blob: 4a8239b931de474319b3cb21420eedbfaaeccc30 [file] [log] [blame]
Darren Tuckere7140f22008-06-10 23:01:51 +10001/* $OpenBSD: log.c,v 1.41 2008/06/10 04:50:25 dtucker Exp $ */
Damien Miller5ce662a1999-11-11 17:57:39 +11002/*
Damien Millere4340be2000-09-16 13:29:08 +11003 * Author: Tatu Ylonen <ylo@cs.hut.fi>
4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5 * All rights reserved
6 *
7 * As far as I am concerned, the code I have written for this software
8 * can be used freely for any purpose. Any derived versions of this
9 * software must be clearly marked as such, and if the derived work is
10 * incompatible with the protocol description in the RFC file, it must be
11 * called by a name other than "ssh" or "Secure Shell".
12 */
13/*
Damien Millere4340be2000-09-16 13:29:08 +110014 * Copyright (c) 2000 Markus Friedl. All rights reserved.
15 *
16 * Redistribution and use in source and binary forms, with or without
17 * modification, are permitted provided that the following conditions
18 * are met:
19 * 1. Redistributions of source code must retain the above copyright
20 * notice, this list of conditions and the following disclaimer.
21 * 2. Redistributions in binary form must reproduce the above copyright
22 * notice, this list of conditions and the following disclaimer in the
23 * documentation and/or other materials provided with the distribution.
24 *
25 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
26 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
27 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
28 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
29 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
30 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
31 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
32 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
33 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Damien Miller5428f641999-11-25 11:54:57 +110035 */
Damien Miller5ce662a1999-11-11 17:57:39 +110036
37#include "includes.h"
Damien Miller5ce662a1999-11-11 17:57:39 +110038
Damien Millerd7834352006-08-05 12:39:39 +100039#include <sys/types.h>
40
Darren Tucker5d196262006-07-12 22:15:16 +100041#include <stdarg.h>
Damien Millera7a73ee2006-08-05 11:37:59 +100042#include <stdio.h>
Damien Millere7a1e5c2006-08-05 11:34:19 +100043#include <stdlib.h>
Damien Millere3476ed2006-07-24 14:13:33 +100044#include <string.h>
Ben Lindstrom8a432f52001-03-05 07:24:46 +000045#include <syslog.h>
Damien Millere6b3b612006-07-24 14:01:23 +100046#include <unistd.h>
Darren Tucker36b78002007-05-20 15:08:15 +100047#include <errno.h>
Damien Miller5c3a5582003-09-23 22:12:38 +100048#if defined(HAVE_STRNVIS) && defined(HAVE_VIS_H)
49# include <vis.h>
50#endif
Ben Lindstrom8a432f52001-03-05 07:24:46 +000051
Damien Miller194a1cb2006-07-10 21:09:22 +100052#include "xmalloc.h"
Damien Millerd7834352006-08-05 12:39:39 +100053#include "log.h"
Damien Miller194a1cb2006-07-10 21:09:22 +100054
Ben Lindstrom8a432f52001-03-05 07:24:46 +000055static LogLevel log_level = SYSLOG_LEVEL_INFO;
56static int log_on_stderr = 1;
57static int log_facility = LOG_AUTH;
58static char *argv0;
59
60extern char *__progname;
61
Damien Miller23a70272004-07-21 10:52:13 +100062#define LOG_SYSLOG_VIS (VIS_CSTYLE|VIS_NL|VIS_TAB|VIS_OCTAL)
63#define LOG_STDERR_VIS (VIS_SAFE|VIS_OCTAL)
64
Ben Lindstrom8a432f52001-03-05 07:24:46 +000065/* textual representation of log-facilities/levels */
66
67static struct {
68 const char *name;
69 SyslogFacility val;
70} log_facilities[] = {
71 { "DAEMON", SYSLOG_FACILITY_DAEMON },
72 { "USER", SYSLOG_FACILITY_USER },
73 { "AUTH", SYSLOG_FACILITY_AUTH },
Damien Miller30246a82001-03-05 21:23:31 +110074#ifdef LOG_AUTHPRIV
75 { "AUTHPRIV", SYSLOG_FACILITY_AUTHPRIV },
76#endif
Ben Lindstrom8a432f52001-03-05 07:24:46 +000077 { "LOCAL0", SYSLOG_FACILITY_LOCAL0 },
78 { "LOCAL1", SYSLOG_FACILITY_LOCAL1 },
79 { "LOCAL2", SYSLOG_FACILITY_LOCAL2 },
80 { "LOCAL3", SYSLOG_FACILITY_LOCAL3 },
81 { "LOCAL4", SYSLOG_FACILITY_LOCAL4 },
82 { "LOCAL5", SYSLOG_FACILITY_LOCAL5 },
83 { "LOCAL6", SYSLOG_FACILITY_LOCAL6 },
84 { "LOCAL7", SYSLOG_FACILITY_LOCAL7 },
Damien Millerfcd93202002-02-05 12:26:34 +110085 { NULL, SYSLOG_FACILITY_NOT_SET }
Ben Lindstrom8a432f52001-03-05 07:24:46 +000086};
87
88static struct {
89 const char *name;
90 LogLevel val;
91} log_levels[] =
92{
93 { "QUIET", SYSLOG_LEVEL_QUIET },
94 { "FATAL", SYSLOG_LEVEL_FATAL },
95 { "ERROR", SYSLOG_LEVEL_ERROR },
96 { "INFO", SYSLOG_LEVEL_INFO },
97 { "VERBOSE", SYSLOG_LEVEL_VERBOSE },
98 { "DEBUG", SYSLOG_LEVEL_DEBUG1 },
99 { "DEBUG1", SYSLOG_LEVEL_DEBUG1 },
100 { "DEBUG2", SYSLOG_LEVEL_DEBUG2 },
101 { "DEBUG3", SYSLOG_LEVEL_DEBUG3 },
Damien Millerfcd93202002-02-05 12:26:34 +1100102 { NULL, SYSLOG_LEVEL_NOT_SET }
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000103};
104
105SyslogFacility
106log_facility_number(char *name)
107{
108 int i;
Ben Lindstrom8e8ef2a2002-07-07 22:14:55 +0000109
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000110 if (name != NULL)
111 for (i = 0; log_facilities[i].name; i++)
112 if (strcasecmp(log_facilities[i].name, name) == 0)
113 return log_facilities[i].val;
Damien Millerfcd93202002-02-05 12:26:34 +1100114 return SYSLOG_FACILITY_NOT_SET;
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000115}
116
Darren Tuckere7140f22008-06-10 23:01:51 +1000117const char *
118log_facility_name(SyslogFacility facility)
119{
120 u_int i;
121
122 for (i = 0; log_facilities[i].name; i++)
123 if (log_facilities[i].val == facility)
124 return log_facilities[i].name;
125 return NULL;
126}
127
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000128LogLevel
129log_level_number(char *name)
130{
131 int i;
Ben Lindstrom8e8ef2a2002-07-07 22:14:55 +0000132
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000133 if (name != NULL)
134 for (i = 0; log_levels[i].name; i++)
135 if (strcasecmp(log_levels[i].name, name) == 0)
136 return log_levels[i].val;
Damien Millerfcd93202002-02-05 12:26:34 +1100137 return SYSLOG_LEVEL_NOT_SET;
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000138}
Damien Miller5ce662a1999-11-11 17:57:39 +1100139
Darren Tuckere7140f22008-06-10 23:01:51 +1000140const char *
141log_level_name(LogLevel level)
142{
143 u_int i;
144
145 for (i = 0; log_levels[i].name != NULL; i++)
146 if (log_levels[i].val == level)
147 return log_levels[i].name;
148 return NULL;
149}
150
Damien Miller5ce662a1999-11-11 17:57:39 +1100151/* Error messages that should be logged. */
152
153void
Damien Miller95def091999-11-25 00:26:21 +1100154error(const char *fmt,...)
Damien Miller5ce662a1999-11-11 17:57:39 +1100155{
Damien Miller95def091999-11-25 00:26:21 +1100156 va_list args;
Ben Lindstrom8e8ef2a2002-07-07 22:14:55 +0000157
Damien Miller95def091999-11-25 00:26:21 +1100158 va_start(args, fmt);
159 do_log(SYSLOG_LEVEL_ERROR, fmt, args);
160 va_end(args);
Damien Miller5ce662a1999-11-11 17:57:39 +1100161}
162
Damien Miller99a648e2006-08-19 00:32:20 +1000163void
164sigdie(const char *fmt,...)
165{
Darren Tuckeraa1517c2006-08-20 17:55:54 +1000166#ifdef DO_LOG_SAFE_IN_SIGHAND
Damien Miller99a648e2006-08-19 00:32:20 +1000167 va_list args;
168
169 va_start(args, fmt);
170 do_log(SYSLOG_LEVEL_FATAL, fmt, args);
171 va_end(args);
Damien Millerbb598142006-08-19 08:38:23 +1000172#endif
Damien Miller99a648e2006-08-19 00:32:20 +1000173 _exit(1);
174}
175
176
Damien Miller5ce662a1999-11-11 17:57:39 +1100177/* Log this message (information that usually should go to the log). */
178
179void
Damien Miller996acd22003-04-09 20:59:48 +1000180logit(const char *fmt,...)
Damien Miller5ce662a1999-11-11 17:57:39 +1100181{
Damien Miller95def091999-11-25 00:26:21 +1100182 va_list args;
Ben Lindstrom8e8ef2a2002-07-07 22:14:55 +0000183
Damien Miller95def091999-11-25 00:26:21 +1100184 va_start(args, fmt);
Ben Lindstromdb65e8f2001-01-19 04:26:52 +0000185 do_log(SYSLOG_LEVEL_INFO, fmt, args);
Damien Miller95def091999-11-25 00:26:21 +1100186 va_end(args);
Damien Miller5ce662a1999-11-11 17:57:39 +1100187}
188
189/* More detailed messages (information that does not need to go to the log). */
190
191void
Damien Miller95def091999-11-25 00:26:21 +1100192verbose(const char *fmt,...)
Damien Miller5ce662a1999-11-11 17:57:39 +1100193{
Damien Miller95def091999-11-25 00:26:21 +1100194 va_list args;
Ben Lindstrom8e8ef2a2002-07-07 22:14:55 +0000195
Damien Miller95def091999-11-25 00:26:21 +1100196 va_start(args, fmt);
197 do_log(SYSLOG_LEVEL_VERBOSE, fmt, args);
198 va_end(args);
Damien Miller5ce662a1999-11-11 17:57:39 +1100199}
200
201/* Debugging messages that should not be logged during normal operation. */
202
203void
Damien Miller95def091999-11-25 00:26:21 +1100204debug(const char *fmt,...)
Damien Miller5ce662a1999-11-11 17:57:39 +1100205{
Damien Miller95def091999-11-25 00:26:21 +1100206 va_list args;
Ben Lindstrom8e8ef2a2002-07-07 22:14:55 +0000207
Damien Miller95def091999-11-25 00:26:21 +1100208 va_start(args, fmt);
Damien Millere4340be2000-09-16 13:29:08 +1100209 do_log(SYSLOG_LEVEL_DEBUG1, fmt, args);
210 va_end(args);
211}
212
213void
214debug2(const char *fmt,...)
215{
216 va_list args;
Ben Lindstrom8e8ef2a2002-07-07 22:14:55 +0000217
Damien Millere4340be2000-09-16 13:29:08 +1100218 va_start(args, fmt);
219 do_log(SYSLOG_LEVEL_DEBUG2, fmt, args);
220 va_end(args);
221}
222
223void
224debug3(const char *fmt,...)
225{
226 va_list args;
Ben Lindstrom8e8ef2a2002-07-07 22:14:55 +0000227
Damien Millere4340be2000-09-16 13:29:08 +1100228 va_start(args, fmt);
229 do_log(SYSLOG_LEVEL_DEBUG3, fmt, args);
Damien Miller95def091999-11-25 00:26:21 +1100230 va_end(args);
Damien Miller5ce662a1999-11-11 17:57:39 +1100231}
232
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000233/*
234 * Initialize the log.
235 */
236
237void
238log_init(char *av0, LogLevel level, SyslogFacility facility, int on_stderr)
239{
Darren Tucker9b5495d2005-02-01 17:35:09 +1100240#if defined(HAVE_OPENLOG_R) && defined(SYSLOG_DATA_INIT)
241 struct syslog_data sdata = SYSLOG_DATA_INIT;
242#endif
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000243
Darren Tucker835903d2005-03-09 20:12:47 +1100244 argv0 = av0;
245
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000246 switch (level) {
247 case SYSLOG_LEVEL_QUIET:
248 case SYSLOG_LEVEL_FATAL:
249 case SYSLOG_LEVEL_ERROR:
250 case SYSLOG_LEVEL_INFO:
251 case SYSLOG_LEVEL_VERBOSE:
252 case SYSLOG_LEVEL_DEBUG1:
253 case SYSLOG_LEVEL_DEBUG2:
254 case SYSLOG_LEVEL_DEBUG3:
255 log_level = level;
256 break;
257 default:
Kevin Stevesedcd5762001-04-02 13:45:00 +0000258 fprintf(stderr, "Unrecognized internal syslog level code %d\n",
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000259 (int) level);
260 exit(1);
261 }
262
263 log_on_stderr = on_stderr;
264 if (on_stderr)
265 return;
266
267 switch (facility) {
268 case SYSLOG_FACILITY_DAEMON:
269 log_facility = LOG_DAEMON;
270 break;
271 case SYSLOG_FACILITY_USER:
272 log_facility = LOG_USER;
273 break;
274 case SYSLOG_FACILITY_AUTH:
275 log_facility = LOG_AUTH;
276 break;
Damien Miller30246a82001-03-05 21:23:31 +1100277#ifdef LOG_AUTHPRIV
278 case SYSLOG_FACILITY_AUTHPRIV:
279 log_facility = LOG_AUTHPRIV;
280 break;
Ben Lindstrom53f11c62001-03-05 08:18:17 +0000281#endif
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000282 case SYSLOG_FACILITY_LOCAL0:
283 log_facility = LOG_LOCAL0;
284 break;
285 case SYSLOG_FACILITY_LOCAL1:
286 log_facility = LOG_LOCAL1;
287 break;
288 case SYSLOG_FACILITY_LOCAL2:
289 log_facility = LOG_LOCAL2;
290 break;
291 case SYSLOG_FACILITY_LOCAL3:
292 log_facility = LOG_LOCAL3;
293 break;
294 case SYSLOG_FACILITY_LOCAL4:
295 log_facility = LOG_LOCAL4;
296 break;
297 case SYSLOG_FACILITY_LOCAL5:
298 log_facility = LOG_LOCAL5;
299 break;
300 case SYSLOG_FACILITY_LOCAL6:
301 log_facility = LOG_LOCAL6;
302 break;
303 case SYSLOG_FACILITY_LOCAL7:
304 log_facility = LOG_LOCAL7;
305 break;
306 default:
307 fprintf(stderr,
Kevin Stevesedcd5762001-04-02 13:45:00 +0000308 "Unrecognized internal syslog facility code %d\n",
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000309 (int) facility);
310 exit(1);
311 }
Darren Tucker9b5495d2005-02-01 17:35:09 +1100312
313 /*
314 * If an external library (eg libwrap) attempts to use syslog
315 * immediately after reexec, syslog may be pointing to the wrong
316 * facility, so we force an open/close of syslog here.
317 */
318#if defined(HAVE_OPENLOG_R) && defined(SYSLOG_DATA_INIT)
319 openlog_r(argv0 ? argv0 : __progname, LOG_PID, log_facility, &sdata);
320 closelog_r(&sdata);
321#else
322 openlog(argv0 ? argv0 : __progname, LOG_PID, log_facility);
323 closelog();
324#endif
Damien Miller6162d121999-11-21 13:23:52 +1100325}
326
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000327#define MSGBUFSIZ 1024
328
Ben Lindstrom9c8edc92002-02-26 17:52:14 +0000329void
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000330do_log(LogLevel level, const char *fmt, va_list args)
Damien Miller6162d121999-11-21 13:23:52 +1100331{
Damien Miller051b0ac2004-02-18 22:59:43 +1100332#if defined(HAVE_OPENLOG_R) && defined(SYSLOG_DATA_INIT)
Damien Miller74a34422003-05-20 09:24:17 +1000333 struct syslog_data sdata = SYSLOG_DATA_INIT;
334#endif
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000335 char msgbuf[MSGBUFSIZ];
336 char fmtbuf[MSGBUFSIZ];
337 char *txt = NULL;
338 int pri = LOG_INFO;
Darren Tucker36b78002007-05-20 15:08:15 +1000339 int saved_errno = errno;
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000340
341 if (level > log_level)
342 return;
343
344 switch (level) {
345 case SYSLOG_LEVEL_FATAL:
346 if (!log_on_stderr)
347 txt = "fatal";
348 pri = LOG_CRIT;
349 break;
350 case SYSLOG_LEVEL_ERROR:
351 if (!log_on_stderr)
352 txt = "error";
353 pri = LOG_ERR;
354 break;
355 case SYSLOG_LEVEL_INFO:
356 pri = LOG_INFO;
357 break;
358 case SYSLOG_LEVEL_VERBOSE:
359 pri = LOG_INFO;
360 break;
361 case SYSLOG_LEVEL_DEBUG1:
362 txt = "debug1";
363 pri = LOG_DEBUG;
364 break;
365 case SYSLOG_LEVEL_DEBUG2:
366 txt = "debug2";
367 pri = LOG_DEBUG;
368 break;
369 case SYSLOG_LEVEL_DEBUG3:
370 txt = "debug3";
371 pri = LOG_DEBUG;
372 break;
373 default:
374 txt = "internal error";
375 pri = LOG_ERR;
376 break;
377 }
378 if (txt != NULL) {
379 snprintf(fmtbuf, sizeof(fmtbuf), "%s: %s", txt, fmt);
380 vsnprintf(msgbuf, sizeof(msgbuf), fmtbuf, args);
381 } else {
382 vsnprintf(msgbuf, sizeof(msgbuf), fmt, args);
383 }
Damien Miller23a70272004-07-21 10:52:13 +1000384 strnvis(fmtbuf, msgbuf, sizeof(fmtbuf),
385 log_on_stderr ? LOG_STDERR_VIS : LOG_SYSLOG_VIS);
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000386 if (log_on_stderr) {
Damien Millerc11fe252003-05-25 14:38:02 +1000387 snprintf(msgbuf, sizeof msgbuf, "%s\r\n", fmtbuf);
388 write(STDERR_FILENO, msgbuf, strlen(msgbuf));
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000389 } else {
Damien Miller051b0ac2004-02-18 22:59:43 +1100390#if defined(HAVE_OPENLOG_R) && defined(SYSLOG_DATA_INIT)
Damien Miller74a34422003-05-20 09:24:17 +1000391 openlog_r(argv0 ? argv0 : __progname, LOG_PID, log_facility, &sdata);
Damien Millerc11fe252003-05-25 14:38:02 +1000392 syslog_r(pri, &sdata, "%.500s", fmtbuf);
Damien Miller74a34422003-05-20 09:24:17 +1000393 closelog_r(&sdata);
394#else
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000395 openlog(argv0 ? argv0 : __progname, LOG_PID, log_facility);
Damien Millerb93addb2003-01-07 17:04:18 +1100396 syslog(pri, "%.500s", fmtbuf);
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000397 closelog();
Damien Miller74a34422003-05-20 09:24:17 +1000398#endif
Ben Lindstrom8a432f52001-03-05 07:24:46 +0000399 }
Darren Tucker36b78002007-05-20 15:08:15 +1000400 errno = saved_errno;
Damien Miller6162d121999-11-21 13:23:52 +1100401}