Home | History | Annotate | Line # | Download | only in syslogd
syslogd.c revision 1.55
      1  1.55  christos /*	$NetBSD: syslogd.c,v 1.55 2002/08/02 02:23:49 christos Exp $	*/
      2  1.32        ad 
      3   1.1       cgd /*
      4   1.5     perry  * Copyright (c) 1983, 1988, 1993, 1994
      5   1.5     perry  *	The Regents of the University of California.  All rights reserved.
      6   1.1       cgd  *
      7   1.1       cgd  * Redistribution and use in source and binary forms, with or without
      8   1.1       cgd  * modification, are permitted provided that the following conditions
      9   1.1       cgd  * are met:
     10   1.1       cgd  * 1. Redistributions of source code must retain the above copyright
     11   1.1       cgd  *    notice, this list of conditions and the following disclaimer.
     12   1.1       cgd  * 2. Redistributions in binary form must reproduce the above copyright
     13   1.1       cgd  *    notice, this list of conditions and the following disclaimer in the
     14   1.1       cgd  *    documentation and/or other materials provided with the distribution.
     15   1.1       cgd  * 3. All advertising materials mentioning features or use of this software
     16   1.1       cgd  *    must display the following acknowledgement:
     17   1.1       cgd  *	This product includes software developed by the University of
     18   1.1       cgd  *	California, Berkeley and its contributors.
     19   1.1       cgd  * 4. Neither the name of the University nor the names of its contributors
     20   1.1       cgd  *    may be used to endorse or promote products derived from this software
     21   1.1       cgd  *    without specific prior written permission.
     22   1.1       cgd  *
     23   1.1       cgd  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     24   1.1       cgd  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     25   1.1       cgd  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     26   1.1       cgd  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     27   1.1       cgd  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     28   1.1       cgd  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     29   1.1       cgd  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     30   1.1       cgd  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     31   1.1       cgd  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     32   1.1       cgd  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     33   1.1       cgd  * SUCH DAMAGE.
     34   1.1       cgd  */
     35   1.1       cgd 
     36  1.11  christos #include <sys/cdefs.h>
     37   1.1       cgd #ifndef lint
     38  1.11  christos __COPYRIGHT("@(#) Copyright (c) 1983, 1988, 1993, 1994\n\
     39  1.11  christos 	The Regents of the University of California.  All rights reserved.\n");
     40   1.1       cgd #endif /* not lint */
     41   1.1       cgd 
     42   1.1       cgd #ifndef lint
     43  1.11  christos #if 0
     44  1.11  christos static char sccsid[] = "@(#)syslogd.c	8.3 (Berkeley) 4/4/94";
     45  1.11  christos #else
     46  1.55  christos __RCSID("$NetBSD: syslogd.c,v 1.55 2002/08/02 02:23:49 christos Exp $");
     47  1.11  christos #endif
     48   1.1       cgd #endif /* not lint */
     49   1.1       cgd 
     50   1.1       cgd /*
     51   1.1       cgd  *  syslogd -- log system messages
     52   1.1       cgd  *
     53   1.1       cgd  * This program implements a system log. It takes a series of lines.
     54   1.1       cgd  * Each line may have a priority, signified as "<n>" as
     55   1.1       cgd  * the first characters of the line.  If this is
     56   1.1       cgd  * not present, a default priority is used.
     57   1.1       cgd  *
     58   1.1       cgd  * To kill syslogd, send a signal 15 (terminate).  A signal 1 (hup) will
     59   1.1       cgd  * cause it to reread its configuration file.
     60   1.1       cgd  *
     61   1.1       cgd  * Defined Constants:
     62   1.1       cgd  *
     63   1.1       cgd  * MAXLINE -- the maximimum line length that can be handled.
     64   1.1       cgd  * DEFUPRI -- the default priority for user messages
     65   1.1       cgd  * DEFSPRI -- the default priority for kernel messages
     66   1.1       cgd  *
     67   1.1       cgd  * Author: Eric Allman
     68   1.1       cgd  * extensive changes by Ralph Campbell
     69   1.1       cgd  * more extensive changes by Eric Allman (again)
     70   1.1       cgd  */
     71   1.1       cgd 
     72   1.1       cgd #define	MAXLINE		1024		/* maximum line length */
     73   1.1       cgd #define	MAXSVLINE	120		/* maximum saved line length */
     74   1.1       cgd #define DEFUPRI		(LOG_USER|LOG_NOTICE)
     75   1.1       cgd #define DEFSPRI		(LOG_KERN|LOG_CRIT)
     76   1.1       cgd #define TIMERINTVL	30		/* interval for checking flush, mark */
     77   1.5     perry #define TTYMSGTIME	1		/* timeout passed to ttymsg */
     78   1.1       cgd 
     79   1.1       cgd #include <sys/param.h>
     80   1.1       cgd #include <sys/socket.h>
     81  1.53       wiz #include <sys/sysctl.h>
     82  1.53       wiz #include <sys/types.h>
     83   1.1       cgd #include <sys/un.h>
     84  1.53       wiz #include <sys/wait.h>
     85   1.1       cgd 
     86   1.5     perry #include <ctype.h>
     87   1.5     perry #include <errno.h>
     88   1.5     perry #include <fcntl.h>
     89  1.53       wiz #include <grp.h>
     90  1.41      tron #include <locale.h>
     91  1.53       wiz #include <netdb.h>
     92  1.53       wiz #include <poll.h>
     93  1.53       wiz #include <pwd.h>
     94   1.5     perry #include <signal.h>
     95  1.53       wiz #include <stdarg.h>
     96   1.1       cgd #include <stdio.h>
     97   1.5     perry #include <stdlib.h>
     98   1.1       cgd #include <string.h>
     99   1.1       cgd #include <unistd.h>
    100  1.53       wiz #include <util.h>
    101  1.53       wiz 
    102  1.55  christos #include "utmpentry.h"
    103   1.1       cgd #include "pathnames.h"
    104   1.1       cgd 
    105   1.1       cgd #define SYSLOG_NAMES
    106   1.1       cgd #include <sys/syslog.h>
    107   1.1       cgd 
    108  1.46    itojun #ifdef LIBWRAP
    109  1.46    itojun #include <tcpd.h>
    110  1.46    itojun 
    111  1.46    itojun int allow_severity = LOG_AUTH|LOG_INFO;
    112  1.46    itojun int deny_severity = LOG_AUTH|LOG_WARNING;
    113  1.46    itojun #endif
    114  1.46    itojun 
    115   1.1       cgd char	*ConfFile = _PATH_LOGCONF;
    116   1.1       cgd char	ctty[] = _PATH_CONSOLE;
    117   1.1       cgd 
    118   1.1       cgd #define FDMASK(fd)	(1 << (fd))
    119   1.1       cgd 
    120   1.1       cgd #define	dprintf		if (Debug) printf
    121   1.1       cgd 
    122   1.1       cgd #define MAXUNAMES	20	/* maximum number of user names */
    123   1.1       cgd 
    124   1.1       cgd /*
    125   1.1       cgd  * Flags to logmsg().
    126   1.1       cgd  */
    127   1.1       cgd 
    128   1.1       cgd #define IGN_CONS	0x001	/* don't print on console */
    129   1.1       cgd #define SYNC_FILE	0x002	/* do fsync on file after printing */
    130   1.1       cgd #define ADDDATE		0x004	/* add a date to the message */
    131   1.1       cgd #define MARK		0x008	/* this message is a mark */
    132   1.1       cgd 
    133   1.1       cgd /*
    134   1.1       cgd  * This structure represents the files that will have log
    135   1.1       cgd  * copies printed.
    136   1.1       cgd  */
    137   1.1       cgd 
    138   1.1       cgd struct filed {
    139   1.1       cgd 	struct	filed *f_next;		/* next in linked list */
    140   1.1       cgd 	short	f_type;			/* entry type, see below */
    141   1.1       cgd 	short	f_file;			/* file descriptor */
    142   1.1       cgd 	time_t	f_time;			/* time this was last written */
    143   1.1       cgd 	u_char	f_pmask[LOG_NFACILITIES+1];	/* priority mask */
    144   1.1       cgd 	union {
    145   1.1       cgd 		char	f_uname[MAXUNAMES][UT_NAMESIZE+1];
    146   1.1       cgd 		struct {
    147   1.1       cgd 			char	f_hname[MAXHOSTNAMELEN+1];
    148  1.30    itojun 			struct	addrinfo *f_addr;
    149   1.1       cgd 		} f_forw;		/* forwarding address */
    150   1.1       cgd 		char	f_fname[MAXPATHLEN];
    151   1.1       cgd 	} f_un;
    152   1.1       cgd 	char	f_prevline[MAXSVLINE];		/* last message logged */
    153   1.1       cgd 	char	f_lasttime[16];			/* time of last occurrence */
    154   1.1       cgd 	char	f_prevhost[MAXHOSTNAMELEN+1];	/* host from which recd. */
    155   1.1       cgd 	int	f_prevpri;			/* pri of f_prevline */
    156   1.1       cgd 	int	f_prevlen;			/* length of f_prevline */
    157   1.1       cgd 	int	f_prevcount;			/* repetition cnt of prevline */
    158   1.1       cgd 	int	f_repeatcount;			/* number of "repeated" msgs */
    159   1.1       cgd };
    160   1.1       cgd 
    161   1.1       cgd /*
    162   1.1       cgd  * Intervals at which we flush out "message repeated" messages,
    163   1.1       cgd  * in seconds after previous message is logged.  After each flush,
    164   1.1       cgd  * we move to the next interval until we reach the largest.
    165   1.1       cgd  */
    166   1.1       cgd int	repeatinterval[] = { 30, 120, 600 };	/* # of secs before flush */
    167   1.1       cgd #define	MAXREPEAT ((sizeof(repeatinterval) / sizeof(repeatinterval[0])) - 1)
    168   1.1       cgd #define	REPEATTIME(f)	((f)->f_time + repeatinterval[(f)->f_repeatcount])
    169   1.1       cgd #define	BACKOFF(f)	{ if (++(f)->f_repeatcount > MAXREPEAT) \
    170   1.1       cgd 				 (f)->f_repeatcount = MAXREPEAT; \
    171   1.1       cgd 			}
    172   1.1       cgd 
    173   1.1       cgd /* values for f_type */
    174   1.1       cgd #define F_UNUSED	0		/* unused entry */
    175   1.1       cgd #define F_FILE		1		/* regular file */
    176   1.1       cgd #define F_TTY		2		/* terminal */
    177   1.1       cgd #define F_CONSOLE	3		/* console terminal */
    178   1.1       cgd #define F_FORW		4		/* remote machine */
    179   1.1       cgd #define F_USERS		5		/* list of users */
    180   1.1       cgd #define F_WALL		6		/* everyone logged on */
    181   1.1       cgd 
    182   1.1       cgd char	*TypeNames[7] = {
    183   1.1       cgd 	"UNUSED",	"FILE",		"TTY",		"CONSOLE",
    184   1.1       cgd 	"FORW",		"USERS",	"WALL"
    185   1.1       cgd };
    186   1.1       cgd 
    187   1.1       cgd struct	filed *Files;
    188   1.1       cgd struct	filed consfile;
    189   1.1       cgd 
    190   1.1       cgd int	Debug;			/* debug flag */
    191  1.47      manu int	daemonized = 0;		/* we are not daemonized yet */
    192   1.1       cgd char	LocalHostName[MAXHOSTNAMELEN+1];	/* our hostname */
    193   1.1       cgd char	*LocalDomain;		/* our local domain name */
    194  1.38     jwise int	*finet = NULL;			/* Internet datagram sockets */
    195   1.1       cgd int	Initialized = 0;	/* set when we have initialized ourselves */
    196   1.1       cgd int	MarkInterval = 20 * 60;	/* interval between marks in seconds */
    197   1.1       cgd int	MarkSeq = 0;		/* mark sequence number */
    198  1.35     jwise int	SecureMode = 0;		/* listen only on unix domain socks */
    199  1.45       mrg int	UseNameService = 1;	/* make domain name queries */
    200  1.36     jwise int	NumForwards = 0;	/* number of forwarding actions in conf file */
    201  1.22       mrg char	**LogPaths;		/* array of pathnames to read messages from */
    202   1.1       cgd 
    203  1.53       wiz void	cfline(char *, struct filed *);
    204  1.53       wiz char   *cvthname(struct sockaddr_storage *);
    205  1.53       wiz int	decode(const char *, CODE *);
    206  1.53       wiz void	die(int);
    207  1.53       wiz void	domark(int);
    208  1.53       wiz void	fprintlog(struct filed *, int, char *);
    209  1.53       wiz int	getmsgbufsize(void);
    210  1.53       wiz int*	socksetup(int);
    211  1.53       wiz void	init(int);
    212  1.53       wiz void	logerror(const char *, ...);
    213  1.53       wiz void	logmsg(int, char *, char *, int);
    214  1.53       wiz void	printline(char *, char *);
    215  1.53       wiz void	printsys(char *);
    216  1.53       wiz void	reapchild(int);
    217  1.53       wiz void	usage(void);
    218  1.53       wiz void	wallmsg(struct filed *, struct iovec *);
    219  1.53       wiz int	main(int, char *[]);
    220  1.53       wiz void	logpath_add(char ***, int *, int *, char *);
    221  1.53       wiz void	logpath_fileadd(char ***, int *, int *, char *);
    222   1.1       cgd 
    223   1.5     perry int
    224  1.53       wiz main(int argc, char *argv[])
    225   1.1       cgd {
    226  1.22       mrg 	int ch, *funix, i, j, fklog, len, linesize;
    227  1.31    itojun 	int *nfinetix, nfklogix, nfunixbaseix, nfds;
    228  1.22       mrg 	int funixsize = 0, funixmaxsize = 0;
    229   1.1       cgd 	struct sockaddr_un sunx, fromunix;
    230  1.30    itojun 	struct sockaddr_storage frominet;
    231  1.22       mrg 	char *p, *line, **pp;
    232  1.22       mrg 	struct pollfd *readfds;
    233  1.47      manu 	uid_t uid = 0;
    234  1.47      manu 	gid_t gid = 0;
    235  1.47      manu 	char *user = NULL;
    236  1.47      manu 	char *group = NULL;
    237  1.47      manu 	char *root = "/";
    238  1.47      manu 	char *endp;
    239  1.47      manu 	struct group   *gr;
    240  1.47      manu 	struct passwd  *pw;
    241  1.47      manu 
    242  1.41      tron 
    243  1.41      tron 	(void)setlocale(LC_ALL, "");
    244   1.1       cgd 
    245  1.47      manu 	while ((ch = getopt(argc, argv, "dnsf:m:p:P:u:g:t:")) != -1)
    246   1.5     perry 		switch(ch) {
    247  1.53       wiz 		case 'd':		/* debug */
    248  1.53       wiz 			Debug++;
    249  1.53       wiz 			break;
    250  1.53       wiz 		case 'f':		/* configuration file */
    251  1.53       wiz 			ConfFile = optarg;
    252  1.47      manu 			break;
    253  1.47      manu 		case 'g':
    254  1.47      manu 			group = optarg;
    255  1.47      manu 			if (*group == '\0')
    256  1.47      manu 				usage();
    257  1.47      manu 			break;
    258   1.1       cgd 		case 'm':		/* mark interval */
    259   1.1       cgd 			MarkInterval = atoi(optarg) * 60;
    260   1.1       cgd 			break;
    261  1.45       mrg 		case 'n':		/* turn off DNS queries */
    262  1.45       mrg 			UseNameService = 0;
    263  1.45       mrg 			break;
    264   1.1       cgd 		case 'p':		/* path */
    265  1.22       mrg 			logpath_add(&LogPaths, &funixsize,
    266  1.22       mrg 			    &funixmaxsize, optarg);
    267  1.22       mrg 			break;
    268  1.22       mrg 		case 'P':		/* file of paths */
    269  1.22       mrg 			logpath_fileadd(&LogPaths, &funixsize,
    270  1.22       mrg 			    &funixmaxsize, optarg);
    271   1.1       cgd 			break;
    272  1.35     jwise 		case 's':		/* no network listen mode */
    273   1.7     perry 			SecureMode++;
    274   1.7     perry 			break;
    275  1.53       wiz 		case 't':
    276  1.53       wiz 			root = optarg;
    277  1.53       wiz 			if (*root == '\0')
    278  1.53       wiz 				usage();
    279  1.53       wiz 			break;
    280  1.53       wiz 		case 'u':
    281  1.53       wiz 			user = optarg;
    282  1.53       wiz 			if (*user == '\0')
    283  1.53       wiz 				usage();
    284  1.53       wiz 			break;
    285   1.1       cgd 		case '?':
    286   1.1       cgd 		default:
    287   1.1       cgd 			usage();
    288   1.1       cgd 		}
    289   1.5     perry 	if ((argc -= optind) != 0)
    290   1.1       cgd 		usage();
    291   1.1       cgd 
    292  1.47      manu 	setlinebuf(stdout);
    293  1.47      manu 
    294  1.47      manu 	if (user != NULL) {
    295  1.47      manu 		if (isdigit((unsigned char)*user)) {
    296  1.47      manu 			uid = (uid_t)strtoul(user, &endp, 0);
    297  1.47      manu 			if (*endp != '\0')
    298  1.47      manu 	    			goto getuser;
    299  1.47      manu 		} else {
    300  1.47      manu getuser:
    301  1.47      manu 			if ((pw = getpwnam(user)) != NULL) {
    302  1.47      manu 				uid = pw->pw_uid;
    303  1.47      manu 			} else {
    304  1.47      manu 				errno = 0;
    305  1.47      manu 				logerror("Cannot find user `%s'", user);
    306  1.47      manu 				die (0);
    307  1.47      manu 			}
    308  1.47      manu 		}
    309  1.47      manu 	}
    310  1.47      manu 
    311  1.47      manu 	if (group != NULL) {
    312  1.47      manu 		if (isdigit((unsigned char)*group)) {
    313  1.47      manu 			gid = (gid_t)strtoul(group, &endp, 0);
    314  1.47      manu 			if (*endp != '\0')
    315  1.47      manu 	    			goto getgroup;
    316  1.47      manu 		} else {
    317  1.47      manu getgroup:
    318  1.47      manu 			if ((gr = getgrnam(group)) != NULL) {
    319  1.47      manu 				gid = gr->gr_gid;
    320  1.47      manu 			} else {
    321  1.47      manu 				errno = 0;
    322  1.47      manu 				logerror("Cannot find group `%s'", group);
    323  1.47      manu 				die(0);
    324  1.47      manu 			}
    325  1.47      manu 		}
    326  1.47      manu 	}
    327  1.47      manu 
    328  1.47      manu 	if (access (root, F_OK | R_OK)) {
    329  1.53       wiz 		logerror("Cannot access `%s'", root);
    330  1.47      manu 		die (0);
    331  1.47      manu 	}
    332   1.1       cgd 
    333   1.1       cgd 	consfile.f_type = F_CONSOLE;
    334   1.5     perry 	(void)strcpy(consfile.f_un.f_fname, ctty);
    335   1.5     perry 	(void)gethostname(LocalHostName, sizeof(LocalHostName));
    336  1.19       mrg 	LocalHostName[sizeof(LocalHostName) - 1] = '\0';
    337   1.5     perry 	if ((p = strchr(LocalHostName, '.')) != NULL) {
    338   1.1       cgd 		*p++ = '\0';
    339   1.1       cgd 		LocalDomain = p;
    340   1.5     perry 	} else
    341   1.1       cgd 		LocalDomain = "";
    342  1.15       leo 	linesize = getmsgbufsize();
    343  1.15       leo 	if (linesize < MAXLINE)
    344  1.15       leo 		linesize = MAXLINE;
    345  1.15       leo 	linesize++;
    346  1.15       leo 	line = malloc(linesize);
    347  1.15       leo 	if (line == NULL) {
    348  1.47      manu 		logerror("Couldn't allocate line buffer");
    349  1.15       leo 		die(0);
    350  1.15       leo 	}
    351   1.5     perry 	(void)signal(SIGTERM, die);
    352   1.5     perry 	(void)signal(SIGINT, Debug ? die : SIG_IGN);
    353   1.5     perry 	(void)signal(SIGQUIT, Debug ? die : SIG_IGN);
    354   1.5     perry 	(void)signal(SIGCHLD, reapchild);
    355   1.5     perry 	(void)signal(SIGALRM, domark);
    356   1.5     perry 	(void)alarm(TIMERINTVL);
    357   1.5     perry 
    358   1.5     perry #ifndef SUN_LEN
    359   1.5     perry #define SUN_LEN(unp) (strlen((unp)->sun_path) + 2)
    360   1.5     perry #endif
    361  1.24      tron 	if (funixsize == 0)
    362  1.24      tron 		logpath_add(&LogPaths, &funixsize,
    363  1.24      tron 		    &funixmaxsize, _PATH_LOG);
    364  1.22       mrg 	funix = (int *)malloc(sizeof(int) * funixsize);
    365  1.22       mrg 	if (funix == NULL) {
    366  1.47      manu 		logerror("Couldn't allocate funix descriptors");
    367   1.1       cgd 		die(0);
    368   1.1       cgd 	}
    369  1.26      tron 	for (j = 0, pp = LogPaths; *pp; pp++, j++) {
    370  1.47      manu 		dprintf("Making unix dgram socket `%s'\n", *pp);
    371  1.22       mrg 		unlink(*pp);
    372  1.22       mrg 		memset(&sunx, 0, sizeof(sunx));
    373  1.22       mrg 		sunx.sun_family = AF_LOCAL;
    374  1.22       mrg 		(void)strncpy(sunx.sun_path, *pp, sizeof(sunx.sun_path));
    375  1.22       mrg 		funix[j] = socket(AF_LOCAL, SOCK_DGRAM, 0);
    376  1.22       mrg 		if (funix[j] < 0 || bind(funix[j],
    377  1.22       mrg 		    (struct sockaddr *)&sunx, SUN_LEN(&sunx)) < 0 ||
    378  1.22       mrg 		    chmod(*pp, 0666) < 0) {
    379  1.47      manu 			logerror("Cannot create `%s'", *pp);
    380  1.22       mrg 			die(0);
    381  1.22       mrg 		}
    382  1.47      manu 		dprintf("Listening on unix dgram socket `%s'\n", *pp);
    383  1.22       mrg 	}
    384   1.7     perry 
    385  1.36     jwise 	init(0);
    386  1.30    itojun 
    387  1.22       mrg 	if ((fklog = open(_PATH_KLOG, O_RDONLY, 0)) < 0) {
    388  1.47      manu 		dprintf("Can't open `%s' (%d)\n", _PATH_KLOG, errno);
    389  1.22       mrg 	} else {
    390  1.47      manu 		dprintf("Listening on kernel log `%s'\n", _PATH_KLOG);
    391   1.1       cgd 	}
    392   1.1       cgd 
    393  1.47      manu 	dprintf("Off & running....\n");
    394   1.1       cgd 
    395   1.5     perry 	(void)signal(SIGHUP, init);
    396   1.1       cgd 
    397  1.22       mrg 	/* setup pollfd set. */
    398  1.22       mrg 	readfds = (struct pollfd *)malloc(sizeof(struct pollfd) *
    399  1.31    itojun 			(funixsize + (finet ? *finet : 0) + 1));
    400  1.22       mrg 	if (readfds == NULL) {
    401  1.47      manu 		logerror("Couldn't allocate pollfds");
    402  1.22       mrg 		die(0);
    403  1.22       mrg 	}
    404  1.22       mrg 	nfds = 0;
    405  1.22       mrg 	if (fklog >= 0) {
    406  1.22       mrg 		nfklogix = nfds++;
    407  1.22       mrg 		readfds[nfklogix].fd = fklog;
    408  1.22       mrg 		readfds[nfklogix].events = POLLIN | POLLPRI;
    409  1.22       mrg 	}
    410  1.34     lukem 	if (finet && !SecureMode) {
    411  1.31    itojun 		nfinetix = malloc(*finet * sizeof(*nfinetix));
    412  1.31    itojun 		for (j = 0; j < *finet; j++) {
    413  1.31    itojun 			nfinetix[j] = nfds++;
    414  1.31    itojun 			readfds[nfinetix[j]].fd = finet[j+1];
    415  1.31    itojun 			readfds[nfinetix[j]].events = POLLIN | POLLPRI;
    416  1.31    itojun 		}
    417  1.30    itojun 	}
    418  1.22       mrg 	nfunixbaseix = nfds;
    419  1.22       mrg 	for (j = 0, pp = LogPaths; *pp; pp++) {
    420  1.22       mrg 		readfds[nfds].fd = funix[j++];
    421  1.22       mrg 		readfds[nfds++].events = POLLIN | POLLPRI;
    422  1.22       mrg 	}
    423  1.22       mrg 
    424  1.47      manu 	/*
    425  1.47      manu 	 * All files are open, we can drop privileges and chroot
    426  1.47      manu 	 */
    427  1.53       wiz 	dprintf("Attempt to chroot to `%s'\n", root);
    428  1.53       wiz 	if (chroot(root)) {
    429  1.53       wiz 		logerror("Failed to chroot to `%s'", root);
    430  1.47      manu 		die(0);
    431  1.47      manu 	}
    432  1.53       wiz 	dprintf("Attempt to set GID/EGID to `%d'\n", gid);
    433  1.53       wiz 	if (setgid(gid) || setegid(gid)) {
    434  1.53       wiz 		logerror("Failed to set gid to `%d'", gid);
    435  1.47      manu 		die(0);
    436  1.47      manu 	}
    437  1.53       wiz 	dprintf("Attempt to set UID/EUID to `%d'\n", uid);
    438  1.53       wiz 	if (setuid(uid) || seteuid(uid)) {
    439  1.53       wiz 		logerror("Failed to set uid to `%d'", uid);
    440  1.47      manu 		die(0);
    441  1.47      manu 	}
    442  1.47      manu 
    443  1.47      manu 	/*
    444  1.47      manu 	 * We cannot detach from the terminal before we are sure we won't
    445  1.47      manu 	 * have a fatal error, because error message would not go to the
    446  1.47      manu 	 * terminal and would not be logged because syslogd dies.
    447  1.47      manu 	 * All die() calls are behind us, we can call daemon()
    448  1.47      manu 	 */
    449  1.47      manu 	if (!Debug) {
    450  1.47      manu 		(void)daemon(0, 0);
    451  1.47      manu 		daemonized = 1;
    452  1.48      taca 
    453  1.48      taca 		/* tuck my process id away, if i'm not in debug mode */
    454  1.48      taca 		pidfile(NULL);
    455  1.47      manu 	}
    456  1.47      manu 
    457   1.1       cgd 	for (;;) {
    458  1.22       mrg 		int rv;
    459   1.1       cgd 
    460  1.22       mrg 		rv = poll(readfds, nfds, INFTIM);
    461  1.22       mrg 		if (rv == 0)
    462   1.1       cgd 			continue;
    463  1.22       mrg 		if (rv < 0) {
    464   1.1       cgd 			if (errno != EINTR)
    465  1.47      manu 				logerror("poll() failed");
    466   1.1       cgd 			continue;
    467   1.1       cgd 		}
    468  1.47      manu 		dprintf("Got a message (%d)\n", rv);
    469  1.22       mrg 		if (fklog >= 0 &&
    470  1.22       mrg 		    (readfds[nfklogix].revents & (POLLIN | POLLPRI))) {
    471  1.47      manu 			dprintf("Kernel log active\n");
    472  1.15       leo 			i = read(fklog, line, linesize - 1);
    473   1.1       cgd 			if (i > 0) {
    474   1.1       cgd 				line[i] = '\0';
    475   1.1       cgd 				printsys(line);
    476   1.1       cgd 			} else if (i < 0 && errno != EINTR) {
    477  1.47      manu 				logerror("klog failed");
    478   1.1       cgd 				fklog = -1;
    479   1.1       cgd 			}
    480   1.1       cgd 		}
    481  1.22       mrg 		for (j = 0, pp = LogPaths; *pp; pp++, j++) {
    482  1.22       mrg 			if ((readfds[nfunixbaseix + j].revents &
    483  1.22       mrg 			    (POLLIN | POLLPRI)) == 0)
    484  1.22       mrg 				continue;
    485  1.22       mrg 
    486  1.47      manu 			dprintf("Unix socket (%s) active\n", *pp);
    487   1.5     perry 			len = sizeof(fromunix);
    488  1.22       mrg 			i = recvfrom(funix[j], line, MAXLINE, 0,
    489   1.5     perry 			    (struct sockaddr *)&fromunix, &len);
    490   1.1       cgd 			if (i > 0) {
    491   1.1       cgd 				line[i] = '\0';
    492   1.1       cgd 				printline(LocalHostName, line);
    493  1.22       mrg 			} else if (i < 0 && errno != EINTR) {
    494  1.47      manu 				logerror("recvfrom() unix `%s'", *pp);
    495  1.22       mrg 			}
    496   1.1       cgd 		}
    497  1.34     lukem 		if (finet && !SecureMode) {
    498  1.31    itojun 			for (j = 0; j < *finet; j++) {
    499  1.34     lukem 		    		if (readfds[nfinetix[j]].revents &
    500  1.34     lukem 				    (POLLIN | POLLPRI)) {
    501  1.46    itojun #ifdef LIBWRAP
    502  1.46    itojun 					struct request_info req;
    503  1.46    itojun #endif
    504  1.46    itojun 					int reject = 0;
    505  1.46    itojun 
    506  1.31    itojun 					dprintf("inet socket active\n");
    507  1.46    itojun 
    508  1.46    itojun #ifdef LIBWRAP
    509  1.46    itojun 					request_init(&req, RQ_DAEMON, "syslogd",
    510  1.46    itojun 					    RQ_FILE, finet[j + 1], NULL);
    511  1.46    itojun 					fromhost(&req);
    512  1.46    itojun 					reject = !hosts_access(&req);
    513  1.46    itojun 					if (reject)
    514  1.46    itojun 						dprintf("access denied\n");
    515  1.46    itojun #endif
    516  1.46    itojun 
    517  1.31    itojun 					len = sizeof(frominet);
    518  1.34     lukem 					i = recvfrom(finet[j+1], line, MAXLINE,
    519  1.34     lukem 					    0, (struct sockaddr *)&frominet,
    520  1.34     lukem 					    &len);
    521  1.46    itojun 					if (i == 0 || (i < 0 && errno == EINTR))
    522  1.46    itojun 						continue;
    523  1.46    itojun 					else if (i < 0) {
    524  1.46    itojun 						logerror("recvfrom inet");
    525  1.46    itojun 						continue;
    526  1.46    itojun 					}
    527  1.46    itojun 
    528  1.46    itojun 					line[i] = '\0';
    529  1.46    itojun 					if (!reject)
    530  1.34     lukem 						printline(cvthname(&frominet),
    531  1.34     lukem 						    line);
    532  1.31    itojun 				}
    533  1.31    itojun 			}
    534  1.30    itojun 		}
    535   1.1       cgd 	}
    536   1.1       cgd }
    537   1.1       cgd 
    538   1.5     perry void
    539  1.53       wiz usage(void)
    540   1.1       cgd {
    541   1.5     perry 
    542   1.5     perry 	(void)fprintf(stderr,
    543  1.53       wiz 	    "usage: %s [-dns] [-f config_file] [-g group] [-m mark_interval]\n"
    544  1.53       wiz 	    "\t[-P file_list] [-p log_socket [-p log_socket2 ...]]\n"
    545  1.53       wiz 	    "\t[-t chroot_dir] [-u user]\n", getprogname());
    546   1.1       cgd 	exit(1);
    547   1.1       cgd }
    548   1.1       cgd 
    549   1.1       cgd /*
    550  1.22       mrg  * given a pointer to an array of char *'s, a pointer to it's current
    551  1.22       mrg  * size and current allocated max size, and a new char * to add, add
    552  1.22       mrg  * it, update everything as necessary, possibly allocating a new array
    553  1.22       mrg  */
    554  1.22       mrg void
    555  1.53       wiz logpath_add(char ***lp, int *szp, int *maxszp, char *new)
    556  1.22       mrg {
    557  1.22       mrg 
    558  1.47      manu 	dprintf("Adding `%s' to the %p logpath list\n", new, *lp);
    559  1.22       mrg 	if (*szp == *maxszp) {
    560  1.22       mrg 		if (*maxszp == 0) {
    561  1.22       mrg 			*maxszp = 4;	/* start of with enough for now */
    562  1.26      tron 			*lp = NULL;
    563  1.50     lukem 		} else
    564  1.22       mrg 			*maxszp *= 2;
    565  1.26      tron 		*lp = realloc(*lp, sizeof(char *) * (*maxszp + 1));
    566  1.26      tron 		if (*lp == NULL) {
    567  1.47      manu 			logerror("Couldn't allocate line buffer");
    568  1.26      tron 			die(0);
    569  1.22       mrg 		}
    570  1.22       mrg 	}
    571  1.50     lukem 	if (((*lp)[(*szp)++] = strdup(new)) == NULL) {
    572  1.50     lukem 		logerror("Couldn't allocate logpath");
    573  1.50     lukem 		die(0);
    574  1.50     lukem 	}
    575  1.26      tron 	(*lp)[(*szp)] = NULL;		/* always keep it NULL terminated */
    576  1.22       mrg }
    577  1.22       mrg 
    578  1.22       mrg /* do a file of log sockets */
    579  1.22       mrg void
    580  1.53       wiz logpath_fileadd(char ***lp, int *szp, int *maxszp, char *file)
    581  1.22       mrg {
    582  1.22       mrg 	FILE *fp;
    583  1.22       mrg 	char *line;
    584  1.22       mrg 	size_t len;
    585  1.22       mrg 
    586  1.22       mrg 	fp = fopen(file, "r");
    587  1.22       mrg 	if (fp == NULL) {
    588  1.47      manu 		logerror("Could not open socket file list `%s'", file);
    589  1.22       mrg 		die(0);
    590  1.22       mrg 	}
    591  1.22       mrg 
    592  1.22       mrg 	while ((line = fgetln(fp, &len))) {
    593  1.22       mrg 		line[len - 1] = 0;
    594  1.22       mrg 		logpath_add(lp, szp, maxszp, line);
    595  1.22       mrg 	}
    596  1.22       mrg 	fclose(fp);
    597  1.22       mrg }
    598  1.22       mrg 
    599  1.22       mrg /*
    600   1.1       cgd  * Take a raw input line, decode the message, and print the message
    601   1.1       cgd  * on the appropriate log files.
    602   1.1       cgd  */
    603   1.5     perry void
    604  1.53       wiz printline(char *hname, char *msg)
    605   1.1       cgd {
    606   1.5     perry 	int c, pri;
    607   1.5     perry 	char *p, *q, line[MAXLINE + 1];
    608   1.1       cgd 
    609   1.1       cgd 	/* test for special codes */
    610   1.1       cgd 	pri = DEFUPRI;
    611   1.1       cgd 	p = msg;
    612   1.1       cgd 	if (*p == '<') {
    613   1.1       cgd 		pri = 0;
    614   1.1       cgd 		while (isdigit(*++p))
    615   1.1       cgd 			pri = 10 * pri + (*p - '0');
    616   1.1       cgd 		if (*p == '>')
    617   1.1       cgd 			++p;
    618   1.1       cgd 	}
    619   1.1       cgd 	if (pri &~ (LOG_FACMASK|LOG_PRIMASK))
    620   1.1       cgd 		pri = DEFUPRI;
    621   1.1       cgd 
    622   1.1       cgd 	/* don't allow users to log kernel messages */
    623   1.1       cgd 	if (LOG_FAC(pri) == LOG_KERN)
    624   1.1       cgd 		pri = LOG_MAKEPRI(LOG_USER, LOG_PRI(pri));
    625   1.1       cgd 
    626   1.1       cgd 	q = line;
    627   1.1       cgd 
    628  1.42  sommerfe 	while ((c = *p++) != '\0' &&
    629  1.42  sommerfe 	    q < &line[sizeof(line) - 2]) {
    630  1.42  sommerfe 		c &= 0177;
    631   1.1       cgd 		if (iscntrl(c))
    632   1.1       cgd 			if (c == '\n')
    633   1.1       cgd 				*q++ = ' ';
    634   1.1       cgd 			else if (c == '\t')
    635   1.1       cgd 				*q++ = '\t';
    636   1.1       cgd 			else {
    637   1.1       cgd 				*q++ = '^';
    638   1.1       cgd 				*q++ = c ^ 0100;
    639   1.1       cgd 			}
    640   1.1       cgd 		else
    641   1.1       cgd 			*q++ = c;
    642  1.42  sommerfe 	}
    643   1.1       cgd 	*q = '\0';
    644   1.1       cgd 
    645   1.1       cgd 	logmsg(pri, line, hname, 0);
    646   1.1       cgd }
    647   1.1       cgd 
    648   1.1       cgd /*
    649   1.1       cgd  * Take a raw input line from /dev/klog, split and format similar to syslog().
    650   1.1       cgd  */
    651   1.5     perry void
    652  1.53       wiz printsys(char *msg)
    653   1.1       cgd {
    654   1.5     perry 	int c, pri, flags;
    655   1.5     perry 	char *lp, *p, *q, line[MAXLINE + 1];
    656   1.1       cgd 
    657   1.5     perry 	(void)strcpy(line, _PATH_UNIX);
    658   1.5     perry 	(void)strcat(line, ": ");
    659   1.1       cgd 	lp = line + strlen(line);
    660   1.1       cgd 	for (p = msg; *p != '\0'; ) {
    661   1.1       cgd 		flags = SYNC_FILE | ADDDATE;	/* fsync file after write */
    662   1.1       cgd 		pri = DEFSPRI;
    663   1.1       cgd 		if (*p == '<') {
    664   1.1       cgd 			pri = 0;
    665   1.1       cgd 			while (isdigit(*++p))
    666   1.1       cgd 				pri = 10 * pri + (*p - '0');
    667   1.1       cgd 			if (*p == '>')
    668   1.1       cgd 				++p;
    669   1.1       cgd 		} else {
    670   1.1       cgd 			/* kernel printf's come out on console */
    671   1.1       cgd 			flags |= IGN_CONS;
    672   1.1       cgd 		}
    673   1.1       cgd 		if (pri &~ (LOG_FACMASK|LOG_PRIMASK))
    674   1.1       cgd 			pri = DEFSPRI;
    675   1.1       cgd 		q = lp;
    676   1.1       cgd 		while (*p != '\0' && (c = *p++) != '\n' &&
    677   1.1       cgd 		    q < &line[MAXLINE])
    678   1.1       cgd 			*q++ = c;
    679   1.1       cgd 		*q = '\0';
    680   1.1       cgd 		logmsg(pri, line, LocalHostName, flags);
    681   1.1       cgd 	}
    682   1.1       cgd }
    683   1.1       cgd 
    684   1.1       cgd time_t	now;
    685   1.1       cgd 
    686   1.1       cgd /*
    687   1.1       cgd  * Log a message to the appropriate log files, users, etc. based on
    688   1.1       cgd  * the priority.
    689   1.1       cgd  */
    690   1.5     perry void
    691  1.53       wiz logmsg(int pri, char *msg, char *from, int flags)
    692   1.1       cgd {
    693   1.5     perry 	struct filed *f;
    694   1.5     perry 	int fac, msglen, omask, prilev;
    695   1.1       cgd 	char *timestamp;
    696   1.1       cgd 
    697   1.9       mrg 	dprintf("logmsg: pri 0%o, flags 0x%x, from %s, msg %s\n",
    698   1.1       cgd 	    pri, flags, from, msg);
    699   1.1       cgd 
    700   1.1       cgd 	omask = sigblock(sigmask(SIGHUP)|sigmask(SIGALRM));
    701   1.1       cgd 
    702   1.1       cgd 	/*
    703   1.1       cgd 	 * Check to see if msg looks non-standard.
    704   1.1       cgd 	 */
    705   1.1       cgd 	msglen = strlen(msg);
    706   1.1       cgd 	if (msglen < 16 || msg[3] != ' ' || msg[6] != ' ' ||
    707   1.1       cgd 	    msg[9] != ':' || msg[12] != ':' || msg[15] != ' ')
    708   1.1       cgd 		flags |= ADDDATE;
    709   1.1       cgd 
    710   1.5     perry 	(void)time(&now);
    711   1.1       cgd 	if (flags & ADDDATE)
    712   1.1       cgd 		timestamp = ctime(&now) + 4;
    713   1.1       cgd 	else {
    714   1.1       cgd 		timestamp = msg;
    715   1.1       cgd 		msg += 16;
    716   1.1       cgd 		msglen -= 16;
    717   1.1       cgd 	}
    718   1.1       cgd 
    719   1.1       cgd 	/* extract facility and priority level */
    720   1.1       cgd 	if (flags & MARK)
    721   1.1       cgd 		fac = LOG_NFACILITIES;
    722   1.1       cgd 	else
    723   1.1       cgd 		fac = LOG_FAC(pri);
    724   1.1       cgd 	prilev = LOG_PRI(pri);
    725   1.1       cgd 
    726   1.1       cgd 	/* log the message to the particular outputs */
    727   1.1       cgd 	if (!Initialized) {
    728   1.1       cgd 		f = &consfile;
    729   1.1       cgd 		f->f_file = open(ctty, O_WRONLY, 0);
    730   1.1       cgd 
    731   1.1       cgd 		if (f->f_file >= 0) {
    732   1.1       cgd 			fprintlog(f, flags, msg);
    733   1.5     perry 			(void)close(f->f_file);
    734   1.1       cgd 		}
    735   1.5     perry 		(void)sigsetmask(omask);
    736   1.1       cgd 		return;
    737   1.1       cgd 	}
    738   1.1       cgd 	for (f = Files; f; f = f->f_next) {
    739   1.1       cgd 		/* skip messages that are incorrect priority */
    740   1.1       cgd 		if (f->f_pmask[fac] < prilev ||
    741   1.1       cgd 		    f->f_pmask[fac] == INTERNAL_NOPRI)
    742   1.1       cgd 			continue;
    743   1.1       cgd 
    744   1.1       cgd 		if (f->f_type == F_CONSOLE && (flags & IGN_CONS))
    745   1.1       cgd 			continue;
    746   1.1       cgd 
    747   1.1       cgd 		/* don't output marks to recently written files */
    748   1.1       cgd 		if ((flags & MARK) && (now - f->f_time) < MarkInterval / 2)
    749   1.1       cgd 			continue;
    750   1.1       cgd 
    751   1.1       cgd 		/*
    752   1.1       cgd 		 * suppress duplicate lines to this file
    753   1.1       cgd 		 */
    754   1.1       cgd 		if ((flags & MARK) == 0 && msglen == f->f_prevlen &&
    755   1.1       cgd 		    !strcmp(msg, f->f_prevline) &&
    756   1.1       cgd 		    !strcmp(from, f->f_prevhost)) {
    757   1.5     perry 			(void)strncpy(f->f_lasttime, timestamp, 15);
    758   1.1       cgd 			f->f_prevcount++;
    759  1.47      manu 			dprintf("Msg repeated %d times, %ld sec of %d\n",
    760  1.12   thorpej 			    f->f_prevcount, (long)(now - f->f_time),
    761   1.1       cgd 			    repeatinterval[f->f_repeatcount]);
    762   1.1       cgd 			/*
    763   1.1       cgd 			 * If domark would have logged this by now,
    764   1.1       cgd 			 * flush it now (so we don't hold isolated messages),
    765   1.1       cgd 			 * but back off so we'll flush less often
    766   1.1       cgd 			 * in the future.
    767   1.1       cgd 			 */
    768   1.1       cgd 			if (now > REPEATTIME(f)) {
    769   1.1       cgd 				fprintlog(f, flags, (char *)NULL);
    770   1.1       cgd 				BACKOFF(f);
    771   1.1       cgd 			}
    772   1.1       cgd 		} else {
    773   1.1       cgd 			/* new line, save it */
    774   1.1       cgd 			if (f->f_prevcount)
    775   1.1       cgd 				fprintlog(f, 0, (char *)NULL);
    776   1.1       cgd 			f->f_repeatcount = 0;
    777   1.3       cgd 			f->f_prevpri = pri;
    778   1.5     perry 			(void)strncpy(f->f_lasttime, timestamp, 15);
    779   1.5     perry 			(void)strncpy(f->f_prevhost, from,
    780   1.1       cgd 					sizeof(f->f_prevhost));
    781   1.1       cgd 			if (msglen < MAXSVLINE) {
    782   1.1       cgd 				f->f_prevlen = msglen;
    783   1.5     perry 				(void)strcpy(f->f_prevline, msg);
    784   1.1       cgd 				fprintlog(f, flags, (char *)NULL);
    785   1.1       cgd 			} else {
    786   1.1       cgd 				f->f_prevline[0] = 0;
    787   1.1       cgd 				f->f_prevlen = 0;
    788   1.1       cgd 				fprintlog(f, flags, msg);
    789   1.1       cgd 			}
    790   1.1       cgd 		}
    791   1.1       cgd 	}
    792   1.5     perry 	(void)sigsetmask(omask);
    793   1.1       cgd }
    794   1.1       cgd 
    795   1.5     perry void
    796  1.53       wiz fprintlog(struct filed *f, int flags, char *msg)
    797   1.1       cgd {
    798   1.1       cgd 	struct iovec iov[6];
    799   1.5     perry 	struct iovec *v;
    800  1.30    itojun 	struct addrinfo *r;
    801  1.31    itojun 	int j, l, lsent;
    802   1.1       cgd 	char line[MAXLINE + 1], repbuf[80], greetings[200];
    803   1.1       cgd 
    804   1.1       cgd 	v = iov;
    805   1.1       cgd 	if (f->f_type == F_WALL) {
    806   1.1       cgd 		v->iov_base = greetings;
    807  1.17       mrg 		v->iov_len = snprintf(greetings, sizeof greetings,
    808   1.1       cgd 		    "\r\n\7Message from syslogd@%s at %.24s ...\r\n",
    809   1.1       cgd 		    f->f_prevhost, ctime(&now));
    810   1.1       cgd 		v++;
    811   1.1       cgd 		v->iov_base = "";
    812   1.1       cgd 		v->iov_len = 0;
    813   1.1       cgd 		v++;
    814   1.1       cgd 	} else {
    815   1.1       cgd 		v->iov_base = f->f_lasttime;
    816   1.1       cgd 		v->iov_len = 15;
    817   1.1       cgd 		v++;
    818   1.1       cgd 		v->iov_base = " ";
    819   1.1       cgd 		v->iov_len = 1;
    820   1.1       cgd 		v++;
    821   1.1       cgd 	}
    822   1.1       cgd 	v->iov_base = f->f_prevhost;
    823   1.1       cgd 	v->iov_len = strlen(v->iov_base);
    824   1.1       cgd 	v++;
    825   1.1       cgd 	v->iov_base = " ";
    826   1.1       cgd 	v->iov_len = 1;
    827   1.1       cgd 	v++;
    828   1.1       cgd 
    829   1.1       cgd 	if (msg) {
    830   1.1       cgd 		v->iov_base = msg;
    831   1.1       cgd 		v->iov_len = strlen(msg);
    832   1.1       cgd 	} else if (f->f_prevcount > 1) {
    833   1.1       cgd 		v->iov_base = repbuf;
    834  1.17       mrg 		v->iov_len = snprintf(repbuf, sizeof repbuf,
    835  1.17       mrg 		    "last message repeated %d times", f->f_prevcount);
    836   1.1       cgd 	} else {
    837   1.1       cgd 		v->iov_base = f->f_prevline;
    838   1.1       cgd 		v->iov_len = f->f_prevlen;
    839   1.1       cgd 	}
    840   1.1       cgd 	v++;
    841   1.1       cgd 
    842   1.1       cgd 	dprintf("Logging to %s", TypeNames[f->f_type]);
    843   1.1       cgd 	f->f_time = now;
    844   1.1       cgd 
    845   1.1       cgd 	switch (f->f_type) {
    846   1.1       cgd 	case F_UNUSED:
    847   1.1       cgd 		dprintf("\n");
    848   1.1       cgd 		break;
    849   1.1       cgd 
    850   1.1       cgd 	case F_FORW:
    851   1.1       cgd 		dprintf(" %s\n", f->f_un.f_forw.f_hname);
    852  1.34     lukem 			/*
    853  1.34     lukem 			 * check for local vs remote messages
    854  1.34     lukem 			 * (from FreeBSD PR#bin/7055)
    855  1.34     lukem 			 */
    856  1.21      tron 		if (strcmp(f->f_prevhost, LocalHostName)) {
    857  1.21      tron 			l = snprintf(line, sizeof(line) - 1,
    858  1.21      tron 				     "<%d>%.15s [%s]: %s",
    859  1.21      tron 				     f->f_prevpri, (char *) iov[0].iov_base,
    860  1.21      tron 				     f->f_prevhost, (char *) iov[4].iov_base);
    861  1.21      tron 		} else {
    862  1.21      tron 			l = snprintf(line, sizeof(line) - 1, "<%d>%.15s %s",
    863  1.21      tron 				     f->f_prevpri, (char *) iov[0].iov_base,
    864  1.21      tron 				     (char *) iov[4].iov_base);
    865  1.21      tron 		}
    866   1.1       cgd 		if (l > MAXLINE)
    867   1.1       cgd 			l = MAXLINE;
    868  1.34     lukem 		if (finet) {
    869  1.30    itojun 			for (r = f->f_un.f_forw.f_addr; r; r = r->ai_next) {
    870  1.31    itojun 				for (j = 0; j < *finet; j++) {
    871  1.31    itojun #if 0
    872  1.34     lukem 					/*
    873  1.34     lukem 					 * should we check AF first, or just
    874  1.34     lukem 					 * trial and error? FWD
    875  1.34     lukem 					 */
    876  1.34     lukem 					if (r->ai_family ==
    877  1.34     lukem 					    address_family_of(finet[j+1]))
    878  1.30    itojun #endif
    879  1.34     lukem 					lsent = sendto(finet[j+1], line, l, 0,
    880  1.34     lukem 					    r->ai_addr, r->ai_addrlen);
    881  1.31    itojun 					if (lsent == l)
    882  1.31    itojun 						break;
    883  1.31    itojun 				}
    884  1.30    itojun 			}
    885  1.30    itojun 			if (lsent != l) {
    886  1.30    itojun 				f->f_type = F_UNUSED;
    887  1.47      manu 				logerror("sendto() failed");
    888  1.30    itojun 			}
    889   1.1       cgd 		}
    890   1.1       cgd 		break;
    891   1.1       cgd 
    892   1.1       cgd 	case F_CONSOLE:
    893   1.1       cgd 		if (flags & IGN_CONS) {
    894   1.1       cgd 			dprintf(" (ignored)\n");
    895   1.1       cgd 			break;
    896   1.1       cgd 		}
    897   1.1       cgd 		/* FALLTHROUGH */
    898   1.1       cgd 
    899   1.1       cgd 	case F_TTY:
    900   1.1       cgd 	case F_FILE:
    901   1.1       cgd 		dprintf(" %s\n", f->f_un.f_fname);
    902   1.1       cgd 		if (f->f_type != F_FILE) {
    903   1.1       cgd 			v->iov_base = "\r\n";
    904   1.1       cgd 			v->iov_len = 2;
    905   1.1       cgd 		} else {
    906   1.1       cgd 			v->iov_base = "\n";
    907   1.1       cgd 			v->iov_len = 1;
    908   1.1       cgd 		}
    909   1.1       cgd 	again:
    910   1.1       cgd 		if (writev(f->f_file, iov, 6) < 0) {
    911   1.1       cgd 			int e = errno;
    912   1.5     perry 			(void)close(f->f_file);
    913   1.1       cgd 			/*
    914   1.1       cgd 			 * Check for errors on TTY's due to loss of tty
    915   1.1       cgd 			 */
    916   1.1       cgd 			if ((e == EIO || e == EBADF) && f->f_type != F_FILE) {
    917   1.1       cgd 				f->f_file = open(f->f_un.f_fname,
    918   1.1       cgd 				    O_WRONLY|O_APPEND, 0);
    919   1.1       cgd 				if (f->f_file < 0) {
    920   1.1       cgd 					f->f_type = F_UNUSED;
    921   1.1       cgd 					logerror(f->f_un.f_fname);
    922   1.1       cgd 				} else
    923   1.1       cgd 					goto again;
    924   1.1       cgd 			} else {
    925   1.1       cgd 				f->f_type = F_UNUSED;
    926   1.1       cgd 				errno = e;
    927   1.1       cgd 				logerror(f->f_un.f_fname);
    928   1.1       cgd 			}
    929   1.1       cgd 		} else if (flags & SYNC_FILE)
    930   1.5     perry 			(void)fsync(f->f_file);
    931   1.1       cgd 		break;
    932   1.1       cgd 
    933   1.1       cgd 	case F_USERS:
    934   1.1       cgd 	case F_WALL:
    935   1.1       cgd 		dprintf("\n");
    936   1.1       cgd 		v->iov_base = "\r\n";
    937   1.1       cgd 		v->iov_len = 2;
    938   1.1       cgd 		wallmsg(f, iov);
    939   1.1       cgd 		break;
    940   1.1       cgd 	}
    941   1.1       cgd 	f->f_prevcount = 0;
    942   1.1       cgd }
    943   1.1       cgd 
    944   1.1       cgd /*
    945   1.1       cgd  *  WALLMSG -- Write a message to the world at large
    946   1.1       cgd  *
    947   1.1       cgd  *	Write the specified message to either the entire
    948   1.1       cgd  *	world, or a list of approved users.
    949   1.1       cgd  */
    950   1.5     perry void
    951  1.53       wiz wallmsg(struct filed *f, struct iovec *iov)
    952   1.1       cgd {
    953   1.1       cgd 	static int reenter;			/* avoid calling ourselves */
    954   1.5     perry 	int i;
    955   1.5     perry 	char *p;
    956  1.55  christos 	static struct utmpentry *ohead = NULL;
    957  1.55  christos 	struct utmpentry *ep;
    958   1.1       cgd 
    959   1.1       cgd 	if (reenter++)
    960   1.1       cgd 		return;
    961  1.55  christos 
    962  1.55  christos 	(void)getutentries(NULL, &ep);
    963  1.55  christos 	if (ep != ohead) {
    964  1.55  christos 		freeutentries(ohead);
    965  1.55  christos 		ohead = ep;
    966   1.1       cgd 	}
    967   1.1       cgd 	/* NOSTRICT */
    968  1.55  christos 	for (; ep; ep = ep->next) {
    969   1.1       cgd 		if (f->f_type == F_WALL) {
    970  1.55  christos 			if ((p = ttymsg(iov, 6, ep->line, TTYMSGTIME))
    971  1.55  christos 			    != NULL) {
    972   1.1       cgd 				errno = 0;	/* already in msg */
    973   1.1       cgd 				logerror(p);
    974   1.1       cgd 			}
    975   1.1       cgd 			continue;
    976   1.1       cgd 		}
    977   1.1       cgd 		/* should we send the message to this user? */
    978   1.1       cgd 		for (i = 0; i < MAXUNAMES; i++) {
    979   1.1       cgd 			if (!f->f_un.f_uname[i][0])
    980   1.1       cgd 				break;
    981  1.55  christos 			if (strcmp(f->f_un.f_uname[i], ep->name) == 0) {
    982  1.55  christos 				if ((p = ttymsg(iov, 6, ep->line, TTYMSGTIME))
    983  1.55  christos 				    != NULL) {
    984   1.1       cgd 					errno = 0;	/* already in msg */
    985   1.1       cgd 					logerror(p);
    986   1.1       cgd 				}
    987   1.1       cgd 				break;
    988   1.1       cgd 			}
    989   1.1       cgd 		}
    990   1.1       cgd 	}
    991   1.1       cgd 	reenter = 0;
    992   1.1       cgd }
    993   1.1       cgd 
    994   1.1       cgd void
    995  1.53       wiz reapchild(int signo)
    996   1.1       cgd {
    997   1.1       cgd 	union wait status;
    998   1.1       cgd 
    999   1.5     perry 	while (wait3((int *)&status, WNOHANG, (struct rusage *)NULL) > 0)
   1000   1.1       cgd 		;
   1001   1.1       cgd }
   1002   1.1       cgd 
   1003   1.1       cgd /*
   1004   1.1       cgd  * Return a printable representation of a host address.
   1005   1.1       cgd  */
   1006   1.1       cgd char *
   1007  1.53       wiz cvthname(struct sockaddr_storage *f)
   1008   1.1       cgd {
   1009  1.30    itojun 	int error;
   1010   1.5     perry 	char *p;
   1011  1.30    itojun 	const int niflag = NI_DGRAM;
   1012  1.30    itojun 	static char host[NI_MAXHOST], ip[NI_MAXHOST];
   1013   1.1       cgd 
   1014  1.30    itojun 	error = getnameinfo((struct sockaddr*)f, ((struct sockaddr*)f)->sa_len,
   1015  1.33    itojun 			ip, sizeof ip, NULL, 0, NI_NUMERICHOST|niflag);
   1016   1.1       cgd 
   1017  1.30    itojun 	dprintf("cvthname(%s)\n", ip);
   1018  1.30    itojun 
   1019  1.30    itojun 	if (error) {
   1020  1.30    itojun 		dprintf("Malformed from address %s\n", gai_strerror(error));
   1021   1.1       cgd 		return ("???");
   1022   1.1       cgd 	}
   1023  1.45       mrg 
   1024  1.45       mrg 	if (!UseNameService)
   1025  1.45       mrg 		return (ip);
   1026  1.30    itojun 
   1027  1.30    itojun 	error = getnameinfo((struct sockaddr*)f, ((struct sockaddr*)f)->sa_len,
   1028  1.33    itojun 			host, sizeof host, NULL, 0, niflag);
   1029  1.30    itojun 	if (error) {
   1030  1.30    itojun 		dprintf("Host name for your address (%s) unknown\n", ip);
   1031  1.30    itojun 		return (ip);
   1032   1.1       cgd 	}
   1033  1.30    itojun 	if ((p = strchr(host, '.')) && strcmp(p + 1, LocalDomain) == 0)
   1034   1.1       cgd 		*p = '\0';
   1035  1.30    itojun 	return (host);
   1036   1.1       cgd }
   1037   1.1       cgd 
   1038   1.1       cgd void
   1039  1.53       wiz domark(int signo)
   1040   1.1       cgd {
   1041   1.5     perry 	struct filed *f;
   1042   1.1       cgd 
   1043   1.1       cgd 	now = time((time_t *)NULL);
   1044   1.1       cgd 	MarkSeq += TIMERINTVL;
   1045   1.1       cgd 	if (MarkSeq >= MarkInterval) {
   1046   1.1       cgd 		logmsg(LOG_INFO, "-- MARK --", LocalHostName, ADDDATE|MARK);
   1047   1.1       cgd 		MarkSeq = 0;
   1048   1.1       cgd 	}
   1049   1.1       cgd 
   1050   1.1       cgd 	for (f = Files; f; f = f->f_next) {
   1051   1.1       cgd 		if (f->f_prevcount && now >= REPEATTIME(f)) {
   1052  1.47      manu 			dprintf("Flush %s: repeated %d times, %d sec.\n",
   1053   1.1       cgd 			    TypeNames[f->f_type], f->f_prevcount,
   1054   1.1       cgd 			    repeatinterval[f->f_repeatcount]);
   1055   1.1       cgd 			fprintlog(f, 0, (char *)NULL);
   1056   1.1       cgd 			BACKOFF(f);
   1057   1.1       cgd 		}
   1058   1.1       cgd 	}
   1059   1.5     perry 	(void)alarm(TIMERINTVL);
   1060   1.1       cgd }
   1061   1.1       cgd 
   1062   1.1       cgd /*
   1063   1.1       cgd  * Print syslogd errors some place.
   1064   1.1       cgd  */
   1065   1.5     perry void
   1066  1.47      manu logerror(const char *fmt, ...)
   1067   1.1       cgd {
   1068  1.47      manu 	va_list ap;
   1069  1.47      manu 	char tmpbuf[BUFSIZ];
   1070  1.47      manu 	char buf[BUFSIZ];
   1071  1.47      manu 
   1072  1.47      manu 	va_start(ap, fmt);
   1073  1.47      manu 
   1074  1.47      manu 	(void)vsnprintf(tmpbuf, sizeof(tmpbuf), fmt, ap);
   1075  1.47      manu 
   1076  1.47      manu 	va_end(ap);
   1077   1.1       cgd 
   1078   1.1       cgd 	if (errno)
   1079  1.47      manu 		(void)snprintf(buf, sizeof(buf), "syslogd: %s: %s",
   1080  1.47      manu 		    tmpbuf, strerror(errno));
   1081   1.1       cgd 	else
   1082  1.47      manu 		(void)snprintf(buf, sizeof(buf), "syslogd: %s", tmpbuf);
   1083  1.47      manu 
   1084  1.47      manu 	if (daemonized)
   1085  1.47      manu 		logmsg(LOG_SYSLOG|LOG_ERR, buf, LocalHostName, ADDDATE);
   1086  1.47      manu 	if (!daemonized && Debug)
   1087  1.47      manu 		dprintf("%s\n", buf);
   1088  1.47      manu 	if (!daemonized && !Debug)
   1089  1.47      manu 		printf("%s\n", buf);
   1090  1.47      manu 
   1091  1.47      manu 	return;
   1092   1.1       cgd }
   1093   1.1       cgd 
   1094   1.1       cgd void
   1095  1.53       wiz die(int signo)
   1096   1.1       cgd {
   1097   1.5     perry 	struct filed *f;
   1098  1.47      manu 	char **p;
   1099   1.1       cgd 
   1100   1.1       cgd 	for (f = Files; f != NULL; f = f->f_next) {
   1101   1.1       cgd 		/* flush any pending output */
   1102   1.1       cgd 		if (f->f_prevcount)
   1103   1.1       cgd 			fprintlog(f, 0, (char *)NULL);
   1104   1.1       cgd 	}
   1105  1.47      manu 	errno = 0;
   1106  1.47      manu 	if (signo)
   1107  1.49       kim 		logerror("Exiting on signal %d", signo);
   1108  1.47      manu 	else
   1109  1.47      manu 		logerror("Fatal error, exiting");
   1110  1.22       mrg 	for (p = LogPaths; p && *p; p++)
   1111  1.22       mrg 		unlink(*p);
   1112   1.1       cgd 	exit(0);
   1113   1.1       cgd }
   1114   1.1       cgd 
   1115   1.1       cgd /*
   1116   1.1       cgd  *  INIT -- Initialize syslogd from configuration table
   1117   1.1       cgd  */
   1118   1.1       cgd void
   1119  1.53       wiz init(int signo)
   1120   1.1       cgd {
   1121   1.5     perry 	int i;
   1122   1.5     perry 	FILE *cf;
   1123   1.5     perry 	struct filed *f, *next, **nextp;
   1124   1.5     perry 	char *p;
   1125   1.5     perry 	char cline[LINE_MAX];
   1126   1.1       cgd 
   1127   1.1       cgd 	dprintf("init\n");
   1128   1.1       cgd 
   1129   1.1       cgd 	/*
   1130   1.1       cgd 	 *  Close all open log files.
   1131   1.1       cgd 	 */
   1132   1.1       cgd 	Initialized = 0;
   1133   1.1       cgd 	for (f = Files; f != NULL; f = next) {
   1134   1.1       cgd 		/* flush any pending output */
   1135   1.1       cgd 		if (f->f_prevcount)
   1136   1.1       cgd 			fprintlog(f, 0, (char *)NULL);
   1137   1.1       cgd 
   1138   1.1       cgd 		switch (f->f_type) {
   1139   1.5     perry 		case F_FILE:
   1140   1.5     perry 		case F_TTY:
   1141   1.5     perry 		case F_CONSOLE:
   1142   1.5     perry 			(void)close(f->f_file);
   1143  1.44    itojun 			break;
   1144  1.44    itojun 		case F_FORW:
   1145  1.44    itojun 			if (f->f_un.f_forw.f_addr)
   1146  1.44    itojun 				freeaddrinfo(f->f_un.f_forw.f_addr);
   1147   1.1       cgd 			break;
   1148   1.1       cgd 		}
   1149   1.1       cgd 		next = f->f_next;
   1150   1.5     perry 		free((char *)f);
   1151   1.1       cgd 	}
   1152   1.1       cgd 	Files = NULL;
   1153   1.1       cgd 	nextp = &Files;
   1154   1.1       cgd 
   1155  1.38     jwise 	/*
   1156  1.38     jwise 	 *  Close all open sockets
   1157  1.38     jwise 	 */
   1158  1.38     jwise 
   1159  1.38     jwise 	if (finet) {
   1160  1.38     jwise 		for (i = 0; i < *finet; i++) {
   1161  1.38     jwise 			if (close(finet[i+1]) < 0) {
   1162  1.47      manu 				logerror("close() failed");
   1163  1.38     jwise 				die(0);
   1164  1.38     jwise 			}
   1165  1.38     jwise 		}
   1166  1.38     jwise 	}
   1167  1.39     jwise 
   1168  1.39     jwise 	/*
   1169  1.39     jwise 	 *  Reset counter of forwarding actions
   1170  1.39     jwise 	 */
   1171  1.39     jwise 
   1172  1.39     jwise 	NumForwards=0;
   1173  1.38     jwise 
   1174   1.1       cgd 	/* open the configuration file */
   1175   1.1       cgd 	if ((cf = fopen(ConfFile, "r")) == NULL) {
   1176  1.47      manu 		dprintf("Cannot open `%s'\n", ConfFile);
   1177   1.1       cgd 		*nextp = (struct filed *)calloc(1, sizeof(*f));
   1178   1.1       cgd 		cfline("*.ERR\t/dev/console", *nextp);
   1179   1.1       cgd 		(*nextp)->f_next = (struct filed *)calloc(1, sizeof(*f));
   1180   1.1       cgd 		cfline("*.PANIC\t*", (*nextp)->f_next);
   1181   1.1       cgd 		Initialized = 1;
   1182   1.1       cgd 		return;
   1183   1.1       cgd 	}
   1184   1.1       cgd 
   1185   1.1       cgd 	/*
   1186   1.1       cgd 	 *  Foreach line in the conf table, open that file.
   1187   1.1       cgd 	 */
   1188   1.1       cgd 	f = NULL;
   1189   1.5     perry 	while (fgets(cline, sizeof(cline), cf) != NULL) {
   1190   1.1       cgd 		/*
   1191   1.1       cgd 		 * check for end-of-section, comments, strip off trailing
   1192   1.1       cgd 		 * spaces and newline character.
   1193   1.1       cgd 		 */
   1194   1.5     perry 		for (p = cline; isspace(*p); ++p)
   1195   1.5     perry 			continue;
   1196  1.10        pk 		if (*p == '\0' || *p == '#')
   1197   1.1       cgd 			continue;
   1198   1.5     perry 		for (p = strchr(cline, '\0'); isspace(*--p);)
   1199   1.5     perry 			continue;
   1200   1.1       cgd 		*++p = '\0';
   1201   1.1       cgd 		f = (struct filed *)calloc(1, sizeof(*f));
   1202   1.1       cgd 		*nextp = f;
   1203   1.1       cgd 		nextp = &f->f_next;
   1204   1.1       cgd 		cfline(cline, f);
   1205   1.1       cgd 	}
   1206   1.1       cgd 
   1207   1.1       cgd 	/* close the configuration file */
   1208   1.5     perry 	(void)fclose(cf);
   1209   1.1       cgd 
   1210   1.1       cgd 	Initialized = 1;
   1211   1.1       cgd 
   1212   1.1       cgd 	if (Debug) {
   1213   1.1       cgd 		for (f = Files; f; f = f->f_next) {
   1214   1.1       cgd 			for (i = 0; i <= LOG_NFACILITIES; i++)
   1215   1.1       cgd 				if (f->f_pmask[i] == INTERNAL_NOPRI)
   1216   1.1       cgd 					printf("X ");
   1217   1.1       cgd 				else
   1218   1.1       cgd 					printf("%d ", f->f_pmask[i]);
   1219   1.1       cgd 			printf("%s: ", TypeNames[f->f_type]);
   1220   1.1       cgd 			switch (f->f_type) {
   1221   1.1       cgd 			case F_FILE:
   1222   1.1       cgd 			case F_TTY:
   1223   1.1       cgd 			case F_CONSOLE:
   1224   1.1       cgd 				printf("%s", f->f_un.f_fname);
   1225   1.1       cgd 				break;
   1226   1.1       cgd 
   1227   1.1       cgd 			case F_FORW:
   1228   1.1       cgd 				printf("%s", f->f_un.f_forw.f_hname);
   1229   1.1       cgd 				break;
   1230   1.1       cgd 
   1231   1.1       cgd 			case F_USERS:
   1232  1.34     lukem 				for (i = 0;
   1233  1.34     lukem 				    i < MAXUNAMES && *f->f_un.f_uname[i]; i++)
   1234   1.1       cgd 					printf("%s, ", f->f_un.f_uname[i]);
   1235   1.1       cgd 				break;
   1236   1.1       cgd 			}
   1237   1.1       cgd 			printf("\n");
   1238   1.1       cgd 		}
   1239  1.38     jwise 	}
   1240  1.38     jwise 
   1241  1.38     jwise 	finet = socksetup(PF_UNSPEC);
   1242  1.38     jwise 	if (finet) {
   1243  1.38     jwise 		if (SecureMode) {
   1244  1.38     jwise 			for (i = 0; i < *finet; i++) {
   1245  1.38     jwise 				if (shutdown(finet[i+1], SHUT_RD) < 0) {
   1246  1.47      manu 					logerror("shutdown() failed");
   1247  1.38     jwise 					die(0);
   1248  1.38     jwise 				}
   1249  1.38     jwise 			}
   1250  1.38     jwise 		} else
   1251  1.47      manu 			dprintf("Listening on inet and/or inet6 socket\n");
   1252  1.47      manu 		dprintf("Sending on inet and/or inet6 socket\n");
   1253   1.1       cgd 	}
   1254   1.1       cgd 
   1255   1.1       cgd 	logmsg(LOG_SYSLOG|LOG_INFO, "syslogd: restart", LocalHostName, ADDDATE);
   1256   1.1       cgd 	dprintf("syslogd: restarted\n");
   1257   1.1       cgd }
   1258   1.1       cgd 
   1259   1.1       cgd /*
   1260   1.1       cgd  * Crack a configuration file line
   1261   1.1       cgd  */
   1262   1.5     perry void
   1263  1.53       wiz cfline(char *line, struct filed *f)
   1264   1.1       cgd {
   1265  1.30    itojun 	struct addrinfo hints, *res;
   1266  1.30    itojun 	int    error, i, pri;
   1267  1.30    itojun 	char   *bp, *p, *q;
   1268  1.47      manu 	char   buf[MAXLINE];
   1269  1.47      manu 	int    sp_err;
   1270   1.1       cgd 
   1271   1.1       cgd 	dprintf("cfline(%s)\n", line);
   1272   1.1       cgd 
   1273   1.1       cgd 	errno = 0;	/* keep strerror() stuff out of logerror messages */
   1274   1.1       cgd 
   1275   1.1       cgd 	/* clear out file entry */
   1276   1.5     perry 	memset(f, 0, sizeof(*f));
   1277   1.1       cgd 	for (i = 0; i <= LOG_NFACILITIES; i++)
   1278   1.1       cgd 		f->f_pmask[i] = INTERNAL_NOPRI;
   1279  1.47      manu 
   1280  1.47      manu 	/*
   1281  1.47      manu 	 * There should not be any space before the log facility.
   1282  1.47      manu 	 * Check this is okay, complain and fix if it is not.
   1283  1.47      manu 	 */
   1284  1.47      manu 	q = line;
   1285  1.47      manu 	if (isblank((unsigned char)*line)) {
   1286  1.47      manu 		errno = 0;
   1287  1.47      manu 		logerror(
   1288  1.47      manu 		    "Warning: `%s' space or tab before the log facility",
   1289  1.47      manu 		    line);
   1290  1.47      manu 		/* Fix: strip all spaces/tabs before the log facility */
   1291  1.47      manu 		while (*q++ && isblank((unsigned char)*q));
   1292  1.47      manu 		line = q;
   1293  1.47      manu 	}
   1294  1.47      manu 
   1295  1.47      manu 	/*
   1296  1.47      manu 	 * q is now at the first char of the log facility
   1297  1.47      manu 	 * There should be at least one tab after the log facility
   1298  1.47      manu 	 * Check this is okay, and complain and fix if it is not.
   1299  1.47      manu 	 */
   1300  1.47      manu 	q = line + strlen(line);
   1301  1.47      manu 	while (!isblank((unsigned char)*q) && (q != line))
   1302  1.47      manu 		q--;
   1303  1.47      manu 	if ((q == line) && strlen(line)) {
   1304  1.47      manu 		/* No tabs or space in a non empty line: complain */
   1305  1.47      manu 		errno = 0;
   1306  1.47      manu 		logerror(
   1307  1.47      manu 		    "Error: `%s' log facility or log target missing",
   1308  1.47      manu 		    line);
   1309  1.47      manu 	}
   1310  1.47      manu 
   1311  1.47      manu 	/* q is at the end of the blank between the two fields */
   1312  1.47      manu 	sp_err = 0;
   1313  1.47      manu 	while (isblank((unsigned char)*q) && (q != line))
   1314  1.47      manu 		if (*q-- == ' ')
   1315  1.47      manu 			sp_err = 1;
   1316  1.47      manu 
   1317  1.47      manu 	if (sp_err) {
   1318  1.47      manu 		/*
   1319  1.47      manu 		 * A space somewhere between the log facility
   1320  1.47      manu 		 * and the log target: complain
   1321  1.47      manu 		 */
   1322  1.47      manu 		errno = 0;
   1323  1.47      manu 		logerror(
   1324  1.47      manu 		    "Warning: `%s' space found where tab is expected",
   1325  1.47      manu 		    line);
   1326  1.47      manu 		/* ... and fix the problem: replace all spaces by tabs */
   1327  1.47      manu 		while (*++q && isblank((unsigned char)*q))
   1328  1.47      manu 			if (*q == ' ')
   1329  1.47      manu 				*q='\t';
   1330  1.47      manu 	}
   1331   1.1       cgd 
   1332   1.1       cgd 	/* scan through the list of selectors */
   1333   1.1       cgd 	for (p = line; *p && *p != '\t';) {
   1334   1.1       cgd 
   1335   1.1       cgd 		/* find the end of this facility name list */
   1336   1.1       cgd 		for (q = p; *q && *q != '\t' && *q++ != '.'; )
   1337   1.1       cgd 			continue;
   1338   1.1       cgd 
   1339   1.1       cgd 		/* collect priority name */
   1340   1.5     perry 		for (bp = buf; *q && !strchr("\t,;", *q); )
   1341   1.1       cgd 			*bp++ = *q++;
   1342   1.1       cgd 		*bp = '\0';
   1343   1.1       cgd 
   1344   1.1       cgd 		/* skip cruft */
   1345   1.5     perry 		while (strchr(", ;", *q))
   1346   1.1       cgd 			q++;
   1347   1.1       cgd 
   1348   1.1       cgd 		/* decode priority name */
   1349   1.1       cgd 		if (*buf == '*')
   1350   1.1       cgd 			pri = LOG_PRIMASK + 1;
   1351   1.1       cgd 		else {
   1352   1.1       cgd 			pri = decode(buf, prioritynames);
   1353   1.1       cgd 			if (pri < 0) {
   1354  1.47      manu 				errno = 0;
   1355  1.47      manu 				logerror("Unknown priority name `%s'", buf);
   1356   1.1       cgd 				return;
   1357   1.1       cgd 			}
   1358   1.1       cgd 		}
   1359   1.1       cgd 
   1360   1.1       cgd 		/* scan facilities */
   1361   1.5     perry 		while (*p && !strchr("\t.;", *p)) {
   1362   1.5     perry 			for (bp = buf; *p && !strchr("\t,;.", *p); )
   1363   1.1       cgd 				*bp++ = *p++;
   1364   1.1       cgd 			*bp = '\0';
   1365   1.1       cgd 			if (*buf == '*')
   1366   1.1       cgd 				for (i = 0; i < LOG_NFACILITIES; i++)
   1367   1.1       cgd 					f->f_pmask[i] = pri;
   1368   1.1       cgd 			else {
   1369   1.1       cgd 				i = decode(buf, facilitynames);
   1370   1.1       cgd 				if (i < 0) {
   1371  1.47      manu 					errno = 0;
   1372  1.47      manu 					logerror("Unknown facility name `%s'",
   1373   1.1       cgd 					    buf);
   1374   1.1       cgd 					return;
   1375   1.1       cgd 				}
   1376   1.1       cgd 				f->f_pmask[i >> 3] = pri;
   1377   1.1       cgd 			}
   1378   1.1       cgd 			while (*p == ',' || *p == ' ')
   1379   1.1       cgd 				p++;
   1380   1.1       cgd 		}
   1381   1.1       cgd 
   1382   1.1       cgd 		p = q;
   1383   1.1       cgd 	}
   1384   1.1       cgd 
   1385   1.1       cgd 	/* skip to action part */
   1386  1.47      manu 	sp_err = 0;
   1387  1.47      manu 	while ((*p == '\t') || (*p == ' '))
   1388   1.1       cgd 		p++;
   1389   1.1       cgd 
   1390   1.1       cgd 	switch (*p)
   1391   1.1       cgd 	{
   1392   1.1       cgd 	case '@':
   1393   1.5     perry 		(void)strcpy(f->f_un.f_forw.f_hname, ++p);
   1394  1.30    itojun 		memset(&hints, 0, sizeof(hints));
   1395  1.30    itojun 		hints.ai_family = AF_UNSPEC;
   1396  1.30    itojun 		hints.ai_socktype = SOCK_DGRAM;
   1397  1.30    itojun 		hints.ai_protocol = 0;
   1398  1.34     lukem 		error = getaddrinfo(f->f_un.f_forw.f_hname, "syslog", &hints,
   1399  1.34     lukem 		    &res);
   1400  1.30    itojun 		if (error) {
   1401  1.30    itojun 			logerror(gai_strerror(error));
   1402   1.1       cgd 			break;
   1403   1.1       cgd 		}
   1404  1.30    itojun 		f->f_un.f_forw.f_addr = res;
   1405   1.1       cgd 		f->f_type = F_FORW;
   1406  1.36     jwise 		NumForwards++;
   1407   1.1       cgd 		break;
   1408   1.1       cgd 
   1409   1.1       cgd 	case '/':
   1410   1.5     perry 		(void)strcpy(f->f_un.f_fname, p);
   1411   1.1       cgd 		if ((f->f_file = open(p, O_WRONLY|O_APPEND, 0)) < 0) {
   1412  1.13     enami 			f->f_type = F_UNUSED;
   1413   1.1       cgd 			logerror(p);
   1414   1.1       cgd 			break;
   1415   1.1       cgd 		}
   1416   1.1       cgd 		if (isatty(f->f_file))
   1417   1.1       cgd 			f->f_type = F_TTY;
   1418   1.1       cgd 		else
   1419   1.1       cgd 			f->f_type = F_FILE;
   1420   1.1       cgd 		if (strcmp(p, ctty) == 0)
   1421   1.1       cgd 			f->f_type = F_CONSOLE;
   1422   1.1       cgd 		break;
   1423   1.1       cgd 
   1424   1.1       cgd 	case '*':
   1425   1.1       cgd 		f->f_type = F_WALL;
   1426   1.1       cgd 		break;
   1427   1.1       cgd 
   1428   1.1       cgd 	default:
   1429   1.1       cgd 		for (i = 0; i < MAXUNAMES && *p; i++) {
   1430   1.1       cgd 			for (q = p; *q && *q != ','; )
   1431   1.1       cgd 				q++;
   1432   1.5     perry 			(void)strncpy(f->f_un.f_uname[i], p, UT_NAMESIZE);
   1433   1.1       cgd 			if ((q - p) > UT_NAMESIZE)
   1434   1.1       cgd 				f->f_un.f_uname[i][UT_NAMESIZE] = '\0';
   1435   1.1       cgd 			else
   1436   1.1       cgd 				f->f_un.f_uname[i][q - p] = '\0';
   1437   1.1       cgd 			while (*q == ',' || *q == ' ')
   1438   1.1       cgd 				q++;
   1439   1.1       cgd 			p = q;
   1440   1.1       cgd 		}
   1441   1.1       cgd 		f->f_type = F_USERS;
   1442   1.1       cgd 		break;
   1443   1.1       cgd 	}
   1444   1.1       cgd }
   1445   1.1       cgd 
   1446   1.1       cgd 
   1447   1.1       cgd /*
   1448   1.1       cgd  *  Decode a symbolic name to a numeric value
   1449   1.1       cgd  */
   1450   1.5     perry int
   1451  1.53       wiz decode(const char *name, CODE *codetab)
   1452   1.1       cgd {
   1453   1.5     perry 	CODE *c;
   1454   1.5     perry 	char *p, buf[40];
   1455   1.1       cgd 
   1456   1.1       cgd 	if (isdigit(*name))
   1457   1.1       cgd 		return (atoi(name));
   1458   1.1       cgd 
   1459   1.5     perry 	for (p = buf; *name && p < &buf[sizeof(buf) - 1]; p++, name++) {
   1460   1.5     perry 		if (isupper(*name))
   1461   1.5     perry 			*p = tolower(*name);
   1462   1.5     perry 		else
   1463   1.5     perry 			*p = *name;
   1464   1.5     perry 	}
   1465   1.5     perry 	*p = '\0';
   1466   1.1       cgd 	for (c = codetab; c->c_name; c++)
   1467   1.1       cgd 		if (!strcmp(buf, c->c_name))
   1468   1.1       cgd 			return (c->c_val);
   1469   1.1       cgd 
   1470   1.1       cgd 	return (-1);
   1471  1.15       leo }
   1472  1.15       leo 
   1473  1.15       leo /*
   1474  1.15       leo  * Retrieve the size of the kernel message buffer, via sysctl.
   1475  1.15       leo  */
   1476  1.15       leo int
   1477  1.53       wiz getmsgbufsize(void)
   1478  1.15       leo {
   1479  1.15       leo 	int msgbufsize, mib[2];
   1480  1.15       leo 	size_t size;
   1481  1.15       leo 
   1482  1.15       leo 	mib[0] = CTL_KERN;
   1483  1.15       leo 	mib[1] = KERN_MSGBUFSIZE;
   1484  1.15       leo 	size = sizeof msgbufsize;
   1485  1.15       leo 	if (sysctl(mib, 2, &msgbufsize, &size, NULL, 0) == -1) {
   1486  1.47      manu 		dprintf("Couldn't get kern.msgbufsize\n");
   1487  1.15       leo 		return (0);
   1488  1.15       leo 	}
   1489  1.15       leo 	return (msgbufsize);
   1490  1.30    itojun }
   1491  1.30    itojun 
   1492  1.31    itojun int *
   1493  1.53       wiz socksetup(int af)
   1494  1.30    itojun {
   1495  1.31    itojun 	struct addrinfo hints, *res, *r;
   1496  1.31    itojun 	int error, maxs, *s, *socks;
   1497  1.35     jwise 
   1498  1.36     jwise 	if(SecureMode && !NumForwards)
   1499  1.35     jwise 		return(NULL);
   1500  1.30    itojun 
   1501  1.30    itojun 	memset(&hints, 0, sizeof(hints));
   1502  1.30    itojun 	hints.ai_flags = AI_PASSIVE;
   1503  1.30    itojun 	hints.ai_family = af;
   1504  1.30    itojun 	hints.ai_socktype = SOCK_DGRAM;
   1505  1.30    itojun 	error = getaddrinfo(NULL, "syslog", &hints, &res);
   1506  1.30    itojun 	if (error) {
   1507  1.30    itojun 		logerror(gai_strerror(error));
   1508  1.30    itojun 		errno = 0;
   1509  1.30    itojun 		die(0);
   1510  1.30    itojun 	}
   1511  1.31    itojun 
   1512  1.31    itojun 	/* Count max number of sockets we may open */
   1513  1.34     lukem 	for (maxs = 0, r = res; r; r = r->ai_next, maxs++)
   1514  1.34     lukem 		continue;
   1515  1.31    itojun 	socks = malloc ((maxs+1) * sizeof(int));
   1516  1.31    itojun 	if (!socks) {
   1517  1.47      manu 		logerror("Couldn't allocate memory for sockets");
   1518  1.31    itojun 		die(0);
   1519  1.31    itojun 	}
   1520  1.31    itojun 
   1521  1.31    itojun 	*socks = 0;   /* num of sockets counter at start of array */
   1522  1.31    itojun 	s = socks+1;
   1523  1.31    itojun 	for (r = res; r; r = r->ai_next) {
   1524  1.31    itojun 		*s = socket(r->ai_family, r->ai_socktype, r->ai_protocol);
   1525  1.31    itojun 		if (*s < 0) {
   1526  1.47      manu 			logerror("socket() failed");
   1527  1.31    itojun 			continue;
   1528  1.31    itojun 		}
   1529  1.37     jwise 		if (!SecureMode && bind(*s, r->ai_addr, r->ai_addrlen) < 0) {
   1530  1.47      manu 			logerror("bind() failed");
   1531  1.31    itojun 			close (*s);
   1532  1.31    itojun 			continue;
   1533  1.31    itojun 		}
   1534  1.31    itojun 
   1535  1.31    itojun 		*socks = *socks + 1;
   1536  1.31    itojun 		s++;
   1537  1.31    itojun 	}
   1538  1.31    itojun 
   1539  1.31    itojun 	if (*socks == 0) {
   1540  1.31    itojun 		free (socks);
   1541  1.31    itojun 		if(Debug)
   1542  1.31    itojun 			return(NULL);
   1543  1.31    itojun 		else
   1544  1.31    itojun 			die(0);
   1545  1.30    itojun 	}
   1546  1.30    itojun 	if (res)
   1547  1.30    itojun 		freeaddrinfo(res);
   1548  1.30    itojun 
   1549  1.31    itojun 	return(socks);
   1550   1.1       cgd }
   1551