xref: /freebsd/contrib/sendmail/src/main.c (revision 6ba2210ee039f2f12878c217bcf058e9c8b26b29)
1 /*
2  * Copyright (c) 1998-2006, 2008, 2009, 2011 Proofpoint, Inc. and its suppliers.
3  *	All rights reserved.
4  * Copyright (c) 1983, 1995-1997 Eric P. Allman.  All rights reserved.
5  * Copyright (c) 1988, 1993
6  *	The Regents of the University of California.  All rights reserved.
7  *
8  * By using this file, you agree to the terms and conditions set
9  * forth in the LICENSE file which can be found at the top level of
10  * the sendmail distribution.
11  *
12  */
13 
14 #define _DEFINE
15 #include <sendmail.h>
16 #include <sm/sendmail.h>
17 #include <sm/xtrap.h>
18 #include <sm/signal.h>
19 #include <tls.h>
20 
21 #ifndef lint
22 SM_UNUSED(static char copyright[]) =
23 "@(#) Copyright (c) 1998-2013 Proofpoint, Inc. and its suppliers.\n\
24 	All rights reserved.\n\
25      Copyright (c) 1983, 1995-1997 Eric P. Allman.  All rights reserved.\n\
26      Copyright (c) 1988, 1993\n\
27 	The Regents of the University of California.  All rights reserved.\n";
28 #endif /* ! lint */
29 
30 SM_RCSID("@(#)$Id: main.c,v 8.988 2013-11-23 02:52:37 gshapiro Exp $")
31 
32 
33 #if NETINET || NETINET6
34 # include <arpa/inet.h>
35 # if DANE
36 #  include "sm_resolve.h"
37 # endif
38 #endif
39 
40 /* for getcfname() */
41 #include <sendmail/pathnames.h>
42 #include <ratectrl.h>
43 
44 static SM_DEBUG_T
45 DebugNoPRestart = SM_DEBUG_INITIALIZER("no_persistent_restart",
46 	"@(#)$Debug: no_persistent_restart - don't restart, log only $");
47 
48 static void	dump_class __P((STAB *, int));
49 static void	obsolete __P((char **));
50 static void	testmodeline __P((char *, ENVELOPE *));
51 static char	*getextenv __P((const char *));
52 static void	sm_printoptions __P((char **));
53 static SIGFUNC_DECL	intindebug __P((int));
54 static SIGFUNC_DECL	sighup __P((int));
55 static SIGFUNC_DECL	sigpipe __P((int));
56 static SIGFUNC_DECL	sigterm __P((int));
57 #ifdef SIGUSR1
58 static SIGFUNC_DECL	sigusr1 __P((int));
59 #endif
60 
61 /*
62 **  SENDMAIL -- Post mail to a set of destinations.
63 **
64 **	This is the basic mail router.  All user mail programs should
65 **	call this routine to actually deliver mail.  Sendmail in
66 **	turn calls a bunch of mail servers that do the real work of
67 **	delivering the mail.
68 **
69 **	Sendmail is driven by settings read in from /etc/mail/sendmail.cf
70 **	(read by readcf.c).
71 **
72 **	Usage:
73 **		/usr/lib/sendmail [flags] addr ...
74 **
75 **		See the associated documentation for details.
76 **
77 **	Authors:
78 **		Eric Allman, UCB/INGRES (until 10/81).
79 **			     Britton-Lee, Inc., purveyors of fine
80 **				database computers (11/81 - 10/88).
81 **			     International Computer Science Institute
82 **				(11/88 - 9/89).
83 **			     UCB/Mammoth Project (10/89 - 7/95).
84 **			     InReference, Inc. (8/95 - 1/97).
85 **			     Sendmail, Inc. (1/98 - 9/13).
86 **		The support of my employers is gratefully acknowledged.
87 **			Few of them (Britton-Lee in particular) have had
88 **			anything to gain from my involvement in this project.
89 **
90 **		Gregory Neil Shapiro,
91 **			Worcester Polytechnic Institute	(until 3/98).
92 **			Sendmail, Inc. (3/98 - 10/13).
93 **			Proofpoint, Inc. (10/13 - present).
94 **
95 **		Claus Assmann,
96 **			Sendmail, Inc. (12/98 - 10/13).
97 **			Proofpoint, Inc. (10/13 - present).
98 */
99 
100 char		*FullName;	/* sender's full name */
101 ENVELOPE	BlankEnvelope;	/* a "blank" envelope */
102 static ENVELOPE	MainEnvelope;	/* the envelope around the basic letter */
103 ADDRESS		NullAddress =	/* a null address */
104 		{ "", "", NULL, "" };
105 char		*CommandLineArgs;	/* command line args for pid file */
106 bool		Warn_Q_option = false;	/* warn about Q option use */
107 static int	MissingFds = 0;	/* bit map of fds missing on startup */
108 char		*Mbdb = "pw";	/* mailbox database defaults to /etc/passwd */
109 
110 #ifdef NGROUPS_MAX
111 GIDSET_T	InitialGidSet[NGROUPS_MAX];
112 #endif
113 
114 #define MAXCONFIGLEVEL	10	/* highest config version level known */
115 
116 #if SASL
117 static sasl_callback_t srvcallbacks[] =
118 {
119 	{	SASL_CB_VERIFYFILE,	(sasl_callback_ft)&safesaslfile,	NULL	},
120 	{	SASL_CB_PROXY_POLICY,	(sasl_callback_ft)&proxy_policy,	NULL	},
121 	{	SASL_CB_LIST_END,	NULL,		NULL	}
122 };
123 #endif /* SASL */
124 
125 unsigned int	SubmitMode;
126 int		SyslogPrefixLen; /* estimated length of syslog prefix */
127 #define PIDLEN		6	/* pid length for computing SyslogPrefixLen */
128 #ifndef SL_FUDGE
129 # define SL_FUDGE	10	/* fudge offset for SyslogPrefixLen */
130 #endif
131 #define SLDLL		8	/* est. length of default syslog label */
132 
133 
134 /* Some options are dangerous to allow users to use in non-submit mode */
135 #define CHECK_AGAINST_OPMODE(cmd)					\
136 {									\
137 	if (extraprivs &&						\
138 	    OpMode != MD_DELIVER && OpMode != MD_SMTP &&		\
139 	    OpMode != MD_ARPAFTP && OpMode != MD_CHECKCONFIG &&		\
140 	    OpMode != MD_VERIFY && OpMode != MD_TEST)			\
141 	{								\
142 		(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,		\
143 				     "WARNING: Ignoring submission mode -%c option (not in submission mode)\n", \
144 		       (cmd));						\
145 		break;							\
146 	}								\
147 	if (extraprivs && queuerun)					\
148 	{								\
149 		(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,		\
150 				     "WARNING: Ignoring submission mode -%c option with -q\n", \
151 		       (cmd));						\
152 		break;							\
153 	}								\
154 }
155 
156 int
157 main(argc, argv, envp)
158 	int argc;
159 	char **argv;
160 	char **envp;
161 {
162 	register char *p;
163 	char **av;
164 	extern char Version[];
165 	char *ep, *from;
166 	STAB *st;
167 	register int i;
168 	int j;
169 	int dp;
170 	int fill_errno;
171 	int qgrp = NOQGRP;		/* queue group to process */
172 	bool safecf = true;
173 	BITMAP256 *p_flags = NULL;	/* daemon flags */
174 	bool warn_C_flag = false;
175 	bool auth = true;		/* whether to set e_auth_param */
176 	char warn_f_flag = '\0';
177 	bool run_in_foreground = false;	/* -bD mode */
178 	bool queuerun = false, debug = false;
179 	struct passwd *pw;
180 	struct hostent *hp;
181 	char *nullserver = NULL;
182 	char *authinfo = NULL;
183 	char *sysloglabel = NULL;	/* label for syslog */
184 	char *conffile = NULL;		/* name of .cf file */
185 	char *queuegroup = NULL;	/* queue group to process */
186 	char *quarantining = NULL;	/* quarantine queue items? */
187 	bool extraprivs;
188 	bool forged, negate;
189 	bool queuepersistent = false;	/* queue runner process runs forever */
190 	bool foregroundqueue = false;	/* queue run in foreground */
191 	bool save_val;			/* to save some bool var. */
192 	int cftype;			/* which cf file to use? */
193 	SM_FILE_T *smdebug;
194 	static time_t starttime = 0;	/* when was process started */
195 	struct stat traf_st;		/* for TrafficLog FIFO check */
196 	char buf[MAXLINE];
197 	char jbuf[MAXHOSTNAMELEN];	/* holds MyHostName */
198 	static char rnamebuf[MAXNAME];	/* holds RealUserName */
199 	char *emptyenviron[1];
200 #if STARTTLS
201 	bool tls_ok;
202 #endif
203 	QUEUE_CHAR *new;
204 	ENVELOPE *e;
205 	extern int DtableSize;
206 	extern int optind;
207 	extern int opterr;
208 	extern char *optarg;
209 	extern char **environ;
210 #if SASL
211 	extern void sm_sasl_init __P((void));
212 #endif
213 
214 #if USE_ENVIRON
215 	envp = environ;
216 #endif
217 
218 	/* turn off profiling */
219 	SM_PROF(0);
220 
221 	/* install default exception handler */
222 	sm_exc_newthread(fatal_error);
223 
224 	/* set the default in/out channel so errors reported to screen */
225 	InChannel = smioin;
226 	OutChannel = smioout;
227 
228 	/*
229 	**  Check to see if we reentered.
230 	**	This would normally happen if e_putheader or e_putbody
231 	**	were NULL when invoked.
232 	*/
233 
234 	if (starttime != 0)
235 	{
236 		syserr("main: reentered!");
237 		abort();
238 	}
239 	starttime = curtime();
240 
241 	/* avoid null pointer dereferences */
242 	TermEscape.te_rv_on = TermEscape.te_under_on = TermEscape.te_normal = "";
243 
244 	RealUid = getuid();
245 	RealGid = getgid();
246 
247 	/* Check if sendmail is running with extra privs */
248 	extraprivs = (RealUid != 0 &&
249 		      (geteuid() != getuid() || getegid() != getgid()));
250 
251 	CurrentPid = getpid();
252 
253 	/* get whatever .cf file is right for the opmode */
254 	cftype = SM_GET_RIGHT_CF;
255 
256 	/* in 4.4BSD, the table can be huge; impose a reasonable limit */
257 	DtableSize = getdtsize();
258 	if (DtableSize > 256)
259 		DtableSize = 256;
260 
261 	/*
262 	**  Be sure we have enough file descriptors.
263 	**	But also be sure that 0, 1, & 2 are open.
264 	*/
265 
266 	/* reset errno and fill_errno; the latter is used way down below */
267 	errno = fill_errno = 0;
268 	fill_fd(STDIN_FILENO, NULL);
269 	if (errno != 0)
270 		fill_errno = errno;
271 	fill_fd(STDOUT_FILENO, NULL);
272 	if (errno != 0)
273 		fill_errno = errno;
274 	fill_fd(STDERR_FILENO, NULL);
275 	if (errno != 0)
276 		fill_errno = errno;
277 
278 	sm_closefrom(STDERR_FILENO + 1, DtableSize);
279 	errno = 0;
280 	smdebug = NULL;
281 
282 #if LOG
283 # ifndef SM_LOG_STR
284 #  define SM_LOG_STR	"sendmail"
285 # endif
286 # ifdef LOG_MAIL
287 	openlog(SM_LOG_STR, LOG_PID, LOG_MAIL);
288 # else
289 	openlog(SM_LOG_STR, LOG_PID);
290 # endif
291 #endif /* LOG */
292 
293 	/*
294 	**  Seed the random number generator.
295 	**  Used for queue file names, picking a queue directory, and
296 	**  MX randomization.
297 	*/
298 
299 	seed_random();
300 
301 	/* do machine-dependent initializations */
302 	init_md(argc, argv);
303 
304 
305 	SyslogPrefixLen = PIDLEN + (MAXQFNAME - 3) + SL_FUDGE + SLDLL;
306 
307 	/* reset status from syserr() calls for missing file descriptors */
308 	Errors = 0;
309 	ExitStat = EX_OK;
310 
311 	SubmitMode = SUBMIT_UNKNOWN;
312 #if _FFR_LOCAL_DAEMON
313 	LocalDaemon = false;
314 # if NETINET6
315 	V6LoopbackAddrFound = false;
316 # endif
317 #endif
318 #if XDEBUG
319 	checkfd012("after openlog");
320 #endif
321 
322 	tTsetup(tTdvect, sizeof(tTdvect), "0-99.1,*_trace_*.1");
323 
324 #ifdef NGROUPS_MAX
325 	/* save initial group set for future checks */
326 	i = getgroups(NGROUPS_MAX, InitialGidSet);
327 	if (i <= 0)
328 	{
329 		InitialGidSet[0] = (GID_T) -1;
330 		i = 0;
331 	}
332 	while (i < NGROUPS_MAX)
333 		InitialGidSet[i++] = InitialGidSet[0];
334 #endif /* NGROUPS_MAX */
335 
336 	/* drop group id privileges (RunAsUser not yet set) */
337 	dp = drop_privileges(false);
338 	setstat(dp);
339 
340 #ifdef SIGUSR1
341 	/* Only allow root (or non-set-*-ID binaries) to use SIGUSR1 */
342 	if (!extraprivs)
343 	{
344 		/* arrange to dump state on user-1 signal */
345 		(void) sm_signal(SIGUSR1, sigusr1);
346 	}
347 	else
348 	{
349 		/* ignore user-1 signal */
350 		(void) sm_signal(SIGUSR1, SIG_IGN);
351 	}
352 #endif /* SIGUSR1 */
353 
354 	/* initialize for setproctitle */
355 	initsetproctitle(argc, argv, envp);
356 
357 	/* Handle any non-getoptable constructions. */
358 	obsolete(argv);
359 
360 	/*
361 	**  Do a quick prescan of the argument list.
362 	*/
363 
364 
365 	/* find initial opMode */
366 	OpMode = MD_DELIVER;
367 	av = argv;
368 	p = strrchr(*av, '/');
369 	if (p++ == NULL)
370 		p = *av;
371 	if (strcmp(p, "newaliases") == 0)
372 		OpMode = MD_INITALIAS;
373 	else if (strcmp(p, "mailq") == 0)
374 		OpMode = MD_PRINT;
375 	else if (strcmp(p, "smtpd") == 0)
376 		OpMode = MD_DAEMON;
377 	else if (strcmp(p, "hoststat") == 0)
378 		OpMode = MD_HOSTSTAT;
379 	else if (strcmp(p, "purgestat") == 0)
380 		OpMode = MD_PURGESTAT;
381 
382 #if defined(__osf__) || defined(_AIX3)
383 # define OPTIONS	"A:B:b:C:cD:d:e:F:f:Gh:IiL:M:mN:nO:o:p:Q:q:R:r:sTtV:vX:x"
384 #endif /* defined(__osf__) || defined(_AIX3) */
385 #if defined(sony_news)
386 # define OPTIONS	"A:B:b:C:cD:d:E:e:F:f:Gh:IiJ:L:M:mN:nO:o:p:Q:q:R:r:sTtV:vX:"
387 #endif /* defined(sony_news) */
388 #ifndef OPTIONS
389 # define OPTIONS	"A:B:b:C:cD:d:e:F:f:Gh:IiL:M:mN:nO:o:p:Q:q:R:r:sTtV:vX:"
390 #endif
391 
392 	/* Set to 0 to allow -b; need to check optarg before using it! */
393 	opterr = 0;
394 	while ((j = getopt(argc, argv, OPTIONS)) != -1)
395 	{
396 		switch (j)
397 		{
398 		  case 'b':	/* operations mode */
399 			j = (optarg == NULL) ? ' ' : *optarg;
400 			switch (j)
401 			{
402 			  case MD_DAEMON:
403 			  case MD_FGDAEMON:
404 			  case MD_SMTP:
405 			  case MD_INITALIAS:
406 			  case MD_DELIVER:
407 			  case MD_VERIFY:
408 			  case MD_TEST:
409 			  case MD_PRINT:
410 			  case MD_PRINTNQE:
411 			  case MD_HOSTSTAT:
412 			  case MD_PURGESTAT:
413 			  case MD_ARPAFTP:
414 			  case MD_CHECKCONFIG:
415 				OpMode = j;
416 				break;
417 
418 #if _FFR_LOCAL_DAEMON
419 			  case MD_LOCAL:
420 				OpMode = MD_DAEMON;
421 				LocalDaemon = true;
422 				break;
423 #endif /* _FFR_LOCAL_DAEMON */
424 
425 			  case MD_FREEZE:
426 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
427 						     "Frozen configurations unsupported\n");
428 				return EX_USAGE;
429 
430 			  default:
431 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
432 						     "Invalid operation mode %c\n",
433 						     j);
434 				return EX_USAGE;
435 			}
436 			break;
437 
438 		  case 'D':
439 			if (debug)
440 			{
441 				errno = 0;
442 				syserr("-D file must be before -d");
443 				ExitStat = EX_USAGE;
444 				break;
445 			}
446 			dp = drop_privileges(true);
447 			setstat(dp);
448 			smdebug = sm_io_open(SmFtStdio, SM_TIME_DEFAULT,
449 					    optarg, SM_IO_APPEND, NULL);
450 			if (smdebug == NULL)
451 			{
452 				syserr("cannot open %s", optarg);
453 				ExitStat = EX_CANTCREAT;
454 				break;
455 			}
456 			sm_debug_setfile(smdebug);
457 			break;
458 
459 		  case 'd':
460 			debug = true;
461 			tTflag(optarg);
462 			(void) sm_io_setvbuf(sm_debug_file(), SM_TIME_DEFAULT,
463 					     (char *) NULL, SM_IO_NBF,
464 					     SM_IO_BUFSIZ);
465 			break;
466 
467 		  case 'G':	/* relay (gateway) submission */
468 			SubmitMode = SUBMIT_MTA;
469 			break;
470 
471 		  case 'L':
472 			if (optarg == NULL)
473 			{
474 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
475 						     "option requires an argument -- '%c'",
476 						     (char) j);
477 				return EX_USAGE;
478 			}
479 			j = SM_MIN(strlen(optarg), 32) + 1;
480 			sysloglabel = xalloc(j);
481 			(void) sm_strlcpy(sysloglabel, optarg, j);
482 			SyslogPrefixLen = PIDLEN + (MAXQFNAME - 3) +
483 					  SL_FUDGE + j;
484 			break;
485 
486 		  case 'Q':
487 		  case 'q':
488 			/* just check if it is there */
489 			queuerun = true;
490 			break;
491 		}
492 	}
493 	opterr = 1;
494 
495 	/* Don't leak queue information via debug flags */
496 	if (extraprivs && queuerun && debug)
497 	{
498 		(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
499 				     "WARNING: Can not use -d with -q.  Disabling debugging.\n");
500 		sm_debug_close();
501 		sm_debug_setfile(NULL);
502 		(void) memset(tTdvect, '\0', sizeof(tTdvect));
503 	}
504 
505 #if LOG
506 	if (sysloglabel != NULL)
507 	{
508 		/* Sanitize the string */
509 		for (p = sysloglabel; *p != '\0'; p++)
510 		{
511 			if (!isascii(*p) || !isprint(*p) || *p == '%')
512 				*p = '*';
513 		}
514 		closelog();
515 # ifdef LOG_MAIL
516 		openlog(sysloglabel, LOG_PID, LOG_MAIL);
517 # else
518 		openlog(sysloglabel, LOG_PID);
519 # endif
520 	}
521 #endif /* LOG */
522 
523 	/* set up the blank envelope */
524 	BlankEnvelope.e_puthdr = putheader;
525 	BlankEnvelope.e_putbody = putbody;
526 	BlankEnvelope.e_xfp = NULL;
527 	STRUCTCOPY(NullAddress, BlankEnvelope.e_from);
528 	CurEnv = &BlankEnvelope;
529 	STRUCTCOPY(NullAddress, MainEnvelope.e_from);
530 
531 	/*
532 	**  Set default values for variables.
533 	**	These cannot be in initialized data space.
534 	*/
535 
536 	setdefaults(&BlankEnvelope);
537 	initmacros(&BlankEnvelope);
538 
539 	/* reset macro */
540 	set_op_mode(OpMode);
541 	if (OpMode == MD_DAEMON)
542 		DaemonPid = CurrentPid;	/* needed for finis() to work */
543 
544 	pw = sm_getpwuid(RealUid);
545 	if (pw != NULL)
546 		(void) sm_strlcpy(rnamebuf, pw->pw_name, sizeof(rnamebuf));
547 	else
548 		(void) sm_snprintf(rnamebuf, sizeof(rnamebuf), "Unknown UID %d",
549 				   (int) RealUid);
550 
551 	RealUserName = rnamebuf;
552 
553 	if (tTd(0, 101))
554 	{
555 		sm_dprintf("Version %s\n", Version);
556 		finis(false, true, EX_OK);
557 		/* NOTREACHED */
558 	}
559 
560 	/*
561 	**  if running non-set-user-ID binary as non-root, pretend
562 	**  we are the RunAsUid
563 	*/
564 
565 	if (RealUid != 0 && geteuid() == RealUid)
566 	{
567 		if (tTd(47, 1))
568 			sm_dprintf("Non-set-user-ID binary: RunAsUid = RealUid = %d\n",
569 				   (int) RealUid);
570 		RunAsUid = RealUid;
571 	}
572 	else if (geteuid() != 0)
573 		RunAsUid = geteuid();
574 
575 	EffGid = getegid();
576 	if (RealUid != 0 && EffGid == RealGid)
577 		RunAsGid = RealGid;
578 
579 	if (tTd(47, 5))
580 	{
581 		sm_dprintf("main: e/ruid = %d/%d e/rgid = %d/%d\n",
582 			   (int) geteuid(), (int) getuid(),
583 			   (int) getegid(), (int) getgid());
584 		sm_dprintf("main: RunAsUser = %d:%d\n",
585 			   (int) RunAsUid, (int) RunAsGid);
586 	}
587 
588 	/* save command line arguments */
589 	j = 0;
590 	for (av = argv; *av != NULL; )
591 		j += strlen(*av++) + 1;
592 	SaveArgv = (char **) xalloc(sizeof(char *) * (argc + 1));
593 	CommandLineArgs = xalloc(j);
594 	p = CommandLineArgs;
595 	for (av = argv, i = 0; *av != NULL; )
596 	{
597 		int h;
598 
599 		SaveArgv[i++] = newstr(*av);
600 		if (av != argv)
601 			*p++ = ' ';
602 		(void) sm_strlcpy(p, *av++, j);
603 		h = strlen(p);
604 		p += h;
605 		j -= h + 1;
606 	}
607 	SaveArgv[i] = NULL;
608 
609 	if (tTd(0, 1))
610 	{
611 		extern char *CompileOptions[];
612 
613 		sm_dprintf("Version %s\n Compiled with:", Version);
614 		sm_printoptions(CompileOptions);
615 	}
616 	if (tTd(0, 10))
617 	{
618 		extern char *OsCompileOptions[];
619 
620 		sm_dprintf("    OS Defines:");
621 		sm_printoptions(OsCompileOptions);
622 #ifdef _PATH_UNIX
623 		sm_dprintf("Kernel symbols:\t%s\n", _PATH_UNIX);
624 #endif
625 
626 		sm_dprintf("     Conf file:\t%s (default for MSP)\n",
627 			   getcfname(OpMode, SubmitMode, SM_GET_SUBMIT_CF,
628 				     conffile));
629 		sm_dprintf("     Conf file:\t%s (default for MTA)\n",
630 			   getcfname(OpMode, SubmitMode, SM_GET_SENDMAIL_CF,
631 				     conffile));
632 		sm_dprintf("      Pid file:\t%s (default)\n", PidFile);
633 	}
634 
635 	if (tTd(0, 12))
636 	{
637 		extern char *SmCompileOptions[];
638 
639 		sm_dprintf(" libsm Defines:");
640 		sm_printoptions(SmCompileOptions);
641 	}
642 
643 	if (tTd(0, 13))
644 	{
645 		extern char *FFRCompileOptions[];
646 
647 		sm_dprintf("   FFR Defines:");
648 		sm_printoptions(FFRCompileOptions);
649 	}
650 
651 #if STARTTLS
652 	if (tTd(0, 14))
653 	{
654 		/* exit(EX_CONFIG) if different? */
655 		sm_dprintf("       OpenSSL: compiled 0x%08x\n",
656 			   (uint) OPENSSL_VERSION_NUMBER);
657 		sm_dprintf("       OpenSSL: linked   0x%08x\n",
658 			   (uint) TLS_version_num());
659 	}
660 #endif /* STARTTLS */
661 
662 	/* clear sendmail's environment */
663 	ExternalEnviron = environ;
664 	emptyenviron[0] = NULL;
665 	environ = emptyenviron;
666 
667 	/*
668 	**  restore any original TZ setting until TimeZoneSpec has been
669 	**  determined - or early log messages may get bogus time stamps
670 	*/
671 
672 	if ((p = getextenv("TZ")) != NULL)
673 	{
674 		char *tz;
675 		int tzlen;
676 
677 		/* XXX check for reasonable length? */
678 		tzlen = strlen(p) + 4;
679 		tz = xalloc(tzlen);
680 		(void) sm_strlcpyn(tz, tzlen, 2, "TZ=", p);
681 
682 		/* XXX check return code? */
683 		(void) putenv(tz);
684 	}
685 
686 	/* prime the child environment */
687 	sm_setuserenv("AGENT", "sendmail");
688 
689 	(void) sm_signal(SIGPIPE, SIG_IGN);
690 	OldUmask = umask(022);
691 	FullName = getextenv("NAME");
692 	if (FullName != NULL)
693 		FullName = newstr(FullName);
694 
695 	/*
696 	**  Initialize name server if it is going to be used.
697 	*/
698 
699 #if NAMED_BIND
700 	if (!bitset(RES_INIT, _res.options))
701 		(void) res_init();
702 	if (tTd(8, 8))
703 		_res.options |= RES_DEBUG;
704 	else
705 		_res.options &= ~RES_DEBUG;
706 # ifdef RES_NOALIASES
707 	_res.options |= RES_NOALIASES;
708 # endif
709 	TimeOuts.res_retry[RES_TO_DEFAULT] = _res.retry;
710 	TimeOuts.res_retry[RES_TO_FIRST] = _res.retry;
711 	TimeOuts.res_retry[RES_TO_NORMAL] = _res.retry;
712 	TimeOuts.res_retrans[RES_TO_DEFAULT] = _res.retrans;
713 	TimeOuts.res_retrans[RES_TO_FIRST] = _res.retrans;
714 	TimeOuts.res_retrans[RES_TO_NORMAL] = _res.retrans;
715 #endif /* NAMED_BIND */
716 
717 	errno = 0;
718 	from = NULL;
719 
720 	/* initialize some macros, etc. */
721 	init_vendor_macros(&BlankEnvelope);
722 
723 	/* version */
724 	macdefine(&BlankEnvelope.e_macro, A_PERM, 'v', Version);
725 
726 	/* hostname */
727 	hp = myhostname(jbuf, sizeof(jbuf));
728 	if (jbuf[0] != '\0')
729 	{
730 		struct utsname utsname;
731 
732 		if (tTd(0, 4))
733 			sm_dprintf("Canonical name: %s\n", jbuf);
734 		macdefine(&BlankEnvelope.e_macro, A_TEMP, 'w', jbuf);
735 		macdefine(&BlankEnvelope.e_macro, A_TEMP, 'j', jbuf);
736 		setclass('w', jbuf);
737 
738 		p = strchr(jbuf, '.');
739 		if (p != NULL && p[1] != '\0')
740 			macdefine(&BlankEnvelope.e_macro, A_TEMP, 'm', &p[1]);
741 
742 		if (uname(&utsname) >= 0)
743 			p = utsname.nodename;
744 		else
745 		{
746 			if (tTd(0, 22))
747 				sm_dprintf("uname failed (%s)\n",
748 					   sm_errstring(errno));
749 			makelower(jbuf);
750 			p = jbuf;
751 		}
752 		if (tTd(0, 4))
753 			sm_dprintf(" UUCP nodename: %s\n", p);
754 		macdefine(&BlankEnvelope.e_macro, A_TEMP, 'k', p);
755 		setclass('k', p);
756 		setclass('w', p);
757 	}
758 	if (hp != NULL)
759 	{
760 		for (av = hp->h_aliases; av != NULL && *av != NULL; av++)
761 		{
762 			if (tTd(0, 4))
763 				sm_dprintf("\ta.k.a.: %s\n", *av);
764 			setclass('w', *av);
765 		}
766 #if NETINET || NETINET6
767 		for (i = 0; i >= 0 && hp->h_addr_list[i] != NULL; i++)
768 		{
769 # if NETINET6
770 			char *addr;
771 			char buf6[INET6_ADDRSTRLEN];
772 			struct in6_addr ia6;
773 # endif /* NETINET6 */
774 # if NETINET
775 			struct in_addr ia;
776 # endif
777 			char ipbuf[103];
778 
779 			ipbuf[0] = '\0';
780 			switch (hp->h_addrtype)
781 			{
782 # if NETINET
783 			  case AF_INET:
784 				if (hp->h_length != INADDRSZ)
785 					break;
786 
787 				memmove(&ia, hp->h_addr_list[i], INADDRSZ);
788 				(void) sm_snprintf(ipbuf, sizeof(ipbuf),
789 						   "[%.100s]", inet_ntoa(ia));
790 				break;
791 # endif /* NETINET */
792 
793 # if NETINET6
794 			  case AF_INET6:
795 				if (hp->h_length != IN6ADDRSZ)
796 					break;
797 
798 				memmove(&ia6, hp->h_addr_list[i], IN6ADDRSZ);
799 				addr = anynet_ntop(&ia6, buf6, sizeof(buf6));
800 				if (addr != NULL)
801 					(void) sm_snprintf(ipbuf, sizeof(ipbuf),
802 							   "[%.100s]", addr);
803 				break;
804 # endif /* NETINET6 */
805 			}
806 			if (ipbuf[0] == '\0')
807 				break;
808 
809 			if (tTd(0, 4))
810 				sm_dprintf("\ta.k.a.: %s\n", ipbuf);
811 			setclass('w', ipbuf);
812 		}
813 #endif /* NETINET || NETINET6 */
814 #if NETINET6
815 		freehostent(hp);
816 		hp = NULL;
817 #endif
818 	}
819 
820 	/* current time */
821 	macdefine(&BlankEnvelope.e_macro, A_TEMP, 'b', arpadate((char *) NULL));
822 
823 	/* current load average */
824 	sm_getla();
825 
826 	QueueLimitRecipient = (QUEUE_CHAR *) NULL;
827 	QueueLimitSender = (QUEUE_CHAR *) NULL;
828 	QueueLimitId = (QUEUE_CHAR *) NULL;
829 	QueueLimitQuarantine = (QUEUE_CHAR *) NULL;
830 
831 	/*
832 	**  Crack argv.
833 	*/
834 
835 	optind = 1;
836 	while ((j = getopt(argc, argv, OPTIONS)) != -1)
837 	{
838 		switch (j)
839 		{
840 		  case 'b':	/* operations mode */
841 			/* already done */
842 			break;
843 
844 		  case 'A':	/* use Alternate sendmail/submit.cf */
845 			cftype = optarg[0] == 'c' ? SM_GET_SUBMIT_CF
846 						  : SM_GET_SENDMAIL_CF;
847 			break;
848 
849 		  case 'B':	/* body type */
850 			CHECK_AGAINST_OPMODE(j);
851 			BlankEnvelope.e_bodytype = newstr(optarg);
852 			break;
853 
854 		  case 'C':	/* select configuration file (already done) */
855 			if (RealUid != 0)
856 				warn_C_flag = true;
857 			conffile = newstr(optarg);
858 			dp = drop_privileges(true);
859 			setstat(dp);
860 			safecf = false;
861 			break;
862 
863 		  case 'D':
864 		  case 'd':	/* debugging */
865 			/* already done */
866 			break;
867 
868 		  case 'f':	/* from address */
869 		  case 'r':	/* obsolete -f flag */
870 			CHECK_AGAINST_OPMODE(j);
871 			if (from != NULL)
872 			{
873 				usrerr("More than one \"from\" person");
874 				ExitStat = EX_USAGE;
875 				break;
876 			}
877 			if (optarg[0] == '\0')
878 				from = newstr("<>");
879 			else
880 				from = newstr(denlstring(optarg, true, true));
881 			if (strcmp(RealUserName, from) != 0)
882 				warn_f_flag = j;
883 			break;
884 
885 		  case 'F':	/* set full name */
886 			CHECK_AGAINST_OPMODE(j);
887 			FullName = newstr(optarg);
888 			break;
889 
890 		  case 'G':	/* relay (gateway) submission */
891 			/* already set */
892 			CHECK_AGAINST_OPMODE(j);
893 			break;
894 
895 		  case 'h':	/* hop count */
896 			CHECK_AGAINST_OPMODE(j);
897 			BlankEnvelope.e_hopcount = (short) strtol(optarg, &ep,
898 								  10);
899 			(void) sm_snprintf(buf, sizeof(buf), "%d",
900 					   BlankEnvelope.e_hopcount);
901 			macdefine(&BlankEnvelope.e_macro, A_TEMP, 'c', buf);
902 
903 			if (*ep)
904 			{
905 				usrerr("Bad hop count (%s)", optarg);
906 				ExitStat = EX_USAGE;
907 			}
908 			break;
909 
910 		  case 'L':	/* program label */
911 			/* already set */
912 			break;
913 
914 		  case 'n':	/* don't alias */
915 			CHECK_AGAINST_OPMODE(j);
916 			NoAlias = true;
917 			break;
918 
919 		  case 'N':	/* delivery status notifications */
920 			CHECK_AGAINST_OPMODE(j);
921 			DefaultNotify |= QHASNOTIFY;
922 			macdefine(&BlankEnvelope.e_macro, A_TEMP,
923 				macid("{dsn_notify}"), optarg);
924 			if (sm_strcasecmp(optarg, "never") == 0)
925 				break;
926 			for (p = optarg; p != NULL; optarg = p)
927 			{
928 				p = strchr(p, ',');
929 				if (p != NULL)
930 					*p++ = '\0';
931 				if (sm_strcasecmp(optarg, "success") == 0)
932 					DefaultNotify |= QPINGONSUCCESS;
933 				else if (sm_strcasecmp(optarg, "failure") == 0)
934 					DefaultNotify |= QPINGONFAILURE;
935 				else if (sm_strcasecmp(optarg, "delay") == 0)
936 					DefaultNotify |= QPINGONDELAY;
937 				else
938 				{
939 					usrerr("Invalid -N argument");
940 					ExitStat = EX_USAGE;
941 				}
942 			}
943 			break;
944 
945 		  case 'o':	/* set option */
946 			setoption(*optarg, optarg + 1, false, true,
947 				  &BlankEnvelope);
948 			break;
949 
950 		  case 'O':	/* set option (long form) */
951 			setoption(' ', optarg, false, true, &BlankEnvelope);
952 			break;
953 
954 		  case 'p':	/* set protocol */
955 			CHECK_AGAINST_OPMODE(j);
956 			p = strchr(optarg, ':');
957 			if (p != NULL)
958 			{
959 				*p++ = '\0';
960 				if (*p != '\0')
961 				{
962 					i = strlen(p) + 1;
963 					ep = sm_malloc_x(i);
964 					cleanstrcpy(ep, p, i);
965 					macdefine(&BlankEnvelope.e_macro,
966 						  A_HEAP, 's', ep);
967 				}
968 			}
969 			if (*optarg != '\0')
970 			{
971 				i = strlen(optarg) + 1;
972 				ep = sm_malloc_x(i);
973 				cleanstrcpy(ep, optarg, i);
974 				macdefine(&BlankEnvelope.e_macro, A_HEAP,
975 					  'r', ep);
976 			}
977 			break;
978 
979 		  case 'Q':	/* change quarantining on queued items */
980 			/* sanity check */
981 			if (OpMode != MD_DELIVER &&
982 			    OpMode != MD_QUEUERUN)
983 			{
984 				usrerr("Can not use -Q with -b%c", OpMode);
985 				ExitStat = EX_USAGE;
986 				break;
987 			}
988 
989 			if (OpMode == MD_DELIVER)
990 				set_op_mode(MD_QUEUERUN);
991 
992 			FullName = NULL;
993 
994 			quarantining = newstr(optarg);
995 			break;
996 
997 		  case 'q':	/* run queue files at intervals */
998 			/* sanity check */
999 			if (OpMode != MD_DELIVER &&
1000 			    OpMode != MD_DAEMON &&
1001 			    OpMode != MD_FGDAEMON &&
1002 			    OpMode != MD_PRINT &&
1003 			    OpMode != MD_PRINTNQE &&
1004 			    OpMode != MD_QUEUERUN)
1005 			{
1006 				usrerr("Can not use -q with -b%c", OpMode);
1007 				ExitStat = EX_USAGE;
1008 				break;
1009 			}
1010 
1011 			/* don't override -bd, -bD or -bp */
1012 			if (OpMode == MD_DELIVER)
1013 				set_op_mode(MD_QUEUERUN);
1014 
1015 			FullName = NULL;
1016 			negate = optarg[0] == '!';
1017 			if (negate)
1018 			{
1019 				/* negate meaning of pattern match */
1020 				optarg++; /* skip '!' for next switch */
1021 			}
1022 
1023 			switch (optarg[0])
1024 			{
1025 			  case 'G': /* Limit by queue group name */
1026 				if (negate)
1027 				{
1028 					usrerr("Can not use -q!G");
1029 					ExitStat = EX_USAGE;
1030 					break;
1031 				}
1032 				if (queuegroup != NULL)
1033 				{
1034 					usrerr("Can not use multiple -qG options");
1035 					ExitStat = EX_USAGE;
1036 					break;
1037 				}
1038 				queuegroup = newstr(&optarg[1]);
1039 				break;
1040 
1041 			  case 'I': /* Limit by ID */
1042 				new = (QUEUE_CHAR *) xalloc(sizeof(*new));
1043 				new->queue_match = newstr(&optarg[1]);
1044 				new->queue_negate = negate;
1045 				new->queue_next = QueueLimitId;
1046 				QueueLimitId = new;
1047 				break;
1048 
1049 			  case 'R': /* Limit by recipient */
1050 				new = (QUEUE_CHAR *) xalloc(sizeof(*new));
1051 				new->queue_match = newstr(&optarg[1]);
1052 				new->queue_negate = negate;
1053 				new->queue_next = QueueLimitRecipient;
1054 				QueueLimitRecipient = new;
1055 				break;
1056 
1057 			  case 'S': /* Limit by sender */
1058 				new = (QUEUE_CHAR *) xalloc(sizeof(*new));
1059 				new->queue_match = newstr(&optarg[1]);
1060 				new->queue_negate = negate;
1061 				new->queue_next = QueueLimitSender;
1062 				QueueLimitSender = new;
1063 				break;
1064 
1065 			  case 'f': /* foreground queue run */
1066 				foregroundqueue  = true;
1067 				break;
1068 
1069 			  case 'Q': /* Limit by quarantine message */
1070 				if (optarg[1] != '\0')
1071 				{
1072 					new = (QUEUE_CHAR *) xalloc(sizeof(*new));
1073 					new->queue_match = newstr(&optarg[1]);
1074 					new->queue_negate = negate;
1075 					new->queue_next = QueueLimitQuarantine;
1076 					QueueLimitQuarantine = new;
1077 				}
1078 				QueueMode = QM_QUARANTINE;
1079 				break;
1080 
1081 			  case 'L': /* act on lost items */
1082 				QueueMode = QM_LOST;
1083 				break;
1084 
1085 			  case 'p': /* Persistent queue */
1086 				queuepersistent = true;
1087 				if (QueueIntvl == 0)
1088 					QueueIntvl = 1;
1089 				if (optarg[1] == '\0')
1090 					break;
1091 				++optarg;
1092 				/* FALLTHROUGH */
1093 
1094 			  default:
1095 				i = Errors;
1096 				QueueIntvl = convtime(optarg, 'm');
1097 				if (QueueIntvl < 0)
1098 				{
1099 					usrerr("Invalid -q value");
1100 					ExitStat = EX_USAGE;
1101 				}
1102 
1103 				/* check for bad conversion */
1104 				if (i < Errors)
1105 					ExitStat = EX_USAGE;
1106 				break;
1107 			}
1108 			break;
1109 
1110 		  case 'R':	/* DSN RET: what to return */
1111 			CHECK_AGAINST_OPMODE(j);
1112 			if (bitset(EF_RET_PARAM, BlankEnvelope.e_flags))
1113 			{
1114 				usrerr("Duplicate -R flag");
1115 				ExitStat = EX_USAGE;
1116 				break;
1117 			}
1118 			BlankEnvelope.e_flags |= EF_RET_PARAM;
1119 			if (sm_strcasecmp(optarg, "hdrs") == 0)
1120 				BlankEnvelope.e_flags |= EF_NO_BODY_RETN;
1121 			else if (sm_strcasecmp(optarg, "full") != 0)
1122 			{
1123 				usrerr("Invalid -R value");
1124 				ExitStat = EX_USAGE;
1125 			}
1126 			macdefine(&BlankEnvelope.e_macro, A_TEMP,
1127 				  macid("{dsn_ret}"), optarg);
1128 			break;
1129 
1130 		  case 't':	/* read recipients from message */
1131 			CHECK_AGAINST_OPMODE(j);
1132 			GrabTo = true;
1133 			break;
1134 
1135 		  case 'V':	/* DSN ENVID: set "original" envelope id */
1136 			CHECK_AGAINST_OPMODE(j);
1137 			if (!xtextok(optarg))
1138 			{
1139 				usrerr("Invalid syntax in -V flag");
1140 				ExitStat = EX_USAGE;
1141 			}
1142 			else
1143 			{
1144 				BlankEnvelope.e_envid = newstr(optarg);
1145 				macdefine(&BlankEnvelope.e_macro, A_TEMP,
1146 					  macid("{dsn_envid}"), optarg);
1147 			}
1148 			break;
1149 
1150 		  case 'X':	/* traffic log file */
1151 			dp = drop_privileges(true);
1152 			setstat(dp);
1153 			if (stat(optarg, &traf_st) == 0 &&
1154 			    S_ISFIFO(traf_st.st_mode))
1155 				TrafficLogFile = sm_io_open(SmFtStdio,
1156 							    SM_TIME_DEFAULT,
1157 							    optarg,
1158 							    SM_IO_WRONLY, NULL);
1159 			else
1160 				TrafficLogFile = sm_io_open(SmFtStdio,
1161 							    SM_TIME_DEFAULT,
1162 							    optarg,
1163 							    SM_IO_APPEND, NULL);
1164 			if (TrafficLogFile == NULL)
1165 			{
1166 				syserr("cannot open %s", optarg);
1167 				ExitStat = EX_CANTCREAT;
1168 				break;
1169 			}
1170 			(void) sm_io_setvbuf(TrafficLogFile, SM_TIME_DEFAULT,
1171 					     NULL, SM_IO_LBF, 0);
1172 			break;
1173 
1174 			/* compatibility flags */
1175 		  case 'c':	/* connect to non-local mailers */
1176 		  case 'i':	/* don't let dot stop me */
1177 		  case 'm':	/* send to me too */
1178 		  case 'T':	/* set timeout interval */
1179 		  case 'v':	/* give blow-by-blow description */
1180 			setoption(j, "T", false, true, &BlankEnvelope);
1181 			break;
1182 
1183 		  case 'e':	/* error message disposition */
1184 		  case 'M':	/* define macro */
1185 			setoption(j, optarg, false, true, &BlankEnvelope);
1186 			break;
1187 
1188 		  case 's':	/* save From lines in headers */
1189 			setoption('f', "T", false, true, &BlankEnvelope);
1190 			break;
1191 
1192 #ifdef DBM
1193 		  case 'I':	/* initialize alias DBM file */
1194 			set_op_mode(MD_INITALIAS);
1195 			break;
1196 #endif /* DBM */
1197 
1198 #if defined(__osf__) || defined(_AIX3)
1199 		  case 'x':	/* random flag that OSF/1 & AIX mailx passes */
1200 			break;
1201 #endif
1202 #if defined(sony_news)
1203 		  case 'E':
1204 		  case 'J':	/* ignore flags for Japanese code conversion
1205 				   implemented on Sony NEWS */
1206 			break;
1207 #endif /* defined(sony_news) */
1208 
1209 		  default:
1210 			finis(true, true, EX_USAGE);
1211 			/* NOTREACHED */
1212 			break;
1213 		}
1214 	}
1215 
1216 	/* if we've had errors so far, exit now */
1217 	if ((ExitStat != EX_OK && OpMode != MD_TEST && OpMode != MD_CHECKCONFIG) ||
1218 	    ExitStat == EX_OSERR)
1219 	{
1220 		finis(false, true, ExitStat);
1221 		/* NOTREACHED */
1222 	}
1223 
1224 	if (bitset(SUBMIT_MTA, SubmitMode))
1225 	{
1226 		/* If set daemon_flags on command line, don't reset it */
1227 		if (macvalue(macid("{daemon_flags}"), &BlankEnvelope) == NULL)
1228 			macdefine(&BlankEnvelope.e_macro, A_PERM,
1229 				  macid("{daemon_flags}"), "CC f");
1230 	}
1231 	else if (OpMode == MD_DELIVER || OpMode == MD_SMTP)
1232 	{
1233 		SubmitMode = SUBMIT_MSA;
1234 
1235 		/* If set daemon_flags on command line, don't reset it */
1236 		if (macvalue(macid("{daemon_flags}"), &BlankEnvelope) == NULL)
1237 			macdefine(&BlankEnvelope.e_macro, A_PERM,
1238 				  macid("{daemon_flags}"), "c u");
1239 	}
1240 
1241 	/*
1242 	**  Do basic initialization.
1243 	**	Read system control file.
1244 	**	Extract special fields for local use.
1245 	*/
1246 
1247 #if XDEBUG
1248 	checkfd012("before readcf");
1249 #endif
1250 	vendor_pre_defaults(&BlankEnvelope);
1251 
1252 	readcf(getcfname(OpMode, SubmitMode, cftype, conffile),
1253 			 safecf, &BlankEnvelope);
1254 #if !defined(_USE_SUN_NSSWITCH_) && !defined(_USE_DEC_SVC_CONF_)
1255 	ConfigFileRead = true;
1256 #endif
1257 	vendor_post_defaults(&BlankEnvelope);
1258 
1259 	/* now we can complain about missing fds */
1260 	if (MissingFds != 0 && LogLevel > 8)
1261 	{
1262 		char mbuf[MAXLINE];
1263 
1264 		mbuf[0] = '\0';
1265 		if (bitset(1 << STDIN_FILENO, MissingFds))
1266 			(void) sm_strlcat(mbuf, ", stdin", sizeof(mbuf));
1267 		if (bitset(1 << STDOUT_FILENO, MissingFds))
1268 			(void) sm_strlcat(mbuf, ", stdout", sizeof(mbuf));
1269 		if (bitset(1 << STDERR_FILENO, MissingFds))
1270 			(void) sm_strlcat(mbuf, ", stderr", sizeof(mbuf));
1271 
1272 		/* Notice: fill_errno is from high above: fill_fd() */
1273 		sm_syslog(LOG_WARNING, NOQID,
1274 			  "File descriptors missing on startup: %s; %s",
1275 			  &mbuf[2], sm_errstring(fill_errno));
1276 	}
1277 
1278 	/* Remove the ability for a normal user to send signals */
1279 	if (RealUid != 0 && RealUid != geteuid())
1280 	{
1281 		uid_t new_uid = geteuid();
1282 
1283 #if HASSETREUID
1284 		/*
1285 		**  Since we can differentiate between uid and euid,
1286 		**  make the uid a different user so the real user
1287 		**  can't send signals.  However, it doesn't need to be
1288 		**  root (euid has root).
1289 		*/
1290 
1291 		if (new_uid == 0)
1292 			new_uid = DefUid;
1293 		if (tTd(47, 5))
1294 			sm_dprintf("Changing real uid to %d\n", (int) new_uid);
1295 		if (setreuid(new_uid, geteuid()) < 0)
1296 		{
1297 			syserr("main: setreuid(%d, %d) failed",
1298 			       (int) new_uid, (int) geteuid());
1299 			finis(false, true, EX_OSERR);
1300 			/* NOTREACHED */
1301 		}
1302 		if (tTd(47, 10))
1303 			sm_dprintf("Now running as e/ruid %d:%d\n",
1304 				   (int) geteuid(), (int) getuid());
1305 #else /* HASSETREUID */
1306 		/*
1307 		**  Have to change both effective and real so need to
1308 		**  change them both to effective to keep privs.
1309 		*/
1310 
1311 		if (tTd(47, 5))
1312 			sm_dprintf("Changing uid to %d\n", (int) new_uid);
1313 		if (setuid(new_uid) < 0)
1314 		{
1315 			syserr("main: setuid(%d) failed", (int) new_uid);
1316 			finis(false, true, EX_OSERR);
1317 			/* NOTREACHED */
1318 		}
1319 		if (tTd(47, 10))
1320 			sm_dprintf("Now running as e/ruid %d:%d\n",
1321 				   (int) geteuid(), (int) getuid());
1322 #endif /* HASSETREUID */
1323 	}
1324 
1325 #if NAMED_BIND
1326 	if (FallbackMX != NULL)
1327 		(void) getfallbackmxrr(FallbackMX);
1328 #endif
1329 
1330 	if (SuperSafe == SAFE_INTERACTIVE && !SM_IS_INTERACTIVE(CurEnv->e_sendmode))
1331 	{
1332 		(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
1333 				     "WARNING: SuperSafe=interactive should only be used with\n         DeliveryMode=interactive\n");
1334 	}
1335 
1336 	if (UseMSP && (OpMode == MD_DAEMON || OpMode == MD_FGDAEMON))
1337 	{
1338 		usrerr("Mail submission program cannot be used as daemon");
1339 		finis(false, true, EX_USAGE);
1340 	}
1341 
1342 	if (OpMode == MD_DELIVER || OpMode == MD_SMTP ||
1343 	    OpMode == MD_QUEUERUN || OpMode == MD_ARPAFTP ||
1344 	    OpMode == MD_DAEMON || OpMode == MD_FGDAEMON)
1345 		makeworkgroups();
1346 
1347 	/* set up the basic signal handlers */
1348 	if (sm_signal(SIGINT, SIG_IGN) != SIG_IGN)
1349 		(void) sm_signal(SIGINT, intsig);
1350 	(void) sm_signal(SIGTERM, intsig);
1351 
1352 	/* Enforce use of local time (null string overrides this) */
1353 	if (TimeZoneSpec == NULL)
1354 		unsetenv("TZ");
1355 	else if (TimeZoneSpec[0] != '\0')
1356 		sm_setuserenv("TZ", TimeZoneSpec);
1357 	else
1358 		sm_setuserenv("TZ", NULL);
1359 	tzset();
1360 
1361 	/* initialize mailbox database */
1362 	i = sm_mbdb_initialize(Mbdb);
1363 	if (i != EX_OK)
1364 	{
1365 		usrerr("Can't initialize mailbox database \"%s\": %s",
1366 		       Mbdb, sm_strexit(i));
1367 		ExitStat = i;
1368 	}
1369 
1370 	/* avoid denial-of-service attacks */
1371 	resetlimits();
1372 
1373 	if (OpMode == MD_TEST)
1374 	{
1375 		/* can't be done after readcf if RunAs* is used */
1376 		dp = drop_privileges(true);
1377 		if (dp != EX_OK)
1378 		{
1379 			finis(false, true, dp);
1380 			/* NOTREACHED */
1381 		}
1382 	}
1383 	else if (OpMode != MD_DAEMON && OpMode != MD_FGDAEMON)
1384 	{
1385 		/* drop privileges -- daemon mode done after socket/bind */
1386 		dp = drop_privileges(false);
1387 		setstat(dp);
1388 		if (dp == EX_OK && UseMSP && (geteuid() == 0 || getuid() == 0))
1389 		{
1390 			usrerr("Mail submission program must have RunAsUser set to non root user");
1391 			finis(false, true, EX_CONFIG);
1392 			/* NOTREACHED */
1393 		}
1394 	}
1395 
1396 #if NAMED_BIND
1397 	_res.retry = TimeOuts.res_retry[RES_TO_DEFAULT];
1398 	_res.retrans = TimeOuts.res_retrans[RES_TO_DEFAULT];
1399 #endif
1400 
1401 	/*
1402 	**  Find our real host name for future logging.
1403 	*/
1404 
1405 	authinfo = getauthinfo(STDIN_FILENO, &forged);
1406 	macdefine(&BlankEnvelope.e_macro, A_TEMP, '_', authinfo);
1407 
1408 	/* suppress error printing if errors mailed back or whatever */
1409 	if (BlankEnvelope.e_errormode != EM_PRINT)
1410 		HoldErrs = true;
1411 
1412 	/* set up the $=m class now, after .cf has a chance to redefine $m */
1413 	expand("\201m", jbuf, sizeof(jbuf), &BlankEnvelope);
1414 	if (jbuf[0] != '\0')
1415 		setclass('m', jbuf);
1416 
1417 	/* probe interfaces and locate any additional names */
1418 	if (DontProbeInterfaces != DPI_PROBENONE)
1419 		load_if_names();
1420 
1421 	if (tTd(0, 10))
1422 	{
1423 		char pidpath[MAXPATHLEN];
1424 
1425 		/* Now we know which .cf file we use */
1426 		sm_dprintf("     Conf file:\t%s (selected)\n",
1427 			   getcfname(OpMode, SubmitMode, cftype, conffile));
1428 		expand(PidFile, pidpath, sizeof(pidpath), &BlankEnvelope);
1429 		sm_dprintf("      Pid file:\t%s (selected)\n", pidpath);
1430 	}
1431 
1432 	if (tTd(0, 1))
1433 	{
1434 		sm_dprintf("\n============ SYSTEM IDENTITY (after readcf) ============");
1435 		sm_dprintf("\n      (short domain name) $w = ");
1436 		xputs(sm_debug_file(), macvalue('w', &BlankEnvelope));
1437 		sm_dprintf("\n  (canonical domain name) $j = ");
1438 		xputs(sm_debug_file(), macvalue('j', &BlankEnvelope));
1439 		sm_dprintf("\n         (subdomain name) $m = ");
1440 		xputs(sm_debug_file(), macvalue('m', &BlankEnvelope));
1441 		sm_dprintf("\n              (node name) $k = ");
1442 		xputs(sm_debug_file(), macvalue('k', &BlankEnvelope));
1443 		sm_dprintf("\n========================================================\n\n");
1444 	}
1445 
1446 	/*
1447 	**  Do more command line checking -- these are things that
1448 	**  have to modify the results of reading the config file.
1449 	*/
1450 
1451 	/* process authorization warnings from command line */
1452 	if (warn_C_flag)
1453 		auth_warning(&BlankEnvelope, "Processed by %s with -C %s",
1454 			     RealUserName, conffile);
1455 	if (Warn_Q_option && !wordinclass(RealUserName, 't'))
1456 		auth_warning(&BlankEnvelope, "Processed from queue %s",
1457 			     QueueDir);
1458 	if (sysloglabel != NULL && !wordinclass(RealUserName, 't') &&
1459 	    RealUid != 0 && RealUid != TrustedUid && LogLevel > 1)
1460 		sm_syslog(LOG_WARNING, NOQID, "user %d changed syslog label",
1461 			  (int) RealUid);
1462 
1463 	/* check body type for legality */
1464 	i = check_bodytype(BlankEnvelope.e_bodytype);
1465 	if (i == BODYTYPE_ILLEGAL)
1466 	{
1467 		usrerr("Illegal body type %s", BlankEnvelope.e_bodytype);
1468 		BlankEnvelope.e_bodytype = NULL;
1469 	}
1470 	else if (i != BODYTYPE_NONE)
1471 		SevenBitInput = (i == BODYTYPE_7BIT);
1472 
1473 	/* tweak default DSN notifications */
1474 	if (DefaultNotify == 0)
1475 		DefaultNotify = QPINGONFAILURE|QPINGONDELAY;
1476 
1477 	/* check for sane configuration level */
1478 	if (ConfigLevel > MAXCONFIGLEVEL)
1479 	{
1480 		syserr("Warning: .cf version level (%d) exceeds sendmail version %s functionality (%d)",
1481 		       ConfigLevel, Version, MAXCONFIGLEVEL);
1482 	}
1483 
1484 	/* need MCI cache to have persistence */
1485 	if (HostStatDir != NULL && MaxMciCache == 0)
1486 	{
1487 		HostStatDir = NULL;
1488 		(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
1489 				     "Warning: HostStatusDirectory disabled with ConnectionCacheSize = 0\n");
1490 	}
1491 
1492 	/* need HostStatusDir in order to have SingleThreadDelivery */
1493 	if (SingleThreadDelivery && HostStatDir == NULL)
1494 	{
1495 		SingleThreadDelivery = false;
1496 		(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
1497 				     "Warning: HostStatusDirectory required for SingleThreadDelivery\n");
1498 	}
1499 
1500 #if _FFR_MEMSTAT
1501 	j = sm_memstat_open();
1502 	if (j < 0 && (RefuseLowMem > 0 || QueueLowMem > 0) && LogLevel > 4)
1503 	{
1504 		sm_syslog(LOG_WARNING, NOQID,
1505 			  "cannot get memory statistics, settings ignored, error=%d"
1506 			  , j);
1507 	}
1508 #endif /* _FFR_MEMSTAT */
1509 
1510 	/* check for permissions */
1511 	if (RealUid != 0 &&
1512 	    RealUid != TrustedUid)
1513 	{
1514 		char *action = NULL;
1515 
1516 		switch (OpMode)
1517 		{
1518 		  case MD_QUEUERUN:
1519 			if (quarantining != NULL)
1520 				action = "quarantine jobs";
1521 			else
1522 			{
1523 				/* Normal users can do a single queue run */
1524 				if (QueueIntvl == 0)
1525 					break;
1526 			}
1527 
1528 			/* but not persistent queue runners */
1529 			if (action == NULL)
1530 				action = "start a queue runner daemon";
1531 			/* FALLTHROUGH */
1532 
1533 		  case MD_PURGESTAT:
1534 			if (action == NULL)
1535 				action = "purge host status";
1536 			/* FALLTHROUGH */
1537 
1538 		  case MD_DAEMON:
1539 		  case MD_FGDAEMON:
1540 			if (action == NULL)
1541 				action = "run daemon";
1542 
1543 			if (tTd(65, 1))
1544 				sm_dprintf("Deny user %d attempt to %s\n",
1545 					   (int) RealUid, action);
1546 
1547 			if (LogLevel > 1)
1548 				sm_syslog(LOG_ALERT, NOQID,
1549 					  "user %d attempted to %s",
1550 					  (int) RealUid, action);
1551 			HoldErrs = false;
1552 			usrerr("Permission denied (real uid not trusted)");
1553 			finis(false, true, EX_USAGE);
1554 			/* NOTREACHED */
1555 			break;
1556 
1557 		  case MD_VERIFY:
1558 			if (bitset(PRIV_RESTRICTEXPAND, PrivacyFlags))
1559 			{
1560 				/*
1561 				**  If -bv and RestrictExpand,
1562 				**  drop privs to prevent normal
1563 				**  users from reading private
1564 				**  aliases/forwards/:include:s
1565 				*/
1566 
1567 				if (tTd(65, 1))
1568 					sm_dprintf("Drop privs for user %d attempt to expand (RestrictExpand)\n",
1569 						   (int) RealUid);
1570 
1571 				dp = drop_privileges(true);
1572 
1573 				/* Fake address safety */
1574 				if (tTd(65, 1))
1575 					sm_dprintf("Faking DontBlameSendmail=NonRootSafeAddr\n");
1576 				setbitn(DBS_NONROOTSAFEADDR, DontBlameSendmail);
1577 
1578 				if (dp != EX_OK)
1579 				{
1580 					if (tTd(65, 1))
1581 						sm_dprintf("Failed to drop privs for user %d attempt to expand, exiting\n",
1582 							   (int) RealUid);
1583 					CurEnv->e_id = NULL;
1584 					finis(true, true, dp);
1585 					/* NOTREACHED */
1586 				}
1587 			}
1588 			break;
1589 
1590 		  case MD_TEST:
1591 		  case MD_CHECKCONFIG:
1592 		  case MD_PRINT:
1593 		  case MD_PRINTNQE:
1594 		  case MD_FREEZE:
1595 		  case MD_HOSTSTAT:
1596 			/* Nothing special to check */
1597 			break;
1598 
1599 		  case MD_INITALIAS:
1600 			if (!wordinclass(RealUserName, 't'))
1601 			{
1602 				if (tTd(65, 1))
1603 					sm_dprintf("Deny user %d attempt to rebuild the alias map\n",
1604 						   (int) RealUid);
1605 				if (LogLevel > 1)
1606 					sm_syslog(LOG_ALERT, NOQID,
1607 						  "user %d attempted to rebuild the alias map",
1608 						  (int) RealUid);
1609 				HoldErrs = false;
1610 				usrerr("Permission denied (real uid not trusted)");
1611 				finis(false, true, EX_USAGE);
1612 				/* NOTREACHED */
1613 			}
1614 			if (UseMSP)
1615 			{
1616 				HoldErrs = false;
1617 				usrerr("User %d cannot rebuild aliases in mail submission program",
1618 				       (int) RealUid);
1619 				finis(false, true, EX_USAGE);
1620 				/* NOTREACHED */
1621 			}
1622 			/* FALLTHROUGH */
1623 
1624 		  default:
1625 			if (bitset(PRIV_RESTRICTEXPAND, PrivacyFlags) &&
1626 			    Verbose != 0)
1627 			{
1628 				/*
1629 				**  If -v and RestrictExpand, reset
1630 				**  Verbose to prevent normal users
1631 				**  from seeing the expansion of
1632 				**  aliases/forwards/:include:s
1633 				*/
1634 
1635 				if (tTd(65, 1))
1636 					sm_dprintf("Dropping verbosity for user %d (RestrictExpand)\n",
1637 						   (int) RealUid);
1638 				Verbose = 0;
1639 			}
1640 			break;
1641 		}
1642 	}
1643 
1644 	if (MeToo)
1645 		BlankEnvelope.e_flags |= EF_METOO;
1646 
1647 	switch (OpMode)
1648 	{
1649 	  case MD_TEST:
1650 		/* don't have persistent host status in test mode */
1651 		HostStatDir = NULL;
1652 		/* FALLTHROUGH */
1653 
1654 	  case MD_CHECKCONFIG:
1655 		if (Verbose == 0)
1656 			Verbose = 2;
1657 		BlankEnvelope.e_errormode = EM_PRINT;
1658 		HoldErrs = false;
1659 		break;
1660 
1661 	  case MD_VERIFY:
1662 		BlankEnvelope.e_errormode = EM_PRINT;
1663 		HoldErrs = false;
1664 		/* arrange to exit cleanly on hangup signal */
1665 		if (sm_signal(SIGHUP, SIG_IGN) == (sigfunc_t) SIG_DFL)
1666 			(void) sm_signal(SIGHUP, intsig);
1667 		if (geteuid() != 0)
1668 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
1669 					     "Notice: -bv may give misleading output for non-privileged user\n");
1670 		break;
1671 
1672 	  case MD_FGDAEMON:
1673 		run_in_foreground = true;
1674 		set_op_mode(MD_DAEMON);
1675 		/* FALLTHROUGH */
1676 
1677 	  case MD_DAEMON:
1678 		vendor_daemon_setup(&BlankEnvelope);
1679 
1680 		/* remove things that don't make sense in daemon mode */
1681 		FullName = NULL;
1682 		GrabTo = false;
1683 
1684 		/* arrange to restart on hangup signal */
1685 		if (SaveArgv[0] == NULL || SaveArgv[0][0] != '/')
1686 			sm_syslog(LOG_WARNING, NOQID,
1687 				  "daemon invoked without full pathname; kill -1 won't work");
1688 		break;
1689 
1690 	  case MD_INITALIAS:
1691 		Verbose = 2;
1692 		BlankEnvelope.e_errormode = EM_PRINT;
1693 		HoldErrs = false;
1694 		/* FALLTHROUGH */
1695 
1696 	  default:
1697 		/* arrange to exit cleanly on hangup signal */
1698 		if (sm_signal(SIGHUP, SIG_IGN) == (sigfunc_t) SIG_DFL)
1699 			(void) sm_signal(SIGHUP, intsig);
1700 		break;
1701 	}
1702 
1703 	/* special considerations for FullName */
1704 	if (FullName != NULL)
1705 	{
1706 		char *full = NULL;
1707 
1708 		/* full names can't have newlines */
1709 		if (strchr(FullName, '\n') != NULL)
1710 		{
1711 			full = newstr(denlstring(FullName, true, true));
1712 			FullName = full;
1713 		}
1714 
1715 		/* check for characters that may have to be quoted */
1716 		if (!rfc822_string(FullName))
1717 		{
1718 			/*
1719 			**  Quote a full name with special characters
1720 			**  as a comment so crackaddr() doesn't destroy
1721 			**  the name portion of the address.
1722 			*/
1723 
1724 			FullName = addquotes(FullName, NULL);
1725 			if (full != NULL)
1726 				sm_free(full);  /* XXX */
1727 		}
1728 	}
1729 
1730 	/* do heuristic mode adjustment */
1731 	if (Verbose)
1732 	{
1733 		/* turn off noconnect option */
1734 		setoption('c', "F", true, false, &BlankEnvelope);
1735 
1736 		/* turn on interactive delivery */
1737 		setoption('d', "", true, false, &BlankEnvelope);
1738 	}
1739 
1740 #ifdef VENDOR_CODE
1741 	/* check for vendor mismatch */
1742 	if (VendorCode != VENDOR_CODE)
1743 	{
1744 		message("Warning: .cf file vendor code mismatch: sendmail expects vendor %s, .cf file vendor is %s",
1745 			getvendor(VENDOR_CODE), getvendor(VendorCode));
1746 	}
1747 #endif /* VENDOR_CODE */
1748 
1749 	/* check for out of date configuration level */
1750 	if (ConfigLevel < MAXCONFIGLEVEL)
1751 	{
1752 		message("Warning: .cf file is out of date: sendmail %s supports version %d, .cf file is version %d",
1753 			Version, MAXCONFIGLEVEL, ConfigLevel);
1754 	}
1755 
1756 	if (ConfigLevel < 3)
1757 		UseErrorsTo = true;
1758 
1759 	/* set options that were previous macros */
1760 	if (SmtpGreeting == NULL)
1761 	{
1762 		if (ConfigLevel < 7 &&
1763 		    (p = macvalue('e', &BlankEnvelope)) != NULL)
1764 			SmtpGreeting = newstr(p);
1765 		else
1766 			SmtpGreeting = "\201j Sendmail \201v ready at \201b";
1767 	}
1768 	if (UnixFromLine == NULL)
1769 	{
1770 		if (ConfigLevel < 7 &&
1771 		    (p = macvalue('l', &BlankEnvelope)) != NULL)
1772 			UnixFromLine = newstr(p);
1773 		else
1774 			UnixFromLine = "From \201g  \201d";
1775 	}
1776 	SmtpError[0] = '\0';
1777 
1778 	/* our name for SMTP codes */
1779 	expand("\201j", jbuf, sizeof(jbuf), &BlankEnvelope);
1780 	if (jbuf[0] == '\0')
1781 		PSTRSET(MyHostName, "localhost");
1782 	else
1783 		PSTRSET(MyHostName, jbuf);
1784 	if (strchr(MyHostName, '.') == NULL)
1785 		message("WARNING: local host name (%s) is not qualified; see cf/README: WHO AM I?",
1786 			MyHostName);
1787 
1788 	/* make certain that this name is part of the $=w class */
1789 	setclass('w', MyHostName);
1790 
1791 	/* fill in the structure of the *default* queue */
1792 	st = stab("mqueue", ST_QUEUE, ST_FIND);
1793 	if (st == NULL)
1794 		syserr("No default queue (mqueue) defined");
1795 	else
1796 		set_def_queueval(st->s_quegrp, true);
1797 
1798 	/* the indices of built-in mailers */
1799 	st = stab("local", ST_MAILER, ST_FIND);
1800 	if (st != NULL)
1801 		LocalMailer = st->s_mailer;
1802 	else if (OpMode != MD_TEST || !warn_C_flag)
1803 		syserr("No local mailer defined");
1804 
1805 	st = stab("prog", ST_MAILER, ST_FIND);
1806 	if (st == NULL)
1807 		syserr("No prog mailer defined");
1808 	else
1809 	{
1810 		ProgMailer = st->s_mailer;
1811 		clrbitn(M_MUSER, ProgMailer->m_flags);
1812 	}
1813 
1814 	st = stab("*file*", ST_MAILER, ST_FIND);
1815 	if (st == NULL)
1816 		syserr("No *file* mailer defined");
1817 	else
1818 	{
1819 		FileMailer = st->s_mailer;
1820 		clrbitn(M_MUSER, FileMailer->m_flags);
1821 	}
1822 
1823 	st = stab("*include*", ST_MAILER, ST_FIND);
1824 	if (st == NULL)
1825 		syserr("No *include* mailer defined");
1826 	else
1827 		InclMailer = st->s_mailer;
1828 
1829 	if (ConfigLevel < 6)
1830 	{
1831 		/* heuristic tweaking of local mailer for back compat */
1832 		if (LocalMailer != NULL)
1833 		{
1834 			setbitn(M_ALIASABLE, LocalMailer->m_flags);
1835 			setbitn(M_HASPWENT, LocalMailer->m_flags);
1836 			setbitn(M_TRYRULESET5, LocalMailer->m_flags);
1837 			setbitn(M_CHECKINCLUDE, LocalMailer->m_flags);
1838 			setbitn(M_CHECKPROG, LocalMailer->m_flags);
1839 			setbitn(M_CHECKFILE, LocalMailer->m_flags);
1840 			setbitn(M_CHECKUDB, LocalMailer->m_flags);
1841 		}
1842 		if (ProgMailer != NULL)
1843 			setbitn(M_RUNASRCPT, ProgMailer->m_flags);
1844 		if (FileMailer != NULL)
1845 			setbitn(M_RUNASRCPT, FileMailer->m_flags);
1846 	}
1847 	if (ConfigLevel < 7)
1848 	{
1849 		if (LocalMailer != NULL)
1850 			setbitn(M_VRFY250, LocalMailer->m_flags);
1851 		if (ProgMailer != NULL)
1852 			setbitn(M_VRFY250, ProgMailer->m_flags);
1853 		if (FileMailer != NULL)
1854 			setbitn(M_VRFY250, FileMailer->m_flags);
1855 	}
1856 
1857 	/* MIME Content-Types that cannot be transfer encoded */
1858 	setclass('n', "multipart/signed");
1859 
1860 	/* MIME message/xxx subtypes that can be treated as messages */
1861 	setclass('s', "rfc822");
1862 #if _FFR_EAI
1863 	setclass('s', "global");
1864 #endif
1865 
1866 	/* MIME Content-Transfer-Encodings that can be encoded */
1867 	setclass('e', "7bit");
1868 	setclass('e', "8bit");
1869 	setclass('e', "binary");
1870 
1871 #ifdef USE_B_CLASS
1872 	/* MIME Content-Types that should be treated as binary */
1873 	setclass('b', "image");
1874 	setclass('b', "audio");
1875 	setclass('b', "video");
1876 	setclass('b', "application/octet-stream");
1877 #endif /* USE_B_CLASS */
1878 
1879 	/* MIME headers which have fields to check for overflow */
1880 	setclass(macid("{checkMIMEFieldHeaders}"), "content-disposition");
1881 	setclass(macid("{checkMIMEFieldHeaders}"), "content-type");
1882 
1883 	/* MIME headers to check for length overflow */
1884 	setclass(macid("{checkMIMETextHeaders}"), "content-description");
1885 
1886 	/* MIME headers to check for overflow and rebalance */
1887 	setclass(macid("{checkMIMEHeaders}"), "content-disposition");
1888 	setclass(macid("{checkMIMEHeaders}"), "content-id");
1889 	setclass(macid("{checkMIMEHeaders}"), "content-transfer-encoding");
1890 	setclass(macid("{checkMIMEHeaders}"), "content-type");
1891 	setclass(macid("{checkMIMEHeaders}"), "mime-version");
1892 
1893 	/* Macros to save in the queue file -- don't remove any */
1894 	setclass(macid("{persistentMacros}"), "r");
1895 	setclass(macid("{persistentMacros}"), "s");
1896 	setclass(macid("{persistentMacros}"), "_");
1897 	setclass(macid("{persistentMacros}"), "{if_addr}");
1898 	setclass(macid("{persistentMacros}"), "{daemon_flags}");
1899 
1900 	/* operate in queue directory */
1901 	if (QueueDir == NULL || *QueueDir == '\0')
1902 	{
1903 		if (OpMode != MD_TEST)
1904 		{
1905 			syserr("QueueDirectory (Q) option must be set");
1906 			ExitStat = EX_CONFIG;
1907 		}
1908 	}
1909 	else
1910 	{
1911 		if (OpMode != MD_TEST)
1912 			setup_queues(OpMode == MD_DAEMON);
1913 	}
1914 
1915 	/* check host status directory for validity */
1916 	if (HostStatDir != NULL && !path_is_dir(HostStatDir, false))
1917 	{
1918 		/* cannot use this value */
1919 		(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
1920 				     "Warning: Cannot use HostStatusDirectory = %s: %s\n",
1921 				     HostStatDir, sm_errstring(errno));
1922 		HostStatDir = NULL;
1923 	}
1924 
1925 	if (OpMode == MD_QUEUERUN &&
1926 	    RealUid != 0 && bitset(PRIV_RESTRICTQRUN, PrivacyFlags))
1927 	{
1928 		struct stat stbuf;
1929 
1930 		/* check to see if we own the queue directory */
1931 		if (stat(".", &stbuf) < 0)
1932 			syserr("main: cannot stat %s", QueueDir);
1933 		if (stbuf.st_uid != RealUid)
1934 		{
1935 			/* nope, really a botch */
1936 			HoldErrs = false;
1937 			usrerr("You do not have permission to process the queue");
1938 			finis(false, true, EX_NOPERM);
1939 			/* NOTREACHED */
1940 		}
1941 	}
1942 
1943 #if MILTER
1944 	/* sanity checks on milter filters */
1945 	if (OpMode == MD_DAEMON || OpMode == MD_SMTP)
1946 	{
1947 		milter_config(InputFilterList, InputFilters, MAXFILTERS);
1948 		setup_daemon_milters();
1949 	}
1950 #endif /* MILTER */
1951 
1952 	/* Convert queuegroup string to qgrp number */
1953 	if (queuegroup != NULL)
1954 	{
1955 		qgrp = name2qid(queuegroup);
1956 		if (qgrp == NOQGRP)
1957 		{
1958 			HoldErrs = false;
1959 			usrerr("Queue group %s unknown", queuegroup);
1960 			finis(false, true, ExitStat);
1961 			/* NOTREACHED */
1962 		}
1963 	}
1964 
1965 	/* if checking config or have had errors so far, exit now */
1966 	if (OpMode == MD_CHECKCONFIG || (ExitStat != EX_OK && OpMode != MD_TEST))
1967 	{
1968 		finis(false, true, ExitStat);
1969 		/* NOTREACHED */
1970 	}
1971 
1972 #if SASL
1973 	/* sendmail specific SASL initialization */
1974 	sm_sasl_init();
1975 #endif
1976 
1977 #if XDEBUG
1978 	checkfd012("before main() initmaps");
1979 #endif
1980 
1981 	/*
1982 	**  Do operation-mode-dependent initialization.
1983 	*/
1984 
1985 	switch (OpMode)
1986 	{
1987 	  case MD_PRINT:
1988 		/* print the queue */
1989 		HoldErrs = false;
1990 		(void) dropenvelope(&BlankEnvelope, true, false);
1991 		(void) sm_signal(SIGPIPE, sigpipe);
1992 		if (qgrp != NOQGRP)
1993 		{
1994 			/* Selecting a particular queue group to run */
1995 			for (j = 0; j < Queue[qgrp]->qg_numqueues; j++)
1996 			{
1997 				if (StopRequest)
1998 					stop_sendmail();
1999 				(void) print_single_queue(qgrp, j);
2000 			}
2001 			finis(false, true, EX_OK);
2002 			/* NOTREACHED */
2003 		}
2004 		printqueue();
2005 		finis(false, true, EX_OK);
2006 		/* NOTREACHED */
2007 		break;
2008 
2009 	  case MD_PRINTNQE:
2010 		/* print number of entries in queue */
2011 		(void) dropenvelope(&BlankEnvelope, true, false);
2012 		(void) sm_signal(SIGPIPE, sigpipe);
2013 		printnqe(smioout, NULL);
2014 		finis(false, true, EX_OK);
2015 		/* NOTREACHED */
2016 		break;
2017 
2018 	  case MD_QUEUERUN:
2019 		/* only handle quarantining here */
2020 		if (quarantining == NULL)
2021 			break;
2022 
2023 		if (QueueMode != QM_QUARANTINE &&
2024 		    QueueMode != QM_NORMAL)
2025 		{
2026 			HoldErrs = false;
2027 			usrerr("Can not use -Q with -q%c", QueueMode);
2028 			ExitStat = EX_USAGE;
2029 			finis(false, true, ExitStat);
2030 			/* NOTREACHED */
2031 		}
2032 		quarantine_queue(quarantining, qgrp);
2033 		finis(false, true, EX_OK);
2034 		break;
2035 
2036 	  case MD_HOSTSTAT:
2037 		(void) sm_signal(SIGPIPE, sigpipe);
2038 		(void) mci_traverse_persistent(mci_print_persistent, NULL);
2039 		finis(false, true, EX_OK);
2040 		/* NOTREACHED */
2041 		break;
2042 
2043 	  case MD_PURGESTAT:
2044 		(void) mci_traverse_persistent(mci_purge_persistent, NULL);
2045 		finis(false, true, EX_OK);
2046 		/* NOTREACHED */
2047 		break;
2048 
2049 	  case MD_INITALIAS:
2050 		/* initialize maps */
2051 		initmaps();
2052 		finis(false, true, ExitStat);
2053 		/* NOTREACHED */
2054 		break;
2055 
2056 	  case MD_SMTP:
2057 	  case MD_DAEMON:
2058 		/* reset DSN parameters */
2059 		DefaultNotify = QPINGONFAILURE|QPINGONDELAY;
2060 		macdefine(&BlankEnvelope.e_macro, A_PERM,
2061 			  macid("{dsn_notify}"), NULL);
2062 		BlankEnvelope.e_envid = NULL;
2063 		macdefine(&BlankEnvelope.e_macro, A_PERM,
2064 			  macid("{dsn_envid}"), NULL);
2065 		BlankEnvelope.e_flags &= ~(EF_RET_PARAM|EF_NO_BODY_RETN);
2066 		macdefine(&BlankEnvelope.e_macro, A_PERM,
2067 			  macid("{dsn_ret}"), NULL);
2068 
2069 		/* don't open maps for daemon -- done below in child */
2070 		break;
2071 	}
2072 
2073 	if (tTd(0, 15))
2074 	{
2075 		/* print configuration table (or at least part of it) */
2076 		if (tTd(0, 90))
2077 			printrules();
2078 		for (i = 0; i < MAXMAILERS; i++)
2079 		{
2080 			if (Mailer[i] != NULL)
2081 				printmailer(sm_debug_file(), Mailer[i]);
2082 		}
2083 	}
2084 
2085 	/*
2086 	**  Switch to the main envelope.
2087 	*/
2088 
2089 	CurEnv = newenvelope(&MainEnvelope, &BlankEnvelope,
2090 			     sm_rpool_new_x(NULL));
2091 	MainEnvelope.e_flags = BlankEnvelope.e_flags;
2092 
2093 	/*
2094 	**  If test mode, read addresses from stdin and process.
2095 	*/
2096 
2097 	if (OpMode == MD_TEST)
2098 	{
2099 		if (isatty(sm_io_getinfo(smioin, SM_IO_WHAT_FD, NULL)))
2100 			Verbose = 2;
2101 
2102 		if (Verbose)
2103 		{
2104 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
2105 				     "ADDRESS TEST MODE (ruleset 3 NOT automatically invoked)\n");
2106 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
2107 				     "Enter <ruleset> <address>\n");
2108 		}
2109 		macdefine(&(MainEnvelope.e_macro), A_PERM,
2110 			  macid("{addr_type}"), "e r");
2111 		for (;;)
2112 		{
2113 			SM_TRY
2114 			{
2115 				(void) sm_signal(SIGINT, intindebug);
2116 				(void) sm_releasesignal(SIGINT);
2117 				if (Verbose == 2)
2118 					(void) sm_io_fprintf(smioout,
2119 							     SM_TIME_DEFAULT,
2120 							     "> ");
2121 				(void) sm_io_flush(smioout, SM_TIME_DEFAULT);
2122 				if (sm_io_fgets(smioin, SM_TIME_DEFAULT, buf,
2123 						sizeof(buf)) < 0)
2124 					testmodeline("/quit", &MainEnvelope);
2125 				p = strchr(buf, '\n');
2126 				if (p != NULL)
2127 					*p = '\0';
2128 				if (Verbose < 2)
2129 					(void) sm_io_fprintf(smioout,
2130 							     SM_TIME_DEFAULT,
2131 							     "> %s\n", buf);
2132 				testmodeline(buf, &MainEnvelope);
2133 			}
2134 			SM_EXCEPT(exc, "[!F]*")
2135 			{
2136 				/*
2137 				**  8.10 just prints \n on interrupt.
2138 				**  I'm printing the exception here in case
2139 				**  sendmail is extended to raise additional
2140 				**  exceptions in this context.
2141 				*/
2142 
2143 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
2144 						     "\n");
2145 				sm_exc_print(exc, smioout);
2146 			}
2147 			SM_END_TRY
2148 		}
2149 	}
2150 
2151 #if STARTTLS
2152 	tls_ok = true;
2153 	if (OpMode == MD_QUEUERUN || OpMode == MD_DELIVER ||
2154 	    OpMode == MD_ARPAFTP)
2155 	{
2156 		/* check whether STARTTLS is turned off for the client */
2157 		if (chkclientmodifiers(D_NOTLS))
2158 			tls_ok = false;
2159 	}
2160 	else if (OpMode == MD_DAEMON || OpMode == MD_FGDAEMON ||
2161 		 OpMode == MD_SMTP)
2162 	{
2163 		/* check whether STARTTLS is turned off */
2164 		if (chkdaemonmodifiers(D_NOTLS) && chkclientmodifiers(D_NOTLS))
2165 			tls_ok = false;
2166 	}
2167 	else	/* other modes don't need STARTTLS */
2168 		tls_ok = false;
2169 
2170 	if (tls_ok)
2171 	{
2172 		/* basic TLS initialization */
2173 		j = init_tls_library(FipsMode);
2174 		if (j < 0)
2175 		{
2176 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
2177 				     "ERROR: TLS failed to initialize\n");
2178 			exit(EX_USAGE);
2179 		}
2180 		if (j > 0)
2181 			tls_ok = false;
2182 	}
2183 
2184 	if (!tls_ok && (OpMode == MD_QUEUERUN || OpMode == MD_DELIVER))
2185 	{
2186 		/* disable TLS for client */
2187 		setclttls(false);
2188 	}
2189 #endif /* STARTTLS */
2190 
2191 	/*
2192 	**  If collecting stuff from the queue, go start doing that.
2193 	*/
2194 
2195 	if (OpMode == MD_QUEUERUN && QueueIntvl == 0)
2196 	{
2197 		pid_t pid = -1;
2198 
2199 #if STARTTLS
2200 		/* init TLS for client, ignore result for now */
2201 		(void) initclttls(tls_ok);
2202 #endif
2203 
2204 		/*
2205 		**  The parent process of the caller of runqueue() needs
2206 		**  to stay around for a possible SIGTERM. The SIGTERM will
2207 		**  tell this process that all of the queue runners children
2208 		**  need to be sent SIGTERM as well. At the same time, we
2209 		**  want to return control to the command line. So we do an
2210 		**  extra fork().
2211 		*/
2212 
2213 		if (Verbose || foregroundqueue || (pid = fork()) <= 0)
2214 		{
2215 			/*
2216 			**  If the fork() failed we should still try to do
2217 			**  the queue run. If it succeeded then the child
2218 			**  is going to start the run and wait for all
2219 			**  of the children to finish.
2220 			*/
2221 
2222 			if (pid == 0)
2223 			{
2224 				/* Reset global flags */
2225 				RestartRequest = NULL;
2226 				ShutdownRequest = NULL;
2227 				PendingSignal = 0;
2228 
2229 				/* disconnect from terminal */
2230 				disconnect(2, CurEnv);
2231 			}
2232 
2233 			CurrentPid = getpid();
2234 			if (qgrp != NOQGRP)
2235 			{
2236 				int rwgflags = RWG_NONE;
2237 
2238 				/*
2239 				**  To run a specific queue group mark it to
2240 				**  be run, select the work group it's in and
2241 				**  increment the work counter.
2242 				*/
2243 
2244 				for (i = 0; i < NumQueue && Queue[i] != NULL;
2245 				     i++)
2246 					Queue[i]->qg_nextrun = (time_t) -1;
2247 				Queue[qgrp]->qg_nextrun = 0;
2248 				if (Verbose)
2249 					rwgflags |= RWG_VERBOSE;
2250 				if (queuepersistent)
2251 					rwgflags |= RWG_PERSISTENT;
2252 				rwgflags |= RWG_FORCE;
2253 				(void) run_work_group(Queue[qgrp]->qg_wgrp,
2254 						      rwgflags);
2255 			}
2256 			else
2257 				(void) runqueue(false, Verbose,
2258 						queuepersistent, true);
2259 
2260 			/* set the title to make it easier to find */
2261 			sm_setproctitle(true, CurEnv, "Queue control");
2262 			(void) sm_signal(SIGCHLD, SIG_DFL);
2263 			while (CurChildren > 0)
2264 			{
2265 				int status;
2266 				pid_t ret;
2267 
2268 				errno = 0;
2269 				while ((ret = sm_wait(&status)) <= 0)
2270 				{
2271 					if (errno == ECHILD)
2272 					{
2273 						/*
2274 						**  Oops... something got messed
2275 						**  up really bad. Waiting for
2276 						**  non-existent children
2277 						**  shouldn't happen. Let's get
2278 						**  out of here.
2279 						*/
2280 
2281 						CurChildren = 0;
2282 						break;
2283 					}
2284 					continue;
2285 				}
2286 
2287 				/* something is really really wrong */
2288 				if (errno == ECHILD)
2289 				{
2290 					sm_syslog(LOG_ERR, NOQID,
2291 						  "queue control process: lost all children: wait returned ECHILD");
2292 					break;
2293 				}
2294 
2295 				/* Only drop when a child gives status */
2296 				if (WIFSTOPPED(status))
2297 					continue;
2298 
2299 				proc_list_drop(ret, status, NULL);
2300 			}
2301 		}
2302 		finis(true, true, ExitStat);
2303 		/* NOTREACHED */
2304 	}
2305 
2306 #if SASL
2307 	if (OpMode == MD_SMTP || OpMode == MD_DAEMON)
2308 	{
2309 		/* check whether AUTH is turned off for the server */
2310 		if (!chkdaemonmodifiers(D_NOAUTH) &&
2311 		    (i = sasl_server_init(srvcallbacks, "Sendmail")) != SASL_OK)
2312 			syserr("!sasl_server_init failed! [%s]",
2313 				sasl_errstring(i, NULL, NULL));
2314 	}
2315 #endif /* SASL */
2316 
2317 	if (OpMode == MD_SMTP)
2318 	{
2319 		proc_list_add(CurrentPid, "Sendmail SMTP Agent",
2320 			      PROC_DAEMON, 0, -1, NULL);
2321 
2322 		/* clean up background delivery children */
2323 		(void) sm_signal(SIGCHLD, reapchild);
2324 	}
2325 
2326 	/*
2327 	**  If a daemon, wait for a request.
2328 	**	getrequests will always return in a child.
2329 	**	If we should also be processing the queue, start
2330 	**		doing it in background.
2331 	**	We check for any errors that might have happened
2332 	**		during startup.
2333 	*/
2334 
2335 	if (OpMode == MD_DAEMON || QueueIntvl > 0)
2336 	{
2337 		char dtype[200];
2338 
2339 		/* avoid cleanup in finis(), DaemonPid will be set below */
2340 		DaemonPid = 0;
2341 		if (!run_in_foreground && !tTd(99, 100))
2342 		{
2343 			/* put us in background */
2344 			i = fork();
2345 			if (i < 0)
2346 				syserr("daemon: cannot fork");
2347 			if (i != 0)
2348 			{
2349 				finis(false, true, EX_OK);
2350 				/* NOTREACHED */
2351 			}
2352 
2353 			/*
2354 			**  Initialize exception stack and default exception
2355 			**  handler for child process.
2356 			*/
2357 
2358 			/* Reset global flags */
2359 			RestartRequest = NULL;
2360 			RestartWorkGroup = false;
2361 			ShutdownRequest = NULL;
2362 			PendingSignal = 0;
2363 			CurrentPid = getpid();
2364 
2365 			sm_exc_newthread(fatal_error);
2366 
2367 			/* disconnect from our controlling tty */
2368 			disconnect(2, &MainEnvelope);
2369 		}
2370 
2371 		dtype[0] = '\0';
2372 		if (OpMode == MD_DAEMON)
2373 		{
2374 			(void) sm_strlcat(dtype, "+SMTP", sizeof(dtype));
2375 			DaemonPid = CurrentPid;
2376 		}
2377 		if (QueueIntvl > 0)
2378 		{
2379 			(void) sm_strlcat2(dtype,
2380 					   queuepersistent
2381 					   ? "+persistent-queueing@"
2382 					   : "+queueing@",
2383 					   pintvl(QueueIntvl, true),
2384 					   sizeof(dtype));
2385 		}
2386 		if (tTd(0, 1))
2387 			(void) sm_strlcat(dtype, "+debugging", sizeof(dtype));
2388 
2389 		sm_syslog(LOG_INFO, NOQID,
2390 			  "starting daemon (%s): %s", Version, dtype + 1);
2391 #if XLA
2392 		xla_create_file();
2393 #endif
2394 
2395 		/* save daemon type in a macro for possible PidFile use */
2396 		macdefine(&BlankEnvelope.e_macro, A_TEMP,
2397 			macid("{daemon_info}"), dtype + 1);
2398 
2399 		/* save queue interval in a macro for possible PidFile use */
2400 		macdefine(&MainEnvelope.e_macro, A_TEMP,
2401 			macid("{queue_interval}"), pintvl(QueueIntvl, true));
2402 
2403 		/* workaround: can't seem to release the signal in the parent */
2404 		(void) sm_signal(SIGHUP, sighup);
2405 		(void) sm_releasesignal(SIGHUP);
2406 		(void) sm_signal(SIGTERM, sigterm);
2407 
2408 		if (QueueIntvl > 0)
2409 		{
2410 #if _FFR_RUNPQG
2411 			if (qgrp != NOQGRP)
2412 			{
2413 				int rwgflags = RWG_NONE;
2414 
2415 				/*
2416 				**  To run a specific queue group mark it to
2417 				**  be run, select the work group it's in and
2418 				**  increment the work counter.
2419 				*/
2420 
2421 				for (i = 0; i < NumQueue && Queue[i] != NULL;
2422 				     i++)
2423 					Queue[i]->qg_nextrun = (time_t) -1;
2424 				Queue[qgrp]->qg_nextrun = 0;
2425 				if (Verbose)
2426 					rwgflags |= RWG_VERBOSE;
2427 				if (queuepersistent)
2428 					rwgflags |= RWG_PERSISTENT;
2429 				rwgflags |= RWG_FORCE;
2430 				(void) run_work_group(Queue[qgrp]->qg_wgrp,
2431 						      rwgflags);
2432 			}
2433 			else
2434 #endif /* _FFR_RUNPQG */
2435 				(void) runqueue(true, false, queuepersistent,
2436 						true);
2437 
2438 			/*
2439 			**  If queuepersistent but not in daemon mode then
2440 			**  we're going to do the queue runner monitoring here.
2441 			**  If in daemon mode then the monitoring will happen
2442 			**  elsewhere.
2443 			*/
2444 
2445 			if (OpMode != MD_DAEMON && queuepersistent)
2446 			{
2447 				/*
2448 				**  Write the pid to file
2449 				**  XXX Overwrites sendmail.pid
2450 				*/
2451 
2452 				log_sendmail_pid(&MainEnvelope);
2453 
2454 				/* set the title to make it easier to find */
2455 				sm_setproctitle(true, CurEnv, "Queue control");
2456 				(void) sm_signal(SIGCHLD, SIG_DFL);
2457 				while (CurChildren > 0)
2458 				{
2459 					int status;
2460 					pid_t ret;
2461 					int group;
2462 
2463 					CHECK_RESTART;
2464 					errno = 0;
2465 					while ((ret = sm_wait(&status)) <= 0)
2466 					{
2467 						/*
2468 						**  Waiting for non-existent
2469 						**  children shouldn't happen.
2470 						**  Let's get out of here if
2471 						**  it occurs.
2472 						*/
2473 
2474 						if (errno == ECHILD)
2475 						{
2476 							CurChildren = 0;
2477 							break;
2478 						}
2479 						continue;
2480 					}
2481 
2482 					/* something is really really wrong */
2483 					if (errno == ECHILD)
2484 					{
2485 						sm_syslog(LOG_ERR, NOQID,
2486 							  "persistent queue runner control process: lost all children: wait returned ECHILD");
2487 						break;
2488 					}
2489 
2490 					if (WIFSTOPPED(status))
2491 						continue;
2492 
2493 					/* Probe only on a child status */
2494 					proc_list_drop(ret, status, &group);
2495 
2496 					if (WIFSIGNALED(status))
2497 					{
2498 						if (WCOREDUMP(status))
2499 						{
2500 							sm_syslog(LOG_ERR, NOQID,
2501 								  "persistent queue runner=%d core dumped, signal=%d",
2502 								  group, WTERMSIG(status));
2503 
2504 							/* don't restart this */
2505 							mark_work_group_restart(
2506 								group, -1);
2507 							continue;
2508 						}
2509 
2510 						sm_syslog(LOG_ERR, NOQID,
2511 							  "persistent queue runner=%d died, pid=%ld, signal=%d",
2512 							  group, (long) ret,
2513 							  WTERMSIG(status));
2514 					}
2515 
2516 					/*
2517 					**  When debugging active, don't
2518 					**  restart the persistent queues.
2519 					**  But do log this as info.
2520 					*/
2521 
2522 					if (sm_debug_active(&DebugNoPRestart,
2523 							    1))
2524 					{
2525 						sm_syslog(LOG_DEBUG, NOQID,
2526 							  "persistent queue runner=%d, exited",
2527 							  group);
2528 						mark_work_group_restart(group,
2529 									-1);
2530 					}
2531 					CHECK_RESTART;
2532 				}
2533 				finis(true, true, ExitStat);
2534 				/* NOTREACHED */
2535 			}
2536 
2537 			if (OpMode != MD_DAEMON)
2538 			{
2539 				char qtype[200];
2540 
2541 				/*
2542 				**  Write the pid to file
2543 				**  XXX Overwrites sendmail.pid
2544 				*/
2545 
2546 				log_sendmail_pid(&MainEnvelope);
2547 
2548 				/* set the title to make it easier to find */
2549 				qtype[0] = '\0';
2550 				(void) sm_strlcpyn(qtype, sizeof(qtype), 4,
2551 						   "Queue runner@",
2552 						   pintvl(QueueIntvl, true),
2553 						   " for ",
2554 						   QueueDir);
2555 				sm_setproctitle(true, CurEnv, qtype);
2556 				for (;;)
2557 				{
2558 					(void) pause();
2559 
2560 					CHECK_RESTART;
2561 
2562 					if (doqueuerun())
2563 						(void) runqueue(true, false,
2564 								false, false);
2565 				}
2566 			}
2567 		}
2568 		(void) dropenvelope(&MainEnvelope, true, false);
2569 
2570 #if STARTTLS
2571 		/* init TLS for server, ignore result for now */
2572 		(void) initsrvtls(tls_ok);
2573 #endif
2574 
2575 	nextreq:
2576 		p_flags = getrequests(&MainEnvelope);
2577 
2578 		/* drop privileges */
2579 		(void) drop_privileges(false);
2580 
2581 		/*
2582 		**  Get authentication data
2583 		**  Set _ macro in BlankEnvelope before calling newenvelope().
2584 		*/
2585 
2586 #if _FFR_XCNCT
2587 		if (bitnset(D_XCNCT, *p_flags) || bitnset(D_XCNCT_M, *p_flags))
2588 		{
2589 			/* copied from getauthinfo() */
2590 			if (RealHostName == NULL)
2591 			{
2592 				RealHostName = newstr(hostnamebyanyaddr(&RealHostAddr));
2593 				if (strlen(RealHostName) > MAXNAME)
2594 					RealHostName[MAXNAME] = '\0'; /* XXX - 1 ? */
2595 			}
2596 			snprintf(buf, sizeof(buf), "%s [%s]",
2597 				RealHostName, anynet_ntoa(&RealHostAddr));
2598 
2599 			forged = bitnset(D_XCNCT_M, *p_flags);
2600 			if (forged)
2601 			{
2602 				(void) sm_strlcat(buf, " (may be forged)",
2603 						sizeof(buf));
2604 				macdefine(&BlankEnvelope.e_macro, A_PERM,
2605 					  macid("{client_resolve}"), "FORGED");
2606 			}
2607 
2608 			/* HACK! variable used only two times right below */
2609 			authinfo = buf;
2610 			if (tTd(75, 9))
2611 				sm_syslog(LOG_INFO, NOQID,
2612 					"main: where=not_calling_getauthinfo, RealHostAddr=%s",
2613 					anynet_ntoa(&RealHostAddr));
2614 		}
2615 		else
2616 		/* WARNING: "non-braced" else */
2617 #endif /* _FFR_XCNCT */
2618 		authinfo = getauthinfo(sm_io_getinfo(InChannel, SM_IO_WHAT_FD,
2619 						     NULL), &forged);
2620 		macdefine(&BlankEnvelope.e_macro, A_TEMP, '_', authinfo);
2621 		if (tTd(75, 9))
2622 			sm_syslog(LOG_INFO, NOQID,
2623 				"main: where=after_getauthinfo, RealHostAddr=%s",
2624 				anynet_ntoa(&RealHostAddr));
2625 
2626 		/* at this point we are in a child: reset state */
2627 		sm_rpool_free(MainEnvelope.e_rpool);
2628 		(void) newenvelope(&MainEnvelope, &MainEnvelope,
2629 				   sm_rpool_new_x(NULL));
2630 	}
2631 
2632 	if (LogLevel > 9)
2633 	{
2634 		p = authinfo;
2635 		if (NULL == p)
2636 		{
2637 			if (NULL != RealHostName)
2638 				p = RealHostName;
2639 			else
2640 				p = anynet_ntoa(&RealHostAddr);
2641 			if (NULL == p)
2642 				p = "unknown";
2643 		}
2644 
2645 		/* log connection information */
2646 		sm_syslog(LOG_INFO, NULL, "connect from %s", p);
2647 	}
2648 
2649 	/*
2650 	**  If running SMTP protocol, start collecting and executing
2651 	**  commands.  This will never return.
2652 	*/
2653 
2654 	if (OpMode == MD_SMTP || OpMode == MD_DAEMON)
2655 	{
2656 		char pbuf[20];
2657 
2658 		/*
2659 		**  Save some macros for check_* rulesets.
2660 		*/
2661 
2662 		if (forged)
2663 		{
2664 			char ipbuf[103];
2665 
2666 			(void) sm_snprintf(ipbuf, sizeof(ipbuf), "[%.100s]",
2667 					   anynet_ntoa(&RealHostAddr));
2668 			macdefine(&BlankEnvelope.e_macro, A_TEMP,
2669 				  macid("{client_name}"), ipbuf);
2670 		}
2671 		else
2672 			macdefine(&BlankEnvelope.e_macro, A_PERM,
2673 				  macid("{client_name}"), RealHostName);
2674 		macdefine(&BlankEnvelope.e_macro, A_PERM,
2675 			  macid("{client_ptr}"), RealHostName);
2676 		macdefine(&BlankEnvelope.e_macro, A_TEMP,
2677 			  macid("{client_addr}"), anynet_ntoa(&RealHostAddr));
2678 		sm_getla();
2679 
2680 		switch (RealHostAddr.sa.sa_family)
2681 		{
2682 #if NETINET
2683 		  case AF_INET:
2684 			(void) sm_snprintf(pbuf, sizeof(pbuf), "%d",
2685 					   ntohs(RealHostAddr.sin.sin_port));
2686 			break;
2687 #endif /* NETINET */
2688 #if NETINET6
2689 		  case AF_INET6:
2690 			(void) sm_snprintf(pbuf, sizeof(pbuf), "%d",
2691 					   ntohs(RealHostAddr.sin6.sin6_port));
2692 			break;
2693 #endif /* NETINET6 */
2694 		  default:
2695 			(void) sm_snprintf(pbuf, sizeof(pbuf), "0");
2696 			break;
2697 		}
2698 		macdefine(&BlankEnvelope.e_macro, A_TEMP,
2699 			macid("{client_port}"), pbuf);
2700 
2701 		if (OpMode == MD_DAEMON)
2702 		{
2703 			ENVELOPE *saved_env;
2704 
2705 			/* validate the connection */
2706 			HoldErrs = true;
2707 			saved_env = CurEnv;
2708 			CurEnv = &BlankEnvelope;
2709 			nullserver = validate_connection(&RealHostAddr,
2710 						macvalue(macid("{client_name}"),
2711 							&BlankEnvelope),
2712 						&BlankEnvelope);
2713 			if (bitset(EF_DISCARD, BlankEnvelope.e_flags))
2714 				MainEnvelope.e_flags |= EF_DISCARD;
2715 			CurEnv = saved_env;
2716 			HoldErrs = false;
2717 		}
2718 		else if (p_flags == NULL)
2719 		{
2720 			p_flags = (BITMAP256 *) xalloc(sizeof(*p_flags));
2721 			clrbitmap(p_flags);
2722 		}
2723 #if STARTTLS
2724 		if (OpMode == MD_SMTP)
2725 			(void) initsrvtls(tls_ok);
2726 #endif
2727 
2728 		/* turn off profiling */
2729 		SM_PROF(1);
2730 		smtp(nullserver, *p_flags, &MainEnvelope);
2731 
2732 		if (tTd(93, 100))
2733 		{
2734 			/* turn off profiling */
2735 			SM_PROF(0);
2736 			if (OpMode == MD_DAEMON)
2737 				goto nextreq;
2738 		}
2739 	}
2740 
2741 	sm_rpool_free(MainEnvelope.e_rpool);
2742 	clearenvelope(&MainEnvelope, false, sm_rpool_new_x(NULL));
2743 	if (OpMode == MD_VERIFY)
2744 	{
2745 		set_delivery_mode(SM_VERIFY, &MainEnvelope);
2746 		PostMasterCopy = NULL;
2747 	}
2748 	else
2749 	{
2750 		/* interactive -- all errors are global */
2751 		MainEnvelope.e_flags |= EF_GLOBALERRS|EF_LOGSENDER;
2752 	}
2753 
2754 	/*
2755 	**  Do basic system initialization and set the sender
2756 	*/
2757 
2758 	initsys(&MainEnvelope);
2759 	macdefine(&MainEnvelope.e_macro, A_PERM, macid("{ntries}"), "0");
2760 	macdefine(&MainEnvelope.e_macro, A_PERM, macid("{nrcpts}"), "0");
2761 	setsender(from, &MainEnvelope, NULL, '\0', false);
2762 	if (warn_f_flag != '\0' && !wordinclass(RealUserName, 't') &&
2763 	    (!bitnset(M_LOCALMAILER, MainEnvelope.e_from.q_mailer->m_flags) ||
2764 	     strcmp(MainEnvelope.e_from.q_user, RealUserName) != 0))
2765 	{
2766 		auth_warning(&MainEnvelope, "%s set sender to %s using -%c",
2767 			     RealUserName, from, warn_f_flag);
2768 #if SASL
2769 		auth = false;
2770 #endif
2771 	}
2772 	if (auth)
2773 	{
2774 		char *fv;
2775 
2776 		/* set the initial sender for AUTH= to $f@$j */
2777 		fv = macvalue('f', &MainEnvelope);
2778 		if (fv == NULL || *fv == '\0')
2779 			MainEnvelope.e_auth_param = NULL;
2780 		else
2781 		{
2782 			if (strchr(fv, '@') == NULL)
2783 			{
2784 				i = strlen(fv) + strlen(macvalue('j',
2785 							&MainEnvelope)) + 2;
2786 				p = sm_malloc_x(i);
2787 				(void) sm_strlcpyn(p, i, 3, fv, "@",
2788 						   macvalue('j',
2789 							    &MainEnvelope));
2790 			}
2791 			else
2792 				p = sm_strdup_x(fv);
2793 			MainEnvelope.e_auth_param = sm_rpool_strdup_x(MainEnvelope.e_rpool,
2794 								      xtextify(p, "="));
2795 			sm_free(p);  /* XXX */
2796 		}
2797 	}
2798 	if (macvalue('s', &MainEnvelope) == NULL)
2799 		macdefine(&MainEnvelope.e_macro, A_PERM, 's', RealHostName);
2800 
2801 	av = argv + optind;
2802 	if (*av == NULL && !GrabTo)
2803 	{
2804 		MainEnvelope.e_to = NULL;
2805 		MainEnvelope.e_flags |= EF_GLOBALERRS;
2806 		HoldErrs = false;
2807 		SuperSafe = SAFE_NO;
2808 		usrerr("Recipient names must be specified");
2809 
2810 		/* collect body for UUCP return */
2811 		if (OpMode != MD_VERIFY)
2812 			collect(InChannel, false, NULL, &MainEnvelope, true);
2813 		finis(true, true, EX_USAGE);
2814 		/* NOTREACHED */
2815 	}
2816 
2817 	/*
2818 	**  Scan argv and deliver the message to everyone.
2819 	*/
2820 
2821 	save_val = LogUsrErrs;
2822 	LogUsrErrs = true;
2823 	sendtoargv(av, &MainEnvelope);
2824 	LogUsrErrs = save_val;
2825 
2826 	/* if we have had errors sofar, arrange a meaningful exit stat */
2827 	if (Errors > 0 && ExitStat == EX_OK)
2828 		ExitStat = EX_USAGE;
2829 
2830 #if _FFR_FIX_DASHT
2831 	/*
2832 	**  If using -t, force not sending to argv recipients, even
2833 	**  if they are mentioned in the headers.
2834 	*/
2835 
2836 	if (GrabTo)
2837 	{
2838 		ADDRESS *q;
2839 
2840 		for (q = MainEnvelope.e_sendqueue; q != NULL; q = q->q_next)
2841 			q->q_state = QS_REMOVED;
2842 	}
2843 #endif /* _FFR_FIX_DASHT */
2844 
2845 	/*
2846 	**  Read the input mail.
2847 	*/
2848 
2849 	MainEnvelope.e_to = NULL;
2850 	if (OpMode != MD_VERIFY || GrabTo)
2851 	{
2852 		int savederrors;
2853 		unsigned long savedflags;
2854 
2855 		/*
2856 		**  workaround for compiler warning on Irix:
2857 		**  do not initialize variable in the definition, but
2858 		**  later on:
2859 		**  warning(1548): transfer of control bypasses
2860 		**  initialization of:
2861 		**  variable "savederrors" (declared at line 2570)
2862 		**  variable "savedflags" (declared at line 2571)
2863 		**  goto giveup;
2864 		*/
2865 
2866 		savederrors = Errors;
2867 		savedflags = MainEnvelope.e_flags & EF_FATALERRS;
2868 		MainEnvelope.e_flags |= EF_GLOBALERRS;
2869 		MainEnvelope.e_flags &= ~EF_FATALERRS;
2870 		Errors = 0;
2871 		buffer_errors();
2872 		collect(InChannel, false, NULL, &MainEnvelope, true);
2873 
2874 		/* header checks failed */
2875 		if (Errors > 0)
2876 		{
2877   giveup:
2878 			if (!GrabTo)
2879 			{
2880 				/* Log who the mail would have gone to */
2881 				logundelrcpts(&MainEnvelope,
2882 					      MainEnvelope.e_message,
2883 					      8, false);
2884 			}
2885 			flush_errors(true);
2886 			finis(true, true, ExitStat);
2887 			/* NOTREACHED */
2888 			return -1;
2889 		}
2890 
2891 		/* bail out if message too large */
2892 		if (bitset(EF_CLRQUEUE, MainEnvelope.e_flags))
2893 		{
2894 			finis(true, true, ExitStat != EX_OK ? ExitStat
2895 							    : EX_DATAERR);
2896 			/* NOTREACHED */
2897 			return -1;
2898 		}
2899 
2900 		/* set message size */
2901 		(void) sm_snprintf(buf, sizeof(buf), "%ld",
2902 				   PRT_NONNEGL(MainEnvelope.e_msgsize));
2903 		macdefine(&MainEnvelope.e_macro, A_TEMP,
2904 			  macid("{msg_size}"), buf);
2905 
2906 		Errors = savederrors;
2907 		MainEnvelope.e_flags |= savedflags;
2908 	}
2909 	errno = 0;
2910 
2911 	if (tTd(1, 1))
2912 		sm_dprintf("From person = \"%s\"\n",
2913 			   MainEnvelope.e_from.q_paddr);
2914 
2915 	/* Check if quarantining stats should be updated */
2916 	if (MainEnvelope.e_quarmsg != NULL)
2917 		markstats(&MainEnvelope, NULL, STATS_QUARANTINE);
2918 
2919 	/*
2920 	**  Actually send everything.
2921 	**	If verifying, just ack.
2922 	*/
2923 
2924 	if (Errors == 0)
2925 	{
2926 		if (!split_by_recipient(&MainEnvelope) &&
2927 		    bitset(EF_FATALERRS, MainEnvelope.e_flags))
2928 			goto giveup;
2929 	}
2930 
2931 	/* make sure we deliver at least the first envelope */
2932 	i = FastSplit > 0 ? 0 : -1;
2933 	for (e = &MainEnvelope; e != NULL; e = e->e_sibling, i++)
2934 	{
2935 		ENVELOPE *next;
2936 
2937 		e->e_from.q_state = QS_SENDER;
2938 		if (tTd(1, 5))
2939 		{
2940 			sm_dprintf("main[%d]: QS_SENDER ", i);
2941 			printaddr(sm_debug_file(), &e->e_from, false);
2942 		}
2943 		e->e_to = NULL;
2944 		sm_getla();
2945 		GrabTo = false;
2946 #if NAMED_BIND
2947 		_res.retry = TimeOuts.res_retry[RES_TO_FIRST];
2948 		_res.retrans = TimeOuts.res_retrans[RES_TO_FIRST];
2949 #endif
2950 		next = e->e_sibling;
2951 		e->e_sibling = NULL;
2952 
2953 		/* after FastSplit envelopes: queue up */
2954 		sendall(e, i >= FastSplit ? SM_QUEUE : SM_DEFAULT);
2955 		e->e_sibling = next;
2956 	}
2957 
2958 	/*
2959 	**  All done.
2960 	**	Don't send return error message if in VERIFY mode.
2961 	*/
2962 
2963 	finis(true, true, ExitStat);
2964 	/* NOTREACHED */
2965 	return ExitStat;
2966 }
2967 /*
2968 **  STOP_SENDMAIL -- Stop the running program
2969 **
2970 **	Parameters:
2971 **		none.
2972 **
2973 **	Returns:
2974 **		none.
2975 **
2976 **	Side Effects:
2977 **		exits.
2978 */
2979 
2980 void
2981 stop_sendmail()
2982 {
2983 	/* reset uid for process accounting */
2984 	endpwent();
2985 	(void) setuid(RealUid);
2986 	exit(EX_OK);
2987 }
2988 /*
2989 **  FINIS -- Clean up and exit.
2990 **
2991 **	Parameters:
2992 **		drop -- whether or not to drop CurEnv envelope
2993 **		cleanup -- call exit() or _exit()?
2994 **		exitstat -- exit status to use for exit() call
2995 **
2996 **	Returns:
2997 **		never
2998 **
2999 **	Side Effects:
3000 **		exits sendmail
3001 */
3002 
3003 void
3004 finis(drop, cleanup, exitstat)
3005 	bool drop;
3006 	bool cleanup;
3007 	volatile int exitstat;
3008 {
3009 	char pidpath[MAXPATHLEN];
3010 	pid_t pid;
3011 
3012 	/* Still want to process new timeouts added below */
3013 	sm_clear_events();
3014 	(void) sm_releasesignal(SIGALRM);
3015 
3016 #if RATECTL_DEBUG || _FFR_OCC
3017 	/* do this only in "main" process */
3018 	if (DaemonPid == getpid())
3019 	{
3020 		SM_FILE_T *fp;
3021 
3022 		fp = sm_debug_file();
3023 		if (fp != NULL)
3024 			dump_ch(fp);
3025 	}
3026 #endif
3027 	if (tTd(2, 1))
3028 	{
3029 		sm_dprintf("\n====finis: stat %d e_id=%s e_flags=",
3030 			   exitstat,
3031 			   CurEnv->e_id == NULL ? "NOQUEUE" : CurEnv->e_id);
3032 		printenvflags(CurEnv);
3033 	}
3034 	if (tTd(2, 9))
3035 		printopenfds(false);
3036 
3037 	SM_TRY
3038 		/*
3039 		**  Clean up.  This might raise E:mta.quickabort
3040 		*/
3041 
3042 		/* clean up temp files */
3043 		CurEnv->e_to = NULL;
3044 		if (drop)
3045 		{
3046 			if (CurEnv->e_id != NULL)
3047 			{
3048 				int r;
3049 
3050 				r = dropenvelope(CurEnv, true, false);
3051 				if (exitstat == EX_OK)
3052 					exitstat = r;
3053 				sm_rpool_free(CurEnv->e_rpool);
3054 				CurEnv->e_rpool = NULL;
3055 
3056 				/* these may have pointed to the rpool */
3057 				CurEnv->e_to = NULL;
3058 				CurEnv->e_message = NULL;
3059 				CurEnv->e_statmsg = NULL;
3060 				CurEnv->e_quarmsg = NULL;
3061 				CurEnv->e_bodytype = NULL;
3062 				CurEnv->e_id = NULL;
3063 				CurEnv->e_envid = NULL;
3064 				CurEnv->e_auth_param = NULL;
3065 			}
3066 			else
3067 				poststats(StatFile);
3068 		}
3069 
3070 		/* flush any cached connections */
3071 		mci_flush(true, NULL);
3072 
3073 		/* close maps belonging to this pid */
3074 		closemaps(false);
3075 
3076 #if USERDB
3077 		/* close UserDatabase */
3078 		_udbx_close();
3079 #endif
3080 
3081 #if SASL
3082 		stop_sasl_client();
3083 #endif
3084 
3085 #if XLA
3086 		/* clean up extended load average stuff */
3087 		xla_all_end();
3088 #endif
3089 
3090 	SM_FINALLY
3091 		/*
3092 		**  And exit.
3093 		*/
3094 
3095 		if (LogLevel > 78)
3096 			sm_syslog(LOG_DEBUG, CurEnv->e_id, "finis, pid=%d",
3097 				  (int) CurrentPid);
3098 		if (exitstat == EX_TEMPFAIL ||
3099 		    CurEnv->e_errormode == EM_BERKNET)
3100 			exitstat = EX_OK;
3101 
3102 		/* XXX clean up queues and related data structures */
3103 		cleanup_queues();
3104 		pid = getpid();
3105 #if SM_CONF_SHM
3106 		cleanup_shm(DaemonPid == pid);
3107 #endif
3108 
3109 		/* close locked pid file */
3110 		close_sendmail_pid();
3111 
3112 		if (DaemonPid == pid || PidFilePid == pid)
3113 		{
3114 			/* blow away the pid file */
3115 			expand(PidFile, pidpath, sizeof(pidpath), CurEnv);
3116 			(void) unlink(pidpath);
3117 		}
3118 
3119 		/* reset uid for process accounting */
3120 		endpwent();
3121 		sm_mbdb_terminate();
3122 #if _FFR_MEMSTAT
3123 		(void) sm_memstat_close();
3124 #endif
3125 		(void) setuid(RealUid);
3126 #if SM_HEAP_CHECK
3127 		/* dump the heap, if we are checking for memory leaks */
3128 		if (sm_debug_active(&SmHeapCheck, 2))
3129 			sm_heap_report(smioout,
3130 				       sm_debug_level(&SmHeapCheck) - 1);
3131 #endif
3132 		if (sm_debug_active(&SmXtrapReport, 1))
3133 			sm_dprintf("xtrap count = %d\n", SmXtrapCount);
3134 		if (cleanup)
3135 			exit(exitstat);
3136 		else
3137 			_exit(exitstat);
3138 	SM_END_TRY
3139 }
3140 /*
3141 **  INTINDEBUG -- signal handler for SIGINT in -bt mode
3142 **
3143 **	Parameters:
3144 **		sig -- incoming signal.
3145 **
3146 **	Returns:
3147 **		none.
3148 **
3149 **	Side Effects:
3150 **		longjmps back to test mode loop.
3151 **
3152 **	NOTE:	THIS CAN BE CALLED FROM A SIGNAL HANDLER.  DO NOT ADD
3153 **		ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3154 **		DOING.
3155 */
3156 
3157 /* Type of an exception generated on SIGINT during address test mode.  */
3158 static const SM_EXC_TYPE_T EtypeInterrupt =
3159 {
3160 	SmExcTypeMagic,
3161 	"S:mta.interrupt",
3162 	"",
3163 	sm_etype_printf,
3164 	"interrupt",
3165 };
3166 
3167 /* ARGSUSED */
3168 static SIGFUNC_DECL
3169 intindebug(sig)
3170 	int sig;
3171 {
3172 	int save_errno = errno;
3173 
3174 	FIX_SYSV_SIGNAL(sig, intindebug);
3175 	errno = save_errno;
3176 	CHECK_CRITICAL(sig);
3177 	errno = save_errno;
3178 	sm_exc_raisenew_x(&EtypeInterrupt);
3179 	errno = save_errno;
3180 	return SIGFUNC_RETURN;
3181 }
3182 /*
3183 **  SIGTERM -- SIGTERM handler for the daemon
3184 **
3185 **	Parameters:
3186 **		sig -- signal number.
3187 **
3188 **	Returns:
3189 **		none.
3190 **
3191 **	Side Effects:
3192 **		Sets ShutdownRequest which will hopefully trigger
3193 **		the daemon to exit.
3194 **
3195 **	NOTE:	THIS CAN BE CALLED FROM A SIGNAL HANDLER.  DO NOT ADD
3196 **		ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3197 **		DOING.
3198 */
3199 
3200 /* ARGSUSED */
3201 static SIGFUNC_DECL
3202 sigterm(sig)
3203 	int sig;
3204 {
3205 	int save_errno = errno;
3206 
3207 	FIX_SYSV_SIGNAL(sig, sigterm);
3208 	ShutdownRequest = "signal";
3209 	errno = save_errno;
3210 	return SIGFUNC_RETURN;
3211 }
3212 /*
3213 **  SIGHUP -- handle a SIGHUP signal
3214 **
3215 **	Parameters:
3216 **		sig -- incoming signal.
3217 **
3218 **	Returns:
3219 **		none.
3220 **
3221 **	Side Effects:
3222 **		Sets RestartRequest which should cause the daemon
3223 **		to restart.
3224 **
3225 **	NOTE:	THIS CAN BE CALLED FROM A SIGNAL HANDLER.  DO NOT ADD
3226 **		ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3227 **		DOING.
3228 */
3229 
3230 /* ARGSUSED */
3231 static SIGFUNC_DECL
3232 sighup(sig)
3233 	int sig;
3234 {
3235 	int save_errno = errno;
3236 
3237 	FIX_SYSV_SIGNAL(sig, sighup);
3238 	RestartRequest = "signal";
3239 	errno = save_errno;
3240 	return SIGFUNC_RETURN;
3241 }
3242 /*
3243 **  SIGPIPE -- signal handler for SIGPIPE
3244 **
3245 **	Parameters:
3246 **		sig -- incoming signal.
3247 **
3248 **	Returns:
3249 **		none.
3250 **
3251 **	Side Effects:
3252 **		Sets StopRequest which should cause the mailq/hoststatus
3253 **		display to stop.
3254 **
3255 **	NOTE:	THIS CAN BE CALLED FROM A SIGNAL HANDLER.  DO NOT ADD
3256 **		ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3257 **		DOING.
3258 */
3259 
3260 /* ARGSUSED */
3261 static SIGFUNC_DECL
3262 sigpipe(sig)
3263 	int sig;
3264 {
3265 	int save_errno = errno;
3266 
3267 	FIX_SYSV_SIGNAL(sig, sigpipe);
3268 	StopRequest = true;
3269 	errno = save_errno;
3270 	return SIGFUNC_RETURN;
3271 }
3272 /*
3273 **  INTSIG -- clean up on interrupt
3274 **
3275 **	This just arranges to exit.  It pessimizes in that it
3276 **	may resend a message.
3277 **
3278 **	Parameters:
3279 **		sig -- incoming signal.
3280 **
3281 **	Returns:
3282 **		none.
3283 **
3284 **	Side Effects:
3285 **		Unlocks the current job.
3286 **
3287 **	NOTE:	THIS CAN BE CALLED FROM A SIGNAL HANDLER.  DO NOT ADD
3288 **		ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3289 **		DOING.
3290 */
3291 
3292 /* ARGSUSED */
3293 SIGFUNC_DECL
3294 intsig(sig)
3295 	int sig;
3296 {
3297 	bool drop = false;
3298 	int save_errno = errno;
3299 
3300 	FIX_SYSV_SIGNAL(sig, intsig);
3301 	errno = save_errno;
3302 	CHECK_CRITICAL(sig);
3303 	sm_allsignals(true);
3304 	IntSig = true;
3305 
3306 	FileName = NULL;
3307 
3308 	/* Clean-up on aborted stdin message submission */
3309 	if  (OpMode == MD_SMTP ||
3310 	     OpMode == MD_DELIVER ||
3311 	     OpMode == MD_ARPAFTP)
3312 	{
3313 		if (CurEnv->e_id != NULL)
3314 		{
3315 			char *fn;
3316 
3317 			fn = queuename(CurEnv, DATAFL_LETTER);
3318 			if (fn != NULL)
3319 				(void) unlink(fn);
3320 			fn = queuename(CurEnv, ANYQFL_LETTER);
3321 			if (fn != NULL)
3322 				(void) unlink(fn);
3323 		}
3324 		_exit(EX_OK);
3325 		/* NOTREACHED */
3326 	}
3327 
3328 	if (sig != 0 && LogLevel > 79)
3329 		sm_syslog(LOG_DEBUG, CurEnv->e_id, "interrupt");
3330 	if (OpMode != MD_TEST)
3331 		unlockqueue(CurEnv);
3332 
3333 	finis(drop, false, EX_OK);
3334 	/* NOTREACHED */
3335 }
3336 /*
3337 **  DISCONNECT -- remove our connection with any foreground process
3338 **
3339 **	Parameters:
3340 **		droplev -- how "deeply" we should drop the line.
3341 **			0 -- ignore signals, mail back errors, make sure
3342 **			     output goes to stdout.
3343 **			1 -- also, make stdout go to /dev/null.
3344 **			2 -- also, disconnect from controlling terminal
3345 **			     (only for daemon mode).
3346 **		e -- the current envelope.
3347 **
3348 **	Returns:
3349 **		none
3350 **
3351 **	Side Effects:
3352 **		Trys to insure that we are immune to vagaries of
3353 **		the controlling tty.
3354 */
3355 
3356 void
3357 disconnect(droplev, e)
3358 	int droplev;
3359 	register ENVELOPE *e;
3360 {
3361 	int fd;
3362 
3363 	if (tTd(52, 1))
3364 		sm_dprintf("disconnect: In %d Out %d, e=%p\n",
3365 			   sm_io_getinfo(InChannel, SM_IO_WHAT_FD, NULL),
3366 			   sm_io_getinfo(OutChannel, SM_IO_WHAT_FD, NULL),
3367 			   (void *)e);
3368 	if (tTd(52, 100))
3369 	{
3370 		sm_dprintf("don't\n");
3371 		return;
3372 	}
3373 	if (LogLevel > 93)
3374 		sm_syslog(LOG_DEBUG, e->e_id,
3375 			  "disconnect level %d",
3376 			  droplev);
3377 
3378 	/* be sure we don't get nasty signals */
3379 	(void) sm_signal(SIGINT, SIG_IGN);
3380 	(void) sm_signal(SIGQUIT, SIG_IGN);
3381 
3382 	/* we can't communicate with our caller, so.... */
3383 	HoldErrs = true;
3384 	CurEnv->e_errormode = EM_MAIL;
3385 	Verbose = 0;
3386 	DisConnected = true;
3387 
3388 	/* all input from /dev/null */
3389 	if (InChannel != smioin)
3390 	{
3391 		(void) sm_io_close(InChannel, SM_TIME_DEFAULT);
3392 		InChannel = smioin;
3393 	}
3394 	if (sm_io_reopen(SmFtStdio, SM_TIME_DEFAULT, SM_PATH_DEVNULL,
3395 			 SM_IO_RDONLY, NULL, smioin) == NULL)
3396 		sm_syslog(LOG_ERR, e->e_id,
3397 			  "disconnect: sm_io_reopen(\"%s\") failed: %s",
3398 			  SM_PATH_DEVNULL, sm_errstring(errno));
3399 
3400 	/*
3401 	**  output to the transcript
3402 	**	We also compare the fd numbers here since OutChannel
3403 	**	might be a layer on top of smioout due to encryption
3404 	**	(see sfsasl.c).
3405 	*/
3406 
3407 	if (OutChannel != smioout &&
3408 	    sm_io_getinfo(OutChannel, SM_IO_WHAT_FD, NULL) !=
3409 	    sm_io_getinfo(smioout, SM_IO_WHAT_FD, NULL))
3410 	{
3411 		(void) sm_io_close(OutChannel, SM_TIME_DEFAULT);
3412 		OutChannel = smioout;
3413 
3414 #if 0
3415 		/*
3416 		**  Has smioout been closed? Reopen it.
3417 		**	This shouldn't happen anymore, the code is here
3418 		**	just as a reminder.
3419 		*/
3420 
3421 		if (smioout->sm_magic == NULL &&
3422 		    sm_io_reopen(SmFtStdio, SM_TIME_DEFAULT, SM_PATH_DEVNULL,
3423 				 SM_IO_WRONLY, NULL, smioout) == NULL)
3424 			sm_syslog(LOG_ERR, e->e_id,
3425 				  "disconnect: sm_io_reopen(\"%s\") failed: %s",
3426 				  SM_PATH_DEVNULL, sm_errstring(errno));
3427 #endif /* 0 */
3428 	}
3429 	if (droplev > 0)
3430 	{
3431 		fd = open(SM_PATH_DEVNULL, O_WRONLY, 0666);
3432 		if (fd == -1)
3433 		{
3434 			sm_syslog(LOG_ERR, e->e_id,
3435 				  "disconnect: open(\"%s\") failed: %s",
3436 				  SM_PATH_DEVNULL, sm_errstring(errno));
3437 		}
3438 		(void) sm_io_flush(smioout, SM_TIME_DEFAULT);
3439 		if (fd >= 0)
3440 		{
3441 			(void) dup2(fd, STDOUT_FILENO);
3442 			(void) dup2(fd, STDERR_FILENO);
3443 			(void) close(fd);
3444 		}
3445 	}
3446 
3447 	/* drop our controlling TTY completely if possible */
3448 	if (droplev > 1)
3449 	{
3450 		(void) setsid();
3451 		errno = 0;
3452 	}
3453 
3454 #if XDEBUG
3455 	checkfd012("disconnect");
3456 #endif
3457 
3458 	if (LogLevel > 71)
3459 		sm_syslog(LOG_DEBUG, e->e_id, "in background, pid=%d",
3460 			  (int) CurrentPid);
3461 
3462 	errno = 0;
3463 }
3464 
3465 static void
3466 obsolete(argv)
3467 	char *argv[];
3468 {
3469 	register char *ap;
3470 	register char *op;
3471 
3472 	while ((ap = *++argv) != NULL)
3473 	{
3474 		/* Return if "--" or not an option of any form. */
3475 		if (ap[0] != '-' || ap[1] == '-')
3476 			return;
3477 
3478 		/* Don't allow users to use "-Q." or "-Q ." */
3479 		if ((ap[1] == 'Q' && ap[2] == '.') ||
3480 		    (ap[1] == 'Q' && argv[1] != NULL &&
3481 		     argv[1][0] == '.' && argv[1][1] == '\0'))
3482 		{
3483 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
3484 					     "Can not use -Q.\n");
3485 			exit(EX_USAGE);
3486 		}
3487 
3488 		/* skip over options that do have a value */
3489 		op = strchr(OPTIONS, ap[1]);
3490 		if (op != NULL && *++op == ':' && ap[2] == '\0' &&
3491 		    ap[1] != 'd' &&
3492 #if defined(sony_news)
3493 		    ap[1] != 'E' && ap[1] != 'J' &&
3494 #endif
3495 		    argv[1] != NULL && argv[1][0] != '-')
3496 		{
3497 			argv++;
3498 			continue;
3499 		}
3500 
3501 		/* If -C doesn't have an argument, use sendmail.cf. */
3502 #define __DEFPATH	"sendmail.cf"
3503 		if (ap[1] == 'C' && ap[2] == '\0')
3504 		{
3505 			*argv = xalloc(sizeof(__DEFPATH) + 2);
3506 			(void) sm_strlcpyn(argv[0], sizeof(__DEFPATH) + 2, 2,
3507 					   "-C", __DEFPATH);
3508 		}
3509 
3510 		/* If -q doesn't have an argument, run it once. */
3511 		if (ap[1] == 'q' && ap[2] == '\0')
3512 			*argv = "-q0";
3513 
3514 		/* If -Q doesn't have an argument, disable quarantining */
3515 		if (ap[1] == 'Q' && ap[2] == '\0')
3516 			*argv = "-Q.";
3517 
3518 		/* if -d doesn't have an argument, use 0-99.1 */
3519 		if (ap[1] == 'd' && ap[2] == '\0')
3520 			*argv = "-d0-99.1";
3521 
3522 #if defined(sony_news)
3523 		/* if -E doesn't have an argument, use -EC */
3524 		if (ap[1] == 'E' && ap[2] == '\0')
3525 			*argv = "-EC";
3526 
3527 		/* if -J doesn't have an argument, use -JJ */
3528 		if (ap[1] == 'J' && ap[2] == '\0')
3529 			*argv = "-JJ";
3530 #endif /* defined(sony_news) */
3531 	}
3532 }
3533 /*
3534 **  AUTH_WARNING -- specify authorization warning
3535 **
3536 **	Parameters:
3537 **		e -- the current envelope.
3538 **		msg -- the text of the message.
3539 **		args -- arguments to the message.
3540 **
3541 **	Returns:
3542 **		none.
3543 */
3544 
3545 void
3546 #ifdef __STDC__
3547 auth_warning(register ENVELOPE *e, const char *msg, ...)
3548 #else /* __STDC__ */
3549 auth_warning(e, msg, va_alist)
3550 	register ENVELOPE *e;
3551 	const char *msg;
3552 	va_dcl
3553 #endif /* __STDC__ */
3554 {
3555 	char buf[MAXLINE];
3556 	SM_VA_LOCAL_DECL
3557 
3558 	if (bitset(PRIV_AUTHWARNINGS, PrivacyFlags))
3559 	{
3560 		register char *p;
3561 		static char hostbuf[48];
3562 
3563 		if (hostbuf[0] == '\0')
3564 		{
3565 			struct hostent *hp;
3566 
3567 			hp = myhostname(hostbuf, sizeof(hostbuf));
3568 #if NETINET6
3569 			if (hp != NULL)
3570 			{
3571 				freehostent(hp);
3572 				hp = NULL;
3573 			}
3574 #endif /* NETINET6 */
3575 		}
3576 
3577 		(void) sm_strlcpyn(buf, sizeof(buf), 2, hostbuf, ": ");
3578 		p = &buf[strlen(buf)];
3579 		SM_VA_START(ap, msg);
3580 		(void) sm_vsnprintf(p, SPACELEFT(buf, p), msg, ap);
3581 		SM_VA_END(ap);
3582 		addheader("X-Authentication-Warning", buf, 0, e, true);
3583 		if (LogLevel > 3)
3584 			sm_syslog(LOG_INFO, e->e_id,
3585 				  "Authentication-Warning: %.400s",
3586 				  buf);
3587 	}
3588 }
3589 /*
3590 **  GETEXTENV -- get from external environment
3591 **
3592 **	Parameters:
3593 **		envar -- the name of the variable to retrieve
3594 **
3595 **	Returns:
3596 **		The value, if any.
3597 */
3598 
3599 static char *
3600 getextenv(envar)
3601 	const char *envar;
3602 {
3603 	char **envp;
3604 	int l;
3605 
3606 	l = strlen(envar);
3607 	for (envp = ExternalEnviron; envp != NULL && *envp != NULL; envp++)
3608 	{
3609 		if (strncmp(*envp, envar, l) == 0 && (*envp)[l] == '=')
3610 			return &(*envp)[l + 1];
3611 	}
3612 	return NULL;
3613 }
3614 /*
3615 **  SM_SETUSERENV -- set an environment variable in the propagated environment
3616 **
3617 **	Parameters:
3618 **		envar -- the name of the environment variable.
3619 **		value -- the value to which it should be set.  If
3620 **			null, this is extracted from the incoming
3621 **			environment.  If that is not set, the call
3622 **			to sm_setuserenv is ignored.
3623 **
3624 **	Returns:
3625 **		none.
3626 */
3627 
3628 void
3629 sm_setuserenv(envar, value)
3630 	const char *envar;
3631 	const char *value;
3632 {
3633 	int i, l;
3634 	char **evp = UserEnviron;
3635 	char *p;
3636 
3637 	if (value == NULL)
3638 	{
3639 		value = getextenv(envar);
3640 		if (value == NULL)
3641 			return;
3642 	}
3643 
3644 	/* XXX enforce reasonable size? */
3645 	i = strlen(envar) + 1;
3646 	l = strlen(value) + i + 1;
3647 	p = (char *) xalloc(l);
3648 	(void) sm_strlcpyn(p, l, 3, envar, "=", value);
3649 
3650 	while (*evp != NULL && strncmp(*evp, p, i) != 0)
3651 		evp++;
3652 	if (*evp != NULL)
3653 	{
3654 		*evp++ = p;
3655 	}
3656 	else if (evp < &UserEnviron[MAXUSERENVIRON])
3657 	{
3658 		*evp++ = p;
3659 		*evp = NULL;
3660 	}
3661 
3662 	/* make sure it is in our environment as well */
3663 	if (putenv(p) < 0)
3664 		syserr("sm_setuserenv: putenv(%s) failed", p);
3665 }
3666 /*
3667 **  DUMPSTATE -- dump state
3668 **
3669 **	For debugging.
3670 */
3671 
3672 void
3673 dumpstate(when)
3674 	char *when;
3675 {
3676 	register char *j = macvalue('j', CurEnv);
3677 	int rs;
3678 	extern int NextMacroId;
3679 
3680 	sm_syslog(LOG_DEBUG, CurEnv->e_id,
3681 		  "--- dumping state on %s: $j = %s ---",
3682 		  when,
3683 		  j == NULL ? "<NULL>" : j);
3684 	if (j != NULL)
3685 	{
3686 		if (!wordinclass(j, 'w'))
3687 			sm_syslog(LOG_DEBUG, CurEnv->e_id,
3688 				  "*** $j not in $=w ***");
3689 	}
3690 	sm_syslog(LOG_DEBUG, CurEnv->e_id, "CurChildren = %d", CurChildren);
3691 	sm_syslog(LOG_DEBUG, CurEnv->e_id, "NextMacroId = %d (Max %d)",
3692 		  NextMacroId, MAXMACROID);
3693 	sm_syslog(LOG_DEBUG, CurEnv->e_id, "--- open file descriptors: ---");
3694 	printopenfds(true);
3695 	sm_syslog(LOG_DEBUG, CurEnv->e_id, "--- connection cache: ---");
3696 	mci_dump_all(smioout, true);
3697 	rs = strtorwset("debug_dumpstate", NULL, ST_FIND);
3698 	if (rs > 0)
3699 	{
3700 		int status;
3701 		register char **pvp;
3702 		char *pv[MAXATOM + 1];
3703 
3704 		pv[0] = NULL;
3705 		status = REWRITE(pv, rs, CurEnv);
3706 		sm_syslog(LOG_DEBUG, CurEnv->e_id,
3707 			  "--- ruleset debug_dumpstate returns stat %d, pv: ---",
3708 			  status);
3709 		for (pvp = pv; *pvp != NULL; pvp++)
3710 			sm_syslog(LOG_DEBUG, CurEnv->e_id, "%s", *pvp);
3711 	}
3712 	sm_syslog(LOG_DEBUG, CurEnv->e_id, "--- end of state dump ---");
3713 }
3714 
3715 #ifdef SIGUSR1
3716 /*
3717 **  SIGUSR1 -- Signal a request to dump state.
3718 **
3719 **	Parameters:
3720 **		sig -- calling signal.
3721 **
3722 **	Returns:
3723 **		none.
3724 **
3725 **	NOTE:	THIS CAN BE CALLED FROM A SIGNAL HANDLER.  DO NOT ADD
3726 **		ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3727 **		DOING.
3728 **
3729 **		XXX: More work is needed for this signal handler.
3730 */
3731 
3732 /* ARGSUSED */
3733 static SIGFUNC_DECL
3734 sigusr1(sig)
3735 	int sig;
3736 {
3737 	int save_errno = errno;
3738 
3739 	FIX_SYSV_SIGNAL(sig, sigusr1);
3740 	errno = save_errno;
3741 	CHECK_CRITICAL(sig);
3742 	dumpstate("user signal");
3743 # if SM_HEAP_CHECK
3744 	dumpstab();
3745 # endif
3746 	errno = save_errno;
3747 	return SIGFUNC_RETURN;
3748 }
3749 #endif /* SIGUSR1 */
3750 
3751 /*
3752 **  DROP_PRIVILEGES -- reduce privileges to those of the RunAsUser option
3753 **
3754 **	Parameters:
3755 **		to_real_uid -- if set, drop to the real uid instead
3756 **			of the RunAsUser.
3757 **
3758 **	Returns:
3759 **		EX_OSERR if the setuid failed.
3760 **		EX_OK otherwise.
3761 */
3762 
3763 int
3764 drop_privileges(to_real_uid)
3765 	bool to_real_uid;
3766 {
3767 	int rval = EX_OK;
3768 	GIDSET_T emptygidset[1];
3769 
3770 	if (tTd(47, 1))
3771 		sm_dprintf("drop_privileges(%d): Real[UG]id=%ld:%ld, get[ug]id=%ld:%ld, gete[ug]id=%ld:%ld, RunAs[UG]id=%ld:%ld\n",
3772 			   (int) to_real_uid,
3773 			   (long) RealUid, (long) RealGid,
3774 			   (long) getuid(), (long) getgid(),
3775 			   (long) geteuid(), (long) getegid(),
3776 			   (long) RunAsUid, (long) RunAsGid);
3777 
3778 	if (to_real_uid)
3779 	{
3780 		RunAsUserName = RealUserName;
3781 		RunAsUid = RealUid;
3782 		RunAsGid = RealGid;
3783 		EffGid = RunAsGid;
3784 	}
3785 
3786 	/* make sure no one can grab open descriptors for secret files */
3787 	endpwent();
3788 	sm_mbdb_terminate();
3789 
3790 	/* reset group permissions; these can be set later */
3791 	emptygidset[0] = (to_real_uid || RunAsGid != 0) ? RunAsGid : getegid();
3792 
3793 	/*
3794 	**  Notice:  on some OS (Linux...) the setgroups() call causes
3795 	**	a logfile entry if sendmail is not run by root.
3796 	**	However, it is unclear (no POSIX standard) whether
3797 	**	setgroups() can only succeed if executed by root.
3798 	**	So for now we keep it as it is; if you want to change it, use
3799 	**  if (geteuid() == 0 && setgroups(1, emptygidset) == -1)
3800 	*/
3801 
3802 	if (setgroups(1, emptygidset) == -1 && geteuid() == 0)
3803 	{
3804 		syserr("drop_privileges: setgroups(1, %d) failed",
3805 		       (int) emptygidset[0]);
3806 		rval = EX_OSERR;
3807 	}
3808 
3809 	/* reset primary group id */
3810 	if (to_real_uid)
3811 	{
3812 		/*
3813 		**  Drop gid to real gid.
3814 		**  On some OS we must reset the effective[/real[/saved]] gid,
3815 		**  and then use setgid() to finally drop all group privileges.
3816 		**  Later on we check whether we can get back the
3817 		**  effective gid.
3818 		*/
3819 
3820 #if HASSETEGID
3821 		if (setegid(RunAsGid) < 0)
3822 		{
3823 			syserr("drop_privileges: setegid(%d) failed",
3824 			       (int) RunAsGid);
3825 			rval = EX_OSERR;
3826 		}
3827 #else /* HASSETEGID */
3828 # if HASSETREGID
3829 		if (setregid(RunAsGid, RunAsGid) < 0)
3830 		{
3831 			syserr("drop_privileges: setregid(%d, %d) failed",
3832 			       (int) RunAsGid, (int) RunAsGid);
3833 			rval = EX_OSERR;
3834 		}
3835 # else /* HASSETREGID */
3836 #  if HASSETRESGID
3837 		if (setresgid(RunAsGid, RunAsGid, RunAsGid) < 0)
3838 		{
3839 			syserr("drop_privileges: setresgid(%d, %d, %d) failed",
3840 			       (int) RunAsGid, (int) RunAsGid, (int) RunAsGid);
3841 			rval = EX_OSERR;
3842 		}
3843 #  endif /* HASSETRESGID */
3844 # endif /* HASSETREGID */
3845 #endif /* HASSETEGID */
3846 	}
3847 	if (rval == EX_OK && (to_real_uid || RunAsGid != 0))
3848 	{
3849 		if (setgid(RunAsGid) < 0 && (!UseMSP || getegid() != RunAsGid))
3850 		{
3851 			syserr("drop_privileges: setgid(%ld) failed",
3852 			       (long) RunAsGid);
3853 			rval = EX_OSERR;
3854 		}
3855 		errno = 0;
3856 		if (rval == EX_OK && getegid() != RunAsGid)
3857 		{
3858 			syserr("drop_privileges: Unable to set effective gid=%ld to RunAsGid=%ld",
3859 			       (long) getegid(), (long) RunAsGid);
3860 			rval = EX_OSERR;
3861 		}
3862 	}
3863 
3864 	/* fiddle with uid */
3865 	if (to_real_uid || RunAsUid != 0)
3866 	{
3867 		uid_t euid;
3868 
3869 		/*
3870 		**  Try to setuid(RunAsUid).
3871 		**  euid must be RunAsUid,
3872 		**  ruid must be RunAsUid unless (e|r)uid wasn't 0
3873 		**	and we didn't have to drop privileges to the real uid.
3874 		*/
3875 
3876 		if (setuid(RunAsUid) < 0 ||
3877 		    geteuid() != RunAsUid ||
3878 		    (getuid() != RunAsUid &&
3879 		     (to_real_uid || geteuid() == 0 || getuid() == 0)))
3880 		{
3881 #if HASSETREUID
3882 			/*
3883 			**  if ruid != RunAsUid, euid == RunAsUid, then
3884 			**  try resetting just the real uid, then using
3885 			**  setuid() to drop the saved-uid as well.
3886 			*/
3887 
3888 			if (geteuid() == RunAsUid)
3889 			{
3890 				if (setreuid(RunAsUid, -1) < 0)
3891 				{
3892 					syserr("drop_privileges: setreuid(%d, -1) failed",
3893 					       (int) RunAsUid);
3894 					rval = EX_OSERR;
3895 				}
3896 				if (setuid(RunAsUid) < 0)
3897 				{
3898 					syserr("drop_privileges: second setuid(%d) attempt failed",
3899 					       (int) RunAsUid);
3900 					rval = EX_OSERR;
3901 				}
3902 			}
3903 			else
3904 #endif /* HASSETREUID */
3905 			{
3906 				syserr("drop_privileges: setuid(%d) failed",
3907 				       (int) RunAsUid);
3908 				rval = EX_OSERR;
3909 			}
3910 		}
3911 		euid = geteuid();
3912 		if (RunAsUid != 0 && setuid(0) == 0)
3913 		{
3914 			/*
3915 			**  Believe it or not, the Linux capability model
3916 			**  allows a non-root process to override setuid()
3917 			**  on a process running as root and prevent that
3918 			**  process from dropping privileges.
3919 			*/
3920 
3921 			syserr("drop_privileges: setuid(0) succeeded (when it should not)");
3922 			rval = EX_OSERR;
3923 		}
3924 		else if (RunAsUid != euid && setuid(euid) == 0)
3925 		{
3926 			/*
3927 			**  Some operating systems will keep the saved-uid
3928 			**  if a non-root effective-uid calls setuid(real-uid)
3929 			**  making it possible to set it back again later.
3930 			*/
3931 
3932 			syserr("drop_privileges: Unable to drop non-root set-user-ID privileges");
3933 			rval = EX_OSERR;
3934 		}
3935 	}
3936 
3937 	if ((to_real_uid || RunAsGid != 0) &&
3938 	    rval == EX_OK && RunAsGid != EffGid &&
3939 	    getuid() != 0 && geteuid() != 0)
3940 	{
3941 		errno = 0;
3942 		if (setgid(EffGid) == 0)
3943 		{
3944 			syserr("drop_privileges: setgid(%d) succeeded (when it should not)",
3945 			       (int) EffGid);
3946 			rval = EX_OSERR;
3947 		}
3948 	}
3949 
3950 	if (tTd(47, 5))
3951 	{
3952 		sm_dprintf("drop_privileges: e/ruid = %d/%d e/rgid = %d/%d\n",
3953 			   (int) geteuid(), (int) getuid(),
3954 			   (int) getegid(), (int) getgid());
3955 		sm_dprintf("drop_privileges: RunAsUser = %d:%d\n",
3956 			   (int) RunAsUid, (int) RunAsGid);
3957 		if (tTd(47, 10))
3958 			sm_dprintf("drop_privileges: rval = %d\n", rval);
3959 	}
3960 	return rval;
3961 }
3962 /*
3963 **  FILL_FD -- make sure a file descriptor has been properly allocated
3964 **
3965 **	Used to make sure that stdin/out/err are allocated on startup
3966 **
3967 **	Parameters:
3968 **		fd -- the file descriptor to be filled.
3969 **		where -- a string used for logging.  If NULL, this is
3970 **			being called on startup, and logging should
3971 **			not be done.
3972 **
3973 **	Returns:
3974 **		none
3975 **
3976 **	Side Effects:
3977 **		possibly changes MissingFds
3978 */
3979 
3980 void
3981 fill_fd(fd, where)
3982 	int fd;
3983 	char *where;
3984 {
3985 	int i;
3986 	struct stat stbuf;
3987 
3988 	if (fstat(fd, &stbuf) >= 0 || errno != EBADF)
3989 		return;
3990 
3991 	if (where != NULL)
3992 		syserr("fill_fd: %s: fd %d not open", where, fd);
3993 	else
3994 		MissingFds |= 1 << fd;
3995 	i = open(SM_PATH_DEVNULL, fd == 0 ? O_RDONLY : O_WRONLY, 0666);
3996 	if (i < 0)
3997 	{
3998 		syserr("!fill_fd: %s: cannot open %s",
3999 		       where == NULL ? "startup" : where, SM_PATH_DEVNULL);
4000 	}
4001 	if (fd != i)
4002 	{
4003 		(void) dup2(i, fd);
4004 		(void) close(i);
4005 	}
4006 }
4007 /*
4008 **  SM_PRINTOPTIONS -- print options
4009 **
4010 **	Parameters:
4011 **		options -- array of options.
4012 **
4013 **	Returns:
4014 **		none.
4015 */
4016 
4017 static void
4018 sm_printoptions(options)
4019 	char **options;
4020 {
4021 	int ll;
4022 	char **av;
4023 
4024 	av = options;
4025 	ll = 7;
4026 	while (*av != NULL)
4027 	{
4028 		if (ll + strlen(*av) > 63)
4029 		{
4030 			sm_dprintf("\n");
4031 			ll = 0;
4032 		}
4033 		if (ll == 0)
4034 			sm_dprintf("\t\t");
4035 		else
4036 			sm_dprintf(" ");
4037 		sm_dprintf("%s", *av);
4038 		ll += strlen(*av++) + 1;
4039 	}
4040 	sm_dprintf("\n");
4041 }
4042 
4043 /*
4044 **  TO8BIT -- convert \octal sequences in a test mode input line
4045 **
4046 **	Parameters:
4047 **		str -- the input line.
4048 **
4049 **	Returns:
4050 **		none.
4051 **
4052 **	Side Effects:
4053 **		replaces \0octal in str with octal value.
4054 */
4055 
4056 static bool to8bit __P((char *));
4057 
4058 static bool
4059 to8bit(str)
4060 	char *str;
4061 {
4062 	int c, len;
4063 	char *out, *in;
4064 	bool changed;
4065 
4066 	if (str == NULL)
4067 		return false;
4068 	in = out = str;
4069 	changed = false;
4070 	len = 0;
4071 	while ((c = (*str++ & 0377)) != '\0')
4072 	{
4073 		int oct, nxtc;
4074 
4075 		++len;
4076 		if (c == '\\' &&
4077 		    (nxtc = (*str & 0377)) == '0')
4078 		{
4079 			oct = 0;
4080 			while ((nxtc = (*str & 0377)) != '\0' &&
4081 				isascii(nxtc) && isdigit(nxtc))
4082 			{
4083 				oct <<= 3;
4084 				oct += nxtc - '0';
4085 				++str;
4086 				++len;
4087 			}
4088 			changed = true;
4089 			c = oct;
4090 		}
4091 		*out++ = c;
4092 	}
4093 	*out++ = c;
4094 	if (changed)
4095 	{
4096 		char *q;
4097 
4098 		q = quote_internal_chars(in, in, &len);
4099 		if (q != in)
4100 			sm_strlcpy(in, q, len);
4101 	}
4102 	return changed;
4103 }
4104 
4105 /*
4106 **  TESTMODELINE -- process a test mode input line
4107 **
4108 **	Parameters:
4109 **		line -- the input line.
4110 **		e -- the current environment.
4111 **	Syntax:
4112 **		#  a comment
4113 **		.X process X as a configuration line
4114 **		=X dump a configuration item (such as mailers)
4115 **		$X dump a macro or class
4116 **		/X try an activity
4117 **		X  normal process through rule set X
4118 */
4119 
4120 static void
4121 testmodeline(line, e)
4122 	char *line;
4123 	ENVELOPE *e;
4124 {
4125 	register char *p;
4126 	char *q;
4127 	auto char *delimptr;
4128 	int mid;
4129 	int i, rs;
4130 	STAB *map;
4131 	char **s;
4132 	struct rewrite *rw;
4133 	ADDRESS a;
4134 	char *lbp;
4135 	auto int lbs;
4136 	static int tryflags = RF_COPYNONE;
4137 	char exbuf[MAXLINE];
4138 	char lbuf[MAXLINE];
4139 	extern unsigned char TokTypeNoC[];
4140 	bool eightbit;
4141 
4142 	/* skip leading spaces */
4143 	while (*line == ' ')
4144 		line++;
4145 
4146 	lbp = NULL;
4147 	eightbit = false;
4148 	switch (line[0])
4149 	{
4150 	  case '#':
4151 	  case '\0':
4152 		return;
4153 
4154 	  case '?':
4155 		help("-bt", e);
4156 		return;
4157 
4158 	  case '.':		/* config-style settings */
4159 		switch (line[1])
4160 		{
4161 		  case 'D':
4162 			mid = macid_parse(&line[2], &delimptr);
4163 			if (mid == 0)
4164 				return;
4165 			lbs = sizeof(lbuf);
4166 			lbp = translate_dollars(delimptr, lbuf, &lbs);
4167 			macdefine(&e->e_macro, A_TEMP, mid, lbp);
4168 			if (lbp != lbuf)
4169 				SM_FREE(lbp);
4170 			break;
4171 
4172 		  case 'C':
4173 			if (line[2] == '\0')	/* not to call syserr() */
4174 				return;
4175 
4176 			mid = macid_parse(&line[2], &delimptr);
4177 			if (mid == 0)
4178 				return;
4179 			lbs = sizeof(lbuf);
4180 			lbp = translate_dollars(delimptr, lbuf, &lbs);
4181 			expand(lbp, exbuf, sizeof(exbuf), e);
4182 			if (lbp != lbuf)
4183 				SM_FREE(lbp);
4184 			p = exbuf;
4185 			while (*p != '\0')
4186 			{
4187 				register char *wd;
4188 				char delim;
4189 
4190 				while (*p != '\0' && SM_ISSPACE(*p))
4191 					p++;
4192 				wd = p;
4193 				while (*p != '\0' && !(SM_ISSPACE(*p)))
4194 					p++;
4195 				delim = *p;
4196 				*p = '\0';
4197 				if (wd[0] != '\0')
4198 					setclass(mid, wd);
4199 				*p = delim;
4200 			}
4201 			break;
4202 
4203 		  case '\0':
4204 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4205 					     "Usage: .[DC]macro value(s)\n");
4206 			break;
4207 
4208 		  default:
4209 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4210 					     "Unknown \".\" command %s\n", line);
4211 			break;
4212 		}
4213 		return;
4214 
4215 	  case '=':		/* config-style settings */
4216 		switch (line[1])
4217 		{
4218 		  case 'S':		/* dump rule set */
4219 			rs = strtorwset(&line[2], NULL, ST_FIND);
4220 			if (rs < 0)
4221 			{
4222 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4223 						     "Undefined ruleset %s\n", &line[2]);
4224 				return;
4225 			}
4226 			rw = RewriteRules[rs];
4227 			if (rw == NULL)
4228 				return;
4229 			do
4230 			{
4231 				(void) sm_io_putc(smioout, SM_TIME_DEFAULT,
4232 						  'R');
4233 				s = rw->r_lhs;
4234 				while (*s != NULL)
4235 				{
4236 					xputs(smioout, *s++);
4237 					(void) sm_io_putc(smioout,
4238 							  SM_TIME_DEFAULT, ' ');
4239 				}
4240 				(void) sm_io_putc(smioout, SM_TIME_DEFAULT,
4241 						  '\t');
4242 				(void) sm_io_putc(smioout, SM_TIME_DEFAULT,
4243 						  '\t');
4244 				s = rw->r_rhs;
4245 				while (*s != NULL)
4246 				{
4247 					xputs(smioout, *s++);
4248 					(void) sm_io_putc(smioout,
4249 							  SM_TIME_DEFAULT, ' ');
4250 				}
4251 				(void) sm_io_putc(smioout, SM_TIME_DEFAULT,
4252 						  '\n');
4253 			} while ((rw = rw->r_next) != NULL);
4254 			break;
4255 
4256 		  case 'M':
4257 			for (i = 0; i < MAXMAILERS; i++)
4258 			{
4259 				if (Mailer[i] != NULL)
4260 					printmailer(smioout, Mailer[i]);
4261 			}
4262 			break;
4263 
4264 		  case '\0':
4265 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4266 					     "Usage: =Sruleset or =M\n");
4267 			break;
4268 
4269 		  default:
4270 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4271 					     "Unknown \"=\" command %s\n", line);
4272 			break;
4273 		}
4274 		return;
4275 
4276 	  case '-':		/* set command-line-like opts */
4277 		switch (line[1])
4278 		{
4279 		  case 'd':
4280 			tTflag(&line[2]);
4281 			break;
4282 
4283 		  case '\0':
4284 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4285 					     "Usage: -d{debug arguments}\n");
4286 			break;
4287 
4288 		  default:
4289 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4290 					     "Unknown \"-\" command %s\n", line);
4291 			break;
4292 		}
4293 		return;
4294 
4295 	  case '$':
4296 		if (line[1] == '=')
4297 		{
4298 			mid = macid(&line[2]);
4299 			if (mid != 0)
4300 				stabapply(dump_class, mid);
4301 			return;
4302 		}
4303 		mid = macid(&line[1]);
4304 		if (mid == 0)
4305 			return;
4306 		p = macvalue(mid, e);
4307 		if (p == NULL)
4308 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4309 					     "Undefined\n");
4310 		else
4311 		{
4312 			xputs(smioout, p);
4313 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4314 					     "\n");
4315 		}
4316 		return;
4317 
4318 	  case '/':		/* miscellaneous commands */
4319 		p = &line[strlen(line)];
4320 		while (--p >= line && SM_ISSPACE(*p))
4321 			*p = '\0';
4322 		p = strpbrk(line, " \t");
4323 		if (p != NULL)
4324 		{
4325 			while (SM_ISSPACE(*p))
4326 				*p++ = '\0';
4327 		}
4328 		else
4329 			p = "";
4330 		if (line[1] == '\0')
4331 		{
4332 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4333 					     "Usage: /[canon|map|mx|parse|try|tryflags]\n");
4334 			return;
4335 		}
4336 		if (sm_strcasecmp(&line[1], "quit") == 0)
4337 		{
4338 			CurEnv->e_id = NULL;
4339 			finis(true, true, ExitStat);
4340 			/* NOTREACHED */
4341 		}
4342 		if (sm_strcasecmp(&line[1], "mx") == 0)
4343 		{
4344 #if NAMED_BIND
4345 			/* look up MX records */
4346 			int nmx;
4347 			auto int rcode;
4348 			char *mxhosts[MAXMXHOSTS + 1];
4349 
4350 			if (*p == '\0')
4351 			{
4352 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4353 						     "Usage: /mx address\n");
4354 				return;
4355 			}
4356 			nmx = getmxrr(p, mxhosts, NULL, TRYFALLBACK, &rcode,
4357 				      NULL, -1);
4358 			if (nmx == NULLMX)
4359 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4360 						     "getmxrr(%s) returns null MX (See RFC7505)\n",
4361 						     p);
4362 			else
4363 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4364 						     "getmxrr(%s) returns %d value(s):\n",
4365 						     p, nmx);
4366 			for (i = 0; i < nmx; i++)
4367 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4368 						     "\t%s\n", mxhosts[i]);
4369 #else /* NAMED_BIND */
4370 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4371 					     "No MX code compiled in\n");
4372 #endif /* NAMED_BIND */
4373 		}
4374 		else if (sm_strcasecmp(&line[1], "canon") == 0)
4375 		{
4376 			char host[MAXHOSTNAMELEN];
4377 
4378 			if (*p == '\0')
4379 			{
4380 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4381 						     "Usage: /canon address\n");
4382 				return;
4383 			}
4384 			else if (sm_strlcpy(host, p, sizeof(host)) >= sizeof(host))
4385 			{
4386 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4387 						     "Name too long\n");
4388 				return;
4389 			}
4390 			(void) getcanonname(host, sizeof(host), !HasWildcardMX,
4391 					    NULL);
4392 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4393 					     "getcanonname(%s) returns %s\n",
4394 					     p, host);
4395 		}
4396 		else if (sm_strcasecmp(&line[1], "map") == 0)
4397 		{
4398 			auto int rcode = EX_OK;
4399 			char *av[2];
4400 
4401 			if (*p == '\0')
4402 			{
4403 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4404 						     "Usage: /map mapname key\n");
4405 				return;
4406 			}
4407 			for (q = p; *q != '\0' && !(SM_ISSPACE(*q)); q++)
4408 				continue;
4409 			if (*q == '\0')
4410 			{
4411 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4412 						     "No key specified\n");
4413 				return;
4414 			}
4415 			*q++ = '\0';
4416 			map = stab(p, ST_MAP, ST_FIND);
4417 			if (map == NULL)
4418 			{
4419 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4420 						     "Map named \"%s\" not found\n", p);
4421 				return;
4422 			}
4423 			if (!bitset(MF_OPEN, map->s_map.map_mflags) &&
4424 			    !openmap(&(map->s_map)))
4425 			{
4426 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4427 						     "Map named \"%s\" not open\n", p);
4428 				return;
4429 			}
4430 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4431 					     "map_lookup: %s (%s) ", p, q);
4432 			av[0] = q;
4433 			av[1] = NULL;
4434 			p = (*map->s_map.map_class->map_lookup)
4435 					(&map->s_map, q, av, &rcode);
4436 			if (p == NULL)
4437 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4438 						     "no match (%d)\n",
4439 						     rcode);
4440 			else
4441 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4442 						     "returns %s (%d)\n", p,
4443 						     rcode);
4444 		}
4445 		else if (sm_strcasecmp(&line[1], "try") == 0)
4446 		{
4447 			MAILER *m;
4448 			STAB *st;
4449 			auto int rcode = EX_OK;
4450 
4451 			q = strpbrk(p, " \t");
4452 			if (q != NULL)
4453 			{
4454 				while (SM_ISSPACE(*q))
4455 					*q++ = '\0';
4456 			}
4457 			if (q == NULL || *q == '\0')
4458 			{
4459 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4460 						     "Usage: /try mailer address\n");
4461 				return;
4462 			}
4463 			st = stab(p, ST_MAILER, ST_FIND);
4464 			if (st == NULL)
4465 			{
4466 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4467 						     "Unknown mailer %s\n", p);
4468 				return;
4469 			}
4470 			m = st->s_mailer;
4471 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4472 					     "Trying %s %s address %s for mailer %s\n",
4473 				     bitset(RF_HEADERADDR, tryflags) ? "header"
4474 							: "envelope",
4475 				     bitset(RF_SENDERADDR, tryflags) ? "sender"
4476 							: "recipient", q, p);
4477 			p = remotename(q, m, tryflags, &rcode, CurEnv);
4478 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4479 					     "Rcode = %d, addr = %s\n",
4480 					     rcode, p == NULL ? "<NULL>" : p);
4481 			e->e_to = NULL;
4482 		}
4483 		else if (sm_strcasecmp(&line[1], "tryflags") == 0)
4484 		{
4485 			if (*p == '\0')
4486 			{
4487 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4488 						     "Usage: /tryflags [Hh|Ee][Ss|Rr]\n");
4489 				return;
4490 			}
4491 			for (; *p != '\0'; p++)
4492 			{
4493 				switch (*p)
4494 				{
4495 				  case 'H':
4496 				  case 'h':
4497 					tryflags |= RF_HEADERADDR;
4498 					break;
4499 
4500 				  case 'E':
4501 				  case 'e':
4502 					tryflags &= ~RF_HEADERADDR;
4503 					break;
4504 
4505 				  case 'S':
4506 				  case 's':
4507 					tryflags |= RF_SENDERADDR;
4508 					break;
4509 
4510 				  case 'R':
4511 				  case 'r':
4512 					tryflags &= ~RF_SENDERADDR;
4513 					break;
4514 				}
4515 			}
4516 			exbuf[0] = bitset(RF_HEADERADDR, tryflags) ? 'h' : 'e';
4517 			exbuf[1] = ' ';
4518 			exbuf[2] = bitset(RF_SENDERADDR, tryflags) ? 's' : 'r';
4519 			exbuf[3] = '\0';
4520 			macdefine(&e->e_macro, A_TEMP,
4521 				macid("{addr_type}"), exbuf);
4522 		}
4523 		else if (sm_strcasecmp(&line[1], "parse") == 0)
4524 		{
4525 			if (*p == '\0')
4526 			{
4527 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4528 						     "Usage: /parse address\n");
4529 				return;
4530 			}
4531 			q = crackaddr(p, e);
4532 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4533 					     "Cracked address = ");
4534 			xputs(smioout, q);
4535 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4536 					     "\nParsing %s %s address\n",
4537 					     bitset(RF_HEADERADDR, tryflags) ?
4538 							"header" : "envelope",
4539 					     bitset(RF_SENDERADDR, tryflags) ?
4540 							"sender" : "recipient");
4541 			if (parseaddr(p, &a, tryflags, '\0', NULL, e, true)
4542 			    == NULL)
4543 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4544 						     "Cannot parse\n");
4545 			else if (a.q_host != NULL && a.q_host[0] != '\0')
4546 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4547 						     "mailer %s, host %s, user %s\n",
4548 						     a.q_mailer->m_name,
4549 						     a.q_host,
4550 						     a.q_user);
4551 			else
4552 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4553 						     "mailer %s, user %s\n",
4554 						     a.q_mailer->m_name,
4555 						     a.q_user);
4556 			e->e_to = NULL;
4557 		}
4558 		else if (sm_strcasecmp(&line[1], "header") == 0)
4559 		{
4560 			unsigned long ul;
4561 
4562 			ul = chompheader(p, CHHDR_CHECK|CHHDR_USER, NULL, e);
4563 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4564 					     "ul = %lu\n", ul);
4565 		}
4566 #if NETINET || NETINET6
4567 		else if (sm_strcasecmp(&line[1], "gethostbyname") == 0)
4568 		{
4569 			int family = AF_INET;
4570 
4571 			q = strpbrk(p, " \t");
4572 			if (q != NULL)
4573 			{
4574 				while (SM_ISSPACE(*q))
4575 					*q++ = '\0';
4576 # if NETINET6
4577 				if (*q != '\0' && (strcmp(q, "inet6") == 0 ||
4578 						   strcmp(q, "AAAA") == 0))
4579 					family = AF_INET6;
4580 # endif /* NETINET6 */
4581 			}
4582 			(void) sm_gethostbyname(p, family);
4583 		}
4584 #endif /* NETINET || NETINET6 */
4585 #if DANE
4586 		else if (sm_strcasecmp(&line[1], "dnslookup") == 0)
4587 		{
4588 			DNS_REPLY_T *r;
4589 			int rr_type, family;
4590 			unsigned int flags;
4591 
4592 			rr_type = T_A;
4593 			family = AF_INET;
4594 			flags = RR_AS_TEXT;
4595 			q = strpbrk(p, " \t");
4596 			if (q != NULL)
4597 			{
4598 				char *pflags;
4599 
4600 				while (SM_ISSPACE(*q))
4601 					*q++ = '\0';
4602 				pflags = strpbrk(q, " \t");
4603 				if (pflags != NULL)
4604 				{
4605 					while (SM_ISSPACE(*pflags))
4606 						*pflags++ = '\0';
4607 				}
4608 				rr_type = dns_string_to_type(q);
4609 				if (rr_type == T_A)
4610 					family = AF_INET;
4611 # if NETINET6
4612 				if (rr_type == T_AAAA)
4613 					family = AF_INET6;
4614 # endif
4615 				while (pflags != NULL && *pflags != '\0' &&
4616 					!SM_ISSPACE(*pflags))
4617 				{
4618 					if (*pflags == 'c')
4619 						flags |= RR_NO_CNAME;
4620 					else if (*pflags == 'o')
4621 						flags |= RR_ONLY_CNAME;
4622 					else if (*pflags == 'T')
4623 						flags &= ~RR_AS_TEXT;
4624 					++pflags;
4625 				}
4626 			}
4627 			r = dns_lookup_int(p, C_IN, rr_type,
4628 					0, 0, 0, flags, NULL, NULL);
4629 			if (r != NULL && family >= 0)
4630 			{
4631 				(void) dns2he(r, family);
4632 				dns_free_data(r);
4633 				r = NULL;
4634 			}
4635 		}
4636 #endif /* DANE */
4637 		else
4638 		{
4639 			(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4640 					     "Unknown \"/\" command %s\n",
4641 					     line);
4642 		}
4643 		(void) sm_io_flush(smioout, SM_TIME_DEFAULT);
4644 		return;
4645 	}
4646 
4647 	for (p = line; SM_ISSPACE(*p); p++)
4648 		continue;
4649 	q = p;
4650 	while (*p != '\0' && !(SM_ISSPACE(*p)))
4651 		p++;
4652 	if (*p == '\0')
4653 	{
4654 		(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4655 				     "No address!\n");
4656 		return;
4657 	}
4658 	*p = '\0';
4659 	if (tTd(23, 101))
4660 		eightbit = to8bit(p + 1);
4661 	if (invalidaddr(p + 1, NULL, true))
4662 		return;
4663 	do
4664 	{
4665 		register char **pvp;
4666 		char pvpbuf[PSBUFSIZE];
4667 
4668 		pvp = prescan(++p, ',', pvpbuf, sizeof(pvpbuf), &delimptr,
4669 			      ConfigLevel >= 9 ? TokTypeNoC : ExtTokenTab, false);
4670 		if (pvp == NULL)
4671 			continue;
4672 		p = q;
4673 		while (*p != '\0')
4674 		{
4675 			int status;
4676 
4677 			rs = strtorwset(p, NULL, ST_FIND);
4678 			if (rs < 0)
4679 			{
4680 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4681 						     "Undefined ruleset %s\n",
4682 						     p);
4683 				break;
4684 			}
4685 			status = REWRITE(pvp, rs, e);
4686 			if (status != EX_OK)
4687 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4688 						     "== Ruleset %s (%d) status %d\n",
4689 						     p, rs, status);
4690 			else if (eightbit)
4691 			{
4692 				cataddr(pvp, NULL, exbuf, sizeof(exbuf), '\0',
4693 					true);
4694 				(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4695 						     "cataddr: %s\n",
4696 						     str2prt(exbuf));
4697 			}
4698 			while (*p != '\0' && *p++ != ',')
4699 				continue;
4700 		}
4701 	} while (*(p = delimptr) != '\0');
4702 	(void) sm_io_flush(smioout, SM_TIME_DEFAULT);
4703 }
4704 
4705 static void
4706 dump_class(s, id)
4707 	register STAB *s;
4708 	int id;
4709 {
4710 	if (s->s_symtype != ST_CLASS)
4711 		return;
4712 	if (bitnset(bitidx(id), s->s_class))
4713 		(void) sm_io_fprintf(smioout, SM_TIME_DEFAULT,
4714 				     "%s\n", s->s_name);
4715 }
4716 
4717 /*
4718 **  An exception type used to create QuickAbort exceptions.
4719 **  This is my first cut at converting QuickAbort from longjmp to exceptions.
4720 **  These exceptions have a single integer argument, which is the argument
4721 **  to longjmp in the original code (either 1 or 2).  I don't know the
4722 **  significance of 1 vs 2: the calls to setjmp don't care.
4723 */
4724 
4725 const SM_EXC_TYPE_T EtypeQuickAbort =
4726 {
4727 	SmExcTypeMagic,
4728 	"E:mta.quickabort",
4729 	"i",
4730 	sm_etype_printf,
4731 	"quick abort %0",
4732 };
4733