search for: log_con

Displaying 5 results from an estimated 5 matches for "log_con".

Did you mean: log_cond
1997 Feb 18
0
Abuse of the syslog facility
...d_intr: status=0x59 { SeekComplete DataRequest Error } { UncorrectableError }, CHS=157/2/9, sector=2826\0"; const char *mesg2 ="end_request: I/O error, dev 03:00, sector 2826\0"; const char *mesg3 = "EXT2-fs: group descriptors corrupted !\0"; openlog("kernel", LOG_CONS, LOG_KERN); syslog(LOG_ERR, mesg1); syslog(LOG_ERR, mesg2); syslog(LOG_ERR, mesg3); closelog(); } --------------------------------- If one does "chmod o-rw /dev/log" that stops the above message from ending up in the log. However if the user runs the above in a tight loop, i.e. &quo...
2004 Oct 21
0
define more syslog flags
...ude/syslog.h 2004-10-21 15:35:22.411495112 -0600 @@ -47,6 +47,14 @@ #define LOG_FACMASK 01770 #define LOG_FAC(x) (((x) >> 3) & (LOG_FACMASK >> 3)) +/* openlog() flags - not used */ +#define LOG_PID 0x01 /* include pid with message */ +#define LOG_CONS 0x02 /* write to console on logger error */ +#define LOG_ODELAY 0x04 /* delay connection until syslog() */ +#define LOG_NDELAY 0x08 /* open connection immediately */ +#define LOG_NOWAIT 0x10 /* wait for child processes (unused on linux) */ +#d...
2003 Feb 20
0
Netbios name service forwarding.
..., j; struct sockaddr_in from; fd_set rfds; int tid; int bcast; int dmport; if (argc < 3) { fprintf (stderr, "Usage:\n"); fprintf (stderr, "%s nmbdport interface [interface] [interface] ...\n"); exit (1); } openlog ("nbnsfw", LOG_CONS, LOG_DAEMON); daemon (0, 0); setsid (); argc--; argv++; dmport = atoi (*(argv++)); argc--; while (argc--) { open_if (*(argv++), NETBIOSPORT, dmport); } syslog (LOG_ERR, "Local nmbd port is %d", dmport); for (;;) { FD_ZERO (&rfds);...
2005 Oct 02
11
Repeated attacks via SSH
Everyone: We're starting to see a rash of password guessing attacks via SSH on all of our exposed BSD servers which are running an SSH daemon. They're coming from multiple addresses, which makes us suspect that they're being carried out by a network of "bots" rather than a single attacker. But wait... there's more. The interesting thing about these attacks is that
2013 Jul 15
21
[PATCH 00 of 21 RESEND] blktap3/drivers: Introduce tapdisk server.
This patch series copies the core of the tapdisk process from blktap2, with updates coming from blktap2.5. Signed-off-by: Thanos Makatos <thanos.makatos@citrix.com>