2017-11-18 19:09:20 +03:00
/* SPDX-License-Identifier: LGPL-2.1+ */
2013-12-10 01:43:08 +04:00
/***
2018-06-12 18:15:23 +03:00
Copyright © 2013 Intel Corporation . All rights reserved .
2013-12-10 01:43:08 +04:00
* * */
# include <errno.h>
2013-12-10 01:43:19 +04:00
# include <net/ethernet.h>
2014-04-06 16:05:32 +04:00
# include <net/if_arp.h>
2015-10-24 23:58:24 +03:00
# include <stdio.h>
# include <stdlib.h>
# include <string.h>
2014-02-23 20:30:13 +04:00
# include <sys/ioctl.h>
2015-10-24 23:58:24 +03:00
# include <linux/if_infiniband.h>
2013-12-10 01:43:08 +04:00
2015-10-24 23:58:24 +03:00
# include "sd-dhcp-client.h"
2013-12-10 01:43:08 +04:00
2015-10-27 05:01:06 +03:00
# include "alloc-util.h"
2015-10-24 23:58:24 +03:00
# include "async.h"
# include "dhcp-identifier.h"
2013-12-10 01:43:19 +04:00
# include "dhcp-internal.h"
2014-02-27 04:24:05 +04:00
# include "dhcp-lease-internal.h"
2015-10-24 23:58:24 +03:00
# include "dhcp-protocol.h"
2015-11-16 12:17:48 +03:00
# include "dns-domain.h"
2018-11-13 07:50:08 +03:00
# include "event-util.h"
2015-11-16 12:17:48 +03:00
# include "hostname-util.h"
2018-11-27 12:34:32 +03:00
# include "io-util.h"
2015-10-24 23:58:24 +03:00
# include "random-util.h"
# include "string-util.h"
2018-05-07 15:21:02 +03:00
# include "strv.h"
2018-11-27 12:34:32 +03:00
# include "util.h"
2013-12-10 01:43:08 +04:00
2015-01-22 02:53:16 +03:00
# define MAX_CLIENT_ID_LEN (sizeof(uint32_t) + MAX_DUID_LEN) /* Arbitrary limit */
2015-04-12 21:15:08 +03:00
# define MAX_MAC_ADDR_LEN CONST_MAX(INFINIBAND_ALEN, ETH_ALEN)
2014-10-08 23:15:45 +04:00
2016-01-27 13:21:23 +03:00
# define RESTART_AFTER_NAK_MIN_USEC (1 * USEC_PER_SEC)
# define RESTART_AFTER_NAK_MAX_USEC (30 * USEC_PER_MINUTE)
2013-12-10 01:43:08 +04:00
struct sd_dhcp_client {
2015-08-26 22:05:53 +03:00
unsigned n_ref ;
2014-04-09 14:12:07 +04:00
2013-12-10 01:43:08 +04:00
DHCPState state ;
2013-12-10 01:43:25 +04:00
sd_event * event ;
2014-01-18 22:32:45 +04:00
int event_priority ;
2013-12-10 01:43:25 +04:00
sd_event_source * timeout_resend ;
2016-05-23 17:13:18 +03:00
int ifindex ;
2013-12-10 01:43:26 +04:00
int fd ;
2016-11-11 02:34:19 +03:00
uint16_t port ;
2013-12-10 01:43:26 +04:00
union sockaddr_union link ;
sd_event_source * receive_message ;
2014-07-15 20:55:31 +04:00
bool request_broadcast ;
2013-12-10 01:43:08 +04:00
uint8_t * req_opts ;
2013-12-31 20:57:38 +04:00
size_t req_opts_allocated ;
2013-12-10 01:43:08 +04:00
size_t req_opts_size ;
2017-08-03 04:32:46 +03:00
bool anonymize ;
2013-12-20 19:16:10 +04:00
be32_t last_addr ;
2014-10-08 23:15:45 +04:00
uint8_t mac_addr [ MAX_MAC_ADDR_LEN ] ;
size_t mac_addr_len ;
uint16_t arp_type ;
2015-01-22 02:53:16 +03:00
struct {
uint8_t type ;
union {
struct {
/* 0: Generic (non-LL) (RFC 2132) */
uint8_t data [ MAX_CLIENT_ID_LEN ] ;
} _packed_ gen ;
struct {
/* 1: Ethernet Link-Layer (RFC 2132) */
uint8_t haddr [ ETH_ALEN ] ;
} _packed_ eth ;
struct {
/* 2 - 254: ARP/Link-Layer (RFC 2132) */
uint8_t haddr [ 0 ] ;
} _packed_ ll ;
struct {
/* 255: Node-specific (RFC 4361) */
2016-03-31 02:33:55 +03:00
be32_t iaid ;
2015-01-22 02:53:16 +03:00
struct duid duid ;
} _packed_ ns ;
struct {
uint8_t data [ MAX_CLIENT_ID_LEN ] ;
} _packed_ raw ;
} ;
} _packed_ client_id ;
2014-11-19 02:01:20 +03:00
size_t client_id_len ;
2014-07-01 22:58:49 +04:00
char * hostname ;
2014-07-14 12:04:18 +04:00
char * vendor_class_identifier ;
2018-05-07 15:21:02 +03:00
char * * user_class ;
2014-08-01 18:10:13 +04:00
uint32_t mtu ;
2013-12-10 01:43:19 +04:00
uint32_t xid ;
2013-12-10 01:43:25 +04:00
usec_t start_time ;
2018-10-19 21:00:46 +03:00
unsigned attempt ;
2013-12-10 01:43:30 +04:00
usec_t request_sent ;
sd_event_source * timeout_t1 ;
sd_event_source * timeout_t2 ;
sd_event_source * timeout_expire ;
2016-05-23 17:48:56 +03:00
sd_dhcp_client_callback_t callback ;
2013-12-10 01:43:31 +04:00
void * userdata ;
2014-02-05 02:13:52 +04:00
sd_dhcp_lease * lease ;
2016-01-27 13:21:23 +03:00
usec_t start_delay ;
2013-12-10 01:43:08 +04:00
} ;
static const uint8_t default_req_opts [ ] = {
2016-01-20 16:44:24 +03:00
SD_DHCP_OPTION_SUBNET_MASK ,
SD_DHCP_OPTION_ROUTER ,
SD_DHCP_OPTION_HOST_NAME ,
SD_DHCP_OPTION_DOMAIN_NAME ,
SD_DHCP_OPTION_DOMAIN_NAME_SERVER ,
2013-12-10 01:43:08 +04:00
} ;
2017-08-03 04:32:46 +03:00
/* RFC7844 section 3:
MAY contain the Parameter Request List option .
RFC7844 section 3.6 :
The client intending to protect its privacy SHOULD only request a
minimal number of options in the PRL and SHOULD also randomly shuffle
the ordering of option codes in the PRL . If this random ordering
cannot be implemented , the client MAY order the option codes in the
PRL by option code number ( lowest to highest ) .
*/
/* NOTE: using PRL options that Windows 10 RFC7844 implementation uses */
static const uint8_t default_req_opts_anonymize [ ] = {
2018-12-23 01:57:28 +03:00
SD_DHCP_OPTION_SUBNET_MASK , /* 1 */
SD_DHCP_OPTION_ROUTER , /* 3 */
SD_DHCP_OPTION_DOMAIN_NAME_SERVER , /* 6 */
SD_DHCP_OPTION_DOMAIN_NAME , /* 15 */
SD_DHCP_OPTION_ROUTER_DISCOVER , /* 31 */
SD_DHCP_OPTION_STATIC_ROUTE , /* 33 */
SD_DHCP_OPTION_VENDOR_SPECIFIC , /* 43 */
SD_DHCP_OPTION_NETBIOS_NAMESERVER , /* 44 */
SD_DHCP_OPTION_NETBIOS_NODETYPE , /* 46 */
SD_DHCP_OPTION_NETBIOS_SCOPE , /* 47 */
SD_DHCP_OPTION_CLASSLESS_STATIC_ROUTE , /* 121 */
SD_DHCP_OPTION_PRIVATE_CLASSLESS_STATIC_ROUTE , /* 249 */
SD_DHCP_OPTION_PRIVATE_PROXY_AUTODISCOVERY , /* 252 */
2017-08-03 04:32:46 +03:00
} ;
2016-05-03 18:52:44 +03:00
static int client_receive_message_raw (
sd_event_source * s ,
int fd ,
uint32_t revents ,
void * userdata ) ;
static int client_receive_message_udp (
sd_event_source * s ,
int fd ,
uint32_t revents ,
void * userdata ) ;
2014-05-22 17:18:28 +04:00
static void client_stop ( sd_dhcp_client * client , int error ) ;
2013-12-20 19:16:18 +04:00
2016-05-03 18:52:44 +03:00
int sd_dhcp_client_set_callback (
sd_dhcp_client * client ,
sd_dhcp_client_callback_t cb ,
void * userdata ) {
2016-05-23 17:48:56 +03:00
2013-12-10 01:43:31 +04:00
assert_return ( client , - EINVAL ) ;
2016-05-23 17:48:56 +03:00
client - > callback = cb ;
2013-12-10 01:43:31 +04:00
client - > userdata = userdata ;
return 0 ;
}
2014-07-15 20:55:31 +04:00
int sd_dhcp_client_set_request_broadcast ( sd_dhcp_client * client , int broadcast ) {
assert_return ( client , - EINVAL ) ;
client - > request_broadcast = ! ! broadcast ;
return 0 ;
}
2014-01-16 22:55:25 +04:00
int sd_dhcp_client_set_request_option ( sd_dhcp_client * client , uint8_t option ) {
2013-12-10 01:43:08 +04:00
size_t i ;
assert_return ( client , - EINVAL ) ;
2016-05-23 17:27:05 +03:00
assert_return ( IN_SET ( client - > state , DHCP_STATE_INIT , DHCP_STATE_STOPPED ) , - EBUSY ) ;
2013-12-10 01:43:08 +04:00
switch ( option ) {
2016-05-23 17:27:05 +03:00
2016-01-20 16:44:24 +03:00
case SD_DHCP_OPTION_PAD :
case SD_DHCP_OPTION_OVERLOAD :
case SD_DHCP_OPTION_MESSAGE_TYPE :
case SD_DHCP_OPTION_PARAMETER_REQUEST_LIST :
case SD_DHCP_OPTION_END :
2013-12-10 01:43:08 +04:00
return - EINVAL ;
default :
break ;
}
for ( i = 0 ; i < client - > req_opts_size ; i + + )
if ( client - > req_opts [ i ] = = option )
return - EEXIST ;
2013-12-31 20:57:38 +04:00
if ( ! GREEDY_REALLOC ( client - > req_opts , client - > req_opts_allocated ,
2013-12-10 01:43:08 +04:00
client - > req_opts_size + 1 ) )
return - ENOMEM ;
2013-12-31 20:57:38 +04:00
client - > req_opts [ client - > req_opts_size + + ] = option ;
2013-12-10 01:43:08 +04:00
return 0 ;
}
2016-05-03 18:52:44 +03:00
int sd_dhcp_client_set_request_address (
sd_dhcp_client * client ,
const struct in_addr * last_addr ) {
2016-05-23 17:27:05 +03:00
2013-12-10 01:43:08 +04:00
assert_return ( client , - EINVAL ) ;
2016-05-23 17:27:05 +03:00
assert_return ( IN_SET ( client - > state , DHCP_STATE_INIT , DHCP_STATE_STOPPED ) , - EBUSY ) ;
2013-12-10 01:43:08 +04:00
if ( last_addr )
client - > last_addr = last_addr - > s_addr ;
else
client - > last_addr = INADDR_ANY ;
return 0 ;
}
2016-05-23 17:13:18 +03:00
int sd_dhcp_client_set_ifindex ( sd_dhcp_client * client , int ifindex ) {
2013-12-10 01:43:08 +04:00
2016-05-23 17:13:18 +03:00
assert_return ( client , - EINVAL ) ;
assert_return ( IN_SET ( client - > state , DHCP_STATE_INIT , DHCP_STATE_STOPPED ) , - EBUSY ) ;
assert_return ( ifindex > 0 , - EINVAL ) ;
2013-12-10 01:43:08 +04:00
2016-05-23 17:13:18 +03:00
client - > ifindex = ifindex ;
2013-12-10 01:43:08 +04:00
return 0 ;
}
2016-05-03 18:52:44 +03:00
int sd_dhcp_client_set_mac (
sd_dhcp_client * client ,
const uint8_t * addr ,
size_t addr_len ,
uint16_t arp_type ) {
2014-05-22 17:18:28 +04:00
DHCP_CLIENT_DONT_DESTROY ( client ) ;
2014-03-21 21:36:32 +04:00
bool need_restart = false ;
2013-12-10 01:43:19 +04:00
assert_return ( client , - EINVAL ) ;
2014-03-21 21:36:32 +04:00
assert_return ( addr , - EINVAL ) ;
2014-10-08 23:15:45 +04:00
assert_return ( addr_len > 0 & & addr_len < = MAX_MAC_ADDR_LEN , - EINVAL ) ;
assert_return ( arp_type > 0 , - EINVAL ) ;
if ( arp_type = = ARPHRD_ETHER )
assert_return ( addr_len = = ETH_ALEN , - EINVAL ) ;
else if ( arp_type = = ARPHRD_INFINIBAND )
assert_return ( addr_len = = INFINIBAND_ALEN , - EINVAL ) ;
else
return - EINVAL ;
2013-12-10 01:43:19 +04:00
2014-10-08 23:15:45 +04:00
if ( client - > mac_addr_len = = addr_len & &
memcmp ( & client - > mac_addr , addr , addr_len ) = = 0 )
2014-03-21 21:36:32 +04:00
return 0 ;
2014-04-09 14:12:08 +04:00
if ( ! IN_SET ( client - > state , DHCP_STATE_INIT , DHCP_STATE_STOPPED ) ) {
2016-05-23 17:27:05 +03:00
log_dhcp_client ( client , " Changing MAC address on running DHCP client, restarting " ) ;
2014-03-21 21:36:32 +04:00
need_restart = true ;
2015-09-22 15:46:21 +03:00
client_stop ( client , SD_DHCP_CLIENT_EVENT_STOP ) ;
2014-03-21 21:36:32 +04:00
}
2014-03-05 14:07:15 +04:00
2014-10-08 23:15:45 +04:00
memcpy ( & client - > mac_addr , addr , addr_len ) ;
client - > mac_addr_len = addr_len ;
client - > arp_type = arp_type ;
2014-11-19 02:01:20 +03:00
if ( need_restart & & client - > state ! = DHCP_STATE_STOPPED )
sd_dhcp_client_start ( client ) ;
return 0 ;
}
2016-05-03 18:52:44 +03:00
int sd_dhcp_client_get_client_id (
sd_dhcp_client * client ,
uint8_t * type ,
const uint8_t * * data ,
size_t * data_len ) {
2014-11-19 02:01:20 +03:00
assert_return ( client , - EINVAL ) ;
assert_return ( type , - EINVAL ) ;
assert_return ( data , - EINVAL ) ;
assert_return ( data_len , - EINVAL ) ;
* type = 0 ;
* data = NULL ;
* data_len = 0 ;
if ( client - > client_id_len ) {
2015-01-22 02:53:16 +03:00
* type = client - > client_id . type ;
2014-11-19 02:01:20 +03:00
* data = client - > client_id . raw . data ;
2015-01-22 02:53:16 +03:00
* data_len = client - > client_id_len - sizeof ( client - > client_id . type ) ;
2014-11-19 02:01:20 +03:00
}
return 0 ;
}
2016-05-03 18:52:44 +03:00
int sd_dhcp_client_set_client_id (
sd_dhcp_client * client ,
uint8_t type ,
const uint8_t * data ,
size_t data_len ) {
2014-11-19 02:01:20 +03:00
DHCP_CLIENT_DONT_DESTROY ( client ) ;
bool need_restart = false ;
assert_return ( client , - EINVAL ) ;
assert_return ( data , - EINVAL ) ;
assert_return ( data_len > 0 & & data_len < = MAX_CLIENT_ID_LEN , - EINVAL ) ;
2015-01-22 02:53:16 +03:00
if ( client - > client_id_len = = data_len + sizeof ( client - > client_id . type ) & &
client - > client_id . type = = type & &
2014-11-19 02:01:20 +03:00
memcmp ( & client - > client_id . raw . data , data , data_len ) = = 0 )
return 0 ;
dhcp: don't enforce hardware address length for sd_dhcp_client_set_client_id()
sd_dhcp_client_set_client_id() is the only API for setting a raw client-id.
All other setters are more restricted and only allow to set a type 255 DUID.
Also, dhcp4_set_client_identifier() is the only caller, which already
does:
r = sd_dhcp_client_set_client_id(link->dhcp_client,
ARPHRD_ETHER,
(const uint8_t *) &link->mac,
sizeof(link->mac));
and hence ensures that the data length is indeed ETH_ALEN.
Drop additional input validation from sd_dhcp_client_set_client_id(). The client-id
is an opaque blob, and if a caller wishes to set type 1 (ethernet) or type 32
(infiniband) with unexpected address length, it should be allowed. The actual
client-id is not relevant to the DHCP client, and it's the responsibility of the
caller to generate a suitable client-id.
For example, in NetworkManager you can configure all the bytes of the
client-id, including such _invalid_ settings. I think it makes sense,
to allow the user to fully configure the identifier. Even if such configuration
would be rejected, it would be the responsibility of the higher layers (including
a sensible error message to the user) and not fail later during
sd_dhcp_client_set_client_id().
Still log a debug message if the length is unexpected.
2018-12-19 12:05:37 +03:00
/* For hardware types, log debug message about unexpected data length.
*
* Note that infiniband ' s INFINIBAND_ALEN is 20 bytes long , but only
* last last 8 bytes of the address are stable and suitable to put into
* the client - id . The caller is advised to account for that . */
if ( ( type = = ARPHRD_ETHER & & data_len ! = ETH_ALEN ) | |
( type = = ARPHRD_INFINIBAND & & data_len ! = 8 ) )
log_dhcp_client ( client , " Changing client ID to hardware type %u with "
" unexpected address length %zu " ,
type , data_len ) ;
2014-11-19 02:01:20 +03:00
if ( ! IN_SET ( client - > state , DHCP_STATE_INIT , DHCP_STATE_STOPPED ) ) {
log_dhcp_client ( client , " Changing client ID on running DHCP "
" client, restarting " ) ;
need_restart = true ;
2015-09-22 15:46:21 +03:00
client_stop ( client , SD_DHCP_CLIENT_EVENT_STOP ) ;
2014-11-19 02:01:20 +03:00
}
2015-01-22 02:53:16 +03:00
client - > client_id . type = type ;
2014-11-19 02:01:20 +03:00
memcpy ( & client - > client_id . raw . data , data , data_len ) ;
2015-01-22 02:53:16 +03:00
client - > client_id_len = data_len + sizeof ( client - > client_id . type ) ;
2013-12-10 01:43:19 +04:00
2014-04-09 14:12:08 +04:00
if ( need_restart & & client - > state ! = DHCP_STATE_STOPPED )
2014-03-21 21:36:32 +04:00
sd_dhcp_client_start ( client ) ;
2013-12-10 01:43:19 +04:00
return 0 ;
}
2016-04-30 04:18:11 +03:00
/**
* Sets IAID and DUID . If duid is non - null , the DUID is set to duid_type + duid
* without further modification . Otherwise , if duid_type is supported , DUID
* is set based on that type . Otherwise , an error is returned .
*/
2018-08-07 07:55:38 +03:00
static int dhcp_client_set_iaid_duid_internal (
2016-05-03 18:52:44 +03:00
sd_dhcp_client * client ,
2018-11-24 00:19:26 +03:00
bool iaid_append ,
bool iaid_set ,
2016-05-03 18:52:44 +03:00
uint32_t iaid ,
uint16_t duid_type ,
2016-05-03 19:08:56 +03:00
const void * duid ,
2018-08-07 07:55:38 +03:00
size_t duid_len ,
usec_t llt_time ) {
2016-05-03 18:52:44 +03:00
2016-03-31 02:33:55 +03:00
DHCP_CLIENT_DONT_DESTROY ( client ) ;
int r ;
2016-04-30 04:18:11 +03:00
size_t len ;
2016-03-31 02:33:55 +03:00
assert_return ( client , - EINVAL ) ;
2018-12-23 01:58:58 +03:00
assert_return ( duid_len = = 0 | | duid , - EINVAL ) ;
2016-04-30 04:18:11 +03:00
2018-12-23 01:58:58 +03:00
if ( duid ) {
dhcp6: don't enforce DUID content for sd_dhcp6_client_set_duid()
There are various functions to set the DUID of a DHCPv6 client.
However, none of them allows to set arbitrary data. The closest is
sd_dhcp6_client_set_duid(), which would still do validation of the
DUID's content via dhcp_validate_duid_len().
Relax the validation and only log a debug message if the DUID
does not validate.
Note that dhcp_validate_duid_len() already is not very strict. For example
with DUID_TYPE_LLT it only ensures that the length is suitable to contain
hwtype and time. It does not further check that the length of hwaddr is non-zero
or suitable for hwtype. Also, non-well-known DUID types are accepted for
extensibility. Why reject certain DUIDs but allowing clearly wrong formats
otherwise?
The validation and failure should happen earlier, when accepting the
unsuitable DUID. At that point, there is more context of what is wrong,
and a better failure reason (or warning) can be reported to the user. Rejecting
the DUID when setting up the DHCPv6 client seems not optimal, in particular
because the DHCPv6 client does not care about actual content of the
DUID and treats it as opaque blob.
Also, NetworkManager (which uses this code) allows to configure the entire
binary DUID in binary. It intentionally does not validate the binary
content any further. Hence, it needs to be able to set _invalid_ DUIDs,
provided that some basic constraints are satisfied (like the maximum length).
sd_dhcp6_client_set_duid() has two callers: both set the DUID obtained
from link_get_duid(), which comes from configuration.
`man networkd.conf` says: "The configured DHCP DUID should conform to
the specification in RFC 3315, RFC 6355.". It does not not state that
it MUST conform.
Note that dhcp_validate_duid_len() has another caller: DHCPv4's
dhcp_client_set_iaid_duid_internal(). In this case, continue with
strict validation, as the callers are more controlled. Also, there is
already sd_dhcp_client_set_client_id() which can be used to bypass
this check and set arbitrary client identifiers.
2018-12-20 13:56:02 +03:00
r = dhcp_validate_duid_len ( duid_type , duid_len , true ) ;
2016-04-30 04:18:11 +03:00
if ( r < 0 )
return r ;
}
2016-03-31 02:33:55 +03:00
2016-04-30 04:18:11 +03:00
zero ( client - > client_id ) ;
2016-03-31 02:33:55 +03:00
client - > client_id . type = 255 ;
2018-11-24 00:19:26 +03:00
if ( iaid_append ) {
if ( iaid_set )
client - > client_id . ns . iaid = htobe32 ( iaid ) ;
else {
2018-03-12 19:18:07 +03:00
r = dhcp_identifier_set_iaid ( client - > ifindex , client - > mac_addr ,
client - > mac_addr_len ,
2018-11-01 16:43:11 +03:00
true ,
2018-03-12 19:18:07 +03:00
& client - > client_id . ns . iaid ) ;
if ( r < 0 )
return r ;
2018-11-24 00:19:26 +03:00
}
2018-03-12 19:18:07 +03:00
}
2016-03-31 02:33:55 +03:00
2018-12-23 01:58:58 +03:00
if ( duid ) {
2016-03-31 02:33:55 +03:00
client - > client_id . ns . duid . type = htobe16 ( duid_type ) ;
memcpy ( & client - > client_id . ns . duid . raw . data , duid , duid_len ) ;
2016-04-30 04:18:11 +03:00
len = sizeof ( client - > client_id . ns . duid . type ) + duid_len ;
} else
2018-06-25 12:23:13 +03:00
switch ( duid_type ) {
2018-08-07 07:35:58 +03:00
case DUID_TYPE_LLT :
2018-08-24 05:14:32 +03:00
if ( client - > mac_addr_len = = 0 )
2018-08-07 07:35:58 +03:00
return - EOPNOTSUPP ;
2018-08-07 07:55:38 +03:00
r = dhcp_identifier_set_duid_llt ( & client - > client_id . ns . duid , llt_time , client - > mac_addr , client - > mac_addr_len , client - > arp_type , & len ) ;
2018-08-07 07:35:58 +03:00
if ( r < 0 )
return r ;
break ;
2018-06-25 12:23:13 +03:00
case DUID_TYPE_EN :
r = dhcp_identifier_set_duid_en ( & client - > client_id . ns . duid , & len ) ;
if ( r < 0 )
return r ;
break ;
2018-08-07 07:35:58 +03:00
case DUID_TYPE_LL :
2018-08-24 05:14:32 +03:00
if ( client - > mac_addr_len = = 0 )
2018-08-07 07:35:58 +03:00
return - EOPNOTSUPP ;
r = dhcp_identifier_set_duid_ll ( & client - > client_id . ns . duid , client - > mac_addr , client - > mac_addr_len , client - > arp_type , & len ) ;
if ( r < 0 )
return r ;
break ;
2018-06-25 12:23:13 +03:00
case DUID_TYPE_UUID :
r = dhcp_identifier_set_duid_uuid ( & client - > client_id . ns . duid , & len ) ;
if ( r < 0 )
return r ;
break ;
default :
2018-08-07 07:35:58 +03:00
return - EINVAL ;
2018-06-25 12:23:13 +03:00
}
2016-03-31 02:33:55 +03:00
2016-04-30 04:18:11 +03:00
client - > client_id_len = sizeof ( client - > client_id . type ) + len +
2018-11-24 00:19:26 +03:00
( iaid_append ? sizeof ( client - > client_id . ns . iaid ) : 0 ) ;
2016-03-31 02:33:55 +03:00
if ( ! IN_SET ( client - > state , DHCP_STATE_INIT , DHCP_STATE_STOPPED ) ) {
2018-11-24 00:19:26 +03:00
log_dhcp_client ( client , " Configured %sDUID, restarting. " , iaid_append ? " IAID+ " : " " ) ;
2016-03-31 02:33:55 +03:00
client_stop ( client , SD_DHCP_CLIENT_EVENT_STOP ) ;
sd_dhcp_client_start ( client ) ;
}
return 0 ;
}
2018-03-12 19:18:07 +03:00
int sd_dhcp_client_set_iaid_duid (
sd_dhcp_client * client ,
2018-11-24 00:19:26 +03:00
bool iaid_set ,
2018-03-12 19:18:07 +03:00
uint32_t iaid ,
uint16_t duid_type ,
const void * duid ,
size_t duid_len ) {
2018-11-24 00:19:26 +03:00
return dhcp_client_set_iaid_duid_internal ( client , true , iaid_set , iaid , duid_type , duid , duid_len , 0 ) ;
2018-08-07 07:55:38 +03:00
}
int sd_dhcp_client_set_iaid_duid_llt (
sd_dhcp_client * client ,
2018-11-24 00:19:26 +03:00
bool iaid_set ,
2018-08-07 07:55:38 +03:00
uint32_t iaid ,
usec_t llt_time ) {
2018-11-24 00:19:26 +03:00
return dhcp_client_set_iaid_duid_internal ( client , true , iaid_set , iaid , DUID_TYPE_LLT , NULL , 0 , llt_time ) ;
2018-03-12 19:18:07 +03:00
}
int sd_dhcp_client_set_duid (
sd_dhcp_client * client ,
uint16_t duid_type ,
const void * duid ,
size_t duid_len ) {
2018-11-24 00:19:26 +03:00
return dhcp_client_set_iaid_duid_internal ( client , false , false , 0 , duid_type , duid , duid_len , 0 ) ;
2018-08-07 07:55:38 +03:00
}
int sd_dhcp_client_set_duid_llt (
sd_dhcp_client * client ,
usec_t llt_time ) {
2018-11-24 00:19:26 +03:00
return dhcp_client_set_iaid_duid_internal ( client , false , false , 0 , DUID_TYPE_LLT , NULL , 0 , llt_time ) ;
2018-03-12 19:18:07 +03:00
}
2016-05-03 18:52:44 +03:00
int sd_dhcp_client_set_hostname (
sd_dhcp_client * client ,
const char * hostname ) {
2014-07-01 22:58:49 +04:00
assert_return ( client , - EINVAL ) ;
2017-11-16 12:05:44 +03:00
/* Make sure hostnames qualify as DNS and as Linux hostnames */
2016-11-19 20:53:29 +03:00
if ( hostname & &
2017-11-16 12:05:44 +03:00
! ( hostname_is_valid ( hostname , false ) & & dns_name_is_valid ( hostname ) > 0 ) )
2015-11-16 12:17:48 +03:00
return - EINVAL ;
2016-11-19 20:53:29 +03:00
return free_and_strdup ( & client - > hostname , hostname ) ;
2014-07-01 22:58:49 +04:00
}
2016-05-03 18:52:44 +03:00
int sd_dhcp_client_set_vendor_class_identifier (
sd_dhcp_client * client ,
const char * vci ) {
2014-07-14 12:04:18 +04:00
assert_return ( client , - EINVAL ) ;
2016-11-19 20:53:29 +03:00
return free_and_strdup ( & client - > vendor_class_identifier , vci ) ;
2014-07-14 12:04:18 +04:00
}
2018-05-07 15:21:02 +03:00
int sd_dhcp_client_set_user_class (
sd_dhcp_client * client ,
const char * const * user_class ) {
_cleanup_strv_free_ char * * s = NULL ;
char * * p ;
STRV_FOREACH ( p , ( char * * ) user_class )
if ( strlen ( * p ) > 255 )
return - ENAMETOOLONG ;
s = strv_copy ( ( char * * ) user_class ) ;
if ( ! s )
return - ENOMEM ;
client - > user_class = TAKE_PTR ( s ) ;
return 0 ;
}
2016-11-11 02:34:19 +03:00
int sd_dhcp_client_set_client_port (
sd_dhcp_client * client ,
uint16_t port ) {
assert_return ( client , - EINVAL ) ;
client - > port = port ;
return 0 ;
}
2014-08-01 18:10:13 +04:00
int sd_dhcp_client_set_mtu ( sd_dhcp_client * client , uint32_t mtu ) {
assert_return ( client , - EINVAL ) ;
assert_return ( mtu > = DHCP_DEFAULT_MIN_SIZE , - ERANGE ) ;
client - > mtu = mtu ;
return 0 ;
}
2014-02-05 02:13:52 +04:00
int sd_dhcp_client_get_lease ( sd_dhcp_client * client , sd_dhcp_lease * * ret ) {
2013-12-10 01:43:31 +04:00
assert_return ( client , - EINVAL ) ;
2017-09-29 10:58:22 +03:00
if ( ! IN_SET ( client - > state , DHCP_STATE_BOUND , DHCP_STATE_RENEWING , DHCP_STATE_REBINDING ) )
2014-02-05 02:13:52 +04:00
return - EADDRNOTAVAIL ;
2013-12-10 01:43:31 +04:00
2016-05-23 17:27:05 +03:00
if ( ret )
* ret = client - > lease ;
2014-01-14 02:07:59 +04:00
return 0 ;
}
2014-05-22 17:18:28 +04:00
static void client_notify ( sd_dhcp_client * client , int event ) {
2016-05-23 17:48:56 +03:00
assert ( client ) ;
if ( client - > callback )
client - > callback ( client , event , client - > userdata ) ;
2013-12-10 01:43:29 +04:00
}
2014-03-12 13:46:40 +04:00
static int client_initialize ( sd_dhcp_client * client ) {
2013-12-10 01:43:23 +04:00
assert_return ( client , - EINVAL ) ;
2016-05-23 17:27:05 +03:00
client - > receive_message = sd_event_source_unref ( client - > receive_message ) ;
2013-12-10 01:43:26 +04:00
2014-05-07 00:59:22 +04:00
client - > fd = asynchronous_close ( client - > fd ) ;
2013-12-10 01:43:26 +04:00
2018-11-13 07:50:08 +03:00
( void ) event_source_disable ( client - > timeout_resend ) ;
( void ) event_source_disable ( client - > timeout_t1 ) ;
( void ) event_source_disable ( client - > timeout_t2 ) ;
( void ) event_source_disable ( client - > timeout_expire ) ;
2013-12-10 01:43:30 +04:00
2013-12-10 01:43:27 +04:00
client - > attempt = 1 ;
2014-01-31 13:31:24 +04:00
client - > state = DHCP_STATE_INIT ;
2014-03-12 13:46:40 +04:00
client - > xid = 0 ;
2013-12-10 01:43:23 +04:00
dhcp: clean up dhcp4 lease object
a) drop handling of obsolete or unused DHCP options time_offset,
mtu_aging_timeout, policy filter, mdr, ttl, ip forwarding settings.
Should this become useful one day we can readd support for this.
b) For subnet mask and broadcast it is not always clear whether 0 or
255.255.255.255 might be valid, hence maintain a boolean indicating
validity next to it.
c) serialize/deserialize broadcast address, lifetime, T1 and T2 together
with the rest of the fields in dhcp_lease_save() and
dhcp_lease_load().
d) consistently return ENODATA from getter functions for data that is
missing in the lease.
e) add missing getter calls for broadcast, lifetime, T1, T2.
f) when decoding DHCP options, generate debug messages on parse
failures, but try to proceed if possible.
g) Similar, when deserializing a lease in dhcp_lease_load(), make sure
we deal nicely with unparsable fields, to provide upgrade compat.
h) fix some memory allocations
2015-08-27 02:05:13 +03:00
client - > lease = sd_dhcp_lease_unref ( client - > lease ) ;
2013-12-10 01:43:26 +04:00
2014-03-12 13:46:40 +04:00
return 0 ;
}
2014-05-22 17:18:28 +04:00
static void client_stop ( sd_dhcp_client * client , int error ) {
assert ( client ) ;
2014-03-12 13:46:40 +04:00
2014-04-28 00:01:42 +04:00
if ( error < 0 )
log_dhcp_client ( client , " STOPPED: %s " , strerror ( - error ) ) ;
2015-09-22 15:46:21 +03:00
else if ( error = = SD_DHCP_CLIENT_EVENT_STOP )
2014-05-17 23:23:20 +04:00
log_dhcp_client ( client , " STOPPED " ) ;
else
log_dhcp_client ( client , " STOPPED: Unknown event " ) ;
2014-03-12 13:46:40 +04:00
2014-05-22 17:18:28 +04:00
client_notify ( client , error ) ;
2014-02-22 22:53:45 +04:00
2014-05-22 17:18:28 +04:00
client_initialize ( client ) ;
2013-12-10 01:43:23 +04:00
}
2016-05-03 18:52:44 +03:00
static int client_message_init (
sd_dhcp_client * client ,
DHCPPacket * * ret ,
uint8_t type ,
size_t * _optlen ,
size_t * _optoffset ) {
2016-02-27 15:40:50 +03:00
_cleanup_free_ DHCPPacket * packet = NULL ;
2014-05-21 18:46:14 +04:00
size_t optlen , optoffset , size ;
2014-04-11 21:54:04 +04:00
be16_t max_size ;
2014-11-04 20:20:43 +03:00
usec_t time_now ;
uint16_t secs ;
2014-02-11 16:11:18 +04:00
int r ;
2013-12-10 01:43:19 +04:00
2014-03-19 17:45:35 +04:00
assert ( client ) ;
2014-11-04 20:20:43 +03:00
assert ( client - > start_time ) ;
2014-05-21 18:46:14 +04:00
assert ( ret ) ;
assert ( _optlen ) ;
assert ( _optoffset ) ;
2017-10-04 17:01:32 +03:00
assert ( IN_SET ( type , DHCP_DISCOVER , DHCP_REQUEST ) ) ;
2014-02-24 01:07:07 +04:00
2014-05-21 18:46:14 +04:00
optlen = DHCP_MIN_OPTIONS_SIZE ;
size = sizeof ( DHCPPacket ) + optlen ;
packet = malloc0 ( size ) ;
if ( ! packet )
return - ENOMEM ;
r = dhcp_message_init ( & packet - > dhcp , BOOTREQUEST , client - > xid , type ,
2014-10-08 23:15:45 +04:00
client - > arp_type , optlen , & optoffset ) ;
2014-02-11 16:11:18 +04:00
if ( r < 0 )
return r ;
2013-12-10 01:43:19 +04:00
2014-02-24 01:07:07 +04:00
/* Although 'secs' field is a SHOULD in RFC 2131, certain DHCP servers
refuse to issue an DHCP lease if ' secs ' is set to zero */
2014-11-04 20:20:43 +03:00
r = sd_event_now ( client - > event , clock_boottime_or_monotonic ( ) , & time_now ) ;
if ( r < 0 )
return r ;
assert ( time_now > = client - > start_time ) ;
/* seconds between sending first and last DISCOVER
* must always be strictly positive to deal with broken servers */
secs = ( ( time_now - client - > start_time ) / USEC_PER_SEC ) ? : 1 ;
packet - > dhcp . secs = htobe16 ( secs ) ;
2014-02-24 01:07:07 +04:00
2014-05-28 22:43:37 +04:00
/* RFC2132 section 4.1
A client that cannot receive unicast IP datagrams until its protocol
software has been configured with an IP address SHOULD set the
BROADCAST bit in the ' flags ' field to 1 in any DHCPDISCOVER or
DHCPREQUEST messages that client sends . The BROADCAST bit will
provide a hint to the DHCP server and BOOTP relay agent to broadcast
2014-07-15 20:55:31 +04:00
any messages to the client on the client ' s subnet .
Note : some interfaces needs this to be enabled , but some networks
needs this to be disabled as broadcasts are filteretd , so this
needs to be configurable */
2014-10-08 23:15:45 +04:00
if ( client - > request_broadcast | | client - > arp_type ! = ARPHRD_ETHER )
2014-07-15 20:55:31 +04:00
packet - > dhcp . flags = htobe16 ( 0x8000 ) ;
2014-05-28 22:43:37 +04:00
2014-04-11 23:02:16 +04:00
/* RFC2132 section 4.1.1:
The client MUST include its hardware address in the ’ chaddr ’ field , if
2014-10-08 23:15:45 +04:00
necessary for delivery of DHCP reply messages . Non - Ethernet
interfaces will leave ' chaddr ' empty and use the client identifier
instead ( eg , RFC 4390 section 2.1 ) .
2014-04-11 23:02:16 +04:00
*/
2014-10-08 23:15:45 +04:00
if ( client - > arp_type = = ARPHRD_ETHER )
memcpy ( & packet - > dhcp . chaddr , & client - > mac_addr , ETH_ALEN ) ;
2013-12-10 01:43:22 +04:00
2016-03-22 01:24:24 +03:00
/* If no client identifier exists, construct an RFC 4361-compliant one */
2015-01-22 02:53:16 +03:00
if ( client - > client_id_len = = 0 ) {
size_t duid_len ;
client - > client_id . type = 255 ;
2018-11-01 16:43:11 +03:00
r = dhcp_identifier_set_iaid ( client - > ifindex , client - > mac_addr , client - > mac_addr_len ,
true , & client - > client_id . ns . iaid ) ;
2015-01-22 02:53:16 +03:00
if ( r < 0 )
return r ;
r = dhcp_identifier_set_duid_en ( & client - > client_id . ns . duid , & duid_len ) ;
if ( r < 0 )
return r ;
client - > client_id_len = sizeof ( client - > client_id . type ) + sizeof ( client - > client_id . ns . iaid ) + duid_len ;
2014-11-19 02:01:20 +03:00
}
2014-02-22 22:53:45 +04:00
/* Some DHCP servers will refuse to issue an DHCP lease if the Client
2013-12-10 01:43:19 +04:00
Identifier option is not set */
2014-11-19 02:01:20 +03:00
if ( client - > client_id_len ) {
r = dhcp_option_append ( & packet - > dhcp , optlen , & optoffset , 0 ,
2016-01-20 16:44:24 +03:00
SD_DHCP_OPTION_CLIENT_IDENTIFIER ,
2014-11-19 02:01:20 +03:00
client - > client_id_len ,
2015-01-22 02:53:16 +03:00
& client - > client_id ) ;
2014-11-19 02:01:20 +03:00
if ( r < 0 )
return r ;
}
2014-04-11 23:02:16 +04:00
/* RFC2131 section 3.5:
in its initial DHCPDISCOVER or DHCPREQUEST message , a
client may provide the server with a list of specific
parameters the client is interested in . If the client
includes a list of parameters in a DHCPDISCOVER message ,
it MUST include that list in any subsequent DHCPREQUEST
messages .
*/
2017-08-03 20:19:51 +03:00
/* RFC7844 section 3:
MAY contain the Parameter Request List option . */
/* NOTE: in case that there would be an option to do not send
* any PRL at all , the size should be checked before sending */
if ( client - > req_opts_size > 0 ) {
r = dhcp_option_append ( & packet - > dhcp , optlen , & optoffset , 0 ,
SD_DHCP_OPTION_PARAMETER_REQUEST_LIST ,
client - > req_opts_size , client - > req_opts ) ;
if ( r < 0 )
return r ;
}
2014-04-11 21:54:04 +04:00
2014-04-11 23:02:16 +04:00
/* RFC2131 section 3.5:
The client SHOULD include the ’ maximum DHCP message size ’ option to
let the server know how large the server may make its DHCP messages .
Note ( from ConnMan ) : Some DHCP servers will send bigger DHCP packets
2018-09-30 22:20:08 +03:00
than the defined default size unless the Maximum Message Size option
2014-12-29 12:45:58 +03:00
is explicitly set
2014-08-01 18:10:13 +04:00
RFC3442 " Requirements to Avoid Sizing Constraints " :
Because a full routing table can be quite large , the standard 576
octet maximum size for a DHCP message may be too short to contain
some legitimate Classless Static Route options . Because of this ,
clients implementing the Classless Static Route option SHOULD send a
Maximum DHCP Message Size [ 4 ] option if the DHCP client ' s TCP / IP
stack is capable of receiving larger IP datagrams . In this case , the
client SHOULD set the value of this option to at least the MTU of the
interface that the client is configuring . The client MAY set the
value of this option higher , up to the size of the largest UDP packet
it is prepared to accept . ( Note that the value specified in the
Maximum DHCP Message Size option is the total maximum packet size ,
including IP and UDP headers . )
2014-04-11 23:02:16 +04:00
*/
2017-08-04 04:08:41 +03:00
/* RFC7844 section 3:
SHOULD NOT contain any other option . */
if ( ! client - > anonymize ) {
max_size = htobe16 ( size ) ;
r = dhcp_option_append ( & packet - > dhcp , client - > mtu , & optoffset , 0 ,
SD_DHCP_OPTION_MAXIMUM_MESSAGE_SIZE ,
2 , & max_size ) ;
if ( r < 0 )
return r ;
}
2013-12-10 01:43:19 +04:00
2014-05-21 18:46:14 +04:00
* _optlen = optlen ;
* _optoffset = optoffset ;
2018-04-05 08:26:26 +03:00
* ret = TAKE_PTR ( packet ) ;
2014-05-21 18:46:14 +04:00
2013-12-10 01:43:19 +04:00
return 0 ;
}
2016-05-03 18:52:44 +03:00
static int client_append_fqdn_option (
DHCPMessage * message ,
size_t optlen ,
size_t * optoffset ,
const char * fqdn ) {
2015-11-16 12:17:48 +03:00
uint8_t buffer [ 3 + DHCP_MAX_FQDN_LENGTH ] ;
int r ;
buffer [ 0 ] = DHCP_FQDN_FLAG_S | /* Request server to perform A RR DNS updates */
DHCP_FQDN_FLAG_E ; /* Canonical wire format */
buffer [ 1 ] = 0 ; /* RCODE1 (deprecated) */
buffer [ 2 ] = 0 ; /* RCODE2 (deprecated) */
2015-12-02 22:47:11 +03:00
r = dns_name_to_wire_format ( fqdn , buffer + 3 , sizeof ( buffer ) - 3 , false ) ;
2015-11-16 12:17:48 +03:00
if ( r > 0 )
r = dhcp_option_append ( message , optlen , optoffset , 0 ,
2016-01-20 16:44:24 +03:00
SD_DHCP_OPTION_FQDN , 3 + r , buffer ) ;
2015-11-16 12:17:48 +03:00
return r ;
}
2016-05-03 18:52:44 +03:00
static int dhcp_client_send_raw (
sd_dhcp_client * client ,
DHCPPacket * packet ,
size_t len ) {
2016-11-11 02:34:19 +03:00
dhcp_packet_append_ip_headers ( packet , INADDR_ANY , client - > port ,
2014-03-10 01:51:07 +04:00
INADDR_BROADCAST , DHCP_PORT_SERVER , len ) ;
return dhcp_network_send_raw_socket ( client - > fd , & client - > link ,
packet , len ) ;
}
2014-03-19 17:45:35 +04:00
static int client_send_discover ( sd_dhcp_client * client ) {
2014-03-27 23:13:11 +04:00
_cleanup_free_ DHCPPacket * discover = NULL ;
2014-05-21 18:46:14 +04:00
size_t optoffset , optlen ;
2014-03-19 17:45:35 +04:00
int r ;
assert ( client ) ;
2017-10-04 17:01:32 +03:00
assert ( IN_SET ( client - > state , DHCP_STATE_INIT , DHCP_STATE_SELECTING ) ) ;
2014-04-11 23:02:16 +04:00
2014-05-21 18:46:14 +04:00
r = client_message_init ( client , & discover , DHCP_DISCOVER ,
& optlen , & optoffset ) ;
2014-03-19 17:45:35 +04:00
if ( r < 0 )
return r ;
2013-12-10 01:43:19 +04:00
2014-04-11 23:02:16 +04:00
/* the client may suggest values for the network address
and lease time in the DHCPDISCOVER message . The client may include
the ’ requested IP address ’ option to suggest that a particular IP
address be assigned , and may include the ’ IP address lease time ’
option to suggest the lease time it would like .
*/
2013-12-10 01:43:19 +04:00
if ( client - > last_addr ! = INADDR_ANY ) {
2014-05-21 17:55:02 +04:00
r = dhcp_option_append ( & discover - > dhcp , optlen , & optoffset , 0 ,
2016-01-20 16:44:24 +03:00
SD_DHCP_OPTION_REQUESTED_IP_ADDRESS ,
2014-05-20 13:04:50 +04:00
4 , & client - > last_addr ) ;
2014-03-19 17:45:35 +04:00
if ( r < 0 )
return r ;
2013-12-10 01:43:19 +04:00
}
2014-07-01 22:58:49 +04:00
if ( client - > hostname ) {
2015-11-16 12:17:48 +03:00
/* According to RFC 4702 "clients that send the Client FQDN option in
their messages MUST NOT also send the Host Name option " . Just send
one of the two depending on the hostname type .
*/
2015-11-25 23:07:17 +03:00
if ( dns_name_is_single_label ( client - > hostname ) ) {
2015-11-16 12:17:48 +03:00
/* it is unclear from RFC 2131 if client should send hostname in
DHCPDISCOVER but dhclient does and so we do as well
*/
r = dhcp_option_append ( & discover - > dhcp , optlen , & optoffset , 0 ,
2016-01-20 16:44:24 +03:00
SD_DHCP_OPTION_HOST_NAME ,
2015-11-16 12:17:48 +03:00
strlen ( client - > hostname ) , client - > hostname ) ;
} else
r = client_append_fqdn_option ( & discover - > dhcp , optlen , & optoffset ,
client - > hostname ) ;
2014-07-01 22:58:49 +04:00
if ( r < 0 )
return r ;
}
2014-07-14 12:04:18 +04:00
if ( client - > vendor_class_identifier ) {
r = dhcp_option_append ( & discover - > dhcp , optlen , & optoffset , 0 ,
2016-01-20 16:44:24 +03:00
SD_DHCP_OPTION_VENDOR_CLASS_IDENTIFIER ,
2014-07-14 12:04:18 +04:00
strlen ( client - > vendor_class_identifier ) ,
client - > vendor_class_identifier ) ;
if ( r < 0 )
return r ;
}
2018-05-07 15:21:02 +03:00
if ( client - > user_class ) {
r = dhcp_option_append ( & discover - > dhcp , optlen , & optoffset , 0 ,
SD_DHCP_OPTION_USER_CLASS ,
strv_length ( client - > user_class ) ,
client - > user_class ) ;
if ( r < 0 )
return r ;
}
2014-05-21 17:55:02 +04:00
r = dhcp_option_append ( & discover - > dhcp , optlen , & optoffset , 0 ,
2016-01-20 16:44:24 +03:00
SD_DHCP_OPTION_END , 0 , NULL ) ;
2014-06-18 22:26:54 +04:00
if ( r < 0 )
return r ;
2013-12-10 01:43:19 +04:00
2014-04-11 23:02:16 +04:00
/* We currently ignore:
The client SHOULD wait a random time between one and ten seconds to
desynchronize the use of DHCP at startup .
*/
2014-05-20 13:04:50 +04:00
r = dhcp_client_send_raw ( client , discover , sizeof ( DHCPPacket ) + optoffset ) ;
2014-03-19 17:45:35 +04:00
if ( r < 0 )
return r ;
2013-12-10 01:43:27 +04:00
2014-02-22 22:53:45 +04:00
log_dhcp_client ( client , " DISCOVER " ) ;
2014-03-10 01:51:07 +04:00
return 0 ;
2013-12-10 01:43:27 +04:00
}
2014-03-19 17:45:35 +04:00
static int client_send_request ( sd_dhcp_client * client ) {
2014-06-13 20:48:20 +04:00
_cleanup_free_ DHCPPacket * request = NULL ;
2014-05-21 18:46:14 +04:00
size_t optoffset , optlen ;
2014-03-19 17:45:35 +04:00
int r ;
2013-12-10 01:43:27 +04:00
2016-05-23 17:27:05 +03:00
assert ( client ) ;
r = client_message_init ( client , & request , DHCP_REQUEST , & optlen , & optoffset ) ;
2014-03-19 17:45:35 +04:00
if ( r < 0 )
return r ;
2013-12-10 01:43:19 +04:00
2014-01-31 13:31:22 +04:00
switch ( client - > state ) {
2014-04-11 23:02:16 +04:00
/* See RFC2131 section 4.3.2 (note that there is a typo in the RFC,
SELECTING should be REQUESTING )
*/
case DHCP_STATE_REQUESTING :
/* Client inserts the address of the selected server in ’ server
identifier ’ , ’ ciaddr ’ MUST be zero , ’ requested IP address ’ MUST be
filled in with the yiaddr value from the chosen DHCPOFFER .
*/
2014-01-31 13:31:22 +04:00
2014-05-21 17:55:02 +04:00
r = dhcp_option_append ( & request - > dhcp , optlen , & optoffset , 0 ,
2016-01-20 16:44:24 +03:00
SD_DHCP_OPTION_SERVER_IDENTIFIER ,
2014-04-11 23:02:16 +04:00
4 , & client - > lease - > server_address ) ;
2014-03-19 17:45:35 +04:00
if ( r < 0 )
return r ;
2014-01-31 13:31:22 +04:00
2014-05-21 17:55:02 +04:00
r = dhcp_option_append ( & request - > dhcp , optlen , & optoffset , 0 ,
2016-01-20 16:44:24 +03:00
SD_DHCP_OPTION_REQUESTED_IP_ADDRESS ,
2014-03-19 17:45:35 +04:00
4 , & client - > lease - > address ) ;
if ( r < 0 )
return r ;
2014-04-11 23:02:16 +04:00
break ;
case DHCP_STATE_INIT_REBOOT :
/* ’ server identifier’ MUST NOT be filled in, ’ requested IP address’
option MUST be filled in with client ’ s notion of its previously
assigned address . ’ ciaddr ’ MUST be zero .
*/
2014-05-21 17:55:02 +04:00
r = dhcp_option_append ( & request - > dhcp , optlen , & optoffset , 0 ,
2016-01-20 16:44:24 +03:00
SD_DHCP_OPTION_REQUESTED_IP_ADDRESS ,
2014-04-11 23:02:16 +04:00
4 , & client - > last_addr ) ;
2014-03-19 17:45:35 +04:00
if ( r < 0 )
return r ;
2014-01-31 13:31:22 +04:00
break ;
case DHCP_STATE_RENEWING :
2014-04-11 23:02:16 +04:00
/* ’ server identifier’ MUST NOT be filled in, ’ requested IP address’
option MUST NOT be filled in , ’ ciaddr ’ MUST be filled in with
client ’ s IP address .
*/
2014-01-31 13:31:22 +04:00
case DHCP_STATE_REBINDING :
2014-04-11 23:02:16 +04:00
/* ’ server identifier’ MUST NOT be filled in, ’ requested IP address’
option MUST NOT be filled in , ’ ciaddr ’ MUST be filled in with
client ’ s IP address .
This message MUST be broadcast to the 0xffffffff IP broadcast address .
*/
request - > dhcp . ciaddr = client - > lease - > address ;
2014-01-31 13:31:22 +04:00
break ;
2014-04-09 14:12:08 +04:00
2014-04-11 23:02:16 +04:00
case DHCP_STATE_INIT :
case DHCP_STATE_SELECTING :
case DHCP_STATE_REBOOTING :
case DHCP_STATE_BOUND :
2014-04-09 14:12:08 +04:00
case DHCP_STATE_STOPPED :
return - EINVAL ;
2013-12-10 01:43:27 +04:00
}
2013-12-10 01:43:19 +04:00
2014-07-01 22:58:49 +04:00
if ( client - > hostname ) {
2015-11-25 23:07:17 +03:00
if ( dns_name_is_single_label ( client - > hostname ) )
2015-11-16 12:17:48 +03:00
r = dhcp_option_append ( & request - > dhcp , optlen , & optoffset , 0 ,
2016-01-20 16:44:24 +03:00
SD_DHCP_OPTION_HOST_NAME ,
2015-11-16 12:17:48 +03:00
strlen ( client - > hostname ) , client - > hostname ) ;
else
r = client_append_fqdn_option ( & request - > dhcp , optlen , & optoffset ,
client - > hostname ) ;
2014-07-01 22:58:49 +04:00
if ( r < 0 )
return r ;
}
2017-02-20 12:15:58 +03:00
if ( client - > vendor_class_identifier ) {
r = dhcp_option_append ( & request - > dhcp , optlen , & optoffset , 0 ,
SD_DHCP_OPTION_VENDOR_CLASS_IDENTIFIER ,
strlen ( client - > vendor_class_identifier ) ,
client - > vendor_class_identifier ) ;
if ( r < 0 )
return r ;
}
2014-05-21 17:55:02 +04:00
r = dhcp_option_append ( & request - > dhcp , optlen , & optoffset , 0 ,
2016-01-20 16:44:24 +03:00
SD_DHCP_OPTION_END , 0 , NULL ) ;
2014-03-19 17:45:35 +04:00
if ( r < 0 )
return r ;
2013-12-10 01:43:19 +04:00
2013-12-20 19:16:18 +04:00
if ( client - > state = = DHCP_STATE_RENEWING ) {
2014-03-19 17:45:35 +04:00
r = dhcp_network_send_udp_socket ( client - > fd ,
client - > lease - > server_address ,
DHCP_PORT_SERVER ,
& request - > dhcp ,
2014-05-20 13:04:50 +04:00
sizeof ( DHCPMessage ) + optoffset ) ;
2013-12-20 19:16:18 +04:00
} else {
2014-05-20 13:04:50 +04:00
r = dhcp_client_send_raw ( client , request , sizeof ( DHCPPacket ) + optoffset ) ;
2013-12-20 19:16:18 +04:00
}
2014-03-19 17:45:35 +04:00
if ( r < 0 )
return r ;
2013-12-10 01:43:19 +04:00
2014-04-12 03:01:13 +04:00
switch ( client - > state ) {
2016-05-23 17:27:05 +03:00
2014-04-12 03:01:13 +04:00
case DHCP_STATE_REQUESTING :
log_dhcp_client ( client , " REQUEST (requesting) " ) ;
break ;
2016-05-23 17:27:05 +03:00
2014-04-12 03:01:13 +04:00
case DHCP_STATE_INIT_REBOOT :
log_dhcp_client ( client , " REQUEST (init-reboot) " ) ;
break ;
2016-05-23 17:27:05 +03:00
2014-04-12 03:01:13 +04:00
case DHCP_STATE_RENEWING :
log_dhcp_client ( client , " REQUEST (renewing) " ) ;
break ;
2016-05-23 17:27:05 +03:00
2014-04-12 03:01:13 +04:00
case DHCP_STATE_REBINDING :
log_dhcp_client ( client , " REQUEST (rebinding) " ) ;
break ;
2016-05-23 17:27:05 +03:00
2014-04-12 03:01:13 +04:00
default :
log_dhcp_client ( client , " REQUEST (invalid) " ) ;
break ;
}
2014-02-22 22:53:45 +04:00
2014-03-10 01:51:07 +04:00
return 0 ;
2013-12-10 01:43:19 +04:00
}
2014-04-12 02:34:05 +04:00
static int client_start ( sd_dhcp_client * client ) ;
2016-05-03 18:52:44 +03:00
static int client_timeout_resend (
sd_event_source * s ,
uint64_t usec ,
void * userdata ) {
2013-12-10 01:43:25 +04:00
sd_dhcp_client * client = userdata ;
2014-05-22 17:18:28 +04:00
DHCP_CLIENT_DONT_DESTROY ( client ) ;
2013-12-20 19:16:18 +04:00
usec_t next_timeout = 0 ;
2014-03-18 17:13:01 +04:00
uint64_t time_now ;
2013-12-20 19:16:18 +04:00
uint32_t time_left ;
2014-03-18 17:13:01 +04:00
int r ;
2014-01-18 22:32:45 +04:00
assert ( s ) ;
assert ( client ) ;
assert ( client - > event ) ;
2013-12-10 01:43:25 +04:00
2014-07-24 20:53:01 +04:00
r = sd_event_now ( client - > event , clock_boottime_or_monotonic ( ) , & time_now ) ;
2014-03-18 17:13:01 +04:00
if ( r < 0 )
goto error ;
2013-12-20 19:16:18 +04:00
switch ( client - > state ) {
2016-05-23 17:27:05 +03:00
2013-12-20 19:16:18 +04:00
case DHCP_STATE_RENEWING :
2014-02-13 23:56:16 +04:00
time_left = ( client - > lease - > t2 - client - > lease - > t1 ) / 2 ;
2013-12-20 19:16:18 +04:00
if ( time_left < 60 )
time_left = 60 ;
2013-12-10 01:43:25 +04:00
2014-03-18 17:13:01 +04:00
next_timeout = time_now + time_left * USEC_PER_SEC ;
2013-12-10 01:43:25 +04:00
2013-12-20 19:16:18 +04:00
break ;
2013-12-20 19:16:20 +04:00
case DHCP_STATE_REBINDING :
2014-02-13 23:56:16 +04:00
time_left = ( client - > lease - > lifetime - client - > lease - > t2 ) / 2 ;
2013-12-20 19:16:20 +04:00
if ( time_left < 60 )
time_left = 60 ;
2014-03-18 17:13:01 +04:00
next_timeout = time_now + time_left * USEC_PER_SEC ;
2013-12-20 19:16:20 +04:00
break ;
2014-01-31 13:31:22 +04:00
case DHCP_STATE_REBOOTING :
/* start over as we did not receive a timely ack or nak */
2014-04-12 02:34:05 +04:00
r = client_initialize ( client ) ;
2014-04-11 20:02:54 +04:00
if ( r < 0 )
goto error ;
2014-01-31 13:31:22 +04:00
2014-04-12 03:01:13 +04:00
r = client_start ( client ) ;
if ( r < 0 )
goto error ;
else {
log_dhcp_client ( client , " REBOOTED " ) ;
return 0 ;
}
2014-04-12 02:34:05 +04:00
2013-12-20 19:16:18 +04:00
case DHCP_STATE_INIT :
case DHCP_STATE_INIT_REBOOT :
case DHCP_STATE_SELECTING :
case DHCP_STATE_REQUESTING :
case DHCP_STATE_BOUND :
if ( client - > attempt < 64 )
client - > attempt * = 2 ;
2014-03-18 17:13:01 +04:00
next_timeout = time_now + ( client - > attempt - 1 ) * USEC_PER_SEC ;
2013-12-20 19:16:18 +04:00
break ;
2014-04-09 14:12:08 +04:00
case DHCP_STATE_STOPPED :
r = - EINVAL ;
goto error ;
2013-12-20 19:16:18 +04:00
}
2013-12-22 22:59:12 +04:00
next_timeout + = ( random_u32 ( ) & 0x1fffff ) ;
2013-12-10 01:43:25 +04:00
2018-11-13 07:50:08 +03:00
r = event_reset_time ( client - > event , & client - > timeout_resend ,
clock_boottime_or_monotonic ( ) ,
next_timeout , 10 * USEC_PER_MSEC ,
client_timeout_resend , client ,
client - > event_priority , " dhcp4-resend-timer " , true ) ;
2014-08-28 17:46:29 +04:00
if ( r < 0 )
goto error ;
2013-12-10 01:43:27 +04:00
switch ( client - > state ) {
case DHCP_STATE_INIT :
2014-03-19 17:45:35 +04:00
r = client_send_discover ( client ) ;
2014-01-18 22:32:45 +04:00
if ( r > = 0 ) {
2013-12-10 01:43:27 +04:00
client - > state = DHCP_STATE_SELECTING ;
client - > attempt = 1 ;
} else {
if ( client - > attempt > = 64 )
goto error ;
}
break ;
case DHCP_STATE_SELECTING :
2014-03-19 17:45:35 +04:00
r = client_send_discover ( client ) ;
2014-01-18 22:32:45 +04:00
if ( r < 0 & & client - > attempt > = 64 )
2013-12-10 01:43:25 +04:00
goto error ;
2013-12-10 01:43:27 +04:00
break ;
2014-01-31 13:31:22 +04:00
case DHCP_STATE_INIT_REBOOT :
2013-12-10 01:43:27 +04:00
case DHCP_STATE_REQUESTING :
2013-12-20 19:16:18 +04:00
case DHCP_STATE_RENEWING :
2013-12-20 19:16:20 +04:00
case DHCP_STATE_REBINDING :
2014-03-19 17:45:35 +04:00
r = client_send_request ( client ) ;
2014-01-18 22:32:45 +04:00
if ( r < 0 & & client - > attempt > = 64 )
2013-12-10 01:43:27 +04:00
goto error ;
2013-12-10 01:43:25 +04:00
2014-01-31 13:31:22 +04:00
if ( client - > state = = DHCP_STATE_INIT_REBOOT )
client - > state = DHCP_STATE_REBOOTING ;
2014-03-18 17:13:01 +04:00
client - > request_sent = time_now ;
2013-12-10 01:43:30 +04:00
2013-12-10 01:43:25 +04:00
break ;
case DHCP_STATE_REBOOTING :
case DHCP_STATE_BOUND :
break ;
2014-04-09 14:12:08 +04:00
case DHCP_STATE_STOPPED :
r = - EINVAL ;
goto error ;
2013-12-10 01:43:25 +04:00
}
return 0 ;
error :
2014-01-18 22:32:45 +04:00
client_stop ( client , r ) ;
2013-12-10 01:43:25 +04:00
/* Errors were dealt with when stopping the client, don't spill
errors into the event loop handler */
return 0 ;
}
2016-05-03 18:52:44 +03:00
static int client_initialize_io_events (
sd_dhcp_client * client ,
sd_event_io_handler_t io_callback ) {
2013-12-20 19:16:19 +04:00
int r ;
2014-01-18 22:32:45 +04:00
assert ( client ) ;
assert ( client - > event ) ;
2014-02-20 02:54:58 +04:00
r = sd_event_add_io ( client - > event , & client - > receive_message ,
client - > fd , EPOLLIN , io_callback ,
client ) ;
2013-12-20 19:16:19 +04:00
if ( r < 0 )
goto error ;
2014-02-13 23:56:16 +04:00
r = sd_event_source_set_priority ( client - > receive_message ,
client - > event_priority ) ;
2014-01-18 22:32:45 +04:00
if ( r < 0 )
goto error ;
2014-11-04 18:27:05 +03:00
r = sd_event_source_set_description ( client - > receive_message , " dhcp4-receive-message " ) ;
2014-08-28 17:46:29 +04:00
if ( r < 0 )
goto error ;
2014-07-25 16:44:12 +04:00
error :
if ( r < 0 )
client_stop ( client , r ) ;
return 0 ;
}
static int client_initialize_time_events ( sd_dhcp_client * client ) {
2016-01-27 13:21:23 +03:00
uint64_t usec = 0 ;
2014-07-25 16:44:12 +04:00
int r ;
assert ( client ) ;
assert ( client - > event ) ;
2016-01-27 13:21:23 +03:00
if ( client - > start_delay ) {
2016-02-15 18:11:51 +03:00
assert_se ( sd_event_now ( client - > event , clock_boottime_or_monotonic ( ) , & usec ) > = 0 ) ;
2016-01-27 13:21:23 +03:00
usec + = client - > start_delay ;
}
2018-11-13 07:50:08 +03:00
r = event_reset_time ( client - > event , & client - > timeout_resend ,
clock_boottime_or_monotonic ( ) ,
usec , 0 ,
client_timeout_resend , client ,
client - > event_priority , " dhcp4-resend-timer " , true ) ;
2013-12-20 19:16:19 +04:00
if ( r < 0 )
client_stop ( client , r ) ;
return 0 ;
}
2016-05-03 18:52:44 +03:00
static int client_initialize_events ( sd_dhcp_client * client , sd_event_io_handler_t io_callback ) {
2014-07-25 16:44:12 +04:00
client_initialize_io_events ( client , io_callback ) ;
client_initialize_time_events ( client ) ;
return 0 ;
}
2016-01-27 13:21:23 +03:00
static int client_start_delayed ( sd_dhcp_client * client ) {
2014-03-12 13:46:40 +04:00
int r ;
assert_return ( client , - EINVAL ) ;
assert_return ( client - > event , - EINVAL ) ;
2016-05-23 17:13:18 +03:00
assert_return ( client - > ifindex > 0 , - EINVAL ) ;
2014-03-12 13:46:40 +04:00
assert_return ( client - > fd < 0 , - EBUSY ) ;
assert_return ( client - > xid = = 0 , - EINVAL ) ;
2016-05-23 17:27:05 +03:00
assert_return ( IN_SET ( client - > state , DHCP_STATE_INIT , DHCP_STATE_INIT_REBOOT ) , - EBUSY ) ;
2014-03-12 13:46:40 +04:00
client - > xid = random_u32 ( ) ;
2016-05-23 17:13:18 +03:00
r = dhcp_network_bind_raw_socket ( client - > ifindex , & client - > link ,
2014-10-08 23:15:45 +04:00
client - > xid , client - > mac_addr ,
2016-11-11 02:34:19 +03:00
client - > mac_addr_len , client - > arp_type , client - > port ) ;
2014-03-12 13:46:40 +04:00
if ( r < 0 ) {
client_stop ( client , r ) ;
return r ;
}
client - > fd = r ;
2014-03-20 19:21:43 +04:00
2017-09-29 01:37:23 +03:00
if ( IN_SET ( client - > state , DHCP_STATE_INIT , DHCP_STATE_INIT_REBOOT ) )
2014-07-24 20:53:01 +04:00
client - > start_time = now ( clock_boottime_or_monotonic ( ) ) ;
2014-03-12 13:46:40 +04:00
return client_initialize_events ( client , client_receive_message_raw ) ;
}
2016-01-27 13:21:23 +03:00
static int client_start ( sd_dhcp_client * client ) {
client - > start_delay = 0 ;
return client_start_delayed ( client ) ;
}
2016-05-03 18:52:44 +03:00
static int client_timeout_expire ( sd_event_source * s , uint64_t usec , void * userdata ) {
2013-12-10 01:43:31 +04:00
sd_dhcp_client * client = userdata ;
2014-05-22 17:18:28 +04:00
DHCP_CLIENT_DONT_DESTROY ( client ) ;
2013-12-10 01:43:31 +04:00
2014-02-22 22:53:45 +04:00
log_dhcp_client ( client , " EXPIRED " ) ;
2015-09-22 15:46:21 +03:00
client_notify ( client , SD_DHCP_CLIENT_EVENT_EXPIRED ) ;
2014-03-12 13:46:40 +04:00
2014-04-09 14:12:08 +04:00
/* lease was lost, start over if not freed or stopped in callback */
2014-05-22 17:18:28 +04:00
if ( client - > state ! = DHCP_STATE_STOPPED ) {
2014-04-09 14:12:07 +04:00
client_initialize ( client ) ;
client_start ( client ) ;
}
2013-12-10 01:43:31 +04:00
2013-12-10 01:43:30 +04:00
return 0 ;
}
2014-01-16 22:55:25 +04:00
static int client_timeout_t2 ( sd_event_source * s , uint64_t usec , void * userdata ) {
2013-12-20 19:16:20 +04:00
sd_dhcp_client * client = userdata ;
2014-05-22 17:18:28 +04:00
DHCP_CLIENT_DONT_DESTROY ( client ) ;
2013-12-20 19:16:20 +04:00
int r ;
2016-05-23 17:27:05 +03:00
assert ( client ) ;
2014-03-18 22:22:43 +04:00
client - > receive_message = sd_event_source_unref ( client - > receive_message ) ;
2014-05-07 00:59:22 +04:00
client - > fd = asynchronous_close ( client - > fd ) ;
2013-12-20 19:16:20 +04:00
client - > state = DHCP_STATE_REBINDING ;
client - > attempt = 1 ;
2016-05-23 17:13:18 +03:00
r = dhcp_network_bind_raw_socket ( client - > ifindex , & client - > link ,
2014-10-08 23:15:45 +04:00
client - > xid , client - > mac_addr ,
2016-11-11 02:34:19 +03:00
client - > mac_addr_len , client - > arp_type ,
client - > port ) ;
2013-12-20 19:16:20 +04:00
if ( r < 0 ) {
client_stop ( client , r ) ;
return 0 ;
}
client - > fd = r ;
2014-03-18 17:13:01 +04:00
return client_initialize_events ( client , client_receive_message_raw ) ;
2013-12-10 01:43:30 +04:00
}
2016-05-03 18:52:44 +03:00
static int client_timeout_t1 ( sd_event_source * s , uint64_t usec , void * userdata ) {
2013-12-20 19:16:18 +04:00
sd_dhcp_client * client = userdata ;
2014-05-22 17:18:28 +04:00
DHCP_CLIENT_DONT_DESTROY ( client ) ;
2013-12-20 19:16:18 +04:00
client - > state = DHCP_STATE_RENEWING ;
client - > attempt = 1 ;
2014-07-25 16:44:12 +04:00
return client_initialize_time_events ( client ) ;
2013-12-10 01:43:30 +04:00
}
2016-05-03 18:52:44 +03:00
static int client_handle_offer ( sd_dhcp_client * client , DHCPMessage * offer , size_t len ) {
tree-wide: expose "p"-suffix unref calls in public APIs to make gcc cleanup easy
GLIB has recently started to officially support the gcc cleanup
attribute in its public API, hence let's do the same for our APIs.
With this patch we'll define an xyz_unrefp() call for each public
xyz_unref() call, to make it easy to use inside a
__attribute__((cleanup())) expression. Then, all code is ported over to
make use of this.
The new calls are also documented in the man pages, with examples how to
use them (well, I only added docs where the _unref() call itself already
had docs, and the examples, only cover sd_bus_unrefp() and
sd_event_unrefp()).
This also renames sd_lldp_free() to sd_lldp_unref(), since that's how we
tend to call our destructors these days.
Note that this defines no public macro that wraps gcc's attribute and
makes it easier to use. While I think it's our duty in the library to
make our stuff easy to use, I figure it's not our duty to make gcc's own
features easy to use on its own. Most likely, client code which wants to
make use of this should define its own:
#define _cleanup_(function) __attribute__((cleanup(function)))
Or similar, to make the gcc feature easier to use.
Making this logic public has the benefit that we can remove three header
files whose only purpose was to define these functions internally.
See #2008.
2015-11-27 21:13:45 +03:00
_cleanup_ ( sd_dhcp_lease_unrefp ) sd_dhcp_lease * lease = NULL ;
2014-01-16 22:55:25 +04:00
int r ;
2013-12-10 01:43:29 +04:00
2014-02-05 02:13:52 +04:00
r = dhcp_lease_new ( & lease ) ;
if ( r < 0 )
return r ;
2013-12-10 01:43:26 +04:00
2014-11-19 02:13:12 +03:00
if ( client - > client_id_len ) {
r = dhcp_lease_set_client_id ( lease ,
2015-01-22 02:53:16 +03:00
( uint8_t * ) & client - > client_id ,
2014-11-19 02:13:12 +03:00
client - > client_id_len ) ;
if ( r < 0 )
return r ;
}
2015-11-25 19:29:30 +03:00
r = dhcp_option_parse ( offer , len , dhcp_lease_parse_options , lease , NULL ) ;
2014-03-19 19:05:44 +04:00
if ( r ! = DHCP_OFFER ) {
2014-08-29 15:28:04 +04:00
log_dhcp_client ( client , " received message was not an OFFER, ignoring " ) ;
2014-01-16 22:55:25 +04:00
return - ENOMSG ;
2014-03-19 19:05:44 +04:00
}
2013-12-10 01:43:26 +04:00
2014-03-03 20:13:59 +04:00
lease - > next_server = offer - > siaddr ;
2014-02-13 23:56:16 +04:00
lease - > address = offer - > yiaddr ;
2013-12-10 01:43:26 +04:00
dhcp: clean up dhcp4 lease object
a) drop handling of obsolete or unused DHCP options time_offset,
mtu_aging_timeout, policy filter, mdr, ttl, ip forwarding settings.
Should this become useful one day we can readd support for this.
b) For subnet mask and broadcast it is not always clear whether 0 or
255.255.255.255 might be valid, hence maintain a boolean indicating
validity next to it.
c) serialize/deserialize broadcast address, lifetime, T1 and T2 together
with the rest of the fields in dhcp_lease_save() and
dhcp_lease_load().
d) consistently return ENODATA from getter functions for data that is
missing in the lease.
e) add missing getter calls for broadcast, lifetime, T1, T2.
f) when decoding DHCP options, generate debug messages on parse
failures, but try to proceed if possible.
g) Similar, when deserializing a lease in dhcp_lease_load(), make sure
we deal nicely with unparsable fields, to provide upgrade compat.
h) fix some memory allocations
2015-08-27 02:05:13 +03:00
if ( lease - > address = = 0 | |
lease - > server_address = = 0 | |
2014-03-19 19:05:44 +04:00
lease - > lifetime = = 0 ) {
dhcp: clean up dhcp4 lease object
a) drop handling of obsolete or unused DHCP options time_offset,
mtu_aging_timeout, policy filter, mdr, ttl, ip forwarding settings.
Should this become useful one day we can readd support for this.
b) For subnet mask and broadcast it is not always clear whether 0 or
255.255.255.255 might be valid, hence maintain a boolean indicating
validity next to it.
c) serialize/deserialize broadcast address, lifetime, T1 and T2 together
with the rest of the fields in dhcp_lease_save() and
dhcp_lease_load().
d) consistently return ENODATA from getter functions for data that is
missing in the lease.
e) add missing getter calls for broadcast, lifetime, T1, T2.
f) when decoding DHCP options, generate debug messages on parse
failures, but try to proceed if possible.
g) Similar, when deserializing a lease in dhcp_lease_load(), make sure
we deal nicely with unparsable fields, to provide upgrade compat.
h) fix some memory allocations
2015-08-27 02:05:13 +03:00
log_dhcp_client ( client , " received lease lacks address, server address or lease lifetime, ignoring " ) ;
2014-01-16 22:55:25 +04:00
return - ENOMSG ;
2014-03-19 19:05:44 +04:00
}
dhcp: clean up dhcp4 lease object
a) drop handling of obsolete or unused DHCP options time_offset,
mtu_aging_timeout, policy filter, mdr, ttl, ip forwarding settings.
Should this become useful one day we can readd support for this.
b) For subnet mask and broadcast it is not always clear whether 0 or
255.255.255.255 might be valid, hence maintain a boolean indicating
validity next to it.
c) serialize/deserialize broadcast address, lifetime, T1 and T2 together
with the rest of the fields in dhcp_lease_save() and
dhcp_lease_load().
d) consistently return ENODATA from getter functions for data that is
missing in the lease.
e) add missing getter calls for broadcast, lifetime, T1, T2.
f) when decoding DHCP options, generate debug messages on parse
failures, but try to proceed if possible.
g) Similar, when deserializing a lease in dhcp_lease_load(), make sure
we deal nicely with unparsable fields, to provide upgrade compat.
h) fix some memory allocations
2015-08-27 02:05:13 +03:00
if ( ! lease - > have_subnet_mask ) {
2014-03-19 19:05:44 +04:00
r = dhcp_lease_set_default_subnet_mask ( lease ) ;
if ( r < 0 ) {
2018-02-08 12:34:52 +03:00
log_dhcp_client ( client ,
" received lease lacks subnet mask, "
" and a fallback one cannot be generated, ignoring " ) ;
2014-03-19 19:05:44 +04:00
return - ENOMSG ;
}
}
2013-12-10 01:43:26 +04:00
2014-04-11 07:45:46 +04:00
sd_dhcp_lease_unref ( client - > lease ) ;
2018-04-05 08:26:26 +03:00
client - > lease = TAKE_PTR ( lease ) ;
2013-12-10 01:43:26 +04:00
2014-02-22 22:53:45 +04:00
log_dhcp_client ( client , " OFFER " ) ;
2013-12-10 01:43:26 +04:00
return 0 ;
}
2016-05-03 18:52:44 +03:00
static int client_handle_forcerenew ( sd_dhcp_client * client , DHCPMessage * force , size_t len ) {
2014-05-16 02:50:44 +04:00
int r ;
2015-11-25 19:29:30 +03:00
r = dhcp_option_parse ( force , len , NULL , NULL , NULL ) ;
2014-05-16 02:50:44 +04:00
if ( r ! = DHCP_FORCERENEW )
return - ENOMSG ;
log_dhcp_client ( client , " FORCERENEW " ) ;
return 0 ;
}
2016-05-03 18:52:44 +03:00
static int client_handle_ack ( sd_dhcp_client * client , DHCPMessage * ack , size_t len ) {
tree-wide: expose "p"-suffix unref calls in public APIs to make gcc cleanup easy
GLIB has recently started to officially support the gcc cleanup
attribute in its public API, hence let's do the same for our APIs.
With this patch we'll define an xyz_unrefp() call for each public
xyz_unref() call, to make it easy to use inside a
__attribute__((cleanup())) expression. Then, all code is ported over to
make use of this.
The new calls are also documented in the man pages, with examples how to
use them (well, I only added docs where the _unref() call itself already
had docs, and the examples, only cover sd_bus_unrefp() and
sd_event_unrefp()).
This also renames sd_lldp_free() to sd_lldp_unref(), since that's how we
tend to call our destructors these days.
Note that this defines no public macro that wraps gcc's attribute and
makes it easier to use. While I think it's our duty in the library to
make our stuff easy to use, I figure it's not our duty to make gcc's own
features easy to use on its own. Most likely, client code which wants to
make use of this should define its own:
#define _cleanup_(function) __attribute__((cleanup(function)))
Or similar, to make the gcc feature easier to use.
Making this logic public has the benefit that we can remove three header
files whose only purpose was to define these functions internally.
See #2008.
2015-11-27 21:13:45 +03:00
_cleanup_ ( sd_dhcp_lease_unrefp ) sd_dhcp_lease * lease = NULL ;
2015-11-25 19:29:30 +03:00
_cleanup_free_ char * error_message = NULL ;
2014-01-16 22:55:25 +04:00
int r ;
2013-12-10 01:43:29 +04:00
2014-02-05 02:13:52 +04:00
r = dhcp_lease_new ( & lease ) ;
if ( r < 0 )
return r ;
2013-12-10 01:43:29 +04:00
2014-11-19 02:13:12 +03:00
if ( client - > client_id_len ) {
r = dhcp_lease_set_client_id ( lease ,
2015-01-22 02:53:16 +03:00
( uint8_t * ) & client - > client_id ,
2014-11-19 02:13:12 +03:00
client - > client_id_len ) ;
if ( r < 0 )
return r ;
}
2015-11-25 19:29:30 +03:00
r = dhcp_option_parse ( ack , len , dhcp_lease_parse_options , lease , & error_message ) ;
2014-02-22 22:53:45 +04:00
if ( r = = DHCP_NAK ) {
2015-11-25 19:29:30 +03:00
log_dhcp_client ( client , " NAK: %s " , strna ( error_message ) ) ;
2014-05-17 23:23:20 +04:00
return - EADDRNOTAVAIL ;
2014-02-22 22:53:45 +04:00
}
2013-12-10 01:43:29 +04:00
2014-03-19 19:05:44 +04:00
if ( r ! = DHCP_ACK ) {
2014-08-29 15:28:04 +04:00
log_dhcp_client ( client , " received message was not an ACK, ignoring " ) ;
2014-01-16 22:55:25 +04:00
return - ENOMSG ;
2014-03-19 19:05:44 +04:00
}
2013-12-10 01:43:29 +04:00
2014-03-03 20:13:59 +04:00
lease - > next_server = ack - > siaddr ;
2014-02-13 23:56:16 +04:00
lease - > address = ack - > yiaddr ;
2013-12-10 01:43:29 +04:00
if ( lease - > address = = INADDR_ANY | |
lease - > server_address = = INADDR_ANY | |
2014-03-19 19:05:44 +04:00
lease - > lifetime = = 0 ) {
2014-08-29 15:28:04 +04:00
log_dhcp_client ( client , " received lease lacks address, server "
2014-03-19 19:05:44 +04:00
" address or lease lifetime, ignoring " ) ;
2014-01-16 22:55:25 +04:00
return - ENOMSG ;
2014-03-19 19:05:44 +04:00
}
if ( lease - > subnet_mask = = INADDR_ANY ) {
r = dhcp_lease_set_default_subnet_mask ( lease ) ;
if ( r < 0 ) {
2018-02-08 12:34:52 +03:00
log_dhcp_client ( client ,
" received lease lacks subnet mask, "
" and a fallback one cannot be generated, ignoring " ) ;
2014-03-19 19:05:44 +04:00
return - ENOMSG ;
}
}
2013-12-10 01:43:29 +04:00
2015-09-22 15:46:21 +03:00
r = SD_DHCP_CLIENT_EVENT_IP_ACQUIRE ;
2013-12-10 01:43:29 +04:00
if ( client - > lease ) {
if ( client - > lease - > address ! = lease - > address | |
client - > lease - > subnet_mask ! = lease - > subnet_mask | |
client - > lease - > router ! = lease - > router ) {
2015-09-22 15:46:21 +03:00
r = SD_DHCP_CLIENT_EVENT_IP_CHANGE ;
2014-06-26 17:18:43 +04:00
} else
2015-09-22 15:46:21 +03:00
r = SD_DHCP_CLIENT_EVENT_RENEW ;
2013-12-10 01:43:29 +04:00
2014-02-05 02:13:52 +04:00
client - > lease = sd_dhcp_lease_unref ( client - > lease ) ;
2013-12-10 01:43:29 +04:00
}
2018-04-05 08:26:26 +03:00
client - > lease = TAKE_PTR ( lease ) ;
2013-12-10 01:43:29 +04:00
2014-02-22 22:53:45 +04:00
log_dhcp_client ( client , " ACK " ) ;
2013-12-10 01:43:29 +04:00
return r ;
}
2015-08-27 02:59:43 +03:00
static uint64_t client_compute_timeout ( sd_dhcp_client * client , uint32_t lifetime , double factor ) {
2014-03-19 20:19:22 +04:00
assert ( client ) ;
assert ( client - > request_sent ) ;
2015-08-27 02:59:43 +03:00
assert ( lifetime > 0 ) ;
2014-03-19 20:19:22 +04:00
2015-08-27 02:59:43 +03:00
if ( lifetime > 3 )
lifetime - = 3 ;
else
lifetime = 0 ;
return client - > request_sent + ( lifetime * USEC_PER_SEC * factor ) +
2013-12-22 22:59:12 +04:00
+ ( random_u32 ( ) & 0x1fffff ) ;
2013-12-10 01:43:30 +04:00
}
2014-03-19 20:19:22 +04:00
static int client_set_lease_timeouts ( sd_dhcp_client * client ) {
usec_t time_now ;
uint64_t lifetime_timeout ;
uint64_t t2_timeout ;
uint64_t t1_timeout ;
char time_string [ FORMAT_TIMESPAN_MAX ] ;
2014-01-16 22:55:25 +04:00
int r ;
2013-12-10 01:43:30 +04:00
2014-01-18 22:32:45 +04:00
assert ( client ) ;
assert ( client - > event ) ;
2014-03-19 20:19:22 +04:00
assert ( client - > lease ) ;
assert ( client - > lease - > lifetime ) ;
2013-12-10 01:43:30 +04:00
2014-03-19 20:19:22 +04:00
/* don't set timers for infinite leases */
2018-11-13 07:50:08 +03:00
if ( client - > lease - > lifetime = = 0xffffffff ) {
( void ) event_source_disable ( client - > timeout_t1 ) ;
( void ) event_source_disable ( client - > timeout_t2 ) ;
( void ) event_source_disable ( client - > timeout_expire ) ;
2014-03-19 20:19:22 +04:00
return 0 ;
2018-11-13 07:50:08 +03:00
}
2013-12-10 01:43:30 +04:00
2014-07-24 20:53:01 +04:00
r = sd_event_now ( client - > event , clock_boottime_or_monotonic ( ) , & time_now ) ;
2014-03-19 20:19:22 +04:00
if ( r < 0 )
return r ;
assert ( client - > request_sent < = time_now ) ;
/* convert the various timeouts from relative (secs) to absolute (usecs) */
lifetime_timeout = client_compute_timeout ( client , client - > lease - > lifetime , 1 ) ;
2015-08-27 02:59:43 +03:00
if ( client - > lease - > t1 > 0 & & client - > lease - > t2 > 0 ) {
2014-03-19 20:19:22 +04:00
/* both T1 and T2 are given */
if ( client - > lease - > t1 < client - > lease - > t2 & &
client - > lease - > t2 < client - > lease - > lifetime ) {
/* they are both valid */
t2_timeout = client_compute_timeout ( client , client - > lease - > t2 , 1 ) ;
t1_timeout = client_compute_timeout ( client , client - > lease - > t1 , 1 ) ;
} else {
/* discard both */
t2_timeout = client_compute_timeout ( client , client - > lease - > lifetime , 7.0 / 8.0 ) ;
client - > lease - > t2 = ( client - > lease - > lifetime * 7 ) / 8 ;
t1_timeout = client_compute_timeout ( client , client - > lease - > lifetime , 0.5 ) ;
client - > lease - > t1 = client - > lease - > lifetime / 2 ;
}
2015-08-27 02:59:43 +03:00
} else if ( client - > lease - > t2 > 0 & & client - > lease - > t2 < client - > lease - > lifetime ) {
2014-03-19 20:19:22 +04:00
/* only T2 is given, and it is valid */
t2_timeout = client_compute_timeout ( client , client - > lease - > t2 , 1 ) ;
t1_timeout = client_compute_timeout ( client , client - > lease - > lifetime , 0.5 ) ;
client - > lease - > t1 = client - > lease - > lifetime / 2 ;
if ( t2_timeout < = t1_timeout ) {
/* the computed T1 would be invalid, so discard T2 */
t2_timeout = client_compute_timeout ( client , client - > lease - > lifetime , 7.0 / 8.0 ) ;
client - > lease - > t2 = ( client - > lease - > lifetime * 7 ) / 8 ;
}
2015-08-27 02:59:43 +03:00
} else if ( client - > lease - > t1 > 0 & & client - > lease - > t1 < client - > lease - > lifetime ) {
2014-03-19 20:19:22 +04:00
/* only T1 is given, and it is valid */
t1_timeout = client_compute_timeout ( client , client - > lease - > t1 , 1 ) ;
t2_timeout = client_compute_timeout ( client , client - > lease - > lifetime , 7.0 / 8.0 ) ;
client - > lease - > t2 = ( client - > lease - > lifetime * 7 ) / 8 ;
if ( t2_timeout < = t1_timeout ) {
/* the computed T2 would be invalid, so discard T1 */
t2_timeout = client_compute_timeout ( client , client - > lease - > lifetime , 0.5 ) ;
client - > lease - > t2 = client - > lease - > lifetime / 2 ;
}
} else {
/* fall back to the default timeouts */
t1_timeout = client_compute_timeout ( client , client - > lease - > lifetime , 0.5 ) ;
client - > lease - > t1 = client - > lease - > lifetime / 2 ;
t2_timeout = client_compute_timeout ( client , client - > lease - > lifetime , 7.0 / 8.0 ) ;
client - > lease - > t2 = ( client - > lease - > lifetime * 7 ) / 8 ;
}
2013-12-10 01:43:30 +04:00
2014-03-19 20:19:22 +04:00
/* arm lifetime timeout */
2018-11-13 07:50:08 +03:00
r = event_reset_time ( client - > event , & client - > timeout_expire ,
clock_boottime_or_monotonic ( ) ,
lifetime_timeout , 10 * USEC_PER_MSEC ,
client_timeout_expire , client ,
client - > event_priority , " dhcp4-lifetime " , true ) ;
2014-08-28 17:46:29 +04:00
if ( r < 0 )
return r ;
2014-03-19 20:19:22 +04:00
log_dhcp_client ( client , " lease expires in %s " ,
2015-09-25 18:41:09 +03:00
format_timespan ( time_string , FORMAT_TIMESPAN_MAX , lifetime_timeout - time_now , USEC_PER_SEC ) ) ;
2013-12-10 01:43:30 +04:00
2014-03-19 20:19:22 +04:00
/* don't arm earlier timeouts if this has already expired */
if ( lifetime_timeout < = time_now )
return 0 ;
2013-12-10 01:43:30 +04:00
2014-03-19 20:19:22 +04:00
/* arm T2 timeout */
2018-11-13 07:50:08 +03:00
r = event_reset_time ( client - > event , & client - > timeout_t2 ,
clock_boottime_or_monotonic ( ) ,
t2_timeout , 10 * USEC_PER_MSEC ,
client_timeout_t2 , client ,
client - > event_priority , " dhcp4-t2-timeout " , true ) ;
2014-08-28 17:46:29 +04:00
if ( r < 0 )
return r ;
2014-03-19 20:19:22 +04:00
log_dhcp_client ( client , " T2 expires in %s " ,
2015-09-25 18:41:09 +03:00
format_timespan ( time_string , FORMAT_TIMESPAN_MAX , t2_timeout - time_now , USEC_PER_SEC ) ) ;
2014-03-19 20:19:22 +04:00
/* don't arm earlier timeout if this has already expired */
if ( t2_timeout < = time_now )
return 0 ;
2013-12-10 01:43:30 +04:00
2014-03-19 20:19:22 +04:00
/* arm T1 timeout */
2018-11-13 07:50:08 +03:00
r = event_reset_time ( client - > event , & client - > timeout_t1 ,
clock_boottime_or_monotonic ( ) ,
t1_timeout , 10 * USEC_PER_MSEC ,
client_timeout_t1 , client ,
client - > event_priority , " dhcp4-t1-timer " , true ) ;
2014-08-28 17:46:29 +04:00
if ( r < 0 )
return r ;
2014-03-19 20:19:22 +04:00
log_dhcp_client ( client , " T1 expires in %s " ,
2015-09-25 18:41:09 +03:00
format_timespan ( time_string , FORMAT_TIMESPAN_MAX , t1_timeout - time_now , USEC_PER_SEC ) ) ;
2014-03-19 20:19:22 +04:00
2013-12-10 01:43:30 +04:00
return 0 ;
}
2016-05-03 18:52:44 +03:00
static int client_handle_message ( sd_dhcp_client * client , DHCPMessage * message , int len ) {
2014-05-22 17:18:28 +04:00
DHCP_CLIENT_DONT_DESTROY ( client ) ;
2016-01-27 13:21:23 +03:00
char time_string [ FORMAT_TIMESPAN_MAX ] ;
2014-02-13 23:56:16 +04:00
int r = 0 , notify_event = 0 ;
2013-12-10 01:43:26 +04:00
2014-01-18 22:32:45 +04:00
assert ( client ) ;
assert ( client - > event ) ;
2014-02-13 23:56:16 +04:00
assert ( message ) ;
2014-01-18 22:32:45 +04:00
2013-12-10 01:43:26 +04:00
switch ( client - > state ) {
case DHCP_STATE_SELECTING :
2014-02-13 23:56:16 +04:00
r = client_handle_offer ( client , message , len ) ;
if ( r > = 0 ) {
2013-12-10 01:43:26 +04:00
client - > state = DHCP_STATE_REQUESTING ;
2013-12-10 01:43:27 +04:00
client - > attempt = 1 ;
2018-11-13 07:50:08 +03:00
r = event_reset_time ( client - > event , & client - > timeout_resend ,
clock_boottime_or_monotonic ( ) ,
0 , 0 ,
client_timeout_resend , client ,
client - > event_priority , " dhcp4-resend-timer " , true ) ;
2014-08-28 17:46:29 +04:00
if ( r < 0 )
goto error ;
2014-03-19 19:05:44 +04:00
} else if ( r = = - ENOMSG )
/* invalid message, let's ignore it */
return 0 ;
2013-12-10 01:43:26 +04:00
break ;
2014-01-31 13:31:22 +04:00
case DHCP_STATE_REBOOTING :
2013-12-10 01:43:29 +04:00
case DHCP_STATE_REQUESTING :
2013-12-20 19:16:18 +04:00
case DHCP_STATE_RENEWING :
2013-12-20 19:16:20 +04:00
case DHCP_STATE_REBINDING :
2013-12-20 19:16:18 +04:00
2014-02-13 23:56:16 +04:00
r = client_handle_ack ( client , message , len ) ;
2014-05-17 23:23:20 +04:00
if ( r > = 0 ) {
2016-01-27 13:21:23 +03:00
client - > start_delay = 0 ;
2018-11-13 07:50:08 +03:00
( void ) event_source_disable ( client - > timeout_resend ) ;
2014-10-30 22:23:00 +03:00
client - > receive_message =
sd_event_source_unref ( client - > receive_message ) ;
client - > fd = asynchronous_close ( client - > fd ) ;
2013-12-10 01:43:29 +04:00
2014-01-31 13:31:22 +04:00
if ( IN_SET ( client - > state , DHCP_STATE_REQUESTING ,
DHCP_STATE_REBOOTING ) )
2015-09-22 15:46:21 +03:00
notify_event = SD_DHCP_CLIENT_EVENT_IP_ACQUIRE ;
else if ( r ! = SD_DHCP_CLIENT_EVENT_IP_ACQUIRE )
2013-12-20 19:16:18 +04:00
notify_event = r ;
2013-12-10 01:43:29 +04:00
client - > state = DHCP_STATE_BOUND ;
client - > attempt = 1 ;
client - > last_addr = client - > lease - > address ;
2014-03-19 20:19:22 +04:00
r = client_set_lease_timeouts ( client ) ;
2014-12-11 16:43:09 +03:00
if ( r < 0 ) {
log_dhcp_client ( client , " could not set lease timeouts " ) ;
2013-12-10 01:43:30 +04:00
goto error ;
2014-12-11 16:43:09 +03:00
}
2013-12-10 01:43:30 +04:00
2016-12-07 04:00:05 +03:00
r = dhcp_network_bind_udp_socket ( client - > ifindex , client - > lease - > address , client - > port ) ;
2014-07-25 16:44:12 +04:00
if ( r < 0 ) {
log_dhcp_client ( client , " could not bind UDP socket " ) ;
goto error ;
}
client - > fd = r ;
client_initialize_io_events ( client , client_receive_message_udp ) ;
2014-04-09 14:12:07 +04:00
if ( notify_event ) {
2014-05-22 17:18:28 +04:00
client_notify ( client , notify_event ) ;
if ( client - > state = = DHCP_STATE_STOPPED )
2014-04-09 14:12:07 +04:00
return 0 ;
}
2013-12-10 01:43:29 +04:00
2014-05-17 23:23:20 +04:00
} else if ( r = = - EADDRNOTAVAIL ) {
/* got a NAK, let's restart the client */
2018-10-19 20:41:51 +03:00
client_notify ( client , SD_DHCP_CLIENT_EVENT_EXPIRED ) ;
2014-05-17 23:23:20 +04:00
r = client_initialize ( client ) ;
if ( r < 0 )
goto error ;
2016-01-27 13:21:23 +03:00
r = client_start_delayed ( client ) ;
2014-05-17 23:23:20 +04:00
if ( r < 0 )
goto error ;
2016-01-27 13:21:23 +03:00
log_dhcp_client ( client , " REBOOT in %s " , format_timespan ( time_string , FORMAT_TIMESPAN_MAX ,
client - > start_delay , USEC_PER_SEC ) ) ;
client - > start_delay = CLAMP ( client - > start_delay * 2 ,
RESTART_AFTER_NAK_MIN_USEC , RESTART_AFTER_NAK_MAX_USEC ) ;
2014-05-17 23:23:20 +04:00
return 0 ;
2014-03-19 19:05:44 +04:00
} else if ( r = = - ENOMSG )
/* invalid message, let's ignore it */
return 0 ;
2013-12-17 19:24:16 +04:00
2013-12-10 01:43:29 +04:00
break ;
2014-05-16 02:50:44 +04:00
case DHCP_STATE_BOUND :
r = client_handle_forcerenew ( client , message , len ) ;
if ( r > = 0 ) {
r = client_timeout_t1 ( NULL , 0 , client ) ;
if ( r < 0 )
goto error ;
} else if ( r = = - ENOMSG )
/* invalid message, let's ignore it */
return 0 ;
break ;
2013-12-10 01:43:26 +04:00
case DHCP_STATE_INIT :
case DHCP_STATE_INIT_REBOOT :
break ;
2014-04-09 14:12:08 +04:00
case DHCP_STATE_STOPPED :
r = - EINVAL ;
goto error ;
2013-12-10 01:43:26 +04:00
}
error :
2014-05-17 23:23:20 +04:00
if ( r < 0 )
2014-04-09 14:12:07 +04:00
client_stop ( client , r ) ;
2013-12-10 01:43:27 +04:00
2014-04-09 14:12:07 +04:00
return r ;
2013-12-10 01:43:26 +04:00
}
2016-05-03 18:52:44 +03:00
static int client_receive_message_udp (
sd_event_source * s ,
int fd ,
uint32_t revents ,
void * userdata ) {
2014-02-13 23:56:16 +04:00
sd_dhcp_client * client = userdata ;
2014-02-23 20:30:13 +04:00
_cleanup_free_ DHCPMessage * message = NULL ;
2019-02-06 20:13:20 +03:00
const uint8_t * expected_chaddr = NULL ;
2014-10-08 23:15:45 +04:00
uint8_t expected_hlen = 0 ;
2016-02-16 00:50:01 +03:00
ssize_t len , buflen ;
2014-02-13 23:56:16 +04:00
assert ( s ) ;
assert ( client ) ;
2016-02-16 00:50:01 +03:00
buflen = next_datagram_size_fd ( fd ) ;
if ( buflen < 0 )
return buflen ;
2014-02-23 20:30:13 +04:00
message = malloc0 ( buflen ) ;
if ( ! message )
return - ENOMEM ;
2016-05-22 00:00:32 +03:00
len = recv ( fd , message , buflen , 0 ) ;
2014-04-06 21:35:36 +04:00
if ( len < 0 ) {
2017-10-04 17:01:32 +03:00
if ( IN_SET ( errno , EAGAIN , EINTR ) )
2015-11-24 20:25:52 +03:00
return 0 ;
2017-05-13 18:26:55 +03:00
return log_dhcp_client_errno ( client , errno ,
" Could not receive message from UDP socket: %m " ) ;
2016-05-23 16:56:01 +03:00
}
if ( ( size_t ) len < sizeof ( DHCPMessage ) ) {
2015-11-24 20:25:52 +03:00
log_dhcp_client ( client , " Too small to be a DHCP message: ignoring " ) ;
2014-02-13 23:56:16 +04:00
return 0 ;
2014-07-26 19:53:33 +04:00
}
if ( be32toh ( message - > magic ) ! = DHCP_MAGIC_COOKIE ) {
2015-11-24 20:25:52 +03:00
log_dhcp_client ( client , " Not a DHCP message: ignoring " ) ;
2014-07-26 19:53:33 +04:00
return 0 ;
}
if ( message - > op ! = BOOTREPLY ) {
2015-11-24 20:25:52 +03:00
log_dhcp_client ( client , " Not a BOOTREPLY message: ignoring " ) ;
2014-07-26 19:53:33 +04:00
return 0 ;
}
2014-10-08 23:15:45 +04:00
if ( message - > htype ! = client - > arp_type ) {
2015-11-24 20:25:52 +03:00
log_dhcp_client ( client , " Packet type does not match client type " ) ;
2014-10-08 23:15:45 +04:00
return 0 ;
}
if ( client - > arp_type = = ARPHRD_ETHER ) {
expected_hlen = ETH_ALEN ;
2019-02-06 20:13:20 +03:00
expected_chaddr = & client - > mac_addr [ 0 ] ;
2014-10-08 23:15:45 +04:00
}
if ( message - > hlen ! = expected_hlen ) {
2015-11-24 20:25:52 +03:00
log_dhcp_client ( client , " Unexpected packet hlen %d " , message - > hlen ) ;
2014-07-26 19:53:33 +04:00
return 0 ;
}
2019-02-06 20:13:20 +03:00
if ( expected_hlen > 0 & & memcmp ( & message - > chaddr [ 0 ] , expected_chaddr , expected_hlen ) ) {
2015-11-24 20:25:52 +03:00
log_dhcp_client ( client , " Received chaddr does not match expected: ignoring " ) ;
2014-07-26 19:53:33 +04:00
return 0 ;
}
2014-02-13 23:56:16 +04:00
2014-05-16 02:50:44 +04:00
if ( client - > state ! = DHCP_STATE_BOUND & &
be32toh ( message - > xid ) ! = client - > xid ) {
/* in BOUND state, we may receive FORCERENEW with xid set by server,
so ignore the xid in this case */
2015-11-24 20:25:52 +03:00
log_dhcp_client ( client , " Received xid (%u) does not match expected (%u): ignoring " ,
2014-05-16 02:50:44 +04:00
be32toh ( message - > xid ) , client - > xid ) ;
return 0 ;
}
2014-03-19 20:19:22 +04:00
return client_handle_message ( client , message , len ) ;
2014-02-13 23:56:16 +04:00
}
2016-05-03 18:52:44 +03:00
static int client_receive_message_raw (
sd_event_source * s ,
int fd ,
uint32_t revents ,
void * userdata ) {
2014-02-13 23:56:16 +04:00
sd_dhcp_client * client = userdata ;
2014-02-23 20:30:13 +04:00
_cleanup_free_ DHCPPacket * packet = NULL ;
2014-02-24 04:09:21 +04:00
uint8_t cmsgbuf [ CMSG_LEN ( sizeof ( struct tpacket_auxdata ) ) ] ;
struct iovec iov = { } ;
struct msghdr msg = {
. msg_iov = & iov ,
. msg_iovlen = 1 ,
. msg_control = cmsgbuf ,
. msg_controllen = sizeof ( cmsgbuf ) ,
} ;
struct cmsghdr * cmsg ;
bool checksum = true ;
2016-02-16 00:50:01 +03:00
ssize_t buflen , len ;
int r ;
2014-02-13 23:56:16 +04:00
assert ( s ) ;
assert ( client ) ;
2016-02-16 00:50:01 +03:00
buflen = next_datagram_size_fd ( fd ) ;
if ( buflen < 0 )
return buflen ;
2014-02-23 20:30:13 +04:00
packet = malloc0 ( buflen ) ;
if ( ! packet )
return - ENOMEM ;
2018-11-27 12:34:32 +03:00
iov = IOVEC_MAKE ( packet , buflen ) ;
2014-02-24 04:09:21 +04:00
2015-02-12 13:44:48 +03:00
len = recvmsg ( fd , & msg , 0 ) ;
2014-02-24 04:09:21 +04:00
if ( len < 0 ) {
2017-10-04 17:01:32 +03:00
if ( IN_SET ( errno , EAGAIN , EINTR ) )
2015-11-24 20:25:52 +03:00
return 0 ;
2017-05-13 18:26:55 +03:00
return log_dhcp_client_errno ( client , errno ,
" Could not receive message from raw socket: %m " ) ;
2014-04-06 21:35:36 +04:00
} else if ( ( size_t ) len < sizeof ( DHCPPacket ) )
return 0 ;
2014-02-24 04:09:21 +04:00
2018-12-23 01:59:20 +03:00
CMSG_FOREACH ( cmsg , & msg )
2014-04-11 02:51:55 +04:00
if ( cmsg - > cmsg_level = = SOL_PACKET & &
cmsg - > cmsg_type = = PACKET_AUXDATA & &
cmsg - > cmsg_len = = CMSG_LEN ( sizeof ( struct tpacket_auxdata ) ) ) {
struct tpacket_auxdata * aux = ( struct tpacket_auxdata * ) CMSG_DATA ( cmsg ) ;
2014-02-24 04:09:21 +04:00
checksum = ! ( aux - > tp_status & TP_STATUS_CSUMNOTREADY ) ;
break ;
}
2014-02-13 23:56:16 +04:00
2016-11-11 02:34:19 +03:00
r = dhcp_packet_verify_headers ( packet , len , checksum , client - > port ) ;
2014-02-23 04:34:05 +04:00
if ( r < 0 )
2014-02-17 02:28:19 +04:00
return 0 ;
2014-02-13 23:56:16 +04:00
len - = DHCP_IP_UDP_SIZE ;
2014-03-19 20:19:22 +04:00
return client_handle_message ( client , & packet - > dhcp , len ) ;
2014-02-13 23:56:16 +04:00
}
2014-01-16 22:55:25 +04:00
int sd_dhcp_client_start ( sd_dhcp_client * client ) {
2013-12-20 19:16:19 +04:00
int r ;
2013-12-10 01:43:25 +04:00
2013-12-10 01:43:19 +04:00
assert_return ( client , - EINVAL ) ;
2014-03-12 13:46:40 +04:00
r = client_initialize ( client ) ;
if ( r < 0 )
2013-12-20 19:16:19 +04:00
return r ;
2013-12-10 01:43:26 +04:00
2017-08-03 20:42:06 +03:00
/* RFC7844 section 3.3:
SHOULD perform a complete four - way handshake , starting with a
DHCPDISCOVER , to obtain a new address lease . If the client can
ascertain that this is exactly the same network to which it was
previously connected , and if the link - layer address did not change ,
the client MAY issue a DHCPREQUEST to try to reclaim the current
address . */
if ( client - > last_addr & & ! client - > anonymize )
2014-03-12 13:46:40 +04:00
client - > state = DHCP_STATE_INIT_REBOOT ;
2013-12-10 01:43:25 +04:00
2014-04-12 03:01:13 +04:00
r = client_start ( client ) ;
if ( r > = 0 )
2016-05-23 17:13:18 +03:00
log_dhcp_client ( client , " STARTED on ifindex %i " , client - > ifindex ) ;
2014-04-12 03:01:13 +04:00
return r ;
2013-12-10 01:43:19 +04:00
}
2014-01-16 22:55:25 +04:00
int sd_dhcp_client_stop ( sd_dhcp_client * client ) {
2014-05-22 17:18:28 +04:00
DHCP_CLIENT_DONT_DESTROY ( client ) ;
2014-04-09 14:12:07 +04:00
assert_return ( client , - EINVAL ) ;
2015-09-22 15:46:21 +03:00
client_stop ( client , SD_DHCP_CLIENT_EVENT_STOP ) ;
2014-05-22 17:18:28 +04:00
client - > state = DHCP_STATE_STOPPED ;
2014-04-09 14:12:07 +04:00
return 0 ;
2013-12-10 01:43:23 +04:00
}
2016-02-16 21:33:36 +03:00
int sd_dhcp_client_attach_event ( sd_dhcp_client * client , sd_event * event , int64_t priority ) {
2014-01-18 22:32:45 +04:00
int r ;
assert_return ( client , - EINVAL ) ;
assert_return ( ! client - > event , - EBUSY ) ;
if ( event )
client - > event = sd_event_ref ( event ) ;
else {
r = sd_event_default ( & client - > event ) ;
if ( r < 0 )
return 0 ;
}
client - > event_priority = priority ;
return 0 ;
}
int sd_dhcp_client_detach_event ( sd_dhcp_client * client ) {
assert_return ( client , - EINVAL ) ;
client - > event = sd_event_unref ( client - > event ) ;
return 0 ;
}
sd_event * sd_dhcp_client_get_event ( sd_dhcp_client * client ) {
2016-05-23 17:27:05 +03:00
assert_return ( client , NULL ) ;
2014-01-18 22:32:45 +04:00
return client - > event ;
}
2018-08-27 08:01:46 +03:00
static sd_dhcp_client * dhcp_client_free ( sd_dhcp_client * client ) {
assert ( client ) ;
2014-04-09 14:12:07 +04:00
2015-08-26 22:05:53 +03:00
log_dhcp_client ( client , " FREE " ) ;
2014-04-11 07:45:46 +04:00
2018-11-13 07:50:08 +03:00
client - > timeout_resend = sd_event_source_unref ( client - > timeout_resend ) ;
client - > timeout_t1 = sd_event_source_unref ( client - > timeout_t1 ) ;
client - > timeout_t2 = sd_event_source_unref ( client - > timeout_t2 ) ;
client - > timeout_expire = sd_event_source_unref ( client - > timeout_expire ) ;
2015-08-26 22:05:53 +03:00
2018-11-13 07:50:08 +03:00
client_initialize ( client ) ;
2015-08-26 22:05:53 +03:00
sd_dhcp_client_detach_event ( client ) ;
sd_dhcp_lease_unref ( client - > lease ) ;
free ( client - > req_opts ) ;
free ( client - > hostname ) ;
free ( client - > vendor_class_identifier ) ;
2018-05-07 15:21:02 +03:00
client - > user_class = strv_free ( client - > user_class ) ;
2016-10-17 01:28:30 +03:00
return mfree ( client ) ;
2013-12-10 01:43:32 +04:00
}
2018-08-27 08:01:46 +03:00
DEFINE_TRIVIAL_REF_UNREF_FUNC ( sd_dhcp_client , sd_dhcp_client , dhcp_client_free ) ;
2017-08-03 04:32:46 +03:00
int sd_dhcp_client_new ( sd_dhcp_client * * ret , int anonymize ) {
tree-wide: expose "p"-suffix unref calls in public APIs to make gcc cleanup easy
GLIB has recently started to officially support the gcc cleanup
attribute in its public API, hence let's do the same for our APIs.
With this patch we'll define an xyz_unrefp() call for each public
xyz_unref() call, to make it easy to use inside a
__attribute__((cleanup())) expression. Then, all code is ported over to
make use of this.
The new calls are also documented in the man pages, with examples how to
use them (well, I only added docs where the _unref() call itself already
had docs, and the examples, only cover sd_bus_unrefp() and
sd_event_unrefp()).
This also renames sd_lldp_free() to sd_lldp_unref(), since that's how we
tend to call our destructors these days.
Note that this defines no public macro that wraps gcc's attribute and
makes it easier to use. While I think it's our duty in the library to
make our stuff easy to use, I figure it's not our duty to make gcc's own
features easy to use on its own. Most likely, client code which wants to
make use of this should define its own:
#define _cleanup_(function) __attribute__((cleanup(function)))
Or similar, to make the gcc feature easier to use.
Making this logic public has the benefit that we can remove three header
files whose only purpose was to define these functions internally.
See #2008.
2015-11-27 21:13:45 +03:00
_cleanup_ ( sd_dhcp_client_unrefp ) sd_dhcp_client * client = NULL ;
2013-12-10 01:43:08 +04:00
2014-01-18 22:32:45 +04:00
assert_return ( ret , - EINVAL ) ;
2013-12-10 01:43:25 +04:00
2018-11-13 07:49:12 +03:00
client = new ( sd_dhcp_client , 1 ) ;
2013-12-10 01:43:08 +04:00
if ( ! client )
2014-01-18 22:32:45 +04:00
return - ENOMEM ;
2013-12-10 01:43:08 +04:00
2018-11-13 07:49:12 +03:00
* client = ( sd_dhcp_client ) {
. n_ref = 1 ,
. state = DHCP_STATE_INIT ,
. ifindex = - 1 ,
. fd = - 1 ,
. attempt = 1 ,
. mtu = DHCP_DEFAULT_MIN_SIZE ,
. port = DHCP_PORT_CLIENT ,
. anonymize = ! ! anonymize ,
} ;
2017-08-03 04:32:46 +03:00
/* NOTE: this could be moved to a function. */
if ( anonymize ) {
client - > req_opts_size = ELEMENTSOF ( default_req_opts_anonymize ) ;
client - > req_opts = memdup ( default_req_opts_anonymize , client - > req_opts_size ) ;
} else {
client - > req_opts_size = ELEMENTSOF ( default_req_opts ) ;
client - > req_opts = memdup ( default_req_opts , client - > req_opts_size ) ;
}
2014-01-18 22:32:45 +04:00
if ( ! client - > req_opts )
return - ENOMEM ;
2018-04-05 08:26:26 +03:00
* ret = TAKE_PTR ( client ) ;
2013-12-10 01:43:08 +04:00
2014-01-18 22:32:45 +04:00
return 0 ;
2013-12-10 01:43:08 +04:00
}