]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/libsystemd-network/sd-ipv4ll.c
tree-wide: drop string.h when string-util.h or friends are included
[thirdparty/systemd.git] / src / libsystemd-network / sd-ipv4ll.c
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
5c1d3fc9 2/***
810adae9 3 Copyright © 2014 Axis Communications AB. All rights reserved.
5c1d3fc9
UTL
4***/
5
07630cea 6#include <arpa/inet.h>
5c1d3fc9 7#include <errno.h>
5c1d3fc9 8#include <stdio.h>
07630cea 9#include <stdlib.h>
07630cea 10
dccca82b 11#include "sd-id128.h"
07630cea
LP
12#include "sd-ipv4acd.h"
13#include "sd-ipv4ll.h"
5c1d3fc9 14
b5efdb8a 15#include "alloc-util.h"
96a7979f 16#include "ether-addr-util.h"
129dc1b4 17#include "in-addr-util.h"
5c1d3fc9 18#include "list.h"
3df3e884 19#include "random-util.h"
e3dca008
TG
20#include "siphash24.h"
21#include "sparse-endian.h"
703945c1 22#include "string-util.h"
e3dca008 23#include "util.h"
5c1d3fc9 24
96a7979f
LP
25#define IPV4LL_NETWORK UINT32_C(0xA9FE0000)
26#define IPV4LL_NETMASK UINT32_C(0xFFFF0000)
5c1d3fc9 27
b45e4eb6 28#define IPV4LL_DONT_DESTROY(ll) \
4afd3348 29 _cleanup_(sd_ipv4ll_unrefp) _unused_ sd_ipv4ll *_dont_destroy_##ll = sd_ipv4ll_ref(ll)
b45e4eb6 30
5c1d3fc9 31struct sd_ipv4ll {
9c8e3101 32 unsigned n_ref;
56cd007a 33
e3dca008 34 sd_ipv4acd *acd;
96a7979f 35
e3dca008 36 be32_t address; /* the address pushed to ACD */
96a7979f
LP
37 struct ether_addr mac;
38
39 struct {
40 le64_t value;
41 le64_t generation;
42 } seed;
43 bool seed_set;
e3dca008 44
5c1d3fc9
UTL
45 /* External */
46 be32_t claimed_address;
96a7979f 47
45aa74c7 48 sd_ipv4ll_callback_t callback;
5c1d3fc9
UTL
49 void* userdata;
50};
51
62c6bbbc 52#define log_ipv4ll_errno(ll, error, fmt, ...) log_internal(LOG_DEBUG, error, PROJECT_FILE, __LINE__, __func__, "IPV4LL: " fmt, ##__VA_ARGS__)
703945c1
LP
53#define log_ipv4ll(ll, fmt, ...) log_ipv4ll_errno(ll, 0, fmt, ##__VA_ARGS__)
54
96a7979f
LP
55static void ipv4ll_on_acd(sd_ipv4acd *ll, int event, void *userdata);
56
8301aa0b
YW
57static sd_ipv4ll *ipv4ll_free(sd_ipv4ll *ll) {
58 assert(ll);
b45e4eb6 59
e3dca008 60 sd_ipv4acd_unref(ll->acd);
6b430fdb 61 return mfree(ll);
b45e4eb6
TG
62}
63
8301aa0b
YW
64DEFINE_TRIVIAL_REF_UNREF_FUNC(sd_ipv4ll, sd_ipv4ll, ipv4ll_free);
65
b45e4eb6 66int sd_ipv4ll_new(sd_ipv4ll **ret) {
4afd3348 67 _cleanup_(sd_ipv4ll_unrefp) sd_ipv4ll *ll = NULL;
e3dca008 68 int r;
b45e4eb6
TG
69
70 assert_return(ret, -EINVAL);
71
72 ll = new0(sd_ipv4ll, 1);
73 if (!ll)
74 return -ENOMEM;
75
0c28d288
LP
76 ll->n_ref = 1;
77
e3dca008
TG
78 r = sd_ipv4acd_new(&ll->acd);
79 if (r < 0)
80 return r;
81
82 r = sd_ipv4acd_set_callback(ll->acd, ipv4ll_on_acd, ll);
83 if (r < 0)
84 return r;
85
1cc6c93a 86 *ret = TAKE_PTR(ll);
b45e4eb6
TG
87
88 return 0;
89}
90
b45e4eb6 91int sd_ipv4ll_stop(sd_ipv4ll *ll) {
e3dca008 92 assert_return(ll, -EINVAL);
94a355a1 93
96a7979f 94 return sd_ipv4acd_stop(ll->acd);
5c1d3fc9
UTL
95}
96
2f8e7633 97int sd_ipv4ll_set_ifindex(sd_ipv4ll *ll, int ifindex) {
e3dca008 98 assert_return(ll, -EINVAL);
2f8e7633 99 assert_return(ifindex > 0, -EINVAL);
96a7979f 100 assert_return(sd_ipv4ll_is_running(ll) == 0, -EBUSY);
5c1d3fc9 101
2f8e7633 102 return sd_ipv4acd_set_ifindex(ll->acd, ifindex);
5c1d3fc9
UTL
103}
104
e3dca008 105int sd_ipv4ll_set_mac(sd_ipv4ll *ll, const struct ether_addr *addr) {
b26f7e8e
TG
106 int r;
107
e3dca008 108 assert_return(ll, -EINVAL);
96a7979f
LP
109 assert_return(addr, -EINVAL);
110 assert_return(sd_ipv4ll_is_running(ll) == 0, -EBUSY);
b26f7e8e 111
96a7979f
LP
112 r = sd_ipv4acd_set_mac(ll->acd, addr);
113 if (r < 0)
114 return r;
5c1d3fc9 115
96a7979f
LP
116 ll->mac = *addr;
117 return 0;
5c1d3fc9
UTL
118}
119
120int sd_ipv4ll_detach_event(sd_ipv4ll *ll) {
121 assert_return(ll, -EINVAL);
122
e3dca008 123 return sd_ipv4acd_detach_event(ll->acd);
5c1d3fc9
UTL
124}
125
32d20645 126int sd_ipv4ll_attach_event(sd_ipv4ll *ll, sd_event *event, int64_t priority) {
5c1d3fc9 127 assert_return(ll, -EINVAL);
5c1d3fc9 128
73e94c0d 129 return sd_ipv4acd_attach_event(ll->acd, event, priority);
5c1d3fc9
UTL
130}
131
ccf86354 132int sd_ipv4ll_set_callback(sd_ipv4ll *ll, sd_ipv4ll_callback_t cb, void *userdata) {
5c1d3fc9
UTL
133 assert_return(ll, -EINVAL);
134
45aa74c7 135 ll->callback = cb;
5c1d3fc9
UTL
136 ll->userdata = userdata;
137
138 return 0;
139}
140
9ed794a3 141int sd_ipv4ll_get_address(sd_ipv4ll *ll, struct in_addr *address) {
5c1d3fc9
UTL
142 assert_return(ll, -EINVAL);
143 assert_return(address, -EINVAL);
144
ece174c5 145 if (ll->claimed_address == 0)
5c1d3fc9 146 return -ENOENT;
5c1d3fc9
UTL
147
148 address->s_addr = ll->claimed_address;
e3dca008 149
5c1d3fc9
UTL
150 return 0;
151}
152
38958cd6 153int sd_ipv4ll_set_address_seed(sd_ipv4ll *ll, uint64_t seed) {
b5db00e5 154 assert_return(ll, -EINVAL);
96a7979f 155 assert_return(sd_ipv4ll_is_running(ll) == 0, -EBUSY);
d9bf4f8c 156
96a7979f
LP
157 ll->seed.value = htole64(seed);
158 ll->seed_set = true;
b5db00e5 159
e3dca008 160 return 0;
b5db00e5
UTL
161}
162
04c01369 163int sd_ipv4ll_is_running(sd_ipv4ll *ll) {
75677581 164 assert_return(ll, false);
aba496a5 165
e3dca008 166 return sd_ipv4acd_is_running(ll->acd);
aba496a5
UTL
167}
168
129dc1b4 169static bool ipv4ll_address_is_valid(const struct in_addr *address) {
129dc1b4
TG
170 assert(address);
171
172 if (!in_addr_is_link_local(AF_INET, (const union in_addr_union *) address))
173 return false;
174
ae06d1be 175 return !IN_SET(be32toh(address->s_addr) & 0x0000FF00U, 0x0000U, 0xFF00U);
129dc1b4
TG
176}
177
178int sd_ipv4ll_set_address(sd_ipv4ll *ll, const struct in_addr *address) {
179 int r;
180
181 assert_return(ll, -EINVAL);
182 assert_return(address, -EINVAL);
183 assert_return(ipv4ll_address_is_valid(address), -EINVAL);
184
185 r = sd_ipv4acd_set_address(ll->acd, address);
186 if (r < 0)
187 return r;
188
189 ll->address = address->s_addr;
190
191 return 0;
192}
193
96a7979f
LP
194#define PICK_HASH_KEY SD_ID128_MAKE(15,ac,82,a6,d6,3f,49,78,98,77,5d,0c,69,02,94,0b)
195
e3dca008 196static int ipv4ll_pick_address(sd_ipv4ll *ll) {
703945c1 197 _cleanup_free_ char *address = NULL;
e3dca008 198 be32_t addr;
5c1d3fc9 199
e3dca008 200 assert(ll);
4d978a46 201
e3dca008 202 do {
96a7979f 203 uint64_t h;
5c1d3fc9 204
96a7979f 205 h = siphash24(&ll->seed, sizeof(ll->seed), PICK_HASH_KEY.bytes);
5c1d3fc9 206
96a7979f
LP
207 /* Increase the generation counter by one */
208 ll->seed.generation = htole64(le64toh(ll->seed.generation) + 1);
b5db00e5 209
96a7979f
LP
210 addr = htobe32((h & UINT32_C(0x0000FFFF)) | IPV4LL_NETWORK);
211 } while (addr == ll->address ||
ae06d1be 212 IN_SET(be32toh(addr) & 0x0000FF00U, 0x0000U, 0xFF00U));
96a7979f 213
703945c1
LP
214 (void) in_addr_to_string(AF_INET, &(union in_addr_union) { .in.s_addr = addr }, &address);
215 log_ipv4ll(ll, "Picked new IP address %s.", strna(address));
216
96a7979f 217 return sd_ipv4ll_set_address(ll, &(struct in_addr) { addr });
e3dca008
TG
218}
219
96a7979f
LP
220#define MAC_HASH_KEY SD_ID128_MAKE(df,04,22,98,3f,ad,14,52,f9,87,2e,d1,9c,70,e2,f2)
221
52cf2b13 222static int ipv4ll_start_internal(sd_ipv4ll *ll, bool reset_generation) {
e3dca008 223 int r;
96a7979f 224 bool picked_address = false;
e3dca008
TG
225
226 assert_return(ll, -EINVAL);
96a7979f 227 assert_return(!ether_addr_is_null(&ll->mac), -EINVAL);
96a7979f
LP
228
229 /* If no random seed is set, generate some from the MAC address */
230 if (!ll->seed_set)
231 ll->seed.value = htole64(siphash24(ll->mac.ether_addr_octet, ETH_ALEN, MAC_HASH_KEY.bytes));
232
52cf2b13
YW
233 if (reset_generation)
234 ll->seed.generation = 0;
b5db00e5
UTL
235
236 if (ll->address == 0) {
e3dca008 237 r = ipv4ll_pick_address(ll);
b5db00e5 238 if (r < 0)
e3dca008 239 return r;
96a7979f
LP
240
241 picked_address = true;
b5db00e5 242 }
5c1d3fc9 243
e3dca008 244 r = sd_ipv4acd_start(ll->acd);
96a7979f
LP
245 if (r < 0) {
246
247 /* We couldn't start? If so, let's forget the picked address again, the user might make a change and
248 * retry, and we want the new data to take effect when picking an address. */
249 if (picked_address)
250 ll->address = 0;
251
e3dca008 252 return r;
96a7979f 253 }
996d1697 254
e3dca008
TG
255 return 0;
256}
996d1697 257
52cf2b13
YW
258int sd_ipv4ll_start(sd_ipv4ll *ll) {
259 assert_return(ll, -EINVAL);
260 assert_return(sd_ipv4ll_is_running(ll) == 0, -EBUSY);
261
262 return ipv4ll_start_internal(ll, true);
263}
264
265int sd_ipv4ll_restart(sd_ipv4ll *ll) {
266 ll->address = 0;
267
268 return ipv4ll_start_internal(ll, false);
269}
270
e3dca008
TG
271static void ipv4ll_client_notify(sd_ipv4ll *ll, int event) {
272 assert(ll);
5c1d3fc9 273
45aa74c7
LP
274 if (ll->callback)
275 ll->callback(ll, event, ll->userdata);
e3dca008 276}
5c1d3fc9 277
e3dca008
TG
278void ipv4ll_on_acd(sd_ipv4acd *acd, int event, void *userdata) {
279 sd_ipv4ll *ll = userdata;
280 IPV4LL_DONT_DESTROY(ll);
281 int r;
5c1d3fc9 282
e3dca008
TG
283 assert(acd);
284 assert(ll);
9021bb9f 285
e3dca008 286 switch (event) {
73e94c0d 287
2237aa02 288 case SD_IPV4ACD_EVENT_STOP:
be19c5b5 289 ipv4ll_client_notify(ll, SD_IPV4LL_EVENT_STOP);
e3dca008 290 ll->claimed_address = 0;
e3dca008 291 break;
73e94c0d 292
2237aa02 293 case SD_IPV4ACD_EVENT_BIND:
e3dca008 294 ll->claimed_address = ll->address;
be19c5b5 295 ipv4ll_client_notify(ll, SD_IPV4LL_EVENT_BIND);
e3dca008 296 break;
73e94c0d 297
2237aa02 298 case SD_IPV4ACD_EVENT_CONFLICT:
e3dca008
TG
299 /* if an address was already bound we must call up to the
300 user to handle this, otherwise we just try again */
301 if (ll->claimed_address != 0) {
be19c5b5 302 ipv4ll_client_notify(ll, SD_IPV4LL_EVENT_CONFLICT);
e3dca008
TG
303
304 ll->claimed_address = 0;
305 } else {
52cf2b13 306 r = sd_ipv4ll_restart(ll);
e3dca008
TG
307 if (r < 0)
308 goto error;
309 }
310
311 break;
96a7979f 312
e3dca008
TG
313 default:
314 assert_not_reached("Invalid IPv4ACD event.");
315 }
316
317 return;
318
319error:
be19c5b5 320 ipv4ll_client_notify(ll, SD_IPV4LL_EVENT_STOP);
5c1d3fc9 321}