2 * sys-next.c - System-dependent procedures for setting up
3 * PPP interfaces on NeXT 3.2/3.3 systems
5 * Copyright (c) 1989 Carnegie Mellon University.
6 * Copyright (c) 1994 Philippe-Andre Prindeville.
9 * Redistribution and use in source and binary forms are permitted
10 * provided that the above copyright notice and this paragraph are
11 * duplicated in all such forms and that any documentation,
12 * advertising materials, and other materials related to such
13 * distribution and use acknowledge that the software was developed
14 * by Carnegie Mellon University. The name of the
15 * University may not be used to endorse or promote products derived
16 * from this software without specific prior written permission.
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
19 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
23 static char rcsid[] = "$Id: sys-NeXT.c,v 1.4 1996/01/01 23:03:23 paulus Exp $";
33 #include <sys/types.h>
35 #include <sys/socket.h>
36 #include <sys/ioctl.h>
38 #include <sys/errno.h>
40 #include <sys/fcntl.h>
43 #include <net/ppp_defs.h>
44 #include <net/if_ppp.h>
46 #include <netinet/in.h>
47 #include <netinet/in_systm.h>
48 #include <netinet/in_var.h>
49 #include <netinet/ip.h>
50 #include <netinet/if_ether.h>
51 #include <net/route.h>
52 #include <netinet/in.h>
54 #include <netinfo/ni.h>
58 static int initdisc = -1; /* Initial TTY discipline */
59 static int initfdflags = -1; /* Initial file descriptor flags for fd */
63 static int restore_term; /* 1 => we've munged the terminal */
64 static struct termios inittermios; /* Initial TTY termios */
66 static char *lock_file;
68 static int sockfd; /* socket for doing interface ioctls */
70 #if defined(i386) && defined(HAS_BROKEN_IOCTL)
74 static int if_is_up; /* the interface is currently up */
75 static u_int32_t default_route_gateway; /* gateway addr for default route */
76 static u_int32_t proxy_arp_addr; /* remote addr for proxy arp */
78 /* Prototypes for procedures local to this file. */
79 static int translate_speed __P((int));
80 static int baud_rate_of __P((int));
81 static int dodefaultroute __P((u_int32_t, int));
82 static int get_ether_addr __P((u_int32_t, struct sockaddr *));
83 static int ether_by_host __P((char *, struct ether_addr *));
87 * sys_init - System-dependent initialization.
92 openlog("pppd", LOG_PID | LOG_NDELAY, LOG_PPP);
93 setlogmask(LOG_UPTO(LOG_INFO));
95 setlogmask(LOG_UPTO(LOG_DEBUG));
97 /* Get an internet socket for doing socket ioctl's on. */
98 if ((sockfd = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
99 syslog(LOG_ERR, "Couldn't create IP socket: %m");
105 * sys_cleanup - restore any system state we modified before exiting:
106 * mark the interface down, delete default route and/or proxy arp entry.
107 * This should call die() because it's called from die().
115 strncpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
116 if (ioctl(sockfd, SIOCGIFFLAGS, &ifr) >= 0
117 && ((ifr.ifr_flags & IFF_UP) != 0)) {
118 ifr.ifr_flags &= ~IFF_UP;
119 ioctl(sockfd, SIOCSIFFLAGS, &ifr);
123 if (default_route_gateway)
124 cifdefaultroute(0, default_route_gateway);
126 cifproxyarp(0, proxy_arp_addr);
130 * note_debug_level - note a change in the debug level.
136 syslog(LOG_INFO, "Debug turned ON, Level %d", debug);
137 setlogmask(LOG_UPTO(LOG_DEBUG));
139 setlogmask(LOG_UPTO(LOG_WARNING));
144 * ppp_available - check whether the system has any ppp interfaces
145 * (in fact we check whether we can do an ioctl on ppp0).
153 if ((s = socket(AF_INET, SOCK_DGRAM, 0)) < 0)
154 return 1; /* can't tell - maybe we're not root */
156 strncpy(ifr.ifr_name, "ppp0", sizeof (ifr.ifr_name));
157 ok = ioctl(s, SIOCGIFFLAGS, (caddr_t) &ifr) >= 0;
164 * establish_ppp - Turn the serial port into a ppp interface.
170 int pppdisc = PPPDISC;
173 if (ioctl(fd, TIOCGETD, &initdisc) < 0) {
174 syslog(LOG_ERR, "ioctl(TIOCGETD): %m");
177 if (ioctl(fd, TIOCSETD, &pppdisc) < 0) {
178 syslog(LOG_ERR, "ioctl(establish TIOCSETD): %m");
183 * Find out which interface we were given.
185 if (ioctl(fd, PPPIOCGUNIT, &ifunit) < 0) {
186 syslog(LOG_ERR, "ioctl(PPPIOCGUNIT): %m");
191 * Enable debug in the driver if requested.
194 if (ioctl(fd, PPPIOCGFLAGS, (caddr_t) &x) < 0) {
195 syslog(LOG_WARNING, "ioctl(PPPIOCGFLAGS): %m");
197 x |= (kdebugflag & 0xFF) * SC_DEBUG;
198 if (ioctl(fd, PPPIOCSFLAGS, (caddr_t) &x) < 0)
199 syslog(LOG_WARNING, "ioctl(PPPIOCSFLAGS): %m");
204 * Set device for non-blocking reads.
206 if ((initfdflags = fcntl(fd, F_GETFL)) == -1
207 || fcntl(fd, F_SETFL, initfdflags | O_NONBLOCK) == -1) {
208 syslog(LOG_WARNING, "Couldn't set device to non-blocking mode: %m");
214 * disestablish_ppp - Restore the serial port to normal operation.
215 * This shouldn't call die() because it's called from die().
224 /* Reset non-blocking mode on the file descriptor. */
225 if (initfdflags != -1 && fcntl(fd, F_SETFL, initfdflags) < 0)
226 syslog(LOG_WARNING, "Couldn't restore device fd flags: %m");
231 * Check whether the link seems not to be 8-bit clean.
233 if (ioctl(fd, PPPIOCGFLAGS, (caddr_t) &x) == 0) {
235 switch (~x & (SC_RCV_B7_0|SC_RCV_B7_1|SC_RCV_EVNP|SC_RCV_ODDP)) {
237 s = "bit 7 set to 1";
240 s = "bit 7 set to 0";
250 syslog(LOG_WARNING, "Serial link is not 8-bit clean:");
251 syslog(LOG_WARNING, "All received characters had %s", s);
254 if (ioctl(fd, TIOCSETD, &initdisc) < 0)
255 syslog(LOG_ERR, "ioctl(disestablish TIOCSETD): %m");
260 * List of valid speeds.
263 int speed_int, speed_val;
339 #warning Defining B115200
350 * Translate from bits/second to a speed_t.
356 struct speed *speedp;
360 for (speedp = speeds; speedp->speed_int; speedp++)
361 if (bps == speedp->speed_int)
362 return speedp->speed_val;
363 syslog(LOG_WARNING, "speed %d not supported", bps);
368 * Translate from a speed_t to bits/second.
374 struct speed *speedp;
378 for (speedp = speeds; speedp->speed_int; speedp++)
379 if (speed == speedp->speed_val)
380 return speedp->speed_int;
386 * set_up_tty: Set up the serial port on `fd' for 8 bits, no parity,
387 * at the requested speed, etc. If `local' is true, set CLOCAL
388 * regardless of whether the modem option was specified.
391 set_up_tty(fd, local)
394 int speed, x, modembits;
397 if (tcgetattr(fd, &tios) < 0) {
398 syslog(LOG_ERR, "tcgetattr: %m");
405 tios.c_cflag &= ~(CSIZE | CSTOPB | PARENB | CLOCAL);
407 tios.c_cflag |= CS8 | CREAD | HUPCL;
409 tios.c_cflag |= CLOCAL;
411 tios.c_iflag = IGNBRK | IGNPAR;
415 tios.c_cc[VTIME] = 0;
418 tios.c_iflag |= IXON | IXOFF;
419 tios.c_cc[VSTOP] = 0x13; /* DC3 = XOFF = ^S */
420 tios.c_cc[VSTART] = 0x11; /* DC1 = XON = ^Q */
423 speed = translate_speed(inspeed);
425 cfsetospeed(&tios, speed);
426 cfsetispeed(&tios, speed);
428 speed = cfgetospeed(&tios);
432 modembits = TIOCM_RTS | TIOCM_CTS;
433 if (ioctl(fd, (crtscts ? TIOCMBIS : TIOCMBIC), &modembits) < 0)
434 syslog(LOG_ERR, "ioctl: TIOCMBIS/BIC: %m");
437 if (tcsetattr(fd, TCSAFLUSH, &tios) < 0) {
438 syslog(LOG_ERR, "tcsetattr: %m");
442 baud_rate = inspeed = baud_rate_of(speed);
447 * restore_tty - restore the terminal to the saved settings.
454 if (tcsetattr(fd, TCSAFLUSH, &inittermios) < 0)
456 syslog(LOG_WARNING, "tcsetattr: %m");
462 * setdtr - control the DTR line on the serial port.
463 * This is called from die(), so it shouldn't call die().
465 * The write hack is to get NXFax to recognize that there is
466 * activity on the port. Not using the write nukes
467 * NXFax's capability to determine port usage.
474 int modembits = TIOCM_DTR;
482 /* ioctl(fd, (on? TIOCMBIS: TIOCMBIC), &modembits); */
483 ioctl(fd, (on? TIOCSDTR: TIOCCDTR), 0);
488 * output - Output PPP packet.
497 log_packet(p, len, "sent ");
499 if (write(ttyfd, p, len) < 0) {
500 if (errno == EWOULDBLOCK || errno == ENOBUFS
501 || errno == ENXIO || errno == EIO) {
502 syslog(LOG_WARNING, "write: warning: %m");
504 syslog(LOG_ERR, "write: %m");
512 * wait_input - wait until there is data available on ttyfd,
513 * for the length of time specified by *timo (indefinite
518 struct timeval *timo;
524 FD_SET(ttyfd, &ready);
525 n = select(ttyfd+1, &ready, NULL, &ready, timo);
526 if (n < 0 && errno != EINTR) {
527 syslog(LOG_ERR, "select: %m");
534 * read_packet - get a PPP packet from the serial device.
542 if ((len = read(ttyfd, buf, PPP_MTU + PPP_HDRLEN)) < 0) {
543 if (errno == EWOULDBLOCK || errno == EINTR) {
544 MAINDEBUG((LOG_DEBUG, "read: %m"));
547 syslog(LOG_ERR, "read: %m");
555 * ppp_send_config - configure the transmit characteristics of
559 ppp_send_config(unit, mtu, asyncmap, pcomp, accomp)
567 strncpy(ifr.ifr_name, ifname, sizeof (ifr.ifr_name));
569 if (ioctl(sockfd, SIOCSIFMTU, (caddr_t) &ifr) < 0) {
570 syslog(LOG_ERR, "ioctl(SIOCSIFMTU): %m");
574 if (ioctl(ttyfd, PPPIOCSASYNCMAP, (caddr_t) &asyncmap) < 0) {
575 syslog(LOG_ERR, "ioctl(PPPIOCSASYNCMAP): %m");
579 if (ioctl(ttyfd, PPPIOCGFLAGS, (caddr_t) &x) < 0) {
580 syslog(LOG_ERR, "ioctl(PPPIOCGFLAGS): %m");
583 x = pcomp? x | SC_COMP_PROT: x &~ SC_COMP_PROT;
584 x = accomp? x | SC_COMP_AC: x &~ SC_COMP_AC;
585 if (ioctl(ttyfd, PPPIOCSFLAGS, (caddr_t) &x) < 0) {
586 syslog(LOG_ERR, "ioctl(PPPIOCSFLAGS): %m");
593 * ppp_set_xaccm - set the extended transmit ACCM for the interface.
596 ppp_set_xaccm(unit, accm)
600 if (ioctl(ttyfd, PPPIOCSXASYNCMAP, accm) < 0 && errno != ENOTTY)
601 syslog(LOG_WARNING, "ioctl(PPPIOCSXASYNCMAP): %m");
606 * ppp_recv_config - configure the receive-side characteristics of
610 ppp_recv_config(unit, mru, asyncmap, pcomp, accomp)
617 if (ioctl(ttyfd, PPPIOCSMRU, (caddr_t) &mru) < 0) {
618 syslog(LOG_ERR, "ioctl(PPPIOCSMRU): %m");
621 if (ioctl(ttyfd, PPPIOCSRASYNCMAP, (caddr_t) &asyncmap) < 0) {
622 syslog(LOG_ERR, "ioctl(PPPIOCSRASYNCMAP): %m");
625 if (ioctl(ttyfd, PPPIOCGFLAGS, (caddr_t) &x) < 0) {
626 syslog(LOG_ERR, "ioctl(PPPIOCGFLAGS): %m");
629 x = !accomp? x | SC_REJ_COMP_AC: x &~ SC_REJ_COMP_AC;
630 if (ioctl(ttyfd, PPPIOCSFLAGS, (caddr_t) &x) < 0) {
631 syslog(LOG_ERR, "ioctl(PPPIOCSFLAGS): %m");
637 * ccp_test - ask kernel whether a given compression method
638 * is acceptable for use.
641 ccp_test(unit, opt_ptr, opt_len, for_transmit)
642 int unit, opt_len, for_transmit;
645 struct ppp_option_data data;
648 data.length = opt_len;
649 data.transmit = for_transmit;
650 if (ioctl(ttyfd, PPPIOCSCOMPRESS, (caddr_t) &data) >= 0)
652 return (errno == ENOBUFS)? 0: -1;
656 * ccp_flags_set - inform kernel about the current state of CCP.
659 ccp_flags_set(unit, isopen, isup)
660 int unit, isopen, isup;
664 if (ioctl(ttyfd, PPPIOCGFLAGS, (caddr_t) &x) < 0) {
665 syslog(LOG_ERR, "ioctl(PPPIOCGFLAGS): %m");
668 x = isopen? x | SC_CCP_OPEN: x &~ SC_CCP_OPEN;
669 x = isup? x | SC_CCP_UP: x &~ SC_CCP_UP;
670 if (ioctl(ttyfd, PPPIOCSFLAGS, (caddr_t) &x) < 0)
671 syslog(LOG_ERR, "ioctl(PPPIOCSFLAGS): %m");
675 * ccp_fatal_error - returns 1 if decompression was disabled as a
676 * result of an error detected after decompression of a packet,
677 * 0 otherwise. This is necessary because of patent nonsense.
680 ccp_fatal_error(unit)
685 if (ioctl(ttyfd, PPPIOCGFLAGS, (caddr_t) &x) < 0) {
686 syslog(LOG_ERR, "ioctl(PPPIOCGFLAGS): %m");
689 return x & SC_DC_FERROR;
693 * sifvjcomp - config tcp header compression
696 sifvjcomp(u, vjcomp, cidcomp, maxcid)
697 int u, vjcomp, cidcomp, maxcid;
701 if (ioctl(ttyfd, PPPIOCGFLAGS, (caddr_t) &x) < 0) {
702 syslog(LOG_ERR, "ioctl(PPIOCGFLAGS): %m");
705 x = vjcomp ? x | SC_COMP_TCP: x &~ SC_COMP_TCP;
706 x = cidcomp? x & ~SC_NO_TCP_CCID: x | SC_NO_TCP_CCID;
707 if (ioctl(ttyfd, PPPIOCSFLAGS, (caddr_t) &x) < 0) {
708 syslog(LOG_ERR, "ioctl(PPPIOCSFLAGS): %m");
711 if (ioctl(ttyfd, PPPIOCSMAXCID, (caddr_t) &maxcid) < 0) {
712 syslog(LOG_ERR, "ioctl(PPPIOCSFLAGS): %m");
719 * sifup - Config the interface up and enable IP packets to pass.
722 #define SC_ENABLE_IP 0x100 /* compat for old versions of kernel code */
733 strncpy(ifr.ifr_name, ifname, sizeof (ifr.ifr_name));
734 if (ioctl(sockfd, SIOCGIFFLAGS, (caddr_t) &ifr) < 0) {
735 syslog(LOG_ERR, "ioctl (SIOCGIFFLAGS): %m");
738 ifr.ifr_flags |= IFF_UP;
739 if (ioctl(sockfd, SIOCSIFFLAGS, (caddr_t) &ifr) < 0) {
740 syslog(LOG_ERR, "ioctl(SIOCSIFFLAGS): %m");
744 npi.protocol = PPP_IP;
745 npi.mode = NPMODE_PASS;
746 if (ioctl(ttyfd, PPPIOCSNPMODE, &npi) < 0) {
747 if (errno != ENOTTY) {
748 syslog(LOG_ERR, "ioctl(PPPIOCSNPMODE): %m");
751 /* for backwards compatibility */
752 if (ioctl(ttyfd, PPPIOCGFLAGS, (caddr_t) &x) < 0) {
753 syslog(LOG_ERR, "ioctl (PPPIOCGFLAGS): %m");
757 if (ioctl(ttyfd, PPPIOCSFLAGS, (caddr_t) &x) < 0) {
758 syslog(LOG_ERR, "ioctl(PPPIOCSFLAGS): %m");
766 * sifdown - Config the interface down and disable IP.
778 npi.protocol = PPP_IP;
779 npi.mode = NPMODE_ERROR;
780 if (ioctl(ttyfd, PPPIOCSNPMODE, (caddr_t) &npi) < 0) {
781 if (errno != ENOTTY) {
782 syslog(LOG_ERR, "ioctl(PPPIOCSNPMODE): %m");
785 /* backwards compatibility */
786 if (ioctl(ttyfd, PPPIOCGFLAGS, (caddr_t) &x) < 0) {
787 syslog(LOG_ERR, "ioctl (PPPIOCGFLAGS): %m");
791 if (ioctl(ttyfd, PPPIOCSFLAGS, (caddr_t) &x) < 0) {
792 syslog(LOG_ERR, "ioctl(PPPIOCSFLAGS): %m");
799 strncpy(ifr.ifr_name, ifname, sizeof (ifr.ifr_name));
800 if (ioctl(sockfd, SIOCGIFFLAGS, (caddr_t) &ifr) < 0) {
801 syslog(LOG_ERR, "ioctl (SIOCGIFFLAGS): %m");
804 ifr.ifr_flags &= ~IFF_UP;
805 if (ioctl(sockfd, SIOCSIFFLAGS, (caddr_t) &ifr) < 0) {
806 syslog(LOG_ERR, "ioctl(SIOCSIFFLAGS): %m");
815 * SET_SA_FAMILY - set the sa_family field of a struct sockaddr,
818 #define SET_SA_FAMILY(addr, family) \
819 BZERO((char *) &(addr), sizeof(addr)); \
820 addr.sa_family = (family);
823 * sifaddr - Config the interface IP addresses and netmask.
834 strncpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
835 SET_SA_FAMILY(ifr.ifr_addr, AF_INET);
836 ((struct sockaddr_in *) &ifr.ifr_addr)->sin_addr.s_addr = o;
837 if (ioctl(sockfd, SIOCSIFADDR, (caddr_t) &ifr) < 0) {
838 syslog(LOG_ERR, "ioctl(SIOCAIFADDR): %m");
841 ((struct sockaddr_in *) &ifr.ifr_dstaddr)->sin_addr.s_addr = h;
842 if (ioctl(sockfd, SIOCSIFDSTADDR, (caddr_t) &ifr) < 0) {
843 syslog(LOG_ERR, "ioctl(SIOCSIFDSTADDR): %m");
847 ((struct sockaddr_in *) &ifr.ifr_addr)->sin_addr.s_addr = m;
848 syslog(LOG_INFO, "Setting interface mask to %s\n", ip_ntoa(m));
849 if (ioctl(sockfd, SIOCSIFNETMASK, (caddr_t) &ifr) < 0) {
850 syslog(LOG_ERR, "ioctl(SIOCSIFNETMASK): %m");
858 * cifaddr - Clear the interface IP addresses, and delete routes
859 * through the interface if possible.
861 * N.B.: under NextStep, you can't *delete* an address on an interface,
862 * so we change it to 0.0.0.0... A real hack. But it simplifies
863 * reconnection on the server side.
874 (void) sifaddr(u, o, h, 0L);
876 SET_SA_FAMILY(rt.rt_dst, AF_INET);
877 ((struct sockaddr_in *) &rt.rt_dst)->sin_addr.s_addr = h;
878 SET_SA_FAMILY(rt.rt_gateway, AF_INET);
879 ((struct sockaddr_in *) &rt.rt_gateway)->sin_addr.s_addr = o;
880 rt.rt_flags = RTF_HOST;
881 if (ioctl(sockfd, SIOCDELRT, (caddr_t) &rt) < 0) {
882 syslog(LOG_ERR, "ioctl(SIOCDELRT): %m");
889 * sifdefaultroute - assign a default route through the address given.
892 sifdefaultroute(u, g)
896 return dodefaultroute(g, 's');
900 * cifdefaultroute - delete a default route through the address given.
903 cifdefaultroute(u, g)
907 return dodefaultroute(g, 'c');
911 * dodefaultroute - talk to a routing socket to add/delete a default route.
914 dodefaultroute(g, cmd)
920 SET_SA_FAMILY(rt.rt_dst, AF_INET);
921 ((struct sockaddr_in *) &rt.rt_dst)->sin_addr.s_addr = 0L;
922 SET_SA_FAMILY(rt.rt_gateway, AF_INET);
923 ((struct sockaddr_in *) &rt.rt_gateway)->sin_addr.s_addr = g;
924 rt.rt_flags = RTF_GATEWAY;
925 if (ioctl(sockfd, (cmd == 's') ? SIOCADDRT : SIOCDELRT, &rt) < 0) {
926 syslog(LOG_ERR, "%cifdefaultroute: ioctl(%s): %m", cmd,
927 (cmd == 's') ? "SIOCADDRT" : "SIOCDELRT");
930 default_route_gateway = (cmd == 's')? g: 0;
935 * sifproxyarp - Make a proxy ARP entry for the peer.
938 sifproxyarp(unit, hisaddr)
942 struct arpreq arpreq;
944 BZERO(&arpreq, sizeof(arpreq));
947 * Get the hardware address of an interface on the same subnet
948 * as our local address.
950 if (!get_ether_addr(hisaddr, &arpreq.arp_ha)) {
951 syslog(LOG_ERR, "Cannot determine ethernet address for proxy ARP");
955 SET_SA_FAMILY(arpreq.arp_pa, AF_INET);
956 ((struct sockaddr_in *) &arpreq.arp_pa)->sin_addr.s_addr = hisaddr;
957 arpreq.arp_flags = ATF_PERM | ATF_PUBL;
958 if (ioctl(sockfd, SIOCSARP, (caddr_t)&arpreq) < 0) {
959 syslog(LOG_ERR, "ioctl(SIOCSARP): %m");
963 proxy_arp_addr = hisaddr;
968 * cifproxyarp - Delete the proxy ARP entry for the peer.
971 cifproxyarp(unit, hisaddr)
975 struct arpreq arpreq;
977 BZERO(&arpreq, sizeof(arpreq));
978 SET_SA_FAMILY(arpreq.arp_pa, AF_INET);
979 ((struct sockaddr_in *) &arpreq.arp_pa)->sin_addr.s_addr = hisaddr;
980 if (ioctl(sockfd, SIOCDARP, (caddr_t)&arpreq) < 0) {
981 syslog(LOG_WARNING, "ioctl(SIOCDARP): %m");
989 * get_ether_addr - get the hardware address of an interface on the
990 * the same subnet as ipaddr.
995 get_ether_addr(ipaddr, hwaddr)
997 struct sockaddr *hwaddr;
999 struct ifreq *ifr, *ifend, *ifp;
1000 u_int32_t ina, mask;
1001 struct ether_addr dla;
1004 struct ifreq ifs[MAX_IFS];
1005 struct hostent *hostent;
1007 ifc.ifc_len = sizeof(ifs);
1009 if (ioctl(sockfd, SIOCGIFCONF, &ifc) < 0) {
1010 syslog(LOG_ERR, "ioctl(SIOCGIFCONF): %m");
1015 * Scan through looking for an interface with an Internet
1016 * address on the same subnet as `ipaddr'.
1018 ifend = (struct ifreq *) (ifc.ifc_buf + ifc.ifc_len);
1019 for (ifr = ifc.ifc_req; ifr < ifend; ifr = (struct ifreq *)
1020 ((char *)&ifr->ifr_addr + sizeof(struct sockaddr))) {
1021 if (ifr->ifr_addr.sa_family == AF_INET) {
1022 ina = ((struct sockaddr_in *) &ifr->ifr_addr)->sin_addr.s_addr;
1023 strncpy(ifreq.ifr_name, ifr->ifr_name, sizeof(ifreq.ifr_name));
1025 * Check that the interface is up, and not point-to-point
1028 if (ioctl(sockfd, SIOCGIFFLAGS, &ifreq) < 0)
1030 if ((ifreq.ifr_flags &
1031 (IFF_UP|IFF_BROADCAST|IFF_POINTOPOINT|IFF_LOOPBACK|IFF_NOARP))
1032 != (IFF_UP|IFF_BROADCAST))
1035 * Get its netmask and check that it's on the right subnet.
1037 if (ioctl(sockfd, SIOCGIFNETMASK, &ifreq) < 0)
1039 mask = ((struct sockaddr_in*)&ifreq.ifr_addr)->sin_addr.s_addr;
1040 if ((ipaddr & mask) != (ina & mask))
1049 syslog(LOG_INFO, "found interface %s for proxy arp", ifr->ifr_name);
1052 * Get the hostname and look for an entry using the ethers database.
1053 * Under NeXTStep this is the best we can do for now.
1055 if ((hostent = gethostbyaddr((char*)&ina, sizeof(ina), AF_INET)) == NULL)
1058 if (ether_by_host(hostent->h_name, &dla)) {
1059 syslog(LOG_INFO, "Add entry for %s in /etc/ethers", hostent->h_name);
1060 return 0; /* it's not there */
1062 hwaddr->sa_family = AF_UNSPEC;
1063 BCOPY(&dla, hwaddr->sa_data, sizeof(dla));
1068 ether_by_host(hostname, etherptr)
1070 struct ether_addr *etherptr;
1072 struct ether_addr *thisptr;
1078 if (!ether_hostton(hostname, etherptr))
1081 * We shall now try and
1082 * find the address in the
1083 * top domain of netinfo.
1085 strcat(strcpy(path, "/machines/"), hostname);
1087 if (ni_open((void *)0, "/", &conn)
1088 || ni_root(conn, &root)
1089 || ni_pathsearch(conn, &root, path)
1090 || ni_lookupprop(conn, &root, "en_address", &val))
1094 * Now we can convert the returned string into an ethernet address.
1096 strcpy(path, val.ni_namelist_val[0]);
1098 if ((thisptr = (struct ether_addr*)ether_aton(path)) == NULL)
1100 BCOPY(thisptr, etherptr, sizeof(struct ether_addr));
1107 * Return user specified netmask, modified by any mask we might determine
1108 * for address `addr' (in network byte order).
1109 * Here we scan through the system's list of interfaces, looking for
1110 * any non-point-to-point interfaces which might appear to be on the same
1111 * network as `addr'. If we find any, we OR in their netmask to the
1112 * user-specified netmask.
1118 u_int32_t mask, nmask, ina;
1119 struct ifreq *ifr, *ifend, ifreq;
1121 struct ifreq ifs[MAX_IFS];
1124 if (IN_CLASSA(addr)) /* determine network mask for address class */
1125 nmask = IN_CLASSA_NET;
1126 else if (IN_CLASSB(addr))
1127 nmask = IN_CLASSB_NET;
1129 nmask = IN_CLASSC_NET;
1130 /* class D nets are disallowed by bad_ip_adrs */
1131 mask = netmask | htonl(nmask);
1134 * Scan through the system's network interfaces.
1136 ifc.ifc_len = sizeof(ifs);
1138 if (ioctl(sockfd, SIOCGIFCONF, &ifc) < 0) {
1139 syslog(LOG_WARNING, "ioctl(SIOCGIFCONF): %m");
1142 ifend = (struct ifreq *) (ifc.ifc_buf + ifc.ifc_len);
1143 for (ifr = ifc.ifc_req; ifr < ifend; ifr = (struct ifreq *)
1144 ((char *)&ifr->ifr_addr + sizeof(struct sockaddr))) {
1146 * Check the interface's internet address.
1148 if (ifr->ifr_addr.sa_family != AF_INET)
1150 ina = ((struct sockaddr_in *) &ifr->ifr_addr)->sin_addr.s_addr;
1151 if ((ntohl(ina) & nmask) != (addr & nmask))
1154 * Check that the interface is up, and not point-to-point or loopback.
1156 strncpy(ifreq.ifr_name, ifr->ifr_name, sizeof(ifreq.ifr_name));
1157 if (ioctl(sockfd, SIOCGIFFLAGS, &ifreq) < 0)
1159 if ((ifreq.ifr_flags & (IFF_UP|IFF_POINTOPOINT|IFF_LOOPBACK))
1163 * Get its netmask and OR it into our mask.
1165 if (ioctl(sockfd, SIOCGIFNETMASK, &ifreq) < 0)
1167 mask |= ((struct sockaddr_in *)&ifreq.ifr_addr)->sin_addr.s_addr;
1176 * daemon - Detach us from the terminal session.
1179 daemon(nochdir, noclose)
1180 int nochdir, noclose;
1184 if ((pid = fork()) < 0)
1187 exit(0); /* parent dies */
1192 fclose(stdin); /* don't need stdin, stdout, stderr */
1204 char *d = malloc(strlen(s) + 1);
1206 if (d) strcpy(d, s);
1211 * This logwtmp() implementation is subject to the following copyright:
1213 * Copyright (c) 1988 The Regents of the University of California.
1214 * All rights reserved.
1216 * Redistribution and use in source and binary forms are permitted
1217 * provided that the above copyright notice and this paragraph are
1218 * duplicated in all such forms and that any documentation,
1219 * advertising materials, and other materials related to such
1220 * distribution and use acknowledge that the software was developed
1221 * by the University of California, Berkeley. The name of the
1222 * University may not be used to endorse or promote products derived
1223 * from this software without specific prior written permission.
1224 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
1225 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
1226 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
1229 #define WTMPFILE "/usr/adm/wtmp"
1232 logwtmp(line, name, host)
1233 char *line, *name, *host;
1239 if ((fd = open(WTMPFILE, O_WRONLY|O_APPEND, 0)) < 0)
1241 if (!fstat(fd, &buf)) {
1242 (void)strncpy(ut.ut_line, line, sizeof(ut.ut_line));
1243 (void)strncpy(ut.ut_name, name, sizeof(ut.ut_name));
1244 (void)strncpy(ut.ut_host, host, sizeof(ut.ut_host));
1245 (void)time(&ut.ut_time);
1246 if (write(fd, (char *)&ut, sizeof(struct utmp)) != sizeof(struct utmp))
1247 (void)ftruncate(fd, buf.st_size);
1253 * Routines for locking and unlocking the serial device, moved here
1257 #define LOCK_PREFIX "/usr/spool/uucp/LCK/LCK.."
1260 * lock - create a lock file for the named device
1269 if ((p = strrchr(dev, '/')) != NULL)
1271 lock_file = malloc(strlen(LOCK_PREFIX) + strlen(dev) + 1);
1272 if (lock_file == NULL)
1273 novm("lock file name");
1274 strcat(strcpy(lock_file, LOCK_PREFIX), dev);
1276 while ((fd = open(lock_file, O_EXCL | O_CREAT | O_RDWR, 0644)) < 0) {
1278 && (fd = open(lock_file, O_RDONLY, 0)) >= 0) {
1279 /* Read the lock file to find out who has the device locked */
1280 n = read(fd, &pid, sizeof(pid));
1282 syslog(LOG_ERR, "Can't read pid from lock file %s", lock_file);
1285 if (kill(pid, 0) == -1 && errno == ESRCH) {
1286 /* pid no longer exists - remove the lock file */
1287 if (unlink(lock_file) == 0) {
1289 syslog(LOG_NOTICE, "Removed stale lock on %s (pid %d)",
1293 syslog(LOG_WARNING, "Couldn't remove stale lock on %s",
1296 syslog(LOG_NOTICE, "Device %s is locked by pid %d",
1301 syslog(LOG_ERR, "Can't create lock file %s: %m", lock_file);
1308 write(fd, &pid, sizeof pid);
1315 * unlock - remove our lockfile
1327 #if defined(i386) && defined(HAS_BROKEN_IOCTL)
1338 u_char let, code, size;
1340 size = (cmd >> 16) & IOCPARM_MASK;
1344 if (let == 't' && (75 <= code && code <= 90))
1345 syslog(LOG_INFO, "ioctl(%d, 0x%x ('%c', %d, %d), 0x%x)\n", fd, cmd,
1346 let, code, size, c);
1349 ret = ioctl(fd, cmd, c);
1354 syslog(LOG_INFO, "ioctl('%c', %d, %d) errno = %d (%m)\n",
1355 let, code, size, errno);
1356 if (let == 't' && (75 <= code && code <= 90) && (cmd & IOC_OUT)) {
1357 int i, len = ((cmd >> 16) & IOCPARM_MASK);
1358 for (i = 0; i < len / 4; ++i)
1359 syslog(LOG_INFO, "word[%d] @ 0x%06x = 0x%x\n",
1360 i, &((int *) c)[i],((int *)c)[i]);
1365 if (ret == -1 && errno == EPERM)
1369 #endif /* HAS_BROKEN_IOCTL */
1372 #if defined(FIXSIGS) && (defined (hppa) || defined(sparc))
1375 * These redefinitions of Posix functions are necessary
1376 * because HPPA systems have an OS bug that causes
1377 * sigaction to core dump:
1379 * AlainF 9-Nov-1994 HACK FOR HP-PA/NEXTSTEP
1380 * sigaction(3) seems broken in the HP-PA NeXTSTEP 3.2
1381 * Posix lib. This causes pppd to SIGBUS at the expiration
1382 * of the first timeout (_sigtramp seems to invoke
1383 * the SIGALRM handler at an unreasonably low address).
1384 * All calls so sigaction(3) have been changed to calls
1385 * to sigvec(2) and sigprocmask(SIG_BLOCK,...) to
1387 * This is kind of a hack, especially since there are
1388 * other routines of the Posix lib still used, but
1391 * Dave Hess <David-Hess@net.tamu.edu> noted that 3.3 Sparc seems to
1392 * have the same bug. Thus this fix has been enabled for SPARC also.
1397 int sigemptyset(sigset_t *mask)
1402 sigaddset(sigset_t *mask, int which_sig)
1404 *mask |= sigmask(which_sig);
1408 int sigaction(int sig, const struct sigaction *act, struct sigaction *oact)
1413 sv.sv_handler = act->sa_handler;
1414 sv.sv_mask = act->sa_mask;
1420 syslog(LOG_WARNING, "PPPD: Inside modified HP and SPARC sigaction\n");
1423 return sigvec(sig, &sv, NULL);