1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2006 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 #pragma ident "%Z%%M% %I% %E% SMI" 27 28 #include <sys/types.h> 29 #include <stdlib.h> 30 #include <assert.h> 31 #include <errno.h> 32 #include <locale.h> 33 #include <string.h> 34 #include <unistd.h> 35 #include <signal.h> 36 #include <stdio.h> 37 #include <stdio_ext.h> 38 #include <dhcp_hostconf.h> 39 #include <dhcp_symbol.h> 40 #include <dhcpagent_ipc.h> 41 #include <dhcpmsg.h> 42 #include <netinet/dhcp.h> 43 44 #include "async.h" 45 #include "agent.h" 46 #include "script_handler.h" 47 #include "util.h" 48 #include "class_id.h" 49 #include "states.h" 50 #include "packet.h" 51 52 #ifndef TEXT_DOMAIN 53 #define TEXT_DOMAIN "SYS_TEST" 54 #endif 55 56 iu_timer_id_t inactivity_id; 57 int class_id_len = 0; 58 char *class_id; 59 iu_eh_t *eh; 60 iu_tq_t *tq; 61 pid_t grandparent; 62 63 static boolean_t shutdown_started = B_FALSE; 64 static boolean_t do_adopt = B_FALSE; 65 static unsigned int debug_level = 0; 66 static iu_eh_callback_t accept_event, ipc_event; 67 68 /* 69 * The ipc_cmd_allowed[] table indicates which IPC commands are allowed in 70 * which states; a non-zero value indicates the command is permitted. 71 * 72 * START is permitted if the interface is fresh, or if we are in the process 73 * of trying to obtain a lease (as a convenience to save the administrator 74 * from having to do an explicit DROP). EXTEND, RELEASE, and GET_TAG require 75 * a lease to be obtained in order to make sense. INFORM is permitted if the 76 * interface is fresh or has an INFORM in progress or previously done on it -- 77 * otherwise a DROP or RELEASE is first required. PING and STATUS always make 78 * sense and thus are always permitted, as is DROP in order to permit the 79 * administrator to always bail out. 80 */ 81 static int ipc_cmd_allowed[DHCP_NSTATES][DHCP_NIPC] = { 82 /* D E P R S S I G */ 83 /* R X I E T T N E */ 84 /* O T N L A A F T */ 85 /* P E G E R T O _ */ 86 /* . N . A T U R T */ 87 /* . D . S . S M A */ 88 /* . . . E . . . G */ 89 /* INIT */ { 1, 0, 1, 0, 1, 1, 1, 0 }, 90 /* SELECTING */ { 1, 0, 1, 0, 1, 1, 0, 0 }, 91 /* REQUESTING */ { 1, 0, 1, 0, 1, 1, 0, 0 }, 92 /* BOUND */ { 1, 1, 1, 1, 0, 1, 0, 1 }, 93 /* RENEWING */ { 1, 1, 1, 1, 0, 1, 0, 1 }, 94 /* REBINDING */ { 1, 1, 1, 1, 0, 1, 0, 1 }, 95 /* INFORMATION */ { 1, 0, 1, 0, 0, 1, 1, 1 }, 96 /* INIT_REBOOT */ { 1, 0, 1, 0, 1, 1, 0, 0 }, 97 /* ADOPTING */ { 1, 0, 1, 0, 0, 1, 0, 0 }, 98 /* INFORM_SENT */ { 1, 0, 1, 0, 0, 1, 1, 0 } 99 }; 100 101 int 102 main(int argc, char **argv) 103 { 104 boolean_t is_daemon = B_TRUE; 105 boolean_t is_verbose = B_FALSE; 106 int ipc_fd; 107 int c; 108 struct rlimit rl; 109 110 /* 111 * -l is ignored for compatibility with old agent. 112 */ 113 114 while ((c = getopt(argc, argv, "vd:l:fa")) != EOF) { 115 116 switch (c) { 117 118 case 'a': 119 do_adopt = B_TRUE; 120 grandparent = getpid(); 121 break; 122 123 case 'd': 124 debug_level = strtoul(optarg, NULL, 0); 125 break; 126 127 case 'f': 128 is_daemon = B_FALSE; 129 break; 130 131 case 'v': 132 is_verbose = B_TRUE; 133 break; 134 135 case '?': 136 (void) fprintf(stderr, "usage: %s [-a] [-d n] [-f] [-v]" 137 "\n", argv[0]); 138 return (EXIT_FAILURE); 139 140 default: 141 break; 142 } 143 } 144 145 (void) setlocale(LC_ALL, ""); 146 (void) textdomain(TEXT_DOMAIN); 147 148 if (geteuid() != 0) { 149 dhcpmsg_init(argv[0], B_FALSE, is_verbose, debug_level); 150 dhcpmsg(MSG_ERROR, "must be super-user"); 151 dhcpmsg_fini(); 152 return (EXIT_FAILURE); 153 } 154 155 if (is_daemon && daemonize() == 0) { 156 dhcpmsg_init(argv[0], B_FALSE, is_verbose, debug_level); 157 dhcpmsg(MSG_ERR, "cannot become daemon, exiting"); 158 dhcpmsg_fini(); 159 return (EXIT_FAILURE); 160 } 161 162 dhcpmsg_init(argv[0], is_daemon, is_verbose, debug_level); 163 (void) atexit(dhcpmsg_fini); 164 165 tq = iu_tq_create(); 166 eh = iu_eh_create(); 167 168 if (eh == NULL || tq == NULL) { 169 errno = ENOMEM; 170 dhcpmsg(MSG_ERR, "cannot create timer queue or event handler"); 171 return (EXIT_FAILURE); 172 } 173 174 /* 175 * ignore most signals that could be reasonably generated. 176 */ 177 178 (void) signal(SIGTERM, graceful_shutdown); 179 (void) signal(SIGQUIT, graceful_shutdown); 180 (void) signal(SIGPIPE, SIG_IGN); 181 (void) signal(SIGUSR1, SIG_IGN); 182 (void) signal(SIGUSR2, SIG_IGN); 183 (void) signal(SIGINT, SIG_IGN); 184 (void) signal(SIGHUP, SIG_IGN); 185 (void) signal(SIGCHLD, SIG_IGN); 186 187 /* 188 * upon SIGTHAW we need to refresh any non-infinite leases. 189 */ 190 191 (void) iu_eh_register_signal(eh, SIGTHAW, refresh_ifslist, NULL); 192 193 class_id = get_class_id(); 194 if (class_id != NULL) 195 class_id_len = strlen(class_id); 196 else 197 dhcpmsg(MSG_WARNING, "get_class_id failed, continuing " 198 "with no vendor class id"); 199 200 /* 201 * the inactivity timer is enabled any time there are no 202 * interfaces under DHCP control. if DHCP_INACTIVITY_WAIT 203 * seconds transpire without an interface under DHCP control, 204 * the agent shuts down. 205 */ 206 207 inactivity_id = iu_schedule_timer(tq, DHCP_INACTIVITY_WAIT, 208 inactivity_shutdown, NULL); 209 210 /* 211 * max out the number available descriptors, just in case.. 212 */ 213 214 rl.rlim_cur = RLIM_INFINITY; 215 rl.rlim_max = RLIM_INFINITY; 216 if (setrlimit(RLIMIT_NOFILE, &rl) == -1) 217 dhcpmsg(MSG_ERR, "setrlimit failed"); 218 219 (void) enable_extended_FILE_stdio(-1, -1); 220 221 /* 222 * create the ipc channel that the agent will listen for 223 * requests on, and register it with the event handler so that 224 * `accept_event' will be called back. 225 */ 226 227 switch (dhcp_ipc_init(&ipc_fd)) { 228 229 case 0: 230 break; 231 232 case DHCP_IPC_E_BIND: 233 dhcpmsg(MSG_ERROR, "dhcp_ipc_init: cannot bind to port " 234 "%i (agent already running?)", IPPORT_DHCPAGENT); 235 return (EXIT_FAILURE); 236 237 default: 238 dhcpmsg(MSG_ERROR, "dhcp_ipc_init failed"); 239 return (EXIT_FAILURE); 240 } 241 242 if (iu_register_event(eh, ipc_fd, POLLIN, accept_event, 0) == -1) { 243 dhcpmsg(MSG_ERR, "cannot register ipc fd for messages"); 244 return (EXIT_FAILURE); 245 } 246 247 /* 248 * if the -a (adopt) option was specified, try to adopt the 249 * kernel-managed interface before we start. Our grandparent 250 * will be waiting for us to finish this, so signal him when 251 * we're done. 252 */ 253 254 if (do_adopt) { 255 int result; 256 257 result = dhcp_adopt(); 258 259 if (grandparent != (pid_t)0) { 260 dhcpmsg(MSG_DEBUG, "adoption complete, signalling " 261 "parent (%i) to exit.", grandparent); 262 (void) kill(grandparent, SIGALRM); 263 } 264 265 if (result == 0) 266 return (EXIT_FAILURE); 267 } 268 269 /* 270 * enter the main event loop; this is where all the real work 271 * takes place (through registering events and scheduling timers). 272 * this function only returns when the agent is shutting down. 273 */ 274 275 switch (iu_handle_events(eh, tq)) { 276 277 case -1: 278 dhcpmsg(MSG_WARNING, "iu_handle_events exited abnormally"); 279 break; 280 281 case DHCP_REASON_INACTIVITY: 282 dhcpmsg(MSG_INFO, "no interfaces to manage, shutting down..."); 283 break; 284 285 case DHCP_REASON_TERMINATE: 286 dhcpmsg(MSG_INFO, "received SIGTERM, shutting down..."); 287 break; 288 289 case DHCP_REASON_SIGNAL: 290 dhcpmsg(MSG_WARNING, "received unexpected signal, shutting " 291 "down..."); 292 break; 293 } 294 295 (void) iu_eh_unregister_signal(eh, SIGTHAW, NULL); 296 297 iu_eh_destroy(eh); 298 iu_tq_destroy(tq); 299 300 return (EXIT_SUCCESS); 301 } 302 303 /* 304 * drain_script(): event loop callback during shutdown 305 * 306 * input: eh_t *: unused 307 * void *: unused 308 * output: boolean_t: B_TRUE if event loop should exit; B_FALSE otherwise 309 */ 310 311 /* ARGSUSED */ 312 boolean_t 313 drain_script(iu_eh_t *ehp, void *arg) 314 { 315 if (shutdown_started == B_FALSE) { 316 shutdown_started = B_TRUE; 317 if (do_adopt == B_FALSE) /* see 4291141 */ 318 nuke_ifslist(B_TRUE); 319 } 320 return (script_count == 0); 321 } 322 323 /* 324 * accept_event(): accepts a new connection on the ipc socket and registers 325 * to receive its messages with the event handler 326 * 327 * input: iu_eh_t *: unused 328 * int: the file descriptor in the iu_eh_t * the connection came in on 329 * (other arguments unused) 330 * output: void 331 */ 332 333 /* ARGSUSED */ 334 static void 335 accept_event(iu_eh_t *ehp, int fd, short events, iu_event_id_t id, void *arg) 336 { 337 int client_fd; 338 int is_priv; 339 340 if (dhcp_ipc_accept(fd, &client_fd, &is_priv) != 0) { 341 dhcpmsg(MSG_ERR, "accept_event: accept on ipc socket"); 342 return; 343 } 344 345 if (iu_register_event(eh, client_fd, POLLIN, ipc_event, 346 (void *)is_priv) == -1) { 347 dhcpmsg(MSG_ERROR, "accept_event: cannot register ipc socket " 348 "for callback"); 349 } 350 } 351 352 /* 353 * ipc_event(): processes incoming ipc requests 354 * 355 * input: iu_eh_t *: unused 356 * int: the file descriptor in the iu_eh_t * the request came in on 357 * short: unused 358 * iu_event_id_t: unused 359 * void *: indicates whether the request is from a privileged client 360 * output: void 361 */ 362 363 /* ARGSUSED */ 364 static void 365 ipc_event(iu_eh_t *ehp, int fd, short events, iu_event_id_t id, void *arg) 366 { 367 dhcp_ipc_request_t *request; 368 struct ifslist *ifsp, *primary_ifsp; 369 int error, is_priv = (int)arg; 370 PKT_LIST *plp[2]; 371 dhcp_ipc_type_t cmd; 372 373 (void) iu_unregister_event(eh, id, NULL); 374 375 if (dhcp_ipc_recv_request(fd, &request, DHCP_IPC_REQUEST_WAIT) != 0) { 376 dhcpmsg(MSG_ERROR, "ipc_event: dhcp_ipc_recv_request failed"); 377 (void) dhcp_ipc_close(fd); 378 return; 379 } 380 381 cmd = DHCP_IPC_CMD(request->message_type); 382 if (cmd >= DHCP_NIPC) { 383 send_error_reply(request, DHCP_IPC_E_CMD_UNKNOWN, &fd); 384 return; 385 } 386 387 /* return EPERM for any of the privileged actions */ 388 389 if (!is_priv) { 390 switch (cmd) { 391 392 case DHCP_STATUS: 393 case DHCP_PING: 394 case DHCP_GET_TAG: 395 break; 396 397 default: 398 dhcpmsg(MSG_WARNING, "ipc_event: privileged ipc " 399 "command (%i) attempted on %s", cmd, 400 request->ifname); 401 402 send_error_reply(request, DHCP_IPC_E_PERM, &fd); 403 return; 404 } 405 } 406 407 /* 408 * try to locate the ifs associated with this command. if the 409 * command is DHCP_START or DHCP_INFORM, then if there isn't 410 * an ifs already, make one (there may already be one from a 411 * previous failed attempt to START or INFORM). otherwise, 412 * verify the interface is still valid. 413 */ 414 415 ifsp = lookup_ifs(request->ifname); 416 417 switch (cmd) { 418 419 case DHCP_START: /* FALLTHRU */ 420 case DHCP_INFORM: 421 /* 422 * it's possible that the interface already exists, but 423 * has been abandoned. usually in those cases we should 424 * return DHCP_IPC_E_UNKIF, but that makes little sense 425 * in the case of "start" or "inform", so just ignore 426 * the abandoned interface and start over anew. 427 */ 428 429 if (ifsp != NULL && verify_ifs(ifsp) == 0) 430 ifsp = NULL; 431 432 /* 433 * as part of initializing the ifs, insert_ifs() 434 * creates a DLPI stream at ifsp->if_dlpi_fd. 435 */ 436 437 if (ifsp == NULL) { 438 ifsp = insert_ifs(request->ifname, B_FALSE, &error); 439 if (ifsp == NULL) { 440 send_error_reply(request, error, &fd); 441 return; 442 } 443 } 444 break; 445 446 default: 447 if (ifsp == NULL) { 448 if (request->ifname[0] == '\0') 449 error = DHCP_IPC_E_NOPRIMARY; 450 else 451 error = DHCP_IPC_E_UNKIF; 452 453 send_error_reply(request, error, &fd); 454 return; 455 } 456 break; 457 } 458 459 if (verify_ifs(ifsp) == 0) { 460 send_error_reply(request, DHCP_IPC_E_UNKIF, &fd); 461 return; 462 } 463 464 if (ifsp->if_dflags & DHCP_IF_BOOTP) { 465 switch (cmd) { 466 467 case DHCP_EXTEND: 468 case DHCP_RELEASE: 469 case DHCP_INFORM: 470 send_error_reply(request, DHCP_IPC_E_BOOTP, &fd); 471 return; 472 473 default: 474 break; 475 } 476 } 477 478 /* 479 * verify that the interface is in a state which will allow the 480 * command. we do this up front so that we can return an error 481 * *before* needlessly cancelling an in-progress transaction. 482 */ 483 484 if (!ipc_cmd_allowed[ifsp->if_state][cmd]) { 485 send_error_reply(request, DHCP_IPC_E_OUTSTATE, &fd); 486 return; 487 } 488 489 if ((request->message_type & DHCP_PRIMARY) && is_priv) { 490 if ((primary_ifsp = lookup_ifs("")) != NULL) 491 primary_ifsp->if_dflags &= ~DHCP_IF_PRIMARY; 492 ifsp->if_dflags |= DHCP_IF_PRIMARY; 493 } 494 495 /* 496 * current design dictates that there can be only one 497 * outstanding transaction per interface -- this simplifies 498 * the code considerably and also fits well with RFC2131. 499 * it is worth classifying the different DHCP commands into 500 * synchronous (those which we will handle now and be done 501 * with) and asynchronous (those which require transactions 502 * and will be completed at an indeterminate time in the 503 * future): 504 * 505 * DROP: removes the agent's management of an interface. 506 * asynchronous as the script program may be invoked. 507 * 508 * PING: checks to see if the agent controls an interface. 509 * synchronous, since no packets need to be sent 510 * to the DHCP server. 511 * 512 * STATUS: returns information about the an interface. 513 * synchronous, since no packets need to be sent 514 * to the DHCP server. 515 * 516 * RELEASE: releases the agent's management of an interface 517 * and brings the interface down. asynchronous as 518 * the script program may be invoked. 519 * 520 * EXTEND: renews a lease. asynchronous, since the agent 521 * needs to wait for an ACK, etc. 522 * 523 * START: starts DHCP on an interface. asynchronous since 524 * the agent needs to wait for OFFERs, ACKs, etc. 525 * 526 * INFORM: obtains configuration parameters for an externally 527 * configured interface. asynchronous, since the 528 * agent needs to wait for an ACK. 529 * 530 * notice that EXTEND, INFORM, START, DROP and RELEASE are 531 * asynchronous. notice also that asynchronous commands may 532 * occur from within the agent -- for instance, the agent 533 * will need to do implicit EXTENDs to extend the lease. in 534 * order to make the code simpler, the following rules apply 535 * for asynchronous commands: 536 * 537 * there can only be one asynchronous command at a time per 538 * interface. the current asynchronous command is managed by 539 * the async_* api: async_start(), async_finish(), 540 * async_timeout(), async_cancel(), and async_pending(). 541 * async_start() starts management of a new asynchronous 542 * command on an interface, which should only be done after 543 * async_pending() is called to check that there are no 544 * pending asynchronous commands on that interface. when the 545 * command is completed, async_finish() should be called. all 546 * asynchronous commands have an associated timer, which calls 547 * async_timeout() when it times out. if async_timeout() 548 * decides that the asynchronous command should be cancelled 549 * (see below), it calls async_cancel() to attempt 550 * cancellation. 551 * 552 * asynchronous commands started by a user command have an 553 * associated ipc_action which provides the agent with 554 * information for how to get in touch with the user command 555 * when the action completes. these ipc_action records also 556 * have an associated timeout which may be infinite. 557 * ipc_action_start() should be called when starting an 558 * asynchronous command requested by a user, which sets up the 559 * timer and keeps track of the ipc information (file 560 * descriptor, request type). when the asynchronous command 561 * completes, ipc_action_finish() should be called to return a 562 * command status code to the user and close the ipc 563 * connection). if the command does not complete before the 564 * timer fires, ipc_action_timeout() is called which closes 565 * the ipc connection and returns DHCP_IPC_E_TIMEOUT to the 566 * user. note that independent of ipc_action_timeout(), 567 * ipc_action_finish() should be called. 568 * 569 * on a case-by-case basis, here is what happens (per interface): 570 * 571 * o when an asynchronous command is requested, then 572 * async_pending() is called to see if there is already 573 * an asynchronous event. if so, the command does not 574 * proceed, and if there is an associated ipc_action, 575 * the user command is sent DHCP_IPC_E_PEND. 576 * 577 * o otherwise, the the transaction is started with 578 * async_start(). if the transaction is on behalf 579 * of a user, ipc_action_start() is called to keep 580 * track of the ipc information and set up the 581 * ipc_action timer. 582 * 583 * o if the command completes normally and before a 584 * timeout fires, then async_finish() is called. 585 * if there was an associated ipc_action, 586 * ipc_action_finish() is called to complete it. 587 * 588 * o if the command fails before a timeout fires, then 589 * async_finish() is called, and the interface is 590 * is returned to a known state based on the command. 591 * if there was an associated ipc_action, 592 * ipc_action_finish() is called to complete it. 593 * 594 * o if the ipc_action timer fires before command 595 * completion, then DHCP_IPC_E_TIMEOUT is returned to 596 * the user. however, the transaction continues to 597 * be carried out asynchronously. 598 * 599 * o if async_timeout() fires before command completion, 600 * then if the command was internal to the agent, it 601 * is cancelled. otherwise, if it was a user command, 602 * then if the user is still waiting for the command 603 * to complete, the command continues and async_timeout() 604 * is rescheduled. 605 */ 606 607 switch (cmd) { 608 609 case DHCP_DROP: /* FALLTHRU */ 610 case DHCP_RELEASE: /* FALLTHRU */ 611 case DHCP_EXTEND: /* FALLTHRU */ 612 case DHCP_INFORM: /* FALLTHRU */ 613 case DHCP_START: 614 /* 615 * if shutdown request has been received, send back an error. 616 */ 617 if (shutdown_started) { 618 send_error_reply(request, DHCP_IPC_E_OUTSTATE, &fd); 619 return; 620 } 621 622 if (async_pending(ifsp)) { 623 send_error_reply(request, DHCP_IPC_E_PEND, &fd); 624 return; 625 } 626 627 if (ipc_action_start(ifsp, request, fd) == 0) { 628 dhcpmsg(MSG_WARNING, "ipc_event: ipc_action_start " 629 "failed for %s", ifsp->if_name); 630 send_error_reply(request, DHCP_IPC_E_MEMORY, &fd); 631 return; 632 } 633 634 if (async_start(ifsp, cmd, B_TRUE) == 0) { 635 ipc_action_finish(ifsp, DHCP_IPC_E_MEMORY); 636 return; 637 } 638 break; 639 640 default: 641 break; 642 } 643 644 switch (cmd) { 645 646 case DHCP_DROP: 647 (void) script_start(ifsp, EVENT_DROP, dhcp_drop, NULL, NULL); 648 return; 649 650 case DHCP_EXTEND: 651 (void) dhcp_extending(ifsp); 652 break; 653 654 case DHCP_GET_TAG: { 655 dhcp_optnum_t optnum; 656 DHCP_OPT *opt = NULL; 657 boolean_t did_alloc = B_FALSE; 658 PKT_LIST *ack = ifsp->if_ack; 659 660 /* 661 * verify the request makes sense. 662 */ 663 664 if (request->data_type != DHCP_TYPE_OPTNUM || 665 request->data_length != sizeof (dhcp_optnum_t)) { 666 send_error_reply(request, DHCP_IPC_E_PROTO, &fd); 667 return; 668 } 669 670 (void) memcpy(&optnum, request->buffer, sizeof (dhcp_optnum_t)); 671 load_option: 672 switch (optnum.category) { 673 674 case DSYM_SITE: /* FALLTHRU */ 675 case DSYM_STANDARD: 676 if (optnum.code <= DHCP_LAST_OPT) 677 opt = ack->opts[optnum.code]; 678 break; 679 680 case DSYM_VENDOR: 681 /* 682 * the test against VS_OPTION_START is broken up into 683 * two tests to avoid compiler warnings under intel. 684 */ 685 686 if ((optnum.code > VS_OPTION_START || 687 optnum.code == VS_OPTION_START) && 688 optnum.code <= VS_OPTION_END) 689 opt = ack->vs[optnum.code]; 690 break; 691 692 case DSYM_FIELD: 693 if (optnum.code + optnum.size > sizeof (PKT)) 694 break; 695 696 /* + 2 to account for option code and length byte */ 697 opt = malloc(optnum.size + 2); 698 if (opt == NULL) { 699 send_error_reply(request, DHCP_IPC_E_MEMORY, 700 &fd); 701 return; 702 } 703 704 did_alloc = B_TRUE; 705 opt->len = optnum.size; 706 opt->code = optnum.code; 707 (void) memcpy(&opt->value, (caddr_t)ack->pkt + 708 opt->code, opt->len); 709 710 break; 711 712 default: 713 send_error_reply(request, DHCP_IPC_E_PROTO, &fd); 714 return; 715 } 716 717 /* 718 * return the option payload, if there was one. the "+ 2" 719 * accounts for the option code number and length byte. 720 */ 721 722 if (opt != NULL) { 723 send_data_reply(request, &fd, 0, DHCP_TYPE_OPTION, opt, 724 opt->len + 2); 725 726 if (did_alloc) 727 free(opt); 728 return; 729 } else if (ack != ifsp->if_orig_ack) { 730 /* 731 * There wasn't any definition for the option in the 732 * current ack, so now retry with the original ack if 733 * the original ack is not the current ack. 734 */ 735 ack = ifsp->if_orig_ack; 736 goto load_option; 737 } 738 739 /* 740 * note that an "okay" response is returned either in 741 * the case of an unknown option or a known option 742 * with no payload. this is okay (for now) since 743 * dhcpinfo checks whether an option is valid before 744 * ever performing ipc with the agent. 745 */ 746 747 send_ok_reply(request, &fd); 748 return; 749 } 750 751 case DHCP_INFORM: 752 dhcp_inform(ifsp); 753 /* next destination: dhcp_acknak() */ 754 return; 755 756 case DHCP_PING: 757 if (ifsp->if_dflags & DHCP_IF_FAILED) 758 send_error_reply(request, DHCP_IPC_E_FAILEDIF, &fd); 759 else 760 send_ok_reply(request, &fd); 761 return; 762 763 case DHCP_RELEASE: 764 (void) script_start(ifsp, EVENT_RELEASE, dhcp_release, 765 "Finished with lease.", NULL); 766 return; 767 768 case DHCP_START: 769 assert(ifsp->if_state == INIT); 770 (void) canonize_ifs(ifsp); 771 772 /* 773 * if we have a valid hostconf lying around, then jump 774 * into INIT_REBOOT. if it fails, we'll end up going 775 * through the whole selecting() procedure again. 776 */ 777 778 error = read_hostconf(ifsp->if_name, plp, 2); 779 if (error != -1) { 780 ifsp->if_orig_ack = ifsp->if_ack = plp[0]; 781 if (error > 1) { 782 /* 783 * Return indicated we had more than one packet 784 * second one is the original ack. Older 785 * versions of the agent wrote only one ack 786 * to the file, we now keep both the first 787 * ack as well as the last one. 788 */ 789 ifsp->if_orig_ack = plp[1]; 790 } 791 dhcp_init_reboot(ifsp); 792 /* next destination: dhcp_acknak() */ 793 return; 794 } 795 796 /* 797 * if not debugging, wait for a few seconds before 798 * going into SELECTING. 799 */ 800 801 if (debug_level == 0) { 802 if (iu_schedule_timer_ms(tq, 803 lrand48() % DHCP_SELECT_WAIT, dhcp_start, ifsp) 804 != -1) { 805 hold_ifs(ifsp); 806 /* next destination: dhcp_start() */ 807 return; 808 } 809 } 810 811 dhcp_selecting(ifsp); 812 /* next destination: dhcp_requesting() */ 813 return; 814 815 case DHCP_STATUS: { 816 dhcp_status_t status; 817 818 status.if_began = monosec_to_time(ifsp->if_curstart_monosec); 819 820 if (ifsp->if_lease == DHCP_PERM) { 821 status.if_t1 = DHCP_PERM; 822 status.if_t2 = DHCP_PERM; 823 status.if_lease = DHCP_PERM; 824 } else { 825 status.if_t1 = status.if_began + ifsp->if_t1; 826 status.if_t2 = status.if_began + ifsp->if_t2; 827 status.if_lease = status.if_began + ifsp->if_lease; 828 } 829 830 status.version = DHCP_STATUS_VER; 831 status.if_state = ifsp->if_state; 832 status.if_dflags = ifsp->if_dflags; 833 status.if_sent = ifsp->if_sent; 834 status.if_recv = ifsp->if_received; 835 status.if_bad_offers = ifsp->if_bad_offers; 836 837 (void) strlcpy(status.if_name, ifsp->if_name, IFNAMSIZ); 838 839 send_data_reply(request, &fd, 0, DHCP_TYPE_STATUS, &status, 840 sizeof (dhcp_status_t)); 841 return; 842 } 843 844 default: 845 return; 846 } 847 } 848