/* $NetBSD: dhcpd.c,v 1.2.6.1 2024/02/29 11:39:58 martin Exp $ */ /* dhcpd.c DHCP Server Daemon. */ /* * Copyright (c) 2004-2022 by Internet Systems Consortium, Inc. ("ISC") * Copyright (c) 1996-2003 by Internet Software Consortium * * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. * * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. * * Internet Systems Consortium, Inc. * PO Box 360 * Newmarket, NH 03857 USA * * https://www.isc.org/ * */ #include __RCSID("$NetBSD: dhcpd.c,v 1.2.6.1 2024/02/29 11:39:58 martin Exp $"); static const char copyright[] = "Copyright 2004-2022 Internet Systems Consortium."; static const char arr [] = "All rights reserved."; static const char message [] = "Internet Systems Consortium DHCP Server"; static const char url [] = "For info, please visit https://www.isc.org/software/dhcp/"; #include "dhcpd.h" #include #include #include #include #include #include #include #include #if defined (PARANOIA) # include # include # include /* get around the ISC declaration of group */ # define group real_group # include # undef group /* global values so db.c can look at them */ uid_t set_uid = 0; gid_t set_gid = 0; #endif /* PARANOIA */ struct class unknown_class; struct class known_class; struct iaddr server_identifier; int server_identifier_matched; #if defined (NSUPDATE) /* This stuff is always executed to figure the default values for certain ddns variables. */ char std_nsupdate [] = " \n\ option server.ddns-hostname = \n\ pick (option fqdn.hostname, option host-name, config-option host-name); \n\ option server.ddns-domainname = config-option domain-name; \n\ option server.ddns-rev-domainname = \"in-addr.arpa.\";"; /* Stores configured DDNS conflict detection flags */ u_int16_t ddns_conflict_mask; #endif /* NSUPDATE */ int ddns_update_style; int dont_use_fsync = 0; /* 0 = default, use fsync, 1 = don't use fsync */ int server_id_check = 0; /* 0 = default, don't check server id, 1 = do check */ #ifdef DHCPv6 int prefix_length_mode = PLM_PREFER; int do_release_on_roam = 0; /* 0 = default, do not release v6 leases on roam */ #endif #ifdef EUI_64 int persist_eui64 = 1; /* 1 = write EUI64 leases to disk, 0 = don't */ #endif int authoring_byte_order = 0; /* 0 = not set */ int lease_id_format = TOKEN_OCTAL; /* octal by default */ u_int32_t abandon_lease_time = DEFAULT_ABANDON_LEASE_TIME; const char *path_dhcpd_conf = _PATH_DHCPD_CONF; const char *path_dhcpd_db = _PATH_DHCPD_DB; const char *path_dhcpd_pid = _PATH_DHCPD_PID; /* False (default) => we write and use a pid file */ isc_boolean_t no_pid_file = ISC_FALSE; int dhcp_max_agent_option_packet_length = DHCP_MTU_MAX; static omapi_auth_key_t *omapi_key = (omapi_auth_key_t *)0; int omapi_port; #if defined (TRACING) trace_type_t *trace_srandom; #endif extern uint16_t local_port; extern uint16_t remote_port; libdhcp_callbacks_t dhcpd_callbacks = { &local_port, &remote_port, classify, check_collection, dhcp, #ifdef DHCPv6 dhcpv6, #endif /* DHCPv6 */ bootp, find_class, parse_allow_deny, dhcp_set_control_state, }; char *progname; static isc_result_t verify_addr (omapi_object_t *l, omapi_addr_t *addr) { return ISC_R_SUCCESS; } static isc_result_t verify_auth (omapi_object_t *p, omapi_auth_key_t *a) { if (a != omapi_key) return DHCP_R_INVALIDKEY; return ISC_R_SUCCESS; } static void omapi_listener_start (void *foo) { omapi_object_t *listener; isc_result_t result; struct timeval tv; listener = (omapi_object_t *)0; result = omapi_generic_new (&listener, MDL); if (result != ISC_R_SUCCESS) log_fatal ("Can't allocate new generic object: %s", isc_result_totext (result)); result = omapi_protocol_listen (listener, (unsigned)omapi_port, 1); if (result == ISC_R_SUCCESS && omapi_key) result = omapi_protocol_configure_security (listener, verify_addr, verify_auth); if (result != ISC_R_SUCCESS) { log_error ("Can't start OMAPI protocol: %s", isc_result_totext (result)); tv.tv_sec = cur_tv.tv_sec + 5; tv.tv_usec = cur_tv.tv_usec; add_timeout (&tv, omapi_listener_start, 0, 0, 0); } omapi_object_dereference (&listener, MDL); } #ifndef UNIT_TEST #define DHCPD_USAGE0 \ "[-p ] [-f] [-d] [-q] [-t|-T]\n" #ifdef DHCPv6 #ifdef DHCP4o6 #define DHCPD_USAGE1 \ " [-4|-6] [-4o6 ]\n" \ " [-cf config-file] [-lf lease-file]\n" #else /* DHCP4o6 */ #define DHCPD_USAGE1 \ " [-4|-6] [-cf config-file] [-lf lease-file]\n" #endif /* DHCP4o6 */ #else /* !DHCPv6 */ #define DHCPD_USAGE1 \ " [-cf config-file] [-lf lease-file]\n" #endif /* DHCPv6 */ #if defined (PARANOIA) #define DHCPD_USAGEP \ " [-user user] [-group group] [-chroot dir]\n" #else #define DHCPD_USAGEP "" #endif /* PARANOIA */ #if defined (TRACING) #define DHCPD_USAGET \ " [-tf trace-output-file]\n" \ " [-play trace-input-file]\n" #else #define DHCPD_USAGET "" #endif /* TRACING */ #define DHCPD_USAGEC \ " [-pf pid-file] [--no-pid] [-s server]\n" \ " [if0 [...ifN]]" #define DHCPD_USAGEH "{--version|--help|-h}" /*! * * \brief Print the generic usage message * * If the user has provided an incorrect command line print out * the description of the command line. The arguments provide * a way for the caller to request more specific information about * the error be printed as well. Mostly this will be that some * command doesn't include its argument. * * \param sfmt - The basic string and format for the specific error * \param sarg - Generally the offending argument from the command line. * * \return Nothing */ #include __RCSID("$NetBSD: dhcpd.c,v 1.2.6.1 2024/02/29 11:39:58 martin Exp $"); static char use_noarg[] = "No argument for command: %s "; static void usage(const char *sfmt, const char *sarg) { log_info("%s %s", message, PACKAGE_VERSION); log_info(copyright); log_info(arr); log_info(url); /* If desired print out the specific error message */ #ifdef PRINT_SPECIFIC_CL_ERRORS if (sfmt != NULL) log_error(sfmt, sarg); #endif log_fatal("Usage: %s %s%s%s%s%s\n %s %s", isc_file_basename(progname), DHCPD_USAGE0, DHCPD_USAGE1, DHCPD_USAGEP, DHCPD_USAGET, DHCPD_USAGEC, isc_file_basename(progname), DHCPD_USAGEH); } /* Note: If we add unit tests to test setup_chroot it will * need to be moved to be outside the ifndef UNIT_TEST block. */ #if defined (PARANOIA) /* to be used in one of two possible scenarios */ static void setup_chroot (char *chroot_dir) { if (geteuid()) log_fatal ("you must be root to use chroot"); if (chroot(chroot_dir)) { log_fatal ("chroot(\"%s\"): %m", chroot_dir); } if (chdir ("/")) { /* probably permission denied */ log_fatal ("chdir(\"/\"): %m"); } } #endif /* PARANOIA */ int main(int argc, char **argv) { int fd; int i, status; struct servent *ent; char *s; int cftest = 0; int lftest = 0; int pid; char pbuf [20]; #ifndef DEBUG int daemon = 1; int dfd[2] = { -1, -1 }; #endif int quiet = 0; char *server = (char *)0; isc_result_t result; unsigned seed; struct interface_info *ip; #if defined (NSUPDATE) struct parse *parse; int lose; #endif int have_dhcpd_conf = 0; int have_dhcpd_db = 0; int have_dhcpd_pid = 0; #ifdef DHCPv6 int local_family_set = 0; #ifdef DHCP4o6 u_int16_t dhcp4o6_port = 0; #endif /* DHCP4o6 */ #endif /* DHCPv6 */ #if defined (TRACING) char *traceinfile = (char *)0; char *traceoutfile = (char *)0; #endif #if defined (PARANOIA) char *set_user = 0; char *set_group = 0; char *set_chroot = 0; #endif /* PARANOIA */ libdhcp_callbacks_register(&dhcpd_callbacks); #ifdef OLD_LOG_NAME progname = "dhcpd"; #else progname = argv[0]; #endif /* Make sure that file descriptors 0 (stdin), 1, (stdout), and 2 (stderr) are open. To do this, we assume that when we open a file the lowest available file descriptor is used. */ fd = open("/dev/null", O_RDWR); if (fd == 0) fd = open("/dev/null", O_RDWR); if (fd == 1) fd = open("/dev/null", O_RDWR); if (fd == 2) log_perror = 0; /* No sense logging to /dev/null. */ else if (fd != -1) close(fd); /* Parse arguments changing daemon */ for (i = 1; i < argc; i++) { if (!strcmp (argv [i], "-f")) { #ifndef DEBUG daemon = 0; #endif } else if (!strcmp (argv [i], "-d")) { #ifndef DEBUG daemon = 0; #endif } else if (!strcmp (argv [i], "-t")) { #ifndef DEBUG daemon = 0; #endif } else if (!strcmp (argv [i], "-T")) { #ifndef DEBUG daemon = 0; #endif } else if (!strcmp (argv [i], "--version")) { const char vstring[] = "isc-dhcpd-"; IGNORE_RET(write(STDERR_FILENO, vstring, strlen(vstring))); IGNORE_RET(write(STDERR_FILENO, PACKAGE_VERSION, strlen(PACKAGE_VERSION))); IGNORE_RET(write(STDERR_FILENO, "\n", 1)); exit (0); } else if (!strcmp(argv[i], "--help") || !strcmp(argv[i], "-h")) { const char *pname = isc_file_basename(progname); IGNORE_RET(write(STDERR_FILENO, "Usage: ", 7)); IGNORE_RET(write(STDERR_FILENO, pname, strlen(pname))); IGNORE_RET(write(STDERR_FILENO, " ", 1)); IGNORE_RET(write(STDERR_FILENO, DHCPD_USAGE0, strlen(DHCPD_USAGE0))); IGNORE_RET(write(STDERR_FILENO, DHCPD_USAGE1, strlen(DHCPD_USAGE1))); #if defined (PARANOIA) IGNORE_RET(write(STDERR_FILENO, DHCPD_USAGEP, strlen(DHCPD_USAGEP))); #endif #if defined (TRACING) IGNORE_RET(write(STDERR_FILENO, DHCPD_USAGET, strlen(DHCPD_USAGET))); #endif IGNORE_RET(write(STDERR_FILENO, DHCPD_USAGEC, strlen(DHCPD_USAGEC))); IGNORE_RET(write(STDERR_FILENO, "\n", 1)); IGNORE_RET(write(STDERR_FILENO, " ", 7)); IGNORE_RET(write(STDERR_FILENO, pname, strlen(pname))); IGNORE_RET(write(STDERR_FILENO, " ", 1)); IGNORE_RET(write(STDERR_FILENO, DHCPD_USAGEH, strlen(DHCPD_USAGEH))); IGNORE_RET(write(STDERR_FILENO, "\n", 1)); exit(0); #ifdef TRACING } else if (!strcmp (argv [i], "-play")) { #ifndef DEBUG daemon = 0; #endif #endif } } #ifndef DEBUG /* When not forbidden prepare to become a daemon */ if (daemon) { if (pipe(dfd) == -1) log_fatal("Can't get pipe: %m"); if ((pid = fork ()) < 0) log_fatal("Can't fork daemon: %m"); if (pid != 0) { /* Parent: wait for the child to start */ int n; (void) close(dfd[1]); do { char buf; n = read(dfd[0], &buf, 1); if (n == 1) _exit((int)buf); } while (n == -1 && errno == EINTR); _exit(1); } /* Child */ (void) close(dfd[0]); } #endif /* Set up the isc and dns library managers */ status = dhcp_context_create(DHCP_CONTEXT_PRE_DB, NULL, NULL); if (status != ISC_R_SUCCESS) log_fatal("Can't initialize context: %s", isc_result_totext(status)); /* Set up the client classification system. */ classification_setup (); /* Initialize the omapi system. */ result = omapi_init (); if (result != ISC_R_SUCCESS) log_fatal ("Can't initialize OMAPI: %s", isc_result_totext (result)); /* Set up the OMAPI wrappers for common objects. */ dhcp_db_objects_setup (); /* Set up the OMAPI wrappers for various server database internal objects. */ dhcp_common_objects_setup (); /* Initially, log errors to stderr as well as to syslogd. */ openlog (isc_file_basename(progname), DHCP_LOG_OPTIONS, DHCPD_LOG_FACILITY); for (i = 1; i < argc; i++) { if (!strcmp (argv [i], "-p")) { if (++i == argc) usage(use_noarg, argv[i-1]); local_port = validate_port (argv [i]); log_debug ("binding to user-specified port %d", ntohs (local_port)); } else if (!strcmp (argv [i], "-f")) { #ifndef DEBUG /* daemon = 0; */ #endif } else if (!strcmp (argv [i], "-d")) { #ifndef DEBUG /* daemon = 0; */ #endif log_perror = -1; } else if (!strcmp (argv [i], "-s")) { if (++i == argc) usage(use_noarg, argv[i-1]); server = argv [i]; #if defined (PARANOIA) } else if (!strcmp (argv [i], "-user")) { if (++i == argc) usage(use_noarg, argv[i-1]); set_user = argv [i]; } else if (!strcmp (argv [i], "-group")) { if (++i == argc) usage(use_noarg, argv[i-1]); set_group = argv [i]; } else if (!strcmp (argv [i], "-chroot")) { if (++i == argc) usage(use_noarg, argv[i-1]); set_chroot = argv [i]; #endif /* PARANOIA */ } else if (!strcmp (argv [i], "-cf")) { if (++i == argc) usage(use_noarg, argv[i-1]); path_dhcpd_conf = argv [i]; have_dhcpd_conf = 1; } else if (!strcmp (argv [i], "-lf")) { if (++i == argc) usage(use_noarg, argv[i-1]); path_dhcpd_db = argv [i]; have_dhcpd_db = 1; } else if (!strcmp (argv [i], "-pf")) { if (++i == argc) usage(use_noarg, argv[i-1]); path_dhcpd_pid = argv [i]; have_dhcpd_pid = 1; } else if (!strcmp(argv[i], "--no-pid")) { no_pid_file = ISC_TRUE; } else if (!strcmp (argv [i], "-t")) { /* test configurations only */ #ifndef DEBUG /* daemon = 0; */ #endif cftest = 1; log_perror = -1; } else if (!strcmp (argv [i], "-T")) { /* test configurations and lease file only */ #ifndef DEBUG /* daemon = 0; */ #endif cftest = 1; lftest = 1; log_perror = -1; } else if (!strcmp (argv [i], "-q")) { quiet = 1; quiet_interface_discovery = 1; #ifdef DHCPv6 } else if (!strcmp(argv[i], "-4")) { if (local_family_set && (local_family != AF_INET)) { log_fatal("Server cannot run in both IPv4 and " "IPv6 mode at the same time."); } local_family = AF_INET; local_family_set = 1; } else if (!strcmp(argv[i], "-6")) { if (local_family_set && (local_family != AF_INET6)) { log_fatal("Server cannot run in both IPv4 and " "IPv6 mode at the same time."); } local_family = AF_INET6; local_family_set = 1; #ifdef DHCP4o6 } else if (!strcmp(argv[i], "-4o6")) { if (++i == argc) usage(use_noarg, argv[i-1]); dhcp4o6_port = validate_port_pair(argv[i]); log_debug("DHCPv4 over DHCPv6 over ::1 port %d and %d", ntohs(dhcp4o6_port), ntohs(dhcp4o6_port) + 1); dhcpv4_over_dhcpv6 = 1; #endif /* DHCP4o6 */ #endif /* DHCPv6 */ #if defined (TRACING) } else if (!strcmp (argv [i], "-tf")) { if (++i == argc) usage(use_noarg, argv[i-1]); traceoutfile = argv [i]; } else if (!strcmp (argv [i], "-play")) { if (++i == argc) usage(use_noarg, argv[i-1]); traceinfile = argv [i]; trace_replay_init (); #endif /* TRACING */ } else if (argv [i][0] == '-') { usage("Unknown command %s", argv[i]); } else { struct interface_info *tmp = (struct interface_info *)0; if (strlen(argv[i]) >= sizeof(tmp->name)) log_fatal("%s: interface name too long " "(is %ld)", argv[i], (long)strlen(argv[i])); result = interface_allocate (&tmp, MDL); if (result != ISC_R_SUCCESS) log_fatal ("Insufficient memory to %s %s: %s", "record interface", argv [i], isc_result_totext (result)); strcpy (tmp -> name, argv [i]); if (interfaces) { interface_reference (&tmp -> next, interfaces, MDL); interface_dereference (&interfaces, MDL); } interface_reference (&interfaces, tmp, MDL); tmp -> flags = INTERFACE_REQUESTED; } } #if defined(DHCPv6) && defined(DHCP4o6) if (dhcpv4_over_dhcpv6) { if (!local_family_set) log_error("please specify the address family " "with DHPv4 over DHCPv6 [-4|-6]."); if ((local_family == AF_INET) && (interfaces != NULL)) log_fatal("DHCPv4 server in DHPv4 over DHCPv6 " "mode with command line specified " "interfaces."); } #endif /* DHCPv6 && DHCP4o6 */ if (!have_dhcpd_conf && (s = getenv ("PATH_DHCPD_CONF"))) { path_dhcpd_conf = s; } #ifdef DHCPv6 if (local_family == AF_INET6) { /* DHCPv6: override DHCPv4 lease and pid filenames */ if (!have_dhcpd_db) { if ((s = getenv ("PATH_DHCPD6_DB"))) path_dhcpd_db = s; else path_dhcpd_db = _PATH_DHCPD6_DB; } if (!have_dhcpd_pid) { if ((s = getenv ("PATH_DHCPD6_PID"))) path_dhcpd_pid = s; else path_dhcpd_pid = _PATH_DHCPD6_PID; } } else #endif /* DHCPv6 */ { if (!have_dhcpd_db && (s = getenv ("PATH_DHCPD_DB"))) { path_dhcpd_db = s; have_dhcpd_db = 1; } if (!have_dhcpd_pid && (s = getenv ("PATH_DHCPD_PID"))) { path_dhcpd_pid = s; have_dhcpd_pid = 1; } } /* * convert relative path names to absolute, for files that need * to be reopened after chdir() has been called */ if (have_dhcpd_db && path_dhcpd_db[0] != '/') { path_dhcpd_db = absolute_path(path_dhcpd_db); } if (!quiet) { log_info("%s %s", message, PACKAGE_VERSION); log_info (copyright); log_info (arr); log_info (url); } else { log_perror = 0; } #ifndef DEBUG /* * We need to fork before we call the context create * call that creates the worker threads! */ if (daemon) { /* First part of becoming a daemon... */ if ((pid = fork ()) < 0) log_fatal ("Can't fork daemon: %m"); else if (pid) exit (0); } #endif /* Set up the isc and dns library managers */ status = dhcp_context_create(DHCP_CONTEXT_PRE_DB, NULL, NULL); if (status != ISC_R_SUCCESS) log_fatal("Can't initialize context: %s", isc_result_totext(status)); /* Set up the client classification system. */ classification_setup (); #if defined (TRACING) trace_init (set_time, MDL); if (traceoutfile) { result = trace_begin (traceoutfile, MDL); if (result != ISC_R_SUCCESS) log_fatal ("Unable to begin trace: %s", isc_result_totext (result)); } interface_trace_setup (); parse_trace_setup (); trace_srandom = trace_type_register ("random-seed", (void *)0, trace_seed_input, trace_seed_stop, MDL); #if defined (NSUPDATE) trace_ddns_init(); #endif /* NSUPDATE */ #endif #if defined (PARANOIA) /* get user and group info if those options were given */ if (set_user) { struct passwd *tmp_pwd; if (geteuid()) log_fatal ("you must be root to set user"); if (!(tmp_pwd = getpwnam(set_user))) log_fatal ("no such user: %s", set_user); set_uid = tmp_pwd->pw_uid; /* use the user's group as the default gid */ if (!set_group) set_gid = tmp_pwd->pw_gid; } if (set_group) { /* get around the ISC declaration of group */ #define group real_group struct group *tmp_grp; if (geteuid()) log_fatal ("you must be root to set group"); if (!(tmp_grp = getgrnam(set_group))) log_fatal ("no such group: %s", set_group); set_gid = tmp_grp->gr_gid; #undef group } # if defined (EARLY_CHROOT) if (set_chroot) setup_chroot (set_chroot); # endif /* EARLY_CHROOT */ #endif /* PARANOIA */ /* Default to the DHCP/BOOTP port. */ if (!local_port) { if ((s = getenv ("DHCPD_PORT"))) { local_port = validate_port (s); log_debug ("binding to environment-specified port %d", ntohs (local_port)); } else { if (local_family == AF_INET) { ent = getservbyname("dhcp", "udp"); if (ent == NULL) { local_port = htons(67); } else { local_port = ent->s_port; } } else { /* INSIST(local_family == AF_INET6); */ ent = getservbyname("dhcpv6-server", "udp"); if (ent == NULL) { local_port = htons(547); } else { local_port = ent->s_port; } } #ifndef __CYGWIN32__ /* XXX */ endservent (); #endif } } if (local_family == AF_INET) { remote_port = htons(ntohs(local_port) + 1); } else { /* INSIST(local_family == AF_INET6); */ ent = getservbyname("dhcpv6-client", "udp"); if (ent == NULL) { remote_port = htons(546); } else { remote_port = ent->s_port; } } if (server) { if (local_family != AF_INET) { log_fatal("You can only specify address to send " "replies to when running an IPv4 server."); } if (!inet_aton (server, &limited_broadcast)) { struct hostent *he; he = gethostbyname (server); if (he) { memcpy (&limited_broadcast, he -> h_addr_list [0], sizeof limited_broadcast); } else limited_broadcast.s_addr = INADDR_BROADCAST; } } else { limited_broadcast.s_addr = INADDR_BROADCAST; } /* Get the current time... */ gettimeofday(&cur_tv, NULL); /* Set up the initial dhcp option universe. */ initialize_common_option_spaces (); initialize_server_option_spaces (); /* Add the ddns update style enumeration prior to parsing. */ add_enumeration (&ddns_styles); add_enumeration (&syslog_enum); #if defined (LDAP_CONFIGURATION) add_enumeration (&ldap_methods); #if defined (LDAP_USE_SSL) add_enumeration (&ldap_ssl_usage_enum); add_enumeration (&ldap_tls_reqcert_enum); add_enumeration (&ldap_tls_crlcheck_enum); #endif #endif if (!group_allocate (&root_group, MDL)) log_fatal ("Can't allocate root group!"); root_group -> authoritative = 0; /* Set up various hooks. */ dhcp_interface_setup_hook = dhcpd_interface_setup_hook; bootp_packet_handler = do_packet; #ifdef DHCPv6 add_enumeration (&prefix_length_modes); dhcpv6_packet_handler = do_packet6; #endif /* DHCPv6 */ #if defined (NSUPDATE) /* Set up the standard name service updater routine. */ parse = NULL; status = new_parse(&parse, -1, std_nsupdate, sizeof(std_nsupdate) - 1, "standard name service update routine", 0); if (status != ISC_R_SUCCESS) log_fatal ("can't begin parsing name service updater!"); if (parse != NULL) { lose = 0; if (!(parse_executable_statements(&root_group->statements, parse, &lose, context_any))) { end_parse(&parse); log_fatal("can't parse standard name service updater!"); } end_parse(&parse); } #endif /* Initialize icmp support... */ if (!cftest && !lftest) icmp_startup (1, lease_pinged); #if defined (TRACING) if (traceinfile) { if (!have_dhcpd_db) { log_error ("%s", ""); log_error ("** You must specify a lease file with -lf."); log_error (" Dhcpd will not overwrite your default"); log_fatal (" lease file when playing back a trace. **"); } trace_file_replay (traceinfile); #if defined (DEBUG_MEMORY_LEAKAGE) && \ defined (DEBUG_MEMORY_LEAKAGE_ON_EXIT) free_everything (); omapi_print_dmalloc_usage_by_caller (); #endif exit (0); } #endif #ifdef DHCPv6 /* set up DHCPv6 hashes */ if (!ia_new_hash(&ia_na_active, DEFAULT_HASH_SIZE, MDL)) { log_fatal("Out of memory creating hash for active IA_NA."); } if (!ia_new_hash(&ia_ta_active, DEFAULT_HASH_SIZE, MDL)) { log_fatal("Out of memory creating hash for active IA_TA."); } if (!ia_new_hash(&ia_pd_active, DEFAULT_HASH_SIZE, MDL)) { log_fatal("Out of memory creating hash for active IA_PD."); } #endif /* DHCPv6 */ /* Read the dhcpd.conf file... */ if (readconf () != ISC_R_SUCCESS) log_fatal ("Configuration file errors encountered -- exiting"); postconf_initialization (quiet); #if defined (FAILOVER_PROTOCOL) dhcp_failover_sanity_check(); #endif #if defined(DHCPv6) && defined(DHCP4o6) if (dhcpv4_over_dhcpv6) { if ((local_family == AF_INET) && (interfaces != NULL)) log_fatal("DHCPv4 server in DHPv4 over DHCPv6 " "mode with config file specified " "interfaces."); } #endif /* DHCPv6 && DHCP4o6 */ #if defined (PARANOIA) && !defined (EARLY_CHROOT) if (set_chroot) setup_chroot (set_chroot); #endif /* PARANOIA && !EARLY_CHROOT */ #ifdef DHCPv6 /* log info about ipv6_ponds with large address ranges */ report_jumbo_ranges(); #endif /* test option should cause an early exit */ if (cftest && !lftest) { exit(0); } /* * First part of dealing with pid files. Check to see if * we should continue running or not. We run if: * - we are testing the lease file out * - we don't have a pid file to check * - there is no other process running */ if ((lftest == 0) && (no_pid_file == ISC_FALSE)) { /*Read previous pid file. */ if ((i = open(path_dhcpd_pid, O_RDONLY)) >= 0) { status = read(i, pbuf, (sizeof pbuf) - 1); close(i); if (status > 0) { pbuf[status] = 0; pid = atoi(pbuf); /* * If there was a previous server process and * it is still running, abort */ if (!pid || (pid != getpid() && kill(pid, 0) == 0)) log_fatal("There's already a " "DHCP server running."); } } } group_write_hook = group_writer; /* Start up the database... */ db_startup (lftest); if (lftest) exit (0); /* Discover all the network interfaces and initialize them. */ #if defined(DHCPv6) && defined(DHCP4o6) if (dhcpv4_over_dhcpv6) { int real_family = local_family; local_family = AF_INET6; /* The DHCPv4 side of DHCPv4-over-DHCPv6 service uses a specific discovery which doesn't register DHCPv6 sockets. */ if (real_family == AF_INET) discover_interfaces(DISCOVER_SERVER46); else discover_interfaces(DISCOVER_SERVER); local_family = real_family; } else #endif /* DHCPv6 && DHCP4o6 */ discover_interfaces(DISCOVER_SERVER); #ifdef DHCPv6 /* * Remove addresses from our pools that we should not issue * to clients. * * We currently have no support for this in IPv4. It is not * as important in IPv4, as making pools with ranges that * leave out interfaces and hosts is fairly straightforward * using range notation, but not so handy with CIDR notation. */ if (local_family == AF_INET6) { mark_hosts_unavailable(); mark_phosts_unavailable(); mark_interfaces_unavailable(); } #endif /* DHCPv6 */ /* Make up a seed for the random number generator from current time plus the sum of the last four bytes of each interface's hardware address interpreted as an integer. Not much entropy, but we're booting, so we're not likely to find anything better. */ seed = 0; for (ip = interfaces; ip; ip = ip -> next) { int junk; memcpy (&junk, &ip -> hw_address.hbuf [ip -> hw_address.hlen - sizeof seed], sizeof seed); seed += junk; } srandom (seed + cur_time); #if defined (TRACING) trace_seed_stash (trace_srandom, seed + cur_time); #endif postdb_startup (); #ifdef DHCPv6 /* * Set server DHCPv6 identifier - we go in order: * dhcp6.server-id in the config file * server-duid from the lease file * server-duid from the config file (the config file is read first * and the lease file overwrites the config file information) * generate a new one from the interface hardware addresses. * In all cases we write it out to the lease file. * See dhcpv6.c for discussion of setting DUID. */ if ((set_server_duid_from_option() != ISC_R_SUCCESS) && (!server_duid_isset()) && (generate_new_server_duid() != ISC_R_SUCCESS)) { log_fatal("Unable to set server identifier."); } write_server_duid(); #ifdef DHCP4o6 if (dhcpv4_over_dhcpv6) dhcp4o6_setup(dhcp4o6_port); #endif /* DHCP4o6 */ #endif /* DHCPv6 */ #ifndef DEBUG /* * Second part of dealing with pid files. Now * that we have forked we can write our pid if * appropriate. */ if (no_pid_file == ISC_FALSE) { i = open(path_dhcpd_pid, O_WRONLY|O_CREAT|O_TRUNC, 0644); if (i >= 0) { sprintf(pbuf, "%d\n", (int) getpid()); IGNORE_RET(write(i, pbuf, strlen(pbuf))); close(i); } else { log_error("Can't create PID file %s: %m.", path_dhcpd_pid); } } #if defined (PARANOIA) /* change uid to the specified one */ if (set_gid) { if (setgroups (0, (void *)0)) log_fatal ("setgroups: %m"); if (setgid (set_gid)) log_fatal ("setgid(%d): %m", (int) set_gid); } if (set_uid) { if (setuid (set_uid)) log_fatal ("setuid(%d): %m", (int) set_uid); } #endif /* PARANOIA */ /* If we were requested to log to stdout on the command line, keep doing so; otherwise, stop. */ if (log_perror == -1) log_perror = 1; else log_perror = 0; if (daemon) { if (dfd[0] != -1 && dfd[1] != -1) { char buf = 0; if (write(dfd[1], &buf, 1) != 1) log_fatal("write to parent: %m"); (void) close(dfd[1]); dfd[0] = dfd[1] = -1; } /* Become session leader and get pid... */ (void) setsid(); /* Close standard I/O descriptors. */ (void) close(0); (void) close(1); (void) close(2); /* Reopen them on /dev/null. */ (void) open("/dev/null", O_RDWR); (void) open("/dev/null", O_RDWR); (void) open("/dev/null", O_RDWR); log_perror = 0; /* No sense logging to /dev/null. */ IGNORE_RET (chdir("/")); } #endif /* !DEBUG */ #if defined (DEBUG_MEMORY_LEAKAGE) || defined (DEBUG_MALLOC_POOL) || \ defined (DEBUG_MEMORY_LEAKAGE_ON_EXIT) dmalloc_cutoff_generation = dmalloc_generation; dmalloc_longterm = dmalloc_outstanding; dmalloc_outstanding = 0; #endif omapi_set_int_value ((omapi_object_t *)dhcp_control_object, (omapi_object_t *)0, "state", server_running); #if defined(ENABLE_GENTLE_SHUTDOWN) /* no signal handlers until we deal with the side effects */ /* install signal handlers */ signal(SIGINT, dhcp_signal_handler); /* control-c */ signal(SIGTERM, dhcp_signal_handler); /* kill */ #endif /* Log that we are about to start working */ log_info("Server starting service."); /* * Receive packets and dispatch them... * dispatch() will never return. */ dispatch (); /* Let's return status code */ return 0; } #endif /* !UNIT_TEST */ void postconf_initialization (int quiet) { struct option_state *options = NULL; struct data_string db; struct option_cache *oc; char *s; isc_result_t result; int tmp; #if defined (NSUPDATE) struct in_addr local4, *local4_ptr = NULL; struct in6_addr local6, *local6_ptr = NULL; #endif /* Now try to get the lease file name. */ option_state_allocate(&options, MDL); execute_statements_in_scope(NULL, NULL, NULL, NULL, NULL, options, &global_scope, root_group, NULL, NULL); memset(&db, 0, sizeof db); oc = lookup_option(&server_universe, options, SV_LEASE_FILE_NAME); if (oc && evaluate_option_cache(&db, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL)) { s = dmalloc(db.len + 1, MDL); if (!s) log_fatal("no memory for lease db filename."); memcpy(s, db.data, db.len); s[db.len] = 0; data_string_forget(&db, MDL); path_dhcpd_db = s; } oc = lookup_option(&server_universe, options, SV_PID_FILE_NAME); if (oc && evaluate_option_cache(&db, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL)) { s = dmalloc(db.len + 1, MDL); if (!s) log_fatal("no memory for pid filename."); memcpy(s, db.data, db.len); s[db.len] = 0; data_string_forget(&db, MDL); path_dhcpd_pid = s; } #ifdef DHCPv6 if (local_family == AF_INET6) { /* * Override lease file name with dhcpv6 lease file name, * if it was set; then, do the same with the pid file name */ oc = lookup_option(&server_universe, options, SV_DHCPV6_LEASE_FILE_NAME); if (oc && evaluate_option_cache(&db, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL)) { s = dmalloc(db.len + 1, MDL); if (!s) log_fatal("no memory for lease db filename."); memcpy(s, db.data, db.len); s[db.len] = 0; data_string_forget(&db, MDL); path_dhcpd_db = s; } oc = lookup_option(&server_universe, options, SV_DHCPV6_PID_FILE_NAME); if (oc && evaluate_option_cache(&db, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL)) { s = dmalloc(db.len + 1, MDL); if (!s) log_fatal("no memory for pid filename."); memcpy(s, db.data, db.len); s[db.len] = 0; data_string_forget(&db, MDL); path_dhcpd_pid = s; } oc = lookup_option(&server_universe, options, SV_LOCAL_ADDRESS6); if (oc && evaluate_option_cache(&db, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL)) { if (db.len == 16) { memcpy(&local_address6, db.data, 16); } else log_fatal("invalid local address " "data length"); data_string_forget(&db, MDL); } oc = lookup_option(&server_universe, options, SV_BIND_LOCAL_ADDRESS6); if (oc && evaluate_boolean_option_cache(NULL, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL)) { bind_local_address6 = 1; } } #endif /* DHCPv6 */ omapi_port = -1; oc = lookup_option(&server_universe, options, SV_OMAPI_PORT); if (oc && evaluate_option_cache(&db, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL)) { if (db.len == 2) { omapi_port = getUShort(db.data); } else log_fatal("invalid omapi port data length"); data_string_forget(&db, MDL); } oc = lookup_option(&server_universe, options, SV_OMAPI_KEY); if (oc && evaluate_option_cache(&db, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL)) { s = dmalloc(db.len + 1, MDL); if (!s) log_fatal("no memory for OMAPI key filename."); memcpy(s, db.data, db.len); s[db.len] = 0; data_string_forget(&db, MDL); result = omapi_auth_key_lookup_name(&omapi_key, s); dfree(s, MDL); if (result != ISC_R_SUCCESS) log_fatal("OMAPI key %s: %s", s, isc_result_totext (result)); } oc = lookup_option(&server_universe, options, SV_LOCAL_PORT); if (oc && evaluate_option_cache(&db, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL)) { if (db.len == 2) { local_port = htons(getUShort (db.data)); } else log_fatal("invalid local port data length"); data_string_forget(&db, MDL); } oc = lookup_option(&server_universe, options, SV_REMOTE_PORT); if (oc && evaluate_option_cache(&db, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL)) { if (db.len == 2) { remote_port = htons(getUShort (db.data)); } else log_fatal("invalid remote port data length"); data_string_forget(&db, MDL); } oc = lookup_option(&server_universe, options, SV_LIMITED_BROADCAST_ADDRESS); if (oc && evaluate_option_cache(&db, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL)) { if (db.len == 4) { memcpy(&limited_broadcast, db.data, 4); } else log_fatal("invalid broadcast address data length"); data_string_forget(&db, MDL); } oc = lookup_option(&server_universe, options, SV_LOCAL_ADDRESS); if (oc && evaluate_option_cache(&db, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL)) { if (db.len == 4) { memcpy(&local_address, db.data, 4); } else log_fatal("invalid local address data length"); data_string_forget(&db, MDL); } oc = lookup_option(&server_universe, options, SV_DDNS_UPDATE_STYLE); if (oc) { if (evaluate_option_cache(&db, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL)) { if (db.len == 1) { ddns_update_style = db.data[0]; } else log_fatal("invalid dns update type"); data_string_forget(&db, MDL); } } else { ddns_update_style = DDNS_UPDATE_STYLE_NONE; } #if defined (NSUPDATE) /* We no longer support ad_hoc, tell the user */ if (ddns_update_style == DDNS_UPDATE_STYLE_AD_HOC) { log_fatal("ddns-update-style ad_hoc no longer supported"); } oc = lookup_option(&server_universe, options, SV_DDNS_LOCAL_ADDRESS4); if (oc) { if (evaluate_option_cache(&db, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL)) { if (db.len == 4) { memcpy(&local4, db.data, 4); local4_ptr = &local4; } data_string_forget(&db, MDL); } } oc = lookup_option(&server_universe, options, SV_DDNS_LOCAL_ADDRESS6); if (oc) { if (evaluate_option_cache(&db, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL)) { if (db.len == 16) { memcpy(&local6, db.data, 16); local6_ptr = &local6; } data_string_forget(&db, MDL); } } /* Don't init DNS client if update style is none. This avoids * listening ports that aren't needed. We don't use ddns-udpates * as that has multiple levels of scope. */ if (ddns_update_style != DDNS_UPDATE_STYLE_NONE) { if (dhcp_context_create(DHCP_CONTEXT_POST_DB, local4_ptr, local6_ptr) != ISC_R_SUCCESS) { log_fatal("Unable to complete ddns initialization"); } } /* Set the conflict detection flag mask based on globally * defined DDNS configuration params. This mask should be * to init ddns_cb::flags before for every DDNS transaction. */ ddns_conflict_mask = get_conflict_mask(options); #else /* If we don't have support for updates compiled in tell the user */ if (ddns_update_style != DDNS_UPDATE_STYLE_NONE) { log_fatal("Support for ddns-update-style not compiled in"); } #endif if (!quiet) { log_info ("Config file: %s", path_dhcpd_conf); log_info ("Database file: %s", path_dhcpd_db); log_info ("PID file: %s", path_dhcpd_pid); } oc = lookup_option(&server_universe, options, SV_LOG_FACILITY); if (oc) { if (evaluate_option_cache(&db, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL)) { if (db.len == 1) { closelog (); openlog(isc_file_basename(progname), DHCP_LOG_OPTIONS, db.data[0]); /* Log the startup banner into the new log file. */ /* Don't log to stderr twice. */ tmp = log_perror; log_perror = 0; log_info("%s %s", message, PACKAGE_VERSION); log_info(copyright); log_info(arr); log_info(url); log_perror = tmp; } else log_fatal("invalid log facility"); data_string_forget(&db, MDL); } } #if defined(DELAYED_ACK) oc = lookup_option(&server_universe, options, SV_DELAYED_ACK); if (oc && evaluate_option_cache(&db, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL)) { if (db.len == 2) { max_outstanding_acks = htons(getUShort(db.data)); } else { log_fatal("invalid max delayed ACK count "); } data_string_forget(&db, MDL); } #if defined(DHCP4o6) /* Delayed acks and DHCPv4-over-DHCPv6 are incompatible */ if (dhcpv4_over_dhcpv6) { if (max_outstanding_acks > 0) { log_debug("DHCP4o6 enabled, " "setting delayed-ack to zero (incompatible)"); } max_outstanding_acks = 0; } #endif oc = lookup_option(&server_universe, options, SV_MAX_ACK_DELAY); if (oc && evaluate_option_cache(&db, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL)) { u_int32_t timeval; if (db.len != 4) log_fatal("invalid max ack delay configuration"); timeval = getULong(db.data); max_ack_delay_secs = timeval / 1000000; max_ack_delay_usecs = timeval % 1000000; data_string_forget(&db, MDL); } #endif oc = lookup_option(&server_universe, options, SV_DONT_USE_FSYNC); if ((oc != NULL) && evaluate_boolean_option_cache(NULL, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL)) { dont_use_fsync = 1; log_error("Not using fsync() to flush lease writes"); } oc = lookup_option(&server_universe, options, SV_SERVER_ID_CHECK); if ((oc != NULL) && evaluate_boolean_option_cache(NULL, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL)) { log_info("Setting server-id-check true"); server_id_check = 1; } #ifdef DHCPv6 oc = lookup_option(&server_universe, options, SV_PREFIX_LEN_MODE); if ((oc != NULL) && evaluate_option_cache(&db, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL)) { if (db.len == 1) { prefix_length_mode = db.data[0]; } else { log_fatal("invalid prefix-len-mode"); } data_string_forget(&db, MDL); } #endif // Set global abandon-lease-time option. oc = lookup_option (&server_universe, options, SV_ABANDON_LEASE_TIME); if ((oc != NULL) && evaluate_option_cache(&db, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL)) { if (db.len == sizeof (u_int32_t)) { abandon_lease_time = getULong (db.data); } else { log_fatal("invalid abandon-lease-time"); } data_string_forget (&db, MDL); } #if defined (FAILOVER_PROTOCOL) oc = lookup_option(&server_universe, options, SV_CHECK_SECS_BYTE_ORDER); if ((oc != NULL) && evaluate_boolean_option_cache(NULL, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL)) { check_secs_byte_order = 1; } #endif #ifdef EUI_64 oc = lookup_option(&server_universe, options, SV_PERSIST_EUI_64_LEASES); if (oc != NULL) { persist_eui64 = evaluate_boolean_option_cache(NULL, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL); } if (!persist_eui64) { log_info("EUI64 leases will not be written to lease file"); } #endif #ifdef DHCPv6 oc = lookup_option(&server_universe, options, SV_RELEASE_ON_ROAM); if (oc != NULL) { do_release_on_roam = evaluate_boolean_option_cache(NULL, NULL, NULL, NULL, options, NULL, &global_scope, oc, MDL); } #endif #if defined (BINARY_LEASES) if (local_family == AF_INET) { log_info("Source compiled to use binary-leases"); } #endif /* Don't need the options anymore. */ option_state_dereference(&options, MDL); } void postdb_startup (void) { /* Initialize the omapi listener state. */ if (omapi_port != -1) { omapi_listener_start (0); } #if defined (FAILOVER_PROTOCOL) /* Initialize the failover listener state. */ dhcp_failover_startup (); #endif /* * Begin our lease timeout background task. */ schedule_all_ipv6_lease_timeouts(); } void lease_pinged (from, packet, length) struct iaddr from; u_int8_t *packet; int length; { struct lease *lp; /* Don't try to look up a pinged lease if we aren't trying to ping one - otherwise somebody could easily make us churn by just forging repeated ICMP EchoReply packets for us to look up. */ if (!outstanding_pings) return; lp = (struct lease *)0; if (!find_lease_by_ip_addr (&lp, from, MDL)) { log_debug ("unexpected ICMP Echo Reply from %s", piaddr (from)); return; } if (!lp -> state) { #if defined (FAILOVER_PROTOCOL) if (!lp -> pool || !lp -> pool -> failover_peer) #endif log_debug ("ICMP Echo Reply for %s late or spurious.", piaddr (from)); goto out; } if (lp -> ends > cur_time) { log_debug ("ICMP Echo reply while lease %s valid.", piaddr (from)); } /* At this point it looks like we pinged a lease and got a response, which shouldn't have happened. */ data_string_forget (&lp -> state -> parameter_request_list, MDL); free_lease_state (lp -> state, MDL); lp -> state = (struct lease_state *)0; abandon_lease (lp, "pinged before offer"); cancel_timeout (lease_ping_timeout, lp); --outstanding_pings; out: lease_dereference (&lp, MDL); } void lease_ping_timeout (vlp) void *vlp; { struct lease *lp = vlp; #if defined (DEBUG_MEMORY_LEAKAGE) unsigned long previous_outstanding = dmalloc_outstanding; #endif --outstanding_pings; dhcp_reply (lp); #if defined (DEBUG_MEMORY_LEAKAGE) log_info ("generation %ld: %ld new, %ld outstanding, %ld long-term", dmalloc_generation, dmalloc_outstanding - previous_outstanding, dmalloc_outstanding, dmalloc_longterm); #endif #if defined (DEBUG_MEMORY_LEAKAGE) dmalloc_dump_outstanding (); #endif } int dhcpd_interface_setup_hook (struct interface_info *ip, struct iaddr *ia) { struct subnet *subnet; struct shared_network *share; isc_result_t status; /* Special case for fallback network - not sure why this is necessary. */ if (!ia) { const char *fnn = "fallback-net"; status = shared_network_allocate (&ip -> shared_network, MDL); if (status != ISC_R_SUCCESS) log_fatal ("No memory for shared subnet: %s", isc_result_totext (status)); ip -> shared_network -> name = dmalloc (strlen (fnn) + 1, MDL); if (!ip -> shared_network -> name) log_fatal("no memory for shared network"); strcpy (ip -> shared_network -> name, fnn); return 1; } /* If there's a registered subnet for this address, connect it together... */ subnet = (struct subnet *)0; if (find_subnet (&subnet, *ia, MDL)) { /* If this interface has multiple aliases on the same subnet, ignore all but the first we encounter. */ if (!subnet -> interface) { interface_reference (&subnet -> interface, ip, MDL); subnet -> interface_address = *ia; } else if (subnet -> interface != ip) { log_error ("Multiple interfaces match the %s: %s %s", "same subnet", subnet -> interface -> name, ip -> name); } share = subnet -> shared_network; if (ip -> shared_network && ip -> shared_network != share) { log_fatal ("Interface %s matches multiple shared %s", ip -> name, "networks"); } else { if (!ip -> shared_network) shared_network_reference (&ip -> shared_network, share, MDL); } if (!share -> interface) { interface_reference (&share -> interface, ip, MDL); } else if (share -> interface != ip) { log_error ("Multiple interfaces match the %s: %s %s", "same shared network", share -> interface -> name, ip -> name); } subnet_dereference (&subnet, MDL); } return 1; } static TIME shutdown_time; static int omapi_connection_count; enum dhcp_shutdown_state shutdown_state; isc_result_t dhcp_io_shutdown (omapi_object_t *obj, void *foo) { /* Shut down all listeners. */ if (shutdown_state == shutdown_listeners && obj -> type == omapi_type_listener && obj -> inner && obj -> inner -> type == omapi_type_protocol_listener) { omapi_listener_destroy (obj, MDL); return ISC_R_SUCCESS; } /* Shut down all existing omapi connections. */ if (obj -> type == omapi_type_connection && obj -> inner && obj -> inner -> type == omapi_type_protocol) { if (shutdown_state == shutdown_drop_omapi_connections) { omapi_disconnect (obj, 1); } omapi_connection_count++; if (shutdown_state == shutdown_omapi_connections) { omapi_disconnect (obj, 0); return ISC_R_SUCCESS; } } /* Shutdown all DHCP interfaces. */ if (obj -> type == dhcp_type_interface && shutdown_state == shutdown_dhcp) { dhcp_interface_remove (obj, (omapi_object_t *)0); return ISC_R_SUCCESS; } return ISC_R_SUCCESS; } static isc_result_t dhcp_io_shutdown_countdown (void *vlp) { #if defined (FAILOVER_PROTOCOL) dhcp_failover_state_t *state; int failover_connection_count = 0; #endif struct timeval tv; oncemore: if (shutdown_state == shutdown_listeners || shutdown_state == shutdown_omapi_connections || shutdown_state == shutdown_drop_omapi_connections || shutdown_state == shutdown_dhcp) { omapi_connection_count = 0; omapi_io_state_foreach (dhcp_io_shutdown, 0); } if ((shutdown_state == shutdown_listeners || shutdown_state == shutdown_omapi_connections || shutdown_state == shutdown_drop_omapi_connections) && omapi_connection_count == 0) { shutdown_state = shutdown_dhcp; shutdown_time = cur_time; goto oncemore; } else if (shutdown_state == shutdown_listeners && cur_time - shutdown_time > 4) { shutdown_state = shutdown_omapi_connections; shutdown_time = cur_time; } else if (shutdown_state == shutdown_omapi_connections && cur_time - shutdown_time > 4) { shutdown_state = shutdown_drop_omapi_connections; shutdown_time = cur_time; } else if (shutdown_state == shutdown_drop_omapi_connections && cur_time - shutdown_time > 4) { shutdown_state = shutdown_dhcp; shutdown_time = cur_time; goto oncemore; } else if (shutdown_state == shutdown_dhcp && cur_time - shutdown_time > 4) { shutdown_state = shutdown_done; shutdown_time = cur_time; } #if defined (FAILOVER_PROTOCOL) /* Set all failover peers into the shutdown state. */ if (shutdown_state == shutdown_dhcp) { for (state = failover_states; state; state = state -> next) { if (state -> me.state == normal) { dhcp_failover_set_state (state, shut_down); failover_connection_count++; } if (state -> me.state == shut_down && state -> partner.state != partner_down) failover_connection_count++; } } if (shutdown_state == shutdown_done) { for (state = failover_states; state; state = state -> next) { if (state -> me.state == shut_down) { if (state -> link_to_peer) dhcp_failover_link_dereference (&state -> link_to_peer, MDL); dhcp_failover_set_state (state, recover); } } #if defined (DEBUG_MEMORY_LEAKAGE) && \ defined (DEBUG_MEMORY_LEAKAGE_ON_EXIT) free_everything (); omapi_print_dmalloc_usage_by_caller (); #endif if (no_pid_file == ISC_FALSE) (void) unlink(path_dhcpd_pid); exit (0); } #else if (shutdown_state == shutdown_done) { #if defined (DEBUG_MEMORY_LEAKAGE) && \ defined (DEBUG_MEMORY_LEAKAGE_ON_EXIT) free_everything (); omapi_print_dmalloc_usage_by_caller (); #endif if (no_pid_file == ISC_FALSE) (void) unlink(path_dhcpd_pid); exit (0); } #endif if (shutdown_state == shutdown_dhcp && #if defined(FAILOVER_PROTOCOL) !failover_connection_count && #endif ISC_TRUE) { shutdown_state = shutdown_done; shutdown_time = cur_time; goto oncemore; } tv.tv_sec = cur_tv.tv_sec + 1; tv.tv_usec = cur_tv.tv_usec; add_timeout (&tv, (void (*)(void *))dhcp_io_shutdown_countdown, 0, 0, 0); return ISC_R_SUCCESS; } isc_result_t dhcp_set_control_state (control_object_state_t oldstate, control_object_state_t newstate) { struct timeval tv; if (newstate != server_shutdown) return DHCP_R_INVALIDARG; /* Re-entry. */ if (shutdown_signal == SIGUSR1) return ISC_R_SUCCESS; shutdown_time = cur_time; shutdown_state = shutdown_listeners; /* Called by user. */ if (shutdown_signal == 0) { shutdown_signal = SIGUSR1; dhcp_io_shutdown_countdown (0); return ISC_R_SUCCESS; } /* Called on signal. */ log_info("Received signal %d, initiating shutdown.", shutdown_signal); shutdown_signal = SIGUSR1; /* * Prompt the shutdown event onto the timer queue * and return to the dispatch loop. */ tv.tv_sec = cur_tv.tv_sec; tv.tv_usec = cur_tv.tv_usec + 1; add_timeout(&tv, (void (*)(void *))dhcp_io_shutdown_countdown, 0, 0, 0); return ISC_R_SUCCESS; }