2 * System-dependent procedures for pppd under Digital UNIX (OSF/1).
4 * Copyright (c) 1994 The Australian National University.
7 * Permission to use, copy, modify, and distribute this software and its
8 * documentation is hereby granted, provided that the above copyright
9 * notice appears in all copies. This software is provided without any
10 * warranty, express or implied. The Australian National University
11 * makes no representations about the suitability of this software for
14 * IN NO EVENT SHALL THE AUSTRALIAN NATIONAL UNIVERSITY BE LIABLE TO ANY
15 * PARTY FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES
16 * ARISING OUT OF THE USE OF THIS SOFTWARE AND ITS DOCUMENTATION, EVEN IF
17 * THE AUSTRALIAN NATIONAL UNIVERSITY HAVE BEEN ADVISED OF THE POSSIBILITY
20 * THE AUSTRALIAN NATIONAL UNIVERSITY SPECIFICALLY DISCLAIMS ANY WARRANTIES,
21 * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
22 * AND FITNESS FOR A PARTICULAR PURPOSE. THE SOFTWARE PROVIDED HEREUNDER IS
23 * ON AN "AS IS" BASIS, AND THE AUSTRALIAN NATIONAL UNIVERSITY HAS NO
24 * OBLIGATION TO PROVIDE MAINTENANCE, SUPPORT, UPDATES, ENHANCEMENTS,
29 static char rcsid[] = "$Id: sys-osf.c,v 1.26 1999/04/27 22:33:09 varadhan Exp $";
44 #include <sys/types.h>
45 #include <sys/param.h>
46 #include <sys/socket.h>
47 #include <sys/stream.h>
48 #include <sys/stropts.h>
52 #include <sys/ioctl.h>
54 #include <net/if_dl.h>
55 #include <net/if_arp.h>
56 #include <net/route.h>
57 #include <net/ppp_defs.h>
58 #include <net/pppio.h>
59 #include <netinet/in.h>
60 #include <arpa/inet.h>
65 static int fdmuxid = -1;
69 static int restore_term;
70 static struct termios inittermios;
71 static struct winsize wsinfo; /* Initial window size info */
72 static pid_t tty_sid; /* PID of our session leader */
74 extern u_char inpacket_buf[]; /* borrowed from main.c */
76 static int link_mtu, link_mru;
79 static int tty_nmodules;
80 static char tty_modules[NMODULES][FMNAMESZ+1];
82 static int closed_stdio;
83 static int initfdflags = -1;
84 static int orig_ttyfd = -1;
86 static int if_is_up; /* Interface has been marked up */
87 static u_int32_t ifaddrs[2]; /* local and remote addresses */
88 static u_int32_t default_route_gateway; /* Gateway for default route added */
89 static u_int32_t proxy_arp_addr; /* Addr for proxy arp entry added */
91 #define MAX_POLLFDS 32
92 static struct pollfd pollfds[MAX_POLLFDS];
95 /* Prototypes for procedures local to this file. */
96 static int translate_speed __P((int));
97 static int baud_rate_of __P((int));
98 static int get_ether_addr __P((u_int32_t, struct sockaddr *));
99 static int strioctl __P((int, int, void *, int, int));
103 * sys_init - System-dependent initialization.
110 openlog("pppd", LOG_PID | LOG_NDELAY, LOG_PPP);
111 setlogmask(LOG_UPTO(LOG_INFO));
113 setlogmask(LOG_UPTO(LOG_DEBUG));
115 /* Get an internet socket for doing socket ioctl's on. */
116 if ((sockfd = socket(AF_INET, SOCK_DGRAM, 0)) < 0)
117 fatal("Couldn't create IP socket: %m");
120 tty_sid = getsid((pid_t)0);
123 * Open the ppp device.
125 pppfd = open("/dev/streams/ppp", O_RDWR | O_NONBLOCK, 0);
127 fatal("Can't open /dev/streams/ppp: %m");
129 x = PPPDBG_LOG + PPPDBG_DRIVER;
130 strioctl(pppfd, PPPIO_DEBUG, &x, sizeof(int), 0);
133 /* Assign a new PPA and get its unit number. */
134 if (strioctl(pppfd, PPPIO_NEWPPA, &ifunit, 0, sizeof(int)) < 0)
135 fatal("Can't create new PPP interface: %m");
138 * Open the ppp device again and push the if_ppp module on it.
140 iffd = open("/dev/streams/ppp", O_RDWR, 0);
142 fatal("Can't open /dev/streams/ppp (2): %m");
144 x = PPPDBG_LOG + PPPDBG_DRIVER;
145 strioctl(iffd, PPPIO_DEBUG, &x, sizeof(int), 0);
147 if (strioctl(iffd, PPPIO_ATTACH, &ifunit, sizeof(int), 0) < 0)
148 fatal("Couldn't attach ppp interface to device: %m");
149 if (ioctl(iffd, I_PUSH, "if_ppp") < 0)
150 fatal("Can't push ppp interface module: %m");
152 x = PPPDBG_LOG + PPPDBG_IF;
153 strioctl(iffd, PPPIO_DEBUG, &x, sizeof(int), 0);
155 if (strioctl(iffd, PPPIO_NEWPPA, &ifunit, sizeof(int), 0) < 0)
156 fatal("Couldn't create ppp interface unit: %m");
158 if (strioctl(iffd, PPPIO_BIND, &x, sizeof(int), 0) < 0)
159 fatal("Couldn't bind ppp interface to IP SAP: %m");
165 * sys_cleanup - restore any system state we modified before exiting:
166 * mark the interface down, delete default route and/or proxy arp entry.
167 * This shouldn't call die() because it's called from die().
175 cifaddr(0, ifaddrs[0], ifaddrs[1]);
176 if (default_route_gateway)
177 cifdefaultroute(0, 0, default_route_gateway);
179 cifproxyarp(0, proxy_arp_addr);
183 * sys_close - Clean up in a child process before execing.
195 * sys_check_options - check the options that the user specified
205 * daemon - Detach us from controlling terminal session.
208 daemon(nochdir, noclose)
209 int nochdir, noclose;
213 if ((pid = fork()) < 0)
216 exit(0); /* parent dies */
221 fclose(stdin); /* don't need stdin, stdout, stderr */
230 * ppp_available - check whether the system has any ppp interfaces
237 return stat("/dev/streams/ppp", &buf) >= 0;
240 char pipename[] = "/dev/streams/pipe";
243 * streampipe -- Opens a STREAMS based pipe. Used by streamify().
247 streampipe(int fd[2])
249 if ((fd[0]=open(pipename, O_RDWR)) == -1)
251 else if ((fd[1]=open(pipename, O_RDWR)) == -1) {
254 } else if (ioctl(fd[0], I_PIPE, fd[1]) != 0) {
259 return(ioctl(fd[0], I_PUSH, "pipemod"));
264 * streamify -- Needed for Digital UNIX, since some tty devices are not STREAMS
265 * modules (but ptys are, and pipes can be).
268 #define BUFFSIZE 1000 /* Size of buffer for streamify() */
275 int ret, fret, rret, maxfd;
276 static char buffer[BUFFSIZE];
279 if (streampipe(fdes) != 0)
280 error("streampipe(): %m\n");
281 else if (isastream(fdes[0]) == 1) {
282 if ((fret=fork()) < 0) {
283 error("fork(): %m\n");
284 } else if (fret == 0) {
285 /* Process to forward things from pipe to tty */
286 sigemptyset(&(sa.sa_mask));
287 sa.sa_handler = SIG_DFL;
289 sigaction(SIGHUP, &sa, NULL); /* Go back to default actions */
290 sigaction(SIGINT, &sa, NULL); /* for changed signals. */
291 sigaction(SIGTERM, &sa, NULL);
292 sigaction(SIGCHLD, &sa, NULL);
293 sigaction(SIGUSR1, &sa, NULL);
294 sigaction(SIGUSR2, &sa, NULL);
297 maxfd = (fdes[1]>fd)?fdes[1]:fd;
300 FD_SET(fdes[1], &readfds);
301 FD_SET(fd, &readfds);
302 ret = select(maxfd+1, &readfds, NULL, NULL, NULL);
303 if (FD_ISSET(fd, &readfds)) {
304 rret = read(fd, buffer, BUFFSIZE);
306 SYSDEBUG(("slave died: EOF on tty."));
309 write(fdes[1], buffer, rret);
312 if (FD_ISSET(fdes[1], &readfds)) {
313 rret = read(fdes[1], buffer, BUFFSIZE);
315 SYSDEBUG(("slave died: EOF on pipe."));
318 write(fd, buffer, rret);
333 * establish_ppp - Turn the serial port into a ppp interface.
341 if (isastream(fd) != 1) {
342 if ((ttyfd = fd = streamify(fd)) < 0)
343 fatal("Couldn't get a STREAMS module!\n");
346 /* Pop any existing modules off the tty stream. */
348 if (ioctl(fd, I_LOOK, tty_modules[i]) < 0
349 || ioctl(fd, I_POP, 0) < 0)
351 error("popping module %s\n", tty_modules[i]);
356 /* Push the async hdlc module and the compressor module. */
357 if (ioctl(fd, I_PUSH, "ppp_ahdl") < 0)
358 fatal("Couldn't push PPP Async HDLC module: %m");
359 if (ioctl(fd, I_PUSH, "ppp_comp") < 0)
360 error("Couldn't push PPP compression module: %m");
362 /* read mode, message non-discard mode */
363 if (ioctl(fd, I_SRDOPT, RMSGN|RPROTNORM) < 0)
364 fatal("ioctl(I_SRDOPT, RMSGN): %m");
366 /* Link the serial port under the PPP multiplexor. */
367 if ((fdmuxid = ioctl(pppfd, I_LINK, fd)) < 0)
368 fatal("Can't link tty to PPP mux: %m");
370 /* close stdin, stdout, stderr if they might refer to the device */
371 if (default_device && !closed_stdio) {
374 for (i = 0; i <= 2; ++i)
375 if (i != fd && i != sockfd)
381 * Set device for non-blocking reads.
382 * XXX why do we need to do this? don't we use pppfd not fd?
384 if ((initfdflags = fcntl(fd, F_GETFL)) == -1
385 || fcntl(fd, F_SETFL, initfdflags | O_NONBLOCK) == -1) {
386 warn("Couldn't set device to non-blocking mode: %m");
393 * restore_loop - reattach the ppp unit to the loopback.
394 * This doesn't need to do anything because disestablish_ppp does it.
402 * disestablish_ppp - Restore the serial port to normal operation.
403 * It attempts to reconstruct the stream with the previously popped
404 * modules. This shouldn't call die() because it's called from die().
413 if (ioctl(pppfd, I_UNLINK, fdmuxid) < 0) {
415 error("Can't unlink tty from PPP mux: %m");
419 /* Reset non-blocking mode on the file descriptor. */
420 if (initfdflags != -1 && fcntl(fd, F_SETFL, initfdflags) < 0)
421 warn("Couldn't restore device fd flags: %m");
425 while (ioctl(fd, I_POP, 0) >= 0)
427 for (i = tty_nmodules - 1; i >= 0; --i)
428 if (ioctl(fd, I_PUSH, tty_modules[i]) < 0)
429 error("Couldn't restore tty module %s: %m",
433 if (hungup && default_device && tty_sid > 0) {
435 * If we have received a hangup, we need to send a SIGHUP
436 * to the terminal's controlling process. The reason is
437 * that the original stream head for the terminal hasn't
438 * seen the M_HANGUP message (it went up through the ppp
439 * driver to the stream head for our fd to /dev/ppp).
441 dbglog("sending hangup to %d", tty_sid);
442 if (kill(tty_sid, SIGHUP) < 0)
443 error("couldn't kill pgrp: %m");
445 if (orig_ttyfd >= 0) {
447 (void)wait((void *)0);
455 * Check whether the link seems not to be 8-bit clean.
463 if (strioctl(pppfd, PPPIO_GCLEAN, &x, 0, sizeof(x)) < 0)
468 s = "bit 7 set to 1";
471 s = "bit 7 set to 0";
481 warn("Serial link is not 8-bit clean:");
482 warn("All received characters had %s", s);
487 * List of valid speeds.
490 int speed_int, speed_val;
562 * Translate from bits/second to a speed_t.
568 struct speed *speedp;
572 for (speedp = speeds; speedp->speed_int; speedp++)
573 if (bps == speedp->speed_int)
574 return speedp->speed_val;
575 warn("speed %d not supported", bps);
580 * Translate from a speed_t to bits/second.
586 struct speed *speedp;
590 for (speedp = speeds; speedp->speed_int; speedp++)
591 if (speed == speedp->speed_val)
592 return speedp->speed_int;
597 * set_up_tty: Set up the serial port on `fd' for 8 bits, no parity,
598 * at the requested speed, etc. If `local' is true, set CLOCAL
599 * regardless of whether the modem option was specified.
602 set_up_tty(fd, local)
608 if (tcgetattr(fd, &tios) < 0)
609 fatal("tcgetattr: %m");
613 ioctl(fd, TIOCGWINSZ, &wsinfo);
616 tios.c_cflag &= ~(CSIZE | CSTOPB | PARENB | CLOCAL);
618 tios.c_cflag |= CRTSCTS;
619 else if (crtscts < 0)
620 tios.c_cflag &= ~CRTSCTS;
622 tios.c_cflag |= CS8 | CREAD | HUPCL;
624 tios.c_cflag |= CLOCAL;
625 tios.c_iflag = IGNBRK | IGNPAR;
629 tios.c_cc[VTIME] = 0;
632 tios.c_iflag |= IXON | IXOFF;
633 tios.c_cc[VSTOP] = 0x13; /* DC3 = XOFF = ^S */
634 tios.c_cc[VSTART] = 0x11; /* DC1 = XON = ^Q */
637 speed = translate_speed(inspeed);
639 cfsetospeed(&tios, speed);
640 cfsetispeed(&tios, speed);
642 speed = cfgetospeed(&tios);
644 * We can't proceed if the serial port speed is 0,
645 * since that implies that the serial port is disabled.
648 fatal("Baud rate for %s is 0; need explicit baud rate", devnam);
651 if (tcsetattr(fd, TCSAFLUSH, &tios) < 0)
652 fatal("tcsetattr: %m");
654 baud_rate = inspeed = baud_rate_of(speed);
659 * restore_tty - restore the terminal to the saved settings.
666 if (!default_device) {
668 * Turn off echoing, because otherwise we can get into
669 * a loop with the tty and the modem echoing to each other.
670 * We presume we are the sole user of this tty device, so
671 * when we close it, it will revert to its defaults anyway.
673 inittermios.c_lflag &= ~(ECHO | ECHONL);
675 if (tcsetattr(fd, TCSAFLUSH, &inittermios) < 0)
676 if (!hungup && errno != ENXIO)
677 warn("tcsetattr: %m");
678 ioctl(fd, TIOCSWINSZ, &wsinfo);
684 * setdtr - control the DTR line on the serial port.
685 * This is called from die(), so it shouldn't call die().
691 int modembits = TIOCM_DTR;
693 ioctl(fd, (on? TIOCMBIS: TIOCMBIC), &modembits);
697 * open_loopback - open the device we use for getting packets
698 * in demand mode. Under Digital Unix, we use our existing fd
708 * output - Output PPP packet.
721 dbglog("sent %P", p, len);
724 data.buf = (caddr_t) p;
726 while (putmsg(pppfd, NULL, &data, 0) < 0) {
727 if (--retries < 0 || (errno != EWOULDBLOCK && errno != EAGAIN)) {
729 error("Couldn't send packet: %m");
733 pfd.events = POLLOUT;
734 poll(&pfd, 1, 250); /* wait for up to 0.25 seconds */
740 * wait_input - wait until there is data available on fd,
741 * for the length of time specified by *timo (indefinite
746 struct timeval *timo;
750 t = timo == NULL? -1: timo->tv_sec * 1000 + timo->tv_usec / 1000;
751 if (poll(pollfds, n_pollfds, t) < 0 && errno != EINTR)
756 * add_fd - add an fd to the set that wait_input waits for.
763 for (n = 0; n < n_pollfds; ++n)
764 if (pollfds[n].fd == fd)
766 if (n_pollfds < MAX_POLLFDS) {
767 pollfds[n_pollfds].fd = fd;
768 pollfds[n_pollfds].events = POLLIN | POLLPRI | POLLHUP;
771 error("Too many inputs!");
775 * remove_fd - remove an fd from the set that wait_input waits for.
782 for (n = 0; n < n_pollfds; ++n) {
783 if (pollfds[n].fd == fd) {
784 while (++n < n_pollfds)
785 pollfds[n-1] = pollfds[n];
794 * wait_loop_output - wait until there is data available on the
795 * loopback, for the length of time specified by *timo (indefinite
799 wait_loop_output(timo)
800 struct timeval *timo;
806 * wait_time - wait for a given length of time or until a
807 * signal is received.
811 struct timeval *timo;
815 n = select(0, NULL, NULL, NULL, timo);
816 if (n < 0 && errno != EINTR)
822 * read_packet - get a PPP packet from the serial device.
828 struct strbuf ctrl, data;
830 unsigned char ctrlbuf[64];
833 data.maxlen = PPP_MRU + PPP_HDRLEN;
834 data.buf = (caddr_t) buf;
835 ctrl.maxlen = sizeof(ctrlbuf);
836 ctrl.buf = (caddr_t) ctrlbuf;
838 len = getmsg(pppfd, &ctrl, &data, &flags);
840 if (errno = EAGAIN || errno == EWOULDBLOCK || errno == EINTR)
842 fatal("Error reading packet: %m");
849 * Got a M_PROTO or M_PCPROTO message. Huh?
852 dbglog("got ctrl msg len=%d", ctrl.len);
858 * get_loop_output - get outgoing packets from the ppp device,
859 * and detect when we want to bring the real link up.
860 * Return value is 1 if we need to bring up the link, 0 otherwise.
868 while ((len = read_packet(inpacket_buf)) > 0) {
869 if (loop_frame(inpacket_buf, len))
876 * ppp_send_config - configure the transmit characteristics of
880 ppp_send_config(unit, mtu, asyncmap, pcomp, accomp)
888 if (strioctl(pppfd, PPPIO_MTU, &mtu, sizeof(mtu), 0) < 0) {
889 if (hungup && errno == ENXIO)
891 error("Couldn't set MTU: %m");
893 if (strioctl(pppfd, PPPIO_XACCM, &asyncmap, sizeof(asyncmap), 0) < 0) {
894 error("Couldn't set transmit ACCM: %m");
896 cf[0] = (pcomp? COMP_PROT: 0) + (accomp? COMP_AC: 0);
897 cf[1] = COMP_PROT | COMP_AC;
898 if (strioctl(pppfd, PPPIO_CFLAGS, cf, sizeof(cf), sizeof(int)) < 0) {
899 error("Couldn't set prot/AC compression: %m");
904 * ppp_set_xaccm - set the extended transmit ACCM for the interface.
907 ppp_set_xaccm(unit, accm)
911 if (strioctl(pppfd, PPPIO_XACCM, accm, sizeof(ext_accm), 0) < 0) {
912 if (!hungup || errno != ENXIO)
913 warn("Couldn't set extended ACCM: %m");
918 * ppp_recv_config - configure the receive-side characteristics of
922 ppp_recv_config(unit, mru, asyncmap, pcomp, accomp)
930 if (strioctl(pppfd, PPPIO_MRU, &mru, sizeof(mru), 0) < 0) {
931 if (hungup && errno == ENXIO)
933 error("Couldn't set MRU: %m");
935 if (strioctl(pppfd, PPPIO_RACCM, &asyncmap, sizeof(asyncmap), 0) < 0) {
936 error("Couldn't set receive ACCM: %m");
938 cf[0] = (pcomp? DECOMP_PROT: 0) + (accomp? DECOMP_AC: 0);
939 cf[1] = DECOMP_PROT | DECOMP_AC;
940 if (strioctl(pppfd, PPPIO_CFLAGS, cf, sizeof(cf), sizeof(int)) < 0) {
941 error("Couldn't set prot/AC decompression: %m");
946 * ccp_test - ask kernel whether a given compression method
947 * is acceptable for use.
949 * In Digital UNIX the memory buckets for chunks >16K are not
950 * primed when the system comes up. That means we're not
951 * likely to get the memory needed for the compressor on
952 * the first try. The way we work around this is to have
953 * the driver spin off a thread to go get the memory for us
954 * (we can't block at that point in a streams context.)
956 * This code synchronizes with the thread when it has returned
957 * with the memory we need. The driver will continue to return
958 * with EAGAIN until the thread comes back. We give up here
959 * if after 10 attempts in one second we still don't have memory.
960 * It's up to the driver to not lose track of that memory if
961 * thread takes too long to return.
964 ccp_test(unit, opt_ptr, opt_len, for_transmit)
965 int unit, opt_len, for_transmit;
972 tval.tv_usec = 100000;
973 for (i = 0; i < 10; ++i) {
974 if (strioctl(pppfd, (for_transmit? PPPIO_XCOMP: PPPIO_RCOMP),
975 opt_ptr, opt_len, 0) >= 0) {
983 error("hard failure trying to get memory for a compressor: %m");
984 return (errno == ENOSR)? 0: -1;
988 * ccp_flags_set - inform kernel about the current state of CCP.
991 ccp_flags_set(unit, isopen, isup)
992 int unit, isopen, isup;
996 cf[0] = (isopen? CCP_ISOPEN: 0) + (isup? CCP_ISUP: 0);
997 cf[1] = CCP_ISOPEN | CCP_ISUP | CCP_ERROR | CCP_FATALERROR;
998 if (strioctl(pppfd, PPPIO_CFLAGS, cf, sizeof(cf), sizeof(int)) < 0) {
999 if (!hungup || errno != ENXIO)
1000 error("Couldn't set kernel CCP state: %m");
1005 * get_idle_time - return how long the link has been idle.
1008 get_idle_time(u, ip)
1010 struct ppp_idle *ip;
1012 return strioctl(pppfd, PPPIO_GIDLE, ip, 0, sizeof(struct ppp_idle)) >= 0;
1016 * get_ppp_stats - return statistics for the link.
1019 get_ppp_stats(u, stats)
1021 struct pppd_stats *stats;
1025 if (strioctl(pppfd, PPPIO_GETSTAT, &s, 0, sizeof(s)) < 0) {
1026 error("Couldn't get link statistics: %m");
1029 stats->bytes_in = s.p.ppp_ibytes;
1030 stats->bytes_out = s.p.ppp_obytes;
1036 * ccp_fatal_error - returns 1 if decompression was disabled as a
1037 * result of an error detected after decompression of a packet,
1038 * 0 otherwise. This is necessary because of patent nonsense.
1041 ccp_fatal_error(unit)
1047 if (strioctl(pppfd, PPPIO_CFLAGS, cf, sizeof(cf), sizeof(int)) < 0) {
1048 if (errno != ENXIO && errno != EINVAL)
1049 error("Couldn't get compression flags: %m");
1052 return cf[0] & CCP_FATALERROR;
1056 * sifvjcomp - config tcp header compression
1059 sifvjcomp(u, vjcomp, xcidcomp, xmaxcid)
1060 int u, vjcomp, xcidcomp, xmaxcid;
1066 maxcid[0] = xcidcomp;
1067 maxcid[1] = 15; /* XXX should be rmaxcid */
1068 if (strioctl(pppfd, PPPIO_VJINIT, maxcid, sizeof(maxcid), 0) < 0) {
1069 error("Couldn't initialize VJ compression: %m");
1073 cf[0] = (vjcomp? COMP_VJC + DECOMP_VJC: 0) /* XXX this is wrong */
1074 + (xcidcomp? COMP_VJCCID + DECOMP_VJCCID: 0);
1075 cf[1] = COMP_VJC + DECOMP_VJC + COMP_VJCCID + DECOMP_VJCCID;
1076 if (strioctl(pppfd, PPPIO_CFLAGS, cf, sizeof(cf), sizeof(int)) < 0) {
1078 error("Couldn't enable VJ compression: %m");
1085 * sifup - Config the interface up and enable IP packets to pass.
1093 strlcpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
1094 if (ioctl(sockfd, SIOCGIFFLAGS, &ifr) < 0) {
1095 error("Couldn't mark interface up (get): %m");
1098 ifr.ifr_flags |= IFF_UP;
1099 if (ioctl(sockfd, SIOCSIFFLAGS, &ifr) < 0) {
1100 error("Couldn't mark interface up (set): %m");
1108 * sifdown - Config the interface down and disable IP.
1116 bzero(&ifr, sizeof(ifr));
1117 strlcpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
1118 if (ioctl(sockfd, SIOCGIFFLAGS, &ifr) < 0) {
1119 error("Couldn't mark interface down (get): %m");
1122 if ((ifr.ifr_flags & IFF_UP) != 0) {
1123 ifr.ifr_flags &= ~IFF_UP;
1124 if (ioctl(sockfd, SIOCSIFFLAGS, &ifr) < 0) {
1125 error("Couldn't mark interface down (set): %m");
1134 * sifnpmode - Set the mode for handling packets for a given NP.
1137 sifnpmode(u, proto, mode)
1145 npi[1] = (int) mode;
1146 if (strioctl(pppfd, PPPIO_NPMODE, npi, 2 * sizeof(int), 0) < 0) {
1147 error("ioctl(set NP %d mode to %d): %m", proto, mode);
1153 #define INET_ADDR(x) (((struct sockaddr_in *) &(x))->sin_addr.s_addr)
1156 * SET_SA_FAMILY - initialize a struct sockaddr, setting the sa_family field.
1158 #define SET_SA_FAMILY(addr, family) \
1159 BZERO((char *) &(addr), sizeof(addr)); \
1160 addr.sa_family = (family); \
1161 addr.sa_len = sizeof ((addr))
1164 * sifaddr - Config the interface IP addresses and netmask.
1172 struct ifaliasreq addreq;
1177 /* flush old address, if any
1179 bzero(&ifr, sizeof (ifr));
1180 strlcpy(ifr.ifr_name, ifname, sizeof (ifr.ifr_name));
1181 SET_SA_FAMILY(ifr.ifr_addr, AF_INET);
1182 ((struct sockaddr_in *) &ifr.ifr_addr)->sin_addr.s_addr = o;
1183 if ((ioctl(sockfd, (int)SIOCDIFADDR, (caddr_t) &ifr) < 0)
1184 && errno != EADDRNOTAVAIL) {
1185 error("ioctl(SIOCDIFADDR): %m");
1189 bzero(&addreq, sizeof (addreq));
1190 strlcpy(addreq.ifra_name, ifname, sizeof (addreq.ifra_name));
1191 SET_SA_FAMILY(addreq.ifra_addr, AF_INET);
1192 SET_SA_FAMILY(addreq.ifra_broadaddr, AF_INET);
1193 ((struct sockaddr_in *)&addreq.ifra_addr)->sin_addr.s_addr = o;
1194 ((struct sockaddr_in *)&addreq.ifra_broadaddr)->sin_addr.s_addr = h;
1197 ((struct sockaddr_in *)&addreq.ifra_mask)->sin_addr.s_addr = m;
1198 addreq.ifra_mask.sa_len = sizeof (struct sockaddr);
1199 info("Setting interface mask to %s\n", ip_ntoa(m));
1202 /* install new src/dst and (possibly) netmask
1204 if (ioctl(sockfd, SIOCPIFADDR, &addreq) < 0) {
1205 error("ioctl(SIOCPIFADDR): %m");
1209 ifr.ifr_data = (caddr_t)&link_mtu;
1211 if (ioctl(sockfd, SIOCSIPMTU, &ifr) < 0) {
1212 error("Couldn't set IP MTU: %m");
1223 * cifaddr - Clear the interface IP addresses, and delete routes
1224 * through the interface if possible.
1235 bzero(&ifr, sizeof (ifr));
1236 strlcpy(ifr.ifr_name, ifname, sizeof (ifr.ifr_name));
1237 SET_SA_FAMILY(ifr.ifr_addr, AF_INET);
1238 ((struct sockaddr_in *) &ifr.ifr_addr)->sin_addr.s_addr = o;
1239 if (ioctl(sockfd, (int)SIOCDIFADDR, (caddr_t) &ifr) < 0) {
1240 error("ioctl(SIOCDIFADDR): %m");
1248 * sifdefaultroute - assign a default route through the address given.
1251 sifdefaultroute(u, l, g)
1257 BZERO(&rt, sizeof(rt));
1258 SET_SA_FAMILY(rt.rt_dst, AF_INET);
1259 SET_SA_FAMILY(rt.rt_gateway, AF_INET);
1260 ((struct sockaddr_in *) &rt.rt_gateway)->sin_addr.s_addr = g;
1261 rt.rt_flags = RTF_GATEWAY;
1262 if (ioctl(sockfd, (int)SIOCADDRT, &rt) < 0) {
1263 error("default route ioctl(SIOCADDRT): %m");
1266 default_route_gateway = g;
1272 * cifdefaultroute - delete a default route through the address given.
1275 cifdefaultroute(u, l, g)
1281 BZERO(&rt, sizeof(rt));
1282 SET_SA_FAMILY(rt.rt_dst, AF_INET);
1283 SET_SA_FAMILY(rt.rt_gateway, AF_INET);
1284 ((struct sockaddr_in *) &rt.rt_gateway)->sin_addr.s_addr = g;
1285 rt.rt_flags = RTF_GATEWAY;
1286 if (ioctl(sockfd, (int)SIOCDELRT, &rt) < 0) {
1287 error("default route ioctl(SIOCDELRT): %m");
1290 default_route_gateway = 0;
1295 * sifproxyarp - Make a proxy ARP entry for the peer.
1298 sifproxyarp(unit, hisaddr)
1302 struct arpreq arpreq;
1304 BZERO(&arpreq, sizeof(arpreq));
1307 * Get the hardware address of an interface on the same subnet
1308 * as our local address.
1310 if (!get_ether_addr(hisaddr, &arpreq.arp_ha)) {
1311 warn("Cannot determine ethernet address for proxy ARP");
1315 SET_SA_FAMILY(arpreq.arp_pa, AF_INET);
1316 ((struct sockaddr_in *) &arpreq.arp_pa)->sin_addr.s_addr = hisaddr;
1317 arpreq.arp_flags = ATF_PERM | ATF_PUBL;
1318 if (ioctl(sockfd, (int)SIOCSARP, (caddr_t)&arpreq) < 0) {
1319 error("ioctl(SIOCSARP): %m");
1323 proxy_arp_addr = hisaddr;
1329 * cifproxyarp - Delete the proxy ARP entry for the peer.
1332 cifproxyarp(unit, hisaddr)
1336 struct arpreq arpreq;
1338 BZERO(&arpreq, sizeof(arpreq));
1339 SET_SA_FAMILY(arpreq.arp_pa, AF_INET);
1340 ((struct sockaddr_in *) &arpreq.arp_pa)->sin_addr.s_addr = hisaddr;
1341 if (ioctl(sockfd, (int)SIOCDARP, (caddr_t)&arpreq) < 0) {
1342 error("ioctl(SIOCDARP): %m");
1350 * get_ether_addr - get the hardware address of an interface on the
1351 * the same subnet as ipaddr.
1356 get_ether_addr(ipaddr, hwaddr)
1358 struct sockaddr *hwaddr;
1360 struct ifreq *ifr, *ifend;
1361 u_int32_t ina, mask;
1364 struct ifreq ifs[MAX_IFS];
1365 struct ifdevea ifdevreq;
1367 ifc.ifc_len = sizeof(ifs);
1369 if (ioctl(sockfd, SIOCGIFCONF, &ifc) < 0) {
1370 error("ioctl(SIOCGIFCONF): %m");
1375 * Scan through looking for an interface with an Internet
1376 * address on the same subnet as `ipaddr'.
1378 ifend = (struct ifreq *) (ifc.ifc_buf + ifc.ifc_len);
1379 for (ifr = ifc.ifc_req; ifr < ifend; ifr++) {
1380 if (ifr->ifr_addr.sa_family == AF_INET) {
1383 * Check that the interface is up, and not point-to-point
1386 strlcpy(ifreq.ifr_name, ifr->ifr_name, sizeof(ifreq.ifr_name));
1387 if (ioctl(sockfd, SIOCGIFFLAGS, &ifreq) < 0)
1389 if ((ifreq.ifr_flags &
1390 (IFF_UP|IFF_BROADCAST|IFF_POINTOPOINT|IFF_LOOPBACK|IFF_NOARP))
1391 != (IFF_UP|IFF_BROADCAST))
1395 * Get its netmask and check that it's on the right subnet.
1397 if (ioctl(sockfd, SIOCGIFNETMASK, &ifreq) < 0)
1399 ina = ((struct sockaddr_in *) &ifr->ifr_addr)->sin_addr.s_addr;
1400 mask = ((struct sockaddr_in *) &ifreq.ifr_addr)->sin_addr.s_addr;
1401 if ((ipaddr & mask) != (ina & mask))
1406 if (ifr->ifr_addr.sa_len > sizeof (ifr->ifr_addr))
1407 ifr = (struct ifreq *)((caddr_t)ifr + (ifr->ifr_addr.sa_len - sizeof (ifr->ifr_addr)));
1413 info("found interface %s for proxy arp", ifr->ifr_name);
1415 strlcpy(ifdevreq.ifr_name, ifr->ifr_name, sizeof(ifdevreq.ifr_name));
1417 if (ioctl(sockfd, (int)SIOCRPHYSADDR, &ifdevreq) < 0) {
1418 perror("ioctl(SIOCRPHYSADDR)");
1422 hwaddr->sa_family = AF_UNSPEC;
1423 memcpy(hwaddr->sa_data, ifdevreq.current_pa, sizeof(ifdevreq.current_pa));
1427 #define WTMPFILE "/usr/adm/wtmp"
1430 logwtmp(line, name, host)
1431 const char *line, *name, *host;
1437 if ((fd = open(WTMPFILE, O_WRONLY|O_APPEND, 0)) < 0)
1439 if (!fstat(fd, &buf)) {
1440 strncpy(ut.ut_line, line, sizeof(ut.ut_line));
1441 strncpy(ut.ut_name, name, sizeof(ut.ut_name));
1442 strncpy(ut.ut_host, host, sizeof(ut.ut_host));
1443 (void)time(&ut.ut_time);
1444 if (write(fd, (char *)&ut, sizeof(struct utmp)) != sizeof(struct utmp))
1445 (void)ftruncate(fd, buf.st_size);
1451 * Return user specified netmask, modified by any mask we might determine
1452 * for address `addr' (in network byte order).
1453 * Here we scan through the system's list of interfaces, looking for
1454 * any non-point-to-point interfaces which might appear to be on the same
1455 * network as `addr'. If we find any, we OR in their netmask to the
1456 * user-specified netmask.
1462 u_int32_t mask, nmask, ina;
1463 struct ifreq *ifr, *ifend, ifreq;
1467 if (IN_CLASSA(addr)) /* determine network mask for address class */
1468 nmask = IN_CLASSA_NET;
1469 else if (IN_CLASSB(addr))
1470 nmask = IN_CLASSB_NET;
1472 nmask = IN_CLASSC_NET;
1473 /* class D nets are disallowed by bad_ip_adrs */
1474 mask = netmask | htonl(nmask);
1477 * Scan through the system's network interfaces.
1479 ifc.ifc_len = MAX_IFS * sizeof(struct ifreq);
1480 ifc.ifc_req = (struct ifreq *)alloca(ifc.ifc_len);
1481 if (ifc.ifc_req == 0)
1483 if (ioctl(sockfd, SIOCGIFCONF, &ifc) < 0) {
1484 warn("Couldn't get system interface list: %m");
1487 ifend = (struct ifreq *) (ifc.ifc_buf + ifc.ifc_len);
1488 for (ifr = ifc.ifc_req; ifr < ifend; ifr++) {
1490 * Check the interface's internet address.
1492 if (ifr->ifr_addr.sa_family == AF_INET) {
1493 ina = INET_ADDR(ifr->ifr_addr);
1494 if ((ntohl(ina) & nmask) != (addr & nmask))
1497 * Check that the interface is up, and not point-to-point or loopback.
1499 strlcpy(ifreq.ifr_name, ifr->ifr_name, sizeof(ifreq.ifr_name));
1500 if (ioctl(sockfd, SIOCGIFFLAGS, &ifreq) < 0)
1502 if ((ifreq.ifr_flags & (IFF_UP|IFF_POINTOPOINT|IFF_LOOPBACK))
1506 * Get its netmask and OR it into our mask.
1508 if (ioctl(sockfd, SIOCGIFNETMASK, &ifreq) < 0)
1510 mask |= INET_ADDR(ifreq.ifr_addr);
1513 if (ifr->ifr_addr.sa_len > sizeof (ifr->ifr_addr))
1514 ifr = (struct ifreq *)((caddr_t)ifr + (ifr->ifr_addr.sa_len - sizeof (ifr->ifr_addr)));
1522 * have_route_to - determine if the system has any route to
1523 * a given IP address. `addr' is in network byte order.
1524 * For demand mode to work properly, we have to ignore routes
1525 * through our own interface.
1527 int have_route_to(u_int32_t addr)
1529 char buf[sizeof(struct rt_msghdr) + (sizeof(struct sockaddr_in))];
1532 struct rt_msghdr *rtm;
1533 struct sockaddr_in *sin;
1534 int msglen = sizeof(*rtm) + (sizeof(*sin));
1538 rtm = (struct rt_msghdr *)buf;
1539 memset(rtm, 0, msglen);
1540 rtm->rtm_msglen = msglen;
1541 rtm->rtm_version = RTM_VERSION;
1542 rtm->rtm_type = RTM_GET;
1543 rtm->rtm_addrs = RTA_DST;
1544 /* rtm->rtm_addrs, rtm_flags should be set on output */
1546 sin = (struct sockaddr_in *)((u_char *)rtm + sizeof(*rtm));
1547 sin->sin_len = sizeof(*sin);
1548 sin->sin_family = AF_INET;
1549 sin->sin_addr.s_addr = addr;
1553 if ((s = socket(PF_ROUTE, SOCK_RAW, 0)) < 0)
1555 if (write(s, (char *)rtm, msglen) != msglen) {
1557 return status == ESRCH? 0: -1;
1560 n = read(s, msg, 2048);
1565 rtm = (struct rt_msghdr *) msg;
1566 if (rtm->rtm_version != RTM_VERSION)
1569 /* here we try to work out if the route is through our own interface */
1570 cp = (char *)(rtm + 1);
1571 if (rtm->rtm_addrs & RTA_DST) {
1572 struct sockaddr *sa = (struct sockaddr *) cp;
1573 cp = (char *)(((unsigned long)cp + sa->sa_len
1574 + sizeof(long) - 1) & ~(sizeof(long) - 1));
1576 if (rtm->rtm_addrs & RTA_GATEWAY) {
1577 sin = (struct sockaddr_in *) cp;
1578 if (sin->sin_addr.s_addr == ifaddrs[0]
1579 || sin->sin_addr.s_addr == ifaddrs[1])
1580 return 0; /* route is through our interface */
1587 strioctl(fd, cmd, ptr, ilen, olen)
1588 int fd, cmd, ilen, olen;
1591 struct strioctl str;
1597 if (ioctl(fd, I_STR, &str) == -1)
1599 if (str.ic_len != olen)
1600 dbglog("strioctl: expected %d bytes, got %d for cmd %x\n",
1601 olen, str.ic_len, cmd);
1606 * Use the hostid as part of the random number seed.
1615 * get_pty - get a pty master/slave pair and chown the slave side
1616 * to the uid given. Assumes slave_name points to >= 12 bytes of space.
1619 get_pty(master_fdp, slave_fdp, slave_name, uid)
1627 struct termios tios;
1630 for (i = 0; i < 64; ++i) {
1631 slprintf(pty_name, sizeof(pty_name), "/dev/pty%c%x",
1632 'p' + i / 16, i % 16);
1633 mfd = open(pty_name, O_RDWR, 0);
1636 sfd = open(pty_name, O_RDWR | O_NOCTTY, 0);
1645 strlcpy(slave_name, pty_name, 12);
1648 fchown(sfd, uid, -1);
1649 fchmod(sfd, S_IRUSR | S_IWUSR);
1650 if (tcgetattr(sfd, &tios) == 0) {
1651 tios.c_cflag &= ~(CSIZE | CSTOPB | PARENB);
1652 tios.c_cflag |= CS8 | CREAD;
1653 tios.c_iflag = IGNPAR | CLOCAL;
1656 if (tcsetattr(sfd, TCSAFLUSH, &tios) < 0)
1657 warn("couldn't set attributes on pty: %m");
1659 warn("couldn't get attributes on pty: %m");
1666 * Code for locking/unlocking the serial device.
1667 * This code is derived from chat.c.
1670 #if !defined(HDB) && !defined(SUNOS3)
1671 #define HDB 1 /* ascii lock files are the default */
1677 # define LOCK_PREFIX "/usr/spool/locks/LCK.."
1679 # define LOCK_PREFIX "/usr/spool/uucp/LCK.."
1681 #endif /* LOCK_DIR */
1683 static char *lock_file; /* name of lock file created */
1686 * lock - create a lock file for the named device.
1692 char hdb_lock_buffer[12];
1697 if ((p = strrchr(dev, '/')) != NULL)
1699 l = strlen(LOCK_PREFIX) + strlen(dev) + 1;
1700 lock_file = malloc(l);
1701 if (lock_file == NULL)
1702 novm("lock file name");
1703 slprintf(lock_file, l, "%s%s", LOCK_PREFIX, dev);
1705 while ((fd = open(lock_file, O_EXCL | O_CREAT | O_RDWR, 0644)) < 0) {
1707 && (fd = open(lock_file, O_RDONLY, 0)) >= 0) {
1708 /* Read the lock file to find out who has the device locked */
1710 n = read(fd, hdb_lock_buffer, 11);
1712 hdb_lock_buffer[n] = 0;
1713 pid = atoi(hdb_lock_buffer);
1716 n = read(fd, &pid, sizeof(pid));
1719 error("Can't read pid from lock file %s", lock_file);
1722 if (kill(pid, 0) == -1 && errno == ESRCH) {
1723 /* pid no longer exists - remove the lock file */
1724 if (unlink(lock_file) == 0) {
1726 notice("Removed stale lock on %s (pid %d)",
1730 warn("Couldn't remove stale lock on %s",
1733 notice("Device %s is locked by pid %d",
1738 error("Can't create lock file %s: %m", lock_file);
1745 slprintf(hdb_lock_buffer, sizeof(hdb_lock_buffer), "%10d\n", getpid());
1746 write(fd, hdb_lock_buffer, 11);
1749 write(fd, &pid, sizeof pid);
1757 * unlock - remove our lockfile
1771 set_filters(pass, active)
1772 struct bpf_program *pass, *active;
1778 bpf_compile(program, buf, optimize)
1779 struct bpf_program *program;
1793 bpf_filter(pc, p, wirelen, buflen)
1794 struct bpf_insn *pc;