Home | History | Annotate | Line # | Download | only in syslogd
syslogd.c revision 1.58
      1  1.58    itojun /*	$NetBSD: syslogd.c,v 1.58 2003/05/14 23:53:09 itojun Exp $	*/
      2  1.32        ad 
      3   1.1       cgd /*
      4   1.5     perry  * Copyright (c) 1983, 1988, 1993, 1994
      5   1.5     perry  *	The Regents of the University of California.  All rights reserved.
      6   1.1       cgd  *
      7   1.1       cgd  * Redistribution and use in source and binary forms, with or without
      8   1.1       cgd  * modification, are permitted provided that the following conditions
      9   1.1       cgd  * are met:
     10   1.1       cgd  * 1. Redistributions of source code must retain the above copyright
     11   1.1       cgd  *    notice, this list of conditions and the following disclaimer.
     12   1.1       cgd  * 2. Redistributions in binary form must reproduce the above copyright
     13   1.1       cgd  *    notice, this list of conditions and the following disclaimer in the
     14   1.1       cgd  *    documentation and/or other materials provided with the distribution.
     15   1.1       cgd  * 3. All advertising materials mentioning features or use of this software
     16   1.1       cgd  *    must display the following acknowledgement:
     17   1.1       cgd  *	This product includes software developed by the University of
     18   1.1       cgd  *	California, Berkeley and its contributors.
     19   1.1       cgd  * 4. Neither the name of the University nor the names of its contributors
     20   1.1       cgd  *    may be used to endorse or promote products derived from this software
     21   1.1       cgd  *    without specific prior written permission.
     22   1.1       cgd  *
     23   1.1       cgd  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     24   1.1       cgd  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     25   1.1       cgd  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     26   1.1       cgd  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     27   1.1       cgd  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     28   1.1       cgd  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     29   1.1       cgd  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     30   1.1       cgd  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     31   1.1       cgd  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     32   1.1       cgd  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     33   1.1       cgd  * SUCH DAMAGE.
     34   1.1       cgd  */
     35   1.1       cgd 
     36  1.11  christos #include <sys/cdefs.h>
     37   1.1       cgd #ifndef lint
     38  1.11  christos __COPYRIGHT("@(#) Copyright (c) 1983, 1988, 1993, 1994\n\
     39  1.11  christos 	The Regents of the University of California.  All rights reserved.\n");
     40   1.1       cgd #endif /* not lint */
     41   1.1       cgd 
     42   1.1       cgd #ifndef lint
     43  1.11  christos #if 0
     44  1.11  christos static char sccsid[] = "@(#)syslogd.c	8.3 (Berkeley) 4/4/94";
     45  1.11  christos #else
     46  1.58    itojun __RCSID("$NetBSD: syslogd.c,v 1.58 2003/05/14 23:53:09 itojun Exp $");
     47  1.11  christos #endif
     48   1.1       cgd #endif /* not lint */
     49   1.1       cgd 
     50   1.1       cgd /*
     51   1.1       cgd  *  syslogd -- log system messages
     52   1.1       cgd  *
     53   1.1       cgd  * This program implements a system log. It takes a series of lines.
     54   1.1       cgd  * Each line may have a priority, signified as "<n>" as
     55   1.1       cgd  * the first characters of the line.  If this is
     56   1.1       cgd  * not present, a default priority is used.
     57   1.1       cgd  *
     58   1.1       cgd  * To kill syslogd, send a signal 15 (terminate).  A signal 1 (hup) will
     59   1.1       cgd  * cause it to reread its configuration file.
     60   1.1       cgd  *
     61   1.1       cgd  * Defined Constants:
     62   1.1       cgd  *
     63   1.1       cgd  * MAXLINE -- the maximimum line length that can be handled.
     64   1.1       cgd  * DEFUPRI -- the default priority for user messages
     65   1.1       cgd  * DEFSPRI -- the default priority for kernel messages
     66   1.1       cgd  *
     67   1.1       cgd  * Author: Eric Allman
     68   1.1       cgd  * extensive changes by Ralph Campbell
     69   1.1       cgd  * more extensive changes by Eric Allman (again)
     70   1.1       cgd  */
     71   1.1       cgd 
     72   1.1       cgd #define	MAXLINE		1024		/* maximum line length */
     73   1.1       cgd #define	MAXSVLINE	120		/* maximum saved line length */
     74   1.1       cgd #define DEFUPRI		(LOG_USER|LOG_NOTICE)
     75   1.1       cgd #define DEFSPRI		(LOG_KERN|LOG_CRIT)
     76   1.1       cgd #define TIMERINTVL	30		/* interval for checking flush, mark */
     77   1.5     perry #define TTYMSGTIME	1		/* timeout passed to ttymsg */
     78   1.1       cgd 
     79   1.1       cgd #include <sys/param.h>
     80   1.1       cgd #include <sys/socket.h>
     81  1.53       wiz #include <sys/sysctl.h>
     82  1.53       wiz #include <sys/types.h>
     83   1.1       cgd #include <sys/un.h>
     84  1.53       wiz #include <sys/wait.h>
     85   1.1       cgd 
     86  1.56    itojun #include <netinet/in.h>
     87  1.56    itojun 
     88   1.5     perry #include <ctype.h>
     89   1.5     perry #include <errno.h>
     90   1.5     perry #include <fcntl.h>
     91  1.53       wiz #include <grp.h>
     92  1.41      tron #include <locale.h>
     93  1.53       wiz #include <netdb.h>
     94  1.53       wiz #include <poll.h>
     95  1.53       wiz #include <pwd.h>
     96   1.5     perry #include <signal.h>
     97  1.53       wiz #include <stdarg.h>
     98   1.1       cgd #include <stdio.h>
     99   1.5     perry #include <stdlib.h>
    100   1.1       cgd #include <string.h>
    101   1.1       cgd #include <unistd.h>
    102  1.53       wiz #include <util.h>
    103  1.53       wiz 
    104  1.55  christos #include "utmpentry.h"
    105   1.1       cgd #include "pathnames.h"
    106   1.1       cgd 
    107   1.1       cgd #define SYSLOG_NAMES
    108   1.1       cgd #include <sys/syslog.h>
    109   1.1       cgd 
    110  1.46    itojun #ifdef LIBWRAP
    111  1.46    itojun #include <tcpd.h>
    112  1.46    itojun 
    113  1.46    itojun int allow_severity = LOG_AUTH|LOG_INFO;
    114  1.46    itojun int deny_severity = LOG_AUTH|LOG_WARNING;
    115  1.46    itojun #endif
    116  1.46    itojun 
    117   1.1       cgd char	*ConfFile = _PATH_LOGCONF;
    118   1.1       cgd char	ctty[] = _PATH_CONSOLE;
    119   1.1       cgd 
    120   1.1       cgd #define FDMASK(fd)	(1 << (fd))
    121   1.1       cgd 
    122   1.1       cgd #define	dprintf		if (Debug) printf
    123   1.1       cgd 
    124   1.1       cgd #define MAXUNAMES	20	/* maximum number of user names */
    125   1.1       cgd 
    126   1.1       cgd /*
    127   1.1       cgd  * Flags to logmsg().
    128   1.1       cgd  */
    129   1.1       cgd 
    130   1.1       cgd #define IGN_CONS	0x001	/* don't print on console */
    131   1.1       cgd #define SYNC_FILE	0x002	/* do fsync on file after printing */
    132   1.1       cgd #define ADDDATE		0x004	/* add a date to the message */
    133   1.1       cgd #define MARK		0x008	/* this message is a mark */
    134   1.1       cgd 
    135   1.1       cgd /*
    136   1.1       cgd  * This structure represents the files that will have log
    137   1.1       cgd  * copies printed.
    138   1.1       cgd  */
    139   1.1       cgd 
    140   1.1       cgd struct filed {
    141   1.1       cgd 	struct	filed *f_next;		/* next in linked list */
    142   1.1       cgd 	short	f_type;			/* entry type, see below */
    143   1.1       cgd 	short	f_file;			/* file descriptor */
    144   1.1       cgd 	time_t	f_time;			/* time this was last written */
    145   1.1       cgd 	u_char	f_pmask[LOG_NFACILITIES+1];	/* priority mask */
    146   1.1       cgd 	union {
    147   1.1       cgd 		char	f_uname[MAXUNAMES][UT_NAMESIZE+1];
    148   1.1       cgd 		struct {
    149   1.1       cgd 			char	f_hname[MAXHOSTNAMELEN+1];
    150  1.30    itojun 			struct	addrinfo *f_addr;
    151   1.1       cgd 		} f_forw;		/* forwarding address */
    152   1.1       cgd 		char	f_fname[MAXPATHLEN];
    153   1.1       cgd 	} f_un;
    154   1.1       cgd 	char	f_prevline[MAXSVLINE];		/* last message logged */
    155   1.1       cgd 	char	f_lasttime[16];			/* time of last occurrence */
    156   1.1       cgd 	char	f_prevhost[MAXHOSTNAMELEN+1];	/* host from which recd. */
    157   1.1       cgd 	int	f_prevpri;			/* pri of f_prevline */
    158   1.1       cgd 	int	f_prevlen;			/* length of f_prevline */
    159   1.1       cgd 	int	f_prevcount;			/* repetition cnt of prevline */
    160   1.1       cgd 	int	f_repeatcount;			/* number of "repeated" msgs */
    161   1.1       cgd };
    162   1.1       cgd 
    163   1.1       cgd /*
    164   1.1       cgd  * Intervals at which we flush out "message repeated" messages,
    165   1.1       cgd  * in seconds after previous message is logged.  After each flush,
    166   1.1       cgd  * we move to the next interval until we reach the largest.
    167   1.1       cgd  */
    168   1.1       cgd int	repeatinterval[] = { 30, 120, 600 };	/* # of secs before flush */
    169   1.1       cgd #define	MAXREPEAT ((sizeof(repeatinterval) / sizeof(repeatinterval[0])) - 1)
    170   1.1       cgd #define	REPEATTIME(f)	((f)->f_time + repeatinterval[(f)->f_repeatcount])
    171   1.1       cgd #define	BACKOFF(f)	{ if (++(f)->f_repeatcount > MAXREPEAT) \
    172   1.1       cgd 				 (f)->f_repeatcount = MAXREPEAT; \
    173   1.1       cgd 			}
    174   1.1       cgd 
    175   1.1       cgd /* values for f_type */
    176   1.1       cgd #define F_UNUSED	0		/* unused entry */
    177   1.1       cgd #define F_FILE		1		/* regular file */
    178   1.1       cgd #define F_TTY		2		/* terminal */
    179   1.1       cgd #define F_CONSOLE	3		/* console terminal */
    180   1.1       cgd #define F_FORW		4		/* remote machine */
    181   1.1       cgd #define F_USERS		5		/* list of users */
    182   1.1       cgd #define F_WALL		6		/* everyone logged on */
    183   1.1       cgd 
    184   1.1       cgd char	*TypeNames[7] = {
    185   1.1       cgd 	"UNUSED",	"FILE",		"TTY",		"CONSOLE",
    186   1.1       cgd 	"FORW",		"USERS",	"WALL"
    187   1.1       cgd };
    188   1.1       cgd 
    189   1.1       cgd struct	filed *Files;
    190   1.1       cgd struct	filed consfile;
    191   1.1       cgd 
    192   1.1       cgd int	Debug;			/* debug flag */
    193  1.47      manu int	daemonized = 0;		/* we are not daemonized yet */
    194   1.1       cgd char	LocalHostName[MAXHOSTNAMELEN+1];	/* our hostname */
    195   1.1       cgd char	*LocalDomain;		/* our local domain name */
    196  1.38     jwise int	*finet = NULL;			/* Internet datagram sockets */
    197   1.1       cgd int	Initialized = 0;	/* set when we have initialized ourselves */
    198   1.1       cgd int	MarkInterval = 20 * 60;	/* interval between marks in seconds */
    199   1.1       cgd int	MarkSeq = 0;		/* mark sequence number */
    200  1.35     jwise int	SecureMode = 0;		/* listen only on unix domain socks */
    201  1.45       mrg int	UseNameService = 1;	/* make domain name queries */
    202  1.36     jwise int	NumForwards = 0;	/* number of forwarding actions in conf file */
    203  1.22       mrg char	**LogPaths;		/* array of pathnames to read messages from */
    204   1.1       cgd 
    205  1.53       wiz void	cfline(char *, struct filed *);
    206  1.53       wiz char   *cvthname(struct sockaddr_storage *);
    207  1.53       wiz int	decode(const char *, CODE *);
    208  1.53       wiz void	die(int);
    209  1.53       wiz void	domark(int);
    210  1.53       wiz void	fprintlog(struct filed *, int, char *);
    211  1.53       wiz int	getmsgbufsize(void);
    212  1.53       wiz int*	socksetup(int);
    213  1.53       wiz void	init(int);
    214  1.53       wiz void	logerror(const char *, ...);
    215  1.53       wiz void	logmsg(int, char *, char *, int);
    216  1.53       wiz void	printline(char *, char *);
    217  1.53       wiz void	printsys(char *);
    218  1.53       wiz void	reapchild(int);
    219  1.53       wiz void	usage(void);
    220  1.53       wiz void	wallmsg(struct filed *, struct iovec *);
    221  1.53       wiz int	main(int, char *[]);
    222  1.53       wiz void	logpath_add(char ***, int *, int *, char *);
    223  1.53       wiz void	logpath_fileadd(char ***, int *, int *, char *);
    224   1.1       cgd 
    225   1.5     perry int
    226  1.53       wiz main(int argc, char *argv[])
    227   1.1       cgd {
    228  1.22       mrg 	int ch, *funix, i, j, fklog, len, linesize;
    229  1.31    itojun 	int *nfinetix, nfklogix, nfunixbaseix, nfds;
    230  1.22       mrg 	int funixsize = 0, funixmaxsize = 0;
    231   1.1       cgd 	struct sockaddr_un sunx, fromunix;
    232  1.30    itojun 	struct sockaddr_storage frominet;
    233  1.22       mrg 	char *p, *line, **pp;
    234  1.22       mrg 	struct pollfd *readfds;
    235  1.47      manu 	uid_t uid = 0;
    236  1.47      manu 	gid_t gid = 0;
    237  1.47      manu 	char *user = NULL;
    238  1.47      manu 	char *group = NULL;
    239  1.47      manu 	char *root = "/";
    240  1.47      manu 	char *endp;
    241  1.47      manu 	struct group   *gr;
    242  1.47      manu 	struct passwd  *pw;
    243  1.57    itojun 	unsigned long l;
    244  1.41      tron 
    245  1.41      tron 	(void)setlocale(LC_ALL, "");
    246   1.1       cgd 
    247  1.47      manu 	while ((ch = getopt(argc, argv, "dnsf:m:p:P:u:g:t:")) != -1)
    248   1.5     perry 		switch(ch) {
    249  1.53       wiz 		case 'd':		/* debug */
    250  1.53       wiz 			Debug++;
    251  1.53       wiz 			break;
    252  1.53       wiz 		case 'f':		/* configuration file */
    253  1.53       wiz 			ConfFile = optarg;
    254  1.47      manu 			break;
    255  1.47      manu 		case 'g':
    256  1.47      manu 			group = optarg;
    257  1.47      manu 			if (*group == '\0')
    258  1.47      manu 				usage();
    259  1.47      manu 			break;
    260   1.1       cgd 		case 'm':		/* mark interval */
    261   1.1       cgd 			MarkInterval = atoi(optarg) * 60;
    262   1.1       cgd 			break;
    263  1.45       mrg 		case 'n':		/* turn off DNS queries */
    264  1.45       mrg 			UseNameService = 0;
    265  1.45       mrg 			break;
    266   1.1       cgd 		case 'p':		/* path */
    267  1.22       mrg 			logpath_add(&LogPaths, &funixsize,
    268  1.22       mrg 			    &funixmaxsize, optarg);
    269  1.22       mrg 			break;
    270  1.22       mrg 		case 'P':		/* file of paths */
    271  1.22       mrg 			logpath_fileadd(&LogPaths, &funixsize,
    272  1.22       mrg 			    &funixmaxsize, optarg);
    273   1.1       cgd 			break;
    274  1.35     jwise 		case 's':		/* no network listen mode */
    275   1.7     perry 			SecureMode++;
    276   1.7     perry 			break;
    277  1.53       wiz 		case 't':
    278  1.53       wiz 			root = optarg;
    279  1.53       wiz 			if (*root == '\0')
    280  1.53       wiz 				usage();
    281  1.53       wiz 			break;
    282  1.53       wiz 		case 'u':
    283  1.53       wiz 			user = optarg;
    284  1.53       wiz 			if (*user == '\0')
    285  1.53       wiz 				usage();
    286  1.53       wiz 			break;
    287   1.1       cgd 		case '?':
    288   1.1       cgd 		default:
    289   1.1       cgd 			usage();
    290   1.1       cgd 		}
    291   1.5     perry 	if ((argc -= optind) != 0)
    292   1.1       cgd 		usage();
    293   1.1       cgd 
    294  1.47      manu 	setlinebuf(stdout);
    295  1.47      manu 
    296  1.47      manu 	if (user != NULL) {
    297  1.47      manu 		if (isdigit((unsigned char)*user)) {
    298  1.57    itojun 			errno = 0;
    299  1.57    itojun 			endp = NULL;
    300  1.57    itojun 			l = strtoul(user, &endp, 0);
    301  1.57    itojun 			if (errno || *endp != '\0')
    302  1.47      manu 	    			goto getuser;
    303  1.57    itojun 			uid = (uid_t)l;
    304  1.57    itojun 			if (uid != l) {
    305  1.57    itojun 				errno = 0;
    306  1.57    itojun 				logerror("UID out of range");
    307  1.57    itojun 				die(0);
    308  1.57    itojun 			}
    309  1.47      manu 		} else {
    310  1.47      manu getuser:
    311  1.47      manu 			if ((pw = getpwnam(user)) != NULL) {
    312  1.47      manu 				uid = pw->pw_uid;
    313  1.47      manu 			} else {
    314  1.47      manu 				errno = 0;
    315  1.47      manu 				logerror("Cannot find user `%s'", user);
    316  1.47      manu 				die (0);
    317  1.47      manu 			}
    318  1.47      manu 		}
    319  1.47      manu 	}
    320  1.47      manu 
    321  1.47      manu 	if (group != NULL) {
    322  1.47      manu 		if (isdigit((unsigned char)*group)) {
    323  1.57    itojun 			errno = 0;
    324  1.57    itojun 			endp = NULL;
    325  1.57    itojun 			l = strtoul(group, &endp, 0);
    326  1.57    itojun 			if (errno || *endp != '\0')
    327  1.47      manu 	    			goto getgroup;
    328  1.57    itojun 			gid = (gid_t)l;
    329  1.57    itojun 			if (gid != l) {
    330  1.57    itojun 				errno = 0;
    331  1.57    itojun 				logerror("GID out of range");
    332  1.57    itojun 				die(0);
    333  1.57    itojun 			}
    334  1.47      manu 		} else {
    335  1.47      manu getgroup:
    336  1.47      manu 			if ((gr = getgrnam(group)) != NULL) {
    337  1.47      manu 				gid = gr->gr_gid;
    338  1.47      manu 			} else {
    339  1.47      manu 				errno = 0;
    340  1.47      manu 				logerror("Cannot find group `%s'", group);
    341  1.47      manu 				die(0);
    342  1.47      manu 			}
    343  1.47      manu 		}
    344  1.47      manu 	}
    345  1.47      manu 
    346  1.47      manu 	if (access (root, F_OK | R_OK)) {
    347  1.53       wiz 		logerror("Cannot access `%s'", root);
    348  1.47      manu 		die (0);
    349  1.47      manu 	}
    350   1.1       cgd 
    351   1.1       cgd 	consfile.f_type = F_CONSOLE;
    352  1.58    itojun 	(void)strlcpy(consfile.f_un.f_fname, ctty,
    353  1.58    itojun 	    sizeof(consfile.f_un.f_fname));
    354   1.5     perry 	(void)gethostname(LocalHostName, sizeof(LocalHostName));
    355  1.19       mrg 	LocalHostName[sizeof(LocalHostName) - 1] = '\0';
    356   1.5     perry 	if ((p = strchr(LocalHostName, '.')) != NULL) {
    357   1.1       cgd 		*p++ = '\0';
    358   1.1       cgd 		LocalDomain = p;
    359   1.5     perry 	} else
    360   1.1       cgd 		LocalDomain = "";
    361  1.15       leo 	linesize = getmsgbufsize();
    362  1.15       leo 	if (linesize < MAXLINE)
    363  1.15       leo 		linesize = MAXLINE;
    364  1.15       leo 	linesize++;
    365  1.15       leo 	line = malloc(linesize);
    366  1.15       leo 	if (line == NULL) {
    367  1.47      manu 		logerror("Couldn't allocate line buffer");
    368  1.15       leo 		die(0);
    369  1.15       leo 	}
    370   1.5     perry 	(void)signal(SIGTERM, die);
    371   1.5     perry 	(void)signal(SIGINT, Debug ? die : SIG_IGN);
    372   1.5     perry 	(void)signal(SIGQUIT, Debug ? die : SIG_IGN);
    373   1.5     perry 	(void)signal(SIGCHLD, reapchild);
    374   1.5     perry 	(void)signal(SIGALRM, domark);
    375   1.5     perry 	(void)alarm(TIMERINTVL);
    376   1.5     perry 
    377   1.5     perry #ifndef SUN_LEN
    378   1.5     perry #define SUN_LEN(unp) (strlen((unp)->sun_path) + 2)
    379   1.5     perry #endif
    380  1.24      tron 	if (funixsize == 0)
    381  1.24      tron 		logpath_add(&LogPaths, &funixsize,
    382  1.24      tron 		    &funixmaxsize, _PATH_LOG);
    383  1.22       mrg 	funix = (int *)malloc(sizeof(int) * funixsize);
    384  1.22       mrg 	if (funix == NULL) {
    385  1.47      manu 		logerror("Couldn't allocate funix descriptors");
    386   1.1       cgd 		die(0);
    387   1.1       cgd 	}
    388  1.26      tron 	for (j = 0, pp = LogPaths; *pp; pp++, j++) {
    389  1.47      manu 		dprintf("Making unix dgram socket `%s'\n", *pp);
    390  1.22       mrg 		unlink(*pp);
    391  1.22       mrg 		memset(&sunx, 0, sizeof(sunx));
    392  1.22       mrg 		sunx.sun_family = AF_LOCAL;
    393  1.22       mrg 		(void)strncpy(sunx.sun_path, *pp, sizeof(sunx.sun_path));
    394  1.22       mrg 		funix[j] = socket(AF_LOCAL, SOCK_DGRAM, 0);
    395  1.22       mrg 		if (funix[j] < 0 || bind(funix[j],
    396  1.22       mrg 		    (struct sockaddr *)&sunx, SUN_LEN(&sunx)) < 0 ||
    397  1.22       mrg 		    chmod(*pp, 0666) < 0) {
    398  1.47      manu 			logerror("Cannot create `%s'", *pp);
    399  1.22       mrg 			die(0);
    400  1.22       mrg 		}
    401  1.47      manu 		dprintf("Listening on unix dgram socket `%s'\n", *pp);
    402  1.22       mrg 	}
    403   1.7     perry 
    404  1.36     jwise 	init(0);
    405  1.30    itojun 
    406  1.22       mrg 	if ((fklog = open(_PATH_KLOG, O_RDONLY, 0)) < 0) {
    407  1.47      manu 		dprintf("Can't open `%s' (%d)\n", _PATH_KLOG, errno);
    408  1.22       mrg 	} else {
    409  1.47      manu 		dprintf("Listening on kernel log `%s'\n", _PATH_KLOG);
    410   1.1       cgd 	}
    411   1.1       cgd 
    412  1.47      manu 	dprintf("Off & running....\n");
    413   1.1       cgd 
    414   1.5     perry 	(void)signal(SIGHUP, init);
    415   1.1       cgd 
    416  1.22       mrg 	/* setup pollfd set. */
    417  1.22       mrg 	readfds = (struct pollfd *)malloc(sizeof(struct pollfd) *
    418  1.31    itojun 			(funixsize + (finet ? *finet : 0) + 1));
    419  1.22       mrg 	if (readfds == NULL) {
    420  1.47      manu 		logerror("Couldn't allocate pollfds");
    421  1.22       mrg 		die(0);
    422  1.22       mrg 	}
    423  1.22       mrg 	nfds = 0;
    424  1.22       mrg 	if (fklog >= 0) {
    425  1.22       mrg 		nfklogix = nfds++;
    426  1.22       mrg 		readfds[nfklogix].fd = fklog;
    427  1.22       mrg 		readfds[nfklogix].events = POLLIN | POLLPRI;
    428  1.22       mrg 	}
    429  1.34     lukem 	if (finet && !SecureMode) {
    430  1.31    itojun 		nfinetix = malloc(*finet * sizeof(*nfinetix));
    431  1.31    itojun 		for (j = 0; j < *finet; j++) {
    432  1.31    itojun 			nfinetix[j] = nfds++;
    433  1.31    itojun 			readfds[nfinetix[j]].fd = finet[j+1];
    434  1.31    itojun 			readfds[nfinetix[j]].events = POLLIN | POLLPRI;
    435  1.31    itojun 		}
    436  1.30    itojun 	}
    437  1.22       mrg 	nfunixbaseix = nfds;
    438  1.22       mrg 	for (j = 0, pp = LogPaths; *pp; pp++) {
    439  1.22       mrg 		readfds[nfds].fd = funix[j++];
    440  1.22       mrg 		readfds[nfds++].events = POLLIN | POLLPRI;
    441  1.22       mrg 	}
    442  1.22       mrg 
    443  1.47      manu 	/*
    444  1.47      manu 	 * All files are open, we can drop privileges and chroot
    445  1.47      manu 	 */
    446  1.53       wiz 	dprintf("Attempt to chroot to `%s'\n", root);
    447  1.53       wiz 	if (chroot(root)) {
    448  1.53       wiz 		logerror("Failed to chroot to `%s'", root);
    449  1.47      manu 		die(0);
    450  1.47      manu 	}
    451  1.53       wiz 	dprintf("Attempt to set GID/EGID to `%d'\n", gid);
    452  1.53       wiz 	if (setgid(gid) || setegid(gid)) {
    453  1.53       wiz 		logerror("Failed to set gid to `%d'", gid);
    454  1.47      manu 		die(0);
    455  1.47      manu 	}
    456  1.53       wiz 	dprintf("Attempt to set UID/EUID to `%d'\n", uid);
    457  1.53       wiz 	if (setuid(uid) || seteuid(uid)) {
    458  1.53       wiz 		logerror("Failed to set uid to `%d'", uid);
    459  1.47      manu 		die(0);
    460  1.47      manu 	}
    461  1.47      manu 
    462  1.47      manu 	/*
    463  1.47      manu 	 * We cannot detach from the terminal before we are sure we won't
    464  1.47      manu 	 * have a fatal error, because error message would not go to the
    465  1.47      manu 	 * terminal and would not be logged because syslogd dies.
    466  1.47      manu 	 * All die() calls are behind us, we can call daemon()
    467  1.47      manu 	 */
    468  1.47      manu 	if (!Debug) {
    469  1.47      manu 		(void)daemon(0, 0);
    470  1.47      manu 		daemonized = 1;
    471  1.48      taca 
    472  1.48      taca 		/* tuck my process id away, if i'm not in debug mode */
    473  1.48      taca 		pidfile(NULL);
    474  1.47      manu 	}
    475  1.47      manu 
    476   1.1       cgd 	for (;;) {
    477  1.22       mrg 		int rv;
    478   1.1       cgd 
    479  1.22       mrg 		rv = poll(readfds, nfds, INFTIM);
    480  1.22       mrg 		if (rv == 0)
    481   1.1       cgd 			continue;
    482  1.22       mrg 		if (rv < 0) {
    483   1.1       cgd 			if (errno != EINTR)
    484  1.47      manu 				logerror("poll() failed");
    485   1.1       cgd 			continue;
    486   1.1       cgd 		}
    487  1.47      manu 		dprintf("Got a message (%d)\n", rv);
    488  1.22       mrg 		if (fklog >= 0 &&
    489  1.22       mrg 		    (readfds[nfklogix].revents & (POLLIN | POLLPRI))) {
    490  1.47      manu 			dprintf("Kernel log active\n");
    491  1.15       leo 			i = read(fklog, line, linesize - 1);
    492   1.1       cgd 			if (i > 0) {
    493   1.1       cgd 				line[i] = '\0';
    494   1.1       cgd 				printsys(line);
    495   1.1       cgd 			} else if (i < 0 && errno != EINTR) {
    496  1.47      manu 				logerror("klog failed");
    497   1.1       cgd 				fklog = -1;
    498   1.1       cgd 			}
    499   1.1       cgd 		}
    500  1.22       mrg 		for (j = 0, pp = LogPaths; *pp; pp++, j++) {
    501  1.22       mrg 			if ((readfds[nfunixbaseix + j].revents &
    502  1.22       mrg 			    (POLLIN | POLLPRI)) == 0)
    503  1.22       mrg 				continue;
    504  1.22       mrg 
    505  1.47      manu 			dprintf("Unix socket (%s) active\n", *pp);
    506   1.5     perry 			len = sizeof(fromunix);
    507  1.22       mrg 			i = recvfrom(funix[j], line, MAXLINE, 0,
    508   1.5     perry 			    (struct sockaddr *)&fromunix, &len);
    509   1.1       cgd 			if (i > 0) {
    510   1.1       cgd 				line[i] = '\0';
    511   1.1       cgd 				printline(LocalHostName, line);
    512  1.22       mrg 			} else if (i < 0 && errno != EINTR) {
    513  1.47      manu 				logerror("recvfrom() unix `%s'", *pp);
    514  1.22       mrg 			}
    515   1.1       cgd 		}
    516  1.34     lukem 		if (finet && !SecureMode) {
    517  1.31    itojun 			for (j = 0; j < *finet; j++) {
    518  1.34     lukem 		    		if (readfds[nfinetix[j]].revents &
    519  1.34     lukem 				    (POLLIN | POLLPRI)) {
    520  1.46    itojun #ifdef LIBWRAP
    521  1.46    itojun 					struct request_info req;
    522  1.46    itojun #endif
    523  1.46    itojun 					int reject = 0;
    524  1.46    itojun 
    525  1.31    itojun 					dprintf("inet socket active\n");
    526  1.46    itojun 
    527  1.46    itojun #ifdef LIBWRAP
    528  1.46    itojun 					request_init(&req, RQ_DAEMON, "syslogd",
    529  1.46    itojun 					    RQ_FILE, finet[j + 1], NULL);
    530  1.46    itojun 					fromhost(&req);
    531  1.46    itojun 					reject = !hosts_access(&req);
    532  1.46    itojun 					if (reject)
    533  1.46    itojun 						dprintf("access denied\n");
    534  1.46    itojun #endif
    535  1.46    itojun 
    536  1.31    itojun 					len = sizeof(frominet);
    537  1.34     lukem 					i = recvfrom(finet[j+1], line, MAXLINE,
    538  1.34     lukem 					    0, (struct sockaddr *)&frominet,
    539  1.34     lukem 					    &len);
    540  1.46    itojun 					if (i == 0 || (i < 0 && errno == EINTR))
    541  1.46    itojun 						continue;
    542  1.46    itojun 					else if (i < 0) {
    543  1.46    itojun 						logerror("recvfrom inet");
    544  1.46    itojun 						continue;
    545  1.46    itojun 					}
    546  1.46    itojun 
    547  1.46    itojun 					line[i] = '\0';
    548  1.46    itojun 					if (!reject)
    549  1.34     lukem 						printline(cvthname(&frominet),
    550  1.34     lukem 						    line);
    551  1.31    itojun 				}
    552  1.31    itojun 			}
    553  1.30    itojun 		}
    554   1.1       cgd 	}
    555   1.1       cgd }
    556   1.1       cgd 
    557   1.5     perry void
    558  1.53       wiz usage(void)
    559   1.1       cgd {
    560   1.5     perry 
    561   1.5     perry 	(void)fprintf(stderr,
    562  1.53       wiz 	    "usage: %s [-dns] [-f config_file] [-g group] [-m mark_interval]\n"
    563  1.53       wiz 	    "\t[-P file_list] [-p log_socket [-p log_socket2 ...]]\n"
    564  1.53       wiz 	    "\t[-t chroot_dir] [-u user]\n", getprogname());
    565   1.1       cgd 	exit(1);
    566   1.1       cgd }
    567   1.1       cgd 
    568   1.1       cgd /*
    569  1.22       mrg  * given a pointer to an array of char *'s, a pointer to it's current
    570  1.22       mrg  * size and current allocated max size, and a new char * to add, add
    571  1.22       mrg  * it, update everything as necessary, possibly allocating a new array
    572  1.22       mrg  */
    573  1.22       mrg void
    574  1.53       wiz logpath_add(char ***lp, int *szp, int *maxszp, char *new)
    575  1.22       mrg {
    576  1.22       mrg 
    577  1.47      manu 	dprintf("Adding `%s' to the %p logpath list\n", new, *lp);
    578  1.22       mrg 	if (*szp == *maxszp) {
    579  1.22       mrg 		if (*maxszp == 0) {
    580  1.22       mrg 			*maxszp = 4;	/* start of with enough for now */
    581  1.26      tron 			*lp = NULL;
    582  1.50     lukem 		} else
    583  1.22       mrg 			*maxszp *= 2;
    584  1.26      tron 		*lp = realloc(*lp, sizeof(char *) * (*maxszp + 1));
    585  1.26      tron 		if (*lp == NULL) {
    586  1.47      manu 			logerror("Couldn't allocate line buffer");
    587  1.26      tron 			die(0);
    588  1.22       mrg 		}
    589  1.22       mrg 	}
    590  1.50     lukem 	if (((*lp)[(*szp)++] = strdup(new)) == NULL) {
    591  1.50     lukem 		logerror("Couldn't allocate logpath");
    592  1.50     lukem 		die(0);
    593  1.50     lukem 	}
    594  1.26      tron 	(*lp)[(*szp)] = NULL;		/* always keep it NULL terminated */
    595  1.22       mrg }
    596  1.22       mrg 
    597  1.22       mrg /* do a file of log sockets */
    598  1.22       mrg void
    599  1.53       wiz logpath_fileadd(char ***lp, int *szp, int *maxszp, char *file)
    600  1.22       mrg {
    601  1.22       mrg 	FILE *fp;
    602  1.22       mrg 	char *line;
    603  1.22       mrg 	size_t len;
    604  1.22       mrg 
    605  1.22       mrg 	fp = fopen(file, "r");
    606  1.22       mrg 	if (fp == NULL) {
    607  1.47      manu 		logerror("Could not open socket file list `%s'", file);
    608  1.22       mrg 		die(0);
    609  1.22       mrg 	}
    610  1.22       mrg 
    611  1.22       mrg 	while ((line = fgetln(fp, &len))) {
    612  1.22       mrg 		line[len - 1] = 0;
    613  1.22       mrg 		logpath_add(lp, szp, maxszp, line);
    614  1.22       mrg 	}
    615  1.22       mrg 	fclose(fp);
    616  1.22       mrg }
    617  1.22       mrg 
    618  1.22       mrg /*
    619   1.1       cgd  * Take a raw input line, decode the message, and print the message
    620   1.1       cgd  * on the appropriate log files.
    621   1.1       cgd  */
    622   1.5     perry void
    623  1.53       wiz printline(char *hname, char *msg)
    624   1.1       cgd {
    625   1.5     perry 	int c, pri;
    626   1.5     perry 	char *p, *q, line[MAXLINE + 1];
    627   1.1       cgd 
    628   1.1       cgd 	/* test for special codes */
    629   1.1       cgd 	pri = DEFUPRI;
    630   1.1       cgd 	p = msg;
    631   1.1       cgd 	if (*p == '<') {
    632   1.1       cgd 		pri = 0;
    633   1.1       cgd 		while (isdigit(*++p))
    634   1.1       cgd 			pri = 10 * pri + (*p - '0');
    635   1.1       cgd 		if (*p == '>')
    636   1.1       cgd 			++p;
    637   1.1       cgd 	}
    638   1.1       cgd 	if (pri &~ (LOG_FACMASK|LOG_PRIMASK))
    639   1.1       cgd 		pri = DEFUPRI;
    640   1.1       cgd 
    641   1.1       cgd 	/* don't allow users to log kernel messages */
    642   1.1       cgd 	if (LOG_FAC(pri) == LOG_KERN)
    643   1.1       cgd 		pri = LOG_MAKEPRI(LOG_USER, LOG_PRI(pri));
    644   1.1       cgd 
    645   1.1       cgd 	q = line;
    646   1.1       cgd 
    647  1.42  sommerfe 	while ((c = *p++) != '\0' &&
    648  1.42  sommerfe 	    q < &line[sizeof(line) - 2]) {
    649  1.42  sommerfe 		c &= 0177;
    650   1.1       cgd 		if (iscntrl(c))
    651   1.1       cgd 			if (c == '\n')
    652   1.1       cgd 				*q++ = ' ';
    653   1.1       cgd 			else if (c == '\t')
    654   1.1       cgd 				*q++ = '\t';
    655   1.1       cgd 			else {
    656   1.1       cgd 				*q++ = '^';
    657   1.1       cgd 				*q++ = c ^ 0100;
    658   1.1       cgd 			}
    659   1.1       cgd 		else
    660   1.1       cgd 			*q++ = c;
    661  1.42  sommerfe 	}
    662   1.1       cgd 	*q = '\0';
    663   1.1       cgd 
    664   1.1       cgd 	logmsg(pri, line, hname, 0);
    665   1.1       cgd }
    666   1.1       cgd 
    667   1.1       cgd /*
    668   1.1       cgd  * Take a raw input line from /dev/klog, split and format similar to syslog().
    669   1.1       cgd  */
    670   1.5     perry void
    671  1.53       wiz printsys(char *msg)
    672   1.1       cgd {
    673   1.5     perry 	int c, pri, flags;
    674   1.5     perry 	char *lp, *p, *q, line[MAXLINE + 1];
    675   1.1       cgd 
    676  1.58    itojun 	(void)strlcpy(line, _PATH_UNIX, sizeof(line));
    677  1.58    itojun 	(void)strlcat(line, ": ", sizeof(line));
    678   1.1       cgd 	lp = line + strlen(line);
    679   1.1       cgd 	for (p = msg; *p != '\0'; ) {
    680   1.1       cgd 		flags = SYNC_FILE | ADDDATE;	/* fsync file after write */
    681   1.1       cgd 		pri = DEFSPRI;
    682   1.1       cgd 		if (*p == '<') {
    683   1.1       cgd 			pri = 0;
    684   1.1       cgd 			while (isdigit(*++p))
    685   1.1       cgd 				pri = 10 * pri + (*p - '0');
    686   1.1       cgd 			if (*p == '>')
    687   1.1       cgd 				++p;
    688   1.1       cgd 		} else {
    689   1.1       cgd 			/* kernel printf's come out on console */
    690   1.1       cgd 			flags |= IGN_CONS;
    691   1.1       cgd 		}
    692   1.1       cgd 		if (pri &~ (LOG_FACMASK|LOG_PRIMASK))
    693   1.1       cgd 			pri = DEFSPRI;
    694   1.1       cgd 		q = lp;
    695   1.1       cgd 		while (*p != '\0' && (c = *p++) != '\n' &&
    696   1.1       cgd 		    q < &line[MAXLINE])
    697   1.1       cgd 			*q++ = c;
    698   1.1       cgd 		*q = '\0';
    699   1.1       cgd 		logmsg(pri, line, LocalHostName, flags);
    700   1.1       cgd 	}
    701   1.1       cgd }
    702   1.1       cgd 
    703   1.1       cgd time_t	now;
    704   1.1       cgd 
    705   1.1       cgd /*
    706   1.1       cgd  * Log a message to the appropriate log files, users, etc. based on
    707   1.1       cgd  * the priority.
    708   1.1       cgd  */
    709   1.5     perry void
    710  1.53       wiz logmsg(int pri, char *msg, char *from, int flags)
    711   1.1       cgd {
    712   1.5     perry 	struct filed *f;
    713   1.5     perry 	int fac, msglen, omask, prilev;
    714   1.1       cgd 	char *timestamp;
    715   1.1       cgd 
    716   1.9       mrg 	dprintf("logmsg: pri 0%o, flags 0x%x, from %s, msg %s\n",
    717   1.1       cgd 	    pri, flags, from, msg);
    718   1.1       cgd 
    719   1.1       cgd 	omask = sigblock(sigmask(SIGHUP)|sigmask(SIGALRM));
    720   1.1       cgd 
    721   1.1       cgd 	/*
    722   1.1       cgd 	 * Check to see if msg looks non-standard.
    723   1.1       cgd 	 */
    724   1.1       cgd 	msglen = strlen(msg);
    725   1.1       cgd 	if (msglen < 16 || msg[3] != ' ' || msg[6] != ' ' ||
    726   1.1       cgd 	    msg[9] != ':' || msg[12] != ':' || msg[15] != ' ')
    727   1.1       cgd 		flags |= ADDDATE;
    728   1.1       cgd 
    729   1.5     perry 	(void)time(&now);
    730   1.1       cgd 	if (flags & ADDDATE)
    731   1.1       cgd 		timestamp = ctime(&now) + 4;
    732   1.1       cgd 	else {
    733   1.1       cgd 		timestamp = msg;
    734   1.1       cgd 		msg += 16;
    735   1.1       cgd 		msglen -= 16;
    736   1.1       cgd 	}
    737   1.1       cgd 
    738   1.1       cgd 	/* extract facility and priority level */
    739   1.1       cgd 	if (flags & MARK)
    740   1.1       cgd 		fac = LOG_NFACILITIES;
    741   1.1       cgd 	else
    742   1.1       cgd 		fac = LOG_FAC(pri);
    743   1.1       cgd 	prilev = LOG_PRI(pri);
    744   1.1       cgd 
    745   1.1       cgd 	/* log the message to the particular outputs */
    746   1.1       cgd 	if (!Initialized) {
    747   1.1       cgd 		f = &consfile;
    748   1.1       cgd 		f->f_file = open(ctty, O_WRONLY, 0);
    749   1.1       cgd 
    750   1.1       cgd 		if (f->f_file >= 0) {
    751   1.1       cgd 			fprintlog(f, flags, msg);
    752   1.5     perry 			(void)close(f->f_file);
    753   1.1       cgd 		}
    754   1.5     perry 		(void)sigsetmask(omask);
    755   1.1       cgd 		return;
    756   1.1       cgd 	}
    757   1.1       cgd 	for (f = Files; f; f = f->f_next) {
    758   1.1       cgd 		/* skip messages that are incorrect priority */
    759   1.1       cgd 		if (f->f_pmask[fac] < prilev ||
    760   1.1       cgd 		    f->f_pmask[fac] == INTERNAL_NOPRI)
    761   1.1       cgd 			continue;
    762   1.1       cgd 
    763   1.1       cgd 		if (f->f_type == F_CONSOLE && (flags & IGN_CONS))
    764   1.1       cgd 			continue;
    765   1.1       cgd 
    766   1.1       cgd 		/* don't output marks to recently written files */
    767   1.1       cgd 		if ((flags & MARK) && (now - f->f_time) < MarkInterval / 2)
    768   1.1       cgd 			continue;
    769   1.1       cgd 
    770   1.1       cgd 		/*
    771   1.1       cgd 		 * suppress duplicate lines to this file
    772   1.1       cgd 		 */
    773   1.1       cgd 		if ((flags & MARK) == 0 && msglen == f->f_prevlen &&
    774   1.1       cgd 		    !strcmp(msg, f->f_prevline) &&
    775   1.1       cgd 		    !strcmp(from, f->f_prevhost)) {
    776   1.5     perry 			(void)strncpy(f->f_lasttime, timestamp, 15);
    777   1.1       cgd 			f->f_prevcount++;
    778  1.47      manu 			dprintf("Msg repeated %d times, %ld sec of %d\n",
    779  1.12   thorpej 			    f->f_prevcount, (long)(now - f->f_time),
    780   1.1       cgd 			    repeatinterval[f->f_repeatcount]);
    781   1.1       cgd 			/*
    782   1.1       cgd 			 * If domark would have logged this by now,
    783   1.1       cgd 			 * flush it now (so we don't hold isolated messages),
    784   1.1       cgd 			 * but back off so we'll flush less often
    785   1.1       cgd 			 * in the future.
    786   1.1       cgd 			 */
    787   1.1       cgd 			if (now > REPEATTIME(f)) {
    788   1.1       cgd 				fprintlog(f, flags, (char *)NULL);
    789   1.1       cgd 				BACKOFF(f);
    790   1.1       cgd 			}
    791   1.1       cgd 		} else {
    792   1.1       cgd 			/* new line, save it */
    793   1.1       cgd 			if (f->f_prevcount)
    794   1.1       cgd 				fprintlog(f, 0, (char *)NULL);
    795   1.1       cgd 			f->f_repeatcount = 0;
    796   1.3       cgd 			f->f_prevpri = pri;
    797   1.5     perry 			(void)strncpy(f->f_lasttime, timestamp, 15);
    798   1.5     perry 			(void)strncpy(f->f_prevhost, from,
    799   1.1       cgd 					sizeof(f->f_prevhost));
    800   1.1       cgd 			if (msglen < MAXSVLINE) {
    801   1.1       cgd 				f->f_prevlen = msglen;
    802  1.58    itojun 				(void)strlcpy(f->f_prevline, msg,
    803  1.58    itojun 				    sizeof(f->f_prevline));
    804   1.1       cgd 				fprintlog(f, flags, (char *)NULL);
    805   1.1       cgd 			} else {
    806   1.1       cgd 				f->f_prevline[0] = 0;
    807   1.1       cgd 				f->f_prevlen = 0;
    808   1.1       cgd 				fprintlog(f, flags, msg);
    809   1.1       cgd 			}
    810   1.1       cgd 		}
    811   1.1       cgd 	}
    812   1.5     perry 	(void)sigsetmask(omask);
    813   1.1       cgd }
    814   1.1       cgd 
    815   1.5     perry void
    816  1.53       wiz fprintlog(struct filed *f, int flags, char *msg)
    817   1.1       cgd {
    818   1.1       cgd 	struct iovec iov[6];
    819   1.5     perry 	struct iovec *v;
    820  1.30    itojun 	struct addrinfo *r;
    821  1.31    itojun 	int j, l, lsent;
    822   1.1       cgd 	char line[MAXLINE + 1], repbuf[80], greetings[200];
    823   1.1       cgd 
    824   1.1       cgd 	v = iov;
    825   1.1       cgd 	if (f->f_type == F_WALL) {
    826   1.1       cgd 		v->iov_base = greetings;
    827  1.17       mrg 		v->iov_len = snprintf(greetings, sizeof greetings,
    828   1.1       cgd 		    "\r\n\7Message from syslogd@%s at %.24s ...\r\n",
    829   1.1       cgd 		    f->f_prevhost, ctime(&now));
    830   1.1       cgd 		v++;
    831   1.1       cgd 		v->iov_base = "";
    832   1.1       cgd 		v->iov_len = 0;
    833   1.1       cgd 		v++;
    834   1.1       cgd 	} else {
    835   1.1       cgd 		v->iov_base = f->f_lasttime;
    836   1.1       cgd 		v->iov_len = 15;
    837   1.1       cgd 		v++;
    838   1.1       cgd 		v->iov_base = " ";
    839   1.1       cgd 		v->iov_len = 1;
    840   1.1       cgd 		v++;
    841   1.1       cgd 	}
    842   1.1       cgd 	v->iov_base = f->f_prevhost;
    843   1.1       cgd 	v->iov_len = strlen(v->iov_base);
    844   1.1       cgd 	v++;
    845   1.1       cgd 	v->iov_base = " ";
    846   1.1       cgd 	v->iov_len = 1;
    847   1.1       cgd 	v++;
    848   1.1       cgd 
    849   1.1       cgd 	if (msg) {
    850   1.1       cgd 		v->iov_base = msg;
    851   1.1       cgd 		v->iov_len = strlen(msg);
    852   1.1       cgd 	} else if (f->f_prevcount > 1) {
    853   1.1       cgd 		v->iov_base = repbuf;
    854  1.17       mrg 		v->iov_len = snprintf(repbuf, sizeof repbuf,
    855  1.17       mrg 		    "last message repeated %d times", f->f_prevcount);
    856   1.1       cgd 	} else {
    857   1.1       cgd 		v->iov_base = f->f_prevline;
    858   1.1       cgd 		v->iov_len = f->f_prevlen;
    859   1.1       cgd 	}
    860   1.1       cgd 	v++;
    861   1.1       cgd 
    862   1.1       cgd 	dprintf("Logging to %s", TypeNames[f->f_type]);
    863   1.1       cgd 	f->f_time = now;
    864   1.1       cgd 
    865   1.1       cgd 	switch (f->f_type) {
    866   1.1       cgd 	case F_UNUSED:
    867   1.1       cgd 		dprintf("\n");
    868   1.1       cgd 		break;
    869   1.1       cgd 
    870   1.1       cgd 	case F_FORW:
    871   1.1       cgd 		dprintf(" %s\n", f->f_un.f_forw.f_hname);
    872  1.34     lukem 			/*
    873  1.34     lukem 			 * check for local vs remote messages
    874  1.34     lukem 			 * (from FreeBSD PR#bin/7055)
    875  1.34     lukem 			 */
    876  1.21      tron 		if (strcmp(f->f_prevhost, LocalHostName)) {
    877  1.21      tron 			l = snprintf(line, sizeof(line) - 1,
    878  1.21      tron 				     "<%d>%.15s [%s]: %s",
    879  1.21      tron 				     f->f_prevpri, (char *) iov[0].iov_base,
    880  1.21      tron 				     f->f_prevhost, (char *) iov[4].iov_base);
    881  1.21      tron 		} else {
    882  1.21      tron 			l = snprintf(line, sizeof(line) - 1, "<%d>%.15s %s",
    883  1.21      tron 				     f->f_prevpri, (char *) iov[0].iov_base,
    884  1.21      tron 				     (char *) iov[4].iov_base);
    885  1.21      tron 		}
    886   1.1       cgd 		if (l > MAXLINE)
    887   1.1       cgd 			l = MAXLINE;
    888  1.34     lukem 		if (finet) {
    889  1.30    itojun 			for (r = f->f_un.f_forw.f_addr; r; r = r->ai_next) {
    890  1.31    itojun 				for (j = 0; j < *finet; j++) {
    891  1.31    itojun #if 0
    892  1.34     lukem 					/*
    893  1.34     lukem 					 * should we check AF first, or just
    894  1.34     lukem 					 * trial and error? FWD
    895  1.34     lukem 					 */
    896  1.34     lukem 					if (r->ai_family ==
    897  1.34     lukem 					    address_family_of(finet[j+1]))
    898  1.30    itojun #endif
    899  1.34     lukem 					lsent = sendto(finet[j+1], line, l, 0,
    900  1.34     lukem 					    r->ai_addr, r->ai_addrlen);
    901  1.31    itojun 					if (lsent == l)
    902  1.31    itojun 						break;
    903  1.31    itojun 				}
    904  1.30    itojun 			}
    905  1.30    itojun 			if (lsent != l) {
    906  1.30    itojun 				f->f_type = F_UNUSED;
    907  1.47      manu 				logerror("sendto() failed");
    908  1.30    itojun 			}
    909   1.1       cgd 		}
    910   1.1       cgd 		break;
    911   1.1       cgd 
    912   1.1       cgd 	case F_CONSOLE:
    913   1.1       cgd 		if (flags & IGN_CONS) {
    914   1.1       cgd 			dprintf(" (ignored)\n");
    915   1.1       cgd 			break;
    916   1.1       cgd 		}
    917   1.1       cgd 		/* FALLTHROUGH */
    918   1.1       cgd 
    919   1.1       cgd 	case F_TTY:
    920   1.1       cgd 	case F_FILE:
    921   1.1       cgd 		dprintf(" %s\n", f->f_un.f_fname);
    922   1.1       cgd 		if (f->f_type != F_FILE) {
    923   1.1       cgd 			v->iov_base = "\r\n";
    924   1.1       cgd 			v->iov_len = 2;
    925   1.1       cgd 		} else {
    926   1.1       cgd 			v->iov_base = "\n";
    927   1.1       cgd 			v->iov_len = 1;
    928   1.1       cgd 		}
    929   1.1       cgd 	again:
    930   1.1       cgd 		if (writev(f->f_file, iov, 6) < 0) {
    931   1.1       cgd 			int e = errno;
    932   1.5     perry 			(void)close(f->f_file);
    933   1.1       cgd 			/*
    934   1.1       cgd 			 * Check for errors on TTY's due to loss of tty
    935   1.1       cgd 			 */
    936   1.1       cgd 			if ((e == EIO || e == EBADF) && f->f_type != F_FILE) {
    937   1.1       cgd 				f->f_file = open(f->f_un.f_fname,
    938   1.1       cgd 				    O_WRONLY|O_APPEND, 0);
    939   1.1       cgd 				if (f->f_file < 0) {
    940   1.1       cgd 					f->f_type = F_UNUSED;
    941   1.1       cgd 					logerror(f->f_un.f_fname);
    942   1.1       cgd 				} else
    943   1.1       cgd 					goto again;
    944   1.1       cgd 			} else {
    945   1.1       cgd 				f->f_type = F_UNUSED;
    946   1.1       cgd 				errno = e;
    947   1.1       cgd 				logerror(f->f_un.f_fname);
    948   1.1       cgd 			}
    949   1.1       cgd 		} else if (flags & SYNC_FILE)
    950   1.5     perry 			(void)fsync(f->f_file);
    951   1.1       cgd 		break;
    952   1.1       cgd 
    953   1.1       cgd 	case F_USERS:
    954   1.1       cgd 	case F_WALL:
    955   1.1       cgd 		dprintf("\n");
    956   1.1       cgd 		v->iov_base = "\r\n";
    957   1.1       cgd 		v->iov_len = 2;
    958   1.1       cgd 		wallmsg(f, iov);
    959   1.1       cgd 		break;
    960   1.1       cgd 	}
    961   1.1       cgd 	f->f_prevcount = 0;
    962   1.1       cgd }
    963   1.1       cgd 
    964   1.1       cgd /*
    965   1.1       cgd  *  WALLMSG -- Write a message to the world at large
    966   1.1       cgd  *
    967   1.1       cgd  *	Write the specified message to either the entire
    968   1.1       cgd  *	world, or a list of approved users.
    969   1.1       cgd  */
    970   1.5     perry void
    971  1.53       wiz wallmsg(struct filed *f, struct iovec *iov)
    972   1.1       cgd {
    973   1.1       cgd 	static int reenter;			/* avoid calling ourselves */
    974   1.5     perry 	int i;
    975   1.5     perry 	char *p;
    976  1.55  christos 	static struct utmpentry *ohead = NULL;
    977  1.55  christos 	struct utmpentry *ep;
    978   1.1       cgd 
    979   1.1       cgd 	if (reenter++)
    980   1.1       cgd 		return;
    981  1.55  christos 
    982  1.55  christos 	(void)getutentries(NULL, &ep);
    983  1.55  christos 	if (ep != ohead) {
    984  1.55  christos 		freeutentries(ohead);
    985  1.55  christos 		ohead = ep;
    986   1.1       cgd 	}
    987   1.1       cgd 	/* NOSTRICT */
    988  1.55  christos 	for (; ep; ep = ep->next) {
    989   1.1       cgd 		if (f->f_type == F_WALL) {
    990  1.55  christos 			if ((p = ttymsg(iov, 6, ep->line, TTYMSGTIME))
    991  1.55  christos 			    != NULL) {
    992   1.1       cgd 				errno = 0;	/* already in msg */
    993   1.1       cgd 				logerror(p);
    994   1.1       cgd 			}
    995   1.1       cgd 			continue;
    996   1.1       cgd 		}
    997   1.1       cgd 		/* should we send the message to this user? */
    998   1.1       cgd 		for (i = 0; i < MAXUNAMES; i++) {
    999   1.1       cgd 			if (!f->f_un.f_uname[i][0])
   1000   1.1       cgd 				break;
   1001  1.55  christos 			if (strcmp(f->f_un.f_uname[i], ep->name) == 0) {
   1002  1.55  christos 				if ((p = ttymsg(iov, 6, ep->line, TTYMSGTIME))
   1003  1.55  christos 				    != NULL) {
   1004   1.1       cgd 					errno = 0;	/* already in msg */
   1005   1.1       cgd 					logerror(p);
   1006   1.1       cgd 				}
   1007   1.1       cgd 				break;
   1008   1.1       cgd 			}
   1009   1.1       cgd 		}
   1010   1.1       cgd 	}
   1011   1.1       cgd 	reenter = 0;
   1012   1.1       cgd }
   1013   1.1       cgd 
   1014   1.1       cgd void
   1015  1.53       wiz reapchild(int signo)
   1016   1.1       cgd {
   1017   1.1       cgd 	union wait status;
   1018   1.1       cgd 
   1019   1.5     perry 	while (wait3((int *)&status, WNOHANG, (struct rusage *)NULL) > 0)
   1020   1.1       cgd 		;
   1021   1.1       cgd }
   1022   1.1       cgd 
   1023   1.1       cgd /*
   1024   1.1       cgd  * Return a printable representation of a host address.
   1025   1.1       cgd  */
   1026   1.1       cgd char *
   1027  1.53       wiz cvthname(struct sockaddr_storage *f)
   1028   1.1       cgd {
   1029  1.30    itojun 	int error;
   1030   1.5     perry 	char *p;
   1031  1.30    itojun 	const int niflag = NI_DGRAM;
   1032  1.30    itojun 	static char host[NI_MAXHOST], ip[NI_MAXHOST];
   1033   1.1       cgd 
   1034  1.30    itojun 	error = getnameinfo((struct sockaddr*)f, ((struct sockaddr*)f)->sa_len,
   1035  1.33    itojun 			ip, sizeof ip, NULL, 0, NI_NUMERICHOST|niflag);
   1036   1.1       cgd 
   1037  1.30    itojun 	dprintf("cvthname(%s)\n", ip);
   1038  1.30    itojun 
   1039  1.30    itojun 	if (error) {
   1040  1.30    itojun 		dprintf("Malformed from address %s\n", gai_strerror(error));
   1041   1.1       cgd 		return ("???");
   1042   1.1       cgd 	}
   1043  1.45       mrg 
   1044  1.45       mrg 	if (!UseNameService)
   1045  1.45       mrg 		return (ip);
   1046  1.30    itojun 
   1047  1.30    itojun 	error = getnameinfo((struct sockaddr*)f, ((struct sockaddr*)f)->sa_len,
   1048  1.33    itojun 			host, sizeof host, NULL, 0, niflag);
   1049  1.30    itojun 	if (error) {
   1050  1.30    itojun 		dprintf("Host name for your address (%s) unknown\n", ip);
   1051  1.30    itojun 		return (ip);
   1052   1.1       cgd 	}
   1053  1.30    itojun 	if ((p = strchr(host, '.')) && strcmp(p + 1, LocalDomain) == 0)
   1054   1.1       cgd 		*p = '\0';
   1055  1.30    itojun 	return (host);
   1056   1.1       cgd }
   1057   1.1       cgd 
   1058   1.1       cgd void
   1059  1.53       wiz domark(int signo)
   1060   1.1       cgd {
   1061   1.5     perry 	struct filed *f;
   1062   1.1       cgd 
   1063   1.1       cgd 	now = time((time_t *)NULL);
   1064   1.1       cgd 	MarkSeq += TIMERINTVL;
   1065   1.1       cgd 	if (MarkSeq >= MarkInterval) {
   1066   1.1       cgd 		logmsg(LOG_INFO, "-- MARK --", LocalHostName, ADDDATE|MARK);
   1067   1.1       cgd 		MarkSeq = 0;
   1068   1.1       cgd 	}
   1069   1.1       cgd 
   1070   1.1       cgd 	for (f = Files; f; f = f->f_next) {
   1071   1.1       cgd 		if (f->f_prevcount && now >= REPEATTIME(f)) {
   1072  1.47      manu 			dprintf("Flush %s: repeated %d times, %d sec.\n",
   1073   1.1       cgd 			    TypeNames[f->f_type], f->f_prevcount,
   1074   1.1       cgd 			    repeatinterval[f->f_repeatcount]);
   1075   1.1       cgd 			fprintlog(f, 0, (char *)NULL);
   1076   1.1       cgd 			BACKOFF(f);
   1077   1.1       cgd 		}
   1078   1.1       cgd 	}
   1079   1.5     perry 	(void)alarm(TIMERINTVL);
   1080   1.1       cgd }
   1081   1.1       cgd 
   1082   1.1       cgd /*
   1083   1.1       cgd  * Print syslogd errors some place.
   1084   1.1       cgd  */
   1085   1.5     perry void
   1086  1.47      manu logerror(const char *fmt, ...)
   1087   1.1       cgd {
   1088  1.47      manu 	va_list ap;
   1089  1.47      manu 	char tmpbuf[BUFSIZ];
   1090  1.47      manu 	char buf[BUFSIZ];
   1091  1.47      manu 
   1092  1.47      manu 	va_start(ap, fmt);
   1093  1.47      manu 
   1094  1.47      manu 	(void)vsnprintf(tmpbuf, sizeof(tmpbuf), fmt, ap);
   1095  1.47      manu 
   1096  1.47      manu 	va_end(ap);
   1097   1.1       cgd 
   1098   1.1       cgd 	if (errno)
   1099  1.47      manu 		(void)snprintf(buf, sizeof(buf), "syslogd: %s: %s",
   1100  1.47      manu 		    tmpbuf, strerror(errno));
   1101   1.1       cgd 	else
   1102  1.47      manu 		(void)snprintf(buf, sizeof(buf), "syslogd: %s", tmpbuf);
   1103  1.47      manu 
   1104  1.47      manu 	if (daemonized)
   1105  1.47      manu 		logmsg(LOG_SYSLOG|LOG_ERR, buf, LocalHostName, ADDDATE);
   1106  1.47      manu 	if (!daemonized && Debug)
   1107  1.47      manu 		dprintf("%s\n", buf);
   1108  1.47      manu 	if (!daemonized && !Debug)
   1109  1.47      manu 		printf("%s\n", buf);
   1110  1.47      manu 
   1111  1.47      manu 	return;
   1112   1.1       cgd }
   1113   1.1       cgd 
   1114   1.1       cgd void
   1115  1.53       wiz die(int signo)
   1116   1.1       cgd {
   1117   1.5     perry 	struct filed *f;
   1118  1.47      manu 	char **p;
   1119   1.1       cgd 
   1120   1.1       cgd 	for (f = Files; f != NULL; f = f->f_next) {
   1121   1.1       cgd 		/* flush any pending output */
   1122   1.1       cgd 		if (f->f_prevcount)
   1123   1.1       cgd 			fprintlog(f, 0, (char *)NULL);
   1124   1.1       cgd 	}
   1125  1.47      manu 	errno = 0;
   1126  1.47      manu 	if (signo)
   1127  1.49       kim 		logerror("Exiting on signal %d", signo);
   1128  1.47      manu 	else
   1129  1.47      manu 		logerror("Fatal error, exiting");
   1130  1.22       mrg 	for (p = LogPaths; p && *p; p++)
   1131  1.22       mrg 		unlink(*p);
   1132   1.1       cgd 	exit(0);
   1133   1.1       cgd }
   1134   1.1       cgd 
   1135   1.1       cgd /*
   1136   1.1       cgd  *  INIT -- Initialize syslogd from configuration table
   1137   1.1       cgd  */
   1138   1.1       cgd void
   1139  1.53       wiz init(int signo)
   1140   1.1       cgd {
   1141   1.5     perry 	int i;
   1142   1.5     perry 	FILE *cf;
   1143   1.5     perry 	struct filed *f, *next, **nextp;
   1144   1.5     perry 	char *p;
   1145   1.5     perry 	char cline[LINE_MAX];
   1146   1.1       cgd 
   1147   1.1       cgd 	dprintf("init\n");
   1148   1.1       cgd 
   1149   1.1       cgd 	/*
   1150   1.1       cgd 	 *  Close all open log files.
   1151   1.1       cgd 	 */
   1152   1.1       cgd 	Initialized = 0;
   1153   1.1       cgd 	for (f = Files; f != NULL; f = next) {
   1154   1.1       cgd 		/* flush any pending output */
   1155   1.1       cgd 		if (f->f_prevcount)
   1156   1.1       cgd 			fprintlog(f, 0, (char *)NULL);
   1157   1.1       cgd 
   1158   1.1       cgd 		switch (f->f_type) {
   1159   1.5     perry 		case F_FILE:
   1160   1.5     perry 		case F_TTY:
   1161   1.5     perry 		case F_CONSOLE:
   1162   1.5     perry 			(void)close(f->f_file);
   1163  1.44    itojun 			break;
   1164  1.44    itojun 		case F_FORW:
   1165  1.44    itojun 			if (f->f_un.f_forw.f_addr)
   1166  1.44    itojun 				freeaddrinfo(f->f_un.f_forw.f_addr);
   1167   1.1       cgd 			break;
   1168   1.1       cgd 		}
   1169   1.1       cgd 		next = f->f_next;
   1170   1.5     perry 		free((char *)f);
   1171   1.1       cgd 	}
   1172   1.1       cgd 	Files = NULL;
   1173   1.1       cgd 	nextp = &Files;
   1174   1.1       cgd 
   1175  1.38     jwise 	/*
   1176  1.38     jwise 	 *  Close all open sockets
   1177  1.38     jwise 	 */
   1178  1.38     jwise 
   1179  1.38     jwise 	if (finet) {
   1180  1.38     jwise 		for (i = 0; i < *finet; i++) {
   1181  1.38     jwise 			if (close(finet[i+1]) < 0) {
   1182  1.47      manu 				logerror("close() failed");
   1183  1.38     jwise 				die(0);
   1184  1.38     jwise 			}
   1185  1.38     jwise 		}
   1186  1.38     jwise 	}
   1187  1.39     jwise 
   1188  1.39     jwise 	/*
   1189  1.39     jwise 	 *  Reset counter of forwarding actions
   1190  1.39     jwise 	 */
   1191  1.39     jwise 
   1192  1.39     jwise 	NumForwards=0;
   1193  1.38     jwise 
   1194   1.1       cgd 	/* open the configuration file */
   1195   1.1       cgd 	if ((cf = fopen(ConfFile, "r")) == NULL) {
   1196  1.47      manu 		dprintf("Cannot open `%s'\n", ConfFile);
   1197   1.1       cgd 		*nextp = (struct filed *)calloc(1, sizeof(*f));
   1198   1.1       cgd 		cfline("*.ERR\t/dev/console", *nextp);
   1199   1.1       cgd 		(*nextp)->f_next = (struct filed *)calloc(1, sizeof(*f));
   1200   1.1       cgd 		cfline("*.PANIC\t*", (*nextp)->f_next);
   1201   1.1       cgd 		Initialized = 1;
   1202   1.1       cgd 		return;
   1203   1.1       cgd 	}
   1204   1.1       cgd 
   1205   1.1       cgd 	/*
   1206   1.1       cgd 	 *  Foreach line in the conf table, open that file.
   1207   1.1       cgd 	 */
   1208   1.1       cgd 	f = NULL;
   1209   1.5     perry 	while (fgets(cline, sizeof(cline), cf) != NULL) {
   1210   1.1       cgd 		/*
   1211   1.1       cgd 		 * check for end-of-section, comments, strip off trailing
   1212   1.1       cgd 		 * spaces and newline character.
   1213   1.1       cgd 		 */
   1214   1.5     perry 		for (p = cline; isspace(*p); ++p)
   1215   1.5     perry 			continue;
   1216  1.10        pk 		if (*p == '\0' || *p == '#')
   1217   1.1       cgd 			continue;
   1218   1.5     perry 		for (p = strchr(cline, '\0'); isspace(*--p);)
   1219   1.5     perry 			continue;
   1220   1.1       cgd 		*++p = '\0';
   1221   1.1       cgd 		f = (struct filed *)calloc(1, sizeof(*f));
   1222   1.1       cgd 		*nextp = f;
   1223   1.1       cgd 		nextp = &f->f_next;
   1224   1.1       cgd 		cfline(cline, f);
   1225   1.1       cgd 	}
   1226   1.1       cgd 
   1227   1.1       cgd 	/* close the configuration file */
   1228   1.5     perry 	(void)fclose(cf);
   1229   1.1       cgd 
   1230   1.1       cgd 	Initialized = 1;
   1231   1.1       cgd 
   1232   1.1       cgd 	if (Debug) {
   1233   1.1       cgd 		for (f = Files; f; f = f->f_next) {
   1234   1.1       cgd 			for (i = 0; i <= LOG_NFACILITIES; i++)
   1235   1.1       cgd 				if (f->f_pmask[i] == INTERNAL_NOPRI)
   1236   1.1       cgd 					printf("X ");
   1237   1.1       cgd 				else
   1238   1.1       cgd 					printf("%d ", f->f_pmask[i]);
   1239   1.1       cgd 			printf("%s: ", TypeNames[f->f_type]);
   1240   1.1       cgd 			switch (f->f_type) {
   1241   1.1       cgd 			case F_FILE:
   1242   1.1       cgd 			case F_TTY:
   1243   1.1       cgd 			case F_CONSOLE:
   1244   1.1       cgd 				printf("%s", f->f_un.f_fname);
   1245   1.1       cgd 				break;
   1246   1.1       cgd 
   1247   1.1       cgd 			case F_FORW:
   1248   1.1       cgd 				printf("%s", f->f_un.f_forw.f_hname);
   1249   1.1       cgd 				break;
   1250   1.1       cgd 
   1251   1.1       cgd 			case F_USERS:
   1252  1.34     lukem 				for (i = 0;
   1253  1.34     lukem 				    i < MAXUNAMES && *f->f_un.f_uname[i]; i++)
   1254   1.1       cgd 					printf("%s, ", f->f_un.f_uname[i]);
   1255   1.1       cgd 				break;
   1256   1.1       cgd 			}
   1257   1.1       cgd 			printf("\n");
   1258   1.1       cgd 		}
   1259  1.38     jwise 	}
   1260  1.38     jwise 
   1261  1.38     jwise 	finet = socksetup(PF_UNSPEC);
   1262  1.38     jwise 	if (finet) {
   1263  1.38     jwise 		if (SecureMode) {
   1264  1.38     jwise 			for (i = 0; i < *finet; i++) {
   1265  1.38     jwise 				if (shutdown(finet[i+1], SHUT_RD) < 0) {
   1266  1.47      manu 					logerror("shutdown() failed");
   1267  1.38     jwise 					die(0);
   1268  1.38     jwise 				}
   1269  1.38     jwise 			}
   1270  1.38     jwise 		} else
   1271  1.47      manu 			dprintf("Listening on inet and/or inet6 socket\n");
   1272  1.47      manu 		dprintf("Sending on inet and/or inet6 socket\n");
   1273   1.1       cgd 	}
   1274   1.1       cgd 
   1275   1.1       cgd 	logmsg(LOG_SYSLOG|LOG_INFO, "syslogd: restart", LocalHostName, ADDDATE);
   1276   1.1       cgd 	dprintf("syslogd: restarted\n");
   1277   1.1       cgd }
   1278   1.1       cgd 
   1279   1.1       cgd /*
   1280   1.1       cgd  * Crack a configuration file line
   1281   1.1       cgd  */
   1282   1.5     perry void
   1283  1.53       wiz cfline(char *line, struct filed *f)
   1284   1.1       cgd {
   1285  1.30    itojun 	struct addrinfo hints, *res;
   1286  1.30    itojun 	int    error, i, pri;
   1287  1.30    itojun 	char   *bp, *p, *q;
   1288  1.47      manu 	char   buf[MAXLINE];
   1289  1.47      manu 	int    sp_err;
   1290   1.1       cgd 
   1291   1.1       cgd 	dprintf("cfline(%s)\n", line);
   1292   1.1       cgd 
   1293   1.1       cgd 	errno = 0;	/* keep strerror() stuff out of logerror messages */
   1294   1.1       cgd 
   1295   1.1       cgd 	/* clear out file entry */
   1296   1.5     perry 	memset(f, 0, sizeof(*f));
   1297   1.1       cgd 	for (i = 0; i <= LOG_NFACILITIES; i++)
   1298   1.1       cgd 		f->f_pmask[i] = INTERNAL_NOPRI;
   1299  1.47      manu 
   1300  1.47      manu 	/*
   1301  1.47      manu 	 * There should not be any space before the log facility.
   1302  1.47      manu 	 * Check this is okay, complain and fix if it is not.
   1303  1.47      manu 	 */
   1304  1.47      manu 	q = line;
   1305  1.47      manu 	if (isblank((unsigned char)*line)) {
   1306  1.47      manu 		errno = 0;
   1307  1.47      manu 		logerror(
   1308  1.47      manu 		    "Warning: `%s' space or tab before the log facility",
   1309  1.47      manu 		    line);
   1310  1.47      manu 		/* Fix: strip all spaces/tabs before the log facility */
   1311  1.47      manu 		while (*q++ && isblank((unsigned char)*q));
   1312  1.47      manu 		line = q;
   1313  1.47      manu 	}
   1314  1.47      manu 
   1315  1.47      manu 	/*
   1316  1.47      manu 	 * q is now at the first char of the log facility
   1317  1.47      manu 	 * There should be at least one tab after the log facility
   1318  1.47      manu 	 * Check this is okay, and complain and fix if it is not.
   1319  1.47      manu 	 */
   1320  1.47      manu 	q = line + strlen(line);
   1321  1.47      manu 	while (!isblank((unsigned char)*q) && (q != line))
   1322  1.47      manu 		q--;
   1323  1.47      manu 	if ((q == line) && strlen(line)) {
   1324  1.47      manu 		/* No tabs or space in a non empty line: complain */
   1325  1.47      manu 		errno = 0;
   1326  1.47      manu 		logerror(
   1327  1.47      manu 		    "Error: `%s' log facility or log target missing",
   1328  1.47      manu 		    line);
   1329  1.47      manu 	}
   1330  1.47      manu 
   1331  1.47      manu 	/* q is at the end of the blank between the two fields */
   1332  1.47      manu 	sp_err = 0;
   1333  1.47      manu 	while (isblank((unsigned char)*q) && (q != line))
   1334  1.47      manu 		if (*q-- == ' ')
   1335  1.47      manu 			sp_err = 1;
   1336  1.47      manu 
   1337  1.47      manu 	if (sp_err) {
   1338  1.47      manu 		/*
   1339  1.47      manu 		 * A space somewhere between the log facility
   1340  1.47      manu 		 * and the log target: complain
   1341  1.47      manu 		 */
   1342  1.47      manu 		errno = 0;
   1343  1.47      manu 		logerror(
   1344  1.47      manu 		    "Warning: `%s' space found where tab is expected",
   1345  1.47      manu 		    line);
   1346  1.47      manu 		/* ... and fix the problem: replace all spaces by tabs */
   1347  1.47      manu 		while (*++q && isblank((unsigned char)*q))
   1348  1.47      manu 			if (*q == ' ')
   1349  1.47      manu 				*q='\t';
   1350  1.47      manu 	}
   1351   1.1       cgd 
   1352   1.1       cgd 	/* scan through the list of selectors */
   1353   1.1       cgd 	for (p = line; *p && *p != '\t';) {
   1354   1.1       cgd 
   1355   1.1       cgd 		/* find the end of this facility name list */
   1356   1.1       cgd 		for (q = p; *q && *q != '\t' && *q++ != '.'; )
   1357   1.1       cgd 			continue;
   1358   1.1       cgd 
   1359   1.1       cgd 		/* collect priority name */
   1360   1.5     perry 		for (bp = buf; *q && !strchr("\t,;", *q); )
   1361   1.1       cgd 			*bp++ = *q++;
   1362   1.1       cgd 		*bp = '\0';
   1363   1.1       cgd 
   1364   1.1       cgd 		/* skip cruft */
   1365   1.5     perry 		while (strchr(", ;", *q))
   1366   1.1       cgd 			q++;
   1367   1.1       cgd 
   1368   1.1       cgd 		/* decode priority name */
   1369   1.1       cgd 		if (*buf == '*')
   1370   1.1       cgd 			pri = LOG_PRIMASK + 1;
   1371   1.1       cgd 		else {
   1372   1.1       cgd 			pri = decode(buf, prioritynames);
   1373   1.1       cgd 			if (pri < 0) {
   1374  1.47      manu 				errno = 0;
   1375  1.47      manu 				logerror("Unknown priority name `%s'", buf);
   1376   1.1       cgd 				return;
   1377   1.1       cgd 			}
   1378   1.1       cgd 		}
   1379   1.1       cgd 
   1380   1.1       cgd 		/* scan facilities */
   1381   1.5     perry 		while (*p && !strchr("\t.;", *p)) {
   1382   1.5     perry 			for (bp = buf; *p && !strchr("\t,;.", *p); )
   1383   1.1       cgd 				*bp++ = *p++;
   1384   1.1       cgd 			*bp = '\0';
   1385   1.1       cgd 			if (*buf == '*')
   1386   1.1       cgd 				for (i = 0; i < LOG_NFACILITIES; i++)
   1387   1.1       cgd 					f->f_pmask[i] = pri;
   1388   1.1       cgd 			else {
   1389   1.1       cgd 				i = decode(buf, facilitynames);
   1390   1.1       cgd 				if (i < 0) {
   1391  1.47      manu 					errno = 0;
   1392  1.47      manu 					logerror("Unknown facility name `%s'",
   1393   1.1       cgd 					    buf);
   1394   1.1       cgd 					return;
   1395   1.1       cgd 				}
   1396   1.1       cgd 				f->f_pmask[i >> 3] = pri;
   1397   1.1       cgd 			}
   1398   1.1       cgd 			while (*p == ',' || *p == ' ')
   1399   1.1       cgd 				p++;
   1400   1.1       cgd 		}
   1401   1.1       cgd 
   1402   1.1       cgd 		p = q;
   1403   1.1       cgd 	}
   1404   1.1       cgd 
   1405   1.1       cgd 	/* skip to action part */
   1406  1.47      manu 	sp_err = 0;
   1407  1.47      manu 	while ((*p == '\t') || (*p == ' '))
   1408   1.1       cgd 		p++;
   1409   1.1       cgd 
   1410   1.1       cgd 	switch (*p)
   1411   1.1       cgd 	{
   1412   1.1       cgd 	case '@':
   1413  1.58    itojun 		(void)strlcpy(f->f_un.f_forw.f_hname, ++p,
   1414  1.58    itojun 		    sizeof(f->f_un.f_forw.f_hname));
   1415  1.30    itojun 		memset(&hints, 0, sizeof(hints));
   1416  1.30    itojun 		hints.ai_family = AF_UNSPEC;
   1417  1.30    itojun 		hints.ai_socktype = SOCK_DGRAM;
   1418  1.30    itojun 		hints.ai_protocol = 0;
   1419  1.34     lukem 		error = getaddrinfo(f->f_un.f_forw.f_hname, "syslog", &hints,
   1420  1.34     lukem 		    &res);
   1421  1.30    itojun 		if (error) {
   1422  1.30    itojun 			logerror(gai_strerror(error));
   1423   1.1       cgd 			break;
   1424   1.1       cgd 		}
   1425  1.30    itojun 		f->f_un.f_forw.f_addr = res;
   1426   1.1       cgd 		f->f_type = F_FORW;
   1427  1.36     jwise 		NumForwards++;
   1428   1.1       cgd 		break;
   1429   1.1       cgd 
   1430   1.1       cgd 	case '/':
   1431  1.58    itojun 		(void)strlcpy(f->f_un.f_fname, p, sizeof(f->f_un.f_fname));
   1432   1.1       cgd 		if ((f->f_file = open(p, O_WRONLY|O_APPEND, 0)) < 0) {
   1433  1.13     enami 			f->f_type = F_UNUSED;
   1434   1.1       cgd 			logerror(p);
   1435   1.1       cgd 			break;
   1436   1.1       cgd 		}
   1437   1.1       cgd 		if (isatty(f->f_file))
   1438   1.1       cgd 			f->f_type = F_TTY;
   1439   1.1       cgd 		else
   1440   1.1       cgd 			f->f_type = F_FILE;
   1441   1.1       cgd 		if (strcmp(p, ctty) == 0)
   1442   1.1       cgd 			f->f_type = F_CONSOLE;
   1443   1.1       cgd 		break;
   1444   1.1       cgd 
   1445   1.1       cgd 	case '*':
   1446   1.1       cgd 		f->f_type = F_WALL;
   1447   1.1       cgd 		break;
   1448   1.1       cgd 
   1449   1.1       cgd 	default:
   1450   1.1       cgd 		for (i = 0; i < MAXUNAMES && *p; i++) {
   1451   1.1       cgd 			for (q = p; *q && *q != ','; )
   1452   1.1       cgd 				q++;
   1453   1.5     perry 			(void)strncpy(f->f_un.f_uname[i], p, UT_NAMESIZE);
   1454   1.1       cgd 			if ((q - p) > UT_NAMESIZE)
   1455   1.1       cgd 				f->f_un.f_uname[i][UT_NAMESIZE] = '\0';
   1456   1.1       cgd 			else
   1457   1.1       cgd 				f->f_un.f_uname[i][q - p] = '\0';
   1458   1.1       cgd 			while (*q == ',' || *q == ' ')
   1459   1.1       cgd 				q++;
   1460   1.1       cgd 			p = q;
   1461   1.1       cgd 		}
   1462   1.1       cgd 		f->f_type = F_USERS;
   1463   1.1       cgd 		break;
   1464   1.1       cgd 	}
   1465   1.1       cgd }
   1466   1.1       cgd 
   1467   1.1       cgd 
   1468   1.1       cgd /*
   1469   1.1       cgd  *  Decode a symbolic name to a numeric value
   1470   1.1       cgd  */
   1471   1.5     perry int
   1472  1.53       wiz decode(const char *name, CODE *codetab)
   1473   1.1       cgd {
   1474   1.5     perry 	CODE *c;
   1475   1.5     perry 	char *p, buf[40];
   1476   1.1       cgd 
   1477   1.1       cgd 	if (isdigit(*name))
   1478   1.1       cgd 		return (atoi(name));
   1479   1.1       cgd 
   1480   1.5     perry 	for (p = buf; *name && p < &buf[sizeof(buf) - 1]; p++, name++) {
   1481   1.5     perry 		if (isupper(*name))
   1482   1.5     perry 			*p = tolower(*name);
   1483   1.5     perry 		else
   1484   1.5     perry 			*p = *name;
   1485   1.5     perry 	}
   1486   1.5     perry 	*p = '\0';
   1487   1.1       cgd 	for (c = codetab; c->c_name; c++)
   1488   1.1       cgd 		if (!strcmp(buf, c->c_name))
   1489   1.1       cgd 			return (c->c_val);
   1490   1.1       cgd 
   1491   1.1       cgd 	return (-1);
   1492  1.15       leo }
   1493  1.15       leo 
   1494  1.15       leo /*
   1495  1.15       leo  * Retrieve the size of the kernel message buffer, via sysctl.
   1496  1.15       leo  */
   1497  1.15       leo int
   1498  1.53       wiz getmsgbufsize(void)
   1499  1.15       leo {
   1500  1.15       leo 	int msgbufsize, mib[2];
   1501  1.15       leo 	size_t size;
   1502  1.15       leo 
   1503  1.15       leo 	mib[0] = CTL_KERN;
   1504  1.15       leo 	mib[1] = KERN_MSGBUFSIZE;
   1505  1.15       leo 	size = sizeof msgbufsize;
   1506  1.15       leo 	if (sysctl(mib, 2, &msgbufsize, &size, NULL, 0) == -1) {
   1507  1.47      manu 		dprintf("Couldn't get kern.msgbufsize\n");
   1508  1.15       leo 		return (0);
   1509  1.15       leo 	}
   1510  1.15       leo 	return (msgbufsize);
   1511  1.30    itojun }
   1512  1.30    itojun 
   1513  1.31    itojun int *
   1514  1.53       wiz socksetup(int af)
   1515  1.30    itojun {
   1516  1.31    itojun 	struct addrinfo hints, *res, *r;
   1517  1.31    itojun 	int error, maxs, *s, *socks;
   1518  1.56    itojun 	const int on = 1;
   1519  1.35     jwise 
   1520  1.36     jwise 	if(SecureMode && !NumForwards)
   1521  1.35     jwise 		return(NULL);
   1522  1.30    itojun 
   1523  1.30    itojun 	memset(&hints, 0, sizeof(hints));
   1524  1.30    itojun 	hints.ai_flags = AI_PASSIVE;
   1525  1.30    itojun 	hints.ai_family = af;
   1526  1.30    itojun 	hints.ai_socktype = SOCK_DGRAM;
   1527  1.30    itojun 	error = getaddrinfo(NULL, "syslog", &hints, &res);
   1528  1.30    itojun 	if (error) {
   1529  1.30    itojun 		logerror(gai_strerror(error));
   1530  1.30    itojun 		errno = 0;
   1531  1.30    itojun 		die(0);
   1532  1.30    itojun 	}
   1533  1.31    itojun 
   1534  1.31    itojun 	/* Count max number of sockets we may open */
   1535  1.34     lukem 	for (maxs = 0, r = res; r; r = r->ai_next, maxs++)
   1536  1.34     lukem 		continue;
   1537  1.56    itojun 	socks = malloc((maxs+1) * sizeof(int));
   1538  1.31    itojun 	if (!socks) {
   1539  1.47      manu 		logerror("Couldn't allocate memory for sockets");
   1540  1.31    itojun 		die(0);
   1541  1.31    itojun 	}
   1542  1.31    itojun 
   1543  1.31    itojun 	*socks = 0;   /* num of sockets counter at start of array */
   1544  1.56    itojun 	s = socks + 1;
   1545  1.31    itojun 	for (r = res; r; r = r->ai_next) {
   1546  1.31    itojun 		*s = socket(r->ai_family, r->ai_socktype, r->ai_protocol);
   1547  1.31    itojun 		if (*s < 0) {
   1548  1.47      manu 			logerror("socket() failed");
   1549  1.56    itojun 			continue;
   1550  1.56    itojun 		}
   1551  1.56    itojun 		if (r->ai_family == AF_INET6 && setsockopt(*s, IPPROTO_IPV6,
   1552  1.56    itojun 		    IPV6_V6ONLY, &on, sizeof(on)) < 0) {
   1553  1.56    itojun 			logerror("setsockopt(IPV6_V6ONLY) failed");
   1554  1.56    itojun 			close(*s);
   1555  1.31    itojun 			continue;
   1556  1.31    itojun 		}
   1557  1.37     jwise 		if (!SecureMode && bind(*s, r->ai_addr, r->ai_addrlen) < 0) {
   1558  1.47      manu 			logerror("bind() failed");
   1559  1.31    itojun 			close (*s);
   1560  1.31    itojun 			continue;
   1561  1.31    itojun 		}
   1562  1.31    itojun 
   1563  1.31    itojun 		*socks = *socks + 1;
   1564  1.31    itojun 		s++;
   1565  1.31    itojun 	}
   1566  1.31    itojun 
   1567  1.31    itojun 	if (*socks == 0) {
   1568  1.31    itojun 		free (socks);
   1569  1.31    itojun 		if(Debug)
   1570  1.31    itojun 			return(NULL);
   1571  1.31    itojun 		else
   1572  1.31    itojun 			die(0);
   1573  1.30    itojun 	}
   1574  1.30    itojun 	if (res)
   1575  1.30    itojun 		freeaddrinfo(res);
   1576  1.30    itojun 
   1577  1.31    itojun 	return(socks);
   1578   1.1       cgd }
   1579