]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/libsystemd-network/sd-radv.c
sd-radv: make sd_radv_set_router_lifetime() take usec_t (uint64_t)
[thirdparty/systemd.git] / src / libsystemd-network / sd-radv.c
CommitLineData
db9ecf05 1/* SPDX-License-Identifier: LGPL-2.1-or-later */
04473969 2/***
810adae9 3 Copyright © 2017 Intel Corporation. All rights reserved.
04473969
PF
4***/
5
6#include <netinet/icmp6.h>
7#include <netinet/in.h>
204f99d2 8#include <arpa/inet.h>
04473969
PF
9
10#include "sd-radv.h"
11
12#include "alloc-util.h"
e965d6ab 13#include "dns-domain.h"
ae25915d 14#include "ether-addr-util.h"
807a8ede 15#include "event-util.h"
04473969
PF
16#include "fd-util.h"
17#include "icmp6-util.h"
18#include "in-addr-util.h"
5cfa2c3d
LP
19#include "io-util.h"
20#include "macro.h"
0a970718 21#include "memory-util.h"
61a9fa8f 22#include "network-common.h"
04473969 23#include "radv-internal.h"
5cfa2c3d 24#include "random-util.h"
04473969
PF
25#include "socket-util.h"
26#include "string-util.h"
e965d6ab 27#include "strv.h"
04473969 28
204f99d2
PF
29_public_ int sd_radv_new(sd_radv **ret) {
30 _cleanup_(sd_radv_unrefp) sd_radv *ra = NULL;
31
32 assert_return(ret, -EINVAL);
33
78f9d24f 34 ra = new(sd_radv, 1);
204f99d2
PF
35 if (!ra)
36 return -ENOMEM;
37
78f9d24f
YW
38 *ra = (sd_radv) {
39 .n_ref = 1,
40 .fd = -1,
41 };
204f99d2 42
1cc6c93a 43 *ret = TAKE_PTR(ra);
204f99d2
PF
44
45 return 0;
46}
47
48_public_ int sd_radv_attach_event(sd_radv *ra, sd_event *event, int64_t priority) {
49 int r;
50
51 assert_return(ra, -EINVAL);
52 assert_return(!ra->event, -EBUSY);
53
54 if (event)
55 ra->event = sd_event_ref(event);
56 else {
57 r = sd_event_default(&ra->event);
58 if (r < 0)
59 return 0;
60 }
61
62 ra->event_priority = priority;
63
64 return 0;
65}
66
67_public_ int sd_radv_detach_event(sd_radv *ra) {
68
69 assert_return(ra, -EINVAL);
70
71 ra->event = sd_event_unref(ra->event);
72 return 0;
73}
74
75_public_ sd_event *sd_radv_get_event(sd_radv *ra) {
76 assert_return(ra, NULL);
77
78 return ra->event;
79}
80
96fe813c
YW
81_public_ int sd_radv_is_running(sd_radv *ra) {
82 assert_return(ra, false);
83
84 return ra->state != SD_RADV_STATE_IDLE;
85}
86
204fb681 87static void radv_reset(sd_radv *ra) {
c4b6dda0 88 assert(ra);
204fb681 89
807a8ede 90 (void) event_source_disable(ra->timeout_event_source);
204fb681 91
eb2f7502 92 ra->recv_event_source = sd_event_source_disable_unref(ra->recv_event_source);
88d5a3db 93
204fb681
PF
94 ra->ra_sent = 0;
95}
96
8301aa0b 97static sd_radv *radv_free(sd_radv *ra) {
e866e17b
LP
98 if (!ra)
99 return NULL;
204f99d2
PF
100
101 while (ra->prefixes) {
102 sd_radv_prefix *p = ra->prefixes;
103
104 LIST_REMOVE(prefix, ra->prefixes, p);
105 sd_radv_prefix_unref(p);
106 }
107
69d7eba1
YW
108 while (ra->route_prefixes) {
109 sd_radv_route_prefix *p = ra->route_prefixes;
110
111 LIST_REMOVE(prefix, ra->route_prefixes, p);
112 sd_radv_route_prefix_unref(p);
113 }
114
e9c6da38 115 free(ra->rdnss);
f9aa5417 116 free(ra->dnssl);
e9c6da38 117
204fb681
PF
118 radv_reset(ra);
119
eb2f7502 120 sd_event_source_unref(ra->timeout_event_source);
204f99d2 121 sd_radv_detach_event(ra);
c4b6dda0
LP
122
123 ra->fd = safe_close(ra->fd);
61a9fa8f 124 free(ra->ifname);
c4b6dda0 125
204f99d2
PF
126 return mfree(ra);
127}
128
8301aa0b
YW
129DEFINE_PUBLIC_TRIVIAL_REF_UNREF_FUNC(sd_radv, sd_radv, radv_free);
130
7003b114 131static int radv_send(sd_radv *ra, const struct in6_addr *dst, usec_t lifetime_usec) {
203d4df5 132 sd_radv_route_prefix *rt;
77baf5ae
PF
133 sd_radv_prefix *p;
134 struct sockaddr_in6 dst_addr = {
135 .sin6_family = AF_INET6,
136 .sin6_addr = IN6ADDR_ALL_NODES_MULTICAST_INIT,
137 };
138 struct nd_router_advert adv = {};
139 struct {
140 struct nd_opt_hdr opthdr;
141 struct ether_addr slladdr;
142 } _packed_ opt_mac = {
143 .opthdr = {
144 .nd_opt_type = ND_OPT_SOURCE_LINKADDR,
145 .nd_opt_len = (sizeof(struct nd_opt_hdr) +
146 sizeof(struct ether_addr) - 1) /8 + 1,
147 },
148 };
149 struct nd_opt_mtu opt_mtu = {
150 .nd_opt_mtu_type = ND_OPT_MTU,
151 .nd_opt_mtu_len = 1,
152 };
203d4df5 153 /* Reserve iov space for RA header, linkaddr, MTU, N prefixes, N routes, RDNSS
6852c0f6 154 and DNSSL */
203d4df5 155 struct iovec iov[5 + ra->n_prefixes + ra->n_route_prefixes];
77baf5ae
PF
156 struct msghdr msg = {
157 .msg_name = &dst_addr,
158 .msg_namelen = sizeof(dst_addr),
159 .msg_iov = iov,
160 };
7003b114 161 uint16_t lifetime_sec;
d601b566
PF
162 usec_t time_now;
163 int r;
164
dc0ec5e2
LP
165 assert(ra);
166
d601b566
PF
167 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
168 if (r < 0)
169 return r;
77baf5ae 170
7003b114
YW
171 /* a value of UINT16_MAX represents infinity, 0x0 means this host is not a router */
172 if (lifetime_usec == USEC_INFINITY)
173 lifetime_sec = UINT16_MAX;
174 else if (lifetime_usec > (UINT16_MAX - 1) * USEC_PER_SEC)
175 lifetime_sec = UINT16_MAX - 1;
176 else
177 lifetime_sec = DIV_ROUND_UP(lifetime_usec, USEC_PER_SEC);
178
94876904 179 if (dst && in6_addr_is_set(dst))
77baf5ae 180 dst_addr.sin6_addr = *dst;
88d5a3db 181
77baf5ae
PF
182 adv.nd_ra_type = ND_ROUTER_ADVERT;
183 adv.nd_ra_curhoplimit = ra->hop_limit;
184 adv.nd_ra_flags_reserved = ra->flags;
7003b114 185 adv.nd_ra_router_lifetime = htobe16(lifetime_sec);
5cfa2c3d 186 iov[msg.msg_iovlen++] = IOVEC_MAKE(&adv, sizeof(adv));
77baf5ae
PF
187
188 /* MAC address is optional, either because the link does not use L2
189 addresses or load sharing is desired. See RFC 4861, Section 4.2 */
ae25915d 190 if (!ether_addr_is_null(&ra->mac_addr)) {
77baf5ae 191 opt_mac.slladdr = ra->mac_addr;
5cfa2c3d 192 iov[msg.msg_iovlen++] = IOVEC_MAKE(&opt_mac, sizeof(opt_mac));
77baf5ae
PF
193 }
194
195 if (ra->mtu) {
196 opt_mtu.nd_opt_mtu_mtu = htobe32(ra->mtu);
5cfa2c3d 197 iov[msg.msg_iovlen++] = IOVEC_MAKE(&opt_mtu, sizeof(opt_mtu));
77baf5ae
PF
198 }
199
200 LIST_FOREACH(prefix, p, ra->prefixes) {
d601b566
PF
201 if (p->valid_until) {
202
203 if (time_now > p->valid_until)
204 p->opt.valid_lifetime = 0;
205 else
206 p->opt.valid_lifetime = htobe32((p->valid_until - time_now) / USEC_PER_SEC);
207
208 if (time_now > p->preferred_until)
209 p->opt.preferred_lifetime = 0;
210 else
211 p->opt.preferred_lifetime = htobe32((p->preferred_until - time_now) / USEC_PER_SEC);
212 }
5cfa2c3d 213 iov[msg.msg_iovlen++] = IOVEC_MAKE(&p->opt, sizeof(p->opt));
77baf5ae
PF
214 }
215
203d4df5
SS
216 LIST_FOREACH(prefix, rt, ra->route_prefixes)
217 iov[msg.msg_iovlen++] = IOVEC_MAKE(&rt->opt, sizeof(rt->opt));
218
5cfa2c3d
LP
219 if (ra->rdnss)
220 iov[msg.msg_iovlen++] = IOVEC_MAKE(ra->rdnss, ra->rdnss->length * 8);
e9c6da38 221
5cfa2c3d
LP
222 if (ra->dnssl)
223 iov[msg.msg_iovlen++] = IOVEC_MAKE(ra->dnssl, ra->dnssl->length * 8);
e965d6ab 224
77baf5ae
PF
225 if (sendmsg(ra->fd, &msg, 0) < 0)
226 return -errno;
204fb681 227
77baf5ae 228 return 0;
204fb681
PF
229}
230
88d5a3db
PF
231static int radv_recv(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
232 sd_radv *ra = userdata;
233 _cleanup_free_ char *addr = NULL;
234 struct in6_addr src;
235 triple_timestamp timestamp;
236 int r;
237 ssize_t buflen;
238 _cleanup_free_ char *buf = NULL;
239
240 assert(s);
241 assert(ra);
242 assert(ra->event);
243
244 buflen = next_datagram_size_fd(fd);
cfffddea
LP
245 if (buflen < 0)
246 return (int) buflen;
88d5a3db
PF
247
248 buf = new0(char, buflen);
249 if (!buf)
e55a6eae 250 return -ENOMEM;
88d5a3db
PF
251
252 r = icmp6_receive(fd, buf, buflen, &src, &timestamp);
253 if (r < 0) {
254 switch (r) {
255 case -EADDRNOTAVAIL:
c633628d 256 (void) in_addr_to_string(AF_INET6, (const union in_addr_union*) &src, &addr);
35388783 257 log_radv(ra, "Received RS from non-link-local address %s. Ignoring", addr);
88d5a3db
PF
258 break;
259
260 case -EMULTIHOP:
35388783 261 log_radv(ra, "Received RS with invalid hop limit. Ignoring.");
88d5a3db
PF
262 break;
263
264 case -EPFNOSUPPORT:
35388783 265 log_radv(ra, "Received invalid source address from ICMPv6 socket. Ignoring.");
88d5a3db
PF
266 break;
267
8eb41f4c
LP
268 case -EAGAIN: /* ignore spurious wakeups */
269 break;
270
88d5a3db 271 default:
35388783 272 log_radv_errno(ra, r, "Unexpected error receiving from ICMPv6 socket, Ignoring: %m");
88d5a3db
PF
273 break;
274 }
275
276 return 0;
277 }
278
cfffddea 279 if ((size_t) buflen < sizeof(struct nd_router_solicit)) {
35388783 280 log_radv(ra, "Too short packet received, ignoring");
cfffddea
LP
281 return 0;
282 }
283
c633628d 284 (void) in_addr_to_string(AF_INET6, (const union in_addr_union*) &src, &addr);
88d5a3db 285
7003b114 286 r = radv_send(ra, &src, ra->lifetime_usec);
88d5a3db 287 if (r < 0)
35388783 288 log_radv_errno(ra, r, "Unable to send solicited Router Advertisement to %s, ignoring: %m", strnull(addr));
88d5a3db 289 else
35388783 290 log_radv(ra, "Sent solicited Router Advertisement to %s", strnull(addr));
88d5a3db
PF
291
292 return 0;
293}
294
204fb681
PF
295static usec_t radv_compute_timeout(usec_t min, usec_t max) {
296 assert_return(min <= max, SD_RADV_DEFAULT_MIN_TIMEOUT_USEC);
297
ef90b6a4
GM
298 /* RFC 4861: min must be no less than 3s, max must be no less than 4s */
299 min = MAX(min, 3*USEC_PER_SEC);
300 max = MAX(max, 4*USEC_PER_SEC);
301
204fb681
PF
302 return min + (random_u32() % (max - min));
303}
304
305static int radv_timeout(sd_event_source *s, uint64_t usec, void *userdata) {
7003b114 306 usec_t min_timeout, max_timeout, time_now, timeout;
204fb681 307 sd_radv *ra = userdata;
7003b114 308 int r;
204fb681
PF
309
310 assert(s);
311 assert(ra);
312 assert(ra->event);
313
204fb681
PF
314 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
315 if (r < 0)
316 goto fail;
317
7003b114 318 r = radv_send(ra, NULL, ra->lifetime_usec);
204fb681 319 if (r < 0)
35388783 320 log_radv_errno(ra, r, "Unable to send Router Advertisement: %m");
204fb681
PF
321
322 /* RFC 4861, Section 6.2.4, sending initial Router Advertisements */
323 if (ra->ra_sent < SD_RADV_MAX_INITIAL_RTR_ADVERTISEMENTS) {
324 max_timeout = SD_RADV_MAX_INITIAL_RTR_ADVERT_INTERVAL_USEC;
325 min_timeout = SD_RADV_MAX_INITIAL_RTR_ADVERT_INTERVAL_USEC / 3;
7003b114
YW
326 } else {
327 max_timeout = SD_RADV_DEFAULT_MAX_TIMEOUT_USEC;
328 min_timeout = SD_RADV_DEFAULT_MIN_TIMEOUT_USEC;
204fb681
PF
329 }
330
ef90b6a4
GM
331 /* RFC 4861, Section 6.2.1, lifetime must be at least MaxRtrAdvInterval,
332 so lower the interval here */
7003b114
YW
333 if (ra->lifetime_usec > 0 && ra->lifetime_usec < max_timeout) {
334 max_timeout = ra->lifetime_usec;
ef90b6a4
GM
335 min_timeout = max_timeout / 3;
336 }
337
204fb681 338 timeout = radv_compute_timeout(min_timeout, max_timeout);
5291f26d 339 log_radv(ra, "Next Router Advertisement in %s", FORMAT_TIMESPAN(timeout, USEC_PER_SEC));
204fb681 340
807a8ede
YW
341 r = event_reset_time(ra->event, &ra->timeout_event_source,
342 clock_boottime_or_monotonic(),
343 time_now + timeout, MSEC_PER_SEC,
344 radv_timeout, ra,
345 ra->event_priority, "radv-timeout", true);
204fb681
PF
346 if (r < 0)
347 goto fail;
348
349 ra->ra_sent++;
350
807a8ede
YW
351 return 0;
352
204fb681 353fail:
290696e5 354 sd_radv_stop(ra);
204fb681
PF
355
356 return 0;
357}
358
290696e5 359_public_ int sd_radv_stop(sd_radv *ra) {
204fb681
PF
360 int r;
361
c8bae363
YW
362 if (!ra)
363 return 0;
204f99d2 364
6f8a8b84
SS
365 if (ra->state == SD_RADV_STATE_IDLE)
366 return 0;
367
35388783 368 log_radv(ra, "Stopping IPv6 Router Advertisement daemon");
204f99d2 369
290696e5
YW
370 /* RFC 4861, Section 6.2.5, send at least one Router Advertisement
371 with zero lifetime */
372 r = radv_send(ra, NULL, 0);
373 if (r < 0)
35388783 374 log_radv_errno(ra, r, "Unable to send last Router Advertisement with router lifetime set to zero: %m");
204fb681
PF
375
376 radv_reset(ra);
77baf5ae 377 ra->fd = safe_close(ra->fd);
204f99d2
PF
378 ra->state = SD_RADV_STATE_IDLE;
379
380 return 0;
381}
382
383_public_ int sd_radv_start(sd_radv *ra) {
f474884c 384 int r;
204fb681 385
204f99d2
PF
386 assert_return(ra, -EINVAL);
387 assert_return(ra->event, -EINVAL);
388 assert_return(ra->ifindex > 0, -EINVAL);
389
390 if (ra->state != SD_RADV_STATE_IDLE)
391 return 0;
392
807a8ede
YW
393 r = event_reset_time(ra->event, &ra->timeout_event_source,
394 clock_boottime_or_monotonic(),
395 0, 0,
396 radv_timeout, ra,
397 ra->event_priority, "radv-timeout", true);
204fb681
PF
398 if (r < 0)
399 goto fail;
400
77baf5ae
PF
401 r = icmp6_bind_router_advertisement(ra->ifindex);
402 if (r < 0)
403 goto fail;
404
405 ra->fd = r;
88d5a3db
PF
406
407 r = sd_event_add_io(ra->event, &ra->recv_event_source, ra->fd, EPOLLIN, radv_recv, ra);
408 if (r < 0)
409 goto fail;
410
411 r = sd_event_source_set_priority(ra->recv_event_source, ra->event_priority);
412 if (r < 0)
413 goto fail;
414
415 (void) sd_event_source_set_description(ra->recv_event_source, "radv-receive-message");
77baf5ae 416
204f99d2
PF
417 ra->state = SD_RADV_STATE_ADVERTISING;
418
35388783 419 log_radv(ra, "Started IPv6 Router Advertisement daemon");
204f99d2
PF
420
421 return 0;
204fb681
PF
422
423 fail:
424 radv_reset(ra);
425
426 return r;
204f99d2
PF
427}
428
429_public_ int sd_radv_set_ifindex(sd_radv *ra, int ifindex) {
430 assert_return(ra, -EINVAL);
7fa69c0a 431 assert_return(ifindex > 0, -EINVAL);
204f99d2
PF
432
433 if (ra->state != SD_RADV_STATE_IDLE)
434 return -EBUSY;
435
436 ra->ifindex = ifindex;
437
438 return 0;
439}
440
61a9fa8f
YW
441int sd_radv_set_ifname(sd_radv *ra, const char *ifname) {
442 assert_return(ra, -EINVAL);
443 assert_return(ifname, -EINVAL);
444
445 if (!ifname_valid_full(ifname, IFNAME_VALID_ALTERNATIVE))
446 return -EINVAL;
447
448 return free_and_strdup(&ra->ifname, ifname);
449}
450
5977b71f
YW
451int sd_radv_get_ifname(sd_radv *ra, const char **ret) {
452 int r;
453
454 assert_return(ra, -EINVAL);
61a9fa8f 455
5977b71f
YW
456 r = get_ifname(ra->ifindex, &ra->ifname);
457 if (r < 0)
458 return r;
459
460 if (ret)
461 *ret = ra->ifname;
462
463 return 0;
61a9fa8f
YW
464}
465
204f99d2
PF
466_public_ int sd_radv_set_mac(sd_radv *ra, const struct ether_addr *mac_addr) {
467 assert_return(ra, -EINVAL);
468
469 if (ra->state != SD_RADV_STATE_IDLE)
470 return -EBUSY;
471
472 if (mac_addr)
473 ra->mac_addr = *mac_addr;
474 else
475 zero(ra->mac_addr);
476
477 return 0;
478}
479
480_public_ int sd_radv_set_mtu(sd_radv *ra, uint32_t mtu) {
481 assert_return(ra, -EINVAL);
482 assert_return(mtu >= 1280, -EINVAL);
483
204f99d2
PF
484 ra->mtu = mtu;
485
486 return 0;
487}
488
489_public_ int sd_radv_set_hop_limit(sd_radv *ra, uint8_t hop_limit) {
490 assert_return(ra, -EINVAL);
491
492 if (ra->state != SD_RADV_STATE_IDLE)
493 return -EBUSY;
494
495 ra->hop_limit = hop_limit;
496
497 return 0;
498}
499
7003b114 500_public_ int sd_radv_set_router_lifetime(sd_radv *ra, uint64_t lifetime_usec) {
204f99d2
PF
501 assert_return(ra, -EINVAL);
502
503 if (ra->state != SD_RADV_STATE_IDLE)
504 return -EBUSY;
505
ac138551
YW
506 /* RFC 4191, Section 2.2, "...If the Router Lifetime is zero, the preference value MUST be set
507 * to (00) by the sender..." */
7003b114 508 if (lifetime_usec == 0 &&
204f99d2
PF
509 (ra->flags & (0x3 << 3)) != (SD_NDISC_PREFERENCE_MEDIUM << 3))
510 return -ETIME;
511
7003b114 512 ra->lifetime_usec = lifetime_usec;
204f99d2
PF
513
514 return 0;
515}
516
517_public_ int sd_radv_set_managed_information(sd_radv *ra, int managed) {
518 assert_return(ra, -EINVAL);
519
520 if (ra->state != SD_RADV_STATE_IDLE)
521 return -EBUSY;
522
523 SET_FLAG(ra->flags, ND_RA_FLAG_MANAGED, managed);
524
525 return 0;
526}
527
528_public_ int sd_radv_set_other_information(sd_radv *ra, int other) {
529 assert_return(ra, -EINVAL);
530
531 if (ra->state != SD_RADV_STATE_IDLE)
532 return -EBUSY;
533
534 SET_FLAG(ra->flags, ND_RA_FLAG_OTHER, other);
535
536 return 0;
537}
538
539_public_ int sd_radv_set_preference(sd_radv *ra, unsigned preference) {
204f99d2
PF
540 assert_return(ra, -EINVAL);
541 assert_return(IN_SET(preference,
542 SD_NDISC_PREFERENCE_LOW,
543 SD_NDISC_PREFERENCE_MEDIUM,
544 SD_NDISC_PREFERENCE_HIGH), -EINVAL);
545
dd1b1870
YW
546 /* RFC 4191, Section 2.2, "...If the Router Lifetime is zero, the preference value MUST be set
547 * to (00) by the sender..." */
7003b114 548 if (ra->lifetime_usec == 0 && preference != SD_NDISC_PREFERENCE_MEDIUM)
dd1b1870
YW
549 return -EINVAL;
550
204f99d2
PF
551 ra->flags = (ra->flags & ~(0x3 << 3)) | (preference << 3);
552
dd1b1870 553 return 0;
204f99d2
PF
554}
555
a3a98776 556_public_ int sd_radv_add_prefix(sd_radv *ra, sd_radv_prefix *p, int dynamic) {
204f99d2 557 sd_radv_prefix *cur;
d601b566 558 int r;
204f99d2 559 _cleanup_free_ char *addr_p = NULL;
d601b566 560 usec_t time_now, valid, preferred, valid_until, preferred_until;
204f99d2
PF
561
562 assert_return(ra, -EINVAL);
563
564 if (!p)
565 return -EINVAL;
566
59ea6e57 567 /* Refuse prefixes that don't have a prefix set */
94876904 568 if (in6_addr_is_null(&p->opt.in6_addr))
59ea6e57
LP
569 return -ENOEXEC;
570
5380707a 571 (void) in_addr_prefix_to_string(AF_INET6,
c633628d 572 (const union in_addr_union*) &p->opt.in6_addr,
5380707a
YW
573 p->opt.prefixlen, &addr_p);
574
204f99d2 575 LIST_FOREACH(prefix, cur, ra->prefixes) {
204f99d2
PF
576
577 r = in_addr_prefix_intersect(AF_INET6,
c633628d 578 (const union in_addr_union*) &cur->opt.in6_addr,
204f99d2 579 cur->opt.prefixlen,
c633628d 580 (const union in_addr_union*) &p->opt.in6_addr,
204f99d2 581 p->opt.prefixlen);
5380707a
YW
582 if (r < 0)
583 return r;
584 if (r == 0)
585 continue;
204f99d2 586
5380707a
YW
587 if (dynamic && cur->opt.prefixlen == p->opt.prefixlen)
588 goto update;
d601b566 589
5380707a
YW
590 _cleanup_free_ char *addr_cur = NULL;
591 (void) in_addr_prefix_to_string(AF_INET6,
c633628d 592 (const union in_addr_union*) &cur->opt.in6_addr,
5380707a 593 cur->opt.prefixlen, &addr_cur);
35388783
YW
594 return log_radv_errno(ra, SYNTHETIC_ERRNO(EEXIST),
595 "IPv6 prefix %s already configured, ignoring %s",
596 strna(addr_cur), strna(addr_p));
204f99d2
PF
597 }
598
599 p = sd_radv_prefix_ref(p);
600
601 LIST_APPEND(prefix, ra->prefixes, p);
602
603 ra->n_prefixes++;
604
d601b566 605 if (!dynamic) {
35388783 606 log_radv(ra, "Added prefix %s", strna(addr_p));
d601b566
PF
607 return 0;
608 }
609
610 cur = p;
611
97efde65
MM
612 /* If RAs have already been sent, send an RA immediately to announce the newly-added prefix */
613 if (ra->ra_sent > 0) {
7003b114 614 r = radv_send(ra, NULL, ra->lifetime_usec);
6333aa9d 615 if (r < 0)
35388783 616 log_radv_errno(ra, r, "Unable to send Router Advertisement for added prefix: %m");
6333aa9d 617 else
35388783 618 log_radv(ra, "Sent Router Advertisement for added prefix");
97efde65
MM
619 }
620
d601b566
PF
621 update:
622 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
623 if (r < 0)
624 return r;
625
626 valid = be32toh(p->opt.valid_lifetime) * USEC_PER_SEC;
627 valid_until = usec_add(valid, time_now);
628 if (valid_until == USEC_INFINITY)
629 return -EOVERFLOW;
630
631 preferred = be32toh(p->opt.preferred_lifetime) * USEC_PER_SEC;
632 preferred_until = usec_add(preferred, time_now);
633 if (preferred_until == USEC_INFINITY)
634 return -EOVERFLOW;
635
636 cur->valid_until = valid_until;
637 cur->preferred_until = preferred_until;
638
35388783 639 log_radv(ra, "Updated prefix %s preferred %s valid %s",
5380707a 640 strna(addr_p),
5291f26d
ZJS
641 FORMAT_TIMESPAN(preferred, USEC_PER_SEC),
642 FORMAT_TIMESPAN(valid, USEC_PER_SEC));
204f99d2
PF
643
644 return 0;
645}
646
34c169c4 647_public_ sd_radv_prefix *sd_radv_remove_prefix(sd_radv *ra,
f5a5706a
LP
648 const struct in6_addr *prefix,
649 unsigned char prefixlen) {
34c169c4
PF
650 sd_radv_prefix *cur, *next;
651
652 assert_return(ra, NULL);
653 assert_return(prefix, NULL);
654
655 LIST_FOREACH_SAFE(prefix, cur, next, ra->prefixes) {
656 if (prefixlen != cur->opt.prefixlen)
657 continue;
658
94876904 659 if (!in6_addr_equal(prefix, &cur->opt.in6_addr))
34c169c4
PF
660 continue;
661
662 LIST_REMOVE(prefix, ra->prefixes, cur);
663 ra->n_prefixes--;
62bbbedf 664 sd_radv_prefix_unref(cur);
34c169c4
PF
665
666 break;
667 }
668
669 return cur;
670}
671
203d4df5 672_public_ int sd_radv_add_route_prefix(sd_radv *ra, sd_radv_route_prefix *p, int dynamic) {
203d4df5
SS
673 usec_t time_now, valid, valid_until;
674 _cleanup_free_ char *pretty = NULL;
675 sd_radv_route_prefix *cur;
676 int r;
677
678 assert_return(ra, -EINVAL);
679
680 if (!p)
681 return -EINVAL;
682
5380707a 683 (void) in_addr_prefix_to_string(AF_INET6,
c633628d 684 (const union in_addr_union*) &p->opt.in6_addr,
5380707a 685 p->opt.prefixlen, &pretty);
203d4df5
SS
686
687 LIST_FOREACH(prefix, cur, ra->route_prefixes) {
203d4df5
SS
688
689 r = in_addr_prefix_intersect(AF_INET6,
c633628d 690 (const union in_addr_union*) &cur->opt.in6_addr,
203d4df5 691 cur->opt.prefixlen,
c633628d 692 (const union in_addr_union*) &p->opt.in6_addr,
203d4df5
SS
693 p->opt.prefixlen);
694 if (r < 0)
695 return r;
696 if (r == 0)
697 continue;
698
699 if (dynamic && cur->opt.prefixlen == p->opt.prefixlen)
700 goto update;
701
5380707a
YW
702 _cleanup_free_ char *addr = NULL;
703 (void) in_addr_prefix_to_string(AF_INET6,
c633628d 704 (const union in_addr_union*) &cur->opt.in6_addr,
5380707a 705 cur->opt.prefixlen, &addr);
35388783
YW
706 return log_radv_errno(ra, SYNTHETIC_ERRNO(EEXIST),
707 "IPv6 route prefix %s already configured, ignoring %s",
708 strna(addr), strna(pretty));
203d4df5
SS
709 }
710
711 p = sd_radv_route_prefix_ref(p);
712
713 LIST_APPEND(prefix, ra->route_prefixes, p);
714 ra->n_route_prefixes++;
715
203d4df5 716 if (!dynamic) {
35388783 717 log_radv(ra, "Added prefix %s", strna(pretty));
203d4df5
SS
718 return 0;
719 }
720
97efde65
MM
721 /* If RAs have already been sent, send an RA immediately to announce the newly-added route prefix */
722 if (ra->ra_sent > 0) {
7003b114 723 r = radv_send(ra, NULL, ra->lifetime_usec);
6333aa9d 724 if (r < 0)
35388783 725 log_radv_errno(ra, r, "Unable to send Router Advertisement for added route prefix: %m");
6333aa9d 726 else
35388783 727 log_radv(ra, "Sent Router Advertisement for added route prefix");
97efde65
MM
728 }
729
203d4df5
SS
730 update:
731 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
732 if (r < 0)
733 return r;
734
735 valid = be32toh(p->opt.lifetime) * USEC_PER_SEC;
736 valid_until = usec_add(valid, time_now);
737 if (valid_until == USEC_INFINITY)
738 return -EOVERFLOW;
739
35388783 740 log_radv(ra, "Updated route prefix %s valid %s",
5380707a 741 strna(pretty),
5291f26d 742 FORMAT_TIMESPAN(valid, USEC_PER_SEC));
203d4df5
SS
743
744 return 0;
745}
746
e9c6da38
PF
747_public_ int sd_radv_set_rdnss(sd_radv *ra, uint32_t lifetime,
748 const struct in6_addr *dns, size_t n_dns) {
749 _cleanup_free_ struct sd_radv_opt_dns *opt_rdnss = NULL;
750 size_t len;
751
752 assert_return(ra, -EINVAL);
753 assert_return(n_dns < 128, -EINVAL);
754
755 if (!dns || n_dns == 0) {
756 ra->rdnss = mfree(ra->rdnss);
757 ra->n_rdnss = 0;
758
759 return 0;
760 }
761
762 len = sizeof(struct sd_radv_opt_dns) + sizeof(struct in6_addr) * n_dns;
763
764 opt_rdnss = malloc0(len);
765 if (!opt_rdnss)
766 return -ENOMEM;
767
768 opt_rdnss->type = SD_RADV_OPT_RDNSS;
769 opt_rdnss->length = len / 8;
770 opt_rdnss->lifetime = htobe32(lifetime);
771
772 memcpy(opt_rdnss + 1, dns, n_dns * sizeof(struct in6_addr));
773
1cc6c93a 774 free_and_replace(ra->rdnss, opt_rdnss);
e9c6da38
PF
775
776 ra->n_rdnss = n_dns;
777
778 return 0;
779}
780
e965d6ab
PF
781_public_ int sd_radv_set_dnssl(sd_radv *ra, uint32_t lifetime,
782 char **search_list) {
783 _cleanup_free_ struct sd_radv_opt_dns *opt_dnssl = NULL;
784 size_t len = 0;
785 char **s;
786 uint8_t *p;
787
788 assert_return(ra, -EINVAL);
789
97d7974b 790 if (strv_isempty(search_list)) {
e965d6ab 791 ra->dnssl = mfree(ra->dnssl);
e965d6ab
PF
792 return 0;
793 }
794
795 STRV_FOREACH(s, search_list)
796 len += strlen(*s) + 2;
797
798 len = (sizeof(struct sd_radv_opt_dns) + len + 7) & ~0x7;
799
800 opt_dnssl = malloc0(len);
801 if (!opt_dnssl)
802 return -ENOMEM;
803
804 opt_dnssl->type = SD_RADV_OPT_DNSSL;
805 opt_dnssl->length = len / 8;
806 opt_dnssl->lifetime = htobe32(lifetime);
807
808 p = (uint8_t *)(opt_dnssl + 1);
809 len -= sizeof(struct sd_radv_opt_dns);
810
811 STRV_FOREACH(s, search_list) {
812 int r;
813
814 r = dns_name_to_wire_format(*s, p, len, false);
815 if (r < 0)
816 return r;
817
818 if (len < (size_t)r)
819 return -ENOBUFS;
820
821 p += r;
822 len -= r;
823 }
824
1cc6c93a 825 free_and_replace(ra->dnssl, opt_dnssl);
e965d6ab
PF
826
827 return 0;
828}
829
04473969 830_public_ int sd_radv_prefix_new(sd_radv_prefix **ret) {
d2c8eed2 831 sd_radv_prefix *p;
04473969
PF
832
833 assert_return(ret, -EINVAL);
834
d2c8eed2 835 p = new(sd_radv_prefix, 1);
04473969
PF
836 if (!p)
837 return -ENOMEM;
838
d2c8eed2
LP
839 *p = (sd_radv_prefix) {
840 .n_ref = 1,
04473969 841
d2c8eed2
LP
842 .opt.type = ND_OPT_PREFIX_INFORMATION,
843 .opt.length = (sizeof(p->opt) - 1)/8 + 1,
844 .opt.prefixlen = 64,
04473969 845
d2c8eed2
LP
846 /* RFC 4861, Section 6.2.1 */
847 .opt.flags = ND_OPT_PI_FLAG_ONLINK|ND_OPT_PI_FLAG_AUTO,
204f99d2 848
d2c8eed2
LP
849 .opt.preferred_lifetime = htobe32(604800),
850 .opt.valid_lifetime = htobe32(2592000),
851 };
04473969 852
d2c8eed2 853 *ret = p;
04473969
PF
854 return 0;
855}
856
8301aa0b 857DEFINE_PUBLIC_TRIVIAL_REF_UNREF_FUNC(sd_radv_prefix, sd_radv_prefix, mfree);
04473969 858
f5a5706a 859_public_ int sd_radv_prefix_set_prefix(sd_radv_prefix *p, const struct in6_addr *in6_addr,
04473969
PF
860 unsigned char prefixlen) {
861 assert_return(p, -EINVAL);
862 assert_return(in6_addr, -EINVAL);
863
864 if (prefixlen < 3 || prefixlen > 128)
865 return -EINVAL;
866
867 if (prefixlen > 64)
868 /* unusual but allowed, log it */
35388783 869 log_radv(NULL, "Unusual prefix length %d greater than 64", prefixlen);
04473969
PF
870
871 p->opt.in6_addr = *in6_addr;
872 p->opt.prefixlen = prefixlen;
873
874 return 0;
875}
876
34332af2
SS
877_public_ int sd_radv_prefix_get_prefix(sd_radv_prefix *p, struct in6_addr *ret_in6_addr,
878 unsigned char *ret_prefixlen) {
879 assert_return(p, -EINVAL);
880 assert_return(ret_in6_addr, -EINVAL);
881 assert_return(ret_prefixlen, -EINVAL);
882
883 *ret_in6_addr = p->opt.in6_addr;
884 *ret_prefixlen = p->opt.prefixlen;
885
886 return 0;
887}
888
04473969
PF
889_public_ int sd_radv_prefix_set_onlink(sd_radv_prefix *p, int onlink) {
890 assert_return(p, -EINVAL);
891
892 SET_FLAG(p->opt.flags, ND_OPT_PI_FLAG_ONLINK, onlink);
893
894 return 0;
895}
896
897_public_ int sd_radv_prefix_set_address_autoconfiguration(sd_radv_prefix *p,
898 int address_autoconfiguration) {
899 assert_return(p, -EINVAL);
900
901 SET_FLAG(p->opt.flags, ND_OPT_PI_FLAG_AUTO, address_autoconfiguration);
902
903 return 0;
904}
905
906_public_ int sd_radv_prefix_set_valid_lifetime(sd_radv_prefix *p,
907 uint32_t valid_lifetime) {
908 assert_return(p, -EINVAL);
909
910 p->opt.valid_lifetime = htobe32(valid_lifetime);
911
912 return 0;
913}
914
915_public_ int sd_radv_prefix_set_preferred_lifetime(sd_radv_prefix *p,
916 uint32_t preferred_lifetime) {
917 assert_return(p, -EINVAL);
918
919 p->opt.preferred_lifetime = htobe32(preferred_lifetime);
920
921 return 0;
922}
203d4df5
SS
923
924_public_ int sd_radv_route_prefix_new(sd_radv_route_prefix **ret) {
925 sd_radv_route_prefix *p;
926
927 assert_return(ret, -EINVAL);
928
929 p = new(sd_radv_route_prefix, 1);
930 if (!p)
931 return -ENOMEM;
932
933 *p = (sd_radv_route_prefix) {
934 .n_ref = 1,
935
936 .opt.type = SD_RADV_OPT_ROUTE_INFORMATION,
937 .opt.length = DIV_ROUND_UP(sizeof(p->opt), 8),
938 .opt.prefixlen = 64,
939
940 .opt.lifetime = htobe32(604800),
941 };
942
943 *ret = p;
944 return 0;
945}
946
947DEFINE_PUBLIC_TRIVIAL_REF_UNREF_FUNC(sd_radv_route_prefix, sd_radv_route_prefix, mfree);
948
7ebb1431 949_public_ int sd_radv_route_prefix_set_prefix(sd_radv_route_prefix *p, const struct in6_addr *in6_addr,
203d4df5
SS
950 unsigned char prefixlen) {
951 assert_return(p, -EINVAL);
952 assert_return(in6_addr, -EINVAL);
953
954 if (prefixlen > 128)
955 return -EINVAL;
956
957 if (prefixlen > 64)
958 /* unusual but allowed, log it */
35388783 959 log_radv(NULL, "Unusual prefix length %u greater than 64", prefixlen);
203d4df5
SS
960
961 p->opt.in6_addr = *in6_addr;
962 p->opt.prefixlen = prefixlen;
963
964 return 0;
965}
966
967_public_ int sd_radv_route_prefix_set_lifetime(sd_radv_route_prefix *p, uint32_t valid_lifetime) {
968 assert_return(p, -EINVAL);
969
970 p->opt.lifetime = htobe32(valid_lifetime);
971
972 return 0;
973}