In the final code block of in_control_internal, remove ia from the hash table
[dragonfly.git] / contrib / ipfilter / ipmon.c
blobf7e2865430838af0286d3ad3e03bf5e1dad308f4
1 /* $FreeBSD: src/contrib/ipfilter/ipmon.c,v 1.5.2.7 2003/03/01 03:55:51 darrenr Exp $ */
2 /* $FreeBSD: src/contrib/ipfilter/ipmon.c,v 1.5.2.8 2004/07/04 09:24:39 darrenr Exp $ */
3 /*
4 * Copyright (C) 1993-2002 by Darren Reed.
6 * See the IPFILTER.LICENCE file for details on licencing.
7 */
8 #ifndef SOLARIS
9 #define SOLARIS (defined(__SVR4) || defined(__svr4__)) && defined(sun)
10 #endif
12 #if defined(__sgi) && (IRIX > 602)
13 # include <sys/ptimers.h>
14 #endif
15 #include <sys/types.h>
16 #include <sys/stat.h>
17 #include <sys/param.h>
18 #include <sys/file.h>
19 #include <sys/time.h>
20 #include <sys/socket.h>
21 #include <sys/ioctl.h>
23 #include <stdio.h>
24 #include <unistd.h>
25 #include <string.h>
26 #include <fcntl.h>
27 #include <errno.h>
28 #if !defined(__SVR4) && !defined(__svr4__)
29 # if (__FreeBSD_version >= 300000)
30 # include <sys/dirent.h>
31 # else
32 # include <sys/dir.h>
33 # endif
34 #else
35 # include <sys/filio.h>
36 # include <sys/byteorder.h>
37 #endif
38 #if !defined(__SVR4) && !defined(__GNUC__)
39 # include <strings.h>
40 #endif
41 #include <signal.h>
42 #include <stdlib.h>
43 #include <stddef.h>
44 #include <netinet/in.h>
45 #include <netinet/in_systm.h>
46 #include <net/if.h>
47 #include <netinet/ip.h>
48 #include <netinet/tcp_fsm.h>
49 #include <netdb.h>
50 #include <arpa/inet.h>
51 #include <arpa/nameser.h>
52 #include <resolv.h>
54 #ifndef linux
55 # include <sys/protosw.h>
56 # include <netinet/ip_var.h>
57 #endif
59 #include <netinet/tcp.h>
60 #include <netinet/ip_icmp.h>
62 #include <ctype.h>
63 #include <syslog.h>
65 #include "netinet/ip_compat.h"
66 #include <netinet/tcpip.h>
67 #include "netinet/ip_fil.h"
68 #include "netinet/ip_nat.h"
69 #include "netinet/ip_state.h"
71 #if !defined(lint)
72 static const char sccsid[] = "@(#)ipmon.c 1.21 6/5/96 (C)1993-2000 Darren Reed";
73 static const char rcsid[] = "@(#)$Id: ipmon.c,v 2.12.2.37 2002/12/06 11:40:26 darrenr Exp $";
74 #endif
77 #if defined(sun) && !defined(SOLARIS2)
78 #define STRERROR(x) sys_errlist[x]
79 extern char *sys_errlist[];
80 #else
81 #define STRERROR(x) strerror(x)
82 #endif
85 struct flags {
86 int value;
87 char flag;
91 typedef struct icmp_subtype {
92 int ist_val;
93 char *ist_name;
94 } icmp_subtype_t;
96 typedef struct icmp_type {
97 int it_val;
98 struct icmp_subtype *it_subtable;
99 size_t it_stsize;
100 char *it_name;
101 } icmp_type_t;
104 #define IST_SZ(x) (sizeof(x)/sizeof(icmp_subtype_t))
107 struct flags tcpfl[] = {
108 { TH_ACK, 'A' },
109 { TH_RST, 'R' },
110 { TH_SYN, 'S' },
111 { TH_FIN, 'F' },
112 { TH_URG, 'U' },
113 { TH_PUSH,'P' },
114 { TH_ECN, 'E' },
115 { TH_CWR, 'C' },
116 { 0, '\0' }
119 #if SOLARIS
120 static char *pidfile = "/etc/opt/ipf/ipmon.pid";
121 #else
122 # if BSD >= 199306
123 static char *pidfile = "/var/run/ipmon.pid";
124 # else
125 static char *pidfile = "/etc/ipmon.pid";
126 # endif
127 #endif
129 static char line[2048];
130 static int opts = 0;
131 static FILE *newlog = NULL;
132 static char *logfile = NULL;
133 static int donehup = 0;
134 static void usage __P((char *));
135 static void handlehup __P((int));
136 static void flushlogs __P((char *, FILE *));
137 static void print_log __P((int, FILE *, char *, int));
138 static void print_ipflog __P((FILE *, char *, int));
139 static void print_natlog __P((FILE *, char *, int));
140 static void print_statelog __P((FILE *, char *, int));
141 static void dumphex __P((FILE *, u_char *, int));
142 static int read_log __P((int, int *, char *, int));
143 static void write_pid __P((char *));
144 static char *icmpname __P((u_int, u_int));
145 static char *icmpname6 __P((u_int, u_int));
146 static icmp_type_t *find_icmptype __P((int, icmp_type_t *, size_t));
147 static icmp_subtype_t *find_icmpsubtype __P((int, icmp_subtype_t *, size_t));
149 char *hostname __P((int, int, u_32_t *));
150 char *portname __P((int, char *, u_int));
151 int main __P((int, char *[]));
153 static void logopts __P((int, char *));
154 static void init_tabs __P((void));
155 static char *getproto __P((u_int));
157 static char **protocols = NULL;
158 static char **udp_ports = NULL;
159 static char **tcp_ports = NULL;
161 #define OPT_SYSLOG 0x001
162 #define OPT_RESOLVE 0x002
163 #define OPT_HEXBODY 0x004
164 #define OPT_VERBOSE 0x008
165 #define OPT_HEXHDR 0x010
166 #define OPT_TAIL 0x020
167 #define OPT_NAT 0x080
168 #define OPT_STATE 0x100
169 #define OPT_FILTER 0x200
170 #define OPT_PORTNUM 0x400
171 #define OPT_LOGALL (OPT_NAT|OPT_STATE|OPT_FILTER)
172 #define OPT_LOGBODY 0x800
174 #define HOSTNAME_V4(a,b) hostname((a), 4, (u_32_t *)&(b))
176 #ifndef LOGFAC
177 #define LOGFAC LOG_LOCAL0
178 #endif
181 static icmp_subtype_t icmpunreachnames[] = {
182 { ICMP_UNREACH_NET, "net" },
183 { ICMP_UNREACH_HOST, "host" },
184 { ICMP_UNREACH_PROTOCOL, "protocol" },
185 { ICMP_UNREACH_PORT, "port" },
186 { ICMP_UNREACH_NEEDFRAG, "needfrag" },
187 { ICMP_UNREACH_SRCFAIL, "srcfail" },
188 { ICMP_UNREACH_NET_UNKNOWN, "net_unknown" },
189 { ICMP_UNREACH_HOST_UNKNOWN, "host_unknown" },
190 { ICMP_UNREACH_NET, "isolated" },
191 { ICMP_UNREACH_NET_PROHIB, "net_prohib" },
192 { ICMP_UNREACH_NET_PROHIB, "host_prohib" },
193 { ICMP_UNREACH_TOSNET, "tosnet" },
194 { ICMP_UNREACH_TOSHOST, "toshost" },
195 { ICMP_UNREACH_ADMIN_PROHIBIT, "admin_prohibit" },
196 { -2, NULL }
199 static icmp_subtype_t redirectnames[] = {
200 { ICMP_REDIRECT_NET, "net" },
201 { ICMP_REDIRECT_HOST, "host" },
202 { ICMP_REDIRECT_TOSNET, "tosnet" },
203 { ICMP_REDIRECT_TOSHOST, "toshost" },
204 { -2, NULL }
207 static icmp_subtype_t timxceednames[] = {
208 { ICMP_TIMXCEED_INTRANS, "transit" },
209 { ICMP_TIMXCEED_REASS, "reassem" },
210 { -2, NULL }
213 static icmp_subtype_t paramnames[] = {
214 { ICMP_PARAMPROB_ERRATPTR, "errata_pointer" },
215 { ICMP_PARAMPROB_OPTABSENT, "optmissing" },
216 { ICMP_PARAMPROB_LENGTH, "length" },
217 { -2, NULL }
220 static icmp_type_t icmptypes[] = {
221 { ICMP_ECHOREPLY, NULL, 0, "echoreply" },
222 { -1, NULL, 0, NULL },
223 { -1, NULL, 0, NULL },
224 { ICMP_UNREACH, icmpunreachnames,
225 IST_SZ(icmpunreachnames),"unreach" },
226 { ICMP_SOURCEQUENCH, NULL, 0, "sourcequench" },
227 { ICMP_REDIRECT, redirectnames,
228 IST_SZ(redirectnames), "redirect" },
229 { -1, NULL, 0, NULL },
230 { -1, NULL, 0, NULL },
231 { ICMP_ECHO, NULL, 0, "echo" },
232 { ICMP_ROUTERADVERT, NULL, 0, "routeradvert" },
233 { ICMP_ROUTERSOLICIT, NULL, 0, "routersolicit" },
234 { ICMP_TIMXCEED, timxceednames,
235 IST_SZ(timxceednames), "timxceed" },
236 { ICMP_PARAMPROB, paramnames,
237 IST_SZ(paramnames), "paramprob" },
238 { ICMP_TSTAMP, NULL, 0, "timestamp" },
239 { ICMP_TSTAMPREPLY, NULL, 0, "timestampreply" },
240 { ICMP_IREQ, NULL, 0, "inforeq" },
241 { ICMP_IREQREPLY, NULL, 0, "inforeply" },
242 { ICMP_MASKREQ, NULL, 0, "maskreq" },
243 { ICMP_MASKREPLY, NULL, 0, "maskreply" },
244 { -2, NULL, 0, NULL }
247 static icmp_subtype_t icmpredirect6[] = {
248 { ICMP6_DST_UNREACH_NOROUTE, "noroute" },
249 { ICMP6_DST_UNREACH_ADMIN, "admin" },
250 { ICMP6_DST_UNREACH_NOTNEIGHBOR, "neighbour" },
251 { ICMP6_DST_UNREACH_ADDR, "address" },
252 { ICMP6_DST_UNREACH_NOPORT, "noport" },
253 { -2, NULL }
256 static icmp_subtype_t icmptimexceed6[] = {
257 { ICMP6_TIME_EXCEED_TRANSIT, "intransit" },
258 { ICMP6_TIME_EXCEED_REASSEMBLY, "reassem" },
259 { -2, NULL }
262 static icmp_subtype_t icmpparamprob6[] = {
263 { ICMP6_PARAMPROB_HEADER, "header" },
264 { ICMP6_PARAMPROB_NEXTHEADER, "nextheader" },
265 { ICMP6_PARAMPROB_OPTION, "option" },
266 { -2, NULL }
269 static icmp_subtype_t icmpquerysubject6[] = {
270 { ICMP6_NI_SUBJ_IPV6, "ipv6" },
271 { ICMP6_NI_SUBJ_FQDN, "fqdn" },
272 { ICMP6_NI_SUBJ_IPV4, "ipv4" },
273 { -2, NULL },
276 static icmp_subtype_t icmpnodeinfo6[] = {
277 { ICMP6_NI_SUCCESS, "success" },
278 { ICMP6_NI_REFUSED, "refused" },
279 { ICMP6_NI_UNKNOWN, "unknown" },
280 { -2, NULL }
283 static icmp_subtype_t icmprenumber6[] = {
284 { ICMP6_ROUTER_RENUMBERING_COMMAND, "command" },
285 { ICMP6_ROUTER_RENUMBERING_RESULT, "result" },
286 { ICMP6_ROUTER_RENUMBERING_SEQNUM_RESET, "seqnum_reset" },
287 { -2, NULL }
290 static icmp_type_t icmptypes6[] = {
291 { 0, NULL, 0, NULL },
292 { ICMP6_DST_UNREACH, icmpredirect6,
293 IST_SZ(icmpredirect6), "unreach" },
294 { ICMP6_PACKET_TOO_BIG, NULL, 0, "toobig" },
295 { ICMP6_TIME_EXCEEDED, icmptimexceed6,
296 IST_SZ(icmptimexceed6), "timxceed" },
297 { ICMP6_PARAM_PROB, icmpparamprob6,
298 IST_SZ(icmpparamprob6), "paramprob" },
299 { ICMP6_ECHO_REQUEST, NULL, 0, "echo" },
300 { ICMP6_ECHO_REPLY, NULL, 0, "echoreply" },
301 { ICMP6_MEMBERSHIP_QUERY, icmpquerysubject6,
302 IST_SZ(icmpquerysubject6), "groupmemberquery" },
303 { ICMP6_MEMBERSHIP_REPORT,NULL, 0, "groupmemberreport" },
304 { ICMP6_MEMBERSHIP_REDUCTION,NULL, 0, "groupmemberterm" },
305 { ND_ROUTER_SOLICIT, NULL, 0, "routersolicit" },
306 { ND_ROUTER_ADVERT, NULL, 0, "routeradvert" },
307 { ND_NEIGHBOR_SOLICIT, NULL, 0, "neighborsolicit" },
308 { ND_NEIGHBOR_ADVERT, NULL, 0, "neighboradvert" },
309 { ND_REDIRECT, NULL, 0, "redirect" },
310 { ICMP6_ROUTER_RENUMBERING, icmprenumber6,
311 IST_SZ(icmprenumber6), "routerrenumber" },
312 { ICMP6_WRUREQUEST, NULL, 0, "whoareyourequest" },
313 { ICMP6_WRUREPLY, NULL, 0, "whoareyoureply" },
314 { ICMP6_FQDN_QUERY, NULL, 0, "fqdnquery" },
315 { ICMP6_FQDN_REPLY, NULL, 0, "fqdnreply" },
316 { ICMP6_NI_QUERY, icmpnodeinfo6,
317 IST_SZ(icmpnodeinfo6), "nodeinforequest" },
318 { ICMP6_NI_REPLY, NULL, 0, "nodeinforeply" },
319 { MLD6_MTRACE_RESP, NULL, 0, "mtraceresponse" },
320 { MLD6_MTRACE, NULL, 0, "mtracerequest" },
321 { -2, NULL, 0, NULL }
324 static icmp_subtype_t *find_icmpsubtype(type, table, tablesz)
325 int type;
326 icmp_subtype_t *table;
327 size_t tablesz;
329 icmp_subtype_t *ist;
330 int i;
332 if (tablesz < 2)
333 return NULL;
335 if ((type < 0) || (type > table[tablesz - 2].ist_val))
336 return NULL;
338 i = type;
339 if (table[type].ist_val == type)
340 return table + type;
342 for (i = 0, ist = table; ist->ist_val != -2; i++, ist++)
343 if (ist->ist_val == type)
344 return ist;
345 return NULL;
349 static icmp_type_t *find_icmptype(type, table, tablesz)
350 int type;
351 icmp_type_t *table;
352 size_t tablesz;
354 icmp_type_t *it;
355 int i;
357 if (tablesz < 2)
358 return NULL;
360 if ((type < 0) || (type > table[tablesz - 2].it_val))
361 return NULL;
363 i = type;
364 if (table[type].it_val == type)
365 return table + type;
367 for (i = 0, it = table; it->it_val != -2; i++, it++)
368 if (it->it_val == type)
369 return it;
370 return NULL;
374 static void handlehup(sig)
375 int sig;
377 FILE *fp;
379 signal(SIGHUP, handlehup);
380 if (logfile && (fp = fopen(logfile, "a")))
381 newlog = fp;
382 init_tabs();
383 donehup = 1;
387 static void init_tabs()
389 struct protoent *p;
390 struct servent *s;
391 char *name, **tab;
392 int port;
394 if (protocols != NULL) {
395 free(protocols);
396 protocols = NULL;
398 protocols = (char **)malloc(256 * sizeof(*protocols));
399 if (protocols != NULL) {
400 bzero((char *)protocols, 256 * sizeof(*protocols));
402 setprotoent(1);
403 while ((p = getprotoent()) != NULL)
404 if (p->p_proto >= 0 && p->p_proto <= 255 &&
405 p->p_name != NULL && protocols[p->p_proto] == NULL)
406 protocols[p->p_proto] = strdup(p->p_name);
407 endprotoent();
410 if (udp_ports != NULL) {
411 free(udp_ports);
412 udp_ports = NULL;
414 udp_ports = (char **)malloc(65536 * sizeof(*udp_ports));
415 if (udp_ports != NULL)
416 bzero((char *)udp_ports, 65536 * sizeof(*udp_ports));
418 if (tcp_ports != NULL) {
419 free(tcp_ports);
420 tcp_ports = NULL;
422 tcp_ports = (char **)malloc(65536 * sizeof(*tcp_ports));
423 if (tcp_ports != NULL)
424 bzero((char *)tcp_ports, 65536 * sizeof(*tcp_ports));
426 setservent(1);
427 while ((s = getservent()) != NULL) {
428 if (s->s_proto == NULL)
429 continue;
430 else if (!strcmp(s->s_proto, "tcp")) {
431 port = ntohs(s->s_port);
432 name = s->s_name;
433 tab = tcp_ports;
434 } else if (!strcmp(s->s_proto, "udp")) {
435 port = ntohs(s->s_port);
436 name = s->s_name;
437 tab = udp_ports;
438 } else
439 continue;
440 if ((port < 0 || port > 65535) || (name == NULL))
441 continue;
442 tab[port] = strdup(name);
444 endservent();
448 static char *getproto(p)
449 u_int p;
451 static char pnum[4];
452 char *s;
454 p &= 0xff;
455 s = protocols ? protocols[p] : NULL;
456 if (s == NULL) {
457 sprintf(pnum, "%u", p);
458 s = pnum;
460 return s;
464 static int read_log(fd, lenp, buf, bufsize)
465 int fd, bufsize, *lenp;
466 char *buf;
468 int nr;
470 nr = read(fd, buf, bufsize);
471 if (!nr)
472 return 2;
473 if ((nr < 0) && (errno != EINTR))
474 return -1;
475 *lenp = nr;
476 return 0;
480 char *hostname(res, v, ip)
481 int res, v;
482 u_32_t *ip;
484 # define MAX_INETA 16
485 static char hname[MAXHOSTNAMELEN + MAX_INETA + 3];
486 #ifdef USE_INET6
487 static char hostbuf[MAXHOSTNAMELEN+1];
488 #endif
489 struct hostent *hp;
490 struct in_addr ipa;
492 if (v == 4) {
493 ipa.s_addr = *ip;
494 if (!res)
495 return inet_ntoa(ipa);
496 hp = gethostbyaddr((char *)ip, sizeof(*ip), AF_INET);
497 if (!hp)
498 return inet_ntoa(ipa);
499 sprintf(hname, "%.*s[%s]", MAXHOSTNAMELEN, hp->h_name,
500 inet_ntoa(ipa));
501 return hname;
503 #ifdef USE_INET6
504 (void) inet_ntop(AF_INET6, ip, hostbuf, sizeof(hostbuf) - 1);
505 hostbuf[MAXHOSTNAMELEN] = '\0';
506 return hostbuf;
507 #else
508 return "IPv6";
509 #endif
513 char *portname(res, proto, port)
514 int res;
515 char *proto;
516 u_int port;
518 static char pname[8];
519 char *s;
521 port = ntohs(port);
522 port &= 0xffff;
523 (void) sprintf(pname, "%u", port);
524 if (!res || (opts & OPT_PORTNUM))
525 return pname;
526 s = NULL;
527 if (!strcmp(proto, "tcp"))
528 s = tcp_ports[port];
529 else if (!strcmp(proto, "udp"))
530 s = udp_ports[port];
531 if (s == NULL)
532 s = pname;
533 return s;
537 static char *icmpname(type, code)
538 u_int type;
539 u_int code;
541 static char name[80];
542 icmp_subtype_t *ist;
543 icmp_type_t *it;
544 char *s;
546 s = NULL;
547 it = find_icmptype(type, icmptypes, sizeof(icmptypes) / sizeof(*it));
548 if (it != NULL)
549 s = it->it_name;
551 if (s == NULL)
552 sprintf(name, "icmptype(%d)/", type);
553 else
554 sprintf(name, "%s/", s);
556 ist = NULL;
557 if (it != NULL && it->it_subtable != NULL)
558 ist = find_icmpsubtype(code, it->it_subtable, it->it_stsize);
560 if (ist != NULL && ist->ist_name != NULL)
561 strcat(name, ist->ist_name);
562 else
563 sprintf(name + strlen(name), "%d", code);
565 return name;
568 static char *icmpname6(type, code)
569 u_int type;
570 u_int code;
572 static char name[80];
573 icmp_subtype_t *ist;
574 icmp_type_t *it;
575 char *s;
577 s = NULL;
578 it = find_icmptype(type, icmptypes6, sizeof(icmptypes6) / sizeof(*it));
579 if (it != NULL)
580 s = it->it_name;
582 if (s == NULL)
583 sprintf(name, "icmpv6type(%d)/", type);
584 else
585 sprintf(name, "%s/", s);
587 ist = NULL;
588 if (it != NULL && it->it_subtable != NULL)
589 ist = find_icmpsubtype(code, it->it_subtable, it->it_stsize);
591 if (ist != NULL && ist->ist_name != NULL)
592 strcat(name, ist->ist_name);
593 else
594 sprintf(name + strlen(name), "%d", code);
596 return name;
600 static void dumphex(log, buf, len)
601 FILE *log;
602 u_char *buf;
603 int len;
605 char line[80];
606 int i, j, k;
607 u_char *s = buf, *t = (u_char *)line;
609 if (len == 0 || buf == 0)
610 return;
611 *line = '\0';
613 for (i = len, j = 0; i; i--, j++, s++) {
614 if (j && !(j & 0xf)) {
615 *t++ = '\n';
616 *t = '\0';
617 if (!(opts & OPT_SYSLOG))
618 fputs(line, log);
619 else
620 syslog(LOG_INFO, "%s", line);
621 t = (u_char *)line;
622 *t = '\0';
624 sprintf((char *)t, "%02x", *s & 0xff);
625 t += 2;
626 if (!((j + 1) & 0xf)) {
627 s -= 15;
628 sprintf((char *)t, " ");
629 t += 8;
630 for (k = 16; k; k--, s++)
631 *t++ = (isprint(*s) ? *s : '.');
632 s--;
635 if ((j + 1) & 0xf)
636 *t++ = ' ';;
639 if (j & 0xf) {
640 for (k = 16 - (j & 0xf); k; k--) {
641 *t++ = ' ';
642 *t++ = ' ';
643 *t++ = ' ';
645 sprintf((char *)t, " ");
646 t += 7;
647 s -= j & 0xf;
648 for (k = j & 0xf; k; k--, s++)
649 *t++ = (isprint(*s) ? *s : '.');
650 *t++ = '\n';
651 *t = '\0';
653 if (!(opts & OPT_SYSLOG)) {
654 fputs(line, log);
655 fflush(log);
656 } else
657 syslog(LOG_INFO, "%s", line);
660 static void print_natlog(log, buf, blen)
661 FILE *log;
662 char *buf;
663 int blen;
665 struct natlog *nl;
666 iplog_t *ipl = (iplog_t *)buf;
667 char *t = line;
668 struct tm *tm;
669 int res, i, len;
670 char *proto;
672 nl = (struct natlog *)((char *)ipl + IPLOG_SIZE);
673 res = (opts & OPT_RESOLVE) ? 1 : 0;
674 tm = localtime((time_t *)&ipl->ipl_sec);
675 len = sizeof(line);
676 if (!(opts & OPT_SYSLOG)) {
677 (void) strftime(t, len, "%d/%m/%Y ", tm);
678 i = strlen(t);
679 len -= i;
680 t += i;
682 (void) strftime(t, len, "%T", tm);
683 t += strlen(t);
684 (void) sprintf(t, ".%-.6ld @%hd ", ipl->ipl_usec, nl->nl_rule + 1);
685 t += strlen(t);
687 if (nl->nl_type == NL_NEWMAP)
688 strcpy(t, "NAT:MAP ");
689 else if (nl->nl_type == NL_NEWRDR)
690 strcpy(t, "NAT:RDR ");
691 else if (nl->nl_type == NL_EXPIRE)
692 strcpy(t, "NAT:EXPIRE ");
693 else if (nl->nl_type == NL_FLUSH)
694 strcpy(t, "NAT:FLUSH ");
695 else if (nl->nl_type == NL_NEWBIMAP)
696 strcpy(t, "NAT:BIMAP ");
697 else if (nl->nl_type == NL_NEWBLOCK)
698 strcpy(t, "NAT:MAPBLOCK ");
699 else
700 sprintf(t, "Type: %d ", nl->nl_type);
701 t += strlen(t);
703 proto = getproto(nl->nl_p);
705 (void) sprintf(t, "%s,%s <- -> ", HOSTNAME_V4(res, nl->nl_inip),
706 portname(res, proto, (u_int)nl->nl_inport));
707 t += strlen(t);
708 (void) sprintf(t, "%s,%s ", HOSTNAME_V4(res, nl->nl_outip),
709 portname(res, proto, (u_int)nl->nl_outport));
710 t += strlen(t);
711 (void) sprintf(t, "[%s,%s]", HOSTNAME_V4(res, nl->nl_origip),
712 portname(res, proto, (u_int)nl->nl_origport));
713 t += strlen(t);
714 if (nl->nl_type == NL_EXPIRE) {
715 #ifdef USE_QUAD_T
716 (void) sprintf(t, " Pkts %qd Bytes %qd",
717 (long long)nl->nl_pkts,
718 (long long)nl->nl_bytes);
719 #else
720 (void) sprintf(t, " Pkts %ld Bytes %ld",
721 nl->nl_pkts, nl->nl_bytes);
722 #endif
723 t += strlen(t);
726 *t++ = '\n';
727 *t++ = '\0';
728 if (opts & OPT_SYSLOG)
729 syslog(LOG_INFO, "%s", line);
730 else
731 (void) fprintf(log, "%s", line);
735 static void print_statelog(log, buf, blen)
736 FILE *log;
737 char *buf;
738 int blen;
740 struct ipslog *sl;
741 iplog_t *ipl = (iplog_t *)buf;
742 char *t = line, *proto;
743 struct tm *tm;
744 int res, i, len;
746 sl = (struct ipslog *)((char *)ipl + IPLOG_SIZE);
747 res = (opts & OPT_RESOLVE) ? 1 : 0;
748 tm = localtime((time_t *)&ipl->ipl_sec);
749 len = sizeof(line);
750 if (!(opts & OPT_SYSLOG)) {
751 (void) strftime(t, len, "%d/%m/%Y ", tm);
752 i = strlen(t);
753 len -= i;
754 t += i;
756 (void) strftime(t, len, "%T", tm);
757 t += strlen(t);
758 (void) sprintf(t, ".%-.6ld ", ipl->ipl_usec);
759 t += strlen(t);
761 if (sl->isl_type == ISL_NEW)
762 strcpy(t, "STATE:NEW ");
763 else if (sl->isl_type == ISL_EXPIRE) {
764 if ((sl->isl_p == IPPROTO_TCP) &&
765 (sl->isl_state[0] > TCPS_ESTABLISHED ||
766 sl->isl_state[1] > TCPS_ESTABLISHED))
767 strcpy(t, "STATE:CLOSE ");
768 else
769 strcpy(t, "STATE:EXPIRE ");
770 } else if (sl->isl_type == ISL_FLUSH)
771 strcpy(t, "STATE:FLUSH ");
772 else if (sl->isl_type == ISL_REMOVE)
773 strcpy(t, "STATE:REMOVE ");
774 else
775 sprintf(t, "Type: %d ", sl->isl_type);
776 t += strlen(t);
778 proto = getproto(sl->isl_p);
780 if (sl->isl_p == IPPROTO_TCP || sl->isl_p == IPPROTO_UDP) {
781 (void) sprintf(t, "%s,%s -> ",
782 hostname(res, sl->isl_v, (u_32_t *)&sl->isl_src),
783 portname(res, proto, (u_int)sl->isl_sport));
784 t += strlen(t);
785 (void) sprintf(t, "%s,%s PR %s",
786 hostname(res, sl->isl_v, (u_32_t *)&sl->isl_dst),
787 portname(res, proto, (u_int)sl->isl_dport), proto);
788 } else if (sl->isl_p == IPPROTO_ICMP) {
789 (void) sprintf(t, "%s -> ", hostname(res, sl->isl_v,
790 (u_32_t *)&sl->isl_src));
791 t += strlen(t);
792 (void) sprintf(t, "%s PR icmp %d",
793 hostname(res, sl->isl_v, (u_32_t *)&sl->isl_dst),
794 sl->isl_itype);
795 } else if (sl->isl_p == IPPROTO_ICMPV6) {
796 (void) sprintf(t, "%s -> ", hostname(res, sl->isl_v,
797 (u_32_t *)&sl->isl_src));
798 t += strlen(t);
799 (void) sprintf(t, "%s PR icmpv6 %d",
800 hostname(res, sl->isl_v, (u_32_t *)&sl->isl_dst),
801 sl->isl_itype);
803 t += strlen(t);
804 if (sl->isl_type != ISL_NEW) {
805 #ifdef USE_QUAD_T
806 (void) sprintf(t, " Pkts %qd Bytes %qd",
807 (long long)sl->isl_pkts,
808 (long long)sl->isl_bytes);
809 #else
810 (void) sprintf(t, " Pkts %ld Bytes %ld",
811 sl->isl_pkts, sl->isl_bytes);
812 #endif
813 t += strlen(t);
816 *t++ = '\n';
817 *t++ = '\0';
818 if (opts & OPT_SYSLOG)
819 syslog(LOG_INFO, "%s", line);
820 else
821 (void) fprintf(log, "%s", line);
825 static void print_log(logtype, log, buf, blen)
826 FILE *log;
827 char *buf;
828 int logtype, blen;
830 iplog_t *ipl;
831 char *bp = NULL, *bpo = NULL;
832 int psize;
834 while (blen > 0) {
835 ipl = (iplog_t *)buf;
836 if ((u_long)ipl & (sizeof(long)-1)) {
837 if (bp)
838 bpo = bp;
839 bp = (char *)malloc(blen);
840 bcopy((char *)ipl, bp, blen);
841 if (bpo) {
842 free(bpo);
843 bpo = NULL;
845 buf = bp;
846 continue;
848 if (ipl->ipl_magic != IPL_MAGIC) {
849 /* invalid data or out of sync */
850 break;
852 psize = ipl->ipl_dsize;
853 switch (logtype)
855 case IPL_LOGIPF :
856 print_ipflog(log, buf, psize);
857 break;
858 case IPL_LOGNAT :
859 print_natlog(log, buf, psize);
860 break;
861 case IPL_LOGSTATE :
862 print_statelog(log, buf, psize);
863 break;
866 blen -= psize;
867 buf += psize;
869 if (bp)
870 free(bp);
871 return;
875 static void print_ipflog(log, buf, blen)
876 FILE *log;
877 char *buf;
878 int blen;
880 tcphdr_t *tp;
881 struct icmp *ic;
882 struct icmp *icmp;
883 struct tm *tm;
884 char *t, *proto;
885 int i, v, lvl, res, len, off, plen, ipoff;
886 ip_t *ipc, *ip;
887 u_short hl, p;
888 ipflog_t *ipf;
889 iplog_t *ipl;
890 u_32_t *s, *d;
891 #ifdef USE_INET6
892 ip6_t *ip6;
893 #endif
895 ipl = (iplog_t *)buf;
896 ipf = (ipflog_t *)((char *)buf + IPLOG_SIZE);
897 ip = (ip_t *)((char *)ipf + sizeof(*ipf));
898 v = ip->ip_v;
899 res = (opts & OPT_RESOLVE) ? 1 : 0;
900 t = line;
901 *t = '\0';
902 tm = localtime((time_t *)&ipl->ipl_sec);
903 #ifdef linux
904 if (v == 4)
905 ip->ip_len = ntohs(ip->ip_len);
906 #endif
908 len = sizeof(line);
909 if (!(opts & OPT_SYSLOG)) {
910 (void) strftime(t, len, "%d/%m/%Y ", tm);
911 i = strlen(t);
912 len -= i;
913 t += i;
915 (void) strftime(t, len, "%T", tm);
916 t += strlen(t);
917 (void) sprintf(t, ".%-.6ld ", ipl->ipl_usec);
918 t += strlen(t);
919 if (ipl->ipl_count > 1) {
920 (void) sprintf(t, "%dx ", ipl->ipl_count);
921 t += strlen(t);
923 #if (SOLARIS || \
924 (defined(NetBSD) && (NetBSD <= 1991011) && (NetBSD >= 199603)) || \
925 (defined(OpenBSD) && (OpenBSD >= 199603))) || defined(linux) || \
926 defined(__DragonFly__)
928 char ifname[sizeof(ipf->fl_ifname) + 1];
930 strncpy(ifname, (char *)ipf->fl_ifname, sizeof(ipf->fl_ifname));
931 ifname[sizeof(ipf->fl_ifname)] = '\0';
932 (void) sprintf(t, "%s", ifname);
933 t += strlen(t);
934 # if SOLARIS
935 if (isalpha(*(t - 1))) {
936 sprintf(t, "%d", ipf->fl_unit);
937 t += strlen(t);
939 # endif
941 #else
942 for (len = 0; len < 3; len++)
943 if (ipf->fl_ifname[len] == '\0')
944 break;
945 if (ipf->fl_ifname[len])
946 len++;
947 (void) sprintf(t, "%*.*s%u", len, len, ipf->fl_ifname, ipf->fl_unit);
948 t += strlen(t);
949 #endif
950 if (ipf->fl_group == 0xffffffff)
951 strcat(t, " @-1:");
952 else
953 (void) sprintf(t, " @%u:", ipf->fl_group);
954 t += strlen(t);
955 if (ipf->fl_rule == 0xffffffff)
956 strcat(t, "-1 ");
957 else
958 (void) sprintf(t, "%u ", ipf->fl_rule + 1);
959 t += strlen(t);
961 if (ipf->fl_flags & FF_SHORT) {
962 *t++ = 'S';
963 lvl = LOG_ERR;
964 } else if (ipf->fl_flags & FR_PASS) {
965 if (ipf->fl_flags & FR_LOG)
966 *t++ = 'p';
967 else
968 *t++ = 'P';
969 lvl = LOG_NOTICE;
970 } else if (ipf->fl_flags & FR_BLOCK) {
971 if (ipf->fl_flags & FR_LOG)
972 *t++ = 'b';
973 else
974 *t++ = 'B';
975 lvl = LOG_WARNING;
976 } else if (ipf->fl_flags & FF_LOGNOMATCH) {
977 *t++ = 'n';
978 lvl = LOG_NOTICE;
979 } else {
980 *t++ = 'L';
981 lvl = LOG_INFO;
983 if (ipf->fl_loglevel != 0xffff)
984 lvl = ipf->fl_loglevel;
985 *t++ = ' ';
986 *t = '\0';
988 if (v == 6) {
989 #ifdef USE_INET6
990 off = 0;
991 ipoff = 0;
992 hl = sizeof(ip6_t);
993 ip6 = (ip6_t *)ip;
994 p = (u_short)ip6->ip6_nxt;
995 s = (u_32_t *)&ip6->ip6_src;
996 d = (u_32_t *)&ip6->ip6_dst;
997 plen = hl + ntohs(ip6->ip6_plen);
998 #else
999 sprintf(t, "ipv6");
1000 goto printipflog;
1001 #endif
1002 } else if (v == 4) {
1003 hl = (ip->ip_hl << 2);
1004 ipoff = ip->ip_off;
1005 off = ipoff & IP_OFFMASK;
1006 p = (u_short)ip->ip_p;
1007 s = (u_32_t *)&ip->ip_src;
1008 d = (u_32_t *)&ip->ip_dst;
1009 plen = ip->ip_len;
1010 } else {
1011 goto printipflog;
1013 proto = getproto(p);
1015 if ((p == IPPROTO_TCP || p == IPPROTO_UDP) && !off) {
1016 tp = (tcphdr_t *)((char *)ip + hl);
1017 if (!(ipf->fl_flags & FF_SHORT)) {
1018 (void) sprintf(t, "%s,%s -> ", hostname(res, v, s),
1019 portname(res, proto, (u_int)tp->th_sport));
1020 t += strlen(t);
1021 (void) sprintf(t, "%s,%s PR %s len %hu %hu",
1022 hostname(res, v, d),
1023 portname(res, proto, (u_int)tp->th_dport),
1024 proto, hl, plen);
1025 t += strlen(t);
1027 if (p == IPPROTO_TCP) {
1028 *t++ = ' ';
1029 *t++ = '-';
1030 for (i = 0; tcpfl[i].value; i++)
1031 if (tp->th_flags & tcpfl[i].value)
1032 *t++ = tcpfl[i].flag;
1033 if (opts & OPT_VERBOSE) {
1034 (void) sprintf(t, " %lu %lu %hu",
1035 (u_long)(ntohl(tp->th_seq)),
1036 (u_long)(ntohl(tp->th_ack)),
1037 ntohs(tp->th_win));
1038 t += strlen(t);
1041 *t = '\0';
1042 } else {
1043 (void) sprintf(t, "%s -> ", hostname(res, v, s));
1044 t += strlen(t);
1045 (void) sprintf(t, "%s PR %s len %hu %hu",
1046 hostname(res, v, d), proto, hl, plen);
1048 } else if ((p == IPPROTO_ICMPV6) && !off && (v == 6)) {
1049 ic = (struct icmp *)((char *)ip + hl);
1050 (void) sprintf(t, "%s -> ", hostname(res, v, s));
1051 t += strlen(t);
1052 (void) sprintf(t, "%s PR icmpv6 len %hu %hu icmpv6 %s",
1053 hostname(res, v, d), hl, plen,
1054 icmpname6(ic->icmp_type, ic->icmp_code));
1055 } else if ((p == IPPROTO_ICMP) && !off && (v == 4)) {
1056 ic = (struct icmp *)((char *)ip + hl);
1057 (void) sprintf(t, "%s -> ", hostname(res, v, s));
1058 t += strlen(t);
1059 (void) sprintf(t, "%s PR icmp len %hu %hu icmp %s",
1060 hostname(res, v, d), hl, plen,
1061 icmpname(ic->icmp_type, ic->icmp_code));
1062 if (ic->icmp_type == ICMP_UNREACH ||
1063 ic->icmp_type == ICMP_SOURCEQUENCH ||
1064 ic->icmp_type == ICMP_PARAMPROB ||
1065 ic->icmp_type == ICMP_REDIRECT ||
1066 ic->icmp_type == ICMP_TIMXCEED) {
1067 ipc = &ic->icmp_ip;
1068 i = ntohs(ipc->ip_len);
1069 ipoff = ntohs(ipc->ip_off);
1070 proto = getproto(ipc->ip_p);
1072 if (!(ipoff & IP_OFFMASK) &&
1073 ((ipc->ip_p == IPPROTO_TCP) ||
1074 (ipc->ip_p == IPPROTO_UDP))) {
1075 tp = (tcphdr_t *)((char *)ipc + hl);
1076 t += strlen(t);
1077 (void) sprintf(t, " for %s,%s -",
1078 HOSTNAME_V4(res, ipc->ip_src),
1079 portname(res, proto,
1080 (u_int)tp->th_sport));
1081 t += strlen(t);
1082 (void) sprintf(t, " %s,%s PR %s len %hu %hu",
1083 HOSTNAME_V4(res, ipc->ip_dst),
1084 portname(res, proto,
1085 (u_int)tp->th_dport),
1086 proto, ipc->ip_hl << 2, i);
1087 } else if (!(ipoff & IP_OFFMASK) &&
1088 (ipc->ip_p == IPPROTO_ICMP)) {
1089 icmp = (icmphdr_t *)((char *)ipc + hl);
1091 t += strlen(t);
1092 (void) sprintf(t, " for %s -",
1093 HOSTNAME_V4(res, ipc->ip_src));
1094 t += strlen(t);
1095 (void) sprintf(t,
1096 " %s PR icmp len %hu %hu icmp %d/%d",
1097 HOSTNAME_V4(res, ipc->ip_dst),
1098 ipc->ip_hl << 2, i,
1099 icmp->icmp_type, icmp->icmp_code);
1101 } else {
1102 t += strlen(t);
1103 (void) sprintf(t, " for %s -",
1104 HOSTNAME_V4(res, ipc->ip_src));
1105 t += strlen(t);
1106 (void) sprintf(t, " %s PR %s len %hu (%hu)",
1107 HOSTNAME_V4(res, ipc->ip_dst), proto,
1108 ipc->ip_hl << 2, i);
1109 t += strlen(t);
1110 if (ipoff & IP_OFFMASK) {
1111 (void) sprintf(t, " (frag %d:%hu@%hu%s%s)",
1112 ntohs(ipc->ip_id),
1113 i - (ipc->ip_hl<<2),
1114 (ipoff & IP_OFFMASK) << 3,
1115 ipoff & IP_MF ? "+" : "",
1116 ipoff & IP_DF ? "-" : "");
1120 } else {
1121 (void) sprintf(t, "%s -> ", hostname(res, v, s));
1122 t += strlen(t);
1123 (void) sprintf(t, "%s PR %s len %hu (%hu)",
1124 hostname(res, v, d), proto, hl, plen);
1125 t += strlen(t);
1126 if (off & IP_OFFMASK)
1127 (void) sprintf(t, " (frag %d:%hu@%hu%s%s)",
1128 ntohs(ip->ip_id),
1129 plen - hl, (off & IP_OFFMASK) << 3,
1130 ipoff & IP_MF ? "+" : "",
1131 ipoff & IP_DF ? "-" : "");
1133 t += strlen(t);
1135 if (ipf->fl_flags & FR_KEEPSTATE) {
1136 (void) strcpy(t, " K-S");
1137 t += strlen(t);
1140 if (ipf->fl_flags & FR_KEEPFRAG) {
1141 (void) strcpy(t, " K-F");
1142 t += strlen(t);
1145 if (ipf->fl_dir == 0)
1146 strcpy(t, " IN");
1147 else if (ipf->fl_dir == 1)
1148 strcpy(t, " OUT");
1149 t += strlen(t);
1150 printipflog:
1151 *t++ = '\n';
1152 *t++ = '\0';
1153 if (opts & OPT_SYSLOG)
1154 syslog(lvl, "%s", line);
1155 else
1156 (void) fprintf(log, "%s", line);
1157 if (opts & OPT_HEXHDR)
1158 dumphex(log, (u_char *)buf, sizeof(iplog_t) + sizeof(*ipf));
1159 if (opts & OPT_HEXBODY)
1160 dumphex(log, (u_char *)ip, ipf->fl_plen + ipf->fl_hlen);
1161 else if ((opts & OPT_LOGBODY) && (ipf->fl_flags & FR_LOGBODY))
1162 dumphex(log, (u_char *)ip + ipf->fl_hlen, ipf->fl_plen);
1166 static void usage(prog)
1167 char *prog;
1169 fprintf(stderr, "%s: [-NFhstvxX] [-f <logfile>]\n", prog);
1170 exit(1);
1174 static void write_pid(file)
1175 char *file;
1177 FILE *fp = NULL;
1178 int fd;
1180 if ((fd = open(file, O_CREAT|O_TRUNC|O_WRONLY, 0644)) >= 0)
1181 fp = fdopen(fd, "w");
1182 if (!fp) {
1183 close(fd);
1184 fprintf(stderr, "unable to open/create pid file: %s\n", file);
1185 return;
1187 fprintf(fp, "%d", getpid());
1188 fclose(fp);
1189 close(fd);
1193 static void flushlogs(file, log)
1194 char *file;
1195 FILE *log;
1197 int fd, flushed = 0;
1199 if ((fd = open(file, O_RDWR)) == -1) {
1200 (void) fprintf(stderr, "%s: open: %s\n",
1201 file, STRERROR(errno));
1202 exit(1);
1205 if (ioctl(fd, SIOCIPFFB, &flushed) == 0) {
1206 printf("%d bytes flushed from log buffer\n",
1207 flushed);
1208 fflush(stdout);
1209 } else
1210 perror("SIOCIPFFB");
1211 (void) close(fd);
1213 if (flushed) {
1214 if (opts & OPT_SYSLOG)
1215 syslog(LOG_INFO, "%d bytes flushed from log\n",
1216 flushed);
1217 else if (log != stdout)
1218 fprintf(log, "%d bytes flushed from log\n", flushed);
1223 static void logopts(turnon, options)
1224 int turnon;
1225 char *options;
1227 int flags = 0;
1228 char *s;
1230 for (s = options; *s; s++)
1232 switch (*s)
1234 case 'N' :
1235 flags |= OPT_NAT;
1236 break;
1237 case 'S' :
1238 flags |= OPT_STATE;
1239 break;
1240 case 'I' :
1241 flags |= OPT_FILTER;
1242 break;
1243 default :
1244 fprintf(stderr, "Unknown log option %c\n", *s);
1245 exit(1);
1249 if (turnon)
1250 opts |= flags;
1251 else
1252 opts &= ~(flags);
1256 int main(argc, argv)
1257 int argc;
1258 char *argv[];
1260 int fdt[3], devices = 0, make_daemon = 0;
1261 char buf[IPLLOGSIZE], *iplfile[3], *s;
1262 int fd[3], doread, n, i;
1263 extern char *optarg;
1264 extern int optind;
1265 int regular[3], c;
1266 FILE *log = stdout;
1267 struct stat sb;
1268 size_t nr, tr;
1270 fd[0] = fd[1] = fd[2] = -1;
1271 fdt[0] = fdt[1] = fdt[2] = -1;
1272 iplfile[0] = IPL_NAME;
1273 iplfile[1] = IPNAT_NAME;
1274 iplfile[2] = IPSTATE_NAME;
1276 while ((c = getopt(argc, argv, "?abDf:FhnN:o:O:pP:sS:tvxX")) != -1)
1277 switch (c)
1279 case 'a' :
1280 opts |= OPT_LOGALL;
1281 fdt[0] = IPL_LOGIPF;
1282 fdt[1] = IPL_LOGNAT;
1283 fdt[2] = IPL_LOGSTATE;
1284 break;
1285 case 'b' :
1286 opts |= OPT_LOGBODY;
1287 break;
1288 case 'D' :
1289 make_daemon = 1;
1290 break;
1291 case 'f' : case 'I' :
1292 opts |= OPT_FILTER;
1293 fdt[0] = IPL_LOGIPF;
1294 iplfile[0] = optarg;
1295 break;
1296 case 'F' :
1297 flushlogs(iplfile[0], log);
1298 flushlogs(iplfile[1], log);
1299 flushlogs(iplfile[2], log);
1300 break;
1301 case 'n' :
1302 opts |= OPT_RESOLVE;
1303 break;
1304 case 'N' :
1305 opts |= OPT_NAT;
1306 fdt[1] = IPL_LOGNAT;
1307 iplfile[1] = optarg;
1308 break;
1309 case 'o' : case 'O' :
1310 logopts(c == 'o', optarg);
1311 fdt[0] = fdt[1] = fdt[2] = -1;
1312 if (opts & OPT_FILTER)
1313 fdt[0] = IPL_LOGIPF;
1314 if (opts & OPT_NAT)
1315 fdt[1] = IPL_LOGNAT;
1316 if (opts & OPT_STATE)
1317 fdt[2] = IPL_LOGSTATE;
1318 break;
1319 case 'p' :
1320 opts |= OPT_PORTNUM;
1321 break;
1322 case 'P' :
1323 pidfile = optarg;
1324 break;
1325 case 's' :
1326 s = strrchr(argv[0], '/');
1327 if (s == NULL)
1328 s = argv[0];
1329 else
1330 s++;
1331 openlog(s, LOG_NDELAY|LOG_PID, LOGFAC);
1332 opts |= OPT_SYSLOG;
1333 log = NULL;
1334 break;
1335 case 'S' :
1336 opts |= OPT_STATE;
1337 fdt[2] = IPL_LOGSTATE;
1338 iplfile[2] = optarg;
1339 break;
1340 case 't' :
1341 opts |= OPT_TAIL;
1342 break;
1343 case 'v' :
1344 opts |= OPT_VERBOSE;
1345 break;
1346 case 'x' :
1347 opts |= OPT_HEXBODY;
1348 break;
1349 case 'X' :
1350 opts |= OPT_HEXHDR;
1351 break;
1352 default :
1353 case 'h' :
1354 case '?' :
1355 usage(argv[0]);
1358 init_tabs();
1361 * Default action is to only open the filter log file.
1363 if ((fdt[0] == -1) && (fdt[1] == -1) && (fdt[2] == -1))
1364 fdt[0] = IPL_LOGIPF;
1366 for (i = 0; i < 3; i++) {
1367 if (fdt[i] == -1)
1368 continue;
1369 if (!strcmp(iplfile[i], "-"))
1370 fd[i] = 0;
1371 else {
1372 if ((fd[i] = open(iplfile[i], O_RDONLY)) == -1) {
1373 (void) fprintf(stderr,
1374 "%s: open: %s\n", iplfile[i],
1375 STRERROR(errno));
1376 exit(1);
1377 /* NOTREACHED */
1379 if (fstat(fd[i], &sb) == -1) {
1380 (void) fprintf(stderr, "%d: fstat: %s\n",
1381 fd[i], STRERROR(errno));
1382 exit(1);
1383 /* NOTREACHED */
1385 if (!(regular[i] = !S_ISCHR(sb.st_mode)))
1386 devices++;
1390 if (!(opts & OPT_SYSLOG)) {
1391 logfile = argv[optind];
1392 log = logfile ? fopen(logfile, "a") : stdout;
1393 if (log == NULL) {
1394 (void) fprintf(stderr, "%s: fopen: %s\n",
1395 argv[optind], STRERROR(errno));
1396 exit(1);
1397 /* NOTREACHED */
1399 setvbuf(log, NULL, _IONBF, 0);
1400 } else
1401 log = NULL;
1403 if (make_daemon && ((log != stdout) || (opts & OPT_SYSLOG))) {
1404 #if BSD
1405 daemon(0, !(opts & OPT_SYSLOG));
1406 #else
1407 int pid;
1408 if ((pid = fork()) > 0)
1409 exit(0);
1410 if (pid < 0) {
1411 (void) fprintf(stderr, "%s: fork() failed: %s\n",
1412 argv[0], STRERROR(errno));
1413 exit(1);
1414 /* NOTREACHED */
1416 setsid();
1417 if ((opts & OPT_SYSLOG))
1418 close(2);
1419 #endif /* !BSD */
1420 close(0);
1421 close(1);
1423 write_pid(pidfile);
1425 signal(SIGHUP, handlehup);
1427 for (doread = 1; doread; ) {
1428 nr = 0;
1430 for (i = 0; i < 3; i++) {
1431 tr = 0;
1432 if (fdt[i] == -1)
1433 continue;
1434 if (!regular[i]) {
1435 if (ioctl(fd[i], FIONREAD, &tr) == -1) {
1436 if (opts & OPT_SYSLOG)
1437 syslog(LOG_CRIT,
1438 "ioctl(FIONREAD): %m");
1439 else
1440 perror("ioctl(FIONREAD)");
1441 exit(1);
1442 /* NOTREACHED */
1444 } else {
1445 tr = (lseek(fd[i], 0, SEEK_CUR) < sb.st_size);
1446 if (!tr && !(opts & OPT_TAIL))
1447 doread = 0;
1449 if (!tr)
1450 continue;
1451 nr += tr;
1453 tr = read_log(fd[i], &n, buf, sizeof(buf));
1454 if (donehup) {
1455 donehup = 0;
1456 if (newlog) {
1457 fclose(log);
1458 log = newlog;
1459 newlog = NULL;
1463 switch (tr)
1465 case -1 :
1466 if (opts & OPT_SYSLOG)
1467 syslog(LOG_CRIT, "read: %m\n");
1468 else
1469 perror("read");
1470 doread = 0;
1471 break;
1472 case 1 :
1473 if (opts & OPT_SYSLOG)
1474 syslog(LOG_CRIT, "aborting logging\n");
1475 else
1476 fprintf(log, "aborting logging\n");
1477 doread = 0;
1478 break;
1479 case 2 :
1480 break;
1481 case 0 :
1482 if (n > 0) {
1483 print_log(fdt[i], log, buf, n);
1484 if (!(opts & OPT_SYSLOG))
1485 fflush(log);
1487 break;
1490 if (!nr && ((opts & OPT_TAIL) || devices))
1491 sleep(1);
1493 exit(0);
1494 /* NOTREACHED */