]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/libsystemd-network/sd-radv.c
Merge pull request #16336 from yuwata/ifindex-cleanups
[thirdparty/systemd.git] / src / libsystemd-network / sd-radv.c
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
04473969 2/***
810adae9 3 Copyright © 2017 Intel Corporation. All rights reserved.
04473969
PF
4***/
5
6#include <netinet/icmp6.h>
7#include <netinet/in.h>
204f99d2 8#include <arpa/inet.h>
04473969
PF
9
10#include "sd-radv.h"
11
12#include "alloc-util.h"
e965d6ab 13#include "dns-domain.h"
ae25915d 14#include "ether-addr-util.h"
807a8ede 15#include "event-util.h"
04473969
PF
16#include "fd-util.h"
17#include "icmp6-util.h"
18#include "in-addr-util.h"
5cfa2c3d
LP
19#include "io-util.h"
20#include "macro.h"
0a970718 21#include "memory-util.h"
04473969 22#include "radv-internal.h"
5cfa2c3d 23#include "random-util.h"
04473969
PF
24#include "socket-util.h"
25#include "string-util.h"
e965d6ab 26#include "strv.h"
04473969 27
204f99d2
PF
28_public_ int sd_radv_new(sd_radv **ret) {
29 _cleanup_(sd_radv_unrefp) sd_radv *ra = NULL;
30
31 assert_return(ret, -EINVAL);
32
78f9d24f 33 ra = new(sd_radv, 1);
204f99d2
PF
34 if (!ra)
35 return -ENOMEM;
36
78f9d24f
YW
37 *ra = (sd_radv) {
38 .n_ref = 1,
39 .fd = -1,
40 };
204f99d2 41
1cc6c93a 42 *ret = TAKE_PTR(ra);
204f99d2
PF
43
44 return 0;
45}
46
47_public_ int sd_radv_attach_event(sd_radv *ra, sd_event *event, int64_t priority) {
48 int r;
49
50 assert_return(ra, -EINVAL);
51 assert_return(!ra->event, -EBUSY);
52
53 if (event)
54 ra->event = sd_event_ref(event);
55 else {
56 r = sd_event_default(&ra->event);
57 if (r < 0)
58 return 0;
59 }
60
61 ra->event_priority = priority;
62
63 return 0;
64}
65
66_public_ int sd_radv_detach_event(sd_radv *ra) {
67
68 assert_return(ra, -EINVAL);
69
70 ra->event = sd_event_unref(ra->event);
71 return 0;
72}
73
74_public_ sd_event *sd_radv_get_event(sd_radv *ra) {
75 assert_return(ra, NULL);
76
77 return ra->event;
78}
79
204fb681 80static void radv_reset(sd_radv *ra) {
c4b6dda0 81 assert(ra);
204fb681 82
807a8ede 83 (void) event_source_disable(ra->timeout_event_source);
204fb681 84
88d5a3db
PF
85 ra->recv_event_source =
86 sd_event_source_unref(ra->recv_event_source);
87
204fb681
PF
88 ra->ra_sent = 0;
89}
90
8301aa0b 91static sd_radv *radv_free(sd_radv *ra) {
e866e17b
LP
92 if (!ra)
93 return NULL;
204f99d2
PF
94
95 while (ra->prefixes) {
96 sd_radv_prefix *p = ra->prefixes;
97
98 LIST_REMOVE(prefix, ra->prefixes, p);
99 sd_radv_prefix_unref(p);
100 }
101
69d7eba1
YW
102 while (ra->route_prefixes) {
103 sd_radv_route_prefix *p = ra->route_prefixes;
104
105 LIST_REMOVE(prefix, ra->route_prefixes, p);
106 sd_radv_route_prefix_unref(p);
107 }
108
e9c6da38 109 free(ra->rdnss);
f9aa5417 110 free(ra->dnssl);
e9c6da38 111
807a8ede
YW
112 ra->timeout_event_source = sd_event_source_unref(ra->timeout_event_source);
113
204fb681
PF
114 radv_reset(ra);
115
204f99d2 116 sd_radv_detach_event(ra);
c4b6dda0
LP
117
118 ra->fd = safe_close(ra->fd);
119
204f99d2
PF
120 return mfree(ra);
121}
122
8301aa0b
YW
123DEFINE_PUBLIC_TRIVIAL_REF_UNREF_FUNC(sd_radv, sd_radv, radv_free);
124
83ef9d14 125static int radv_send(sd_radv *ra, const struct in6_addr *dst, uint32_t router_lifetime) {
203d4df5 126 sd_radv_route_prefix *rt;
77baf5ae
PF
127 sd_radv_prefix *p;
128 struct sockaddr_in6 dst_addr = {
129 .sin6_family = AF_INET6,
130 .sin6_addr = IN6ADDR_ALL_NODES_MULTICAST_INIT,
131 };
132 struct nd_router_advert adv = {};
133 struct {
134 struct nd_opt_hdr opthdr;
135 struct ether_addr slladdr;
136 } _packed_ opt_mac = {
137 .opthdr = {
138 .nd_opt_type = ND_OPT_SOURCE_LINKADDR,
139 .nd_opt_len = (sizeof(struct nd_opt_hdr) +
140 sizeof(struct ether_addr) - 1) /8 + 1,
141 },
142 };
143 struct nd_opt_mtu opt_mtu = {
144 .nd_opt_mtu_type = ND_OPT_MTU,
145 .nd_opt_mtu_len = 1,
146 };
203d4df5 147 /* Reserve iov space for RA header, linkaddr, MTU, N prefixes, N routes, RDNSS
6852c0f6 148 and DNSSL */
203d4df5 149 struct iovec iov[5 + ra->n_prefixes + ra->n_route_prefixes];
77baf5ae
PF
150 struct msghdr msg = {
151 .msg_name = &dst_addr,
152 .msg_namelen = sizeof(dst_addr),
153 .msg_iov = iov,
154 };
d601b566
PF
155 usec_t time_now;
156 int r;
157
dc0ec5e2
LP
158 assert(ra);
159
d601b566
PF
160 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
161 if (r < 0)
162 return r;
77baf5ae 163
dc0ec5e2 164 if (dst && !IN6_IS_ADDR_UNSPECIFIED(dst))
77baf5ae 165 dst_addr.sin6_addr = *dst;
88d5a3db 166
77baf5ae
PF
167 adv.nd_ra_type = ND_ROUTER_ADVERT;
168 adv.nd_ra_curhoplimit = ra->hop_limit;
169 adv.nd_ra_flags_reserved = ra->flags;
170 adv.nd_ra_router_lifetime = htobe16(router_lifetime);
5cfa2c3d 171 iov[msg.msg_iovlen++] = IOVEC_MAKE(&adv, sizeof(adv));
77baf5ae
PF
172
173 /* MAC address is optional, either because the link does not use L2
174 addresses or load sharing is desired. See RFC 4861, Section 4.2 */
ae25915d 175 if (!ether_addr_is_null(&ra->mac_addr)) {
77baf5ae 176 opt_mac.slladdr = ra->mac_addr;
5cfa2c3d 177 iov[msg.msg_iovlen++] = IOVEC_MAKE(&opt_mac, sizeof(opt_mac));
77baf5ae
PF
178 }
179
180 if (ra->mtu) {
181 opt_mtu.nd_opt_mtu_mtu = htobe32(ra->mtu);
5cfa2c3d 182 iov[msg.msg_iovlen++] = IOVEC_MAKE(&opt_mtu, sizeof(opt_mtu));
77baf5ae
PF
183 }
184
185 LIST_FOREACH(prefix, p, ra->prefixes) {
d601b566
PF
186 if (p->valid_until) {
187
188 if (time_now > p->valid_until)
189 p->opt.valid_lifetime = 0;
190 else
191 p->opt.valid_lifetime = htobe32((p->valid_until - time_now) / USEC_PER_SEC);
192
193 if (time_now > p->preferred_until)
194 p->opt.preferred_lifetime = 0;
195 else
196 p->opt.preferred_lifetime = htobe32((p->preferred_until - time_now) / USEC_PER_SEC);
197 }
5cfa2c3d 198 iov[msg.msg_iovlen++] = IOVEC_MAKE(&p->opt, sizeof(p->opt));
77baf5ae
PF
199 }
200
203d4df5
SS
201 LIST_FOREACH(prefix, rt, ra->route_prefixes)
202 iov[msg.msg_iovlen++] = IOVEC_MAKE(&rt->opt, sizeof(rt->opt));
203
5cfa2c3d
LP
204 if (ra->rdnss)
205 iov[msg.msg_iovlen++] = IOVEC_MAKE(ra->rdnss, ra->rdnss->length * 8);
e9c6da38 206
5cfa2c3d
LP
207 if (ra->dnssl)
208 iov[msg.msg_iovlen++] = IOVEC_MAKE(ra->dnssl, ra->dnssl->length * 8);
e965d6ab 209
77baf5ae
PF
210 if (sendmsg(ra->fd, &msg, 0) < 0)
211 return -errno;
204fb681 212
77baf5ae 213 return 0;
204fb681
PF
214}
215
88d5a3db
PF
216static int radv_recv(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
217 sd_radv *ra = userdata;
218 _cleanup_free_ char *addr = NULL;
219 struct in6_addr src;
220 triple_timestamp timestamp;
221 int r;
222 ssize_t buflen;
223 _cleanup_free_ char *buf = NULL;
224
225 assert(s);
226 assert(ra);
227 assert(ra->event);
228
229 buflen = next_datagram_size_fd(fd);
cfffddea
LP
230 if (buflen < 0)
231 return (int) buflen;
88d5a3db
PF
232
233 buf = new0(char, buflen);
234 if (!buf)
e55a6eae 235 return -ENOMEM;
88d5a3db
PF
236
237 r = icmp6_receive(fd, buf, buflen, &src, &timestamp);
238 if (r < 0) {
239 switch (r) {
240 case -EADDRNOTAVAIL:
241 (void) in_addr_to_string(AF_INET6, (union in_addr_union*) &src, &addr);
242 log_radv("Received RS from non-link-local address %s. Ignoring", addr);
243 break;
244
245 case -EMULTIHOP:
246 log_radv("Received RS with invalid hop limit. Ignoring.");
247 break;
248
249 case -EPFNOSUPPORT:
250 log_radv("Received invalid source address from ICMPv6 socket. Ignoring.");
251 break;
252
8eb41f4c
LP
253 case -EAGAIN: /* ignore spurious wakeups */
254 break;
255
88d5a3db 256 default:
8eb41f4c 257 log_radv_errno(r, "Unexpected error receiving from ICMPv6 socket: %m");
88d5a3db
PF
258 break;
259 }
260
261 return 0;
262 }
263
cfffddea
LP
264 if ((size_t) buflen < sizeof(struct nd_router_solicit)) {
265 log_radv("Too short packet received");
266 return 0;
267 }
268
88d5a3db
PF
269 (void) in_addr_to_string(AF_INET6, (union in_addr_union*) &src, &addr);
270
271 r = radv_send(ra, &src, ra->lifetime);
272 if (r < 0)
5a9fca25 273 log_radv_errno(r, "Unable to send solicited Router Advertisement to %s: %m", strnull(addr));
88d5a3db 274 else
5a9fca25 275 log_radv("Sent solicited Router Advertisement to %s", strnull(addr));
88d5a3db
PF
276
277 return 0;
278}
279
204fb681
PF
280static usec_t radv_compute_timeout(usec_t min, usec_t max) {
281 assert_return(min <= max, SD_RADV_DEFAULT_MIN_TIMEOUT_USEC);
282
ef90b6a4
GM
283 /* RFC 4861: min must be no less than 3s, max must be no less than 4s */
284 min = MAX(min, 3*USEC_PER_SEC);
285 max = MAX(max, 4*USEC_PER_SEC);
286
204fb681
PF
287 return min + (random_u32() % (max - min));
288}
289
290static int radv_timeout(sd_event_source *s, uint64_t usec, void *userdata) {
291 int r;
292 sd_radv *ra = userdata;
293 usec_t min_timeout = SD_RADV_DEFAULT_MIN_TIMEOUT_USEC;
294 usec_t max_timeout = SD_RADV_DEFAULT_MAX_TIMEOUT_USEC;
295 usec_t time_now, timeout;
296 char time_string[FORMAT_TIMESPAN_MAX];
297
298 assert(s);
299 assert(ra);
300 assert(ra->event);
301
204fb681
PF
302 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
303 if (r < 0)
304 goto fail;
305
306 r = radv_send(ra, NULL, ra->lifetime);
307 if (r < 0)
fdc2afc1 308 log_radv_errno(r, "Unable to send Router Advertisement: %m");
204fb681
PF
309
310 /* RFC 4861, Section 6.2.4, sending initial Router Advertisements */
311 if (ra->ra_sent < SD_RADV_MAX_INITIAL_RTR_ADVERTISEMENTS) {
312 max_timeout = SD_RADV_MAX_INITIAL_RTR_ADVERT_INTERVAL_USEC;
313 min_timeout = SD_RADV_MAX_INITIAL_RTR_ADVERT_INTERVAL_USEC / 3;
314 }
315
ef90b6a4
GM
316 /* RFC 4861, Section 6.2.1, lifetime must be at least MaxRtrAdvInterval,
317 so lower the interval here */
318 if (ra->lifetime > 0 && (ra->lifetime * USEC_PER_SEC) < max_timeout) {
319 max_timeout = ra->lifetime * USEC_PER_SEC;
320 min_timeout = max_timeout / 3;
321 }
322
204fb681
PF
323 timeout = radv_compute_timeout(min_timeout, max_timeout);
324
325 log_radv("Next Router Advertisement in %s",
326 format_timespan(time_string, FORMAT_TIMESPAN_MAX,
327 timeout, USEC_PER_SEC));
328
807a8ede
YW
329 r = event_reset_time(ra->event, &ra->timeout_event_source,
330 clock_boottime_or_monotonic(),
331 time_now + timeout, MSEC_PER_SEC,
332 radv_timeout, ra,
333 ra->event_priority, "radv-timeout", true);
204fb681
PF
334 if (r < 0)
335 goto fail;
336
337 ra->ra_sent++;
338
807a8ede
YW
339 return 0;
340
204fb681 341fail:
807a8ede 342 sd_radv_stop(ra);
204fb681
PF
343
344 return 0;
345}
346
204f99d2 347_public_ int sd_radv_stop(sd_radv *ra) {
204fb681
PF
348 int r;
349
204f99d2
PF
350 assert_return(ra, -EINVAL);
351
6f8a8b84
SS
352 if (ra->state == SD_RADV_STATE_IDLE)
353 return 0;
354
204f99d2
PF
355 log_radv("Stopping IPv6 Router Advertisement daemon");
356
204fb681
PF
357 /* RFC 4861, Section 6.2.5, send at least one Router Advertisement
358 with zero lifetime */
359 r = radv_send(ra, NULL, 0);
360 if (r < 0)
fdc2afc1 361 log_radv_errno(r, "Unable to send last Router Advertisement with router lifetime set to zero: %m");
204fb681
PF
362
363 radv_reset(ra);
77baf5ae 364 ra->fd = safe_close(ra->fd);
204f99d2
PF
365 ra->state = SD_RADV_STATE_IDLE;
366
367 return 0;
368}
369
370_public_ int sd_radv_start(sd_radv *ra) {
f474884c 371 int r;
204fb681 372
204f99d2
PF
373 assert_return(ra, -EINVAL);
374 assert_return(ra->event, -EINVAL);
375 assert_return(ra->ifindex > 0, -EINVAL);
376
377 if (ra->state != SD_RADV_STATE_IDLE)
378 return 0;
379
807a8ede
YW
380 r = event_reset_time(ra->event, &ra->timeout_event_source,
381 clock_boottime_or_monotonic(),
382 0, 0,
383 radv_timeout, ra,
384 ra->event_priority, "radv-timeout", true);
204fb681
PF
385 if (r < 0)
386 goto fail;
387
77baf5ae
PF
388 r = icmp6_bind_router_advertisement(ra->ifindex);
389 if (r < 0)
390 goto fail;
391
392 ra->fd = r;
88d5a3db
PF
393
394 r = sd_event_add_io(ra->event, &ra->recv_event_source, ra->fd, EPOLLIN, radv_recv, ra);
395 if (r < 0)
396 goto fail;
397
398 r = sd_event_source_set_priority(ra->recv_event_source, ra->event_priority);
399 if (r < 0)
400 goto fail;
401
402 (void) sd_event_source_set_description(ra->recv_event_source, "radv-receive-message");
77baf5ae 403
204f99d2
PF
404 ra->state = SD_RADV_STATE_ADVERTISING;
405
406 log_radv("Started IPv6 Router Advertisement daemon");
407
408 return 0;
204fb681
PF
409
410 fail:
411 radv_reset(ra);
412
413 return r;
204f99d2
PF
414}
415
416_public_ int sd_radv_set_ifindex(sd_radv *ra, int ifindex) {
417 assert_return(ra, -EINVAL);
7fa69c0a 418 assert_return(ifindex > 0, -EINVAL);
204f99d2
PF
419
420 if (ra->state != SD_RADV_STATE_IDLE)
421 return -EBUSY;
422
423 ra->ifindex = ifindex;
424
425 return 0;
426}
427
428_public_ int sd_radv_set_mac(sd_radv *ra, const struct ether_addr *mac_addr) {
429 assert_return(ra, -EINVAL);
430
431 if (ra->state != SD_RADV_STATE_IDLE)
432 return -EBUSY;
433
434 if (mac_addr)
435 ra->mac_addr = *mac_addr;
436 else
437 zero(ra->mac_addr);
438
439 return 0;
440}
441
442_public_ int sd_radv_set_mtu(sd_radv *ra, uint32_t mtu) {
443 assert_return(ra, -EINVAL);
444 assert_return(mtu >= 1280, -EINVAL);
445
204f99d2
PF
446 ra->mtu = mtu;
447
448 return 0;
449}
450
451_public_ int sd_radv_set_hop_limit(sd_radv *ra, uint8_t hop_limit) {
452 assert_return(ra, -EINVAL);
453
454 if (ra->state != SD_RADV_STATE_IDLE)
455 return -EBUSY;
456
457 ra->hop_limit = hop_limit;
458
459 return 0;
460}
461
462_public_ int sd_radv_set_router_lifetime(sd_radv *ra, uint32_t router_lifetime) {
463 assert_return(ra, -EINVAL);
464
465 if (ra->state != SD_RADV_STATE_IDLE)
466 return -EBUSY;
467
468 /* RFC 4191, Section 2.2, "...If the Router Lifetime is zero, the
469 preference value MUST be set to (00) by the sender..." */
470 if (router_lifetime == 0 &&
471 (ra->flags & (0x3 << 3)) != (SD_NDISC_PREFERENCE_MEDIUM << 3))
472 return -ETIME;
473
474 ra->lifetime = router_lifetime;
475
476 return 0;
477}
478
479_public_ int sd_radv_set_managed_information(sd_radv *ra, int managed) {
480 assert_return(ra, -EINVAL);
481
482 if (ra->state != SD_RADV_STATE_IDLE)
483 return -EBUSY;
484
485 SET_FLAG(ra->flags, ND_RA_FLAG_MANAGED, managed);
486
487 return 0;
488}
489
490_public_ int sd_radv_set_other_information(sd_radv *ra, int other) {
491 assert_return(ra, -EINVAL);
492
493 if (ra->state != SD_RADV_STATE_IDLE)
494 return -EBUSY;
495
496 SET_FLAG(ra->flags, ND_RA_FLAG_OTHER, other);
497
498 return 0;
499}
500
501_public_ int sd_radv_set_preference(sd_radv *ra, unsigned preference) {
502 int r = 0;
503
504 assert_return(ra, -EINVAL);
505 assert_return(IN_SET(preference,
506 SD_NDISC_PREFERENCE_LOW,
507 SD_NDISC_PREFERENCE_MEDIUM,
508 SD_NDISC_PREFERENCE_HIGH), -EINVAL);
509
510 ra->flags = (ra->flags & ~(0x3 << 3)) | (preference << 3);
511
512 return r;
513}
514
a3a98776 515_public_ int sd_radv_add_prefix(sd_radv *ra, sd_radv_prefix *p, int dynamic) {
204f99d2 516 sd_radv_prefix *cur;
d601b566 517 int r;
204f99d2 518 _cleanup_free_ char *addr_p = NULL;
d601b566
PF
519 char time_string_preferred[FORMAT_TIMESPAN_MAX];
520 char time_string_valid[FORMAT_TIMESPAN_MAX];
521 usec_t time_now, valid, preferred, valid_until, preferred_until;
204f99d2
PF
522
523 assert_return(ra, -EINVAL);
524
525 if (!p)
526 return -EINVAL;
527
59ea6e57
LP
528 /* Refuse prefixes that don't have a prefix set */
529 if (IN6_IS_ADDR_UNSPECIFIED(&p->opt.in6_addr))
530 return -ENOEXEC;
531
204f99d2 532 LIST_FOREACH(prefix, cur, ra->prefixes) {
204f99d2
PF
533
534 r = in_addr_prefix_intersect(AF_INET6,
535 (union in_addr_union*) &cur->opt.in6_addr,
536 cur->opt.prefixlen,
537 (union in_addr_union*) &p->opt.in6_addr,
538 p->opt.prefixlen);
539 if (r > 0) {
540 _cleanup_free_ char *addr_cur = NULL;
541
204f99d2
PF
542 (void) in_addr_to_string(AF_INET6,
543 (union in_addr_union*) &p->opt.in6_addr,
544 &addr_p);
545
d601b566
PF
546 if (dynamic && cur->opt.prefixlen == p->opt.prefixlen)
547 goto update;
548
549 (void) in_addr_to_string(AF_INET6,
550 (union in_addr_union*) &cur->opt.in6_addr,
551 &addr_cur);
204f99d2
PF
552 log_radv("IPv6 prefix %s/%u already configured, ignoring %s/%u",
553 addr_cur, cur->opt.prefixlen,
554 addr_p, p->opt.prefixlen);
555
556 return -EEXIST;
557 }
558 }
559
560 p = sd_radv_prefix_ref(p);
561
562 LIST_APPEND(prefix, ra->prefixes, p);
563
564 ra->n_prefixes++;
565
566 (void) in_addr_to_string(AF_INET6, (union in_addr_union*) &p->opt.in6_addr, &addr_p);
d601b566
PF
567
568 if (!dynamic) {
569 log_radv("Added prefix %s/%d", addr_p, p->opt.prefixlen);
570 return 0;
571 }
572
573 cur = p;
574
575 update:
576 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
577 if (r < 0)
578 return r;
579
580 valid = be32toh(p->opt.valid_lifetime) * USEC_PER_SEC;
581 valid_until = usec_add(valid, time_now);
582 if (valid_until == USEC_INFINITY)
583 return -EOVERFLOW;
584
585 preferred = be32toh(p->opt.preferred_lifetime) * USEC_PER_SEC;
586 preferred_until = usec_add(preferred, time_now);
587 if (preferred_until == USEC_INFINITY)
588 return -EOVERFLOW;
589
590 cur->valid_until = valid_until;
591 cur->preferred_until = preferred_until;
592
81c5a596 593 log_radv("Updated prefix %s/%u preferred %s valid %s",
d601b566
PF
594 addr_p, p->opt.prefixlen,
595 format_timespan(time_string_preferred, FORMAT_TIMESPAN_MAX,
596 preferred, USEC_PER_SEC),
597 format_timespan(time_string_valid, FORMAT_TIMESPAN_MAX,
598 valid, USEC_PER_SEC));
204f99d2
PF
599
600 return 0;
601}
602
34c169c4 603_public_ sd_radv_prefix *sd_radv_remove_prefix(sd_radv *ra,
f5a5706a
LP
604 const struct in6_addr *prefix,
605 unsigned char prefixlen) {
34c169c4
PF
606 sd_radv_prefix *cur, *next;
607
608 assert_return(ra, NULL);
609 assert_return(prefix, NULL);
610
611 LIST_FOREACH_SAFE(prefix, cur, next, ra->prefixes) {
612 if (prefixlen != cur->opt.prefixlen)
613 continue;
614
615 if (!in_addr_equal(AF_INET6,
616 (union in_addr_union *)prefix,
617 (union in_addr_union *)&cur->opt.in6_addr))
618 continue;
619
620 LIST_REMOVE(prefix, ra->prefixes, cur);
621 ra->n_prefixes--;
62bbbedf 622 sd_radv_prefix_unref(cur);
34c169c4
PF
623
624 break;
625 }
626
627 return cur;
628}
629
203d4df5
SS
630_public_ int sd_radv_add_route_prefix(sd_radv *ra, sd_radv_route_prefix *p, int dynamic) {
631 char time_string_valid[FORMAT_TIMESPAN_MAX];
632 usec_t time_now, valid, valid_until;
633 _cleanup_free_ char *pretty = NULL;
634 sd_radv_route_prefix *cur;
635 int r;
636
637 assert_return(ra, -EINVAL);
638
639 if (!p)
640 return -EINVAL;
641
642 (void) in_addr_to_string(AF_INET6,
643 (union in_addr_union*) &p->opt.in6_addr,
644 &pretty);
645
646 LIST_FOREACH(prefix, cur, ra->route_prefixes) {
647 _cleanup_free_ char *addr = NULL;
648
649 r = in_addr_prefix_intersect(AF_INET6,
650 (union in_addr_union*) &cur->opt.in6_addr,
651 cur->opt.prefixlen,
652 (union in_addr_union*) &p->opt.in6_addr,
653 p->opt.prefixlen);
654 if (r < 0)
655 return r;
656 if (r == 0)
657 continue;
658
659 if (dynamic && cur->opt.prefixlen == p->opt.prefixlen)
660 goto update;
661
662 (void) in_addr_to_string(AF_INET6,
663 (union in_addr_union*) &cur->opt.in6_addr,
664 &addr);
665 log_radv("IPv6 route prefix %s/%u already configured, ignoring %s/%u",
666 strempty(addr), cur->opt.prefixlen,
667 strempty(pretty), p->opt.prefixlen);
668
669 return -EEXIST;
670 }
671
672 p = sd_radv_route_prefix_ref(p);
673
674 LIST_APPEND(prefix, ra->route_prefixes, p);
675 ra->n_route_prefixes++;
676
677 cur = p;
678 if (!dynamic) {
679 log_radv("Added prefix %s/%u", strempty(pretty), p->opt.prefixlen);
680 return 0;
681 }
682
683 update:
684 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
685 if (r < 0)
686 return r;
687
688 valid = be32toh(p->opt.lifetime) * USEC_PER_SEC;
689 valid_until = usec_add(valid, time_now);
690 if (valid_until == USEC_INFINITY)
691 return -EOVERFLOW;
692
81c5a596 693 log_radv("Updated route prefix %s/%u valid %s",
203d4df5
SS
694 strempty(pretty), p->opt.prefixlen,
695 format_timespan(time_string_valid, FORMAT_TIMESPAN_MAX, valid, USEC_PER_SEC));
696
697 return 0;
698}
699
e9c6da38
PF
700_public_ int sd_radv_set_rdnss(sd_radv *ra, uint32_t lifetime,
701 const struct in6_addr *dns, size_t n_dns) {
702 _cleanup_free_ struct sd_radv_opt_dns *opt_rdnss = NULL;
703 size_t len;
704
705 assert_return(ra, -EINVAL);
706 assert_return(n_dns < 128, -EINVAL);
707
708 if (!dns || n_dns == 0) {
709 ra->rdnss = mfree(ra->rdnss);
710 ra->n_rdnss = 0;
711
712 return 0;
713 }
714
715 len = sizeof(struct sd_radv_opt_dns) + sizeof(struct in6_addr) * n_dns;
716
717 opt_rdnss = malloc0(len);
718 if (!opt_rdnss)
719 return -ENOMEM;
720
721 opt_rdnss->type = SD_RADV_OPT_RDNSS;
722 opt_rdnss->length = len / 8;
723 opt_rdnss->lifetime = htobe32(lifetime);
724
725 memcpy(opt_rdnss + 1, dns, n_dns * sizeof(struct in6_addr));
726
1cc6c93a 727 free_and_replace(ra->rdnss, opt_rdnss);
e9c6da38
PF
728
729 ra->n_rdnss = n_dns;
730
731 return 0;
732}
733
e965d6ab
PF
734_public_ int sd_radv_set_dnssl(sd_radv *ra, uint32_t lifetime,
735 char **search_list) {
736 _cleanup_free_ struct sd_radv_opt_dns *opt_dnssl = NULL;
737 size_t len = 0;
738 char **s;
739 uint8_t *p;
740
741 assert_return(ra, -EINVAL);
742
97d7974b 743 if (strv_isempty(search_list)) {
e965d6ab 744 ra->dnssl = mfree(ra->dnssl);
e965d6ab
PF
745 return 0;
746 }
747
748 STRV_FOREACH(s, search_list)
749 len += strlen(*s) + 2;
750
751 len = (sizeof(struct sd_radv_opt_dns) + len + 7) & ~0x7;
752
753 opt_dnssl = malloc0(len);
754 if (!opt_dnssl)
755 return -ENOMEM;
756
757 opt_dnssl->type = SD_RADV_OPT_DNSSL;
758 opt_dnssl->length = len / 8;
759 opt_dnssl->lifetime = htobe32(lifetime);
760
761 p = (uint8_t *)(opt_dnssl + 1);
762 len -= sizeof(struct sd_radv_opt_dns);
763
764 STRV_FOREACH(s, search_list) {
765 int r;
766
767 r = dns_name_to_wire_format(*s, p, len, false);
768 if (r < 0)
769 return r;
770
771 if (len < (size_t)r)
772 return -ENOBUFS;
773
774 p += r;
775 len -= r;
776 }
777
1cc6c93a 778 free_and_replace(ra->dnssl, opt_dnssl);
e965d6ab
PF
779
780 return 0;
781}
782
04473969 783_public_ int sd_radv_prefix_new(sd_radv_prefix **ret) {
d2c8eed2 784 sd_radv_prefix *p;
04473969
PF
785
786 assert_return(ret, -EINVAL);
787
d2c8eed2 788 p = new(sd_radv_prefix, 1);
04473969
PF
789 if (!p)
790 return -ENOMEM;
791
d2c8eed2
LP
792 *p = (sd_radv_prefix) {
793 .n_ref = 1,
04473969 794
d2c8eed2
LP
795 .opt.type = ND_OPT_PREFIX_INFORMATION,
796 .opt.length = (sizeof(p->opt) - 1)/8 + 1,
797 .opt.prefixlen = 64,
04473969 798
d2c8eed2
LP
799 /* RFC 4861, Section 6.2.1 */
800 .opt.flags = ND_OPT_PI_FLAG_ONLINK|ND_OPT_PI_FLAG_AUTO,
204f99d2 801
d2c8eed2
LP
802 .opt.preferred_lifetime = htobe32(604800),
803 .opt.valid_lifetime = htobe32(2592000),
804 };
04473969 805
d2c8eed2 806 *ret = p;
04473969
PF
807 return 0;
808}
809
8301aa0b 810DEFINE_PUBLIC_TRIVIAL_REF_UNREF_FUNC(sd_radv_prefix, sd_radv_prefix, mfree);
04473969 811
f5a5706a 812_public_ int sd_radv_prefix_set_prefix(sd_radv_prefix *p, const struct in6_addr *in6_addr,
04473969
PF
813 unsigned char prefixlen) {
814 assert_return(p, -EINVAL);
815 assert_return(in6_addr, -EINVAL);
816
817 if (prefixlen < 3 || prefixlen > 128)
818 return -EINVAL;
819
820 if (prefixlen > 64)
821 /* unusual but allowed, log it */
822 log_radv("Unusual prefix length %d greater than 64", prefixlen);
823
824 p->opt.in6_addr = *in6_addr;
825 p->opt.prefixlen = prefixlen;
826
827 return 0;
828}
829
34332af2
SS
830_public_ int sd_radv_prefix_get_prefix(sd_radv_prefix *p, struct in6_addr *ret_in6_addr,
831 unsigned char *ret_prefixlen) {
832 assert_return(p, -EINVAL);
833 assert_return(ret_in6_addr, -EINVAL);
834 assert_return(ret_prefixlen, -EINVAL);
835
836 *ret_in6_addr = p->opt.in6_addr;
837 *ret_prefixlen = p->opt.prefixlen;
838
839 return 0;
840}
841
04473969
PF
842_public_ int sd_radv_prefix_set_onlink(sd_radv_prefix *p, int onlink) {
843 assert_return(p, -EINVAL);
844
845 SET_FLAG(p->opt.flags, ND_OPT_PI_FLAG_ONLINK, onlink);
846
847 return 0;
848}
849
850_public_ int sd_radv_prefix_set_address_autoconfiguration(sd_radv_prefix *p,
851 int address_autoconfiguration) {
852 assert_return(p, -EINVAL);
853
854 SET_FLAG(p->opt.flags, ND_OPT_PI_FLAG_AUTO, address_autoconfiguration);
855
856 return 0;
857}
858
859_public_ int sd_radv_prefix_set_valid_lifetime(sd_radv_prefix *p,
860 uint32_t valid_lifetime) {
861 assert_return(p, -EINVAL);
862
863 p->opt.valid_lifetime = htobe32(valid_lifetime);
864
865 return 0;
866}
867
868_public_ int sd_radv_prefix_set_preferred_lifetime(sd_radv_prefix *p,
869 uint32_t preferred_lifetime) {
870 assert_return(p, -EINVAL);
871
872 p->opt.preferred_lifetime = htobe32(preferred_lifetime);
873
874 return 0;
875}
203d4df5
SS
876
877_public_ int sd_radv_route_prefix_new(sd_radv_route_prefix **ret) {
878 sd_radv_route_prefix *p;
879
880 assert_return(ret, -EINVAL);
881
882 p = new(sd_radv_route_prefix, 1);
883 if (!p)
884 return -ENOMEM;
885
886 *p = (sd_radv_route_prefix) {
887 .n_ref = 1,
888
889 .opt.type = SD_RADV_OPT_ROUTE_INFORMATION,
890 .opt.length = DIV_ROUND_UP(sizeof(p->opt), 8),
891 .opt.prefixlen = 64,
892
893 .opt.lifetime = htobe32(604800),
894 };
895
896 *ret = p;
897 return 0;
898}
899
900DEFINE_PUBLIC_TRIVIAL_REF_UNREF_FUNC(sd_radv_route_prefix, sd_radv_route_prefix, mfree);
901
902_public_ int sd_radv_prefix_set_route_prefix(sd_radv_route_prefix *p, const struct in6_addr *in6_addr,
903 unsigned char prefixlen) {
904 assert_return(p, -EINVAL);
905 assert_return(in6_addr, -EINVAL);
906
907 if (prefixlen > 128)
908 return -EINVAL;
909
910 if (prefixlen > 64)
911 /* unusual but allowed, log it */
912 log_radv("Unusual prefix length %u greater than 64", prefixlen);
913
914 p->opt.in6_addr = *in6_addr;
915 p->opt.prefixlen = prefixlen;
916
917 return 0;
918}
919
920_public_ int sd_radv_route_prefix_set_lifetime(sd_radv_route_prefix *p, uint32_t valid_lifetime) {
921 assert_return(p, -EINVAL);
922
923 p->opt.lifetime = htobe32(valid_lifetime);
924
925 return 0;
926}