1 /* $OpenBSD: src/sbin/dhclient/dhclient.c,v 1.146 2012/07/09 16:21:21 krw Exp $ */ 2 3 /* 4 * Copyright 2004 Henning Brauer <henning@openbsd.org> 5 * Copyright (c) 1995, 1996, 1997, 1998, 1999 6 * The Internet Software Consortium. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 2. Redistributions in binary form must reproduce the above copyright 15 * notice, this list of conditions and the following disclaimer in the 16 * documentation and/or other materials provided with the distribution. 17 * 3. Neither the name of The Internet Software Consortium nor the names 18 * of its contributors may be used to endorse or promote products derived 19 * from this software without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE INTERNET SOFTWARE CONSORTIUM AND 22 * CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, 23 * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF 24 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE 25 * DISCLAIMED. IN NO EVENT SHALL THE INTERNET SOFTWARE CONSORTIUM OR 26 * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 27 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT 28 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF 29 * USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND 30 * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 31 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT 32 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33 * SUCH DAMAGE. 34 * 35 * This software has been written for the Internet Software Consortium 36 * by Ted Lemon <mellon@fugue.com> in cooperation with Vixie 37 * Enterprises. To learn more about the Internet Software Consortium, 38 * see ``http://www.vix.com/isc''. To learn more about Vixie 39 * Enterprises, see ``http://www.vix.com''. 40 * 41 * This client was substantially modified and enhanced by Elliot Poger 42 * for use on Linux while he was working on the MosquitoNet project at 43 * Stanford. 44 * 45 * The current version owes much to Elliot's Linux enhancements, but 46 * was substantially reorganized and partially rewritten by Ted Lemon 47 * so as to use the same networking framework that the Internet Software 48 * Consortium DHCP server uses. Much system-specific configuration code 49 * was moved into a shell script so that as support for more operating 50 * systems is added, it will not be necessary to port and maintain 51 * system-specific configuration code to these operating systems - instead, 52 * the shell script can invoke the native tools to accomplish the same 53 * purpose. 54 */ 55 #include <sys/ioctl.h> 56 57 #include <ctype.h> 58 #include <poll.h> 59 #include <pwd.h> 60 #include <unistd.h> 61 62 #include "dhcpd.h" 63 #include "privsep.h" 64 65 #define CLIENT_PATH "PATH=/usr/bin:/usr/sbin:/bin:/sbin" 66 #define DEFAULT_LEASE_TIME 43200 /* 12 hours... */ 67 #define TIME_MAX 2147483647 68 #define POLL_FAILURES 10 69 #define POLL_FAILURE_WAIT 1 /* Back off multiplier (seconds) */ 70 71 time_t cur_time; 72 73 char *path_dhclient_conf = _PATH_DHCLIENT_CONF; 74 char *path_dhclient_db = NULL; 75 76 int log_perror = 1; 77 int privfd; 78 int nullfd = -1; 79 int no_daemon; 80 int unknown_ok = 1; 81 int routefd = -1; 82 83 struct iaddr iaddr_broadcast = { 4, { 255, 255, 255, 255 } }; 84 struct in_addr inaddr_any; 85 struct sockaddr_in sockaddr_broadcast; 86 87 struct interface_info *ifi; 88 struct client_state *client; 89 struct client_config *config; 90 91 int findproto(char *, int); 92 struct sockaddr *get_ifa(char *, int); 93 void usage(void); 94 int check_option(struct client_lease *l, int option); 95 int ipv4addrs(char * buf); 96 int res_hnok(const char *dn); 97 char *option_as_string(unsigned int code, unsigned char *data, int len); 98 int fork_privchld(int, int); 99 void get_ifname(char *, char *); 100 #define ROUNDUP(a) \ 101 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long)) 102 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len)) 103 104 time_t scripttime; 105 static FILE *leaseFile; 106 107 int 108 findproto(char *cp, int n) 109 { 110 struct sockaddr *sa; 111 int i; 112 113 if (n == 0) 114 return -1; 115 for (i = 1; i; i <<= 1) { 116 if (i & n) { 117 sa = (struct sockaddr *)cp; 118 switch (i) { 119 case RTA_IFA: 120 case RTA_DST: 121 case RTA_GATEWAY: 122 case RTA_NETMASK: 123 if (sa->sa_family == AF_INET) 124 return AF_INET; 125 if (sa->sa_family == AF_INET6) 126 return AF_INET6; 127 break; 128 case RTA_IFP: 129 break; 130 } 131 ADVANCE(cp, sa); 132 } 133 } 134 return (-1); 135 } 136 137 struct sockaddr * 138 get_ifa(char *cp, int n) 139 { 140 struct sockaddr *sa; 141 int i; 142 143 if (n == 0) 144 return (NULL); 145 for (i = 1; i; i <<= 1) 146 if (i & n) { 147 sa = (struct sockaddr *)cp; 148 if (i == RTA_IFA) 149 return (sa); 150 ADVANCE(cp, sa); 151 } 152 153 return (NULL); 154 } 155 struct iaddr defaddr = { .len = 4 }; /* NULL is for silence warnings */ 156 157 void 158 routehandler(void) 159 { 160 int linkstat; 161 char msg[2048]; 162 struct rt_msghdr *rtm; 163 struct if_msghdr *ifm; 164 struct ifa_msghdr *ifam; 165 struct if_announcemsghdr *ifan; 166 struct client_lease *l; 167 time_t t = time(NULL); 168 struct sockaddr *sa; 169 struct iaddr a; 170 ssize_t n; 171 char *errmsg, buf[64]; 172 173 do { 174 n = read(routefd, &msg, sizeof(msg)); 175 } while (n == -1 && errno == EINTR); 176 177 rtm = (struct rt_msghdr *)msg; 178 if (n < sizeof(rtm->rtm_msglen) || n < rtm->rtm_msglen || 179 rtm->rtm_version != RTM_VERSION) 180 return; 181 182 switch (rtm->rtm_type) { 183 case RTM_NEWADDR: 184 ifam = (struct ifa_msghdr *)rtm; 185 if (ifam->ifam_index != ifi->index) 186 break; 187 if (findproto((char *)(ifam + 1), ifam->ifam_addrs) != AF_INET) 188 break; 189 sa = get_ifa((char *)(ifam + 1), ifam->ifam_addrs); 190 if (sa == NULL) { 191 errmsg = "sa == NULL"; 192 goto die; 193 } 194 195 if ((a.len = sizeof(struct in_addr)) > sizeof(a.iabuf)) 196 error("king bula sez: len mismatch"); 197 memcpy(a.iabuf, &((struct sockaddr_in *)sa)->sin_addr, a.len); 198 if (addr_eq(a, defaddr)) 199 break; 200 201 /* state_panic() can try unexpired existing leases */ 202 if (client->active && addr_eq(a, client->active->address)) 203 break; 204 for (l = client->leases; l != NULL; l = l->next) 205 if (addr_eq(a, l->address)) 206 break; 207 208 if (l != NULL) 209 /* new addr is the one we set */ 210 break; 211 snprintf(buf, sizeof(buf), "%s: %s", 212 "new address not one we set", piaddr(a)); 213 errmsg = buf; 214 goto die; 215 case RTM_DELADDR: 216 ifam = (struct ifa_msghdr *)rtm; 217 if (ifam->ifam_index != ifi->index) 218 break; 219 if (findproto((char *)(ifam + 1), ifam->ifam_addrs) != AF_INET) 220 break; 221 /* XXX check addrs like RTM_NEWADDR instead of this? */ 222 if (scripttime == 0 || t < scripttime + 10) 223 break; 224 errmsg = "interface address deleted"; 225 goto die; 226 case RTM_IFINFO: 227 ifm = (struct if_msghdr *)rtm; 228 if (ifm->ifm_index != ifi->index) 229 break; 230 if ((rtm->rtm_flags & RTF_UP) == 0) { 231 errmsg = "interface down"; 232 goto die; 233 } 234 235 linkstat = 236 LINK_STATE_IS_UP(ifm->ifm_data.ifi_link_state) ? 1 : 0; 237 if (linkstat != ifi->linkstat) { 238 #ifdef DEBUG 239 debug("link state %s -> %s", 240 ifi->linkstat ? "up" : "down", 241 linkstat ? "up" : "down"); 242 #endif 243 ifi->linkstat = interface_status(ifi->name); 244 if (ifi->linkstat) { 245 client->state = S_REBOOTING; 246 state_reboot(); 247 } 248 } 249 break; 250 case RTM_IFANNOUNCE: 251 ifan = (struct if_announcemsghdr *)rtm; 252 if (ifan->ifan_what == IFAN_DEPARTURE && 253 ifan->ifan_index == ifi->index) { 254 errmsg = "interface departure"; 255 goto die; 256 } 257 break; 258 default: 259 break; 260 } 261 return; 262 263 die: 264 script_init("FAIL"); 265 script_go(); 266 error("routehandler: %s", errmsg); 267 } 268 269 int 270 main(int argc, char *argv[]) 271 { 272 int ch, fd, quiet = 0, i = 0, pipe_fd[2]; 273 struct passwd *pw; 274 275 /* Initially, log errors to stderr as well as to syslogd. */ 276 openlog(getprogname(), LOG_PID | LOG_NDELAY, DHCPD_LOG_FACILITY); 277 setlogmask(LOG_UPTO(LOG_INFO)); 278 279 while ((ch = getopt(argc, argv, "c:dl:qu")) != -1) 280 switch (ch) { 281 case 'c': 282 path_dhclient_conf = optarg; 283 break; 284 case 'd': 285 no_daemon = 1; 286 break; 287 case 'l': 288 path_dhclient_db = optarg; 289 break; 290 case 'q': 291 quiet = 1; 292 break; 293 case 'u': 294 unknown_ok = 0; 295 break; 296 default: 297 usage(); 298 } 299 300 argc -= optind; 301 argv += optind; 302 303 if (argc != 1) 304 usage(); 305 306 ifi = calloc(1, sizeof(*ifi)); 307 if (ifi == NULL) 308 error("ifi calloc"); 309 client = calloc(1, sizeof(*client)); 310 if (client == NULL) 311 error("client calloc"); 312 config = calloc(1, sizeof(*config)); 313 if (config == NULL) 314 error("config calloc"); 315 316 get_ifname(ifi->name, argv[0]); 317 if (path_dhclient_db == NULL && asprintf(&path_dhclient_db, "%s.%s", 318 _PATH_DHCLIENT_DB, ifi->name) == -1) 319 error("asprintf"); 320 321 if (quiet) 322 log_perror = 0; 323 324 tzset(); 325 time(&cur_time); 326 327 memset(&sockaddr_broadcast, 0, sizeof(sockaddr_broadcast)); 328 sockaddr_broadcast.sin_family = AF_INET; 329 sockaddr_broadcast.sin_port = htons(REMOTE_PORT); 330 sockaddr_broadcast.sin_addr.s_addr = INADDR_BROADCAST; 331 sockaddr_broadcast.sin_len = sizeof(sockaddr_broadcast); 332 inaddr_any.s_addr = INADDR_ANY; 333 334 read_client_conf(); 335 336 if (interface_status(ifi->name) == 0) { 337 interface_link_forceup(ifi->name); 338 /* Give it up to 4 seconds of silent grace to find link */ 339 i = -4; 340 } else 341 i = 0; 342 343 while (!(ifi->linkstat = interface_status(ifi->name))) { 344 if (i == 0) 345 fprintf(stderr, "%s: no link ...", ifi->name); 346 else if (i > 0) 347 fprintf(stderr, "."); 348 fflush(stderr); 349 if (++i > config->link_timeout) { 350 fprintf(stderr, " sleeping\n"); 351 goto dispatch; 352 } 353 sleep(1); 354 } 355 if (i > 0) 356 fprintf(stderr, " got link\n"); 357 358 dispatch: 359 if ((nullfd = open(_PATH_DEVNULL, O_RDWR, 0)) == -1) 360 error("cannot open %s: %m", _PATH_DEVNULL); 361 362 if ((pw = getpwnam("_dhcp")) == NULL) 363 error("no such user: _dhcp"); 364 365 if (pipe(pipe_fd) == -1) 366 error("pipe"); 367 368 fork_privchld(pipe_fd[0], pipe_fd[1]); 369 370 close(pipe_fd[0]); 371 privfd = pipe_fd[1]; 372 373 if ((fd = open(path_dhclient_db, O_RDONLY|O_EXLOCK|O_CREAT, 0)) == -1) 374 error("can't open and lock %s: %m", path_dhclient_db); 375 read_client_leases(); 376 if ((leaseFile = fopen(path_dhclient_db, "w")) == NULL) 377 error("can't open %s: %m", path_dhclient_db); 378 rewrite_client_leases(); 379 close(fd); 380 381 if ((routefd = socket(PF_ROUTE, SOCK_RAW, 0)) == -1) 382 error("socket(PF_ROUTE, SOCK_RAW): %m"); 383 384 /* set up the interface */ 385 discover_interface(); 386 387 if (chroot(_PATH_VAREMPTY) == -1) 388 error("chroot"); 389 if (chdir("/") == -1) 390 error("chdir(\"/\")"); 391 392 if (setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) == -1) 393 error("setresgid"); 394 if (setgroups(1, &pw->pw_gid) == -1) 395 error("setgroups"); 396 if (setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid) == -1) 397 error("setresuid"); 398 399 endpwent(); 400 401 setproctitle("%s", ifi->name); 402 403 if (ifi->linkstat) { 404 client->state = S_REBOOTING; 405 state_reboot(); 406 } else 407 go_daemon(); 408 409 dispatch(); 410 411 /* not reached */ 412 return (0); 413 } 414 415 void 416 usage(void) 417 { 418 fprintf(stderr, "usage: %s [-dqu] [-c file] [-l file] interface\n", 419 getprogname()); 420 exit(1); 421 } 422 423 /* 424 * Individual States: 425 * 426 * Each routine is called from the dhclient_state_machine() in one of 427 * these conditions: 428 * -> entering INIT state 429 * -> recvpacket_flag == 0: timeout in this state 430 * -> otherwise: received a packet in this state 431 * 432 * Return conditions as handled by dhclient_state_machine(): 433 * Returns 1, sendpacket_flag = 1: send packet, reset timer. 434 * Returns 1, sendpacket_flag = 0: just reset the timer (wait for a milestone). 435 * Returns 0: finish the nap which was interrupted for no good reason. 436 * 437 * Several per-interface variables are used to keep track of the process: 438 * active_lease: the lease that is being used on the interface 439 * (null pointer if not configured yet). 440 * offered_leases: leases corresponding to DHCPOFFER messages that have 441 * been sent to us by DHCP servers. 442 * acked_leases: leases corresponding to DHCPACK messages that have been 443 * sent to us by DHCP servers. 444 * sendpacket: DHCP packet we're trying to send. 445 * destination: IP address to send sendpacket to 446 * In addition, there are several relevant per-lease variables. 447 * T1_expiry, T2_expiry, lease_expiry: lease milestones 448 * In the active lease, these control the process of renewing the lease; 449 * In leases on the acked_leases list, this simply determines when we 450 * can no longer legitimately use the lease. 451 */ 452 void 453 state_reboot(void) 454 { 455 /* Cancel all timeouts, since a link state change gets us here 456 and can happen anytime. */ 457 cancel_timeout(); 458 459 /* If we don't remember an active lease, go straight to INIT. */ 460 if (!client->active || client->active->is_bootp) { 461 client->state = S_INIT; 462 state_init(); 463 return; 464 } 465 466 /* make_request doesn't initialize xid because it normally comes 467 from the DHCPDISCOVER, but we haven't sent a DHCPDISCOVER, 468 so pick an xid now. */ 469 client->xid = arc4random(); 470 471 /* Make a DHCPREQUEST packet, and set appropriate per-interface 472 flags. */ 473 make_request(client->active); 474 client->destination = iaddr_broadcast; 475 client->first_sending = cur_time; 476 client->interval = 0; 477 478 /* Send out the first DHCPREQUEST packet. */ 479 send_request(); 480 } 481 482 /* 483 * Called when a lease has completely expired and we've 484 * been unable to renew it. 485 */ 486 void 487 state_init(void) 488 { 489 /* Make a DHCPDISCOVER packet, and set appropriate per-interface 490 flags. */ 491 make_discover(client->active); 492 client->xid = client->packet.xid; 493 client->destination = iaddr_broadcast; 494 client->state = S_SELECTING; 495 client->first_sending = cur_time; 496 client->interval = 0; 497 498 /* Add an immediate timeout to cause the first DHCPDISCOVER packet 499 to go out. */ 500 send_discover(); 501 } 502 503 /* 504 * state_selecting is called when one or more DHCPOFFER packets 505 * have been received and a configurable period of time has passed. 506 */ 507 void 508 state_selecting(void) 509 { 510 struct client_lease *lp, *next, *picked; 511 512 /* Cancel state_selecting and send_discover timeouts, since either 513 one could have got us here. */ 514 cancel_timeout(); 515 516 /* We have received one or more DHCPOFFER packets. Currently, 517 the only criterion by which we judge leases is whether or 518 not we get a response when we arp for them. */ 519 picked = NULL; 520 for (lp = client->offered_leases; lp; lp = next) { 521 next = lp->next; 522 523 if (!picked) { 524 picked = lp; 525 } else { 526 make_decline(lp); 527 send_decline(); 528 free_client_lease(lp); 529 } 530 } 531 client->offered_leases = NULL; 532 533 /* If we just tossed all the leases we were offered, go back 534 to square one. */ 535 if (!picked) { 536 client->state = S_INIT; 537 state_init(); 538 return; 539 } 540 picked->next = NULL; 541 542 /* If it was a BOOTREPLY, we can just take the address right now. */ 543 if (!picked->options[DHO_DHCP_MESSAGE_TYPE].len) { 544 client->new = picked; 545 546 /* Make up some lease expiry times 547 XXX these should be configurable. */ 548 client->new->expiry = cur_time + 12000; 549 client->new->renewal += cur_time + 8000; 550 client->new->rebind += cur_time + 10000; 551 552 client->state = S_REQUESTING; 553 554 /* Bind to the address we received. */ 555 bind_lease(); 556 return; 557 } 558 559 /* Go to the REQUESTING state. */ 560 client->destination = iaddr_broadcast; 561 client->state = S_REQUESTING; 562 client->first_sending = cur_time; 563 client->interval = 0; 564 565 /* Make a DHCPREQUEST packet from the lease we picked. */ 566 make_request(picked); 567 client->xid = client->packet.xid; 568 569 /* Toss the lease we picked - we'll get it back in a DHCPACK. */ 570 free_client_lease(picked); 571 572 /* Add an immediate timeout to send the first DHCPREQUEST packet. */ 573 send_request(); 574 } 575 576 void 577 dhcpack(struct iaddr client_addr, struct option_data *options) 578 { 579 struct client_lease *lease; 580 581 582 if (client->state != S_REBOOTING && 583 client->state != S_REQUESTING && 584 client->state != S_RENEWING && 585 client->state != S_REBINDING) 586 return; 587 588 589 lease = packet_to_lease(options); 590 if (!lease) { 591 note("packet_to_lease failed."); 592 return; 593 } 594 595 client->new = lease; 596 597 /* Stop resending DHCPREQUEST. */ 598 cancel_timeout(); 599 600 /* Figure out the lease time. */ 601 if (client->new->options[DHO_DHCP_LEASE_TIME].data) 602 client->new->expiry = 603 getULong(client->new->options[DHO_DHCP_LEASE_TIME].data); 604 else 605 client->new->expiry = DEFAULT_LEASE_TIME; 606 /* A number that looks negative here is really just very large, 607 because the lease expiry offset is unsigned. */ 608 if (client->new->expiry < 0) 609 client->new->expiry = TIME_MAX; 610 /* XXX should be fixed by resetting the client state */ 611 if (client->new->expiry < 60) 612 client->new->expiry = 60; 613 614 /* Take the server-provided renewal time if there is one; 615 otherwise figure it out according to the spec. */ 616 if (client->new->options[DHO_DHCP_RENEWAL_TIME].len) 617 client->new->renewal = 618 getULong(client->new->options[DHO_DHCP_RENEWAL_TIME].data); 619 else 620 client->new->renewal = client->new->expiry / 2; 621 622 /* Same deal with the rebind time. */ 623 if (client->new->options[DHO_DHCP_REBINDING_TIME].len) 624 client->new->rebind = 625 getULong(client->new->options[DHO_DHCP_REBINDING_TIME].data); 626 else 627 client->new->rebind = client->new->renewal + 628 client->new->renewal / 2 + client->new->renewal / 4; 629 630 client->new->expiry += cur_time; 631 /* Lease lengths can never be negative. */ 632 if (client->new->expiry < cur_time) 633 client->new->expiry = TIME_MAX; 634 client->new->renewal += cur_time; 635 if (client->new->renewal < cur_time) 636 client->new->renewal = TIME_MAX; 637 client->new->rebind += cur_time; 638 if (client->new->rebind < cur_time) 639 client->new->rebind = TIME_MAX; 640 641 bind_lease(); 642 } 643 644 void 645 bind_lease(void) 646 { 647 /* Run the client script with the new parameters. */ 648 script_init((client->state == S_REQUESTING ? "BOUND" : 649 (client->state == S_RENEWING ? "RENEW" : 650 (client->state == S_REBOOTING ? "REBOOT" : "REBIND")))); 651 if (client->active && client->state != S_REBOOTING) 652 script_write_params("old_", client->active); 653 script_write_params("new_", client->new); 654 script_go(); 655 656 /* Replace the old active lease with the new one. */ 657 if (client->active) 658 free_client_lease(client->active); 659 client->active = client->new; 660 client->new = NULL; 661 662 /* Write out new leases file. */ 663 rewrite_client_leases(); 664 665 /* Set timeout to start the renewal process. */ 666 set_timeout(client->active->renewal, state_bound); 667 668 note("bound to %s -- renewal in %ld seconds.", 669 piaddr(client->active->address), 670 client->active->renewal - cur_time); 671 client->state = S_BOUND; 672 reinitialize_interface(); 673 go_daemon(); 674 } 675 676 /* 677 * state_bound is called when we've successfully bound to a particular 678 * lease, but the renewal time on that lease has expired. We are 679 * expected to unicast a DHCPREQUEST to the server that gave us our 680 * original lease. 681 */ 682 void 683 state_bound(void) 684 { 685 /* T1 has expired. */ 686 make_request(client->active); 687 client->xid = client->packet.xid; 688 689 if (client->active->options[DHO_DHCP_SERVER_IDENTIFIER].len == 4) { 690 memcpy(client->destination.iabuf, 691 client->active->options[DHO_DHCP_SERVER_IDENTIFIER].data, 692 4); 693 client->destination.len = 4; 694 } else 695 client->destination = iaddr_broadcast; 696 697 client->first_sending = cur_time; 698 client->interval = 0; 699 client->state = S_RENEWING; 700 701 /* Send the first packet immediately. */ 702 send_request(); 703 } 704 705 void 706 dhcpoffer(struct iaddr client_addr, struct option_data *options) 707 { 708 struct client_lease *lease, *lp; 709 int i; 710 int stop_selecting; 711 char *name = options[DHO_DHCP_MESSAGE_TYPE].len ? "DHCPOFFER" : 712 "BOOTREPLY"; 713 714 715 if (client->state != S_SELECTING) 716 return; 717 718 719 /* If this lease doesn't supply the minimum required parameters, 720 blow it off. */ 721 for (i = 0; config->required_options[i]; i++) { 722 if (!options[config->required_options[i]].len) { 723 note("%s isn't satisfactory.", name); 724 return; 725 } 726 } 727 728 /* If we've already seen this lease, don't record it again. */ 729 for (lease = client->offered_leases; 730 lease; lease = lease->next) { 731 if (lease->address.len == sizeof(client->packet.yiaddr) && 732 !memcmp(lease->address.iabuf, 733 &client->packet.yiaddr, lease->address.len)) { 734 #ifdef DEBUG 735 debug("%s already seen.", name); 736 #endif 737 return; 738 } 739 } 740 741 lease = packet_to_lease(options); 742 if (!lease) { 743 note("packet_to_lease failed."); 744 return; 745 } 746 747 /* If this lease was acquired through a BOOTREPLY, record that 748 fact. */ 749 if (!options[DHO_DHCP_MESSAGE_TYPE].len) 750 lease->is_bootp = 1; 751 752 /* Figure out when we're supposed to stop selecting. */ 753 stop_selecting = client->first_sending + config->select_interval; 754 755 /* If this is the lease we asked for, put it at the head of the 756 list, and don't mess with the arp request timeout. */ 757 if (addr_eq(lease->address, client->requested_address)) { 758 lease->next = client->offered_leases; 759 client->offered_leases = lease; 760 } else { 761 /* Put the lease at the end of the list. */ 762 lease->next = NULL; 763 if (!client->offered_leases) 764 client->offered_leases = lease; 765 else { 766 for (lp = client->offered_leases; lp->next; 767 lp = lp->next) 768 ; /* nothing */ 769 lp->next = lease; 770 } 771 } 772 773 /* If the selecting interval has expired, go immediately to 774 state_selecting(). Otherwise, time out into 775 state_selecting at the select interval. */ 776 if (stop_selecting <= cur_time) 777 state_selecting(); 778 else { 779 set_timeout(stop_selecting, state_selecting); 780 } 781 } 782 783 /* 784 * Allocate a client_lease structure and initialize it from the 785 * parameters in the specified packet. 786 */ 787 struct client_lease * 788 packet_to_lease(struct option_data *options) 789 { 790 struct client_lease *lease; 791 int i; 792 793 lease = malloc(sizeof(struct client_lease)); 794 795 if (!lease) { 796 warning("dhcpoffer: no memory to record lease."); 797 return (NULL); 798 } 799 800 memset(lease, 0, sizeof(*lease)); 801 802 /* Copy the lease options. */ 803 for (i = 0; i < 256; i++) { 804 if (options[i].len) { 805 lease->options[i] = options[i]; 806 options[i].data = NULL; 807 options[i].len = 0; 808 if (!check_option(lease, i)) { 809 warning("Invalid lease option - ignoring offer"); 810 free_client_lease(lease); 811 return (NULL); 812 } 813 } 814 } 815 816 lease->address.len = sizeof(client->packet.yiaddr); 817 memcpy(lease->address.iabuf, &client->packet.yiaddr, 818 lease->address.len); 819 820 /* If the server name was filled out, copy it. */ 821 if ((!lease->options[DHO_DHCP_OPTION_OVERLOAD].len || 822 !(lease->options[DHO_DHCP_OPTION_OVERLOAD].data[0] & 2)) && 823 client->packet.sname[0]) { 824 lease->server_name = malloc(DHCP_SNAME_LEN + 1); 825 if (!lease->server_name) { 826 warning("dhcpoffer: no memory for server name."); 827 free_client_lease(lease); 828 return (NULL); 829 } 830 memcpy(lease->server_name, client->packet.sname, 831 DHCP_SNAME_LEN); 832 lease->server_name[DHCP_SNAME_LEN] = '\0'; 833 if (!res_hnok(lease->server_name)) { 834 warning("Bogus server name %s", lease->server_name); 835 free(lease->server_name); 836 lease->server_name = NULL; 837 } 838 } 839 840 /* Ditto for the filename. */ 841 if ((!lease->options[DHO_DHCP_OPTION_OVERLOAD].len || 842 !(lease->options[DHO_DHCP_OPTION_OVERLOAD].data[0] & 1)) && 843 client->packet.file[0]) { 844 /* Don't count on the NUL terminator. */ 845 lease->filename = malloc(DHCP_FILE_LEN + 1); 846 if (!lease->filename) { 847 warning("dhcpoffer: no memory for filename."); 848 free_client_lease(lease); 849 return (NULL); 850 } 851 memcpy(lease->filename, client->packet.file, DHCP_FILE_LEN); 852 lease->filename[DHCP_FILE_LEN] = '\0'; 853 } 854 return lease; 855 } 856 857 void 858 dhcpnak(struct iaddr client_addr, struct option_data *options) 859 { 860 861 if (client->state != S_REBOOTING && 862 client->state != S_REQUESTING && 863 client->state != S_RENEWING && 864 client->state != S_REBINDING) 865 return; 866 867 868 if (!client->active) { 869 note("DHCPNAK with no active lease."); 870 return; 871 } 872 873 free_client_lease(client->active); 874 client->active = NULL; 875 876 /* Stop sending DHCPREQUEST packets... */ 877 cancel_timeout(); 878 879 client->state = S_INIT; 880 state_init(); 881 } 882 883 /* 884 * Send out a DHCPDISCOVER packet, and set a timeout to send out another 885 * one after the right interval has expired. If we don't get an offer by 886 * the time we reach the panic interval, call the panic function. 887 */ 888 void 889 send_discover(void) 890 { 891 int interval, increase = 1; 892 893 /* Figure out how long it's been since we started transmitting. */ 894 interval = cur_time - client->first_sending; 895 896 /* If we're past the panic timeout, call the script and tell it 897 we haven't found anything for this interface yet. */ 898 if (interval > config->timeout) { 899 state_panic(); 900 return; 901 } 902 903 /* 904 * If we're supposed to increase the interval, do so. If it's 905 * currently zero (i.e., we haven't sent any packets yet), set 906 * it to initial_interval; otherwise, add to it a random 907 * number between zero and two times itself. On average, this 908 * means that it will double with every transmission. 909 */ 910 if (increase) { 911 if (!client->interval) 912 client->interval = config->initial_interval; 913 else { 914 client->interval += (arc4random() >> 2) % 915 (2 * client->interval); 916 } 917 918 /* Don't backoff past cutoff. */ 919 if (client->interval > config->backoff_cutoff) 920 client->interval = ((config->backoff_cutoff / 2) 921 + ((arc4random() >> 2) % 922 config->backoff_cutoff)); 923 } else if (!client->interval) 924 client->interval = config->initial_interval; 925 926 /* If the backoff would take us to the panic timeout, just use that 927 as the interval. */ 928 if (cur_time + client->interval > 929 client->first_sending + config->timeout) 930 client->interval = (client->first_sending + 931 config->timeout) - cur_time + 1; 932 933 /* Record the number of seconds since we started sending. */ 934 if (interval < 65536) 935 client->packet.secs = htons(interval); 936 else 937 client->packet.secs = htons(65535); 938 client->secs = client->packet.secs; 939 940 note("DHCPDISCOVER on %s to %s port %d interval %ld", 941 ifi->name, inet_ntoa(sockaddr_broadcast.sin_addr), 942 ntohs(sockaddr_broadcast.sin_port), client->interval); 943 944 /* Send out a packet. */ 945 send_packet(inaddr_any, &sockaddr_broadcast, NULL); 946 947 set_timeout(cur_time + client->interval, send_discover); 948 } 949 950 /* 951 * state_panic gets called if we haven't received any offers in a preset 952 * amount of time. When this happens, we try to use existing leases 953 * that haven't yet expired, and failing that, we call the client script 954 * and hope it can do something. 955 */ 956 void 957 state_panic(void) 958 { 959 struct client_lease *loop = client->active; 960 struct client_lease *lp; 961 962 note("No DHCPOFFERS received."); 963 964 /* We may not have an active lease, but we may have some 965 predefined leases that we can try. */ 966 if (!client->active && client->leases) 967 goto activate_next; 968 969 /* Run through the list of leases and see if one can be used. */ 970 while (client->active) { 971 if (client->active->expiry > cur_time) { 972 note("Trying recorded lease %s", 973 piaddr(client->active->address)); 974 /* Run the client script with the existing 975 parameters. */ 976 script_init("TIMEOUT"); 977 script_write_params("new_", client->active); 978 979 /* If the old lease is still good and doesn't 980 yet need renewal, go into BOUND state and 981 timeout at the renewal time. */ 982 if (!script_go()) { 983 if (cur_time < 984 client->active->renewal) { 985 client->state = S_BOUND; 986 note("bound: renewal in %ld seconds.", 987 client->active->renewal - 988 cur_time); 989 set_timeout(client->active->renewal, 990 state_bound); 991 } else { 992 client->state = S_BOUND; 993 note("bound: immediate renewal."); 994 state_bound(); 995 } 996 reinitialize_interface(); 997 go_daemon(); 998 return; 999 } 1000 } 1001 1002 /* If there are no other leases, give up. */ 1003 if (!client->leases) { 1004 client->leases = client->active; 1005 client->active = NULL; 1006 break; 1007 } 1008 1009 activate_next: 1010 /* Otherwise, put the active lease at the end of the 1011 lease list, and try another lease.. */ 1012 for (lp = client->leases; lp->next; lp = lp->next) 1013 ; 1014 lp->next = client->active; 1015 if (lp->next) 1016 lp->next->next = NULL; 1017 client->active = client->leases; 1018 client->leases = client->leases->next; 1019 1020 /* If we already tried this lease, we've exhausted the 1021 set of leases, so we might as well give up for 1022 now. */ 1023 if (client->active == loop) 1024 break; 1025 else if (!loop) 1026 loop = client->active; 1027 } 1028 1029 /* No leases were available, or what was available didn't work, so 1030 tell the shell script that we failed to allocate an address, 1031 and try again later. */ 1032 note("No working leases in persistent database - sleeping."); 1033 script_init("FAIL"); 1034 script_go(); 1035 client->state = S_INIT; 1036 set_timeout(cur_time + config->retry_interval, state_init); 1037 go_daemon(); 1038 } 1039 1040 void 1041 send_request(void) 1042 { 1043 struct sockaddr_in destination; 1044 struct in_addr from; 1045 int interval; 1046 1047 /* Figure out how long it's been since we started transmitting. */ 1048 interval = cur_time - client->first_sending; 1049 1050 /* If we're in the INIT-REBOOT or REQUESTING state and we're 1051 past the reboot timeout, go to INIT and see if we can 1052 DISCOVER an address... */ 1053 /* XXX In the INIT-REBOOT state, if we don't get an ACK, it 1054 means either that we're on a network with no DHCP server, 1055 or that our server is down. In the latter case, assuming 1056 that there is a backup DHCP server, DHCPDISCOVER will get 1057 us a new address, but we could also have successfully 1058 reused our old address. In the former case, we're hosed 1059 anyway. This is not a win-prone situation. */ 1060 if ((client->state == S_REBOOTING || 1061 client->state == S_REQUESTING) && 1062 interval > config->reboot_timeout) { 1063 client->state = S_INIT; 1064 cancel_timeout(); 1065 state_init(); 1066 return; 1067 } 1068 1069 /* If the lease has expired, relinquish the address and go back 1070 to the INIT state. */ 1071 if (client->state != S_REQUESTING && 1072 cur_time > client->active->expiry) { 1073 /* Run the client script with the new parameters. */ 1074 script_init("EXPIRE"); 1075 script_write_params("old_", client->active); 1076 script_go(); 1077 1078 client->state = S_INIT; 1079 state_init(); 1080 return; 1081 } 1082 1083 /* Do the exponential backoff... */ 1084 if (!client->interval) 1085 client->interval = config->initial_interval; 1086 else 1087 client->interval += ((arc4random() >> 2) % 1088 (2 * client->interval)); 1089 1090 /* Don't backoff past cutoff. */ 1091 if (client->interval > config->backoff_cutoff) 1092 client->interval = ((config->backoff_cutoff / 2) + 1093 ((arc4random() >> 2) % client->interval)); 1094 1095 /* If the backoff would take us to the expiry time, just set the 1096 timeout to the expiry time. */ 1097 if (client->state != S_REQUESTING && cur_time + client->interval > 1098 client->active->expiry) 1099 client->interval = client->active->expiry - cur_time + 1; 1100 1101 /* If the lease T2 time has elapsed, or if we're not yet bound, 1102 broadcast the DHCPREQUEST rather than unicasting. */ 1103 memset(&destination, 0, sizeof(destination)); 1104 if (client->state == S_REQUESTING || 1105 client->state == S_REBOOTING || 1106 cur_time > client->active->rebind) 1107 destination.sin_addr.s_addr = INADDR_BROADCAST; 1108 else 1109 memcpy(&destination.sin_addr.s_addr, client->destination.iabuf, 1110 sizeof(destination.sin_addr.s_addr)); 1111 destination.sin_port = htons(REMOTE_PORT); 1112 destination.sin_family = AF_INET; 1113 destination.sin_len = sizeof(destination); 1114 1115 if (client->state != S_REQUESTING) 1116 memcpy(&from, client->active->address.iabuf, sizeof(from)); 1117 else 1118 from.s_addr = INADDR_ANY; 1119 1120 /* Record the number of seconds since we started sending. */ 1121 if (client->state == S_REQUESTING) 1122 client->packet.secs = client->secs; 1123 else { 1124 if (interval < 65536) 1125 client->packet.secs = htons(interval); 1126 else 1127 client->packet.secs = htons(65535); 1128 } 1129 1130 note("DHCPREQUEST on %s to %s port %d", ifi->name, 1131 inet_ntoa(destination.sin_addr), ntohs(destination.sin_port)); 1132 1133 /* Send out a packet. */ 1134 send_packet(from, &destination, NULL); 1135 1136 set_timeout(cur_time + client->interval, send_request); 1137 } 1138 1139 void 1140 send_decline(void) 1141 { 1142 note("DHCPDECLINE on %s to %s port %d", ifi->name, 1143 inet_ntoa(sockaddr_broadcast.sin_addr), 1144 ntohs(sockaddr_broadcast.sin_port)); 1145 1146 /* Send out a packet. */ 1147 send_packet(inaddr_any, &sockaddr_broadcast, NULL); 1148 } 1149 1150 void 1151 make_discover(struct client_lease *lease) 1152 { 1153 unsigned char discover = DHCPDISCOVER; 1154 struct option_data options[256]; 1155 int i; 1156 1157 memset(options, 0, sizeof(options)); 1158 memset(&client->packet, 0, sizeof(client->packet)); 1159 1160 /* Set DHCP_MESSAGE_TYPE to DHCPDISCOVER */ 1161 i = DHO_DHCP_MESSAGE_TYPE; 1162 options[i].data = &discover; 1163 options[i].len = sizeof(discover); 1164 1165 /* Request the options we want */ 1166 i = DHO_DHCP_PARAMETER_REQUEST_LIST; 1167 options[i].data = config->requested_options; 1168 options[i].len = config->requested_option_count; 1169 1170 /* If we had an address, try to get it again. */ 1171 if (lease) { 1172 client->requested_address = lease->address; 1173 i = DHO_DHCP_REQUESTED_ADDRESS; 1174 options[i].data = lease->address.iabuf; 1175 options[i].len = lease->address.len; 1176 } else 1177 client->requested_address.len = 0; 1178 1179 /* Send any options requested in the config file. */ 1180 for (i = 0; i < 256; i++) 1181 if (!options[i].data && 1182 config->send_options[i].data) { 1183 options[i].data = config->send_options[i].data; 1184 options[i].len = config->send_options[i].len; 1185 } 1186 1187 /* Set up the option buffer to fit in a minimal UDP packet. */ 1188 i = cons_options(options); 1189 if (i == -1 || client->packet.options[i] != DHO_END) 1190 error("options do not fit in DHCPDISCOVER packet."); 1191 client->packet_length = DHCP_FIXED_NON_UDP+i+1; 1192 if (client->packet_length < BOOTP_MIN_LEN) 1193 client->packet_length = BOOTP_MIN_LEN; 1194 1195 client->packet.op = BOOTREQUEST; 1196 client->packet.htype = ifi->hw_address.htype; 1197 client->packet.hlen = ifi->hw_address.hlen; 1198 client->packet.hops = 0; 1199 client->packet.xid = arc4random(); 1200 client->packet.secs = 0; /* filled in by send_discover. */ 1201 client->packet.flags = 0; 1202 1203 memset(&client->packet.ciaddr, 0, sizeof(client->packet.ciaddr)); 1204 memset(&client->packet.yiaddr, 0, sizeof(client->packet.yiaddr)); 1205 memset(&client->packet.siaddr, 0, sizeof(client->packet.siaddr)); 1206 memset(&client->packet.giaddr, 0, sizeof(client->packet.giaddr)); 1207 memcpy(client->packet.chaddr, ifi->hw_address.haddr, 1208 ifi->hw_address.hlen); 1209 } 1210 1211 void 1212 make_request(struct client_lease * lease) 1213 { 1214 unsigned char request = DHCPREQUEST; 1215 struct option_data options[256]; 1216 int i; 1217 1218 memset(options, 0, sizeof(options)); 1219 memset(&client->packet, 0, sizeof(client->packet)); 1220 1221 /* Set DHCP_MESSAGE_TYPE to DHCPREQUEST */ 1222 i = DHO_DHCP_MESSAGE_TYPE; 1223 options[i].data = &request; 1224 options[i].len = sizeof(request); 1225 1226 /* Request the options we want */ 1227 i = DHO_DHCP_PARAMETER_REQUEST_LIST; 1228 options[i].data = config->requested_options; 1229 options[i].len = config->requested_option_count; 1230 1231 /* If we are requesting an address that hasn't yet been assigned 1232 to us, use the DHCP Requested Address option. */ 1233 if (client->state == S_REQUESTING) { 1234 /* Send back the server identifier... */ 1235 i = DHO_DHCP_SERVER_IDENTIFIER; 1236 options[i].data = lease->options[i].data; 1237 options[i].len = lease->options[i].len; 1238 } 1239 if (client->state == S_REQUESTING || 1240 client->state == S_REBOOTING) { 1241 client->requested_address = lease->address; 1242 i = DHO_DHCP_REQUESTED_ADDRESS; 1243 options[i].data = lease->address.iabuf; 1244 options[i].len = lease->address.len; 1245 } else 1246 client->requested_address.len = 0; 1247 1248 /* Send any options requested in the config file. */ 1249 for (i = 0; i < 256; i++) 1250 if (!options[i].data && config->send_options[i].data) { 1251 options[i].data = config->send_options[i].data; 1252 options[i].len = config->send_options[i].len; 1253 } 1254 1255 /* Set up the option buffer to fit in a minimal UDP packet. */ 1256 i = cons_options(options); 1257 if (i == -1 || client->packet.options[i] != DHO_END) 1258 error("options do not fit in DHCPREQUEST packet."); 1259 client->packet_length = DHCP_FIXED_NON_UDP+i+1; 1260 if (client->packet_length < BOOTP_MIN_LEN) 1261 client->packet_length = BOOTP_MIN_LEN; 1262 1263 client->packet.op = BOOTREQUEST; 1264 client->packet.htype = ifi->hw_address.htype; 1265 client->packet.hlen = ifi->hw_address.hlen; 1266 client->packet.hops = 0; 1267 client->packet.xid = client->xid; 1268 client->packet.secs = 0; /* Filled in by send_request. */ 1269 client->packet.flags = 0; 1270 1271 /* If we own the address we're requesting, put it in ciaddr; 1272 otherwise set ciaddr to zero. */ 1273 if (client->state == S_BOUND || 1274 client->state == S_RENEWING || 1275 client->state == S_REBINDING) { 1276 memcpy(&client->packet.ciaddr, 1277 lease->address.iabuf, lease->address.len); 1278 } else { 1279 memset(&client->packet.ciaddr, 0, 1280 sizeof(client->packet.ciaddr)); 1281 } 1282 1283 memset(&client->packet.yiaddr, 0, sizeof(client->packet.yiaddr)); 1284 memset(&client->packet.siaddr, 0, sizeof(client->packet.siaddr)); 1285 memset(&client->packet.giaddr, 0, sizeof(client->packet.giaddr)); 1286 memcpy(client->packet.chaddr, ifi->hw_address.haddr, 1287 ifi->hw_address.hlen); 1288 } 1289 1290 void 1291 make_decline(struct client_lease *lease) 1292 { 1293 struct option_data options[256]; 1294 unsigned char decline = DHCPDECLINE; 1295 int i; 1296 1297 memset(options, 0, sizeof(options)); 1298 memset(&client->packet, 0, sizeof(client->packet)); 1299 1300 /* Set DHCP_MESSAGE_TYPE to DHCPDECLINE */ 1301 i = DHO_DHCP_MESSAGE_TYPE; 1302 options[i].data = &decline; 1303 options[i].len = sizeof(decline); 1304 1305 /* Send back the server identifier... */ 1306 i = DHO_DHCP_SERVER_IDENTIFIER; 1307 options[i].data = lease->options[i].data; 1308 options[i].len = lease->options[i].len; 1309 1310 /* Send back the address we're declining. */ 1311 i = DHO_DHCP_REQUESTED_ADDRESS; 1312 options[i].data = lease->address.iabuf; 1313 options[i].len = lease->address.len; 1314 1315 /* Send the uid if the user supplied one. */ 1316 i = DHO_DHCP_CLIENT_IDENTIFIER; 1317 if (config->send_options[i].len) { 1318 options[i].data = config->send_options[i].data; 1319 options[i].len = config->send_options[i].len; 1320 } 1321 1322 /* Set up the option buffer to fit in a minimal UDP packet. */ 1323 i = cons_options(options); 1324 if (i == -1 || client->packet.options[i] != DHO_END) 1325 error("options do not fit in DHCPDECLINE packet."); 1326 client->packet_length = DHCP_FIXED_NON_UDP+i+1; 1327 if (client->packet_length < BOOTP_MIN_LEN) 1328 client->packet_length = BOOTP_MIN_LEN; 1329 1330 client->packet.op = BOOTREQUEST; 1331 client->packet.htype = ifi->hw_address.htype; 1332 client->packet.hlen = ifi->hw_address.hlen; 1333 client->packet.hops = 0; 1334 client->packet.xid = client->xid; 1335 client->packet.secs = 0; /* Filled in by send_request. */ 1336 client->packet.flags = 0; 1337 1338 /* ciaddr must always be zero. */ 1339 memset(&client->packet.ciaddr, 0, sizeof(client->packet.ciaddr)); 1340 memset(&client->packet.yiaddr, 0, sizeof(client->packet.yiaddr)); 1341 memset(&client->packet.siaddr, 0, sizeof(client->packet.siaddr)); 1342 memset(&client->packet.giaddr, 0, sizeof(client->packet.giaddr)); 1343 memcpy(client->packet.chaddr, ifi->hw_address.haddr, 1344 ifi->hw_address.hlen); 1345 } 1346 1347 void 1348 free_client_lease(struct client_lease *lease) 1349 { 1350 int i; 1351 1352 if (lease->server_name) 1353 free(lease->server_name); 1354 if (lease->filename) 1355 free(lease->filename); 1356 for (i = 0; i < 256; i++) { 1357 if (lease->options[i].len) 1358 free(lease->options[i].data); 1359 } 1360 free(lease); 1361 } 1362 1363 void 1364 rewrite_client_leases(void) 1365 { 1366 struct client_lease *lp; 1367 1368 if (!leaseFile) /* XXX */ 1369 error("lease file not open"); 1370 1371 fflush(leaseFile); 1372 rewind(leaseFile); 1373 1374 for (lp = client->leases; lp; lp = lp->next) { 1375 if (client->active && addr_eq(lp->address, 1376 client->active->address)) 1377 continue; 1378 write_client_lease(lp); 1379 } 1380 1381 if (client->active) 1382 write_client_lease(client->active); 1383 1384 fflush(leaseFile); 1385 ftruncate(fileno(leaseFile), ftello(leaseFile)); 1386 fsync(fileno(leaseFile)); 1387 } 1388 1389 void 1390 write_client_lease(struct client_lease *lease) 1391 { 1392 struct tm *t; 1393 int i; 1394 1395 /* If the lease came from the config file, we don't need to stash 1396 a copy in the lease database. */ 1397 if (lease->is_static) 1398 return; 1399 1400 if (!leaseFile) /* XXX */ 1401 error("lease file not open"); 1402 1403 fprintf(leaseFile, "lease {\n"); 1404 if (lease->is_bootp) 1405 fprintf(leaseFile, " bootp;\n"); 1406 fprintf(leaseFile, " interface \"%s\";\n", ifi->name); 1407 fprintf(leaseFile, " fixed-address %s;\n", piaddr(lease->address)); 1408 if (lease->filename) 1409 fprintf(leaseFile, " filename \"%s\";\n", lease->filename); 1410 if (lease->server_name) 1411 fprintf(leaseFile, " server-name \"%s\";\n", 1412 lease->server_name); 1413 for (i = 0; i < 256; i++) 1414 if (lease->options[i].len) 1415 fprintf(leaseFile, " option %s %s;\n", 1416 dhcp_options[i].name, 1417 pretty_print_option(i, lease->options[i].data, 1418 lease->options[i].len, 1, 1)); 1419 1420 t = gmtime(&lease->renewal); 1421 fprintf(leaseFile, " renew %d %d/%d/%d %02d:%02d:%02d;\n", 1422 t->tm_wday, t->tm_year + 1900, t->tm_mon + 1, t->tm_mday, 1423 t->tm_hour, t->tm_min, t->tm_sec); 1424 t = gmtime(&lease->rebind); 1425 fprintf(leaseFile, " rebind %d %d/%d/%d %02d:%02d:%02d;\n", 1426 t->tm_wday, t->tm_year + 1900, t->tm_mon + 1, t->tm_mday, 1427 t->tm_hour, t->tm_min, t->tm_sec); 1428 t = gmtime(&lease->expiry); 1429 fprintf(leaseFile, " expire %d %d/%d/%d %02d:%02d:%02d;\n", 1430 t->tm_wday, t->tm_year + 1900, t->tm_mon + 1, t->tm_mday, 1431 t->tm_hour, t->tm_min, t->tm_sec); 1432 fprintf(leaseFile, "}\n"); 1433 fflush(leaseFile); 1434 } 1435 1436 void 1437 script_init(char *reason) 1438 { 1439 size_t len; 1440 struct imsg_hdr hdr; 1441 struct buf *buf; 1442 1443 hdr.code = IMSG_SCRIPT_INIT; 1444 hdr.len = sizeof(struct imsg_hdr) + sizeof(size_t) + strlen(reason); 1445 buf = buf_open(hdr.len); 1446 1447 buf_add(buf, &hdr, sizeof(hdr)); 1448 len = strlen(reason); 1449 buf_add(buf, &len, sizeof(len)); 1450 buf_add(buf, reason, len); 1451 1452 buf_close(privfd, buf); 1453 } 1454 1455 void 1456 priv_script_init(char *reason) 1457 { 1458 client->scriptEnvsize = 100; 1459 if (client->scriptEnv == NULL) 1460 client->scriptEnv = 1461 calloc(client->scriptEnvsize, sizeof(char *)); 1462 if (client->scriptEnv == NULL) 1463 error("script_init: no memory for environment"); 1464 1465 client->scriptEnv[0] = strdup(CLIENT_PATH); 1466 if (client->scriptEnv[0] == NULL) 1467 error("script_init: no memory for environment"); 1468 1469 client->scriptEnv[1] = NULL; 1470 1471 script_set_env("", "interface", ifi->name); 1472 1473 script_set_env("", "reason", reason); 1474 } 1475 1476 void 1477 priv_script_write_params(char *prefix, struct client_lease *lease) 1478 { 1479 u_int8_t dbuf[1500]; 1480 int i, len = 0; 1481 char tbuf[128]; 1482 1483 script_set_env(prefix, "ip_address", piaddr(lease->address)); 1484 1485 if (lease->options[DHO_SUBNET_MASK].len && 1486 (lease->options[DHO_SUBNET_MASK].len < 1487 sizeof(lease->address.iabuf))) { 1488 struct iaddr netmask, subnet, broadcast; 1489 1490 memcpy(netmask.iabuf, lease->options[DHO_SUBNET_MASK].data, 1491 lease->options[DHO_SUBNET_MASK].len); 1492 netmask.len = lease->options[DHO_SUBNET_MASK].len; 1493 1494 subnet = subnet_number(lease->address, netmask); 1495 if (subnet.len) { 1496 script_set_env(prefix, "network_number", 1497 piaddr(subnet)); 1498 if (!lease->options[DHO_BROADCAST_ADDRESS].len) { 1499 broadcast = broadcast_addr(subnet, netmask); 1500 if (broadcast.len) 1501 script_set_env(prefix, 1502 "broadcast_address", 1503 piaddr(broadcast)); 1504 } 1505 } 1506 } 1507 1508 if (lease->filename) 1509 script_set_env(prefix, "filename", lease->filename); 1510 if (lease->server_name) 1511 script_set_env(prefix, "server_name", 1512 lease->server_name); 1513 for (i = 0; i < 256; i++) { 1514 u_int8_t *dp = NULL; 1515 1516 if (config->defaults[i].len) { 1517 if (lease->options[i].len) { 1518 switch (config->default_actions[i]) { 1519 case ACTION_DEFAULT: 1520 dp = lease->options[i].data; 1521 len = lease->options[i].len; 1522 break; 1523 case ACTION_SUPERSEDE: 1524 supersede: 1525 dp = config->defaults[i].data; 1526 len = config->defaults[i].len; 1527 break; 1528 case ACTION_PREPEND: 1529 len = config->defaults[i].len + 1530 lease->options[i].len; 1531 if (len >= sizeof(dbuf)) { 1532 warning("no space to %s %s", 1533 "prepend option", 1534 dhcp_options[i].name); 1535 goto supersede; 1536 } 1537 dp = dbuf; 1538 memcpy(dp, 1539 config->defaults[i].data, 1540 config->defaults[i].len); 1541 memcpy(dp + 1542 config->defaults[i].len, 1543 lease->options[i].data, 1544 lease->options[i].len); 1545 dp[len] = '\0'; 1546 break; 1547 case ACTION_APPEND: 1548 len = config->defaults[i].len + 1549 lease->options[i].len; 1550 if (len >= sizeof(dbuf)) { 1551 warning("no space to %s %s", 1552 "append option", 1553 dhcp_options[i].name); 1554 goto supersede; 1555 } 1556 dp = dbuf; 1557 memcpy(dp, lease->options[i].data, 1558 lease->options[i].len); 1559 memcpy(dp + lease->options[i].len, 1560 config->defaults[i].data, 1561 config->defaults[i].len); 1562 dp[len] = '\0'; 1563 } 1564 } else { 1565 dp = config->defaults[i].data; 1566 len = config->defaults[i].len; 1567 } 1568 } else if (lease->options[i].len) { 1569 len = lease->options[i].len; 1570 dp = lease->options[i].data; 1571 } else { 1572 len = 0; 1573 } 1574 if (len) { 1575 char name[256]; 1576 1577 if (dhcp_option_ev_name(name, sizeof(name), 1578 &dhcp_options[i])) 1579 script_set_env(prefix, name, 1580 pretty_print_option(i, dp, len, 0, 0)); 1581 } 1582 } 1583 snprintf(tbuf, sizeof(tbuf), "%d", (int)lease->expiry); 1584 script_set_env(prefix, "expiry", tbuf); 1585 } 1586 1587 void 1588 script_write_params(char *prefix, struct client_lease *lease) 1589 { 1590 size_t fn_len = 0, sn_len = 0, pr_len = 0; 1591 struct imsg_hdr hdr; 1592 struct buf *buf; 1593 int i; 1594 1595 if (lease->filename != NULL) 1596 fn_len = strlen(lease->filename); 1597 if (lease->server_name != NULL) 1598 sn_len = strlen(lease->server_name); 1599 if (prefix != NULL) 1600 pr_len = strlen(prefix); 1601 1602 hdr.code = IMSG_SCRIPT_WRITE_PARAMS; 1603 hdr.len = sizeof(hdr) + sizeof(struct client_lease) + 1604 sizeof(size_t) + fn_len + sizeof(size_t) + sn_len + 1605 sizeof(size_t) + pr_len; 1606 1607 for (i = 0; i < 256; i++) 1608 hdr.len += sizeof(int) + lease->options[i].len; 1609 1610 scripttime = time(NULL); 1611 1612 buf = buf_open(hdr.len); 1613 1614 buf_add(buf, &hdr, sizeof(hdr)); 1615 buf_add(buf, lease, sizeof(struct client_lease)); 1616 buf_add(buf, &fn_len, sizeof(fn_len)); 1617 buf_add(buf, lease->filename, fn_len); 1618 buf_add(buf, &sn_len, sizeof(sn_len)); 1619 buf_add(buf, lease->server_name, sn_len); 1620 buf_add(buf, &pr_len, sizeof(pr_len)); 1621 buf_add(buf, prefix, pr_len); 1622 1623 for (i = 0; i < 256; i++) { 1624 buf_add(buf, &lease->options[i].len, 1625 sizeof(lease->options[i].len)); 1626 buf_add(buf, lease->options[i].data, 1627 lease->options[i].len); 1628 } 1629 1630 buf_close(privfd, buf); 1631 } 1632 1633 int 1634 script_go(void) 1635 { 1636 struct imsg_hdr hdr; 1637 struct buf *buf; 1638 int ret; 1639 1640 scripttime = time(NULL); 1641 1642 hdr.code = IMSG_SCRIPT_GO; 1643 hdr.len = sizeof(struct imsg_hdr); 1644 1645 buf = buf_open(hdr.len); 1646 1647 buf_add(buf, &hdr, sizeof(hdr)); 1648 buf_close(privfd, buf); 1649 1650 bzero(&hdr, sizeof(hdr)); 1651 buf_read(privfd, &hdr, sizeof(hdr)); 1652 if (hdr.code != IMSG_SCRIPT_GO_RET) 1653 error("unexpected msg type %u", hdr.code); 1654 if (hdr.len != sizeof(hdr) + sizeof(int)) 1655 error("received corrupted message"); 1656 buf_read(privfd, &ret, sizeof(ret)); 1657 1658 return (ret); 1659 } 1660 1661 int 1662 priv_script_go(void) 1663 { 1664 char *scriptName, *argv[2], **envp; 1665 int pid, wpid, wstatus; 1666 1667 scripttime = time(NULL); 1668 1669 scriptName = config->script_name; 1670 envp = client->scriptEnv; 1671 1672 argv[0] = scriptName; 1673 argv[1] = NULL; 1674 1675 pid = fork(); 1676 if (pid < 0) { 1677 error("fork: %m"); 1678 wstatus = 0; 1679 } else if (pid) { 1680 do { 1681 wpid = wait(&wstatus); 1682 } while (wpid != pid && wpid > 0); 1683 if (wpid < 0) { 1684 error("wait: %m"); 1685 wstatus = 0; 1686 } 1687 } else { 1688 execve(scriptName, argv, envp); 1689 error("execve (%s, ...): %m", scriptName); 1690 } 1691 1692 script_flush_env(); 1693 1694 return (WEXITSTATUS(wstatus)); 1695 } 1696 1697 void 1698 script_set_env(const char *prefix, const char *name, const char *value) 1699 { 1700 int i, j, namelen; 1701 1702 namelen = strlen(name); 1703 1704 for (i = 0; client->scriptEnv[i]; i++) 1705 if (strncmp(client->scriptEnv[i], name, namelen) == 0 && 1706 client->scriptEnv[i][namelen] == '=') 1707 break; 1708 1709 if (client->scriptEnv[i]) 1710 /* Reuse the slot. */ 1711 free(client->scriptEnv[i]); 1712 else { 1713 /* New variable. Expand if necessary. */ 1714 if (i >= client->scriptEnvsize - 1) { 1715 char **newscriptEnv; 1716 int newscriptEnvsize = client->scriptEnvsize + 50; 1717 1718 newscriptEnv = realloc(client->scriptEnv, 1719 newscriptEnvsize); 1720 if (newscriptEnv == NULL) { 1721 free(client->scriptEnv); 1722 client->scriptEnv = NULL; 1723 client->scriptEnvsize = 0; 1724 error("script_set_env: no memory for variable"); 1725 } 1726 client->scriptEnv = newscriptEnv; 1727 client->scriptEnvsize = newscriptEnvsize; 1728 } 1729 /* need to set the NULL pointer at end of array beyond 1730 the new slot. */ 1731 client->scriptEnv[i + 1] = NULL; 1732 } 1733 /* Allocate space and format the variable in the appropriate slot. */ 1734 client->scriptEnv[i] = malloc(strlen(prefix) + strlen(name) + 1 + 1735 strlen(value) + 1); 1736 if (client->scriptEnv[i] == NULL) 1737 error("script_set_env: no memory for variable assignment"); 1738 1739 /* No `` or $() command substitution allowed in environment values! */ 1740 for (j = 0; j < strlen(value); j++) 1741 switch (value[j]) { 1742 case '`': 1743 case '$': 1744 error("illegal character (%c) in value '%s'", value[j], 1745 value); 1746 /* not reached */ 1747 } 1748 snprintf(client->scriptEnv[i], strlen(prefix) + strlen(name) + 1749 1 + strlen(value) + 1, "%s%s=%s", prefix, name, value); 1750 } 1751 1752 void 1753 script_flush_env(void) 1754 { 1755 int i; 1756 1757 for (i = 0; client->scriptEnv[i]; i++) { 1758 free(client->scriptEnv[i]); 1759 client->scriptEnv[i] = NULL; 1760 } 1761 client->scriptEnvsize = 0; 1762 } 1763 1764 int 1765 dhcp_option_ev_name(char *buf, size_t buflen, const struct option *option) 1766 { 1767 size_t i; 1768 1769 for (i = 0; option->name[i]; i++) { 1770 if (i + 1 == buflen) 1771 return 0; 1772 if (option->name[i] == '-') 1773 buf[i] = '_'; 1774 else 1775 buf[i] = option->name[i]; 1776 } 1777 1778 buf[i] = 0; 1779 return 1; 1780 } 1781 1782 void 1783 go_daemon(void) 1784 { 1785 static int state = 0; 1786 1787 if (no_daemon || state) 1788 return; 1789 1790 state = 1; 1791 1792 /* Stop logging to stderr... */ 1793 log_perror = 0; 1794 1795 if (daemon(1, 0) == -1) 1796 error("daemon"); 1797 1798 /* we are chrooted, daemon(3) fails to open /dev/null */ 1799 if (nullfd != -1) { 1800 dup2(nullfd, STDIN_FILENO); 1801 dup2(nullfd, STDOUT_FILENO); 1802 dup2(nullfd, STDERR_FILENO); 1803 close(nullfd); 1804 nullfd = -1; 1805 } 1806 } 1807 1808 int 1809 check_option(struct client_lease *l, int option) 1810 { 1811 char *opbuf; 1812 char *sbuf; 1813 1814 /* we use this, since this is what gets passed to dhclient-script */ 1815 1816 opbuf = pretty_print_option(option, l->options[option].data, 1817 l->options[option].len, 0, 0); 1818 1819 sbuf = option_as_string(option, l->options[option].data, 1820 l->options[option].len); 1821 1822 switch (option) { 1823 case DHO_SUBNET_MASK: 1824 case DHO_SWAP_SERVER: 1825 case DHO_BROADCAST_ADDRESS: 1826 case DHO_DHCP_SERVER_IDENTIFIER: 1827 case DHO_ROUTER_SOLICITATION_ADDRESS: 1828 case DHO_DHCP_REQUESTED_ADDRESS: 1829 if (ipv4addrs(opbuf) == 0) { 1830 warning("Invalid IP address in option %s: %s", 1831 dhcp_options[option].name, opbuf); 1832 return (0); 1833 } 1834 if (l->options[option].len != 4) { /* RFC 2132 */ 1835 warning("warning: Only 1 IP address allowed in " 1836 "%s option; length %d, must be 4", 1837 dhcp_options[option].name, 1838 l->options[option].len); 1839 l->options[option].len = 4; 1840 } 1841 return (1); 1842 case DHO_TIME_SERVERS: 1843 case DHO_NAME_SERVERS: 1844 case DHO_ROUTERS: 1845 case DHO_DOMAIN_NAME_SERVERS: 1846 case DHO_LOG_SERVERS: 1847 case DHO_COOKIE_SERVERS: 1848 case DHO_LPR_SERVERS: 1849 case DHO_IMPRESS_SERVERS: 1850 case DHO_RESOURCE_LOCATION_SERVERS: 1851 case DHO_NIS_SERVERS: 1852 case DHO_NTP_SERVERS: 1853 case DHO_NETBIOS_NAME_SERVERS: 1854 case DHO_NETBIOS_DD_SERVER: 1855 case DHO_FONT_SERVERS: 1856 if (ipv4addrs(opbuf) == 0) { 1857 warning("Invalid IP address in option %s: %s", 1858 dhcp_options[option].name, opbuf); 1859 return (0); 1860 } 1861 return (1); 1862 case DHO_HOST_NAME: 1863 case DHO_DOMAIN_NAME: 1864 case DHO_NIS_DOMAIN: 1865 if (!res_hnok(sbuf)) { 1866 warning("Bogus Host Name option %d: %s (%s)", option, 1867 sbuf, opbuf); 1868 l->options[option].len = 0; 1869 free(l->options[option].data); 1870 } 1871 return (1); 1872 case DHO_PAD: 1873 case DHO_TIME_OFFSET: 1874 case DHO_BOOT_SIZE: 1875 case DHO_MERIT_DUMP: 1876 case DHO_ROOT_PATH: 1877 case DHO_EXTENSIONS_PATH: 1878 case DHO_IP_FORWARDING: 1879 case DHO_NON_LOCAL_SOURCE_ROUTING: 1880 case DHO_POLICY_FILTER: 1881 case DHO_MAX_DGRAM_REASSEMBLY: 1882 case DHO_DEFAULT_IP_TTL: 1883 case DHO_PATH_MTU_AGING_TIMEOUT: 1884 case DHO_PATH_MTU_PLATEAU_TABLE: 1885 case DHO_INTERFACE_MTU: 1886 case DHO_ALL_SUBNETS_LOCAL: 1887 case DHO_PERFORM_MASK_DISCOVERY: 1888 case DHO_MASK_SUPPLIER: 1889 case DHO_ROUTER_DISCOVERY: 1890 case DHO_STATIC_ROUTES: 1891 case DHO_TRAILER_ENCAPSULATION: 1892 case DHO_ARP_CACHE_TIMEOUT: 1893 case DHO_IEEE802_3_ENCAPSULATION: 1894 case DHO_DEFAULT_TCP_TTL: 1895 case DHO_TCP_KEEPALIVE_INTERVAL: 1896 case DHO_TCP_KEEPALIVE_GARBAGE: 1897 case DHO_VENDOR_ENCAPSULATED_OPTIONS: 1898 case DHO_NETBIOS_NODE_TYPE: 1899 case DHO_NETBIOS_SCOPE: 1900 case DHO_X_DISPLAY_MANAGER: 1901 case DHO_DHCP_LEASE_TIME: 1902 case DHO_DHCP_OPTION_OVERLOAD: 1903 case DHO_DHCP_MESSAGE_TYPE: 1904 case DHO_DHCP_PARAMETER_REQUEST_LIST: 1905 case DHO_DHCP_MESSAGE: 1906 case DHO_DHCP_MAX_MESSAGE_SIZE: 1907 case DHO_DHCP_RENEWAL_TIME: 1908 case DHO_DHCP_REBINDING_TIME: 1909 case DHO_DHCP_CLASS_IDENTIFIER: 1910 case DHO_DHCP_CLIENT_IDENTIFIER: 1911 case DHO_DHCP_USER_CLASS_ID: 1912 case DHO_TFTP_SERVER: 1913 case DHO_END: 1914 return (1); 1915 default: 1916 if (!unknown_ok) 1917 warning("unknown dhcp option value 0x%x", option); 1918 return (unknown_ok); 1919 } 1920 } 1921 1922 int 1923 res_hnok(const char *name) 1924 { 1925 const char *dn = name; 1926 int pch = '.', ch = *dn++; 1927 int warn = 0; 1928 1929 while (ch != '\0') { 1930 int nch = *dn++; 1931 1932 if (ch == '.') { 1933 ; 1934 } else if (pch == '.' || nch == '.' || nch == '\0') { 1935 if (!isalnum(ch)) 1936 return (0); 1937 } else if (!isalnum(ch) && ch != '-' && ch != '_') 1938 return (0); 1939 else if (ch == '_' && warn == 0) { 1940 warning("warning: hostname %s contains an " 1941 "underscore which violates RFC 952", name); 1942 warn++; 1943 } 1944 pch = ch, ch = nch; 1945 } 1946 return (1); 1947 } 1948 1949 /* Does buf consist only of dotted decimal ipv4 addrs? 1950 * return how many if so, 1951 * otherwise, return 0 1952 */ 1953 int 1954 ipv4addrs(char * buf) 1955 { 1956 struct in_addr jnk; 1957 int count = 0; 1958 1959 while (inet_aton(buf, &jnk) == 1){ 1960 count++; 1961 while (*buf == '.' || isdigit(*buf)) 1962 buf++; 1963 if (*buf == '\0') 1964 return (count); 1965 while (*buf == ' ') 1966 buf++; 1967 } 1968 return (0); 1969 } 1970 1971 char * 1972 option_as_string(unsigned int code, unsigned char *data, int len) 1973 { 1974 static char optbuf[32768]; /* XXX */ 1975 char *op = optbuf; 1976 int opleft = sizeof(optbuf); 1977 unsigned char *dp = data; 1978 1979 if (code > 255) 1980 error("option_as_string: bad code %d", code); 1981 1982 for (; dp < data + len; dp++) { 1983 if (!isascii(*dp) || !isprint(*dp)) { 1984 if (dp + 1 != data + len || *dp != 0) { 1985 size_t oplen; 1986 snprintf(op, opleft, "\\%03o", *dp); 1987 oplen = strlen(op); 1988 op += oplen; 1989 opleft -= oplen; 1990 } 1991 } else if (*dp == '"' || *dp == '\'' || *dp == '$' || 1992 *dp == '`' || *dp == '\\') { 1993 *op++ = '\\'; 1994 *op++ = *dp; 1995 opleft -= 2; 1996 } else { 1997 *op++ = *dp; 1998 opleft--; 1999 } 2000 } 2001 if (opleft < 1) 2002 goto toobig; 2003 *op = 0; 2004 return optbuf; 2005 toobig: 2006 warning("dhcp option too large"); 2007 return "<error>"; 2008 } 2009 2010 int 2011 fork_privchld(int fd, int fd2) 2012 { 2013 struct pollfd pfd[1]; 2014 int nfds, pfail = 0; 2015 2016 switch (fork()) { 2017 case -1: 2018 error("cannot fork"); 2019 break; 2020 case 0: 2021 break; 2022 default: 2023 return (0); 2024 } 2025 2026 if (chdir("/") == -1) 2027 error("chdir(\"/\")"); 2028 2029 setproctitle("%s [priv]", ifi->name); 2030 2031 dup2(nullfd, STDIN_FILENO); 2032 dup2(nullfd, STDOUT_FILENO); 2033 dup2(nullfd, STDERR_FILENO); 2034 close(nullfd); 2035 close(fd2); 2036 2037 for (;;) { 2038 pfd[0].fd = fd; 2039 pfd[0].events = POLLIN; 2040 if ((nfds = poll(pfd, 1, INFTIM)) == -1) 2041 if (errno != EINTR) 2042 error("poll error"); 2043 2044 /* 2045 * Handle temporary errors, but bail if they persist. 2046 */ 2047 if (nfds == 0 || !(pfd[0].revents & POLLIN)) { 2048 if (pfail > POLL_FAILURES) 2049 error("poll failed > %d times", POLL_FAILURES); 2050 sleep(pfail * POLL_FAILURE_WAIT); 2051 pfail++; 2052 continue; 2053 } 2054 2055 dispatch_imsg(fd); 2056 } 2057 } 2058 2059 void 2060 get_ifname(char *ifname, char *arg) 2061 { 2062 struct ifgroupreq ifgr; 2063 struct ifg_req *ifg; 2064 int s, len; 2065 2066 if (!strcmp(arg, "egress")) { 2067 s = socket(AF_INET, SOCK_DGRAM, 0); 2068 if (s == -1) 2069 error("socket error"); 2070 bzero(&ifgr, sizeof(ifgr)); 2071 strlcpy(ifgr.ifgr_name, "egress", sizeof(ifgr.ifgr_name)); 2072 if (ioctl(s, SIOCGIFGMEMB, (caddr_t)&ifgr) == -1) { 2073 if (errno == ENOENT) 2074 error("no interface in group egress found"); 2075 error("ioctl SIOCGIFGMEMB: %m"); 2076 } 2077 len = ifgr.ifgr_len; 2078 if ((ifgr.ifgr_groups = calloc(1, len)) == NULL) 2079 error("get_ifname"); 2080 if (ioctl(s, SIOCGIFGMEMB, (caddr_t)&ifgr) == -1) 2081 error("ioctl SIOCGIFGMEMB: %m"); 2082 2083 arg = NULL; 2084 for (ifg = ifgr.ifgr_groups; 2085 ifg && len >= sizeof(struct ifg_req); ifg++) { 2086 len -= sizeof(struct ifg_req); 2087 if (arg) 2088 error("too many interfaces in group egress"); 2089 arg = ifg->ifgrq_member; 2090 } 2091 2092 if (strlcpy(ifi->name, arg, IFNAMSIZ) >= IFNAMSIZ) 2093 error("Interface name too long: %m"); 2094 2095 free(ifgr.ifgr_groups); 2096 close(s); 2097 } else if (strlcpy(ifi->name, arg, IFNAMSIZ) >= IFNAMSIZ) 2098 error("Interface name too long"); 2099 } 2100