2 * sys-bsd.c - System-dependent procedures for setting up
3 * PPP interfaces on bsd-4.4-ish systems (including 386BSD, NetBSD, etc.)
5 * Copyright (c) 1993-2002 Paul Mackerras. All rights reserved.
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
14 * 2. The name(s) of the authors of this software must not be used to
15 * endorse or promote products derived from this software without
16 * prior written permission.
18 * 3. Redistributions of any form whatsoever must retain the following
20 * "This product includes software developed by Paul Mackerras
21 * <paulus@samba.org>".
23 * THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES WITH REGARD TO
24 * THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
25 * AND FITNESS, IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY
26 * SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
27 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
28 * AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
29 * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
31 * Derived from main.c and pppd.h, which are:
33 * Copyright (c) 1984-2000 Carnegie Mellon University. All rights reserved.
35 * Redistribution and use in source and binary forms, with or without
36 * modification, are permitted provided that the following conditions
39 * 1. Redistributions of source code must retain the above copyright
40 * notice, this list of conditions and the following disclaimer.
42 * 2. Redistributions in binary form must reproduce the above copyright
43 * notice, this list of conditions and the following disclaimer in
44 * the documentation and/or other materials provided with the
47 * 3. The name "Carnegie Mellon University" must not be used to
48 * endorse or promote products derived from this software without
49 * prior written permission. For permission or any legal
50 * details, please contact
51 * Office of Technology Transfer
52 * Carnegie Mellon University
54 * Pittsburgh, PA 15213-3890
55 * (412) 268-4387, fax: (412) 268-7395
56 * tech-transfer@andrew.cmu.edu
58 * 4. Redistributions of any form whatsoever must retain the following
60 * "This product includes software developed by Computing Services
61 * at Carnegie Mellon University (http://www.cmu.edu/computing/)."
63 * CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO
64 * THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
65 * AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE
66 * FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
67 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
68 * AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
69 * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
72 #define RCSID "$Id: sys-bsd.c,v 1.50 2004/11/04 10:02:26 paulus Exp $"
73 /* $NetBSD: sys-bsd.c,v 1.1.1.3 1997/09/26 18:53:04 christos Exp $ */
87 #include <sys/ioctl.h>
88 #include <sys/types.h>
89 #include <sys/socket.h>
92 #include <sys/param.h>
101 #include <net/ppp_defs.h>
102 #include <net/if_ppp.h>
103 #include <net/route.h>
104 #include <net/if_dl.h>
105 #include <netinet/in.h>
108 #include <sys/param.h>
109 #if defined(NetBSD) && (NetBSD >= 199703)
110 #include <netinet/if_inarp.h>
111 #else /* NetBSD 1.2D or later */
113 #include <netinet/if_ether.h>
115 #include <net/if_ether.h>
124 static const char rcsid[] = RCSID;
126 static int initdisc = -1; /* Initial TTY discipline for ppp_fd */
127 static int initfdflags = -1; /* Initial file descriptor flags for ppp_fd */
128 static int ppp_fd = -1; /* fd which is set to PPP discipline */
131 static int restore_term; /* 1 => we've munged the terminal */
132 static struct termios inittermios; /* Initial TTY termios */
133 static struct winsize wsinfo; /* Initial window size info */
135 static int loop_slave = -1;
136 static int loop_master;
137 static char loop_name[20];
139 static unsigned char inbuf[512]; /* buffer for chars read from loopback */
141 static int sockfd; /* socket for doing interface ioctls */
143 static fd_set in_fds; /* set of fds that wait_input waits for */
144 static int max_in_fd; /* highest fd set in in_fds */
146 static int if_is_up; /* the interface is currently up */
147 static u_int32_t ifaddrs[2]; /* local and remote addresses we set */
148 static u_int32_t default_route_gateway; /* gateway addr for default route */
149 static u_int32_t proxy_arp_addr; /* remote addr for proxy arp */
151 /* Prototypes for procedures local to this file. */
152 static int dodefaultroute __P((u_int32_t, int));
153 static int get_ether_addr __P((u_int32_t, struct sockaddr_dl *));
157 * sys_init - System-dependent initialization.
162 /* Get an internet socket for doing socket ioctl's on. */
163 if ((sockfd = socket(AF_INET, SOCK_DGRAM, 0)) < 0)
164 fatal("Couldn't create IP socket: %m");
171 * sys_cleanup - restore any system state we modified before exiting:
172 * mark the interface down, delete default route and/or proxy arp entry.
173 * This should call die() because it's called from die().
181 strlcpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
182 if (ioctl(sockfd, SIOCGIFFLAGS, &ifr) >= 0
183 && ((ifr.ifr_flags & IFF_UP) != 0)) {
184 ifr.ifr_flags &= ~IFF_UP;
185 ioctl(sockfd, SIOCSIFFLAGS, &ifr);
189 cifaddr(0, ifaddrs[0], ifaddrs[1]);
190 if (default_route_gateway)
191 cifdefaultroute(0, 0, default_route_gateway);
193 cifproxyarp(0, proxy_arp_addr);
197 * sys_close - Clean up in a child process before execing.
203 if (loop_slave >= 0) {
210 * sys_check_options - check the options that the user specified
217 warn("DTR/CTS flow control is not supported on this system");
225 * ppp_available - check whether the system has any ppp interfaces
226 * (in fact we check whether we can do an ioctl on ppp0).
233 extern char *no_ppp_msg;
235 if ((s = socket(AF_INET, SOCK_DGRAM, 0)) < 0)
236 return 1; /* can't tell */
238 strlcpy(ifr.ifr_name, "ppp0", sizeof (ifr.ifr_name));
239 ok = ioctl(s, SIOCGIFFLAGS, (caddr_t) &ifr) >= 0;
243 This system lacks kernel support for PPP. To include PPP support\n\
244 in the kernel, please follow the steps detailed in the README.bsd\n\
245 file in the ppp-2.2 distribution.\n";
250 * establish_ppp - Turn the serial port into a ppp interface.
256 int pppdisc = PPPDISC;
261 * Demand mode - prime the old ppp device to relinquish the unit.
263 if (ioctl(ppp_fd, PPPIOCXFERUNIT, 0) < 0)
264 fatal("ioctl(transfer ppp unit): %m");
268 * Save the old line discipline of fd, and set it to PPP.
270 if (ioctl(fd, TIOCGETD, &initdisc) < 0)
271 fatal("ioctl(TIOCGETD): %m");
272 if (ioctl(fd, TIOCSETD, &pppdisc) < 0)
273 fatal("ioctl(TIOCSETD): %m");
277 * Find out which interface we were given.
279 if (ioctl(fd, PPPIOCGUNIT, &ifunit) < 0)
280 fatal("ioctl(PPPIOCGUNIT): %m");
283 * Check that we got the same unit again.
285 if (ioctl(fd, PPPIOCGUNIT, &x) < 0)
286 fatal("ioctl(PPPIOCGUNIT): %m");
288 fatal("transfer_ppp failed: wanted unit %d, got %d", ifunit, x);
290 ioctl(loop_slave, TIOCSETD, &x);
296 * Enable debug in the driver if requested.
299 if (ioctl(fd, PPPIOCGFLAGS, (caddr_t) &x) < 0) {
300 warn("ioctl (PPPIOCGFLAGS): %m");
302 x |= (kdebugflag & 0xFF) * SC_DEBUG;
303 if (ioctl(fd, PPPIOCSFLAGS, (caddr_t) &x) < 0)
304 warn("ioctl(PPPIOCSFLAGS): %m");
309 * Set device for non-blocking reads.
311 if ((initfdflags = fcntl(fd, F_GETFL)) == -1
312 || fcntl(fd, F_SETFL, initfdflags | O_NONBLOCK) == -1) {
313 warn("Couldn't set device to non-blocking mode: %m");
320 * restore_loop - reattach the ppp unit to the loopback.
328 * Transfer the ppp interface back to the loopback.
330 if (ioctl(ppp_fd, PPPIOCXFERUNIT, 0) < 0)
331 fatal("ioctl(transfer ppp unit): %m");
333 if (ioctl(loop_slave, TIOCSETD, &x) < 0)
334 fatal("ioctl(TIOCSETD): %m");
337 * Check that we got the same unit again.
339 if (ioctl(loop_slave, PPPIOCGUNIT, &x) < 0)
340 fatal("ioctl(PPPIOCGUNIT): %m");
342 fatal("transfer_ppp failed: wanted unit %d, got %d", ifunit, x);
348 * disestablish_ppp - Restore the serial port to normal operation.
349 * This shouldn't call die() because it's called from die().
355 /* Reset non-blocking mode on fd. */
356 if (initfdflags != -1 && fcntl(fd, F_SETFL, initfdflags) < 0)
357 warn("Couldn't restore device fd flags: %m");
360 /* Restore old line discipline. */
361 if (initdisc >= 0 && ioctl(fd, TIOCSETD, &initdisc) < 0)
362 error("ioctl(TIOCSETD): %m");
370 * Check whether the link seems not to be 8-bit clean.
378 if (ioctl(ppp_fd, PPPIOCGFLAGS, (caddr_t) &x) == 0) {
380 switch (~x & (SC_RCV_B7_0|SC_RCV_B7_1|SC_RCV_EVNP|SC_RCV_ODDP)) {
382 s = "bit 7 set to 1";
385 s = "bit 7 set to 0";
395 warn("Serial link is not 8-bit clean:");
396 warn("All received characters had %s", s);
402 * set_up_tty: Set up the serial port on `fd' for 8 bits, no parity,
403 * at the requested speed, etc. If `local' is true, set CLOCAL
404 * regardless of whether the modem option was specified.
406 * For *BSD, we assume that speed_t values numerically equal bits/second.
409 set_up_tty(fd, local)
414 if (tcgetattr(fd, &tios) < 0)
415 fatal("tcgetattr: %m");
419 ioctl(fd, TIOCGWINSZ, &wsinfo);
422 tios.c_cflag &= ~(CSIZE | CSTOPB | PARENB | CLOCAL);
423 if (crtscts > 0 && !local) {
426 tios.c_cflag |= CDTRCTS;
429 tios.c_cflag |= CRTSCTS;
430 } else if (crtscts < 0) {
431 tios.c_cflag &= ~CRTSCTS;
433 tios.c_cflag &= ~CDTRCTS;
437 tios.c_cflag |= CS8 | CREAD | HUPCL;
439 tios.c_cflag |= CLOCAL;
440 tios.c_iflag = IGNBRK | IGNPAR;
444 tios.c_cc[VTIME] = 0;
447 tios.c_iflag |= IXON | IXOFF;
448 tios.c_cc[VSTOP] = 0x13; /* DC3 = XOFF = ^S */
449 tios.c_cc[VSTART] = 0x11; /* DC1 = XON = ^Q */
453 cfsetospeed(&tios, inspeed);
454 cfsetispeed(&tios, inspeed);
456 inspeed = cfgetospeed(&tios);
458 * We can't proceed if the serial port speed is 0,
459 * since that implies that the serial port is disabled.
462 fatal("Baud rate for %s is 0; need explicit baud rate", devnam);
466 if (tcsetattr(fd, TCSAFLUSH, &tios) < 0)
467 fatal("tcsetattr: %m");
473 * restore_tty - restore the terminal to the saved settings.
480 if (!default_device) {
482 * Turn off echoing, because otherwise we can get into
483 * a loop with the tty and the modem echoing to each other.
484 * We presume we are the sole user of this tty device, so
485 * when we close it, it will revert to its defaults anyway.
487 inittermios.c_lflag &= ~(ECHO | ECHONL);
489 if (tcsetattr(fd, TCSAFLUSH, &inittermios) < 0)
491 warn("tcsetattr: %m");
492 ioctl(fd, TIOCSWINSZ, &wsinfo);
498 * setdtr - control the DTR line on the serial port.
499 * This is called from die(), so it shouldn't call die().
505 int modembits = TIOCM_DTR;
507 ioctl(fd, (on? TIOCMBIS: TIOCMBIC), &modembits);
511 * get_pty - get a pty master/slave pair and chown the slave side
512 * to the uid given. Assumes slave_name points to >= 12 bytes of space.
515 get_pty(master_fdp, slave_fdp, slave_name, uid)
523 if (openpty(master_fdp, slave_fdp, slave_name, NULL, NULL) < 0)
526 fchown(*slave_fdp, uid, -1);
527 fchmod(*slave_fdp, S_IRUSR | S_IWUSR);
528 if (tcgetattr(*slave_fdp, &tios) == 0) {
529 tios.c_cflag &= ~(CSIZE | CSTOPB | PARENB);
530 tios.c_cflag |= CS8 | CREAD;
531 tios.c_iflag = IGNPAR | CLOCAL;
534 if (tcsetattr(*slave_fdp, TCSAFLUSH, &tios) < 0)
535 warn("couldn't set attributes on pty: %m");
537 warn("couldn't get attributes on pty: %m");
544 * open_ppp_loopback - open the device we use for getting
545 * packets in demand mode, and connect it to a ppp interface.
553 int pppdisc = PPPDISC;
555 if (openpty(&loop_master, &loop_slave, loop_name, NULL, NULL) < 0)
556 fatal("No free pty for loopback");
557 SYSDEBUG(("using %s for loopback", loop_name));
559 if (tcgetattr(loop_slave, &tios) == 0) {
560 tios.c_cflag &= ~(CSIZE | CSTOPB | PARENB);
561 tios.c_cflag |= CS8 | CREAD;
562 tios.c_iflag = IGNPAR;
565 if (tcsetattr(loop_slave, TCSAFLUSH, &tios) < 0)
566 warn("couldn't set attributes on loopback: %m");
569 if ((flags = fcntl(loop_master, F_GETFL)) != -1)
570 if (fcntl(loop_master, F_SETFL, flags | O_NONBLOCK) == -1)
571 warn("couldn't set loopback to nonblock: %m");
574 if (ioctl(ppp_fd, TIOCSETD, &pppdisc) < 0)
575 fatal("ioctl(TIOCSETD): %m");
578 * Find out which interface we were given.
580 if (ioctl(ppp_fd, PPPIOCGUNIT, &ifunit) < 0)
581 fatal("ioctl(PPPIOCGUNIT): %m");
584 * Enable debug in the driver if requested.
587 if (ioctl(ppp_fd, PPPIOCGFLAGS, (caddr_t) &flags) < 0) {
588 warn("ioctl (PPPIOCGFLAGS): %m");
590 flags |= (kdebugflag & 0xFF) * SC_DEBUG;
591 if (ioctl(ppp_fd, PPPIOCSFLAGS, (caddr_t) &flags) < 0)
592 warn("ioctl(PPPIOCSFLAGS): %m");
601 * output - Output PPP packet.
610 dbglog("sent %P", p, len);
612 if (write(ttyfd, p, len) < 0) {
620 * wait_input - wait until there is data available,
621 * for the length of time specified by *timo (indefinite
626 struct timeval *timo;
632 n = select(max_in_fd + 1, &ready, NULL, &ready, timo);
633 if (n < 0 && errno != EINTR)
639 * add_fd - add an fd to the set that wait_input waits for.
644 if (fd >= FD_SETSIZE)
645 fatal("internal error: file descriptor too large (%d)", fd);
652 * remove_fd - remove an fd from the set that wait_input waits for.
662 * wait_loop_output - wait until there is data available on the
663 * loopback, for the length of time specified by *timo (indefinite
667 wait_loop_output(timo)
668 struct timeval *timo;
674 if (loop_master >= FD_SETSIZE)
675 fatal("internal error: file descriptor too large (%d)", loop_master);
676 FD_SET(loop_master, &ready);
677 n = select(loop_master + 1, &ready, NULL, &ready, timo);
678 if (n < 0 && errno != EINTR)
684 * wait_time - wait for a given length of time or until a
685 * signal is received.
689 struct timeval *timo;
693 n = select(0, NULL, NULL, NULL, timo);
694 if (n < 0 && errno != EINTR)
701 * read_packet - get a PPP packet from the serial device.
709 if ((len = read(ttyfd, buf, PPP_MTU + PPP_HDRLEN)) < 0) {
710 if (errno == EWOULDBLOCK || errno == EINTR)
719 * get_loop_output - read characters from the loopback, form them
720 * into frames, and detect when we want to bring the real link up.
721 * Return value is 1 if we need to bring up the link, 0 otherwise.
729 while ((n = read(loop_master, inbuf, sizeof(inbuf))) >= 0) {
730 if (loop_chars(inbuf, n))
735 fatal("eof on loopback");
736 if (errno != EWOULDBLOCK)
737 fatal("read from loopback: %m");
744 * ppp_send_config - configure the transmit characteristics of
748 ppp_send_config(unit, mtu, asyncmap, pcomp, accomp)
756 strlcpy(ifr.ifr_name, ifname, sizeof (ifr.ifr_name));
758 if (ioctl(sockfd, SIOCSIFMTU, (caddr_t) &ifr) < 0)
759 fatal("ioctl(SIOCSIFMTU): %m");
761 if (ioctl(ppp_fd, PPPIOCSASYNCMAP, (caddr_t) &asyncmap) < 0)
762 fatal("ioctl(PPPIOCSASYNCMAP): %m");
764 if (ioctl(ppp_fd, PPPIOCGFLAGS, (caddr_t) &x) < 0)
765 fatal("ioctl (PPPIOCGFLAGS): %m");
766 x = pcomp? x | SC_COMP_PROT: x &~ SC_COMP_PROT;
767 x = accomp? x | SC_COMP_AC: x &~ SC_COMP_AC;
768 x = sync_serial ? x | SC_SYNC : x & ~SC_SYNC;
769 if (ioctl(ppp_fd, PPPIOCSFLAGS, (caddr_t) &x) < 0)
770 fatal("ioctl(PPPIOCSFLAGS): %m");
775 * ppp_set_xaccm - set the extended transmit ACCM for the interface.
778 ppp_set_xaccm(unit, accm)
782 if (ioctl(ppp_fd, PPPIOCSXASYNCMAP, accm) < 0 && errno != ENOTTY)
783 warn("ioctl(set extended ACCM): %m");
788 * ppp_recv_config - configure the receive-side characteristics of
792 ppp_recv_config(unit, mru, asyncmap, pcomp, accomp)
799 if (ioctl(ppp_fd, PPPIOCSMRU, (caddr_t) &mru) < 0)
800 fatal("ioctl(PPPIOCSMRU): %m");
801 if (ioctl(ppp_fd, PPPIOCSRASYNCMAP, (caddr_t) &asyncmap) < 0)
802 fatal("ioctl(PPPIOCSRASYNCMAP): %m");
803 if (ioctl(ppp_fd, PPPIOCGFLAGS, (caddr_t) &x) < 0)
804 fatal("ioctl (PPPIOCGFLAGS): %m");
805 x = !accomp? x | SC_REJ_COMP_AC: x &~ SC_REJ_COMP_AC;
806 if (ioctl(ppp_fd, PPPIOCSFLAGS, (caddr_t) &x) < 0)
807 fatal("ioctl(PPPIOCSFLAGS): %m");
811 * ccp_test - ask kernel whether a given compression method
812 * is acceptable for use. Returns 1 if the method and parameters
813 * are OK, 0 if the method is known but the parameters are not OK
814 * (e.g. code size should be reduced), or -1 if the method is unknown.
817 ccp_test(unit, opt_ptr, opt_len, for_transmit)
818 int unit, opt_len, for_transmit;
821 struct ppp_option_data data;
824 data.length = opt_len;
825 data.transmit = for_transmit;
826 if (ioctl(ttyfd, PPPIOCSCOMPRESS, (caddr_t) &data) >= 0)
828 return (errno == ENOBUFS)? 0: -1;
832 * ccp_flags_set - inform kernel about the current state of CCP.
835 ccp_flags_set(unit, isopen, isup)
836 int unit, isopen, isup;
840 if (ioctl(ppp_fd, PPPIOCGFLAGS, (caddr_t) &x) < 0) {
841 error("ioctl (PPPIOCGFLAGS): %m");
844 x = isopen? x | SC_CCP_OPEN: x &~ SC_CCP_OPEN;
845 x = isup? x | SC_CCP_UP: x &~ SC_CCP_UP;
846 if (ioctl(ppp_fd, PPPIOCSFLAGS, (caddr_t) &x) < 0)
847 error("ioctl(PPPIOCSFLAGS): %m");
851 * ccp_fatal_error - returns 1 if decompression was disabled as a
852 * result of an error detected after decompression of a packet,
853 * 0 otherwise. This is necessary because of patent nonsense.
856 ccp_fatal_error(unit)
861 if (ioctl(ppp_fd, PPPIOCGFLAGS, (caddr_t) &x) < 0) {
862 error("ioctl(PPPIOCGFLAGS): %m");
865 return x & SC_DC_FERROR;
869 * get_idle_time - return how long the link has been idle.
876 return ioctl(ppp_fd, PPPIOCGIDLE, ip) >= 0;
880 * get_ppp_stats - return statistics for the link.
883 get_ppp_stats(u, stats)
885 struct pppd_stats *stats;
887 struct ifpppstatsreq req;
889 memset (&req, 0, sizeof (req));
890 strlcpy(req.ifr_name, ifname, sizeof(req.ifr_name));
891 if (ioctl(sockfd, SIOCGPPPSTATS, &req) < 0) {
892 error("Couldn't get PPP statistics: %m");
895 stats->bytes_in = req.stats.p.ppp_ibytes;
896 stats->bytes_out = req.stats.p.ppp_obytes;
903 * set_filters - transfer the pass and active filters to the kernel.
906 set_filters(pass, active)
907 struct bpf_program *pass, *active;
911 if (pass->bf_len > 0) {
912 if (ioctl(ppp_fd, PPPIOCSPASS, pass) < 0) {
913 error("Couldn't set pass-filter in kernel: %m");
917 if (active->bf_len > 0) {
918 if (ioctl(ppp_fd, PPPIOCSACTIVE, active) < 0) {
919 error("Couldn't set active-filter in kernel: %m");
928 * sifvjcomp - config tcp header compression
931 sifvjcomp(u, vjcomp, cidcomp, maxcid)
932 int u, vjcomp, cidcomp, maxcid;
936 if (ioctl(ppp_fd, PPPIOCGFLAGS, (caddr_t) &x) < 0) {
937 error("ioctl (PPPIOCGFLAGS): %m");
940 x = vjcomp ? x | SC_COMP_TCP: x &~ SC_COMP_TCP;
941 x = cidcomp? x & ~SC_NO_TCP_CCID: x | SC_NO_TCP_CCID;
942 if (ioctl(ppp_fd, PPPIOCSFLAGS, (caddr_t) &x) < 0) {
943 error("ioctl(PPPIOCSFLAGS): %m");
946 if (vjcomp && ioctl(ppp_fd, PPPIOCSMAXCID, (caddr_t) &maxcid) < 0) {
947 error("ioctl(PPPIOCSFLAGS): %m");
954 * sifup - Config the interface up and enable IP packets to pass.
962 strlcpy(ifr.ifr_name, ifname, sizeof (ifr.ifr_name));
963 if (ioctl(sockfd, SIOCGIFFLAGS, (caddr_t) &ifr) < 0) {
964 error("ioctl (SIOCGIFFLAGS): %m");
967 ifr.ifr_flags |= IFF_UP;
968 if (ioctl(sockfd, SIOCSIFFLAGS, (caddr_t) &ifr) < 0) {
969 error("ioctl(SIOCSIFFLAGS): %m");
977 * sifnpmode - Set the mode for handling packets for a given NP.
980 sifnpmode(u, proto, mode)
987 npi.protocol = proto;
989 if (ioctl(ppp_fd, PPPIOCSNPMODE, &npi) < 0) {
990 error("ioctl(set NP %d mode to %d): %m", proto, mode);
997 * sifdown - Config the interface down and disable IP.
1008 npi.protocol = PPP_IP;
1009 npi.mode = NPMODE_ERROR;
1010 ioctl(ppp_fd, PPPIOCSNPMODE, (caddr_t) &npi);
1011 /* ignore errors, because ppp_fd might have been closed by now. */
1013 strlcpy(ifr.ifr_name, ifname, sizeof (ifr.ifr_name));
1014 if (ioctl(sockfd, SIOCGIFFLAGS, (caddr_t) &ifr) < 0) {
1015 error("ioctl (SIOCGIFFLAGS): %m");
1018 ifr.ifr_flags &= ~IFF_UP;
1019 if (ioctl(sockfd, SIOCSIFFLAGS, (caddr_t) &ifr) < 0) {
1020 error("ioctl(SIOCSIFFLAGS): %m");
1029 * SET_SA_FAMILY - set the sa_family field of a struct sockaddr,
1032 #define SET_SA_FAMILY(addr, family) \
1033 BZERO((char *) &(addr), sizeof(addr)); \
1034 addr.sa_family = (family); \
1035 addr.sa_len = sizeof(addr);
1038 * sifaddr - Config the interface IP addresses and netmask.
1045 struct ifaliasreq ifra;
1048 strlcpy(ifra.ifra_name, ifname, sizeof(ifra.ifra_name));
1049 SET_SA_FAMILY(ifra.ifra_addr, AF_INET);
1050 ((struct sockaddr_in *) &ifra.ifra_addr)->sin_addr.s_addr = o;
1051 SET_SA_FAMILY(ifra.ifra_broadaddr, AF_INET);
1052 ((struct sockaddr_in *) &ifra.ifra_broadaddr)->sin_addr.s_addr = h;
1054 SET_SA_FAMILY(ifra.ifra_mask, AF_INET);
1055 ((struct sockaddr_in *) &ifra.ifra_mask)->sin_addr.s_addr = m;
1057 BZERO(&ifra.ifra_mask, sizeof(ifra.ifra_mask));
1058 BZERO(&ifr, sizeof(ifr));
1059 strlcpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
1060 if (ioctl(sockfd, SIOCDIFADDR, (caddr_t) &ifr) < 0) {
1061 if (errno != EADDRNOTAVAIL)
1062 warn("Couldn't remove interface address: %m");
1064 if (ioctl(sockfd, SIOCAIFADDR, (caddr_t) &ifra) < 0) {
1065 if (errno != EEXIST) {
1066 error("Couldn't set interface address: %m");
1069 warn("Couldn't set interface address: Address %I already exists", o);
1077 * cifaddr - Clear the interface IP addresses, and delete routes
1078 * through the interface if possible.
1085 struct ifaliasreq ifra;
1088 strlcpy(ifra.ifra_name, ifname, sizeof(ifra.ifra_name));
1089 SET_SA_FAMILY(ifra.ifra_addr, AF_INET);
1090 ((struct sockaddr_in *) &ifra.ifra_addr)->sin_addr.s_addr = o;
1091 SET_SA_FAMILY(ifra.ifra_broadaddr, AF_INET);
1092 ((struct sockaddr_in *) &ifra.ifra_broadaddr)->sin_addr.s_addr = h;
1093 BZERO(&ifra.ifra_mask, sizeof(ifra.ifra_mask));
1094 if (ioctl(sockfd, SIOCDIFADDR, (caddr_t) &ifra) < 0) {
1095 if (errno != EADDRNOTAVAIL)
1096 warn("Couldn't delete interface address: %m");
1103 * sifdefaultroute - assign a default route through the address given.
1106 sifdefaultroute(u, l, g)
1110 return dodefaultroute(g, 's');
1114 * cifdefaultroute - delete a default route through the address given.
1117 cifdefaultroute(u, l, g)
1121 return dodefaultroute(g, 'c');
1125 * dodefaultroute - talk to a routing socket to add/delete a default route.
1128 dodefaultroute(g, cmd)
1134 struct rt_msghdr hdr;
1135 struct sockaddr_in dst;
1136 struct sockaddr_in gway;
1137 struct sockaddr_in mask;
1140 if ((routes = socket(PF_ROUTE, SOCK_RAW, AF_INET)) < 0) {
1141 error("Couldn't %s default route: socket: %m",
1142 cmd=='s'? "add": "delete");
1146 memset(&rtmsg, 0, sizeof(rtmsg));
1147 rtmsg.hdr.rtm_type = cmd == 's'? RTM_ADD: RTM_DELETE;
1148 rtmsg.hdr.rtm_flags = RTF_UP | RTF_GATEWAY | RTF_STATIC;
1149 rtmsg.hdr.rtm_version = RTM_VERSION;
1150 rtmsg.hdr.rtm_seq = ++rtm_seq;
1151 rtmsg.hdr.rtm_addrs = RTA_DST | RTA_GATEWAY | RTA_NETMASK;
1152 rtmsg.dst.sin_len = sizeof(rtmsg.dst);
1153 rtmsg.dst.sin_family = AF_INET;
1154 rtmsg.gway.sin_len = sizeof(rtmsg.gway);
1155 rtmsg.gway.sin_family = AF_INET;
1156 rtmsg.gway.sin_addr.s_addr = g;
1157 rtmsg.mask.sin_len = sizeof(rtmsg.dst);
1158 rtmsg.mask.sin_family = AF_INET;
1160 rtmsg.hdr.rtm_msglen = sizeof(rtmsg);
1161 if (write(routes, &rtmsg, sizeof(rtmsg)) < 0) {
1162 error("Couldn't %s default route: %m",
1163 cmd=='s'? "add": "delete");
1169 default_route_gateway = (cmd == 's')? g: 0;
1173 #if RTM_VERSION >= 3
1176 * sifproxyarp - Make a proxy ARP entry for the peer.
1179 struct rt_msghdr hdr;
1180 struct sockaddr_inarp dst;
1181 struct sockaddr_dl hwa;
1185 static int arpmsg_valid;
1188 sifproxyarp(unit, hisaddr)
1195 * Get the hardware address of an interface on the same subnet
1196 * as our local address.
1198 memset(&arpmsg, 0, sizeof(arpmsg));
1199 if (!get_ether_addr(hisaddr, &arpmsg.hwa)) {
1200 error("Cannot determine ethernet address for proxy ARP");
1204 if ((routes = socket(PF_ROUTE, SOCK_RAW, AF_INET)) < 0) {
1205 error("Couldn't add proxy arp entry: socket: %m");
1209 arpmsg.hdr.rtm_type = RTM_ADD;
1210 arpmsg.hdr.rtm_flags = RTF_ANNOUNCE | RTF_HOST | RTF_STATIC;
1211 arpmsg.hdr.rtm_version = RTM_VERSION;
1212 arpmsg.hdr.rtm_seq = ++rtm_seq;
1213 arpmsg.hdr.rtm_addrs = RTA_DST | RTA_GATEWAY;
1214 arpmsg.hdr.rtm_inits = RTV_EXPIRE;
1215 arpmsg.dst.sin_len = sizeof(struct sockaddr_inarp);
1216 arpmsg.dst.sin_family = AF_INET;
1217 arpmsg.dst.sin_addr.s_addr = hisaddr;
1218 arpmsg.dst.sin_other = SIN_PROXY;
1220 arpmsg.hdr.rtm_msglen = (char *) &arpmsg.hwa - (char *) &arpmsg
1221 + arpmsg.hwa.sdl_len;
1222 if (write(routes, &arpmsg, arpmsg.hdr.rtm_msglen) < 0) {
1223 error("Couldn't add proxy arp entry: %m");
1230 proxy_arp_addr = hisaddr;
1235 * cifproxyarp - Delete the proxy ARP entry for the peer.
1238 cifproxyarp(unit, hisaddr)
1248 arpmsg.hdr.rtm_type = RTM_DELETE;
1249 arpmsg.hdr.rtm_seq = ++rtm_seq;
1251 if ((routes = socket(PF_ROUTE, SOCK_RAW, AF_INET)) < 0) {
1252 error("Couldn't delete proxy arp entry: socket: %m");
1256 if (write(routes, &arpmsg, arpmsg.hdr.rtm_msglen) < 0) {
1257 error("Couldn't delete proxy arp entry: %m");
1267 #else /* RTM_VERSION */
1270 * sifproxyarp - Make a proxy ARP entry for the peer.
1273 sifproxyarp(unit, hisaddr)
1277 struct arpreq arpreq;
1279 struct sockaddr_dl sdl;
1283 BZERO(&arpreq, sizeof(arpreq));
1286 * Get the hardware address of an interface on the same subnet
1287 * as our local address.
1289 if (!get_ether_addr(hisaddr, &dls.sdl)) {
1290 error("Cannot determine ethernet address for proxy ARP");
1294 arpreq.arp_ha.sa_len = sizeof(struct sockaddr);
1295 arpreq.arp_ha.sa_family = AF_UNSPEC;
1296 BCOPY(LLADDR(&dls.sdl), arpreq.arp_ha.sa_data, dls.sdl.sdl_alen);
1297 SET_SA_FAMILY(arpreq.arp_pa, AF_INET);
1298 ((struct sockaddr_in *) &arpreq.arp_pa)->sin_addr.s_addr = hisaddr;
1299 arpreq.arp_flags = ATF_PERM | ATF_PUBL;
1300 if (ioctl(sockfd, SIOCSARP, (caddr_t)&arpreq) < 0) {
1301 error("Couldn't add proxy arp entry: %m");
1305 proxy_arp_addr = hisaddr;
1310 * cifproxyarp - Delete the proxy ARP entry for the peer.
1313 cifproxyarp(unit, hisaddr)
1317 struct arpreq arpreq;
1319 BZERO(&arpreq, sizeof(arpreq));
1320 SET_SA_FAMILY(arpreq.arp_pa, AF_INET);
1321 ((struct sockaddr_in *) &arpreq.arp_pa)->sin_addr.s_addr = hisaddr;
1322 if (ioctl(sockfd, SIOCDARP, (caddr_t)&arpreq) < 0) {
1323 warn("Couldn't delete proxy arp entry: %m");
1329 #endif /* RTM_VERSION */
1333 * get_ether_addr - get the hardware address of an interface on the
1334 * the same subnet as ipaddr.
1339 get_ether_addr(ipaddr, hwaddr)
1341 struct sockaddr_dl *hwaddr;
1343 struct ifreq *ifr, *ifend, *ifp;
1344 u_int32_t ina, mask;
1345 struct sockaddr_dl *dla;
1348 struct ifreq ifs[MAX_IFS];
1350 ifc.ifc_len = sizeof(ifs);
1352 if (ioctl(sockfd, SIOCGIFCONF, &ifc) < 0) {
1353 error("ioctl(SIOCGIFCONF): %m");
1358 * Scan through looking for an interface with an Internet
1359 * address on the same subnet as `ipaddr'.
1361 ifend = (struct ifreq *) (ifc.ifc_buf + ifc.ifc_len);
1362 for (ifr = ifc.ifc_req; ifr < ifend; ifr = (struct ifreq *)
1363 ((char *)&ifr->ifr_addr + ifr->ifr_addr.sa_len)) {
1364 if (ifr->ifr_addr.sa_family == AF_INET) {
1365 ina = ((struct sockaddr_in *) &ifr->ifr_addr)->sin_addr.s_addr;
1366 strlcpy(ifreq.ifr_name, ifr->ifr_name, sizeof(ifreq.ifr_name));
1368 * Check that the interface is up, and not point-to-point
1371 if (ioctl(sockfd, SIOCGIFFLAGS, &ifreq) < 0)
1373 if ((ifreq.ifr_flags &
1374 (IFF_UP|IFF_BROADCAST|IFF_POINTOPOINT|IFF_LOOPBACK|IFF_NOARP))
1375 != (IFF_UP|IFF_BROADCAST))
1378 * Get its netmask and check that it's on the right subnet.
1380 if (ioctl(sockfd, SIOCGIFNETMASK, &ifreq) < 0)
1382 mask = ((struct sockaddr_in *) &ifreq.ifr_addr)->sin_addr.s_addr;
1383 if ((ipaddr & mask) != (ina & mask))
1392 info("found interface %s for proxy arp", ifr->ifr_name);
1395 * Now scan through again looking for a link-level address
1396 * for this interface.
1399 for (ifr = ifc.ifc_req; ifr < ifend; ) {
1400 if (strcmp(ifp->ifr_name, ifr->ifr_name) == 0
1401 && ifr->ifr_addr.sa_family == AF_LINK) {
1403 * Found the link-level address - copy it out
1405 dla = (struct sockaddr_dl *) &ifr->ifr_addr;
1406 BCOPY(dla, hwaddr, dla->sdl_len);
1409 ifr = (struct ifreq *) ((char *)&ifr->ifr_addr + ifr->ifr_addr.sa_len);
1416 * Return user specified netmask, modified by any mask we might determine
1417 * for address `addr' (in network byte order).
1418 * Here we scan through the system's list of interfaces, looking for
1419 * any non-point-to-point interfaces which might appear to be on the same
1420 * network as `addr'. If we find any, we OR in their netmask to the
1421 * user-specified netmask.
1427 u_int32_t mask, nmask, ina;
1428 struct ifreq *ifr, *ifend, ifreq;
1430 struct ifreq ifs[MAX_IFS];
1433 if (IN_CLASSA(addr)) /* determine network mask for address class */
1434 nmask = IN_CLASSA_NET;
1435 else if (IN_CLASSB(addr))
1436 nmask = IN_CLASSB_NET;
1438 nmask = IN_CLASSC_NET;
1439 /* class D nets are disallowed by bad_ip_adrs */
1440 mask = netmask | htonl(nmask);
1443 * Scan through the system's network interfaces.
1445 ifc.ifc_len = sizeof(ifs);
1447 if (ioctl(sockfd, SIOCGIFCONF, &ifc) < 0) {
1448 warn("ioctl(SIOCGIFCONF): %m");
1451 ifend = (struct ifreq *) (ifc.ifc_buf + ifc.ifc_len);
1452 for (ifr = ifc.ifc_req; ifr < ifend; ifr = (struct ifreq *)
1453 ((char *)&ifr->ifr_addr + ifr->ifr_addr.sa_len)) {
1455 * Check the interface's internet address.
1457 if (ifr->ifr_addr.sa_family != AF_INET)
1459 ina = ((struct sockaddr_in *) &ifr->ifr_addr)->sin_addr.s_addr;
1460 if ((ntohl(ina) & nmask) != (addr & nmask))
1463 * Check that the interface is up, and not point-to-point or loopback.
1465 strlcpy(ifreq.ifr_name, ifr->ifr_name, sizeof(ifreq.ifr_name));
1466 if (ioctl(sockfd, SIOCGIFFLAGS, &ifreq) < 0)
1468 if ((ifreq.ifr_flags & (IFF_UP|IFF_POINTOPOINT|IFF_LOOPBACK))
1472 * Get its netmask and OR it into our mask.
1474 if (ioctl(sockfd, SIOCGIFNETMASK, &ifreq) < 0)
1476 mask |= ((struct sockaddr_in *)&ifreq.ifr_addr)->sin_addr.s_addr;
1483 * have_route_to - determine if the system has any route to
1484 * a given IP address.
1485 * For demand mode to work properly, we have to ignore routes
1486 * through our own interface.
1488 int have_route_to(u_int32_t addr)
1494 * Use the hostid as part of the random number seed.
1504 * lock - create a lock file for the named lock device
1506 #define LOCK_PREFIX "/var/spool/lock/LCK.."
1508 static char *lock_file; /* name of lock file created */
1514 char hdb_lock_buffer[12];
1519 if ((p = strrchr(dev, '/')) != NULL)
1521 l = strlen(LOCK_PREFIX) + strlen(dev) + 1;
1522 lock_file = malloc(l);
1523 if (lock_file == NULL)
1524 novm("lock file name");
1525 slprintf(lock_file, l, "%s%s", LOCK_PREFIX, dev);
1527 while ((fd = open(lock_file, O_EXCL | O_CREAT | O_RDWR, 0644)) < 0) {
1529 && (fd = open(lock_file, O_RDONLY, 0)) >= 0) {
1530 /* Read the lock file to find out who has the device locked */
1531 n = read(fd, hdb_lock_buffer, 11);
1533 error("Can't read pid from lock file %s", lock_file);
1536 hdb_lock_buffer[n] = 0;
1537 pid = atoi(hdb_lock_buffer);
1538 if (kill(pid, 0) == -1 && errno == ESRCH) {
1539 /* pid no longer exists - remove the lock file */
1540 if (unlink(lock_file) == 0) {
1542 notice("Removed stale lock on %s (pid %d)",
1546 warn("Couldn't remove stale lock on %s",
1549 notice("Device %s is locked by pid %d",
1554 error("Can't create lock file %s: %m", lock_file);
1560 slprintf(hdb_lock_buffer, sizeof(hdb_lock_buffer), "%10d\n", getpid());
1561 write(fd, hdb_lock_buffer, 11);
1568 * unlock - remove our lockfile