xref: /netbsd-src/usr.sbin/syslogd/syslogd.c (revision d710132b4b8ce7f7cccaaf660cb16aa16b4077a0)
1 /*	$NetBSD: syslogd.c,v 1.59 2003/05/14 23:58:23 itojun Exp $	*/
2 
3 /*
4  * Copyright (c) 1983, 1988, 1993, 1994
5  *	The Regents of the University of California.  All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  * 3. All advertising materials mentioning features or use of this software
16  *    must display the following acknowledgement:
17  *	This product includes software developed by the University of
18  *	California, Berkeley and its contributors.
19  * 4. Neither the name of the University nor the names of its contributors
20  *    may be used to endorse or promote products derived from this software
21  *    without specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33  * SUCH DAMAGE.
34  */
35 
36 #include <sys/cdefs.h>
37 #ifndef lint
38 __COPYRIGHT("@(#) Copyright (c) 1983, 1988, 1993, 1994\n\
39 	The Regents of the University of California.  All rights reserved.\n");
40 #endif /* not lint */
41 
42 #ifndef lint
43 #if 0
44 static char sccsid[] = "@(#)syslogd.c	8.3 (Berkeley) 4/4/94";
45 #else
46 __RCSID("$NetBSD: syslogd.c,v 1.59 2003/05/14 23:58:23 itojun Exp $");
47 #endif
48 #endif /* not lint */
49 
50 /*
51  *  syslogd -- log system messages
52  *
53  * This program implements a system log. It takes a series of lines.
54  * Each line may have a priority, signified as "<n>" as
55  * the first characters of the line.  If this is
56  * not present, a default priority is used.
57  *
58  * To kill syslogd, send a signal 15 (terminate).  A signal 1 (hup) will
59  * cause it to reread its configuration file.
60  *
61  * Defined Constants:
62  *
63  * MAXLINE -- the maximimum line length that can be handled.
64  * DEFUPRI -- the default priority for user messages
65  * DEFSPRI -- the default priority for kernel messages
66  *
67  * Author: Eric Allman
68  * extensive changes by Ralph Campbell
69  * more extensive changes by Eric Allman (again)
70  */
71 
72 #define	MAXLINE		1024		/* maximum line length */
73 #define	MAXSVLINE	120		/* maximum saved line length */
74 #define DEFUPRI		(LOG_USER|LOG_NOTICE)
75 #define DEFSPRI		(LOG_KERN|LOG_CRIT)
76 #define TIMERINTVL	30		/* interval for checking flush, mark */
77 #define TTYMSGTIME	1		/* timeout passed to ttymsg */
78 
79 #include <sys/param.h>
80 #include <sys/socket.h>
81 #include <sys/sysctl.h>
82 #include <sys/types.h>
83 #include <sys/un.h>
84 #include <sys/wait.h>
85 
86 #include <netinet/in.h>
87 
88 #include <ctype.h>
89 #include <errno.h>
90 #include <fcntl.h>
91 #include <grp.h>
92 #include <locale.h>
93 #include <netdb.h>
94 #include <poll.h>
95 #include <pwd.h>
96 #include <signal.h>
97 #include <stdarg.h>
98 #include <stdio.h>
99 #include <stdlib.h>
100 #include <string.h>
101 #include <unistd.h>
102 #include <util.h>
103 
104 #include "utmpentry.h"
105 #include "pathnames.h"
106 
107 #define SYSLOG_NAMES
108 #include <sys/syslog.h>
109 
110 #ifdef LIBWRAP
111 #include <tcpd.h>
112 
113 int allow_severity = LOG_AUTH|LOG_INFO;
114 int deny_severity = LOG_AUTH|LOG_WARNING;
115 #endif
116 
117 char	*ConfFile = _PATH_LOGCONF;
118 char	ctty[] = _PATH_CONSOLE;
119 
120 #define FDMASK(fd)	(1 << (fd))
121 
122 #define	dprintf		if (Debug) printf
123 
124 #define MAXUNAMES	20	/* maximum number of user names */
125 
126 /*
127  * Flags to logmsg().
128  */
129 
130 #define IGN_CONS	0x001	/* don't print on console */
131 #define SYNC_FILE	0x002	/* do fsync on file after printing */
132 #define ADDDATE		0x004	/* add a date to the message */
133 #define MARK		0x008	/* this message is a mark */
134 
135 /*
136  * This structure represents the files that will have log
137  * copies printed.
138  */
139 
140 struct filed {
141 	struct	filed *f_next;		/* next in linked list */
142 	short	f_type;			/* entry type, see below */
143 	short	f_file;			/* file descriptor */
144 	time_t	f_time;			/* time this was last written */
145 	u_char	f_pmask[LOG_NFACILITIES+1];	/* priority mask */
146 	union {
147 		char	f_uname[MAXUNAMES][UT_NAMESIZE+1];
148 		struct {
149 			char	f_hname[MAXHOSTNAMELEN+1];
150 			struct	addrinfo *f_addr;
151 		} f_forw;		/* forwarding address */
152 		char	f_fname[MAXPATHLEN];
153 	} f_un;
154 	char	f_prevline[MAXSVLINE];		/* last message logged */
155 	char	f_lasttime[16];			/* time of last occurrence */
156 	char	f_prevhost[MAXHOSTNAMELEN+1];	/* host from which recd. */
157 	int	f_prevpri;			/* pri of f_prevline */
158 	int	f_prevlen;			/* length of f_prevline */
159 	int	f_prevcount;			/* repetition cnt of prevline */
160 	int	f_repeatcount;			/* number of "repeated" msgs */
161 };
162 
163 /*
164  * Intervals at which we flush out "message repeated" messages,
165  * in seconds after previous message is logged.  After each flush,
166  * we move to the next interval until we reach the largest.
167  */
168 int	repeatinterval[] = { 30, 120, 600 };	/* # of secs before flush */
169 #define	MAXREPEAT ((sizeof(repeatinterval) / sizeof(repeatinterval[0])) - 1)
170 #define	REPEATTIME(f)	((f)->f_time + repeatinterval[(f)->f_repeatcount])
171 #define	BACKOFF(f)	{ if (++(f)->f_repeatcount > MAXREPEAT) \
172 				 (f)->f_repeatcount = MAXREPEAT; \
173 			}
174 
175 /* values for f_type */
176 #define F_UNUSED	0		/* unused entry */
177 #define F_FILE		1		/* regular file */
178 #define F_TTY		2		/* terminal */
179 #define F_CONSOLE	3		/* console terminal */
180 #define F_FORW		4		/* remote machine */
181 #define F_USERS		5		/* list of users */
182 #define F_WALL		6		/* everyone logged on */
183 
184 char	*TypeNames[7] = {
185 	"UNUSED",	"FILE",		"TTY",		"CONSOLE",
186 	"FORW",		"USERS",	"WALL"
187 };
188 
189 struct	filed *Files;
190 struct	filed consfile;
191 
192 int	Debug;			/* debug flag */
193 int	daemonized = 0;		/* we are not daemonized yet */
194 char	LocalHostName[MAXHOSTNAMELEN+1];	/* our hostname */
195 char	*LocalDomain;		/* our local domain name */
196 int	*finet = NULL;		/* Internet datagram sockets */
197 int	Initialized = 0;	/* set when we have initialized ourselves */
198 int	MarkInterval = 20 * 60;	/* interval between marks in seconds */
199 int	MarkSeq = 0;		/* mark sequence number */
200 int	SecureMode = 0;		/* listen only on unix domain socks */
201 int	UseNameService = 1;	/* make domain name queries */
202 int	NumForwards = 0;	/* number of forwarding actions in conf file */
203 char	**LogPaths;		/* array of pathnames to read messages from */
204 
205 void	cfline(char *, struct filed *);
206 char   *cvthname(struct sockaddr_storage *);
207 int	decode(const char *, CODE *);
208 void	die(int);
209 void	domark(int);
210 void	fprintlog(struct filed *, int, char *);
211 int	getmsgbufsize(void);
212 int*	socksetup(int);
213 void	init(int);
214 void	logerror(const char *, ...);
215 void	logmsg(int, char *, char *, int);
216 void	printline(char *, char *);
217 void	printsys(char *);
218 void	reapchild(int);
219 void	usage(void);
220 void	wallmsg(struct filed *, struct iovec *);
221 int	main(int, char *[]);
222 void	logpath_add(char ***, int *, int *, char *);
223 void	logpath_fileadd(char ***, int *, int *, char *);
224 
225 int
226 main(int argc, char *argv[])
227 {
228 	int ch, *funix, i, j, fklog, len, linesize;
229 	int *nfinetix, nfklogix, nfunixbaseix, nfds;
230 	int funixsize = 0, funixmaxsize = 0;
231 	struct sockaddr_un sunx, fromunix;
232 	struct sockaddr_storage frominet;
233 	char *p, *line, **pp;
234 	struct pollfd *readfds;
235 	uid_t uid = 0;
236 	gid_t gid = 0;
237 	char *user = NULL;
238 	char *group = NULL;
239 	char *root = "/";
240 	char *endp;
241 	struct group   *gr;
242 	struct passwd  *pw;
243 	unsigned long l;
244 
245 	(void)setlocale(LC_ALL, "");
246 
247 	while ((ch = getopt(argc, argv, "dnsf:m:p:P:u:g:t:")) != -1)
248 		switch(ch) {
249 		case 'd':		/* debug */
250 			Debug++;
251 			break;
252 		case 'f':		/* configuration file */
253 			ConfFile = optarg;
254 			break;
255 		case 'g':
256 			group = optarg;
257 			if (*group == '\0')
258 				usage();
259 			break;
260 		case 'm':		/* mark interval */
261 			MarkInterval = atoi(optarg) * 60;
262 			break;
263 		case 'n':		/* turn off DNS queries */
264 			UseNameService = 0;
265 			break;
266 		case 'p':		/* path */
267 			logpath_add(&LogPaths, &funixsize,
268 			    &funixmaxsize, optarg);
269 			break;
270 		case 'P':		/* file of paths */
271 			logpath_fileadd(&LogPaths, &funixsize,
272 			    &funixmaxsize, optarg);
273 			break;
274 		case 's':		/* no network listen mode */
275 			SecureMode++;
276 			break;
277 		case 't':
278 			root = optarg;
279 			if (*root == '\0')
280 				usage();
281 			break;
282 		case 'u':
283 			user = optarg;
284 			if (*user == '\0')
285 				usage();
286 			break;
287 		case '?':
288 		default:
289 			usage();
290 		}
291 	if ((argc -= optind) != 0)
292 		usage();
293 
294 	setlinebuf(stdout);
295 
296 	if (user != NULL) {
297 		if (isdigit((unsigned char)*user)) {
298 			errno = 0;
299 			endp = NULL;
300 			l = strtoul(user, &endp, 0);
301 			if (errno || *endp != '\0')
302 	    			goto getuser;
303 			uid = (uid_t)l;
304 			if (uid != l) {
305 				errno = 0;
306 				logerror("UID out of range");
307 				die(0);
308 			}
309 		} else {
310 getuser:
311 			if ((pw = getpwnam(user)) != NULL) {
312 				uid = pw->pw_uid;
313 			} else {
314 				errno = 0;
315 				logerror("Cannot find user `%s'", user);
316 				die (0);
317 			}
318 		}
319 	}
320 
321 	if (group != NULL) {
322 		if (isdigit((unsigned char)*group)) {
323 			errno = 0;
324 			endp = NULL;
325 			l = strtoul(group, &endp, 0);
326 			if (errno || *endp != '\0')
327 	    			goto getgroup;
328 			gid = (gid_t)l;
329 			if (gid != l) {
330 				errno = 0;
331 				logerror("GID out of range");
332 				die(0);
333 			}
334 		} else {
335 getgroup:
336 			if ((gr = getgrnam(group)) != NULL) {
337 				gid = gr->gr_gid;
338 			} else {
339 				errno = 0;
340 				logerror("Cannot find group `%s'", group);
341 				die(0);
342 			}
343 		}
344 	}
345 
346 	if (access (root, F_OK | R_OK)) {
347 		logerror("Cannot access `%s'", root);
348 		die (0);
349 	}
350 
351 	consfile.f_type = F_CONSOLE;
352 	(void)strlcpy(consfile.f_un.f_fname, ctty,
353 	    sizeof(consfile.f_un.f_fname));
354 	(void)gethostname(LocalHostName, sizeof(LocalHostName));
355 	LocalHostName[sizeof(LocalHostName) - 1] = '\0';
356 	if ((p = strchr(LocalHostName, '.')) != NULL) {
357 		*p++ = '\0';
358 		LocalDomain = p;
359 	} else
360 		LocalDomain = "";
361 	linesize = getmsgbufsize();
362 	if (linesize < MAXLINE)
363 		linesize = MAXLINE;
364 	linesize++;
365 	line = malloc(linesize);
366 	if (line == NULL) {
367 		logerror("Couldn't allocate line buffer");
368 		die(0);
369 	}
370 	(void)signal(SIGTERM, die);
371 	(void)signal(SIGINT, Debug ? die : SIG_IGN);
372 	(void)signal(SIGQUIT, Debug ? die : SIG_IGN);
373 	(void)signal(SIGCHLD, reapchild);
374 	(void)signal(SIGALRM, domark);
375 	(void)alarm(TIMERINTVL);
376 
377 #ifndef SUN_LEN
378 #define SUN_LEN(unp) (strlen((unp)->sun_path) + 2)
379 #endif
380 	if (funixsize == 0)
381 		logpath_add(&LogPaths, &funixsize,
382 		    &funixmaxsize, _PATH_LOG);
383 	funix = (int *)malloc(sizeof(int) * funixsize);
384 	if (funix == NULL) {
385 		logerror("Couldn't allocate funix descriptors");
386 		die(0);
387 	}
388 	for (j = 0, pp = LogPaths; *pp; pp++, j++) {
389 		dprintf("Making unix dgram socket `%s'\n", *pp);
390 		unlink(*pp);
391 		memset(&sunx, 0, sizeof(sunx));
392 		sunx.sun_family = AF_LOCAL;
393 		(void)strncpy(sunx.sun_path, *pp, sizeof(sunx.sun_path));
394 		funix[j] = socket(AF_LOCAL, SOCK_DGRAM, 0);
395 		if (funix[j] < 0 || bind(funix[j],
396 		    (struct sockaddr *)&sunx, SUN_LEN(&sunx)) < 0 ||
397 		    chmod(*pp, 0666) < 0) {
398 			logerror("Cannot create `%s'", *pp);
399 			die(0);
400 		}
401 		dprintf("Listening on unix dgram socket `%s'\n", *pp);
402 	}
403 
404 	init(0);
405 
406 	if ((fklog = open(_PATH_KLOG, O_RDONLY, 0)) < 0) {
407 		dprintf("Can't open `%s' (%d)\n", _PATH_KLOG, errno);
408 	} else {
409 		dprintf("Listening on kernel log `%s'\n", _PATH_KLOG);
410 	}
411 
412 	dprintf("Off & running....\n");
413 
414 	(void)signal(SIGHUP, init);
415 
416 	/* setup pollfd set. */
417 	readfds = (struct pollfd *)malloc(sizeof(struct pollfd) *
418 			(funixsize + (finet ? *finet : 0) + 1));
419 	if (readfds == NULL) {
420 		logerror("Couldn't allocate pollfds");
421 		die(0);
422 	}
423 	nfds = 0;
424 	if (fklog >= 0) {
425 		nfklogix = nfds++;
426 		readfds[nfklogix].fd = fklog;
427 		readfds[nfklogix].events = POLLIN | POLLPRI;
428 	}
429 	if (finet && !SecureMode) {
430 		nfinetix = malloc(*finet * sizeof(*nfinetix));
431 		for (j = 0; j < *finet; j++) {
432 			nfinetix[j] = nfds++;
433 			readfds[nfinetix[j]].fd = finet[j+1];
434 			readfds[nfinetix[j]].events = POLLIN | POLLPRI;
435 		}
436 	}
437 	nfunixbaseix = nfds;
438 	for (j = 0, pp = LogPaths; *pp; pp++) {
439 		readfds[nfds].fd = funix[j++];
440 		readfds[nfds++].events = POLLIN | POLLPRI;
441 	}
442 
443 	/*
444 	 * All files are open, we can drop privileges and chroot
445 	 */
446 	dprintf("Attempt to chroot to `%s'\n", root);
447 	if (chroot(root)) {
448 		logerror("Failed to chroot to `%s'", root);
449 		die(0);
450 	}
451 	dprintf("Attempt to set GID/EGID to `%d'\n", gid);
452 	if (setgid(gid) || setegid(gid)) {
453 		logerror("Failed to set gid to `%d'", gid);
454 		die(0);
455 	}
456 	dprintf("Attempt to set UID/EUID to `%d'\n", uid);
457 	if (setuid(uid) || seteuid(uid)) {
458 		logerror("Failed to set uid to `%d'", uid);
459 		die(0);
460 	}
461 
462 	/*
463 	 * We cannot detach from the terminal before we are sure we won't
464 	 * have a fatal error, because error message would not go to the
465 	 * terminal and would not be logged because syslogd dies.
466 	 * All die() calls are behind us, we can call daemon()
467 	 */
468 	if (!Debug) {
469 		(void)daemon(0, 0);
470 		daemonized = 1;
471 
472 		/* tuck my process id away, if i'm not in debug mode */
473 		pidfile(NULL);
474 	}
475 
476 	for (;;) {
477 		int rv;
478 
479 		rv = poll(readfds, nfds, INFTIM);
480 		if (rv == 0)
481 			continue;
482 		if (rv < 0) {
483 			if (errno != EINTR)
484 				logerror("poll() failed");
485 			continue;
486 		}
487 		dprintf("Got a message (%d)\n", rv);
488 		if (fklog >= 0 &&
489 		    (readfds[nfklogix].revents & (POLLIN | POLLPRI))) {
490 			dprintf("Kernel log active\n");
491 			i = read(fklog, line, linesize - 1);
492 			if (i > 0) {
493 				line[i] = '\0';
494 				printsys(line);
495 			} else if (i < 0 && errno != EINTR) {
496 				logerror("klog failed");
497 				fklog = -1;
498 			}
499 		}
500 		for (j = 0, pp = LogPaths; *pp; pp++, j++) {
501 			if ((readfds[nfunixbaseix + j].revents &
502 			    (POLLIN | POLLPRI)) == 0)
503 				continue;
504 
505 			dprintf("Unix socket (%s) active\n", *pp);
506 			len = sizeof(fromunix);
507 			i = recvfrom(funix[j], line, MAXLINE, 0,
508 			    (struct sockaddr *)&fromunix, &len);
509 			if (i > 0) {
510 				line[i] = '\0';
511 				printline(LocalHostName, line);
512 			} else if (i < 0 && errno != EINTR) {
513 				logerror("recvfrom() unix `%s'", *pp);
514 			}
515 		}
516 		if (finet && !SecureMode) {
517 			for (j = 0; j < *finet; j++) {
518 		    		if (readfds[nfinetix[j]].revents &
519 				    (POLLIN | POLLPRI)) {
520 #ifdef LIBWRAP
521 					struct request_info req;
522 #endif
523 					int reject = 0;
524 
525 					dprintf("inet socket active\n");
526 
527 #ifdef LIBWRAP
528 					request_init(&req, RQ_DAEMON, "syslogd",
529 					    RQ_FILE, finet[j + 1], NULL);
530 					fromhost(&req);
531 					reject = !hosts_access(&req);
532 					if (reject)
533 						dprintf("access denied\n");
534 #endif
535 
536 					len = sizeof(frominet);
537 					i = recvfrom(finet[j+1], line, MAXLINE,
538 					    0, (struct sockaddr *)&frominet,
539 					    &len);
540 					if (i == 0 || (i < 0 && errno == EINTR))
541 						continue;
542 					else if (i < 0) {
543 						logerror("recvfrom inet");
544 						continue;
545 					}
546 
547 					line[i] = '\0';
548 					if (!reject)
549 						printline(cvthname(&frominet),
550 						    line);
551 				}
552 			}
553 		}
554 	}
555 }
556 
557 void
558 usage(void)
559 {
560 
561 	(void)fprintf(stderr,
562 	    "usage: %s [-dns] [-f config_file] [-g group] [-m mark_interval]\n"
563 	    "\t[-P file_list] [-p log_socket [-p log_socket2 ...]]\n"
564 	    "\t[-t chroot_dir] [-u user]\n", getprogname());
565 	exit(1);
566 }
567 
568 /*
569  * given a pointer to an array of char *'s, a pointer to it's current
570  * size and current allocated max size, and a new char * to add, add
571  * it, update everything as necessary, possibly allocating a new array
572  */
573 void
574 logpath_add(char ***lp, int *szp, int *maxszp, char *new)
575 {
576 
577 	dprintf("Adding `%s' to the %p logpath list\n", new, *lp);
578 	if (*szp == *maxszp) {
579 		if (*maxszp == 0) {
580 			*maxszp = 4;	/* start of with enough for now */
581 			*lp = NULL;
582 		} else
583 			*maxszp *= 2;
584 		*lp = realloc(*lp, sizeof(char *) * (*maxszp + 1));
585 		if (*lp == NULL) {
586 			logerror("Couldn't allocate line buffer");
587 			die(0);
588 		}
589 	}
590 	if (((*lp)[(*szp)++] = strdup(new)) == NULL) {
591 		logerror("Couldn't allocate logpath");
592 		die(0);
593 	}
594 	(*lp)[(*szp)] = NULL;		/* always keep it NULL terminated */
595 }
596 
597 /* do a file of log sockets */
598 void
599 logpath_fileadd(char ***lp, int *szp, int *maxszp, char *file)
600 {
601 	FILE *fp;
602 	char *line;
603 	size_t len;
604 
605 	fp = fopen(file, "r");
606 	if (fp == NULL) {
607 		logerror("Could not open socket file list `%s'", file);
608 		die(0);
609 	}
610 
611 	while ((line = fgetln(fp, &len))) {
612 		line[len - 1] = 0;
613 		logpath_add(lp, szp, maxszp, line);
614 	}
615 	fclose(fp);
616 }
617 
618 /*
619  * Take a raw input line, decode the message, and print the message
620  * on the appropriate log files.
621  */
622 void
623 printline(char *hname, char *msg)
624 {
625 	int c, pri;
626 	char *p, *q, line[MAXLINE + 1];
627 
628 	/* test for special codes */
629 	pri = DEFUPRI;
630 	p = msg;
631 	if (*p == '<') {
632 		pri = 0;
633 		while (isdigit(*++p))
634 			pri = 10 * pri + (*p - '0');
635 		if (*p == '>')
636 			++p;
637 	}
638 	if (pri &~ (LOG_FACMASK|LOG_PRIMASK))
639 		pri = DEFUPRI;
640 
641 	/* don't allow users to log kernel messages */
642 	if (LOG_FAC(pri) == LOG_KERN)
643 		pri = LOG_MAKEPRI(LOG_USER, LOG_PRI(pri));
644 
645 	q = line;
646 
647 	while ((c = *p++) != '\0' &&
648 	    q < &line[sizeof(line) - 2]) {
649 		c &= 0177;
650 		if (iscntrl(c))
651 			if (c == '\n')
652 				*q++ = ' ';
653 			else if (c == '\t')
654 				*q++ = '\t';
655 			else {
656 				*q++ = '^';
657 				*q++ = c ^ 0100;
658 			}
659 		else
660 			*q++ = c;
661 	}
662 	*q = '\0';
663 
664 	logmsg(pri, line, hname, 0);
665 }
666 
667 /*
668  * Take a raw input line from /dev/klog, split and format similar to syslog().
669  */
670 void
671 printsys(char *msg)
672 {
673 	int c, pri, flags;
674 	char *lp, *p, *q, line[MAXLINE + 1];
675 
676 	(void)strlcpy(line, _PATH_UNIX, sizeof(line));
677 	(void)strlcat(line, ": ", sizeof(line));
678 	lp = line + strlen(line);
679 	for (p = msg; *p != '\0'; ) {
680 		flags = SYNC_FILE | ADDDATE;	/* fsync file after write */
681 		pri = DEFSPRI;
682 		if (*p == '<') {
683 			pri = 0;
684 			while (isdigit(*++p))
685 				pri = 10 * pri + (*p - '0');
686 			if (*p == '>')
687 				++p;
688 		} else {
689 			/* kernel printf's come out on console */
690 			flags |= IGN_CONS;
691 		}
692 		if (pri &~ (LOG_FACMASK|LOG_PRIMASK))
693 			pri = DEFSPRI;
694 		q = lp;
695 		while (*p != '\0' && (c = *p++) != '\n' &&
696 		    q < &line[MAXLINE])
697 			*q++ = c;
698 		*q = '\0';
699 		logmsg(pri, line, LocalHostName, flags);
700 	}
701 }
702 
703 time_t	now;
704 
705 /*
706  * Log a message to the appropriate log files, users, etc. based on
707  * the priority.
708  */
709 void
710 logmsg(int pri, char *msg, char *from, int flags)
711 {
712 	struct filed *f;
713 	int fac, msglen, omask, prilev;
714 	char *timestamp;
715 
716 	dprintf("logmsg: pri 0%o, flags 0x%x, from %s, msg %s\n",
717 	    pri, flags, from, msg);
718 
719 	omask = sigblock(sigmask(SIGHUP)|sigmask(SIGALRM));
720 
721 	/*
722 	 * Check to see if msg looks non-standard.
723 	 */
724 	msglen = strlen(msg);
725 	if (msglen < 16 || msg[3] != ' ' || msg[6] != ' ' ||
726 	    msg[9] != ':' || msg[12] != ':' || msg[15] != ' ')
727 		flags |= ADDDATE;
728 
729 	(void)time(&now);
730 	if (flags & ADDDATE)
731 		timestamp = ctime(&now) + 4;
732 	else {
733 		timestamp = msg;
734 		msg += 16;
735 		msglen -= 16;
736 	}
737 
738 	/* extract facility and priority level */
739 	if (flags & MARK)
740 		fac = LOG_NFACILITIES;
741 	else
742 		fac = LOG_FAC(pri);
743 	prilev = LOG_PRI(pri);
744 
745 	/* log the message to the particular outputs */
746 	if (!Initialized) {
747 		f = &consfile;
748 		f->f_file = open(ctty, O_WRONLY, 0);
749 
750 		if (f->f_file >= 0) {
751 			fprintlog(f, flags, msg);
752 			(void)close(f->f_file);
753 		}
754 		(void)sigsetmask(omask);
755 		return;
756 	}
757 	for (f = Files; f; f = f->f_next) {
758 		/* skip messages that are incorrect priority */
759 		if (f->f_pmask[fac] < prilev ||
760 		    f->f_pmask[fac] == INTERNAL_NOPRI)
761 			continue;
762 
763 		if (f->f_type == F_CONSOLE && (flags & IGN_CONS))
764 			continue;
765 
766 		/* don't output marks to recently written files */
767 		if ((flags & MARK) && (now - f->f_time) < MarkInterval / 2)
768 			continue;
769 
770 		/*
771 		 * suppress duplicate lines to this file
772 		 */
773 		if ((flags & MARK) == 0 && msglen == f->f_prevlen &&
774 		    !strcmp(msg, f->f_prevline) &&
775 		    !strcmp(from, f->f_prevhost)) {
776 			(void)strncpy(f->f_lasttime, timestamp, 15);
777 			f->f_prevcount++;
778 			dprintf("Msg repeated %d times, %ld sec of %d\n",
779 			    f->f_prevcount, (long)(now - f->f_time),
780 			    repeatinterval[f->f_repeatcount]);
781 			/*
782 			 * If domark would have logged this by now,
783 			 * flush it now (so we don't hold isolated messages),
784 			 * but back off so we'll flush less often
785 			 * in the future.
786 			 */
787 			if (now > REPEATTIME(f)) {
788 				fprintlog(f, flags, (char *)NULL);
789 				BACKOFF(f);
790 			}
791 		} else {
792 			/* new line, save it */
793 			if (f->f_prevcount)
794 				fprintlog(f, 0, (char *)NULL);
795 			f->f_repeatcount = 0;
796 			f->f_prevpri = pri;
797 			(void)strncpy(f->f_lasttime, timestamp, 15);
798 			(void)strncpy(f->f_prevhost, from,
799 					sizeof(f->f_prevhost));
800 			if (msglen < MAXSVLINE) {
801 				f->f_prevlen = msglen;
802 				(void)strlcpy(f->f_prevline, msg,
803 				    sizeof(f->f_prevline));
804 				fprintlog(f, flags, (char *)NULL);
805 			} else {
806 				f->f_prevline[0] = 0;
807 				f->f_prevlen = 0;
808 				fprintlog(f, flags, msg);
809 			}
810 		}
811 	}
812 	(void)sigsetmask(omask);
813 }
814 
815 void
816 fprintlog(struct filed *f, int flags, char *msg)
817 {
818 	struct iovec iov[6];
819 	struct iovec *v;
820 	struct addrinfo *r;
821 	int j, l, lsent;
822 	char line[MAXLINE + 1], repbuf[80], greetings[200];
823 
824 	v = iov;
825 	if (f->f_type == F_WALL) {
826 		v->iov_base = greetings;
827 		v->iov_len = snprintf(greetings, sizeof greetings,
828 		    "\r\n\7Message from syslogd@%s at %.24s ...\r\n",
829 		    f->f_prevhost, ctime(&now));
830 		v++;
831 		v->iov_base = "";
832 		v->iov_len = 0;
833 		v++;
834 	} else {
835 		v->iov_base = f->f_lasttime;
836 		v->iov_len = 15;
837 		v++;
838 		v->iov_base = " ";
839 		v->iov_len = 1;
840 		v++;
841 	}
842 	v->iov_base = f->f_prevhost;
843 	v->iov_len = strlen(v->iov_base);
844 	v++;
845 	v->iov_base = " ";
846 	v->iov_len = 1;
847 	v++;
848 
849 	if (msg) {
850 		v->iov_base = msg;
851 		v->iov_len = strlen(msg);
852 	} else if (f->f_prevcount > 1) {
853 		v->iov_base = repbuf;
854 		v->iov_len = snprintf(repbuf, sizeof repbuf,
855 		    "last message repeated %d times", f->f_prevcount);
856 	} else {
857 		v->iov_base = f->f_prevline;
858 		v->iov_len = f->f_prevlen;
859 	}
860 	v++;
861 
862 	dprintf("Logging to %s", TypeNames[f->f_type]);
863 	f->f_time = now;
864 
865 	switch (f->f_type) {
866 	case F_UNUSED:
867 		dprintf("\n");
868 		break;
869 
870 	case F_FORW:
871 		dprintf(" %s\n", f->f_un.f_forw.f_hname);
872 			/*
873 			 * check for local vs remote messages
874 			 * (from FreeBSD PR#bin/7055)
875 			 */
876 		if (strcmp(f->f_prevhost, LocalHostName)) {
877 			l = snprintf(line, sizeof(line) - 1,
878 				     "<%d>%.15s [%s]: %s",
879 				     f->f_prevpri, (char *) iov[0].iov_base,
880 				     f->f_prevhost, (char *) iov[4].iov_base);
881 		} else {
882 			l = snprintf(line, sizeof(line) - 1, "<%d>%.15s %s",
883 				     f->f_prevpri, (char *) iov[0].iov_base,
884 				     (char *) iov[4].iov_base);
885 		}
886 		if (l > MAXLINE)
887 			l = MAXLINE;
888 		if (finet) {
889 			for (r = f->f_un.f_forw.f_addr; r; r = r->ai_next) {
890 				for (j = 0; j < *finet; j++) {
891 #if 0
892 					/*
893 					 * should we check AF first, or just
894 					 * trial and error? FWD
895 					 */
896 					if (r->ai_family ==
897 					    address_family_of(finet[j+1]))
898 #endif
899 					lsent = sendto(finet[j+1], line, l, 0,
900 					    r->ai_addr, r->ai_addrlen);
901 					if (lsent == l)
902 						break;
903 				}
904 			}
905 			if (lsent != l) {
906 				f->f_type = F_UNUSED;
907 				logerror("sendto() failed");
908 			}
909 		}
910 		break;
911 
912 	case F_CONSOLE:
913 		if (flags & IGN_CONS) {
914 			dprintf(" (ignored)\n");
915 			break;
916 		}
917 		/* FALLTHROUGH */
918 
919 	case F_TTY:
920 	case F_FILE:
921 		dprintf(" %s\n", f->f_un.f_fname);
922 		if (f->f_type != F_FILE) {
923 			v->iov_base = "\r\n";
924 			v->iov_len = 2;
925 		} else {
926 			v->iov_base = "\n";
927 			v->iov_len = 1;
928 		}
929 	again:
930 		if (writev(f->f_file, iov, 6) < 0) {
931 			int e = errno;
932 			(void)close(f->f_file);
933 			/*
934 			 * Check for errors on TTY's due to loss of tty
935 			 */
936 			if ((e == EIO || e == EBADF) && f->f_type != F_FILE) {
937 				f->f_file = open(f->f_un.f_fname,
938 				    O_WRONLY|O_APPEND, 0);
939 				if (f->f_file < 0) {
940 					f->f_type = F_UNUSED;
941 					logerror(f->f_un.f_fname);
942 				} else
943 					goto again;
944 			} else {
945 				f->f_type = F_UNUSED;
946 				errno = e;
947 				logerror(f->f_un.f_fname);
948 			}
949 		} else if (flags & SYNC_FILE)
950 			(void)fsync(f->f_file);
951 		break;
952 
953 	case F_USERS:
954 	case F_WALL:
955 		dprintf("\n");
956 		v->iov_base = "\r\n";
957 		v->iov_len = 2;
958 		wallmsg(f, iov);
959 		break;
960 	}
961 	f->f_prevcount = 0;
962 }
963 
964 /*
965  *  WALLMSG -- Write a message to the world at large
966  *
967  *	Write the specified message to either the entire
968  *	world, or a list of approved users.
969  */
970 void
971 wallmsg(struct filed *f, struct iovec *iov)
972 {
973 	static int reenter;			/* avoid calling ourselves */
974 	int i;
975 	char *p;
976 	static struct utmpentry *ohead = NULL;
977 	struct utmpentry *ep;
978 
979 	if (reenter++)
980 		return;
981 
982 	(void)getutentries(NULL, &ep);
983 	if (ep != ohead) {
984 		freeutentries(ohead);
985 		ohead = ep;
986 	}
987 	/* NOSTRICT */
988 	for (; ep; ep = ep->next) {
989 		if (f->f_type == F_WALL) {
990 			if ((p = ttymsg(iov, 6, ep->line, TTYMSGTIME))
991 			    != NULL) {
992 				errno = 0;	/* already in msg */
993 				logerror(p);
994 			}
995 			continue;
996 		}
997 		/* should we send the message to this user? */
998 		for (i = 0; i < MAXUNAMES; i++) {
999 			if (!f->f_un.f_uname[i][0])
1000 				break;
1001 			if (strcmp(f->f_un.f_uname[i], ep->name) == 0) {
1002 				if ((p = ttymsg(iov, 6, ep->line, TTYMSGTIME))
1003 				    != NULL) {
1004 					errno = 0;	/* already in msg */
1005 					logerror(p);
1006 				}
1007 				break;
1008 			}
1009 		}
1010 	}
1011 	reenter = 0;
1012 }
1013 
1014 void
1015 reapchild(int signo)
1016 {
1017 	union wait status;
1018 
1019 	while (wait3((int *)&status, WNOHANG, (struct rusage *)NULL) > 0)
1020 		;
1021 }
1022 
1023 /*
1024  * Return a printable representation of a host address.
1025  */
1026 char *
1027 cvthname(struct sockaddr_storage *f)
1028 {
1029 	int error;
1030 	char *p;
1031 	const int niflag = NI_DGRAM;
1032 	static char host[NI_MAXHOST], ip[NI_MAXHOST];
1033 
1034 	error = getnameinfo((struct sockaddr*)f, ((struct sockaddr*)f)->sa_len,
1035 			ip, sizeof ip, NULL, 0, NI_NUMERICHOST|niflag);
1036 
1037 	dprintf("cvthname(%s)\n", ip);
1038 
1039 	if (error) {
1040 		dprintf("Malformed from address %s\n", gai_strerror(error));
1041 		return ("???");
1042 	}
1043 
1044 	if (!UseNameService)
1045 		return (ip);
1046 
1047 	error = getnameinfo((struct sockaddr*)f, ((struct sockaddr*)f)->sa_len,
1048 			host, sizeof host, NULL, 0, niflag);
1049 	if (error) {
1050 		dprintf("Host name for your address (%s) unknown\n", ip);
1051 		return (ip);
1052 	}
1053 	if ((p = strchr(host, '.')) && strcmp(p + 1, LocalDomain) == 0)
1054 		*p = '\0';
1055 	return (host);
1056 }
1057 
1058 void
1059 domark(int signo)
1060 {
1061 	struct filed *f;
1062 
1063 	now = time((time_t *)NULL);
1064 	MarkSeq += TIMERINTVL;
1065 	if (MarkSeq >= MarkInterval) {
1066 		logmsg(LOG_INFO, "-- MARK --", LocalHostName, ADDDATE|MARK);
1067 		MarkSeq = 0;
1068 	}
1069 
1070 	for (f = Files; f; f = f->f_next) {
1071 		if (f->f_prevcount && now >= REPEATTIME(f)) {
1072 			dprintf("Flush %s: repeated %d times, %d sec.\n",
1073 			    TypeNames[f->f_type], f->f_prevcount,
1074 			    repeatinterval[f->f_repeatcount]);
1075 			fprintlog(f, 0, (char *)NULL);
1076 			BACKOFF(f);
1077 		}
1078 	}
1079 	(void)alarm(TIMERINTVL);
1080 }
1081 
1082 /*
1083  * Print syslogd errors some place.
1084  */
1085 void
1086 logerror(const char *fmt, ...)
1087 {
1088 	va_list ap;
1089 	char tmpbuf[BUFSIZ];
1090 	char buf[BUFSIZ];
1091 
1092 	va_start(ap, fmt);
1093 
1094 	(void)vsnprintf(tmpbuf, sizeof(tmpbuf), fmt, ap);
1095 
1096 	va_end(ap);
1097 
1098 	if (errno)
1099 		(void)snprintf(buf, sizeof(buf), "syslogd: %s: %s",
1100 		    tmpbuf, strerror(errno));
1101 	else
1102 		(void)snprintf(buf, sizeof(buf), "syslogd: %s", tmpbuf);
1103 
1104 	if (daemonized)
1105 		logmsg(LOG_SYSLOG|LOG_ERR, buf, LocalHostName, ADDDATE);
1106 	if (!daemonized && Debug)
1107 		dprintf("%s\n", buf);
1108 	if (!daemonized && !Debug)
1109 		printf("%s\n", buf);
1110 
1111 	return;
1112 }
1113 
1114 void
1115 die(int signo)
1116 {
1117 	struct filed *f;
1118 	char **p;
1119 
1120 	for (f = Files; f != NULL; f = f->f_next) {
1121 		/* flush any pending output */
1122 		if (f->f_prevcount)
1123 			fprintlog(f, 0, (char *)NULL);
1124 	}
1125 	errno = 0;
1126 	if (signo)
1127 		logerror("Exiting on signal %d", signo);
1128 	else
1129 		logerror("Fatal error, exiting");
1130 	for (p = LogPaths; p && *p; p++)
1131 		unlink(*p);
1132 	exit(0);
1133 }
1134 
1135 /*
1136  *  INIT -- Initialize syslogd from configuration table
1137  */
1138 void
1139 init(int signo)
1140 {
1141 	int i;
1142 	FILE *cf;
1143 	struct filed *f, *next, **nextp;
1144 	char *p;
1145 	char cline[LINE_MAX];
1146 
1147 	dprintf("init\n");
1148 
1149 	/*
1150 	 *  Close all open log files.
1151 	 */
1152 	Initialized = 0;
1153 	for (f = Files; f != NULL; f = next) {
1154 		/* flush any pending output */
1155 		if (f->f_prevcount)
1156 			fprintlog(f, 0, (char *)NULL);
1157 
1158 		switch (f->f_type) {
1159 		case F_FILE:
1160 		case F_TTY:
1161 		case F_CONSOLE:
1162 			(void)close(f->f_file);
1163 			break;
1164 		case F_FORW:
1165 			if (f->f_un.f_forw.f_addr)
1166 				freeaddrinfo(f->f_un.f_forw.f_addr);
1167 			break;
1168 		}
1169 		next = f->f_next;
1170 		free((char *)f);
1171 	}
1172 	Files = NULL;
1173 	nextp = &Files;
1174 
1175 	/*
1176 	 *  Close all open sockets
1177 	 */
1178 
1179 	if (finet) {
1180 		for (i = 0; i < *finet; i++) {
1181 			if (close(finet[i+1]) < 0) {
1182 				logerror("close() failed");
1183 				die(0);
1184 			}
1185 		}
1186 	}
1187 
1188 	/*
1189 	 *  Reset counter of forwarding actions
1190 	 */
1191 
1192 	NumForwards=0;
1193 
1194 	/* open the configuration file */
1195 	if ((cf = fopen(ConfFile, "r")) == NULL) {
1196 		dprintf("Cannot open `%s'\n", ConfFile);
1197 		*nextp = (struct filed *)calloc(1, sizeof(*f));
1198 		cfline("*.ERR\t/dev/console", *nextp);
1199 		(*nextp)->f_next = (struct filed *)calloc(1, sizeof(*f));
1200 		cfline("*.PANIC\t*", (*nextp)->f_next);
1201 		Initialized = 1;
1202 		return;
1203 	}
1204 
1205 	/*
1206 	 *  Foreach line in the conf table, open that file.
1207 	 */
1208 	f = NULL;
1209 	while (fgets(cline, sizeof(cline), cf) != NULL) {
1210 		/*
1211 		 * check for end-of-section, comments, strip off trailing
1212 		 * spaces and newline character.
1213 		 */
1214 		for (p = cline; isspace(*p); ++p)
1215 			continue;
1216 		if (*p == '\0' || *p == '#')
1217 			continue;
1218 		for (p = strchr(cline, '\0'); isspace(*--p);)
1219 			continue;
1220 		*++p = '\0';
1221 		f = (struct filed *)calloc(1, sizeof(*f));
1222 		*nextp = f;
1223 		nextp = &f->f_next;
1224 		cfline(cline, f);
1225 	}
1226 
1227 	/* close the configuration file */
1228 	(void)fclose(cf);
1229 
1230 	Initialized = 1;
1231 
1232 	if (Debug) {
1233 		for (f = Files; f; f = f->f_next) {
1234 			for (i = 0; i <= LOG_NFACILITIES; i++)
1235 				if (f->f_pmask[i] == INTERNAL_NOPRI)
1236 					printf("X ");
1237 				else
1238 					printf("%d ", f->f_pmask[i]);
1239 			printf("%s: ", TypeNames[f->f_type]);
1240 			switch (f->f_type) {
1241 			case F_FILE:
1242 			case F_TTY:
1243 			case F_CONSOLE:
1244 				printf("%s", f->f_un.f_fname);
1245 				break;
1246 
1247 			case F_FORW:
1248 				printf("%s", f->f_un.f_forw.f_hname);
1249 				break;
1250 
1251 			case F_USERS:
1252 				for (i = 0;
1253 				    i < MAXUNAMES && *f->f_un.f_uname[i]; i++)
1254 					printf("%s, ", f->f_un.f_uname[i]);
1255 				break;
1256 			}
1257 			printf("\n");
1258 		}
1259 	}
1260 
1261 	finet = socksetup(PF_UNSPEC);
1262 	if (finet) {
1263 		if (SecureMode) {
1264 			for (i = 0; i < *finet; i++) {
1265 				if (shutdown(finet[i+1], SHUT_RD) < 0) {
1266 					logerror("shutdown() failed");
1267 					die(0);
1268 				}
1269 			}
1270 		} else
1271 			dprintf("Listening on inet and/or inet6 socket\n");
1272 		dprintf("Sending on inet and/or inet6 socket\n");
1273 	}
1274 
1275 	logmsg(LOG_SYSLOG|LOG_INFO, "syslogd: restart", LocalHostName, ADDDATE);
1276 	dprintf("syslogd: restarted\n");
1277 }
1278 
1279 /*
1280  * Crack a configuration file line
1281  */
1282 void
1283 cfline(char *line, struct filed *f)
1284 {
1285 	struct addrinfo hints, *res;
1286 	int    error, i, pri;
1287 	char   *bp, *p, *q;
1288 	char   buf[MAXLINE];
1289 	int    sp_err;
1290 
1291 	dprintf("cfline(%s)\n", line);
1292 
1293 	errno = 0;	/* keep strerror() stuff out of logerror messages */
1294 
1295 	/* clear out file entry */
1296 	memset(f, 0, sizeof(*f));
1297 	for (i = 0; i <= LOG_NFACILITIES; i++)
1298 		f->f_pmask[i] = INTERNAL_NOPRI;
1299 
1300 	/*
1301 	 * There should not be any space before the log facility.
1302 	 * Check this is okay, complain and fix if it is not.
1303 	 */
1304 	q = line;
1305 	if (isblank((unsigned char)*line)) {
1306 		errno = 0;
1307 		logerror(
1308 		    "Warning: `%s' space or tab before the log facility",
1309 		    line);
1310 		/* Fix: strip all spaces/tabs before the log facility */
1311 		while (*q++ && isblank((unsigned char)*q));
1312 		line = q;
1313 	}
1314 
1315 	/*
1316 	 * q is now at the first char of the log facility
1317 	 * There should be at least one tab after the log facility
1318 	 * Check this is okay, and complain and fix if it is not.
1319 	 */
1320 	q = line + strlen(line);
1321 	while (!isblank((unsigned char)*q) && (q != line))
1322 		q--;
1323 	if ((q == line) && strlen(line)) {
1324 		/* No tabs or space in a non empty line: complain */
1325 		errno = 0;
1326 		logerror(
1327 		    "Error: `%s' log facility or log target missing",
1328 		    line);
1329 	}
1330 
1331 	/* q is at the end of the blank between the two fields */
1332 	sp_err = 0;
1333 	while (isblank((unsigned char)*q) && (q != line))
1334 		if (*q-- == ' ')
1335 			sp_err = 1;
1336 
1337 	if (sp_err) {
1338 		/*
1339 		 * A space somewhere between the log facility
1340 		 * and the log target: complain
1341 		 */
1342 		errno = 0;
1343 		logerror(
1344 		    "Warning: `%s' space found where tab is expected",
1345 		    line);
1346 		/* ... and fix the problem: replace all spaces by tabs */
1347 		while (*++q && isblank((unsigned char)*q))
1348 			if (*q == ' ')
1349 				*q='\t';
1350 	}
1351 
1352 	/* scan through the list of selectors */
1353 	for (p = line; *p && *p != '\t';) {
1354 
1355 		/* find the end of this facility name list */
1356 		for (q = p; *q && *q != '\t' && *q++ != '.'; )
1357 			continue;
1358 
1359 		/* collect priority name */
1360 		for (bp = buf; *q && !strchr("\t,;", *q); )
1361 			*bp++ = *q++;
1362 		*bp = '\0';
1363 
1364 		/* skip cruft */
1365 		while (strchr(", ;", *q))
1366 			q++;
1367 
1368 		/* decode priority name */
1369 		if (*buf == '*')
1370 			pri = LOG_PRIMASK + 1;
1371 		else {
1372 			pri = decode(buf, prioritynames);
1373 			if (pri < 0) {
1374 				errno = 0;
1375 				logerror("Unknown priority name `%s'", buf);
1376 				return;
1377 			}
1378 		}
1379 
1380 		/* scan facilities */
1381 		while (*p && !strchr("\t.;", *p)) {
1382 			for (bp = buf; *p && !strchr("\t,;.", *p); )
1383 				*bp++ = *p++;
1384 			*bp = '\0';
1385 			if (*buf == '*')
1386 				for (i = 0; i < LOG_NFACILITIES; i++)
1387 					f->f_pmask[i] = pri;
1388 			else {
1389 				i = decode(buf, facilitynames);
1390 				if (i < 0) {
1391 					errno = 0;
1392 					logerror("Unknown facility name `%s'",
1393 					    buf);
1394 					return;
1395 				}
1396 				f->f_pmask[i >> 3] = pri;
1397 			}
1398 			while (*p == ',' || *p == ' ')
1399 				p++;
1400 		}
1401 
1402 		p = q;
1403 	}
1404 
1405 	/* skip to action part */
1406 	sp_err = 0;
1407 	while ((*p == '\t') || (*p == ' '))
1408 		p++;
1409 
1410 	switch (*p)
1411 	{
1412 	case '@':
1413 		(void)strlcpy(f->f_un.f_forw.f_hname, ++p,
1414 		    sizeof(f->f_un.f_forw.f_hname));
1415 		memset(&hints, 0, sizeof(hints));
1416 		hints.ai_family = AF_UNSPEC;
1417 		hints.ai_socktype = SOCK_DGRAM;
1418 		hints.ai_protocol = 0;
1419 		error = getaddrinfo(f->f_un.f_forw.f_hname, "syslog", &hints,
1420 		    &res);
1421 		if (error) {
1422 			logerror(gai_strerror(error));
1423 			break;
1424 		}
1425 		f->f_un.f_forw.f_addr = res;
1426 		f->f_type = F_FORW;
1427 		NumForwards++;
1428 		break;
1429 
1430 	case '/':
1431 		(void)strlcpy(f->f_un.f_fname, p, sizeof(f->f_un.f_fname));
1432 		if ((f->f_file = open(p, O_WRONLY|O_APPEND, 0)) < 0) {
1433 			f->f_type = F_UNUSED;
1434 			logerror(p);
1435 			break;
1436 		}
1437 		if (isatty(f->f_file))
1438 			f->f_type = F_TTY;
1439 		else
1440 			f->f_type = F_FILE;
1441 		if (strcmp(p, ctty) == 0)
1442 			f->f_type = F_CONSOLE;
1443 		break;
1444 
1445 	case '*':
1446 		f->f_type = F_WALL;
1447 		break;
1448 
1449 	default:
1450 		for (i = 0; i < MAXUNAMES && *p; i++) {
1451 			for (q = p; *q && *q != ','; )
1452 				q++;
1453 			(void)strncpy(f->f_un.f_uname[i], p, UT_NAMESIZE);
1454 			if ((q - p) > UT_NAMESIZE)
1455 				f->f_un.f_uname[i][UT_NAMESIZE] = '\0';
1456 			else
1457 				f->f_un.f_uname[i][q - p] = '\0';
1458 			while (*q == ',' || *q == ' ')
1459 				q++;
1460 			p = q;
1461 		}
1462 		f->f_type = F_USERS;
1463 		break;
1464 	}
1465 }
1466 
1467 
1468 /*
1469  *  Decode a symbolic name to a numeric value
1470  */
1471 int
1472 decode(const char *name, CODE *codetab)
1473 {
1474 	CODE *c;
1475 	char *p, buf[40];
1476 
1477 	if (isdigit(*name))
1478 		return (atoi(name));
1479 
1480 	for (p = buf; *name && p < &buf[sizeof(buf) - 1]; p++, name++) {
1481 		if (isupper(*name))
1482 			*p = tolower(*name);
1483 		else
1484 			*p = *name;
1485 	}
1486 	*p = '\0';
1487 	for (c = codetab; c->c_name; c++)
1488 		if (!strcmp(buf, c->c_name))
1489 			return (c->c_val);
1490 
1491 	return (-1);
1492 }
1493 
1494 /*
1495  * Retrieve the size of the kernel message buffer, via sysctl.
1496  */
1497 int
1498 getmsgbufsize(void)
1499 {
1500 	int msgbufsize, mib[2];
1501 	size_t size;
1502 
1503 	mib[0] = CTL_KERN;
1504 	mib[1] = KERN_MSGBUFSIZE;
1505 	size = sizeof msgbufsize;
1506 	if (sysctl(mib, 2, &msgbufsize, &size, NULL, 0) == -1) {
1507 		dprintf("Couldn't get kern.msgbufsize\n");
1508 		return (0);
1509 	}
1510 	return (msgbufsize);
1511 }
1512 
1513 int *
1514 socksetup(int af)
1515 {
1516 	struct addrinfo hints, *res, *r;
1517 	int error, maxs, *s, *socks;
1518 	const int on = 1;
1519 
1520 	if(SecureMode && !NumForwards)
1521 		return(NULL);
1522 
1523 	memset(&hints, 0, sizeof(hints));
1524 	hints.ai_flags = AI_PASSIVE;
1525 	hints.ai_family = af;
1526 	hints.ai_socktype = SOCK_DGRAM;
1527 	error = getaddrinfo(NULL, "syslog", &hints, &res);
1528 	if (error) {
1529 		logerror(gai_strerror(error));
1530 		errno = 0;
1531 		die(0);
1532 	}
1533 
1534 	/* Count max number of sockets we may open */
1535 	for (maxs = 0, r = res; r; r = r->ai_next, maxs++)
1536 		continue;
1537 	socks = malloc((maxs+1) * sizeof(int));
1538 	if (!socks) {
1539 		logerror("Couldn't allocate memory for sockets");
1540 		die(0);
1541 	}
1542 
1543 	*socks = 0;   /* num of sockets counter at start of array */
1544 	s = socks + 1;
1545 	for (r = res; r; r = r->ai_next) {
1546 		*s = socket(r->ai_family, r->ai_socktype, r->ai_protocol);
1547 		if (*s < 0) {
1548 			logerror("socket() failed");
1549 			continue;
1550 		}
1551 		if (r->ai_family == AF_INET6 && setsockopt(*s, IPPROTO_IPV6,
1552 		    IPV6_V6ONLY, &on, sizeof(on)) < 0) {
1553 			logerror("setsockopt(IPV6_V6ONLY) failed");
1554 			close(*s);
1555 			continue;
1556 		}
1557 		if (!SecureMode && bind(*s, r->ai_addr, r->ai_addrlen) < 0) {
1558 			logerror("bind() failed");
1559 			close (*s);
1560 			continue;
1561 		}
1562 
1563 		*socks = *socks + 1;
1564 		s++;
1565 	}
1566 
1567 	if (*socks == 0) {
1568 		free (socks);
1569 		if(Debug)
1570 			return(NULL);
1571 		else
1572 			die(0);
1573 	}
1574 	if (res)
1575 		freeaddrinfo(res);
1576 
1577 	return(socks);
1578 }
1579