1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License, Version 1.0 only 6 * (the "License"). You may not use this file except in compliance 7 * with the License. 8 * 9 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 10 * or http://www.opensolaris.org/os/licensing. 11 * See the License for the specific language governing permissions 12 * and limitations under the License. 13 * 14 * When distributing Covered Code, include this CDDL HEADER in each 15 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 16 * If applicable, add the following below this CDDL HEADER, with the 17 * fields enclosed by brackets "[]" replaced with your own identifying 18 * information: Portions Copyright [yyyy] [name of copyright owner] 19 * 20 * CDDL HEADER END 21 */ 22 /* 23 * Copyright 2005 Sun Microsystems, Inc. All rights reserved. 24 * Use is subject to license terms. 25 */ 26 27 28 /* 29 * This code implements the Starfire Virtual Console host daemon 30 * (see cvcd(1M)). It accepts a connection from netcon_server 31 * and transfers console I/O to/from the SSP across the 32 * network via TLI. The I/O is sent to the cvcredir device 33 * on the host (see cvc(7) and cvcredir(7)). It also sends 34 * disconnect and break ioctl's to the kernel CVC drivers. 35 */ 36 37 #pragma ident "%Z%%M% %I% %E% SMI" 38 39 40 #include <stdio.h> 41 #include <stdarg.h> 42 #include <syslog.h> 43 #include <stdlib.h> 44 #include <tiuser.h> 45 #include <sys/timod.h> 46 #include <fcntl.h> 47 #include <sys/param.h> 48 #include <sys/utsname.h> 49 #include <sys/stat.h> 50 #include <unistd.h> 51 #include <stropts.h> 52 #include <sys/conf.h> 53 #include <pwd.h> 54 #include <errno.h> 55 #include <sys/socket.h> 56 #include <arpa/inet.h> 57 #include <locale.h> 58 #include <termio.h> 59 #include <signal.h> 60 #include <sys/cvc.h> 61 62 #include <string.h> 63 64 #include <sys/ioctl.h> 65 #include <sys/file.h> 66 #include <sys/sockio.h> 67 68 #include <sys/tihdr.h> 69 70 #include <netdb.h> 71 #include <net/if.h> 72 #include <netinet/if_ether.h> 73 74 #include <inet/common.h> 75 #include <sys/systeminfo.h> 76 77 /* Process priority control */ 78 #include <sys/priocntl.h> 79 #include <sys/tspriocntl.h> 80 #include <sys/rtpriocntl.h> 81 82 /* 83 * Misc. defines. 84 */ 85 #define CONREF "connection request from illegal host" 86 #define SSPHOSTNAMEFILE "/etc/ssphostname" 87 #define NODENAME "/etc/nodename" 88 #define MAXIFS 256 89 90 /* 91 * Function prototypes 92 */ 93 static void cvcd_connect(int fd, struct pollfd *); 94 static void cvcd_reject(int fd); 95 static void cvcd_read(struct pollfd *); 96 static void cvcd_write(char *data, int size); 97 static void cvcd_status(int fd); 98 static void cvcd_winch(int, char *, int); 99 static void cvcd_ioctl(int fd, int cmd); 100 static void cvcd_err(int code, char *format, ...); 101 static void usage(void); 102 static id_t schedinfo(char *name, short *maxpri); 103 static void cvcd_setopt(int fd, int name); 104 105 /* 106 * Globals 107 */ 108 static int rconsfd; /* Console redirection driver */ 109 static char progname[MAXPATHLEN]; 110 static char ssphostname[MAXPATHLEN]; 111 static int debug = 0; 112 static int connected = 0; 113 static int peercheck = 1; 114 static char nic_name[32]; 115 116 int 117 main(int argc, char **argv) 118 { 119 int opt; 120 int tport = 0; 121 char *hostname; 122 struct utsname utsname; 123 struct t_info tinfo; 124 int cvcd_ssp; 125 int nfd; 126 struct pollfd *cvcd_pfd; 127 int i; 128 int j; 129 struct servent *se; 130 struct sockaddr_in *sin; 131 struct t_bind *reqb; 132 struct t_bind *retb; 133 struct t_optmgmt *topt, *tropt; 134 struct opthdr *sockopt; 135 int on = 1; 136 int tmperr = 0; 137 int event; 138 char prefix[256]; 139 pcparms_t pcparms; 140 tsparms_t *tsparmsp; 141 id_t pid, tsID; 142 short tsmaxpri; 143 static int netcon_fail = 0; 144 145 (void) setlocale(LC_ALL, ""); 146 (void) strcpy(progname, argv[0]); 147 (void) memset(ssphostname, 0, MAXPATHLEN); 148 149 if ((cvcd_ssp = open(SSPHOSTNAMEFILE, O_RDONLY)) < 0) { 150 /* 151 * If there is no /etc/ssphostname disable peer check after 152 * issuing warning. 153 */ 154 tmperr = errno; 155 peercheck = 0; 156 } else { 157 if ((i = read(cvcd_ssp, ssphostname, MAXPATHLEN)) < 0) { 158 cvcd_err(LOG_ERR, "failed to read ssphostname"); 159 } 160 /* 161 * The ssp-config(1M) command newline terminates the 162 * ssphostname in the /etc/ssphostname file 163 */ 164 ssphostname[i-1] = '\0'; 165 (void) close(cvcd_ssp); 166 167 (void) memset(nic_name, 0, sizeof (nic_name)); 168 } 169 170 #if defined(DEBUG) 171 while ((opt = getopt(argc, argv, "dp:r:")) != EOF) { 172 #else 173 while ((opt = getopt(argc, argv, "r:")) != EOF) { 174 #endif /* DEBUG */ 175 switch (opt) { 176 177 #if defined(DEBUG) 178 case 'd' : debug = 1; 179 break; 180 181 case 'p' : tport = atoi(optarg); 182 break; 183 #endif /* DEBUG */ 184 185 case 'r' : (void) strcpy(ssphostname, optarg); 186 break; 187 188 default : usage(); 189 exit(1); 190 } 191 } 192 193 if (uname(&utsname) == -1) { 194 perror("HOSTNAME not defined"); 195 exit(1); 196 } 197 hostname = utsname.nodename; 198 199 /* 200 * hostname may still be NULL, depends on when cvcd was started 201 * in the boot sequence. If it is NULL, try one more time 202 * to get a hostname -> look in the /etc/nodename file. 203 */ 204 if (!strlen(hostname)) { 205 /* 206 * try to get the hostname from the /etc/nodename file 207 * we reuse the utsname.nodename buffer here! hostname 208 * already points to it. 209 */ 210 if ((nfd = open(NODENAME, O_RDONLY)) > 0) { 211 if ((i = read(nfd, utsname.nodename, SYS_NMLN)) <= 0) { 212 cvcd_err(LOG_WARNING, 213 "failed to acquire hostname"); 214 } 215 utsname.nodename[i-1] = '\0'; 216 (void) close(nfd); 217 } 218 } 219 220 /* 221 * Must be root. 222 */ 223 if (debug == 0 && geteuid() != 0) { 224 fprintf(stderr, "cvcd: Must be root"); 225 exit(1); 226 } 227 228 /* 229 * Daemonize... 230 */ 231 if (debug == 0) { 232 for (i = 0; i < NOFILE; i++) { 233 (void) close(i); 234 } 235 (void) chdir("/"); 236 (void) umask(0); 237 if (fork() != 0) { 238 exit(0); 239 } 240 (void) setpgrp(); 241 (void) sprintf(prefix, "%s-(HOSTNAME:%s)", progname, hostname); 242 openlog(prefix, LOG_CONS | LOG_NDELAY, LOG_LOCAL0); 243 } 244 if (peercheck == 0) { 245 cvcd_err(LOG_ERR, "open(SSPHOSTNAMEFILE):%s", 246 strerror(tmperr)); 247 } 248 249 cvcd_pfd = (struct pollfd *)malloc(3*sizeof (struct pollfd)); 250 if (cvcd_pfd == (struct pollfd *)NULL) { 251 cvcd_err(LOG_ERR, "malloc:", strerror(errno)); 252 exit(1); 253 } 254 (void) memset((void *)cvcd_pfd, 0, 3*sizeof (struct pollfd)); 255 cvcd_pfd[0].fd = -1; 256 cvcd_pfd[1].fd = -1; 257 cvcd_pfd[2].fd = -1; 258 259 /* SPR 94004 */ 260 (void) sigignore(SIGTERM); 261 262 /* 263 * SPR 83644: cvc and kadb are not compatible under heavy loads. 264 * Fix: will give cvcd highest TS priority at execution time. 265 */ 266 pid = getpid(); 267 pcparms.pc_cid = PC_CLNULL; 268 tsparmsp = (tsparms_t *)pcparms.pc_clparms; 269 270 /* Get scheduler properties for this PID */ 271 if (priocntl(P_PID, pid, PC_GETPARMS, (caddr_t)&pcparms) == -1L) { 272 cvcd_err(LOG_ERR, 273 "cvcd: GETPARMS failed. Warning: can't get ", 274 "TS priorities."); 275 } else { 276 /* Get class IDs and maximum priorities for a TS process */ 277 if ((tsID = schedinfo("TS", &tsmaxpri)) == -1) { 278 cvcd_err(LOG_ERR, "cvcd: Warning, can't get ", 279 "TS scheduler info."); 280 } else { 281 if (debug) { /* Print priority info */ 282 if (pcparms.pc_cid == tsID) { 283 cvcd_err(LOG_DEBUG, "%s%d%s%d%s%d\n", 284 "cvcd:: PID:", pid, 285 ", TS priority:", 286 tsparmsp->ts_upri, 287 ", TS max_pri:", tsmaxpri); 288 } 289 } 290 /* Change proc's priority to maxtspri */ 291 pcparms.pc_cid = tsID; 292 tsparmsp = (struct tsparms *)pcparms.pc_clparms; 293 tsparmsp->ts_upri = tsmaxpri; 294 tsparmsp->ts_uprilim = tsmaxpri; 295 296 if (priocntl(P_PID, pid, PC_SETPARMS, 297 (caddr_t)&pcparms) == -1L) { 298 cvcd_err(LOG_ERR, "cvcd: Warning, ", 299 "can't set TS maximum priority."); 300 } 301 /* Done */ 302 if (debug) { /* Get new scheduler properties for PID */ 303 if (priocntl(P_PID, pid, PC_GETPARMS, 304 (caddr_t)&pcparms) == -1L) { 305 cvcd_err(LOG_DEBUG, "GETPARMS failed"); 306 exit(1); 307 } else { 308 cvcd_err(LOG_DEBUG, "%s%d%s%d%s%d\n", 309 "cvcd:: PID:", pid, 310 ", New TS priority:", 311 tsparmsp->ts_upri, 312 ", TS max_pri:", tsmaxpri); 313 } 314 } 315 } 316 } 317 318 if (debug == 1) { 319 cvcd_err(LOG_DEBUG, "tport = %d, debug = %d", tport, debug); 320 } 321 322 if (tport == 0) { 323 if ((se = getservbyname(CVCD_SERVICE, "tcp")) == NULL) { 324 cvcd_err(LOG_ERR, "getservbyname(%s) not found", 325 CVCD_SERVICE); 326 exit(1); 327 } 328 tport = se->s_port; 329 } 330 331 cvcd_ssp = t_open(TCP_DEV, O_RDWR, &tinfo); 332 if (cvcd_ssp == -1) { 333 cvcd_err(LOG_ERR, "t_open: %s", t_errlist[t_errno]); 334 exit(1); 335 } 336 337 /* 338 * Set the SO_REUSEADDR option for this TLI endpoint. 339 */ 340 cvcd_setopt(cvcd_ssp, SO_REUSEADDR); 341 342 /* 343 * Set the SO_DONTROUTE option for this TLI endpoint, if 344 * /etc/ssphostname exists. 345 */ 346 if (peercheck == 1) 347 cvcd_setopt(cvcd_ssp, SO_DONTROUTE); 348 349 /* 350 * Bind it. 351 */ 352 if (((reqb = (struct t_bind *)t_alloc(cvcd_ssp, T_BIND, T_ALL)) 353 == (struct t_bind *)NULL)) { 354 cvcd_err(LOG_ERR, "%s", t_errlist[t_errno]); 355 exit(1); 356 } 357 if (((retb = (struct t_bind *)t_alloc(cvcd_ssp, T_BIND, T_ALL)) 358 == (struct t_bind *)NULL)) { 359 cvcd_err(LOG_ERR, "%s", t_errlist[t_errno]); 360 exit(1); 361 } 362 reqb->qlen = 1; 363 reqb->addr.len = sizeof (struct sockaddr_in); 364 sin = (struct sockaddr_in *)reqb->addr.buf; 365 (void) memset((void *)sin, 0, sizeof (struct sockaddr_in)); 366 sin->sin_family = AF_INET; 367 368 369 sin->sin_addr.s_addr = htonl(INADDR_ANY); 370 sin->sin_port = htons(tport); 371 if (t_bind(cvcd_ssp, reqb, retb) == -1) { 372 cvcd_err(LOG_ERR, "t_bind: %s", t_errlist[t_errno]); 373 exit(1); 374 } 375 sin = (struct sockaddr_in *)retb->addr.buf; 376 if (sin->sin_port != htons(tport)) { 377 cvcd_err(LOG_ERR, "t_bind: bound to wrong port"); 378 cvcd_err(LOG_ERR, "Wanted %d, got %d", tport, 379 ntohs(sin->sin_port)); 380 exit(1); 381 } 382 383 t_free((char *)reqb, T_BIND); 384 t_free((char *)retb, T_BIND); 385 386 387 /* 388 * Wait for connect from OBP. 389 */ 390 cvcd_pfd[2].fd = cvcd_ssp; 391 cvcd_pfd[2].events = POLLIN|POLLPRI; 392 if ((event = poll(&cvcd_pfd[2], 1, -1)) == -1) { 393 cvcd_err(LOG_ERR, "poll: %s", strerror(errno)); 394 exit(1); 395 } 396 /* 397 * cvcd_connect sets global 398 * connected = 1 if successful. 399 */ 400 cvcd_connect(cvcd_ssp, cvcd_pfd); 401 402 /* 403 * Now set up the Network Console redirection driver. 404 */ 405 rconsfd = open(CVCREDIR_DEV, O_RDWR|O_NDELAY); 406 if (rconsfd < 0) { 407 cvcd_err(LOG_ERR, "open: %s", strerror(errno)); 408 exit(1); 409 } 410 411 /* 412 * cvcd_pfd holds three file descriptors we need to poll from: 413 * 0 will be connected to in_cvcd; 1 is the CVC Redirection driver; 414 * and 2 is the listen endpoint for new connections. 415 */ 416 cvcd_pfd[1].fd = rconsfd; 417 cvcd_pfd[1].events = POLLIN; 418 /* 419 * Loop through main service routine. We check for inbound in.cvcd 420 * connection and data xfer between host and in.cvcd. 421 */ 422 for (;;) { 423 424 char buf[MAXPKTSZ]; 425 426 /* 427 * Check for in_cvcd connect requests. 428 */ 429 switch ((event = t_look(cvcd_ssp))) { 430 case -1 : 431 cvcd_err(LOG_ERR, "%s", t_errlist[t_errno]); 432 exit(1); 433 /* NOTREACHED */ 434 break; 435 case 0 : /* Nothing to do */ 436 break; 437 case T_LISTEN : 438 if (connected == 1) { 439 /* 440 * Someone already connected. 441 */ 442 cvcd_reject(cvcd_ssp); 443 } else { 444 /* 445 * cvcd_connect sets global 446 * connected = 1 if successful. 447 */ 448 cvcd_connect(cvcd_ssp, cvcd_pfd); 449 450 /* 451 * Re-open the cvcredir driver if 452 * the netcon_fail is true. This 453 * indicates there was a previous 454 * network connection that got closed. 455 */ 456 if (netcon_fail) { 457 rconsfd = open(CVCREDIR_DEV, 458 O_RDWR|O_NDELAY); 459 if (rconsfd < 0) { 460 cvcd_err(LOG_ERR, 461 "open: %s", 462 strerror(errno)); 463 exit(1); 464 } 465 cvcd_pfd[1].fd = rconsfd; 466 cvcd_pfd[1].events = POLLIN; 467 netcon_fail = 0; 468 } 469 } 470 break; 471 default : 472 cvcd_err(LOG_ERR, 473 "Illegal event %d for cvcd_ssp", event); 474 exit(1); 475 } 476 /* 477 * Take a look for console I/O or connect request. 478 */ 479 if ((event = poll(cvcd_pfd, 3, -1)) == -1) { 480 cvcd_err(LOG_ERR, "poll: %s", strerror(errno)); 481 exit(1); 482 } 483 484 /* 485 * The following for loop is to detect any bad 486 * things(ie hangup,errors,invalid fd) have happened 487 * to the file descriptors we're interested in. 488 * If so, disconnect current network console connection. 489 */ 490 for (j = 0; j < 3; j++) { 491 if (cvcd_pfd[j].revents & (POLLERR|POLLHUP|POLLNVAL)) { 492 cvcd_err(LOG_WARNING, 493 "poll: status on %s fd:%s%s%s", 494 ((j == 2) ? "listen" : 495 ((j == 0) ? "network" : "redir")), 496 (cvcd_pfd[j].revents & POLLERR) ? 497 " error" : "", 498 (cvcd_pfd[j].revents & POLLHUP) ? 499 " hangup" : "", 500 (cvcd_pfd[j].revents & POLLNVAL) ? 501 " bad fd" : ""); 502 503 (void) t_close(cvcd_pfd[0].fd); 504 cvcd_pfd[0].fd = -1; 505 506 (void) close(cvcd_pfd[1].fd); 507 cvcd_pfd[1].fd = -1; 508 connected = 0; 509 netcon_fail = 1; 510 break; 511 } 512 } 513 514 /* 515 * Check if dummy netcon_fail flag is set, if set returns 516 * to the beginning of the main service routine. 517 */ 518 if (netcon_fail) 519 continue; 520 521 if (event != 0) { 522 if (cvcd_pfd[0].revents == POLLIN) { 523 /* 524 * Process cvcd_ssp data and commands. 525 */ 526 cvcd_read(cvcd_pfd); 527 } 528 if (cvcd_pfd[1].revents == POLLIN) { 529 int s; 530 531 if ((s = read(rconsfd, buf, MAXPKTSZ)) == -1) { 532 cvcd_err(LOG_ERR, "read: %s", 533 strerror(errno)); 534 exit(1); 535 } 536 if ((s > 0) && (connected == 1)) { 537 if (write(cvcd_pfd[0].fd, buf, s) != 538 s) { 539 cvcd_err(LOG_ERR, 540 "lost data output"); 541 } 542 } 543 } 544 } 545 } /* End forever loop */ 546 547 #ifdef lint 548 /* NOTREACHED */ 549 return (1); 550 #endif /* lint */ 551 } 552 553 static void 554 cvcd_reject(int fd) 555 { 556 struct t_call *tcall; 557 558 tcall = (struct t_call *)t_alloc(fd, T_CALL, T_ALL); 559 if (tcall == (struct t_call *)NULL) { 560 cvcd_err(LOG_ERR, "cvcd_reject: t_alloc: %s", 561 t_errlist[t_errno]); 562 return; 563 } 564 if (t_listen(fd, tcall) == -1) { 565 if (t_errno == TNODATA) { 566 cvcd_err(LOG_ERR, "cvcd_reject: No client data!"); 567 } 568 cvcd_err(LOG_ERR, "cvcd_reject: t_listen: %s", 569 t_errlist[t_errno]); 570 t_free((char *)tcall, T_CALL); 571 return; 572 } 573 if (t_snddis(fd, tcall) < 0) { 574 cvcd_err(LOG_ERR, "cvcd_reject: t_snddis: %s", 575 t_errlist[t_errno]); 576 } 577 t_free((char *)tcall, T_CALL); 578 } 579 580 static void 581 cvcd_connect(int fd, struct pollfd *pfd) 582 { 583 struct t_call *tcall; 584 int newfd; 585 struct sockaddr_in *peer; 586 int badpeer = 1; 587 struct hostent *he; 588 struct netbuf netbuf; 589 char addr[100]; 590 ulong_t tmpaddr; /* network byte order */ 591 char **pp; 592 593 tcall = (struct t_call *)t_alloc(fd, T_CALL, T_ALL); 594 if (tcall == (struct t_call *)NULL) { 595 cvcd_err(LOG_ERR, "cvcd_connect: t_alloc: %s", 596 t_errlist[t_errno]); 597 return; 598 } 599 if (t_listen(fd, tcall) == -1) { 600 if (t_errno == TNODATA) { 601 cvcd_err(LOG_ERR, "cvcd_connect: No client data!"); 602 } 603 cvcd_err(LOG_ERR, "cnctip_connect: t_listen: %s", 604 t_errlist[t_errno]); 605 t_free((char *)tcall, T_CALL); 606 return; 607 } 608 if (pfd[0].fd != -1) { 609 cvcd_err(LOG_ERR, "cvcd_connect: no free file descriptors!"); 610 t_free((char *)tcall, T_CALL); 611 return; 612 } 613 newfd = t_open(TCP_DEV, O_RDWR|O_NDELAY, NULL); 614 if (newfd == -1) { 615 cvcd_err(LOG_ERR, "cvcd_connect: t_open: %s", 616 t_errlist[t_errno]); 617 t_free((char *)tcall, T_CALL); 618 return; 619 } 620 if (t_accept(fd, newfd, tcall) < 0) { 621 cvcd_err(LOG_ERR, "cvcd_connect: t_accept: %s", 622 t_errlist[t_errno]); 623 t_close(newfd); 624 t_free((char *)tcall, T_CALL); 625 return; 626 } 627 t_free((char *)tcall, T_CALL); 628 629 /* 630 * If /etc/ssphostname doesnt exists, dont bother verifying 631 * peer since we cant do gethostbyname. 632 */ 633 if (peercheck == 1) { 634 he = gethostbyname(ssphostname); 635 if (he == NULL) { 636 cvcd_err(LOG_ERR, "gethostbyname: %s", 637 strerror(h_errno)); 638 cvcd_err(LOG_ERR, "unable to get SSP name %s!", 639 ssphostname); 640 exit(1); 641 } 642 /* 643 * Verify peer is from specified host by comparing the 644 * address (in network byte order) of the TLI endpoint 645 * and the address (in network byte order) of the ssp 646 * (using the hostname found in /etc/ssphostname). 647 */ 648 (void) memset(addr, 0, 100); 649 netbuf.buf = addr; 650 netbuf.len = 0; 651 netbuf.maxlen = 100; 652 if (ioctl(newfd, TI_GETPEERNAME, &netbuf) < 0) { 653 cvcd_err(LOG_ERR, "ioctl(TI_GETPEERNAME): %s", 654 strerror(errno)); 655 t_close(newfd); 656 return; 657 } 658 659 /* 660 * cvcd doesn't check multi-homed ssphostname 661 * properly (only checks 1st address) 662 */ 663 peer = (struct sockaddr_in *)addr; 664 for (pp = he->h_addr_list; *pp != 0; pp++) { 665 tmpaddr = htonl(*(ulong_t *)*pp); 666 if (memcmp(&peer->sin_addr.s_addr, &tmpaddr, 667 he->h_length) == 0) { 668 badpeer = 0; 669 break; 670 } 671 } 672 673 if (badpeer) { 674 cvcd_err(LOG_ERR, CONREF); 675 cvcd_err(LOG_ERR, "remote host = %s.", 676 inet_ntoa(peer->sin_addr)); 677 t_close(newfd); 678 return; 679 } 680 } 681 pfd[0].fd = newfd; 682 pfd[0].events = POLLIN; 683 connected = 1; 684 } 685 686 /* 687 * Read in data from client. 688 */ 689 static void 690 cvcd_read(struct pollfd *pd) 691 { 692 register char *data; 693 register int fd = pd[0].fd; 694 char buf[MAXPKTSZ]; 695 int flags = 0; 696 697 data = buf; 698 699 if (pd[0].revents & POLLIN) { 700 int n; 701 702 if ((n = t_rcv(fd, data, MAXPKTSZ, &flags)) == -1) { 703 cvcd_err(LOG_ERR, "cvcd_read: t_rcv: %s", 704 t_errlist[t_errno]); 705 (void) t_close(pd[0].fd); 706 pd[0].fd = -1; 707 connected = 0; 708 return; 709 } 710 if (flags & T_EXPEDITED) { 711 if (n != 1) { 712 cvcd_err(LOG_ERR, 713 "cvcd_read: %d bytes EXD!!", 714 n); 715 } 716 /* 717 * Deal with cvcd_ssp_commands. 718 */ 719 switch (data[n-1]) { 720 case CVC_CONN_BREAK : 721 cvcd_ioctl(rconsfd, CVC_BREAK); 722 break; 723 724 case CVC_CONN_DIS : 725 (void) t_close(pd[0].fd); 726 pd[0].fd = -1; 727 cvcd_ioctl(rconsfd, CVC_DISCONNECT); 728 connected = 0; 729 break; 730 731 case CVC_CONN_STAT : 732 cvcd_status(fd); 733 break; 734 735 default : 736 cvcd_err(LOG_ERR, 737 "Illegal cmd 0x%x", buf[n-1]); 738 break; 739 } 740 } else { 741 if (((data[0] & 0377) == 0377) && 742 ((data[1] & 0377) == 0377)) { 743 /* 744 * Pass on window size changes (TIOCSWINSZ). 745 */ 746 cvcd_winch(rconsfd, data, n); 747 (void) memset(data, 0, n); 748 } else { 749 cvcd_write(buf, n); 750 } 751 } 752 } 753 754 } 755 756 static void 757 cvcd_ioctl(int fd, int flags) 758 { 759 struct strioctl cmd; 760 761 cmd.ic_cmd = flags; 762 cmd.ic_timout = 0; 763 cmd.ic_len = 0; 764 cmd.ic_dp = NULL; 765 766 if (ioctl(fd, I_STR, &cmd) == -1) { 767 cvcd_err(LOG_ERR, "cvcd_ioctl: %s", strerror(errno)); 768 exit(1); 769 } 770 } 771 772 773 /* ARGSUSED */ 774 static void 775 cvcd_status(int fd) 776 { 777 } 778 779 780 /* 781 * Write input to console - called from cvcd_read. 782 */ 783 static void 784 cvcd_write(char *data, int size) 785 { 786 int n; 787 788 if ((n = write(rconsfd, data, size)) == -1) { 789 cvcd_err(LOG_ERR, "cvcd_write: write: %s", strerror(errno)); 790 exit(1); 791 } 792 if (n != size) { 793 cvcd_err(LOG_ERR, "cvcd_write: wrote %d of %d bytes", n, size); 794 } 795 } 796 797 static void 798 usage() 799 { 800 #if defined(DEBUG) 801 (void) printf("%s [-d] [-p port]\n", progname); 802 #else 803 (void) printf("%s -r [ssp host]\n", progname); 804 #endif /* DEBUG */ 805 } 806 807 /* 808 * cvcd_err () 809 * 810 * Description: 811 * Log messages via syslog daemon. 812 * 813 * Input: 814 * code - logging code 815 * format - messages to log 816 * 817 * Output: 818 * void 819 * 820 */ 821 static void 822 cvcd_err(int code, char *format, ...) 823 { 824 va_list varg_ptr; 825 char buf[MAXPKTSZ]; 826 827 va_start(varg_ptr, format); 828 (void) vsprintf(buf, format, varg_ptr); 829 va_end(varg_ptr); 830 831 if (debug == 0) 832 syslog(code, buf); 833 else 834 (void) fprintf(stderr, "%s: %s\n", progname, buf); 835 } 836 837 /* 838 * Handle a "control" request (signaled by magic being present) 839 * in the data stream. For now, we are only willing to handle 840 * window size changes. 841 */ 842 void 843 cvcd_winch(int pty, char *cp, int n) 844 { 845 struct winsize w; 846 847 if (n < 4+sizeof (w) || cp[2] != 's' || cp[3] != 's') 848 return; 849 (void) memcpy(&w, cp + 4, sizeof (w)); 850 w.ws_row = ntohs(w.ws_row); 851 w.ws_col = ntohs(w.ws_col); 852 w.ws_xpixel = ntohs(w.ws_xpixel); 853 w.ws_ypixel = ntohs(w.ws_ypixel); 854 (void) ioctl(pty, TIOCSWINSZ, &w); 855 } 856 857 858 /* 859 * Return class ID and maximum priority of it. 860 * Input: 861 * name: is class name (either TS or RT). 862 * maxpri: maximum priority for the class, returned in *maxpri. 863 * Output: 864 * pc_cid: class ID 865 */ 866 static id_t 867 schedinfo(char *name, short *maxpri) 868 { 869 pcinfo_t info; 870 tsinfo_t *tsinfop; 871 rtinfo_t *rtinfop; 872 873 (void) strcpy(info.pc_clname, name); 874 if (priocntl(0L, 0L, PC_GETCID, (caddr_t)&info) == -1L) { 875 return (-1); 876 } 877 if (strcmp(name, "TS") == 0) { /* Time Shared */ 878 tsinfop = (struct tsinfo *)info.pc_clinfo; 879 *maxpri = tsinfop->ts_maxupri; 880 } else if (strcmp(name, "RT") == 0) { /* Real Time */ 881 rtinfop = (struct rtinfo *)info.pc_clinfo; 882 *maxpri = rtinfop->rt_maxpri; 883 } else { 884 return (-1); 885 } 886 return (info.pc_cid); 887 } 888 889 890 /* 891 * set the tli options for the given endpoint represented by fd 892 */ 893 static void 894 cvcd_setopt(int fd, int name) 895 { 896 struct t_optmgmt *topt, *tropt; 897 struct opthdr *sockopt; 898 int on = 1; 899 900 topt = (struct t_optmgmt *)t_alloc(fd, T_OPTMGMT, 0); 901 if (topt == NULL) { 902 cvcd_err(LOG_ERR, "t_alloc: %s", t_errlist[t_errno]); 903 exit(1); 904 } 905 tropt = (struct t_optmgmt *)t_alloc(fd, T_OPTMGMT, 0); 906 if (tropt == NULL) { 907 cvcd_err(LOG_ERR, "t_alloc: %s", t_errlist[t_errno]); 908 exit(1); 909 } 910 topt->opt.buf = (char *)malloc(sizeof (struct opthdr) + sizeof (int)); 911 topt->opt.maxlen = 0; 912 topt->opt.len = sizeof (struct opthdr) + sizeof (int); 913 topt->flags = T_NEGOTIATE; 914 sockopt = (struct opthdr *)topt->opt.buf; 915 sockopt->level = SOL_SOCKET; 916 sockopt->name = name; 917 sockopt->len = sizeof (int); 918 (void) memcpy((char *)(topt->opt.buf + sizeof (struct opthdr)), 919 (char *)&on, sizeof (on)); 920 tropt->opt.buf = (char *)malloc(sizeof (struct opthdr) + sizeof (int)); 921 tropt->opt.maxlen = sizeof (struct opthdr) + sizeof (int); 922 923 if (t_optmgmt(fd, topt, tropt) == -1) { 924 t_error("t_optmgmt"); 925 exit(1); 926 } 927 928 t_free((char *)topt, T_OPTMGMT); 929 t_free((char *)tropt, T_OPTMGMT); 930 } 931