]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/libsystemd-network/sd-radv.c
Merge pull request #18863 from keszybz/cmdline-escaping
[thirdparty/systemd.git] / src / libsystemd-network / sd-radv.c
CommitLineData
db9ecf05 1/* SPDX-License-Identifier: LGPL-2.1-or-later */
04473969 2/***
810adae9 3 Copyright © 2017 Intel Corporation. All rights reserved.
04473969
PF
4***/
5
6#include <netinet/icmp6.h>
7#include <netinet/in.h>
204f99d2 8#include <arpa/inet.h>
04473969
PF
9
10#include "sd-radv.h"
11
12#include "alloc-util.h"
e965d6ab 13#include "dns-domain.h"
ae25915d 14#include "ether-addr-util.h"
807a8ede 15#include "event-util.h"
04473969
PF
16#include "fd-util.h"
17#include "icmp6-util.h"
18#include "in-addr-util.h"
5cfa2c3d
LP
19#include "io-util.h"
20#include "macro.h"
0a970718 21#include "memory-util.h"
61a9fa8f 22#include "network-common.h"
04473969 23#include "radv-internal.h"
5cfa2c3d 24#include "random-util.h"
04473969
PF
25#include "socket-util.h"
26#include "string-util.h"
e965d6ab 27#include "strv.h"
04473969 28
204f99d2
PF
29_public_ int sd_radv_new(sd_radv **ret) {
30 _cleanup_(sd_radv_unrefp) sd_radv *ra = NULL;
31
32 assert_return(ret, -EINVAL);
33
78f9d24f 34 ra = new(sd_radv, 1);
204f99d2
PF
35 if (!ra)
36 return -ENOMEM;
37
78f9d24f
YW
38 *ra = (sd_radv) {
39 .n_ref = 1,
40 .fd = -1,
41 };
204f99d2 42
1cc6c93a 43 *ret = TAKE_PTR(ra);
204f99d2
PF
44
45 return 0;
46}
47
48_public_ int sd_radv_attach_event(sd_radv *ra, sd_event *event, int64_t priority) {
49 int r;
50
51 assert_return(ra, -EINVAL);
52 assert_return(!ra->event, -EBUSY);
53
54 if (event)
55 ra->event = sd_event_ref(event);
56 else {
57 r = sd_event_default(&ra->event);
58 if (r < 0)
59 return 0;
60 }
61
62 ra->event_priority = priority;
63
64 return 0;
65}
66
67_public_ int sd_radv_detach_event(sd_radv *ra) {
68
69 assert_return(ra, -EINVAL);
70
71 ra->event = sd_event_unref(ra->event);
72 return 0;
73}
74
75_public_ sd_event *sd_radv_get_event(sd_radv *ra) {
76 assert_return(ra, NULL);
77
78 return ra->event;
79}
80
96fe813c
YW
81_public_ int sd_radv_is_running(sd_radv *ra) {
82 assert_return(ra, false);
83
84 return ra->state != SD_RADV_STATE_IDLE;
85}
86
204fb681 87static void radv_reset(sd_radv *ra) {
c4b6dda0 88 assert(ra);
204fb681 89
807a8ede 90 (void) event_source_disable(ra->timeout_event_source);
204fb681 91
88d5a3db
PF
92 ra->recv_event_source =
93 sd_event_source_unref(ra->recv_event_source);
94
204fb681
PF
95 ra->ra_sent = 0;
96}
97
8301aa0b 98static sd_radv *radv_free(sd_radv *ra) {
e866e17b
LP
99 if (!ra)
100 return NULL;
204f99d2
PF
101
102 while (ra->prefixes) {
103 sd_radv_prefix *p = ra->prefixes;
104
105 LIST_REMOVE(prefix, ra->prefixes, p);
106 sd_radv_prefix_unref(p);
107 }
108
69d7eba1
YW
109 while (ra->route_prefixes) {
110 sd_radv_route_prefix *p = ra->route_prefixes;
111
112 LIST_REMOVE(prefix, ra->route_prefixes, p);
113 sd_radv_route_prefix_unref(p);
114 }
115
e9c6da38 116 free(ra->rdnss);
f9aa5417 117 free(ra->dnssl);
e9c6da38 118
807a8ede
YW
119 ra->timeout_event_source = sd_event_source_unref(ra->timeout_event_source);
120
204fb681
PF
121 radv_reset(ra);
122
204f99d2 123 sd_radv_detach_event(ra);
c4b6dda0
LP
124
125 ra->fd = safe_close(ra->fd);
61a9fa8f 126 free(ra->ifname);
c4b6dda0 127
204f99d2
PF
128 return mfree(ra);
129}
130
8301aa0b
YW
131DEFINE_PUBLIC_TRIVIAL_REF_UNREF_FUNC(sd_radv, sd_radv, radv_free);
132
83ef9d14 133static int radv_send(sd_radv *ra, const struct in6_addr *dst, uint32_t router_lifetime) {
203d4df5 134 sd_radv_route_prefix *rt;
77baf5ae
PF
135 sd_radv_prefix *p;
136 struct sockaddr_in6 dst_addr = {
137 .sin6_family = AF_INET6,
138 .sin6_addr = IN6ADDR_ALL_NODES_MULTICAST_INIT,
139 };
140 struct nd_router_advert adv = {};
141 struct {
142 struct nd_opt_hdr opthdr;
143 struct ether_addr slladdr;
144 } _packed_ opt_mac = {
145 .opthdr = {
146 .nd_opt_type = ND_OPT_SOURCE_LINKADDR,
147 .nd_opt_len = (sizeof(struct nd_opt_hdr) +
148 sizeof(struct ether_addr) - 1) /8 + 1,
149 },
150 };
151 struct nd_opt_mtu opt_mtu = {
152 .nd_opt_mtu_type = ND_OPT_MTU,
153 .nd_opt_mtu_len = 1,
154 };
203d4df5 155 /* Reserve iov space for RA header, linkaddr, MTU, N prefixes, N routes, RDNSS
6852c0f6 156 and DNSSL */
203d4df5 157 struct iovec iov[5 + ra->n_prefixes + ra->n_route_prefixes];
77baf5ae
PF
158 struct msghdr msg = {
159 .msg_name = &dst_addr,
160 .msg_namelen = sizeof(dst_addr),
161 .msg_iov = iov,
162 };
d601b566
PF
163 usec_t time_now;
164 int r;
165
dc0ec5e2
LP
166 assert(ra);
167
d601b566
PF
168 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
169 if (r < 0)
170 return r;
77baf5ae 171
94876904 172 if (dst && in6_addr_is_set(dst))
77baf5ae 173 dst_addr.sin6_addr = *dst;
88d5a3db 174
77baf5ae
PF
175 adv.nd_ra_type = ND_ROUTER_ADVERT;
176 adv.nd_ra_curhoplimit = ra->hop_limit;
177 adv.nd_ra_flags_reserved = ra->flags;
178 adv.nd_ra_router_lifetime = htobe16(router_lifetime);
5cfa2c3d 179 iov[msg.msg_iovlen++] = IOVEC_MAKE(&adv, sizeof(adv));
77baf5ae
PF
180
181 /* MAC address is optional, either because the link does not use L2
182 addresses or load sharing is desired. See RFC 4861, Section 4.2 */
ae25915d 183 if (!ether_addr_is_null(&ra->mac_addr)) {
77baf5ae 184 opt_mac.slladdr = ra->mac_addr;
5cfa2c3d 185 iov[msg.msg_iovlen++] = IOVEC_MAKE(&opt_mac, sizeof(opt_mac));
77baf5ae
PF
186 }
187
188 if (ra->mtu) {
189 opt_mtu.nd_opt_mtu_mtu = htobe32(ra->mtu);
5cfa2c3d 190 iov[msg.msg_iovlen++] = IOVEC_MAKE(&opt_mtu, sizeof(opt_mtu));
77baf5ae
PF
191 }
192
193 LIST_FOREACH(prefix, p, ra->prefixes) {
d601b566
PF
194 if (p->valid_until) {
195
196 if (time_now > p->valid_until)
197 p->opt.valid_lifetime = 0;
198 else
199 p->opt.valid_lifetime = htobe32((p->valid_until - time_now) / USEC_PER_SEC);
200
201 if (time_now > p->preferred_until)
202 p->opt.preferred_lifetime = 0;
203 else
204 p->opt.preferred_lifetime = htobe32((p->preferred_until - time_now) / USEC_PER_SEC);
205 }
5cfa2c3d 206 iov[msg.msg_iovlen++] = IOVEC_MAKE(&p->opt, sizeof(p->opt));
77baf5ae
PF
207 }
208
203d4df5
SS
209 LIST_FOREACH(prefix, rt, ra->route_prefixes)
210 iov[msg.msg_iovlen++] = IOVEC_MAKE(&rt->opt, sizeof(rt->opt));
211
5cfa2c3d
LP
212 if (ra->rdnss)
213 iov[msg.msg_iovlen++] = IOVEC_MAKE(ra->rdnss, ra->rdnss->length * 8);
e9c6da38 214
5cfa2c3d
LP
215 if (ra->dnssl)
216 iov[msg.msg_iovlen++] = IOVEC_MAKE(ra->dnssl, ra->dnssl->length * 8);
e965d6ab 217
77baf5ae
PF
218 if (sendmsg(ra->fd, &msg, 0) < 0)
219 return -errno;
204fb681 220
77baf5ae 221 return 0;
204fb681
PF
222}
223
88d5a3db
PF
224static int radv_recv(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
225 sd_radv *ra = userdata;
226 _cleanup_free_ char *addr = NULL;
227 struct in6_addr src;
228 triple_timestamp timestamp;
229 int r;
230 ssize_t buflen;
231 _cleanup_free_ char *buf = NULL;
232
233 assert(s);
234 assert(ra);
235 assert(ra->event);
236
237 buflen = next_datagram_size_fd(fd);
cfffddea
LP
238 if (buflen < 0)
239 return (int) buflen;
88d5a3db
PF
240
241 buf = new0(char, buflen);
242 if (!buf)
e55a6eae 243 return -ENOMEM;
88d5a3db
PF
244
245 r = icmp6_receive(fd, buf, buflen, &src, &timestamp);
246 if (r < 0) {
247 switch (r) {
248 case -EADDRNOTAVAIL:
c633628d 249 (void) in_addr_to_string(AF_INET6, (const union in_addr_union*) &src, &addr);
35388783 250 log_radv(ra, "Received RS from non-link-local address %s. Ignoring", addr);
88d5a3db
PF
251 break;
252
253 case -EMULTIHOP:
35388783 254 log_radv(ra, "Received RS with invalid hop limit. Ignoring.");
88d5a3db
PF
255 break;
256
257 case -EPFNOSUPPORT:
35388783 258 log_radv(ra, "Received invalid source address from ICMPv6 socket. Ignoring.");
88d5a3db
PF
259 break;
260
8eb41f4c
LP
261 case -EAGAIN: /* ignore spurious wakeups */
262 break;
263
88d5a3db 264 default:
35388783 265 log_radv_errno(ra, r, "Unexpected error receiving from ICMPv6 socket, Ignoring: %m");
88d5a3db
PF
266 break;
267 }
268
269 return 0;
270 }
271
cfffddea 272 if ((size_t) buflen < sizeof(struct nd_router_solicit)) {
35388783 273 log_radv(ra, "Too short packet received, ignoring");
cfffddea
LP
274 return 0;
275 }
276
c633628d 277 (void) in_addr_to_string(AF_INET6, (const union in_addr_union*) &src, &addr);
88d5a3db
PF
278
279 r = radv_send(ra, &src, ra->lifetime);
280 if (r < 0)
35388783 281 log_radv_errno(ra, r, "Unable to send solicited Router Advertisement to %s, ignoring: %m", strnull(addr));
88d5a3db 282 else
35388783 283 log_radv(ra, "Sent solicited Router Advertisement to %s", strnull(addr));
88d5a3db
PF
284
285 return 0;
286}
287
204fb681
PF
288static usec_t radv_compute_timeout(usec_t min, usec_t max) {
289 assert_return(min <= max, SD_RADV_DEFAULT_MIN_TIMEOUT_USEC);
290
ef90b6a4
GM
291 /* RFC 4861: min must be no less than 3s, max must be no less than 4s */
292 min = MAX(min, 3*USEC_PER_SEC);
293 max = MAX(max, 4*USEC_PER_SEC);
294
204fb681
PF
295 return min + (random_u32() % (max - min));
296}
297
298static int radv_timeout(sd_event_source *s, uint64_t usec, void *userdata) {
299 int r;
300 sd_radv *ra = userdata;
301 usec_t min_timeout = SD_RADV_DEFAULT_MIN_TIMEOUT_USEC;
302 usec_t max_timeout = SD_RADV_DEFAULT_MAX_TIMEOUT_USEC;
303 usec_t time_now, timeout;
304 char time_string[FORMAT_TIMESPAN_MAX];
305
306 assert(s);
307 assert(ra);
308 assert(ra->event);
309
204fb681
PF
310 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
311 if (r < 0)
312 goto fail;
313
314 r = radv_send(ra, NULL, ra->lifetime);
315 if (r < 0)
35388783 316 log_radv_errno(ra, r, "Unable to send Router Advertisement: %m");
204fb681
PF
317
318 /* RFC 4861, Section 6.2.4, sending initial Router Advertisements */
319 if (ra->ra_sent < SD_RADV_MAX_INITIAL_RTR_ADVERTISEMENTS) {
320 max_timeout = SD_RADV_MAX_INITIAL_RTR_ADVERT_INTERVAL_USEC;
321 min_timeout = SD_RADV_MAX_INITIAL_RTR_ADVERT_INTERVAL_USEC / 3;
322 }
323
ef90b6a4
GM
324 /* RFC 4861, Section 6.2.1, lifetime must be at least MaxRtrAdvInterval,
325 so lower the interval here */
326 if (ra->lifetime > 0 && (ra->lifetime * USEC_PER_SEC) < max_timeout) {
327 max_timeout = ra->lifetime * USEC_PER_SEC;
328 min_timeout = max_timeout / 3;
329 }
330
204fb681
PF
331 timeout = radv_compute_timeout(min_timeout, max_timeout);
332
35388783 333 log_radv(ra, "Next Router Advertisement in %s",
204fb681
PF
334 format_timespan(time_string, FORMAT_TIMESPAN_MAX,
335 timeout, USEC_PER_SEC));
336
807a8ede
YW
337 r = event_reset_time(ra->event, &ra->timeout_event_source,
338 clock_boottime_or_monotonic(),
339 time_now + timeout, MSEC_PER_SEC,
340 radv_timeout, ra,
341 ra->event_priority, "radv-timeout", true);
204fb681
PF
342 if (r < 0)
343 goto fail;
344
345 ra->ra_sent++;
346
807a8ede
YW
347 return 0;
348
204fb681 349fail:
290696e5 350 sd_radv_stop(ra);
204fb681
PF
351
352 return 0;
353}
354
290696e5 355_public_ int sd_radv_stop(sd_radv *ra) {
204fb681
PF
356 int r;
357
c8bae363
YW
358 if (!ra)
359 return 0;
204f99d2 360
6f8a8b84
SS
361 if (ra->state == SD_RADV_STATE_IDLE)
362 return 0;
363
35388783 364 log_radv(ra, "Stopping IPv6 Router Advertisement daemon");
204f99d2 365
290696e5
YW
366 /* RFC 4861, Section 6.2.5, send at least one Router Advertisement
367 with zero lifetime */
368 r = radv_send(ra, NULL, 0);
369 if (r < 0)
35388783 370 log_radv_errno(ra, r, "Unable to send last Router Advertisement with router lifetime set to zero: %m");
204fb681
PF
371
372 radv_reset(ra);
77baf5ae 373 ra->fd = safe_close(ra->fd);
204f99d2
PF
374 ra->state = SD_RADV_STATE_IDLE;
375
376 return 0;
377}
378
379_public_ int sd_radv_start(sd_radv *ra) {
f474884c 380 int r;
204fb681 381
204f99d2
PF
382 assert_return(ra, -EINVAL);
383 assert_return(ra->event, -EINVAL);
384 assert_return(ra->ifindex > 0, -EINVAL);
385
386 if (ra->state != SD_RADV_STATE_IDLE)
387 return 0;
388
807a8ede
YW
389 r = event_reset_time(ra->event, &ra->timeout_event_source,
390 clock_boottime_or_monotonic(),
391 0, 0,
392 radv_timeout, ra,
393 ra->event_priority, "radv-timeout", true);
204fb681
PF
394 if (r < 0)
395 goto fail;
396
77baf5ae
PF
397 r = icmp6_bind_router_advertisement(ra->ifindex);
398 if (r < 0)
399 goto fail;
400
401 ra->fd = r;
88d5a3db
PF
402
403 r = sd_event_add_io(ra->event, &ra->recv_event_source, ra->fd, EPOLLIN, radv_recv, ra);
404 if (r < 0)
405 goto fail;
406
407 r = sd_event_source_set_priority(ra->recv_event_source, ra->event_priority);
408 if (r < 0)
409 goto fail;
410
411 (void) sd_event_source_set_description(ra->recv_event_source, "radv-receive-message");
77baf5ae 412
204f99d2
PF
413 ra->state = SD_RADV_STATE_ADVERTISING;
414
35388783 415 log_radv(ra, "Started IPv6 Router Advertisement daemon");
204f99d2
PF
416
417 return 0;
204fb681
PF
418
419 fail:
420 radv_reset(ra);
421
422 return r;
204f99d2
PF
423}
424
425_public_ int sd_radv_set_ifindex(sd_radv *ra, int ifindex) {
426 assert_return(ra, -EINVAL);
7fa69c0a 427 assert_return(ifindex > 0, -EINVAL);
204f99d2
PF
428
429 if (ra->state != SD_RADV_STATE_IDLE)
430 return -EBUSY;
431
432 ra->ifindex = ifindex;
433
434 return 0;
435}
436
61a9fa8f
YW
437int sd_radv_set_ifname(sd_radv *ra, const char *ifname) {
438 assert_return(ra, -EINVAL);
439 assert_return(ifname, -EINVAL);
440
441 if (!ifname_valid_full(ifname, IFNAME_VALID_ALTERNATIVE))
442 return -EINVAL;
443
444 return free_and_strdup(&ra->ifname, ifname);
445}
446
447const char *sd_radv_get_ifname(sd_radv *ra) {
448 if (!ra)
449 return NULL;
450
451 return get_ifname(ra->ifindex, &ra->ifname);
452}
453
204f99d2
PF
454_public_ int sd_radv_set_mac(sd_radv *ra, const struct ether_addr *mac_addr) {
455 assert_return(ra, -EINVAL);
456
457 if (ra->state != SD_RADV_STATE_IDLE)
458 return -EBUSY;
459
460 if (mac_addr)
461 ra->mac_addr = *mac_addr;
462 else
463 zero(ra->mac_addr);
464
465 return 0;
466}
467
468_public_ int sd_radv_set_mtu(sd_radv *ra, uint32_t mtu) {
469 assert_return(ra, -EINVAL);
470 assert_return(mtu >= 1280, -EINVAL);
471
204f99d2
PF
472 ra->mtu = mtu;
473
474 return 0;
475}
476
477_public_ int sd_radv_set_hop_limit(sd_radv *ra, uint8_t hop_limit) {
478 assert_return(ra, -EINVAL);
479
480 if (ra->state != SD_RADV_STATE_IDLE)
481 return -EBUSY;
482
483 ra->hop_limit = hop_limit;
484
485 return 0;
486}
487
ac138551 488_public_ int sd_radv_set_router_lifetime(sd_radv *ra, uint16_t router_lifetime) {
204f99d2
PF
489 assert_return(ra, -EINVAL);
490
491 if (ra->state != SD_RADV_STATE_IDLE)
492 return -EBUSY;
493
ac138551
YW
494 /* RFC 4191, Section 2.2, "...If the Router Lifetime is zero, the preference value MUST be set
495 * to (00) by the sender..." */
204f99d2
PF
496 if (router_lifetime == 0 &&
497 (ra->flags & (0x3 << 3)) != (SD_NDISC_PREFERENCE_MEDIUM << 3))
498 return -ETIME;
499
500 ra->lifetime = router_lifetime;
501
502 return 0;
503}
504
505_public_ int sd_radv_set_managed_information(sd_radv *ra, int managed) {
506 assert_return(ra, -EINVAL);
507
508 if (ra->state != SD_RADV_STATE_IDLE)
509 return -EBUSY;
510
511 SET_FLAG(ra->flags, ND_RA_FLAG_MANAGED, managed);
512
513 return 0;
514}
515
516_public_ int sd_radv_set_other_information(sd_radv *ra, int other) {
517 assert_return(ra, -EINVAL);
518
519 if (ra->state != SD_RADV_STATE_IDLE)
520 return -EBUSY;
521
522 SET_FLAG(ra->flags, ND_RA_FLAG_OTHER, other);
523
524 return 0;
525}
526
527_public_ int sd_radv_set_preference(sd_radv *ra, unsigned preference) {
204f99d2
PF
528 assert_return(ra, -EINVAL);
529 assert_return(IN_SET(preference,
530 SD_NDISC_PREFERENCE_LOW,
531 SD_NDISC_PREFERENCE_MEDIUM,
532 SD_NDISC_PREFERENCE_HIGH), -EINVAL);
533
dd1b1870
YW
534 /* RFC 4191, Section 2.2, "...If the Router Lifetime is zero, the preference value MUST be set
535 * to (00) by the sender..." */
536 if (ra->lifetime == 0 && preference != SD_NDISC_PREFERENCE_MEDIUM)
537 return -EINVAL;
538
204f99d2
PF
539 ra->flags = (ra->flags & ~(0x3 << 3)) | (preference << 3);
540
dd1b1870 541 return 0;
204f99d2
PF
542}
543
a3a98776 544_public_ int sd_radv_add_prefix(sd_radv *ra, sd_radv_prefix *p, int dynamic) {
204f99d2 545 sd_radv_prefix *cur;
d601b566 546 int r;
204f99d2 547 _cleanup_free_ char *addr_p = NULL;
d601b566
PF
548 char time_string_preferred[FORMAT_TIMESPAN_MAX];
549 char time_string_valid[FORMAT_TIMESPAN_MAX];
550 usec_t time_now, valid, preferred, valid_until, preferred_until;
204f99d2
PF
551
552 assert_return(ra, -EINVAL);
553
554 if (!p)
555 return -EINVAL;
556
59ea6e57 557 /* Refuse prefixes that don't have a prefix set */
94876904 558 if (in6_addr_is_null(&p->opt.in6_addr))
59ea6e57
LP
559 return -ENOEXEC;
560
5380707a 561 (void) in_addr_prefix_to_string(AF_INET6,
c633628d 562 (const union in_addr_union*) &p->opt.in6_addr,
5380707a
YW
563 p->opt.prefixlen, &addr_p);
564
204f99d2 565 LIST_FOREACH(prefix, cur, ra->prefixes) {
204f99d2
PF
566
567 r = in_addr_prefix_intersect(AF_INET6,
c633628d 568 (const union in_addr_union*) &cur->opt.in6_addr,
204f99d2 569 cur->opt.prefixlen,
c633628d 570 (const union in_addr_union*) &p->opt.in6_addr,
204f99d2 571 p->opt.prefixlen);
5380707a
YW
572 if (r < 0)
573 return r;
574 if (r == 0)
575 continue;
204f99d2 576
5380707a
YW
577 if (dynamic && cur->opt.prefixlen == p->opt.prefixlen)
578 goto update;
d601b566 579
5380707a
YW
580 _cleanup_free_ char *addr_cur = NULL;
581 (void) in_addr_prefix_to_string(AF_INET6,
c633628d 582 (const union in_addr_union*) &cur->opt.in6_addr,
5380707a 583 cur->opt.prefixlen, &addr_cur);
35388783
YW
584 return log_radv_errno(ra, SYNTHETIC_ERRNO(EEXIST),
585 "IPv6 prefix %s already configured, ignoring %s",
586 strna(addr_cur), strna(addr_p));
204f99d2
PF
587 }
588
589 p = sd_radv_prefix_ref(p);
590
591 LIST_APPEND(prefix, ra->prefixes, p);
592
593 ra->n_prefixes++;
594
d601b566 595 if (!dynamic) {
35388783 596 log_radv(ra, "Added prefix %s", strna(addr_p));
d601b566
PF
597 return 0;
598 }
599
600 cur = p;
601
97efde65
MM
602 /* If RAs have already been sent, send an RA immediately to announce the newly-added prefix */
603 if (ra->ra_sent > 0) {
6333aa9d
LP
604 r = radv_send(ra, NULL, ra->lifetime);
605 if (r < 0)
35388783 606 log_radv_errno(ra, r, "Unable to send Router Advertisement for added prefix: %m");
6333aa9d 607 else
35388783 608 log_radv(ra, "Sent Router Advertisement for added prefix");
97efde65
MM
609 }
610
d601b566
PF
611 update:
612 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
613 if (r < 0)
614 return r;
615
616 valid = be32toh(p->opt.valid_lifetime) * USEC_PER_SEC;
617 valid_until = usec_add(valid, time_now);
618 if (valid_until == USEC_INFINITY)
619 return -EOVERFLOW;
620
621 preferred = be32toh(p->opt.preferred_lifetime) * USEC_PER_SEC;
622 preferred_until = usec_add(preferred, time_now);
623 if (preferred_until == USEC_INFINITY)
624 return -EOVERFLOW;
625
626 cur->valid_until = valid_until;
627 cur->preferred_until = preferred_until;
628
35388783 629 log_radv(ra, "Updated prefix %s preferred %s valid %s",
5380707a 630 strna(addr_p),
d601b566
PF
631 format_timespan(time_string_preferred, FORMAT_TIMESPAN_MAX,
632 preferred, USEC_PER_SEC),
633 format_timespan(time_string_valid, FORMAT_TIMESPAN_MAX,
634 valid, USEC_PER_SEC));
204f99d2
PF
635
636 return 0;
637}
638
34c169c4 639_public_ sd_radv_prefix *sd_radv_remove_prefix(sd_radv *ra,
f5a5706a
LP
640 const struct in6_addr *prefix,
641 unsigned char prefixlen) {
34c169c4
PF
642 sd_radv_prefix *cur, *next;
643
644 assert_return(ra, NULL);
645 assert_return(prefix, NULL);
646
647 LIST_FOREACH_SAFE(prefix, cur, next, ra->prefixes) {
648 if (prefixlen != cur->opt.prefixlen)
649 continue;
650
94876904 651 if (!in6_addr_equal(prefix, &cur->opt.in6_addr))
34c169c4
PF
652 continue;
653
654 LIST_REMOVE(prefix, ra->prefixes, cur);
655 ra->n_prefixes--;
62bbbedf 656 sd_radv_prefix_unref(cur);
34c169c4
PF
657
658 break;
659 }
660
661 return cur;
662}
663
203d4df5
SS
664_public_ int sd_radv_add_route_prefix(sd_radv *ra, sd_radv_route_prefix *p, int dynamic) {
665 char time_string_valid[FORMAT_TIMESPAN_MAX];
666 usec_t time_now, valid, valid_until;
667 _cleanup_free_ char *pretty = NULL;
668 sd_radv_route_prefix *cur;
669 int r;
670
671 assert_return(ra, -EINVAL);
672
673 if (!p)
674 return -EINVAL;
675
5380707a 676 (void) in_addr_prefix_to_string(AF_INET6,
c633628d 677 (const union in_addr_union*) &p->opt.in6_addr,
5380707a 678 p->opt.prefixlen, &pretty);
203d4df5
SS
679
680 LIST_FOREACH(prefix, cur, ra->route_prefixes) {
203d4df5
SS
681
682 r = in_addr_prefix_intersect(AF_INET6,
c633628d 683 (const union in_addr_union*) &cur->opt.in6_addr,
203d4df5 684 cur->opt.prefixlen,
c633628d 685 (const union in_addr_union*) &p->opt.in6_addr,
203d4df5
SS
686 p->opt.prefixlen);
687 if (r < 0)
688 return r;
689 if (r == 0)
690 continue;
691
692 if (dynamic && cur->opt.prefixlen == p->opt.prefixlen)
693 goto update;
694
5380707a
YW
695 _cleanup_free_ char *addr = NULL;
696 (void) in_addr_prefix_to_string(AF_INET6,
c633628d 697 (const union in_addr_union*) &cur->opt.in6_addr,
5380707a 698 cur->opt.prefixlen, &addr);
35388783
YW
699 return log_radv_errno(ra, SYNTHETIC_ERRNO(EEXIST),
700 "IPv6 route prefix %s already configured, ignoring %s",
701 strna(addr), strna(pretty));
203d4df5
SS
702 }
703
704 p = sd_radv_route_prefix_ref(p);
705
706 LIST_APPEND(prefix, ra->route_prefixes, p);
707 ra->n_route_prefixes++;
708
203d4df5 709 if (!dynamic) {
35388783 710 log_radv(ra, "Added prefix %s", strna(pretty));
203d4df5
SS
711 return 0;
712 }
713
97efde65
MM
714 /* If RAs have already been sent, send an RA immediately to announce the newly-added route prefix */
715 if (ra->ra_sent > 0) {
6333aa9d
LP
716 r = radv_send(ra, NULL, ra->lifetime);
717 if (r < 0)
35388783 718 log_radv_errno(ra, r, "Unable to send Router Advertisement for added route prefix: %m");
6333aa9d 719 else
35388783 720 log_radv(ra, "Sent Router Advertisement for added route prefix");
97efde65
MM
721 }
722
203d4df5
SS
723 update:
724 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
725 if (r < 0)
726 return r;
727
728 valid = be32toh(p->opt.lifetime) * USEC_PER_SEC;
729 valid_until = usec_add(valid, time_now);
730 if (valid_until == USEC_INFINITY)
731 return -EOVERFLOW;
732
35388783 733 log_radv(ra, "Updated route prefix %s valid %s",
5380707a 734 strna(pretty),
203d4df5
SS
735 format_timespan(time_string_valid, FORMAT_TIMESPAN_MAX, valid, USEC_PER_SEC));
736
737 return 0;
738}
739
e9c6da38
PF
740_public_ int sd_radv_set_rdnss(sd_radv *ra, uint32_t lifetime,
741 const struct in6_addr *dns, size_t n_dns) {
742 _cleanup_free_ struct sd_radv_opt_dns *opt_rdnss = NULL;
743 size_t len;
744
745 assert_return(ra, -EINVAL);
746 assert_return(n_dns < 128, -EINVAL);
747
748 if (!dns || n_dns == 0) {
749 ra->rdnss = mfree(ra->rdnss);
750 ra->n_rdnss = 0;
751
752 return 0;
753 }
754
755 len = sizeof(struct sd_radv_opt_dns) + sizeof(struct in6_addr) * n_dns;
756
757 opt_rdnss = malloc0(len);
758 if (!opt_rdnss)
759 return -ENOMEM;
760
761 opt_rdnss->type = SD_RADV_OPT_RDNSS;
762 opt_rdnss->length = len / 8;
763 opt_rdnss->lifetime = htobe32(lifetime);
764
765 memcpy(opt_rdnss + 1, dns, n_dns * sizeof(struct in6_addr));
766
1cc6c93a 767 free_and_replace(ra->rdnss, opt_rdnss);
e9c6da38
PF
768
769 ra->n_rdnss = n_dns;
770
771 return 0;
772}
773
e965d6ab
PF
774_public_ int sd_radv_set_dnssl(sd_radv *ra, uint32_t lifetime,
775 char **search_list) {
776 _cleanup_free_ struct sd_radv_opt_dns *opt_dnssl = NULL;
777 size_t len = 0;
778 char **s;
779 uint8_t *p;
780
781 assert_return(ra, -EINVAL);
782
97d7974b 783 if (strv_isempty(search_list)) {
e965d6ab 784 ra->dnssl = mfree(ra->dnssl);
e965d6ab
PF
785 return 0;
786 }
787
788 STRV_FOREACH(s, search_list)
789 len += strlen(*s) + 2;
790
791 len = (sizeof(struct sd_radv_opt_dns) + len + 7) & ~0x7;
792
793 opt_dnssl = malloc0(len);
794 if (!opt_dnssl)
795 return -ENOMEM;
796
797 opt_dnssl->type = SD_RADV_OPT_DNSSL;
798 opt_dnssl->length = len / 8;
799 opt_dnssl->lifetime = htobe32(lifetime);
800
801 p = (uint8_t *)(opt_dnssl + 1);
802 len -= sizeof(struct sd_radv_opt_dns);
803
804 STRV_FOREACH(s, search_list) {
805 int r;
806
807 r = dns_name_to_wire_format(*s, p, len, false);
808 if (r < 0)
809 return r;
810
811 if (len < (size_t)r)
812 return -ENOBUFS;
813
814 p += r;
815 len -= r;
816 }
817
1cc6c93a 818 free_and_replace(ra->dnssl, opt_dnssl);
e965d6ab
PF
819
820 return 0;
821}
822
04473969 823_public_ int sd_radv_prefix_new(sd_radv_prefix **ret) {
d2c8eed2 824 sd_radv_prefix *p;
04473969
PF
825
826 assert_return(ret, -EINVAL);
827
d2c8eed2 828 p = new(sd_radv_prefix, 1);
04473969
PF
829 if (!p)
830 return -ENOMEM;
831
d2c8eed2
LP
832 *p = (sd_radv_prefix) {
833 .n_ref = 1,
04473969 834
d2c8eed2
LP
835 .opt.type = ND_OPT_PREFIX_INFORMATION,
836 .opt.length = (sizeof(p->opt) - 1)/8 + 1,
837 .opt.prefixlen = 64,
04473969 838
d2c8eed2
LP
839 /* RFC 4861, Section 6.2.1 */
840 .opt.flags = ND_OPT_PI_FLAG_ONLINK|ND_OPT_PI_FLAG_AUTO,
204f99d2 841
d2c8eed2
LP
842 .opt.preferred_lifetime = htobe32(604800),
843 .opt.valid_lifetime = htobe32(2592000),
844 };
04473969 845
d2c8eed2 846 *ret = p;
04473969
PF
847 return 0;
848}
849
8301aa0b 850DEFINE_PUBLIC_TRIVIAL_REF_UNREF_FUNC(sd_radv_prefix, sd_radv_prefix, mfree);
04473969 851
f5a5706a 852_public_ int sd_radv_prefix_set_prefix(sd_radv_prefix *p, const struct in6_addr *in6_addr,
04473969
PF
853 unsigned char prefixlen) {
854 assert_return(p, -EINVAL);
855 assert_return(in6_addr, -EINVAL);
856
857 if (prefixlen < 3 || prefixlen > 128)
858 return -EINVAL;
859
860 if (prefixlen > 64)
861 /* unusual but allowed, log it */
35388783 862 log_radv(NULL, "Unusual prefix length %d greater than 64", prefixlen);
04473969
PF
863
864 p->opt.in6_addr = *in6_addr;
865 p->opt.prefixlen = prefixlen;
866
867 return 0;
868}
869
34332af2
SS
870_public_ int sd_radv_prefix_get_prefix(sd_radv_prefix *p, struct in6_addr *ret_in6_addr,
871 unsigned char *ret_prefixlen) {
872 assert_return(p, -EINVAL);
873 assert_return(ret_in6_addr, -EINVAL);
874 assert_return(ret_prefixlen, -EINVAL);
875
876 *ret_in6_addr = p->opt.in6_addr;
877 *ret_prefixlen = p->opt.prefixlen;
878
879 return 0;
880}
881
04473969
PF
882_public_ int sd_radv_prefix_set_onlink(sd_radv_prefix *p, int onlink) {
883 assert_return(p, -EINVAL);
884
885 SET_FLAG(p->opt.flags, ND_OPT_PI_FLAG_ONLINK, onlink);
886
887 return 0;
888}
889
890_public_ int sd_radv_prefix_set_address_autoconfiguration(sd_radv_prefix *p,
891 int address_autoconfiguration) {
892 assert_return(p, -EINVAL);
893
894 SET_FLAG(p->opt.flags, ND_OPT_PI_FLAG_AUTO, address_autoconfiguration);
895
896 return 0;
897}
898
899_public_ int sd_radv_prefix_set_valid_lifetime(sd_radv_prefix *p,
900 uint32_t valid_lifetime) {
901 assert_return(p, -EINVAL);
902
903 p->opt.valid_lifetime = htobe32(valid_lifetime);
904
905 return 0;
906}
907
908_public_ int sd_radv_prefix_set_preferred_lifetime(sd_radv_prefix *p,
909 uint32_t preferred_lifetime) {
910 assert_return(p, -EINVAL);
911
912 p->opt.preferred_lifetime = htobe32(preferred_lifetime);
913
914 return 0;
915}
203d4df5
SS
916
917_public_ int sd_radv_route_prefix_new(sd_radv_route_prefix **ret) {
918 sd_radv_route_prefix *p;
919
920 assert_return(ret, -EINVAL);
921
922 p = new(sd_radv_route_prefix, 1);
923 if (!p)
924 return -ENOMEM;
925
926 *p = (sd_radv_route_prefix) {
927 .n_ref = 1,
928
929 .opt.type = SD_RADV_OPT_ROUTE_INFORMATION,
930 .opt.length = DIV_ROUND_UP(sizeof(p->opt), 8),
931 .opt.prefixlen = 64,
932
933 .opt.lifetime = htobe32(604800),
934 };
935
936 *ret = p;
937 return 0;
938}
939
940DEFINE_PUBLIC_TRIVIAL_REF_UNREF_FUNC(sd_radv_route_prefix, sd_radv_route_prefix, mfree);
941
942_public_ int sd_radv_prefix_set_route_prefix(sd_radv_route_prefix *p, const struct in6_addr *in6_addr,
943 unsigned char prefixlen) {
944 assert_return(p, -EINVAL);
945 assert_return(in6_addr, -EINVAL);
946
947 if (prefixlen > 128)
948 return -EINVAL;
949
950 if (prefixlen > 64)
951 /* unusual but allowed, log it */
35388783 952 log_radv(NULL, "Unusual prefix length %u greater than 64", prefixlen);
203d4df5
SS
953
954 p->opt.in6_addr = *in6_addr;
955 p->opt.prefixlen = prefixlen;
956
957 return 0;
958}
959
960_public_ int sd_radv_route_prefix_set_lifetime(sd_radv_route_prefix *p, uint32_t valid_lifetime) {
961 assert_return(p, -EINVAL);
962
963 p->opt.lifetime = htobe32(valid_lifetime);
964
965 return 0;
966}