mirror of
https://github.com/sudo-project/sudo.git
synced 2025-08-29 05:17:54 +00:00
only block the signal it may be delivered later when we unblock. Also, there is no need to block SIGCHLD since we no longer do the double fork. The normal SIGCHLD handler is sufficient.
717 lines
17 KiB
C
717 lines
17 KiB
C
/*
|
|
* Copyright (c) 1994-1996,1998-2007 Todd C. Miller <Todd.Miller@courtesan.com>
|
|
*
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
* copyright notice and this permission notice appear in all copies.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
*
|
|
* Sponsored in part by the Defense Advanced Research Projects
|
|
* Agency (DARPA) and Air Force Research Laboratory, Air Force
|
|
* Materiel Command, USAF, under agreement number F39502-99-1-0512.
|
|
*/
|
|
|
|
#ifdef __TANDEM
|
|
# include <floss.h>
|
|
#endif
|
|
|
|
#include <config.h>
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/param.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/wait.h>
|
|
#include <stdio.h>
|
|
#ifdef STDC_HEADERS
|
|
# include <stdlib.h>
|
|
# include <stddef.h>
|
|
#else
|
|
# ifdef HAVE_STDLIB_H
|
|
# include <stdlib.h>
|
|
# endif
|
|
#endif /* STDC_HEADERS */
|
|
#ifdef HAVE_STRING_H
|
|
# include <string.h>
|
|
#else
|
|
# ifdef HAVE_STRINGS_H
|
|
# include <strings.h>
|
|
# endif
|
|
#endif /* HAVE_STRING_H */
|
|
#ifdef HAVE_UNISTD_H
|
|
# include <unistd.h>
|
|
#endif /* HAVE_UNISTD_H */
|
|
#include <pwd.h>
|
|
#include <grp.h>
|
|
#include <signal.h>
|
|
#include <time.h>
|
|
#include <errno.h>
|
|
|
|
#include "sudo.h"
|
|
|
|
#ifndef lint
|
|
__unused static const char rcsid[] = "$Sudo$";
|
|
#endif /* lint */
|
|
|
|
static void do_syslog __P((int, char *));
|
|
static void do_logfile __P((char *));
|
|
static void send_mail __P((char *));
|
|
static int should_mail __P((int));
|
|
static char *get_timestr __P((void));
|
|
static void mysyslog __P((int, const char *, ...));
|
|
static char *new_logline __P((const char *, int));
|
|
|
|
#define MAXSYSLOGTRIES 16 /* num of retries for broken syslogs */
|
|
|
|
/*
|
|
* We do an openlog(3)/closelog(3) for each message because some
|
|
* authentication methods (notably PAM) use syslog(3) for their
|
|
* own nefarious purposes and may call openlog(3) and closelog(3).
|
|
* Note that because we don't want to assume that all systems have
|
|
* vsyslog(3) (HP-UX doesn't) "%m" will not be expanded.
|
|
* Sadly this is a maze of #ifdefs.
|
|
*/
|
|
static void
|
|
#ifdef __STDC__
|
|
mysyslog(int pri, const char *fmt, ...)
|
|
#else
|
|
mysyslog(pri, fmt, va_alist)
|
|
int pri;
|
|
const char *fmt;
|
|
va_dcl
|
|
#endif
|
|
{
|
|
#ifdef BROKEN_SYSLOG
|
|
int i;
|
|
#endif
|
|
char buf[MAXSYSLOGLEN+1];
|
|
va_list ap;
|
|
|
|
#ifdef __STDC__
|
|
va_start(ap, fmt);
|
|
#else
|
|
va_start(ap);
|
|
#endif
|
|
#ifdef LOG_NFACILITIES
|
|
openlog("sudo", 0, def_syslog);
|
|
#else
|
|
openlog("sudo", 0);
|
|
#endif
|
|
vsnprintf(buf, sizeof(buf), fmt, ap);
|
|
#ifdef BROKEN_SYSLOG
|
|
/*
|
|
* Some versions of syslog(3) don't guarantee success and return
|
|
* an int (notably HP-UX < 10.0). So, if at first we don't succeed,
|
|
* try, try again...
|
|
*/
|
|
for (i = 0; i < MAXSYSLOGTRIES; i++)
|
|
if (syslog(pri, "%s", buf) == 0)
|
|
break;
|
|
#else
|
|
syslog(pri, "%s", buf);
|
|
#endif /* BROKEN_SYSLOG */
|
|
va_end(ap);
|
|
closelog();
|
|
}
|
|
|
|
/*
|
|
* Log a message to syslog, pre-pending the username and splitting the
|
|
* message into parts if it is longer than MAXSYSLOGLEN.
|
|
*/
|
|
static void
|
|
do_syslog(pri, msg)
|
|
int pri;
|
|
char *msg;
|
|
{
|
|
size_t len, maxlen;
|
|
char *p, *tmp, save;
|
|
const char *fmt;
|
|
const char *fmt_first = "%8s : %s";
|
|
const char *fmt_contd = "%8s : (command continued) %s";
|
|
|
|
/*
|
|
* Log the full line, breaking into multiple syslog(3) calls if necessary
|
|
*/
|
|
fmt = fmt_first;
|
|
maxlen = MAXSYSLOGLEN - (sizeof(fmt_first) - 6 + strlen(user_name));
|
|
for (p = msg; *p != '\0'; ) {
|
|
len = strlen(p);
|
|
if (len > maxlen) {
|
|
/*
|
|
* Break up the line into what will fit on one syslog(3) line
|
|
* Try to avoid breaking words into several lines if possible.
|
|
*/
|
|
tmp = memrchr(p, ' ', maxlen);
|
|
if (tmp == NULL)
|
|
tmp = p + maxlen;
|
|
|
|
/* NULL terminate line, but save the char to restore later */
|
|
save = *tmp;
|
|
*tmp = '\0';
|
|
|
|
mysyslog(pri, fmt, user_name, p);
|
|
|
|
*tmp = save; /* restore saved character */
|
|
|
|
/* Advance p and eliminate leading whitespace */
|
|
for (p = tmp; *p == ' '; p++)
|
|
;
|
|
} else {
|
|
mysyslog(pri, fmt, user_name, p);
|
|
p += len;
|
|
}
|
|
fmt = fmt_contd;
|
|
maxlen = MAXSYSLOGLEN - (sizeof(fmt_contd) - 6 + strlen(user_name));
|
|
}
|
|
}
|
|
|
|
static void
|
|
do_logfile(msg)
|
|
char *msg;
|
|
{
|
|
char *full_line;
|
|
char *beg, *oldend, *end;
|
|
FILE *fp;
|
|
mode_t oldmask;
|
|
size_t maxlen;
|
|
|
|
oldmask = umask(077);
|
|
maxlen = def_loglinelen > 0 ? def_loglinelen : 0;
|
|
fp = fopen(def_logfile, "a");
|
|
(void) umask(oldmask);
|
|
if (fp == NULL) {
|
|
easprintf(&full_line, "Can't open log file: %s: %s",
|
|
def_logfile, strerror(errno));
|
|
send_mail(full_line);
|
|
efree(full_line);
|
|
} else if (!lock_file(fileno(fp), SUDO_LOCK)) {
|
|
easprintf(&full_line, "Can't lock log file: %s: %s",
|
|
def_logfile, strerror(errno));
|
|
send_mail(full_line);
|
|
efree(full_line);
|
|
} else {
|
|
if (def_loglinelen == 0) {
|
|
/* Don't pretty-print long log file lines (hard to grep) */
|
|
if (def_log_host)
|
|
(void) fprintf(fp, "%s : %s : HOST=%s : %s\n", get_timestr(),
|
|
user_name, user_shost, msg);
|
|
else
|
|
(void) fprintf(fp, "%s : %s : %s\n", get_timestr(),
|
|
user_name, msg);
|
|
} else {
|
|
if (def_log_host)
|
|
easprintf(&full_line, "%s : %s : HOST=%s : %s", get_timestr(),
|
|
user_name, user_shost, msg);
|
|
else
|
|
easprintf(&full_line, "%s : %s : %s", get_timestr(),
|
|
user_name, msg);
|
|
|
|
/*
|
|
* Print out full_line with word wrap
|
|
*/
|
|
beg = end = full_line;
|
|
while (beg) {
|
|
oldend = end;
|
|
end = strchr(oldend, ' ');
|
|
|
|
if (maxlen > 0 && end) {
|
|
*end = '\0';
|
|
if (strlen(beg) > maxlen) {
|
|
/* too far, need to back up & print the line */
|
|
|
|
if (beg == (char *)full_line)
|
|
maxlen -= 4; /* don't indent first line */
|
|
|
|
*end = ' ';
|
|
if (oldend != beg) {
|
|
/* rewind & print */
|
|
end = oldend-1;
|
|
while (*end == ' ')
|
|
--end;
|
|
*(++end) = '\0';
|
|
(void) fprintf(fp, "%s\n ", beg);
|
|
*end = ' ';
|
|
} else {
|
|
(void) fprintf(fp, "%s\n ", beg);
|
|
}
|
|
|
|
/* reset beg to point to the start of the new substr */
|
|
beg = end;
|
|
while (*beg == ' ')
|
|
++beg;
|
|
} else {
|
|
/* we still have room */
|
|
*end = ' ';
|
|
}
|
|
|
|
/* remove leading whitespace */
|
|
while (*end == ' ')
|
|
++end;
|
|
} else {
|
|
/* final line */
|
|
(void) fprintf(fp, "%s\n", beg);
|
|
beg = NULL; /* exit condition */
|
|
}
|
|
}
|
|
efree(full_line);
|
|
}
|
|
(void) fflush(fp);
|
|
(void) lock_file(fileno(fp), SUDO_UNLOCK);
|
|
(void) fclose(fp);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Log and mail the denial message, optionally informing the user.
|
|
*/
|
|
void
|
|
log_denial(status, inform_user)
|
|
int status;
|
|
int inform_user;
|
|
{
|
|
char *message;
|
|
char *logline;
|
|
|
|
/* Set error message. */
|
|
if (ISSET(status, FLAG_NO_USER))
|
|
message = "user NOT in sudoers";
|
|
else if (ISSET(status, FLAG_NO_HOST))
|
|
message = "user NOT authorized on host";
|
|
else
|
|
message = "command not allowed";
|
|
|
|
logline = new_logline(message, 0);
|
|
|
|
if (should_mail(status))
|
|
send_mail(logline); /* send mail based on status */
|
|
|
|
/* Inform the user if they failed to authenticate. */
|
|
if (inform_user) {
|
|
if (ISSET(status, FLAG_NO_USER))
|
|
(void) fprintf(stderr, "%s is not in the sudoers file. %s",
|
|
user_name, "This incident will be reported.\n");
|
|
else if (ISSET(status, FLAG_NO_HOST))
|
|
(void) fprintf(stderr, "%s is not allowed to run sudo on %s. %s",
|
|
user_name, user_shost, "This incident will be reported.\n");
|
|
else if (ISSET(status, FLAG_NO_CHECK))
|
|
(void) fprintf(stderr, "Sorry, user %s may not run sudo on %s.\n",
|
|
user_name, user_shost);
|
|
else
|
|
(void) fprintf(stderr,
|
|
"Sorry, user %s is not allowed to execute '%s%s%s' as %s%s%s on %s.\n",
|
|
user_name, user_cmnd, user_args ? " " : "",
|
|
user_args ? user_args : "",
|
|
list_pw ? list_pw->pw_name : runas_pw ?
|
|
runas_pw->pw_name : user_name, runas_gr ? ":" : "",
|
|
runas_gr ? runas_gr->gr_name : "", user_host);
|
|
}
|
|
|
|
/*
|
|
* Log via syslog and/or a file.
|
|
*/
|
|
if (def_syslog)
|
|
do_syslog(def_syslog_badpri, logline);
|
|
if (def_logfile)
|
|
do_logfile(logline);
|
|
|
|
efree(logline);
|
|
}
|
|
|
|
/*
|
|
* Log and potentially mail the allowed command.
|
|
*/
|
|
void
|
|
log_allowed(status)
|
|
int status;
|
|
{
|
|
char *logline;
|
|
|
|
logline = new_logline(NULL, 0);
|
|
|
|
if (should_mail(status))
|
|
send_mail(logline); /* send mail based on status */
|
|
|
|
/*
|
|
* Log via syslog and/or a file.
|
|
*/
|
|
if (def_syslog)
|
|
do_syslog(def_syslog_goodpri, logline);
|
|
if (def_logfile)
|
|
do_logfile(logline);
|
|
|
|
efree(logline);
|
|
}
|
|
|
|
void
|
|
#ifdef __STDC__
|
|
log_error(int flags, const char *fmt, ...)
|
|
#else
|
|
log_error(flags, fmt, va_alist)
|
|
int flags;
|
|
const char *fmt;
|
|
va_dcl
|
|
#endif
|
|
{
|
|
int serrno = errno;
|
|
char *message;
|
|
char *logline;
|
|
va_list ap;
|
|
#ifdef __STDC__
|
|
va_start(ap, fmt);
|
|
#else
|
|
va_start(ap);
|
|
#endif
|
|
|
|
/* Become root if we are not already to avoid user interference */
|
|
set_perms(PERM_ROOT);
|
|
|
|
/* Expand printf-style format + args. */
|
|
evasprintf(&message, fmt, ap);
|
|
va_end(ap);
|
|
|
|
if (ISSET(flags, MSG_ONLY))
|
|
logline = message;
|
|
else
|
|
logline = new_logline(message, ISSET(flags, USE_ERRNO) ? serrno : 0);
|
|
|
|
/*
|
|
* Tell the user.
|
|
*/
|
|
if (!ISSET(flags, NO_STDERR)) {
|
|
if (ISSET(flags, USE_ERRNO))
|
|
warning("%s", message);
|
|
else
|
|
warningx("%s", message);
|
|
}
|
|
efree(message);
|
|
|
|
/*
|
|
* Send a copy of the error via mail.
|
|
*/
|
|
if (!ISSET(flags, NO_MAIL))
|
|
send_mail(logline);
|
|
|
|
/*
|
|
* Log to syslog and/or a file.
|
|
*/
|
|
if (def_syslog)
|
|
do_syslog(def_syslog_badpri, logline);
|
|
if (def_logfile)
|
|
do_logfile(logline);
|
|
|
|
if (logline != message)
|
|
efree(logline);
|
|
|
|
if (!ISSET(flags, NO_EXIT)) {
|
|
cleanup(0);
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
#define MAX_MAILFLAGS 63
|
|
|
|
/*
|
|
* Send a message to MAILTO user
|
|
*/
|
|
static void
|
|
send_mail(line)
|
|
char *line;
|
|
{
|
|
FILE *mail;
|
|
char *p;
|
|
int pfd[2];
|
|
pid_t pid;
|
|
sigaction_t sa, saved_sa_pipe;
|
|
#ifndef NO_ROOT_MAILER
|
|
static char *root_envp[] = {
|
|
"HOME=/",
|
|
"PATH=/usr/bin:/bin",
|
|
"LOGNAME=root",
|
|
"USERNAME=root",
|
|
"USER=root",
|
|
NULL
|
|
};
|
|
#endif
|
|
|
|
/* Just return if mailer is disabled. */
|
|
if (!def_mailerpath || !def_mailto)
|
|
return;
|
|
|
|
/* Ignore SIGPIPE in case mailer exits prematurely (or is missing). */
|
|
sigemptyset(&sa.sa_mask);
|
|
sa.sa_flags = 0;
|
|
sa.sa_handler = SIG_IGN;
|
|
(void) sigaction(SIGPIPE, &sa, &saved_sa_pipe);
|
|
|
|
if (pipe(pfd) == -1)
|
|
error(1, "cannot open pipe");
|
|
|
|
switch (pid = fork()) {
|
|
case -1:
|
|
/* Error. */
|
|
error(1, "cannot fork");
|
|
break;
|
|
case 0:
|
|
{
|
|
char *argv[MAX_MAILFLAGS + 1];
|
|
char *mpath, *mflags;
|
|
int i;
|
|
|
|
/* Child, set stdin to output side of the pipe */
|
|
if (pfd[0] != STDIN_FILENO) {
|
|
(void) dup2(pfd[0], STDIN_FILENO);
|
|
(void) close(pfd[0]);
|
|
}
|
|
(void) close(pfd[1]);
|
|
|
|
/* Build up an argv based the mailer path and flags */
|
|
mflags = estrdup(def_mailerflags);
|
|
mpath = estrdup(def_mailerpath);
|
|
if ((argv[0] = strrchr(mpath, ' ')))
|
|
argv[0]++;
|
|
else
|
|
argv[0] = mpath;
|
|
|
|
i = 1;
|
|
if ((p = strtok(mflags, " \t"))) {
|
|
do {
|
|
argv[i] = p;
|
|
} while (++i < MAX_MAILFLAGS && (p = strtok(NULL, " \t")));
|
|
}
|
|
argv[i] = NULL;
|
|
|
|
/* Close password, group and other fds so we don't leak. */
|
|
sudo_endpwent();
|
|
sudo_endgrent();
|
|
closefrom(STDERR_FILENO + 1);
|
|
|
|
/*
|
|
* Depending on the config, either run the mailer as root
|
|
* (so user cannot kill it) or as the user (for the paranoid).
|
|
*/
|
|
#ifndef NO_ROOT_MAILER
|
|
set_perms(PERM_ROOT);
|
|
execve(mpath, argv, root_envp);
|
|
#else
|
|
set_perms(PERM_FULL_USER);
|
|
execv(mpath, argv);
|
|
#endif /* NO_ROOT_MAILER */
|
|
_exit(127);
|
|
}
|
|
break;
|
|
}
|
|
|
|
(void) close(pfd[0]);
|
|
mail = fdopen(pfd[1], "w");
|
|
|
|
/* Pipes are all setup, send message. */
|
|
(void) fprintf(mail, "To: %s\nFrom: %s\nAuto-Submitted: %s\nSubject: ",
|
|
def_mailto, def_mailfrom ? def_mailfrom : user_name, "auto-generated");
|
|
for (p = def_mailsub; *p; p++) {
|
|
/* Expand escapes in the subject */
|
|
if (*p == '%' && *(p+1) != '%') {
|
|
switch (*(++p)) {
|
|
case 'h':
|
|
(void) fputs(user_host, mail);
|
|
break;
|
|
case 'u':
|
|
(void) fputs(user_name, mail);
|
|
break;
|
|
default:
|
|
p--;
|
|
break;
|
|
}
|
|
} else
|
|
(void) fputc(*p, mail);
|
|
}
|
|
(void) fprintf(mail, "\n\n%s : %s : %s : %s\n\n", user_host,
|
|
get_timestr(), user_name, line);
|
|
fclose(mail);
|
|
|
|
(void) sigaction(SIGPIPE, &saved_sa_pipe, NULL);
|
|
}
|
|
|
|
/*
|
|
* Determine whether we should send mail based on "status" and defaults options.
|
|
*/
|
|
static int
|
|
should_mail(status)
|
|
int status;
|
|
{
|
|
|
|
return(def_mail_always || ISSET(status, VALIDATE_ERROR) ||
|
|
(def_mail_no_user && ISSET(status, FLAG_NO_USER)) ||
|
|
(def_mail_no_host && ISSET(status, FLAG_NO_HOST)) ||
|
|
(def_mail_no_perms && !ISSET(status, VALIDATE_OK)));
|
|
}
|
|
|
|
/*
|
|
* SIGCHLD sig handler--wait for children as they die.
|
|
*/
|
|
RETSIGTYPE
|
|
reapchild(sig)
|
|
int sig;
|
|
{
|
|
int status, serrno = errno;
|
|
#ifdef sudo_waitpid
|
|
pid_t pid;
|
|
|
|
do {
|
|
pid = sudo_waitpid(-1, &status, WNOHANG);
|
|
} while (pid != 0 && (pid != -1 || errno == EINTR));
|
|
#else
|
|
(void) wait(&status);
|
|
#endif
|
|
errno = serrno;
|
|
}
|
|
|
|
/*
|
|
* Return an ascii string with the current date + time
|
|
* Uses strftime() if available, else falls back to ctime().
|
|
*/
|
|
static char *
|
|
get_timestr()
|
|
{
|
|
char *s;
|
|
time_t now = time((time_t) 0);
|
|
#ifdef HAVE_STRFTIME
|
|
static char buf[128];
|
|
struct tm *timeptr;
|
|
|
|
timeptr = localtime(&now);
|
|
if (def_log_year)
|
|
s = "%h %e %T %Y";
|
|
else
|
|
s = "%h %e %T";
|
|
|
|
/* strftime() does not guarantee to NUL-terminate so we must check. */
|
|
buf[sizeof(buf) - 1] = '\0';
|
|
if (strftime(buf, sizeof(buf), s, timeptr) && buf[sizeof(buf) - 1] == '\0')
|
|
return(buf);
|
|
|
|
#endif /* HAVE_STRFTIME */
|
|
|
|
s = ctime(&now) + 4; /* skip day of the week */
|
|
if (def_log_year)
|
|
s[20] = '\0'; /* avoid the newline */
|
|
else
|
|
s[15] = '\0'; /* don't care about year */
|
|
|
|
return(s);
|
|
}
|
|
|
|
#define LL_TTY_STR "TTY="
|
|
#define LL_CWD_STR "PWD=" /* XXX - should be CWD= */
|
|
#define LL_USER_STR "USER="
|
|
#define LL_GROUP_STR "GROUP="
|
|
#define LL_ENV_STR "ENV="
|
|
#define LL_CMND_STR "COMMAND="
|
|
|
|
/*
|
|
* Allocate and fill in a new logline.
|
|
*/
|
|
static char *
|
|
new_logline(message, serrno)
|
|
const char *message;
|
|
int serrno;
|
|
{
|
|
size_t len = 0;
|
|
char *evstr = NULL;
|
|
char *errstr = NULL;
|
|
char *line;
|
|
|
|
/*
|
|
* Compute line length
|
|
*/
|
|
if (message != NULL)
|
|
len += strlen(message) + 3;
|
|
if (serrno) {
|
|
errstr = strerror(serrno);
|
|
len += strlen(errstr) + 3;
|
|
}
|
|
len += sizeof(LL_TTY_STR) + 2 + strlen(user_tty);
|
|
len += sizeof(LL_CWD_STR) + 2 + strlen(user_cwd);
|
|
if (runas_pw != NULL)
|
|
len += sizeof(LL_USER_STR) + 2 + strlen(runas_pw->pw_name);
|
|
if (runas_gr != NULL)
|
|
len += sizeof(LL_GROUP_STR) + 2 + strlen(runas_gr->gr_name);
|
|
if (sudo_user.env_vars != NULL) {
|
|
size_t evlen = 0;
|
|
struct list_member *cur;
|
|
for (cur = sudo_user.env_vars; cur != NULL; cur = cur->next)
|
|
evlen += strlen(cur->value) + 1;
|
|
evstr = emalloc(evlen);
|
|
evstr[0] = '\0';
|
|
for (cur = sudo_user.env_vars; cur != NULL; cur = cur->next) {
|
|
strlcat(evstr, cur->value, evlen);
|
|
strlcat(evstr, " ", evlen); /* NOTE: last one will fail */
|
|
}
|
|
len += sizeof(LL_ENV_STR) + 2 + evlen;
|
|
}
|
|
len += sizeof(LL_CMND_STR) - 1 + strlen(user_cmnd);
|
|
if (user_args != NULL)
|
|
len += strlen(user_args) + 1;
|
|
|
|
/*
|
|
* Allocate and build up the line.
|
|
*/
|
|
line = emalloc(++len);
|
|
line[0] = '\0';
|
|
|
|
if (message != NULL) {
|
|
if (strlcat(line, message, len) >= len ||
|
|
strlcat(line, errstr ? " : " : " ; ", len) >= len)
|
|
goto toobig;
|
|
}
|
|
if (serrno) {
|
|
if (strlcat(line, errstr, len) >= len ||
|
|
strlcat(line, " ; ", len) >= len)
|
|
goto toobig;
|
|
}
|
|
if (strlcat(line, LL_TTY_STR, len) >= len ||
|
|
strlcat(line, user_tty, len) >= len ||
|
|
strlcat(line, " ; ", len) >= len)
|
|
goto toobig;
|
|
if (strlcat(line, LL_CWD_STR, len) >= len ||
|
|
strlcat(line, user_cwd, len) >= len ||
|
|
strlcat(line, " ; ", len) >= len)
|
|
goto toobig;
|
|
if (runas_pw != NULL) {
|
|
if (strlcat(line, LL_USER_STR, len) >= len ||
|
|
strlcat(line, runas_pw->pw_name, len) >= len ||
|
|
strlcat(line, " ; ", len) >= len)
|
|
goto toobig;
|
|
}
|
|
if (runas_gr != NULL) {
|
|
if (strlcat(line, LL_GROUP_STR, len) >= len ||
|
|
strlcat(line, runas_gr->gr_name, len) >= len ||
|
|
strlcat(line, " ; ", len) >= len)
|
|
goto toobig;
|
|
}
|
|
if (evstr != NULL) {
|
|
if (strlcat(line, LL_ENV_STR, len) >= len ||
|
|
strlcat(line, evstr, len) >= len ||
|
|
strlcat(line, " ; ", len) >= len)
|
|
goto toobig;
|
|
efree(evstr);
|
|
}
|
|
if (strlcat(line, LL_CMND_STR, len) >= len ||
|
|
strlcat(line, user_cmnd, len) >= len)
|
|
goto toobig;
|
|
if (user_args != NULL) {
|
|
if (strlcat(line, " ", len) >= len ||
|
|
strlcat(line, user_args, len) >= len)
|
|
goto toobig;
|
|
}
|
|
|
|
return (line);
|
|
toobig:
|
|
errorx(1, "internal error: insufficient space for log line");
|
|
}
|