blob: d0dd1bd20bad0eac25f14a6ca2bcce6c56a5abfd [file] [log] [blame]
Erik Andersene49d5ec2000-02-08 19:58:47 +00001/* vi: set sw=4 ts=4: */
Eric Andersen3843e961999-11-25 07:30:46 +00002/*
3 * Mini syslogd implementation for busybox
4 *
Eric Andersenc7bda1c2004-03-15 08:29:22 +00005 * Copyright (C) 1999-2004 by Erik Andersen <andersen@codepoet.org>
Eric Andersen3843e961999-11-25 07:30:46 +00006 *
Erik Andersenf13df372000-04-18 23:51:51 +00007 * Copyright (C) 2000 by Karl M. Hegbloom <karlheg@debian.org>
8 *
Glenn L McGrath6ed77592002-12-12 10:54:48 +00009 * "circular buffer" Copyright (C) 2001 by Gennady Feldman <gfeldman@gena01.com>
Mark Whitley6317c4b2001-03-12 22:51:50 +000010 *
Glenn L McGrath6ed77592002-12-12 10:54:48 +000011 * Maintainer: Gennady Feldman <gfeldman@gena01.com> as of Mar 12, 2001
Mark Whitley6bff9cc2001-03-12 23:41:34 +000012 *
Denys Vlasenko0ef64bd2010-08-16 20:14:46 +020013 * Licensed under GPLv2 or later, see file LICENSE in this source tree.
Eric Andersen3843e961999-11-25 07:30:46 +000014 */
Denys Vlasenkod34f3002015-10-18 18:42:03 +020015//config:config SYSLOGD
Denys Vlasenkob097a842018-12-28 03:20:17 +010016//config: bool "syslogd (13 kb)"
Denys Vlasenkod34f3002015-10-18 18:42:03 +020017//config: default y
18//config: help
Denys Vlasenko72089cf2017-07-21 09:50:55 +020019//config: The syslogd utility is used to record logs of all the
20//config: significant events that occur on a system. Every
21//config: message that is logged records the date and time of the
22//config: event, and will generally also record the name of the
23//config: application that generated the message. When used in
24//config: conjunction with klogd, messages from the Linux kernel
25//config: can also be recorded. This is terribly useful,
26//config: especially for finding what happened when something goes
27//config: wrong. And something almost always will go wrong if
28//config: you wait long enough....
Denys Vlasenkod34f3002015-10-18 18:42:03 +020029//config:
30//config:config FEATURE_ROTATE_LOGFILE
31//config: bool "Rotate message files"
32//config: default y
33//config: depends on SYSLOGD
34//config: help
Denys Vlasenko72089cf2017-07-21 09:50:55 +020035//config: This enables syslogd to rotate the message files
36//config: on his own. No need to use an external rotate script.
Denys Vlasenkod34f3002015-10-18 18:42:03 +020037//config:
38//config:config FEATURE_REMOTE_LOG
39//config: bool "Remote Log support"
40//config: default y
41//config: depends on SYSLOGD
42//config: help
Denys Vlasenko72089cf2017-07-21 09:50:55 +020043//config: When you enable this feature, the syslogd utility can
44//config: be used to send system log messages to another system
45//config: connected via a network. This allows the remote
46//config: machine to log all the system messages, which can be
47//config: terribly useful for reducing the number of serial
48//config: cables you use. It can also be a very good security
49//config: measure to prevent system logs from being tampered with
50//config: by an intruder.
Denys Vlasenkod34f3002015-10-18 18:42:03 +020051//config:
52//config:config FEATURE_SYSLOGD_DUP
53//config: bool "Support -D (drop dups) option"
54//config: default y
55//config: depends on SYSLOGD
56//config: help
Denys Vlasenko72089cf2017-07-21 09:50:55 +020057//config: Option -D instructs syslogd to drop consecutive messages
58//config: which are totally the same.
Denys Vlasenkod34f3002015-10-18 18:42:03 +020059//config:
60//config:config FEATURE_SYSLOGD_CFG
61//config: bool "Support syslog.conf"
62//config: default y
63//config: depends on SYSLOGD
64//config: help
Denys Vlasenko72089cf2017-07-21 09:50:55 +020065//config: Supports restricted syslogd config. See docs/syslog.conf.txt
Denys Vlasenkod34f3002015-10-18 18:42:03 +020066//config:
67//config:config FEATURE_SYSLOGD_READ_BUFFER_SIZE
68//config: int "Read buffer size in bytes"
69//config: default 256
70//config: range 256 20000
71//config: depends on SYSLOGD
72//config: help
Denys Vlasenko72089cf2017-07-21 09:50:55 +020073//config: This option sets the size of the syslog read buffer.
74//config: Actual memory usage increases around five times the
75//config: change done here.
Denys Vlasenkod34f3002015-10-18 18:42:03 +020076//config:
77//config:config FEATURE_IPC_SYSLOG
78//config: bool "Circular Buffer support"
79//config: default y
80//config: depends on SYSLOGD
81//config: help
Denys Vlasenko72089cf2017-07-21 09:50:55 +020082//config: When you enable this feature, the syslogd utility will
83//config: use a circular buffer to record system log messages.
84//config: When the buffer is filled it will continue to overwrite
85//config: the oldest messages. This can be very useful for
86//config: systems with little or no permanent storage, since
87//config: otherwise system logs can eventually fill up your
88//config: entire filesystem, which may cause your system to
89//config: break badly.
Denys Vlasenkod34f3002015-10-18 18:42:03 +020090//config:
91//config:config FEATURE_IPC_SYSLOG_BUFFER_SIZE
92//config: int "Circular buffer size in Kbytes (minimum 4KB)"
93//config: default 16
94//config: range 4 2147483647
95//config: depends on FEATURE_IPC_SYSLOG
96//config: help
Denys Vlasenko72089cf2017-07-21 09:50:55 +020097//config: This option sets the size of the circular buffer
98//config: used to record system log messages.
Denys Vlasenkod34f3002015-10-18 18:42:03 +020099//config:
100//config:config FEATURE_KMSG_SYSLOG
101//config: bool "Linux kernel printk buffer support"
102//config: default y
103//config: depends on SYSLOGD
104//config: select PLATFORM_LINUX
105//config: help
Denys Vlasenko72089cf2017-07-21 09:50:55 +0200106//config: When you enable this feature, the syslogd utility will
107//config: write system log message to the Linux kernel's printk buffer.
108//config: This can be used as a smaller alternative to the syslogd IPC
109//config: support, as klogd and logread aren't needed.
Denys Vlasenkod34f3002015-10-18 18:42:03 +0200110//config:
Denys Vlasenko72089cf2017-07-21 09:50:55 +0200111//config: NOTICE: Syslog facilities in log entries needs kernel 3.5+.
Denys Vlasenkod34f3002015-10-18 18:42:03 +0200112
113//applet:IF_SYSLOGD(APPLET(syslogd, BB_DIR_SBIN, BB_SUID_DROP))
114
115//kbuild:lib-$(CONFIG_SYSLOGD) += syslogd_and_logger.o
Eric Andersenb99df0f1999-11-24 09:04:33 +0000116
Pere Orga5bc8c002011-04-11 03:29:49 +0200117//usage:#define syslogd_trivial_usage
118//usage: "[OPTIONS]"
119//usage:#define syslogd_full_usage "\n\n"
Denys Vlasenkoaeab42e2011-05-25 11:58:56 +0200120//usage: "System logging utility\n"
121//usage: IF_NOT_FEATURE_SYSLOGD_CFG(
122//usage: "(this version of syslogd ignores /etc/syslog.conf)\n"
123//usage: )
Pere Orga5bc8c002011-04-11 03:29:49 +0200124//usage: "\n -n Run in foreground"
Pere Orga5bc8c002011-04-11 03:29:49 +0200125//usage: IF_FEATURE_REMOTE_LOG(
Denys Vlasenko257a7752013-03-15 01:50:35 +0100126//usage: "\n -R HOST[:PORT] Log to HOST:PORT (default PORT:514)"
Denys Vlasenkoaeab42e2011-05-25 11:58:56 +0200127//usage: "\n -L Log locally and via network (default is network only if -R)"
128//usage: )
Pere Orga5bc8c002011-04-11 03:29:49 +0200129//usage: IF_FEATURE_IPC_SYSLOG(
Pere Orga5bc8c002011-04-11 03:29:49 +0200130/* NB: -Csize shouldn't have space (because size is optional) */
Denys Vlasenkoaeab42e2011-05-25 11:58:56 +0200131//usage: "\n -C[size_kb] Log to shared mem buffer (use logread to read it)"
132//usage: )
Denys Vlasenkoa28c1b22014-07-02 15:21:30 +0200133//usage: IF_FEATURE_KMSG_SYSLOG(
134//usage: "\n -K Log to kernel printk buffer (use dmesg to read it)"
135//usage: )
Mike Frysingerea1b4442016-04-04 01:28:32 -0400136//usage: "\n -O FILE Log to FILE (default: /var/log/messages, stdout if -)"
Denys Vlasenkoa28c1b22014-07-02 15:21:30 +0200137//usage: IF_FEATURE_ROTATE_LOGFILE(
Denys Vlasenkof3d705f2017-01-21 03:46:35 +0100138//usage: "\n -s SIZE Max size (KB) before rotation (default 200KB, 0=off)"
139//usage: "\n -b N N rotated logs to keep (default 1, max 99, 0=purge)"
Denys Vlasenkoa28c1b22014-07-02 15:21:30 +0200140//usage: )
141//usage: "\n -l N Log only messages more urgent than prio N (1-8)"
142//usage: "\n -S Smaller output"
Peter Korsgaard9d539f92018-08-09 11:25:22 +0200143//usage: "\n -t Strip client-generated timestamps"
Denys Vlasenkoa28c1b22014-07-02 15:21:30 +0200144//usage: IF_FEATURE_SYSLOGD_DUP(
145//usage: "\n -D Drop duplicates"
146//usage: )
Denys Vlasenkoaeab42e2011-05-25 11:58:56 +0200147//usage: IF_FEATURE_SYSLOGD_CFG(
148//usage: "\n -f FILE Use FILE as config (default:/etc/syslog.conf)"
149//usage: )
Denys Vlasenkof3d705f2017-01-21 03:46:35 +0100150/* //usage: "\n -m MIN Minutes between MARK lines (default 20, 0=off)" */
Pere Orga5bc8c002011-04-11 03:29:49 +0200151//usage:
152//usage:#define syslogd_example_usage
153//usage: "$ syslogd -R masterlog:514\n"
154//usage: "$ syslogd -R 192.168.1.1:601\n"
155
Denis Vlasenkobd1aeeb2008-06-11 15:43:19 +0000156/*
157 * Done in syslogd_and_logger.c:
Denis Vlasenkob6adbf12007-05-26 19:00:18 +0000158#include "libbb.h"
Bernhard Reutner-Fischerf4701962008-01-27 12:50:12 +0000159#define SYSLOG_NAMES
160#define SYSLOG_NAMES_CONST
161#include <syslog.h>
Denis Vlasenkobd1aeeb2008-06-11 15:43:19 +0000162*/
Cédric Cabessaadc30b42013-08-05 02:09:16 +0200163#ifndef _PATH_LOG
164#define _PATH_LOG "/dev/log"
165#endif
Bernhard Reutner-Fischerf4701962008-01-27 12:50:12 +0000166
Erik Andersen983b51b2000-04-04 18:14:25 +0000167#include <sys/un.h>
Eric Andersenced2cef2000-07-20 23:41:24 +0000168#include <sys/uio.h>
Eric Andersen3843e961999-11-25 07:30:46 +0000169
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000170#if ENABLE_FEATURE_REMOTE_LOG
171#include <netinet/in.h>
Denis Vlasenko4998c812007-02-14 20:51:46 +0000172#endif
Erik Andersene49d5ec2000-02-08 19:58:47 +0000173
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000174#if ENABLE_FEATURE_IPC_SYSLOG
175#include <sys/ipc.h>
176#include <sys/sem.h>
177#include <sys/shm.h>
178#endif
Denis Vlasenko1decd0e2006-09-30 19:17:40 +0000179
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000180
181#define DEBUG 0
182
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000183/* MARK code is not very useful, is bloat, and broken:
184 * can deadlock if alarmed to make MARK while writing to IPC buffer
185 * (semaphores are down but do_mark routine tries to down them again) */
186#undef SYSLOGD_MARK
187
Denis Vlasenko0d948202008-12-09 22:53:31 +0000188/* Write locking does not seem to be useful either */
189#undef SYSLOGD_WRLOCK
190
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000191enum {
Janne Kiviluotoc897dfe2010-03-31 15:58:58 +0200192 MAX_READ = CONFIG_FEATURE_SYSLOGD_READ_BUFFER_SIZE,
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000193 DNS_WAIT_SEC = 2 * 60,
194};
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000195
196/* Semaphore operation structures */
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000197struct shbuf_ds {
Denis Vlasenko5f1b1492007-08-12 21:33:06 +0000198 int32_t size; /* size of data - 1 */
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000199 int32_t tail; /* end of message list */
200 char data[1]; /* data/messages */
201};
202
Thomas Geuligd2f77792010-02-28 13:01:59 +0100203#if ENABLE_FEATURE_REMOTE_LOG
204typedef struct {
205 int remoteFD;
206 unsigned last_dns_resolve;
207 len_and_sockaddr *remoteAddr;
208 const char *remoteHostname;
209} remoteHost_t;
210#endif
211
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200212typedef struct logFile_t {
213 const char *path;
214 int fd;
Joshua Judson Rosenae57fca2014-07-03 14:51:47 +0200215 time_t last_log_time;
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200216#if ENABLE_FEATURE_ROTATE_LOGFILE
217 unsigned size;
218 uint8_t isRegular;
219#endif
220} logFile_t;
221
222#if ENABLE_FEATURE_SYSLOGD_CFG
223typedef struct logRule_t {
224 uint8_t enabled_facility_priomap[LOG_NFACILITIES];
225 struct logFile_t *file;
226 struct logRule_t *next;
227} logRule_t;
228#endif
229
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000230/* Allows us to have smaller initializer. Ugly. */
231#define GLOBALS \
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200232 logFile_t logFile; \
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000233 /* interval between marks in seconds */ \
234 /*int markInterval;*/ \
235 /* level of messages to be logged */ \
236 int logLevel; \
Denis Vlasenko5e34ff22009-04-21 11:09:40 +0000237IF_FEATURE_ROTATE_LOGFILE( \
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000238 /* max size of file before rotation */ \
239 unsigned logFileSize; \
240 /* number of rotated message files */ \
241 unsigned logFileRotate; \
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000242) \
Denis Vlasenko5e34ff22009-04-21 11:09:40 +0000243IF_FEATURE_IPC_SYSLOG( \
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000244 int shmid; /* ipc shared memory id */ \
245 int s_semid; /* ipc semaphore id */ \
246 int shm_size; \
247 struct sembuf SMwup[1]; \
248 struct sembuf SMwdn[3]; \
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200249) \
250IF_FEATURE_SYSLOGD_CFG( \
251 logRule_t *log_rules; \
Peter Korsgaardcd776cf2013-01-06 00:07:19 +0100252) \
253IF_FEATURE_KMSG_SYSLOG( \
254 int kmsgfd; \
255 int primask; \
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000256)
257
258struct init_globals {
259 GLOBALS
260};
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000261
262struct globals {
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000263 GLOBALS
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000264
265#if ENABLE_FEATURE_REMOTE_LOG
Thomas Geuligd2f77792010-02-28 13:01:59 +0100266 llist_t *remoteHosts;
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000267#endif
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000268#if ENABLE_FEATURE_IPC_SYSLOG
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000269 struct shbuf_ds *shbuf;
270#endif
Denis Vlasenko6f1713f2008-02-25 23:23:58 +0000271 /* localhost's name. We print only first 64 chars */
272 char *hostname;
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000273
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000274 /* We recv into recvbuf... */
Denis Vlasenkobe048f22008-02-26 20:13:52 +0000275 char recvbuf[MAX_READ * (1 + ENABLE_FEATURE_SYSLOGD_DUP)];
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000276 /* ...then copy to parsebuf, escaping control chars */
277 /* (can grow x2 max) */
278 char parsebuf[MAX_READ*2];
279 /* ...then sprintf into printbuf, adding timestamp (15 chars),
280 * host (64), fac.prio (20) to the message */
281 /* (growth by: 15 + 64 + 20 + delims = ~110) */
282 char printbuf[MAX_READ*2 + 128];
283};
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000284
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000285static const struct init_globals init_data = {
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200286 .logFile = {
287 .path = "/var/log/messages",
288 .fd = -1,
289 },
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000290#ifdef SYSLOGD_MARK
291 .markInterval = 20 * 60,
292#endif
293 .logLevel = 8,
294#if ENABLE_FEATURE_ROTATE_LOGFILE
295 .logFileSize = 200 * 1024,
296 .logFileRotate = 1,
297#endif
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000298#if ENABLE_FEATURE_IPC_SYSLOG
299 .shmid = -1,
300 .s_semid = -1,
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200301 .shm_size = ((CONFIG_FEATURE_IPC_SYSLOG_BUFFER_SIZE)*1024), /* default shm size */
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000302 .SMwup = { {1, -1, IPC_NOWAIT} },
303 .SMwdn = { {0, 0}, {1, 0}, {1, +1} },
304#endif
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000305};
306
307#define G (*ptr_to_globals)
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000308#define INIT_G() do { \
Denis Vlasenko574f2f42008-02-27 18:41:59 +0000309 SET_PTR_TO_GLOBALS(memcpy(xzalloc(sizeof(G)), &init_data, sizeof(init_data))); \
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000310} while (0)
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000311
312
Denis Vlasenkoa0e2a0a2007-01-04 21:22:11 +0000313/* Options */
Denis Vlasenko14c19402006-09-30 19:20:00 +0000314enum {
315 OPTBIT_mark = 0, // -m
316 OPTBIT_nofork, // -n
317 OPTBIT_outfile, // -O
318 OPTBIT_loglevel, // -l
319 OPTBIT_small, // -S
Peter Korsgaard9d539f92018-08-09 11:25:22 +0200320 OPTBIT_timestamp, // -t
Denis Vlasenko5e34ff22009-04-21 11:09:40 +0000321 IF_FEATURE_ROTATE_LOGFILE(OPTBIT_filesize ,) // -s
322 IF_FEATURE_ROTATE_LOGFILE(OPTBIT_rotatecnt ,) // -b
323 IF_FEATURE_REMOTE_LOG( OPTBIT_remotelog ,) // -R
324 IF_FEATURE_REMOTE_LOG( OPTBIT_locallog ,) // -L
325 IF_FEATURE_IPC_SYSLOG( OPTBIT_circularlog,) // -C
326 IF_FEATURE_SYSLOGD_DUP( OPTBIT_dup ,) // -D
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200327 IF_FEATURE_SYSLOGD_CFG( OPTBIT_cfg ,) // -f
Peter Korsgaardcd776cf2013-01-06 00:07:19 +0100328 IF_FEATURE_KMSG_SYSLOG( OPTBIT_kmsg ,) // -K
Denis Vlasenko14c19402006-09-30 19:20:00 +0000329
330 OPT_mark = 1 << OPTBIT_mark ,
331 OPT_nofork = 1 << OPTBIT_nofork ,
332 OPT_outfile = 1 << OPTBIT_outfile ,
333 OPT_loglevel = 1 << OPTBIT_loglevel,
334 OPT_small = 1 << OPTBIT_small ,
Peter Korsgaard9d539f92018-08-09 11:25:22 +0200335 OPT_timestamp = 1 << OPTBIT_timestamp,
Denis Vlasenko5e34ff22009-04-21 11:09:40 +0000336 OPT_filesize = IF_FEATURE_ROTATE_LOGFILE((1 << OPTBIT_filesize )) + 0,
337 OPT_rotatecnt = IF_FEATURE_ROTATE_LOGFILE((1 << OPTBIT_rotatecnt )) + 0,
338 OPT_remotelog = IF_FEATURE_REMOTE_LOG( (1 << OPTBIT_remotelog )) + 0,
339 OPT_locallog = IF_FEATURE_REMOTE_LOG( (1 << OPTBIT_locallog )) + 0,
340 OPT_circularlog = IF_FEATURE_IPC_SYSLOG( (1 << OPTBIT_circularlog)) + 0,
341 OPT_dup = IF_FEATURE_SYSLOGD_DUP( (1 << OPTBIT_dup )) + 0,
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200342 OPT_cfg = IF_FEATURE_SYSLOGD_CFG( (1 << OPTBIT_cfg )) + 0,
Peter Korsgaardcd776cf2013-01-06 00:07:19 +0100343 OPT_kmsg = IF_FEATURE_KMSG_SYSLOG( (1 << OPTBIT_kmsg )) + 0,
Denis Vlasenko14c19402006-09-30 19:20:00 +0000344};
Peter Korsgaard9d539f92018-08-09 11:25:22 +0200345#define OPTION_STR "m:nO:l:St" \
Denis Vlasenko5e34ff22009-04-21 11:09:40 +0000346 IF_FEATURE_ROTATE_LOGFILE("s:" ) \
347 IF_FEATURE_ROTATE_LOGFILE("b:" ) \
Denys Vlasenko237bedd2016-07-06 21:58:02 +0200348 IF_FEATURE_REMOTE_LOG( "R:*") \
Denis Vlasenko5e34ff22009-04-21 11:09:40 +0000349 IF_FEATURE_REMOTE_LOG( "L" ) \
350 IF_FEATURE_IPC_SYSLOG( "C::") \
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200351 IF_FEATURE_SYSLOGD_DUP( "D" ) \
Peter Korsgaardcd776cf2013-01-06 00:07:19 +0100352 IF_FEATURE_SYSLOGD_CFG( "f:" ) \
353 IF_FEATURE_KMSG_SYSLOG( "K" )
Denis Vlasenko14c19402006-09-30 19:20:00 +0000354#define OPTION_DECL *opt_m, *opt_l \
Denis Vlasenko5e34ff22009-04-21 11:09:40 +0000355 IF_FEATURE_ROTATE_LOGFILE(,*opt_s) \
356 IF_FEATURE_ROTATE_LOGFILE(,*opt_b) \
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200357 IF_FEATURE_IPC_SYSLOG( ,*opt_C = NULL) \
358 IF_FEATURE_SYSLOGD_CFG( ,*opt_f = NULL)
359#define OPTION_PARAM &opt_m, &(G.logFile.path), &opt_l \
Denis Vlasenko5e34ff22009-04-21 11:09:40 +0000360 IF_FEATURE_ROTATE_LOGFILE(,&opt_s) \
361 IF_FEATURE_ROTATE_LOGFILE(,&opt_b) \
Denys Vlasenko69675782013-01-14 01:34:48 +0100362 IF_FEATURE_REMOTE_LOG( ,&remoteAddrList) \
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200363 IF_FEATURE_IPC_SYSLOG( ,&opt_C) \
364 IF_FEATURE_SYSLOGD_CFG( ,&opt_f)
Eric Andersen871d93c2002-09-17 20:06:29 +0000365
Eric Andersen871d93c2002-09-17 20:06:29 +0000366
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200367#if ENABLE_FEATURE_SYSLOGD_CFG
368static const CODE* find_by_name(char *name, const CODE* c_set)
369{
370 for (; c_set->c_name; c_set++) {
371 if (strcmp(name, c_set->c_name) == 0)
372 return c_set;
373 }
374 return NULL;
375}
376#endif
377static const CODE* find_by_val(int val, const CODE* c_set)
378{
379 for (; c_set->c_name; c_set++) {
380 if (c_set->c_val == val)
381 return c_set;
382 }
383 return NULL;
384}
385
386#if ENABLE_FEATURE_SYSLOGD_CFG
387static void parse_syslogdcfg(const char *file)
388{
389 char *t;
390 logRule_t **pp_rule;
391 /* tok[0] set of selectors */
392 /* tok[1] file name */
393 /* tok[2] has to be NULL */
394 char *tok[3];
395 parser_t *parser;
396
397 parser = config_open2(file ? file : "/etc/syslog.conf",
Denys Vlasenko514cbfc2011-09-16 13:28:52 +0200398 file ? xfopen_for_read : fopen_for_read);
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200399 if (!parser)
400 /* didn't find default /etc/syslog.conf */
401 /* proceed as if we built busybox without config support */
402 return;
403
404 /* use ptr to ptr to avoid checking whether head was initialized */
405 pp_rule = &G.log_rules;
406 /* iterate through lines of config, skipping comments */
407 while (config_read(parser, tok, 3, 2, "# \t", PARSE_NORMAL | PARSE_MIN_DIE)) {
408 char *cur_selector;
409 logRule_t *cur_rule;
410
411 /* unexpected trailing token? */
Denys Vlasenko0288b272011-04-16 20:15:14 +0200412 if (tok[2])
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200413 goto cfgerr;
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200414
415 cur_rule = *pp_rule = xzalloc(sizeof(*cur_rule));
416
417 cur_selector = tok[0];
418 /* iterate through selectors: "kern.info;kern.!err;..." */
419 do {
420 const CODE *code;
421 char *next_selector;
422 uint8_t negated_prio; /* "kern.!err" */
423 uint8_t single_prio; /* "kern.=err" */
424 uint32_t facmap; /* bitmap of enabled facilities */
425 uint8_t primap; /* bitmap of enabled priorities */
426 unsigned i;
427
428 next_selector = strchr(cur_selector, ';');
429 if (next_selector)
430 *next_selector++ = '\0';
431
432 t = strchr(cur_selector, '.');
Denys Vlasenko0288b272011-04-16 20:15:14 +0200433 if (!t)
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200434 goto cfgerr;
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200435 *t++ = '\0'; /* separate facility from priority */
436
437 negated_prio = 0;
438 single_prio = 0;
439 if (*t == '!') {
440 negated_prio = 1;
441 ++t;
442 }
443 if (*t == '=') {
444 single_prio = 1;
445 ++t;
446 }
447
448 /* parse priority */
449 if (*t == '*')
450 primap = 0xff; /* all 8 log levels enabled */
451 else {
452 uint8_t priority;
Denys Vlasenkocf686ae2017-08-16 15:05:36 +0200453 code = find_by_name(t, bb_prioritynames);
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200454 if (!code)
455 goto cfgerr;
456 primap = 0;
457 priority = code->c_val;
458 if (priority == INTERNAL_NOPRI) {
459 /* ensure we take "enabled_facility_priomap[fac] &= 0" branch below */
460 negated_prio = 1;
461 } else {
462 priority = 1 << priority;
463 do {
464 primap |= priority;
465 if (single_prio)
466 break;
467 priority >>= 1;
468 } while (priority);
469 if (negated_prio)
470 primap = ~primap;
471 }
472 }
473
474 /* parse facility */
475 if (*cur_selector == '*')
476 facmap = (1<<LOG_NFACILITIES) - 1;
477 else {
478 char *next_facility;
479 facmap = 0;
480 t = cur_selector;
481 /* iterate through facilities: "kern,daemon.<priospec>" */
482 do {
483 next_facility = strchr(t, ',');
484 if (next_facility)
485 *next_facility++ = '\0';
Denys Vlasenkocf686ae2017-08-16 15:05:36 +0200486 code = find_by_name(t, bb_facilitynames);
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200487 if (!code)
488 goto cfgerr;
489 /* "mark" is not a real facility, skip it */
490 if (code->c_val != INTERNAL_MARK)
491 facmap |= 1<<(LOG_FAC(code->c_val));
492 t = next_facility;
493 } while (t);
494 }
495
496 /* merge result with previous selectors */
497 for (i = 0; i < LOG_NFACILITIES; ++i) {
498 if (!(facmap & (1<<i)))
499 continue;
500 if (negated_prio)
501 cur_rule->enabled_facility_priomap[i] &= primap;
502 else
503 cur_rule->enabled_facility_priomap[i] |= primap;
504 }
505
506 cur_selector = next_selector;
507 } while (cur_selector);
508
Sergey Naumove9c8bed2011-04-16 19:36:15 +0200509 /* check whether current file name was mentioned in previous rules or
510 * as global logfile (G.logFile).
511 */
512 if (strcmp(G.logFile.path, tok[1]) == 0) {
513 cur_rule->file = &G.logFile;
514 goto found;
515 }
516 /* temporarily use cur_rule as iterator, but *pp_rule still points
517 * to currently processing rule entry.
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200518 * NOTE: *pp_rule points to the current (and last in the list) rule.
519 */
520 for (cur_rule = G.log_rules; cur_rule != *pp_rule; cur_rule = cur_rule->next) {
521 if (strcmp(cur_rule->file->path, tok[1]) == 0) {
522 /* found - reuse the same file structure */
523 (*pp_rule)->file = cur_rule->file;
524 cur_rule = *pp_rule;
525 goto found;
526 }
527 }
528 cur_rule->file = xzalloc(sizeof(*cur_rule->file));
529 cur_rule->file->fd = -1;
530 cur_rule->file->path = xstrdup(tok[1]);
531 found:
532 pp_rule = &cur_rule->next;
533 }
534 config_close(parser);
535 return;
536
537 cfgerr:
Denys Vlasenko81fa9992013-01-20 16:05:41 +0100538 bb_error_msg_and_die("error in '%s' at line %d",
539 file ? file : "/etc/syslog.conf",
540 parser->lineno);
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200541}
542#endif
543
Mark Whitley6317c4b2001-03-12 22:51:50 +0000544/* circular buffer variables/structures */
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000545#if ENABLE_FEATURE_IPC_SYSLOG
546
Eric Andersend4a5e252003-12-19 11:32:14 +0000547#if CONFIG_FEATURE_IPC_SYSLOG_BUFFER_SIZE < 4
548#error Sorry, you must set the syslogd buffer size to at least 4KB.
549#error Please check CONFIG_FEATURE_IPC_SYSLOG_BUFFER_SIZE
550#endif
551
Denis Vlasenkobd1aeeb2008-06-11 15:43:19 +0000552/* our shared key (syslogd.c and logread.c must be in sync) */
553enum { KEY_ID = 0x414e4547 }; /* "GENA" */
Mark Whitley6317c4b2001-03-12 22:51:50 +0000554
"Vladimir N. Oleynik"e4baaa22005-09-22 12:59:26 +0000555static void ipcsyslog_cleanup(void)
Glenn L McGrath912d8f42002-11-10 22:46:45 +0000556{
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000557 if (G.shmid != -1) {
558 shmdt(G.shbuf);
Glenn L McGrath912d8f42002-11-10 22:46:45 +0000559 }
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000560 if (G.shmid != -1) {
561 shmctl(G.shmid, IPC_RMID, NULL);
Glenn L McGrath912d8f42002-11-10 22:46:45 +0000562 }
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000563 if (G.s_semid != -1) {
564 semctl(G.s_semid, 0, IPC_RMID, 0);
Glenn L McGrath912d8f42002-11-10 22:46:45 +0000565 }
Mark Whitley6317c4b2001-03-12 22:51:50 +0000566}
567
"Vladimir N. Oleynik"e4baaa22005-09-22 12:59:26 +0000568static void ipcsyslog_init(void)
Glenn L McGrath912d8f42002-11-10 22:46:45 +0000569{
Denis Vlasenkoa9b60e92007-01-04 17:59:59 +0000570 if (DEBUG)
Denis Vlasenkobd1aeeb2008-06-11 15:43:19 +0000571 printf("shmget(%x, %d,...)\n", (int)KEY_ID, G.shm_size);
Denis Vlasenkoa9b60e92007-01-04 17:59:59 +0000572
Denis Vlasenkoa1120a82007-08-14 10:27:56 +0000573 G.shmid = shmget(KEY_ID, G.shm_size, IPC_CREAT | 0644);
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000574 if (G.shmid == -1) {
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000575 bb_perror_msg_and_die("shmget");
576 }
Mark Whitley6317c4b2001-03-12 22:51:50 +0000577
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000578 G.shbuf = shmat(G.shmid, NULL, 0);
Denis Vlasenko4e9ca752008-01-07 15:58:02 +0000579 if (G.shbuf == (void*) -1L) { /* shmat has bizarre error return */
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000580 bb_perror_msg_and_die("shmat");
581 }
Mark Whitley6317c4b2001-03-12 22:51:50 +0000582
Denis Vlasenko5f1b1492007-08-12 21:33:06 +0000583 memset(G.shbuf, 0, G.shm_size);
584 G.shbuf->size = G.shm_size - offsetof(struct shbuf_ds, data) - 1;
585 /*G.shbuf->tail = 0;*/
Mark Whitley6317c4b2001-03-12 22:51:50 +0000586
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200587 /* we'll trust the OS to set initial semval to 0 (let's hope) */
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000588 G.s_semid = semget(KEY_ID, 2, IPC_CREAT | IPC_EXCL | 1023);
589 if (G.s_semid == -1) {
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000590 if (errno == EEXIST) {
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000591 G.s_semid = semget(KEY_ID, 2, 0);
592 if (G.s_semid != -1)
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000593 return;
Glenn L McGrath912d8f42002-11-10 22:46:45 +0000594 }
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000595 bb_perror_msg_and_die("semget");
Mark Whitley6317c4b2001-03-12 22:51:50 +0000596 }
597}
598
Denis Vlasenkoa0e2a0a2007-01-04 21:22:11 +0000599/* Write message to shared mem buffer */
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200600static void log_to_shmem(const char *msg)
Glenn L McGrath912d8f42002-11-10 22:46:45 +0000601{
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000602 int old_tail, new_tail;
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200603 int len;
Mark Whitley6317c4b2001-03-12 22:51:50 +0000604
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000605 if (semop(G.s_semid, G.SMwdn, 3) == -1) {
Bernhard Reutner-Fischerd591a362006-08-20 17:35:13 +0000606 bb_perror_msg_and_die("SMwdn");
607 }
Mark Whitley6317c4b2001-03-12 22:51:50 +0000608
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000609 /* Circular Buffer Algorithm:
Mark Whitley6317c4b2001-03-12 22:51:50 +0000610 * --------------------------
Denis Vlasenko150f4022007-01-13 21:06:21 +0000611 * tail == position where to store next syslog message.
Denis Vlasenko5f1b1492007-08-12 21:33:06 +0000612 * tail's max value is (shbuf->size - 1)
613 * Last byte of buffer is never used and remains NUL.
Mark Whitley6317c4b2001-03-12 22:51:50 +0000614 */
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200615 len = strlen(msg) + 1; /* length with NUL included */
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000616 again:
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000617 old_tail = G.shbuf->tail;
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000618 new_tail = old_tail + len;
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000619 if (new_tail < G.shbuf->size) {
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000620 /* store message, set new tail */
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000621 memcpy(G.shbuf->data + old_tail, msg, len);
622 G.shbuf->tail = new_tail;
Glenn L McGrath912d8f42002-11-10 22:46:45 +0000623 } else {
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000624 /* k == available buffer space ahead of old tail */
Denis Vlasenko5f1b1492007-08-12 21:33:06 +0000625 int k = G.shbuf->size - old_tail;
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000626 /* copy what fits to the end of buffer, and repeat */
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000627 memcpy(G.shbuf->data + old_tail, msg, k);
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000628 msg += k;
629 len -= k;
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000630 G.shbuf->tail = 0;
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000631 goto again;
Mark Whitley6317c4b2001-03-12 22:51:50 +0000632 }
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000633 if (semop(G.s_semid, G.SMwup, 1) == -1) {
Bernhard Reutner-Fischerd591a362006-08-20 17:35:13 +0000634 bb_perror_msg_and_die("SMwup");
635 }
Denis Vlasenkoa9b60e92007-01-04 17:59:59 +0000636 if (DEBUG)
Denis Vlasenko5f1b1492007-08-12 21:33:06 +0000637 printf("tail:%d\n", G.shbuf->tail);
Mark Whitley6317c4b2001-03-12 22:51:50 +0000638}
Rob Landley028ba282006-08-28 20:16:42 +0000639#else
Peter Korsgaard99807072013-01-06 13:11:04 +0100640static void ipcsyslog_cleanup(void) {}
641static void ipcsyslog_init(void) {}
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000642void log_to_shmem(const char *msg);
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000643#endif /* FEATURE_IPC_SYSLOG */
644
Peter Korsgaardcd776cf2013-01-06 00:07:19 +0100645#if ENABLE_FEATURE_KMSG_SYSLOG
646static void kmsg_init(void)
647{
648 G.kmsgfd = xopen("/dev/kmsg", O_WRONLY);
649
650 /*
651 * kernel < 3.5 expects single char printk KERN_* priority prefix,
652 * from 3.5 onwards the full syslog facility/priority format is supported
653 */
654 if (get_linux_version_code() < KERNEL_VERSION(3,5,0))
655 G.primask = LOG_PRIMASK;
656 else
657 G.primask = -1;
658}
659
660static void kmsg_cleanup(void)
661{
662 if (ENABLE_FEATURE_CLEAN_UP)
663 close(G.kmsgfd);
664}
665
666/* Write message to /dev/kmsg */
667static void log_to_kmsg(int pri, const char *msg)
668{
669 /*
670 * kernel < 3.5 expects single char printk KERN_* priority prefix,
671 * from 3.5 onwards the full syslog facility/priority format is supported
672 */
673 pri &= G.primask;
674
Joshua Judson Rosene46047a2014-07-02 19:41:41 +0200675 full_write(G.kmsgfd, G.printbuf, sprintf(G.printbuf, "<%d>%s\n", pri, msg));
Peter Korsgaardcd776cf2013-01-06 00:07:19 +0100676}
677#else
Peter Korsgaard99807072013-01-06 13:11:04 +0100678static void kmsg_init(void) {}
679static void kmsg_cleanup(void) {}
680static void log_to_kmsg(int pri UNUSED_PARAM, const char *msg UNUSED_PARAM) {}
Peter Korsgaardcd776cf2013-01-06 00:07:19 +0100681#endif /* FEATURE_KMSG_SYSLOG */
682
Erik Andersen983b51b2000-04-04 18:14:25 +0000683/* Print a message to the log file. */
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200684static void log_locally(time_t now, char *msg, logFile_t *log_file)
Eric Andersen3843e961999-11-25 07:30:46 +0000685{
Denis Vlasenko0d948202008-12-09 22:53:31 +0000686#ifdef SYSLOGD_WRLOCK
Denis Vlasenkob8934972007-01-04 18:02:32 +0000687 struct flock fl;
Denis Vlasenko0d948202008-12-09 22:53:31 +0000688#endif
Denis Vlasenkob8934972007-01-04 18:02:32 +0000689 int len = strlen(msg);
Eric Andersen3843e961999-11-25 07:30:46 +0000690
Denys Vlasenkoa28c1b22014-07-02 15:21:30 +0200691 /* fd can't be 0 (we connect fd 0 to /dev/log socket) */
692 /* fd is 1 if "-O -" is in use */
693 if (log_file->fd > 1) {
Joshua Judson Rosenae57fca2014-07-03 14:51:47 +0200694 /* Reopen log files every second. This allows admin
695 * to delete the files and not worry about restarting us.
Denis Vlasenkod9415d62009-03-02 14:26:28 +0000696 * This costs almost nothing since it happens
Joshua Judson Rosenae57fca2014-07-03 14:51:47 +0200697 * _at most_ once a second for each file, and happens
698 * only when each file is actually written.
Denis Vlasenkod9415d62009-03-02 14:26:28 +0000699 */
Denis Vlasenko4dada742008-01-03 12:13:42 +0000700 if (!now)
701 now = time(NULL);
Joshua Judson Rosenae57fca2014-07-03 14:51:47 +0200702 if (log_file->last_log_time != now) {
703 log_file->last_log_time = now;
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200704 close(log_file->fd);
Denis Vlasenkob8934972007-01-04 18:02:32 +0000705 goto reopen;
706 }
Denys Vlasenkoa28c1b22014-07-02 15:21:30 +0200707 }
708 else if (log_file->fd == 1) {
709 /* We are logging to stdout: do nothing */
710 }
711 else {
712 if (LONE_DASH(log_file->path)) {
713 log_file->fd = 1;
714 /* log_file->isRegular = 0; - already is */
715 } else {
Denis Vlasenkob8934972007-01-04 18:02:32 +0000716 reopen:
Denys Vlasenkoa28c1b22014-07-02 15:21:30 +0200717 log_file->fd = open(log_file->path, O_WRONLY | O_CREAT
Denis Vlasenkod9415d62009-03-02 14:26:28 +0000718 | O_NOCTTY | O_APPEND | O_NONBLOCK,
719 0666);
Denys Vlasenkoa28c1b22014-07-02 15:21:30 +0200720 if (log_file->fd < 0) {
721 /* cannot open logfile? - print to /dev/console then */
722 int fd = device_open(DEV_CONSOLE, O_WRONLY | O_NOCTTY | O_NONBLOCK);
723 if (fd < 0)
724 fd = 2; /* then stderr, dammit */
725 full_write(fd, msg, len);
726 if (fd != 2)
727 close(fd);
728 return;
729 }
Denis Vlasenkob8934972007-01-04 18:02:32 +0000730#if ENABLE_FEATURE_ROTATE_LOGFILE
Denys Vlasenkoa28c1b22014-07-02 15:21:30 +0200731 {
732 struct stat statf;
733 log_file->isRegular = (fstat(log_file->fd, &statf) == 0 && S_ISREG(statf.st_mode));
734 /* bug (mostly harmless): can wrap around if file > 4gb */
735 log_file->size = statf.st_size;
736 }
Denis Vlasenkob8934972007-01-04 18:02:32 +0000737#endif
Denys Vlasenkoa28c1b22014-07-02 15:21:30 +0200738 }
Denis Vlasenkob8934972007-01-04 18:02:32 +0000739 }
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000740
Denis Vlasenko0d948202008-12-09 22:53:31 +0000741#ifdef SYSLOGD_WRLOCK
Denis Vlasenkob8934972007-01-04 18:02:32 +0000742 fl.l_whence = SEEK_SET;
743 fl.l_start = 0;
744 fl.l_len = 1;
745 fl.l_type = F_WRLCK;
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200746 fcntl(log_file->fd, F_SETLKW, &fl);
Denis Vlasenko0d948202008-12-09 22:53:31 +0000747#endif
Bernhard Reutner-Fischerd591a362006-08-20 17:35:13 +0000748
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000749#if ENABLE_FEATURE_ROTATE_LOGFILE
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200750 if (G.logFileSize && log_file->isRegular && log_file->size > G.logFileSize) {
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000751 if (G.logFileRotate) { /* always 0..99 */
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200752 int i = strlen(log_file->path) + 3 + 1;
Denis Vlasenkob8934972007-01-04 18:02:32 +0000753 char oldFile[i];
754 char newFile[i];
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000755 i = G.logFileRotate - 1;
Denis Vlasenkob8934972007-01-04 18:02:32 +0000756 /* rename: f.8 -> f.9; f.7 -> f.8; ... */
757 while (1) {
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200758 sprintf(newFile, "%s.%d", log_file->path, i);
Denis Vlasenkob8934972007-01-04 18:02:32 +0000759 if (i == 0) break;
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200760 sprintf(oldFile, "%s.%d", log_file->path, --i);
Denis Vlasenko69dc3252008-05-24 21:03:53 +0000761 /* ignore errors - file might be missing */
762 rename(oldFile, newFile);
Eric Andersen29c77f72003-10-09 09:43:18 +0000763 }
Denis Vlasenkob8934972007-01-04 18:02:32 +0000764 /* newFile == "f.0" now */
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200765 rename(log_file->path, newFile);
Eric Andersen29c77f72003-10-09 09:43:18 +0000766 }
Joshua Judson Rosen1b90e032014-05-20 01:02:18 -0400767
Joshua Judson Rosen9aa6ffb2014-05-20 01:02:20 -0400768 /* We may or may not have just renamed the file away;
769 * if we didn't rename because we aren't keeping any backlog,
770 * then it's time to clobber the file. If we did rename it...,
771 * incredibly, if F and F.0 are hardlinks, POSIX _demands_
772 * that rename returns 0 but does not remove F!!!
773 * (hardlinked F/F.0 pair was observed after
774 * power failure during rename()).
775 * So ensure old file is gone in any case:
Joshua Judson Rosen1b90e032014-05-20 01:02:18 -0400776 */
Joshua Judson Rosen9aa6ffb2014-05-20 01:02:20 -0400777 unlink(log_file->path);
Joshua Judson Rosenb905d6c2014-05-20 01:02:19 -0400778#ifdef SYSLOGD_WRLOCK
779 fl.l_type = F_UNLCK;
780 fcntl(log_file->fd, F_SETLKW, &fl);
781#endif
Joshua Judson Rosen9aa6ffb2014-05-20 01:02:20 -0400782 close(log_file->fd);
783 goto reopen;
Eric Andersen3843e961999-11-25 07:30:46 +0000784 }
Joshua Judson Rosene46047a2014-07-02 19:41:41 +0200785/* TODO: what to do on write errors ("disk full")? */
786 len = full_write(log_file->fd, msg, len);
787 if (len > 0)
788 log_file->size += len;
789#else
790 full_write(log_file->fd, msg, len);
Denis Vlasenkob8934972007-01-04 18:02:32 +0000791#endif
Joshua Judson Rosene46047a2014-07-02 19:41:41 +0200792
Denis Vlasenko0d948202008-12-09 22:53:31 +0000793#ifdef SYSLOGD_WRLOCK
Denis Vlasenkob8934972007-01-04 18:02:32 +0000794 fl.l_type = F_UNLCK;
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200795 fcntl(log_file->fd, F_SETLKW, &fl);
Denis Vlasenko0d948202008-12-09 22:53:31 +0000796#endif
Eric Andersenb99df0f1999-11-24 09:04:33 +0000797}
798
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000799static void parse_fac_prio_20(int pri, char *res20)
Eric Andersen3843e961999-11-25 07:30:46 +0000800{
Denis Vlasenko3c8b5ba2007-06-04 18:23:59 +0000801 const CODE *c_pri, *c_fac;
Eric Andersenb99df0f1999-11-24 09:04:33 +0000802
Denys Vlasenkocf686ae2017-08-16 15:05:36 +0200803 c_fac = find_by_val(LOG_FAC(pri) << 3, bb_facilitynames);
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200804 if (c_fac) {
Denys Vlasenkocf686ae2017-08-16 15:05:36 +0200805 c_pri = find_by_val(LOG_PRI(pri), bb_prioritynames);
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200806 if (c_pri) {
807 snprintf(res20, 20, "%s.%s", c_fac->c_name, c_pri->c_name);
808 return;
Glenn L McGrath912d8f42002-11-10 22:46:45 +0000809 }
Erik Andersen9ffdaa62000-02-11 21:55:04 +0000810 }
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200811 snprintf(res20, 20, "<%d>", pri);
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000812}
Eric Andersen3843e961999-11-25 07:30:46 +0000813
Denis Vlasenkoa0e2a0a2007-01-04 21:22:11 +0000814/* len parameter is used only for "is there a timestamp?" check.
Denis Vlasenko018b1552007-11-06 01:38:46 +0000815 * NB: some callers cheat and supply len==0 when they know
816 * that there is no timestamp, short-circuiting the test. */
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000817static void timestamp_and_log(int pri, char *msg, int len)
818{
Peter Korsgaard9d539f92018-08-09 11:25:22 +0200819 char *timestamp = NULL;
Denis Vlasenko4dada742008-01-03 12:13:42 +0000820 time_t now;
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000821
Denis Vlasenko574c3162009-04-22 02:53:02 +0000822 /* Jan 18 00:11:22 msg... */
823 /* 01234567890123456 */
Peter Korsgaard9d539f92018-08-09 11:25:22 +0200824 if (len >= 16 && msg[3] == ' ' && msg[6] == ' '
825 && msg[9] == ':' && msg[12] == ':' && msg[15] == ' '
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000826 ) {
Peter Korsgaard9d539f92018-08-09 11:25:22 +0200827 if (!(option_mask32 & OPT_timestamp)) {
828 /* use message timestamp */
829 timestamp = msg;
830 now = 0;
831 }
Erik Andersene49d5ec2000-02-08 19:58:47 +0000832 msg += 16;
833 }
Peter Korsgaard9d539f92018-08-09 11:25:22 +0200834
835 if (!timestamp) {
836 time(&now);
837 timestamp = ctime(&now) + 4; /* skip day of week */
838 }
839
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000840 timestamp[15] = '\0';
Eric Andersen3843e961999-11-25 07:30:46 +0000841
Peter Korsgaard99807072013-01-06 13:11:04 +0100842 if (option_mask32 & OPT_kmsg) {
Peter Korsgaardcd776cf2013-01-06 00:07:19 +0100843 log_to_kmsg(pri, msg);
844 return;
845 }
846
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000847 if (option_mask32 & OPT_small)
848 sprintf(G.printbuf, "%s %s\n", timestamp, msg);
849 else {
850 char res[20];
851 parse_fac_prio_20(pri, res);
Denis Vlasenko6f1713f2008-02-25 23:23:58 +0000852 sprintf(G.printbuf, "%s %.64s %s %s\n", timestamp, G.hostname, res, msg);
Eric Andersenbf2b8ae2000-12-08 19:52:01 +0000853 }
Denis Vlasenko4dada742008-01-03 12:13:42 +0000854
855 /* Log message locally (to file or shared mem) */
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200856#if ENABLE_FEATURE_SYSLOGD_CFG
857 {
858 bool match = 0;
859 logRule_t *rule;
860 uint8_t facility = LOG_FAC(pri);
861 uint8_t prio_bit = 1 << LOG_PRI(pri);
862
863 for (rule = G.log_rules; rule; rule = rule->next) {
864 if (rule->enabled_facility_priomap[facility] & prio_bit) {
865 log_locally(now, G.printbuf, rule->file);
866 match = 1;
867 }
868 }
869 if (match)
870 return;
871 }
872#endif
873 if (LOG_PRI(pri) < G.logLevel) {
874#if ENABLE_FEATURE_IPC_SYSLOG
875 if ((option_mask32 & OPT_circularlog) && G.shbuf) {
Denys Vlasenko514cbfc2011-09-16 13:28:52 +0200876 log_to_shmem(G.printbuf);
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200877 return;
878 }
879#endif
880 log_locally(now, G.printbuf, &G.logFile);
881 }
Denis Vlasenko4dada742008-01-03 12:13:42 +0000882}
883
884static void timestamp_and_log_internal(const char *msg)
885{
Denis Vlasenko0d948202008-12-09 22:53:31 +0000886 /* -L, or no -R */
Denis Vlasenko4dada742008-01-03 12:13:42 +0000887 if (ENABLE_FEATURE_REMOTE_LOG && !(option_mask32 & OPT_locallog))
888 return;
889 timestamp_and_log(LOG_SYSLOG | LOG_INFO, (char*)msg, 0);
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000890}
Glenn L McGrath73ebb882004-09-14 18:12:13 +0000891
Denis Vlasenko75cddd82008-02-13 09:19:14 +0000892/* tmpbuf[len] is a NUL byte (set by caller), but there can be other,
893 * embedded NULs. Split messages on each of these NULs, parse prio,
894 * escape control chars and log each locally. */
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000895static void split_escape_and_log(char *tmpbuf, int len)
896{
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000897 char *p = tmpbuf;
898
899 tmpbuf += len;
900 while (p < tmpbuf) {
901 char c;
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000902 char *q = G.parsebuf;
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000903 int pri = (LOG_USER | LOG_NOTICE);
904
905 if (*p == '<') {
Denis Vlasenkoa0e2a0a2007-01-04 21:22:11 +0000906 /* Parse the magic priority number */
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000907 pri = bb_strtou(p + 1, &p, 10);
Denis Vlasenko018b1552007-11-06 01:38:46 +0000908 if (*p == '>')
909 p++;
910 if (pri & ~(LOG_FACMASK | LOG_PRIMASK))
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000911 pri = (LOG_USER | LOG_NOTICE);
Denis Vlasenko1decd0e2006-09-30 19:17:40 +0000912 }
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000913
914 while ((c = *p++)) {
915 if (c == '\n')
916 c = ' ';
Denis Vlasenko2ee028d2007-06-21 13:44:53 +0000917 if (!(c & ~0x1f) && c != '\t') {
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000918 *q++ = '^';
919 c += '@'; /* ^@, ^A, ^B... */
920 }
921 *q++ = c;
922 }
923 *q = '\0';
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000924
Denis Vlasenkoa0e2a0a2007-01-04 21:22:11 +0000925 /* Now log it */
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200926 timestamp_and_log(pri, G.parsebuf, q - G.parsebuf);
Eric Andersen7f94a5c2004-06-22 10:12:59 +0000927 }
Eric Andersen3843e961999-11-25 07:30:46 +0000928}
929
Denis Vlasenko4998c812007-02-14 20:51:46 +0000930#ifdef SYSLOGD_MARK
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000931static void do_mark(int sig)
Eric Andersen3843e961999-11-25 07:30:46 +0000932{
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000933 if (G.markInterval) {
Denis Vlasenko4dada742008-01-03 12:13:42 +0000934 timestamp_and_log_internal("-- MARK --");
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000935 alarm(G.markInterval);
Erik Andersene49d5ec2000-02-08 19:58:47 +0000936 }
Eric Andersen3843e961999-11-25 07:30:46 +0000937}
Denis Vlasenko4998c812007-02-14 20:51:46 +0000938#endif
Eric Andersen3843e961999-11-25 07:30:46 +0000939
Denis Vlasenkod031b202007-11-10 01:28:19 +0000940/* Don't inline: prevent struct sockaddr_un to take up space on stack
941 * permanently */
942static NOINLINE int create_socket(void)
Eric Andersen3843e961999-11-25 07:30:46 +0000943{
Erik Andersene49d5ec2000-02-08 19:58:47 +0000944 struct sockaddr_un sunx;
Denis Vlasenkod7ecd862007-09-07 13:53:32 +0000945 int sock_fd;
Denis Vlasenko6ca04442007-02-11 16:19:28 +0000946 char *dev_log_name;
Erik Andersenf13df372000-04-18 23:51:51 +0000947
Denis Vlasenkod031b202007-11-10 01:28:19 +0000948 memset(&sunx, 0, sizeof(sunx));
949 sunx.sun_family = AF_UNIX;
950
951 /* Unlink old /dev/log or object it points to. */
952 /* (if it exists, bind will fail) */
Cédric Cabessaadc30b42013-08-05 02:09:16 +0200953 strcpy(sunx.sun_path, _PATH_LOG);
954 dev_log_name = xmalloc_follow_symlinks(_PATH_LOG);
Denis Vlasenkod031b202007-11-10 01:28:19 +0000955 if (dev_log_name) {
956 safe_strncpy(sunx.sun_path, dev_log_name, sizeof(sunx.sun_path));
957 free(dev_log_name);
958 }
959 unlink(sunx.sun_path);
960
961 sock_fd = xsocket(AF_UNIX, SOCK_DGRAM, 0);
962 xbind(sock_fd, (struct sockaddr *) &sunx, sizeof(sunx));
Cédric Cabessaadc30b42013-08-05 02:09:16 +0200963 chmod(_PATH_LOG, 0666);
Denis Vlasenkod031b202007-11-10 01:28:19 +0000964
965 return sock_fd;
966}
967
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000968#if ENABLE_FEATURE_REMOTE_LOG
Thomas Geuligd2f77792010-02-28 13:01:59 +0100969static int try_to_resolve_remote(remoteHost_t *rh)
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000970{
Thomas Geuligd2f77792010-02-28 13:01:59 +0100971 if (!rh->remoteAddr) {
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000972 unsigned now = monotonic_sec();
973
974 /* Don't resolve name too often - DNS timeouts can be big */
Thomas Geuligd2f77792010-02-28 13:01:59 +0100975 if ((now - rh->last_dns_resolve) < DNS_WAIT_SEC)
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000976 return -1;
Thomas Geuligd2f77792010-02-28 13:01:59 +0100977 rh->last_dns_resolve = now;
978 rh->remoteAddr = host2sockaddr(rh->remoteHostname, 514);
979 if (!rh->remoteAddr)
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000980 return -1;
981 }
Daniel Dickinsone74d7982010-08-03 04:26:20 +0200982 return xsocket(rh->remoteAddr->u.sa.sa_family, SOCK_DGRAM, 0);
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000983}
984#endif
985
Denis Vlasenkoa60f84e2008-07-05 09:18:54 +0000986static void do_syslogd(void) NORETURN;
Denis Vlasenkod031b202007-11-10 01:28:19 +0000987static void do_syslogd(void)
988{
Thomas Geuligd2f77792010-02-28 13:01:59 +0100989#if ENABLE_FEATURE_REMOTE_LOG
990 llist_t *item;
991#endif
Denis Vlasenkobe048f22008-02-26 20:13:52 +0000992#if ENABLE_FEATURE_SYSLOGD_DUP
993 int last_sz = -1;
994 char *last_buf;
995 char *recvbuf = G.recvbuf;
996#else
997#define recvbuf (G.recvbuf)
998#endif
Denis Vlasenkod031b202007-11-10 01:28:19 +0000999
Denis Vlasenko0d948202008-12-09 22:53:31 +00001000 /* Set up signal handlers (so that they interrupt read()) */
1001 signal_no_SA_RESTART_empty_mask(SIGTERM, record_signo);
1002 signal_no_SA_RESTART_empty_mask(SIGINT, record_signo);
1003 //signal_no_SA_RESTART_empty_mask(SIGQUIT, record_signo);
Glenn L McGrath912d8f42002-11-10 22:46:45 +00001004 signal(SIGHUP, SIG_IGN);
Denis Vlasenko4998c812007-02-14 20:51:46 +00001005#ifdef SYSLOGD_MARK
Denis Vlasenkoceab8702007-01-04 17:57:54 +00001006 signal(SIGALRM, do_mark);
Denis Vlasenko5e892ba2007-03-15 19:50:46 +00001007 alarm(G.markInterval);
Denis Vlasenko4998c812007-02-14 20:51:46 +00001008#endif
Denys Vlasenkoa28c1b22014-07-02 15:21:30 +02001009 xmove_fd(create_socket(), STDIN_FILENO);
Eric Andersenb99df0f1999-11-24 09:04:33 +00001010
Peter Korsgaard99807072013-01-06 13:11:04 +01001011 if (option_mask32 & OPT_circularlog)
Glenn L McGrath912d8f42002-11-10 22:46:45 +00001012 ipcsyslog_init();
Eric Andersenea906502001-04-05 20:55:17 +00001013
Peter Korsgaard99807072013-01-06 13:11:04 +01001014 if (option_mask32 & OPT_kmsg)
Peter Korsgaardcd776cf2013-01-06 00:07:19 +01001015 kmsg_init();
1016
Denis Vlasenko4dada742008-01-03 12:13:42 +00001017 timestamp_and_log_internal("syslogd started: BusyBox v" BB_VER);
Erik Andersene49d5ec2000-02-08 19:58:47 +00001018
Denis Vlasenko0d948202008-12-09 22:53:31 +00001019 while (!bb_got_signal) {
Denis Vlasenko6b06cb82008-05-15 21:30:45 +00001020 ssize_t sz;
Denis Vlasenkobe048f22008-02-26 20:13:52 +00001021
1022#if ENABLE_FEATURE_SYSLOGD_DUP
1023 last_buf = recvbuf;
1024 if (recvbuf == G.recvbuf)
1025 recvbuf = G.recvbuf + MAX_READ;
1026 else
1027 recvbuf = G.recvbuf;
1028#endif
Denis Vlasenko018b1552007-11-06 01:38:46 +00001029 read_again:
Denys Vlasenkoa28c1b22014-07-02 15:21:30 +02001030 sz = read(STDIN_FILENO, recvbuf, MAX_READ - 1);
Denis Vlasenko0d948202008-12-09 22:53:31 +00001031 if (sz < 0) {
1032 if (!bb_got_signal)
Cédric Cabessaadc30b42013-08-05 02:09:16 +02001033 bb_perror_msg("read from %s", _PATH_LOG);
Denis Vlasenko0d948202008-12-09 22:53:31 +00001034 break;
1035 }
Erik Andersene49d5ec2000-02-08 19:58:47 +00001036
Denis Vlasenko75cddd82008-02-13 09:19:14 +00001037 /* Drop trailing '\n' and NULs (typically there is one NUL) */
Denis Vlasenko018b1552007-11-06 01:38:46 +00001038 while (1) {
1039 if (sz == 0)
1040 goto read_again;
Denis Vlasenkocb12cb22007-11-06 11:34:03 +00001041 /* man 3 syslog says: "A trailing newline is added when needed".
1042 * However, neither glibc nor uclibc do this:
1043 * syslog(prio, "test") sends "test\0" to /dev/log,
Denis Vlasenko75cddd82008-02-13 09:19:14 +00001044 * syslog(prio, "test\n") sends "test\n\0".
Denis Vlasenkocb12cb22007-11-06 11:34:03 +00001045 * IOW: newline is passed verbatim!
1046 * I take it to mean that it's syslogd's job
Denis Vlasenko75cddd82008-02-13 09:19:14 +00001047 * to make those look identical in the log files. */
Denis Vlasenkobe048f22008-02-26 20:13:52 +00001048 if (recvbuf[sz-1] != '\0' && recvbuf[sz-1] != '\n')
Denis Vlasenko018b1552007-11-06 01:38:46 +00001049 break;
1050 sz--;
1051 }
Denis Vlasenkobe048f22008-02-26 20:13:52 +00001052#if ENABLE_FEATURE_SYSLOGD_DUP
1053 if ((option_mask32 & OPT_dup) && (sz == last_sz))
1054 if (memcmp(last_buf, recvbuf, sz) == 0)
1055 continue;
1056 last_sz = sz;
1057#endif
Denis Vlasenkoceab8702007-01-04 17:57:54 +00001058#if ENABLE_FEATURE_REMOTE_LOG
Thomas Geuligd2f77792010-02-28 13:01:59 +01001059 /* Stock syslogd sends it '\n'-terminated
1060 * over network, mimic that */
1061 recvbuf[sz] = '\n';
1062
Denis Vlasenkod7ecd862007-09-07 13:53:32 +00001063 /* We are not modifying log messages in any way before send */
1064 /* Remote site cannot trust _us_ anyway and need to do validation again */
Thomas Geuligd2f77792010-02-28 13:01:59 +01001065 for (item = G.remoteHosts; item != NULL; item = item->link) {
1066 remoteHost_t *rh = (remoteHost_t *)item->data;
1067
1068 if (rh->remoteFD == -1) {
1069 rh->remoteFD = try_to_resolve_remote(rh);
1070 if (rh->remoteFD == -1)
1071 continue;
Glenn L McGrath912d8f42002-11-10 22:46:45 +00001072 }
Daniel Dickinsone74d7982010-08-03 04:26:20 +02001073
1074 /* Send message to remote logger.
1075 * On some errors, close and set remoteFD to -1
1076 * so that DNS resolution is retried.
1077 */
1078 if (sendto(rh->remoteFD, recvbuf, sz+1,
1079 MSG_DONTWAIT | MSG_NOSIGNAL,
1080 &(rh->remoteAddr->u.sa), rh->remoteAddr->len) == -1
1081 ) {
1082 switch (errno) {
1083 case ECONNRESET:
1084 case ENOTCONN: /* paranoia */
1085 case EPIPE:
1086 close(rh->remoteFD);
1087 rh->remoteFD = -1;
1088 free(rh->remoteAddr);
1089 rh->remoteAddr = NULL;
1090 }
1091 }
Denis Vlasenko87f3b262007-09-07 13:43:28 +00001092 }
Denis Vlasenkod7ecd862007-09-07 13:53:32 +00001093#endif
Denis Vlasenko75cddd82008-02-13 09:19:14 +00001094 if (!ENABLE_FEATURE_REMOTE_LOG || (option_mask32 & OPT_locallog)) {
Denis Vlasenkobe048f22008-02-26 20:13:52 +00001095 recvbuf[sz] = '\0'; /* ensure it *is* NUL terminated */
1096 split_escape_and_log(recvbuf, sz);
Denis Vlasenko75cddd82008-02-13 09:19:14 +00001097 }
Denis Vlasenko0d948202008-12-09 22:53:31 +00001098 } /* while (!bb_got_signal) */
1099
1100 timestamp_and_log_internal("syslogd exiting");
Denys Vlasenko50596532019-03-17 19:47:52 +01001101 remove_pidfile_std_path_and_ext("syslogd");
Peter Korsgaard99807072013-01-06 13:11:04 +01001102 ipcsyslog_cleanup();
1103 if (option_mask32 & OPT_kmsg)
Peter Korsgaardcd776cf2013-01-06 00:07:19 +01001104 kmsg_cleanup();
Denis Vlasenko0d948202008-12-09 22:53:31 +00001105 kill_myself_with_sig(bb_got_signal);
Denis Vlasenkobd1aeeb2008-06-11 15:43:19 +00001106#undef recvbuf
Eric Andersenb99df0f1999-11-24 09:04:33 +00001107}
1108
Denis Vlasenko9b49a5e2007-10-11 10:05:36 +00001109int syslogd_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
Denis Vlasenkoa60f84e2008-07-05 09:18:54 +00001110int syslogd_main(int argc UNUSED_PARAM, char **argv)
Eric Andersen3843e961999-11-25 07:30:46 +00001111{
Denis Vlasenko0d948202008-12-09 22:53:31 +00001112 int opts;
Thomas Geuligd2f77792010-02-28 13:01:59 +01001113 char OPTION_DECL;
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +00001114#if ENABLE_FEATURE_REMOTE_LOG
Thomas Geuligd2f77792010-02-28 13:01:59 +01001115 llist_t *remoteAddrList = NULL;
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +00001116#endif
Denis Vlasenko5e892ba2007-03-15 19:50:46 +00001117
Thomas Geuligd2f77792010-02-28 13:01:59 +01001118 INIT_G();
1119
Denys Vlasenko237bedd2016-07-06 21:58:02 +02001120 /* No non-option params */
Denys Vlasenko22542ec2017-08-08 21:55:02 +02001121 opts = getopt32(argv, "^"OPTION_STR"\0""=0", OPTION_PARAM);
Thomas Geuligd2f77792010-02-28 13:01:59 +01001122#if ENABLE_FEATURE_REMOTE_LOG
1123 while (remoteAddrList) {
1124 remoteHost_t *rh = xzalloc(sizeof(*rh));
1125 rh->remoteHostname = llist_pop(&remoteAddrList);
1126 rh->remoteFD = -1;
1127 rh->last_dns_resolve = monotonic_sec() - DNS_WAIT_SEC - 1;
1128 llist_add_to(&G.remoteHosts, rh);
1129 }
1130#endif
1131
Denis Vlasenko4998c812007-02-14 20:51:46 +00001132#ifdef SYSLOGD_MARK
Denis Vlasenko0d948202008-12-09 22:53:31 +00001133 if (opts & OPT_mark) // -m
Denis Vlasenko5e892ba2007-03-15 19:50:46 +00001134 G.markInterval = xatou_range(opt_m, 0, INT_MAX/60) * 60;
Denis Vlasenko4998c812007-02-14 20:51:46 +00001135#endif
Denis Vlasenko0d948202008-12-09 22:53:31 +00001136 //if (opts & OPT_nofork) // -n
1137 //if (opts & OPT_outfile) // -O
1138 if (opts & OPT_loglevel) // -l
Denis Vlasenko5e892ba2007-03-15 19:50:46 +00001139 G.logLevel = xatou_range(opt_l, 1, 8);
Denis Vlasenko0d948202008-12-09 22:53:31 +00001140 //if (opts & OPT_small) // -S
Denis Vlasenko14c19402006-09-30 19:20:00 +00001141#if ENABLE_FEATURE_ROTATE_LOGFILE
Denis Vlasenko0d948202008-12-09 22:53:31 +00001142 if (opts & OPT_filesize) // -s
Denis Vlasenko5e892ba2007-03-15 19:50:46 +00001143 G.logFileSize = xatou_range(opt_s, 0, INT_MAX/1024) * 1024;
Denis Vlasenko0d948202008-12-09 22:53:31 +00001144 if (opts & OPT_rotatecnt) // -b
Denis Vlasenko5e892ba2007-03-15 19:50:46 +00001145 G.logFileRotate = xatou_range(opt_b, 0, 99);
Denis Vlasenko14c19402006-09-30 19:20:00 +00001146#endif
Denis Vlasenko14c19402006-09-30 19:20:00 +00001147#if ENABLE_FEATURE_IPC_SYSLOG
Denis Vlasenko218f2f42007-01-24 22:02:01 +00001148 if (opt_C) // -Cn
Denis Vlasenko5e892ba2007-03-15 19:50:46 +00001149 G.shm_size = xatoul_range(opt_C, 4, INT_MAX/1024) * 1024;
Denis Vlasenko14c19402006-09-30 19:20:00 +00001150#endif
Eric Andersen4ed17822000-12-11 19:28:29 +00001151 /* If they have not specified remote logging, then log locally */
Denis Vlasenko0d948202008-12-09 22:53:31 +00001152 if (ENABLE_FEATURE_REMOTE_LOG && !(opts & OPT_remotelog)) // -R
Denis Vlasenkoc12f5302006-10-06 09:49:47 +00001153 option_mask32 |= OPT_locallog;
Sergey Naumov73ef15c2011-04-10 07:34:27 +02001154#if ENABLE_FEATURE_SYSLOGD_CFG
1155 parse_syslogdcfg(opt_f);
1156#endif
Mark Whitley6317c4b2001-03-12 22:51:50 +00001157
Erik Andersene49d5ec2000-02-08 19:58:47 +00001158 /* Store away localhost's name before the fork */
Denis Vlasenko6f1713f2008-02-25 23:23:58 +00001159 G.hostname = safe_gethostname();
1160 *strchrnul(G.hostname, '.') = '\0';
Erik Andersene49d5ec2000-02-08 19:58:47 +00001161
Denis Vlasenko0d948202008-12-09 22:53:31 +00001162 if (!(opts & OPT_nofork)) {
Denis Vlasenko5a142022007-03-26 13:20:54 +00001163 bb_daemonize_or_rexec(DAEMON_CHDIR_ROOT, argv);
Eric Andersen35e643b2003-07-28 07:40:39 +00001164 }
Anthony G. Basile12677ac2012-12-10 14:49:39 -05001165
Denys Vlasenkoa4252422010-01-29 16:44:48 +01001166 //umask(0); - why??
Denys Vlasenko50596532019-03-17 19:47:52 +01001167 write_pidfile_std_path_and_ext("syslogd");
Anthony G. Basile12677ac2012-12-10 14:49:39 -05001168
Denis Vlasenkoceab8702007-01-04 17:57:54 +00001169 do_syslogd();
Denis Vlasenko8a820b22007-01-06 22:08:53 +00001170 /* return EXIT_SUCCESS; */
Eric Andersen3843e961999-11-25 07:30:46 +00001171}
Denis Vlasenkobd1aeeb2008-06-11 15:43:19 +00001172
1173/* Clean up. Needed because we are included from syslogd_and_logger.c */
Denis Vlasenko0d948202008-12-09 22:53:31 +00001174#undef DEBUG
1175#undef SYSLOGD_MARK
1176#undef SYSLOGD_WRLOCK
Denis Vlasenkobd1aeeb2008-06-11 15:43:19 +00001177#undef G
1178#undef GLOBALS
1179#undef INIT_G
1180#undef OPTION_STR
1181#undef OPTION_DECL
1182#undef OPTION_PARAM