]> git.proxmox.com Git - qemu.git/blob - slirp/misc.c
slirp: Rework internal configuration
[qemu.git] / slirp / misc.c
1 /*
2 * Copyright (c) 1995 Danny Gasparovski.
3 *
4 * Please read the file COPYRIGHT for the
5 * terms and conditions of the copyright.
6 */
7
8 #include <slirp.h>
9
10 u_int curtime, time_fasttimo, last_slowtimo;
11
12 #if 0
13 int x_port = -1;
14 int x_display = 0;
15 int x_screen = 0;
16
17 int
18 show_x(buff, inso)
19 char *buff;
20 struct socket *inso;
21 {
22 if (x_port < 0) {
23 lprint("X Redir: X not being redirected.\r\n");
24 } else {
25 lprint("X Redir: In sh/bash/zsh/etc. type: DISPLAY=%s:%d.%d; export DISPLAY\r\n",
26 inet_ntoa(our_addr), x_port, x_screen);
27 lprint("X Redir: In csh/tcsh/etc. type: setenv DISPLAY %s:%d.%d\r\n",
28 inet_ntoa(our_addr), x_port, x_screen);
29 if (x_display)
30 lprint("X Redir: Redirecting to display %d\r\n", x_display);
31 }
32
33 return CFG_OK;
34 }
35
36
37 /*
38 * XXX Allow more than one X redirection?
39 */
40 void
41 redir_x(inaddr, start_port, display, screen)
42 u_int32_t inaddr;
43 int start_port;
44 int display;
45 int screen;
46 {
47 int i;
48
49 if (x_port >= 0) {
50 lprint("X Redir: X already being redirected.\r\n");
51 show_x(0, 0);
52 } else {
53 for (i = 6001 + (start_port-1); i <= 6100; i++) {
54 if (solisten(htons(i), inaddr, htons(6000 + display), 0)) {
55 /* Success */
56 x_port = i - 6000;
57 x_display = display;
58 x_screen = screen;
59 show_x(0, 0);
60 return;
61 }
62 }
63 lprint("X Redir: Error: Couldn't redirect a port for X. Weird.\r\n");
64 }
65 }
66 #endif
67
68 /*
69 * Get our IP address and put it in our_addr
70 */
71 void
72 getouraddr(void)
73 {
74 char buff[256];
75 struct hostent *he = NULL;
76
77 if (gethostname(buff,256) == 0)
78 he = gethostbyname(buff);
79 if (he)
80 our_addr = *(struct in_addr *)he->h_addr;
81 if (our_addr.s_addr == 0)
82 our_addr.s_addr = loopback_addr.s_addr;
83 }
84
85 struct quehead {
86 struct quehead *qh_link;
87 struct quehead *qh_rlink;
88 };
89
90 inline void
91 insque(void *a, void *b)
92 {
93 register struct quehead *element = (struct quehead *) a;
94 register struct quehead *head = (struct quehead *) b;
95 element->qh_link = head->qh_link;
96 head->qh_link = (struct quehead *)element;
97 element->qh_rlink = (struct quehead *)head;
98 ((struct quehead *)(element->qh_link))->qh_rlink
99 = (struct quehead *)element;
100 }
101
102 inline void
103 remque(void *a)
104 {
105 register struct quehead *element = (struct quehead *) a;
106 ((struct quehead *)(element->qh_link))->qh_rlink = element->qh_rlink;
107 ((struct quehead *)(element->qh_rlink))->qh_link = element->qh_link;
108 element->qh_rlink = NULL;
109 /* element->qh_link = NULL; TCP FIN1 crashes if you do this. Why ? */
110 }
111
112 /* #endif */
113
114
115 int add_exec(struct ex_list **ex_ptr, int do_pty, char *exec,
116 struct in_addr addr, int port)
117 {
118 struct ex_list *tmp_ptr;
119
120 /* First, check if the port is "bound" */
121 for (tmp_ptr = *ex_ptr; tmp_ptr; tmp_ptr = tmp_ptr->ex_next) {
122 if (port == tmp_ptr->ex_fport &&
123 addr.s_addr == tmp_ptr->ex_addr.s_addr)
124 return -1;
125 }
126
127 tmp_ptr = *ex_ptr;
128 *ex_ptr = (struct ex_list *)malloc(sizeof(struct ex_list));
129 (*ex_ptr)->ex_fport = port;
130 (*ex_ptr)->ex_addr = addr;
131 (*ex_ptr)->ex_pty = do_pty;
132 (*ex_ptr)->ex_exec = (do_pty == 3) ? exec : strdup(exec);
133 (*ex_ptr)->ex_next = tmp_ptr;
134 return 0;
135 }
136
137 #ifndef HAVE_STRERROR
138
139 /*
140 * For systems with no strerror
141 */
142
143 extern int sys_nerr;
144 extern char *sys_errlist[];
145
146 char *
147 strerror(error)
148 int error;
149 {
150 if (error < sys_nerr)
151 return sys_errlist[error];
152 else
153 return "Unknown error.";
154 }
155
156 #endif
157
158
159 #ifdef _WIN32
160
161 int
162 fork_exec(struct socket *so, const char *ex, int do_pty)
163 {
164 /* not implemented */
165 return 0;
166 }
167
168 #else
169
170 #ifndef CONFIG_QEMU
171 int
172 slirp_openpty(amaster, aslave)
173 int *amaster, *aslave;
174 {
175 register int master, slave;
176
177 #ifdef HAVE_GRANTPT
178 char *ptr;
179
180 if ((master = open("/dev/ptmx", O_RDWR)) < 0 ||
181 grantpt(master) < 0 ||
182 unlockpt(master) < 0 ||
183 (ptr = ptsname(master)) == NULL) {
184 close(master);
185 return -1;
186 }
187
188 if ((slave = open(ptr, O_RDWR)) < 0 ||
189 ioctl(slave, I_PUSH, "ptem") < 0 ||
190 ioctl(slave, I_PUSH, "ldterm") < 0 ||
191 ioctl(slave, I_PUSH, "ttcompat") < 0) {
192 close(master);
193 close(slave);
194 return -1;
195 }
196
197 *amaster = master;
198 *aslave = slave;
199 return 0;
200
201 #else
202
203 static char line[] = "/dev/ptyXX";
204 register const char *cp1, *cp2;
205
206 for (cp1 = "pqrsPQRS"; *cp1; cp1++) {
207 line[8] = *cp1;
208 for (cp2 = "0123456789abcdefghijklmnopqrstuv"; *cp2; cp2++) {
209 line[9] = *cp2;
210 if ((master = open(line, O_RDWR, 0)) == -1) {
211 if (errno == ENOENT)
212 return (-1); /* out of ptys */
213 } else {
214 line[5] = 't';
215 /* These will fail */
216 (void) chown(line, getuid(), 0);
217 (void) chmod(line, S_IRUSR|S_IWUSR|S_IWGRP);
218 #ifdef HAVE_REVOKE
219 (void) revoke(line);
220 #endif
221 if ((slave = open(line, O_RDWR, 0)) != -1) {
222 *amaster = master;
223 *aslave = slave;
224 return 0;
225 }
226 (void) close(master);
227 line[5] = 'p';
228 }
229 }
230 }
231 errno = ENOENT; /* out of ptys */
232 return (-1);
233 #endif
234 }
235 #endif
236
237 /*
238 * XXX This is ugly
239 * We create and bind a socket, then fork off to another
240 * process, which connects to this socket, after which we
241 * exec the wanted program. If something (strange) happens,
242 * the accept() call could block us forever.
243 *
244 * do_pty = 0 Fork/exec inetd style
245 * do_pty = 1 Fork/exec using slirp.telnetd
246 * do_ptr = 2 Fork/exec using pty
247 */
248 int
249 fork_exec(struct socket *so, const char *ex, int do_pty)
250 {
251 int s;
252 struct sockaddr_in addr;
253 socklen_t addrlen = sizeof(addr);
254 int opt;
255 int master = -1;
256 const char *argv[256];
257 #if 0
258 char buff[256];
259 #endif
260 /* don't want to clobber the original */
261 char *bptr;
262 const char *curarg;
263 int c, i, ret;
264
265 DEBUG_CALL("fork_exec");
266 DEBUG_ARG("so = %lx", (long)so);
267 DEBUG_ARG("ex = %lx", (long)ex);
268 DEBUG_ARG("do_pty = %lx", (long)do_pty);
269
270 if (do_pty == 2) {
271 #if 0
272 if (slirp_openpty(&master, &s) == -1) {
273 lprint("Error: openpty failed: %s\n", strerror(errno));
274 return 0;
275 }
276 #else
277 return 0;
278 #endif
279 } else {
280 addr.sin_family = AF_INET;
281 addr.sin_port = 0;
282 addr.sin_addr.s_addr = INADDR_ANY;
283
284 if ((s = socket(AF_INET, SOCK_STREAM, 0)) < 0 ||
285 bind(s, (struct sockaddr *)&addr, addrlen) < 0 ||
286 listen(s, 1) < 0) {
287 lprint("Error: inet socket: %s\n", strerror(errno));
288 closesocket(s);
289
290 return 0;
291 }
292 }
293
294 switch(fork()) {
295 case -1:
296 lprint("Error: fork failed: %s\n", strerror(errno));
297 close(s);
298 if (do_pty == 2)
299 close(master);
300 return 0;
301
302 case 0:
303 /* Set the DISPLAY */
304 if (do_pty == 2) {
305 (void) close(master);
306 #ifdef TIOCSCTTY /* XXXXX */
307 (void) setsid();
308 ioctl(s, TIOCSCTTY, (char *)NULL);
309 #endif
310 } else {
311 getsockname(s, (struct sockaddr *)&addr, &addrlen);
312 close(s);
313 /*
314 * Connect to the socket
315 * XXX If any of these fail, we're in trouble!
316 */
317 s = socket(AF_INET, SOCK_STREAM, 0);
318 addr.sin_addr = loopback_addr;
319 do {
320 ret = connect(s, (struct sockaddr *)&addr, addrlen);
321 } while (ret < 0 && errno == EINTR);
322 }
323
324 #if 0
325 if (x_port >= 0) {
326 #ifdef HAVE_SETENV
327 sprintf(buff, "%s:%d.%d", inet_ntoa(our_addr), x_port, x_screen);
328 setenv("DISPLAY", buff, 1);
329 #else
330 sprintf(buff, "DISPLAY=%s:%d.%d", inet_ntoa(our_addr), x_port, x_screen);
331 putenv(buff);
332 #endif
333 }
334 #endif
335 dup2(s, 0);
336 dup2(s, 1);
337 dup2(s, 2);
338 for (s = getdtablesize() - 1; s >= 3; s--)
339 close(s);
340
341 i = 0;
342 bptr = strdup(ex); /* No need to free() this */
343 if (do_pty == 1) {
344 /* Setup "slirp.telnetd -x" */
345 argv[i++] = "slirp.telnetd";
346 argv[i++] = "-x";
347 argv[i++] = bptr;
348 } else
349 do {
350 /* Change the string into argv[] */
351 curarg = bptr;
352 while (*bptr != ' ' && *bptr != (char)0)
353 bptr++;
354 c = *bptr;
355 *bptr++ = (char)0;
356 argv[i++] = strdup(curarg);
357 } while (c);
358
359 argv[i] = NULL;
360 execvp(argv[0], (char **)argv);
361
362 /* Ooops, failed, let's tell the user why */
363 {
364 char buff[256];
365
366 snprintf(buff, sizeof(buff),
367 "Error: execvp of %s failed: %s\n",
368 argv[0], strerror(errno));
369 write(2, buff, strlen(buff)+1);
370 }
371 close(0); close(1); close(2); /* XXX */
372 exit(1);
373
374 default:
375 if (do_pty == 2) {
376 close(s);
377 so->s = master;
378 } else {
379 /*
380 * XXX this could block us...
381 * XXX Should set a timer here, and if accept() doesn't
382 * return after X seconds, declare it a failure
383 * The only reason this will block forever is if socket()
384 * of connect() fail in the child process
385 */
386 do {
387 so->s = accept(s, (struct sockaddr *)&addr, &addrlen);
388 } while (so->s < 0 && errno == EINTR);
389 closesocket(s);
390 opt = 1;
391 setsockopt(so->s,SOL_SOCKET,SO_REUSEADDR,(char *)&opt,sizeof(int));
392 opt = 1;
393 setsockopt(so->s,SOL_SOCKET,SO_OOBINLINE,(char *)&opt,sizeof(int));
394 }
395 fd_nonblock(so->s);
396
397 /* Append the telnet options now */
398 if (so->so_m != NULL && do_pty == 1) {
399 sbappend(so, so->so_m);
400 so->so_m = NULL;
401 }
402
403 return 1;
404 }
405 }
406 #endif
407
408 #ifndef HAVE_STRDUP
409 char *
410 strdup(str)
411 const char *str;
412 {
413 char *bptr;
414
415 bptr = (char *)malloc(strlen(str)+1);
416 strcpy(bptr, str);
417
418 return bptr;
419 }
420 #endif
421
422 #if 0
423 void
424 snooze_hup(num)
425 int num;
426 {
427 int s, ret;
428 #ifndef NO_UNIX_SOCKETS
429 struct sockaddr_un sock_un;
430 #endif
431 struct sockaddr_in sock_in;
432 char buff[256];
433
434 ret = -1;
435 if (slirp_socket_passwd) {
436 s = socket(AF_INET, SOCK_STREAM, 0);
437 if (s < 0)
438 slirp_exit(1);
439 sock_in.sin_family = AF_INET;
440 sock_in.sin_addr.s_addr = slirp_socket_addr;
441 sock_in.sin_port = htons(slirp_socket_port);
442 if (connect(s, (struct sockaddr *)&sock_in, sizeof(sock_in)) != 0)
443 slirp_exit(1); /* just exit...*/
444 sprintf(buff, "kill %s:%d", slirp_socket_passwd, slirp_socket_unit);
445 write(s, buff, strlen(buff)+1);
446 }
447 #ifndef NO_UNIX_SOCKETS
448 else {
449 s = socket(AF_UNIX, SOCK_STREAM, 0);
450 if (s < 0)
451 slirp_exit(1);
452 sock_un.sun_family = AF_UNIX;
453 strcpy(sock_un.sun_path, socket_path);
454 if (connect(s, (struct sockaddr *)&sock_un,
455 sizeof(sock_un.sun_family) + sizeof(sock_un.sun_path)) != 0)
456 slirp_exit(1);
457 sprintf(buff, "kill none:%d", slirp_socket_unit);
458 write(s, buff, strlen(buff)+1);
459 }
460 #endif
461 slirp_exit(0);
462 }
463
464
465 void
466 snooze()
467 {
468 sigset_t s;
469 int i;
470
471 /* Don't need our data anymore */
472 /* XXX This makes SunOS barf */
473 /* brk(0); */
474
475 /* Close all fd's */
476 for (i = 255; i >= 0; i--)
477 close(i);
478
479 signal(SIGQUIT, slirp_exit);
480 signal(SIGHUP, snooze_hup);
481 sigemptyset(&s);
482
483 /* Wait for any signal */
484 sigsuspend(&s);
485
486 /* Just in case ... */
487 exit(255);
488 }
489
490 void
491 relay(s)
492 int s;
493 {
494 char buf[8192];
495 int n;
496 fd_set readfds;
497 struct ttys *ttyp;
498
499 /* Don't need our data anymore */
500 /* XXX This makes SunOS barf */
501 /* brk(0); */
502
503 signal(SIGQUIT, slirp_exit);
504 signal(SIGHUP, slirp_exit);
505 signal(SIGINT, slirp_exit);
506 signal(SIGTERM, slirp_exit);
507
508 /* Fudge to get term_raw and term_restore to work */
509 if (NULL == (ttyp = tty_attach (0, slirp_tty))) {
510 lprint ("Error: tty_attach failed in misc.c:relay()\r\n");
511 slirp_exit (1);
512 }
513 ttyp->fd = 0;
514 ttyp->flags |= TTY_CTTY;
515 term_raw(ttyp);
516
517 while (1) {
518 FD_ZERO(&readfds);
519
520 FD_SET(0, &readfds);
521 FD_SET(s, &readfds);
522
523 n = select(s+1, &readfds, (fd_set *)0, (fd_set *)0, (struct timeval *)0);
524
525 if (n <= 0)
526 slirp_exit(0);
527
528 if (FD_ISSET(0, &readfds)) {
529 n = read(0, buf, 8192);
530 if (n <= 0)
531 slirp_exit(0);
532 n = writen(s, buf, n);
533 if (n <= 0)
534 slirp_exit(0);
535 }
536
537 if (FD_ISSET(s, &readfds)) {
538 n = read(s, buf, 8192);
539 if (n <= 0)
540 slirp_exit(0);
541 n = writen(0, buf, n);
542 if (n <= 0)
543 slirp_exit(0);
544 }
545 }
546
547 /* Just in case.... */
548 exit(1);
549 }
550 #endif
551
552 #ifdef CONFIG_QEMU
553 #include "monitor.h"
554
555 void lprint(const char *format, ...)
556 {
557 va_list args;
558
559 va_start(args, format);
560 monitor_vprintf(cur_mon, format, args);
561 va_end(args);
562 }
563 #else
564 int (*lprint_print) _P((void *, const char *, va_list));
565 char *lprint_ptr, *lprint_ptr2, **lprint_arg;
566
567 void
568 #ifdef __STDC__
569 lprint(const char *format, ...)
570 #else
571 lprint(va_alist) va_dcl
572 #endif
573 {
574 va_list args;
575
576 #ifdef __STDC__
577 va_start(args, format);
578 #else
579 char *format;
580 va_start(args);
581 format = va_arg(args, char *);
582 #endif
583 #if 0
584 /* If we're printing to an sbuf, make sure there's enough room */
585 /* XXX +100? */
586 if (lprint_sb) {
587 if ((lprint_ptr - lprint_sb->sb_wptr) >=
588 (lprint_sb->sb_datalen - (strlen(format) + 100))) {
589 int deltaw = lprint_sb->sb_wptr - lprint_sb->sb_data;
590 int deltar = lprint_sb->sb_rptr - lprint_sb->sb_data;
591 int deltap = lprint_ptr - lprint_sb->sb_data;
592
593 lprint_sb->sb_data = (char *)realloc(lprint_sb->sb_data,
594 lprint_sb->sb_datalen + TCP_SNDSPACE);
595
596 /* Adjust all values */
597 lprint_sb->sb_wptr = lprint_sb->sb_data + deltaw;
598 lprint_sb->sb_rptr = lprint_sb->sb_data + deltar;
599 lprint_ptr = lprint_sb->sb_data + deltap;
600
601 lprint_sb->sb_datalen += TCP_SNDSPACE;
602 }
603 }
604 #endif
605 if (lprint_print)
606 lprint_ptr += (*lprint_print)(*lprint_arg, format, args);
607
608 /* Check if they want output to be logged to file as well */
609 if (lfd) {
610 /*
611 * Remove \r's
612 * otherwise you'll get ^M all over the file
613 */
614 int len = strlen(format);
615 char *bptr1, *bptr2;
616
617 bptr1 = bptr2 = strdup(format);
618
619 while (len--) {
620 if (*bptr1 == '\r')
621 memcpy(bptr1, bptr1+1, len+1);
622 else
623 bptr1++;
624 }
625 vfprintf(lfd, bptr2, args);
626 free(bptr2);
627 }
628 va_end(args);
629 }
630
631 void
632 add_emu(buff)
633 char *buff;
634 {
635 u_int lport, fport;
636 u_int8_t tos = 0, emu = 0;
637 char buff1[256], buff2[256], buff4[128];
638 char *buff3 = buff4;
639 struct emu_t *emup;
640 struct socket *so;
641
642 if (sscanf(buff, "%256s %256s", buff2, buff1) != 2) {
643 lprint("Error: Bad arguments\r\n");
644 return;
645 }
646
647 if (sscanf(buff1, "%d:%d", &lport, &fport) != 2) {
648 lport = 0;
649 if (sscanf(buff1, "%d", &fport) != 1) {
650 lprint("Error: Bad first argument\r\n");
651 return;
652 }
653 }
654
655 if (sscanf(buff2, "%128[^:]:%128s", buff1, buff3) != 2) {
656 buff3 = 0;
657 if (sscanf(buff2, "%256s", buff1) != 1) {
658 lprint("Error: Bad second argument\r\n");
659 return;
660 }
661 }
662
663 if (buff3) {
664 if (strcmp(buff3, "lowdelay") == 0)
665 tos = IPTOS_LOWDELAY;
666 else if (strcmp(buff3, "throughput") == 0)
667 tos = IPTOS_THROUGHPUT;
668 else {
669 lprint("Error: Expecting \"lowdelay\"/\"throughput\"\r\n");
670 return;
671 }
672 }
673
674 if (strcmp(buff1, "ftp") == 0)
675 emu = EMU_FTP;
676 else if (strcmp(buff1, "irc") == 0)
677 emu = EMU_IRC;
678 else if (strcmp(buff1, "none") == 0)
679 emu = EMU_NONE; /* ie: no emulation */
680 else {
681 lprint("Error: Unknown service\r\n");
682 return;
683 }
684
685 /* First, check that it isn't already emulated */
686 for (emup = tcpemu; emup; emup = emup->next) {
687 if (emup->lport == lport && emup->fport == fport) {
688 lprint("Error: port already emulated\r\n");
689 return;
690 }
691 }
692
693 /* link it */
694 emup = (struct emu_t *)malloc(sizeof (struct emu_t));
695 emup->lport = (u_int16_t)lport;
696 emup->fport = (u_int16_t)fport;
697 emup->tos = tos;
698 emup->emu = emu;
699 emup->next = tcpemu;
700 tcpemu = emup;
701
702 /* And finally, mark all current sessions, if any, as being emulated */
703 for (so = tcb.so_next; so != &tcb; so = so->so_next) {
704 if ((lport && lport == ntohs(so->so_lport)) ||
705 (fport && fport == ntohs(so->so_fport))) {
706 if (emu)
707 so->so_emu = emu;
708 if (tos)
709 so->so_iptos = tos;
710 }
711 }
712
713 lprint("Adding emulation for %s to port %d/%d\r\n", buff1, emup->lport, emup->fport);
714 }
715 #endif
716
717 #ifdef BAD_SPRINTF
718
719 #undef vsprintf
720 #undef sprintf
721
722 /*
723 * Some BSD-derived systems have a sprintf which returns char *
724 */
725
726 int
727 vsprintf_len(string, format, args)
728 char *string;
729 const char *format;
730 va_list args;
731 {
732 vsprintf(string, format, args);
733 return strlen(string);
734 }
735
736 int
737 #ifdef __STDC__
738 sprintf_len(char *string, const char *format, ...)
739 #else
740 sprintf_len(va_alist) va_dcl
741 #endif
742 {
743 va_list args;
744 #ifdef __STDC__
745 va_start(args, format);
746 #else
747 char *string;
748 char *format;
749 va_start(args);
750 string = va_arg(args, char *);
751 format = va_arg(args, char *);
752 #endif
753 vsprintf(string, format, args);
754 return strlen(string);
755 }
756
757 #endif
758
759 void
760 u_sleep(int usec)
761 {
762 struct timeval t;
763 fd_set fdset;
764
765 FD_ZERO(&fdset);
766
767 t.tv_sec = 0;
768 t.tv_usec = usec * 1000;
769
770 select(0, &fdset, &fdset, &fdset, &t);
771 }
772
773 /*
774 * Set fd blocking and non-blocking
775 */
776
777 void
778 fd_nonblock(int fd)
779 {
780 #ifdef FIONBIO
781 #ifdef _WIN32
782 unsigned long opt = 1;
783 #else
784 int opt = 1;
785 #endif
786
787 ioctlsocket(fd, FIONBIO, &opt);
788 #else
789 int opt;
790
791 opt = fcntl(fd, F_GETFL, 0);
792 opt |= O_NONBLOCK;
793 fcntl(fd, F_SETFL, opt);
794 #endif
795 }
796
797 void
798 fd_block(int fd)
799 {
800 #ifdef FIONBIO
801 #ifdef _WIN32
802 unsigned long opt = 0;
803 #else
804 int opt = 0;
805 #endif
806
807 ioctlsocket(fd, FIONBIO, &opt);
808 #else
809 int opt;
810
811 opt = fcntl(fd, F_GETFL, 0);
812 opt &= ~O_NONBLOCK;
813 fcntl(fd, F_SETFL, opt);
814 #endif
815 }
816
817
818 #if 0
819 /*
820 * invoke RSH
821 */
822 int
823 rsh_exec(so,ns, user, host, args)
824 struct socket *so;
825 struct socket *ns;
826 char *user;
827 char *host;
828 char *args;
829 {
830 int fd[2];
831 int fd0[2];
832 int s;
833 char buff[256];
834
835 DEBUG_CALL("rsh_exec");
836 DEBUG_ARG("so = %lx", (long)so);
837
838 if (pipe(fd)<0) {
839 lprint("Error: pipe failed: %s\n", strerror(errno));
840 return 0;
841 }
842 /* #ifdef HAVE_SOCKETPAIR */
843 #if 1
844 if (socketpair(PF_UNIX,SOCK_STREAM,0, fd0) == -1) {
845 close(fd[0]);
846 close(fd[1]);
847 lprint("Error: openpty failed: %s\n", strerror(errno));
848 return 0;
849 }
850 #else
851 if (slirp_openpty(&fd0[0], &fd0[1]) == -1) {
852 close(fd[0]);
853 close(fd[1]);
854 lprint("Error: openpty failed: %s\n", strerror(errno));
855 return 0;
856 }
857 #endif
858
859 switch(fork()) {
860 case -1:
861 lprint("Error: fork failed: %s\n", strerror(errno));
862 close(fd[0]);
863 close(fd[1]);
864 close(fd0[0]);
865 close(fd0[1]);
866 return 0;
867
868 case 0:
869 close(fd[0]);
870 close(fd0[0]);
871
872 /* Set the DISPLAY */
873 if (x_port >= 0) {
874 #ifdef HAVE_SETENV
875 sprintf(buff, "%s:%d.%d", inet_ntoa(our_addr), x_port, x_screen);
876 setenv("DISPLAY", buff, 1);
877 #else
878 sprintf(buff, "DISPLAY=%s:%d.%d", inet_ntoa(our_addr), x_port, x_screen);
879 putenv(buff);
880 #endif
881 }
882
883 dup2(fd0[1], 0);
884 dup2(fd0[1], 1);
885 dup2(fd[1], 2);
886 for (s = 3; s <= 255; s++)
887 close(s);
888
889 execlp("rsh","rsh","-l", user, host, args, NULL);
890
891 /* Ooops, failed, let's tell the user why */
892
893 sprintf(buff, "Error: execlp of %s failed: %s\n",
894 "rsh", strerror(errno));
895 write(2, buff, strlen(buff)+1);
896 close(0); close(1); close(2); /* XXX */
897 exit(1);
898
899 default:
900 close(fd[1]);
901 close(fd0[1]);
902 ns->s=fd[0];
903 so->s=fd0[0];
904
905 return 1;
906 }
907 }
908 #endif