:30
|
|
|
Local Variables
|
|
|
|
c-file-style: "linux"
|
|
|
|
c-basic-offset: 4
|
|
|
|
tab-width: 4
|
|
|
|
End:
|
|
|
|
*/
|