]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/libsystemd-network/sd-radv.c
network: DHCP server Add support to transmit SIP server
[thirdparty/systemd.git] / src / libsystemd-network / sd-radv.c
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
04473969 2/***
810adae9 3 Copyright © 2017 Intel Corporation. All rights reserved.
04473969
PF
4***/
5
6#include <netinet/icmp6.h>
7#include <netinet/in.h>
204f99d2 8#include <arpa/inet.h>
04473969
PF
9
10#include "sd-radv.h"
11
12#include "alloc-util.h"
e965d6ab 13#include "dns-domain.h"
ae25915d 14#include "ether-addr-util.h"
807a8ede 15#include "event-util.h"
04473969
PF
16#include "fd-util.h"
17#include "icmp6-util.h"
18#include "in-addr-util.h"
5cfa2c3d
LP
19#include "io-util.h"
20#include "macro.h"
0a970718 21#include "memory-util.h"
04473969 22#include "radv-internal.h"
5cfa2c3d 23#include "random-util.h"
04473969
PF
24#include "socket-util.h"
25#include "string-util.h"
e965d6ab 26#include "strv.h"
04473969 27
204f99d2
PF
28_public_ int sd_radv_new(sd_radv **ret) {
29 _cleanup_(sd_radv_unrefp) sd_radv *ra = NULL;
30
31 assert_return(ret, -EINVAL);
32
78f9d24f 33 ra = new(sd_radv, 1);
204f99d2
PF
34 if (!ra)
35 return -ENOMEM;
36
78f9d24f
YW
37 *ra = (sd_radv) {
38 .n_ref = 1,
39 .fd = -1,
40 };
204f99d2 41
1cc6c93a 42 *ret = TAKE_PTR(ra);
204f99d2
PF
43
44 return 0;
45}
46
47_public_ int sd_radv_attach_event(sd_radv *ra, sd_event *event, int64_t priority) {
48 int r;
49
50 assert_return(ra, -EINVAL);
51 assert_return(!ra->event, -EBUSY);
52
53 if (event)
54 ra->event = sd_event_ref(event);
55 else {
56 r = sd_event_default(&ra->event);
57 if (r < 0)
58 return 0;
59 }
60
61 ra->event_priority = priority;
62
63 return 0;
64}
65
66_public_ int sd_radv_detach_event(sd_radv *ra) {
67
68 assert_return(ra, -EINVAL);
69
70 ra->event = sd_event_unref(ra->event);
71 return 0;
72}
73
74_public_ sd_event *sd_radv_get_event(sd_radv *ra) {
75 assert_return(ra, NULL);
76
77 return ra->event;
78}
79
204fb681 80static void radv_reset(sd_radv *ra) {
c4b6dda0 81 assert(ra);
204fb681 82
807a8ede 83 (void) event_source_disable(ra->timeout_event_source);
204fb681 84
88d5a3db
PF
85 ra->recv_event_source =
86 sd_event_source_unref(ra->recv_event_source);
87
204fb681
PF
88 ra->ra_sent = 0;
89}
90
8301aa0b 91static sd_radv *radv_free(sd_radv *ra) {
e866e17b
LP
92 if (!ra)
93 return NULL;
204f99d2
PF
94
95 while (ra->prefixes) {
96 sd_radv_prefix *p = ra->prefixes;
97
98 LIST_REMOVE(prefix, ra->prefixes, p);
99 sd_radv_prefix_unref(p);
100 }
101
e9c6da38 102 free(ra->rdnss);
f9aa5417 103 free(ra->dnssl);
e9c6da38 104
807a8ede
YW
105 ra->timeout_event_source = sd_event_source_unref(ra->timeout_event_source);
106
204fb681
PF
107 radv_reset(ra);
108
204f99d2 109 sd_radv_detach_event(ra);
c4b6dda0
LP
110
111 ra->fd = safe_close(ra->fd);
112
204f99d2
PF
113 return mfree(ra);
114}
115
8301aa0b
YW
116DEFINE_PUBLIC_TRIVIAL_REF_UNREF_FUNC(sd_radv, sd_radv, radv_free);
117
83ef9d14 118static int radv_send(sd_radv *ra, const struct in6_addr *dst, uint32_t router_lifetime) {
203d4df5 119 sd_radv_route_prefix *rt;
77baf5ae
PF
120 sd_radv_prefix *p;
121 struct sockaddr_in6 dst_addr = {
122 .sin6_family = AF_INET6,
123 .sin6_addr = IN6ADDR_ALL_NODES_MULTICAST_INIT,
124 };
125 struct nd_router_advert adv = {};
126 struct {
127 struct nd_opt_hdr opthdr;
128 struct ether_addr slladdr;
129 } _packed_ opt_mac = {
130 .opthdr = {
131 .nd_opt_type = ND_OPT_SOURCE_LINKADDR,
132 .nd_opt_len = (sizeof(struct nd_opt_hdr) +
133 sizeof(struct ether_addr) - 1) /8 + 1,
134 },
135 };
136 struct nd_opt_mtu opt_mtu = {
137 .nd_opt_mtu_type = ND_OPT_MTU,
138 .nd_opt_mtu_len = 1,
139 };
203d4df5 140 /* Reserve iov space for RA header, linkaddr, MTU, N prefixes, N routes, RDNSS
6852c0f6 141 and DNSSL */
203d4df5 142 struct iovec iov[5 + ra->n_prefixes + ra->n_route_prefixes];
77baf5ae
PF
143 struct msghdr msg = {
144 .msg_name = &dst_addr,
145 .msg_namelen = sizeof(dst_addr),
146 .msg_iov = iov,
147 };
d601b566
PF
148 usec_t time_now;
149 int r;
150
dc0ec5e2
LP
151 assert(ra);
152
d601b566
PF
153 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
154 if (r < 0)
155 return r;
77baf5ae 156
dc0ec5e2 157 if (dst && !IN6_IS_ADDR_UNSPECIFIED(dst))
77baf5ae 158 dst_addr.sin6_addr = *dst;
88d5a3db 159
77baf5ae
PF
160 adv.nd_ra_type = ND_ROUTER_ADVERT;
161 adv.nd_ra_curhoplimit = ra->hop_limit;
162 adv.nd_ra_flags_reserved = ra->flags;
163 adv.nd_ra_router_lifetime = htobe16(router_lifetime);
5cfa2c3d 164 iov[msg.msg_iovlen++] = IOVEC_MAKE(&adv, sizeof(adv));
77baf5ae
PF
165
166 /* MAC address is optional, either because the link does not use L2
167 addresses or load sharing is desired. See RFC 4861, Section 4.2 */
ae25915d 168 if (!ether_addr_is_null(&ra->mac_addr)) {
77baf5ae 169 opt_mac.slladdr = ra->mac_addr;
5cfa2c3d 170 iov[msg.msg_iovlen++] = IOVEC_MAKE(&opt_mac, sizeof(opt_mac));
77baf5ae
PF
171 }
172
173 if (ra->mtu) {
174 opt_mtu.nd_opt_mtu_mtu = htobe32(ra->mtu);
5cfa2c3d 175 iov[msg.msg_iovlen++] = IOVEC_MAKE(&opt_mtu, sizeof(opt_mtu));
77baf5ae
PF
176 }
177
178 LIST_FOREACH(prefix, p, ra->prefixes) {
d601b566
PF
179 if (p->valid_until) {
180
181 if (time_now > p->valid_until)
182 p->opt.valid_lifetime = 0;
183 else
184 p->opt.valid_lifetime = htobe32((p->valid_until - time_now) / USEC_PER_SEC);
185
186 if (time_now > p->preferred_until)
187 p->opt.preferred_lifetime = 0;
188 else
189 p->opt.preferred_lifetime = htobe32((p->preferred_until - time_now) / USEC_PER_SEC);
190 }
5cfa2c3d 191 iov[msg.msg_iovlen++] = IOVEC_MAKE(&p->opt, sizeof(p->opt));
77baf5ae
PF
192 }
193
203d4df5
SS
194 LIST_FOREACH(prefix, rt, ra->route_prefixes)
195 iov[msg.msg_iovlen++] = IOVEC_MAKE(&rt->opt, sizeof(rt->opt));
196
5cfa2c3d
LP
197 if (ra->rdnss)
198 iov[msg.msg_iovlen++] = IOVEC_MAKE(ra->rdnss, ra->rdnss->length * 8);
e9c6da38 199
5cfa2c3d
LP
200 if (ra->dnssl)
201 iov[msg.msg_iovlen++] = IOVEC_MAKE(ra->dnssl, ra->dnssl->length * 8);
e965d6ab 202
77baf5ae
PF
203 if (sendmsg(ra->fd, &msg, 0) < 0)
204 return -errno;
204fb681 205
77baf5ae 206 return 0;
204fb681
PF
207}
208
88d5a3db
PF
209static int radv_recv(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
210 sd_radv *ra = userdata;
211 _cleanup_free_ char *addr = NULL;
212 struct in6_addr src;
213 triple_timestamp timestamp;
214 int r;
215 ssize_t buflen;
216 _cleanup_free_ char *buf = NULL;
217
218 assert(s);
219 assert(ra);
220 assert(ra->event);
221
222 buflen = next_datagram_size_fd(fd);
cfffddea
LP
223 if (buflen < 0)
224 return (int) buflen;
88d5a3db
PF
225
226 buf = new0(char, buflen);
227 if (!buf)
e55a6eae 228 return -ENOMEM;
88d5a3db
PF
229
230 r = icmp6_receive(fd, buf, buflen, &src, &timestamp);
231 if (r < 0) {
232 switch (r) {
233 case -EADDRNOTAVAIL:
234 (void) in_addr_to_string(AF_INET6, (union in_addr_union*) &src, &addr);
235 log_radv("Received RS from non-link-local address %s. Ignoring", addr);
236 break;
237
238 case -EMULTIHOP:
239 log_radv("Received RS with invalid hop limit. Ignoring.");
240 break;
241
242 case -EPFNOSUPPORT:
243 log_radv("Received invalid source address from ICMPv6 socket. Ignoring.");
244 break;
245
8eb41f4c
LP
246 case -EAGAIN: /* ignore spurious wakeups */
247 break;
248
88d5a3db 249 default:
8eb41f4c 250 log_radv_errno(r, "Unexpected error receiving from ICMPv6 socket: %m");
88d5a3db
PF
251 break;
252 }
253
254 return 0;
255 }
256
cfffddea
LP
257 if ((size_t) buflen < sizeof(struct nd_router_solicit)) {
258 log_radv("Too short packet received");
259 return 0;
260 }
261
88d5a3db
PF
262 (void) in_addr_to_string(AF_INET6, (union in_addr_union*) &src, &addr);
263
264 r = radv_send(ra, &src, ra->lifetime);
265 if (r < 0)
5a9fca25 266 log_radv_errno(r, "Unable to send solicited Router Advertisement to %s: %m", strnull(addr));
88d5a3db 267 else
5a9fca25 268 log_radv("Sent solicited Router Advertisement to %s", strnull(addr));
88d5a3db
PF
269
270 return 0;
271}
272
204fb681
PF
273static usec_t radv_compute_timeout(usec_t min, usec_t max) {
274 assert_return(min <= max, SD_RADV_DEFAULT_MIN_TIMEOUT_USEC);
275
276 return min + (random_u32() % (max - min));
277}
278
279static int radv_timeout(sd_event_source *s, uint64_t usec, void *userdata) {
280 int r;
281 sd_radv *ra = userdata;
282 usec_t min_timeout = SD_RADV_DEFAULT_MIN_TIMEOUT_USEC;
283 usec_t max_timeout = SD_RADV_DEFAULT_MAX_TIMEOUT_USEC;
284 usec_t time_now, timeout;
285 char time_string[FORMAT_TIMESPAN_MAX];
286
287 assert(s);
288 assert(ra);
289 assert(ra->event);
290
204fb681
PF
291 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
292 if (r < 0)
293 goto fail;
294
295 r = radv_send(ra, NULL, ra->lifetime);
296 if (r < 0)
fdc2afc1 297 log_radv_errno(r, "Unable to send Router Advertisement: %m");
204fb681
PF
298
299 /* RFC 4861, Section 6.2.4, sending initial Router Advertisements */
300 if (ra->ra_sent < SD_RADV_MAX_INITIAL_RTR_ADVERTISEMENTS) {
301 max_timeout = SD_RADV_MAX_INITIAL_RTR_ADVERT_INTERVAL_USEC;
302 min_timeout = SD_RADV_MAX_INITIAL_RTR_ADVERT_INTERVAL_USEC / 3;
303 }
304
305 timeout = radv_compute_timeout(min_timeout, max_timeout);
306
307 log_radv("Next Router Advertisement in %s",
308 format_timespan(time_string, FORMAT_TIMESPAN_MAX,
309 timeout, USEC_PER_SEC));
310
807a8ede
YW
311 r = event_reset_time(ra->event, &ra->timeout_event_source,
312 clock_boottime_or_monotonic(),
313 time_now + timeout, MSEC_PER_SEC,
314 radv_timeout, ra,
315 ra->event_priority, "radv-timeout", true);
204fb681
PF
316 if (r < 0)
317 goto fail;
318
319 ra->ra_sent++;
320
807a8ede
YW
321 return 0;
322
204fb681 323fail:
807a8ede 324 sd_radv_stop(ra);
204fb681
PF
325
326 return 0;
327}
328
204f99d2 329_public_ int sd_radv_stop(sd_radv *ra) {
204fb681
PF
330 int r;
331
204f99d2
PF
332 assert_return(ra, -EINVAL);
333
6f8a8b84
SS
334 if (ra->state == SD_RADV_STATE_IDLE)
335 return 0;
336
204f99d2
PF
337 log_radv("Stopping IPv6 Router Advertisement daemon");
338
204fb681
PF
339 /* RFC 4861, Section 6.2.5, send at least one Router Advertisement
340 with zero lifetime */
341 r = radv_send(ra, NULL, 0);
342 if (r < 0)
fdc2afc1 343 log_radv_errno(r, "Unable to send last Router Advertisement with router lifetime set to zero: %m");
204fb681
PF
344
345 radv_reset(ra);
77baf5ae 346 ra->fd = safe_close(ra->fd);
204f99d2
PF
347 ra->state = SD_RADV_STATE_IDLE;
348
349 return 0;
350}
351
352_public_ int sd_radv_start(sd_radv *ra) {
f474884c 353 int r;
204fb681 354
204f99d2
PF
355 assert_return(ra, -EINVAL);
356 assert_return(ra->event, -EINVAL);
357 assert_return(ra->ifindex > 0, -EINVAL);
358
359 if (ra->state != SD_RADV_STATE_IDLE)
360 return 0;
361
807a8ede
YW
362 r = event_reset_time(ra->event, &ra->timeout_event_source,
363 clock_boottime_or_monotonic(),
364 0, 0,
365 radv_timeout, ra,
366 ra->event_priority, "radv-timeout", true);
204fb681
PF
367 if (r < 0)
368 goto fail;
369
77baf5ae
PF
370 r = icmp6_bind_router_advertisement(ra->ifindex);
371 if (r < 0)
372 goto fail;
373
374 ra->fd = r;
88d5a3db
PF
375
376 r = sd_event_add_io(ra->event, &ra->recv_event_source, ra->fd, EPOLLIN, radv_recv, ra);
377 if (r < 0)
378 goto fail;
379
380 r = sd_event_source_set_priority(ra->recv_event_source, ra->event_priority);
381 if (r < 0)
382 goto fail;
383
384 (void) sd_event_source_set_description(ra->recv_event_source, "radv-receive-message");
77baf5ae 385
204f99d2
PF
386 ra->state = SD_RADV_STATE_ADVERTISING;
387
388 log_radv("Started IPv6 Router Advertisement daemon");
389
390 return 0;
204fb681
PF
391
392 fail:
393 radv_reset(ra);
394
395 return r;
204f99d2
PF
396}
397
398_public_ int sd_radv_set_ifindex(sd_radv *ra, int ifindex) {
399 assert_return(ra, -EINVAL);
400 assert_return(ifindex >= -1, -EINVAL);
401
402 if (ra->state != SD_RADV_STATE_IDLE)
403 return -EBUSY;
404
405 ra->ifindex = ifindex;
406
407 return 0;
408}
409
410_public_ int sd_radv_set_mac(sd_radv *ra, const struct ether_addr *mac_addr) {
411 assert_return(ra, -EINVAL);
412
413 if (ra->state != SD_RADV_STATE_IDLE)
414 return -EBUSY;
415
416 if (mac_addr)
417 ra->mac_addr = *mac_addr;
418 else
419 zero(ra->mac_addr);
420
421 return 0;
422}
423
424_public_ int sd_radv_set_mtu(sd_radv *ra, uint32_t mtu) {
425 assert_return(ra, -EINVAL);
426 assert_return(mtu >= 1280, -EINVAL);
427
204f99d2
PF
428 ra->mtu = mtu;
429
430 return 0;
431}
432
433_public_ int sd_radv_set_hop_limit(sd_radv *ra, uint8_t hop_limit) {
434 assert_return(ra, -EINVAL);
435
436 if (ra->state != SD_RADV_STATE_IDLE)
437 return -EBUSY;
438
439 ra->hop_limit = hop_limit;
440
441 return 0;
442}
443
444_public_ int sd_radv_set_router_lifetime(sd_radv *ra, uint32_t router_lifetime) {
445 assert_return(ra, -EINVAL);
446
447 if (ra->state != SD_RADV_STATE_IDLE)
448 return -EBUSY;
449
450 /* RFC 4191, Section 2.2, "...If the Router Lifetime is zero, the
451 preference value MUST be set to (00) by the sender..." */
452 if (router_lifetime == 0 &&
453 (ra->flags & (0x3 << 3)) != (SD_NDISC_PREFERENCE_MEDIUM << 3))
454 return -ETIME;
455
456 ra->lifetime = router_lifetime;
457
458 return 0;
459}
460
461_public_ int sd_radv_set_managed_information(sd_radv *ra, int managed) {
462 assert_return(ra, -EINVAL);
463
464 if (ra->state != SD_RADV_STATE_IDLE)
465 return -EBUSY;
466
467 SET_FLAG(ra->flags, ND_RA_FLAG_MANAGED, managed);
468
469 return 0;
470}
471
472_public_ int sd_radv_set_other_information(sd_radv *ra, int other) {
473 assert_return(ra, -EINVAL);
474
475 if (ra->state != SD_RADV_STATE_IDLE)
476 return -EBUSY;
477
478 SET_FLAG(ra->flags, ND_RA_FLAG_OTHER, other);
479
480 return 0;
481}
482
483_public_ int sd_radv_set_preference(sd_radv *ra, unsigned preference) {
484 int r = 0;
485
486 assert_return(ra, -EINVAL);
487 assert_return(IN_SET(preference,
488 SD_NDISC_PREFERENCE_LOW,
489 SD_NDISC_PREFERENCE_MEDIUM,
490 SD_NDISC_PREFERENCE_HIGH), -EINVAL);
491
492 ra->flags = (ra->flags & ~(0x3 << 3)) | (preference << 3);
493
494 return r;
495}
496
a3a98776 497_public_ int sd_radv_add_prefix(sd_radv *ra, sd_radv_prefix *p, int dynamic) {
204f99d2 498 sd_radv_prefix *cur;
d601b566 499 int r;
204f99d2 500 _cleanup_free_ char *addr_p = NULL;
d601b566
PF
501 char time_string_preferred[FORMAT_TIMESPAN_MAX];
502 char time_string_valid[FORMAT_TIMESPAN_MAX];
503 usec_t time_now, valid, preferred, valid_until, preferred_until;
204f99d2
PF
504
505 assert_return(ra, -EINVAL);
506
507 if (!p)
508 return -EINVAL;
509
59ea6e57
LP
510 /* Refuse prefixes that don't have a prefix set */
511 if (IN6_IS_ADDR_UNSPECIFIED(&p->opt.in6_addr))
512 return -ENOEXEC;
513
204f99d2 514 LIST_FOREACH(prefix, cur, ra->prefixes) {
204f99d2
PF
515
516 r = in_addr_prefix_intersect(AF_INET6,
517 (union in_addr_union*) &cur->opt.in6_addr,
518 cur->opt.prefixlen,
519 (union in_addr_union*) &p->opt.in6_addr,
520 p->opt.prefixlen);
521 if (r > 0) {
522 _cleanup_free_ char *addr_cur = NULL;
523
204f99d2
PF
524 (void) in_addr_to_string(AF_INET6,
525 (union in_addr_union*) &p->opt.in6_addr,
526 &addr_p);
527
d601b566
PF
528 if (dynamic && cur->opt.prefixlen == p->opt.prefixlen)
529 goto update;
530
531 (void) in_addr_to_string(AF_INET6,
532 (union in_addr_union*) &cur->opt.in6_addr,
533 &addr_cur);
204f99d2
PF
534 log_radv("IPv6 prefix %s/%u already configured, ignoring %s/%u",
535 addr_cur, cur->opt.prefixlen,
536 addr_p, p->opt.prefixlen);
537
538 return -EEXIST;
539 }
540 }
541
542 p = sd_radv_prefix_ref(p);
543
544 LIST_APPEND(prefix, ra->prefixes, p);
545
546 ra->n_prefixes++;
547
548 (void) in_addr_to_string(AF_INET6, (union in_addr_union*) &p->opt.in6_addr, &addr_p);
d601b566
PF
549
550 if (!dynamic) {
551 log_radv("Added prefix %s/%d", addr_p, p->opt.prefixlen);
552 return 0;
553 }
554
555 cur = p;
556
557 update:
558 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
559 if (r < 0)
560 return r;
561
562 valid = be32toh(p->opt.valid_lifetime) * USEC_PER_SEC;
563 valid_until = usec_add(valid, time_now);
564 if (valid_until == USEC_INFINITY)
565 return -EOVERFLOW;
566
567 preferred = be32toh(p->opt.preferred_lifetime) * USEC_PER_SEC;
568 preferred_until = usec_add(preferred, time_now);
569 if (preferred_until == USEC_INFINITY)
570 return -EOVERFLOW;
571
572 cur->valid_until = valid_until;
573 cur->preferred_until = preferred_until;
574
575 log_radv("%s prefix %s/%u preferred %s valid %s",
576 cur? "Updated": "Added",
577 addr_p, p->opt.prefixlen,
578 format_timespan(time_string_preferred, FORMAT_TIMESPAN_MAX,
579 preferred, USEC_PER_SEC),
580 format_timespan(time_string_valid, FORMAT_TIMESPAN_MAX,
581 valid, USEC_PER_SEC));
204f99d2
PF
582
583 return 0;
584}
585
34c169c4 586_public_ sd_radv_prefix *sd_radv_remove_prefix(sd_radv *ra,
f5a5706a
LP
587 const struct in6_addr *prefix,
588 unsigned char prefixlen) {
34c169c4
PF
589 sd_radv_prefix *cur, *next;
590
591 assert_return(ra, NULL);
592 assert_return(prefix, NULL);
593
594 LIST_FOREACH_SAFE(prefix, cur, next, ra->prefixes) {
595 if (prefixlen != cur->opt.prefixlen)
596 continue;
597
598 if (!in_addr_equal(AF_INET6,
599 (union in_addr_union *)prefix,
600 (union in_addr_union *)&cur->opt.in6_addr))
601 continue;
602
603 LIST_REMOVE(prefix, ra->prefixes, cur);
604 ra->n_prefixes--;
62bbbedf 605 sd_radv_prefix_unref(cur);
34c169c4
PF
606
607 break;
608 }
609
610 return cur;
611}
612
203d4df5
SS
613_public_ int sd_radv_add_route_prefix(sd_radv *ra, sd_radv_route_prefix *p, int dynamic) {
614 char time_string_valid[FORMAT_TIMESPAN_MAX];
615 usec_t time_now, valid, valid_until;
616 _cleanup_free_ char *pretty = NULL;
617 sd_radv_route_prefix *cur;
618 int r;
619
620 assert_return(ra, -EINVAL);
621
622 if (!p)
623 return -EINVAL;
624
625 (void) in_addr_to_string(AF_INET6,
626 (union in_addr_union*) &p->opt.in6_addr,
627 &pretty);
628
629 LIST_FOREACH(prefix, cur, ra->route_prefixes) {
630 _cleanup_free_ char *addr = NULL;
631
632 r = in_addr_prefix_intersect(AF_INET6,
633 (union in_addr_union*) &cur->opt.in6_addr,
634 cur->opt.prefixlen,
635 (union in_addr_union*) &p->opt.in6_addr,
636 p->opt.prefixlen);
637 if (r < 0)
638 return r;
639 if (r == 0)
640 continue;
641
642 if (dynamic && cur->opt.prefixlen == p->opt.prefixlen)
643 goto update;
644
645 (void) in_addr_to_string(AF_INET6,
646 (union in_addr_union*) &cur->opt.in6_addr,
647 &addr);
648 log_radv("IPv6 route prefix %s/%u already configured, ignoring %s/%u",
649 strempty(addr), cur->opt.prefixlen,
650 strempty(pretty), p->opt.prefixlen);
651
652 return -EEXIST;
653 }
654
655 p = sd_radv_route_prefix_ref(p);
656
657 LIST_APPEND(prefix, ra->route_prefixes, p);
658 ra->n_route_prefixes++;
659
660 cur = p;
661 if (!dynamic) {
662 log_radv("Added prefix %s/%u", strempty(pretty), p->opt.prefixlen);
663 return 0;
664 }
665
666 update:
667 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
668 if (r < 0)
669 return r;
670
671 valid = be32toh(p->opt.lifetime) * USEC_PER_SEC;
672 valid_until = usec_add(valid, time_now);
673 if (valid_until == USEC_INFINITY)
674 return -EOVERFLOW;
675
676 log_radv("%s route prefix %s/%u valid %s",
677 cur? "Updated": "Added",
678 strempty(pretty), p->opt.prefixlen,
679 format_timespan(time_string_valid, FORMAT_TIMESPAN_MAX, valid, USEC_PER_SEC));
680
681 return 0;
682}
683
e9c6da38
PF
684_public_ int sd_radv_set_rdnss(sd_radv *ra, uint32_t lifetime,
685 const struct in6_addr *dns, size_t n_dns) {
686 _cleanup_free_ struct sd_radv_opt_dns *opt_rdnss = NULL;
687 size_t len;
688
689 assert_return(ra, -EINVAL);
690 assert_return(n_dns < 128, -EINVAL);
691
692 if (!dns || n_dns == 0) {
693 ra->rdnss = mfree(ra->rdnss);
694 ra->n_rdnss = 0;
695
696 return 0;
697 }
698
699 len = sizeof(struct sd_radv_opt_dns) + sizeof(struct in6_addr) * n_dns;
700
701 opt_rdnss = malloc0(len);
702 if (!opt_rdnss)
703 return -ENOMEM;
704
705 opt_rdnss->type = SD_RADV_OPT_RDNSS;
706 opt_rdnss->length = len / 8;
707 opt_rdnss->lifetime = htobe32(lifetime);
708
709 memcpy(opt_rdnss + 1, dns, n_dns * sizeof(struct in6_addr));
710
1cc6c93a 711 free_and_replace(ra->rdnss, opt_rdnss);
e9c6da38
PF
712
713 ra->n_rdnss = n_dns;
714
715 return 0;
716}
717
e965d6ab
PF
718_public_ int sd_radv_set_dnssl(sd_radv *ra, uint32_t lifetime,
719 char **search_list) {
720 _cleanup_free_ struct sd_radv_opt_dns *opt_dnssl = NULL;
721 size_t len = 0;
722 char **s;
723 uint8_t *p;
724
725 assert_return(ra, -EINVAL);
726
97d7974b 727 if (strv_isempty(search_list)) {
e965d6ab 728 ra->dnssl = mfree(ra->dnssl);
e965d6ab
PF
729 return 0;
730 }
731
732 STRV_FOREACH(s, search_list)
733 len += strlen(*s) + 2;
734
735 len = (sizeof(struct sd_radv_opt_dns) + len + 7) & ~0x7;
736
737 opt_dnssl = malloc0(len);
738 if (!opt_dnssl)
739 return -ENOMEM;
740
741 opt_dnssl->type = SD_RADV_OPT_DNSSL;
742 opt_dnssl->length = len / 8;
743 opt_dnssl->lifetime = htobe32(lifetime);
744
745 p = (uint8_t *)(opt_dnssl + 1);
746 len -= sizeof(struct sd_radv_opt_dns);
747
748 STRV_FOREACH(s, search_list) {
749 int r;
750
751 r = dns_name_to_wire_format(*s, p, len, false);
752 if (r < 0)
753 return r;
754
755 if (len < (size_t)r)
756 return -ENOBUFS;
757
758 p += r;
759 len -= r;
760 }
761
1cc6c93a 762 free_and_replace(ra->dnssl, opt_dnssl);
e965d6ab
PF
763
764 return 0;
765}
766
04473969 767_public_ int sd_radv_prefix_new(sd_radv_prefix **ret) {
d2c8eed2 768 sd_radv_prefix *p;
04473969
PF
769
770 assert_return(ret, -EINVAL);
771
d2c8eed2 772 p = new(sd_radv_prefix, 1);
04473969
PF
773 if (!p)
774 return -ENOMEM;
775
d2c8eed2
LP
776 *p = (sd_radv_prefix) {
777 .n_ref = 1,
04473969 778
d2c8eed2
LP
779 .opt.type = ND_OPT_PREFIX_INFORMATION,
780 .opt.length = (sizeof(p->opt) - 1)/8 + 1,
781 .opt.prefixlen = 64,
04473969 782
d2c8eed2
LP
783 /* RFC 4861, Section 6.2.1 */
784 .opt.flags = ND_OPT_PI_FLAG_ONLINK|ND_OPT_PI_FLAG_AUTO,
204f99d2 785
d2c8eed2
LP
786 .opt.preferred_lifetime = htobe32(604800),
787 .opt.valid_lifetime = htobe32(2592000),
788 };
04473969 789
d2c8eed2 790 *ret = p;
04473969
PF
791 return 0;
792}
793
8301aa0b 794DEFINE_PUBLIC_TRIVIAL_REF_UNREF_FUNC(sd_radv_prefix, sd_radv_prefix, mfree);
04473969 795
f5a5706a 796_public_ int sd_radv_prefix_set_prefix(sd_radv_prefix *p, const struct in6_addr *in6_addr,
04473969
PF
797 unsigned char prefixlen) {
798 assert_return(p, -EINVAL);
799 assert_return(in6_addr, -EINVAL);
800
801 if (prefixlen < 3 || prefixlen > 128)
802 return -EINVAL;
803
804 if (prefixlen > 64)
805 /* unusual but allowed, log it */
806 log_radv("Unusual prefix length %d greater than 64", prefixlen);
807
808 p->opt.in6_addr = *in6_addr;
809 p->opt.prefixlen = prefixlen;
810
811 return 0;
812}
813
814_public_ int sd_radv_prefix_set_onlink(sd_radv_prefix *p, int onlink) {
815 assert_return(p, -EINVAL);
816
817 SET_FLAG(p->opt.flags, ND_OPT_PI_FLAG_ONLINK, onlink);
818
819 return 0;
820}
821
822_public_ int sd_radv_prefix_set_address_autoconfiguration(sd_radv_prefix *p,
823 int address_autoconfiguration) {
824 assert_return(p, -EINVAL);
825
826 SET_FLAG(p->opt.flags, ND_OPT_PI_FLAG_AUTO, address_autoconfiguration);
827
828 return 0;
829}
830
831_public_ int sd_radv_prefix_set_valid_lifetime(sd_radv_prefix *p,
832 uint32_t valid_lifetime) {
833 assert_return(p, -EINVAL);
834
835 p->opt.valid_lifetime = htobe32(valid_lifetime);
836
837 return 0;
838}
839
840_public_ int sd_radv_prefix_set_preferred_lifetime(sd_radv_prefix *p,
841 uint32_t preferred_lifetime) {
842 assert_return(p, -EINVAL);
843
844 p->opt.preferred_lifetime = htobe32(preferred_lifetime);
845
846 return 0;
847}
203d4df5
SS
848
849_public_ int sd_radv_route_prefix_new(sd_radv_route_prefix **ret) {
850 sd_radv_route_prefix *p;
851
852 assert_return(ret, -EINVAL);
853
854 p = new(sd_radv_route_prefix, 1);
855 if (!p)
856 return -ENOMEM;
857
858 *p = (sd_radv_route_prefix) {
859 .n_ref = 1,
860
861 .opt.type = SD_RADV_OPT_ROUTE_INFORMATION,
862 .opt.length = DIV_ROUND_UP(sizeof(p->opt), 8),
863 .opt.prefixlen = 64,
864
865 .opt.lifetime = htobe32(604800),
866 };
867
868 *ret = p;
869 return 0;
870}
871
872DEFINE_PUBLIC_TRIVIAL_REF_UNREF_FUNC(sd_radv_route_prefix, sd_radv_route_prefix, mfree);
873
874_public_ int sd_radv_prefix_set_route_prefix(sd_radv_route_prefix *p, const struct in6_addr *in6_addr,
875 unsigned char prefixlen) {
876 assert_return(p, -EINVAL);
877 assert_return(in6_addr, -EINVAL);
878
879 if (prefixlen > 128)
880 return -EINVAL;
881
882 if (prefixlen > 64)
883 /* unusual but allowed, log it */
884 log_radv("Unusual prefix length %u greater than 64", prefixlen);
885
886 p->opt.in6_addr = *in6_addr;
887 p->opt.prefixlen = prefixlen;
888
889 return 0;
890}
891
892_public_ int sd_radv_route_prefix_set_lifetime(sd_radv_route_prefix *p, uint32_t valid_lifetime) {
893 assert_return(p, -EINVAL);
894
895 p->opt.lifetime = htobe32(valid_lifetime);
896
897 return 0;
898}