/*
* Copyright 2000, International Business Machines Corporation and others.
* All Rights Reserved.
- *
+ *
* This software has been released under the terms of the IBM Public
* License. For details, see the LICENSE file in the top-level source
* directory or online at http://www.openafs.org/dl/license10.html
*/
+#include <afsconfig.h>
#include <afs/param.h>
#include <afs/stds.h>
-#include <sys/types.h>
-#include <sys/stat.h>
-#include <fcntl.h>
-#include <errno.h>
-#include <string.h>
-#include <stdio.h>
-#include <stdlib.h>
+
+#include <afs/procmgmt.h>
+#include <roken.h>
+
+#ifdef IGNORE_SOME_GCC_WARNINGS
+# pragma GCC diagnostic warning "-Wdeprecated-declarations"
+#endif
+
+#ifdef HAVE_SYS_RESOURCE_H
+#include <sys/resource.h>
+#endif
+
#ifdef AFS_NT40_ENV
-#include <winsock2.h>
#include <direct.h>
-#include <io.h>
#include <WINNT/afsevent.h>
-#else
-#include <unistd.h>
-#include <netinet/in.h>
-#include <syslog.h>
#endif /* AFS_NT40_ENV */
-#include <afs/cellconfig.h>
+
#include <rx/rx.h>
#include <rx/xdr.h>
#include <rx/rx_globals.h>
-#include "bosint.h"
-#include "bnode.h"
-#include <afs/auth.h>
+#include <rx/rxkad.h>
+#include <rx/rxstat.h>
#include <afs/keys.h>
#include <afs/ktime.h>
#include <afs/afsutil.h>
#include <afs/fileutil.h>
-#include <afs/procmgmt.h> /* signal(), kill(), wait(), etc. */
+#include <afs/audit.h>
+#include <afs/cellconfig.h>
+
#if defined(AFS_SGI_ENV)
#include <afs/afs_args.h>
#endif
+#include "bosint.h"
+#include "bnode.h"
+#include "bosprototypes.h"
#define BOZO_LWP_STACKSIZE 16000
-extern int BOZO_ExecuteRequest();
-extern int RXSTATS_ExecuteRequest();
-extern int afsconf_GetKey();
-extern struct bnode_ops fsbnode_ops, ezbnode_ops, cronbnode_ops;
+extern struct bnode_ops fsbnode_ops, dafsbnode_ops, ezbnode_ops, cronbnode_ops;
+
struct afsconf_dir *bozo_confdir = 0; /* bozo configuration dir */
-static char *bozo_pid;
-struct rx_securityClass *bozo_rxsc[3];
+static PROCESS bozo_pid;
const char *bozo_fileName;
FILE *bozo_logFile;
-extern int rx_stackSize; /* for rx_SetStackSize macro */
+#ifndef AFS_NT40_ENV
+static int bozo_argc = 0;
+static char** bozo_argv = NULL;
+#endif
+const char *DoCore;
int DoLogging = 0;
int DoSyslog = 0;
+const char *DoPidFiles = NULL;
#ifndef AFS_NT40_ENV
int DoSyslogFacility = LOG_DAEMON;
#endif
struct ktime bozo_nextRestartKT, bozo_nextDayKT;
int bozo_newKTs;
-#ifdef BOS_RESTRICTED_MODE
-int bozo_isrestricted=0;
-int bozo_restdisable=0;
+int rxBind = 0;
+int rxkadDisableDotCheck = 0;
+
+#define ADDRSPERSITE 16 /* Same global is in rx/rx_user.c */
+afs_uint32 SHostAddrs[ADDRSPERSITE];
+
+int bozo_isrestricted = 0;
+int bozo_restdisable = 0;
-void bozo_insecureme(int sig)
+void
+bozo_insecureme(int sig)
{
- signal(SIGFPE, bozo_insecureme);
- bozo_isrestricted=0;
- bozo_restdisable=1;
+ signal(SIGFPE, bozo_insecureme);
+ bozo_isrestricted = 0;
+ bozo_restdisable = 1;
}
-#endif
struct bztemp {
FILE *file;
};
/* check whether caller is authorized to manage RX statistics */
-int bozo_rxstat_userok(call)
- struct rx_call *call;
+int
+bozo_rxstat_userok(struct rx_call *call)
{
- return afsconf_SuperUser(bozo_confdir, call, (char *)0);
+ return afsconf_SuperUser(bozo_confdir, call, NULL);
}
-/* restart bozo process */
-bozo_ReBozo() {
-#ifdef AFS_NT40_ENV
- /* exit with restart code; SCM integrator process will restart bosserver */
- int status = BOSEXIT_RESTART;
+/**
+ * Return true if this name is a member of the local realm.
+ */
+int
+bozo_IsLocalRealmMatch(void *rock, char *name, char *inst, char *cell)
+{
+ struct afsconf_dir *dir = (struct afsconf_dir *)rock;
+ afs_int32 islocal = 0; /* default to no */
+ int code;
- /* if noauth flag is set, pass "-noauth" to new bosserver */
- if (afsconf_GetNoAuthFlag(bozo_confdir)) {
- status |= BOSEXIT_NOAUTH_FLAG;
- }
- /* if logging is on, pass "-log" to new bosserver */
- if (DoLogging) {
- status |= BOSEXIT_LOGGING_FLAG;
+ code = afsconf_IsLocalRealmMatch(dir, &islocal, name, inst, cell);
+ if (code) {
+ bozo_Log("Failed local realm check; code=%d, name=%s, inst=%s, cell=%s\n",
+ code, name, inst, cell);
}
- exit(status);
+ return islocal;
+}
+
+/* restart bozo process */
+int
+bozo_ReBozo(void)
+{
+#ifdef AFS_NT40_ENV
+ /* exit with restart code; SCM integrator process will restart bosserver with
+ the same arguments */
+ exit(BOSEXIT_RESTART);
#else
/* exec new bosserver process */
- char *argv[4];
int i = 0;
- argv[i] = (char *)AFSDIR_SERVER_BOSVR_FILEPATH;
- i++;
-
- /* if noauth flag is set, pass "-noauth" to new bosserver */
- if (afsconf_GetNoAuthFlag(bozo_confdir)) {
- argv[i] = "-noauth";
- i++;
- }
- /* if logging is on, pass "-log" to new bosserver */
- if (DoLogging) {
- argv[i] = "-log";
- i++;
- }
-
-#ifndef AFS_NT40_ENV
- /* if syslog logging is on, pass "-syslog" to new bosserver */
- if (DoSyslog) {
- char *arg=(char *)malloc(40); /* enough for -syslog=# */
- if ( DoSyslogFacility != LOG_DAEMON ) {
- snprintf(arg, 40, "-syslog=%d", DoSyslogFacility);
- } else {
- strcpy(arg, "-syslog");
- }
- argv[i] = arg;
- i++;
- }
-#endif
-
- /* null-terminate argument list */
- argv[i] = NULL;
-
/* close random fd's */
for (i = 3; i < 64; i++) {
close(i);
}
- execv(argv[0], argv); /* should not return */
+ unlink(AFSDIR_SERVER_BOZRXBIND_FILEPATH);
+
+ execv(bozo_argv[0], bozo_argv); /* should not return */
_exit(1);
#endif /* AFS_NT40_ENV */
}
/* make sure a dir exists */
-static MakeDir(adir)
-register char *adir; {
+static int
+MakeDir(const char *adir)
+{
struct stat tstat;
- register afs_int32 code;
+ afs_int32 code;
if (stat(adir, &tstat) < 0 || (tstat.st_mode & S_IFMT) != S_IFDIR) {
int reqPerm;
unlink(adir);
- reqPerm = GetRequiredDirPerm (adir);
- if (reqPerm == -1) reqPerm = 0777;
+ reqPerm = GetRequiredDirPerm(adir);
+ if (reqPerm == -1)
+ reqPerm = 0777;
#ifdef AFS_NT40_ENV
/* underlying filesystem may not support directory protection */
code = mkdir(adir);
}
/* create all the bozo dirs */
-static CreateDirs() {
-
- MakeDir(AFSDIR_USR_DIRPATH);
- MakeDir(AFSDIR_SERVER_AFS_DIRPATH);
+static int
+CreateDirs(const char *coredir)
+{
+ if ((!strncmp
+ (AFSDIR_USR_DIRPATH, AFSDIR_CLIENT_ETC_DIRPATH,
+ strlen(AFSDIR_USR_DIRPATH)))
+ ||
+ (!strncmp
+ (AFSDIR_USR_DIRPATH, AFSDIR_SERVER_BIN_DIRPATH,
+ strlen(AFSDIR_USR_DIRPATH)))) {
+ MakeDir(AFSDIR_USR_DIRPATH);
+ }
+ if (!strncmp
+ (AFSDIR_SERVER_AFS_DIRPATH, AFSDIR_SERVER_BIN_DIRPATH,
+ strlen(AFSDIR_SERVER_AFS_DIRPATH))) {
+ MakeDir(AFSDIR_SERVER_AFS_DIRPATH);
+ }
MakeDir(AFSDIR_SERVER_BIN_DIRPATH);
- MakeDir(AFSDIR_SERVER_ETC_DIRPATH);
+ MakeDir(AFSDIR_SERVER_ETC_DIRPATH);
MakeDir(AFSDIR_SERVER_LOCAL_DIRPATH);
- MakeDir(AFSDIR_SERVER_DB_DIRPATH);
+ MakeDir(AFSDIR_SERVER_DB_DIRPATH);
MakeDir(AFSDIR_SERVER_LOGS_DIRPATH);
#ifndef AFS_NT40_ENV
- MakeDir(AFSDIR_CLIENT_VICE_DIRPATH);
+ if (!strncmp
+ (AFSDIR_CLIENT_VICE_DIRPATH, AFSDIR_CLIENT_ETC_DIRPATH,
+ strlen(AFSDIR_CLIENT_VICE_DIRPATH))) {
+ MakeDir(AFSDIR_CLIENT_VICE_DIRPATH);
+ }
MakeDir(AFSDIR_CLIENT_ETC_DIRPATH);
- symlink(AFSDIR_SERVER_THISCELL_FILEPATH, AFSDIR_CLIENT_THISCELL_FILEPATH);
- symlink(AFSDIR_SERVER_CELLSERVDB_FILEPATH, AFSDIR_CLIENT_CELLSERVDB_FILEPATH);
+ symlink(AFSDIR_SERVER_THISCELL_FILEPATH, AFSDIR_CLIENT_THISCELL_FILEPATH);
+ symlink(AFSDIR_SERVER_CELLSERVDB_FILEPATH,
+ AFSDIR_CLIENT_CELLSERVDB_FILEPATH);
#endif /* AFS_NT40_ENV */
+ if (coredir)
+ MakeDir(coredir);
return 0;
}
/* strip the \\n from the end of the line, if it is present */
-static StripLine(abuffer)
-register char *abuffer; {
- register char *tp;
-
- tp = abuffer + strlen(abuffer); /* starts off pointing at the null */
- if(tp == abuffer) return 0; /* null string, no last character to check */
- tp--; /* aim at last character */
- if (*tp == '\n') *tp = 0;
+static int
+StripLine(char *abuffer)
+{
+ char *tp;
+
+ tp = abuffer + strlen(abuffer); /* starts off pointing at the null */
+ if (tp == abuffer)
+ return 0; /* null string, no last character to check */
+ tp--; /* aim at last character */
+ if (*tp == '\n')
+ *tp = 0;
return 0;
}
/* write one bnode's worth of entry into the file */
-static bzwrite(abnode, at)
-register struct bnode *abnode;
-register struct bztemp *at; {
- register int i;
+static int
+bzwrite(struct bnode *abnode, void *arock)
+{
+ struct bztemp *at = (struct bztemp *)arock;
+ int i;
char tbuffer[BOZO_BSSIZE];
- register afs_int32 code;
+ afs_int32 code;
if (abnode->notifier)
- fprintf(at->file, "bnode %s %s %d %s\n",
- abnode->type->name, abnode->name, abnode->fileGoal, abnode->notifier);
+ fprintf(at->file, "bnode %s %s %d %s\n", abnode->type->name,
+ abnode->name, abnode->fileGoal, abnode->notifier);
else
- fprintf(at->file, "bnode %s %s %d\n", abnode->type->name, abnode->name, abnode->fileGoal);
- for(i=0;;i++) {
+ fprintf(at->file, "bnode %s %s %d\n", abnode->type->name,
+ abnode->name, abnode->fileGoal);
+ for (i = 0;; i++) {
code = bnode_GetParm(abnode, i, tbuffer, BOZO_BSSIZE);
if (code) {
- if (code != BZDOM) return code;
+ if (code != BZDOM)
+ return code;
break;
}
fprintf(at->file, "parm %s\n", tbuffer);
}
#define MAXPARMS 20
-ReadBozoFile(aname)
-char *aname; {
- register FILE *tfile;
+int
+ReadBozoFile(char *aname)
+{
+ FILE *tfile;
char tbuffer[BOZO_BSSIZE];
- register char *tp;
+ char *tp;
char *instp, *typep, *notifier, *notp;
- register afs_int32 code;
+ afs_int32 code;
afs_int32 ktmask, ktday, kthour, ktmin, ktsec;
afs_int32 i, goal;
struct bnode *tb;
char *parms[MAXPARMS];
-#ifdef BOS_RESTRICTED_MODE
+ char *thisparms[MAXPARMS];
int rmode;
-#endif
/* rename BozoInit to BosServer for the user */
if (!aname) {
/* if BozoInit exists and BosConfig doesn't, try a rename */
if (access(AFSDIR_SERVER_BOZINIT_FILEPATH, 0) == 0
&& access(AFSDIR_SERVER_BOZCONF_FILEPATH, 0) != 0) {
- code = renamefile(AFSDIR_SERVER_BOZINIT_FILEPATH, AFSDIR_SERVER_BOZCONF_FILEPATH);
+ code =
+ renamefile(AFSDIR_SERVER_BOZINIT_FILEPATH,
+ AFSDIR_SERVER_BOZCONF_FILEPATH);
if (code < 0)
perror("bosconfig rename");
}
-#ifdef BOS_NEW_CONFIG
if (access(AFSDIR_SERVER_BOZCONFNEW_FILEPATH, 0) == 0) {
- code = renamefile(AFSDIR_SERVER_BOZCONFNEW_FILEPATH,
- AFSDIR_SERVER_BOZCONF_FILEPATH);
- if (code < 0)
- perror("bosconfig rename");
+ code =
+ renamefile(AFSDIR_SERVER_BOZCONFNEW_FILEPATH,
+ AFSDIR_SERVER_BOZCONF_FILEPATH);
+ if (code < 0)
+ perror("bosconfig rename");
}
-#endif
}
- /* setup default times we want to do restarts */
- bozo_nextRestartKT.mask = KTIME_HOUR | KTIME_MIN | KTIME_DAY;
- bozo_nextRestartKT.hour = 4; /* 4 am */
+ /* don't do server restarts by default */
+ bozo_nextRestartKT.mask = KTIME_NEVER;
+ bozo_nextRestartKT.hour = 0;
bozo_nextRestartKT.min = 0;
- bozo_nextRestartKT.day = 0; /* Sunday */
+ bozo_nextRestartKT.day = 0;
+
+ /* restart processes at 5am if their binaries have changed */
bozo_nextDayKT.mask = KTIME_HOUR | KTIME_MIN;
bozo_nextDayKT.hour = 5;
bozo_nextDayKT.min = 0;
- for(code=0;code<MAXPARMS;code++)
- parms[code] = (char *) 0;
- instp = typep = notifier = (char *) 0;
+ for (code = 0; code < MAXPARMS; code++)
+ parms[code] = NULL;
tfile = (FILE *) 0;
- if (!aname) aname = (char *)bozo_fileName;
+ if (!aname)
+ aname = (char *)bozo_fileName;
tfile = fopen(aname, "r");
- if (!tfile)
- return 0; /* -1 */
- instp = (char *) malloc(BOZO_BSSIZE);
- typep = (char *) malloc(BOZO_BSSIZE);
- notifier = notp = (char *) malloc(BOZO_BSSIZE);
+ if (!tfile)
+ return 0; /* -1 */
+ instp = malloc(BOZO_BSSIZE);
+ typep = malloc(BOZO_BSSIZE);
+ notifier = notp = malloc(BOZO_BSSIZE);
while (1) {
/* ok, read lines giving parms and such from the file */
tp = fgets(tbuffer, sizeof(tbuffer), tfile);
- if (tp == (char *) 0) break; /* all done */
+ if (tp == (char *)0)
+ break; /* all done */
if (strncmp(tbuffer, "restarttime", 11) == 0) {
- code = sscanf(tbuffer, "restarttime %d %d %d %d %d",
- &ktmask, &ktday, &kthour, &ktmin, &ktsec);
+ code =
+ sscanf(tbuffer, "restarttime %d %d %d %d %d", &ktmask, &ktday,
+ &kthour, &ktmin, &ktsec);
if (code != 5) {
code = -1;
goto fail;
}
/* otherwise we've read in the proper ktime structure; now assign
- it and continue processing */
+ * it and continue processing */
bozo_nextRestartKT.mask = ktmask;
bozo_nextRestartKT.day = ktday;
bozo_nextRestartKT.hour = kthour;
}
if (strncmp(tbuffer, "checkbintime", 12) == 0) {
- code = sscanf(tbuffer, "checkbintime %d %d %d %d %d",
- &ktmask, &ktday, &kthour, &ktmin, &ktsec);
+ code =
+ sscanf(tbuffer, "checkbintime %d %d %d %d %d", &ktmask,
+ &ktday, &kthour, &ktmin, &ktsec);
if (code != 5) {
code = -1;
goto fail;
}
/* otherwise we've read in the proper ktime structure; now assign
- it and continue processing */
+ * it and continue processing */
bozo_nextDayKT.mask = ktmask; /* time to restart the system */
bozo_nextDayKT.day = ktday;
bozo_nextDayKT.hour = kthour;
continue;
}
-#ifdef BOS_RESTRICTED_MODE
if (strncmp(tbuffer, "restrictmode", 12) == 0) {
- code = sscanf(tbuffer, "restrictmode %d",
- &rmode);
+ code = sscanf(tbuffer, "restrictmode %d", &rmode);
if (code != 1) {
code = -1;
goto fail;
}
- if (rmode !=0 && rmode != 1) {
- code = -1;
- goto fail;
- }
- bozo_isrestricted=rmode;
- continue;
+ if (rmode != 0 && rmode != 1) {
+ code = -1;
+ goto fail;
+ }
+ bozo_isrestricted = rmode;
+ continue;
}
-#endif
-
+
if (strncmp("bnode", tbuffer, 5) != 0) {
code = -1;
goto fail;
}
notifier = notp;
- code = sscanf(tbuffer, "bnode %s %s %d %s", typep, instp, &goal, notifier);
+ code =
+ sscanf(tbuffer, "bnode %s %s %d %s", typep, instp, &goal,
+ notifier);
if (code < 3) {
code = -1;
goto fail;
} else if (code == 3)
- notifier = (char *)0;
-
- for(i=0;i<MAXPARMS;i++) {
+ notifier = NULL;
+
+ memset(thisparms, 0, sizeof(thisparms));
+
+ for (i = 0; i < MAXPARMS; i++) {
/* now read the parms, until we see an "end" line */
tp = fgets(tbuffer, sizeof(tbuffer), tfile);
if (!tp) {
goto fail;
}
StripLine(tbuffer);
- if (!strncmp(tbuffer, "end", 3)) break;
+ if (!strncmp(tbuffer, "end", 3))
+ break;
if (strncmp(tbuffer, "parm ", 5)) {
code = -1;
- goto fail; /* no "parm " either */
+ goto fail; /* no "parm " either */
}
- if (!parms[i]) /* make sure there's space */
- parms[i] = (char *) malloc(BOZO_BSSIZE);
- strcpy(parms[i], tbuffer+5); /* remember the parameter for later */
+ if (!parms[i]) /* make sure there's space */
+ parms[i] = (char *)malloc(BOZO_BSSIZE);
+ strcpy(parms[i], tbuffer + 5); /* remember the parameter for later */
+ thisparms[i] = parms[i];
}
/* ok, we have the type and parms, now create the object */
- code = bnode_Create(typep, instp, &tb, parms[0], parms[1], parms[2],
- parms[3], parms[4], notifier,
- goal ? BSTAT_NORMAL : BSTAT_SHUTDOWN);
- if (code) goto fail;
+ code =
+ bnode_Create(typep, instp, &tb, thisparms[0], thisparms[1],
+ thisparms[2], thisparms[3], thisparms[4], notifier,
+ goal ? BSTAT_NORMAL : BSTAT_SHUTDOWN, 0);
+ if (code)
+ goto fail;
/* bnode created in 'temporarily shutdown' state;
- check to see if we are supposed to run this guy,
- and if so, start the process up */
+ * check to see if we are supposed to run this guy,
+ * and if so, start the process up */
if (goal) {
bnode_SetStat(tb, BSTAT_NORMAL); /* set goal, taking effect immediately */
- }
- else {
+ } else {
bnode_SetStat(tb, BSTAT_SHUTDOWN);
}
}
/* all done */
code = 0;
-fail:
- if (instp) free(instp);
- if (typep) free(typep);
- for(i=0;i<MAXPARMS;i++) if (parms[i]) free(parms[i]);
- if (tfile) fclose(tfile);
+ fail:
+ if (instp)
+ free(instp);
+ if (typep)
+ free(typep);
+ for (i = 0; i < MAXPARMS; i++)
+ if (parms[i])
+ free(parms[i]);
+ if (tfile)
+ fclose(tfile);
return code;
}
/* write a new bozo file */
-WriteBozoFile(aname)
-char *aname; {
- register FILE *tfile;
+int
+WriteBozoFile(char *aname)
+{
+ FILE *tfile;
char tbuffer[AFSDIR_PATH_MAX];
- register afs_int32 code;
+ afs_int32 code;
struct bztemp btemp;
- if (!aname) aname = (char *)bozo_fileName;
+ if (!aname)
+ aname = (char *)bozo_fileName;
strcpy(tbuffer, aname);
strcat(tbuffer, ".NBZ");
tfile = fopen(tbuffer, "w");
- if (!tfile) return -1;
+ if (!tfile)
+ return -1;
btemp.file = tfile;
-#ifdef BOS_RESTRICTED_MODE
+
fprintf(tfile, "restrictmode %d\n", bozo_isrestricted);
-#endif
fprintf(tfile, "restarttime %d %d %d %d %d\n", bozo_nextRestartKT.mask,
- bozo_nextRestartKT.day, bozo_nextRestartKT.hour, bozo_nextRestartKT.min,
- bozo_nextRestartKT.sec);
+ bozo_nextRestartKT.day, bozo_nextRestartKT.hour,
+ bozo_nextRestartKT.min, bozo_nextRestartKT.sec);
fprintf(tfile, "checkbintime %d %d %d %d %d\n", bozo_nextDayKT.mask,
bozo_nextDayKT.day, bozo_nextDayKT.hour, bozo_nextDayKT.min,
bozo_nextDayKT.sec);
return 0;
}
-static bdrestart(abnode, arock)
-register struct bnode *abnode;
-char *arock; {
- register afs_int32 code;
-
+static int
+bdrestart(struct bnode *abnode, void *arock)
+{
+ afs_int32 code;
+
if (abnode->fileGoal != BSTAT_NORMAL || abnode->goal != BSTAT_NORMAL)
- return 0; /* don't restart stopped bnodes */
+ return 0; /* don't restart stopped bnodes */
bnode_Hold(abnode);
code = bnode_RestartP(abnode);
if (code) {
bnode_SetStat(abnode, BSTAT_NORMAL);
}
bnode_Release(abnode);
- return 0; /* keep trying all bnodes */
+ return 0; /* keep trying all bnodes */
}
-#define BOZO_MINSKIP 3600 /* minimum to advance clock */
+#define BOZO_MINSKIP 3600 /* minimum to advance clock */
/* lwp to handle system restarts */
-static BozoDaemon() {
- register afs_int32 now;
-
+static void *
+BozoDaemon(void *unused)
+{
+ afs_int32 now;
+
/* now initialize the values */
bozo_newKTs = 1;
while (1) {
IOMGR_Sleep(60);
now = FT_ApproxTime();
-#ifdef BOS_RESTRICTED_MODE
if (bozo_restdisable) {
- bozo_Log("Restricted mode disabled by signal\n");
- bozo_restdisable=0;
+ bozo_Log("Restricted mode disabled by signal\n");
+ bozo_restdisable = 0;
}
-#endif
+
if (bozo_newKTs) { /* need to recompute restart times */
bozo_newKTs = 0; /* done for a while */
nextRestart = ktime_next(&bozo_nextRestartKT, BOZO_MINSKIP);
/* see if we should do a restart */
if (now > nextRestart) {
- BOZO_ReBozo(0); /* doesn't come back */
+ SBOZO_ReBozo(0); /* doesn't come back */
}
-
+
/* see if we should restart a server */
if (now > nextDay) {
nextDay = ktime_next(&bozo_nextDayKT, BOZO_MINSKIP);
-
+
/* call the bnode restartp function, and restart all that require it */
bnode_ApplyInstance(bdrestart, 0);
}
}
+ return NULL;
}
#ifdef AFS_AIX32_ENV
-static tweak_config()
+static int
+tweak_config(void)
{
FILE *f;
char c[80];
f = popen("/usr/sbin/no -o sb_max", "r");
s = fscanf(f, "sb_max = %d", &sb_max);
fclose(f);
- if (s < 1)
+ if (s < 1)
return;
f = popen("/usr/sbin/no -o ipfragttl", "r");
s = fscanf(f, "ipfragttl = %d", &ipfragttl);
fclose(f);
- if (s < 1)
+ if (s < 1)
ipfragttl = 20;
- if (sb_max < 131072)
+ if (sb_max < 131072)
sb_max = 131072;
if (ipfragttl > 20)
ipfragttl = 20;
-
- sprintf(c, "/usr/sbin/no -o sb_max=%d -o ipfragttl=%d", sb_max, ipfragttl);
+
+ sprintf(c, "/usr/sbin/no -o sb_max=%d -o ipfragttl=%d", sb_max,
+ ipfragttl);
f = popen(c, "r");
fclose(f);
}
#endif
+#if 0
/*
* This routine causes the calling process to go into the background and
* to lose its controlling tty.
* It writes warning messages to the standard error output if certain
* fundamental errors occur.
*
- * This routine requires
- *
- * #include <sys/types.h>
- * #include <sys/stat.h>
- * #include <fcntl.h>
- * #include <unistd.h>
- * #include <stdlib.h>
- *
- * and has been tested on:
+ * This routine has been tested on:
*
* AIX 4.2
* Digital Unix 4.0D
static void
background(void)
{
- /*
+ /*
* A process is a process group leader if its process ID
* (getpid()) and its process group ID (getpgrp()) are the same.
*/
*/
if (getpid() == getpgrp()) {
- pid_t pid;
- pid = fork();
- switch(pid) {
- case -1:
- abort(); /* leave footprints */
- break;
- case 0: /* child */
- break;
- default: /* parent */
- exit(0);
- break;
- }
+ pid_t pid;
+ pid = fork();
+ switch (pid) {
+ case -1:
+ abort(); /* leave footprints */
+ break;
+ case 0: /* child */
+ break;
+ default: /* parent */
+ exit(0);
+ break;
+ }
}
/*
*/
{
- pid_t sid = setsid();
+ pid_t sid = setsid();
- if (sid == -1) {
- static char err[] = "bosserver: WARNING: setsid() failed\n";
- write(STDERR_FILENO, err, sizeof err - 1);
- }
+ if (sid == -1) {
+ static char err[] = "bosserver: WARNING: setsid() failed\n";
+ write(STDERR_FILENO, err, sizeof err - 1);
+ }
}
/*
*/
if (getpid() == getpgrp()) {
- pid_t pid;
- pid = fork();
- switch(pid) {
- case -1:
- abort(); /* leave footprints */
- break;
- case 0: /* child */
- break;
- default: /* parent */
- exit(0);
- break;
- }
+ pid_t pid;
+ pid = fork();
+ switch (pid) {
+ case -1:
+ abort(); /* leave footprints */
+ break;
+ case 0: /* child */
+ break;
+ default: /* parent */
+ exit(0);
+ break;
+ }
}
/*
*/
{
- int fd;
+ int fd;
- fd = open("/dev/tty", O_RDONLY);
+ fd = open("/dev/tty", O_RDONLY);
- if (fd >= 0) {
- static char err[] = "bosserver: WARNING: /dev/tty still attached\n";
- close(fd);
- write(STDERR_FILENO, err, sizeof err - 1);
- }
+ if (fd >= 0) {
+ static char err[] =
+ "bosserver: WARNING: /dev/tty still attached\n";
+ close(fd);
+ write(STDERR_FILENO, err, sizeof err - 1);
+ }
}
}
#endif /* ! AFS_NT40_ENV */
+#endif
+
+static char *
+make_pid_filename(char *ainst, char *aname)
+{
+ char *buffer = NULL;
+
+ if (aname && *aname) {
+ asprintf(&buffer, "%s/%s.%s.pid", DoPidFiles, ainst, aname);
+ if (buffer == NULL)
+ bozo_Log("Failed to alloc pid filename buffer for %s.%s.\n",
+ ainst, aname);
+ } else {
+ asprintf(&buffer, "%s/%s.pid", DoPidFiles, ainst);
+ if (buffer == NULL)
+ bozo_Log("Failed to alloc pid filename buffer for %s.\n", ainst);
+ }
+
+ return buffer;
+}
+
+/**
+ * Write a file containing the pid of the named process.
+ *
+ * @param ainst instance name
+ * @param aname sub-process name of the instance, may be null
+ * @param apid process id of the newly started process
+ *
+ * @returns status
+ */
+int
+bozo_CreatePidFile(char *ainst, char *aname, pid_t apid)
+{
+ int code = 0;
+ char *pidfile = NULL;
+ FILE *fp;
+
+ pidfile = make_pid_filename(ainst, aname);
+ if (!pidfile) {
+ return ENOMEM;
+ }
+ if ((fp = fopen(pidfile, "w")) == NULL) {
+ bozo_Log("Failed to open pidfile %s; errno=%d\n", pidfile, errno);
+ free(pidfile);
+ return errno;
+ }
+ if (fprintf(fp, "%ld\n", afs_printable_int32_ld(apid)) < 0) {
+ code = errno;
+ }
+ if (fclose(fp) != 0) {
+ code = errno;
+ }
+ free(pidfile);
+ return code;
+}
+
+/**
+ * Clean a pid file for a process which just exited.
+ *
+ * @param ainst instance name
+ * @param aname sub-process name of the instance, may be null
+ *
+ * @returns status
+ */
+int
+bozo_DeletePidFile(char *ainst, char *aname)
+{
+ char *pidfile = NULL;
+ pidfile = make_pid_filename(ainst, aname);
+ if (pidfile) {
+ unlink(pidfile);
+ free(pidfile);
+ }
+ return 0;
+}
+
+/**
+ * Create the rxbind file of this bosserver.
+ *
+ * @param host bind address of this server
+ *
+ * @returns status
+ */
+void
+bozo_CreateRxBindFile(afs_uint32 host)
+{
+ char buffer[16];
+ FILE *fp;
+
+ if (host == htonl(INADDR_ANY)) {
+ host = htonl(0x7f000001);
+ }
+
+ afs_inet_ntoa_r(host, buffer);
+ bozo_Log("Listening on %s:%d\n", buffer, AFSCONF_NANNYPORT);
+ if ((fp = fopen(AFSDIR_SERVER_BOZRXBIND_FILEPATH, "w")) == NULL) {
+ bozo_Log("Unable to open rxbind address file: %s, code=%d\n",
+ AFSDIR_SERVER_BOZRXBIND_FILEPATH, errno);
+ } else {
+ fprintf(fp, "%s\n", buffer);
+ fclose(fp);
+ }
+}
/* start a process and monitor it */
#include "AFS_component_version_number.c"
-
-main (argc, argv,envp)
-int argc;
-char **argv;
-char **envp;
+int
+main(int argc, char **argv, char **envp)
{
struct rx_service *tservice;
- register afs_int32 code;
+ afs_int32 code;
struct afsconf_dir *tdir;
int noAuth = 0;
- struct ktc_encryptionKey tkey;
int i;
- pid_t newSessionID;
char namebuf[AFSDIR_PATH_MAX];
-
+ int rxMaxMTU = -1;
+ afs_uint32 host = htonl(INADDR_ANY);
+ char *auditFileName = NULL;
+ struct rx_securityClass **securityClasses;
+ afs_int32 numClasses;
+#ifndef AFS_NT40_ENV
+ int nofork = 0;
+ struct stat sb;
+#endif
#ifdef AFS_AIX32_ENV
struct sigaction nsa;
/* for some reason, this permits user-mode RX to run a lot faster.
- * we do it here in the bosserver, so we don't have to do it
+ * we do it here in the bosserver, so we don't have to do it
* individually in each server.
*/
tweak_config();
/*
- * The following signal action for AIX is necessary so that in case of a
- * crash (i.e. core is generated) we can include the user's data section
+ * The following signal action for AIX is necessary so that in case of a
+ * crash (i.e. core is generated) we can include the user's data section
* in the core dump. Unfortunately, by default, only a partial core is
* generated which, in many cases, isn't too useful.
*/
sigaction(SIGSEGV, &nsa, NULL);
sigaction(SIGABRT, &nsa, NULL);
#endif
-#ifdef BOS_RESTRICTED_MODE
+ osi_audit_init();
signal(SIGFPE, bozo_insecureme);
-#endif
#ifdef AFS_NT40_ENV
/* Initialize winsock */
#ifdef AFS_NT40_ENV
ReportErrorEventAlt(AFSEVT_SVR_NO_INSTALL_DIR, 0, argv[0], 0);
#endif
- fprintf(stderr, "%s: Unable to obtain AFS server directory.\n", argv[0]);
+ fprintf(stderr, "%s: Unable to obtain AFS server directory.\n",
+ argv[0]);
exit(2);
}
/* some path inits */
bozo_fileName = AFSDIR_SERVER_BOZCONF_FILEPATH;
+ DoCore = AFSDIR_SERVER_LOGS_DIRPATH;
/* initialize the list of dirpaths that the bosserver has
* an interest in monitoring */
}
#endif
+#ifndef AFS_NT40_ENV
+ /* save args for restart */
+ bozo_argc = argc;
+ bozo_argv = malloc((argc+1) * sizeof(char*));
+ if (!bozo_argv) {
+ fprintf(stderr, "%s: Failed to allocate argument list.\n", argv[0]);
+ exit(1);
+ }
+ bozo_argv[0] = (char*)AFSDIR_SERVER_BOSVR_FILEPATH; /* expected path */
+ bozo_argv[bozo_argc] = NULL; /* null terminate list */
+#endif /* AFS_NT40_ENV */
+
/* parse cmd line */
- for(code=1;code<argc;code++) {
- if (strcmp(argv[code], "-noauth")==0) {
+ for (code = 1; code < argc; code++) {
+#ifndef AFS_NT40_ENV
+ bozo_argv[code] = argv[code];
+#endif /* AFS_NT40_ENV */
+ if (strcmp(argv[code], "-noauth") == 0) {
/* set noauth flag */
noAuth = 1;
- }
- else if (strcmp(argv[code], "-log")==0) {
+ } else if (strcmp(argv[code], "-log") == 0) {
/* set extra logging flag */
DoLogging = 1;
}
#ifndef AFS_NT40_ENV
- else if (strcmp(argv[code], "-syslog")==0) {
+ else if (strcmp(argv[code], "-syslog") == 0) {
/* set syslog logging flag */
DoSyslog = 1;
- }
- else if (strncmp(argv[code], "-syslog=",8)==0) {
+ } else if (strncmp(argv[code], "-syslog=", 8) == 0) {
DoSyslog = 1;
- DoSyslogFacility = atoi(argv[code]+8);
+ DoSyslogFacility = atoi(argv[code] + 8);
+ } else if (strncmp(argv[code], "-cores=", 7) == 0) {
+ if (strcmp((argv[code]+7), "none") == 0)
+ DoCore = 0;
+ else
+ DoCore = (argv[code]+7);
+ } else if (strcmp(argv[code], "-nofork") == 0) {
+ nofork = 1;
}
#endif
- else if (strcmp(argv[code], "-enable_peer_stats")==0) {
+ else if (strcmp(argv[code], "-enable_peer_stats") == 0) {
rx_enablePeerRPCStats();
- }
- else if (strcmp(argv[code], "-enable_process_stats")==0) {
+ } else if (strcmp(argv[code], "-enable_process_stats") == 0) {
rx_enableProcessRPCStats();
}
-#ifdef BOS_RESTRICTED_MODE
- else if (strcmp(argv[code], "-restricted")==0) {
- bozo_isrestricted=1;
+ else if (strcmp(argv[code], "-restricted") == 0) {
+ bozo_isrestricted = 1;
+ }
+ else if (strcmp(argv[code], "-rxbind") == 0) {
+ rxBind = 1;
+ }
+ else if (strcmp(argv[code], "-allow-dotted-principals") == 0) {
+ rxkadDisableDotCheck = 1;
+ }
+ else if (!strcmp(argv[code], "-rxmaxmtu")) {
+ if ((code + 1) >= argc) {
+ fprintf(stderr, "missing argument for -rxmaxmtu\n");
+ exit(1);
+ }
+ rxMaxMTU = atoi(argv[++code]);
+ }
+ else if (strcmp(argv[code], "-auditlog") == 0) {
+ auditFileName = argv[++code];
+
+ } else if (strcmp(argv[code], "-audit-interface") == 0) {
+ char *interface = argv[++code];
+
+ if (osi_audit_interface(interface)) {
+ printf("Invalid audit interface '%s'\n", interface);
+ exit(1);
+ }
+ } else if (strncmp(argv[code], "-pidfiles=", 10) == 0) {
+ DoPidFiles = (argv[code]+10);
+ } else if (strncmp(argv[code], "-pidfiles", 9) == 0) {
+ DoPidFiles = AFSDIR_BOSCONFIG_DIR;
}
-#endif
else {
/* hack to support help flag */
- printf("Usage: bosserver [-noauth] [-log] "
#ifndef AFS_NT40_ENV
+ printf("Usage: bosserver [-noauth] [-log] "
+ "[-auditlog <log path>] "
+ "[-audit-interafce <file|sysvmq> (default is file)] "
+ "[-rxmaxmtu <bytes>] [-rxbind] [-allow-dotted-principals]"
"[-syslog[=FACILITY]] "
-#endif
- /* "[-enable_peer_stats] [-enable_process_stats] " */
+ "[-restricted] "
+ "[-enable_peer_stats] [-enable_process_stats] "
+ "[-cores=<none|path>] \n"
+ "[-pidfiles[=path]] "
+ "[-nofork] " "[-help]\n");
+#else
+ printf("Usage: bosserver [-noauth] [-log] "
+ "[-auditlog <log path>] "
+ "[-audit-interafce <file|sysvmq> (default is file)] "
+ "[-rxmaxmtu <bytes>] [-rxbind] [-allow-dotted-principals]"
+ "[-restricted] "
+ "[-enable_peer_stats] [-enable_process_stats] "
+ "[-cores=<none|path>] \n"
+ "[-pidfiles[=path]] "
"[-help]\n");
+#endif
fflush(stdout);
exit(0);
}
}
+ if (auditFileName) {
+ osi_audit_file(auditFileName);
+ }
#ifndef AFS_NT40_ENV
if (geteuid() != 0) {
}
bnode_Register("fs", &fsbnode_ops, 3);
+ bnode_Register("dafs", &dafsbnode_ops, 4);
bnode_Register("simple", &ezbnode_ops, 1);
bnode_Register("cron", &cronbnode_ops, 2);
/* create useful dirs */
- CreateDirs();
+ CreateDirs(DoCore);
/* chdir to AFS log directory */
- chdir(AFSDIR_SERVER_LOGS_DIRPATH);
+ if (DoCore)
+ chdir(DoCore);
+ else
+ chdir(AFSDIR_SERVER_LOGS_DIRPATH);
#if 0
fputs(AFS_GOVERNMENT_MESSAGE, stdout);
fflush(stdout);
#endif
- /* go into the background and remove our controlling tty */
+ /* go into the background and remove our controlling tty, close open
+ file desriptors
+ */
#ifndef AFS_NT40_ENV
- background();
+ if (!nofork)
+ daemon(1, 0);
#endif /* ! AFS_NT40_ENV */
- if (!DoSyslog) {
+ if ((!DoSyslog)
+#ifndef AFS_NT40_ENV
+ && ((lstat(AFSDIR_BOZLOG_FILE, &sb) == 0) &&
+ !(S_ISFIFO(sb.st_mode)))
+#endif
+ ) {
strcpy(namebuf, AFSDIR_BOZLOG_FILE);
strcat(namebuf, ".old");
- renamefile(AFSDIR_BOZLOG_FILE, namebuf); /* try rename first */
+ renamefile(AFSDIR_BOZLOG_FILE, namebuf); /* try rename first */
bozo_logFile = fopen(AFSDIR_BOZLOG_FILE, "a");
if (!bozo_logFile) {
printf("bosserver: can't initialize log file (%s).\n",
AFSDIR_SERVER_BOZLOG_FILEPATH);
exit(1);
}
- /* keep log closed normally, so can be removed */
- fclose(bozo_logFile);
+ /* keep log closed normally, so can be removed */
+ fclose(bozo_logFile);
} else {
#ifndef AFS_NT40_ENV
openlog("bosserver", LOG_PID, DoSyslogFacility);
#endif
}
+#if defined(RLIMIT_CORE) && defined(HAVE_GETRLIMIT)
+ {
+ struct rlimit rlp;
+ getrlimit(RLIMIT_CORE, &rlp);
+ if (!DoCore)
+ rlp.rlim_cur = 0;
+ else
+ rlp.rlim_max = rlp.rlim_cur = RLIM_INFINITY;
+ setrlimit(RLIMIT_CORE, &rlp);
+ getrlimit(RLIMIT_CORE, &rlp);
+ bozo_Log("Core limits now %d %d\n",(int)rlp.rlim_cur,(int)rlp.rlim_max);
+ }
+#endif
+
/* Write current state of directory permissions to log file */
- DirAccessOK ();
+ DirAccessOK();
+
+ if (rxBind) {
+ afs_int32 ccode;
+ if (AFSDIR_SERVER_NETRESTRICT_FILEPATH ||
+ AFSDIR_SERVER_NETINFO_FILEPATH) {
+ char reason[1024];
+ ccode = parseNetFiles(SHostAddrs, NULL, NULL,
+ ADDRSPERSITE, reason,
+ AFSDIR_SERVER_NETINFO_FILEPATH,
+ AFSDIR_SERVER_NETRESTRICT_FILEPATH);
+ } else {
+ ccode = rx_getAllAddr(SHostAddrs, ADDRSPERSITE);
+ }
+ if (ccode == 1)
+ host = SHostAddrs[0];
+ }
- for (i=0;i<10;i++) {
- code = rx_Init(htons(AFSCONF_NANNYPORT));
+ for (i = 0; i < 10; i++) {
+ if (rxBind) {
+ code = rx_InitHost(host, htons(AFSCONF_NANNYPORT));
+ } else {
+ code = rx_Init(htons(AFSCONF_NANNYPORT));
+ }
if (code) {
- bozo_Log("can't initialize rx: code=%d\n",code);
+ bozo_Log("can't initialize rx: code=%d\n", code);
sleep(3);
- }
- else break;
+ } else
+ break;
}
- if (i>=10) {
+ if (i >= 10) {
bozo_Log("Bos giving up, can't initialize rx\n");
exit(code);
}
+ /* Disable jumbograms */
+ rx_SetNoJumbo();
+
+ if (rxMaxMTU != -1) {
+ if (rx_SetMaxMTU(rxMaxMTU) != 0) {
+ bozo_Log("bosserver: rxMaxMTU %d is invalid\n", rxMaxMTU);
+ exit(1);
+ }
+ }
+
code = LWP_CreateProcess(BozoDaemon, BOZO_LWP_STACKSIZE, /* priority */ 1,
- /* parm */0, "bozo-the-clown", &bozo_pid);
+ /* param */ NULL , "bozo-the-clown",
+ &bozo_pid);
/* try to read the key from the config file */
tdir = afsconf_Open(AFSDIR_SERVER_ETC_DIRPATH);
bozo_Log("try the 'hostname' command\n");
exit(1);
}
- bzero(tcell.hostAddr, sizeof(tcell.hostAddr)); /* not computed */
- code = afsconf_SetCellInfo(bozo_confdir, AFSDIR_SERVER_ETC_DIRPATH, &tcell);
+ memset(tcell.hostAddr, 0, sizeof(tcell.hostAddr)); /* not computed */
+ code =
+ afsconf_SetCellInfo(bozo_confdir, AFSDIR_SERVER_ETC_DIRPATH,
+ &tcell);
if (code) {
- bozo_Log("could not create cell database in '%s' (code %d), quitting\n", AFSDIR_SERVER_ETC_DIRPATH, code);
+ bozo_Log
+ ("could not create cell database in '%s' (code %d), quitting\n",
+ AFSDIR_SERVER_ETC_DIRPATH, code);
exit(1);
}
tdir = afsconf_Open(AFSDIR_SERVER_ETC_DIRPATH);
if (!tdir) {
- bozo_Log("failed to open newly-created cell database, quitting\n");
+ bozo_Log
+ ("failed to open newly-created cell database, quitting\n");
exit(1);
}
}
+ /* initialize audit user check */
+ osi_audit_set_user_check(tdir, bozo_IsLocalRealmMatch);
+
/* read init file, starting up programs */
- if (code=ReadBozoFile(0)) {
- bozo_Log("bosserver: Something is wrong (%d) with the bos configuration file %s; aborting\n", code, AFSDIR_SERVER_BOZCONF_FILEPATH);
+ if ((code = ReadBozoFile(0))) {
+ bozo_Log
+ ("bosserver: Something is wrong (%d) with the bos configuration file %s; aborting\n",
+ code, AFSDIR_SERVER_BOZCONF_FILEPATH);
exit(code);
}
+ bozo_CreateRxBindFile(host); /* for local scripts */
+
/* opened the cell databse */
bozo_confdir = tdir;
- code = afsconf_GetKey(tdir, 999, &tkey);
/* allow super users to manage RX statistics */
rx_SetRxStatUserOk(bozo_rxstat_userok);
- /* have bcrypt key now */
-
afsconf_SetNoAuthFlag(tdir, noAuth);
+ afsconf_BuildServerSecurityObjects(tdir, &securityClasses, &numClasses);
- bozo_rxsc[0] = (struct rx_securityClass *) rxnull_NewServerSecurityObject();
- bozo_rxsc[1] = (struct rx_securityClass *) 0;
- bozo_rxsc[2] = (struct rx_securityClass *) rxkad_NewServerSecurityObject(
- 0, tdir, afsconf_GetKey, (char *) 0);
-
- /* These two lines disallow jumbograms */
- rx_maxReceiveSize = OLD_MAX_PACKET_SIZE;
- rxi_nSendFrags = rxi_nRecvFrags = 1;
+ if (DoPidFiles) {
+ bozo_CreatePidFile("bosserver", NULL, getpid());
+ }
- tservice = rx_NewService(/* port */ 0, /* service id */ 1,
- /*service name */ "bozo", /* security classes */ bozo_rxsc,
- /* numb sec classes */ 3, BOZO_ExecuteRequest);
+ tservice = rx_NewServiceHost(host, 0, /* service id */ 1,
+ "bozo", securityClasses, numClasses,
+ BOZO_ExecuteRequest);
rx_SetMinProcs(tservice, 2);
rx_SetMaxProcs(tservice, 4);
- rx_SetStackSize(tservice, BOZO_LWP_STACKSIZE); /* so gethostbyname works (in cell stuff) */
+ rx_SetStackSize(tservice, BOZO_LWP_STACKSIZE); /* so gethostbyname works (in cell stuff) */
+ if (rxkadDisableDotCheck) {
+ rx_SetSecurityConfiguration(tservice, RXS_CONFIG_FLAGS,
+ (void *)RXS_CONFIG_FLAGS_DISABLE_DOTCHECK);
+ }
- tservice = rx_NewService(0, RX_STATS_SERVICE_ID, "rpcstats", bozo_rxsc,
- 3, RXSTATS_ExecuteRequest);
+ tservice =
+ rx_NewServiceHost(host, 0, RX_STATS_SERVICE_ID, "rpcstats",
+ securityClasses, numClasses, RXSTATS_ExecuteRequest);
rx_SetMinProcs(tservice, 2);
rx_SetMaxProcs(tservice, 4);
- rx_StartServer(1); /* donate this process */
+ rx_StartServer(1); /* donate this process */
+ return 0;
}
-bozo_Log(a,b,c,d,e,f)
-char *a, *b, *c, *d, *e, *f; {
- char tdate[26];
+void
+bozo_Log(char *format, ...)
+{
+ char tdate[27];
time_t myTime;
+ va_list ap;
+
+ va_start(ap, format);
if (DoSyslog) {
#ifndef AFS_NT40_ENV
- syslog(LOG_INFO, a, b, c, d, e, f);
+ vsyslog(LOG_INFO, format, ap);
#endif
} else {
myTime = time(0);
/* log normally closed, so can be removed */
- bozo_logFile=fopen(AFSDIR_SERVER_BOZLOG_FILEPATH, "a");
- if(bozo_logFile == NULL) {
- printf("bosserver: WARNING: problem with %s", AFSDIR_SERVER_BOZLOG_FILEPATH);
+ bozo_logFile = fopen(AFSDIR_SERVER_BOZLOG_FILEPATH, "a");
+ if (bozo_logFile == NULL) {
+ printf("bosserver: WARNING: problem with %s\n",
+ AFSDIR_SERVER_BOZLOG_FILEPATH);
+ printf("%s ", tdate);
+ vprintf(format, ap);
fflush(stdout);
- }
-
- if (bozo_logFile) {
- fprintf(bozo_logFile, "%s ", tdate);
- fprintf(bozo_logFile, a, b, c, d, e, f);
- fflush(bozo_logFile);
} else {
- printf("%s ", tdate);
- printf(a, b, c, d, e, f);
+ fprintf(bozo_logFile, "%s ", tdate);
+ vfprintf(bozo_logFile, format, ap);
+
+ /* close so rm BosLog works */
+ fclose(bozo_logFile);
}
-
- /* close so rm BosLog works */
- fclose(bozo_logFile);
}
}