1 /* 2 * Copyright (c) 1983 Eric P. Allman 3 * Copyright (c) 1988 Regents of the University of California. 4 * All rights reserved. 5 * 6 * %sccs.include.redist.c% 7 */ 8 9 #ifndef lint 10 static char sccsid[] = "@(#)conf.c 6.43 (Berkeley) 03/25/93"; 11 #endif /* not lint */ 12 13 # include <sys/ioctl.h> 14 # include <sys/param.h> 15 # include <signal.h> 16 # include <pwd.h> 17 # include "sendmail.h" 18 # include "pathnames.h" 19 20 /* 21 ** CONF.C -- Sendmail Configuration Tables. 22 ** 23 ** Defines the configuration of this installation. 24 ** 25 ** Configuration Variables: 26 ** HdrInfo -- a table describing well-known header fields. 27 ** Each entry has the field name and some flags, 28 ** which are described in sendmail.h. 29 ** 30 ** Notes: 31 ** I have tried to put almost all the reasonable 32 ** configuration information into the configuration 33 ** file read at runtime. My intent is that anything 34 ** here is a function of the version of UNIX you 35 ** are running, or is really static -- for example 36 ** the headers are a superset of widely used 37 ** protocols. If you find yourself playing with 38 ** this file too much, you may be making a mistake! 39 */ 40 41 42 43 44 /* 45 ** Header info table 46 ** Final (null) entry contains the flags used for any other field. 47 ** 48 ** Not all of these are actually handled specially by sendmail 49 ** at this time. They are included as placeholders, to let 50 ** you know that "someday" I intend to have sendmail do 51 ** something with them. 52 */ 53 54 struct hdrinfo HdrInfo[] = 55 { 56 /* originator fields, most to least significant */ 57 "resent-sender", H_FROM|H_RESENT, 58 "resent-from", H_FROM|H_RESENT, 59 "resent-reply-to", H_FROM|H_RESENT, 60 "sender", H_FROM, 61 "from", H_FROM, 62 "reply-to", H_FROM, 63 "full-name", H_ACHECK, 64 "return-receipt-to", H_FROM /* |H_RECEIPTTO */, 65 "errors-to", H_FROM|H_ERRORSTO, 66 67 /* destination fields */ 68 "to", H_RCPT, 69 "resent-to", H_RCPT|H_RESENT, 70 "cc", H_RCPT, 71 "resent-cc", H_RCPT|H_RESENT, 72 "bcc", H_RCPT|H_ACHECK, 73 "resent-bcc", H_RCPT|H_ACHECK|H_RESENT, 74 "apparently-to", H_RCPT, 75 76 /* message identification and control */ 77 "message-id", 0, 78 "resent-message-id", H_RESENT, 79 "message", H_EOH, 80 "text", H_EOH, 81 82 /* date fields */ 83 "date", 0, 84 "resent-date", H_RESENT, 85 86 /* trace fields */ 87 "received", H_TRACE|H_FORCE, 88 "via", H_TRACE|H_FORCE, 89 "mail-from", H_TRACE|H_FORCE, 90 91 /* miscellaneous fields */ 92 "comments", H_FORCE, 93 "return-path", H_ACHECK, 94 95 NULL, 0, 96 }; 97 98 99 100 /* 101 ** Location of system files/databases/etc. 102 */ 103 104 char *ConfFile = _PATH_SENDMAILCF; /* runtime configuration */ 105 char *FreezeFile = _PATH_SENDMAILFC; /* frozen version of above */ 106 char *PidFile = _PATH_SENDMAILPID; /* stores daemon proc id */ 107 108 109 110 /* 111 ** Privacy values 112 */ 113 114 struct prival PrivacyValues[] = 115 { 116 "public", PRIV_PUBLIC, 117 "needmailhelo", PRIV_NEEDMAILHELO, 118 "needexpnhelo", PRIV_NEEDEXPNHELO, 119 "needvrfyhelo", PRIV_NEEDVRFYHELO, 120 "noexpn", PRIV_NOEXPN, 121 "novrfy", PRIV_NOVRFY, 122 "restrictmailq", PRIV_RESTRMAILQ, 123 "authwarnings", PRIV_AUTHWARNINGS, 124 "goaway", PRIV_GOAWAY, 125 NULL, 0, 126 }; 127 128 129 130 /* 131 ** Miscellaneous stuff. 132 */ 133 134 int DtableSize = 50; /* max open files; reset in 4.2bsd */ 135 /* 136 ** SETDEFAULTS -- set default values 137 ** 138 ** Because of the way freezing is done, these must be initialized 139 ** using direct code. 140 ** 141 ** Parameters: 142 ** e -- the default envelope. 143 ** 144 ** Returns: 145 ** none. 146 ** 147 ** Side Effects: 148 ** Initializes a bunch of global variables to their 149 ** default values. 150 */ 151 152 #define DAYS * 24 * 60 * 60 153 154 setdefaults(e) 155 register ENVELOPE *e; 156 { 157 SpaceSub = ' '; /* option B */ 158 QueueLA = 8; /* option x */ 159 RefuseLA = 12; /* option X */ 160 WkRecipFact = 30000L; /* option y */ 161 WkClassFact = 1800L; /* option z */ 162 WkTimeFact = 90000L; /* option Z */ 163 QueueFactor = WkRecipFact * 20; /* option q */ 164 FileMode = (getuid() != geteuid()) ? 0644 : 0600; 165 /* option F */ 166 DefUid = 1; /* option u */ 167 DefGid = 1; /* option g */ 168 CheckpointInterval = 10; /* option C */ 169 MaxHopCount = 25; /* option h */ 170 e->e_sendmode = SM_FORK; /* option d */ 171 e->e_errormode = EM_PRINT; /* option e */ 172 EightBit = FALSE; /* option 8 */ 173 MaxMciCache = 1; /* option k */ 174 MciCacheTimeout = 300; /* option K */ 175 LogLevel = 9; /* option L */ 176 settimeouts(NULL); /* option r */ 177 TimeOuts.to_q_return = 5 DAYS; /* option T */ 178 TimeOuts.to_q_warning = 0; /* option T */ 179 PrivacyFlags = PRIV_AUTHWARNINGS; /* option p */ 180 setdefuser(); 181 setupmaps(); 182 setupmailers(); 183 } 184 185 186 /* 187 ** SETDEFUSER -- set/reset DefUser using DefUid (for initgroups()) 188 */ 189 190 setdefuser() 191 { 192 struct passwd *defpwent; 193 static char defuserbuf[40]; 194 195 DefUser = defuserbuf; 196 if ((defpwent = getpwuid(DefUid)) != NULL) 197 strcpy(defuserbuf, defpwent->pw_name); 198 else 199 strcpy(defuserbuf, "nobody"); 200 } 201 /* 202 ** SETUPMAPS -- set up map classes 203 ** 204 ** Since these are compiled in, they cannot be in the config file. 205 ** 206 */ 207 208 setupmaps() 209 { 210 register STAB *s; 211 212 /* host name lookup map */ 213 { 214 extern bool host_map_init(); 215 extern char *maphostname(); 216 217 s = stab("host", ST_MAPCLASS, ST_ENTER); 218 s->s_mapclass.map_init = host_map_init; 219 s->s_mapclass.map_lookup = maphostname; 220 } 221 222 /* dequote map */ 223 { 224 extern bool dequote_init(); 225 extern char *dequote_map(); 226 227 s = stab("dequote", ST_MAPCLASS, ST_ENTER); 228 s->s_mapclass.map_init = dequote_init; 229 s->s_mapclass.map_lookup = dequote_map; 230 } 231 232 # ifdef DBM_MAP 233 /* dbm file access */ 234 { 235 extern bool dbm_map_init(); 236 extern char *dbm_map_lookup(); 237 238 s = stab("dbm", ST_MAPCLASS, ST_ENTER); 239 s->s_mapclass.map_init = dbm_map_init; 240 s->s_mapclass.map_lookup = dbm_map_lookup; 241 } 242 # endif 243 244 # ifdef BTREE_MAP 245 /* new database file access -- btree files */ 246 { 247 extern bool bt_map_init(); 248 extern char *db_map_lookup(); 249 250 s = stab("btree", ST_MAPCLASS, ST_ENTER); 251 s->s_mapclass.map_init = bt_map_init; 252 s->s_mapclass.map_lookup = db_map_lookup; 253 } 254 # endif 255 256 # ifdef HASH_MAP 257 /* new database file access -- hash files */ 258 { 259 extern bool hash_map_init(); 260 extern char *db_map_lookup(); 261 262 s = stab("hash", ST_MAPCLASS, ST_ENTER); 263 s->s_mapclass.map_init = hash_map_init; 264 s->s_mapclass.map_lookup = db_map_lookup; 265 } 266 # endif 267 268 # ifdef NIS_MAP 269 /* NIS map access */ 270 { 271 extern bool nis_map_init(); 272 extern char *nis_map_lookup(); 273 274 s = stab("nis", ST_MAPCLASS, ST_ENTER); 275 s->s_mapclass.map_init = nis_map_init; 276 s->s_mapclass.map_lookup = nis_map_lookup; 277 } 278 # endif 279 280 # ifdef USERDB_MAP 281 /* user database */ 282 { 283 extern bool udb_map_init(); 284 extern char *udb_map_lookup(); 285 286 s = stab("udb", ST_MAPCLASS, ST_ENTER); 287 s->s_mapclass.map_init = udb_map_init; 288 s->s_mapclass.map_lookup = udb_map_lookup; 289 } 290 # endif 291 } 292 /* 293 ** HOST_MAP_INIT -- initialize host class structures 294 */ 295 296 bool 297 host_map_init(map, mapname, args) 298 MAP *map; 299 char *mapname; 300 char *args; 301 { 302 register char *p = args; 303 304 for (;;) 305 { 306 while (isascii(*p) && isspace(*p)) 307 p++; 308 if (*p != '-') 309 break; 310 switch (*++p) 311 { 312 case 'a': 313 map->map_app = ++p; 314 break; 315 } 316 while (*p != '\0' && !(isascii(*p) && isspace(*p))) 317 p++; 318 if (*p != '\0') 319 *p++ = '\0'; 320 } 321 if (map->map_app != NULL) 322 map->map_app = newstr(map->map_app); 323 return TRUE; 324 } 325 /* 326 ** SETUPMAILERS -- initialize default mailers 327 */ 328 329 setupmailers() 330 { 331 char buf[100]; 332 333 strcpy(buf, "prog, P=/bin/sh, F=lsD, A=sh -c $u"); 334 makemailer(buf); 335 336 strcpy(buf, "*file*, P=/dev/null, F=lsDEu, A=FILE"); 337 makemailer(buf); 338 339 strcpy(buf, "*include*, P=/dev/null, F=su, A=INCLUDE"); 340 makemailer(buf); 341 } 342 /* 343 ** GETRUID -- get real user id (V7) 344 */ 345 346 getruid() 347 { 348 if (OpMode == MD_DAEMON) 349 return (RealUid); 350 else 351 return (getuid()); 352 } 353 354 355 /* 356 ** GETRGID -- get real group id (V7). 357 */ 358 359 getrgid() 360 { 361 if (OpMode == MD_DAEMON) 362 return (RealGid); 363 else 364 return (getgid()); 365 } 366 /* 367 ** USERNAME -- return the user id of the logged in user. 368 ** 369 ** Parameters: 370 ** none. 371 ** 372 ** Returns: 373 ** The login name of the logged in user. 374 ** 375 ** Side Effects: 376 ** none. 377 ** 378 ** Notes: 379 ** The return value is statically allocated. 380 */ 381 382 char * 383 username() 384 { 385 static char *myname = NULL; 386 extern char *getlogin(); 387 register struct passwd *pw; 388 389 /* cache the result */ 390 if (myname == NULL) 391 { 392 myname = getlogin(); 393 if (myname == NULL || myname[0] == '\0') 394 { 395 pw = getpwuid(getruid()); 396 if (pw != NULL) 397 myname = newstr(pw->pw_name); 398 } 399 else 400 { 401 uid_t uid = getuid(); 402 403 myname = newstr(myname); 404 if ((pw = getpwnam(myname)) == NULL || 405 (uid != 0 && uid != pw->pw_uid)) 406 { 407 pw = getpwuid(uid); 408 if (pw != NULL) 409 myname = newstr(pw->pw_name); 410 } 411 } 412 if (myname == NULL || myname[0] == '\0') 413 { 414 syserr("554 Who are you?"); 415 myname = "postmaster"; 416 } 417 } 418 419 return (myname); 420 } 421 /* 422 ** TTYPATH -- Get the path of the user's tty 423 ** 424 ** Returns the pathname of the user's tty. Returns NULL if 425 ** the user is not logged in or if s/he has write permission 426 ** denied. 427 ** 428 ** Parameters: 429 ** none 430 ** 431 ** Returns: 432 ** pathname of the user's tty. 433 ** NULL if not logged in or write permission denied. 434 ** 435 ** Side Effects: 436 ** none. 437 ** 438 ** WARNING: 439 ** Return value is in a local buffer. 440 ** 441 ** Called By: 442 ** savemail 443 */ 444 445 # include <sys/stat.h> 446 447 char * 448 ttypath() 449 { 450 struct stat stbuf; 451 register char *pathn; 452 extern char *ttyname(); 453 extern char *getlogin(); 454 455 /* compute the pathname of the controlling tty */ 456 if ((pathn = ttyname(2)) == NULL && (pathn = ttyname(1)) == NULL && 457 (pathn = ttyname(0)) == NULL) 458 { 459 errno = 0; 460 return (NULL); 461 } 462 463 /* see if we have write permission */ 464 if (stat(pathn, &stbuf) < 0 || !bitset(02, stbuf.st_mode)) 465 { 466 errno = 0; 467 return (NULL); 468 } 469 470 /* see if the user is logged in */ 471 if (getlogin() == NULL) 472 return (NULL); 473 474 /* looks good */ 475 return (pathn); 476 } 477 /* 478 ** CHECKCOMPAT -- check for From and To person compatible. 479 ** 480 ** This routine can be supplied on a per-installation basis 481 ** to determine whether a person is allowed to send a message. 482 ** This allows restriction of certain types of internet 483 ** forwarding or registration of users. 484 ** 485 ** If the hosts are found to be incompatible, an error 486 ** message should be given using "usrerr" and 0 should 487 ** be returned. 488 ** 489 ** 'NoReturn' can be set to suppress the return-to-sender 490 ** function; this should be done on huge messages. 491 ** 492 ** Parameters: 493 ** to -- the person being sent to. 494 ** 495 ** Returns: 496 ** an exit status 497 ** 498 ** Side Effects: 499 ** none (unless you include the usrerr stuff) 500 */ 501 502 checkcompat(to, e) 503 register ADDRESS *to; 504 register ENVELOPE *e; 505 { 506 # ifdef lint 507 if (to == NULL) 508 to++; 509 # endif lint 510 # ifdef EXAMPLE_CODE 511 /* this code is intended as an example only */ 512 register STAB *s; 513 514 s = stab("arpa", ST_MAILER, ST_FIND); 515 if (s != NULL && e->e_from.q_mailer != LocalMailer && 516 to->q_mailer == s->s_mailer) 517 { 518 usrerr("553 No ARPA mail through this machine: see your system administration"); 519 /* NoReturn = TRUE; to supress return copy */ 520 return (EX_UNAVAILABLE); 521 } 522 # endif /* EXAMPLE_CODE */ 523 return (EX_OK); 524 } 525 /* 526 ** HOLDSIGS -- arrange to hold all signals 527 ** 528 ** Parameters: 529 ** none. 530 ** 531 ** Returns: 532 ** none. 533 ** 534 ** Side Effects: 535 ** Arranges that signals are held. 536 */ 537 538 holdsigs() 539 { 540 } 541 /* 542 ** RLSESIGS -- arrange to release all signals 543 ** 544 ** This undoes the effect of holdsigs. 545 ** 546 ** Parameters: 547 ** none. 548 ** 549 ** Returns: 550 ** none. 551 ** 552 ** Side Effects: 553 ** Arranges that signals are released. 554 */ 555 556 rlsesigs() 557 { 558 } 559 /* 560 ** GETLA -- get the current load average 561 ** 562 ** This code stolen from la.c. 563 ** 564 ** Parameters: 565 ** none. 566 ** 567 ** Returns: 568 ** The current load average as an integer. 569 ** 570 ** Side Effects: 571 ** none. 572 */ 573 574 /* try to guess what style of load average we have */ 575 #define LA_ZERO 1 /* always return load average as zero */ 576 #define LA_INT 2 /* read kmem for avenrun; interpret as int */ 577 #define LA_FLOAT 3 /* read kmem for avenrun; interpret as float */ 578 #define LA_SUBR 4 /* call getloadavg */ 579 580 #ifndef LA_TYPE 581 # if defined(sun) 582 # define LA_TYPE LA_INT 583 # endif 584 # if defined(mips) || defined(__alpha) 585 /* Ultrix or OSF/1 or RISC/os */ 586 # define LA_TYPE LA_INT 587 # define LA_AVENRUN "avenrun" 588 # endif 589 # if defined(hpux) 590 # define LA_TYPE LA_FLOAT 591 # endif 592 593 # ifndef LA_TYPE 594 # if defined(SYSTEM5) 595 # define LA_TYPE LA_INT 596 # define LA_AVENRUN "avenrun" 597 # else 598 # if defined(BSD) 599 # define LA_TYPE LA_SUBR 600 # else 601 # define LA_TYPE LA_ZERO 602 # endif 603 # endif 604 # endif 605 #endif 606 607 #if (LA_TYPE == LA_INT) || (LA_TYPE == LA_FLOAT) 608 609 #include <nlist.h> 610 611 #ifndef LA_AVENRUN 612 #define LA_AVENRUN "_avenrun" 613 #endif 614 615 /* _PATH_UNIX should be defined in <paths.h> */ 616 #ifndef _PATH_UNIX 617 # if defined(hpux) 618 # define _PATH_UNIX "/hp-ux" 619 # endif 620 # if defined(mips) && !defined(ultrix) 621 /* powerful RISC/os */ 622 # define _PATH_UNIX "/unix" 623 # endif 624 # if defined(SYSTEM5) 625 # ifndef _PATH_UNIX 626 # define _PATH_UNIX "/unix" 627 # endif 628 # endif 629 # ifndef _PATH_UNIX 630 # define _PATH_UNIX "/vmunix" 631 # endif 632 #endif 633 634 struct nlist Nl[] = 635 { 636 { LA_AVENRUN }, 637 #define X_AVENRUN 0 638 { 0 }, 639 }; 640 641 #if defined(unixpc) 642 # define FSHIFT 5 643 #endif 644 645 #if defined(__alpha) 646 # define FSHIFT 10 647 #endif 648 649 #if (LA_TYPE == LA_INT) && !defined(FSHIFT) 650 # define FSHIFT 8 651 #endif 652 #if (LA_TYPE == LA_INT) && !defined(FSCALE) 653 # define FSCALE (1 << FSHIFT) 654 #endif 655 656 getla() 657 { 658 static int kmem = -1; 659 #if LA_TYPE == LA_INT 660 long avenrun[3]; 661 #else 662 double avenrun[3]; 663 #endif 664 extern off_t lseek(); 665 extern char *errstring(); 666 extern int errno; 667 668 if (kmem < 0) 669 { 670 kmem = open("/dev/kmem", 0, 0); 671 if (kmem < 0) 672 { 673 if (tTd(3, 1)) 674 printf("getla: open(/dev/kmem): %s\n", 675 errstring(errno)); 676 return (-1); 677 } 678 (void) fcntl(kmem, F_SETFD, 1); 679 if (nlist(_PATH_UNIX, Nl) < 0) 680 { 681 if (tTd(3, 1)) 682 printf("getla: nlist(%s): %s\n", _PATH_UNIX, 683 errstring(errno)); 684 return (-1); 685 } 686 } 687 if (tTd(3, 20)) 688 printf("getla: symbol address = %#x\n", Nl[X_AVENRUN].n_value); 689 if (lseek(kmem, (off_t) Nl[X_AVENRUN].n_value, 0) == -1 || 690 read(kmem, (char *) avenrun, sizeof(avenrun)) < sizeof(avenrun)) 691 { 692 /* thank you Ian */ 693 if (tTd(3, 1)) 694 printf("getla: lseek or read: %s\n", errstring(errno)); 695 return (-1); 696 } 697 #if LA_TYPE == LA_INT 698 if (tTd(3, 5)) 699 { 700 printf("getla: avenrun = %d", avenrun[0]); 701 if (tTd(3, 15)) 702 printf(", %d, %d", avenrun[1], avenrun[2]); 703 printf("\n"); 704 } 705 if (tTd(3, 1)) 706 printf("getla: %d\n", (int) (avenrun[0] + FSCALE/2) >> FSHIFT); 707 return ((int) (avenrun[0] + FSCALE/2) >> FSHIFT); 708 #else 709 if (tTd(3, 5)) 710 { 711 printf("getla: avenrun = %g", avenrun[0]); 712 if (tTd(3, 15)) 713 printf(", %g, %g", avenrun[1], avenrun[2]); 714 printf("\n"); 715 } 716 if (tTd(3, 1)) 717 printf("getla: %d\n", (int) (avenrun[0] +0.5)); 718 return ((int) (avenrun[0] + 0.5)); 719 #endif 720 } 721 722 #else 723 #if LA_TYPE == LA_SUBR 724 725 getla() 726 { 727 double avenrun[3]; 728 729 if (getloadavg(avenrun, sizeof(avenrun) / sizeof(avenrun[0])) < 0) 730 { 731 if (tTd(3, 1)) 732 perror("getla: getloadavg failed:"); 733 return (-1); 734 } 735 if (tTd(3, 1)) 736 printf("getla: %d\n", (int) (avenrun[0] +0.5)); 737 return ((int) (avenrun[0] + 0.5)); 738 } 739 740 #else 741 742 getla() 743 { 744 if (tTd(3, 1)) 745 printf("getla: ZERO\n"); 746 return (0); 747 } 748 749 #endif 750 #endif 751 /* 752 ** SHOULDQUEUE -- should this message be queued or sent? 753 ** 754 ** Compares the message cost to the load average to decide. 755 ** 756 ** Parameters: 757 ** pri -- the priority of the message in question. 758 ** ctime -- the message creation time. 759 ** 760 ** Returns: 761 ** TRUE -- if this message should be queued up for the 762 ** time being. 763 ** FALSE -- if the load is low enough to send this message. 764 ** 765 ** Side Effects: 766 ** none. 767 */ 768 769 bool 770 shouldqueue(pri, ctime) 771 long pri; 772 time_t ctime; 773 { 774 if (CurrentLA < QueueLA) 775 return (FALSE); 776 if (CurrentLA >= RefuseLA) 777 return (TRUE); 778 return (pri > (QueueFactor / (CurrentLA - QueueLA + 1))); 779 } 780 /* 781 ** REFUSECONNECTIONS -- decide if connections should be refused 782 ** 783 ** Parameters: 784 ** none. 785 ** 786 ** Returns: 787 ** TRUE if incoming SMTP connections should be refused 788 ** (for now). 789 ** FALSE if we should accept new work. 790 ** 791 ** Side Effects: 792 ** none. 793 */ 794 795 bool 796 refuseconnections() 797 { 798 /* this is probably too simplistic */ 799 return (CurrentLA >= RefuseLA); 800 } 801 /* 802 ** SETPROCTITLE -- set process title for ps 803 ** 804 ** Parameters: 805 ** fmt -- a printf style format string. 806 ** a, b, c -- possible parameters to fmt. 807 ** 808 ** Returns: 809 ** none. 810 ** 811 ** Side Effects: 812 ** Clobbers argv of our main procedure so ps(1) will 813 ** display the title. 814 */ 815 816 #ifdef SETPROCTITLE 817 # ifdef __hpux 818 # include <sys/pstat.h> 819 # endif 820 #endif 821 822 /*VARARGS1*/ 823 #ifdef __STDC__ 824 setproctitle(char *fmt, ...) 825 #else 826 setproctitle(fmt, va_alist) 827 char *fmt; 828 va_dcl 829 #endif 830 { 831 # ifdef SETPROCTITLE 832 register char *p; 833 register int i; 834 char buf[MAXLINE]; 835 VA_LOCAL_DECL 836 # ifdef __hpux 837 union pstun pst; 838 # endif 839 extern char **Argv; 840 extern char *LastArgv; 841 842 p = buf; 843 844 /* print sendmail: heading for grep */ 845 (void) strcpy(p, "sendmail: "); 846 p += strlen(p); 847 848 /* print the argument string */ 849 VA_START(fmt); 850 (void) vsprintf(p, fmt, ap); 851 VA_END; 852 853 i = strlen(buf); 854 855 # ifdef __hpux 856 pst.pst_command = buf; 857 pstat(PSTAT_SETCMD, pst, i, 0, 0); 858 # else 859 860 if (i > LastArgv - Argv[0] - 2) 861 { 862 i = LastArgv - Argv[0] - 2; 863 buf[i] = '\0'; 864 } 865 (void) strcpy(Argv[0], buf); 866 p = &Argv[0][i]; 867 while (p < LastArgv) 868 *p++ = ' '; 869 # endif 870 # endif /* SETPROCTITLE */ 871 } 872 /* 873 ** REAPCHILD -- pick up the body of my child, lest it become a zombie 874 ** 875 ** Parameters: 876 ** none. 877 ** 878 ** Returns: 879 ** none. 880 ** 881 ** Side Effects: 882 ** Picks up extant zombies. 883 */ 884 885 # include <sys/wait.h> 886 887 void 888 reapchild() 889 { 890 # ifdef WNOHANG 891 union wait status; 892 893 while (wait3((int *)&status, WNOHANG, (struct rusage *) NULL) > 0) 894 continue; 895 # else /* WNOHANG */ 896 auto int status; 897 898 while (wait((int *)&status) > 0) 899 continue; 900 # endif /* WNOHANG */ 901 # ifdef SYSTEM5 902 (void) signal(SIGCHLD, reapchild); 903 # endif 904 } 905 /* 906 ** UNSETENV -- remove a variable from the environment 907 ** 908 ** Not needed on newer systems. 909 ** 910 ** Parameters: 911 ** name -- the string name of the environment variable to be 912 ** deleted from the current environment. 913 ** 914 ** Returns: 915 ** none. 916 ** 917 ** Globals: 918 ** environ -- a pointer to the current environment. 919 ** 920 ** Side Effects: 921 ** Modifies environ. 922 */ 923 924 #ifdef UNSETENV 925 926 void 927 unsetenv(name) 928 char *name; 929 { 930 extern char **environ; 931 register char **pp; 932 int len = strlen(name); 933 934 for (pp = environ; *pp != NULL; pp++) 935 { 936 if (strncmp(name, *pp, len) == 0 && 937 ((*pp)[len] == '=' || (*pp)[len] == '\0')) 938 break; 939 } 940 941 for (; *pp != NULL; pp++) 942 *pp = pp[1]; 943 } 944 945 #endif /* UNSETENV */ 946 /* 947 ** GETDTABLESIZE -- return number of file descriptors 948 ** 949 ** Only on non-BSD systems 950 ** 951 ** Parameters: 952 ** none 953 ** 954 ** Returns: 955 ** size of file descriptor table 956 ** 957 ** Side Effects: 958 ** none 959 */ 960 961 #ifdef SYSTEM5 962 963 int 964 getdtablesize() 965 { 966 # ifdef _SC_OPEN_MAX 967 return sysconf(_SC_OPEN_MAX); 968 # else 969 return NOFILE; 970 # endif 971 } 972 973 #endif 974 /* 975 ** UNAME -- get the UUCP name of this system. 976 */ 977 978 #ifndef HASUNAME 979 980 int 981 uname(name) 982 struct utsname *name; 983 { 984 FILE *file; 985 char *n; 986 987 name->nodename[0] = '\0'; 988 989 /* try /etc/whoami -- one line with the node name */ 990 if ((file = fopen("/etc/whoami", "r")) != NULL) 991 { 992 (void) fgets(name->nodename, NODE_LENGTH + 1, file); 993 (void) fclose(file); 994 n = strchr(name->nodename, '\n'); 995 if (n != NULL) 996 *n = '\0'; 997 if (name->nodename[0] != '\0') 998 return (0); 999 } 1000 1001 /* try /usr/include/whoami.h -- has a #define somewhere */ 1002 if ((file = fopen("/usr/include/whoami.h", "r")) != NULL) 1003 { 1004 char buf[MAXLINE]; 1005 1006 while (fgets(buf, MAXLINE, file) != NULL) 1007 if (sscanf(buf, "#define sysname \"%*[^\"]\"", 1008 NODE_LENGTH, name->nodename) > 0) 1009 break; 1010 (void) fclose(file); 1011 if (name->nodename[0] != '\0') 1012 return (0); 1013 } 1014 1015 #ifdef TRUST_POPEN 1016 /* 1017 ** Popen is known to have security holes. 1018 */ 1019 1020 /* try uuname -l to return local name */ 1021 if ((file = popen("uuname -l", "r")) != NULL) 1022 { 1023 (void) fgets(name, NODE_LENGTH + 1, file); 1024 (void) pclose(file); 1025 n = strchr(name, '\n'); 1026 if (n != NULL) 1027 *n = '\0'; 1028 if (name->nodename[0] != '\0') 1029 return (0); 1030 } 1031 #endif 1032 1033 return (-1); 1034 } 1035 #endif /* HASUNAME */ 1036 /* 1037 ** INITGROUPS -- initialize groups 1038 ** 1039 ** Stub implementation for System V style systems 1040 */ 1041 1042 #ifndef HASINITGROUPS 1043 # if !defined(SYSTEM5) || defined(hpux) 1044 # define HASINITGROUPS 1045 # endif 1046 #endif 1047 1048 #ifndef HASINITGROUPS 1049 1050 initgroups(name, basegid) 1051 char *name; 1052 int basegid; 1053 { 1054 return 0; 1055 } 1056 1057 #endif 1058 /* 1059 ** ENOUGHSPACE -- check to see if there is enough free space on the queue fs 1060 ** 1061 ** Only implemented if you have statfs. 1062 ** 1063 ** Parameters: 1064 ** msize -- the size to check against. If zero, we don't yet 1065 ** know how big the message will be, so just check for 1066 ** a "reasonable" amount. 1067 ** 1068 ** Returns: 1069 ** TRUE if there is enough space. 1070 ** FALSE otherwise. 1071 */ 1072 1073 #ifndef HASSTATFS 1074 # if defined(BSD4_4) || defined(__osf__) 1075 # define HASSTATFS 1076 # endif 1077 #endif 1078 1079 #ifdef HASSTATFS 1080 # undef HASUSTAT 1081 #endif 1082 1083 #if defined(HASUSTAT) 1084 # include <sys/stat.h> 1085 # include <ustat.h> 1086 #endif 1087 1088 #ifdef HASSTATFS 1089 # if defined(sgi) || defined(apollo) 1090 # include <sys/statfs.h> 1091 # else 1092 # if defined(sun) || defined(hpux) 1093 # include <sys/vfs.h> 1094 # else 1095 # include <sys/mount.h> 1096 # endif 1097 # endif 1098 #endif 1099 1100 bool 1101 enoughspace(msize) 1102 long msize; 1103 { 1104 #if defined(HASSTATFS) || defined(HASUSTAT) 1105 # if defined(HASUSTAT) 1106 struct ustat fs; 1107 struct stat statbuf; 1108 # define FSBLOCKSIZE DEV_BSIZE 1109 # define f_bavail f_tfree 1110 # else 1111 # if defined(ultrix) 1112 struct fs_data fs; 1113 # define f_bavail fd_bfreen 1114 # define FSBLOCKSIZE fs.fd_bsize 1115 # else 1116 struct statfs fs; 1117 # define FSBLOCKSIZE fs.f_bsize 1118 # endif 1119 # endif 1120 long blocksneeded; 1121 extern int errno; 1122 extern char *errstring(); 1123 1124 if (MinBlocksFree <= 0 && msize <= 0) 1125 { 1126 if (tTd(4, 80)) 1127 printf("enoughspace: no threshold\n"); 1128 return TRUE; 1129 } 1130 1131 # if defined(HASUSTAT) 1132 if (stat(QueueDir, &statbuf) == 0 && ustat(statbuf.st_dev, &fs) == 0) 1133 # else 1134 # if defined(sgi) || defined(apollo) 1135 if (statfs(QueueDir, &fs, sizeof fs, 0) == 0) 1136 # else 1137 # if defined(ultrix) 1138 if (statfs(QueueDir, &fs) > 0) 1139 # else 1140 if (statfs(QueueDir, &fs) == 0) 1141 # endif 1142 # endif 1143 # endif 1144 { 1145 if (tTd(4, 80)) 1146 printf("enoughspace: bavail=%ld, need=%ld\n", 1147 fs.f_bavail, msize); 1148 1149 /* convert msize to block count */ 1150 msize = msize / FSBLOCKSIZE + 1; 1151 if (MinBlocksFree >= 0) 1152 msize += MinBlocksFree; 1153 1154 if (fs.f_bavail < msize) 1155 { 1156 #ifdef LOG 1157 if (LogLevel > 0) 1158 syslog(LOG_ALERT, "%s: low on space (have %ld, need %ld)", 1159 QueueDir, fs.f_bavail, msize); 1160 #endif 1161 return FALSE; 1162 } 1163 } 1164 else if (tTd(4, 80)) 1165 printf("enoughspace failure: min=%ld, need=%ld: %s\n", 1166 MinBlocksFree, msize, errstring(errno)); 1167 #endif 1168 return TRUE; 1169 } 1170 /* 1171 ** TRANSIENTERROR -- tell if an error code indicates a transient failure 1172 ** 1173 ** This looks at an errno value and tells if this is likely to 1174 ** go away if retried later. 1175 ** 1176 ** Parameters: 1177 ** err -- the errno code to classify. 1178 ** 1179 ** Returns: 1180 ** TRUE if this is probably transient. 1181 ** FALSE otherwise. 1182 */ 1183 1184 bool 1185 transienterror(err) 1186 int err; 1187 { 1188 switch (err) 1189 { 1190 case EIO: /* I/O error */ 1191 case ENXIO: /* Device not configured */ 1192 case EAGAIN: /* Resource temporarily unavailable */ 1193 case ENOMEM: /* Cannot allocate memory */ 1194 case ENODEV: /* Operation not supported by device */ 1195 case ENFILE: /* Too many open files in system */ 1196 case EMFILE: /* Too many open files */ 1197 case ENOSPC: /* No space left on device */ 1198 #ifdef ETIMEDOUT 1199 case ETIMEDOUT: /* Connection timed out */ 1200 #endif 1201 #ifdef ESTALE 1202 case ESTALE: /* Stale NFS file handle */ 1203 #endif 1204 #ifdef ENETDOWN 1205 case ENETDOWN: /* Network is down */ 1206 #endif 1207 #ifdef ENETUNREACH 1208 case ENETUNREACH: /* Network is unreachable */ 1209 #endif 1210 #ifdef ENETRESET 1211 case ENETRESET: /* Network dropped connection on reset */ 1212 #endif 1213 #ifdef ECONNABORTED 1214 case ECONNABORTED: /* Software caused connection abort */ 1215 #endif 1216 #ifdef ECONNRESET 1217 case ECONNRESET: /* Connection reset by peer */ 1218 #endif 1219 #ifdef ENOBUFS 1220 case ENOBUFS: /* No buffer space available */ 1221 #endif 1222 #ifdef ESHUTDOWN 1223 case ESHUTDOWN: /* Can't send after socket shutdown */ 1224 #endif 1225 #ifdef ECONNREFUSED 1226 case ECONNREFUSED: /* Connection refused */ 1227 #endif 1228 #ifdef EHOSTDOWN 1229 case EHOSTDOWN: /* Host is down */ 1230 #endif 1231 #ifdef EHOSTUNREACH 1232 case EHOSTUNREACH: /* No route to host */ 1233 #endif 1234 #ifdef EDQUOT 1235 case EDQUOT: /* Disc quota exceeded */ 1236 #endif 1237 #ifdef EPROCLIM 1238 case EPROCLIM: /* Too many processes */ 1239 #endif 1240 #ifdef EUSERS 1241 case EUSERS: /* Too many users */ 1242 #endif 1243 #ifdef EDEADLK 1244 case EDEADLK: /* Resource deadlock avoided */ 1245 #endif 1246 #ifdef EISCONN 1247 case EISCONN: /* Socket already connected */ 1248 #endif 1249 #ifdef EINPROGRESS 1250 case EINPROGRESS: /* Operation now in progress */ 1251 #endif 1252 #ifdef EALREADY 1253 case EALREADY: /* Operation already in progress */ 1254 #endif 1255 #ifdef EADDRINUSE 1256 case EADDRINUSE: /* Address already in use */ 1257 #endif 1258 #ifdef EADDRNOTAVAIL 1259 case EADDRNOTAVAIL: /* Can't assign requested address */ 1260 #endif 1261 #ifdef ENOSR 1262 case ENOSR: /* Out of streams resources */ 1263 #endif 1264 return TRUE; 1265 } 1266 1267 /* nope, must be permanent */ 1268 return FALSE; 1269 } 1270 /* 1271 ** LOCKFILE -- lock a file using flock or (shudder) lockf 1272 ** 1273 ** Parameters: 1274 ** fd -- the file descriptor of the file. 1275 ** filename -- the file name (for error messages). 1276 ** type -- type of the lock. Bits can be: 1277 ** LOCK_EX -- exclusive lock. 1278 ** LOCK_NB -- non-blocking. 1279 ** 1280 ** Returns: 1281 ** TRUE if the lock was acquired. 1282 ** FALSE otherwise. 1283 */ 1284 1285 bool 1286 lockfile(fd, filename, type) 1287 int fd; 1288 char *filename; 1289 int type; 1290 { 1291 # ifdef LOCKF 1292 int action; 1293 struct flock lfd; 1294 1295 if (bitset(LOCK_EX, type)) 1296 lfd.l_type = F_WRLCK; 1297 else 1298 lfd.l_type = F_RDLCK; 1299 1300 if (bitset(LOCK_NB, type)) 1301 action = F_SETLK; 1302 else 1303 action = F_SETLKW; 1304 1305 lfd.l_whence = lfd.l_start = lfd.l_len = 0; 1306 1307 if (fcntl(fd, action, &lfd) >= 0) 1308 return TRUE; 1309 1310 if (!bitset(LOCK_NB, type) || (errno != EACCES && errno != EAGAIN)) 1311 syserr("cannot lockf(%s)", filename); 1312 # else 1313 if (flock(fd, type) >= 0) 1314 return TRUE; 1315 1316 if (!bitset(LOCK_NB, type) || errno != EWOULDBLOCK) 1317 syserr("cannot flock(%s)", filename); 1318 # endif 1319 return FALSE; 1320 } 1321