]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/libsystemd-network/sd-radv.c
tree-wide: drop 'This file is part of systemd' blurb
[thirdparty/systemd.git] / src / libsystemd-network / sd-radv.c
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
04473969 2/***
04473969 3 Copyright (C) 2017 Intel Corporation. All rights reserved.
04473969
PF
4***/
5
6#include <netinet/icmp6.h>
7#include <netinet/in.h>
204f99d2 8#include <arpa/inet.h>
04473969
PF
9
10#include "sd-radv.h"
11
204f99d2 12#include "macro.h"
04473969 13#include "alloc-util.h"
e965d6ab 14#include "dns-domain.h"
04473969
PF
15#include "fd-util.h"
16#include "icmp6-util.h"
17#include "in-addr-util.h"
18#include "radv-internal.h"
19#include "socket-util.h"
20#include "string-util.h"
e965d6ab 21#include "strv.h"
04473969 22#include "util.h"
204fb681 23#include "random-util.h"
04473969 24
204f99d2
PF
25_public_ int sd_radv_new(sd_radv **ret) {
26 _cleanup_(sd_radv_unrefp) sd_radv *ra = NULL;
27
28 assert_return(ret, -EINVAL);
29
30 ra = new0(sd_radv, 1);
31 if (!ra)
32 return -ENOMEM;
33
34 ra->n_ref = 1;
77baf5ae 35 ra->fd = -1;
204f99d2
PF
36
37 LIST_HEAD_INIT(ra->prefixes);
38
1cc6c93a 39 *ret = TAKE_PTR(ra);
204f99d2
PF
40
41 return 0;
42}
43
44_public_ int sd_radv_attach_event(sd_radv *ra, sd_event *event, int64_t priority) {
45 int r;
46
47 assert_return(ra, -EINVAL);
48 assert_return(!ra->event, -EBUSY);
49
50 if (event)
51 ra->event = sd_event_ref(event);
52 else {
53 r = sd_event_default(&ra->event);
54 if (r < 0)
55 return 0;
56 }
57
58 ra->event_priority = priority;
59
60 return 0;
61}
62
63_public_ int sd_radv_detach_event(sd_radv *ra) {
64
65 assert_return(ra, -EINVAL);
66
67 ra->event = sd_event_unref(ra->event);
68 return 0;
69}
70
71_public_ sd_event *sd_radv_get_event(sd_radv *ra) {
72 assert_return(ra, NULL);
73
74 return ra->event;
75}
76
204fb681 77static void radv_reset(sd_radv *ra) {
c4b6dda0 78 assert(ra);
204fb681
PF
79
80 ra->timeout_event_source =
81 sd_event_source_unref(ra->timeout_event_source);
82
88d5a3db
PF
83 ra->recv_event_source =
84 sd_event_source_unref(ra->recv_event_source);
85
204fb681
PF
86 ra->ra_sent = 0;
87}
88
204f99d2
PF
89_public_ sd_radv *sd_radv_ref(sd_radv *ra) {
90 if (!ra)
91 return NULL;
92
93 assert(ra->n_ref > 0);
94 ra->n_ref++;
95
96 return ra;
97}
98
99_public_ sd_radv *sd_radv_unref(sd_radv *ra) {
100 if (!ra)
101 return NULL;
102
103 assert(ra->n_ref > 0);
104 ra->n_ref--;
105
106 if (ra->n_ref > 0)
107 return NULL;
108
109 while (ra->prefixes) {
110 sd_radv_prefix *p = ra->prefixes;
111
112 LIST_REMOVE(prefix, ra->prefixes, p);
113 sd_radv_prefix_unref(p);
114 }
115
e9c6da38 116 free(ra->rdnss);
f9aa5417 117 free(ra->dnssl);
e9c6da38 118
204fb681
PF
119 radv_reset(ra);
120
204f99d2 121 sd_radv_detach_event(ra);
c4b6dda0
LP
122
123 ra->fd = safe_close(ra->fd);
124
204f99d2
PF
125 return mfree(ra);
126}
127
204fb681
PF
128static int radv_send(sd_radv *ra, const struct in6_addr *dst,
129 const uint32_t router_lifetime) {
77baf5ae
PF
130 static const struct ether_addr mac_zero = {};
131 sd_radv_prefix *p;
132 struct sockaddr_in6 dst_addr = {
133 .sin6_family = AF_INET6,
134 .sin6_addr = IN6ADDR_ALL_NODES_MULTICAST_INIT,
135 };
136 struct nd_router_advert adv = {};
137 struct {
138 struct nd_opt_hdr opthdr;
139 struct ether_addr slladdr;
140 } _packed_ opt_mac = {
141 .opthdr = {
142 .nd_opt_type = ND_OPT_SOURCE_LINKADDR,
143 .nd_opt_len = (sizeof(struct nd_opt_hdr) +
144 sizeof(struct ether_addr) - 1) /8 + 1,
145 },
146 };
147 struct nd_opt_mtu opt_mtu = {
148 .nd_opt_mtu_type = ND_OPT_MTU,
149 .nd_opt_mtu_len = 1,
150 };
6852c0f6
PF
151 /* Reserve iov space for RA header, linkaddr, MTU, N prefixes, RDNSS
152 and DNSSL */
153 struct iovec iov[5 + ra->n_prefixes];
77baf5ae
PF
154 struct msghdr msg = {
155 .msg_name = &dst_addr,
156 .msg_namelen = sizeof(dst_addr),
157 .msg_iov = iov,
158 };
d601b566
PF
159 usec_t time_now;
160 int r;
161
162 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
163 if (r < 0)
164 return r;
77baf5ae 165
88d5a3db 166 if (dst && !in_addr_is_null(AF_INET6, (union in_addr_union*) dst))
77baf5ae 167 dst_addr.sin6_addr = *dst;
88d5a3db 168
77baf5ae
PF
169 adv.nd_ra_type = ND_ROUTER_ADVERT;
170 adv.nd_ra_curhoplimit = ra->hop_limit;
171 adv.nd_ra_flags_reserved = ra->flags;
172 adv.nd_ra_router_lifetime = htobe16(router_lifetime);
173 iov[msg.msg_iovlen].iov_base = &adv;
174 iov[msg.msg_iovlen].iov_len = sizeof(adv);
175 msg.msg_iovlen++;
176
177 /* MAC address is optional, either because the link does not use L2
178 addresses or load sharing is desired. See RFC 4861, Section 4.2 */
179 if (memcmp(&mac_zero, &ra->mac_addr, sizeof(mac_zero))) {
180 opt_mac.slladdr = ra->mac_addr;
181 iov[msg.msg_iovlen].iov_base = &opt_mac;
182 iov[msg.msg_iovlen].iov_len = sizeof(opt_mac);
183 msg.msg_iovlen++;
184 }
185
186 if (ra->mtu) {
187 opt_mtu.nd_opt_mtu_mtu = htobe32(ra->mtu);
188 iov[msg.msg_iovlen].iov_base = &opt_mtu;
189 iov[msg.msg_iovlen].iov_len = sizeof(opt_mtu);
190 msg.msg_iovlen++;
191 }
192
193 LIST_FOREACH(prefix, p, ra->prefixes) {
d601b566
PF
194 if (p->valid_until) {
195
196 if (time_now > p->valid_until)
197 p->opt.valid_lifetime = 0;
198 else
199 p->opt.valid_lifetime = htobe32((p->valid_until - time_now) / USEC_PER_SEC);
200
201 if (time_now > p->preferred_until)
202 p->opt.preferred_lifetime = 0;
203 else
204 p->opt.preferred_lifetime = htobe32((p->preferred_until - time_now) / USEC_PER_SEC);
205 }
77baf5ae
PF
206 iov[msg.msg_iovlen].iov_base = &p->opt;
207 iov[msg.msg_iovlen].iov_len = sizeof(p->opt);
208 msg.msg_iovlen++;
209 }
210
e9c6da38
PF
211 if (ra->rdnss) {
212 iov[msg.msg_iovlen].iov_base = ra->rdnss;
213 iov[msg.msg_iovlen].iov_len = ra->rdnss->length * 8;
214 msg.msg_iovlen++;
215 }
216
e965d6ab
PF
217 if (ra->dnssl) {
218 iov[msg.msg_iovlen].iov_base = ra->dnssl;
219 iov[msg.msg_iovlen].iov_len = ra->dnssl->length * 8;
220 msg.msg_iovlen++;
221 }
222
77baf5ae
PF
223 if (sendmsg(ra->fd, &msg, 0) < 0)
224 return -errno;
204fb681 225
77baf5ae 226 return 0;
204fb681
PF
227}
228
88d5a3db
PF
229static int radv_recv(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
230 sd_radv *ra = userdata;
231 _cleanup_free_ char *addr = NULL;
232 struct in6_addr src;
233 triple_timestamp timestamp;
234 int r;
235 ssize_t buflen;
236 _cleanup_free_ char *buf = NULL;
237
238 assert(s);
239 assert(ra);
240 assert(ra->event);
241
242 buflen = next_datagram_size_fd(fd);
243
244 if ((unsigned) buflen < sizeof(struct nd_router_solicit))
245 return log_radv("Too short packet received");
246
247 buf = new0(char, buflen);
248 if (!buf)
249 return 0;
250
251 r = icmp6_receive(fd, buf, buflen, &src, &timestamp);
252 if (r < 0) {
253 switch (r) {
254 case -EADDRNOTAVAIL:
255 (void) in_addr_to_string(AF_INET6, (union in_addr_union*) &src, &addr);
256 log_radv("Received RS from non-link-local address %s. Ignoring", addr);
257 break;
258
259 case -EMULTIHOP:
260 log_radv("Received RS with invalid hop limit. Ignoring.");
261 break;
262
263 case -EPFNOSUPPORT:
264 log_radv("Received invalid source address from ICMPv6 socket. Ignoring.");
265 break;
266
267 default:
268 log_radv_warning_errno(r, "Error receiving from ICMPv6 socket: %m");
269 break;
270 }
271
272 return 0;
273 }
274
275 (void) in_addr_to_string(AF_INET6, (union in_addr_union*) &src, &addr);
276
277 r = radv_send(ra, &src, ra->lifetime);
278 if (r < 0)
279 log_radv_warning_errno(r, "Unable to send solicited Router Advertisment to %s: %m", addr);
280 else
281 log_radv("Sent solicited Router Advertisement to %s", addr);
282
283 return 0;
284}
285
204fb681
PF
286static usec_t radv_compute_timeout(usec_t min, usec_t max) {
287 assert_return(min <= max, SD_RADV_DEFAULT_MIN_TIMEOUT_USEC);
288
289 return min + (random_u32() % (max - min));
290}
291
292static int radv_timeout(sd_event_source *s, uint64_t usec, void *userdata) {
293 int r;
294 sd_radv *ra = userdata;
295 usec_t min_timeout = SD_RADV_DEFAULT_MIN_TIMEOUT_USEC;
296 usec_t max_timeout = SD_RADV_DEFAULT_MAX_TIMEOUT_USEC;
297 usec_t time_now, timeout;
298 char time_string[FORMAT_TIMESPAN_MAX];
299
300 assert(s);
301 assert(ra);
302 assert(ra->event);
303
304 ra->timeout_event_source = sd_event_source_unref(ra->timeout_event_source);
305
306 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
307 if (r < 0)
308 goto fail;
309
310 r = radv_send(ra, NULL, ra->lifetime);
311 if (r < 0)
312 log_radv_warning_errno(r, "Unable to send Router Advertisement: %m");
313
314 /* RFC 4861, Section 6.2.4, sending initial Router Advertisements */
315 if (ra->ra_sent < SD_RADV_MAX_INITIAL_RTR_ADVERTISEMENTS) {
316 max_timeout = SD_RADV_MAX_INITIAL_RTR_ADVERT_INTERVAL_USEC;
317 min_timeout = SD_RADV_MAX_INITIAL_RTR_ADVERT_INTERVAL_USEC / 3;
318 }
319
320 timeout = radv_compute_timeout(min_timeout, max_timeout);
321
322 log_radv("Next Router Advertisement in %s",
323 format_timespan(time_string, FORMAT_TIMESPAN_MAX,
324 timeout, USEC_PER_SEC));
325
326 r = sd_event_add_time(ra->event, &ra->timeout_event_source,
327 clock_boottime_or_monotonic(),
328 time_now + timeout, MSEC_PER_SEC,
329 radv_timeout, ra);
330 if (r < 0)
331 goto fail;
332
333 r = sd_event_source_set_priority(ra->timeout_event_source,
334 ra->event_priority);
335 if (r < 0)
336 goto fail;
337
338 r = sd_event_source_set_description(ra->timeout_event_source,
339 "radv-timeout");
340 if (r < 0)
341 goto fail;
342
343 ra->ra_sent++;
344
345fail:
346 if (r < 0)
347 sd_radv_stop(ra);
348
349 return 0;
350}
351
204f99d2 352_public_ int sd_radv_stop(sd_radv *ra) {
204fb681
PF
353 int r;
354
204f99d2
PF
355 assert_return(ra, -EINVAL);
356
6f8a8b84
SS
357 if (ra->state == SD_RADV_STATE_IDLE)
358 return 0;
359
204f99d2
PF
360 log_radv("Stopping IPv6 Router Advertisement daemon");
361
204fb681
PF
362 /* RFC 4861, Section 6.2.5, send at least one Router Advertisement
363 with zero lifetime */
364 r = radv_send(ra, NULL, 0);
365 if (r < 0)
366 log_radv_warning_errno(r, "Unable to send last Router Advertisement with router lifetime set to zero: %m");
367
368 radv_reset(ra);
77baf5ae 369 ra->fd = safe_close(ra->fd);
204f99d2
PF
370 ra->state = SD_RADV_STATE_IDLE;
371
372 return 0;
373}
374
375_public_ int sd_radv_start(sd_radv *ra) {
204fb681
PF
376 int r = 0;
377
204f99d2
PF
378 assert_return(ra, -EINVAL);
379 assert_return(ra->event, -EINVAL);
380 assert_return(ra->ifindex > 0, -EINVAL);
381
382 if (ra->state != SD_RADV_STATE_IDLE)
383 return 0;
384
204fb681
PF
385 r = sd_event_add_time(ra->event, &ra->timeout_event_source,
386 clock_boottime_or_monotonic(), 0, 0,
387 radv_timeout, ra);
388 if (r < 0)
389 goto fail;
390
391 r = sd_event_source_set_priority(ra->timeout_event_source,
392 ra->event_priority);
393 if (r < 0)
394 goto fail;
395
396 (void) sd_event_source_set_description(ra->timeout_event_source,
397 "radv-timeout");
398
77baf5ae
PF
399 r = icmp6_bind_router_advertisement(ra->ifindex);
400 if (r < 0)
401 goto fail;
402
403 ra->fd = r;
88d5a3db
PF
404
405 r = sd_event_add_io(ra->event, &ra->recv_event_source, ra->fd, EPOLLIN, radv_recv, ra);
406 if (r < 0)
407 goto fail;
408
409 r = sd_event_source_set_priority(ra->recv_event_source, ra->event_priority);
410 if (r < 0)
411 goto fail;
412
413 (void) sd_event_source_set_description(ra->recv_event_source, "radv-receive-message");
77baf5ae 414
204f99d2
PF
415 ra->state = SD_RADV_STATE_ADVERTISING;
416
417 log_radv("Started IPv6 Router Advertisement daemon");
418
419 return 0;
204fb681
PF
420
421 fail:
422 radv_reset(ra);
423
424 return r;
204f99d2
PF
425}
426
427_public_ int sd_radv_set_ifindex(sd_radv *ra, int ifindex) {
428 assert_return(ra, -EINVAL);
429 assert_return(ifindex >= -1, -EINVAL);
430
431 if (ra->state != SD_RADV_STATE_IDLE)
432 return -EBUSY;
433
434 ra->ifindex = ifindex;
435
436 return 0;
437}
438
439_public_ int sd_radv_set_mac(sd_radv *ra, const struct ether_addr *mac_addr) {
440 assert_return(ra, -EINVAL);
441
442 if (ra->state != SD_RADV_STATE_IDLE)
443 return -EBUSY;
444
445 if (mac_addr)
446 ra->mac_addr = *mac_addr;
447 else
448 zero(ra->mac_addr);
449
450 return 0;
451}
452
453_public_ int sd_radv_set_mtu(sd_radv *ra, uint32_t mtu) {
454 assert_return(ra, -EINVAL);
455 assert_return(mtu >= 1280, -EINVAL);
456
204f99d2
PF
457 ra->mtu = mtu;
458
459 return 0;
460}
461
462_public_ int sd_radv_set_hop_limit(sd_radv *ra, uint8_t hop_limit) {
463 assert_return(ra, -EINVAL);
464
465 if (ra->state != SD_RADV_STATE_IDLE)
466 return -EBUSY;
467
468 ra->hop_limit = hop_limit;
469
470 return 0;
471}
472
473_public_ int sd_radv_set_router_lifetime(sd_radv *ra, uint32_t router_lifetime) {
474 assert_return(ra, -EINVAL);
475
476 if (ra->state != SD_RADV_STATE_IDLE)
477 return -EBUSY;
478
479 /* RFC 4191, Section 2.2, "...If the Router Lifetime is zero, the
480 preference value MUST be set to (00) by the sender..." */
481 if (router_lifetime == 0 &&
482 (ra->flags & (0x3 << 3)) != (SD_NDISC_PREFERENCE_MEDIUM << 3))
483 return -ETIME;
484
485 ra->lifetime = router_lifetime;
486
487 return 0;
488}
489
490_public_ int sd_radv_set_managed_information(sd_radv *ra, int managed) {
491 assert_return(ra, -EINVAL);
492
493 if (ra->state != SD_RADV_STATE_IDLE)
494 return -EBUSY;
495
496 SET_FLAG(ra->flags, ND_RA_FLAG_MANAGED, managed);
497
498 return 0;
499}
500
501_public_ int sd_radv_set_other_information(sd_radv *ra, int other) {
502 assert_return(ra, -EINVAL);
503
504 if (ra->state != SD_RADV_STATE_IDLE)
505 return -EBUSY;
506
507 SET_FLAG(ra->flags, ND_RA_FLAG_OTHER, other);
508
509 return 0;
510}
511
512_public_ int sd_radv_set_preference(sd_radv *ra, unsigned preference) {
513 int r = 0;
514
515 assert_return(ra, -EINVAL);
516 assert_return(IN_SET(preference,
517 SD_NDISC_PREFERENCE_LOW,
518 SD_NDISC_PREFERENCE_MEDIUM,
519 SD_NDISC_PREFERENCE_HIGH), -EINVAL);
520
521 ra->flags = (ra->flags & ~(0x3 << 3)) | (preference << 3);
522
523 return r;
524}
525
d601b566 526_public_ int sd_radv_add_prefix(sd_radv *ra, sd_radv_prefix *p, bool dynamic) {
204f99d2 527 sd_radv_prefix *cur;
d601b566 528 int r;
204f99d2 529 _cleanup_free_ char *addr_p = NULL;
d601b566
PF
530 char time_string_preferred[FORMAT_TIMESPAN_MAX];
531 char time_string_valid[FORMAT_TIMESPAN_MAX];
532 usec_t time_now, valid, preferred, valid_until, preferred_until;
204f99d2
PF
533
534 assert_return(ra, -EINVAL);
535
536 if (!p)
537 return -EINVAL;
538
539 LIST_FOREACH(prefix, cur, ra->prefixes) {
204f99d2
PF
540
541 r = in_addr_prefix_intersect(AF_INET6,
542 (union in_addr_union*) &cur->opt.in6_addr,
543 cur->opt.prefixlen,
544 (union in_addr_union*) &p->opt.in6_addr,
545 p->opt.prefixlen);
546 if (r > 0) {
547 _cleanup_free_ char *addr_cur = NULL;
548
204f99d2
PF
549 (void) in_addr_to_string(AF_INET6,
550 (union in_addr_union*) &p->opt.in6_addr,
551 &addr_p);
552
d601b566
PF
553 if (dynamic && cur->opt.prefixlen == p->opt.prefixlen)
554 goto update;
555
556 (void) in_addr_to_string(AF_INET6,
557 (union in_addr_union*) &cur->opt.in6_addr,
558 &addr_cur);
204f99d2
PF
559 log_radv("IPv6 prefix %s/%u already configured, ignoring %s/%u",
560 addr_cur, cur->opt.prefixlen,
561 addr_p, p->opt.prefixlen);
562
563 return -EEXIST;
564 }
565 }
566
567 p = sd_radv_prefix_ref(p);
568
569 LIST_APPEND(prefix, ra->prefixes, p);
570
571 ra->n_prefixes++;
572
573 (void) in_addr_to_string(AF_INET6, (union in_addr_union*) &p->opt.in6_addr, &addr_p);
d601b566
PF
574
575 if (!dynamic) {
576 log_radv("Added prefix %s/%d", addr_p, p->opt.prefixlen);
577 return 0;
578 }
579
580 cur = p;
581
582 update:
583 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
584 if (r < 0)
585 return r;
586
587 valid = be32toh(p->opt.valid_lifetime) * USEC_PER_SEC;
588 valid_until = usec_add(valid, time_now);
589 if (valid_until == USEC_INFINITY)
590 return -EOVERFLOW;
591
592 preferred = be32toh(p->opt.preferred_lifetime) * USEC_PER_SEC;
593 preferred_until = usec_add(preferred, time_now);
594 if (preferred_until == USEC_INFINITY)
595 return -EOVERFLOW;
596
597 cur->valid_until = valid_until;
598 cur->preferred_until = preferred_until;
599
600 log_radv("%s prefix %s/%u preferred %s valid %s",
601 cur? "Updated": "Added",
602 addr_p, p->opt.prefixlen,
603 format_timespan(time_string_preferred, FORMAT_TIMESPAN_MAX,
604 preferred, USEC_PER_SEC),
605 format_timespan(time_string_valid, FORMAT_TIMESPAN_MAX,
606 valid, USEC_PER_SEC));
204f99d2
PF
607
608 return 0;
609}
610
34c169c4 611_public_ sd_radv_prefix *sd_radv_remove_prefix(sd_radv *ra,
f5a5706a
LP
612 const struct in6_addr *prefix,
613 unsigned char prefixlen) {
34c169c4
PF
614 sd_radv_prefix *cur, *next;
615
616 assert_return(ra, NULL);
617 assert_return(prefix, NULL);
618
619 LIST_FOREACH_SAFE(prefix, cur, next, ra->prefixes) {
620 if (prefixlen != cur->opt.prefixlen)
621 continue;
622
623 if (!in_addr_equal(AF_INET6,
624 (union in_addr_union *)prefix,
625 (union in_addr_union *)&cur->opt.in6_addr))
626 continue;
627
628 LIST_REMOVE(prefix, ra->prefixes, cur);
629 ra->n_prefixes--;
630
631 break;
632 }
633
634 return cur;
635}
636
e9c6da38
PF
637_public_ int sd_radv_set_rdnss(sd_radv *ra, uint32_t lifetime,
638 const struct in6_addr *dns, size_t n_dns) {
639 _cleanup_free_ struct sd_radv_opt_dns *opt_rdnss = NULL;
640 size_t len;
641
642 assert_return(ra, -EINVAL);
643 assert_return(n_dns < 128, -EINVAL);
644
645 if (!dns || n_dns == 0) {
646 ra->rdnss = mfree(ra->rdnss);
647 ra->n_rdnss = 0;
648
649 return 0;
650 }
651
652 len = sizeof(struct sd_radv_opt_dns) + sizeof(struct in6_addr) * n_dns;
653
654 opt_rdnss = malloc0(len);
655 if (!opt_rdnss)
656 return -ENOMEM;
657
658 opt_rdnss->type = SD_RADV_OPT_RDNSS;
659 opt_rdnss->length = len / 8;
660 opt_rdnss->lifetime = htobe32(lifetime);
661
662 memcpy(opt_rdnss + 1, dns, n_dns * sizeof(struct in6_addr));
663
1cc6c93a 664 free_and_replace(ra->rdnss, opt_rdnss);
e9c6da38
PF
665
666 ra->n_rdnss = n_dns;
667
668 return 0;
669}
670
e965d6ab
PF
671_public_ int sd_radv_set_dnssl(sd_radv *ra, uint32_t lifetime,
672 char **search_list) {
673 _cleanup_free_ struct sd_radv_opt_dns *opt_dnssl = NULL;
674 size_t len = 0;
675 char **s;
676 uint8_t *p;
677
678 assert_return(ra, -EINVAL);
679
97d7974b 680 if (strv_isempty(search_list)) {
e965d6ab 681 ra->dnssl = mfree(ra->dnssl);
e965d6ab
PF
682 return 0;
683 }
684
685 STRV_FOREACH(s, search_list)
686 len += strlen(*s) + 2;
687
688 len = (sizeof(struct sd_radv_opt_dns) + len + 7) & ~0x7;
689
690 opt_dnssl = malloc0(len);
691 if (!opt_dnssl)
692 return -ENOMEM;
693
694 opt_dnssl->type = SD_RADV_OPT_DNSSL;
695 opt_dnssl->length = len / 8;
696 opt_dnssl->lifetime = htobe32(lifetime);
697
698 p = (uint8_t *)(opt_dnssl + 1);
699 len -= sizeof(struct sd_radv_opt_dns);
700
701 STRV_FOREACH(s, search_list) {
702 int r;
703
704 r = dns_name_to_wire_format(*s, p, len, false);
705 if (r < 0)
706 return r;
707
708 if (len < (size_t)r)
709 return -ENOBUFS;
710
711 p += r;
712 len -= r;
713 }
714
1cc6c93a 715 free_and_replace(ra->dnssl, opt_dnssl);
e965d6ab
PF
716
717 return 0;
718}
719
04473969
PF
720_public_ int sd_radv_prefix_new(sd_radv_prefix **ret) {
721 _cleanup_(sd_radv_prefix_unrefp) sd_radv_prefix *p = NULL;
722
723 assert_return(ret, -EINVAL);
724
725 p = new0(sd_radv_prefix, 1);
726 if (!p)
727 return -ENOMEM;
728
729 p->n_ref = 1;
730
731 p->opt.type = ND_OPT_PREFIX_INFORMATION;
732 p->opt.length = (sizeof(p->opt) - 1) /8 + 1;
733
734 p->opt.prefixlen = 64;
735
736 /* RFC 4861, Section 6.2.1 */
737 SET_FLAG(p->opt.flags, ND_OPT_PI_FLAG_ONLINK, true);
738 SET_FLAG(p->opt.flags, ND_OPT_PI_FLAG_AUTO, true);
739 p->opt.preferred_lifetime = htobe32(604800);
740 p->opt.valid_lifetime = htobe32(2592000);
741
204f99d2
PF
742 LIST_INIT(prefix, p);
743
1cc6c93a 744 *ret = TAKE_PTR(p);
04473969
PF
745
746 return 0;
747}
748
749_public_ sd_radv_prefix *sd_radv_prefix_ref(sd_radv_prefix *p) {
750 if (!p)
751 return NULL;
752
753 assert(p->n_ref > 0);
754 p->n_ref++;
755
756 return p;
757}
758
759_public_ sd_radv_prefix *sd_radv_prefix_unref(sd_radv_prefix *p) {
760 if (!p)
761 return NULL;
762
763 assert(p->n_ref > 0);
764 p->n_ref--;
765
766 if (p->n_ref > 0)
767 return NULL;
768
769 return mfree(p);
770}
771
f5a5706a 772_public_ int sd_radv_prefix_set_prefix(sd_radv_prefix *p, const struct in6_addr *in6_addr,
04473969
PF
773 unsigned char prefixlen) {
774 assert_return(p, -EINVAL);
775 assert_return(in6_addr, -EINVAL);
776
777 if (prefixlen < 3 || prefixlen > 128)
778 return -EINVAL;
779
780 if (prefixlen > 64)
781 /* unusual but allowed, log it */
782 log_radv("Unusual prefix length %d greater than 64", prefixlen);
783
784 p->opt.in6_addr = *in6_addr;
785 p->opt.prefixlen = prefixlen;
786
787 return 0;
788}
789
790_public_ int sd_radv_prefix_set_onlink(sd_radv_prefix *p, int onlink) {
791 assert_return(p, -EINVAL);
792
793 SET_FLAG(p->opt.flags, ND_OPT_PI_FLAG_ONLINK, onlink);
794
795 return 0;
796}
797
798_public_ int sd_radv_prefix_set_address_autoconfiguration(sd_radv_prefix *p,
799 int address_autoconfiguration) {
800 assert_return(p, -EINVAL);
801
802 SET_FLAG(p->opt.flags, ND_OPT_PI_FLAG_AUTO, address_autoconfiguration);
803
804 return 0;
805}
806
807_public_ int sd_radv_prefix_set_valid_lifetime(sd_radv_prefix *p,
808 uint32_t valid_lifetime) {
809 assert_return(p, -EINVAL);
810
811 p->opt.valid_lifetime = htobe32(valid_lifetime);
812
813 return 0;
814}
815
816_public_ int sd_radv_prefix_set_preferred_lifetime(sd_radv_prefix *p,
817 uint32_t preferred_lifetime) {
818 assert_return(p, -EINVAL);
819
820 p->opt.preferred_lifetime = htobe32(preferred_lifetime);
821
822 return 0;
823}