1 | /* |
---|
2 | * ppp-watch.c |
---|
3 | * |
---|
4 | * Bring up a PPP connection and Do The Right Thing[tm] to make bringing |
---|
5 | * the connection up or down with ifup and ifdown synchronous. Takes |
---|
6 | * one argument: the logical name of the device to bring up. Does not |
---|
7 | * detach until the interface is up or has permanently failed to come up. |
---|
8 | * |
---|
9 | * Copyright 1999-2003 Red Hat, Inc. |
---|
10 | * |
---|
11 | * This is free software; you can redistribute it and/or modify it |
---|
12 | * under the terms of the GNU General Public License as published by |
---|
13 | * the Free Software Foundation; either version 2 of the License, or |
---|
14 | * (at your option) any later version. |
---|
15 | * |
---|
16 | * This program is distributed in the hope that it will be useful, but |
---|
17 | * WITHOUT ANY WARRANTY; without even the implied warranty of |
---|
18 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
---|
19 | * General Public License for more details. |
---|
20 | * |
---|
21 | * You should have received a copy of the GNU General Public License |
---|
22 | * along with this program; if not, write to the Free Software |
---|
23 | * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. |
---|
24 | * |
---|
25 | */ |
---|
26 | |
---|
27 | /* Algorithm: |
---|
28 | * fork |
---|
29 | * if child: |
---|
30 | * Register with netreport. (now exit implies deregister first) |
---|
31 | * fork/exec ifup-ppp daemon <interface> |
---|
32 | * else: |
---|
33 | * while (1): |
---|
34 | * sigsuspend() |
---|
35 | * if SIGTERM or SIGINT: |
---|
36 | * kill pppd pgrp |
---|
37 | * exit |
---|
38 | * if SIGHUP: |
---|
39 | * reload ifcfg files |
---|
40 | * kill pppd pgrp |
---|
41 | * wait for SIGCHLD to redial |
---|
42 | * if SIGIO: |
---|
43 | * if no physical device found: continue |
---|
44 | * elif physical device is down: |
---|
45 | * wait for pppd to exit to redial if appropriate |
---|
46 | * else: (physical device is up) |
---|
47 | * detach; continue |
---|
48 | * if SIGCHLD: (pppd exited) |
---|
49 | * wait() |
---|
50 | * if pppd exited: |
---|
51 | * if PERSIST: redial |
---|
52 | * else: exit |
---|
53 | * else: (pppd was killed) |
---|
54 | * exit |
---|
55 | * |
---|
56 | * |
---|
57 | * When ppp-watch itself dies for reasons of its own, it uses a return code |
---|
58 | * higher than 25 so as not to clash with pppd return codes, which, as of |
---|
59 | * this writing, range from 0 to 19. |
---|
60 | */ |
---|
61 | |
---|
62 | #include <unistd.h> |
---|
63 | #include <errno.h> |
---|
64 | #include <fcntl.h> |
---|
65 | #include <signal.h> |
---|
66 | #include <string.h> |
---|
67 | #include <stdio.h> |
---|
68 | #include <stdlib.h> |
---|
69 | #include <sys/ioctl.h> |
---|
70 | #include <sys/time.h> |
---|
71 | #include <sys/types.h> |
---|
72 | #include <sys/resource.h> |
---|
73 | #include <sys/socket.h> |
---|
74 | #include <sys/stat.h> |
---|
75 | #include <sys/wait.h> |
---|
76 | #include <termios.h> |
---|
77 | #include <net/if.h> |
---|
78 | #include <glib.h> |
---|
79 | #include "shvar.h" |
---|
80 | |
---|
81 | #define IFCFGPREFIX "/etc/sysconfig/network-scripts/ifcfg-" |
---|
82 | #define IFUP_PPP "/etc/sysconfig/network-scripts/ifup-ppp" |
---|
83 | |
---|
84 | static int theSigterm = 0; |
---|
85 | static int theSigint = 0; |
---|
86 | static int theSighup = 0; |
---|
87 | static int theSigio = 0; |
---|
88 | static int theSigchld = 0; |
---|
89 | static int theSigalrm = 0; |
---|
90 | static int pipeArray[2]; |
---|
91 | |
---|
92 | // patch to respect the maxfail parameter to ppp |
---|
93 | // Scott Sharkey <ssharkey@linux-no-limits.com> |
---|
94 | static int dialCount = 0; |
---|
95 | static pid_t theChild; |
---|
96 | static void failureExit(int exitCode); |
---|
97 | |
---|
98 | static void |
---|
99 | interrupt_child(int signo) { |
---|
100 | kill(theChild, SIGINT); |
---|
101 | } |
---|
102 | |
---|
103 | static void |
---|
104 | set_signal(int signo, void (*handler)(int)) { |
---|
105 | struct sigaction act; |
---|
106 | act.sa_handler = handler; |
---|
107 | act.sa_flags = SA_RESTART; |
---|
108 | sigemptyset(&act.sa_mask); |
---|
109 | sigaction(signo, &act, NULL); |
---|
110 | } |
---|
111 | |
---|
112 | /* Create a pipe, and fork off a child. This is the end of the road for |
---|
113 | * the parent, which will wait for an exit status byte on the pipe (which |
---|
114 | * is written by the child). */ |
---|
115 | static void |
---|
116 | detach(char *device) { |
---|
117 | pid_t childpid; |
---|
118 | unsigned char exitCode; |
---|
119 | int fd; |
---|
120 | |
---|
121 | if (pipe(pipeArray) == -1) |
---|
122 | exit(25); |
---|
123 | |
---|
124 | childpid = fork(); |
---|
125 | if (childpid == -1) |
---|
126 | exit(26); |
---|
127 | |
---|
128 | if (childpid != 0) { |
---|
129 | /* The parent only cares about notifications from the child. */ |
---|
130 | close (pipeArray[1]); |
---|
131 | |
---|
132 | /* Certain signals are meant for our child, the watcher process. */ |
---|
133 | theChild = childpid; |
---|
134 | set_signal(SIGINT, interrupt_child); |
---|
135 | set_signal(SIGTERM, interrupt_child); |
---|
136 | set_signal(SIGHUP, interrupt_child); |
---|
137 | |
---|
138 | /* Read the pipe until the child gives us an exit code as a byte. */ |
---|
139 | while (read (pipeArray[0], &exitCode, 1) == -1) { |
---|
140 | switch (errno) { |
---|
141 | case EINTR: continue; |
---|
142 | default: exit (27); /* this will catch EIO in particular */ |
---|
143 | } |
---|
144 | } |
---|
145 | switch (exitCode) { |
---|
146 | case 0: |
---|
147 | break; |
---|
148 | |
---|
149 | case 1: |
---|
150 | fprintf(stderr, "Device %s: An immediately fatal error of some kind occurred, such as an " |
---|
151 | "essential system call failing, or running out of virtual memory.\n", device); |
---|
152 | break; |
---|
153 | |
---|
154 | case 2: |
---|
155 | fprintf(stderr, "Device %s: An error was detected in processing the options given, such as " |
---|
156 | "two mutually exclusive options being used.\n", device); |
---|
157 | break; |
---|
158 | |
---|
159 | case 3: |
---|
160 | fprintf(stderr, "Device %s: Pppd is not setuid-root and the invoking user is not root.\n", device); |
---|
161 | break; |
---|
162 | |
---|
163 | case 4: |
---|
164 | fprintf(stderr, "Device %s: The kernel does not support PPP, for example, the PPP kernel " |
---|
165 | "driver is not included or cannot be loaded.\n", device); |
---|
166 | break; |
---|
167 | |
---|
168 | case 5: |
---|
169 | fprintf(stderr, "Device %s: Pppd terminated because it was sent a SIGINT, SIGTERM or SIGHUP signal.\n", device); |
---|
170 | break; |
---|
171 | |
---|
172 | case 6: |
---|
173 | fprintf(stderr, "Device %s: The serial port could not be locked.\n", device); |
---|
174 | break; |
---|
175 | |
---|
176 | case 7: |
---|
177 | fprintf(stderr, "Device %s: The serial port could not be opened.\n", device); |
---|
178 | break; |
---|
179 | |
---|
180 | case 8: |
---|
181 | fprintf(stderr, "Device %s: The connect script failed (maybe wrong password or wrong phone number).\n", device); |
---|
182 | break; |
---|
183 | |
---|
184 | case 9: |
---|
185 | fprintf(stderr, "Device %s: The command specified as the argument to the pty option could not be run.\n", device); |
---|
186 | break; |
---|
187 | |
---|
188 | case 10: |
---|
189 | fprintf(stderr, "Device %s: The PPP negotiation failed, that is, it didn't reach the point " |
---|
190 | "where at least one network protocol (e.g. IP) was running.\n", device); |
---|
191 | break; |
---|
192 | |
---|
193 | case 11: |
---|
194 | fprintf(stderr, "Device %s: The peer system failed (or refused) to authenticate itself.\n", device); |
---|
195 | break; |
---|
196 | |
---|
197 | case 12: |
---|
198 | fprintf(stderr, "Device %s: The link was established successfully and terminated because it was idle.\n", device); |
---|
199 | break; |
---|
200 | |
---|
201 | case 13: |
---|
202 | fprintf(stderr, "Device %s: The link was established successfully and terminated because the connect time limit was reached.\n", device); |
---|
203 | break; |
---|
204 | |
---|
205 | case 14: |
---|
206 | fprintf(stderr, "Device %s: Callback was negotiated and an incoming call should arrive shortly.\n", device); |
---|
207 | break; |
---|
208 | |
---|
209 | case 15: |
---|
210 | fprintf(stderr, "Device %s: The link was terminated because the peer is not responding to echo requests.\n", device); |
---|
211 | break; |
---|
212 | |
---|
213 | case 16: |
---|
214 | fprintf(stderr, "Device %s: The link was terminated by the modem hanging up.\n", device); |
---|
215 | break; |
---|
216 | |
---|
217 | case 18: |
---|
218 | fprintf(stderr, "Device %s: The init script failed (returned a non-zero exit status).\n", device); |
---|
219 | break; |
---|
220 | |
---|
221 | case 19: |
---|
222 | fprintf(stderr, "Device %s: We failed to authenticate ourselves to the peer.\n", device); |
---|
223 | break; |
---|
224 | |
---|
225 | case 33: |
---|
226 | fprintf(stderr, "%s already up, initiating redial\n", device); |
---|
227 | break; |
---|
228 | case 34: |
---|
229 | fprintf(stderr, "Failed to activate %s, retrying in the background\n", device); |
---|
230 | break; |
---|
231 | default: |
---|
232 | fprintf(stderr, "Failed to activate %s with error %d\n", device, exitCode); |
---|
233 | break; |
---|
234 | } |
---|
235 | exit(exitCode); |
---|
236 | } |
---|
237 | |
---|
238 | /* We're in the child process, which only writes the exit status |
---|
239 | * of the pppd process to its parent (i.e., it reads nothing). */ |
---|
240 | close (pipeArray[0]); |
---|
241 | |
---|
242 | /* Don't leak this into programs we call. */ |
---|
243 | fcntl(pipeArray[1], F_SETFD, FD_CLOEXEC); |
---|
244 | |
---|
245 | /* Redirect stdio to /dev/null. */ |
---|
246 | fd = open("/dev/null", O_RDONLY); |
---|
247 | dup2(fd, STDIN_FILENO); |
---|
248 | close(fd); |
---|
249 | |
---|
250 | fd = open("/dev/null", O_WRONLY); |
---|
251 | dup2(fd, STDOUT_FILENO); |
---|
252 | dup2(fd, STDERR_FILENO); |
---|
253 | close(fd); |
---|
254 | |
---|
255 | /* Become session and process group leader. */ |
---|
256 | setsid(); |
---|
257 | setpgid(0, 0); |
---|
258 | } |
---|
259 | |
---|
260 | /* Do magic with the pid file (/var/run/pppwatch-$DEVICE.pid): |
---|
261 | * Try to open it for writing. If it exists, send a SIGHUP to whatever PID |
---|
262 | * is already listed in it and remove it. Repeat until we can open it. |
---|
263 | * Write out our PID, and return. */ |
---|
264 | static void |
---|
265 | doPidFile(char *device) { |
---|
266 | static char pidFilePath[PATH_MAX] = ""; |
---|
267 | int fd = -1; |
---|
268 | FILE *f = NULL; |
---|
269 | pid_t pid = 0; |
---|
270 | |
---|
271 | if (device == NULL) { |
---|
272 | /* Remove an existing pid file -- we're exiting. */ |
---|
273 | if(strlen(pidFilePath) > 0) { |
---|
274 | unlink(pidFilePath); |
---|
275 | } |
---|
276 | } else { |
---|
277 | /* Set up the name of the pid file, used only the first time. */ |
---|
278 | snprintf(pidFilePath, sizeof(pidFilePath), "/var/run/pppwatch-%s.pid", |
---|
279 | device); |
---|
280 | |
---|
281 | /* Create the pid file. */ |
---|
282 | do { |
---|
283 | fd = open(pidFilePath, O_WRONLY|O_TRUNC|O_CREAT|O_EXCL|O_NOFOLLOW, |
---|
284 | S_IRUSR|S_IWUSR | S_IRGRP | S_IROTH); |
---|
285 | if(fd == -1) { |
---|
286 | /* Try to open the file for read. */ |
---|
287 | fd = open(pidFilePath, O_RDONLY); |
---|
288 | if(fd == -1) |
---|
289 | failureExit(36); /* This is not good. */ |
---|
290 | |
---|
291 | /* We're already running, send a SIGHUP (we presume that they |
---|
292 | * are calling ifup for a reason, so they probably want to |
---|
293 | * redial) and then exit cleanly and let things go on in the |
---|
294 | * background. Muck with the filename so that we don't go |
---|
295 | * deleting the pid file for the already-running instance. |
---|
296 | */ |
---|
297 | f = fdopen(fd, "r"); |
---|
298 | if(f == NULL) |
---|
299 | failureExit(37); |
---|
300 | |
---|
301 | pid = 0; |
---|
302 | fscanf(f, "%d", &pid); |
---|
303 | fclose(f); |
---|
304 | |
---|
305 | if(pid) { |
---|
306 | /* Try to kill it. */ |
---|
307 | if (kill(pid, SIGHUP) == -1) { |
---|
308 | /* No such pid, remove the bogus pid file. */ |
---|
309 | unlink(pidFilePath); |
---|
310 | } else { |
---|
311 | /* Got it. Don't mess with the pid file on |
---|
312 | * our way out. */ |
---|
313 | memset(pidFilePath, '\0', sizeof(pidFilePath)); |
---|
314 | failureExit(33); |
---|
315 | } |
---|
316 | } |
---|
317 | } |
---|
318 | } while(fd == -1); |
---|
319 | |
---|
320 | f = fdopen(fd, "w"); |
---|
321 | if(f == NULL) |
---|
322 | failureExit(31); |
---|
323 | fprintf(f, "%d\n", getpid()); |
---|
324 | fclose(f); |
---|
325 | } |
---|
326 | } |
---|
327 | |
---|
328 | /* Fork off and exec() a child process. If reap_child is non-zero, |
---|
329 | * wait for the child to exit and return 0 if it ran successfully, |
---|
330 | * otherwise return 0 right away and let the SIGCHLD handler deal. */ |
---|
331 | static int |
---|
332 | fork_exec(gboolean reap, char *path, char *arg1, char *arg2, char *arg3) |
---|
333 | { |
---|
334 | pid_t childpid; |
---|
335 | int status; |
---|
336 | |
---|
337 | sigset_t sigs; |
---|
338 | |
---|
339 | childpid = fork(); |
---|
340 | if (childpid == -1) |
---|
341 | exit(26); |
---|
342 | |
---|
343 | if (childpid == 0) { |
---|
344 | /* Do the exec magic. Prepare by clearing the signal mask for pppd. */ |
---|
345 | sigemptyset(&sigs); |
---|
346 | sigprocmask(SIG_SETMASK, &sigs, NULL); |
---|
347 | |
---|
348 | if (!reap) { |
---|
349 | /* Make sure that the pppd is the leader for its process group. */ |
---|
350 | setsid(); |
---|
351 | setpgid(0, 0); |
---|
352 | } |
---|
353 | |
---|
354 | execl(path, path, arg1, arg2, arg3, NULL); |
---|
355 | perror(path); |
---|
356 | _exit (1); |
---|
357 | } |
---|
358 | |
---|
359 | if (reap) { |
---|
360 | waitpid (childpid, &status, 0); |
---|
361 | if (WIFEXITED(status) && (WEXITSTATUS(status) == 0)) { |
---|
362 | return 0; |
---|
363 | } else { |
---|
364 | return 1; |
---|
365 | } |
---|
366 | } else { |
---|
367 | return 0; |
---|
368 | } |
---|
369 | } |
---|
370 | |
---|
371 | /* Relay the pppd's exit code up to the parent -- can only be called once, |
---|
372 | * because the parent exits as soon as it reads a byte. */ |
---|
373 | static void |
---|
374 | relay_exitcode(unsigned char code) |
---|
375 | { |
---|
376 | unsigned char exitCode; |
---|
377 | exitCode = code; |
---|
378 | write(pipeArray[1], &exitCode, 1); |
---|
379 | close(pipeArray[1]); |
---|
380 | } |
---|
381 | |
---|
382 | /* Unregister with netreport, relay a status byte to the parent, clean up |
---|
383 | * the pid file, and bail. */ |
---|
384 | static void |
---|
385 | failureExit(int exitCode) { |
---|
386 | fork_exec(TRUE, "/sbin/netreport", "-r", NULL, NULL); |
---|
387 | relay_exitcode(exitCode); |
---|
388 | doPidFile(NULL); |
---|
389 | exit(exitCode); |
---|
390 | } |
---|
391 | |
---|
392 | /* Keeps track of which signals we've seen so far. */ |
---|
393 | static void |
---|
394 | signal_tracker (int signum) { |
---|
395 | switch(signum) { |
---|
396 | case SIGTERM: |
---|
397 | theSigterm = 1; break; |
---|
398 | case SIGINT: |
---|
399 | theSigint = 1; break; |
---|
400 | case SIGHUP: |
---|
401 | theSighup = 1; break; |
---|
402 | case SIGIO: |
---|
403 | theSigio = 1; break; |
---|
404 | case SIGCHLD: |
---|
405 | theSigchld = 1; break; |
---|
406 | case SIGALRM: |
---|
407 | theSigalrm = 1; break; |
---|
408 | } |
---|
409 | } |
---|
410 | |
---|
411 | /* Return a shvarFile for this interface, taking into account one level of |
---|
412 | * inheritance (eeewww). */ |
---|
413 | static shvarFile * |
---|
414 | shvarfilesGet(const char *interfaceName) { |
---|
415 | shvarFile *ifcfg = NULL; |
---|
416 | char ifcfgName[PATH_MAX]; |
---|
417 | char *ifcfgParentDiff = NULL; |
---|
418 | |
---|
419 | /* Start with the basic configuration. */ |
---|
420 | snprintf(ifcfgName, sizeof(ifcfgName), "%s%s", IFCFGPREFIX, interfaceName); |
---|
421 | ifcfg = svNewFile(ifcfgName); |
---|
422 | if (ifcfg == NULL) |
---|
423 | return NULL; |
---|
424 | |
---|
425 | /* Do we have a parent interface (i.e., for ppp0-blah, ppp0) to inherit? */ |
---|
426 | ifcfgParentDiff = strchr(ifcfgName + sizeof(IFCFGPREFIX), '-'); |
---|
427 | if (ifcfgParentDiff) { |
---|
428 | *ifcfgParentDiff = '\0'; |
---|
429 | ifcfg->parent = svNewFile(ifcfgName); |
---|
430 | } |
---|
431 | |
---|
432 | /* This is very unclean, but we have to close the shvar descriptors in |
---|
433 | * case they've been numbered STDOUT_FILENO or STDERR_FILENO, which would |
---|
434 | * be disastrous if inherited by a child process. */ |
---|
435 | close (ifcfg->fd); |
---|
436 | ifcfg->fd = 0; |
---|
437 | |
---|
438 | if (ifcfg->parent) { |
---|
439 | close (ifcfg->parent->fd); |
---|
440 | ifcfg->parent->fd = 0; |
---|
441 | } |
---|
442 | |
---|
443 | return ifcfg; |
---|
444 | } |
---|
445 | |
---|
446 | /* Convert a logical interface name to a real one by reading the lock |
---|
447 | * file created by pppd. */ |
---|
448 | static void |
---|
449 | pppLogicalToPhysical(int *pppdPid, char *logicalName, char **physicalName) { |
---|
450 | char mapFileName[PATH_MAX]; |
---|
451 | char buffer[20]; |
---|
452 | char *p, *q; |
---|
453 | int fd, n; |
---|
454 | char *physicalDevice = NULL; |
---|
455 | |
---|
456 | snprintf(mapFileName, sizeof(mapFileName), "/var/run/ppp-%s.pid", |
---|
457 | logicalName); |
---|
458 | fd = open(mapFileName, O_RDONLY); |
---|
459 | if (fd != -1) { |
---|
460 | n = read(fd, buffer, sizeof(buffer) - 1); |
---|
461 | close(fd); |
---|
462 | if (n > 0) { |
---|
463 | buffer[n] = '\0'; |
---|
464 | /* Split up the file at the first line break -- the PID is on the |
---|
465 | * first line. */ |
---|
466 | if((p = strchr(buffer, '\n')) != NULL) { |
---|
467 | *p = '\0'; |
---|
468 | p++; |
---|
469 | if (pppdPid) { |
---|
470 | *pppdPid = atoi(buffer); |
---|
471 | } |
---|
472 | /* The physical device name is on the second line. */ |
---|
473 | if((q = strchr(p, '\n')) != NULL) { |
---|
474 | *q = '\0'; |
---|
475 | physicalDevice = strdup(p); |
---|
476 | } |
---|
477 | } |
---|
478 | } |
---|
479 | } |
---|
480 | |
---|
481 | if (physicalDevice) { |
---|
482 | if (physicalName) { |
---|
483 | *physicalName = physicalDevice; |
---|
484 | } else { |
---|
485 | free(physicalDevice); |
---|
486 | } |
---|
487 | } else { |
---|
488 | if (physicalName) { |
---|
489 | *physicalName = NULL; |
---|
490 | } |
---|
491 | } |
---|
492 | } |
---|
493 | |
---|
494 | /* Return a boolean value indicating if the interface is up. If not, or |
---|
495 | * if we don't know, return FALSE. */ |
---|
496 | static gboolean |
---|
497 | interfaceIsUp(char *device) { |
---|
498 | int sock = -1; |
---|
499 | int family[] = {PF_INET, PF_IPX, PF_AX25, PF_APPLETALK, 0}; |
---|
500 | int p = 0; |
---|
501 | struct ifreq ifr; |
---|
502 | gboolean retcode = FALSE; |
---|
503 | |
---|
504 | /* Create a socket suitable for doing routing ioctls. */ |
---|
505 | for (p = 0; (sock == -1) && family[p]; p++) { |
---|
506 | sock = socket(family[p], SOCK_DGRAM, 0); |
---|
507 | } |
---|
508 | if (sock == -1) |
---|
509 | return FALSE; |
---|
510 | |
---|
511 | /* Populate the request structure for getting the interface's status. */ |
---|
512 | memset(&ifr, 0, sizeof(ifr)); |
---|
513 | strncpy(ifr.ifr_name, device, sizeof(ifr.ifr_name) - 1); |
---|
514 | ifr.ifr_name[sizeof(ifr.ifr_name) - 1] = '\0'; |
---|
515 | |
---|
516 | /* We return TRUE iff the ioctl succeeded and the interface is UP. */ |
---|
517 | if (ioctl(sock, SIOCGIFFLAGS, &ifr) == -1) { |
---|
518 | retcode = FALSE; |
---|
519 | } else if (ifr.ifr_flags & IFF_UP) { |
---|
520 | retcode = TRUE; |
---|
521 | } |
---|
522 | |
---|
523 | close(sock); |
---|
524 | |
---|
525 | return retcode; |
---|
526 | } |
---|
527 | |
---|
528 | /* Very, very minimal hangup function. This just attempts to hang up a device |
---|
529 | * that should already be hung up, so it does not need to be bulletproof. */ |
---|
530 | static void |
---|
531 | hangup(shvarFile *ifcfg) { |
---|
532 | int fd; |
---|
533 | char *line; |
---|
534 | struct termios original_ts, ts; |
---|
535 | |
---|
536 | line = svGetValue(ifcfg, "MODEMPORT"); |
---|
537 | if (line == NULL) |
---|
538 | return; |
---|
539 | |
---|
540 | fd = open(line, O_RDWR | O_NOCTTY | O_NONBLOCK); |
---|
541 | if (fd != -1) { |
---|
542 | if (tcgetattr(fd, &ts) != -1) { |
---|
543 | original_ts = ts; |
---|
544 | write(fd, "\r", 1); /* tickle modems that do not like dropped DTR */ |
---|
545 | usleep(1000); |
---|
546 | cfsetospeed(&ts, B0); |
---|
547 | tcsetattr(fd, TCSANOW, &ts); |
---|
548 | usleep(100000); |
---|
549 | tcsetattr(fd, TCSANOW, &original_ts); |
---|
550 | } |
---|
551 | close(fd); |
---|
552 | } |
---|
553 | free(line); |
---|
554 | } |
---|
555 | |
---|
556 | int |
---|
557 | main(int argc, char **argv) { |
---|
558 | int status; |
---|
559 | pid_t waited; |
---|
560 | char *device, *real_device, *physicalDevice = NULL; |
---|
561 | char *boot = NULL; |
---|
562 | shvarFile *ifcfg; |
---|
563 | sigset_t blockedsigs, unblockedsigs; |
---|
564 | int pppdPid = 0; |
---|
565 | int timeout = 30; |
---|
566 | char *temp; |
---|
567 | gboolean dying = FALSE; |
---|
568 | int sendsig; |
---|
569 | gboolean connectedOnce = FALSE; |
---|
570 | int maxfail = 0; // MAXFAIL Patch <ssharkey@linux-no-limits.com> |
---|
571 | |
---|
572 | if (argc < 2) { |
---|
573 | fprintf (stderr, "usage: ppp-watch <interface-name> [boot]\n"); |
---|
574 | exit(30); |
---|
575 | } |
---|
576 | |
---|
577 | if (strncmp(argv[1], "ifcfg-", 6) == 0) { |
---|
578 | device = argv[1] + 6; |
---|
579 | } else { |
---|
580 | device = argv[1]; |
---|
581 | } |
---|
582 | |
---|
583 | detach(device); /* Prepare a child process to monitor pppd. When we |
---|
584 | return, we'll be in the child. */ |
---|
585 | |
---|
586 | if ((argc > 2) && (strcmp("boot", argv[2]) == 0)) { |
---|
587 | boot = argv[2]; |
---|
588 | } |
---|
589 | |
---|
590 | ifcfg = shvarfilesGet(device); |
---|
591 | if (ifcfg == NULL) |
---|
592 | failureExit(28); |
---|
593 | |
---|
594 | real_device = svGetValue(ifcfg, "DEVICE"); |
---|
595 | if (real_device == NULL) |
---|
596 | real_device = device; |
---|
597 | |
---|
598 | doPidFile(real_device); |
---|
599 | |
---|
600 | /* We'll want to know which signal interrupted our sleep below, so |
---|
601 | * attach a signal handler to these. */ |
---|
602 | set_signal(SIGTERM, signal_tracker); |
---|
603 | set_signal(SIGINT, signal_tracker); |
---|
604 | set_signal(SIGHUP, signal_tracker); |
---|
605 | set_signal(SIGIO, signal_tracker); |
---|
606 | set_signal(SIGCHLD, signal_tracker); |
---|
607 | |
---|
608 | /* We time out only if we're being run at boot-time. */ |
---|
609 | if (boot) { |
---|
610 | temp = svGetValue(ifcfg, "BOOTTIMEOUT"); |
---|
611 | if (temp) { |
---|
612 | timeout = atoi(temp); |
---|
613 | if (timeout < 1) timeout = 1; |
---|
614 | free(temp); |
---|
615 | } else { |
---|
616 | timeout = 30; |
---|
617 | } |
---|
618 | set_signal(SIGALRM, signal_tracker); |
---|
619 | alarm(timeout); |
---|
620 | } |
---|
621 | |
---|
622 | /* Register us to get a signal when something changes. Yes, that's vague. */ |
---|
623 | fork_exec(TRUE, "/sbin/netreport", NULL, NULL, NULL); |
---|
624 | |
---|
625 | /* Reset theSigchld, which should have been triggered by netreport. */ |
---|
626 | theSigchld = 0; |
---|
627 | |
---|
628 | /* We don't set up the procmask until after we have received the netreport |
---|
629 | * signal. Do so now. */ |
---|
630 | sigemptyset(&blockedsigs); |
---|
631 | sigaddset(&blockedsigs, SIGTERM); |
---|
632 | sigaddset(&blockedsigs, SIGINT); |
---|
633 | sigaddset(&blockedsigs, SIGHUP); |
---|
634 | sigaddset(&blockedsigs, SIGIO); |
---|
635 | sigaddset(&blockedsigs, SIGCHLD); |
---|
636 | if (boot) { |
---|
637 | sigaddset(&blockedsigs, SIGALRM); |
---|
638 | } |
---|
639 | sigprocmask(SIG_BLOCK, &blockedsigs, NULL); |
---|
640 | |
---|
641 | sigfillset(&unblockedsigs); |
---|
642 | sigdelset(&unblockedsigs, SIGTERM); |
---|
643 | sigdelset(&unblockedsigs, SIGINT); |
---|
644 | sigdelset(&unblockedsigs, SIGHUP); |
---|
645 | sigdelset(&unblockedsigs, SIGIO); |
---|
646 | sigdelset(&unblockedsigs, SIGCHLD); |
---|
647 | if (boot) { |
---|
648 | sigdelset(&unblockedsigs, SIGALRM); |
---|
649 | } |
---|
650 | sigprocmask(SIG_UNBLOCK, &unblockedsigs, NULL); |
---|
651 | |
---|
652 | /* Initialize the retry timeout using the RETRYTIMEOUT setting. */ |
---|
653 | temp = svGetValue(ifcfg, "RETRYTIMEOUT"); |
---|
654 | if (temp) { |
---|
655 | timeout = atoi(temp); |
---|
656 | free(temp); |
---|
657 | } else { |
---|
658 | timeout = 30; |
---|
659 | } |
---|
660 | |
---|
661 | /* Start trying to bring the interface up. */ |
---|
662 | fork_exec(FALSE, IFUP_PPP, "daemon", device, boot); |
---|
663 | |
---|
664 | while (TRUE) { |
---|
665 | /* Wait for a signal. */ |
---|
666 | if (!theSigterm && |
---|
667 | !theSigint && |
---|
668 | !theSighup && |
---|
669 | !theSigio && |
---|
670 | !theSigchld && |
---|
671 | !theSigalrm) { |
---|
672 | sigsuspend(&unblockedsigs); |
---|
673 | } |
---|
674 | |
---|
675 | /* If we got SIGTERM or SIGINT, give up and hang up. */ |
---|
676 | if (theSigterm || theSigint) { |
---|
677 | theSigterm = theSigint = 0; |
---|
678 | |
---|
679 | /* If we've already tried to exit this way, use SIGKILL instead |
---|
680 | * of SIGTERM, because pppd's just being stubborn. */ |
---|
681 | if (dying) { |
---|
682 | sendsig = SIGKILL; |
---|
683 | } else { |
---|
684 | sendsig = SIGTERM; |
---|
685 | } |
---|
686 | dying = TRUE; |
---|
687 | |
---|
688 | /* Get the pid of our child pppd. */ |
---|
689 | pppLogicalToPhysical(&pppdPid, device, NULL); |
---|
690 | |
---|
691 | /* We don't know what our child pid is. This is very confusing. */ |
---|
692 | if (!pppdPid) { |
---|
693 | failureExit(35); |
---|
694 | } |
---|
695 | |
---|
696 | /* Die, pppd, die. */ |
---|
697 | kill(pppdPid, sendsig); |
---|
698 | if (sendsig == SIGKILL) { |
---|
699 | kill(-pppdPid, SIGTERM); /* Give it a chance to die nicely, then |
---|
700 | kill its whole process group. */ |
---|
701 | usleep(2500000); |
---|
702 | kill(-pppdPid, sendsig); |
---|
703 | hangup(ifcfg); |
---|
704 | failureExit(32); |
---|
705 | } |
---|
706 | } |
---|
707 | |
---|
708 | /* If we got SIGHUP, reload and redial. */ |
---|
709 | if (theSighup) { |
---|
710 | theSighup = 0; |
---|
711 | |
---|
712 | /* Free and reload the configuration structure. */ |
---|
713 | if (ifcfg->parent) |
---|
714 | svCloseFile(ifcfg->parent); |
---|
715 | svCloseFile(ifcfg); |
---|
716 | ifcfg = shvarfilesGet(device); |
---|
717 | |
---|
718 | /* Get the PID of our child pppd. */ |
---|
719 | pppLogicalToPhysical(&pppdPid, device, NULL); |
---|
720 | kill(pppdPid, SIGTERM); |
---|
721 | |
---|
722 | /* We'll redial when the SIGCHLD arrives, even if PERSIST is |
---|
723 | * not set (the latter handled by clearing the "we've connected |
---|
724 | * at least once" flag). */ |
---|
725 | connectedOnce = FALSE; |
---|
726 | |
---|
727 | /* We don't want to delay before redialing, either, so cut |
---|
728 | * the retry timeout to zero. */ |
---|
729 | timeout = 0; |
---|
730 | } |
---|
731 | |
---|
732 | /* If we got a SIGIO (from netreport, presumably), check if the |
---|
733 | * interface is up and return zero (via our parent) if it is. */ |
---|
734 | if (theSigio) { |
---|
735 | theSigio = 0; |
---|
736 | |
---|
737 | pppLogicalToPhysical(NULL, device, &physicalDevice); |
---|
738 | if (physicalDevice) { |
---|
739 | if (interfaceIsUp(physicalDevice)) { |
---|
740 | /* The interface is up, so report a success to a parent if |
---|
741 | * we have one. Any errors after this we just swallow. */ |
---|
742 | relay_exitcode(0); |
---|
743 | connectedOnce = TRUE; |
---|
744 | alarm(0); |
---|
745 | } |
---|
746 | free(physicalDevice); |
---|
747 | } |
---|
748 | } |
---|
749 | |
---|
750 | /* If we got a SIGCHLD, then pppd died (possibly because we killed it), |
---|
751 | * and we need to restart it after timeout seconds. */ |
---|
752 | if (theSigchld) { |
---|
753 | theSigchld = 0; |
---|
754 | |
---|
755 | /* Find its pid, which is also its process group ID. */ |
---|
756 | waited = waitpid(-1, &status, 0); |
---|
757 | if (waited == -1) { |
---|
758 | continue; |
---|
759 | } |
---|
760 | |
---|
761 | /* Now, we need to kill any children of pppd still in pppd's |
---|
762 | * process group, in case they are hanging around. |
---|
763 | * pppd is dead (we just waited for it) but there is no |
---|
764 | * guarantee that its children are dead, and they will |
---|
765 | * hold the modem if we do not get rid of them. |
---|
766 | * We have kept the old pid/pgrp around in pppdPid. */ |
---|
767 | if (pppdPid) { |
---|
768 | kill(-pppdPid, SIGTERM); /* give it a chance to die nicely */ |
---|
769 | usleep(2500000); |
---|
770 | kill(-pppdPid, SIGKILL); |
---|
771 | hangup(ifcfg); |
---|
772 | } |
---|
773 | pppdPid = 0; |
---|
774 | |
---|
775 | /* Bail if the child exitted abnormally or we were already |
---|
776 | * signalled to kill it. */ |
---|
777 | if (!WIFEXITED(status)) { |
---|
778 | failureExit(29); |
---|
779 | } |
---|
780 | if (dying) { |
---|
781 | failureExit(WEXITSTATUS(status)); |
---|
782 | } |
---|
783 | |
---|
784 | /* Error conditions from which we do not expect to recover |
---|
785 | * without user intervention -- do not fill up the logs. */ |
---|
786 | switch (WEXITSTATUS(status)) { |
---|
787 | case 1: case 2: case 3: case 4: case 6: |
---|
788 | case 7: case 9: case 14: case 17: |
---|
789 | failureExit(WEXITSTATUS(status)); |
---|
790 | break; |
---|
791 | default: |
---|
792 | break; |
---|
793 | } |
---|
794 | |
---|
795 | /* PGB 08/20/02: We no longer retry connecting MAXFAIL |
---|
796 | times on a failed connect script unless RETRYCONNECT is |
---|
797 | true. */ |
---|
798 | if ((WEXITSTATUS(status) == 8) && |
---|
799 | !svTrueValue(ifcfg, "RETRYCONNECT", FALSE)) { |
---|
800 | failureExit(WEXITSTATUS(status)); |
---|
801 | } |
---|
802 | |
---|
803 | /* If we've never connected, or PERSIST is set, dial again, up |
---|
804 | * to MAXFAIL times. */ |
---|
805 | if ((WEXITSTATUS(status) == 8) || |
---|
806 | !connectedOnce || |
---|
807 | svTrueValue(ifcfg, "PERSIST", FALSE)) { |
---|
808 | /* If we've been connected (i.e., if we didn't force a redial, |
---|
809 | * but the connection went down) wait for DISCONNECTTIMEOUT |
---|
810 | * seconds before redialing. */ |
---|
811 | if (connectedOnce) { |
---|
812 | connectedOnce = FALSE; |
---|
813 | temp = svGetValue(ifcfg, "DISCONNECTTIMEOUT"); |
---|
814 | if (temp) { |
---|
815 | timeout = atoi(temp); |
---|
816 | free(temp); |
---|
817 | } else { |
---|
818 | timeout = 2; |
---|
819 | } |
---|
820 | } |
---|
821 | sigprocmask(SIG_UNBLOCK, &blockedsigs, NULL); |
---|
822 | sleep(timeout); |
---|
823 | sigprocmask(SIG_BLOCK, &blockedsigs, NULL); |
---|
824 | if (!theSigterm && |
---|
825 | !theSigint && |
---|
826 | !theSighup && |
---|
827 | !theSigio && |
---|
828 | !theSigchld && |
---|
829 | !theSigalrm) { |
---|
830 | fork_exec(FALSE, IFUP_PPP, "daemon", device, boot); |
---|
831 | } |
---|
832 | /* Reinitialize the retry timeout. */ |
---|
833 | temp = svGetValue(ifcfg, "RETRYTIMEOUT"); |
---|
834 | if (temp) { |
---|
835 | timeout = atoi(temp); |
---|
836 | free(temp); |
---|
837 | } else { |
---|
838 | timeout = 30; |
---|
839 | } |
---|
840 | // Scott Sharkey <ssharkey@linux-no-limits.com> |
---|
841 | // MAXFAIL Patch... |
---|
842 | temp = svGetValue(ifcfg, "MAXFAIL"); |
---|
843 | if (temp) { |
---|
844 | maxfail = atoi(temp); |
---|
845 | free(temp); |
---|
846 | } else { |
---|
847 | maxfail = 0; |
---|
848 | } |
---|
849 | if ( maxfail != 0 ) { |
---|
850 | dialCount++; |
---|
851 | if ( dialCount >= maxfail ) |
---|
852 | failureExit(WEXITSTATUS(status)); |
---|
853 | } |
---|
854 | } else { |
---|
855 | failureExit(WEXITSTATUS(status)); |
---|
856 | } |
---|
857 | } |
---|
858 | |
---|
859 | /* We timed out, and we're running at boot-time. */ |
---|
860 | if (theSigalrm) { |
---|
861 | failureExit(34); |
---|
862 | } |
---|
863 | } |
---|
864 | } |
---|