2 * sys-bsd.c - System-dependent procedures for setting up
3 * PPP interfaces on bsd-4.4-ish systems (including 386BSD, NetBSD, etc.)
5 * Copyright (c) 1989 Carnegie Mellon University.
8 * Redistribution and use in source and binary forms are permitted
9 * provided that the above copyright notice and this paragraph are
10 * duplicated in all such forms and that any documentation,
11 * advertising materials, and other materials related to such
12 * distribution and use acknowledge that the software was developed
13 * by Carnegie Mellon University. The name of the
14 * University may not be used to endorse or promote products derived
15 * from this software without specific prior written permission.
16 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
17 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
18 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
22 static char rcsid[] = "$Id: sys-bsd.c,v 1.20 1995/08/11 02:36:21 paulus Exp $";
36 #include <sys/ioctl.h>
37 #include <sys/types.h>
38 #include <sys/socket.h>
43 #include <net/ppp_defs.h>
44 #include <net/if_ppp.h>
45 #include <net/route.h>
46 #include <net/if_dl.h>
47 #include <netinet/in.h>
50 #include <netinet/if_ether.h>
55 static int initdisc = -1; /* Initial TTY discipline */
58 static int restore_term; /* 1 => we've munged the terminal */
59 static struct termios inittermios; /* Initial TTY termios */
60 static struct winsize wsinfo; /* Initial window size info */
62 static char *lock_file; /* name of lock file created */
64 int sockfd; /* socket for doing interface ioctls */
67 * sys_init - System-dependent initialization.
72 openlog("pppd", LOG_PID | LOG_NDELAY, LOG_PPP);
73 setlogmask(LOG_UPTO(LOG_INFO));
75 setlogmask(LOG_UPTO(LOG_DEBUG));
77 /* Get an internet socket for doing socket ioctl's on. */
78 if ((sockfd = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
79 syslog(LOG_ERR, "Couldn't create IP socket: %m");
85 * note_debug_level - note a change in the debug level.
91 syslog(LOG_INFO, "Debug turned ON, Level %d", debug);
92 setlogmask(LOG_UPTO(LOG_DEBUG));
94 setlogmask(LOG_UPTO(LOG_WARNING));
99 * ppp_available - check whether the system has any ppp interfaces
100 * (in fact we check whether we can do an ioctl on ppp0).
108 if ((s = socket(AF_INET, SOCK_DGRAM, 0)) < 0)
109 return 1; /* can't tell - maybe we're not root */
111 strncpy(ifr.ifr_name, "ppp0", sizeof (ifr.ifr_name));
112 ok = ioctl(s, SIOCGIFFLAGS, (caddr_t) &ifr) >= 0;
119 * establish_ppp - Turn the serial port into a ppp interface.
124 int pppdisc = PPPDISC;
127 if (ioctl(fd, TIOCGETD, &initdisc) < 0) {
128 syslog(LOG_ERR, "ioctl(TIOCGETD): %m");
131 if (ioctl(fd, TIOCSETD, &pppdisc) < 0) {
132 syslog(LOG_ERR, "ioctl(TIOCSETD): %m");
137 * Find out which interface we were given.
139 if (ioctl(fd, PPPIOCGUNIT, &ifunit) < 0) {
140 syslog(LOG_ERR, "ioctl(PPPIOCGUNIT): %m");
145 * Enable debug in the driver if requested.
148 if (ioctl(fd, PPPIOCGFLAGS, (caddr_t) &x) < 0) {
149 syslog(LOG_WARNING, "ioctl (PPPIOCGFLAGS): %m");
151 x |= (kdebugflag & 0xFF) * SC_DEBUG;
152 if (ioctl(fd, PPPIOCSFLAGS, (caddr_t) &x) < 0)
153 syslog(LOG_WARNING, "ioctl(PPPIOCSFLAGS): %m");
160 * disestablish_ppp - Restore the serial port to normal operation.
161 * This shouldn't call die() because it's called from die().
171 * Check whether the link seems not to be 8-bit clean.
173 if (ioctl(fd, PPPIOCGFLAGS, (caddr_t) &x) == 0) {
175 switch (~x & (SC_RCV_B7_0|SC_RCV_B7_1|SC_RCV_EVNP|SC_RCV_ODDP)) {
177 s = "bit 7 set to 1";
180 s = "bit 7 set to 0";
190 syslog(LOG_WARNING, "Serial link is not 8-bit clean:");
191 syslog(LOG_WARNING, "All received characters had %s", s);
194 if (ioctl(fd, TIOCSETD, &initdisc) < 0)
195 syslog(LOG_ERR, "ioctl(TIOCSETD): %m");
201 * set_up_tty: Set up the serial port on `fd' for 8 bits, no parity,
202 * at the requested speed, etc. If `local' is true, set CLOCAL
203 * regardless of whether the modem option was specified.
205 * For *BSD, we assume that speed_t values numerically equal bits/second.
207 set_up_tty(fd, local)
212 if (tcgetattr(fd, &tios) < 0) {
213 syslog(LOG_ERR, "tcgetattr: %m");
219 ioctl(fd, TIOCGWINSZ, &wsinfo);
222 tios.c_cflag &= ~(CSIZE | CSTOPB | PARENB | CLOCAL);
224 tios.c_cflag |= CRTSCTS;
225 else if (crtscts < 0)
226 tios.c_cflag &= ~CRTSCTS;
228 tios.c_cflag |= CS8 | CREAD | HUPCL;
230 tios.c_cflag |= CLOCAL;
231 tios.c_iflag = IGNBRK | IGNPAR;
235 tios.c_cc[VTIME] = 0;
238 tios.c_iflag |= IXOFF;
239 tios.c_cc[VSTOP] = 0x13; /* DC3 = XOFF = ^S */
240 tios.c_cc[VSTART] = 0x11; /* DC1 = XON = ^Q */
244 cfsetospeed(&tios, inspeed);
245 cfsetispeed(&tios, inspeed);
247 inspeed = cfgetospeed(&tios);
249 * We can't proceed if the serial port speed is 0,
250 * since that implies that the serial port is disabled.
253 syslog(LOG_ERR, "Baud rate for %s is 0; need explicit baud rate",
260 if (tcsetattr(fd, TCSAFLUSH, &tios) < 0) {
261 syslog(LOG_ERR, "tcsetattr: %m");
269 * restore_tty - restore the terminal to the saved settings.
275 if (!default_device) {
277 * Turn off echoing, because otherwise we can get into
278 * a loop with the tty and the modem echoing to each other.
279 * We presume we are the sole user of this tty device, so
280 * when we close it, it will revert to its defaults anyway.
282 inittermios.c_lflag &= ~(ECHO | ECHONL);
284 if (tcsetattr(fd, TCSAFLUSH, &inittermios) < 0)
286 syslog(LOG_WARNING, "tcsetattr: %m");
287 ioctl(fd, TIOCSWINSZ, &wsinfo);
293 * setdtr - control the DTR line on the serial port.
294 * This is called from die(), so it shouldn't call die().
299 int modembits = TIOCM_DTR;
301 ioctl(fd, (on? TIOCMBIS: TIOCMBIC), &modembits);
306 * output - Output PPP packet.
315 MAINDEBUG((LOG_WARNING, "output: unit != 0!"));
317 log_packet(p, len, "sent ");
319 if (write(fd, p, len) < 0) {
320 syslog(LOG_ERR, "write: %m");
327 * wait_input - wait until there is data available on fd,
328 * for the length of time specified by *timo (indefinite
332 struct timeval *timo;
339 n = select(fd+1, &ready, NULL, &ready, timo);
340 if (n < 0 && errno != EINTR) {
341 syslog(LOG_ERR, "select: %m");
348 * read_packet - get a PPP packet from the serial device.
356 if ((len = read(fd, buf, PPP_MTU + PPP_HDRLEN)) < 0) {
357 if (errno == EWOULDBLOCK || errno == EINTR)
359 syslog(LOG_ERR, "read(fd): %m");
367 * ppp_send_config - configure the transmit characteristics of
371 ppp_send_config(unit, mtu, asyncmap, pcomp, accomp)
379 strncpy(ifr.ifr_name, ifname, sizeof (ifr.ifr_name));
381 if (ioctl(sockfd, SIOCSIFMTU, (caddr_t) &ifr) < 0) {
382 syslog(LOG_ERR, "ioctl(SIOCSIFMTU): %m");
386 if (ioctl(fd, PPPIOCSASYNCMAP, (caddr_t) &asyncmap) < 0) {
387 syslog(LOG_ERR, "ioctl(PPPIOCSASYNCMAP): %m");
391 if (ioctl(fd, PPPIOCGFLAGS, (caddr_t) &x) < 0) {
392 syslog(LOG_ERR, "ioctl (PPPIOCGFLAGS): %m");
395 x = pcomp? x | SC_COMP_PROT: x &~ SC_COMP_PROT;
396 x = accomp? x | SC_COMP_AC: x &~ SC_COMP_AC;
397 if (ioctl(fd, PPPIOCSFLAGS, (caddr_t) &x) < 0) {
398 syslog(LOG_ERR, "ioctl(PPPIOCSFLAGS): %m");
405 * ppp_set_xaccm - set the extended transmit ACCM for the interface.
408 ppp_set_xaccm(unit, accm)
412 if (ioctl(fd, PPPIOCSXASYNCMAP, accm) < 0 && errno != ENOTTY)
413 syslog(LOG_WARNING, "ioctl(set extended ACCM): %m");
418 * ppp_recv_config - configure the receive-side characteristics of
422 ppp_recv_config(unit, mru, asyncmap, pcomp, accomp)
429 if (ioctl(fd, PPPIOCSMRU, (caddr_t) &mru) < 0) {
430 syslog(LOG_ERR, "ioctl(PPPIOCSMRU): %m");
433 if (ioctl(fd, PPPIOCSRASYNCMAP, (caddr_t) &asyncmap) < 0) {
434 syslog(LOG_ERR, "ioctl(PPPIOCSRASYNCMAP): %m");
437 if (ioctl(fd, PPPIOCGFLAGS, (caddr_t) &x) < 0) {
438 syslog(LOG_ERR, "ioctl (PPPIOCGFLAGS): %m");
441 x = !accomp? x | SC_REJ_COMP_AC: x &~ SC_REJ_COMP_AC;
442 if (ioctl(fd, PPPIOCSFLAGS, (caddr_t) &x) < 0) {
443 syslog(LOG_ERR, "ioctl(PPPIOCSFLAGS): %m");
449 * ccp_test - ask kernel whether a given compression method
450 * is acceptable for use.
452 ccp_test(unit, opt_ptr, opt_len, for_transmit)
453 int unit, opt_len, for_transmit;
456 struct ppp_option_data data;
459 data.length = opt_len;
460 data.transmit = for_transmit;
461 return ioctl(fd, PPPIOCSCOMPRESS, (caddr_t) &data) >= 0;
465 * ccp_flags_set - inform kernel about the current state of CCP.
468 ccp_flags_set(unit, isopen, isup)
469 int unit, isopen, isup;
473 if (ioctl(fd, PPPIOCGFLAGS, (caddr_t) &x) < 0) {
474 syslog(LOG_ERR, "ioctl (PPPIOCGFLAGS): %m");
477 x = isopen? x | SC_CCP_OPEN: x &~ SC_CCP_OPEN;
478 x = isup? x | SC_CCP_UP: x &~ SC_CCP_UP;
479 if (ioctl(fd, PPPIOCSFLAGS, (caddr_t) &x) < 0)
480 syslog(LOG_ERR, "ioctl(PPPIOCSFLAGS): %m");
484 * ccp_fatal_error - returns 1 if decompression was disabled as a
485 * result of an error detected after decompression of a packet,
486 * 0 otherwise. This is necessary because of patent nonsense.
489 ccp_fatal_error(unit)
494 if (ioctl(fd, PPPIOCGFLAGS, (caddr_t) &x) < 0) {
495 syslog(LOG_ERR, "ioctl(PPPIOCGFLAGS): %m");
498 return x & SC_DC_FERROR;
502 * sifvjcomp - config tcp header compression
505 sifvjcomp(u, vjcomp, cidcomp, maxcid)
506 int u, vjcomp, cidcomp, maxcid;
510 if (ioctl(fd, PPPIOCGFLAGS, (caddr_t) &x) < 0) {
511 syslog(LOG_ERR, "ioctl (PPPIOCGFLAGS): %m");
514 x = vjcomp ? x | SC_COMP_TCP: x &~ SC_COMP_TCP;
515 x = cidcomp? x & ~SC_NO_TCP_CCID: x | SC_NO_TCP_CCID;
516 if (ioctl(fd, PPPIOCSFLAGS, (caddr_t) &x) < 0) {
517 syslog(LOG_ERR, "ioctl(PPPIOCSFLAGS): %m");
520 if (ioctl(fd, PPPIOCSMAXCID, (caddr_t) &maxcid) < 0) {
521 syslog(LOG_ERR, "ioctl(PPPIOCSFLAGS): %m");
528 * sifup - Config the interface up and enable IP packets to pass.
531 #define SC_ENABLE_IP 0x100 /* compat for old versions of kernel code */
542 strncpy(ifr.ifr_name, ifname, sizeof (ifr.ifr_name));
543 if (ioctl(sockfd, SIOCGIFFLAGS, (caddr_t) &ifr) < 0) {
544 syslog(LOG_ERR, "ioctl (SIOCGIFFLAGS): %m");
547 ifr.ifr_flags |= IFF_UP;
548 if (ioctl(sockfd, SIOCSIFFLAGS, (caddr_t) &ifr) < 0) {
549 syslog(LOG_ERR, "ioctl(SIOCSIFFLAGS): %m");
552 npi.protocol = PPP_IP;
553 npi.mode = NPMODE_PASS;
554 if (ioctl(fd, PPPIOCSNPMODE, &npi) < 0) {
555 if (errno != ENOTTY) {
556 syslog(LOG_ERR, "ioctl(PPPIOCSNPMODE): %m");
559 /* for backwards compatibility */
560 if (ioctl(fd, PPPIOCGFLAGS, (caddr_t) &x) < 0) {
561 syslog(LOG_ERR, "ioctl (PPPIOCGFLAGS): %m");
565 if (ioctl(fd, PPPIOCSFLAGS, (caddr_t) &x) < 0) {
566 syslog(LOG_ERR, "ioctl(PPPIOCSFLAGS): %m");
574 * sifdown - Config the interface down and disable IP.
586 npi.protocol = PPP_IP;
587 npi.mode = NPMODE_ERROR;
588 if (ioctl(fd, PPPIOCSNPMODE, (caddr_t) &npi) < 0) {
589 if (errno != ENOTTY) {
590 syslog(LOG_ERR, "ioctl(PPPIOCSNPMODE): %m");
593 /* backwards compatibility */
594 if (ioctl(fd, PPPIOCGFLAGS, (caddr_t) &x) < 0) {
595 syslog(LOG_ERR, "ioctl (PPPIOCGFLAGS): %m");
599 if (ioctl(fd, PPPIOCSFLAGS, (caddr_t) &x) < 0) {
600 syslog(LOG_ERR, "ioctl(PPPIOCSFLAGS): %m");
607 strncpy(ifr.ifr_name, ifname, sizeof (ifr.ifr_name));
608 if (ioctl(sockfd, SIOCGIFFLAGS, (caddr_t) &ifr) < 0) {
609 syslog(LOG_ERR, "ioctl (SIOCGIFFLAGS): %m");
612 ifr.ifr_flags &= ~IFF_UP;
613 if (ioctl(sockfd, SIOCSIFFLAGS, (caddr_t) &ifr) < 0) {
614 syslog(LOG_ERR, "ioctl(SIOCSIFFLAGS): %m");
622 * SET_SA_FAMILY - set the sa_family field of a struct sockaddr,
625 #define SET_SA_FAMILY(addr, family) \
626 BZERO((char *) &(addr), sizeof(addr)); \
627 addr.sa_family = (family); \
628 addr.sa_len = sizeof(addr);
631 * sifaddr - Config the interface IP addresses and netmask.
638 struct ifaliasreq ifra;
640 strncpy(ifra.ifra_name, ifname, sizeof(ifra.ifra_name));
641 SET_SA_FAMILY(ifra.ifra_addr, AF_INET);
642 ((struct sockaddr_in *) &ifra.ifra_addr)->sin_addr.s_addr = o;
643 SET_SA_FAMILY(ifra.ifra_broadaddr, AF_INET);
644 ((struct sockaddr_in *) &ifra.ifra_broadaddr)->sin_addr.s_addr = h;
646 SET_SA_FAMILY(ifra.ifra_mask, AF_INET);
647 ((struct sockaddr_in *) &ifra.ifra_mask)->sin_addr.s_addr = m;
649 BZERO(&ifra.ifra_mask, sizeof(ifra.ifra_mask));
650 if (ioctl(sockfd, SIOCAIFADDR, (caddr_t) &ifra) < 0) {
651 if (errno != EEXIST) {
652 syslog(LOG_ERR, "ioctl(SIOCAIFADDR): %m");
655 syslog(LOG_WARNING, "ioctl(SIOCAIFADDR): Address already exists");
661 * cifaddr - Clear the interface IP addresses, and delete routes
662 * through the interface if possible.
669 struct ifaliasreq ifra;
671 strncpy(ifra.ifra_name, ifname, sizeof(ifra.ifra_name));
672 SET_SA_FAMILY(ifra.ifra_addr, AF_INET);
673 ((struct sockaddr_in *) &ifra.ifra_addr)->sin_addr.s_addr = o;
674 SET_SA_FAMILY(ifra.ifra_broadaddr, AF_INET);
675 ((struct sockaddr_in *) &ifra.ifra_broadaddr)->sin_addr.s_addr = h;
676 BZERO(&ifra.ifra_mask, sizeof(ifra.ifra_mask));
677 if (ioctl(sockfd, SIOCDIFADDR, (caddr_t) &ifra) < 0) {
678 syslog(LOG_WARNING, "ioctl(SIOCDIFADDR): %m");
685 * sifdefaultroute - assign a default route through the address given.
688 sifdefaultroute(u, g)
692 return dodefaultroute(g, 's');
696 * cifdefaultroute - delete a default route through the address given.
699 cifdefaultroute(u, g)
703 return dodefaultroute(g, 'c');
707 * dodefaultroute - talk to a routing socket to add/delete a default route.
710 dodefaultroute(g, cmd)
716 struct rt_msghdr hdr;
717 struct sockaddr_in dst;
718 struct sockaddr_in gway;
719 struct sockaddr_in mask;
722 if ((routes = socket(PF_ROUTE, SOCK_RAW, AF_INET)) < 0) {
723 syslog(LOG_ERR, "%cifdefaultroute: opening routing socket: %m", cmd);
727 memset(&rtmsg, 0, sizeof(rtmsg));
728 rtmsg.hdr.rtm_type = cmd == 's'? RTM_ADD: RTM_DELETE;
729 rtmsg.hdr.rtm_flags = RTF_UP | RTF_GATEWAY;
730 rtmsg.hdr.rtm_version = RTM_VERSION;
731 rtmsg.hdr.rtm_seq = ++rtm_seq;
732 rtmsg.hdr.rtm_addrs = RTA_DST | RTA_GATEWAY | RTA_NETMASK;
733 rtmsg.dst.sin_len = sizeof(rtmsg.dst);
734 rtmsg.dst.sin_family = AF_INET;
735 rtmsg.gway.sin_len = sizeof(rtmsg.gway);
736 rtmsg.gway.sin_family = AF_INET;
737 rtmsg.gway.sin_addr.s_addr = g;
738 rtmsg.mask.sin_len = sizeof(rtmsg.dst);
739 rtmsg.mask.sin_family = AF_INET;
741 rtmsg.hdr.rtm_msglen = sizeof(rtmsg);
742 if (write(routes, &rtmsg, sizeof(rtmsg)) < 0) {
743 syslog(LOG_ERR, "%s default route: %m", cmd=='s'? "add": "delete");
755 * sifproxyarp - Make a proxy ARP entry for the peer.
758 struct rt_msghdr hdr;
759 struct sockaddr_inarp dst;
760 struct sockaddr_dl hwa;
764 static int arpmsg_valid;
767 sifproxyarp(unit, hisaddr)
775 * Get the hardware address of an interface on the same subnet
776 * as our local address.
778 memset(&arpmsg, 0, sizeof(arpmsg));
779 if (!get_ether_addr(hisaddr, &arpmsg.hwa)) {
780 syslog(LOG_ERR, "Cannot determine ethernet address for proxy ARP");
784 if ((routes = socket(PF_ROUTE, SOCK_RAW, AF_INET)) < 0) {
785 syslog(LOG_ERR, "sifproxyarp: opening routing socket: %m");
789 arpmsg.hdr.rtm_type = RTM_ADD;
790 arpmsg.hdr.rtm_flags = RTF_ANNOUNCE | RTF_HOST | RTF_STATIC;
791 arpmsg.hdr.rtm_version = RTM_VERSION;
792 arpmsg.hdr.rtm_seq = ++rtm_seq;
793 arpmsg.hdr.rtm_addrs = RTA_DST | RTA_GATEWAY;
794 arpmsg.hdr.rtm_inits = RTV_EXPIRE;
795 arpmsg.dst.sin_len = sizeof(struct sockaddr_inarp);
796 arpmsg.dst.sin_family = AF_INET;
797 arpmsg.dst.sin_addr.s_addr = hisaddr;
798 arpmsg.dst.sin_other = SIN_PROXY;
800 arpmsg.hdr.rtm_msglen = (char *) &arpmsg.hwa - (char *) &arpmsg
801 + arpmsg.hwa.sdl_len;
802 if (write(routes, &arpmsg, arpmsg.hdr.rtm_msglen) < 0) {
803 syslog(LOG_ERR, "add proxy arp entry: %m");
814 * cifproxyarp - Delete the proxy ARP entry for the peer.
817 cifproxyarp(unit, hisaddr)
827 arpmsg.hdr.rtm_type = RTM_DELETE;
828 arpmsg.hdr.rtm_seq = ++rtm_seq;
830 if ((routes = socket(PF_ROUTE, SOCK_RAW, AF_INET)) < 0) {
831 syslog(LOG_ERR, "sifproxyarp: opening routing socket: %m");
835 if (write(routes, &arpmsg, arpmsg.hdr.rtm_msglen) < 0) {
836 syslog(LOG_ERR, "delete proxy arp entry: %m");
845 #else /* RTM_VERSION */
848 * sifproxyarp - Make a proxy ARP entry for the peer.
851 sifproxyarp(unit, hisaddr)
855 struct arpreq arpreq;
857 struct sockaddr_dl sdl;
861 BZERO(&arpreq, sizeof(arpreq));
864 * Get the hardware address of an interface on the same subnet
865 * as our local address.
867 if (!get_ether_addr(hisaddr, &dls.sdl)) {
868 syslog(LOG_ERR, "Cannot determine ethernet address for proxy ARP");
872 arpreq.arp_ha.sa_len = sizeof(struct sockaddr);
873 arpreq.arp_ha.sa_family = AF_UNSPEC;
874 BCOPY(LLADDR(&dls.sdl), arpreq.arp_ha.sa_data, dls.sdl.sdl_alen);
875 SET_SA_FAMILY(arpreq.arp_pa, AF_INET);
876 ((struct sockaddr_in *) &arpreq.arp_pa)->sin_addr.s_addr = hisaddr;
877 arpreq.arp_flags = ATF_PERM | ATF_PUBL;
878 if (ioctl(sockfd, SIOCSARP, (caddr_t)&arpreq) < 0) {
879 syslog(LOG_ERR, "ioctl(SIOCSARP): %m");
887 * cifproxyarp - Delete the proxy ARP entry for the peer.
890 cifproxyarp(unit, hisaddr)
894 struct arpreq arpreq;
896 BZERO(&arpreq, sizeof(arpreq));
897 SET_SA_FAMILY(arpreq.arp_pa, AF_INET);
898 ((struct sockaddr_in *) &arpreq.arp_pa)->sin_addr.s_addr = hisaddr;
899 if (ioctl(sockfd, SIOCDARP, (caddr_t)&arpreq) < 0) {
900 syslog(LOG_WARNING, "ioctl(SIOCDARP): %m");
905 #endif /* RTM_VERSION */
909 * get_ether_addr - get the hardware address of an interface on the
910 * the same subnet as ipaddr.
915 get_ether_addr(ipaddr, hwaddr)
917 struct sockaddr_dl *hwaddr;
919 struct ifreq *ifr, *ifend, *ifp;
921 struct sockaddr_dl *dla;
924 struct ifreq ifs[MAX_IFS];
926 ifc.ifc_len = sizeof(ifs);
928 if (ioctl(sockfd, SIOCGIFCONF, &ifc) < 0) {
929 syslog(LOG_ERR, "ioctl(SIOCGIFCONF): %m");
934 * Scan through looking for an interface with an Internet
935 * address on the same subnet as `ipaddr'.
937 ifend = (struct ifreq *) (ifc.ifc_buf + ifc.ifc_len);
938 for (ifr = ifc.ifc_req; ifr < ifend; ifr = (struct ifreq *)
939 ((char *)&ifr->ifr_addr + ifr->ifr_addr.sa_len)) {
940 if (ifr->ifr_addr.sa_family == AF_INET) {
941 ina = ((struct sockaddr_in *) &ifr->ifr_addr)->sin_addr.s_addr;
942 strncpy(ifreq.ifr_name, ifr->ifr_name, sizeof(ifreq.ifr_name));
944 * Check that the interface is up, and not point-to-point
947 if (ioctl(sockfd, SIOCGIFFLAGS, &ifreq) < 0)
949 if ((ifreq.ifr_flags &
950 (IFF_UP|IFF_BROADCAST|IFF_POINTOPOINT|IFF_LOOPBACK|IFF_NOARP))
951 != (IFF_UP|IFF_BROADCAST))
954 * Get its netmask and check that it's on the right subnet.
956 if (ioctl(sockfd, SIOCGIFNETMASK, &ifreq) < 0)
958 mask = ((struct sockaddr_in *) &ifreq.ifr_addr)->sin_addr.s_addr;
959 if ((ipaddr & mask) != (ina & mask))
968 syslog(LOG_INFO, "found interface %s for proxy arp", ifr->ifr_name);
971 * Now scan through again looking for a link-level address
972 * for this interface.
975 for (ifr = ifc.ifc_req; ifr < ifend; ) {
976 if (strcmp(ifp->ifr_name, ifr->ifr_name) == 0
977 && ifr->ifr_addr.sa_family == AF_LINK) {
979 * Found the link-level address - copy it out
981 dla = (struct sockaddr_dl *) &ifr->ifr_addr;
982 BCOPY(dla, hwaddr, dla->sdl_len);
985 ifr = (struct ifreq *) ((char *)&ifr->ifr_addr + ifr->ifr_addr.sa_len);
992 * Return user specified netmask, modified by any mask we might determine
993 * for address `addr' (in network byte order).
994 * Here we scan through the system's list of interfaces, looking for
995 * any non-point-to-point interfaces which might appear to be on the same
996 * network as `addr'. If we find any, we OR in their netmask to the
997 * user-specified netmask.
1003 u_int32_t mask, nmask, ina;
1004 struct ifreq *ifr, *ifend, ifreq;
1006 struct ifreq ifs[MAX_IFS];
1009 if (IN_CLASSA(addr)) /* determine network mask for address class */
1010 nmask = IN_CLASSA_NET;
1011 else if (IN_CLASSB(addr))
1012 nmask = IN_CLASSB_NET;
1014 nmask = IN_CLASSC_NET;
1015 /* class D nets are disallowed by bad_ip_adrs */
1016 mask = netmask | htonl(nmask);
1019 * Scan through the system's network interfaces.
1021 ifc.ifc_len = sizeof(ifs);
1023 if (ioctl(sockfd, SIOCGIFCONF, &ifc) < 0) {
1024 syslog(LOG_WARNING, "ioctl(SIOCGIFCONF): %m");
1027 ifend = (struct ifreq *) (ifc.ifc_buf + ifc.ifc_len);
1028 for (ifr = ifc.ifc_req; ifr < ifend; ifr = (struct ifreq *)
1029 ((char *)&ifr->ifr_addr + ifr->ifr_addr.sa_len)) {
1031 * Check the interface's internet address.
1033 if (ifr->ifr_addr.sa_family != AF_INET)
1035 ina = ((struct sockaddr_in *) &ifr->ifr_addr)->sin_addr.s_addr;
1036 if ((ntohl(ina) & nmask) != (addr & nmask))
1039 * Check that the interface is up, and not point-to-point or loopback.
1041 strncpy(ifreq.ifr_name, ifr->ifr_name, sizeof(ifreq.ifr_name));
1042 if (ioctl(sockfd, SIOCGIFFLAGS, &ifreq) < 0)
1044 if ((ifreq.ifr_flags & (IFF_UP|IFF_POINTOPOINT|IFF_LOOPBACK))
1048 * Get its netmask and OR it into our mask.
1050 if (ioctl(sockfd, SIOCGIFNETMASK, &ifreq) < 0)
1052 mask |= ((struct sockaddr_in *)&ifreq.ifr_addr)->sin_addr.s_addr;
1059 * lock - create a lock file for the named lock device
1061 #define LOCK_PREFIX "/var/spool/lock/LCK.."
1067 char hdb_lock_buffer[12];
1071 if ((p = strrchr(dev, '/')) != NULL)
1073 lock_file = malloc(strlen(LOCK_PREFIX) + strlen(dev) + 1);
1074 if (lock_file == NULL)
1075 novm("lock file name");
1076 strcat(strcpy(lock_file, LOCK_PREFIX), dev);
1078 while ((fd = open(lock_file, O_EXCL | O_CREAT | O_RDWR, 0644)) < 0) {
1080 && (fd = open(lock_file, O_RDONLY, 0)) >= 0) {
1081 /* Read the lock file to find out who has the device locked */
1082 n = read(fd, hdb_lock_buffer, 11);
1084 hdb_lock_buffer[n] = 0;
1085 pid = atoi(hdb_lock_buffer);
1088 syslog(LOG_ERR, "Can't read pid from lock file %s", lock_file);
1091 if (kill(pid, 0) == -1 && errno == ESRCH) {
1092 /* pid no longer exists - remove the lock file */
1093 if (unlink(lock_file) == 0) {
1095 syslog(LOG_NOTICE, "Removed stale lock on %s (pid %d)",
1099 syslog(LOG_WARNING, "Couldn't remove stale lock on %s",
1102 syslog(LOG_NOTICE, "Device %s is locked by pid %d",
1107 syslog(LOG_ERR, "Can't create lock file %s: %m", lock_file);
1113 sprintf(hdb_lock_buffer, "%10d\n", getpid());
1114 write(fd, hdb_lock_buffer, 11);
1121 * unlock - remove our lockfile