]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/network/networkd-radv.c
Merge pull request #28474 from yuwata/chase-fix
[thirdparty/systemd.git] / src / network / networkd-radv.c
1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
2 /***
3 Copyright © 2017 Intel Corporation. All rights reserved.
4 ***/
5
6 #include <netinet/icmp6.h>
7 #include <arpa/inet.h>
8
9 #include "dns-domain.h"
10 #include "networkd-address-generation.h"
11 #include "networkd-address.h"
12 #include "networkd-dhcp-prefix-delegation.h"
13 #include "networkd-link.h"
14 #include "networkd-manager.h"
15 #include "networkd-network.h"
16 #include "networkd-queue.h"
17 #include "networkd-radv.h"
18 #include "networkd-route-util.h"
19 #include "parse-util.h"
20 #include "radv-internal.h"
21 #include "string-util.h"
22 #include "string-table.h"
23 #include "strv.h"
24
25 void network_adjust_radv(Network *network) {
26 assert(network);
27
28 /* After this function is called, network->router_prefix_delegation can be treated as a boolean. */
29
30 if (network->dhcp_pd < 0)
31 /* For backward compatibility. */
32 network->dhcp_pd = FLAGS_SET(network->router_prefix_delegation, RADV_PREFIX_DELEGATION_DHCP6);
33
34 if (!FLAGS_SET(network->link_local, ADDRESS_FAMILY_IPV6)) {
35 if (network->router_prefix_delegation != RADV_PREFIX_DELEGATION_NONE)
36 log_warning("%s: IPv6PrefixDelegation= is enabled but IPv6 link-local addressing is disabled. "
37 "Disabling IPv6PrefixDelegation=.", network->filename);
38
39 network->router_prefix_delegation = RADV_PREFIX_DELEGATION_NONE;
40 }
41
42 if (network->router_prefix_delegation == RADV_PREFIX_DELEGATION_NONE) {
43 network->n_router_dns = 0;
44 network->router_dns = mfree(network->router_dns);
45 network->router_search_domains = ordered_set_free(network->router_search_domains);
46 }
47
48 if (!FLAGS_SET(network->router_prefix_delegation, RADV_PREFIX_DELEGATION_STATIC)) {
49 network->prefixes_by_section = hashmap_free_with_destructor(network->prefixes_by_section, prefix_free);
50 network->route_prefixes_by_section = hashmap_free_with_destructor(network->route_prefixes_by_section, route_prefix_free);
51 }
52 }
53
54 bool link_radv_enabled(Link *link) {
55 assert(link);
56
57 if (!link_may_have_ipv6ll(link, /* check_multicast = */ true))
58 return false;
59
60 if (link->hw_addr.length != ETH_ALEN)
61 return false;
62
63 return link->network->router_prefix_delegation;
64 }
65
66 Prefix *prefix_free(Prefix *prefix) {
67 if (!prefix)
68 return NULL;
69
70 if (prefix->network) {
71 assert(prefix->section);
72 hashmap_remove(prefix->network->prefixes_by_section, prefix->section);
73 }
74
75 config_section_free(prefix->section);
76 set_free(prefix->tokens);
77
78 return mfree(prefix);
79 }
80
81 DEFINE_SECTION_CLEANUP_FUNCTIONS(Prefix, prefix_free);
82
83 static int prefix_new_static(Network *network, const char *filename, unsigned section_line, Prefix **ret) {
84 _cleanup_(config_section_freep) ConfigSection *n = NULL;
85 _cleanup_(prefix_freep) Prefix *prefix = NULL;
86 int r;
87
88 assert(network);
89 assert(ret);
90 assert(filename);
91 assert(section_line > 0);
92
93 r = config_section_new(filename, section_line, &n);
94 if (r < 0)
95 return r;
96
97 prefix = hashmap_get(network->prefixes_by_section, n);
98 if (prefix) {
99 *ret = TAKE_PTR(prefix);
100 return 0;
101 }
102
103 prefix = new(Prefix, 1);
104 if (!prefix)
105 return -ENOMEM;
106
107 *prefix = (Prefix) {
108 .network = network,
109 .section = TAKE_PTR(n),
110
111 .preferred_lifetime = RADV_DEFAULT_PREFERRED_LIFETIME_USEC,
112 .valid_lifetime = RADV_DEFAULT_VALID_LIFETIME_USEC,
113 .onlink = true,
114 .address_auto_configuration = true,
115 };
116
117 r = hashmap_ensure_put(&network->prefixes_by_section, &config_section_hash_ops, prefix->section, prefix);
118 if (r < 0)
119 return r;
120
121 *ret = TAKE_PTR(prefix);
122 return 0;
123 }
124
125 RoutePrefix *route_prefix_free(RoutePrefix *prefix) {
126 if (!prefix)
127 return NULL;
128
129 if (prefix->network) {
130 assert(prefix->section);
131 hashmap_remove(prefix->network->route_prefixes_by_section, prefix->section);
132 }
133
134 config_section_free(prefix->section);
135
136 return mfree(prefix);
137 }
138
139 DEFINE_SECTION_CLEANUP_FUNCTIONS(RoutePrefix, route_prefix_free);
140
141 static int route_prefix_new_static(Network *network, const char *filename, unsigned section_line, RoutePrefix **ret) {
142 _cleanup_(config_section_freep) ConfigSection *n = NULL;
143 _cleanup_(route_prefix_freep) RoutePrefix *prefix = NULL;
144 int r;
145
146 assert(network);
147 assert(ret);
148 assert(filename);
149 assert(section_line > 0);
150
151 r = config_section_new(filename, section_line, &n);
152 if (r < 0)
153 return r;
154
155 prefix = hashmap_get(network->route_prefixes_by_section, n);
156 if (prefix) {
157 *ret = TAKE_PTR(prefix);
158 return 0;
159 }
160
161 prefix = new(RoutePrefix, 1);
162 if (!prefix)
163 return -ENOMEM;
164
165 *prefix = (RoutePrefix) {
166 .network = network,
167 .section = TAKE_PTR(n),
168
169 .lifetime = RADV_DEFAULT_VALID_LIFETIME_USEC,
170 };
171
172 r = hashmap_ensure_put(&network->route_prefixes_by_section, &config_section_hash_ops, prefix->section, prefix);
173 if (r < 0)
174 return r;
175
176 *ret = TAKE_PTR(prefix);
177 return 0;
178 }
179
180 int link_request_radv_addresses(Link *link) {
181 Prefix *p;
182 int r;
183
184 assert(link);
185
186 if (!link_radv_enabled(link))
187 return 0;
188
189 HASHMAP_FOREACH(p, link->network->prefixes_by_section) {
190 _cleanup_set_free_ Set *addresses = NULL;
191 struct in6_addr *a;
192
193 if (!p->assign)
194 continue;
195
196 /* radv_generate_addresses() below requires the prefix length <= 64. */
197 if (p->prefixlen > 64)
198 continue;
199
200 r = radv_generate_addresses(link, p->tokens, &p->prefix, p->prefixlen, &addresses);
201 if (r < 0)
202 return r;
203
204 SET_FOREACH(a, addresses) {
205 _cleanup_(address_freep) Address *address = NULL;
206
207 r = address_new(&address);
208 if (r < 0)
209 return -ENOMEM;
210
211 address->source = NETWORK_CONFIG_SOURCE_STATIC;
212 address->family = AF_INET6;
213 address->in_addr.in6 = *a;
214 address->prefixlen = p->prefixlen;
215 address->route_metric = p->route_metric;
216
217 r = link_request_static_address(link, address);
218 if (r < 0)
219 return r;
220 }
221 }
222
223 return 0;
224 }
225
226 static uint32_t usec_to_lifetime(usec_t usec) {
227 uint64_t t;
228
229 if (usec == USEC_INFINITY)
230 return UINT32_MAX;
231
232 t = DIV_ROUND_UP(usec, USEC_PER_SEC);
233 if (t >= UINT32_MAX)
234 return UINT32_MAX;
235
236 return (uint32_t) t;
237 }
238
239 static int radv_set_prefix(Link *link, Prefix *prefix) {
240 _cleanup_(sd_radv_prefix_unrefp) sd_radv_prefix *p = NULL;
241 int r;
242
243 assert(link);
244 assert(link->radv);
245 assert(prefix);
246
247 r = sd_radv_prefix_new(&p);
248 if (r < 0)
249 return r;
250
251 r = sd_radv_prefix_set_prefix(p, &prefix->prefix, prefix->prefixlen);
252 if (r < 0)
253 return r;
254
255 r = sd_radv_prefix_set_preferred_lifetime(p, prefix->preferred_lifetime, USEC_INFINITY);
256 if (r < 0)
257 return r;
258
259 r = sd_radv_prefix_set_valid_lifetime(p, prefix->valid_lifetime, USEC_INFINITY);
260 if (r < 0)
261 return r;
262
263 r = sd_radv_prefix_set_onlink(p, prefix->onlink);
264 if (r < 0)
265 return r;
266
267 r = sd_radv_prefix_set_address_autoconfiguration(p, prefix->address_auto_configuration);
268 if (r < 0)
269 return r;
270
271 return sd_radv_add_prefix(link->radv, p);
272 }
273
274 static int radv_set_route_prefix(Link *link, RoutePrefix *prefix) {
275 _cleanup_(sd_radv_route_prefix_unrefp) sd_radv_route_prefix *p = NULL;
276 int r;
277
278 assert(link);
279 assert(link->radv);
280 assert(prefix);
281
282 r = sd_radv_route_prefix_new(&p);
283 if (r < 0)
284 return r;
285
286 r = sd_radv_route_prefix_set_prefix(p, &prefix->prefix, prefix->prefixlen);
287 if (r < 0)
288 return r;
289
290 r = sd_radv_route_prefix_set_lifetime(p, prefix->lifetime, USEC_INFINITY);
291 if (r < 0)
292 return r;
293
294 return sd_radv_add_route_prefix(link->radv, p);
295 }
296
297 static int network_get_ipv6_dns(Network *network, struct in6_addr **ret_addresses, size_t *ret_size) {
298 _cleanup_free_ struct in6_addr *addresses = NULL;
299 size_t n_addresses = 0;
300
301 assert(network);
302 assert(ret_addresses);
303 assert(ret_size);
304
305 for (size_t i = 0; i < network->n_dns; i++) {
306 union in_addr_union *addr;
307
308 if (network->dns[i]->family != AF_INET6)
309 continue;
310
311 addr = &network->dns[i]->address;
312
313 if (in_addr_is_null(AF_INET6, addr) ||
314 in_addr_is_link_local(AF_INET6, addr) ||
315 in_addr_is_localhost(AF_INET6, addr))
316 continue;
317
318 if (!GREEDY_REALLOC(addresses, n_addresses + 1))
319 return -ENOMEM;
320
321 addresses[n_addresses++] = addr->in6;
322 }
323
324 *ret_addresses = TAKE_PTR(addresses);
325 *ret_size = n_addresses;
326
327 return n_addresses;
328 }
329
330 static int radv_set_dns(Link *link, Link *uplink) {
331 _cleanup_free_ struct in6_addr *dns = NULL;
332 size_t n_dns;
333 int r;
334
335 if (!link->network->router_emit_dns)
336 return 0;
337
338 if (link->network->router_dns) {
339 struct in6_addr *p;
340
341 dns = new(struct in6_addr, link->network->n_router_dns);
342 if (!dns)
343 return -ENOMEM;
344
345 p = dns;
346 for (size_t i = 0; i < link->network->n_router_dns; i++)
347 if (in6_addr_is_null(&link->network->router_dns[i])) {
348 if (in6_addr_is_set(&link->ipv6ll_address))
349 *(p++) = link->ipv6ll_address;
350 } else
351 *(p++) = link->network->router_dns[i];
352
353 n_dns = p - dns;
354
355 goto set_dns;
356 }
357
358 r = network_get_ipv6_dns(link->network, &dns, &n_dns);
359 if (r > 0)
360 goto set_dns;
361
362 if (uplink) {
363 assert(uplink->network);
364
365 r = network_get_ipv6_dns(uplink->network, &dns, &n_dns);
366 if (r > 0)
367 goto set_dns;
368 }
369
370 return 0;
371
372 set_dns:
373 return sd_radv_set_rdnss(link->radv,
374 usec_to_lifetime(link->network->router_dns_lifetime_usec),
375 dns, n_dns);
376 }
377
378 static int radv_set_domains(Link *link, Link *uplink) {
379 _cleanup_free_ char **s = NULL; /* just free() because the strings are owned by the set */
380 OrderedSet *search_domains;
381
382 if (!link->network->router_emit_domains)
383 return 0;
384
385 search_domains = link->network->router_search_domains;
386
387 if (search_domains)
388 goto set_domains;
389
390 search_domains = link->network->search_domains;
391 if (search_domains)
392 goto set_domains;
393
394 if (uplink) {
395 assert(uplink->network);
396
397 search_domains = uplink->network->search_domains;
398 if (search_domains)
399 goto set_domains;
400 }
401
402 return 0;
403
404 set_domains:
405 s = ordered_set_get_strv(search_domains);
406 if (!s)
407 return log_oom();
408
409 return sd_radv_set_dnssl(link->radv,
410 usec_to_lifetime(link->network->router_dns_lifetime_usec),
411 s);
412
413 }
414
415 static int radv_find_uplink(Link *link, Link **ret) {
416 int r;
417
418 assert(link);
419
420 if (link->network->router_uplink_name)
421 return link_get_by_name(link->manager, link->network->router_uplink_name, ret);
422
423 if (link->network->router_uplink_index > 0)
424 return link_get_by_index(link->manager, link->network->router_uplink_index, ret);
425
426 if (link->network->router_uplink_index == UPLINK_INDEX_AUTO) {
427 if (link_dhcp_pd_is_enabled(link))
428 r = dhcp_pd_find_uplink(link, ret); /* When DHCP-PD is enabled, use its uplink. */
429 else
430 r = manager_find_uplink(link->manager, AF_INET6, link, ret);
431 if (r < 0)
432 /* It is not necessary to propagate error in automatic selection. */
433 *ret = NULL;
434 return 0;
435 }
436
437 *ret = NULL;
438 return 0;
439 }
440
441 static int radv_configure(Link *link) {
442 Link *uplink = NULL;
443 RoutePrefix *q;
444 Prefix *p;
445 int r;
446
447 assert(link);
448 assert(link->network);
449
450 if (link->radv)
451 return -EBUSY;
452
453 r = sd_radv_new(&link->radv);
454 if (r < 0)
455 return r;
456
457 r = sd_radv_attach_event(link->radv, link->manager->event, 0);
458 if (r < 0)
459 return r;
460
461 if (link->hw_addr.length == ETH_ALEN) {
462 r = sd_radv_set_mac(link->radv, &link->hw_addr.ether);
463 if (r < 0)
464 return r;
465 }
466
467 r = sd_radv_set_ifindex(link->radv, link->ifindex);
468 if (r < 0)
469 return r;
470
471 r = sd_radv_set_managed_information(link->radv, link->network->router_managed);
472 if (r < 0)
473 return r;
474
475 r = sd_radv_set_other_information(link->radv, link->network->router_other_information);
476 if (r < 0)
477 return r;
478
479 r = sd_radv_set_router_lifetime(link->radv, link->network->router_lifetime_usec);
480 if (r < 0)
481 return r;
482
483 if (link->network->router_lifetime_usec > 0) {
484 r = sd_radv_set_preference(link->radv, link->network->router_preference);
485 if (r < 0)
486 return r;
487 }
488
489 HASHMAP_FOREACH(p, link->network->prefixes_by_section) {
490 r = radv_set_prefix(link, p);
491 if (r < 0 && r != -EEXIST)
492 return r;
493 }
494
495 HASHMAP_FOREACH(q, link->network->route_prefixes_by_section) {
496 r = radv_set_route_prefix(link, q);
497 if (r < 0 && r != -EEXIST)
498 return r;
499 }
500
501 (void) radv_find_uplink(link, &uplink);
502
503 r = radv_set_dns(link, uplink);
504 if (r < 0)
505 return log_link_debug_errno(link, r, "Could not set RA DNS: %m");
506
507 r = radv_set_domains(link, uplink);
508 if (r < 0)
509 return log_link_debug_errno(link, r, "Could not set RA Domains: %m");
510
511 return 0;
512 }
513
514 int radv_update_mac(Link *link) {
515 bool restart;
516 int r;
517
518 assert(link);
519
520 if (!link->radv)
521 return 0;
522
523 if (link->hw_addr.length != ETH_ALEN)
524 return 0;
525
526 restart = sd_radv_is_running(link->radv);
527
528 r = sd_radv_stop(link->radv);
529 if (r < 0)
530 return r;
531
532 r = sd_radv_set_mac(link->radv, &link->hw_addr.ether);
533 if (r < 0)
534 return r;
535
536 if (restart) {
537 r = sd_radv_start(link->radv);
538 if (r < 0)
539 return r;
540 }
541
542 return 0;
543 }
544
545 static int radv_is_ready_to_configure(Link *link) {
546 bool needs_uplink = false;
547 int r;
548
549 assert(link);
550 assert(link->network);
551
552 if (!link_is_ready_to_configure(link, /* allow_unmanaged = */ false))
553 return false;
554
555 if (in6_addr_is_null(&link->ipv6ll_address))
556 return false;
557
558 if (link->hw_addr.length != ETH_ALEN || hw_addr_is_null(&link->hw_addr))
559 return false;
560
561 if (link->network->router_emit_dns && !link->network->router_dns) {
562 _cleanup_free_ struct in6_addr *dns = NULL;
563 size_t n_dns;
564
565 r = network_get_ipv6_dns(link->network, &dns, &n_dns);
566 if (r < 0)
567 return r;
568
569 needs_uplink = r == 0;
570 }
571
572 if (link->network->router_emit_domains &&
573 !link->network->router_search_domains &&
574 !link->network->search_domains)
575 needs_uplink = true;
576
577 if (needs_uplink) {
578 Link *uplink = NULL;
579
580 if (radv_find_uplink(link, &uplink) < 0)
581 return false;
582
583 if (uplink && !uplink->network)
584 return false;
585 }
586
587 return true;
588 }
589
590 static int radv_process_request(Request *req, Link *link, void *userdata) {
591 int r;
592
593 assert(link);
594
595 r = radv_is_ready_to_configure(link);
596 if (r <= 0)
597 return r;
598
599 r = radv_configure(link);
600 if (r < 0)
601 return log_link_warning_errno(link, r, "Failed to configure IPv6 Router Advertisement engine: %m");
602
603 if (link_has_carrier(link)) {
604 r = radv_start(link);
605 if (r < 0)
606 return log_link_warning_errno(link, r, "Failed to start IPv6 Router Advertisement engine: %m");
607 }
608
609 log_link_debug(link, "IPv6 Router Advertisement engine is configured%s.",
610 link_has_carrier(link) ? " and started" : "");
611 return 1;
612 }
613
614 int link_request_radv(Link *link) {
615 int r;
616
617 assert(link);
618
619 if (!link_radv_enabled(link))
620 return 0;
621
622 if (link->radv)
623 return 0;
624
625 r = link_queue_request(link, REQUEST_TYPE_RADV, radv_process_request, NULL);
626 if (r < 0)
627 return log_link_warning_errno(link, r, "Failed to request configuring of the IPv6 Router Advertisement engine: %m");
628
629 log_link_debug(link, "Requested configuring of the IPv6 Router Advertisement engine.");
630 return 0;
631 }
632
633 int radv_start(Link *link) {
634 int r;
635
636 assert(link);
637 assert(link->network);
638
639 if (!link->radv)
640 return 0;
641
642 if (!link_has_carrier(link))
643 return 0;
644
645 if (in6_addr_is_null(&link->ipv6ll_address))
646 return 0;
647
648 if (sd_radv_is_running(link->radv))
649 return 0;
650
651 if (link->network->dhcp_pd_announce) {
652 r = dhcp_request_prefix_delegation(link);
653 if (r < 0)
654 return log_link_debug_errno(link, r, "Failed to request DHCP delegated subnet prefix: %m");
655 }
656
657 log_link_debug(link, "Starting IPv6 Router Advertisements");
658 return sd_radv_start(link->radv);
659 }
660
661 int radv_add_prefix(
662 Link *link,
663 const struct in6_addr *prefix,
664 uint8_t prefix_len,
665 usec_t lifetime_preferred_usec,
666 usec_t lifetime_valid_usec) {
667
668 _cleanup_(sd_radv_prefix_unrefp) sd_radv_prefix *p = NULL;
669 int r;
670
671 assert(link);
672
673 if (!link->radv)
674 return 0;
675
676 r = sd_radv_prefix_new(&p);
677 if (r < 0)
678 return r;
679
680 r = sd_radv_prefix_set_prefix(p, prefix, prefix_len);
681 if (r < 0)
682 return r;
683
684 r = sd_radv_prefix_set_preferred_lifetime(p, RADV_DEFAULT_PREFERRED_LIFETIME_USEC, lifetime_preferred_usec);
685 if (r < 0)
686 return r;
687
688 r = sd_radv_prefix_set_valid_lifetime(p, RADV_DEFAULT_VALID_LIFETIME_USEC, lifetime_valid_usec);
689 if (r < 0)
690 return r;
691
692 r = sd_radv_add_prefix(link->radv, p);
693 if (r < 0 && r != -EEXIST)
694 return r;
695
696 return 0;
697 }
698
699 static int prefix_section_verify(Prefix *p) {
700 assert(p);
701
702 if (section_is_invalid(p->section))
703 return -EINVAL;
704
705 if (in6_addr_is_null(&p->prefix))
706 return log_warning_errno(SYNTHETIC_ERRNO(EINVAL),
707 "%s: [IPv6Prefix] section without Prefix= field configured, "
708 "or specified prefix is the null address. "
709 "Ignoring [IPv6Prefix] section from line %u.",
710 p->section->filename, p->section->line);
711
712 if (p->prefixlen < 3 || p->prefixlen > 128)
713 return log_warning_errno(SYNTHETIC_ERRNO(EINVAL),
714 "%s: Invalid prefix length %u is specified in [IPv6Prefix] section. "
715 "Valid range is 3…128. Ignoring [IPv6Prefix] section from line %u.",
716 p->section->filename, p->prefixlen, p->section->line);
717
718 if (p->prefixlen > 64) {
719 log_info("%s:%u: Unusual prefix length %u (> 64) is specified in [IPv6Prefix] section from line %s%s.",
720 p->section->filename, p->section->line,
721 p->prefixlen,
722 p->assign ? ", refusing to assign an address in " : "",
723 p->assign ? IN6_ADDR_PREFIX_TO_STRING(&p->prefix, p->prefixlen) : "");
724
725 p->assign = false;
726 }
727
728 if (p->valid_lifetime == 0)
729 return log_warning_errno(SYNTHETIC_ERRNO(EINVAL),
730 "%s: The valid lifetime of prefix cannot be zero. "
731 "Ignoring [IPv6Prefix] section from line %u.",
732 p->section->filename, p->section->line);
733
734 if (p->preferred_lifetime > p->valid_lifetime)
735 return log_warning_errno(SYNTHETIC_ERRNO(EINVAL),
736 "%s: The preferred lifetime %s is longer than the valid lifetime %s. "
737 "Ignoring [IPv6Prefix] section from line %u.",
738 p->section->filename,
739 FORMAT_TIMESPAN(p->preferred_lifetime, USEC_PER_SEC),
740 FORMAT_TIMESPAN(p->valid_lifetime, USEC_PER_SEC),
741 p->section->line);
742
743 return 0;
744 }
745
746 void network_drop_invalid_prefixes(Network *network) {
747 Prefix *p;
748
749 assert(network);
750
751 HASHMAP_FOREACH(p, network->prefixes_by_section)
752 if (prefix_section_verify(p) < 0)
753 prefix_free(p);
754 }
755
756 static int route_prefix_section_verify(RoutePrefix *p) {
757 if (section_is_invalid(p->section))
758 return -EINVAL;
759
760 if (p->prefixlen > 128)
761 return log_warning_errno(SYNTHETIC_ERRNO(EINVAL),
762 "%s: Invalid prefix length %u is specified in [IPv6RoutePrefix] section. "
763 "Valid range is 0…128. Ignoring [IPv6RoutePrefix] section from line %u.",
764 p->section->filename, p->prefixlen, p->section->line);
765
766 if (p->lifetime == 0)
767 return log_warning_errno(SYNTHETIC_ERRNO(EINVAL),
768 "%s: The lifetime of route cannot be zero. "
769 "Ignoring [IPv6RoutePrefix] section from line %u.",
770 p->section->filename, p->section->line);
771
772 return 0;
773 }
774
775 void network_drop_invalid_route_prefixes(Network *network) {
776 RoutePrefix *p;
777
778 assert(network);
779
780 HASHMAP_FOREACH(p, network->route_prefixes_by_section)
781 if (route_prefix_section_verify(p) < 0)
782 route_prefix_free(p);
783 }
784
785 int config_parse_prefix(
786 const char *unit,
787 const char *filename,
788 unsigned line,
789 const char *section,
790 unsigned section_line,
791 const char *lvalue,
792 int ltype,
793 const char *rvalue,
794 void *data,
795 void *userdata) {
796
797 _cleanup_(prefix_free_or_set_invalidp) Prefix *p = NULL;
798 Network *network = ASSERT_PTR(userdata);
799 union in_addr_union a;
800 int r;
801
802 assert(filename);
803 assert(section);
804 assert(lvalue);
805 assert(rvalue);
806
807 r = prefix_new_static(network, filename, section_line, &p);
808 if (r < 0)
809 return log_oom();
810
811 r = in_addr_prefix_from_string(rvalue, AF_INET6, &a, &p->prefixlen);
812 if (r < 0) {
813 log_syntax(unit, LOG_WARNING, filename, line, r,
814 "Prefix is invalid, ignoring assignment: %s", rvalue);
815 return 0;
816 }
817
818 (void) in6_addr_mask(&a.in6, p->prefixlen);
819 p->prefix = a.in6;
820
821 TAKE_PTR(p);
822 return 0;
823 }
824
825 int config_parse_prefix_boolean(
826 const char *unit,
827 const char *filename,
828 unsigned line,
829 const char *section,
830 unsigned section_line,
831 const char *lvalue,
832 int ltype,
833 const char *rvalue,
834 void *data,
835 void *userdata) {
836
837 _cleanup_(prefix_free_or_set_invalidp) Prefix *p = NULL;
838 Network *network = ASSERT_PTR(userdata);
839 int r;
840
841 assert(filename);
842 assert(section);
843 assert(lvalue);
844 assert(rvalue);
845
846 r = prefix_new_static(network, filename, section_line, &p);
847 if (r < 0)
848 return log_oom();
849
850 r = parse_boolean(rvalue);
851 if (r < 0) {
852 log_syntax(unit, LOG_WARNING, filename, line, r,
853 "Failed to parse %s=, ignoring assignment: %s", lvalue, rvalue);
854 return 0;
855 }
856
857 if (streq(lvalue, "OnLink"))
858 p->onlink = r;
859 else if (streq(lvalue, "AddressAutoconfiguration"))
860 p->address_auto_configuration = r;
861 else if (streq(lvalue, "Assign"))
862 p->assign = r;
863 else
864 assert_not_reached();
865
866 TAKE_PTR(p);
867 return 0;
868 }
869
870 int config_parse_prefix_lifetime(
871 const char *unit,
872 const char *filename,
873 unsigned line,
874 const char *section,
875 unsigned section_line,
876 const char *lvalue,
877 int ltype,
878 const char *rvalue,
879 void *data,
880 void *userdata) {
881
882 _cleanup_(prefix_free_or_set_invalidp) Prefix *p = NULL;
883 Network *network = ASSERT_PTR(userdata);
884 usec_t usec;
885 int r;
886
887 assert(filename);
888 assert(section);
889 assert(lvalue);
890 assert(rvalue);
891
892 r = prefix_new_static(network, filename, section_line, &p);
893 if (r < 0)
894 return log_oom();
895
896 r = parse_sec(rvalue, &usec);
897 if (r < 0) {
898 log_syntax(unit, LOG_WARNING, filename, line, r,
899 "Lifetime is invalid, ignoring assignment: %s", rvalue);
900 return 0;
901 }
902
903 if (usec != USEC_INFINITY && DIV_ROUND_UP(usec, USEC_PER_SEC) >= UINT32_MAX) {
904 log_syntax(unit, LOG_WARNING, filename, line, 0,
905 "Lifetime is too long, ignoring assignment: %s", rvalue);
906 return 0;
907 }
908
909 if (streq(lvalue, "PreferredLifetimeSec"))
910 p->preferred_lifetime = usec;
911 else if (streq(lvalue, "ValidLifetimeSec"))
912 p->valid_lifetime = usec;
913 else
914 assert_not_reached();
915
916 TAKE_PTR(p);
917 return 0;
918 }
919
920 int config_parse_prefix_metric(
921 const char *unit,
922 const char *filename,
923 unsigned line,
924 const char *section,
925 unsigned section_line,
926 const char *lvalue,
927 int ltype,
928 const char *rvalue,
929 void *data,
930 void *userdata) {
931
932 _cleanup_(prefix_free_or_set_invalidp) Prefix *p = NULL;
933 Network *network = ASSERT_PTR(userdata);
934 int r;
935
936 assert(filename);
937 assert(section);
938 assert(lvalue);
939 assert(rvalue);
940
941 r = prefix_new_static(network, filename, section_line, &p);
942 if (r < 0)
943 return log_oom();
944
945 r = safe_atou32(rvalue, &p->route_metric);
946 if (r < 0) {
947 log_syntax(unit, LOG_WARNING, filename, line, r,
948 "Failed to parse %s=, ignoring assignment: %s",
949 lvalue, rvalue);
950 return 0;
951 }
952
953 TAKE_PTR(p);
954 return 0;
955 }
956
957 int config_parse_prefix_token(
958 const char *unit,
959 const char *filename,
960 unsigned line,
961 const char *section,
962 unsigned section_line,
963 const char *lvalue,
964 int ltype,
965 const char *rvalue,
966 void *data,
967 void *userdata) {
968
969 _cleanup_(prefix_free_or_set_invalidp) Prefix *p = NULL;
970 Network *network = ASSERT_PTR(userdata);
971 int r;
972
973 assert(filename);
974 assert(section);
975 assert(lvalue);
976 assert(rvalue);
977
978 r = prefix_new_static(network, filename, section_line, &p);
979 if (r < 0)
980 return log_oom();
981
982 r = config_parse_address_generation_type(unit, filename, line, section, section_line,
983 lvalue, ltype, rvalue, &p->tokens, userdata);
984 if (r < 0)
985 return r;
986
987 TAKE_PTR(p);
988 return 0;
989 }
990
991 int config_parse_route_prefix(
992 const char *unit,
993 const char *filename,
994 unsigned line,
995 const char *section,
996 unsigned section_line,
997 const char *lvalue,
998 int ltype,
999 const char *rvalue,
1000 void *data,
1001 void *userdata) {
1002
1003 _cleanup_(route_prefix_free_or_set_invalidp) RoutePrefix *p = NULL;
1004 Network *network = ASSERT_PTR(userdata);
1005 union in_addr_union a;
1006 int r;
1007
1008 assert(filename);
1009 assert(section);
1010 assert(lvalue);
1011 assert(rvalue);
1012
1013 r = route_prefix_new_static(network, filename, section_line, &p);
1014 if (r < 0)
1015 return log_oom();
1016
1017 r = in_addr_prefix_from_string(rvalue, AF_INET6, &a, &p->prefixlen);
1018 if (r < 0) {
1019 log_syntax(unit, LOG_WARNING, filename, line, r,
1020 "Route prefix is invalid, ignoring assignment: %s", rvalue);
1021 return 0;
1022 }
1023
1024 (void) in6_addr_mask(&a.in6, p->prefixlen);
1025 p->prefix = a.in6;
1026
1027 TAKE_PTR(p);
1028 return 0;
1029 }
1030
1031 int config_parse_route_prefix_lifetime(
1032 const char *unit,
1033 const char *filename,
1034 unsigned line,
1035 const char *section,
1036 unsigned section_line,
1037 const char *lvalue,
1038 int ltype,
1039 const char *rvalue,
1040 void *data,
1041 void *userdata) {
1042
1043 _cleanup_(route_prefix_free_or_set_invalidp) RoutePrefix *p = NULL;
1044 Network *network = ASSERT_PTR(userdata);
1045 usec_t usec;
1046 int r;
1047
1048 assert(filename);
1049 assert(section);
1050 assert(lvalue);
1051 assert(rvalue);
1052
1053 r = route_prefix_new_static(network, filename, section_line, &p);
1054 if (r < 0)
1055 return log_oom();
1056
1057 r = parse_sec(rvalue, &usec);
1058 if (r < 0) {
1059 log_syntax(unit, LOG_WARNING, filename, line, r,
1060 "Route lifetime is invalid, ignoring assignment: %s", rvalue);
1061 return 0;
1062 }
1063
1064 if (usec != USEC_INFINITY && DIV_ROUND_UP(usec, USEC_PER_SEC) >= UINT32_MAX) {
1065 log_syntax(unit, LOG_WARNING, filename, line, 0,
1066 "Lifetime is too long, ignoring assignment: %s", rvalue);
1067 return 0;
1068 }
1069
1070 p->lifetime = usec;
1071
1072 TAKE_PTR(p);
1073 return 0;
1074 }
1075
1076 int config_parse_radv_dns(
1077 const char *unit,
1078 const char *filename,
1079 unsigned line,
1080 const char *section,
1081 unsigned section_line,
1082 const char *lvalue,
1083 int ltype,
1084 const char *rvalue,
1085 void *data,
1086 void *userdata) {
1087
1088 Network *n = data;
1089 int r;
1090
1091 assert(filename);
1092 assert(lvalue);
1093 assert(rvalue);
1094
1095 if (isempty(rvalue)) {
1096 n->n_router_dns = 0;
1097 n->router_dns = mfree(n->router_dns);
1098 return 0;
1099 }
1100
1101 for (const char *p = rvalue;;) {
1102 _cleanup_free_ char *w = NULL;
1103 union in_addr_union a;
1104
1105 r = extract_first_word(&p, &w, NULL, 0);
1106 if (r == -ENOMEM)
1107 return log_oom();
1108 if (r < 0) {
1109 log_syntax(unit, LOG_WARNING, filename, line, r,
1110 "Failed to extract word, ignoring: %s", rvalue);
1111 return 0;
1112 }
1113 if (r == 0)
1114 return 0;
1115
1116 if (streq(w, "_link_local"))
1117 a = IN_ADDR_NULL;
1118 else {
1119 r = in_addr_from_string(AF_INET6, w, &a);
1120 if (r < 0) {
1121 log_syntax(unit, LOG_WARNING, filename, line, r,
1122 "Failed to parse DNS server address, ignoring: %s", w);
1123 continue;
1124 }
1125
1126 if (in_addr_is_null(AF_INET6, &a)) {
1127 log_syntax(unit, LOG_WARNING, filename, line, 0,
1128 "DNS server address is null, ignoring: %s", w);
1129 continue;
1130 }
1131 }
1132
1133 struct in6_addr *m;
1134 m = reallocarray(n->router_dns, n->n_router_dns + 1, sizeof(struct in6_addr));
1135 if (!m)
1136 return log_oom();
1137
1138 m[n->n_router_dns++] = a.in6;
1139 n->router_dns = m;
1140 }
1141 }
1142
1143 int config_parse_radv_search_domains(
1144 const char *unit,
1145 const char *filename,
1146 unsigned line,
1147 const char *section,
1148 unsigned section_line,
1149 const char *lvalue,
1150 int ltype,
1151 const char *rvalue,
1152 void *data,
1153 void *userdata) {
1154
1155 Network *n = data;
1156 int r;
1157
1158 assert(filename);
1159 assert(lvalue);
1160 assert(rvalue);
1161
1162 if (isempty(rvalue)) {
1163 n->router_search_domains = ordered_set_free(n->router_search_domains);
1164 return 0;
1165 }
1166
1167 for (const char *p = rvalue;;) {
1168 _cleanup_free_ char *w = NULL, *idna = NULL;
1169
1170 r = extract_first_word(&p, &w, NULL, 0);
1171 if (r == -ENOMEM)
1172 return log_oom();
1173 if (r < 0) {
1174 log_syntax(unit, LOG_WARNING, filename, line, r,
1175 "Failed to extract word, ignoring: %s", rvalue);
1176 return 0;
1177 }
1178 if (r == 0)
1179 return 0;
1180
1181 r = dns_name_apply_idna(w, &idna);
1182 if (r < 0) {
1183 log_syntax(unit, LOG_WARNING, filename, line, r,
1184 "Failed to apply IDNA to domain name '%s', ignoring: %m", w);
1185 continue;
1186 } else if (r == 0)
1187 /* transfer ownership to simplify subsequent operations */
1188 idna = TAKE_PTR(w);
1189
1190 r = ordered_set_ensure_allocated(&n->router_search_domains, &string_hash_ops_free);
1191 if (r < 0)
1192 return log_oom();
1193
1194 r = ordered_set_consume(n->router_search_domains, TAKE_PTR(idna));
1195 if (r < 0)
1196 return log_oom();
1197 }
1198 }
1199
1200 static const char * const radv_prefix_delegation_table[_RADV_PREFIX_DELEGATION_MAX] = {
1201 [RADV_PREFIX_DELEGATION_NONE] = "no",
1202 [RADV_PREFIX_DELEGATION_STATIC] = "static",
1203 [RADV_PREFIX_DELEGATION_DHCP6] = "dhcpv6",
1204 [RADV_PREFIX_DELEGATION_BOTH] = "yes",
1205 };
1206
1207 DEFINE_STRING_TABLE_LOOKUP_WITH_BOOLEAN(
1208 radv_prefix_delegation,
1209 RADVPrefixDelegation,
1210 RADV_PREFIX_DELEGATION_BOTH);
1211
1212 int config_parse_router_prefix_delegation(
1213 const char *unit,
1214 const char *filename,
1215 unsigned line,
1216 const char *section,
1217 unsigned section_line,
1218 const char *lvalue,
1219 int ltype,
1220 const char *rvalue,
1221 void *data,
1222 void *userdata) {
1223
1224 RADVPrefixDelegation val, *ra = ASSERT_PTR(data);
1225 int r;
1226
1227 assert(filename);
1228 assert(lvalue);
1229 assert(rvalue);
1230
1231 if (streq(lvalue, "IPv6SendRA")) {
1232 r = parse_boolean(rvalue);
1233 if (r < 0) {
1234 log_syntax(unit, LOG_WARNING, filename, line, r,
1235 "Invalid %s= setting, ignoring assignment: %s", lvalue, rvalue);
1236 return 0;
1237 }
1238
1239 /* When IPv6SendRA= is enabled, only static prefixes are sent by default, and users
1240 * need to explicitly enable DHCPv6PrefixDelegation=. */
1241 *ra = r ? RADV_PREFIX_DELEGATION_STATIC : RADV_PREFIX_DELEGATION_NONE;
1242 return 0;
1243 }
1244
1245 /* For backward compatibility */
1246 val = radv_prefix_delegation_from_string(rvalue);
1247 if (val < 0) {
1248 log_syntax(unit, LOG_WARNING, filename, line, val,
1249 "Invalid %s= setting, ignoring assignment: %s", lvalue, rvalue);
1250 return 0;
1251 }
1252
1253 *ra = val;
1254 return 0;
1255 }
1256
1257 int config_parse_router_lifetime(
1258 const char *unit,
1259 const char *filename,
1260 unsigned line,
1261 const char *section,
1262 unsigned section_line,
1263 const char *lvalue,
1264 int ltype,
1265 const char *rvalue,
1266 void *data,
1267 void *userdata) {
1268
1269 usec_t usec, *lifetime = ASSERT_PTR(data);
1270 int r;
1271
1272 assert(filename);
1273 assert(section);
1274 assert(lvalue);
1275 assert(rvalue);
1276
1277 if (isempty(rvalue)) {
1278 *lifetime = RADV_DEFAULT_ROUTER_LIFETIME_USEC;
1279 return 0;
1280 }
1281
1282 r = parse_sec(rvalue, &usec);
1283 if (r < 0) {
1284 log_syntax(unit, LOG_WARNING, filename, line, r,
1285 "Failed to parse router lifetime, ignoring assignment: %s", rvalue);
1286 return 0;
1287 }
1288 if (usec > 0) {
1289 if (usec < RADV_MIN_ROUTER_LIFETIME_USEC) {
1290 log_syntax(unit, LOG_WARNING, filename, line, 0,
1291 "Router lifetime %s is too short, using %s.",
1292 FORMAT_TIMESPAN(usec, USEC_PER_SEC),
1293 FORMAT_TIMESPAN(RADV_MIN_ROUTER_LIFETIME_USEC, USEC_PER_SEC));
1294 usec = RADV_MIN_ROUTER_LIFETIME_USEC;
1295 } else if (usec > RADV_MAX_ROUTER_LIFETIME_USEC) {
1296 log_syntax(unit, LOG_WARNING, filename, line, 0,
1297 "Router lifetime %s is too large, using %s.",
1298 FORMAT_TIMESPAN(usec, USEC_PER_SEC),
1299 FORMAT_TIMESPAN(RADV_MAX_ROUTER_LIFETIME_USEC, USEC_PER_SEC));
1300 usec = RADV_MAX_ROUTER_LIFETIME_USEC;
1301 }
1302 }
1303
1304 *lifetime = usec;
1305 return 0;
1306 }
1307
1308 int config_parse_router_preference(
1309 const char *unit,
1310 const char *filename,
1311 unsigned line,
1312 const char *section,
1313 unsigned section_line,
1314 const char *lvalue,
1315 int ltype,
1316 const char *rvalue,
1317 void *data,
1318 void *userdata) {
1319
1320 Network *network = userdata;
1321
1322 assert(filename);
1323 assert(section);
1324 assert(lvalue);
1325 assert(rvalue);
1326 assert(data);
1327
1328 if (streq(rvalue, "high"))
1329 network->router_preference = SD_NDISC_PREFERENCE_HIGH;
1330 else if (STR_IN_SET(rvalue, "medium", "normal", "default"))
1331 network->router_preference = SD_NDISC_PREFERENCE_MEDIUM;
1332 else if (streq(rvalue, "low"))
1333 network->router_preference = SD_NDISC_PREFERENCE_LOW;
1334 else
1335 log_syntax(unit, LOG_WARNING, filename, line, 0,
1336 "Invalid router preference, ignoring assignment: %s", rvalue);
1337
1338 return 0;
1339 }