2012-01-30 22:29:59 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* netutils/telnetd/telnetd_daemon.c
|
|
|
|
*
|
2017-06-27 17:14:13 +02:00
|
|
|
* Copyright (C) 2012, 2017 Gregory Nutt. All rights reserved.
|
2012-09-13 18:58:49 +02:00
|
|
|
* Author: Gregory Nutt <gnutt@nuttx.org>
|
2012-01-30 22:29:59 +01:00
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in
|
|
|
|
* the documentation and/or other materials provided with the
|
|
|
|
* distribution.
|
|
|
|
* 3. Neither the name Gregory Nutt nor the names of its contributors may be
|
|
|
|
* used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
|
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
|
|
|
* COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
|
|
|
|
* OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
|
|
|
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
|
|
|
|
* ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/socket.h>
|
2015-12-07 20:51:37 +01:00
|
|
|
#include <sys/ioctl.h>
|
2012-01-30 22:29:59 +01:00
|
|
|
|
2020-02-03 09:54:54 +01:00
|
|
|
#include <inttypes.h>
|
2012-01-30 22:29:59 +01:00
|
|
|
#include <stdint.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <fcntl.h>
|
2017-06-27 17:14:13 +02:00
|
|
|
#include <string.h>
|
2015-01-22 13:33:55 +01:00
|
|
|
#include <signal.h>
|
2012-01-30 22:29:59 +01:00
|
|
|
#include <semaphore.h>
|
|
|
|
#include <sched.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <debug.h>
|
2014-10-09 00:23:48 +02:00
|
|
|
|
2012-01-30 22:29:59 +01:00
|
|
|
#include <netinet/in.h>
|
2014-10-09 00:23:48 +02:00
|
|
|
#include <arpa/inet.h>
|
2012-01-30 22:29:59 +01:00
|
|
|
|
2015-12-07 16:29:29 +01:00
|
|
|
#include <nuttx/net/telnet.h>
|
|
|
|
|
2016-07-11 18:11:18 +02:00
|
|
|
#include "netutils/telnetd.h"
|
|
|
|
#include "netutils/netlib.h"
|
2012-01-30 22:29:59 +01:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Types
|
|
|
|
****************************************************************************/
|
|
|
|
|
2015-12-07 16:29:29 +01:00
|
|
|
/* This structure represents the overall state of one telnet daemon instance
|
|
|
|
* (Yes, multiple telnet daemons are supported).
|
|
|
|
*/
|
|
|
|
|
|
|
|
struct telnetd_s
|
|
|
|
{
|
2017-06-27 17:14:13 +02:00
|
|
|
uint16_t port; /* The port to listen on (in network byte order) */
|
|
|
|
sa_family_t family; /* Address family */
|
|
|
|
uint8_t priority; /* The execution priority of the spawned task, */
|
|
|
|
size_t stacksize; /* The stack size needed by the spawned task */
|
2015-12-07 16:29:29 +01:00
|
|
|
main_t entry; /* The entrypoint of the task to spawn when a new
|
|
|
|
* connection is accepted. */
|
|
|
|
};
|
|
|
|
|
2012-01-30 22:29:59 +01:00
|
|
|
/****************************************************************************
|
2020-02-03 10:11:41 +01:00
|
|
|
* Private Functions
|
2012-01-30 22:29:59 +01:00
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: telnetd_daemon
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* This function is the Telnet daemon. It does not return (unless an
|
|
|
|
* error occurs).
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* Standard task start up arguments.
|
|
|
|
*
|
|
|
|
* Return:
|
|
|
|
* Does not return unless an error occurs.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2020-02-03 09:54:54 +01:00
|
|
|
static int telnetd_daemon(int argc, FAR char *argv[])
|
2012-01-30 22:29:59 +01:00
|
|
|
{
|
|
|
|
FAR struct telnetd_s *daemon;
|
2017-06-27 17:14:13 +02:00
|
|
|
union
|
|
|
|
{
|
|
|
|
struct sockaddr generic;
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
struct sockaddr_in ipv4;
|
|
|
|
#endif
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
struct sockaddr_in6 ipv6;
|
|
|
|
#endif
|
|
|
|
} addr;
|
2020-07-11 19:23:09 +02:00
|
|
|
|
2015-12-07 20:51:37 +01:00
|
|
|
struct telnet_session_s session;
|
2014-07-11 20:30:23 +02:00
|
|
|
#ifdef CONFIG_NET_SOLINGER
|
2012-01-30 22:29:59 +01:00
|
|
|
struct linger ling;
|
|
|
|
#endif
|
2015-01-22 13:33:55 +01:00
|
|
|
#ifdef CONFIG_SCHED_HAVE_PARENT
|
|
|
|
struct sigaction sa;
|
|
|
|
sigset_t blockset;
|
2015-01-22 13:51:31 +01:00
|
|
|
#endif
|
2012-01-30 22:29:59 +01:00
|
|
|
socklen_t addrlen;
|
|
|
|
pid_t pid;
|
|
|
|
int listensd;
|
|
|
|
int acceptsd;
|
|
|
|
int drvrfd;
|
2020-02-08 17:24:16 +01:00
|
|
|
#ifdef CONFIG_NET_SOCKOPTS
|
2012-01-30 22:29:59 +01:00
|
|
|
int optval;
|
2020-02-08 17:24:16 +01:00
|
|
|
#endif
|
2015-12-07 20:51:37 +01:00
|
|
|
int ret;
|
|
|
|
int fd;
|
2012-01-30 22:29:59 +01:00
|
|
|
|
|
|
|
/* Get daemon startup info */
|
|
|
|
|
2020-02-03 09:54:54 +01:00
|
|
|
daemon = (FAR struct telnetd_s *)((uintptr_t)strtoul(argv[1], NULL, 0));
|
2012-01-30 22:29:59 +01:00
|
|
|
DEBUGASSERT(daemon != NULL);
|
|
|
|
|
2015-01-22 13:33:55 +01:00
|
|
|
#ifdef CONFIG_SCHED_HAVE_PARENT
|
|
|
|
/* Call sigaction with the SA_NOCLDWAIT flag so that we do not transform
|
|
|
|
* children into "zombies" when they terminate: Child exit status will
|
|
|
|
* not be retained.
|
|
|
|
*
|
|
|
|
* NOTE: If the SA_NOCLDWAIT flag is set when establishing a handler for
|
|
|
|
* SIGCHLD, POSIX.1 leaves it unspecified whether a SIGCHLD signal is
|
|
|
|
* generated when a child process terminates. On both Linux and NuttX, a
|
|
|
|
* SIGCHLD signal will be generated in this case.
|
|
|
|
*/
|
|
|
|
|
|
|
|
sa.sa_handler = SIG_IGN;
|
|
|
|
sa.sa_flags = SA_NOCLDWAIT;
|
|
|
|
if (sigaction(SIGCHLD, &sa, NULL) < 0)
|
|
|
|
{
|
2020-02-03 10:16:49 +01:00
|
|
|
nerr("ERROR: sigaction failed: %d\n", errno);
|
|
|
|
goto errout_with_daemon;
|
2015-01-22 13:33:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Block receipt of the SIGCHLD signal */
|
|
|
|
|
|
|
|
sigemptyset(&blockset);
|
|
|
|
sigaddset(&blockset, SIGCHLD);
|
|
|
|
if (sigprocmask(SIG_BLOCK, &blockset, NULL) < 0)
|
|
|
|
{
|
2020-02-03 10:16:49 +01:00
|
|
|
nerr("ERROR: sigprocmask failed: %d\n", errno);
|
|
|
|
goto errout_with_daemon;
|
2015-01-22 13:33:55 +01:00
|
|
|
}
|
|
|
|
#endif /* CONFIG_SCHED_HAVE_PARENT */
|
|
|
|
|
2012-01-30 22:29:59 +01:00
|
|
|
/* Create a new TCP socket to use to listen for connections */
|
|
|
|
|
2017-06-27 17:14:13 +02:00
|
|
|
listensd = socket(daemon->family, SOCK_STREAM, 0);
|
2012-01-30 22:29:59 +01:00
|
|
|
if (listensd < 0)
|
|
|
|
{
|
2017-06-27 17:14:13 +02:00
|
|
|
nerr("ERROR: socket() failed for family %u: %d\n",
|
2020-02-03 10:16:49 +01:00
|
|
|
daemon->family, errno);
|
|
|
|
goto errout_with_daemon;
|
2012-01-30 22:29:59 +01:00
|
|
|
}
|
|
|
|
|
2020-02-08 17:16:13 +01:00
|
|
|
#ifdef CONFIG_NET_SOCKOPTS
|
2012-01-30 22:29:59 +01:00
|
|
|
/* Set socket to reuse address */
|
|
|
|
|
|
|
|
optval = 1;
|
2020-02-03 14:35:37 +01:00
|
|
|
if (setsockopt(listensd, SOL_SOCKET, SO_REUSEADDR,
|
|
|
|
(FAR void *)&optval, sizeof(int)) < 0)
|
2012-01-30 22:29:59 +01:00
|
|
|
{
|
2016-06-11 23:51:27 +02:00
|
|
|
nerr("ERROR: setsockopt SO_REUSEADDR failure: %d\n", errno);
|
2012-01-30 22:29:59 +01:00
|
|
|
goto errout_with_socket;
|
|
|
|
}
|
2020-02-08 17:16:13 +01:00
|
|
|
#endif
|
2012-01-30 22:29:59 +01:00
|
|
|
|
|
|
|
/* Bind the socket to a local address */
|
|
|
|
|
2017-06-27 17:14:13 +02:00
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
if (daemon->family == AF_INET)
|
|
|
|
{
|
|
|
|
addr.ipv4.sin_family = AF_INET;
|
|
|
|
addr.ipv4.sin_port = daemon->port;
|
|
|
|
addr.ipv4.sin_addr.s_addr = INADDR_ANY;
|
|
|
|
addrlen = sizeof(struct sockaddr_in);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
if (daemon->family == AF_INET6)
|
|
|
|
{
|
|
|
|
addr.ipv6.sin6_family = AF_INET6;
|
|
|
|
addr.ipv6.sin6_port = daemon->port;
|
|
|
|
addrlen = sizeof(struct sockaddr_in6);
|
|
|
|
|
2020-07-11 19:23:09 +02:00
|
|
|
memset(addr.ipv6.sin6_addr.s6_addr, 0,
|
|
|
|
sizeof(addr.ipv6.sin6_addr.s6_addr));
|
2017-06-27 17:14:13 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
nerr("ERROR: Unsupported address family: %u", daemon->family);
|
|
|
|
goto errout_with_socket;
|
|
|
|
}
|
2012-01-30 22:29:59 +01:00
|
|
|
|
2017-06-27 17:14:13 +02:00
|
|
|
if (bind(listensd, &addr.generic, addrlen) < 0)
|
2012-01-30 22:29:59 +01:00
|
|
|
{
|
2016-06-11 23:51:27 +02:00
|
|
|
nerr("ERROR: bind failure: %d\n", errno);
|
2012-01-30 22:29:59 +01:00
|
|
|
goto errout_with_socket;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Listen for connections on the bound TCP socket */
|
|
|
|
|
|
|
|
if (listen(listensd, 5) < 0)
|
|
|
|
{
|
2016-06-11 23:51:27 +02:00
|
|
|
nerr("ERROR: listen failure %d\n", errno);
|
2012-01-30 22:29:59 +01:00
|
|
|
goto errout_with_socket;
|
|
|
|
}
|
|
|
|
|
2016-06-20 20:39:46 +02:00
|
|
|
/* Now go silent. */
|
2012-01-30 22:29:59 +01:00
|
|
|
|
2016-06-11 22:13:39 +02:00
|
|
|
#ifndef CONFIG_DEBUG_FEATURES
|
2012-01-30 22:29:59 +01:00
|
|
|
close(0);
|
|
|
|
close(1);
|
|
|
|
close(2);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Begin accepting connections */
|
|
|
|
|
2020-02-03 14:35:37 +01:00
|
|
|
for (; ; )
|
2012-01-30 22:29:59 +01:00
|
|
|
{
|
2019-06-03 17:07:07 +02:00
|
|
|
socklen_t accptlen;
|
|
|
|
|
2016-06-20 19:48:15 +02:00
|
|
|
ninfo("Accepting connections on port %d\n", ntohs(daemon->port));
|
2012-01-30 22:29:59 +01:00
|
|
|
|
2019-06-03 17:07:07 +02:00
|
|
|
accptlen = sizeof(addr);
|
2017-06-27 17:14:13 +02:00
|
|
|
acceptsd = accept(listensd, &addr.generic, &accptlen);
|
2012-01-30 22:29:59 +01:00
|
|
|
if (acceptsd < 0)
|
|
|
|
{
|
2015-01-22 13:33:55 +01:00
|
|
|
/* Just continue if a signal was received */
|
|
|
|
|
2020-02-03 10:11:41 +01:00
|
|
|
if (errno == EINTR)
|
2015-01-22 13:33:55 +01:00
|
|
|
{
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2020-02-03 10:11:41 +01:00
|
|
|
nerr("ERROR: accept failed: %d\n", errno);
|
2015-01-22 13:33:55 +01:00
|
|
|
goto errout_with_socket;
|
|
|
|
}
|
2012-01-30 22:29:59 +01:00
|
|
|
}
|
|
|
|
|
2020-02-08 17:16:13 +01:00
|
|
|
#ifdef CONFIG_NET_SOLINGER
|
2020-07-11 19:23:09 +02:00
|
|
|
/* Configure to "linger" until all data is sent when the socket is
|
|
|
|
* closed
|
|
|
|
*/
|
2012-01-30 22:29:59 +01:00
|
|
|
|
|
|
|
ling.l_onoff = 1;
|
|
|
|
ling.l_linger = 30; /* timeout is seconds */
|
2020-07-11 19:23:09 +02:00
|
|
|
if (setsockopt(acceptsd, SOL_SOCKET, SO_LINGER,
|
|
|
|
&ling, sizeof(struct linger)) < 0)
|
2012-01-30 22:29:59 +01:00
|
|
|
{
|
2016-06-20 20:39:46 +02:00
|
|
|
nerr("ERROR: setsockopt failed: %d\n", errno);
|
2012-01-30 22:29:59 +01:00
|
|
|
goto errout_with_acceptsd;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2015-12-07 20:51:37 +01:00
|
|
|
/* Open the Telnet factory */
|
|
|
|
|
|
|
|
fd = open("/dev/telnet", O_RDONLY);
|
|
|
|
if (fd < 0)
|
|
|
|
{
|
2016-06-20 20:39:46 +02:00
|
|
|
nerr("ERROR: open(/dev/telnet) failed: %d\n", errno);
|
2015-12-07 20:51:37 +01:00
|
|
|
goto errout_with_acceptsd;
|
|
|
|
}
|
|
|
|
|
2012-01-30 22:29:59 +01:00
|
|
|
/* Create a character device to "wrap" the accepted socket descriptor */
|
|
|
|
|
2016-06-20 19:48:15 +02:00
|
|
|
ninfo("Creating the telnet driver\n");
|
2015-12-07 20:51:37 +01:00
|
|
|
|
|
|
|
session.ts_sd = acceptsd;
|
|
|
|
session.ts_devpath[0] = '\0';
|
|
|
|
|
|
|
|
ret = ioctl(fd, SIOCTELNET, (unsigned long)((uintptr_t)&session));
|
|
|
|
close(fd);
|
|
|
|
|
|
|
|
if (ret < 0)
|
2012-01-30 22:29:59 +01:00
|
|
|
{
|
2016-06-20 20:39:46 +02:00
|
|
|
nerr("ERROR: open(/dev/telnet) failed: %d\n", errno);
|
2012-01-30 22:29:59 +01:00
|
|
|
goto errout_with_acceptsd;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Open the driver */
|
|
|
|
|
2016-06-20 19:48:15 +02:00
|
|
|
ninfo("Opening the telnet driver at %s\n", session.ts_devpath);
|
2015-12-07 20:51:37 +01:00
|
|
|
drvrfd = open(session.ts_devpath, O_RDWR);
|
2012-01-30 22:29:59 +01:00
|
|
|
if (drvrfd < 0)
|
|
|
|
{
|
2016-06-20 20:39:46 +02:00
|
|
|
nerr("ERROR: Failed to open %s: %d\n", session.ts_devpath, errno);
|
2020-02-03 10:11:41 +01:00
|
|
|
goto errout_with_socket;
|
2012-01-30 22:29:59 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Use this driver as stdin, stdout, and stderror */
|
|
|
|
|
2020-01-02 13:09:50 +01:00
|
|
|
dup2(drvrfd, 0);
|
|
|
|
dup2(drvrfd, 1);
|
|
|
|
dup2(drvrfd, 2);
|
2012-01-30 22:29:59 +01:00
|
|
|
|
|
|
|
/* And we can close our original driver fd */
|
|
|
|
|
|
|
|
if (drvrfd > 2)
|
|
|
|
{
|
|
|
|
close(drvrfd);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Create a task to handle the connection. The created task
|
|
|
|
* will inherit the new stdin, stdout, and stderr.
|
|
|
|
*/
|
|
|
|
|
2016-06-20 19:48:15 +02:00
|
|
|
ninfo("Starting the telnet session\n");
|
2020-07-11 19:23:09 +02:00
|
|
|
pid = task_create("Telnet session", daemon->priority,
|
|
|
|
daemon->stacksize, daemon->entry, NULL);
|
2012-01-30 22:29:59 +01:00
|
|
|
if (pid < 0)
|
|
|
|
{
|
2016-06-20 20:39:46 +02:00
|
|
|
nerr("ERROR: Failed start the telnet session: %d\n", errno);
|
2020-02-03 10:11:41 +01:00
|
|
|
goto errout_with_socket;
|
2012-01-30 22:29:59 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Forget about the connection. */
|
|
|
|
|
|
|
|
close(0);
|
|
|
|
close(1);
|
|
|
|
close(2);
|
|
|
|
}
|
|
|
|
|
|
|
|
errout_with_acceptsd:
|
|
|
|
close(acceptsd);
|
|
|
|
|
|
|
|
errout_with_socket:
|
|
|
|
close(listensd);
|
2020-02-03 10:16:49 +01:00
|
|
|
errout_with_daemon:
|
2012-01-30 22:29:59 +01:00
|
|
|
free(daemon);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Public Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: telnetd_start
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Start the telnet daemon.
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* config A pointer to a configuration structure that characterizes the
|
|
|
|
* telnet daemon. This configuration structure may be defined
|
|
|
|
* on the caller's stack because it is not retained by the
|
|
|
|
* daemon.
|
|
|
|
*
|
|
|
|
* Return:
|
|
|
|
* The process ID (pid) of the new telnet daemon is returned on
|
|
|
|
* success; A negated errno is returned if the daemon was not successfully
|
|
|
|
* started.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
int telnetd_start(FAR struct telnetd_config_s *config)
|
|
|
|
{
|
|
|
|
FAR struct telnetd_s *daemon;
|
2020-02-03 09:54:54 +01:00
|
|
|
FAR char *argv[2];
|
|
|
|
char arg0[16];
|
2012-01-30 22:29:59 +01:00
|
|
|
pid_t pid;
|
|
|
|
|
|
|
|
/* Allocate a state structure for the new daemon */
|
|
|
|
|
|
|
|
daemon = (FAR struct telnetd_s *)malloc(sizeof(struct telnetd_s));
|
|
|
|
if (!daemon)
|
|
|
|
{
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Initialize the daemon structure */
|
|
|
|
|
|
|
|
daemon->port = config->d_port;
|
2017-06-27 17:14:13 +02:00
|
|
|
daemon->family = config->d_family;
|
2012-01-30 22:29:59 +01:00
|
|
|
daemon->priority = config->t_priority;
|
|
|
|
daemon->stacksize = config->t_stacksize;
|
|
|
|
daemon->entry = config->t_entry;
|
|
|
|
|
|
|
|
/* Then start the new daemon */
|
|
|
|
|
2020-02-03 09:54:54 +01:00
|
|
|
snprintf(arg0, 16, "0x%" PRIxPTR, (uintptr_t)daemon);
|
|
|
|
argv[0] = arg0;
|
|
|
|
argv[1] = NULL;
|
|
|
|
|
2014-09-01 21:21:15 +02:00
|
|
|
pid = task_create("Telnet daemon", config->d_priority, config->d_stacksize,
|
2020-02-03 09:54:54 +01:00
|
|
|
telnetd_daemon, argv);
|
2012-01-30 22:29:59 +01:00
|
|
|
if (pid < 0)
|
|
|
|
{
|
|
|
|
int errval = errno;
|
|
|
|
free(daemon);
|
2016-06-11 23:51:27 +02:00
|
|
|
nerr("ERROR: Failed to start the telnet daemon: %d\n", errval);
|
2012-01-30 22:29:59 +01:00
|
|
|
return -errval;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Return success */
|
|
|
|
|
|
|
|
return pid;
|
|
|
|
}
|