source: trunk/src/sh_error.c@ 397

Last change on this file since 397 was 383, checked in by katerina, 13 years ago

Fix for ticket #281 (warnings from clang static analyzer).

File size: 41.2 KB
RevLine 
[1]1/* SAMHAIN file system integrity testing */
2/* Copyright (C) 1999, 2000 Rainer Wichmann */
3/* */
4/* This program is free software; you can redistribute it */
5/* and/or modify */
6/* it under the terms of the GNU General Public License as */
7/* published by */
8/* the Free Software Foundation; either version 2 of the License, or */
9/* (at your option) any later version. */
10/* */
11/* This program is distributed in the hope that it will be useful, */
12/* but WITHOUT ANY WARRANTY; without even the implied warranty of */
13/* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the */
14/* GNU General Public License for more details. */
15/* */
16/* You should have received a copy of the GNU General Public License */
17/* along with this program; if not, write to the Free Software */
18/* Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */
19
20#include "config_xor.h"
21
[144]22/* Required on Linux to get the correct strerror_r function. Also
23 * for recursive mutexes (_XOPEN_SOURCE >= 500). Gives funny error
24 * on Solaris 10/gcc ('c99' compiler required - huh? Isn't gcc
25 * good enough?).
[132]26 */
[144]27#if !defined(__sun__) && !defined(__sun)
[132]28#define _XOPEN_SOURCE 600
[352]29#undef _GNU_SOURCE
[144]30#endif
[132]31#include <string.h>
[1]32#include <stdio.h>
33#include <stdlib.h>
34#include <stdarg.h>
35#include <ctype.h>
36#include <limits.h>
37#include <errno.h>
38
39/* Required on FreeBSD
40 */
41#include <sys/types.h>
42
43#ifdef HAVE_MEMORY_H
44#include <memory.h>
45#endif
46
47#if defined(HAVE_MLOCK) && !defined(HAVE_BROKEN_MLOCK)
48#include <sys/mman.h>
49#endif
50
51
52
53#include "samhain.h"
54
55#include "sh_cat.h"
56#include "sh_database.h"
57#include "sh_error.h"
58#include "sh_utils.h"
59#include "sh_unix.h"
60#include "sh_tiger.h"
[214]61#include "sh_nmail.h"
[1]62#include "sh_forward.h"
63#include "sh_prelude.h"
[140]64#include "sh_pthread.h"
[1]65
66#if defined(WITH_DATABASE)
67#include "sh_tools.h"
68#endif
69
70#if defined(WITH_EXTERNAL)
71#include "sh_extern.h"
72#endif
73
74#undef FIL__
75#define FIL__ _("sh_error.c")
76/*@-noret -compmempass@*/
77extern int clt_class;
78
79int flag_err_debug = SL_FALSE;
80int flag_err_info = SL_FALSE;
81
82int ShDFLevel[SH_ERR_T_END];
83
84typedef struct _log_t {
85 char file[SH_PATHBUF];
86 char format[SH_PATHBUF];
87 /*@null@*/char * msg;
88 size_t msg_len;
89 int severity;
90 int class;
91 int pid;
92 long status;
93 long line;
94 char timestamp[TIM_MAX];
95} sh_log_t;
96
97
98struct _errFlags errFlags;
99
100static int sh_error_init (void);
101
102/*@owned@*//*@null@*/inline
103static char * get_format(unsigned long msg_id, /*@out@*/int * priority,
104 /*@out@*/unsigned int * class);
105
106static int sh_error_string (struct _log_t * lmsg, va_list vl);
107
[170]108extern int sh_log_console (/*@null@*/const char *message);
[1]109extern int sh_log_syslog (int severity, /*@null@*/char *message);
110extern int sh_log_file (/*@null@*/char *message,
111 /*@null@*/char * inet_peer);
112/* convert a string to a numeric priority
113 */
[22]114int sh_error_convert_level (const char * str_s);
[1]115
116static int IsInitialized = BAD;
117
118/* --- Only log to stderr. ---
119 */
120int OnlyStderr = S_TRUE;
121
[86]122/* --- Enable facilities not safe for closeall(). ---
123 */
124int enableUnsafe = S_FALSE;
[1]125
126/*********************************************
127 * utility functions for verifying entries
128 *********************************************/
129
[20]130int sh_error_verify (const char * s)
[1]131{
132 char * foo;
[133]133 char hashbuf[KEYBUF_SIZE];
[1]134
135 if (s[0] == '/')
136 {
[159]137 foo = sh_tiger_hash_gpg (s, TIGER_FILE, TIGER_NOLIM);
[1]138 fprintf (stdout, _("%s\n"), foo);
139 SH_FREE(foo);
140 }
141 else
142 {
143 fprintf (stdout, _("string=<%s>, hash=<%s>\n"),
144 s, sh_tiger_hash (s, TIGER_DATA,
[133]145 (unsigned long) sl_strlen(s),
146 hashbuf, sizeof(hashbuf))
147 );
[1]148 }
149 (void) fflush(stdout);
150 _exit (EXIT_SUCCESS);
151 /*@i@*/return 0;
152}
153
154
155
156/*********************************************
157 * end utility functions
158 *********************************************/
159
160void sh_error_only_stderr (int flag)
161{
162 OnlyStderr = flag;
163 return;
164}
165
[86]166void sh_error_enable_unsafe (int flag)
167{
168 enableUnsafe = flag;
169 return;
170}
171
[1]172static int dbg_store = 0;
173static int dbg_flag = 0;
174
175static
[170]176void compute_flag_err_debug(void)
[1]177{
178 if ((errFlags.loglevel & SH_ERR_ALL) != 0)
179 flag_err_debug = SL_TRUE;
180 else if ((errFlags.printlevel & SH_ERR_ALL) != 0)
181 flag_err_debug = SL_TRUE;
182 else if ((errFlags.maillevel & SH_ERR_ALL) != 0)
183 flag_err_debug = SL_TRUE;
184 else if ((errFlags.exportlevel & SH_ERR_ALL) != 0)
185 flag_err_debug = SL_TRUE;
186 else if ((errFlags.sysloglevel & SH_ERR_ALL) != 0)
187 flag_err_debug = SL_TRUE;
188 else if ((errFlags.externallevel & SH_ERR_ALL) != 0)
189 flag_err_debug = SL_TRUE;
190 else if ((errFlags.databaselevel & SH_ERR_ALL) != 0)
191 flag_err_debug = SL_TRUE;
192 else if ((errFlags.preludelevel & SH_ERR_ALL) != 0)
193 flag_err_debug = SL_TRUE;
194 else
195 flag_err_debug = SL_FALSE;
196 return;
197}
198
199static
[170]200void compute_flag_err_info(void)
[1]201{
202 if ((errFlags.loglevel & SH_ERR_INFO) != 0)
203 flag_err_info = SL_TRUE;
204 else if ((errFlags.printlevel & SH_ERR_INFO) != 0)
205 flag_err_info = SL_TRUE;
206 else if ((errFlags.maillevel & SH_ERR_INFO) != 0)
207 flag_err_info = SL_TRUE;
208 else if ((errFlags.exportlevel & SH_ERR_INFO) != 0)
209 flag_err_info = SL_TRUE;
210 else if ((errFlags.sysloglevel & SH_ERR_INFO) != 0)
211 flag_err_info = SL_TRUE;
212 else if ((errFlags.externallevel & SH_ERR_INFO) != 0)
213 flag_err_info = SL_TRUE;
214 else if ((errFlags.databaselevel & SH_ERR_INFO) != 0)
215 flag_err_info = SL_TRUE;
216 else if ((errFlags.preludelevel & SH_ERR_INFO) != 0)
217 flag_err_info = SL_TRUE;
218 else
219 flag_err_info = SL_FALSE;
220 return;
221}
222
[170]223void sh_error_dbg_switch(void)
[1]224{
225 if (dbg_flag == 0)
226 {
227 dbg_store = errFlags.printlevel;
228 errFlags.printlevel = (SH_ERR_ALL | SH_ERR_INFO | SH_ERR_NOTICE |
229 SH_ERR_WARN | SH_ERR_STAMP | SH_ERR_ERR |
230 SH_ERR_SEVERE | SH_ERR_FATAL);
231 dbg_flag = 1;
232 flag_err_debug = SL_TRUE;
233 }
234 else {
235 errFlags.printlevel = dbg_store;
236 dbg_store = 0;
237 dbg_flag = 0;
238 compute_flag_err_debug();
239 }
240 return;
241}
242
[22]243static int sh_error_set_classmask (const char * str, int * facility_mask)
[1]244{
245 char * p;
246 int num = 0;
247 unsigned int i;
248 size_t len;
[22]249 char * c;
[1]250
251 SL_ENTER(_("sh_error_set_classmask"));
252
[22]253 if (str == NULL)
[1]254 SL_RETURN( -1, _("sh_error_set_classmask"));
255
256 if (IsInitialized == BAD)
257 (void) sh_error_init();
258
[22]259 if (str[0] == (char) 34)
260 ++str;
261 len = strlen(str);
262
263 c = SH_ALLOC(len+1);
264 sl_strlcpy(c, str, len+1);
265
[1]266 if (c[len-1] == (char) 34)
267 c[len-1] = '\0';
268
269 *facility_mask = 0;
270
271 do {
[131]272#if defined(HAVE_PTHREAD) && defined (_POSIX_THREAD_SAFE_FUNCTIONS) && defined(HAVE_STRTOK_R)
273 char * saveptr;
274 if (num == 0) {
275 p = strtok_r (c, " ,\t", &saveptr);
276 ++num;
277 } else {
278 p = strtok_r (NULL, " ,\t", &saveptr);
279 }
280#else
281 if (num == 0) {
282 p = strtok (c, " ,\t");
283 ++num;
284 } else {
[1]285 p = strtok (NULL, " ,\t");
[131]286 }
287#endif
[1]288
289 if (p == NULL)
290 break;
291
292 for (i = 0; i < SH_CLA_MAX; ++i)
293 {
294 if (i < SH_CLA_RAW_MAX) {
295 if (0 == strcmp(p, _(class_cat[i])))
296 *facility_mask |= (1 << i);
297 } else {
298 if (0 == strcmp(p, _(class_cat[SH_CLA_RAW_MAX + 0])))
299 *facility_mask |= OTHER_CLA;
300 if (0 == strcmp(p, _(class_cat[SH_CLA_RAW_MAX + 1])))
301 *facility_mask |= RUN_NEW;
302 if (0 == strcmp(p, _(class_cat[SH_CLA_RAW_MAX + 2])))
303 *facility_mask |= FIL_NEW;
304 if (0 == strcmp(p, _(class_cat[SH_CLA_RAW_MAX + 3])))
305 *facility_mask |= ERROR_CLA;
306 }
307 }
308
309 } while (p);
310
[22]311 SH_FREE(c);
[1]312 SL_RETURN( 0, _("sh_error_set_classmask"));
313}
314
[22]315int sh_error_log_mask (const char * c)
[1]316{
317 return (sh_error_set_classmask(c, &(errFlags.log_class)));
318}
[22]319int sh_error_mail_mask (const char * c)
[1]320{
321 return (sh_error_set_classmask(c, &(errFlags.mail_class)));
322}
[22]323int sh_error_print_mask (const char * c)
[1]324{
325 return (sh_error_set_classmask(c, &(errFlags.print_class)));
326}
[22]327int sh_error_export_mask (const char * c)
[1]328{
329 return (sh_error_set_classmask(c, &(errFlags.export_class)));
330}
[22]331int sh_error_syslog_mask (const char * c)
[1]332{
333 return (sh_error_set_classmask(c, &(errFlags.syslog_class)));
334}
[22]335int sh_error_external_mask (const char * c)
[1]336{
337 return (sh_error_set_classmask(c, &(errFlags.external_class)));
338}
[22]339int sh_error_database_mask (const char * c)
[1]340{
341 return (sh_error_set_classmask(c, &(errFlags.database_class)));
342}
[22]343int sh_error_prelude_mask (const char * c)
[1]344{
345 return (sh_error_set_classmask(c, &(errFlags.prelude_class)));
346}
347
348
349
[132]350char * sh_error_message (int tellme, char * str, size_t len)
[1]351{
352
[132]353#if defined(HAVE_STRERROR_R)
[352]354 if (len > 0) str[0] = '\0';
[132]355 strerror_r(tellme, str, len);
356 return str;
357#elif defined(HAVE_STRERROR)
358 sl_strlcpy(str, strerror(tellme), len);
359 return str;
[1]360#else
361
[132]362 char *p = NULL;
[1]363#ifdef EACCES
[132]364 if (tellme == EACCES) p = _("Permission denied.");
[1]365#endif
366#ifdef EAGAIN
[132]367 if (tellme == EAGAIN) p = _("Try again.");
[1]368#endif
369#ifdef EBADF
[132]370 if (tellme == EBADF) p = _("File descriptor in bad state.");
[1]371#endif
372#ifdef EEXIST
[132]373 if (tellme == EEXIST) p = _("File exists.");
[1]374#endif
375#ifdef EFAULT
[132]376 if (tellme == EFAULT) p = _("Bad address.");
[1]377#endif
378#ifdef EINVAL
[132]379 if (tellme == EINVAL) p = _("Invalid argument.");
[1]380#endif
381#ifdef EISDIR
[132]382 if (tellme == EISDIR) p = _("Is a directory.");
[1]383#endif
384#ifdef EINTR
[132]385 if (tellme == EINTR) p = _("System call was interrupted.");
[1]386#endif
387#ifdef EIO
[132]388 if (tellme == EIO) p = _("Low-level I/O error.");
[1]389#endif
390#ifdef ELOOP
[132]391 if (tellme == ELOOP) p = _("Too many symbolic links encountered.");
[1]392#endif
393#ifdef EMFILE
[132]394 if (tellme == EMFILE) p = _("Too many open files.");
[1]395#endif
396#ifdef EMLINK
[132]397 if (tellme == EMLINK) p = _("Too many links.");
[1]398#endif
399#ifdef ENAMETOOLONG
400 if (tellme == ENAMETOOLONG)
[132]401 p = _("File name too long.");
[1]402#endif
403#ifdef ENFILE
[132]404 if (tellme == ENFILE) p = _("File table overflow.");
[1]405#endif
406#ifdef ENOENT
[132]407 if (tellme == ENOENT) p = _("File does not exist.");
[1]408#endif
409#ifdef ENOMEM
[132]410 if (tellme == ENOMEM) p = _("Out of memory.");
[1]411#endif
412#ifdef ENOSPC
[132]413 if (tellme == ENOSPC) p = _("No space on device.");
[1]414#endif
415#ifdef ENOTDIR
[132]416 if (tellme == ENOTDIR) p = _("Not a directory.");
[1]417#endif
418#ifdef ENOTSOCK
[132]419 if (tellme == ENOTSOCK) p = _("Not a socket.");
[1]420#endif
421#ifdef EOPNOTSUPP
[132]422 if (tellme == EOPNOTSUPP) p = _("Socket is not of type SOCK_STREAM.");
[1]423#endif
424#ifdef EPERM
[132]425 if (tellme == EPERM) p = _("Permission denied.");
[1]426#endif
427#ifdef EPIPE
[132]428 if (tellme == EPIPE) p = _("No read on pipe.");
[1]429#endif
430#ifdef EROFS
[132]431 if (tellme == EROFS) p = _("Read-only file system.");
[1]432#endif
433#ifdef ETXTBSY
[132]434 if (tellme == ETXTBSY) p = _("Text file busy.");
[1]435#endif
436#ifdef EWOULDBLOCK
437 if (tellme == EWOULDBLOCK)
[132]438 p = _("No connections on non-blocking socket.");
[1]439#endif
440#ifdef EXDEV
[132]441 if (tellme == EXDEV) p = _("Not on same file system.");
[1]442#endif
[132]443 if (!p) p = _("Unknown error");
444 sl_strlcpy(str, p, len);
445 return str;
[1]446#endif /* ifndef HAVE_STRERROR */
447}
448
449
450/* switch off file log
451 */
452void sh_error_logoff()
453{
454 errFlags.HaveLog = BAD;
455 return;
456}
457
458/* switch on file log
459 */
460void sh_error_logrestore()
461{
462 errFlags.HaveLog = GOOD;
463 return;
464}
465
466/* --- Relate priority levels to literals. ---
467 */
468typedef struct eef
469{
[170]470 const char * str;
[1]471 int val;
472} eef_struc;
473
474static eef_struc eef_tab[] =
475{
476 { N_("none"), SH_ERR_NOT },
477 { N_("debug"), SH_ERR_ALL },
478 { N_("info"), SH_ERR_INFO },
479 { N_("notice"), SH_ERR_NOTICE },
480 { N_("warn"), SH_ERR_WARN },
481 { N_("mark"), SH_ERR_STAMP },
482 { N_("err"), SH_ERR_ERR },
483 { N_("crit"), SH_ERR_SEVERE },
484 { N_("alert"), SH_ERR_FATAL },
485#if defined(SH_WITH_SERVER)
486#define SH_EEF_MAX 10
487 { N_("inet"), SH_ERR_INET },
488#else
489#define SH_EEF_MAX 9
490#endif
491};
492
[22]493int sh_error_convert_level (const char * str_s)
[1]494{
495 int i;
496 int level = (-1);
497
498 SL_ENTER(_("sh_error_convert_level"));
499
500 if (str_s == NULL)
501 SL_RETURN( -1, _("sh_error_convert_level"));
502
503 for (i = 0; i < SH_EEF_MAX; ++i)
504 {
505 if (0 == sl_strncmp(str_s, _(eef_tab[i].str),
506 sl_strlen(eef_tab[i].str)))
507 {
508 level = eef_tab[i].val;
509 break;
510 }
511 }
512
513 SL_RETURN( level, _("sh_error_convert_level"));
514}
515
516
517/* --- Set severity levels. ---
518 */
[22]519int sh_error_set_iv (int iv, const char * str_s)
[1]520{
521 int level = (-1);
522
523 SL_ENTER(_("sh_error_set_iv"));
524
525 if (IsInitialized == BAD)
526 (void) sh_error_init();
527
528 level = sh_error_convert_level (str_s);
529
530 if (level == (-1))
531 {
532 sh_error_handle ((-1), FIL__, __LINE__, EINVAL, MSG_EINVALS,
533 _("severity"),
534 str_s != NULL ? str_s : _("(NULL)"));
535 SL_RETURN (-1, _("sh_error_set_iv"));
536 }
537
538 if (iv > SH_ERR_T_START && iv < SH_ERR_T_END)
539 {
540 ShDFLevel[iv] = level;
541 }
542 else
543 {
544 sh_error_handle ((-1), FIL__, __LINE__, EINVAL, MSG_EINVALL,
545 _("severity"), (long) iv);
546 SL_RETURN (-1, _("sh_error_set_iv"));
547 }
548 SL_RETURN (0, _("sh_error_set_iv"));
549}
550
[20]551int sh_error_set_level(const char * str_in, int * facility)
[1]552{
553 register int i, j, f = BAD;
554
555 int old_facility;
[20]556 const char * str_s = str_in;
[1]557
558 SL_ENTER(_("sh_error_set_level"));
559
560 if (IsInitialized == BAD)
561 (void) sh_error_init();
562
563 old_facility = *facility;
564 *facility = 0;
565
566 checkstr:
567
568 if (str_s != NULL)
569 {
570 if (0 == sl_strncmp(str_s, _(eef_tab[0].str), sl_strlen(eef_tab[0].str)))
571 {
572 *facility |= eef_tab[0].val; /* This is 'none' */
573 for (i = 1; i < SH_EEF_MAX; ++i)
574 *facility &= ~eef_tab[i].val;
575 f = GOOD;
576 }
577 else if (str_s[0] == '*') /* all */
578 {
579 for (i = 1; i < SH_EEF_MAX; ++i)
580 *facility |= eef_tab[i].val;
581 f = GOOD;
582 }
583 else if (str_s[0] == '=')
584 {
585 for (i = 1; i < SH_EEF_MAX; ++i)
586 if (0 == sl_strncmp(&str_s[1], _(eef_tab[i].str),
587 sl_strlen(eef_tab[i].str)))
588 {
589 *facility |= eef_tab[i].val;
590 f = GOOD;
591 }
592 }
593 else if (str_s[0] == '!')
594 {
595 if (str_s[1] == '*' ||
596 0 == sl_strncmp(&str_s[1], _(eef_tab[1].str),
597 sl_strlen(eef_tab[1].str)))
598 {
599 *facility |= eef_tab[0].val; /* This is 'none' */
600 for (i = 1; i < SH_EEF_MAX; ++i)
601 *facility &= ~eef_tab[i].val;
602 f = GOOD;
603 }
604 else if (str_s[1] == '=')
605 {
606 for (i = 1; i < SH_EEF_MAX; ++i)
607 {
608 if (0 == sl_strncmp(&str_s[2], _(eef_tab[i].str),
609 sl_strlen(eef_tab[i].str)))
610 {
611 *facility &= ~eef_tab[i].val;
612 f = GOOD;
613 }
614 }
615 }
616 else
617 {
618 for (i = 1; i < SH_EEF_MAX; ++i)
619 {
620 if (0 == sl_strncmp(&str_s[1], _(eef_tab[i].str),
621 sl_strlen(eef_tab[i].str)))
622 {
623 for (j = i; j < SH_EEF_MAX; ++j)
624 {
625 *facility &= ~eef_tab[j].val;
626 }
627 f = GOOD;
628 }
629 }
630 }
631 }
632 else /* plain severity name */
633 {
634 for (i = 1; i < SH_EEF_MAX; ++i)
635 {
636 if (0 == sl_strncmp(str_s, _(eef_tab[i].str),
637 sl_strlen(eef_tab[i].str)))
638 {
639 for (j = i; j < SH_EEF_MAX; ++j)
640 {
641 *facility |= eef_tab[j].val;
642 }
643 f = GOOD;
644 break;
645 }
646 }
647 }
648 }
649
[383]650 if (!str_s)
651 {
652 SL_RETURN ((-1), _("sh_error_set_level"));
653 }
[1]654 /* skip to end of string
655 */
656 while (*str_s != '\0' && *str_s != ';' && *str_s != ',' &&
657 *str_s != ' ' && *str_s != '\t')
658 ++str_s;
659
660 /* skip seperator
661 */
662 while ((*str_s != '\0') &&
663 (*str_s == ';' || *str_s == ',' || *str_s == ' ' || *str_s == '\t'))
664 ++str_s;
665
666 if (*str_s != '\0')
667 {
668 f = BAD;
669 goto checkstr;
670 }
671
672 if (f == BAD)
673 {
674 *facility = old_facility;
675 sh_error_handle ((-1), FIL__, __LINE__, EINVAL, MSG_EINVALS,
676 _("priority"), str_in);
677 SL_RETURN (-1, _("sh_error_set_level"));
678 }
679 compute_flag_err_debug();
680 compute_flag_err_info();
681 SL_RETURN (0, _("sh_error_set_level"));
682}
683
[27]684#if defined(SH_WITH_CLIENT) || defined(SH_WITH_SERVER)
[1]685/* set severity for TCP export
686 */
[20]687int sh_error_setexport(const char * str_s)
[1]688{
689 static int reject = 0;
690 if (reject == 1)
691 return (0);
692
693 if (sh.flag.opts == S_TRUE)
694 reject = 1;
695
696 return (sh_error_set_level(str_s, &errFlags.exportlevel));
697}
698#endif
699
700/* set severity for printing
701 */
702extern void dlog_set_active(int flag);
703
[20]704int sh_error_setprint(const char * str_s)
[1]705{
706 static int reject = 0;
707 int retval;
708
709 if (reject == 1)
710 return (0);
711
712 if (sh.flag.opts == S_TRUE)
713 reject = 1;
714
715 retval = sh_error_set_level(str_s, &errFlags.printlevel);
716
717 if (0 != (errFlags.printlevel & SH_ERR_INFO))
718 dlog_set_active(1);
719 if (0 != (errFlags.printlevel & SH_ERR_ALL))
720 dlog_set_active(2);
721 return retval;
722}
723
724
725/* set level for error logging
726 */
[20]727int sh_error_setlog(const char * str_s)
[1]728{
729 static int reject = 0;
730 if (reject == 1)
731 return (0);
732
733 if (sh.flag.opts == S_TRUE)
734 reject = 1;
735
736 return ( sh_error_set_level(str_s, &errFlags.loglevel) );
737}
738
739
740/* set severity for syslog
741 */
[20]742int sh_error_set_syslog (const char * str_s)
[1]743{
744 static int reject = 0;
745 if (reject == 1)
746 return (0);
747
748 if (sh.flag.opts == S_TRUE)
749 reject = 1;
750
751 return (sh_error_set_level(str_s, &errFlags.sysloglevel));
752}
753
754#if defined(WITH_EXTERNAL)
755/* set severity for external
756 */
[20]757int sh_error_set_external (const char * str_s)
[1]758{
759 static int reject = 0;
760 if (reject == 1)
761 return (0);
762
763 if (sh.flag.opts == S_TRUE)
764 reject = 1;
765
766 return (sh_error_set_level(str_s, &errFlags.externallevel));
767}
768#endif
769
770#if defined(WITH_DATABASE)
771/* set severity for database
772 */
[20]773int sh_error_set_database (const char * str_s)
[1]774{
775 static int reject = 0;
776 if (reject == 1)
777 return (0);
778
779 if (sh.flag.opts == S_TRUE)
780 reject = 1;
781
782 return (sh_error_set_level(str_s, &errFlags.databaselevel));
783}
784#endif
785
786#if defined(HAVE_LIBPRELUDE)
787/* set severity for prelude
788 */
[20]789int sh_error_set_prelude (const char * str_s)
[1]790{
791 static int reject = 0;
792
793 if (reject == 1)
794 return (0);
795
796 if (sh.flag.opts == S_TRUE)
797 reject = 1;
798
799 return sh_error_set_level(str_s, &errFlags.preludelevel);
800}
801#endif
802
803/* init or re-init log facilities that need it
804 */
[170]805void sh_error_fixup(void)
[1]806{
[181]807#if defined(HAVE_LIBPRELUDE)
[1]808 if ((errFlags.preludelevel & SH_ERR_NOT) == 0)
809 sh_prelude_init();
810 else
811 sh_prelude_stop();
812#endif
813#ifdef WITH_DATABASE
814 sh_database_reset();
815#endif
816 return;
817}
818
819/* to be called from sh_prelude_reset
820 */
[170]821void sh_error_init_prelude(void)
[1]822{
[181]823#if defined(HAVE_LIBPRELUDE)
[1]824 if ((errFlags.preludelevel & SH_ERR_NOT) == 0)
825 sh_prelude_init();
826 else
827 sh_prelude_stop();
828#endif
829 return;
830}
831
832
833/* set severity for mailing
834 */
[20]835int sh_error_setseverity (const char * str_s)
[1]836{
837 static int reject = 0;
838 if (reject == 1)
839 return (0);
840
841 if (sh.flag.opts == S_TRUE)
842 reject = 1;
843
844 return (sh_error_set_level(str_s, &errFlags.maillevel));
845}
846
847#ifdef SH_WITH_SERVER
848static char inet_peer[SH_MINIBUF] = { '\0' };
[283]849#ifdef HAVE_LIBPRELUDE
850static char inet_peer_ip[SH_IP_BUF] = { '\0' };
[1]851
[283]852void sh_error_set_peer_ip(const char * str)
853{
854 if (str == NULL)
855 inet_peer_ip[0] = '\0';
856 else
857 sl_strlcpy(inet_peer_ip, str, sizeof(inet_peer_ip));
858}
859#endif
860
[1]861void sh_error_set_peer(const char * str)
862{
863 if (str == NULL)
[11]864 inet_peer[0] = '\0';
[1]865 else
[283]866 sl_strlcpy(inet_peer, str, sizeof(inet_peer));
[1]867}
868#endif
869
870
871/**********************************************************
872 **********************************************************
873 *
874 * -------- MAIN ERROR HANDLING FUNCTION -----------------
875 *
876 *
877 * this function should be called to report an error
878 *
879 **********************************************************
880 **********************************************************/
881
[140]882SH_MUTEX_RECURSIVE(mutex_err_handle);
883
[170]884void sh_error_handle (int sev, const char * file, long line,
[1]885 long status, unsigned long msg_id, ...)
886{
887 va_list vl; /* argument list */
888 struct _log_t * lmsg;
889
890 int severity;
891 unsigned int class;
892 char * fmt;
893
[170]894 int flag_inet;
[1]895
896#ifdef SH_WITH_SERVER
[140]897 int class_inet = clt_class; /* initialize from global */
[1]898 char local_inet_peer[SH_MINIBUF];
[283]899#ifdef HAVE_LIBPRELUDE
900 char local_inet_peer_ip[SH_IP_BUF];
901#endif
[1]902#endif
903
[27]904#if defined(SH_WITH_CLIENT) || defined(SH_WITH_SERVER)
[1]905 char * ex_msg;
906#endif
907#if defined(WITH_DATABASE)
908 char * escape_msg;
909#endif
910
911 static int own_block = 0;
912
913 /*
914 * Block a facility for errors generated
915 * within that facility.
916 */
917 static int print_block = 0;
918#if defined(SH_WITH_MAIL)
919 static int mail_block = 0;
920#endif
921 static int syslog_block = 0;
922 static int log_block = 0;
[27]923#if defined(SH_WITH_CLIENT) || defined(SH_WITH_SERVER)
[1]924 static int export_block = 0;
925#endif
926#if defined(WITH_EXTERNAL)
927 static int external_block = 0;
928#endif
929#if defined(WITH_DATABASE)
930 static int database_block = 0;
931#endif
932#ifdef HAVE_LIBPRELUDE
933 static int prelude_block = 0;
934#endif
935
936 SL_ENTER(_("sh_error_handle"));
937
[140]938 SH_MUTEX_RECURSIVE_INIT(mutex_err_handle);
939 SH_MUTEX_RECURSIVE_LOCK(mutex_err_handle);
940
[1]941#ifdef SH_WITH_SERVER
942 /* copy the global string into a local array
943 */
944 if ((msg_id == MSG_TCP_MSG) && (inet_peer[0] != '\0'))
945 {
[283]946 sl_strlcpy(local_inet_peer, inet_peer, sizeof(local_inet_peer));
[1]947 sh_error_set_peer(NULL);
948 }
949 else
950 local_inet_peer[0] = '\0';
951
[283]952#ifdef HAVE_LIBPRELUDE
953 if ((msg_id == MSG_TCP_MSG) && (inet_peer_ip[0] != '\0'))
954 {
955 sl_strlcpy(local_inet_peer_ip, inet_peer_ip, sizeof(local_inet_peer_ip));
956 sh_error_set_peer_ip(NULL);
957 }
958 else
959 local_inet_peer_ip[0] = '\0';
960#endif
961
[1]962 clt_class = (-1); /* reset global */
[140]963#endif
[1]964
[140]965
[1]966 if (own_block == 1)
967 {
[140]968 goto exit_here;
[1]969 }
970
971 /* --- Initialize to default values. ---
972 */
973 if (IsInitialized == BAD)
974 (void) sh_error_init();
975
[140]976 /* Returns pointer to (constant|thread-specific) static memory
[1]977 */
978 fmt = /*@i@*/get_format (msg_id, &severity, &class);
979
[140]980#ifdef SH_WITH_SERVER
[1]981 if (class_inet != (-1))
982 class = (unsigned int) class_inet;
[140]983#endif
[1]984
[140]985 /* --- Consistency check. ---
986 */
[1]987 ASSERT((fmt != NULL), _("fmt != NULL"))
988 if (fmt == NULL)
989 {
990 fprintf(stderr,
991 _("ERROR: msg=<NULL format>, file=<%s>, line=<%ld>\n"),
992 file, line);
[140]993 goto exit_here;
[1]994 }
995
996 /* --- Override the catalogue severity. ---
997 */
998 if (sev != (-1))
999 severity = sev;
1000
[27]1001 /* these are messages from remote sources
1002 */
[1]1003 if ((severity & SH_ERR_INET) != 0)
1004 {
1005 flag_inet = S_TRUE;
1006 }
[170]1007 else
1008 {
1009 flag_inet = S_FALSE;
1010 }
[1]1011
1012 /* --- Messages not wanted for logging. ---
1013 */
1014 if ( ( (errFlags.printlevel & severity ) == 0 ||
1015 (errFlags.print_class & (1 << class)) == 0 ) &&
1016 ( (errFlags.loglevel & severity ) == 0 ||
1017 (errFlags.log_class & (1 << class)) == 0 ) &&
1018 ( (errFlags.sysloglevel & severity ) == 0 ||
1019 (errFlags.syslog_class & (1 << class)) == 0 ) &&
[27]1020#if defined(SH_WITH_CLIENT) || defined(SH_WITH_CLIENT)
[1]1021 ( (errFlags.exportlevel & severity ) == 0 ||
1022 (errFlags.export_class & (1 << class)) == 0 ) &&
1023#endif
1024#ifdef WITH_EXTERNAL
1025 ( (errFlags.externallevel & severity ) == 0 ||
1026 (errFlags.external_class & (1 << class)) == 0 ) &&
1027#endif
1028#ifdef HAVE_LIBPRELUDE
1029 ( (errFlags.preludelevel & severity ) == 0 ||
1030 (errFlags.prelude_class & (1 << class)) == 0 ) &&
1031#endif
1032#ifdef WITH_DATABASE
1033 ( (errFlags.databaselevel & severity ) == 0 ||
1034 (errFlags.database_class & (1 << class)) == 0 ) &&
1035#endif
1036 ( (errFlags.maillevel & severity ) == 0 ||
1037 (errFlags.mail_class & (1 << class)) == 0 )
1038#ifdef SH_WITH_SERVER
[27]1039 && (flag_inet == S_FALSE) /* still log messages from remote sources */
[1]1040#endif
1041 )
1042 {
[140]1043 goto exit_here;
[1]1044 }
1045
1046 if ((severity & SH_ERR_NOT) != 0)
1047 {
[140]1048 goto exit_here;
[1]1049 }
1050
1051
1052 /* Allocate space for the message.
1053 */
1054 own_block = 1;
1055 lmsg = (struct _log_t *) SH_ALLOC(sizeof(struct _log_t));
1056 MLOCK( (char *) lmsg, sizeof(struct _log_t));
1057 /*@i@*/lmsg->msg = NULL;
1058
1059 /*@i@*/(void) sl_strlcpy(lmsg->format, fmt, SH_PATHBUF);
1060 (void) sl_strlcpy(lmsg->file, file, SH_PATHBUF);
1061 lmsg->severity = severity;
1062 lmsg->class = (int) class;
1063 lmsg->line = line;
1064 lmsg->status = status;
1065
1066 /* Format the log message with timestamp etc.
1067 * Allocate lmsg->msg
1068 */
1069 va_start (vl, msg_id);
1070 (void) sh_error_string (lmsg, vl);
1071 va_end (vl);
1072 own_block = 0;
1073
1074
1075 /* Log to stderr.
1076 */
1077 if ( ((errFlags.printlevel & severity) != 0 &&
1078 (errFlags.print_class & (1 << class)) != 0 &&
1079 (errFlags.printlevel & SH_ERR_NOT) == 0)
1080#ifdef SH_WITH_SERVER
1081 || (flag_inet == S_TRUE)
1082#endif
1083 )
1084 {
1085 if (print_block == 0 && (errFlags.printlevel & SH_ERR_NOT) == 0)
1086 {
1087 /* no truncation
1088 */
1089 print_block = 1;
1090 TPT(( 0, FIL__, __LINE__, lmsg->msg));
1091 /*
1092 * Reports first error after failure. Always tries.
1093 */
1094 (void) sh_log_console (lmsg->msg);
1095 print_block = 0;
1096 }
1097 }
1098
1099
1100 /* Full logging enabled.
1101 */
[86]1102 if (OnlyStderr == S_FALSE) /* full error logging enabled */
[1]1103 {
1104
1105 /* Log to syslog.
1106 */
1107 if ( (errFlags.sysloglevel & severity) != 0 &&
1108 (errFlags.syslog_class & (1 << class)) != 0 &&
1109#ifndef INET_SYSLOG
1110 (flag_inet != S_TRUE) && /* !inet->syslog */
1111#endif
1112 (errFlags.sysloglevel & SH_ERR_NOT) == 0 )
1113 {
1114 /* will truncate to 1023 bytes
1115 */
1116 if (syslog_block == 0)
1117 {
1118 syslog_block = 1;
1119 /*
1120 * Ignores errors. Always tries.
1121 */
1122 (void) sh_log_syslog (lmsg->severity, lmsg->msg);
1123 syslog_block = 0;
1124 }
1125 }
1126
1127#if defined(WITH_EXTERNAL)
1128 /*
1129 * -- external facility
1130 */
1131 if ((errFlags.externallevel & severity) != 0 &&
1132 (errFlags.external_class & (1 << class)) != 0 &&
1133 (errFlags.externallevel & SH_ERR_NOT) == 0 &&
1134 class != AUD)
1135 {
1136 if (external_block == 0)
1137 {
1138 /* no truncation
1139 */
1140 external_block = 1;
1141 /*
1142 * Reports first error after failure. Always tries.
1143 */
1144 (void) sh_ext_execute ('l', 'o', 'g', lmsg->msg, 0);
1145 external_block = 0;
1146 }
1147 }
1148#endif
1149
1150#if defined(WITH_DATABASE)
1151 /*
1152 * -- database facility
1153 */
1154 if ((errFlags.databaselevel & severity) != 0 &&
1155 (errFlags.database_class & (1 << class)) != 0 &&
1156 (errFlags.databaselevel & SH_ERR_NOT) == 0 &&
1157 class != AUD)
1158 {
[86]1159 if (database_block == 0 && enableUnsafe == S_TRUE)
[1]1160 {
1161 /* truncates; query_max is 16k
1162 */
1163 database_block = 1;
1164#ifndef SH_STANDALONE
1165 if (msg_id == MSG_TCP_MSG
1166#ifdef INET_SYSLOG
1167 || msg_id == MSG_INET_SYSLOG
1168#endif
1169 )
1170 {
1171 /* do not escape twice
1172 */
1173 /*
1174 * Reports failure every 60 min. Always tries.
1175 */
1176 (void) sh_database_insert (lmsg->msg);
1177 }
1178 else
1179#endif
1180 {
1181 escape_msg = sh_tools_safe_name(lmsg->msg, 0);
1182 /*
1183 * Reports failure every 60 min. Always tries.
1184 */
1185 (void) sh_database_insert (escape_msg);
1186 SH_FREE(escape_msg);
1187 }
1188 database_block = 0;
1189 }
1190 }
1191#endif
1192
1193 /****************************************************
1194 * Optionally include client code for TCP forwarding
1195 * to log server
1196 ****************************************************/
[27]1197#if defined(SH_WITH_CLIENT) || defined(SH_WITH_SERVER)
[1]1198 /* Export by TCP.
1199 */
[27]1200
1201 if ( ((errFlags.exportlevel & severity ) != 0 &&
1202 (errFlags.export_class & (1 << class)) != 0 &&
1203 (errFlags.exportlevel & SH_ERR_NOT) == 0 &&
1204 class != AUD )
1205#ifdef SH_WITH_SERVER
[65]1206 /* always log inet to export */
1207 || (flag_inet == S_TRUE && sh.srvexport.name[0] != '\0')
[27]1208#endif
1209 /* sh.flag.isserver != GOOD && */
1210 /* (flag_inet == S_FALSE) */ /* don't log inet to export */
1211 )
[1]1212 {
1213 if (export_block == 0)
1214 {
1215 int retval;
[22]1216 size_t ex_len;
[1]1217
1218 /* will truncate to 65280 bytes
1219 */
1220 export_block = 1;
[34]1221 /* ex_len = 64 + sl_strlen(lmsg->msg) + 1; */
1222 ex_len = sl_strlen(lmsg->msg);
1223 if (sl_ok_adds(ex_len, 65))
1224 ex_len = 64 + ex_len + 1;
[22]1225 ex_msg = SH_ALLOC (ex_len);
1226
1227 sl_snprintf(ex_msg, ex_len, _("%d?%u?%s"),
1228 severity, class, lmsg->msg);
[1]1229 retval = sh_forward (ex_msg);
1230 SH_FREE(ex_msg);
1231 export_block = 0;
1232 if (retval == -2)
1233 {
1234 sh_error_handle ((-1), FIL__, __LINE__, 0, MSG_QUEUE_FULL,
1235 _("log server"));
1236 }
1237 }
1238 }
1239#endif
1240
1241
1242 /* Log to mail.
1243 */
1244#if defined(SH_WITH_MAIL)
1245 if ((errFlags.maillevel & severity ) != 0 &&
1246 (errFlags.mail_class & (1 << class)) != 0 &&
1247 (errFlags.maillevel & SH_ERR_NOT) == 0 &&
1248 class != AUD &&
1249 (flag_inet == S_FALSE) ) /* don't log inet to email */
1250 {
1251 if (mail_block == 0)
1252 {
1253 int retval;
1254
1255 /* will truncate to 998 bytes
1256 */
1257 mail_block = 1;
1258
[214]1259 BREAKEXIT(sh_nmail_msg);
[1]1260 if ( (severity & SH_ERR_FATAL) == 0)
[214]1261 retval = sh_nmail_pushstack (severity, lmsg->msg, NULL);
[1]1262 else
[214]1263 retval = sh_nmail_msg (severity, lmsg->msg, NULL);
[1]1264
1265 mail_block = 0;
1266 if (retval == -2)
1267 {
1268 sh_error_handle ((-1), FIL__, __LINE__, 0, MSG_QUEUE_FULL,
1269 _("email"));
1270 }
1271 }
1272 }
1273#endif
1274
1275#ifdef HAVE_LIBPRELUDE
1276 if (((errFlags.preludelevel & severity ) != 0 &&
1277 (errFlags.prelude_class & (1 << class)) != 0 &&
1278 (errFlags.preludelevel & SH_ERR_NOT) == 0 &&
1279 (class != AUD))
1280#ifdef SH_WITH_SERVER
1281 || (flag_inet == S_TRUE)
1282#endif
1283 )
1284 {
[86]1285 if (prelude_block == 0 && enableUnsafe == S_TRUE)
[1]1286 {
1287 /* will truncate to 998 bytes
1288 */
1289 prelude_block = 1;
1290
1291 BREAKEXIT(sh_prelude_alert);
1292 /*
1293 * Reports first error after failure. Always tries.
1294 */
[283]1295#if defined(HAVE_LIBPRELUDE) && defined(SH_WITH_SERVER)
1296 (void) sh_prelude_alert (severity, (int) class,
1297 lmsg->msg, lmsg->status, msg_id,
1298 local_inet_peer_ip);
1299#else
1300 (void) sh_prelude_alert (severity, (int) class,
1301 lmsg->msg, lmsg->status, msg_id,
1302 NULL);
1303#endif
[1]1304 prelude_block = 0;
1305 }
1306 }
1307#endif
1308
1309 /* Log to logfile
1310 */
1311
1312 if ( ( ( (errFlags.loglevel & severity) != 0 &&
1313 (errFlags.log_class & (1 << class)) != 0 &&
1314 (errFlags.loglevel & SH_ERR_NOT) == 0 )
1315#ifdef SH_WITH_SERVER
1316 || (flag_inet == S_TRUE)
1317#endif
1318 ) &&
1319 class != AUD &&
1320 (errFlags.HaveLog != BAD) && /* temporary switched off */
1321 (severity & SH_ERR_NOT) == 0 /* paranoia */
1322 )
1323 {
1324 if (log_block == 0)
1325 {
1326 /* no truncation
1327 */
1328 log_block = 1;
1329 BREAKEXIT(sh_log_file);
1330#ifdef SH_WITH_SERVER
1331 if (0 != sl_ret_euid())
1332 {
1333 /*
1334 * Reports first error after failure. Always tries.
1335 */
1336 if (local_inet_peer[0] == '\0')
1337 (void) sh_log_file (lmsg->msg, NULL);
1338 else
[283]1339 (void) sh_log_file (lmsg->msg, local_inet_peer);
[1]1340 }
1341#else
1342 (void) sh_log_file (lmsg->msg, NULL);
1343#endif
1344 /* sh_log_file (lmsg->msg); */
1345 log_block = 0;
1346 }
1347 }
1348
1349 }
1350
1351 /* Cleanup.
1352 */
1353 own_block = 1;
1354
1355 if (lmsg->msg)
1356 SH_FREE( lmsg->msg );
1357
1358 memset ( lmsg, (int) '\0', sizeof(struct _log_t) );
1359 MUNLOCK( (char *) lmsg, sizeof(struct _log_t) );
1360 SH_FREE( lmsg );
1361 own_block = 0;
1362
[140]1363 exit_here:
[144]1364 ; /* label at end of compound statement */
[140]1365 SH_MUTEX_RECURSIVE_UNLOCK(mutex_err_handle);
1366
[1]1367 /*@i@*/SL_RET0(_("sh_error_handle"));
1368/*@i@*/}
1369
[272]1370#if defined(SH_WITH_MAIL)
1371void sh_error_mail (const char * alias, int sev,
1372 const char * file, long line,
1373 long status, unsigned long msg_id, ...)
1374{
1375 va_list vl; /* argument list */
1376 struct _log_t * lmsg;
[1]1377
[272]1378 int severity;
1379 unsigned int class;
1380 char * fmt;
1381 int retval;
1382
1383 SL_ENTER(_("sh_error_mail"));
1384
1385 /* Returns pointer to (constant|thread-specific) static memory
1386 */
1387 fmt = /*@i@*/get_format (msg_id, &severity, &class);
1388
1389 if (!fmt)
1390 {
1391 SL_RET0(_("sh_error_mail"));
1392 }
1393
1394 /* --- Override the catalogue severity. ---
1395 */
1396 if (sev != (-1))
1397 severity = sev;
1398
1399 /* --- Build the message. ---
1400 */
1401 lmsg = (struct _log_t *) SH_ALLOC(sizeof(struct _log_t));
1402 MLOCK( (char *) lmsg, sizeof(struct _log_t));
1403 /*@i@*/lmsg->msg = NULL;
1404
1405 /*@i@*/(void) sl_strlcpy(lmsg->format, fmt, SH_PATHBUF);
1406 (void) sl_strlcpy(lmsg->file, file, SH_PATHBUF);
1407 lmsg->severity = severity;
1408 lmsg->class = (int) class;
1409 lmsg->line = line;
1410 lmsg->status = status;
1411
1412 /* Format the log message with timestamp etc.
1413 * Allocate lmsg->msg
1414 */
1415 va_start (vl, msg_id);
1416 (void) sh_error_string (lmsg, vl);
1417 va_end (vl);
1418
1419 if ( (severity & SH_ERR_FATAL) == 0)
1420 retval = sh_nmail_pushstack (severity, lmsg->msg, alias);
1421 else
1422 retval = sh_nmail_msg (severity, lmsg->msg, alias);
1423
1424 if (retval == -2)
1425 {
1426 sh_error_handle ((-1), FIL__, __LINE__, 0, MSG_QUEUE_FULL,
1427 _("email"));
1428 }
1429 SL_RET0(_("sh_error_mail"));
1430}
1431#else
1432void sh_error_mail (const char * alias, int sev,
1433 const char * file, long line,
1434 long status, unsigned long msg_id, ...)
1435{
1436 (void) alias;
1437 (void) sev;
1438 (void) file;
1439 (void) line;
1440 (void) status;
1441 (void) msg_id;
1442
1443 return;
1444}
1445/* defined(SH_WITH_MAIL) */
1446#endif
1447
[1]1448/* -------------------------
1449 *
1450 * private functions below
1451 *
1452 * -------------------------
1453 */
1454
1455
1456/* --- Get the format from the message catalog. ---
1457 */
1458/*@owned@*/ /*@null@*/inline
1459static char * get_format(unsigned long msg_id, /*@out@*/ int * priority,
1460 /*@out@*/unsigned int * class)
1461{
1462 int i = 0;
1463
1464 SL_ENTER(_("get_format"));
1465 while (1 == 1)
1466 {
1467 if ( msg_cat[i].format == NULL )
1468 break;
1469
1470 if ( (unsigned long) msg_cat[i].id == msg_id)
1471 {
1472 *priority = (int) msg_cat[i].priority;
1473 *class = (unsigned int) msg_cat[i].class;
[170]1474 SL_RETURN (((char *) _(msg_cat[i].format)), _("get_format"));
[1]1475 }
1476 ++i;
1477 }
1478 *priority = SH_ERR_ERR;
1479 *class = ERR;
1480 SL_RETURN (NULL, _("get_format"));
1481}
1482
1483/*@null@*//*@only@*/static char * ehead_format = NULL;
1484
1485/* allocate space for user-defined message header
1486 */
[22]1487int sh_error_ehead (/*@null@*/const char * str_s)
[1]1488{
1489 size_t size;
[22]1490 const char * s;
[1]1491
1492 SL_ENTER(_("sh_error_ehead"));
1493
1494 if (str_s == NULL)
1495 {
1496 SL_RETURN (-1, _("sh_error_ehead"));
1497 }
1498
1499 /* ascii 34 ist t\"ttelchen
1500 */
1501 /*@i@*/ if (str_s[0] == 34) s = &str_s[1];
1502 else s = str_s;
1503
1504 size = /*@i@*/strlen(s);
[22]1505 if (/*@i@*/s[size-1] == (char) 34) --size; /* truncate */
[1]1506
1507 if (ehead_format != NULL)
1508 SH_FREE(ehead_format);
1509
1510 /*@i@*/ehead_format = SH_ALLOC(size+1);
1511 /*@i@*/ (void) sl_strlcpy(ehead_format, s, size+1);
1512
1513 SL_RETURN( 0, _("sh_error_ehead"));
1514}
1515
1516#if !defined(VA_COPY)
1517#if defined(__GNUC__) && defined(__PPC__) && (defined(_CALL_SYSV) || defined(_WIN32))
1518#define VA_COPY(ap1, ap2) (*(ap1) = *(ap2))
1519#elif defined(VA_COPY_AS_ARRAY)
1520#define VA_COPY(ap1, ap2) memmove ((ap1), (ap2), sizeof (va_list))
1521#else /* va_list is a pointer */
1522#define VA_COPY(ap1, ap2) ((ap1) = (ap2))
1523#endif
1524#endif
1525
1526
1527/* print an error into string
1528 */
1529static int sh_error_string (struct _log_t * lmsg, va_list vl)
1530{
1531 size_t len;
1532 int required;
1533 unsigned long line;
1534 char sev[16] = "";
1535 char cla[16] = "";
1536 char tst[64] = "";
1537 char *p;
1538 va_list vl2;
1539
1540 st_format rep_ehead_tab[] = {
1541 { 'S', S_FMT_STRING, 0, 0, NULL}, /* severity */
1542 { 'T', S_FMT_STRING, 0, 0, NULL}, /* timestamp */
1543 { 'F', S_FMT_STRING, 0, 0, NULL}, /* file */
1544 { 'L', S_FMT_ULONG, 0, 0, NULL}, /* line */
1545 { 'C', S_FMT_STRING, 0, 0, NULL}, /* class */
1546 { 'E', S_FMT_LONG, 0, 0, NULL}, /* status */
1547 {'\0', S_FMT_ULONG, 0, 0, NULL},
1548 };
1549
1550 SL_ENTER(_("sh_error_string"));
1551
1552 if (ehead_format == NULL)
1553 {
1554 ehead_format = SH_ALLOC(64);
1555#ifdef SH_USE_XML
1556 if ((errFlags.printlevel & SH_ERR_ALL) == 0)
1557 (void) sl_strlcpy(ehead_format,
1558 _("<log sev=\"%S\" tstamp=\"%T\" "), 64);
1559 else
1560 (void) sl_strlcpy(ehead_format,
1561 _("<log sev=\"%S\" tstamp=\"%T\" p.f=\"%F\" p.l=\"%L\" p.s=\"%E\" "), 64);
1562#else
1563 if ((errFlags.printlevel & SH_ERR_ALL) == 0)
1564 (void) sl_strlcpy(ehead_format, _("%S %T "), 64);
1565 else
1566 (void) sl_strlcpy(ehead_format, _("%S %T (%F, %L, %E) "), 64);
1567#endif
1568 }
1569
1570 /* header of error message
1571 */
1572#ifdef SH_USE_XML
1573 if ( (lmsg->severity & SH_ERR_INET) != 0)
1574 (void) sl_strlcpy (sev, _("RCVT"), 11);
1575 else if ( (lmsg->severity & SH_ERR_ALL) != 0)
1576 (void) sl_strlcpy (sev, _("DEBG"), 11);
1577 else if ( (lmsg->severity & SH_ERR_INFO) != 0)
1578 (void) sl_strlcpy (sev, _("INFO"), 11);
1579 else if ( (lmsg->severity & SH_ERR_NOTICE) != 0)
1580 (void) sl_strlcpy (sev, _("NOTE"), 11);
1581 else if ( (lmsg->severity & SH_ERR_WARN) != 0)
1582 (void) sl_strlcpy (sev, _("WARN"), 11);
1583 else if ( (lmsg->severity & SH_ERR_STAMP) != 0)
1584 (void) sl_strlcpy (sev, _("MARK"), 11);
1585 else if ( (lmsg->severity & SH_ERR_ERR) != 0)
1586 (void) sl_strlcpy (sev, _("ERRO"), 11);
1587 else if ( (lmsg->severity & SH_ERR_SEVERE) != 0)
1588 (void) sl_strlcpy (sev, _("CRIT"), 11);
1589 else if ( (lmsg->severity & SH_ERR_FATAL) != 0)
1590 (void) sl_strlcpy (sev, _("ALRT"), 11);
1591 else {
1592 (void) sl_strlcpy (sev, _("????"), 11);
1593#else
1594#if defined(INET_SYSLOG)
1595 if ( (lmsg->severity & SH_ERR_INET) != 0)
1596 (void) sl_strlcpy (sev, _("<NET> : "), 11);
1597#else
1598 if ( (lmsg->severity & SH_ERR_INET) != 0)
1599 (void) sl_strlcpy (sev, _("<TCP> : "), 11);
1600#endif
1601 else if ( (lmsg->severity & SH_ERR_ALL) != 0)
1602 (void) sl_strlcpy (sev, _("DEBUG : "), 11);
1603 else if ( (lmsg->severity & SH_ERR_INFO) != 0)
1604 (void) sl_strlcpy (sev, _("INFO : "), 11);
1605 else if ( (lmsg->severity & SH_ERR_NOTICE) != 0)
1606 (void) sl_strlcpy (sev, _("NOTICE : "), 11);
1607 else if ( (lmsg->severity & SH_ERR_WARN) != 0)
1608 (void) sl_strlcpy (sev, _("WARN : "), 11);
1609 else if ( (lmsg->severity & SH_ERR_STAMP) != 0)
1610 (void) sl_strlcpy (sev, _("MARK : "), 11);
1611 else if ( (lmsg->severity & SH_ERR_ERR) != 0)
1612 (void) sl_strlcpy (sev, _("ERROR : "), 11);
1613 else if ( (lmsg->severity & SH_ERR_SEVERE) != 0)
1614 (void) sl_strlcpy (sev, _("CRIT : "), 11);
1615 else if ( (lmsg->severity & SH_ERR_FATAL) != 0)
1616 (void) sl_strlcpy (sev, _("ALERT : "), 11);
1617 else {
1618 (void) sl_strlcpy (sev, _("??? : "), 11);
1619#endif
1620 }
1621
[132]1622 (void) sh_unix_time (0, tst, 64);
[1]1623 line = (unsigned long) lmsg->line;
1624 (void) sl_strlcpy (cla, _(class_cat[lmsg->class]), 11);
1625
1626 /*@i@*/rep_ehead_tab[0].data_str = sev;
1627 /*@i@*/rep_ehead_tab[1].data_str = tst;
1628 /*@i@*/rep_ehead_tab[2].data_str = lmsg->file;
1629 /*@i@*/rep_ehead_tab[3].data_ulong = line;
1630 /*@i@*/rep_ehead_tab[4].data_str = cla;
1631 /*@i@*/rep_ehead_tab[5].data_long = lmsg->status;
1632
1633 p = /*@i@*/sh_util_formatted(ehead_format, rep_ehead_tab);
1634
1635 /* --- copy the header to lmsg->msg ---
1636 */
1637 /*@i@*/lmsg->msg = SH_ALLOC(SH_BUFSIZE);
1638 lmsg->msg_len = SH_BUFSIZE;
1639
1640 if (p)
1641 {
1642 (void) sl_strlcpy (lmsg->msg, p, SH_BUFSIZE);
1643 SH_FREE(p);
1644 }
1645 else
1646 {
1647 lmsg->msg[0] = '\0';
1648 }
1649
1650
1651 /* --- copy message to lmsg->msg ---
1652 */
1653 if ( NULL == strchr(lmsg->format, '%') )
1654 {
1655 (void) sl_strlcat (lmsg->msg, lmsg->format, (size_t) lmsg->msg_len);
1656 }
1657 else
1658 {
1659 /* use VA_COPY */
1660 /*@i@*/VA_COPY(vl2, vl);
1661 len = sl_strlen(lmsg->msg);
1662 /*@i@*/required = sl_vsnprintf(&(lmsg->msg[len]),
[22]1663 (lmsg->msg_len - len), lmsg->format, vl);
[170]1664
[34]1665 if ((required >= 0) &&
1666 sl_ok_adds(required, len) &&
1667 sl_ok_adds((required+len), 4) &&
1668 ((required + len) > (lmsg->msg_len - 4)) )
[1]1669 {
1670 /*@i@*/p = SH_ALLOC(required + len + 4);
1671 (void) sl_strlcpy (p, lmsg->msg, required + len + 1);
1672 SH_FREE(lmsg->msg);
1673 lmsg->msg = p;
1674 lmsg->msg_len = required + len + 4;
1675 (void) sl_vsnprintf(&(lmsg->msg[len]),
[170]1676 (required + 1), lmsg->format, vl2);
[1]1677 }
1678 va_end(vl2);
1679 }
1680
1681#ifdef SH_USE_XML
1682 /* closing tag
1683 */
1684 if (lmsg->msg[sl_strlen(lmsg->msg)-1] != '>')
1685 (void) sl_strlcat (lmsg->msg, _(" />"), lmsg->msg_len);
1686#endif
1687
1688 SL_RETURN(0, _("sh_error_string"));
1689}
1690
1691
1692
1693
1694/* --- Initialize. ---
1695 */
1696static int sh_error_init ()
1697{
1698 register int j;
1699
1700 SL_ENTER(_("sh_error_init"));
1701
1702 errFlags.debug = 0;
1703 errFlags.HaveLog = GOOD;
1704 errFlags.sysloglevel = SH_ERR_NOT;
1705#if defined(SH_STEALTH)
1706 errFlags.loglevel = SH_ERR_NOT;
1707#else
1708 errFlags.loglevel = (SH_ERR_STAMP | SH_ERR_ERR | SH_ERR_SEVERE |
1709 SH_ERR_FATAL);
1710#endif
1711 errFlags.externallevel = SH_ERR_NOT;
1712 errFlags.databaselevel = SH_ERR_NOT;
1713 errFlags.preludelevel = SH_ERR_NOT;
1714 errFlags.maillevel = SH_ERR_FATAL;
1715#if defined(SH_STEALTH)
1716 errFlags.printlevel = SH_ERR_NOT;
1717#else
1718 errFlags.printlevel = (SH_ERR_INFO | SH_ERR_NOTICE | SH_ERR_WARN |
1719 SH_ERR_STAMP | SH_ERR_ERR | SH_ERR_SEVERE |
1720 SH_ERR_FATAL);
[5]1721 flag_err_info = SL_TRUE;
[1]1722#endif
[65]1723
1724#if defined(SH_WITH_SERVER)
1725 errFlags.exportlevel = SH_ERR_NOT;
1726#else
[1]1727 errFlags.exportlevel = (SH_ERR_STAMP | SH_ERR_ERR | SH_ERR_SEVERE |
1728 SH_ERR_FATAL);
[65]1729#endif
[1]1730
1731 errFlags.log_class = 0xFFFF;
1732 errFlags.print_class = 0xFFFF;
1733 errFlags.mail_class = 0xFFFF;
1734 errFlags.export_class = 0xFFFF;
1735 errFlags.syslog_class = 0xFFFF;
1736 errFlags.external_class = 0xFFFF;
1737 errFlags.database_class = 0xFFFF;
1738 errFlags.prelude_class = 0xFFFF;
1739
1740
1741 for (j = 0; j < SH_ERR_T_END; ++j)
1742 ShDFLevel[j] = SH_ERR_SEVERE;
1743
1744 IsInitialized = GOOD;
1745 SL_RETURN (0, _("sh_error_init"));
1746}
Note: See TracBrowser for help on using the repository browser.