freebsd-src/crypto/openssh/log.c

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

505 lines
12 KiB
C
Raw Normal View History

2023-12-18 15:59:40 +00:00
/* $OpenBSD: log.c,v 1.61 2023/12/06 21:06:48 djm Exp $ */
/*
* Author: Tatu Ylonen <ylo@cs.hut.fi>
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
* All rights reserved
*
* As far as I am concerned, the code I have written for this software
* can be used freely for any purpose. Any derived versions of this
* software must be clearly marked as such, and if the derived work is
* incompatible with the protocol description in the RFC file, it must be
* called by a name other than "ssh" or "Secure Shell".
*/
2000-02-24 14:29:47 +00:00
/*
* Copyright (c) 2000 Markus Friedl. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
2000-02-24 14:29:47 +00:00
*/
#include "includes.h"
2006-09-30 13:29:51 +00:00
#include <sys/types.h>
2000-02-24 14:29:47 +00:00
2013-09-18 17:27:38 +00:00
#include <fcntl.h>
2006-09-30 13:29:51 +00:00
#include <stdarg.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <syslog.h>
2006-09-30 13:29:51 +00:00
#include <unistd.h>
#include <errno.h>
2013-03-22 11:19:48 +00:00
#if defined(HAVE_STRNVIS) && defined(HAVE_VIS_H) && !defined(BROKEN_STRNVIS)
2004-01-07 11:10:17 +00:00
# include <vis.h>
#endif
2006-09-30 13:29:51 +00:00
#include "log.h"
2021-04-23 19:10:38 +00:00
#include "match.h"
2006-09-30 13:29:51 +00:00
static LogLevel log_level = SYSLOG_LEVEL_INFO;
static int log_on_stderr = 1;
2013-09-18 17:27:38 +00:00
static int log_stderr_fd = STDERR_FILENO;
static int log_facility = LOG_AUTH;
2021-04-23 19:10:38 +00:00
static const char *argv0;
2011-09-28 08:14:41 +00:00
static log_handler_fn *log_handler;
static void *log_handler_ctx;
2021-04-23 19:10:38 +00:00
static char **log_verbose;
static size_t nlog_verbose;
extern char *__progname;
2004-10-28 16:03:53 +00:00
#define LOG_SYSLOG_VIS (VIS_CSTYLE|VIS_NL|VIS_TAB|VIS_OCTAL)
#define LOG_STDERR_VIS (VIS_SAFE|VIS_OCTAL)
/* textual representation of log-facilities/levels */
static struct {
const char *name;
SyslogFacility val;
} log_facilities[] = {
{ "DAEMON", SYSLOG_FACILITY_DAEMON },
{ "USER", SYSLOG_FACILITY_USER },
{ "AUTH", SYSLOG_FACILITY_AUTH },
2002-06-27 22:31:32 +00:00
#ifdef LOG_AUTHPRIV
{ "AUTHPRIV", SYSLOG_FACILITY_AUTHPRIV },
#endif
{ "LOCAL0", SYSLOG_FACILITY_LOCAL0 },
{ "LOCAL1", SYSLOG_FACILITY_LOCAL1 },
{ "LOCAL2", SYSLOG_FACILITY_LOCAL2 },
{ "LOCAL3", SYSLOG_FACILITY_LOCAL3 },
{ "LOCAL4", SYSLOG_FACILITY_LOCAL4 },
{ "LOCAL5", SYSLOG_FACILITY_LOCAL5 },
{ "LOCAL6", SYSLOG_FACILITY_LOCAL6 },
{ "LOCAL7", SYSLOG_FACILITY_LOCAL7 },
2002-03-18 09:55:03 +00:00
{ NULL, SYSLOG_FACILITY_NOT_SET }
};
static struct {
const char *name;
LogLevel val;
} log_levels[] =
{
{ "QUIET", SYSLOG_LEVEL_QUIET },
{ "FATAL", SYSLOG_LEVEL_FATAL },
{ "ERROR", SYSLOG_LEVEL_ERROR },
{ "INFO", SYSLOG_LEVEL_INFO },
{ "VERBOSE", SYSLOG_LEVEL_VERBOSE },
{ "DEBUG", SYSLOG_LEVEL_DEBUG1 },
{ "DEBUG1", SYSLOG_LEVEL_DEBUG1 },
{ "DEBUG2", SYSLOG_LEVEL_DEBUG2 },
{ "DEBUG3", SYSLOG_LEVEL_DEBUG3 },
2002-03-18 09:55:03 +00:00
{ NULL, SYSLOG_LEVEL_NOT_SET }
};
2018-08-28 10:47:58 +00:00
LogLevel
log_level_get(void)
{
return log_level;
}
SyslogFacility
log_facility_number(char *name)
{
int i;
if (name != NULL)
for (i = 0; log_facilities[i].name; i++)
if (strcasecmp(log_facilities[i].name, name) == 0)
return log_facilities[i].val;
2002-03-18 09:55:03 +00:00
return SYSLOG_FACILITY_NOT_SET;
}
2008-07-23 09:33:08 +00:00
const char *
log_facility_name(SyslogFacility facility)
{
u_int i;
for (i = 0; log_facilities[i].name; i++)
if (log_facilities[i].val == facility)
return log_facilities[i].name;
return NULL;
}
LogLevel
log_level_number(char *name)
{
int i;
if (name != NULL)
for (i = 0; log_levels[i].name; i++)
if (strcasecmp(log_levels[i].name, name) == 0)
return log_levels[i].val;
2002-03-18 09:55:03 +00:00
return SYSLOG_LEVEL_NOT_SET;
2000-02-24 14:29:47 +00:00
}
2008-07-23 09:33:08 +00:00
const char *
log_level_name(LogLevel level)
{
u_int i;
for (i = 0; log_levels[i].name != NULL; i++)
if (log_levels[i].val == level)
return log_levels[i].name;
return NULL;
}
2000-02-24 14:29:47 +00:00
void
2021-04-23 19:10:38 +00:00
log_verbose_add(const char *s)
2000-02-24 14:29:47 +00:00
{
2021-04-23 19:10:38 +00:00
char **tmp;
/* Ignore failures here */
if ((tmp = recallocarray(log_verbose, nlog_verbose, nlog_verbose + 1,
sizeof(*log_verbose))) != NULL) {
log_verbose = tmp;
if ((log_verbose[nlog_verbose] = strdup(s)) != NULL)
nlog_verbose++;
}
}
void
2021-04-23 19:10:38 +00:00
log_verbose_reset(void)
{
2021-04-23 19:10:38 +00:00
size_t i;
2021-04-23 19:10:38 +00:00
for (i = 0; i < nlog_verbose; i++)
free(log_verbose[i]);
free(log_verbose);
log_verbose = NULL;
nlog_verbose = 0;
2000-02-24 14:29:47 +00:00
}
/*
* Initialize the log.
*/
2000-02-24 14:29:47 +00:00
void
2021-04-23 19:10:38 +00:00
log_init(const char *av0, LogLevel level, SyslogFacility facility,
int on_stderr)
2000-02-24 14:29:47 +00:00
{
2005-06-05 15:40:50 +00:00
#if defined(HAVE_OPENLOG_R) && defined(SYSLOG_DATA_INIT)
struct syslog_data sdata = SYSLOG_DATA_INIT;
#endif
2005-06-05 15:41:57 +00:00
argv0 = av0;
2000-02-24 14:29:47 +00:00
2018-05-06 12:24:45 +00:00
if (log_change_level(level) != 0) {
fprintf(stderr, "Unrecognized internal syslog level code %d\n",
(int) level);
exit(1);
}
2011-09-28 08:14:41 +00:00
log_handler = NULL;
log_handler_ctx = NULL;
log_on_stderr = on_stderr;
if (on_stderr)
return;
switch (facility) {
case SYSLOG_FACILITY_DAEMON:
log_facility = LOG_DAEMON;
break;
case SYSLOG_FACILITY_USER:
log_facility = LOG_USER;
break;
case SYSLOG_FACILITY_AUTH:
log_facility = LOG_AUTH;
break;
2002-06-27 22:31:32 +00:00
#ifdef LOG_AUTHPRIV
case SYSLOG_FACILITY_AUTHPRIV:
log_facility = LOG_AUTHPRIV;
break;
#endif
case SYSLOG_FACILITY_LOCAL0:
log_facility = LOG_LOCAL0;
break;
case SYSLOG_FACILITY_LOCAL1:
log_facility = LOG_LOCAL1;
break;
case SYSLOG_FACILITY_LOCAL2:
log_facility = LOG_LOCAL2;
break;
case SYSLOG_FACILITY_LOCAL3:
log_facility = LOG_LOCAL3;
break;
case SYSLOG_FACILITY_LOCAL4:
log_facility = LOG_LOCAL4;
break;
case SYSLOG_FACILITY_LOCAL5:
log_facility = LOG_LOCAL5;
break;
case SYSLOG_FACILITY_LOCAL6:
log_facility = LOG_LOCAL6;
break;
case SYSLOG_FACILITY_LOCAL7:
log_facility = LOG_LOCAL7;
break;
default:
fprintf(stderr,
"Unrecognized internal syslog facility code %d\n",
(int) facility);
exit(1);
}
2005-06-05 15:40:50 +00:00
/*
* If an external library (eg libwrap) attempts to use syslog
* immediately after reexec, syslog may be pointing to the wrong
* facility, so we force an open/close of syslog here.
*/
#if defined(HAVE_OPENLOG_R) && defined(SYSLOG_DATA_INIT)
openlog_r(argv0 ? argv0 : __progname, LOG_PID, log_facility, &sdata);
closelog_r(&sdata);
#else
openlog(argv0 ? argv0 : __progname, LOG_PID, log_facility);
closelog();
#endif
2000-02-24 14:29:47 +00:00
}
2018-05-06 12:24:45 +00:00
int
2013-03-22 11:19:48 +00:00
log_change_level(LogLevel new_log_level)
{
/* no-op if log_init has not been called */
if (argv0 == NULL)
2018-05-06 12:24:45 +00:00
return 0;
switch (new_log_level) {
case SYSLOG_LEVEL_QUIET:
case SYSLOG_LEVEL_FATAL:
case SYSLOG_LEVEL_ERROR:
case SYSLOG_LEVEL_INFO:
case SYSLOG_LEVEL_VERBOSE:
case SYSLOG_LEVEL_DEBUG1:
case SYSLOG_LEVEL_DEBUG2:
case SYSLOG_LEVEL_DEBUG3:
log_level = new_log_level;
return 0;
default:
return -1;
}
2013-03-22 11:19:48 +00:00
}
int
log_is_on_stderr(void)
{
2017-01-31 12:29:48 +00:00
return log_on_stderr && log_stderr_fd == STDERR_FILENO;
2013-03-22 11:19:48 +00:00
}
2013-09-18 17:27:38 +00:00
/* redirect what would usually get written to stderr to specified file */
void
log_redirect_stderr_to(const char *logfile)
{
int fd;
2021-02-14 21:09:58 +00:00
if (logfile == NULL) {
if (log_stderr_fd != STDERR_FILENO) {
close(log_stderr_fd);
log_stderr_fd = STDERR_FILENO;
}
return;
}
2013-09-18 17:27:38 +00:00
if ((fd = open(logfile, O_WRONLY|O_CREAT|O_APPEND, 0600)) == -1) {
fprintf(stderr, "Couldn't open logfile %s: %s\n", logfile,
2021-04-23 19:13:32 +00:00
strerror(errno));
2013-09-18 17:27:38 +00:00
exit(1);
}
log_stderr_fd = fd;
}
#define MSGBUFSIZ 1024
2011-09-28 08:14:41 +00:00
void
set_log_handler(log_handler_fn *handler, void *ctx)
{
log_handler = handler;
log_handler_ctx = ctx;
}
2021-04-23 19:10:38 +00:00
static void
2021-04-23 19:13:32 +00:00
do_log(LogLevel level, int force, const char *suffix, const char *fmt,
va_list args)
2000-02-24 14:29:47 +00:00
{
2004-02-26 10:38:49 +00:00
#if defined(HAVE_OPENLOG_R) && defined(SYSLOG_DATA_INIT)
2004-01-07 11:10:17 +00:00
struct syslog_data sdata = SYSLOG_DATA_INIT;
#endif
char msgbuf[MSGBUFSIZ];
char fmtbuf[MSGBUFSIZ];
char *txt = NULL;
int pri = LOG_INFO;
int saved_errno = errno;
2011-09-28 08:14:41 +00:00
log_handler_fn *tmp_handler;
2021-11-04 17:16:52 +00:00
const char *progname = argv0 != NULL ? argv0 : __progname;
2021-04-23 19:10:38 +00:00
if (!force && level > log_level)
return;
switch (level) {
case SYSLOG_LEVEL_FATAL:
if (!log_on_stderr)
txt = "fatal";
pri = LOG_CRIT;
break;
case SYSLOG_LEVEL_ERROR:
if (!log_on_stderr)
txt = "error";
pri = LOG_ERR;
break;
case SYSLOG_LEVEL_INFO:
pri = LOG_INFO;
break;
case SYSLOG_LEVEL_VERBOSE:
pri = LOG_INFO;
break;
case SYSLOG_LEVEL_DEBUG1:
txt = "debug1";
pri = LOG_DEBUG;
break;
case SYSLOG_LEVEL_DEBUG2:
txt = "debug2";
pri = LOG_DEBUG;
break;
case SYSLOG_LEVEL_DEBUG3:
txt = "debug3";
pri = LOG_DEBUG;
break;
default:
txt = "internal error";
pri = LOG_ERR;
break;
}
2011-09-28 08:14:41 +00:00
if (txt != NULL && log_handler == NULL) {
snprintf(fmtbuf, sizeof(fmtbuf), "%s: %s", txt, fmt);
vsnprintf(msgbuf, sizeof(msgbuf), fmtbuf, args);
} else {
vsnprintf(msgbuf, sizeof(msgbuf), fmt, args);
}
2021-04-23 19:10:38 +00:00
if (suffix != NULL) {
snprintf(fmtbuf, sizeof(fmtbuf), "%s: %s", msgbuf, suffix);
strlcpy(msgbuf, fmtbuf, sizeof(msgbuf));
}
2004-10-28 16:03:53 +00:00
strnvis(fmtbuf, msgbuf, sizeof(fmtbuf),
log_on_stderr ? LOG_STDERR_VIS : LOG_SYSLOG_VIS);
2011-09-28 08:14:41 +00:00
if (log_handler != NULL) {
/* Avoid recursion */
tmp_handler = log_handler;
log_handler = NULL;
2021-04-23 19:13:32 +00:00
tmp_handler(level, force, fmtbuf, log_handler_ctx);
2011-09-28 08:14:41 +00:00
log_handler = tmp_handler;
} else if (log_on_stderr) {
2021-11-04 17:16:52 +00:00
snprintf(msgbuf, sizeof msgbuf, "%s%s%.*s\r\n",
(log_on_stderr > 1) ? progname : "",
(log_on_stderr > 1) ? ": " : "",
2017-08-03 10:10:20 +00:00
(int)sizeof msgbuf - 3, fmtbuf);
2013-09-18 17:27:38 +00:00
(void)write(log_stderr_fd, msgbuf, strlen(msgbuf));
} else {
2004-02-26 10:38:49 +00:00
#if defined(HAVE_OPENLOG_R) && defined(SYSLOG_DATA_INIT)
2021-11-04 17:16:52 +00:00
openlog_r(progname, LOG_PID, log_facility, &sdata);
2004-01-07 11:10:17 +00:00
syslog_r(pri, &sdata, "%.500s", fmtbuf);
closelog_r(&sdata);
#else
2021-11-04 17:16:52 +00:00
openlog(progname, LOG_PID, log_facility);
syslog(pri, "%.500s", fmtbuf);
closelog();
2004-01-07 11:10:17 +00:00
#endif
}
errno = saved_errno;
2000-02-24 14:29:47 +00:00
}
2021-04-23 19:10:38 +00:00
void
sshlog(const char *file, const char *func, int line, int showfunc,
LogLevel level, const char *suffix, const char *fmt, ...)
{
va_list args;
va_start(args, fmt);
sshlogv(file, func, line, showfunc, level, suffix, fmt, args);
va_end(args);
}
void
sshlogdie(const char *file, const char *func, int line, int showfunc,
LogLevel level, const char *suffix, const char *fmt, ...)
{
va_list args;
va_start(args, fmt);
sshlogv(file, func, line, showfunc, SYSLOG_LEVEL_INFO,
suffix, fmt, args);
va_end(args);
cleanup_exit(255);
}
void
sshsigdie(const char *file, const char *func, int line, int showfunc,
LogLevel level, const char *suffix, const char *fmt, ...)
{
va_list args;
va_start(args, fmt);
sshlogv(file, func, line, showfunc, SYSLOG_LEVEL_FATAL,
suffix, fmt, args);
va_end(args);
_exit(1);
}
void
sshlogv(const char *file, const char *func, int line, int showfunc,
LogLevel level, const char *suffix, const char *fmt, va_list args)
{
char tag[128], fmt2[MSGBUFSIZ + 128];
int forced = 0;
const char *cp;
size_t i;
2023-12-18 15:59:40 +00:00
/* short circuit processing early if we're not going to log anything */
if (nlog_verbose == 0 && level > log_level)
return;
2021-08-30 19:14:33 +00:00
snprintf(tag, sizeof(tag), "%.48s:%.48s():%d (pid=%ld)",
(cp = strrchr(file, '/')) == NULL ? file : cp + 1, func, line,
(long)getpid());
2021-04-23 19:10:38 +00:00
for (i = 0; i < nlog_verbose; i++) {
if (match_pattern_list(tag, log_verbose[i], 0) == 1) {
forced = 1;
break;
}
}
2021-04-23 19:13:32 +00:00
if (forced)
2021-04-23 19:10:38 +00:00
snprintf(fmt2, sizeof(fmt2), "%s: %s", tag, fmt);
else if (showfunc)
snprintf(fmt2, sizeof(fmt2), "%s: %s", func, fmt);
else
strlcpy(fmt2, fmt, sizeof(fmt2));
2021-04-23 19:13:32 +00:00
do_log(level, forced, suffix, fmt2, args);
}
void
sshlogdirect(LogLevel level, int forced, const char *fmt, ...)
{
va_list args;
va_start(args, fmt);
do_log(level, forced, NULL, fmt, args);
va_end(args);
2021-04-23 19:10:38 +00:00
}