]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/network/networkd-dhcp-prefix-delegation.c
Merge pull request #33352 from YHNdnzj/freeconp-void
[thirdparty/systemd.git] / src / network / networkd-dhcp-prefix-delegation.c
CommitLineData
d5ebcf65
YW
1/* SPDX-License-Identifier: LGPL-2.1-or-later */
2
557e1b52
YW
3#include <linux/ipv6_route.h>
4
d8ec95c7 5#include "dhcp6-lease-internal.h"
d5ebcf65
YW
6#include "hashmap.h"
7#include "in-addr-prefix-util.h"
8#include "networkd-address-generation.h"
9#include "networkd-address.h"
10#include "networkd-dhcp-prefix-delegation.h"
11#include "networkd-dhcp6.h"
12#include "networkd-link.h"
13#include "networkd-manager.h"
14#include "networkd-queue.h"
15#include "networkd-radv.h"
16#include "networkd-route.h"
e49bad01 17#include "networkd-setlink.h"
d5ebcf65
YW
18#include "parse-util.h"
19#include "string-util.h"
20#include "strv.h"
e49bad01 21#include "tunnel.h"
d5ebcf65 22
a27588d4 23bool link_dhcp_pd_is_enabled(Link *link) {
d5ebcf65
YW
24 assert(link);
25
26 if (!link->network)
27 return false;
28
a27588d4 29 return link->network->dhcp_pd;
d5ebcf65
YW
30}
31
a27588d4 32bool dhcp_pd_is_uplink(Link *link, Link *target, bool accept_auto) {
d5ebcf65
YW
33 assert(link);
34 assert(target);
35
a27588d4 36 if (!link_dhcp_pd_is_enabled(link))
d5ebcf65
YW
37 return false;
38
a27588d4
YW
39 if (link->network->dhcp_pd_uplink_name)
40 return streq_ptr(target->ifname, link->network->dhcp_pd_uplink_name) ||
41 strv_contains(target->alternative_names, link->network->dhcp_pd_uplink_name);
d5ebcf65 42
a27588d4
YW
43 if (link->network->dhcp_pd_uplink_index > 0)
44 return target->ifindex == link->network->dhcp_pd_uplink_index;
d5ebcf65 45
a27588d4 46 if (link->network->dhcp_pd_uplink_index == UPLINK_INDEX_SELF)
d5ebcf65
YW
47 return link == target;
48
a27588d4 49 assert(link->network->dhcp_pd_uplink_index == UPLINK_INDEX_AUTO);
d5ebcf65
YW
50 return accept_auto;
51}
52
a27588d4 53static void link_remove_dhcp_pd_subnet_prefix(Link *link, const struct in6_addr *prefix) {
d5ebcf65
YW
54 void *key;
55
56 assert(link);
57 assert(link->manager);
58 assert(prefix);
59
a27588d4 60 if (hashmap_get(link->manager->links_by_dhcp_pd_subnet_prefix, prefix) != link)
d5ebcf65
YW
61 return;
62
a27588d4 63 hashmap_remove2(link->manager->links_by_dhcp_pd_subnet_prefix, prefix, &key);
d5ebcf65
YW
64 free(key);
65}
66
a27588d4 67static int link_add_dhcp_pd_subnet_prefix(Link *link, const struct in6_addr *prefix) {
d5ebcf65
YW
68 _cleanup_free_ struct in6_addr *copy = NULL;
69 int r;
70
71 assert(link);
72 assert(prefix);
73
74 copy = newdup(struct in6_addr, prefix, 1);
75 if (!copy)
76 return -ENOMEM;
77
a27588d4 78 r = hashmap_ensure_put(&link->manager->links_by_dhcp_pd_subnet_prefix, &in6_addr_hash_ops_free, copy, link);
d5ebcf65
YW
79 if (r < 0)
80 return r;
81 if (r > 0)
82 TAKE_PTR(copy);
83
84 return 0;
85}
86
a27588d4 87static int link_get_by_dhcp_pd_subnet_prefix(Manager *manager, const struct in6_addr *prefix, Link **ret) {
d5ebcf65
YW
88 Link *link;
89
90 assert(manager);
91 assert(prefix);
92
a27588d4 93 link = hashmap_get(manager->links_by_dhcp_pd_subnet_prefix, prefix);
d5ebcf65
YW
94 if (!link)
95 return -ENODEV;
96
97 if (ret)
98 *ret = link;
99 return 0;
100}
101
a27588d4 102static int dhcp_pd_get_assigned_subnet_prefix(Link *link, const struct in6_addr *pd_prefix, uint8_t pd_prefix_len, struct in6_addr *ret) {
d5ebcf65 103 assert(link);
8d01e44c 104 assert(link->manager);
d5ebcf65
YW
105 assert(pd_prefix);
106
a27588d4 107 if (!link_dhcp_pd_is_enabled(link))
d5ebcf65
YW
108 return -ENOENT;
109
a27588d4 110 if (link->network->dhcp_pd_assign) {
d5ebcf65
YW
111 Address *address;
112
113 SET_FOREACH(address, link->addresses) {
a27588d4 114 if (address->source != NETWORK_CONFIG_SOURCE_DHCP_PD)
d5ebcf65
YW
115 continue;
116 assert(address->family == AF_INET6);
117
118 if (in6_addr_prefix_covers(pd_prefix, pd_prefix_len, &address->in_addr.in6) <= 0)
119 continue;
120
121 if (ret) {
122 struct in6_addr prefix = address->in_addr.in6;
123
124 in6_addr_mask(&prefix, 64);
125 *ret = prefix;
126 }
127 return 0;
128 }
129 } else {
130 Route *route;
131
8d01e44c 132 SET_FOREACH(route, link->manager->routes) {
a27588d4 133 if (route->source != NETWORK_CONFIG_SOURCE_DHCP_PD)
d5ebcf65
YW
134 continue;
135 assert(route->family == AF_INET6);
136
8d01e44c
YW
137 if (route->nexthop.ifindex != link->ifindex)
138 continue;
139
d5ebcf65
YW
140 if (in6_addr_prefix_covers(pd_prefix, pd_prefix_len, &route->dst.in6) > 0) {
141 if (ret)
142 *ret = route->dst.in6;
143 return 0;
144 }
145 }
146 }
147
148 return -ENOENT;
149}
150
a27588d4 151int dhcp_pd_remove(Link *link, bool only_marked) {
372acaad 152 int ret = 0;
d5ebcf65
YW
153
154 assert(link);
155 assert(link->manager);
156
a27588d4 157 if (!link_dhcp_pd_is_enabled(link))
d5ebcf65
YW
158 return 0;
159
160 if (!only_marked)
a27588d4 161 link->dhcp_pd_configured = false;
d5ebcf65 162
a27588d4 163 if (!link->network->dhcp_pd_assign) {
d5ebcf65
YW
164 Route *route;
165
8d01e44c 166 SET_FOREACH(route, link->manager->routes) {
a27588d4 167 if (route->source != NETWORK_CONFIG_SOURCE_DHCP_PD)
d5ebcf65 168 continue;
8d01e44c
YW
169 if (route->nexthop.ifindex != link->ifindex)
170 continue;
d5ebcf65
YW
171 if (only_marked && !route_is_marked(route))
172 continue;
173
174 if (link->radv)
95931532 175 sd_radv_remove_prefix(link->radv, &route->dst.in6, 64);
d5ebcf65 176
a27588d4 177 link_remove_dhcp_pd_subnet_prefix(link, &route->dst.in6);
d5ebcf65 178
3caed9ea 179 RET_GATHER(ret, route_remove_and_cancel(route, link->manager));
d5ebcf65
YW
180 }
181 } else {
182 Address *address;
183
184 SET_FOREACH(address, link->addresses) {
185 struct in6_addr prefix;
186
a27588d4 187 if (address->source != NETWORK_CONFIG_SOURCE_DHCP_PD)
d5ebcf65
YW
188 continue;
189 if (only_marked && !address_is_marked(address))
190 continue;
191
192 prefix = address->in_addr.in6;
193 in6_addr_mask(&prefix, 64);
194
195 if (link->radv)
95931532 196 sd_radv_remove_prefix(link->radv, &prefix, 64);
d5ebcf65 197
a27588d4 198 link_remove_dhcp_pd_subnet_prefix(link, &prefix);
d5ebcf65 199
f22b586a 200 RET_GATHER(ret, address_remove_and_cancel(address, link));
d5ebcf65
YW
201 }
202 }
203
372acaad 204 return ret;
d5ebcf65
YW
205}
206
a27588d4 207static int dhcp_pd_check_ready(Link *link);
d5ebcf65 208
a27588d4 209static int dhcp_pd_address_ready_callback(Address *address) {
d5ebcf65
YW
210 Address *a;
211
212 assert(address);
213 assert(address->link);
214
215 SET_FOREACH(a, address->link->addresses)
a27588d4 216 if (a->source == NETWORK_CONFIG_SOURCE_DHCP_PD)
d5ebcf65
YW
217 a->callback = NULL;
218
a27588d4 219 return dhcp_pd_check_ready(address->link);
d5ebcf65
YW
220}
221
a27588d4 222static int dhcp_pd_check_ready(Link *link) {
d5ebcf65
YW
223 int r;
224
225 assert(link);
226 assert(link->network);
227
a27588d4
YW
228 if (link->dhcp_pd_messages > 0) {
229 log_link_debug(link, "%s(): DHCP-PD addresses and routes are not set.", __func__);
d5ebcf65
YW
230 return 0;
231 }
232
a27588d4 233 if (link->network->dhcp_pd_assign) {
d5ebcf65
YW
234 bool has_ready = false;
235 Address *address;
236
237 SET_FOREACH(address, link->addresses) {
a27588d4 238 if (address->source != NETWORK_CONFIG_SOURCE_DHCP_PD)
d5ebcf65
YW
239 continue;
240 if (address_is_ready(address)) {
241 has_ready = true;
242 break;
243 }
244 }
245
246 if (!has_ready) {
247 SET_FOREACH(address, link->addresses)
a27588d4
YW
248 if (address->source == NETWORK_CONFIG_SOURCE_DHCP_PD)
249 address->callback = dhcp_pd_address_ready_callback;
d5ebcf65 250
a27588d4 251 log_link_debug(link, "%s(): no DHCP-PD address is ready.", __func__);
d5ebcf65
YW
252 return 0;
253 }
254 }
255
a27588d4 256 link->dhcp_pd_configured = true;
d5ebcf65 257
a27588d4 258 log_link_debug(link, "DHCP-PD addresses and routes set.");
d5ebcf65 259
a27588d4 260 r = dhcp_pd_remove(link, /* only_marked = */ true);
d5ebcf65
YW
261 if (r < 0)
262 return r;
263
264 link_check_ready(link);
265 return 1;
266}
267
80d62d4f 268static int dhcp_pd_route_handler(sd_netlink *rtnl, sd_netlink_message *m, Request *req, Link *link, Route *route) {
d5ebcf65
YW
269 int r;
270
271 assert(link);
d5ebcf65 272
2c0b49ba 273 r = route_configure_handler_internal(rtnl, m, link, route, "Failed to add prefix route for DHCP delegated subnet prefix");
d5ebcf65
YW
274 if (r <= 0)
275 return r;
276
a27588d4 277 r = dhcp_pd_check_ready(link);
d5ebcf65
YW
278 if (r < 0)
279 link_enter_failed(link);
280
281 return 1;
282}
283
38488bab 284static int dhcp_pd_request_route(Link *link, const struct in6_addr *prefix, usec_t lifetime_usec) {
74c301b9 285 _cleanup_(route_unrefp) Route *route = NULL;
d5ebcf65
YW
286 Route *existing;
287 int r;
288
289 assert(link);
8d01e44c 290 assert(link->manager);
d5ebcf65
YW
291 assert(link->network);
292 assert(prefix);
293
a27588d4 294 if (link->network->dhcp_pd_assign)
d5ebcf65
YW
295 return 0;
296
297 r = route_new(&route);
298 if (r < 0)
299 return r;
300
a27588d4 301 route->source = NETWORK_CONFIG_SOURCE_DHCP_PD;
d5ebcf65
YW
302 route->family = AF_INET6;
303 route->dst.in6 = *prefix;
38488bab 304 route->dst_prefixlen = 64;
d5ebcf65 305 route->protocol = RTPROT_DHCP;
a27588d4 306 route->priority = link->network->dhcp_pd_route_metric;
d5ebcf65
YW
307 route->lifetime_usec = lifetime_usec;
308
2f542fc3
YW
309 r = route_adjust_nexthops(route, link);
310 if (r < 0)
311 return r;
312
8d01e44c 313 if (route_get(link->manager, route, &existing) < 0)
a27588d4 314 link->dhcp_pd_configured = false;
d5ebcf65
YW
315 else
316 route_unmark(existing);
317
5a18697d 318 r = link_request_route(link, route, &link->dhcp_pd_messages, dhcp_pd_route_handler);
d5ebcf65 319 if (r < 0)
a27588d4 320 return log_link_error_errno(link, r, "Failed to request DHCP-PD prefix route: %m");
d5ebcf65
YW
321
322 return 0;
323}
324
80d62d4f 325static int dhcp_pd_address_handler(sd_netlink *rtnl, sd_netlink_message *m, Request *req, Link *link, Address *address) {
d5ebcf65
YW
326 int r;
327
328 assert(link);
d5ebcf65 329
a27588d4 330 r = address_configure_handler_internal(rtnl, m, link, "Could not set DHCP-PD address");
d5ebcf65
YW
331 if (r <= 0)
332 return r;
333
a27588d4 334 r = dhcp_pd_check_ready(link);
d5ebcf65
YW
335 if (r < 0)
336 link_enter_failed(link);
337
338 return 1;
339}
340
a27588d4 341static void log_dhcp_pd_address(Link *link, const Address *address) {
d5ebcf65
YW
342 assert(address);
343 assert(address->family == AF_INET6);
344
b33dd04e 345 int log_level = address_get_harder(link, address, NULL) >= 0 ? LOG_DEBUG : LOG_INFO;
d5ebcf65
YW
346
347 if (log_level < log_get_max_level())
348 return;
349
a27588d4 350 log_link_full(link, log_level, "DHCP-PD address %s (valid %s, preferred %s)",
c71384a9 351 IN6_ADDR_PREFIX_TO_STRING(&address->in_addr.in6, address->prefixlen),
d5ebcf65
YW
352 FORMAT_LIFETIME(address->lifetime_valid_usec),
353 FORMAT_LIFETIME(address->lifetime_preferred_usec));
354}
355
b03565bc
YW
356static int dhcp_pd_request_address_one(Address *address, Link *link) {
357 Address *existing;
358
359 assert(address);
360 assert(link);
361
362 log_dhcp_pd_address(link, address);
363
364 if (address_get(link, address, &existing) < 0)
365 link->dhcp_pd_configured = false;
366 else
367 address_unmark(existing);
368
369 return link_request_address(link, address, &link->dhcp_pd_messages, dhcp_pd_address_handler, NULL);
370}
371
e14679ff
YW
372int dhcp_pd_reconfigure_address(Address *address, Link *link) {
373 int r;
374
375 assert(address);
376 assert(address->source == NETWORK_CONFIG_SOURCE_DHCP_PD);
377 assert(link);
378
379 r = regenerate_address(address, link);
380 if (r <= 0)
381 return r;
382
383 r = dhcp_pd_request_address_one(address, link);
384 if (r < 0)
385 return r;
386
387 if (!link->dhcp_pd_configured)
388 link_set_state(link, LINK_STATE_CONFIGURING);
389
390 link_check_ready(link);
391 return 0;
392}
393
a27588d4 394static int dhcp_pd_request_address(
d5ebcf65
YW
395 Link *link,
396 const struct in6_addr *prefix,
397 usec_t lifetime_preferred_usec,
398 usec_t lifetime_valid_usec) {
399
d5ebcf65
YW
400 int r;
401
402 assert(link);
403 assert(link->network);
404 assert(prefix);
405
a27588d4 406 if (!link->network->dhcp_pd_assign)
d5ebcf65
YW
407 return 0;
408
e700e482
YW
409 _cleanup_hashmap_free_ Hashmap *tokens_by_address = NULL;
410 r = dhcp_pd_generate_addresses(link, prefix, &tokens_by_address);
d5ebcf65 411 if (r < 0)
a27588d4 412 return log_link_warning_errno(link, r, "Failed to generate addresses for acquired DHCP delegated prefix: %m");
d5ebcf65 413
e700e482
YW
414 IPv6Token *token;
415 struct in6_addr *a;
416 HASHMAP_FOREACH_KEY(token, a, tokens_by_address) {
ebd96906 417 _cleanup_(address_unrefp) Address *address = NULL;
d5ebcf65
YW
418
419 r = address_new(&address);
420 if (r < 0)
a27588d4 421 return log_link_error_errno(link, r, "Failed to allocate address for DHCP delegated prefix: %m");
d5ebcf65 422
a27588d4 423 address->source = NETWORK_CONFIG_SOURCE_DHCP_PD;
d5ebcf65
YW
424 address->family = AF_INET6;
425 address->in_addr.in6 = *a;
38488bab 426 address->prefixlen = 64;
d5ebcf65
YW
427 address->lifetime_preferred_usec = lifetime_preferred_usec;
428 address->lifetime_valid_usec = lifetime_valid_usec;
38488bab 429 SET_FLAG(address->flags, IFA_F_MANAGETEMPADDR, link->network->dhcp_pd_manage_temporary_address);
a27588d4 430 address->route_metric = link->network->dhcp_pd_route_metric;
e700e482 431 address->token = ipv6_token_ref(token);
d5ebcf65 432
4b3590c3
TM
433 r = free_and_strdup_warn(&address->netlabel, link->network->dhcp_pd_netlabel);
434 if (r < 0)
435 return r;
436
b03565bc 437 r = dhcp_pd_request_address_one(address, link);
d5ebcf65 438 if (r < 0)
a27588d4 439 return log_link_error_errno(link, r, "Failed to request DHCP delegated prefix address: %m");
d5ebcf65
YW
440 }
441
442 return 0;
443}
444
a27588d4 445static int dhcp_pd_calculate_subnet_prefix(
d5ebcf65
YW
446 const struct in6_addr *pd_prefix,
447 uint8_t pd_prefix_len,
448 uint64_t subnet_id,
449 struct in6_addr *ret) {
450
451 struct in6_addr prefix;
452
453 assert(pd_prefix);
454 assert(pd_prefix_len <= 64);
455 assert(ret);
456
457 if (subnet_id >= UINT64_C(1) << (64 - pd_prefix_len))
458 return -ERANGE;
459
460 prefix = *pd_prefix;
461
462 if (pd_prefix_len < 32)
463 prefix.s6_addr32[0] |= htobe32(subnet_id >> 32);
464
465 prefix.s6_addr32[1] |= htobe32(subnet_id & 0xffffffff);
466
467 *ret = prefix;
468 return 0;
469}
470
a27588d4 471static int dhcp_pd_get_preferred_subnet_prefix(
d5ebcf65
YW
472 Link *link,
473 const struct in6_addr *pd_prefix,
474 uint8_t pd_prefix_len,
475 struct in6_addr *ret) {
476
477 struct in6_addr prefix;
478 Link *assigned_link;
479 int r;
480
481 assert(link);
482 assert(link->manager);
11d8a83f 483 assert(link->network);
d5ebcf65
YW
484 assert(pd_prefix);
485
a27588d4 486 if (link->network->dhcp_pd_subnet_id >= 0) {
d5ebcf65
YW
487 /* If the link has a preference for a particular subnet id try to allocate that */
488
a27588d4 489 r = dhcp_pd_calculate_subnet_prefix(pd_prefix, pd_prefix_len, link->network->dhcp_pd_subnet_id, &prefix);
d5ebcf65
YW
490 if (r < 0)
491 return log_link_warning_errno(link, r,
c0f86d66 492 "subnet id %" PRIi64 " is out of range. Only have %" PRIu64 " subnets.",
a27588d4 493 link->network->dhcp_pd_subnet_id, UINT64_C(1) << (64 - pd_prefix_len));
d5ebcf65 494
d5ebcf65
YW
495 *ret = prefix;
496 return 0;
497 }
498
07b7337a
YW
499 if (dhcp_pd_get_assigned_subnet_prefix(link, pd_prefix, pd_prefix_len, ret) >= 0)
500 return 0;
501
d5ebcf65
YW
502 for (uint64_t n = 0; ; n++) {
503 /* If we do not have an allocation preference just iterate
504 * through the address space and return the first free prefix. */
505
a27588d4 506 r = dhcp_pd_calculate_subnet_prefix(pd_prefix, pd_prefix_len, n, &prefix);
d5ebcf65
YW
507 if (r < 0)
508 return log_link_warning_errno(link, r,
509 "Couldn't find a suitable prefix. Ran out of address space.");
510
511 /* Do not use explicitly requested subnet IDs. Note that the corresponding link may not
512 * appear yet. So, we need to check the ID is not used in any .network files. */
a27588d4 513 if (set_contains(link->manager->dhcp_pd_subnet_ids, &n))
d5ebcf65
YW
514 continue;
515
516 /* Check that the prefix is not assigned to another link. */
a27588d4 517 if (link_get_by_dhcp_pd_subnet_prefix(link->manager, &prefix, &assigned_link) < 0 ||
07b7337a
YW
518 assigned_link == link)
519 break;
d5ebcf65 520 }
07b7337a
YW
521
522 r = link_add_dhcp_pd_subnet_prefix(link, &prefix);
523 if (r < 0)
524 return log_link_warning_errno(link, r, "Failed to save acquired free subnet prefix: %m");
525
526 *ret = prefix;
527 return 0;
d5ebcf65
YW
528}
529
a27588d4 530static int dhcp_pd_assign_subnet_prefix(
d5ebcf65
YW
531 Link *link,
532 const struct in6_addr *pd_prefix,
533 uint8_t pd_prefix_len,
534 usec_t lifetime_preferred_usec,
38488bab
YW
535 usec_t lifetime_valid_usec,
536 bool is_uplink) {
d5ebcf65 537
d5ebcf65
YW
538 struct in6_addr prefix;
539 int r;
540
541 assert(link);
542 assert(link->network);
543 assert(pd_prefix);
544
07b7337a
YW
545 r = dhcp_pd_get_preferred_subnet_prefix(link, pd_prefix, pd_prefix_len, &prefix);
546 if (r < 0)
547 return r == -ERANGE ? 0 : r;
d5ebcf65 548
c71384a9 549 const char *pretty = IN6_ADDR_PREFIX_TO_STRING(&prefix, 64);
d5ebcf65 550
a27588d4 551 if (link_radv_enabled(link) && link->network->dhcp_pd_announce) {
38488bab
YW
552 if (is_uplink)
553 log_link_debug(link, "Ignoring Announce= setting on upstream interface.");
554 else {
555 r = radv_add_prefix(link, &prefix, 64, lifetime_preferred_usec, lifetime_valid_usec);
556 if (r < 0)
557 return log_link_warning_errno(link, r,
558 "Failed to assign/update prefix %s to IPv6 Router Advertisement: %m",
c71384a9 559 pretty);
38488bab 560 }
d5ebcf65
YW
561 }
562
38488bab 563 r = dhcp_pd_request_route(link, &prefix, lifetime_valid_usec);
d5ebcf65
YW
564 if (r < 0)
565 return log_link_warning_errno(link, r,
c71384a9 566 "Failed to assign/update route for prefix %s: %m", pretty);
d5ebcf65 567
38488bab 568 r = dhcp_pd_request_address(link, &prefix, lifetime_preferred_usec, lifetime_valid_usec);
d5ebcf65
YW
569 if (r < 0)
570 return log_link_warning_errno(link, r,
c71384a9 571 "Failed to assign/update address for prefix %s: %m", pretty);
d5ebcf65 572
c71384a9 573 log_link_debug(link, "Assigned prefix %s", pretty);
d5ebcf65
YW
574 return 1;
575}
576
a27588d4 577static int dhcp_pd_prepare(Link *link) {
d5ebcf65
YW
578 if (!IN_SET(link->state, LINK_STATE_CONFIGURING, LINK_STATE_CONFIGURED))
579 return 0;
580
a27588d4 581 if (!link_dhcp_pd_is_enabled(link))
d5ebcf65
YW
582 return 0;
583
a27588d4 584 if (link_radv_enabled(link) && link->network->dhcp_pd_announce && !link->radv)
d5ebcf65
YW
585 return 0;
586
2ccada8d 587 link_mark_addresses(link, NETWORK_CONFIG_SOURCE_DHCP_PD);
8d01e44c 588 manager_mark_routes(link->manager, link, NETWORK_CONFIG_SOURCE_DHCP_PD);
d5ebcf65 589
c3cd5351 590 return 1;
d5ebcf65
YW
591}
592
a27588d4 593static int dhcp_pd_finalize(Link *link) {
d5ebcf65
YW
594 int r;
595
596 if (!IN_SET(link->state, LINK_STATE_CONFIGURING, LINK_STATE_CONFIGURED))
597 return 0;
598
a27588d4
YW
599 if (link->dhcp_pd_messages == 0) {
600 link->dhcp_pd_configured = false;
d5ebcf65 601
a27588d4 602 r = dhcp_pd_remove(link, /* only_marked = */ true);
d5ebcf65
YW
603 if (r < 0)
604 return r;
605 }
606
a27588d4 607 if (!link->dhcp_pd_configured)
d5ebcf65
YW
608 link_set_state(link, LINK_STATE_CONFIGURING);
609
610 link_check_ready(link);
611 return 0;
612}
613
a27588d4 614void dhcp_pd_prefix_lost(Link *uplink) {
da10d2d5 615 Route *route;
d5ebcf65
YW
616 Link *link;
617 int r;
618
a27588d4
YW
619 assert(uplink);
620 assert(uplink->manager);
d5ebcf65 621
a27588d4
YW
622 HASHMAP_FOREACH(link, uplink->manager->links_by_index) {
623 if (!dhcp_pd_is_uplink(link, uplink, /* accept_auto = */ true))
d5ebcf65
YW
624 continue;
625
a27588d4 626 r = dhcp_pd_remove(link, /* only_marked = */ false);
d5ebcf65
YW
627 if (r < 0)
628 link_enter_failed(link);
629 }
630
a27588d4 631 SET_FOREACH(route, uplink->manager->routes) {
277521a1 632 if (!IN_SET(route->source, NETWORK_CONFIG_SOURCE_DHCP4, NETWORK_CONFIG_SOURCE_DHCP6))
da10d2d5
YW
633 continue;
634 if (route->family != AF_INET6)
635 continue;
636 if (route->type != RTN_UNREACHABLE)
637 continue;
a27588d4 638 if (!set_contains(uplink->dhcp_pd_prefixes,
da10d2d5
YW
639 &(struct in_addr_prefix) {
640 .family = AF_INET6,
641 .prefixlen = route->dst_prefixlen,
642 .address = route->dst }))
643 continue;
644
3caed9ea 645 (void) route_remove_and_cancel(route, uplink->manager);
da10d2d5
YW
646 }
647
a27588d4 648 set_clear(uplink->dhcp_pd_prefixes);
d5ebcf65
YW
649}
650
e49bad01
YW
651void dhcp4_pd_prefix_lost(Link *uplink) {
652 Link *tunnel;
653
654 dhcp_pd_prefix_lost(uplink);
655
656 if (uplink->dhcp4_6rd_tunnel_name &&
657 link_get_by_name(uplink->manager, uplink->dhcp4_6rd_tunnel_name, &tunnel) >= 0)
658 (void) link_remove(tunnel);
659}
660
80d62d4f 661static int dhcp4_unreachable_route_handler(sd_netlink *rtnl, sd_netlink_message *m, Request *req, Link *link, Route *route) {
e49bad01
YW
662 int r;
663
664 assert(link);
e49bad01 665
2c0b49ba 666 r = route_configure_handler_internal(rtnl, m, link, route, "Failed to set unreachable route for DHCPv4 delegated prefix");
e49bad01
YW
667 if (r <= 0)
668 return r;
669
670 r = dhcp4_check_ready(link);
671 if (r < 0)
672 link_enter_failed(link);
673
674 return 1;
675}
676
80d62d4f 677static int dhcp6_unreachable_route_handler(sd_netlink *rtnl, sd_netlink_message *m, Request *req, Link *link, Route *route) {
d5ebcf65
YW
678 int r;
679
680 assert(link);
d5ebcf65 681
2c0b49ba 682 r = route_configure_handler_internal(rtnl, m, link, route, "Failed to set unreachable route for DHCPv6 delegated prefix");
d5ebcf65
YW
683 if (r <= 0)
684 return r;
685
686 r = dhcp6_check_ready(link);
687 if (r < 0)
688 link_enter_failed(link);
689
690 return 1;
691}
692
a27588d4 693static int dhcp_request_unreachable_route(
5ed10a19
YW
694 Link *link,
695 const struct in6_addr *addr,
696 uint8_t prefixlen,
697 usec_t lifetime_usec,
a27588d4
YW
698 NetworkConfigSource source,
699 const union in_addr_union *server_address,
700 unsigned *counter,
706cd859
YW
701 route_netlink_handler_t callback,
702 bool *configured) {
5ed10a19 703
74c301b9 704 _cleanup_(route_unrefp) Route *route = NULL;
d5ebcf65
YW
705 Route *existing;
706 int r;
707
708 assert(link);
8d01e44c 709 assert(link->manager);
d5ebcf65 710 assert(addr);
a27588d4 711 assert(IN_SET(source, NETWORK_CONFIG_SOURCE_DHCP4, NETWORK_CONFIG_SOURCE_DHCP6));
5ed10a19 712 assert(server_address);
a27588d4
YW
713 assert(counter);
714 assert(callback);
706cd859 715 assert(configured);
d5ebcf65 716
a536ec38 717 if (prefixlen >= 64) {
a27588d4 718 log_link_debug(link, "Not adding a blocking route for DHCP delegated prefix %s since the prefix has length >= 64.",
c71384a9 719 IN6_ADDR_PREFIX_TO_STRING(addr, prefixlen));
d5ebcf65
YW
720 return 0;
721 }
722
723 r = route_new(&route);
724 if (r < 0)
725 return log_oom();
726
a27588d4 727 route->source = source;
5ed10a19 728 route->provider = *server_address;
d5ebcf65
YW
729 route->family = AF_INET6;
730 route->dst.in6 = *addr;
731 route->dst_prefixlen = prefixlen;
d5ebcf65
YW
732 route->type = RTN_UNREACHABLE;
733 route->protocol = RTPROT_DHCP;
557e1b52 734 route->priority = IP6_RT_PRIO_USER;
d5ebcf65
YW
735 route->lifetime_usec = lifetime_usec;
736
2f542fc3
YW
737 r = route_adjust_nexthops(route, link);
738 if (r < 0)
739 return r;
740
8d01e44c 741 if (route_get(link->manager, route, &existing) < 0)
706cd859 742 *configured = false;
d5ebcf65
YW
743 else
744 route_unmark(existing);
745
5a18697d 746 r = link_request_route(link, route, counter, callback);
c71384a9 747 if (r < 0)
a27588d4 748 return log_link_error_errno(link, r, "Failed to request unreachable route for DHCP delegated prefix %s: %m",
c71384a9 749 IN6_ADDR_PREFIX_TO_STRING(addr, prefixlen));
d5ebcf65
YW
750
751 return 0;
752}
753
e49bad01
YW
754static int dhcp4_request_unreachable_route(
755 Link *link,
756 const struct in6_addr *addr,
757 uint8_t prefixlen,
758 usec_t lifetime_usec,
759 const union in_addr_union *server_address) {
760
761 return dhcp_request_unreachable_route(link, addr, prefixlen, lifetime_usec,
762 NETWORK_CONFIG_SOURCE_DHCP4, server_address,
706cd859
YW
763 &link->dhcp4_messages, dhcp4_unreachable_route_handler,
764 &link->dhcp4_configured);
e49bad01
YW
765}
766
a27588d4
YW
767static int dhcp6_request_unreachable_route(
768 Link *link,
769 const struct in6_addr *addr,
770 uint8_t prefixlen,
771 usec_t lifetime_usec,
772 const union in_addr_union *server_address) {
773
774 return dhcp_request_unreachable_route(link, addr, prefixlen, lifetime_usec,
775 NETWORK_CONFIG_SOURCE_DHCP6, server_address,
706cd859
YW
776 &link->dhcp6_messages, dhcp6_unreachable_route_handler,
777 &link->dhcp6_configured);
a27588d4
YW
778}
779
780static int dhcp_pd_prefix_add(Link *link, const struct in6_addr *prefix, uint8_t prefixlen) {
d5ebcf65
YW
781 struct in_addr_prefix *p;
782 int r;
783
784 assert(link);
785 assert(prefix);
786
787 p = new(struct in_addr_prefix, 1);
788 if (!p)
789 return log_oom();
790
791 *p = (struct in_addr_prefix) {
792 .family = AF_INET6,
793 .prefixlen = prefixlen,
794 .address.in6 = *prefix,
795 };
796
c71384a9
ZJS
797 int log_level = set_contains(link->dhcp_pd_prefixes, p) ? LOG_DEBUG :
798 prefixlen > 64 || prefixlen < 48 ? LOG_WARNING : LOG_INFO;
d5ebcf65 799 log_link_full(link,
c71384a9 800 log_level,
21feba0a 801 "DHCP: received delegated prefix %s%s",
c71384a9 802 IN6_ADDR_PREFIX_TO_STRING(prefix, prefixlen),
d5ebcf65
YW
803 prefixlen > 64 ? " with prefix length > 64, ignoring." :
804 prefixlen < 48 ? " with prefix length < 48, looks unusual.": "");
805
806 /* Store PD prefix even if prefixlen > 64, not to make logged at warning level so frequently. */
a27588d4 807 r = set_ensure_consume(&link->dhcp_pd_prefixes, &in_addr_prefix_hash_ops_free, p);
d5ebcf65 808 if (r < 0)
c71384a9
ZJS
809 return log_link_error_errno(link, r, "Failed to store DHCP delegated prefix %s: %m",
810 IN6_ADDR_PREFIX_TO_STRING(prefix, prefixlen));
a536ec38 811 return 0;
d5ebcf65
YW
812}
813
e49bad01 814static int dhcp4_pd_request_default_gateway_on_6rd_tunnel(Link *link, const struct in_addr *br_address, usec_t lifetime_usec) {
74c301b9 815 _cleanup_(route_unrefp) Route *route = NULL;
e49bad01
YW
816 Route *existing;
817 int r;
818
819 assert(link);
8d01e44c 820 assert(link->manager);
e49bad01
YW
821 assert(br_address);
822
823 r = route_new(&route);
824 if (r < 0)
825 return log_link_debug_errno(link, r, "Failed to allocate default gateway for DHCP delegated prefix: %m");
826
827 route->source = NETWORK_CONFIG_SOURCE_DHCP_PD;
828 route->family = AF_INET6;
054b8c28
YW
829 route->nexthop.family = AF_INET6;
830 route->nexthop.gw.in6.s6_addr32[3] = br_address->s_addr;
e49bad01
YW
831 route->scope = RT_SCOPE_UNIVERSE;
832 route->protocol = RTPROT_DHCP;
833 route->priority = IP6_RT_PRIO_USER;
834 route->lifetime_usec = lifetime_usec;
835
2f542fc3
YW
836 r = route_adjust_nexthops(route, link);
837 if (r < 0)
838 return r;
839
8d01e44c 840 if (route_get(link->manager, route, &existing) < 0) /* This is a new route. */
e49bad01
YW
841 link->dhcp_pd_configured = false;
842 else
843 route_unmark(existing);
844
5a18697d 845 r = link_request_route(link, route, &link->dhcp_pd_messages, dhcp_pd_route_handler);
e49bad01
YW
846 if (r < 0)
847 return log_link_debug_errno(link, r, "Failed to request default gateway for DHCP delegated prefix: %m");
848
849 return 0;
850}
851
852static void dhcp4_calculate_pd_prefix(
853 const struct in_addr *ipv4address,
854 uint8_t ipv4masklen,
855 const struct in6_addr *sixrd_prefix,
856 uint8_t sixrd_prefixlen,
857 struct in6_addr *ret_pd_prefix,
858 uint8_t *ret_pd_prefixlen) {
859
860 struct in6_addr pd_prefix;
861
862 assert(ipv4address);
863 assert(ipv4masklen <= 32);
864 assert(sixrd_prefix);
865 assert(32 - ipv4masklen + sixrd_prefixlen <= 128);
866 assert(ret_pd_prefix);
867
868 pd_prefix = *sixrd_prefix;
869 for (unsigned i = 0; i < (unsigned) (32 - ipv4masklen); i++)
870 if (ipv4address->s_addr & htobe32(UINT32_C(1) << (32 - ipv4masklen - i - 1)))
871 pd_prefix.s6_addr[(i + sixrd_prefixlen) / 8] |= 1 << (7 - (i + sixrd_prefixlen) % 8);
872
873 *ret_pd_prefix = pd_prefix;
874 if (ret_pd_prefixlen)
875 *ret_pd_prefixlen = 32 - ipv4masklen + sixrd_prefixlen;
876}
877
878static int dhcp4_pd_assign_subnet_prefix(Link *link, Link *uplink) {
879 uint8_t ipv4masklen, sixrd_prefixlen, pd_prefixlen;
880 struct in6_addr sixrd_prefix, pd_prefix;
881 const struct in_addr *br_addresses;
882 struct in_addr ipv4address;
a93538e8 883 usec_t lifetime_usec;
e49bad01
YW
884 int r;
885
886 assert(link);
887 assert(uplink);
def4741b 888 assert(uplink->manager);
e49bad01
YW
889 assert(uplink->dhcp_lease);
890
891 r = sd_dhcp_lease_get_address(uplink->dhcp_lease, &ipv4address);
892 if (r < 0)
893 return log_link_warning_errno(uplink, r, "Failed to get DHCPv4 address: %m");
894
a93538e8 895 r = sd_dhcp_lease_get_lifetime_timestamp(uplink->dhcp_lease, CLOCK_BOOTTIME, &lifetime_usec);
e49bad01
YW
896 if (r < 0)
897 return log_link_warning_errno(uplink, r, "Failed to get lifetime of DHCPv4 lease: %m");
898
e49bad01
YW
899 r = sd_dhcp_lease_get_6rd(uplink->dhcp_lease, &ipv4masklen, &sixrd_prefixlen, &sixrd_prefix, &br_addresses, NULL);
900 if (r < 0)
21feba0a 901 return log_link_warning_errno(uplink, r, "Failed to get DHCPv4 6rd option: %m");
e49bad01
YW
902
903 dhcp4_calculate_pd_prefix(&ipv4address, ipv4masklen, &sixrd_prefix, sixrd_prefixlen, &pd_prefix, &pd_prefixlen);
904
905 if (pd_prefixlen > 64)
906 return 0;
907
908 r = dhcp_pd_prepare(link);
909 if (r <= 0)
910 return r;
911
912 if (streq_ptr(uplink->dhcp4_6rd_tunnel_name, link->ifname)) {
e49bad01
YW
913 r = dhcp4_pd_request_default_gateway_on_6rd_tunnel(link, &br_addresses[0], lifetime_usec);
914 if (r < 0)
915 return r;
e49bad01
YW
916 }
917
38488bab
YW
918 r = dhcp_pd_assign_subnet_prefix(link, &pd_prefix, pd_prefixlen, lifetime_usec, lifetime_usec, /* is_uplink = */ false);
919 if (r < 0)
920 return r;
921
e49bad01
YW
922 return dhcp_pd_finalize(link);
923}
924
925static int dhcp4_pd_6rd_tunnel_create_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
926 int r;
927
928 assert(m);
929 assert(link);
930 assert(link->manager);
931 assert(link->dhcp4_6rd_tunnel_name);
932
933 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
934 return 0;
935
936 r = sd_netlink_message_get_errno(m);
937 if (r < 0) {
21feba0a 938 log_link_message_warning_errno(link, m, r, "Failed to create tunnel device for DHCPv4 6rd");
e49bad01
YW
939 link_enter_failed(link);
940 return 0;
941 }
942
943 return 0;
944}
945
946int dhcp4_pd_prefix_acquired(Link *uplink) {
947 _cleanup_free_ char *tunnel_name = NULL;
948 uint8_t ipv4masklen, sixrd_prefixlen, pd_prefixlen;
949 struct in6_addr sixrd_prefix, pd_prefix;
950 struct in_addr ipv4address;
951 union in_addr_union server_address;
21feba0a 952 const struct in_addr *br_addresses;
a93538e8 953 usec_t lifetime_usec;
e49bad01
YW
954 Link *link;
955 int r;
956
957 assert(uplink);
def4741b 958 assert(uplink->manager);
e49bad01
YW
959 assert(uplink->dhcp_lease);
960
961 r = sd_dhcp_lease_get_address(uplink->dhcp_lease, &ipv4address);
962 if (r < 0)
963 return log_link_warning_errno(uplink, r, "Failed to get DHCPv4 address: %m");
964
a93538e8 965 r = sd_dhcp_lease_get_lifetime_timestamp(uplink->dhcp_lease, CLOCK_BOOTTIME, &lifetime_usec);
e49bad01
YW
966 if (r < 0)
967 return log_link_warning_errno(uplink, r, "Failed to get lifetime of DHCPv4 lease: %m");
968
e49bad01
YW
969 r = sd_dhcp_lease_get_server_identifier(uplink->dhcp_lease, &server_address.in);
970 if (r < 0)
971 return log_link_warning_errno(uplink, r, "Failed to get server address of DHCPv4 lease: %m");
972
21feba0a 973 r = sd_dhcp_lease_get_6rd(uplink->dhcp_lease, &ipv4masklen, &sixrd_prefixlen, &sixrd_prefix, &br_addresses, NULL);
e49bad01 974 if (r < 0)
21feba0a
YW
975 return log_link_warning_errno(uplink, r, "Failed to get DHCPv4 6rd option: %m");
976
c71384a9 977 if (DEBUG_LOGGING)
21feba0a 978 log_link_debug(uplink, "DHCPv4: 6rd option is acquired: IPv4_masklen=%u, 6rd_prefix=%s, br_address="IPV4_ADDRESS_FMT_STR,
c71384a9
ZJS
979 ipv4masklen,
980 IN6_ADDR_PREFIX_TO_STRING(&sixrd_prefix, sixrd_prefixlen),
981 IPV4_ADDRESS_FMT_VAL(*br_addresses));
e49bad01
YW
982
983 /* Calculate PD prefix */
984 dhcp4_calculate_pd_prefix(&ipv4address, ipv4masklen, &sixrd_prefix, sixrd_prefixlen, &pd_prefix, &pd_prefixlen);
985
986 /* Register and log PD prefix */
987 r = dhcp_pd_prefix_add(uplink, &pd_prefix, pd_prefixlen);
988 if (r < 0)
989 return r;
990
991 /* Request unreachable route */
992 r = dhcp4_request_unreachable_route(uplink, &pd_prefix, pd_prefixlen, lifetime_usec, &server_address);
993 if (r < 0)
994 return r;
995
996 /* Generate 6rd SIT tunnel device name. */
997 r = dhcp4_pd_create_6rd_tunnel_name(uplink, &tunnel_name);
998 if (r < 0)
999 return r;
1000
1001 /* Remove old tunnel device if exists. */
1002 if (!streq_ptr(uplink->dhcp4_6rd_tunnel_name, tunnel_name)) {
1003 Link *old_tunnel;
1004
1005 if (uplink->dhcp4_6rd_tunnel_name &&
1006 link_get_by_name(uplink->manager, uplink->dhcp4_6rd_tunnel_name, &old_tunnel) >= 0)
1007 (void) link_remove(old_tunnel);
1008
1009 free_and_replace(uplink->dhcp4_6rd_tunnel_name, tunnel_name);
1010 }
1011
1012 /* Create 6rd SIT tunnel device if it does not exist yet. */
1013 if (link_get_by_name(uplink->manager, uplink->dhcp4_6rd_tunnel_name, NULL) < 0) {
1014 r = dhcp4_pd_create_6rd_tunnel(uplink, dhcp4_pd_6rd_tunnel_create_handler);
1015 if (r < 0)
1016 return r;
1017 }
1018
1019 /* Then, assign subnet prefixes to downstream interfaces. */
1020 HASHMAP_FOREACH(link, uplink->manager->links_by_index) {
1021 if (!dhcp_pd_is_uplink(link, uplink, /* accept_auto = */ true))
1022 continue;
1023
1024 r = dhcp4_pd_assign_subnet_prefix(link, uplink);
1025 if (r < 0) {
1026 /* When failed on the upstream interface (i.e., the case link == uplink),
1027 * immediately abort the assignment of the prefixes. As, the all assigned
1028 * prefixes will be dropped soon in link_enter_failed(), and it is meaningless
1029 * to continue the assignment. */
1030 if (link == uplink)
1031 return r;
1032
1033 link_enter_failed(link);
1034 }
1035 }
1036
1037 return 0;
1038}
1039
a27588d4 1040static int dhcp6_pd_assign_subnet_prefixes(Link *link, Link *uplink) {
d5ebcf65
YW
1041 int r;
1042
5014e660
YW
1043 assert(link);
1044 assert(uplink);
1045 assert(uplink->dhcp6_lease);
d5ebcf65 1046
a27588d4 1047 r = dhcp_pd_prepare(link);
c3cd5351 1048 if (r <= 0)
5014e660 1049 return r;
d5ebcf65 1050
d8ec95c7
YW
1051 FOREACH_DHCP6_PD_PREFIX(uplink->dhcp6_lease) {
1052 usec_t lifetime_preferred_usec, lifetime_valid_usec;
d5ebcf65
YW
1053 struct in6_addr pd_prefix;
1054 uint8_t pd_prefix_len;
1055
d8ec95c7 1056 r = sd_dhcp6_lease_get_pd_prefix(uplink->dhcp6_lease, &pd_prefix, &pd_prefix_len);
d5ebcf65 1057 if (r < 0)
d8ec95c7 1058 return r;
d5ebcf65 1059
5014e660 1060 if (pd_prefix_len > 64)
d5ebcf65
YW
1061 continue;
1062
d5ebcf65
YW
1063 /* Mask prefix for safety. */
1064 r = in6_addr_mask(&pd_prefix, pd_prefix_len);
1065 if (r < 0)
5014e660 1066 return r;
d5ebcf65 1067
d8ec95c7
YW
1068 r = sd_dhcp6_lease_get_pd_lifetime_timestamp(uplink->dhcp6_lease, CLOCK_BOOTTIME,
1069 &lifetime_preferred_usec, &lifetime_valid_usec);
1070 if (r < 0)
1071 return r;
1072
38488bab 1073 r = dhcp_pd_assign_subnet_prefix(link, &pd_prefix, pd_prefix_len,
d8ec95c7 1074 lifetime_preferred_usec, lifetime_valid_usec,
38488bab 1075 /* is_uplink = */ link == uplink);
d5ebcf65
YW
1076 if (r < 0)
1077 return r;
1078 }
1079
a27588d4 1080 return dhcp_pd_finalize(link);
d5ebcf65
YW
1081}
1082
a27588d4 1083int dhcp6_pd_prefix_acquired(Link *uplink) {
5ed10a19 1084 union in_addr_union server_address;
d5ebcf65 1085 Link *link;
d5ebcf65
YW
1086 int r;
1087
a27588d4
YW
1088 assert(uplink);
1089 assert(uplink->dhcp6_lease);
d5ebcf65 1090
a27588d4 1091 r = sd_dhcp6_lease_get_server_address(uplink->dhcp6_lease, &server_address.in6);
5ed10a19 1092 if (r < 0)
a27588d4 1093 return log_link_warning_errno(uplink, r, "Failed to get server address of DHCPv6 lease: %m");
5ed10a19 1094
41664456 1095 /* First, logs acquired prefixes and request unreachable routes. */
d8ec95c7
YW
1096 FOREACH_DHCP6_PD_PREFIX(uplink->dhcp6_lease) {
1097 usec_t lifetime_valid_usec;
d5ebcf65
YW
1098 struct in6_addr pd_prefix;
1099 uint8_t pd_prefix_len;
1100
d8ec95c7 1101 r = sd_dhcp6_lease_get_pd_prefix(uplink->dhcp6_lease, &pd_prefix, &pd_prefix_len);
d5ebcf65 1102 if (r < 0)
d8ec95c7 1103 return r;
d5ebcf65 1104
d5ebcf65
YW
1105 /* Mask prefix for safety. */
1106 r = in6_addr_mask(&pd_prefix, pd_prefix_len);
41664456 1107 if (r < 0)
21feba0a 1108 return log_link_error_errno(uplink, r, "Failed to mask DHCPv6 delegated prefix: %m");
41664456 1109
a27588d4 1110 r = dhcp_pd_prefix_add(uplink, &pd_prefix, pd_prefix_len);
d5ebcf65
YW
1111 if (r < 0)
1112 return r;
1113
d8ec95c7
YW
1114 r = sd_dhcp6_lease_get_pd_lifetime_timestamp(uplink->dhcp6_lease, CLOCK_BOOTTIME,
1115 NULL, &lifetime_valid_usec);
1116 if (r < 0)
1117 return r;
1118
5235d739 1119 r = dhcp6_request_unreachable_route(uplink, &pd_prefix, pd_prefix_len,
d8ec95c7 1120 lifetime_valid_usec, &server_address);
d5ebcf65
YW
1121 if (r < 0)
1122 return r;
1123 }
1124
41664456 1125 /* Then, assign subnet prefixes. */
a27588d4
YW
1126 HASHMAP_FOREACH(link, uplink->manager->links_by_index) {
1127 if (!dhcp_pd_is_uplink(link, uplink, /* accept_auto = */ true))
41664456
YW
1128 continue;
1129
a27588d4 1130 r = dhcp6_pd_assign_subnet_prefixes(link, uplink);
d5ebcf65 1131 if (r < 0) {
a27588d4 1132 /* When failed on the upstream interface (i.e., the case link == uplink),
41664456
YW
1133 * immediately abort the assignment of the prefixes. As, the all assigned
1134 * prefixes will be dropped soon in link_enter_failed(), and it is meaningless
1135 * to continue the assignment. */
a27588d4 1136 if (link == uplink)
d5ebcf65
YW
1137 return r;
1138
1139 link_enter_failed(link);
1140 }
1141 }
d5ebcf65
YW
1142
1143 return 0;
1144}
1145
e49bad01
YW
1146static bool dhcp4_pd_uplink_is_ready(Link *link) {
1147 assert(link);
1148
1149 if (!link->network)
1150 return false;
1151
1152 if (!link->network->dhcp_use_6rd)
1153 return false;
1154
1155 if (!IN_SET(link->state, LINK_STATE_CONFIGURING, LINK_STATE_CONFIGURED))
1156 return false;
1157
1158 if (!link->dhcp_client)
1159 return false;
1160
1161 if (sd_dhcp_client_is_running(link->dhcp_client) <= 0)
1162 return false;
1163
0ad8d953 1164 return sd_dhcp_lease_has_6rd(link->dhcp_lease);
e49bad01
YW
1165}
1166
d5ebcf65
YW
1167static bool dhcp6_pd_uplink_is_ready(Link *link) {
1168 assert(link);
1169
1170 if (!link->network)
1171 return false;
1172
1173 if (!link->network->dhcp6_use_pd_prefix)
1174 return false;
1175
1176 if (!IN_SET(link->state, LINK_STATE_CONFIGURING, LINK_STATE_CONFIGURED))
1177 return false;
1178
1179 if (!link->dhcp6_client)
1180 return false;
1181
1182 if (sd_dhcp6_client_is_running(link->dhcp6_client) <= 0)
1183 return false;
1184
fb70992d 1185 return sd_dhcp6_lease_has_pd_prefix(link->dhcp6_lease);
d5ebcf65
YW
1186}
1187
a27588d4 1188int dhcp_pd_find_uplink(Link *link, Link **ret) {
d5ebcf65
YW
1189 Link *uplink = NULL;
1190 int r = 0;
1191
1192 assert(link);
1193 assert(link->manager);
a27588d4 1194 assert(link_dhcp_pd_is_enabled(link));
d5ebcf65
YW
1195 assert(ret);
1196
a27588d4
YW
1197 if (link->network->dhcp_pd_uplink_name)
1198 r = link_get_by_name(link->manager, link->network->dhcp_pd_uplink_name, &uplink);
1199 else if (link->network->dhcp_pd_uplink_index > 0)
1200 r = link_get_by_index(link->manager, link->network->dhcp_pd_uplink_index, &uplink);
1201 else if (link->network->dhcp_pd_uplink_index == UPLINK_INDEX_SELF)
d5ebcf65
YW
1202 uplink = link;
1203 if (r < 0)
1204 return r;
1205
1206 if (uplink) {
e49bad01
YW
1207 if (dhcp4_pd_uplink_is_ready(uplink)) {
1208 *ret = uplink;
1209 return AF_INET;
1210 }
d5ebcf65 1211
e49bad01
YW
1212 if (dhcp6_pd_uplink_is_ready(uplink)) {
1213 *ret = uplink;
1214 return AF_INET6;
1215 }
1216
1217 return -EBUSY;
d5ebcf65
YW
1218 }
1219
1220 HASHMAP_FOREACH(uplink, link->manager->links_by_index) {
d5ebcf65 1221 /* Assume that there exists at most one link which acquired delegated prefixes. */
e49bad01
YW
1222 if (dhcp4_pd_uplink_is_ready(uplink)) {
1223 *ret = uplink;
1224 return AF_INET;
1225 }
1226
1227 if (dhcp6_pd_uplink_is_ready(uplink)) {
1228 *ret = uplink;
1229 return AF_INET6;
1230 }
d5ebcf65
YW
1231 }
1232
1233 return -ENODEV;
1234}
1235
a27588d4 1236int dhcp_request_prefix_delegation(Link *link) {
d5ebcf65 1237 Link *uplink;
e49bad01 1238 int r;
d5ebcf65
YW
1239
1240 assert(link);
1241
a27588d4 1242 if (!link_dhcp_pd_is_enabled(link))
d5ebcf65
YW
1243 return 0;
1244
e49bad01
YW
1245 r = dhcp_pd_find_uplink(link, &uplink);
1246 if (r < 0)
d5ebcf65
YW
1247 return 0;
1248
e49bad01
YW
1249 log_link_debug(link, "Requesting subnets of delegated prefixes acquired by DHCPv%c client on %s",
1250 r == AF_INET ? '4' : '6', uplink->ifname);
1251
1252 return r == AF_INET ?
1253 dhcp4_pd_assign_subnet_prefix(link, uplink) :
1254 dhcp6_pd_assign_subnet_prefixes(link, uplink);
d5ebcf65
YW
1255}
1256
a27588d4 1257int config_parse_dhcp_pd_subnet_id(
d5ebcf65
YW
1258 const char *unit,
1259 const char *filename,
1260 unsigned line,
1261 const char *section,
1262 unsigned section_line,
1263 const char *lvalue,
1264 int ltype,
1265 const char *rvalue,
1266 void *data,
1267 void *userdata) {
1268
99534007 1269 int64_t *p = ASSERT_PTR(data);
d5ebcf65
YW
1270 uint64_t t;
1271 int r;
1272
1273 assert(filename);
1274 assert(lvalue);
1275 assert(rvalue);
d5ebcf65
YW
1276
1277 if (isempty(rvalue) || streq(rvalue, "auto")) {
1278 *p = -1;
1279 return 0;
1280 }
1281
1282 r = safe_atoux64(rvalue, &t);
1283 if (r < 0) {
1284 log_syntax(unit, LOG_WARNING, filename, line, r,
1285 "Failed to parse %s=, ignoring assignment: %s",
1286 lvalue, rvalue);
1287 return 0;
1288 }
1289 if (t > INT64_MAX) {
1290 log_syntax(unit, LOG_WARNING, filename, line, 0,
1291 "Invalid subnet id '%s', ignoring assignment.",
1292 rvalue);
1293 return 0;
1294 }
1295
1296 *p = (int64_t) t;
1297
1298 return 0;
1299}