Home | History | Annotate | Line # | Download | only in syslogd
syslogd.c revision 1.62
      1  1.62    itojun /*	$NetBSD: syslogd.c,v 1.62 2003/10/16 06:22:09 itojun Exp $	*/
      2  1.32        ad 
      3   1.1       cgd /*
      4   1.5     perry  * Copyright (c) 1983, 1988, 1993, 1994
      5   1.5     perry  *	The Regents of the University of California.  All rights reserved.
      6   1.1       cgd  *
      7   1.1       cgd  * Redistribution and use in source and binary forms, with or without
      8   1.1       cgd  * modification, are permitted provided that the following conditions
      9   1.1       cgd  * are met:
     10   1.1       cgd  * 1. Redistributions of source code must retain the above copyright
     11   1.1       cgd  *    notice, this list of conditions and the following disclaimer.
     12   1.1       cgd  * 2. Redistributions in binary form must reproduce the above copyright
     13   1.1       cgd  *    notice, this list of conditions and the following disclaimer in the
     14   1.1       cgd  *    documentation and/or other materials provided with the distribution.
     15  1.60       agc  * 3. Neither the name of the University nor the names of its contributors
     16   1.1       cgd  *    may be used to endorse or promote products derived from this software
     17   1.1       cgd  *    without specific prior written permission.
     18   1.1       cgd  *
     19   1.1       cgd  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     20   1.1       cgd  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     21   1.1       cgd  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     22   1.1       cgd  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     23   1.1       cgd  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     24   1.1       cgd  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     25   1.1       cgd  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     26   1.1       cgd  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     27   1.1       cgd  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     28   1.1       cgd  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     29   1.1       cgd  * SUCH DAMAGE.
     30   1.1       cgd  */
     31   1.1       cgd 
     32  1.11  christos #include <sys/cdefs.h>
     33   1.1       cgd #ifndef lint
     34  1.11  christos __COPYRIGHT("@(#) Copyright (c) 1983, 1988, 1993, 1994\n\
     35  1.11  christos 	The Regents of the University of California.  All rights reserved.\n");
     36   1.1       cgd #endif /* not lint */
     37   1.1       cgd 
     38   1.1       cgd #ifndef lint
     39  1.11  christos #if 0
     40  1.11  christos static char sccsid[] = "@(#)syslogd.c	8.3 (Berkeley) 4/4/94";
     41  1.11  christos #else
     42  1.62    itojun __RCSID("$NetBSD: syslogd.c,v 1.62 2003/10/16 06:22:09 itojun Exp $");
     43  1.11  christos #endif
     44   1.1       cgd #endif /* not lint */
     45   1.1       cgd 
     46   1.1       cgd /*
     47   1.1       cgd  *  syslogd -- log system messages
     48   1.1       cgd  *
     49   1.1       cgd  * This program implements a system log. It takes a series of lines.
     50   1.1       cgd  * Each line may have a priority, signified as "<n>" as
     51   1.1       cgd  * the first characters of the line.  If this is
     52   1.1       cgd  * not present, a default priority is used.
     53   1.1       cgd  *
     54   1.1       cgd  * To kill syslogd, send a signal 15 (terminate).  A signal 1 (hup) will
     55   1.1       cgd  * cause it to reread its configuration file.
     56   1.1       cgd  *
     57   1.1       cgd  * Defined Constants:
     58   1.1       cgd  *
     59   1.1       cgd  * MAXLINE -- the maximimum line length that can be handled.
     60   1.1       cgd  * DEFUPRI -- the default priority for user messages
     61   1.1       cgd  * DEFSPRI -- the default priority for kernel messages
     62   1.1       cgd  *
     63   1.1       cgd  * Author: Eric Allman
     64   1.1       cgd  * extensive changes by Ralph Campbell
     65   1.1       cgd  * more extensive changes by Eric Allman (again)
     66   1.1       cgd  */
     67   1.1       cgd 
     68   1.1       cgd #define	MAXLINE		1024		/* maximum line length */
     69   1.1       cgd #define	MAXSVLINE	120		/* maximum saved line length */
     70   1.1       cgd #define DEFUPRI		(LOG_USER|LOG_NOTICE)
     71   1.1       cgd #define DEFSPRI		(LOG_KERN|LOG_CRIT)
     72   1.1       cgd #define TIMERINTVL	30		/* interval for checking flush, mark */
     73   1.5     perry #define TTYMSGTIME	1		/* timeout passed to ttymsg */
     74   1.1       cgd 
     75   1.1       cgd #include <sys/param.h>
     76   1.1       cgd #include <sys/socket.h>
     77  1.53       wiz #include <sys/sysctl.h>
     78  1.53       wiz #include <sys/types.h>
     79   1.1       cgd #include <sys/un.h>
     80  1.53       wiz #include <sys/wait.h>
     81   1.1       cgd 
     82  1.56    itojun #include <netinet/in.h>
     83  1.56    itojun 
     84   1.5     perry #include <ctype.h>
     85   1.5     perry #include <errno.h>
     86   1.5     perry #include <fcntl.h>
     87  1.53       wiz #include <grp.h>
     88  1.41      tron #include <locale.h>
     89  1.53       wiz #include <netdb.h>
     90  1.53       wiz #include <poll.h>
     91  1.53       wiz #include <pwd.h>
     92   1.5     perry #include <signal.h>
     93  1.53       wiz #include <stdarg.h>
     94   1.1       cgd #include <stdio.h>
     95   1.5     perry #include <stdlib.h>
     96   1.1       cgd #include <string.h>
     97   1.1       cgd #include <unistd.h>
     98  1.53       wiz #include <util.h>
     99  1.53       wiz 
    100  1.55  christos #include "utmpentry.h"
    101   1.1       cgd #include "pathnames.h"
    102   1.1       cgd 
    103   1.1       cgd #define SYSLOG_NAMES
    104   1.1       cgd #include <sys/syslog.h>
    105   1.1       cgd 
    106  1.46    itojun #ifdef LIBWRAP
    107  1.46    itojun #include <tcpd.h>
    108  1.46    itojun 
    109  1.46    itojun int allow_severity = LOG_AUTH|LOG_INFO;
    110  1.46    itojun int deny_severity = LOG_AUTH|LOG_WARNING;
    111  1.46    itojun #endif
    112  1.46    itojun 
    113   1.1       cgd char	*ConfFile = _PATH_LOGCONF;
    114   1.1       cgd char	ctty[] = _PATH_CONSOLE;
    115   1.1       cgd 
    116   1.1       cgd #define FDMASK(fd)	(1 << (fd))
    117   1.1       cgd 
    118   1.1       cgd #define	dprintf		if (Debug) printf
    119   1.1       cgd 
    120   1.1       cgd #define MAXUNAMES	20	/* maximum number of user names */
    121   1.1       cgd 
    122   1.1       cgd /*
    123   1.1       cgd  * Flags to logmsg().
    124   1.1       cgd  */
    125   1.1       cgd 
    126   1.1       cgd #define IGN_CONS	0x001	/* don't print on console */
    127   1.1       cgd #define SYNC_FILE	0x002	/* do fsync on file after printing */
    128   1.1       cgd #define ADDDATE		0x004	/* add a date to the message */
    129   1.1       cgd #define MARK		0x008	/* this message is a mark */
    130   1.1       cgd 
    131   1.1       cgd /*
    132   1.1       cgd  * This structure represents the files that will have log
    133   1.1       cgd  * copies printed.
    134   1.1       cgd  */
    135   1.1       cgd 
    136   1.1       cgd struct filed {
    137   1.1       cgd 	struct	filed *f_next;		/* next in linked list */
    138   1.1       cgd 	short	f_type;			/* entry type, see below */
    139   1.1       cgd 	short	f_file;			/* file descriptor */
    140   1.1       cgd 	time_t	f_time;			/* time this was last written */
    141   1.1       cgd 	u_char	f_pmask[LOG_NFACILITIES+1];	/* priority mask */
    142   1.1       cgd 	union {
    143   1.1       cgd 		char	f_uname[MAXUNAMES][UT_NAMESIZE+1];
    144   1.1       cgd 		struct {
    145   1.1       cgd 			char	f_hname[MAXHOSTNAMELEN+1];
    146  1.30    itojun 			struct	addrinfo *f_addr;
    147   1.1       cgd 		} f_forw;		/* forwarding address */
    148   1.1       cgd 		char	f_fname[MAXPATHLEN];
    149   1.1       cgd 	} f_un;
    150   1.1       cgd 	char	f_prevline[MAXSVLINE];		/* last message logged */
    151   1.1       cgd 	char	f_lasttime[16];			/* time of last occurrence */
    152   1.1       cgd 	char	f_prevhost[MAXHOSTNAMELEN+1];	/* host from which recd. */
    153   1.1       cgd 	int	f_prevpri;			/* pri of f_prevline */
    154   1.1       cgd 	int	f_prevlen;			/* length of f_prevline */
    155   1.1       cgd 	int	f_prevcount;			/* repetition cnt of prevline */
    156   1.1       cgd 	int	f_repeatcount;			/* number of "repeated" msgs */
    157   1.1       cgd };
    158   1.1       cgd 
    159   1.1       cgd /*
    160   1.1       cgd  * Intervals at which we flush out "message repeated" messages,
    161   1.1       cgd  * in seconds after previous message is logged.  After each flush,
    162   1.1       cgd  * we move to the next interval until we reach the largest.
    163   1.1       cgd  */
    164   1.1       cgd int	repeatinterval[] = { 30, 120, 600 };	/* # of secs before flush */
    165   1.1       cgd #define	MAXREPEAT ((sizeof(repeatinterval) / sizeof(repeatinterval[0])) - 1)
    166   1.1       cgd #define	REPEATTIME(f)	((f)->f_time + repeatinterval[(f)->f_repeatcount])
    167   1.1       cgd #define	BACKOFF(f)	{ if (++(f)->f_repeatcount > MAXREPEAT) \
    168   1.1       cgd 				 (f)->f_repeatcount = MAXREPEAT; \
    169   1.1       cgd 			}
    170   1.1       cgd 
    171   1.1       cgd /* values for f_type */
    172   1.1       cgd #define F_UNUSED	0		/* unused entry */
    173   1.1       cgd #define F_FILE		1		/* regular file */
    174   1.1       cgd #define F_TTY		2		/* terminal */
    175   1.1       cgd #define F_CONSOLE	3		/* console terminal */
    176   1.1       cgd #define F_FORW		4		/* remote machine */
    177   1.1       cgd #define F_USERS		5		/* list of users */
    178   1.1       cgd #define F_WALL		6		/* everyone logged on */
    179   1.1       cgd 
    180   1.1       cgd char	*TypeNames[7] = {
    181   1.1       cgd 	"UNUSED",	"FILE",		"TTY",		"CONSOLE",
    182   1.1       cgd 	"FORW",		"USERS",	"WALL"
    183   1.1       cgd };
    184   1.1       cgd 
    185   1.1       cgd struct	filed *Files;
    186   1.1       cgd struct	filed consfile;
    187   1.1       cgd 
    188   1.1       cgd int	Debug;			/* debug flag */
    189  1.47      manu int	daemonized = 0;		/* we are not daemonized yet */
    190   1.1       cgd char	LocalHostName[MAXHOSTNAMELEN+1];	/* our hostname */
    191   1.1       cgd char	*LocalDomain;		/* our local domain name */
    192  1.59    itojun int	*finet = NULL;		/* Internet datagram sockets */
    193   1.1       cgd int	Initialized = 0;	/* set when we have initialized ourselves */
    194   1.1       cgd int	MarkInterval = 20 * 60;	/* interval between marks in seconds */
    195   1.1       cgd int	MarkSeq = 0;		/* mark sequence number */
    196  1.35     jwise int	SecureMode = 0;		/* listen only on unix domain socks */
    197  1.45       mrg int	UseNameService = 1;	/* make domain name queries */
    198  1.36     jwise int	NumForwards = 0;	/* number of forwarding actions in conf file */
    199  1.22       mrg char	**LogPaths;		/* array of pathnames to read messages from */
    200   1.1       cgd 
    201  1.53       wiz void	cfline(char *, struct filed *);
    202  1.53       wiz char   *cvthname(struct sockaddr_storage *);
    203  1.53       wiz int	decode(const char *, CODE *);
    204  1.53       wiz void	die(int);
    205  1.53       wiz void	domark(int);
    206  1.53       wiz void	fprintlog(struct filed *, int, char *);
    207  1.53       wiz int	getmsgbufsize(void);
    208  1.53       wiz int*	socksetup(int);
    209  1.53       wiz void	init(int);
    210  1.53       wiz void	logerror(const char *, ...);
    211  1.53       wiz void	logmsg(int, char *, char *, int);
    212  1.53       wiz void	printline(char *, char *);
    213  1.53       wiz void	printsys(char *);
    214  1.53       wiz void	reapchild(int);
    215  1.53       wiz void	usage(void);
    216  1.53       wiz void	wallmsg(struct filed *, struct iovec *);
    217  1.53       wiz int	main(int, char *[]);
    218  1.53       wiz void	logpath_add(char ***, int *, int *, char *);
    219  1.53       wiz void	logpath_fileadd(char ***, int *, int *, char *);
    220   1.1       cgd 
    221   1.5     perry int
    222  1.53       wiz main(int argc, char *argv[])
    223   1.1       cgd {
    224  1.22       mrg 	int ch, *funix, i, j, fklog, len, linesize;
    225  1.31    itojun 	int *nfinetix, nfklogix, nfunixbaseix, nfds;
    226  1.22       mrg 	int funixsize = 0, funixmaxsize = 0;
    227   1.1       cgd 	struct sockaddr_un sunx, fromunix;
    228  1.30    itojun 	struct sockaddr_storage frominet;
    229  1.22       mrg 	char *p, *line, **pp;
    230  1.22       mrg 	struct pollfd *readfds;
    231  1.47      manu 	uid_t uid = 0;
    232  1.47      manu 	gid_t gid = 0;
    233  1.47      manu 	char *user = NULL;
    234  1.47      manu 	char *group = NULL;
    235  1.47      manu 	char *root = "/";
    236  1.47      manu 	char *endp;
    237  1.47      manu 	struct group   *gr;
    238  1.47      manu 	struct passwd  *pw;
    239  1.57    itojun 	unsigned long l;
    240  1.41      tron 
    241  1.41      tron 	(void)setlocale(LC_ALL, "");
    242   1.1       cgd 
    243  1.47      manu 	while ((ch = getopt(argc, argv, "dnsf:m:p:P:u:g:t:")) != -1)
    244   1.5     perry 		switch(ch) {
    245  1.53       wiz 		case 'd':		/* debug */
    246  1.53       wiz 			Debug++;
    247  1.53       wiz 			break;
    248  1.53       wiz 		case 'f':		/* configuration file */
    249  1.53       wiz 			ConfFile = optarg;
    250  1.47      manu 			break;
    251  1.47      manu 		case 'g':
    252  1.47      manu 			group = optarg;
    253  1.47      manu 			if (*group == '\0')
    254  1.47      manu 				usage();
    255  1.47      manu 			break;
    256   1.1       cgd 		case 'm':		/* mark interval */
    257   1.1       cgd 			MarkInterval = atoi(optarg) * 60;
    258   1.1       cgd 			break;
    259  1.45       mrg 		case 'n':		/* turn off DNS queries */
    260  1.45       mrg 			UseNameService = 0;
    261  1.45       mrg 			break;
    262   1.1       cgd 		case 'p':		/* path */
    263  1.22       mrg 			logpath_add(&LogPaths, &funixsize,
    264  1.22       mrg 			    &funixmaxsize, optarg);
    265  1.22       mrg 			break;
    266  1.22       mrg 		case 'P':		/* file of paths */
    267  1.22       mrg 			logpath_fileadd(&LogPaths, &funixsize,
    268  1.22       mrg 			    &funixmaxsize, optarg);
    269   1.1       cgd 			break;
    270  1.35     jwise 		case 's':		/* no network listen mode */
    271   1.7     perry 			SecureMode++;
    272   1.7     perry 			break;
    273  1.53       wiz 		case 't':
    274  1.53       wiz 			root = optarg;
    275  1.53       wiz 			if (*root == '\0')
    276  1.53       wiz 				usage();
    277  1.53       wiz 			break;
    278  1.53       wiz 		case 'u':
    279  1.53       wiz 			user = optarg;
    280  1.53       wiz 			if (*user == '\0')
    281  1.53       wiz 				usage();
    282  1.53       wiz 			break;
    283   1.1       cgd 		default:
    284   1.1       cgd 			usage();
    285   1.1       cgd 		}
    286   1.5     perry 	if ((argc -= optind) != 0)
    287   1.1       cgd 		usage();
    288   1.1       cgd 
    289  1.47      manu 	setlinebuf(stdout);
    290  1.47      manu 
    291  1.47      manu 	if (user != NULL) {
    292  1.47      manu 		if (isdigit((unsigned char)*user)) {
    293  1.57    itojun 			errno = 0;
    294  1.57    itojun 			endp = NULL;
    295  1.57    itojun 			l = strtoul(user, &endp, 0);
    296  1.57    itojun 			if (errno || *endp != '\0')
    297  1.47      manu 	    			goto getuser;
    298  1.57    itojun 			uid = (uid_t)l;
    299  1.57    itojun 			if (uid != l) {
    300  1.57    itojun 				errno = 0;
    301  1.57    itojun 				logerror("UID out of range");
    302  1.57    itojun 				die(0);
    303  1.57    itojun 			}
    304  1.47      manu 		} else {
    305  1.47      manu getuser:
    306  1.47      manu 			if ((pw = getpwnam(user)) != NULL) {
    307  1.47      manu 				uid = pw->pw_uid;
    308  1.47      manu 			} else {
    309  1.47      manu 				errno = 0;
    310  1.47      manu 				logerror("Cannot find user `%s'", user);
    311  1.47      manu 				die (0);
    312  1.47      manu 			}
    313  1.47      manu 		}
    314  1.47      manu 	}
    315  1.47      manu 
    316  1.47      manu 	if (group != NULL) {
    317  1.47      manu 		if (isdigit((unsigned char)*group)) {
    318  1.57    itojun 			errno = 0;
    319  1.57    itojun 			endp = NULL;
    320  1.57    itojun 			l = strtoul(group, &endp, 0);
    321  1.57    itojun 			if (errno || *endp != '\0')
    322  1.47      manu 	    			goto getgroup;
    323  1.57    itojun 			gid = (gid_t)l;
    324  1.57    itojun 			if (gid != l) {
    325  1.57    itojun 				errno = 0;
    326  1.57    itojun 				logerror("GID out of range");
    327  1.57    itojun 				die(0);
    328  1.57    itojun 			}
    329  1.47      manu 		} else {
    330  1.47      manu getgroup:
    331  1.47      manu 			if ((gr = getgrnam(group)) != NULL) {
    332  1.47      manu 				gid = gr->gr_gid;
    333  1.47      manu 			} else {
    334  1.47      manu 				errno = 0;
    335  1.47      manu 				logerror("Cannot find group `%s'", group);
    336  1.47      manu 				die(0);
    337  1.47      manu 			}
    338  1.47      manu 		}
    339  1.47      manu 	}
    340  1.47      manu 
    341  1.47      manu 	if (access (root, F_OK | R_OK)) {
    342  1.53       wiz 		logerror("Cannot access `%s'", root);
    343  1.47      manu 		die (0);
    344  1.47      manu 	}
    345   1.1       cgd 
    346   1.1       cgd 	consfile.f_type = F_CONSOLE;
    347  1.58    itojun 	(void)strlcpy(consfile.f_un.f_fname, ctty,
    348  1.58    itojun 	    sizeof(consfile.f_un.f_fname));
    349   1.5     perry 	(void)gethostname(LocalHostName, sizeof(LocalHostName));
    350  1.19       mrg 	LocalHostName[sizeof(LocalHostName) - 1] = '\0';
    351   1.5     perry 	if ((p = strchr(LocalHostName, '.')) != NULL) {
    352   1.1       cgd 		*p++ = '\0';
    353   1.1       cgd 		LocalDomain = p;
    354   1.5     perry 	} else
    355   1.1       cgd 		LocalDomain = "";
    356  1.15       leo 	linesize = getmsgbufsize();
    357  1.15       leo 	if (linesize < MAXLINE)
    358  1.15       leo 		linesize = MAXLINE;
    359  1.15       leo 	linesize++;
    360  1.15       leo 	line = malloc(linesize);
    361  1.15       leo 	if (line == NULL) {
    362  1.47      manu 		logerror("Couldn't allocate line buffer");
    363  1.15       leo 		die(0);
    364  1.15       leo 	}
    365   1.5     perry 	(void)signal(SIGTERM, die);
    366   1.5     perry 	(void)signal(SIGINT, Debug ? die : SIG_IGN);
    367   1.5     perry 	(void)signal(SIGQUIT, Debug ? die : SIG_IGN);
    368   1.5     perry 	(void)signal(SIGCHLD, reapchild);
    369   1.5     perry 	(void)signal(SIGALRM, domark);
    370   1.5     perry 	(void)alarm(TIMERINTVL);
    371   1.5     perry 
    372   1.5     perry #ifndef SUN_LEN
    373   1.5     perry #define SUN_LEN(unp) (strlen((unp)->sun_path) + 2)
    374   1.5     perry #endif
    375  1.24      tron 	if (funixsize == 0)
    376  1.24      tron 		logpath_add(&LogPaths, &funixsize,
    377  1.24      tron 		    &funixmaxsize, _PATH_LOG);
    378  1.22       mrg 	funix = (int *)malloc(sizeof(int) * funixsize);
    379  1.22       mrg 	if (funix == NULL) {
    380  1.47      manu 		logerror("Couldn't allocate funix descriptors");
    381   1.1       cgd 		die(0);
    382   1.1       cgd 	}
    383  1.26      tron 	for (j = 0, pp = LogPaths; *pp; pp++, j++) {
    384  1.47      manu 		dprintf("Making unix dgram socket `%s'\n", *pp);
    385  1.22       mrg 		unlink(*pp);
    386  1.22       mrg 		memset(&sunx, 0, sizeof(sunx));
    387  1.22       mrg 		sunx.sun_family = AF_LOCAL;
    388  1.22       mrg 		(void)strncpy(sunx.sun_path, *pp, sizeof(sunx.sun_path));
    389  1.22       mrg 		funix[j] = socket(AF_LOCAL, SOCK_DGRAM, 0);
    390  1.22       mrg 		if (funix[j] < 0 || bind(funix[j],
    391  1.22       mrg 		    (struct sockaddr *)&sunx, SUN_LEN(&sunx)) < 0 ||
    392  1.22       mrg 		    chmod(*pp, 0666) < 0) {
    393  1.47      manu 			logerror("Cannot create `%s'", *pp);
    394  1.22       mrg 			die(0);
    395  1.22       mrg 		}
    396  1.47      manu 		dprintf("Listening on unix dgram socket `%s'\n", *pp);
    397  1.22       mrg 	}
    398   1.7     perry 
    399  1.36     jwise 	init(0);
    400  1.30    itojun 
    401  1.22       mrg 	if ((fklog = open(_PATH_KLOG, O_RDONLY, 0)) < 0) {
    402  1.47      manu 		dprintf("Can't open `%s' (%d)\n", _PATH_KLOG, errno);
    403  1.22       mrg 	} else {
    404  1.47      manu 		dprintf("Listening on kernel log `%s'\n", _PATH_KLOG);
    405   1.1       cgd 	}
    406   1.1       cgd 
    407  1.47      manu 	dprintf("Off & running....\n");
    408   1.1       cgd 
    409   1.5     perry 	(void)signal(SIGHUP, init);
    410   1.1       cgd 
    411  1.22       mrg 	/* setup pollfd set. */
    412  1.22       mrg 	readfds = (struct pollfd *)malloc(sizeof(struct pollfd) *
    413  1.31    itojun 			(funixsize + (finet ? *finet : 0) + 1));
    414  1.22       mrg 	if (readfds == NULL) {
    415  1.47      manu 		logerror("Couldn't allocate pollfds");
    416  1.22       mrg 		die(0);
    417  1.22       mrg 	}
    418  1.22       mrg 	nfds = 0;
    419  1.22       mrg 	if (fklog >= 0) {
    420  1.22       mrg 		nfklogix = nfds++;
    421  1.22       mrg 		readfds[nfklogix].fd = fklog;
    422  1.22       mrg 		readfds[nfklogix].events = POLLIN | POLLPRI;
    423  1.22       mrg 	}
    424  1.34     lukem 	if (finet && !SecureMode) {
    425  1.31    itojun 		nfinetix = malloc(*finet * sizeof(*nfinetix));
    426  1.31    itojun 		for (j = 0; j < *finet; j++) {
    427  1.31    itojun 			nfinetix[j] = nfds++;
    428  1.31    itojun 			readfds[nfinetix[j]].fd = finet[j+1];
    429  1.31    itojun 			readfds[nfinetix[j]].events = POLLIN | POLLPRI;
    430  1.31    itojun 		}
    431  1.30    itojun 	}
    432  1.22       mrg 	nfunixbaseix = nfds;
    433  1.22       mrg 	for (j = 0, pp = LogPaths; *pp; pp++) {
    434  1.22       mrg 		readfds[nfds].fd = funix[j++];
    435  1.22       mrg 		readfds[nfds++].events = POLLIN | POLLPRI;
    436  1.22       mrg 	}
    437  1.22       mrg 
    438  1.47      manu 	/*
    439  1.47      manu 	 * All files are open, we can drop privileges and chroot
    440  1.47      manu 	 */
    441  1.53       wiz 	dprintf("Attempt to chroot to `%s'\n", root);
    442  1.53       wiz 	if (chroot(root)) {
    443  1.53       wiz 		logerror("Failed to chroot to `%s'", root);
    444  1.47      manu 		die(0);
    445  1.47      manu 	}
    446  1.53       wiz 	dprintf("Attempt to set GID/EGID to `%d'\n", gid);
    447  1.53       wiz 	if (setgid(gid) || setegid(gid)) {
    448  1.53       wiz 		logerror("Failed to set gid to `%d'", gid);
    449  1.47      manu 		die(0);
    450  1.47      manu 	}
    451  1.53       wiz 	dprintf("Attempt to set UID/EUID to `%d'\n", uid);
    452  1.53       wiz 	if (setuid(uid) || seteuid(uid)) {
    453  1.53       wiz 		logerror("Failed to set uid to `%d'", uid);
    454  1.47      manu 		die(0);
    455  1.47      manu 	}
    456  1.47      manu 
    457  1.47      manu 	/*
    458  1.47      manu 	 * We cannot detach from the terminal before we are sure we won't
    459  1.47      manu 	 * have a fatal error, because error message would not go to the
    460  1.47      manu 	 * terminal and would not be logged because syslogd dies.
    461  1.47      manu 	 * All die() calls are behind us, we can call daemon()
    462  1.47      manu 	 */
    463  1.47      manu 	if (!Debug) {
    464  1.47      manu 		(void)daemon(0, 0);
    465  1.47      manu 		daemonized = 1;
    466  1.48      taca 
    467  1.48      taca 		/* tuck my process id away, if i'm not in debug mode */
    468  1.48      taca 		pidfile(NULL);
    469  1.47      manu 	}
    470  1.47      manu 
    471   1.1       cgd 	for (;;) {
    472  1.22       mrg 		int rv;
    473   1.1       cgd 
    474  1.22       mrg 		rv = poll(readfds, nfds, INFTIM);
    475  1.22       mrg 		if (rv == 0)
    476   1.1       cgd 			continue;
    477  1.22       mrg 		if (rv < 0) {
    478   1.1       cgd 			if (errno != EINTR)
    479  1.47      manu 				logerror("poll() failed");
    480   1.1       cgd 			continue;
    481   1.1       cgd 		}
    482  1.47      manu 		dprintf("Got a message (%d)\n", rv);
    483  1.22       mrg 		if (fklog >= 0 &&
    484  1.22       mrg 		    (readfds[nfklogix].revents & (POLLIN | POLLPRI))) {
    485  1.47      manu 			dprintf("Kernel log active\n");
    486  1.15       leo 			i = read(fklog, line, linesize - 1);
    487   1.1       cgd 			if (i > 0) {
    488   1.1       cgd 				line[i] = '\0';
    489   1.1       cgd 				printsys(line);
    490   1.1       cgd 			} else if (i < 0 && errno != EINTR) {
    491  1.47      manu 				logerror("klog failed");
    492   1.1       cgd 				fklog = -1;
    493   1.1       cgd 			}
    494   1.1       cgd 		}
    495  1.22       mrg 		for (j = 0, pp = LogPaths; *pp; pp++, j++) {
    496  1.22       mrg 			if ((readfds[nfunixbaseix + j].revents &
    497  1.22       mrg 			    (POLLIN | POLLPRI)) == 0)
    498  1.22       mrg 				continue;
    499  1.22       mrg 
    500  1.47      manu 			dprintf("Unix socket (%s) active\n", *pp);
    501   1.5     perry 			len = sizeof(fromunix);
    502  1.22       mrg 			i = recvfrom(funix[j], line, MAXLINE, 0,
    503   1.5     perry 			    (struct sockaddr *)&fromunix, &len);
    504   1.1       cgd 			if (i > 0) {
    505   1.1       cgd 				line[i] = '\0';
    506   1.1       cgd 				printline(LocalHostName, line);
    507  1.22       mrg 			} else if (i < 0 && errno != EINTR) {
    508  1.47      manu 				logerror("recvfrom() unix `%s'", *pp);
    509  1.22       mrg 			}
    510   1.1       cgd 		}
    511  1.34     lukem 		if (finet && !SecureMode) {
    512  1.31    itojun 			for (j = 0; j < *finet; j++) {
    513  1.34     lukem 		    		if (readfds[nfinetix[j]].revents &
    514  1.34     lukem 				    (POLLIN | POLLPRI)) {
    515  1.46    itojun #ifdef LIBWRAP
    516  1.46    itojun 					struct request_info req;
    517  1.46    itojun #endif
    518  1.46    itojun 					int reject = 0;
    519  1.46    itojun 
    520  1.31    itojun 					dprintf("inet socket active\n");
    521  1.46    itojun 
    522  1.46    itojun #ifdef LIBWRAP
    523  1.46    itojun 					request_init(&req, RQ_DAEMON, "syslogd",
    524  1.46    itojun 					    RQ_FILE, finet[j + 1], NULL);
    525  1.46    itojun 					fromhost(&req);
    526  1.46    itojun 					reject = !hosts_access(&req);
    527  1.46    itojun 					if (reject)
    528  1.46    itojun 						dprintf("access denied\n");
    529  1.46    itojun #endif
    530  1.46    itojun 
    531  1.31    itojun 					len = sizeof(frominet);
    532  1.34     lukem 					i = recvfrom(finet[j+1], line, MAXLINE,
    533  1.34     lukem 					    0, (struct sockaddr *)&frominet,
    534  1.34     lukem 					    &len);
    535  1.46    itojun 					if (i == 0 || (i < 0 && errno == EINTR))
    536  1.46    itojun 						continue;
    537  1.46    itojun 					else if (i < 0) {
    538  1.46    itojun 						logerror("recvfrom inet");
    539  1.46    itojun 						continue;
    540  1.46    itojun 					}
    541  1.46    itojun 
    542  1.46    itojun 					line[i] = '\0';
    543  1.46    itojun 					if (!reject)
    544  1.34     lukem 						printline(cvthname(&frominet),
    545  1.34     lukem 						    line);
    546  1.31    itojun 				}
    547  1.31    itojun 			}
    548  1.30    itojun 		}
    549   1.1       cgd 	}
    550   1.1       cgd }
    551   1.1       cgd 
    552   1.5     perry void
    553  1.53       wiz usage(void)
    554   1.1       cgd {
    555   1.5     perry 
    556   1.5     perry 	(void)fprintf(stderr,
    557  1.53       wiz 	    "usage: %s [-dns] [-f config_file] [-g group] [-m mark_interval]\n"
    558  1.53       wiz 	    "\t[-P file_list] [-p log_socket [-p log_socket2 ...]]\n"
    559  1.53       wiz 	    "\t[-t chroot_dir] [-u user]\n", getprogname());
    560   1.1       cgd 	exit(1);
    561   1.1       cgd }
    562   1.1       cgd 
    563   1.1       cgd /*
    564  1.22       mrg  * given a pointer to an array of char *'s, a pointer to it's current
    565  1.22       mrg  * size and current allocated max size, and a new char * to add, add
    566  1.22       mrg  * it, update everything as necessary, possibly allocating a new array
    567  1.22       mrg  */
    568  1.22       mrg void
    569  1.53       wiz logpath_add(char ***lp, int *szp, int *maxszp, char *new)
    570  1.22       mrg {
    571  1.62    itojun 	char **nlp;
    572  1.62    itojun 	int newmaxsz;
    573  1.22       mrg 
    574  1.47      manu 	dprintf("Adding `%s' to the %p logpath list\n", new, *lp);
    575  1.22       mrg 	if (*szp == *maxszp) {
    576  1.22       mrg 		if (*maxszp == 0) {
    577  1.62    itojun 			newmaxsz = 4;	/* start of with enough for now */
    578  1.26      tron 			*lp = NULL;
    579  1.50     lukem 		} else
    580  1.62    itojun 			newmaxsz = *maxszp * 2;
    581  1.62    itojun 		nlp = realloc(*lp, sizeof(char *) * (newmaxsz + 1));
    582  1.62    itojun 		if (nlp == NULL) {
    583  1.47      manu 			logerror("Couldn't allocate line buffer");
    584  1.26      tron 			die(0);
    585  1.22       mrg 		}
    586  1.62    itojun 		*lp = nlp;
    587  1.62    itojun 		*maxszp = newmaxsz;
    588  1.22       mrg 	}
    589  1.50     lukem 	if (((*lp)[(*szp)++] = strdup(new)) == NULL) {
    590  1.50     lukem 		logerror("Couldn't allocate logpath");
    591  1.50     lukem 		die(0);
    592  1.50     lukem 	}
    593  1.26      tron 	(*lp)[(*szp)] = NULL;		/* always keep it NULL terminated */
    594  1.22       mrg }
    595  1.22       mrg 
    596  1.22       mrg /* do a file of log sockets */
    597  1.22       mrg void
    598  1.53       wiz logpath_fileadd(char ***lp, int *szp, int *maxszp, char *file)
    599  1.22       mrg {
    600  1.22       mrg 	FILE *fp;
    601  1.22       mrg 	char *line;
    602  1.22       mrg 	size_t len;
    603  1.22       mrg 
    604  1.22       mrg 	fp = fopen(file, "r");
    605  1.22       mrg 	if (fp == NULL) {
    606  1.47      manu 		logerror("Could not open socket file list `%s'", file);
    607  1.22       mrg 		die(0);
    608  1.22       mrg 	}
    609  1.22       mrg 
    610  1.22       mrg 	while ((line = fgetln(fp, &len))) {
    611  1.22       mrg 		line[len - 1] = 0;
    612  1.22       mrg 		logpath_add(lp, szp, maxszp, line);
    613  1.22       mrg 	}
    614  1.22       mrg 	fclose(fp);
    615  1.22       mrg }
    616  1.22       mrg 
    617  1.22       mrg /*
    618   1.1       cgd  * Take a raw input line, decode the message, and print the message
    619   1.1       cgd  * on the appropriate log files.
    620   1.1       cgd  */
    621   1.5     perry void
    622  1.53       wiz printline(char *hname, char *msg)
    623   1.1       cgd {
    624   1.5     perry 	int c, pri;
    625   1.5     perry 	char *p, *q, line[MAXLINE + 1];
    626   1.1       cgd 
    627   1.1       cgd 	/* test for special codes */
    628   1.1       cgd 	pri = DEFUPRI;
    629   1.1       cgd 	p = msg;
    630   1.1       cgd 	if (*p == '<') {
    631   1.1       cgd 		pri = 0;
    632   1.1       cgd 		while (isdigit(*++p))
    633   1.1       cgd 			pri = 10 * pri + (*p - '0');
    634   1.1       cgd 		if (*p == '>')
    635   1.1       cgd 			++p;
    636   1.1       cgd 	}
    637   1.1       cgd 	if (pri &~ (LOG_FACMASK|LOG_PRIMASK))
    638   1.1       cgd 		pri = DEFUPRI;
    639   1.1       cgd 
    640   1.1       cgd 	/* don't allow users to log kernel messages */
    641   1.1       cgd 	if (LOG_FAC(pri) == LOG_KERN)
    642   1.1       cgd 		pri = LOG_MAKEPRI(LOG_USER, LOG_PRI(pri));
    643   1.1       cgd 
    644   1.1       cgd 	q = line;
    645   1.1       cgd 
    646  1.42  sommerfe 	while ((c = *p++) != '\0' &&
    647  1.42  sommerfe 	    q < &line[sizeof(line) - 2]) {
    648  1.42  sommerfe 		c &= 0177;
    649   1.1       cgd 		if (iscntrl(c))
    650   1.1       cgd 			if (c == '\n')
    651   1.1       cgd 				*q++ = ' ';
    652   1.1       cgd 			else if (c == '\t')
    653   1.1       cgd 				*q++ = '\t';
    654   1.1       cgd 			else {
    655   1.1       cgd 				*q++ = '^';
    656   1.1       cgd 				*q++ = c ^ 0100;
    657   1.1       cgd 			}
    658   1.1       cgd 		else
    659   1.1       cgd 			*q++ = c;
    660  1.42  sommerfe 	}
    661   1.1       cgd 	*q = '\0';
    662   1.1       cgd 
    663   1.1       cgd 	logmsg(pri, line, hname, 0);
    664   1.1       cgd }
    665   1.1       cgd 
    666   1.1       cgd /*
    667   1.1       cgd  * Take a raw input line from /dev/klog, split and format similar to syslog().
    668   1.1       cgd  */
    669   1.5     perry void
    670  1.53       wiz printsys(char *msg)
    671   1.1       cgd {
    672   1.5     perry 	int c, pri, flags;
    673   1.5     perry 	char *lp, *p, *q, line[MAXLINE + 1];
    674   1.1       cgd 
    675  1.58    itojun 	(void)strlcpy(line, _PATH_UNIX, sizeof(line));
    676  1.58    itojun 	(void)strlcat(line, ": ", sizeof(line));
    677   1.1       cgd 	lp = line + strlen(line);
    678   1.1       cgd 	for (p = msg; *p != '\0'; ) {
    679   1.1       cgd 		flags = SYNC_FILE | ADDDATE;	/* fsync file after write */
    680   1.1       cgd 		pri = DEFSPRI;
    681   1.1       cgd 		if (*p == '<') {
    682   1.1       cgd 			pri = 0;
    683   1.1       cgd 			while (isdigit(*++p))
    684   1.1       cgd 				pri = 10 * pri + (*p - '0');
    685   1.1       cgd 			if (*p == '>')
    686   1.1       cgd 				++p;
    687   1.1       cgd 		} else {
    688   1.1       cgd 			/* kernel printf's come out on console */
    689   1.1       cgd 			flags |= IGN_CONS;
    690   1.1       cgd 		}
    691   1.1       cgd 		if (pri &~ (LOG_FACMASK|LOG_PRIMASK))
    692   1.1       cgd 			pri = DEFSPRI;
    693   1.1       cgd 		q = lp;
    694   1.1       cgd 		while (*p != '\0' && (c = *p++) != '\n' &&
    695   1.1       cgd 		    q < &line[MAXLINE])
    696   1.1       cgd 			*q++ = c;
    697   1.1       cgd 		*q = '\0';
    698   1.1       cgd 		logmsg(pri, line, LocalHostName, flags);
    699   1.1       cgd 	}
    700   1.1       cgd }
    701   1.1       cgd 
    702   1.1       cgd time_t	now;
    703   1.1       cgd 
    704   1.1       cgd /*
    705   1.1       cgd  * Log a message to the appropriate log files, users, etc. based on
    706   1.1       cgd  * the priority.
    707   1.1       cgd  */
    708   1.5     perry void
    709  1.53       wiz logmsg(int pri, char *msg, char *from, int flags)
    710   1.1       cgd {
    711   1.5     perry 	struct filed *f;
    712   1.5     perry 	int fac, msglen, omask, prilev;
    713   1.1       cgd 	char *timestamp;
    714   1.1       cgd 
    715   1.9       mrg 	dprintf("logmsg: pri 0%o, flags 0x%x, from %s, msg %s\n",
    716   1.1       cgd 	    pri, flags, from, msg);
    717   1.1       cgd 
    718   1.1       cgd 	omask = sigblock(sigmask(SIGHUP)|sigmask(SIGALRM));
    719   1.1       cgd 
    720   1.1       cgd 	/*
    721   1.1       cgd 	 * Check to see if msg looks non-standard.
    722   1.1       cgd 	 */
    723   1.1       cgd 	msglen = strlen(msg);
    724   1.1       cgd 	if (msglen < 16 || msg[3] != ' ' || msg[6] != ' ' ||
    725   1.1       cgd 	    msg[9] != ':' || msg[12] != ':' || msg[15] != ' ')
    726   1.1       cgd 		flags |= ADDDATE;
    727   1.1       cgd 
    728   1.5     perry 	(void)time(&now);
    729   1.1       cgd 	if (flags & ADDDATE)
    730   1.1       cgd 		timestamp = ctime(&now) + 4;
    731   1.1       cgd 	else {
    732   1.1       cgd 		timestamp = msg;
    733   1.1       cgd 		msg += 16;
    734   1.1       cgd 		msglen -= 16;
    735   1.1       cgd 	}
    736   1.1       cgd 
    737   1.1       cgd 	/* extract facility and priority level */
    738   1.1       cgd 	if (flags & MARK)
    739   1.1       cgd 		fac = LOG_NFACILITIES;
    740   1.1       cgd 	else
    741   1.1       cgd 		fac = LOG_FAC(pri);
    742   1.1       cgd 	prilev = LOG_PRI(pri);
    743   1.1       cgd 
    744   1.1       cgd 	/* log the message to the particular outputs */
    745   1.1       cgd 	if (!Initialized) {
    746   1.1       cgd 		f = &consfile;
    747   1.1       cgd 		f->f_file = open(ctty, O_WRONLY, 0);
    748   1.1       cgd 
    749   1.1       cgd 		if (f->f_file >= 0) {
    750   1.1       cgd 			fprintlog(f, flags, msg);
    751   1.5     perry 			(void)close(f->f_file);
    752   1.1       cgd 		}
    753   1.5     perry 		(void)sigsetmask(omask);
    754   1.1       cgd 		return;
    755   1.1       cgd 	}
    756   1.1       cgd 	for (f = Files; f; f = f->f_next) {
    757   1.1       cgd 		/* skip messages that are incorrect priority */
    758   1.1       cgd 		if (f->f_pmask[fac] < prilev ||
    759   1.1       cgd 		    f->f_pmask[fac] == INTERNAL_NOPRI)
    760   1.1       cgd 			continue;
    761   1.1       cgd 
    762   1.1       cgd 		if (f->f_type == F_CONSOLE && (flags & IGN_CONS))
    763   1.1       cgd 			continue;
    764   1.1       cgd 
    765   1.1       cgd 		/* don't output marks to recently written files */
    766   1.1       cgd 		if ((flags & MARK) && (now - f->f_time) < MarkInterval / 2)
    767   1.1       cgd 			continue;
    768   1.1       cgd 
    769   1.1       cgd 		/*
    770   1.1       cgd 		 * suppress duplicate lines to this file
    771   1.1       cgd 		 */
    772   1.1       cgd 		if ((flags & MARK) == 0 && msglen == f->f_prevlen &&
    773   1.1       cgd 		    !strcmp(msg, f->f_prevline) &&
    774   1.1       cgd 		    !strcmp(from, f->f_prevhost)) {
    775   1.5     perry 			(void)strncpy(f->f_lasttime, timestamp, 15);
    776   1.1       cgd 			f->f_prevcount++;
    777  1.47      manu 			dprintf("Msg repeated %d times, %ld sec of %d\n",
    778  1.12   thorpej 			    f->f_prevcount, (long)(now - f->f_time),
    779   1.1       cgd 			    repeatinterval[f->f_repeatcount]);
    780   1.1       cgd 			/*
    781   1.1       cgd 			 * If domark would have logged this by now,
    782   1.1       cgd 			 * flush it now (so we don't hold isolated messages),
    783   1.1       cgd 			 * but back off so we'll flush less often
    784   1.1       cgd 			 * in the future.
    785   1.1       cgd 			 */
    786   1.1       cgd 			if (now > REPEATTIME(f)) {
    787   1.1       cgd 				fprintlog(f, flags, (char *)NULL);
    788   1.1       cgd 				BACKOFF(f);
    789   1.1       cgd 			}
    790   1.1       cgd 		} else {
    791   1.1       cgd 			/* new line, save it */
    792   1.1       cgd 			if (f->f_prevcount)
    793   1.1       cgd 				fprintlog(f, 0, (char *)NULL);
    794   1.1       cgd 			f->f_repeatcount = 0;
    795   1.3       cgd 			f->f_prevpri = pri;
    796   1.5     perry 			(void)strncpy(f->f_lasttime, timestamp, 15);
    797   1.5     perry 			(void)strncpy(f->f_prevhost, from,
    798   1.1       cgd 					sizeof(f->f_prevhost));
    799   1.1       cgd 			if (msglen < MAXSVLINE) {
    800   1.1       cgd 				f->f_prevlen = msglen;
    801  1.58    itojun 				(void)strlcpy(f->f_prevline, msg,
    802  1.58    itojun 				    sizeof(f->f_prevline));
    803   1.1       cgd 				fprintlog(f, flags, (char *)NULL);
    804   1.1       cgd 			} else {
    805   1.1       cgd 				f->f_prevline[0] = 0;
    806   1.1       cgd 				f->f_prevlen = 0;
    807   1.1       cgd 				fprintlog(f, flags, msg);
    808   1.1       cgd 			}
    809   1.1       cgd 		}
    810   1.1       cgd 	}
    811   1.5     perry 	(void)sigsetmask(omask);
    812   1.1       cgd }
    813   1.1       cgd 
    814   1.5     perry void
    815  1.53       wiz fprintlog(struct filed *f, int flags, char *msg)
    816   1.1       cgd {
    817   1.1       cgd 	struct iovec iov[6];
    818   1.5     perry 	struct iovec *v;
    819  1.30    itojun 	struct addrinfo *r;
    820  1.31    itojun 	int j, l, lsent;
    821   1.1       cgd 	char line[MAXLINE + 1], repbuf[80], greetings[200];
    822   1.1       cgd 
    823   1.1       cgd 	v = iov;
    824   1.1       cgd 	if (f->f_type == F_WALL) {
    825   1.1       cgd 		v->iov_base = greetings;
    826  1.17       mrg 		v->iov_len = snprintf(greetings, sizeof greetings,
    827   1.1       cgd 		    "\r\n\7Message from syslogd@%s at %.24s ...\r\n",
    828   1.1       cgd 		    f->f_prevhost, ctime(&now));
    829   1.1       cgd 		v++;
    830   1.1       cgd 		v->iov_base = "";
    831   1.1       cgd 		v->iov_len = 0;
    832   1.1       cgd 		v++;
    833   1.1       cgd 	} else {
    834   1.1       cgd 		v->iov_base = f->f_lasttime;
    835   1.1       cgd 		v->iov_len = 15;
    836   1.1       cgd 		v++;
    837   1.1       cgd 		v->iov_base = " ";
    838   1.1       cgd 		v->iov_len = 1;
    839   1.1       cgd 		v++;
    840   1.1       cgd 	}
    841   1.1       cgd 	v->iov_base = f->f_prevhost;
    842   1.1       cgd 	v->iov_len = strlen(v->iov_base);
    843   1.1       cgd 	v++;
    844   1.1       cgd 	v->iov_base = " ";
    845   1.1       cgd 	v->iov_len = 1;
    846   1.1       cgd 	v++;
    847   1.1       cgd 
    848   1.1       cgd 	if (msg) {
    849   1.1       cgd 		v->iov_base = msg;
    850   1.1       cgd 		v->iov_len = strlen(msg);
    851   1.1       cgd 	} else if (f->f_prevcount > 1) {
    852   1.1       cgd 		v->iov_base = repbuf;
    853  1.17       mrg 		v->iov_len = snprintf(repbuf, sizeof repbuf,
    854  1.17       mrg 		    "last message repeated %d times", f->f_prevcount);
    855   1.1       cgd 	} else {
    856   1.1       cgd 		v->iov_base = f->f_prevline;
    857   1.1       cgd 		v->iov_len = f->f_prevlen;
    858   1.1       cgd 	}
    859   1.1       cgd 	v++;
    860   1.1       cgd 
    861   1.1       cgd 	dprintf("Logging to %s", TypeNames[f->f_type]);
    862   1.1       cgd 	f->f_time = now;
    863   1.1       cgd 
    864   1.1       cgd 	switch (f->f_type) {
    865   1.1       cgd 	case F_UNUSED:
    866   1.1       cgd 		dprintf("\n");
    867   1.1       cgd 		break;
    868   1.1       cgd 
    869   1.1       cgd 	case F_FORW:
    870   1.1       cgd 		dprintf(" %s\n", f->f_un.f_forw.f_hname);
    871  1.34     lukem 			/*
    872  1.34     lukem 			 * check for local vs remote messages
    873  1.34     lukem 			 * (from FreeBSD PR#bin/7055)
    874  1.34     lukem 			 */
    875  1.21      tron 		if (strcmp(f->f_prevhost, LocalHostName)) {
    876  1.21      tron 			l = snprintf(line, sizeof(line) - 1,
    877  1.21      tron 				     "<%d>%.15s [%s]: %s",
    878  1.21      tron 				     f->f_prevpri, (char *) iov[0].iov_base,
    879  1.21      tron 				     f->f_prevhost, (char *) iov[4].iov_base);
    880  1.21      tron 		} else {
    881  1.21      tron 			l = snprintf(line, sizeof(line) - 1, "<%d>%.15s %s",
    882  1.21      tron 				     f->f_prevpri, (char *) iov[0].iov_base,
    883  1.21      tron 				     (char *) iov[4].iov_base);
    884  1.21      tron 		}
    885   1.1       cgd 		if (l > MAXLINE)
    886   1.1       cgd 			l = MAXLINE;
    887  1.34     lukem 		if (finet) {
    888  1.30    itojun 			for (r = f->f_un.f_forw.f_addr; r; r = r->ai_next) {
    889  1.31    itojun 				for (j = 0; j < *finet; j++) {
    890  1.31    itojun #if 0
    891  1.34     lukem 					/*
    892  1.34     lukem 					 * should we check AF first, or just
    893  1.34     lukem 					 * trial and error? FWD
    894  1.34     lukem 					 */
    895  1.34     lukem 					if (r->ai_family ==
    896  1.34     lukem 					    address_family_of(finet[j+1]))
    897  1.30    itojun #endif
    898  1.34     lukem 					lsent = sendto(finet[j+1], line, l, 0,
    899  1.34     lukem 					    r->ai_addr, r->ai_addrlen);
    900  1.31    itojun 					if (lsent == l)
    901  1.31    itojun 						break;
    902  1.31    itojun 				}
    903  1.30    itojun 			}
    904  1.30    itojun 			if (lsent != l) {
    905  1.30    itojun 				f->f_type = F_UNUSED;
    906  1.47      manu 				logerror("sendto() failed");
    907  1.30    itojun 			}
    908   1.1       cgd 		}
    909   1.1       cgd 		break;
    910   1.1       cgd 
    911   1.1       cgd 	case F_CONSOLE:
    912   1.1       cgd 		if (flags & IGN_CONS) {
    913   1.1       cgd 			dprintf(" (ignored)\n");
    914   1.1       cgd 			break;
    915   1.1       cgd 		}
    916   1.1       cgd 		/* FALLTHROUGH */
    917   1.1       cgd 
    918   1.1       cgd 	case F_TTY:
    919   1.1       cgd 	case F_FILE:
    920   1.1       cgd 		dprintf(" %s\n", f->f_un.f_fname);
    921   1.1       cgd 		if (f->f_type != F_FILE) {
    922   1.1       cgd 			v->iov_base = "\r\n";
    923   1.1       cgd 			v->iov_len = 2;
    924   1.1       cgd 		} else {
    925   1.1       cgd 			v->iov_base = "\n";
    926   1.1       cgd 			v->iov_len = 1;
    927   1.1       cgd 		}
    928   1.1       cgd 	again:
    929   1.1       cgd 		if (writev(f->f_file, iov, 6) < 0) {
    930   1.1       cgd 			int e = errno;
    931   1.5     perry 			(void)close(f->f_file);
    932   1.1       cgd 			/*
    933   1.1       cgd 			 * Check for errors on TTY's due to loss of tty
    934   1.1       cgd 			 */
    935   1.1       cgd 			if ((e == EIO || e == EBADF) && f->f_type != F_FILE) {
    936   1.1       cgd 				f->f_file = open(f->f_un.f_fname,
    937   1.1       cgd 				    O_WRONLY|O_APPEND, 0);
    938   1.1       cgd 				if (f->f_file < 0) {
    939   1.1       cgd 					f->f_type = F_UNUSED;
    940   1.1       cgd 					logerror(f->f_un.f_fname);
    941   1.1       cgd 				} else
    942   1.1       cgd 					goto again;
    943   1.1       cgd 			} else {
    944   1.1       cgd 				f->f_type = F_UNUSED;
    945   1.1       cgd 				errno = e;
    946   1.1       cgd 				logerror(f->f_un.f_fname);
    947   1.1       cgd 			}
    948   1.1       cgd 		} else if (flags & SYNC_FILE)
    949   1.5     perry 			(void)fsync(f->f_file);
    950   1.1       cgd 		break;
    951   1.1       cgd 
    952   1.1       cgd 	case F_USERS:
    953   1.1       cgd 	case F_WALL:
    954   1.1       cgd 		dprintf("\n");
    955   1.1       cgd 		v->iov_base = "\r\n";
    956   1.1       cgd 		v->iov_len = 2;
    957   1.1       cgd 		wallmsg(f, iov);
    958   1.1       cgd 		break;
    959   1.1       cgd 	}
    960   1.1       cgd 	f->f_prevcount = 0;
    961   1.1       cgd }
    962   1.1       cgd 
    963   1.1       cgd /*
    964   1.1       cgd  *  WALLMSG -- Write a message to the world at large
    965   1.1       cgd  *
    966   1.1       cgd  *	Write the specified message to either the entire
    967   1.1       cgd  *	world, or a list of approved users.
    968   1.1       cgd  */
    969   1.5     perry void
    970  1.53       wiz wallmsg(struct filed *f, struct iovec *iov)
    971   1.1       cgd {
    972   1.1       cgd 	static int reenter;			/* avoid calling ourselves */
    973   1.5     perry 	int i;
    974   1.5     perry 	char *p;
    975  1.55  christos 	static struct utmpentry *ohead = NULL;
    976  1.55  christos 	struct utmpentry *ep;
    977   1.1       cgd 
    978   1.1       cgd 	if (reenter++)
    979   1.1       cgd 		return;
    980  1.55  christos 
    981  1.55  christos 	(void)getutentries(NULL, &ep);
    982  1.55  christos 	if (ep != ohead) {
    983  1.55  christos 		freeutentries(ohead);
    984  1.55  christos 		ohead = ep;
    985   1.1       cgd 	}
    986   1.1       cgd 	/* NOSTRICT */
    987  1.55  christos 	for (; ep; ep = ep->next) {
    988   1.1       cgd 		if (f->f_type == F_WALL) {
    989  1.55  christos 			if ((p = ttymsg(iov, 6, ep->line, TTYMSGTIME))
    990  1.55  christos 			    != NULL) {
    991   1.1       cgd 				errno = 0;	/* already in msg */
    992   1.1       cgd 				logerror(p);
    993   1.1       cgd 			}
    994   1.1       cgd 			continue;
    995   1.1       cgd 		}
    996   1.1       cgd 		/* should we send the message to this user? */
    997   1.1       cgd 		for (i = 0; i < MAXUNAMES; i++) {
    998   1.1       cgd 			if (!f->f_un.f_uname[i][0])
    999   1.1       cgd 				break;
   1000  1.55  christos 			if (strcmp(f->f_un.f_uname[i], ep->name) == 0) {
   1001  1.55  christos 				if ((p = ttymsg(iov, 6, ep->line, TTYMSGTIME))
   1002  1.55  christos 				    != NULL) {
   1003   1.1       cgd 					errno = 0;	/* already in msg */
   1004   1.1       cgd 					logerror(p);
   1005   1.1       cgd 				}
   1006   1.1       cgd 				break;
   1007   1.1       cgd 			}
   1008   1.1       cgd 		}
   1009   1.1       cgd 	}
   1010   1.1       cgd 	reenter = 0;
   1011   1.1       cgd }
   1012   1.1       cgd 
   1013   1.1       cgd void
   1014  1.53       wiz reapchild(int signo)
   1015   1.1       cgd {
   1016   1.1       cgd 	union wait status;
   1017   1.1       cgd 
   1018   1.5     perry 	while (wait3((int *)&status, WNOHANG, (struct rusage *)NULL) > 0)
   1019   1.1       cgd 		;
   1020   1.1       cgd }
   1021   1.1       cgd 
   1022   1.1       cgd /*
   1023   1.1       cgd  * Return a printable representation of a host address.
   1024   1.1       cgd  */
   1025   1.1       cgd char *
   1026  1.53       wiz cvthname(struct sockaddr_storage *f)
   1027   1.1       cgd {
   1028  1.30    itojun 	int error;
   1029   1.5     perry 	char *p;
   1030  1.30    itojun 	const int niflag = NI_DGRAM;
   1031  1.30    itojun 	static char host[NI_MAXHOST], ip[NI_MAXHOST];
   1032   1.1       cgd 
   1033  1.30    itojun 	error = getnameinfo((struct sockaddr*)f, ((struct sockaddr*)f)->sa_len,
   1034  1.33    itojun 			ip, sizeof ip, NULL, 0, NI_NUMERICHOST|niflag);
   1035   1.1       cgd 
   1036  1.30    itojun 	dprintf("cvthname(%s)\n", ip);
   1037  1.30    itojun 
   1038  1.30    itojun 	if (error) {
   1039  1.30    itojun 		dprintf("Malformed from address %s\n", gai_strerror(error));
   1040   1.1       cgd 		return ("???");
   1041   1.1       cgd 	}
   1042  1.45       mrg 
   1043  1.45       mrg 	if (!UseNameService)
   1044  1.45       mrg 		return (ip);
   1045  1.30    itojun 
   1046  1.30    itojun 	error = getnameinfo((struct sockaddr*)f, ((struct sockaddr*)f)->sa_len,
   1047  1.33    itojun 			host, sizeof host, NULL, 0, niflag);
   1048  1.30    itojun 	if (error) {
   1049  1.30    itojun 		dprintf("Host name for your address (%s) unknown\n", ip);
   1050  1.30    itojun 		return (ip);
   1051   1.1       cgd 	}
   1052  1.30    itojun 	if ((p = strchr(host, '.')) && strcmp(p + 1, LocalDomain) == 0)
   1053   1.1       cgd 		*p = '\0';
   1054  1.30    itojun 	return (host);
   1055   1.1       cgd }
   1056   1.1       cgd 
   1057   1.1       cgd void
   1058  1.53       wiz domark(int signo)
   1059   1.1       cgd {
   1060   1.5     perry 	struct filed *f;
   1061   1.1       cgd 
   1062   1.1       cgd 	now = time((time_t *)NULL);
   1063   1.1       cgd 	MarkSeq += TIMERINTVL;
   1064   1.1       cgd 	if (MarkSeq >= MarkInterval) {
   1065   1.1       cgd 		logmsg(LOG_INFO, "-- MARK --", LocalHostName, ADDDATE|MARK);
   1066   1.1       cgd 		MarkSeq = 0;
   1067   1.1       cgd 	}
   1068   1.1       cgd 
   1069   1.1       cgd 	for (f = Files; f; f = f->f_next) {
   1070   1.1       cgd 		if (f->f_prevcount && now >= REPEATTIME(f)) {
   1071  1.47      manu 			dprintf("Flush %s: repeated %d times, %d sec.\n",
   1072   1.1       cgd 			    TypeNames[f->f_type], f->f_prevcount,
   1073   1.1       cgd 			    repeatinterval[f->f_repeatcount]);
   1074   1.1       cgd 			fprintlog(f, 0, (char *)NULL);
   1075   1.1       cgd 			BACKOFF(f);
   1076   1.1       cgd 		}
   1077   1.1       cgd 	}
   1078   1.5     perry 	(void)alarm(TIMERINTVL);
   1079   1.1       cgd }
   1080   1.1       cgd 
   1081   1.1       cgd /*
   1082   1.1       cgd  * Print syslogd errors some place.
   1083   1.1       cgd  */
   1084   1.5     perry void
   1085  1.47      manu logerror(const char *fmt, ...)
   1086   1.1       cgd {
   1087  1.47      manu 	va_list ap;
   1088  1.47      manu 	char tmpbuf[BUFSIZ];
   1089  1.47      manu 	char buf[BUFSIZ];
   1090  1.47      manu 
   1091  1.47      manu 	va_start(ap, fmt);
   1092  1.47      manu 
   1093  1.47      manu 	(void)vsnprintf(tmpbuf, sizeof(tmpbuf), fmt, ap);
   1094  1.47      manu 
   1095  1.47      manu 	va_end(ap);
   1096   1.1       cgd 
   1097   1.1       cgd 	if (errno)
   1098  1.47      manu 		(void)snprintf(buf, sizeof(buf), "syslogd: %s: %s",
   1099  1.47      manu 		    tmpbuf, strerror(errno));
   1100   1.1       cgd 	else
   1101  1.47      manu 		(void)snprintf(buf, sizeof(buf), "syslogd: %s", tmpbuf);
   1102  1.47      manu 
   1103  1.47      manu 	if (daemonized)
   1104  1.47      manu 		logmsg(LOG_SYSLOG|LOG_ERR, buf, LocalHostName, ADDDATE);
   1105  1.47      manu 	if (!daemonized && Debug)
   1106  1.47      manu 		dprintf("%s\n", buf);
   1107  1.47      manu 	if (!daemonized && !Debug)
   1108  1.47      manu 		printf("%s\n", buf);
   1109  1.47      manu 
   1110  1.47      manu 	return;
   1111   1.1       cgd }
   1112   1.1       cgd 
   1113   1.1       cgd void
   1114  1.53       wiz die(int signo)
   1115   1.1       cgd {
   1116   1.5     perry 	struct filed *f;
   1117  1.47      manu 	char **p;
   1118   1.1       cgd 
   1119   1.1       cgd 	for (f = Files; f != NULL; f = f->f_next) {
   1120   1.1       cgd 		/* flush any pending output */
   1121   1.1       cgd 		if (f->f_prevcount)
   1122   1.1       cgd 			fprintlog(f, 0, (char *)NULL);
   1123   1.1       cgd 	}
   1124  1.47      manu 	errno = 0;
   1125  1.47      manu 	if (signo)
   1126  1.49       kim 		logerror("Exiting on signal %d", signo);
   1127  1.47      manu 	else
   1128  1.47      manu 		logerror("Fatal error, exiting");
   1129  1.22       mrg 	for (p = LogPaths; p && *p; p++)
   1130  1.22       mrg 		unlink(*p);
   1131   1.1       cgd 	exit(0);
   1132   1.1       cgd }
   1133   1.1       cgd 
   1134   1.1       cgd /*
   1135   1.1       cgd  *  INIT -- Initialize syslogd from configuration table
   1136   1.1       cgd  */
   1137   1.1       cgd void
   1138  1.53       wiz init(int signo)
   1139   1.1       cgd {
   1140   1.5     perry 	int i;
   1141   1.5     perry 	FILE *cf;
   1142   1.5     perry 	struct filed *f, *next, **nextp;
   1143   1.5     perry 	char *p;
   1144   1.5     perry 	char cline[LINE_MAX];
   1145   1.1       cgd 
   1146   1.1       cgd 	dprintf("init\n");
   1147   1.1       cgd 
   1148   1.1       cgd 	/*
   1149   1.1       cgd 	 *  Close all open log files.
   1150   1.1       cgd 	 */
   1151   1.1       cgd 	Initialized = 0;
   1152   1.1       cgd 	for (f = Files; f != NULL; f = next) {
   1153   1.1       cgd 		/* flush any pending output */
   1154   1.1       cgd 		if (f->f_prevcount)
   1155   1.1       cgd 			fprintlog(f, 0, (char *)NULL);
   1156   1.1       cgd 
   1157   1.1       cgd 		switch (f->f_type) {
   1158   1.5     perry 		case F_FILE:
   1159   1.5     perry 		case F_TTY:
   1160   1.5     perry 		case F_CONSOLE:
   1161   1.5     perry 			(void)close(f->f_file);
   1162  1.44    itojun 			break;
   1163  1.44    itojun 		case F_FORW:
   1164  1.44    itojun 			if (f->f_un.f_forw.f_addr)
   1165  1.44    itojun 				freeaddrinfo(f->f_un.f_forw.f_addr);
   1166   1.1       cgd 			break;
   1167   1.1       cgd 		}
   1168   1.1       cgd 		next = f->f_next;
   1169   1.5     perry 		free((char *)f);
   1170   1.1       cgd 	}
   1171   1.1       cgd 	Files = NULL;
   1172   1.1       cgd 	nextp = &Files;
   1173   1.1       cgd 
   1174  1.38     jwise 	/*
   1175  1.38     jwise 	 *  Close all open sockets
   1176  1.38     jwise 	 */
   1177  1.38     jwise 
   1178  1.38     jwise 	if (finet) {
   1179  1.38     jwise 		for (i = 0; i < *finet; i++) {
   1180  1.38     jwise 			if (close(finet[i+1]) < 0) {
   1181  1.47      manu 				logerror("close() failed");
   1182  1.38     jwise 				die(0);
   1183  1.38     jwise 			}
   1184  1.38     jwise 		}
   1185  1.38     jwise 	}
   1186  1.39     jwise 
   1187  1.39     jwise 	/*
   1188  1.39     jwise 	 *  Reset counter of forwarding actions
   1189  1.39     jwise 	 */
   1190  1.39     jwise 
   1191  1.39     jwise 	NumForwards=0;
   1192  1.38     jwise 
   1193   1.1       cgd 	/* open the configuration file */
   1194   1.1       cgd 	if ((cf = fopen(ConfFile, "r")) == NULL) {
   1195  1.47      manu 		dprintf("Cannot open `%s'\n", ConfFile);
   1196   1.1       cgd 		*nextp = (struct filed *)calloc(1, sizeof(*f));
   1197   1.1       cgd 		cfline("*.ERR\t/dev/console", *nextp);
   1198   1.1       cgd 		(*nextp)->f_next = (struct filed *)calloc(1, sizeof(*f));
   1199   1.1       cgd 		cfline("*.PANIC\t*", (*nextp)->f_next);
   1200   1.1       cgd 		Initialized = 1;
   1201   1.1       cgd 		return;
   1202   1.1       cgd 	}
   1203   1.1       cgd 
   1204   1.1       cgd 	/*
   1205   1.1       cgd 	 *  Foreach line in the conf table, open that file.
   1206   1.1       cgd 	 */
   1207   1.1       cgd 	f = NULL;
   1208   1.5     perry 	while (fgets(cline, sizeof(cline), cf) != NULL) {
   1209   1.1       cgd 		/*
   1210   1.1       cgd 		 * check for end-of-section, comments, strip off trailing
   1211   1.1       cgd 		 * spaces and newline character.
   1212   1.1       cgd 		 */
   1213   1.5     perry 		for (p = cline; isspace(*p); ++p)
   1214   1.5     perry 			continue;
   1215  1.10        pk 		if (*p == '\0' || *p == '#')
   1216   1.1       cgd 			continue;
   1217   1.5     perry 		for (p = strchr(cline, '\0'); isspace(*--p);)
   1218   1.5     perry 			continue;
   1219   1.1       cgd 		*++p = '\0';
   1220   1.1       cgd 		f = (struct filed *)calloc(1, sizeof(*f));
   1221   1.1       cgd 		*nextp = f;
   1222   1.1       cgd 		nextp = &f->f_next;
   1223   1.1       cgd 		cfline(cline, f);
   1224   1.1       cgd 	}
   1225   1.1       cgd 
   1226   1.1       cgd 	/* close the configuration file */
   1227   1.5     perry 	(void)fclose(cf);
   1228   1.1       cgd 
   1229   1.1       cgd 	Initialized = 1;
   1230   1.1       cgd 
   1231   1.1       cgd 	if (Debug) {
   1232   1.1       cgd 		for (f = Files; f; f = f->f_next) {
   1233   1.1       cgd 			for (i = 0; i <= LOG_NFACILITIES; i++)
   1234   1.1       cgd 				if (f->f_pmask[i] == INTERNAL_NOPRI)
   1235   1.1       cgd 					printf("X ");
   1236   1.1       cgd 				else
   1237   1.1       cgd 					printf("%d ", f->f_pmask[i]);
   1238   1.1       cgd 			printf("%s: ", TypeNames[f->f_type]);
   1239   1.1       cgd 			switch (f->f_type) {
   1240   1.1       cgd 			case F_FILE:
   1241   1.1       cgd 			case F_TTY:
   1242   1.1       cgd 			case F_CONSOLE:
   1243   1.1       cgd 				printf("%s", f->f_un.f_fname);
   1244   1.1       cgd 				break;
   1245   1.1       cgd 
   1246   1.1       cgd 			case F_FORW:
   1247   1.1       cgd 				printf("%s", f->f_un.f_forw.f_hname);
   1248   1.1       cgd 				break;
   1249   1.1       cgd 
   1250   1.1       cgd 			case F_USERS:
   1251  1.34     lukem 				for (i = 0;
   1252  1.34     lukem 				    i < MAXUNAMES && *f->f_un.f_uname[i]; i++)
   1253   1.1       cgd 					printf("%s, ", f->f_un.f_uname[i]);
   1254   1.1       cgd 				break;
   1255   1.1       cgd 			}
   1256   1.1       cgd 			printf("\n");
   1257   1.1       cgd 		}
   1258  1.38     jwise 	}
   1259  1.38     jwise 
   1260  1.38     jwise 	finet = socksetup(PF_UNSPEC);
   1261  1.38     jwise 	if (finet) {
   1262  1.38     jwise 		if (SecureMode) {
   1263  1.38     jwise 			for (i = 0; i < *finet; i++) {
   1264  1.38     jwise 				if (shutdown(finet[i+1], SHUT_RD) < 0) {
   1265  1.47      manu 					logerror("shutdown() failed");
   1266  1.38     jwise 					die(0);
   1267  1.38     jwise 				}
   1268  1.38     jwise 			}
   1269  1.38     jwise 		} else
   1270  1.47      manu 			dprintf("Listening on inet and/or inet6 socket\n");
   1271  1.47      manu 		dprintf("Sending on inet and/or inet6 socket\n");
   1272   1.1       cgd 	}
   1273   1.1       cgd 
   1274   1.1       cgd 	logmsg(LOG_SYSLOG|LOG_INFO, "syslogd: restart", LocalHostName, ADDDATE);
   1275   1.1       cgd 	dprintf("syslogd: restarted\n");
   1276   1.1       cgd }
   1277   1.1       cgd 
   1278   1.1       cgd /*
   1279   1.1       cgd  * Crack a configuration file line
   1280   1.1       cgd  */
   1281   1.5     perry void
   1282  1.53       wiz cfline(char *line, struct filed *f)
   1283   1.1       cgd {
   1284  1.30    itojun 	struct addrinfo hints, *res;
   1285  1.30    itojun 	int    error, i, pri;
   1286  1.30    itojun 	char   *bp, *p, *q;
   1287  1.47      manu 	char   buf[MAXLINE];
   1288  1.47      manu 	int    sp_err;
   1289   1.1       cgd 
   1290   1.1       cgd 	dprintf("cfline(%s)\n", line);
   1291   1.1       cgd 
   1292   1.1       cgd 	errno = 0;	/* keep strerror() stuff out of logerror messages */
   1293   1.1       cgd 
   1294   1.1       cgd 	/* clear out file entry */
   1295   1.5     perry 	memset(f, 0, sizeof(*f));
   1296   1.1       cgd 	for (i = 0; i <= LOG_NFACILITIES; i++)
   1297   1.1       cgd 		f->f_pmask[i] = INTERNAL_NOPRI;
   1298  1.47      manu 
   1299  1.47      manu 	/*
   1300  1.47      manu 	 * There should not be any space before the log facility.
   1301  1.47      manu 	 * Check this is okay, complain and fix if it is not.
   1302  1.47      manu 	 */
   1303  1.47      manu 	q = line;
   1304  1.47      manu 	if (isblank((unsigned char)*line)) {
   1305  1.47      manu 		errno = 0;
   1306  1.47      manu 		logerror(
   1307  1.47      manu 		    "Warning: `%s' space or tab before the log facility",
   1308  1.47      manu 		    line);
   1309  1.47      manu 		/* Fix: strip all spaces/tabs before the log facility */
   1310  1.47      manu 		while (*q++ && isblank((unsigned char)*q));
   1311  1.47      manu 		line = q;
   1312  1.47      manu 	}
   1313  1.47      manu 
   1314  1.47      manu 	/*
   1315  1.47      manu 	 * q is now at the first char of the log facility
   1316  1.47      manu 	 * There should be at least one tab after the log facility
   1317  1.47      manu 	 * Check this is okay, and complain and fix if it is not.
   1318  1.47      manu 	 */
   1319  1.47      manu 	q = line + strlen(line);
   1320  1.47      manu 	while (!isblank((unsigned char)*q) && (q != line))
   1321  1.47      manu 		q--;
   1322  1.47      manu 	if ((q == line) && strlen(line)) {
   1323  1.47      manu 		/* No tabs or space in a non empty line: complain */
   1324  1.47      manu 		errno = 0;
   1325  1.47      manu 		logerror(
   1326  1.47      manu 		    "Error: `%s' log facility or log target missing",
   1327  1.47      manu 		    line);
   1328  1.47      manu 	}
   1329  1.47      manu 
   1330  1.47      manu 	/* q is at the end of the blank between the two fields */
   1331  1.47      manu 	sp_err = 0;
   1332  1.47      manu 	while (isblank((unsigned char)*q) && (q != line))
   1333  1.47      manu 		if (*q-- == ' ')
   1334  1.47      manu 			sp_err = 1;
   1335  1.47      manu 
   1336  1.47      manu 	if (sp_err) {
   1337  1.47      manu 		/*
   1338  1.47      manu 		 * A space somewhere between the log facility
   1339  1.47      manu 		 * and the log target: complain
   1340  1.47      manu 		 */
   1341  1.47      manu 		errno = 0;
   1342  1.47      manu 		logerror(
   1343  1.47      manu 		    "Warning: `%s' space found where tab is expected",
   1344  1.47      manu 		    line);
   1345  1.47      manu 		/* ... and fix the problem: replace all spaces by tabs */
   1346  1.47      manu 		while (*++q && isblank((unsigned char)*q))
   1347  1.47      manu 			if (*q == ' ')
   1348  1.47      manu 				*q='\t';
   1349  1.47      manu 	}
   1350   1.1       cgd 
   1351   1.1       cgd 	/* scan through the list of selectors */
   1352   1.1       cgd 	for (p = line; *p && *p != '\t';) {
   1353   1.1       cgd 
   1354   1.1       cgd 		/* find the end of this facility name list */
   1355   1.1       cgd 		for (q = p; *q && *q != '\t' && *q++ != '.'; )
   1356   1.1       cgd 			continue;
   1357   1.1       cgd 
   1358   1.1       cgd 		/* collect priority name */
   1359   1.5     perry 		for (bp = buf; *q && !strchr("\t,;", *q); )
   1360   1.1       cgd 			*bp++ = *q++;
   1361   1.1       cgd 		*bp = '\0';
   1362   1.1       cgd 
   1363   1.1       cgd 		/* skip cruft */
   1364   1.5     perry 		while (strchr(", ;", *q))
   1365   1.1       cgd 			q++;
   1366   1.1       cgd 
   1367   1.1       cgd 		/* decode priority name */
   1368   1.1       cgd 		if (*buf == '*')
   1369   1.1       cgd 			pri = LOG_PRIMASK + 1;
   1370   1.1       cgd 		else {
   1371   1.1       cgd 			pri = decode(buf, prioritynames);
   1372   1.1       cgd 			if (pri < 0) {
   1373  1.47      manu 				errno = 0;
   1374  1.47      manu 				logerror("Unknown priority name `%s'", buf);
   1375   1.1       cgd 				return;
   1376   1.1       cgd 			}
   1377   1.1       cgd 		}
   1378   1.1       cgd 
   1379   1.1       cgd 		/* scan facilities */
   1380   1.5     perry 		while (*p && !strchr("\t.;", *p)) {
   1381   1.5     perry 			for (bp = buf; *p && !strchr("\t,;.", *p); )
   1382   1.1       cgd 				*bp++ = *p++;
   1383   1.1       cgd 			*bp = '\0';
   1384   1.1       cgd 			if (*buf == '*')
   1385   1.1       cgd 				for (i = 0; i < LOG_NFACILITIES; i++)
   1386   1.1       cgd 					f->f_pmask[i] = pri;
   1387   1.1       cgd 			else {
   1388   1.1       cgd 				i = decode(buf, facilitynames);
   1389   1.1       cgd 				if (i < 0) {
   1390  1.47      manu 					errno = 0;
   1391  1.47      manu 					logerror("Unknown facility name `%s'",
   1392   1.1       cgd 					    buf);
   1393   1.1       cgd 					return;
   1394   1.1       cgd 				}
   1395   1.1       cgd 				f->f_pmask[i >> 3] = pri;
   1396   1.1       cgd 			}
   1397   1.1       cgd 			while (*p == ',' || *p == ' ')
   1398   1.1       cgd 				p++;
   1399   1.1       cgd 		}
   1400   1.1       cgd 
   1401   1.1       cgd 		p = q;
   1402   1.1       cgd 	}
   1403   1.1       cgd 
   1404   1.1       cgd 	/* skip to action part */
   1405  1.47      manu 	sp_err = 0;
   1406  1.47      manu 	while ((*p == '\t') || (*p == ' '))
   1407   1.1       cgd 		p++;
   1408   1.1       cgd 
   1409   1.1       cgd 	switch (*p)
   1410   1.1       cgd 	{
   1411   1.1       cgd 	case '@':
   1412  1.58    itojun 		(void)strlcpy(f->f_un.f_forw.f_hname, ++p,
   1413  1.58    itojun 		    sizeof(f->f_un.f_forw.f_hname));
   1414  1.30    itojun 		memset(&hints, 0, sizeof(hints));
   1415  1.30    itojun 		hints.ai_family = AF_UNSPEC;
   1416  1.30    itojun 		hints.ai_socktype = SOCK_DGRAM;
   1417  1.30    itojun 		hints.ai_protocol = 0;
   1418  1.34     lukem 		error = getaddrinfo(f->f_un.f_forw.f_hname, "syslog", &hints,
   1419  1.34     lukem 		    &res);
   1420  1.30    itojun 		if (error) {
   1421  1.30    itojun 			logerror(gai_strerror(error));
   1422   1.1       cgd 			break;
   1423   1.1       cgd 		}
   1424  1.30    itojun 		f->f_un.f_forw.f_addr = res;
   1425   1.1       cgd 		f->f_type = F_FORW;
   1426  1.36     jwise 		NumForwards++;
   1427   1.1       cgd 		break;
   1428   1.1       cgd 
   1429   1.1       cgd 	case '/':
   1430  1.58    itojun 		(void)strlcpy(f->f_un.f_fname, p, sizeof(f->f_un.f_fname));
   1431   1.1       cgd 		if ((f->f_file = open(p, O_WRONLY|O_APPEND, 0)) < 0) {
   1432  1.13     enami 			f->f_type = F_UNUSED;
   1433   1.1       cgd 			logerror(p);
   1434   1.1       cgd 			break;
   1435   1.1       cgd 		}
   1436   1.1       cgd 		if (isatty(f->f_file))
   1437   1.1       cgd 			f->f_type = F_TTY;
   1438   1.1       cgd 		else
   1439   1.1       cgd 			f->f_type = F_FILE;
   1440   1.1       cgd 		if (strcmp(p, ctty) == 0)
   1441   1.1       cgd 			f->f_type = F_CONSOLE;
   1442   1.1       cgd 		break;
   1443   1.1       cgd 
   1444   1.1       cgd 	case '*':
   1445   1.1       cgd 		f->f_type = F_WALL;
   1446   1.1       cgd 		break;
   1447   1.1       cgd 
   1448   1.1       cgd 	default:
   1449   1.1       cgd 		for (i = 0; i < MAXUNAMES && *p; i++) {
   1450   1.1       cgd 			for (q = p; *q && *q != ','; )
   1451   1.1       cgd 				q++;
   1452   1.5     perry 			(void)strncpy(f->f_un.f_uname[i], p, UT_NAMESIZE);
   1453   1.1       cgd 			if ((q - p) > UT_NAMESIZE)
   1454   1.1       cgd 				f->f_un.f_uname[i][UT_NAMESIZE] = '\0';
   1455   1.1       cgd 			else
   1456   1.1       cgd 				f->f_un.f_uname[i][q - p] = '\0';
   1457   1.1       cgd 			while (*q == ',' || *q == ' ')
   1458   1.1       cgd 				q++;
   1459   1.1       cgd 			p = q;
   1460   1.1       cgd 		}
   1461   1.1       cgd 		f->f_type = F_USERS;
   1462   1.1       cgd 		break;
   1463   1.1       cgd 	}
   1464   1.1       cgd }
   1465   1.1       cgd 
   1466   1.1       cgd 
   1467   1.1       cgd /*
   1468   1.1       cgd  *  Decode a symbolic name to a numeric value
   1469   1.1       cgd  */
   1470   1.5     perry int
   1471  1.53       wiz decode(const char *name, CODE *codetab)
   1472   1.1       cgd {
   1473   1.5     perry 	CODE *c;
   1474   1.5     perry 	char *p, buf[40];
   1475   1.1       cgd 
   1476   1.1       cgd 	if (isdigit(*name))
   1477   1.1       cgd 		return (atoi(name));
   1478   1.1       cgd 
   1479   1.5     perry 	for (p = buf; *name && p < &buf[sizeof(buf) - 1]; p++, name++) {
   1480   1.5     perry 		if (isupper(*name))
   1481   1.5     perry 			*p = tolower(*name);
   1482   1.5     perry 		else
   1483   1.5     perry 			*p = *name;
   1484   1.5     perry 	}
   1485   1.5     perry 	*p = '\0';
   1486   1.1       cgd 	for (c = codetab; c->c_name; c++)
   1487   1.1       cgd 		if (!strcmp(buf, c->c_name))
   1488   1.1       cgd 			return (c->c_val);
   1489   1.1       cgd 
   1490   1.1       cgd 	return (-1);
   1491  1.15       leo }
   1492  1.15       leo 
   1493  1.15       leo /*
   1494  1.15       leo  * Retrieve the size of the kernel message buffer, via sysctl.
   1495  1.15       leo  */
   1496  1.15       leo int
   1497  1.53       wiz getmsgbufsize(void)
   1498  1.15       leo {
   1499  1.15       leo 	int msgbufsize, mib[2];
   1500  1.15       leo 	size_t size;
   1501  1.15       leo 
   1502  1.15       leo 	mib[0] = CTL_KERN;
   1503  1.15       leo 	mib[1] = KERN_MSGBUFSIZE;
   1504  1.15       leo 	size = sizeof msgbufsize;
   1505  1.15       leo 	if (sysctl(mib, 2, &msgbufsize, &size, NULL, 0) == -1) {
   1506  1.47      manu 		dprintf("Couldn't get kern.msgbufsize\n");
   1507  1.15       leo 		return (0);
   1508  1.15       leo 	}
   1509  1.15       leo 	return (msgbufsize);
   1510  1.30    itojun }
   1511  1.30    itojun 
   1512  1.31    itojun int *
   1513  1.53       wiz socksetup(int af)
   1514  1.30    itojun {
   1515  1.31    itojun 	struct addrinfo hints, *res, *r;
   1516  1.31    itojun 	int error, maxs, *s, *socks;
   1517  1.56    itojun 	const int on = 1;
   1518  1.35     jwise 
   1519  1.36     jwise 	if(SecureMode && !NumForwards)
   1520  1.35     jwise 		return(NULL);
   1521  1.30    itojun 
   1522  1.30    itojun 	memset(&hints, 0, sizeof(hints));
   1523  1.30    itojun 	hints.ai_flags = AI_PASSIVE;
   1524  1.30    itojun 	hints.ai_family = af;
   1525  1.30    itojun 	hints.ai_socktype = SOCK_DGRAM;
   1526  1.30    itojun 	error = getaddrinfo(NULL, "syslog", &hints, &res);
   1527  1.30    itojun 	if (error) {
   1528  1.30    itojun 		logerror(gai_strerror(error));
   1529  1.30    itojun 		errno = 0;
   1530  1.30    itojun 		die(0);
   1531  1.30    itojun 	}
   1532  1.31    itojun 
   1533  1.31    itojun 	/* Count max number of sockets we may open */
   1534  1.34     lukem 	for (maxs = 0, r = res; r; r = r->ai_next, maxs++)
   1535  1.34     lukem 		continue;
   1536  1.56    itojun 	socks = malloc((maxs+1) * sizeof(int));
   1537  1.31    itojun 	if (!socks) {
   1538  1.47      manu 		logerror("Couldn't allocate memory for sockets");
   1539  1.31    itojun 		die(0);
   1540  1.31    itojun 	}
   1541  1.31    itojun 
   1542  1.31    itojun 	*socks = 0;   /* num of sockets counter at start of array */
   1543  1.56    itojun 	s = socks + 1;
   1544  1.31    itojun 	for (r = res; r; r = r->ai_next) {
   1545  1.31    itojun 		*s = socket(r->ai_family, r->ai_socktype, r->ai_protocol);
   1546  1.31    itojun 		if (*s < 0) {
   1547  1.47      manu 			logerror("socket() failed");
   1548  1.56    itojun 			continue;
   1549  1.56    itojun 		}
   1550  1.56    itojun 		if (r->ai_family == AF_INET6 && setsockopt(*s, IPPROTO_IPV6,
   1551  1.56    itojun 		    IPV6_V6ONLY, &on, sizeof(on)) < 0) {
   1552  1.56    itojun 			logerror("setsockopt(IPV6_V6ONLY) failed");
   1553  1.56    itojun 			close(*s);
   1554  1.31    itojun 			continue;
   1555  1.31    itojun 		}
   1556  1.37     jwise 		if (!SecureMode && bind(*s, r->ai_addr, r->ai_addrlen) < 0) {
   1557  1.47      manu 			logerror("bind() failed");
   1558  1.31    itojun 			close (*s);
   1559  1.31    itojun 			continue;
   1560  1.31    itojun 		}
   1561  1.31    itojun 
   1562  1.31    itojun 		*socks = *socks + 1;
   1563  1.31    itojun 		s++;
   1564  1.31    itojun 	}
   1565  1.31    itojun 
   1566  1.31    itojun 	if (*socks == 0) {
   1567  1.31    itojun 		free (socks);
   1568  1.31    itojun 		if(Debug)
   1569  1.31    itojun 			return(NULL);
   1570  1.31    itojun 		else
   1571  1.31    itojun 			die(0);
   1572  1.30    itojun 	}
   1573  1.30    itojun 	if (res)
   1574  1.30    itojun 		freeaddrinfo(res);
   1575  1.30    itojun 
   1576  1.31    itojun 	return(socks);
   1577   1.1       cgd }
   1578