blob: d9c2d136cc689ace671efd669003feac666740ac [file] [log] [blame]
markus@openbsd.org5d140192018-07-27 12:03:17 +00001/* $OpenBSD: log.c,v 1.51 2018/07/27 12:03:17 markus Exp $ */
Damien Miller5ce662a1999-11-11 17:57:39 +11002/*
Damien Millere4340be2000-09-16 13:29:08 +11003 * Author: Tatu Ylonen <ylo@cs.hut.fi>
4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5 * All rights reserved
6 *
7 * As far as I am concerned, the code I have written for this software
8 * can be used freely for any purpose. Any derived versions of this
9 * software must be clearly marked as such, and if the derived work is
10 * incompatible with the protocol description in the RFC file, it must be
11 * called by a name other than "ssh" or "Secure Shell".
12 */
13/*
Damien Millere4340be2000-09-16 13:29:08 +110014 * Copyright (c) 2000 Markus Friedl. All rights reserved.
15 *
16 * Redistribution and use in source and binary forms, with or without
17 * modification, are permitted provided that the following conditions
18 * are met:
19 * 1. Redistributions of source code must retain the above copyright
20 * notice, this list of conditions and the following disclaimer.
21 * 2. Redistributions in binary form must reproduce the above copyright
22 * notice, this list of conditions and the following disclaimer in the
23 * documentation and/or other materials provided with the distribution.
24 *
25 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
26 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
27 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
28 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
29 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
30 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
31 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
32 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
33 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Damien Miller5428f641999-11-25 11:54:57 +110035 */
Damien Miller5ce662a1999-11-11 17:57:39 +110036
37#include "includes.h"
Damien Miller5ce662a1999-11-11 17:57:39 +110038
Damien Millerd7834352006-08-05 12:39:39 +100039#include <sys/types.h>
40
Damien Miller03d4d7e2013-04-23 15:21:06 +100041#include <fcntl.h>
Darren Tucker5d196262006-07-12 22:15:16 +100042#include <stdarg.h>
Damien Millera7a73ee2006-08-05 11:37:59 +100043#include <stdio.h>
Damien Millere7a1e5c2006-08-05 11:34:19 +100044#include <stdlib.h>
Damien Millere3476ed2006-07-24 14:13:33 +100045#include <string.h>
Ben Lindstrom8a432f52001-03-05 07:24:46 +000046#include <syslog.h>
Damien Millere6b3b612006-07-24 14:01:23 +100047#include <unistd.h>
Darren Tucker36b78002007-05-20 15:08:15 +100048#include <errno.h>
Damien Miller63b4bcd2013-03-20 12:55:14 +110049#if defined(HAVE_STRNVIS) && defined(HAVE_VIS_H) && !defined(BROKEN_STRNVIS)
Damien Miller5c3a5582003-09-23 22:12:38 +100050# include <vis.h>
51#endif
Ben Lindstrom8a432f52001-03-05 07:24:46 +000052
Damien Millerd7834352006-08-05 12:39:39 +100053#include "log.h"
Damien Miller194a1cb2006-07-10 21:09:22 +100054
Ben Lindstrom8a432f52001-03-05 07:24:46 +000055static LogLevel log_level = SYSLOG_LEVEL_INFO;
56static int log_on_stderr = 1;
Damien Miller03d4d7e2013-04-23 15:21:06 +100057static int log_stderr_fd = STDERR_FILENO;
Ben Lindstrom8a432f52001-03-05 07:24:46 +000058static int log_facility = LOG_AUTH;
59static char *argv0;
Damien Miller8f0bf232011-06-20 14:42:23 +100060static log_handler_fn *log_handler;
61static void *log_handler_ctx;
Ben Lindstrom8a432f52001-03-05 07:24:46 +000062
63extern char *__progname;
64
Damien Miller23a70272004-07-21 10:52:13 +100065#define LOG_SYSLOG_VIS (VIS_CSTYLE|VIS_NL|VIS_TAB|VIS_OCTAL)
66#define LOG_STDERR_VIS (VIS_SAFE|VIS_OCTAL)
67
Ben Lindstrom8a432f52001-03-05 07:24:46 +000068/* textual representation of log-facilities/levels */
69
70static struct {
71 const char *name;
72 SyslogFacility val;
73} log_facilities[] = {
74 { "DAEMON", SYSLOG_FACILITY_DAEMON },
75 { "USER", SYSLOG_FACILITY_USER },
76 { "AUTH", SYSLOG_FACILITY_AUTH },
Damien Miller30246a82001-03-05 21:23:31 +110077#ifdef LOG_AUTHPRIV
78 { "AUTHPRIV", SYSLOG_FACILITY_AUTHPRIV },
79#endif
Ben Lindstrom8a432f52001-03-05 07:24:46 +000080 { "LOCAL0", SYSLOG_FACILITY_LOCAL0 },
81 { "LOCAL1", SYSLOG_FACILITY_LOCAL1 },
82 { "LOCAL2", SYSLOG_FACILITY_LOCAL2 },
83 { "LOCAL3", SYSLOG_FACILITY_LOCAL3 },
84 { "LOCAL4", SYSLOG_FACILITY_LOCAL4 },
85 { "LOCAL5", SYSLOG_FACILITY_LOCAL5 },
86 { "LOCAL6", SYSLOG_FACILITY_LOCAL6 },
87 { "LOCAL7", SYSLOG_FACILITY_LOCAL7 },
Damien Millerfcd93202002-02-05 12:26:34 +110088 { NULL, SYSLOG_FACILITY_NOT_SET }
Ben Lindstrom8a432f52001-03-05 07:24:46 +000089};
90
91static struct {
92 const char *name;
93 LogLevel val;
94} log_levels[] =
95{
96 { "QUIET", SYSLOG_LEVEL_QUIET },
97 { "FATAL", SYSLOG_LEVEL_FATAL },
98 { "ERROR", SYSLOG_LEVEL_ERROR },
99 { "INFO", SYSLOG_LEVEL_INFO },
100 { "VERBOSE", SYSLOG_LEVEL_VERBOSE },
101 { "DEBUG", SYSLOG_LEVEL_DEBUG1 },
102 { "DEBUG1", SYSLOG_LEVEL_DEBUG1 },
103 { "DEBUG2", SYSLOG_LEVEL_DEBUG2 },
104 { "DEBUG3", SYSLOG_LEVEL_DEBUG3 },
Damien Millerfcd93202002-02-05 12:26:34 +1100105 { NULL, SYSLOG_LEVEL_NOT_SET }
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000106};
107
markus@openbsd.org5d140192018-07-27 12:03:17 +0000108LogLevel
109log_level_get(void)
110{
111 return log_level;
112}
113
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000114SyslogFacility
115log_facility_number(char *name)
116{
117 int i;
Ben Lindstrom8e8ef2a2002-07-07 22:14:55 +0000118
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000119 if (name != NULL)
120 for (i = 0; log_facilities[i].name; i++)
121 if (strcasecmp(log_facilities[i].name, name) == 0)
122 return log_facilities[i].val;
Damien Millerfcd93202002-02-05 12:26:34 +1100123 return SYSLOG_FACILITY_NOT_SET;
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000124}
125
Darren Tuckere7140f22008-06-10 23:01:51 +1000126const char *
127log_facility_name(SyslogFacility facility)
128{
129 u_int i;
130
131 for (i = 0; log_facilities[i].name; i++)
132 if (log_facilities[i].val == facility)
133 return log_facilities[i].name;
134 return NULL;
135}
136
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000137LogLevel
138log_level_number(char *name)
139{
140 int i;
Ben Lindstrom8e8ef2a2002-07-07 22:14:55 +0000141
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000142 if (name != NULL)
143 for (i = 0; log_levels[i].name; i++)
144 if (strcasecmp(log_levels[i].name, name) == 0)
145 return log_levels[i].val;
Damien Millerfcd93202002-02-05 12:26:34 +1100146 return SYSLOG_LEVEL_NOT_SET;
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000147}
Damien Miller5ce662a1999-11-11 17:57:39 +1100148
Darren Tuckere7140f22008-06-10 23:01:51 +1000149const char *
150log_level_name(LogLevel level)
151{
152 u_int i;
153
154 for (i = 0; log_levels[i].name != NULL; i++)
155 if (log_levels[i].val == level)
156 return log_levels[i].name;
157 return NULL;
158}
159
Damien Miller5ce662a1999-11-11 17:57:39 +1100160/* Error messages that should be logged. */
161
162void
Damien Miller95def091999-11-25 00:26:21 +1100163error(const char *fmt,...)
Damien Miller5ce662a1999-11-11 17:57:39 +1100164{
Damien Miller95def091999-11-25 00:26:21 +1100165 va_list args;
Ben Lindstrom8e8ef2a2002-07-07 22:14:55 +0000166
Damien Miller95def091999-11-25 00:26:21 +1100167 va_start(args, fmt);
168 do_log(SYSLOG_LEVEL_ERROR, fmt, args);
169 va_end(args);
Damien Miller5ce662a1999-11-11 17:57:39 +1100170}
171
Damien Miller99a648e2006-08-19 00:32:20 +1000172void
173sigdie(const char *fmt,...)
174{
Darren Tuckeraa1517c2006-08-20 17:55:54 +1000175#ifdef DO_LOG_SAFE_IN_SIGHAND
Damien Miller99a648e2006-08-19 00:32:20 +1000176 va_list args;
177
178 va_start(args, fmt);
179 do_log(SYSLOG_LEVEL_FATAL, fmt, args);
180 va_end(args);
Damien Millerbb598142006-08-19 08:38:23 +1000181#endif
Damien Miller99a648e2006-08-19 00:32:20 +1000182 _exit(1);
183}
184
dtucker@openbsd.orgaf1f0842016-07-15 05:01:58 +0000185void
186logdie(const char *fmt,...)
187{
188 va_list args;
189
190 va_start(args, fmt);
191 do_log(SYSLOG_LEVEL_INFO, fmt, args);
192 va_end(args);
193 cleanup_exit(255);
194}
Damien Miller99a648e2006-08-19 00:32:20 +1000195
Damien Miller5ce662a1999-11-11 17:57:39 +1100196/* Log this message (information that usually should go to the log). */
197
198void
Damien Miller996acd22003-04-09 20:59:48 +1000199logit(const char *fmt,...)
Damien Miller5ce662a1999-11-11 17:57:39 +1100200{
Damien Miller95def091999-11-25 00:26:21 +1100201 va_list args;
Ben Lindstrom8e8ef2a2002-07-07 22:14:55 +0000202
Damien Miller95def091999-11-25 00:26:21 +1100203 va_start(args, fmt);
Ben Lindstromdb65e8f2001-01-19 04:26:52 +0000204 do_log(SYSLOG_LEVEL_INFO, fmt, args);
Damien Miller95def091999-11-25 00:26:21 +1100205 va_end(args);
Damien Miller5ce662a1999-11-11 17:57:39 +1100206}
207
208/* More detailed messages (information that does not need to go to the log). */
209
210void
Damien Miller95def091999-11-25 00:26:21 +1100211verbose(const char *fmt,...)
Damien Miller5ce662a1999-11-11 17:57:39 +1100212{
Damien Miller95def091999-11-25 00:26:21 +1100213 va_list args;
Ben Lindstrom8e8ef2a2002-07-07 22:14:55 +0000214
Damien Miller95def091999-11-25 00:26:21 +1100215 va_start(args, fmt);
216 do_log(SYSLOG_LEVEL_VERBOSE, fmt, args);
217 va_end(args);
Damien Miller5ce662a1999-11-11 17:57:39 +1100218}
219
220/* Debugging messages that should not be logged during normal operation. */
221
222void
Damien Miller95def091999-11-25 00:26:21 +1100223debug(const char *fmt,...)
Damien Miller5ce662a1999-11-11 17:57:39 +1100224{
Damien Miller95def091999-11-25 00:26:21 +1100225 va_list args;
Ben Lindstrom8e8ef2a2002-07-07 22:14:55 +0000226
Damien Miller95def091999-11-25 00:26:21 +1100227 va_start(args, fmt);
Damien Millere4340be2000-09-16 13:29:08 +1100228 do_log(SYSLOG_LEVEL_DEBUG1, fmt, args);
229 va_end(args);
230}
231
232void
233debug2(const char *fmt,...)
234{
235 va_list args;
Ben Lindstrom8e8ef2a2002-07-07 22:14:55 +0000236
Damien Millere4340be2000-09-16 13:29:08 +1100237 va_start(args, fmt);
238 do_log(SYSLOG_LEVEL_DEBUG2, fmt, args);
239 va_end(args);
240}
241
242void
243debug3(const char *fmt,...)
244{
245 va_list args;
Ben Lindstrom8e8ef2a2002-07-07 22:14:55 +0000246
Damien Millere4340be2000-09-16 13:29:08 +1100247 va_start(args, fmt);
248 do_log(SYSLOG_LEVEL_DEBUG3, fmt, args);
Damien Miller95def091999-11-25 00:26:21 +1100249 va_end(args);
Damien Miller5ce662a1999-11-11 17:57:39 +1100250}
251
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000252/*
253 * Initialize the log.
254 */
255
256void
257log_init(char *av0, LogLevel level, SyslogFacility facility, int on_stderr)
258{
Darren Tucker9b5495d2005-02-01 17:35:09 +1100259#if defined(HAVE_OPENLOG_R) && defined(SYSLOG_DATA_INIT)
260 struct syslog_data sdata = SYSLOG_DATA_INIT;
261#endif
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000262
Darren Tucker835903d2005-03-09 20:12:47 +1100263 argv0 = av0;
264
djm@openbsd.org54cd41a2017-05-17 01:24:17 +0000265 if (log_change_level(level) != 0) {
Kevin Stevesedcd5762001-04-02 13:45:00 +0000266 fprintf(stderr, "Unrecognized internal syslog level code %d\n",
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000267 (int) level);
268 exit(1);
269 }
270
Damien Miller8f0bf232011-06-20 14:42:23 +1000271 log_handler = NULL;
272 log_handler_ctx = NULL;
273
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000274 log_on_stderr = on_stderr;
275 if (on_stderr)
276 return;
277
278 switch (facility) {
279 case SYSLOG_FACILITY_DAEMON:
280 log_facility = LOG_DAEMON;
281 break;
282 case SYSLOG_FACILITY_USER:
283 log_facility = LOG_USER;
284 break;
285 case SYSLOG_FACILITY_AUTH:
286 log_facility = LOG_AUTH;
287 break;
Damien Miller30246a82001-03-05 21:23:31 +1100288#ifdef LOG_AUTHPRIV
289 case SYSLOG_FACILITY_AUTHPRIV:
290 log_facility = LOG_AUTHPRIV;
291 break;
Ben Lindstrom53f11c62001-03-05 08:18:17 +0000292#endif
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000293 case SYSLOG_FACILITY_LOCAL0:
294 log_facility = LOG_LOCAL0;
295 break;
296 case SYSLOG_FACILITY_LOCAL1:
297 log_facility = LOG_LOCAL1;
298 break;
299 case SYSLOG_FACILITY_LOCAL2:
300 log_facility = LOG_LOCAL2;
301 break;
302 case SYSLOG_FACILITY_LOCAL3:
303 log_facility = LOG_LOCAL3;
304 break;
305 case SYSLOG_FACILITY_LOCAL4:
306 log_facility = LOG_LOCAL4;
307 break;
308 case SYSLOG_FACILITY_LOCAL5:
309 log_facility = LOG_LOCAL5;
310 break;
311 case SYSLOG_FACILITY_LOCAL6:
312 log_facility = LOG_LOCAL6;
313 break;
314 case SYSLOG_FACILITY_LOCAL7:
315 log_facility = LOG_LOCAL7;
316 break;
317 default:
318 fprintf(stderr,
Kevin Stevesedcd5762001-04-02 13:45:00 +0000319 "Unrecognized internal syslog facility code %d\n",
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000320 (int) facility);
321 exit(1);
322 }
Darren Tucker9b5495d2005-02-01 17:35:09 +1100323
324 /*
325 * If an external library (eg libwrap) attempts to use syslog
326 * immediately after reexec, syslog may be pointing to the wrong
327 * facility, so we force an open/close of syslog here.
328 */
329#if defined(HAVE_OPENLOG_R) && defined(SYSLOG_DATA_INIT)
330 openlog_r(argv0 ? argv0 : __progname, LOG_PID, log_facility, &sdata);
331 closelog_r(&sdata);
332#else
333 openlog(argv0 ? argv0 : __progname, LOG_PID, log_facility);
334 closelog();
335#endif
Damien Miller6162d121999-11-21 13:23:52 +1100336}
337
djm@openbsd.org54cd41a2017-05-17 01:24:17 +0000338int
Darren Tucker50a48d02012-09-06 21:25:37 +1000339log_change_level(LogLevel new_log_level)
340{
341 /* no-op if log_init has not been called */
342 if (argv0 == NULL)
djm@openbsd.org54cd41a2017-05-17 01:24:17 +0000343 return 0;
344
345 switch (new_log_level) {
346 case SYSLOG_LEVEL_QUIET:
347 case SYSLOG_LEVEL_FATAL:
348 case SYSLOG_LEVEL_ERROR:
349 case SYSLOG_LEVEL_INFO:
350 case SYSLOG_LEVEL_VERBOSE:
351 case SYSLOG_LEVEL_DEBUG1:
352 case SYSLOG_LEVEL_DEBUG2:
353 case SYSLOG_LEVEL_DEBUG3:
354 log_level = new_log_level;
355 return 0;
356 default:
357 return -1;
358 }
Darren Tucker50a48d02012-09-06 21:25:37 +1000359}
360
361int
362log_is_on_stderr(void)
363{
djm@openbsd.orgd2d6bf82016-04-29 08:07:53 +0000364 return log_on_stderr && log_stderr_fd == STDERR_FILENO;
Darren Tucker50a48d02012-09-06 21:25:37 +1000365}
366
Damien Miller03d4d7e2013-04-23 15:21:06 +1000367/* redirect what would usually get written to stderr to specified file */
368void
369log_redirect_stderr_to(const char *logfile)
370{
371 int fd;
372
373 if ((fd = open(logfile, O_WRONLY|O_CREAT|O_APPEND, 0600)) == -1) {
374 fprintf(stderr, "Couldn't open logfile %s: %s\n", logfile,
375 strerror(errno));
376 exit(1);
377 }
378 log_stderr_fd = fd;
379}
380
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000381#define MSGBUFSIZ 1024
382
Ben Lindstrom9c8edc92002-02-26 17:52:14 +0000383void
Damien Miller8f0bf232011-06-20 14:42:23 +1000384set_log_handler(log_handler_fn *handler, void *ctx)
385{
386 log_handler = handler;
387 log_handler_ctx = ctx;
388}
389
390void
391do_log2(LogLevel level, const char *fmt,...)
392{
393 va_list args;
394
395 va_start(args, fmt);
396 do_log(level, fmt, args);
397 va_end(args);
398}
399
400void
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000401do_log(LogLevel level, const char *fmt, va_list args)
Damien Miller6162d121999-11-21 13:23:52 +1100402{
Damien Miller051b0ac2004-02-18 22:59:43 +1100403#if defined(HAVE_OPENLOG_R) && defined(SYSLOG_DATA_INIT)
Damien Miller74a34422003-05-20 09:24:17 +1000404 struct syslog_data sdata = SYSLOG_DATA_INIT;
405#endif
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000406 char msgbuf[MSGBUFSIZ];
407 char fmtbuf[MSGBUFSIZ];
408 char *txt = NULL;
409 int pri = LOG_INFO;
Darren Tucker36b78002007-05-20 15:08:15 +1000410 int saved_errno = errno;
Damien Miller8f0bf232011-06-20 14:42:23 +1000411 log_handler_fn *tmp_handler;
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000412
413 if (level > log_level)
414 return;
415
416 switch (level) {
417 case SYSLOG_LEVEL_FATAL:
418 if (!log_on_stderr)
419 txt = "fatal";
420 pri = LOG_CRIT;
421 break;
422 case SYSLOG_LEVEL_ERROR:
423 if (!log_on_stderr)
424 txt = "error";
425 pri = LOG_ERR;
426 break;
427 case SYSLOG_LEVEL_INFO:
428 pri = LOG_INFO;
429 break;
430 case SYSLOG_LEVEL_VERBOSE:
431 pri = LOG_INFO;
432 break;
433 case SYSLOG_LEVEL_DEBUG1:
434 txt = "debug1";
435 pri = LOG_DEBUG;
436 break;
437 case SYSLOG_LEVEL_DEBUG2:
438 txt = "debug2";
439 pri = LOG_DEBUG;
440 break;
441 case SYSLOG_LEVEL_DEBUG3:
442 txt = "debug3";
443 pri = LOG_DEBUG;
444 break;
445 default:
446 txt = "internal error";
447 pri = LOG_ERR;
448 break;
449 }
Damien Miller8f0bf232011-06-20 14:42:23 +1000450 if (txt != NULL && log_handler == NULL) {
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000451 snprintf(fmtbuf, sizeof(fmtbuf), "%s: %s", txt, fmt);
452 vsnprintf(msgbuf, sizeof(msgbuf), fmtbuf, args);
453 } else {
454 vsnprintf(msgbuf, sizeof(msgbuf), fmt, args);
455 }
Damien Miller23a70272004-07-21 10:52:13 +1000456 strnvis(fmtbuf, msgbuf, sizeof(fmtbuf),
457 log_on_stderr ? LOG_STDERR_VIS : LOG_SYSLOG_VIS);
Damien Miller8f0bf232011-06-20 14:42:23 +1000458 if (log_handler != NULL) {
459 /* Avoid recursion */
460 tmp_handler = log_handler;
461 log_handler = NULL;
462 tmp_handler(level, fmtbuf, log_handler_ctx);
463 log_handler = tmp_handler;
464 } else if (log_on_stderr) {
djm@openbsd.org9747b9c2017-03-10 03:15:58 +0000465 snprintf(msgbuf, sizeof msgbuf, "%.*s\r\n",
466 (int)sizeof msgbuf - 3, fmtbuf);
Darren Tuckerdbee3082013-05-16 20:32:29 +1000467 (void)write(log_stderr_fd, msgbuf, strlen(msgbuf));
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000468 } else {
Damien Miller051b0ac2004-02-18 22:59:43 +1100469#if defined(HAVE_OPENLOG_R) && defined(SYSLOG_DATA_INIT)
Damien Miller74a34422003-05-20 09:24:17 +1000470 openlog_r(argv0 ? argv0 : __progname, LOG_PID, log_facility, &sdata);
Damien Millerc11fe252003-05-25 14:38:02 +1000471 syslog_r(pri, &sdata, "%.500s", fmtbuf);
Damien Miller74a34422003-05-20 09:24:17 +1000472 closelog_r(&sdata);
473#else
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000474 openlog(argv0 ? argv0 : __progname, LOG_PID, log_facility);
Damien Millerb93addb2003-01-07 17:04:18 +1100475 syslog(pri, "%.500s", fmtbuf);
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000476 closelog();
Damien Miller74a34422003-05-20 09:24:17 +1000477#endif
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000478 }
Darren Tucker36b78002007-05-20 15:08:15 +1000479 errno = saved_errno;
Damien Miller6162d121999-11-21 13:23:52 +1100480}