blob: ae0840bff5fbf11c4fd4f9cd2c74d212b2124332 [file] [log] [blame]
Erik Andersene49d5ec2000-02-08 19:58:47 +00001/* vi: set sw=4 ts=4: */
Eric Andersen3843e961999-11-25 07:30:46 +00002/*
3 * Mini syslogd implementation for busybox
4 *
Eric Andersenc7bda1c2004-03-15 08:29:22 +00005 * Copyright (C) 1999-2004 by Erik Andersen <andersen@codepoet.org>
Eric Andersen3843e961999-11-25 07:30:46 +00006 *
Erik Andersenf13df372000-04-18 23:51:51 +00007 * Copyright (C) 2000 by Karl M. Hegbloom <karlheg@debian.org>
8 *
Glenn L McGrath6ed77592002-12-12 10:54:48 +00009 * "circular buffer" Copyright (C) 2001 by Gennady Feldman <gfeldman@gena01.com>
Mark Whitley6317c4b2001-03-12 22:51:50 +000010 *
Glenn L McGrath6ed77592002-12-12 10:54:48 +000011 * Maintainer: Gennady Feldman <gfeldman@gena01.com> as of Mar 12, 2001
Mark Whitley6bff9cc2001-03-12 23:41:34 +000012 *
Denys Vlasenko0ef64bd2010-08-16 20:14:46 +020013 * Licensed under GPLv2 or later, see file LICENSE in this source tree.
Eric Andersen3843e961999-11-25 07:30:46 +000014 */
Denys Vlasenkod34f3002015-10-18 18:42:03 +020015//config:config SYSLOGD
16//config: bool "syslogd"
17//config: default y
18//config: help
19//config: The syslogd utility is used to record logs of all the
20//config: significant events that occur on a system. Every
21//config: message that is logged records the date and time of the
22//config: event, and will generally also record the name of the
23//config: application that generated the message. When used in
24//config: conjunction with klogd, messages from the Linux kernel
25//config: can also be recorded. This is terribly useful,
26//config: especially for finding what happened when something goes
27//config: wrong. And something almost always will go wrong if
28//config: you wait long enough....
29//config:
30//config:config FEATURE_ROTATE_LOGFILE
31//config: bool "Rotate message files"
32//config: default y
33//config: depends on SYSLOGD
34//config: help
35//config: This enables syslogd to rotate the message files
Mike Frysingerea1b4442016-04-04 01:28:32 -040036//config: on his own. No need to use an external rotate script.
Denys Vlasenkod34f3002015-10-18 18:42:03 +020037//config:
38//config:config FEATURE_REMOTE_LOG
39//config: bool "Remote Log support"
40//config: default y
41//config: depends on SYSLOGD
42//config: help
43//config: When you enable this feature, the syslogd utility can
44//config: be used to send system log messages to another system
45//config: connected via a network. This allows the remote
46//config: machine to log all the system messages, which can be
47//config: terribly useful for reducing the number of serial
48//config: cables you use. It can also be a very good security
49//config: measure to prevent system logs from being tampered with
50//config: by an intruder.
51//config:
52//config:config FEATURE_SYSLOGD_DUP
53//config: bool "Support -D (drop dups) option"
54//config: default y
55//config: depends on SYSLOGD
56//config: help
57//config: Option -D instructs syslogd to drop consecutive messages
58//config: which are totally the same.
59//config:
60//config:config FEATURE_SYSLOGD_CFG
61//config: bool "Support syslog.conf"
62//config: default y
63//config: depends on SYSLOGD
64//config: help
65//config: Supports restricted syslogd config. See docs/syslog.conf.txt
66//config:
67//config:config FEATURE_SYSLOGD_READ_BUFFER_SIZE
68//config: int "Read buffer size in bytes"
69//config: default 256
70//config: range 256 20000
71//config: depends on SYSLOGD
72//config: help
73//config: This option sets the size of the syslog read buffer.
74//config: Actual memory usage increases around five times the
75//config: change done here.
76//config:
77//config:config FEATURE_IPC_SYSLOG
78//config: bool "Circular Buffer support"
79//config: default y
80//config: depends on SYSLOGD
81//config: help
82//config: When you enable this feature, the syslogd utility will
83//config: use a circular buffer to record system log messages.
84//config: When the buffer is filled it will continue to overwrite
85//config: the oldest messages. This can be very useful for
86//config: systems with little or no permanent storage, since
87//config: otherwise system logs can eventually fill up your
88//config: entire filesystem, which may cause your system to
89//config: break badly.
90//config:
91//config:config FEATURE_IPC_SYSLOG_BUFFER_SIZE
92//config: int "Circular buffer size in Kbytes (minimum 4KB)"
93//config: default 16
94//config: range 4 2147483647
95//config: depends on FEATURE_IPC_SYSLOG
96//config: help
97//config: This option sets the size of the circular buffer
98//config: used to record system log messages.
99//config:
100//config:config FEATURE_KMSG_SYSLOG
101//config: bool "Linux kernel printk buffer support"
102//config: default y
103//config: depends on SYSLOGD
104//config: select PLATFORM_LINUX
105//config: help
106//config: When you enable this feature, the syslogd utility will
107//config: write system log message to the Linux kernel's printk buffer.
108//config: This can be used as a smaller alternative to the syslogd IPC
109//config: support, as klogd and logread aren't needed.
110//config:
111//config: NOTICE: Syslog facilities in log entries needs kernel 3.5+.
112
113//applet:IF_SYSLOGD(APPLET(syslogd, BB_DIR_SBIN, BB_SUID_DROP))
114
115//kbuild:lib-$(CONFIG_SYSLOGD) += syslogd_and_logger.o
Eric Andersenb99df0f1999-11-24 09:04:33 +0000116
Pere Orga5bc8c002011-04-11 03:29:49 +0200117//usage:#define syslogd_trivial_usage
118//usage: "[OPTIONS]"
119//usage:#define syslogd_full_usage "\n\n"
Denys Vlasenkoaeab42e2011-05-25 11:58:56 +0200120//usage: "System logging utility\n"
121//usage: IF_NOT_FEATURE_SYSLOGD_CFG(
122//usage: "(this version of syslogd ignores /etc/syslog.conf)\n"
123//usage: )
Pere Orga5bc8c002011-04-11 03:29:49 +0200124//usage: "\n -n Run in foreground"
Pere Orga5bc8c002011-04-11 03:29:49 +0200125//usage: IF_FEATURE_REMOTE_LOG(
Denys Vlasenko257a7752013-03-15 01:50:35 +0100126//usage: "\n -R HOST[:PORT] Log to HOST:PORT (default PORT:514)"
Denys Vlasenkoaeab42e2011-05-25 11:58:56 +0200127//usage: "\n -L Log locally and via network (default is network only if -R)"
128//usage: )
Pere Orga5bc8c002011-04-11 03:29:49 +0200129//usage: IF_FEATURE_IPC_SYSLOG(
Pere Orga5bc8c002011-04-11 03:29:49 +0200130/* NB: -Csize shouldn't have space (because size is optional) */
Denys Vlasenkoaeab42e2011-05-25 11:58:56 +0200131//usage: "\n -C[size_kb] Log to shared mem buffer (use logread to read it)"
132//usage: )
Denys Vlasenkoa28c1b22014-07-02 15:21:30 +0200133//usage: IF_FEATURE_KMSG_SYSLOG(
134//usage: "\n -K Log to kernel printk buffer (use dmesg to read it)"
135//usage: )
Mike Frysingerea1b4442016-04-04 01:28:32 -0400136//usage: "\n -O FILE Log to FILE (default: /var/log/messages, stdout if -)"
Denys Vlasenkoa28c1b22014-07-02 15:21:30 +0200137//usage: IF_FEATURE_ROTATE_LOGFILE(
138//usage: "\n -s SIZE Max size (KB) before rotation (default:200KB, 0=off)"
139//usage: "\n -b N N rotated logs to keep (default:1, max=99, 0=purge)"
140//usage: )
141//usage: "\n -l N Log only messages more urgent than prio N (1-8)"
142//usage: "\n -S Smaller output"
143//usage: IF_FEATURE_SYSLOGD_DUP(
144//usage: "\n -D Drop duplicates"
145//usage: )
Denys Vlasenkoaeab42e2011-05-25 11:58:56 +0200146//usage: IF_FEATURE_SYSLOGD_CFG(
147//usage: "\n -f FILE Use FILE as config (default:/etc/syslog.conf)"
148//usage: )
Pere Orga5bc8c002011-04-11 03:29:49 +0200149/* //usage: "\n -m MIN Minutes between MARK lines (default:20, 0=off)" */
150//usage:
151//usage:#define syslogd_example_usage
152//usage: "$ syslogd -R masterlog:514\n"
153//usage: "$ syslogd -R 192.168.1.1:601\n"
154
Denis Vlasenkobd1aeeb2008-06-11 15:43:19 +0000155/*
156 * Done in syslogd_and_logger.c:
Denis Vlasenkob6adbf12007-05-26 19:00:18 +0000157#include "libbb.h"
Bernhard Reutner-Fischerf4701962008-01-27 12:50:12 +0000158#define SYSLOG_NAMES
159#define SYSLOG_NAMES_CONST
160#include <syslog.h>
Denis Vlasenkobd1aeeb2008-06-11 15:43:19 +0000161*/
Cédric Cabessaadc30b42013-08-05 02:09:16 +0200162#ifndef _PATH_LOG
163#define _PATH_LOG "/dev/log"
164#endif
Bernhard Reutner-Fischerf4701962008-01-27 12:50:12 +0000165
Erik Andersen983b51b2000-04-04 18:14:25 +0000166#include <sys/un.h>
Eric Andersenced2cef2000-07-20 23:41:24 +0000167#include <sys/uio.h>
Eric Andersen3843e961999-11-25 07:30:46 +0000168
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000169#if ENABLE_FEATURE_REMOTE_LOG
170#include <netinet/in.h>
Denis Vlasenko4998c812007-02-14 20:51:46 +0000171#endif
Erik Andersene49d5ec2000-02-08 19:58:47 +0000172
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000173#if ENABLE_FEATURE_IPC_SYSLOG
174#include <sys/ipc.h>
175#include <sys/sem.h>
176#include <sys/shm.h>
177#endif
Denis Vlasenko1decd0e2006-09-30 19:17:40 +0000178
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000179
180#define DEBUG 0
181
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000182/* MARK code is not very useful, is bloat, and broken:
183 * can deadlock if alarmed to make MARK while writing to IPC buffer
184 * (semaphores are down but do_mark routine tries to down them again) */
185#undef SYSLOGD_MARK
186
Denis Vlasenko0d948202008-12-09 22:53:31 +0000187/* Write locking does not seem to be useful either */
188#undef SYSLOGD_WRLOCK
189
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000190enum {
Janne Kiviluotoc897dfe2010-03-31 15:58:58 +0200191 MAX_READ = CONFIG_FEATURE_SYSLOGD_READ_BUFFER_SIZE,
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000192 DNS_WAIT_SEC = 2 * 60,
193};
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000194
195/* Semaphore operation structures */
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000196struct shbuf_ds {
Denis Vlasenko5f1b1492007-08-12 21:33:06 +0000197 int32_t size; /* size of data - 1 */
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000198 int32_t tail; /* end of message list */
199 char data[1]; /* data/messages */
200};
201
Thomas Geuligd2f77792010-02-28 13:01:59 +0100202#if ENABLE_FEATURE_REMOTE_LOG
203typedef struct {
204 int remoteFD;
205 unsigned last_dns_resolve;
206 len_and_sockaddr *remoteAddr;
207 const char *remoteHostname;
208} remoteHost_t;
209#endif
210
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200211typedef struct logFile_t {
212 const char *path;
213 int fd;
Joshua Judson Rosenae57fca2014-07-03 14:51:47 +0200214 time_t last_log_time;
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200215#if ENABLE_FEATURE_ROTATE_LOGFILE
216 unsigned size;
217 uint8_t isRegular;
218#endif
219} logFile_t;
220
221#if ENABLE_FEATURE_SYSLOGD_CFG
222typedef struct logRule_t {
223 uint8_t enabled_facility_priomap[LOG_NFACILITIES];
224 struct logFile_t *file;
225 struct logRule_t *next;
226} logRule_t;
227#endif
228
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000229/* Allows us to have smaller initializer. Ugly. */
230#define GLOBALS \
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200231 logFile_t logFile; \
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000232 /* interval between marks in seconds */ \
233 /*int markInterval;*/ \
234 /* level of messages to be logged */ \
235 int logLevel; \
Denis Vlasenko5e34ff22009-04-21 11:09:40 +0000236IF_FEATURE_ROTATE_LOGFILE( \
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000237 /* max size of file before rotation */ \
238 unsigned logFileSize; \
239 /* number of rotated message files */ \
240 unsigned logFileRotate; \
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000241) \
Denis Vlasenko5e34ff22009-04-21 11:09:40 +0000242IF_FEATURE_IPC_SYSLOG( \
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000243 int shmid; /* ipc shared memory id */ \
244 int s_semid; /* ipc semaphore id */ \
245 int shm_size; \
246 struct sembuf SMwup[1]; \
247 struct sembuf SMwdn[3]; \
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200248) \
249IF_FEATURE_SYSLOGD_CFG( \
250 logRule_t *log_rules; \
Peter Korsgaardcd776cf2013-01-06 00:07:19 +0100251) \
252IF_FEATURE_KMSG_SYSLOG( \
253 int kmsgfd; \
254 int primask; \
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000255)
256
257struct init_globals {
258 GLOBALS
259};
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000260
261struct globals {
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000262 GLOBALS
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000263
264#if ENABLE_FEATURE_REMOTE_LOG
Thomas Geuligd2f77792010-02-28 13:01:59 +0100265 llist_t *remoteHosts;
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000266#endif
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000267#if ENABLE_FEATURE_IPC_SYSLOG
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000268 struct shbuf_ds *shbuf;
269#endif
Denis Vlasenko6f1713f2008-02-25 23:23:58 +0000270 /* localhost's name. We print only first 64 chars */
271 char *hostname;
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000272
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000273 /* We recv into recvbuf... */
Denis Vlasenkobe048f22008-02-26 20:13:52 +0000274 char recvbuf[MAX_READ * (1 + ENABLE_FEATURE_SYSLOGD_DUP)];
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000275 /* ...then copy to parsebuf, escaping control chars */
276 /* (can grow x2 max) */
277 char parsebuf[MAX_READ*2];
278 /* ...then sprintf into printbuf, adding timestamp (15 chars),
279 * host (64), fac.prio (20) to the message */
280 /* (growth by: 15 + 64 + 20 + delims = ~110) */
281 char printbuf[MAX_READ*2 + 128];
282};
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000283
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000284static const struct init_globals init_data = {
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200285 .logFile = {
286 .path = "/var/log/messages",
287 .fd = -1,
288 },
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000289#ifdef SYSLOGD_MARK
290 .markInterval = 20 * 60,
291#endif
292 .logLevel = 8,
293#if ENABLE_FEATURE_ROTATE_LOGFILE
294 .logFileSize = 200 * 1024,
295 .logFileRotate = 1,
296#endif
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000297#if ENABLE_FEATURE_IPC_SYSLOG
298 .shmid = -1,
299 .s_semid = -1,
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200300 .shm_size = ((CONFIG_FEATURE_IPC_SYSLOG_BUFFER_SIZE)*1024), /* default shm size */
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000301 .SMwup = { {1, -1, IPC_NOWAIT} },
302 .SMwdn = { {0, 0}, {1, 0}, {1, +1} },
303#endif
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000304};
305
306#define G (*ptr_to_globals)
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000307#define INIT_G() do { \
Denis Vlasenko574f2f42008-02-27 18:41:59 +0000308 SET_PTR_TO_GLOBALS(memcpy(xzalloc(sizeof(G)), &init_data, sizeof(init_data))); \
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000309} while (0)
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000310
311
Denis Vlasenkoa0e2a0a2007-01-04 21:22:11 +0000312/* Options */
Denis Vlasenko14c19402006-09-30 19:20:00 +0000313enum {
314 OPTBIT_mark = 0, // -m
315 OPTBIT_nofork, // -n
316 OPTBIT_outfile, // -O
317 OPTBIT_loglevel, // -l
318 OPTBIT_small, // -S
Denis Vlasenko5e34ff22009-04-21 11:09:40 +0000319 IF_FEATURE_ROTATE_LOGFILE(OPTBIT_filesize ,) // -s
320 IF_FEATURE_ROTATE_LOGFILE(OPTBIT_rotatecnt ,) // -b
321 IF_FEATURE_REMOTE_LOG( OPTBIT_remotelog ,) // -R
322 IF_FEATURE_REMOTE_LOG( OPTBIT_locallog ,) // -L
323 IF_FEATURE_IPC_SYSLOG( OPTBIT_circularlog,) // -C
324 IF_FEATURE_SYSLOGD_DUP( OPTBIT_dup ,) // -D
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200325 IF_FEATURE_SYSLOGD_CFG( OPTBIT_cfg ,) // -f
Peter Korsgaardcd776cf2013-01-06 00:07:19 +0100326 IF_FEATURE_KMSG_SYSLOG( OPTBIT_kmsg ,) // -K
Denis Vlasenko14c19402006-09-30 19:20:00 +0000327
328 OPT_mark = 1 << OPTBIT_mark ,
329 OPT_nofork = 1 << OPTBIT_nofork ,
330 OPT_outfile = 1 << OPTBIT_outfile ,
331 OPT_loglevel = 1 << OPTBIT_loglevel,
332 OPT_small = 1 << OPTBIT_small ,
Denis Vlasenko5e34ff22009-04-21 11:09:40 +0000333 OPT_filesize = IF_FEATURE_ROTATE_LOGFILE((1 << OPTBIT_filesize )) + 0,
334 OPT_rotatecnt = IF_FEATURE_ROTATE_LOGFILE((1 << OPTBIT_rotatecnt )) + 0,
335 OPT_remotelog = IF_FEATURE_REMOTE_LOG( (1 << OPTBIT_remotelog )) + 0,
336 OPT_locallog = IF_FEATURE_REMOTE_LOG( (1 << OPTBIT_locallog )) + 0,
337 OPT_circularlog = IF_FEATURE_IPC_SYSLOG( (1 << OPTBIT_circularlog)) + 0,
338 OPT_dup = IF_FEATURE_SYSLOGD_DUP( (1 << OPTBIT_dup )) + 0,
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200339 OPT_cfg = IF_FEATURE_SYSLOGD_CFG( (1 << OPTBIT_cfg )) + 0,
Peter Korsgaardcd776cf2013-01-06 00:07:19 +0100340 OPT_kmsg = IF_FEATURE_KMSG_SYSLOG( (1 << OPTBIT_kmsg )) + 0,
Denis Vlasenko14c19402006-09-30 19:20:00 +0000341};
342#define OPTION_STR "m:nO:l:S" \
Denis Vlasenko5e34ff22009-04-21 11:09:40 +0000343 IF_FEATURE_ROTATE_LOGFILE("s:" ) \
344 IF_FEATURE_ROTATE_LOGFILE("b:" ) \
Denys Vlasenko237bedd2016-07-06 21:58:02 +0200345 IF_FEATURE_REMOTE_LOG( "R:*") \
Denis Vlasenko5e34ff22009-04-21 11:09:40 +0000346 IF_FEATURE_REMOTE_LOG( "L" ) \
347 IF_FEATURE_IPC_SYSLOG( "C::") \
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200348 IF_FEATURE_SYSLOGD_DUP( "D" ) \
Peter Korsgaardcd776cf2013-01-06 00:07:19 +0100349 IF_FEATURE_SYSLOGD_CFG( "f:" ) \
350 IF_FEATURE_KMSG_SYSLOG( "K" )
Denis Vlasenko14c19402006-09-30 19:20:00 +0000351#define OPTION_DECL *opt_m, *opt_l \
Denis Vlasenko5e34ff22009-04-21 11:09:40 +0000352 IF_FEATURE_ROTATE_LOGFILE(,*opt_s) \
353 IF_FEATURE_ROTATE_LOGFILE(,*opt_b) \
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200354 IF_FEATURE_IPC_SYSLOG( ,*opt_C = NULL) \
355 IF_FEATURE_SYSLOGD_CFG( ,*opt_f = NULL)
356#define OPTION_PARAM &opt_m, &(G.logFile.path), &opt_l \
Denis Vlasenko5e34ff22009-04-21 11:09:40 +0000357 IF_FEATURE_ROTATE_LOGFILE(,&opt_s) \
358 IF_FEATURE_ROTATE_LOGFILE(,&opt_b) \
Denys Vlasenko69675782013-01-14 01:34:48 +0100359 IF_FEATURE_REMOTE_LOG( ,&remoteAddrList) \
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200360 IF_FEATURE_IPC_SYSLOG( ,&opt_C) \
361 IF_FEATURE_SYSLOGD_CFG( ,&opt_f)
Eric Andersen871d93c2002-09-17 20:06:29 +0000362
Eric Andersen871d93c2002-09-17 20:06:29 +0000363
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200364#if ENABLE_FEATURE_SYSLOGD_CFG
365static const CODE* find_by_name(char *name, const CODE* c_set)
366{
367 for (; c_set->c_name; c_set++) {
368 if (strcmp(name, c_set->c_name) == 0)
369 return c_set;
370 }
371 return NULL;
372}
373#endif
374static const CODE* find_by_val(int val, const CODE* c_set)
375{
376 for (; c_set->c_name; c_set++) {
377 if (c_set->c_val == val)
378 return c_set;
379 }
380 return NULL;
381}
382
383#if ENABLE_FEATURE_SYSLOGD_CFG
384static void parse_syslogdcfg(const char *file)
385{
386 char *t;
387 logRule_t **pp_rule;
388 /* tok[0] set of selectors */
389 /* tok[1] file name */
390 /* tok[2] has to be NULL */
391 char *tok[3];
392 parser_t *parser;
393
394 parser = config_open2(file ? file : "/etc/syslog.conf",
Denys Vlasenko514cbfc2011-09-16 13:28:52 +0200395 file ? xfopen_for_read : fopen_for_read);
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200396 if (!parser)
397 /* didn't find default /etc/syslog.conf */
398 /* proceed as if we built busybox without config support */
399 return;
400
401 /* use ptr to ptr to avoid checking whether head was initialized */
402 pp_rule = &G.log_rules;
403 /* iterate through lines of config, skipping comments */
404 while (config_read(parser, tok, 3, 2, "# \t", PARSE_NORMAL | PARSE_MIN_DIE)) {
405 char *cur_selector;
406 logRule_t *cur_rule;
407
408 /* unexpected trailing token? */
Denys Vlasenko0288b272011-04-16 20:15:14 +0200409 if (tok[2])
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200410 goto cfgerr;
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200411
412 cur_rule = *pp_rule = xzalloc(sizeof(*cur_rule));
413
414 cur_selector = tok[0];
415 /* iterate through selectors: "kern.info;kern.!err;..." */
416 do {
417 const CODE *code;
418 char *next_selector;
419 uint8_t negated_prio; /* "kern.!err" */
420 uint8_t single_prio; /* "kern.=err" */
421 uint32_t facmap; /* bitmap of enabled facilities */
422 uint8_t primap; /* bitmap of enabled priorities */
423 unsigned i;
424
425 next_selector = strchr(cur_selector, ';');
426 if (next_selector)
427 *next_selector++ = '\0';
428
429 t = strchr(cur_selector, '.');
Denys Vlasenko0288b272011-04-16 20:15:14 +0200430 if (!t)
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200431 goto cfgerr;
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200432 *t++ = '\0'; /* separate facility from priority */
433
434 negated_prio = 0;
435 single_prio = 0;
436 if (*t == '!') {
437 negated_prio = 1;
438 ++t;
439 }
440 if (*t == '=') {
441 single_prio = 1;
442 ++t;
443 }
444
445 /* parse priority */
446 if (*t == '*')
447 primap = 0xff; /* all 8 log levels enabled */
448 else {
449 uint8_t priority;
450 code = find_by_name(t, prioritynames);
451 if (!code)
452 goto cfgerr;
453 primap = 0;
454 priority = code->c_val;
455 if (priority == INTERNAL_NOPRI) {
456 /* ensure we take "enabled_facility_priomap[fac] &= 0" branch below */
457 negated_prio = 1;
458 } else {
459 priority = 1 << priority;
460 do {
461 primap |= priority;
462 if (single_prio)
463 break;
464 priority >>= 1;
465 } while (priority);
466 if (negated_prio)
467 primap = ~primap;
468 }
469 }
470
471 /* parse facility */
472 if (*cur_selector == '*')
473 facmap = (1<<LOG_NFACILITIES) - 1;
474 else {
475 char *next_facility;
476 facmap = 0;
477 t = cur_selector;
478 /* iterate through facilities: "kern,daemon.<priospec>" */
479 do {
480 next_facility = strchr(t, ',');
481 if (next_facility)
482 *next_facility++ = '\0';
483 code = find_by_name(t, facilitynames);
484 if (!code)
485 goto cfgerr;
486 /* "mark" is not a real facility, skip it */
487 if (code->c_val != INTERNAL_MARK)
488 facmap |= 1<<(LOG_FAC(code->c_val));
489 t = next_facility;
490 } while (t);
491 }
492
493 /* merge result with previous selectors */
494 for (i = 0; i < LOG_NFACILITIES; ++i) {
495 if (!(facmap & (1<<i)))
496 continue;
497 if (negated_prio)
498 cur_rule->enabled_facility_priomap[i] &= primap;
499 else
500 cur_rule->enabled_facility_priomap[i] |= primap;
501 }
502
503 cur_selector = next_selector;
504 } while (cur_selector);
505
Sergey Naumove9c8bed2011-04-16 19:36:15 +0200506 /* check whether current file name was mentioned in previous rules or
507 * as global logfile (G.logFile).
508 */
509 if (strcmp(G.logFile.path, tok[1]) == 0) {
510 cur_rule->file = &G.logFile;
511 goto found;
512 }
513 /* temporarily use cur_rule as iterator, but *pp_rule still points
514 * to currently processing rule entry.
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200515 * NOTE: *pp_rule points to the current (and last in the list) rule.
516 */
517 for (cur_rule = G.log_rules; cur_rule != *pp_rule; cur_rule = cur_rule->next) {
518 if (strcmp(cur_rule->file->path, tok[1]) == 0) {
519 /* found - reuse the same file structure */
520 (*pp_rule)->file = cur_rule->file;
521 cur_rule = *pp_rule;
522 goto found;
523 }
524 }
525 cur_rule->file = xzalloc(sizeof(*cur_rule->file));
526 cur_rule->file->fd = -1;
527 cur_rule->file->path = xstrdup(tok[1]);
528 found:
529 pp_rule = &cur_rule->next;
530 }
531 config_close(parser);
532 return;
533
534 cfgerr:
Denys Vlasenko81fa9992013-01-20 16:05:41 +0100535 bb_error_msg_and_die("error in '%s' at line %d",
536 file ? file : "/etc/syslog.conf",
537 parser->lineno);
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200538}
539#endif
540
Mark Whitley6317c4b2001-03-12 22:51:50 +0000541/* circular buffer variables/structures */
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000542#if ENABLE_FEATURE_IPC_SYSLOG
543
Eric Andersend4a5e252003-12-19 11:32:14 +0000544#if CONFIG_FEATURE_IPC_SYSLOG_BUFFER_SIZE < 4
545#error Sorry, you must set the syslogd buffer size to at least 4KB.
546#error Please check CONFIG_FEATURE_IPC_SYSLOG_BUFFER_SIZE
547#endif
548
Denis Vlasenkobd1aeeb2008-06-11 15:43:19 +0000549/* our shared key (syslogd.c and logread.c must be in sync) */
550enum { KEY_ID = 0x414e4547 }; /* "GENA" */
Mark Whitley6317c4b2001-03-12 22:51:50 +0000551
"Vladimir N. Oleynik"e4baaa22005-09-22 12:59:26 +0000552static void ipcsyslog_cleanup(void)
Glenn L McGrath912d8f42002-11-10 22:46:45 +0000553{
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000554 if (G.shmid != -1) {
555 shmdt(G.shbuf);
Glenn L McGrath912d8f42002-11-10 22:46:45 +0000556 }
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000557 if (G.shmid != -1) {
558 shmctl(G.shmid, IPC_RMID, NULL);
Glenn L McGrath912d8f42002-11-10 22:46:45 +0000559 }
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000560 if (G.s_semid != -1) {
561 semctl(G.s_semid, 0, IPC_RMID, 0);
Glenn L McGrath912d8f42002-11-10 22:46:45 +0000562 }
Mark Whitley6317c4b2001-03-12 22:51:50 +0000563}
564
"Vladimir N. Oleynik"e4baaa22005-09-22 12:59:26 +0000565static void ipcsyslog_init(void)
Glenn L McGrath912d8f42002-11-10 22:46:45 +0000566{
Denis Vlasenkoa9b60e92007-01-04 17:59:59 +0000567 if (DEBUG)
Denis Vlasenkobd1aeeb2008-06-11 15:43:19 +0000568 printf("shmget(%x, %d,...)\n", (int)KEY_ID, G.shm_size);
Denis Vlasenkoa9b60e92007-01-04 17:59:59 +0000569
Denis Vlasenkoa1120a82007-08-14 10:27:56 +0000570 G.shmid = shmget(KEY_ID, G.shm_size, IPC_CREAT | 0644);
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000571 if (G.shmid == -1) {
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000572 bb_perror_msg_and_die("shmget");
573 }
Mark Whitley6317c4b2001-03-12 22:51:50 +0000574
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000575 G.shbuf = shmat(G.shmid, NULL, 0);
Denis Vlasenko4e9ca752008-01-07 15:58:02 +0000576 if (G.shbuf == (void*) -1L) { /* shmat has bizarre error return */
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000577 bb_perror_msg_and_die("shmat");
578 }
Mark Whitley6317c4b2001-03-12 22:51:50 +0000579
Denis Vlasenko5f1b1492007-08-12 21:33:06 +0000580 memset(G.shbuf, 0, G.shm_size);
581 G.shbuf->size = G.shm_size - offsetof(struct shbuf_ds, data) - 1;
582 /*G.shbuf->tail = 0;*/
Mark Whitley6317c4b2001-03-12 22:51:50 +0000583
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200584 /* we'll trust the OS to set initial semval to 0 (let's hope) */
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000585 G.s_semid = semget(KEY_ID, 2, IPC_CREAT | IPC_EXCL | 1023);
586 if (G.s_semid == -1) {
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000587 if (errno == EEXIST) {
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000588 G.s_semid = semget(KEY_ID, 2, 0);
589 if (G.s_semid != -1)
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000590 return;
Glenn L McGrath912d8f42002-11-10 22:46:45 +0000591 }
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000592 bb_perror_msg_and_die("semget");
Mark Whitley6317c4b2001-03-12 22:51:50 +0000593 }
594}
595
Denis Vlasenkoa0e2a0a2007-01-04 21:22:11 +0000596/* Write message to shared mem buffer */
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200597static void log_to_shmem(const char *msg)
Glenn L McGrath912d8f42002-11-10 22:46:45 +0000598{
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000599 int old_tail, new_tail;
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200600 int len;
Mark Whitley6317c4b2001-03-12 22:51:50 +0000601
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000602 if (semop(G.s_semid, G.SMwdn, 3) == -1) {
Bernhard Reutner-Fischerd591a362006-08-20 17:35:13 +0000603 bb_perror_msg_and_die("SMwdn");
604 }
Mark Whitley6317c4b2001-03-12 22:51:50 +0000605
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000606 /* Circular Buffer Algorithm:
Mark Whitley6317c4b2001-03-12 22:51:50 +0000607 * --------------------------
Denis Vlasenko150f4022007-01-13 21:06:21 +0000608 * tail == position where to store next syslog message.
Denis Vlasenko5f1b1492007-08-12 21:33:06 +0000609 * tail's max value is (shbuf->size - 1)
610 * Last byte of buffer is never used and remains NUL.
Mark Whitley6317c4b2001-03-12 22:51:50 +0000611 */
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200612 len = strlen(msg) + 1; /* length with NUL included */
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000613 again:
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000614 old_tail = G.shbuf->tail;
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000615 new_tail = old_tail + len;
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000616 if (new_tail < G.shbuf->size) {
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000617 /* store message, set new tail */
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000618 memcpy(G.shbuf->data + old_tail, msg, len);
619 G.shbuf->tail = new_tail;
Glenn L McGrath912d8f42002-11-10 22:46:45 +0000620 } else {
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000621 /* k == available buffer space ahead of old tail */
Denis Vlasenko5f1b1492007-08-12 21:33:06 +0000622 int k = G.shbuf->size - old_tail;
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000623 /* copy what fits to the end of buffer, and repeat */
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000624 memcpy(G.shbuf->data + old_tail, msg, k);
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000625 msg += k;
626 len -= k;
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000627 G.shbuf->tail = 0;
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000628 goto again;
Mark Whitley6317c4b2001-03-12 22:51:50 +0000629 }
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000630 if (semop(G.s_semid, G.SMwup, 1) == -1) {
Bernhard Reutner-Fischerd591a362006-08-20 17:35:13 +0000631 bb_perror_msg_and_die("SMwup");
632 }
Denis Vlasenkoa9b60e92007-01-04 17:59:59 +0000633 if (DEBUG)
Denis Vlasenko5f1b1492007-08-12 21:33:06 +0000634 printf("tail:%d\n", G.shbuf->tail);
Mark Whitley6317c4b2001-03-12 22:51:50 +0000635}
Rob Landley028ba282006-08-28 20:16:42 +0000636#else
Peter Korsgaard99807072013-01-06 13:11:04 +0100637static void ipcsyslog_cleanup(void) {}
638static void ipcsyslog_init(void) {}
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000639void log_to_shmem(const char *msg);
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000640#endif /* FEATURE_IPC_SYSLOG */
641
Peter Korsgaardcd776cf2013-01-06 00:07:19 +0100642#if ENABLE_FEATURE_KMSG_SYSLOG
643static void kmsg_init(void)
644{
645 G.kmsgfd = xopen("/dev/kmsg", O_WRONLY);
646
647 /*
648 * kernel < 3.5 expects single char printk KERN_* priority prefix,
649 * from 3.5 onwards the full syslog facility/priority format is supported
650 */
651 if (get_linux_version_code() < KERNEL_VERSION(3,5,0))
652 G.primask = LOG_PRIMASK;
653 else
654 G.primask = -1;
655}
656
657static void kmsg_cleanup(void)
658{
659 if (ENABLE_FEATURE_CLEAN_UP)
660 close(G.kmsgfd);
661}
662
663/* Write message to /dev/kmsg */
664static void log_to_kmsg(int pri, const char *msg)
665{
666 /*
667 * kernel < 3.5 expects single char printk KERN_* priority prefix,
668 * from 3.5 onwards the full syslog facility/priority format is supported
669 */
670 pri &= G.primask;
671
Joshua Judson Rosene46047a2014-07-02 19:41:41 +0200672 full_write(G.kmsgfd, G.printbuf, sprintf(G.printbuf, "<%d>%s\n", pri, msg));
Peter Korsgaardcd776cf2013-01-06 00:07:19 +0100673}
674#else
Peter Korsgaard99807072013-01-06 13:11:04 +0100675static void kmsg_init(void) {}
676static void kmsg_cleanup(void) {}
677static void log_to_kmsg(int pri UNUSED_PARAM, const char *msg UNUSED_PARAM) {}
Peter Korsgaardcd776cf2013-01-06 00:07:19 +0100678#endif /* FEATURE_KMSG_SYSLOG */
679
Erik Andersen983b51b2000-04-04 18:14:25 +0000680/* Print a message to the log file. */
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200681static void log_locally(time_t now, char *msg, logFile_t *log_file)
Eric Andersen3843e961999-11-25 07:30:46 +0000682{
Denis Vlasenko0d948202008-12-09 22:53:31 +0000683#ifdef SYSLOGD_WRLOCK
Denis Vlasenkob8934972007-01-04 18:02:32 +0000684 struct flock fl;
Denis Vlasenko0d948202008-12-09 22:53:31 +0000685#endif
Denis Vlasenkob8934972007-01-04 18:02:32 +0000686 int len = strlen(msg);
Eric Andersen3843e961999-11-25 07:30:46 +0000687
Denys Vlasenkoa28c1b22014-07-02 15:21:30 +0200688 /* fd can't be 0 (we connect fd 0 to /dev/log socket) */
689 /* fd is 1 if "-O -" is in use */
690 if (log_file->fd > 1) {
Joshua Judson Rosenae57fca2014-07-03 14:51:47 +0200691 /* Reopen log files every second. This allows admin
692 * to delete the files and not worry about restarting us.
Denis Vlasenkod9415d62009-03-02 14:26:28 +0000693 * This costs almost nothing since it happens
Joshua Judson Rosenae57fca2014-07-03 14:51:47 +0200694 * _at most_ once a second for each file, and happens
695 * only when each file is actually written.
Denis Vlasenkod9415d62009-03-02 14:26:28 +0000696 */
Denis Vlasenko4dada742008-01-03 12:13:42 +0000697 if (!now)
698 now = time(NULL);
Joshua Judson Rosenae57fca2014-07-03 14:51:47 +0200699 if (log_file->last_log_time != now) {
700 log_file->last_log_time = now;
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200701 close(log_file->fd);
Denis Vlasenkob8934972007-01-04 18:02:32 +0000702 goto reopen;
703 }
Denys Vlasenkoa28c1b22014-07-02 15:21:30 +0200704 }
705 else if (log_file->fd == 1) {
706 /* We are logging to stdout: do nothing */
707 }
708 else {
709 if (LONE_DASH(log_file->path)) {
710 log_file->fd = 1;
711 /* log_file->isRegular = 0; - already is */
712 } else {
Denis Vlasenkob8934972007-01-04 18:02:32 +0000713 reopen:
Denys Vlasenkoa28c1b22014-07-02 15:21:30 +0200714 log_file->fd = open(log_file->path, O_WRONLY | O_CREAT
Denis Vlasenkod9415d62009-03-02 14:26:28 +0000715 | O_NOCTTY | O_APPEND | O_NONBLOCK,
716 0666);
Denys Vlasenkoa28c1b22014-07-02 15:21:30 +0200717 if (log_file->fd < 0) {
718 /* cannot open logfile? - print to /dev/console then */
719 int fd = device_open(DEV_CONSOLE, O_WRONLY | O_NOCTTY | O_NONBLOCK);
720 if (fd < 0)
721 fd = 2; /* then stderr, dammit */
722 full_write(fd, msg, len);
723 if (fd != 2)
724 close(fd);
725 return;
726 }
Denis Vlasenkob8934972007-01-04 18:02:32 +0000727#if ENABLE_FEATURE_ROTATE_LOGFILE
Denys Vlasenkoa28c1b22014-07-02 15:21:30 +0200728 {
729 struct stat statf;
730 log_file->isRegular = (fstat(log_file->fd, &statf) == 0 && S_ISREG(statf.st_mode));
731 /* bug (mostly harmless): can wrap around if file > 4gb */
732 log_file->size = statf.st_size;
733 }
Denis Vlasenkob8934972007-01-04 18:02:32 +0000734#endif
Denys Vlasenkoa28c1b22014-07-02 15:21:30 +0200735 }
Denis Vlasenkob8934972007-01-04 18:02:32 +0000736 }
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000737
Denis Vlasenko0d948202008-12-09 22:53:31 +0000738#ifdef SYSLOGD_WRLOCK
Denis Vlasenkob8934972007-01-04 18:02:32 +0000739 fl.l_whence = SEEK_SET;
740 fl.l_start = 0;
741 fl.l_len = 1;
742 fl.l_type = F_WRLCK;
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200743 fcntl(log_file->fd, F_SETLKW, &fl);
Denis Vlasenko0d948202008-12-09 22:53:31 +0000744#endif
Bernhard Reutner-Fischerd591a362006-08-20 17:35:13 +0000745
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000746#if ENABLE_FEATURE_ROTATE_LOGFILE
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200747 if (G.logFileSize && log_file->isRegular && log_file->size > G.logFileSize) {
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000748 if (G.logFileRotate) { /* always 0..99 */
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200749 int i = strlen(log_file->path) + 3 + 1;
Denis Vlasenkob8934972007-01-04 18:02:32 +0000750 char oldFile[i];
751 char newFile[i];
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000752 i = G.logFileRotate - 1;
Denis Vlasenkob8934972007-01-04 18:02:32 +0000753 /* rename: f.8 -> f.9; f.7 -> f.8; ... */
754 while (1) {
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200755 sprintf(newFile, "%s.%d", log_file->path, i);
Denis Vlasenkob8934972007-01-04 18:02:32 +0000756 if (i == 0) break;
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200757 sprintf(oldFile, "%s.%d", log_file->path, --i);
Denis Vlasenko69dc3252008-05-24 21:03:53 +0000758 /* ignore errors - file might be missing */
759 rename(oldFile, newFile);
Eric Andersen29c77f72003-10-09 09:43:18 +0000760 }
Denis Vlasenkob8934972007-01-04 18:02:32 +0000761 /* newFile == "f.0" now */
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200762 rename(log_file->path, newFile);
Eric Andersen29c77f72003-10-09 09:43:18 +0000763 }
Joshua Judson Rosen1b90e032014-05-20 01:02:18 -0400764
Joshua Judson Rosen9aa6ffb2014-05-20 01:02:20 -0400765 /* We may or may not have just renamed the file away;
766 * if we didn't rename because we aren't keeping any backlog,
767 * then it's time to clobber the file. If we did rename it...,
768 * incredibly, if F and F.0 are hardlinks, POSIX _demands_
769 * that rename returns 0 but does not remove F!!!
770 * (hardlinked F/F.0 pair was observed after
771 * power failure during rename()).
772 * So ensure old file is gone in any case:
Joshua Judson Rosen1b90e032014-05-20 01:02:18 -0400773 */
Joshua Judson Rosen9aa6ffb2014-05-20 01:02:20 -0400774 unlink(log_file->path);
Joshua Judson Rosenb905d6c2014-05-20 01:02:19 -0400775#ifdef SYSLOGD_WRLOCK
776 fl.l_type = F_UNLCK;
777 fcntl(log_file->fd, F_SETLKW, &fl);
778#endif
Joshua Judson Rosen9aa6ffb2014-05-20 01:02:20 -0400779 close(log_file->fd);
780 goto reopen;
Eric Andersen3843e961999-11-25 07:30:46 +0000781 }
Joshua Judson Rosene46047a2014-07-02 19:41:41 +0200782/* TODO: what to do on write errors ("disk full")? */
783 len = full_write(log_file->fd, msg, len);
784 if (len > 0)
785 log_file->size += len;
786#else
787 full_write(log_file->fd, msg, len);
Denis Vlasenkob8934972007-01-04 18:02:32 +0000788#endif
Joshua Judson Rosene46047a2014-07-02 19:41:41 +0200789
Denis Vlasenko0d948202008-12-09 22:53:31 +0000790#ifdef SYSLOGD_WRLOCK
Denis Vlasenkob8934972007-01-04 18:02:32 +0000791 fl.l_type = F_UNLCK;
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200792 fcntl(log_file->fd, F_SETLKW, &fl);
Denis Vlasenko0d948202008-12-09 22:53:31 +0000793#endif
Eric Andersenb99df0f1999-11-24 09:04:33 +0000794}
795
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000796static void parse_fac_prio_20(int pri, char *res20)
Eric Andersen3843e961999-11-25 07:30:46 +0000797{
Denis Vlasenko3c8b5ba2007-06-04 18:23:59 +0000798 const CODE *c_pri, *c_fac;
Eric Andersenb99df0f1999-11-24 09:04:33 +0000799
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200800 c_fac = find_by_val(LOG_FAC(pri) << 3, facilitynames);
801 if (c_fac) {
802 c_pri = find_by_val(LOG_PRI(pri), prioritynames);
803 if (c_pri) {
804 snprintf(res20, 20, "%s.%s", c_fac->c_name, c_pri->c_name);
805 return;
Glenn L McGrath912d8f42002-11-10 22:46:45 +0000806 }
Erik Andersen9ffdaa62000-02-11 21:55:04 +0000807 }
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200808 snprintf(res20, 20, "<%d>", pri);
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000809}
Eric Andersen3843e961999-11-25 07:30:46 +0000810
Denis Vlasenkoa0e2a0a2007-01-04 21:22:11 +0000811/* len parameter is used only for "is there a timestamp?" check.
Denis Vlasenko018b1552007-11-06 01:38:46 +0000812 * NB: some callers cheat and supply len==0 when they know
813 * that there is no timestamp, short-circuiting the test. */
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000814static void timestamp_and_log(int pri, char *msg, int len)
815{
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000816 char *timestamp;
Denis Vlasenko4dada742008-01-03 12:13:42 +0000817 time_t now;
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000818
Denis Vlasenko574c3162009-04-22 02:53:02 +0000819 /* Jan 18 00:11:22 msg... */
820 /* 01234567890123456 */
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000821 if (len < 16 || msg[3] != ' ' || msg[6] != ' '
822 || msg[9] != ':' || msg[12] != ':' || msg[15] != ' '
823 ) {
Erik Andersene49d5ec2000-02-08 19:58:47 +0000824 time(&now);
Denis Vlasenko4dada742008-01-03 12:13:42 +0000825 timestamp = ctime(&now) + 4; /* skip day of week */
Erik Andersene49d5ec2000-02-08 19:58:47 +0000826 } else {
Denis Vlasenko4dada742008-01-03 12:13:42 +0000827 now = 0;
Erik Andersene49d5ec2000-02-08 19:58:47 +0000828 timestamp = msg;
Erik Andersene49d5ec2000-02-08 19:58:47 +0000829 msg += 16;
830 }
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000831 timestamp[15] = '\0';
Eric Andersen3843e961999-11-25 07:30:46 +0000832
Peter Korsgaard99807072013-01-06 13:11:04 +0100833 if (option_mask32 & OPT_kmsg) {
Peter Korsgaardcd776cf2013-01-06 00:07:19 +0100834 log_to_kmsg(pri, msg);
835 return;
836 }
837
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000838 if (option_mask32 & OPT_small)
839 sprintf(G.printbuf, "%s %s\n", timestamp, msg);
840 else {
841 char res[20];
842 parse_fac_prio_20(pri, res);
Denis Vlasenko6f1713f2008-02-25 23:23:58 +0000843 sprintf(G.printbuf, "%s %.64s %s %s\n", timestamp, G.hostname, res, msg);
Eric Andersenbf2b8ae2000-12-08 19:52:01 +0000844 }
Denis Vlasenko4dada742008-01-03 12:13:42 +0000845
846 /* Log message locally (to file or shared mem) */
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200847#if ENABLE_FEATURE_SYSLOGD_CFG
848 {
849 bool match = 0;
850 logRule_t *rule;
851 uint8_t facility = LOG_FAC(pri);
852 uint8_t prio_bit = 1 << LOG_PRI(pri);
853
854 for (rule = G.log_rules; rule; rule = rule->next) {
855 if (rule->enabled_facility_priomap[facility] & prio_bit) {
856 log_locally(now, G.printbuf, rule->file);
857 match = 1;
858 }
859 }
860 if (match)
861 return;
862 }
863#endif
864 if (LOG_PRI(pri) < G.logLevel) {
865#if ENABLE_FEATURE_IPC_SYSLOG
866 if ((option_mask32 & OPT_circularlog) && G.shbuf) {
Denys Vlasenko514cbfc2011-09-16 13:28:52 +0200867 log_to_shmem(G.printbuf);
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200868 return;
869 }
870#endif
871 log_locally(now, G.printbuf, &G.logFile);
872 }
Denis Vlasenko4dada742008-01-03 12:13:42 +0000873}
874
875static void timestamp_and_log_internal(const char *msg)
876{
Denis Vlasenko0d948202008-12-09 22:53:31 +0000877 /* -L, or no -R */
Denis Vlasenko4dada742008-01-03 12:13:42 +0000878 if (ENABLE_FEATURE_REMOTE_LOG && !(option_mask32 & OPT_locallog))
879 return;
880 timestamp_and_log(LOG_SYSLOG | LOG_INFO, (char*)msg, 0);
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000881}
Glenn L McGrath73ebb882004-09-14 18:12:13 +0000882
Denis Vlasenko75cddd82008-02-13 09:19:14 +0000883/* tmpbuf[len] is a NUL byte (set by caller), but there can be other,
884 * embedded NULs. Split messages on each of these NULs, parse prio,
885 * escape control chars and log each locally. */
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000886static void split_escape_and_log(char *tmpbuf, int len)
887{
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000888 char *p = tmpbuf;
889
890 tmpbuf += len;
891 while (p < tmpbuf) {
892 char c;
Denis Vlasenko4f93cde2007-03-20 20:03:03 +0000893 char *q = G.parsebuf;
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000894 int pri = (LOG_USER | LOG_NOTICE);
895
896 if (*p == '<') {
Denis Vlasenkoa0e2a0a2007-01-04 21:22:11 +0000897 /* Parse the magic priority number */
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000898 pri = bb_strtou(p + 1, &p, 10);
Denis Vlasenko018b1552007-11-06 01:38:46 +0000899 if (*p == '>')
900 p++;
901 if (pri & ~(LOG_FACMASK | LOG_PRIMASK))
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000902 pri = (LOG_USER | LOG_NOTICE);
Denis Vlasenko1decd0e2006-09-30 19:17:40 +0000903 }
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000904
905 while ((c = *p++)) {
906 if (c == '\n')
907 c = ' ';
Denis Vlasenko2ee028d2007-06-21 13:44:53 +0000908 if (!(c & ~0x1f) && c != '\t') {
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000909 *q++ = '^';
910 c += '@'; /* ^@, ^A, ^B... */
911 }
912 *q++ = c;
913 }
914 *q = '\0';
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000915
Denis Vlasenkoa0e2a0a2007-01-04 21:22:11 +0000916 /* Now log it */
Sergey Naumov73ef15c2011-04-10 07:34:27 +0200917 timestamp_and_log(pri, G.parsebuf, q - G.parsebuf);
Eric Andersen7f94a5c2004-06-22 10:12:59 +0000918 }
Eric Andersen3843e961999-11-25 07:30:46 +0000919}
920
Denis Vlasenko4998c812007-02-14 20:51:46 +0000921#ifdef SYSLOGD_MARK
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000922static void do_mark(int sig)
Eric Andersen3843e961999-11-25 07:30:46 +0000923{
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000924 if (G.markInterval) {
Denis Vlasenko4dada742008-01-03 12:13:42 +0000925 timestamp_and_log_internal("-- MARK --");
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000926 alarm(G.markInterval);
Erik Andersene49d5ec2000-02-08 19:58:47 +0000927 }
Eric Andersen3843e961999-11-25 07:30:46 +0000928}
Denis Vlasenko4998c812007-02-14 20:51:46 +0000929#endif
Eric Andersen3843e961999-11-25 07:30:46 +0000930
Denis Vlasenkod031b202007-11-10 01:28:19 +0000931/* Don't inline: prevent struct sockaddr_un to take up space on stack
932 * permanently */
933static NOINLINE int create_socket(void)
Eric Andersen3843e961999-11-25 07:30:46 +0000934{
Erik Andersene49d5ec2000-02-08 19:58:47 +0000935 struct sockaddr_un sunx;
Denis Vlasenkod7ecd862007-09-07 13:53:32 +0000936 int sock_fd;
Denis Vlasenko6ca04442007-02-11 16:19:28 +0000937 char *dev_log_name;
Erik Andersenf13df372000-04-18 23:51:51 +0000938
Denis Vlasenkod031b202007-11-10 01:28:19 +0000939 memset(&sunx, 0, sizeof(sunx));
940 sunx.sun_family = AF_UNIX;
941
942 /* Unlink old /dev/log or object it points to. */
943 /* (if it exists, bind will fail) */
Cédric Cabessaadc30b42013-08-05 02:09:16 +0200944 strcpy(sunx.sun_path, _PATH_LOG);
945 dev_log_name = xmalloc_follow_symlinks(_PATH_LOG);
Denis Vlasenkod031b202007-11-10 01:28:19 +0000946 if (dev_log_name) {
947 safe_strncpy(sunx.sun_path, dev_log_name, sizeof(sunx.sun_path));
948 free(dev_log_name);
949 }
950 unlink(sunx.sun_path);
951
952 sock_fd = xsocket(AF_UNIX, SOCK_DGRAM, 0);
953 xbind(sock_fd, (struct sockaddr *) &sunx, sizeof(sunx));
Cédric Cabessaadc30b42013-08-05 02:09:16 +0200954 chmod(_PATH_LOG, 0666);
Denis Vlasenkod031b202007-11-10 01:28:19 +0000955
956 return sock_fd;
957}
958
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000959#if ENABLE_FEATURE_REMOTE_LOG
Thomas Geuligd2f77792010-02-28 13:01:59 +0100960static int try_to_resolve_remote(remoteHost_t *rh)
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000961{
Thomas Geuligd2f77792010-02-28 13:01:59 +0100962 if (!rh->remoteAddr) {
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000963 unsigned now = monotonic_sec();
964
965 /* Don't resolve name too often - DNS timeouts can be big */
Thomas Geuligd2f77792010-02-28 13:01:59 +0100966 if ((now - rh->last_dns_resolve) < DNS_WAIT_SEC)
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000967 return -1;
Thomas Geuligd2f77792010-02-28 13:01:59 +0100968 rh->last_dns_resolve = now;
969 rh->remoteAddr = host2sockaddr(rh->remoteHostname, 514);
970 if (!rh->remoteAddr)
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000971 return -1;
972 }
Daniel Dickinsone74d7982010-08-03 04:26:20 +0200973 return xsocket(rh->remoteAddr->u.sa.sa_family, SOCK_DGRAM, 0);
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +0000974}
975#endif
976
Denis Vlasenkoa60f84e2008-07-05 09:18:54 +0000977static void do_syslogd(void) NORETURN;
Denis Vlasenkod031b202007-11-10 01:28:19 +0000978static void do_syslogd(void)
979{
Thomas Geuligd2f77792010-02-28 13:01:59 +0100980#if ENABLE_FEATURE_REMOTE_LOG
981 llist_t *item;
982#endif
Denis Vlasenkobe048f22008-02-26 20:13:52 +0000983#if ENABLE_FEATURE_SYSLOGD_DUP
984 int last_sz = -1;
985 char *last_buf;
986 char *recvbuf = G.recvbuf;
987#else
988#define recvbuf (G.recvbuf)
989#endif
Denis Vlasenkod031b202007-11-10 01:28:19 +0000990
Denis Vlasenko0d948202008-12-09 22:53:31 +0000991 /* Set up signal handlers (so that they interrupt read()) */
992 signal_no_SA_RESTART_empty_mask(SIGTERM, record_signo);
993 signal_no_SA_RESTART_empty_mask(SIGINT, record_signo);
994 //signal_no_SA_RESTART_empty_mask(SIGQUIT, record_signo);
Glenn L McGrath912d8f42002-11-10 22:46:45 +0000995 signal(SIGHUP, SIG_IGN);
Denis Vlasenko4998c812007-02-14 20:51:46 +0000996#ifdef SYSLOGD_MARK
Denis Vlasenkoceab8702007-01-04 17:57:54 +0000997 signal(SIGALRM, do_mark);
Denis Vlasenko5e892ba2007-03-15 19:50:46 +0000998 alarm(G.markInterval);
Denis Vlasenko4998c812007-02-14 20:51:46 +0000999#endif
Denys Vlasenkoa28c1b22014-07-02 15:21:30 +02001000 xmove_fd(create_socket(), STDIN_FILENO);
Eric Andersenb99df0f1999-11-24 09:04:33 +00001001
Peter Korsgaard99807072013-01-06 13:11:04 +01001002 if (option_mask32 & OPT_circularlog)
Glenn L McGrath912d8f42002-11-10 22:46:45 +00001003 ipcsyslog_init();
Eric Andersenea906502001-04-05 20:55:17 +00001004
Peter Korsgaard99807072013-01-06 13:11:04 +01001005 if (option_mask32 & OPT_kmsg)
Peter Korsgaardcd776cf2013-01-06 00:07:19 +01001006 kmsg_init();
1007
Denis Vlasenko4dada742008-01-03 12:13:42 +00001008 timestamp_and_log_internal("syslogd started: BusyBox v" BB_VER);
Erik Andersene49d5ec2000-02-08 19:58:47 +00001009
Denis Vlasenko0d948202008-12-09 22:53:31 +00001010 while (!bb_got_signal) {
Denis Vlasenko6b06cb82008-05-15 21:30:45 +00001011 ssize_t sz;
Denis Vlasenkobe048f22008-02-26 20:13:52 +00001012
1013#if ENABLE_FEATURE_SYSLOGD_DUP
1014 last_buf = recvbuf;
1015 if (recvbuf == G.recvbuf)
1016 recvbuf = G.recvbuf + MAX_READ;
1017 else
1018 recvbuf = G.recvbuf;
1019#endif
Denis Vlasenko018b1552007-11-06 01:38:46 +00001020 read_again:
Denys Vlasenkoa28c1b22014-07-02 15:21:30 +02001021 sz = read(STDIN_FILENO, recvbuf, MAX_READ - 1);
Denis Vlasenko0d948202008-12-09 22:53:31 +00001022 if (sz < 0) {
1023 if (!bb_got_signal)
Cédric Cabessaadc30b42013-08-05 02:09:16 +02001024 bb_perror_msg("read from %s", _PATH_LOG);
Denis Vlasenko0d948202008-12-09 22:53:31 +00001025 break;
1026 }
Erik Andersene49d5ec2000-02-08 19:58:47 +00001027
Denis Vlasenko75cddd82008-02-13 09:19:14 +00001028 /* Drop trailing '\n' and NULs (typically there is one NUL) */
Denis Vlasenko018b1552007-11-06 01:38:46 +00001029 while (1) {
1030 if (sz == 0)
1031 goto read_again;
Denis Vlasenkocb12cb22007-11-06 11:34:03 +00001032 /* man 3 syslog says: "A trailing newline is added when needed".
1033 * However, neither glibc nor uclibc do this:
1034 * syslog(prio, "test") sends "test\0" to /dev/log,
Denis Vlasenko75cddd82008-02-13 09:19:14 +00001035 * syslog(prio, "test\n") sends "test\n\0".
Denis Vlasenkocb12cb22007-11-06 11:34:03 +00001036 * IOW: newline is passed verbatim!
1037 * I take it to mean that it's syslogd's job
Denis Vlasenko75cddd82008-02-13 09:19:14 +00001038 * to make those look identical in the log files. */
Denis Vlasenkobe048f22008-02-26 20:13:52 +00001039 if (recvbuf[sz-1] != '\0' && recvbuf[sz-1] != '\n')
Denis Vlasenko018b1552007-11-06 01:38:46 +00001040 break;
1041 sz--;
1042 }
Denis Vlasenkobe048f22008-02-26 20:13:52 +00001043#if ENABLE_FEATURE_SYSLOGD_DUP
1044 if ((option_mask32 & OPT_dup) && (sz == last_sz))
1045 if (memcmp(last_buf, recvbuf, sz) == 0)
1046 continue;
1047 last_sz = sz;
1048#endif
Denis Vlasenkoceab8702007-01-04 17:57:54 +00001049#if ENABLE_FEATURE_REMOTE_LOG
Thomas Geuligd2f77792010-02-28 13:01:59 +01001050 /* Stock syslogd sends it '\n'-terminated
1051 * over network, mimic that */
1052 recvbuf[sz] = '\n';
1053
Denis Vlasenkod7ecd862007-09-07 13:53:32 +00001054 /* We are not modifying log messages in any way before send */
1055 /* Remote site cannot trust _us_ anyway and need to do validation again */
Thomas Geuligd2f77792010-02-28 13:01:59 +01001056 for (item = G.remoteHosts; item != NULL; item = item->link) {
1057 remoteHost_t *rh = (remoteHost_t *)item->data;
1058
1059 if (rh->remoteFD == -1) {
1060 rh->remoteFD = try_to_resolve_remote(rh);
1061 if (rh->remoteFD == -1)
1062 continue;
Glenn L McGrath912d8f42002-11-10 22:46:45 +00001063 }
Daniel Dickinsone74d7982010-08-03 04:26:20 +02001064
1065 /* Send message to remote logger.
1066 * On some errors, close and set remoteFD to -1
1067 * so that DNS resolution is retried.
1068 */
1069 if (sendto(rh->remoteFD, recvbuf, sz+1,
1070 MSG_DONTWAIT | MSG_NOSIGNAL,
1071 &(rh->remoteAddr->u.sa), rh->remoteAddr->len) == -1
1072 ) {
1073 switch (errno) {
1074 case ECONNRESET:
1075 case ENOTCONN: /* paranoia */
1076 case EPIPE:
1077 close(rh->remoteFD);
1078 rh->remoteFD = -1;
1079 free(rh->remoteAddr);
1080 rh->remoteAddr = NULL;
1081 }
1082 }
Denis Vlasenko87f3b262007-09-07 13:43:28 +00001083 }
Denis Vlasenkod7ecd862007-09-07 13:53:32 +00001084#endif
Denis Vlasenko75cddd82008-02-13 09:19:14 +00001085 if (!ENABLE_FEATURE_REMOTE_LOG || (option_mask32 & OPT_locallog)) {
Denis Vlasenkobe048f22008-02-26 20:13:52 +00001086 recvbuf[sz] = '\0'; /* ensure it *is* NUL terminated */
1087 split_escape_and_log(recvbuf, sz);
Denis Vlasenko75cddd82008-02-13 09:19:14 +00001088 }
Denis Vlasenko0d948202008-12-09 22:53:31 +00001089 } /* while (!bb_got_signal) */
1090
1091 timestamp_and_log_internal("syslogd exiting");
Anthony G. Basile12677ac2012-12-10 14:49:39 -05001092 remove_pidfile(CONFIG_PID_FILE_PATH "/syslogd.pid");
Peter Korsgaard99807072013-01-06 13:11:04 +01001093 ipcsyslog_cleanup();
1094 if (option_mask32 & OPT_kmsg)
Peter Korsgaardcd776cf2013-01-06 00:07:19 +01001095 kmsg_cleanup();
Denis Vlasenko0d948202008-12-09 22:53:31 +00001096 kill_myself_with_sig(bb_got_signal);
Denis Vlasenkobd1aeeb2008-06-11 15:43:19 +00001097#undef recvbuf
Eric Andersenb99df0f1999-11-24 09:04:33 +00001098}
1099
Denis Vlasenko9b49a5e2007-10-11 10:05:36 +00001100int syslogd_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
Denis Vlasenkoa60f84e2008-07-05 09:18:54 +00001101int syslogd_main(int argc UNUSED_PARAM, char **argv)
Eric Andersen3843e961999-11-25 07:30:46 +00001102{
Denis Vlasenko0d948202008-12-09 22:53:31 +00001103 int opts;
Thomas Geuligd2f77792010-02-28 13:01:59 +01001104 char OPTION_DECL;
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +00001105#if ENABLE_FEATURE_REMOTE_LOG
Thomas Geuligd2f77792010-02-28 13:01:59 +01001106 llist_t *remoteAddrList = NULL;
Denis Vlasenko4f2e8bc2008-01-03 12:12:27 +00001107#endif
Denis Vlasenko5e892ba2007-03-15 19:50:46 +00001108
Thomas Geuligd2f77792010-02-28 13:01:59 +01001109 INIT_G();
1110
Denys Vlasenko237bedd2016-07-06 21:58:02 +02001111 /* No non-option params */
1112 opt_complementary = "=0";
Denis Vlasenko0d948202008-12-09 22:53:31 +00001113 opts = getopt32(argv, OPTION_STR, OPTION_PARAM);
Thomas Geuligd2f77792010-02-28 13:01:59 +01001114#if ENABLE_FEATURE_REMOTE_LOG
1115 while (remoteAddrList) {
1116 remoteHost_t *rh = xzalloc(sizeof(*rh));
1117 rh->remoteHostname = llist_pop(&remoteAddrList);
1118 rh->remoteFD = -1;
1119 rh->last_dns_resolve = monotonic_sec() - DNS_WAIT_SEC - 1;
1120 llist_add_to(&G.remoteHosts, rh);
1121 }
1122#endif
1123
Denis Vlasenko4998c812007-02-14 20:51:46 +00001124#ifdef SYSLOGD_MARK
Denis Vlasenko0d948202008-12-09 22:53:31 +00001125 if (opts & OPT_mark) // -m
Denis Vlasenko5e892ba2007-03-15 19:50:46 +00001126 G.markInterval = xatou_range(opt_m, 0, INT_MAX/60) * 60;
Denis Vlasenko4998c812007-02-14 20:51:46 +00001127#endif
Denis Vlasenko0d948202008-12-09 22:53:31 +00001128 //if (opts & OPT_nofork) // -n
1129 //if (opts & OPT_outfile) // -O
1130 if (opts & OPT_loglevel) // -l
Denis Vlasenko5e892ba2007-03-15 19:50:46 +00001131 G.logLevel = xatou_range(opt_l, 1, 8);
Denis Vlasenko0d948202008-12-09 22:53:31 +00001132 //if (opts & OPT_small) // -S
Denis Vlasenko14c19402006-09-30 19:20:00 +00001133#if ENABLE_FEATURE_ROTATE_LOGFILE
Denis Vlasenko0d948202008-12-09 22:53:31 +00001134 if (opts & OPT_filesize) // -s
Denis Vlasenko5e892ba2007-03-15 19:50:46 +00001135 G.logFileSize = xatou_range(opt_s, 0, INT_MAX/1024) * 1024;
Denis Vlasenko0d948202008-12-09 22:53:31 +00001136 if (opts & OPT_rotatecnt) // -b
Denis Vlasenko5e892ba2007-03-15 19:50:46 +00001137 G.logFileRotate = xatou_range(opt_b, 0, 99);
Denis Vlasenko14c19402006-09-30 19:20:00 +00001138#endif
Denis Vlasenko14c19402006-09-30 19:20:00 +00001139#if ENABLE_FEATURE_IPC_SYSLOG
Denis Vlasenko218f2f42007-01-24 22:02:01 +00001140 if (opt_C) // -Cn
Denis Vlasenko5e892ba2007-03-15 19:50:46 +00001141 G.shm_size = xatoul_range(opt_C, 4, INT_MAX/1024) * 1024;
Denis Vlasenko14c19402006-09-30 19:20:00 +00001142#endif
Eric Andersen4ed17822000-12-11 19:28:29 +00001143 /* If they have not specified remote logging, then log locally */
Denis Vlasenko0d948202008-12-09 22:53:31 +00001144 if (ENABLE_FEATURE_REMOTE_LOG && !(opts & OPT_remotelog)) // -R
Denis Vlasenkoc12f5302006-10-06 09:49:47 +00001145 option_mask32 |= OPT_locallog;
Sergey Naumov73ef15c2011-04-10 07:34:27 +02001146#if ENABLE_FEATURE_SYSLOGD_CFG
1147 parse_syslogdcfg(opt_f);
1148#endif
Mark Whitley6317c4b2001-03-12 22:51:50 +00001149
Erik Andersene49d5ec2000-02-08 19:58:47 +00001150 /* Store away localhost's name before the fork */
Denis Vlasenko6f1713f2008-02-25 23:23:58 +00001151 G.hostname = safe_gethostname();
1152 *strchrnul(G.hostname, '.') = '\0';
Erik Andersene49d5ec2000-02-08 19:58:47 +00001153
Denis Vlasenko0d948202008-12-09 22:53:31 +00001154 if (!(opts & OPT_nofork)) {
Denis Vlasenko5a142022007-03-26 13:20:54 +00001155 bb_daemonize_or_rexec(DAEMON_CHDIR_ROOT, argv);
Eric Andersen35e643b2003-07-28 07:40:39 +00001156 }
Anthony G. Basile12677ac2012-12-10 14:49:39 -05001157
Denys Vlasenkoa4252422010-01-29 16:44:48 +01001158 //umask(0); - why??
Anthony G. Basile12677ac2012-12-10 14:49:39 -05001159 write_pidfile(CONFIG_PID_FILE_PATH "/syslogd.pid");
1160
Denis Vlasenkoceab8702007-01-04 17:57:54 +00001161 do_syslogd();
Denis Vlasenko8a820b22007-01-06 22:08:53 +00001162 /* return EXIT_SUCCESS; */
Eric Andersen3843e961999-11-25 07:30:46 +00001163}
Denis Vlasenkobd1aeeb2008-06-11 15:43:19 +00001164
1165/* Clean up. Needed because we are included from syslogd_and_logger.c */
Denis Vlasenko0d948202008-12-09 22:53:31 +00001166#undef DEBUG
1167#undef SYSLOGD_MARK
1168#undef SYSLOGD_WRLOCK
Denis Vlasenkobd1aeeb2008-06-11 15:43:19 +00001169#undef G
1170#undef GLOBALS
1171#undef INIT_G
1172#undef OPTION_STR
1173#undef OPTION_DECL
1174#undef OPTION_PARAM