]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/libsystemd-network/sd-radv.c
sd-radv: per our CODING_STYLE don't use 'bool' in public headers
[thirdparty/systemd.git] / src / libsystemd-network / sd-radv.c
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
04473969 2/***
810adae9 3 Copyright © 2017 Intel Corporation. All rights reserved.
04473969
PF
4***/
5
6#include <netinet/icmp6.h>
7#include <netinet/in.h>
204f99d2 8#include <arpa/inet.h>
04473969
PF
9
10#include "sd-radv.h"
11
204f99d2 12#include "macro.h"
04473969 13#include "alloc-util.h"
e965d6ab 14#include "dns-domain.h"
ae25915d 15#include "ether-addr-util.h"
807a8ede 16#include "event-util.h"
04473969
PF
17#include "fd-util.h"
18#include "icmp6-util.h"
19#include "in-addr-util.h"
20#include "radv-internal.h"
21#include "socket-util.h"
22#include "string-util.h"
e965d6ab 23#include "strv.h"
04473969 24#include "util.h"
204fb681 25#include "random-util.h"
04473969 26
204f99d2
PF
27_public_ int sd_radv_new(sd_radv **ret) {
28 _cleanup_(sd_radv_unrefp) sd_radv *ra = NULL;
29
30 assert_return(ret, -EINVAL);
31
78f9d24f 32 ra = new(sd_radv, 1);
204f99d2
PF
33 if (!ra)
34 return -ENOMEM;
35
78f9d24f
YW
36 *ra = (sd_radv) {
37 .n_ref = 1,
38 .fd = -1,
39 };
204f99d2 40
1cc6c93a 41 *ret = TAKE_PTR(ra);
204f99d2
PF
42
43 return 0;
44}
45
46_public_ int sd_radv_attach_event(sd_radv *ra, sd_event *event, int64_t priority) {
47 int r;
48
49 assert_return(ra, -EINVAL);
50 assert_return(!ra->event, -EBUSY);
51
52 if (event)
53 ra->event = sd_event_ref(event);
54 else {
55 r = sd_event_default(&ra->event);
56 if (r < 0)
57 return 0;
58 }
59
60 ra->event_priority = priority;
61
62 return 0;
63}
64
65_public_ int sd_radv_detach_event(sd_radv *ra) {
66
67 assert_return(ra, -EINVAL);
68
69 ra->event = sd_event_unref(ra->event);
70 return 0;
71}
72
73_public_ sd_event *sd_radv_get_event(sd_radv *ra) {
74 assert_return(ra, NULL);
75
76 return ra->event;
77}
78
204fb681 79static void radv_reset(sd_radv *ra) {
c4b6dda0 80 assert(ra);
204fb681 81
807a8ede 82 (void) event_source_disable(ra->timeout_event_source);
204fb681 83
88d5a3db
PF
84 ra->recv_event_source =
85 sd_event_source_unref(ra->recv_event_source);
86
204fb681
PF
87 ra->ra_sent = 0;
88}
89
8301aa0b 90static sd_radv *radv_free(sd_radv *ra) {
e866e17b
LP
91 if (!ra)
92 return NULL;
204f99d2
PF
93
94 while (ra->prefixes) {
95 sd_radv_prefix *p = ra->prefixes;
96
97 LIST_REMOVE(prefix, ra->prefixes, p);
98 sd_radv_prefix_unref(p);
99 }
100
e9c6da38 101 free(ra->rdnss);
f9aa5417 102 free(ra->dnssl);
e9c6da38 103
807a8ede
YW
104 ra->timeout_event_source = sd_event_source_unref(ra->timeout_event_source);
105
204fb681
PF
106 radv_reset(ra);
107
204f99d2 108 sd_radv_detach_event(ra);
c4b6dda0
LP
109
110 ra->fd = safe_close(ra->fd);
111
204f99d2
PF
112 return mfree(ra);
113}
114
8301aa0b
YW
115DEFINE_PUBLIC_TRIVIAL_REF_UNREF_FUNC(sd_radv, sd_radv, radv_free);
116
83ef9d14 117static int radv_send(sd_radv *ra, const struct in6_addr *dst, uint32_t router_lifetime) {
77baf5ae
PF
118 sd_radv_prefix *p;
119 struct sockaddr_in6 dst_addr = {
120 .sin6_family = AF_INET6,
121 .sin6_addr = IN6ADDR_ALL_NODES_MULTICAST_INIT,
122 };
123 struct nd_router_advert adv = {};
124 struct {
125 struct nd_opt_hdr opthdr;
126 struct ether_addr slladdr;
127 } _packed_ opt_mac = {
128 .opthdr = {
129 .nd_opt_type = ND_OPT_SOURCE_LINKADDR,
130 .nd_opt_len = (sizeof(struct nd_opt_hdr) +
131 sizeof(struct ether_addr) - 1) /8 + 1,
132 },
133 };
134 struct nd_opt_mtu opt_mtu = {
135 .nd_opt_mtu_type = ND_OPT_MTU,
136 .nd_opt_mtu_len = 1,
137 };
6852c0f6
PF
138 /* Reserve iov space for RA header, linkaddr, MTU, N prefixes, RDNSS
139 and DNSSL */
140 struct iovec iov[5 + ra->n_prefixes];
77baf5ae
PF
141 struct msghdr msg = {
142 .msg_name = &dst_addr,
143 .msg_namelen = sizeof(dst_addr),
144 .msg_iov = iov,
145 };
d601b566
PF
146 usec_t time_now;
147 int r;
148
dc0ec5e2
LP
149 assert(ra);
150
d601b566
PF
151 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
152 if (r < 0)
153 return r;
77baf5ae 154
dc0ec5e2 155 if (dst && !IN6_IS_ADDR_UNSPECIFIED(dst))
77baf5ae 156 dst_addr.sin6_addr = *dst;
88d5a3db 157
77baf5ae
PF
158 adv.nd_ra_type = ND_ROUTER_ADVERT;
159 adv.nd_ra_curhoplimit = ra->hop_limit;
160 adv.nd_ra_flags_reserved = ra->flags;
161 adv.nd_ra_router_lifetime = htobe16(router_lifetime);
162 iov[msg.msg_iovlen].iov_base = &adv;
163 iov[msg.msg_iovlen].iov_len = sizeof(adv);
164 msg.msg_iovlen++;
165
166 /* MAC address is optional, either because the link does not use L2
167 addresses or load sharing is desired. See RFC 4861, Section 4.2 */
ae25915d 168 if (!ether_addr_is_null(&ra->mac_addr)) {
77baf5ae
PF
169 opt_mac.slladdr = ra->mac_addr;
170 iov[msg.msg_iovlen].iov_base = &opt_mac;
171 iov[msg.msg_iovlen].iov_len = sizeof(opt_mac);
172 msg.msg_iovlen++;
173 }
174
175 if (ra->mtu) {
176 opt_mtu.nd_opt_mtu_mtu = htobe32(ra->mtu);
177 iov[msg.msg_iovlen].iov_base = &opt_mtu;
178 iov[msg.msg_iovlen].iov_len = sizeof(opt_mtu);
179 msg.msg_iovlen++;
180 }
181
182 LIST_FOREACH(prefix, p, ra->prefixes) {
d601b566
PF
183 if (p->valid_until) {
184
185 if (time_now > p->valid_until)
186 p->opt.valid_lifetime = 0;
187 else
188 p->opt.valid_lifetime = htobe32((p->valid_until - time_now) / USEC_PER_SEC);
189
190 if (time_now > p->preferred_until)
191 p->opt.preferred_lifetime = 0;
192 else
193 p->opt.preferred_lifetime = htobe32((p->preferred_until - time_now) / USEC_PER_SEC);
194 }
77baf5ae
PF
195 iov[msg.msg_iovlen].iov_base = &p->opt;
196 iov[msg.msg_iovlen].iov_len = sizeof(p->opt);
197 msg.msg_iovlen++;
198 }
199
e9c6da38
PF
200 if (ra->rdnss) {
201 iov[msg.msg_iovlen].iov_base = ra->rdnss;
202 iov[msg.msg_iovlen].iov_len = ra->rdnss->length * 8;
203 msg.msg_iovlen++;
204 }
205
e965d6ab
PF
206 if (ra->dnssl) {
207 iov[msg.msg_iovlen].iov_base = ra->dnssl;
208 iov[msg.msg_iovlen].iov_len = ra->dnssl->length * 8;
209 msg.msg_iovlen++;
210 }
211
77baf5ae
PF
212 if (sendmsg(ra->fd, &msg, 0) < 0)
213 return -errno;
204fb681 214
77baf5ae 215 return 0;
204fb681
PF
216}
217
88d5a3db
PF
218static int radv_recv(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
219 sd_radv *ra = userdata;
220 _cleanup_free_ char *addr = NULL;
221 struct in6_addr src;
222 triple_timestamp timestamp;
223 int r;
224 ssize_t buflen;
225 _cleanup_free_ char *buf = NULL;
226
227 assert(s);
228 assert(ra);
229 assert(ra->event);
230
231 buflen = next_datagram_size_fd(fd);
cfffddea
LP
232 if (buflen < 0)
233 return (int) buflen;
88d5a3db
PF
234
235 buf = new0(char, buflen);
236 if (!buf)
e55a6eae 237 return -ENOMEM;
88d5a3db
PF
238
239 r = icmp6_receive(fd, buf, buflen, &src, &timestamp);
240 if (r < 0) {
241 switch (r) {
242 case -EADDRNOTAVAIL:
243 (void) in_addr_to_string(AF_INET6, (union in_addr_union*) &src, &addr);
244 log_radv("Received RS from non-link-local address %s. Ignoring", addr);
245 break;
246
247 case -EMULTIHOP:
248 log_radv("Received RS with invalid hop limit. Ignoring.");
249 break;
250
251 case -EPFNOSUPPORT:
252 log_radv("Received invalid source address from ICMPv6 socket. Ignoring.");
253 break;
254
8eb41f4c
LP
255 case -EAGAIN: /* ignore spurious wakeups */
256 break;
257
88d5a3db 258 default:
8eb41f4c 259 log_radv_errno(r, "Unexpected error receiving from ICMPv6 socket: %m");
88d5a3db
PF
260 break;
261 }
262
263 return 0;
264 }
265
cfffddea
LP
266 if ((size_t) buflen < sizeof(struct nd_router_solicit)) {
267 log_radv("Too short packet received");
268 return 0;
269 }
270
88d5a3db
PF
271 (void) in_addr_to_string(AF_INET6, (union in_addr_union*) &src, &addr);
272
273 r = radv_send(ra, &src, ra->lifetime);
274 if (r < 0)
5a9fca25 275 log_radv_errno(r, "Unable to send solicited Router Advertisement to %s: %m", strnull(addr));
88d5a3db 276 else
5a9fca25 277 log_radv("Sent solicited Router Advertisement to %s", strnull(addr));
88d5a3db
PF
278
279 return 0;
280}
281
204fb681
PF
282static usec_t radv_compute_timeout(usec_t min, usec_t max) {
283 assert_return(min <= max, SD_RADV_DEFAULT_MIN_TIMEOUT_USEC);
284
285 return min + (random_u32() % (max - min));
286}
287
288static int radv_timeout(sd_event_source *s, uint64_t usec, void *userdata) {
289 int r;
290 sd_radv *ra = userdata;
291 usec_t min_timeout = SD_RADV_DEFAULT_MIN_TIMEOUT_USEC;
292 usec_t max_timeout = SD_RADV_DEFAULT_MAX_TIMEOUT_USEC;
293 usec_t time_now, timeout;
294 char time_string[FORMAT_TIMESPAN_MAX];
295
296 assert(s);
297 assert(ra);
298 assert(ra->event);
299
204fb681
PF
300 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
301 if (r < 0)
302 goto fail;
303
304 r = radv_send(ra, NULL, ra->lifetime);
305 if (r < 0)
fdc2afc1 306 log_radv_errno(r, "Unable to send Router Advertisement: %m");
204fb681
PF
307
308 /* RFC 4861, Section 6.2.4, sending initial Router Advertisements */
309 if (ra->ra_sent < SD_RADV_MAX_INITIAL_RTR_ADVERTISEMENTS) {
310 max_timeout = SD_RADV_MAX_INITIAL_RTR_ADVERT_INTERVAL_USEC;
311 min_timeout = SD_RADV_MAX_INITIAL_RTR_ADVERT_INTERVAL_USEC / 3;
312 }
313
314 timeout = radv_compute_timeout(min_timeout, max_timeout);
315
316 log_radv("Next Router Advertisement in %s",
317 format_timespan(time_string, FORMAT_TIMESPAN_MAX,
318 timeout, USEC_PER_SEC));
319
807a8ede
YW
320 r = event_reset_time(ra->event, &ra->timeout_event_source,
321 clock_boottime_or_monotonic(),
322 time_now + timeout, MSEC_PER_SEC,
323 radv_timeout, ra,
324 ra->event_priority, "radv-timeout", true);
204fb681
PF
325 if (r < 0)
326 goto fail;
327
328 ra->ra_sent++;
329
807a8ede
YW
330 return 0;
331
204fb681 332fail:
807a8ede 333 sd_radv_stop(ra);
204fb681
PF
334
335 return 0;
336}
337
204f99d2 338_public_ int sd_radv_stop(sd_radv *ra) {
204fb681
PF
339 int r;
340
204f99d2
PF
341 assert_return(ra, -EINVAL);
342
6f8a8b84
SS
343 if (ra->state == SD_RADV_STATE_IDLE)
344 return 0;
345
204f99d2
PF
346 log_radv("Stopping IPv6 Router Advertisement daemon");
347
204fb681
PF
348 /* RFC 4861, Section 6.2.5, send at least one Router Advertisement
349 with zero lifetime */
350 r = radv_send(ra, NULL, 0);
351 if (r < 0)
fdc2afc1 352 log_radv_errno(r, "Unable to send last Router Advertisement with router lifetime set to zero: %m");
204fb681
PF
353
354 radv_reset(ra);
77baf5ae 355 ra->fd = safe_close(ra->fd);
204f99d2
PF
356 ra->state = SD_RADV_STATE_IDLE;
357
358 return 0;
359}
360
361_public_ int sd_radv_start(sd_radv *ra) {
f474884c 362 int r;
204fb681 363
204f99d2
PF
364 assert_return(ra, -EINVAL);
365 assert_return(ra->event, -EINVAL);
366 assert_return(ra->ifindex > 0, -EINVAL);
367
368 if (ra->state != SD_RADV_STATE_IDLE)
369 return 0;
370
807a8ede
YW
371 r = event_reset_time(ra->event, &ra->timeout_event_source,
372 clock_boottime_or_monotonic(),
373 0, 0,
374 radv_timeout, ra,
375 ra->event_priority, "radv-timeout", true);
204fb681
PF
376 if (r < 0)
377 goto fail;
378
77baf5ae
PF
379 r = icmp6_bind_router_advertisement(ra->ifindex);
380 if (r < 0)
381 goto fail;
382
383 ra->fd = r;
88d5a3db
PF
384
385 r = sd_event_add_io(ra->event, &ra->recv_event_source, ra->fd, EPOLLIN, radv_recv, ra);
386 if (r < 0)
387 goto fail;
388
389 r = sd_event_source_set_priority(ra->recv_event_source, ra->event_priority);
390 if (r < 0)
391 goto fail;
392
393 (void) sd_event_source_set_description(ra->recv_event_source, "radv-receive-message");
77baf5ae 394
204f99d2
PF
395 ra->state = SD_RADV_STATE_ADVERTISING;
396
397 log_radv("Started IPv6 Router Advertisement daemon");
398
399 return 0;
204fb681
PF
400
401 fail:
402 radv_reset(ra);
403
404 return r;
204f99d2
PF
405}
406
407_public_ int sd_radv_set_ifindex(sd_radv *ra, int ifindex) {
408 assert_return(ra, -EINVAL);
409 assert_return(ifindex >= -1, -EINVAL);
410
411 if (ra->state != SD_RADV_STATE_IDLE)
412 return -EBUSY;
413
414 ra->ifindex = ifindex;
415
416 return 0;
417}
418
419_public_ int sd_radv_set_mac(sd_radv *ra, const struct ether_addr *mac_addr) {
420 assert_return(ra, -EINVAL);
421
422 if (ra->state != SD_RADV_STATE_IDLE)
423 return -EBUSY;
424
425 if (mac_addr)
426 ra->mac_addr = *mac_addr;
427 else
428 zero(ra->mac_addr);
429
430 return 0;
431}
432
433_public_ int sd_radv_set_mtu(sd_radv *ra, uint32_t mtu) {
434 assert_return(ra, -EINVAL);
435 assert_return(mtu >= 1280, -EINVAL);
436
204f99d2
PF
437 ra->mtu = mtu;
438
439 return 0;
440}
441
442_public_ int sd_radv_set_hop_limit(sd_radv *ra, uint8_t hop_limit) {
443 assert_return(ra, -EINVAL);
444
445 if (ra->state != SD_RADV_STATE_IDLE)
446 return -EBUSY;
447
448 ra->hop_limit = hop_limit;
449
450 return 0;
451}
452
453_public_ int sd_radv_set_router_lifetime(sd_radv *ra, uint32_t router_lifetime) {
454 assert_return(ra, -EINVAL);
455
456 if (ra->state != SD_RADV_STATE_IDLE)
457 return -EBUSY;
458
459 /* RFC 4191, Section 2.2, "...If the Router Lifetime is zero, the
460 preference value MUST be set to (00) by the sender..." */
461 if (router_lifetime == 0 &&
462 (ra->flags & (0x3 << 3)) != (SD_NDISC_PREFERENCE_MEDIUM << 3))
463 return -ETIME;
464
465 ra->lifetime = router_lifetime;
466
467 return 0;
468}
469
470_public_ int sd_radv_set_managed_information(sd_radv *ra, int managed) {
471 assert_return(ra, -EINVAL);
472
473 if (ra->state != SD_RADV_STATE_IDLE)
474 return -EBUSY;
475
476 SET_FLAG(ra->flags, ND_RA_FLAG_MANAGED, managed);
477
478 return 0;
479}
480
481_public_ int sd_radv_set_other_information(sd_radv *ra, int other) {
482 assert_return(ra, -EINVAL);
483
484 if (ra->state != SD_RADV_STATE_IDLE)
485 return -EBUSY;
486
487 SET_FLAG(ra->flags, ND_RA_FLAG_OTHER, other);
488
489 return 0;
490}
491
492_public_ int sd_radv_set_preference(sd_radv *ra, unsigned preference) {
493 int r = 0;
494
495 assert_return(ra, -EINVAL);
496 assert_return(IN_SET(preference,
497 SD_NDISC_PREFERENCE_LOW,
498 SD_NDISC_PREFERENCE_MEDIUM,
499 SD_NDISC_PREFERENCE_HIGH), -EINVAL);
500
501 ra->flags = (ra->flags & ~(0x3 << 3)) | (preference << 3);
502
503 return r;
504}
505
a3a98776 506_public_ int sd_radv_add_prefix(sd_radv *ra, sd_radv_prefix *p, int dynamic) {
204f99d2 507 sd_radv_prefix *cur;
d601b566 508 int r;
204f99d2 509 _cleanup_free_ char *addr_p = NULL;
d601b566
PF
510 char time_string_preferred[FORMAT_TIMESPAN_MAX];
511 char time_string_valid[FORMAT_TIMESPAN_MAX];
512 usec_t time_now, valid, preferred, valid_until, preferred_until;
204f99d2
PF
513
514 assert_return(ra, -EINVAL);
515
516 if (!p)
517 return -EINVAL;
518
519 LIST_FOREACH(prefix, cur, ra->prefixes) {
204f99d2
PF
520
521 r = in_addr_prefix_intersect(AF_INET6,
522 (union in_addr_union*) &cur->opt.in6_addr,
523 cur->opt.prefixlen,
524 (union in_addr_union*) &p->opt.in6_addr,
525 p->opt.prefixlen);
526 if (r > 0) {
527 _cleanup_free_ char *addr_cur = NULL;
528
204f99d2
PF
529 (void) in_addr_to_string(AF_INET6,
530 (union in_addr_union*) &p->opt.in6_addr,
531 &addr_p);
532
d601b566
PF
533 if (dynamic && cur->opt.prefixlen == p->opt.prefixlen)
534 goto update;
535
536 (void) in_addr_to_string(AF_INET6,
537 (union in_addr_union*) &cur->opt.in6_addr,
538 &addr_cur);
204f99d2
PF
539 log_radv("IPv6 prefix %s/%u already configured, ignoring %s/%u",
540 addr_cur, cur->opt.prefixlen,
541 addr_p, p->opt.prefixlen);
542
543 return -EEXIST;
544 }
545 }
546
547 p = sd_radv_prefix_ref(p);
548
549 LIST_APPEND(prefix, ra->prefixes, p);
550
551 ra->n_prefixes++;
552
553 (void) in_addr_to_string(AF_INET6, (union in_addr_union*) &p->opt.in6_addr, &addr_p);
d601b566
PF
554
555 if (!dynamic) {
556 log_radv("Added prefix %s/%d", addr_p, p->opt.prefixlen);
557 return 0;
558 }
559
560 cur = p;
561
562 update:
563 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
564 if (r < 0)
565 return r;
566
567 valid = be32toh(p->opt.valid_lifetime) * USEC_PER_SEC;
568 valid_until = usec_add(valid, time_now);
569 if (valid_until == USEC_INFINITY)
570 return -EOVERFLOW;
571
572 preferred = be32toh(p->opt.preferred_lifetime) * USEC_PER_SEC;
573 preferred_until = usec_add(preferred, time_now);
574 if (preferred_until == USEC_INFINITY)
575 return -EOVERFLOW;
576
577 cur->valid_until = valid_until;
578 cur->preferred_until = preferred_until;
579
580 log_radv("%s prefix %s/%u preferred %s valid %s",
581 cur? "Updated": "Added",
582 addr_p, p->opt.prefixlen,
583 format_timespan(time_string_preferred, FORMAT_TIMESPAN_MAX,
584 preferred, USEC_PER_SEC),
585 format_timespan(time_string_valid, FORMAT_TIMESPAN_MAX,
586 valid, USEC_PER_SEC));
204f99d2
PF
587
588 return 0;
589}
590
34c169c4 591_public_ sd_radv_prefix *sd_radv_remove_prefix(sd_radv *ra,
f5a5706a
LP
592 const struct in6_addr *prefix,
593 unsigned char prefixlen) {
34c169c4
PF
594 sd_radv_prefix *cur, *next;
595
596 assert_return(ra, NULL);
597 assert_return(prefix, NULL);
598
599 LIST_FOREACH_SAFE(prefix, cur, next, ra->prefixes) {
600 if (prefixlen != cur->opt.prefixlen)
601 continue;
602
603 if (!in_addr_equal(AF_INET6,
604 (union in_addr_union *)prefix,
605 (union in_addr_union *)&cur->opt.in6_addr))
606 continue;
607
608 LIST_REMOVE(prefix, ra->prefixes, cur);
609 ra->n_prefixes--;
610
611 break;
612 }
613
614 return cur;
615}
616
e9c6da38
PF
617_public_ int sd_radv_set_rdnss(sd_radv *ra, uint32_t lifetime,
618 const struct in6_addr *dns, size_t n_dns) {
619 _cleanup_free_ struct sd_radv_opt_dns *opt_rdnss = NULL;
620 size_t len;
621
622 assert_return(ra, -EINVAL);
623 assert_return(n_dns < 128, -EINVAL);
624
625 if (!dns || n_dns == 0) {
626 ra->rdnss = mfree(ra->rdnss);
627 ra->n_rdnss = 0;
628
629 return 0;
630 }
631
632 len = sizeof(struct sd_radv_opt_dns) + sizeof(struct in6_addr) * n_dns;
633
634 opt_rdnss = malloc0(len);
635 if (!opt_rdnss)
636 return -ENOMEM;
637
638 opt_rdnss->type = SD_RADV_OPT_RDNSS;
639 opt_rdnss->length = len / 8;
640 opt_rdnss->lifetime = htobe32(lifetime);
641
642 memcpy(opt_rdnss + 1, dns, n_dns * sizeof(struct in6_addr));
643
1cc6c93a 644 free_and_replace(ra->rdnss, opt_rdnss);
e9c6da38
PF
645
646 ra->n_rdnss = n_dns;
647
648 return 0;
649}
650
e965d6ab
PF
651_public_ int sd_radv_set_dnssl(sd_radv *ra, uint32_t lifetime,
652 char **search_list) {
653 _cleanup_free_ struct sd_radv_opt_dns *opt_dnssl = NULL;
654 size_t len = 0;
655 char **s;
656 uint8_t *p;
657
658 assert_return(ra, -EINVAL);
659
97d7974b 660 if (strv_isempty(search_list)) {
e965d6ab 661 ra->dnssl = mfree(ra->dnssl);
e965d6ab
PF
662 return 0;
663 }
664
665 STRV_FOREACH(s, search_list)
666 len += strlen(*s) + 2;
667
668 len = (sizeof(struct sd_radv_opt_dns) + len + 7) & ~0x7;
669
670 opt_dnssl = malloc0(len);
671 if (!opt_dnssl)
672 return -ENOMEM;
673
674 opt_dnssl->type = SD_RADV_OPT_DNSSL;
675 opt_dnssl->length = len / 8;
676 opt_dnssl->lifetime = htobe32(lifetime);
677
678 p = (uint8_t *)(opt_dnssl + 1);
679 len -= sizeof(struct sd_radv_opt_dns);
680
681 STRV_FOREACH(s, search_list) {
682 int r;
683
684 r = dns_name_to_wire_format(*s, p, len, false);
685 if (r < 0)
686 return r;
687
688 if (len < (size_t)r)
689 return -ENOBUFS;
690
691 p += r;
692 len -= r;
693 }
694
1cc6c93a 695 free_and_replace(ra->dnssl, opt_dnssl);
e965d6ab
PF
696
697 return 0;
698}
699
04473969
PF
700_public_ int sd_radv_prefix_new(sd_radv_prefix **ret) {
701 _cleanup_(sd_radv_prefix_unrefp) sd_radv_prefix *p = NULL;
702
703 assert_return(ret, -EINVAL);
704
705 p = new0(sd_radv_prefix, 1);
706 if (!p)
707 return -ENOMEM;
708
709 p->n_ref = 1;
710
711 p->opt.type = ND_OPT_PREFIX_INFORMATION;
712 p->opt.length = (sizeof(p->opt) - 1) /8 + 1;
713
714 p->opt.prefixlen = 64;
715
716 /* RFC 4861, Section 6.2.1 */
717 SET_FLAG(p->opt.flags, ND_OPT_PI_FLAG_ONLINK, true);
718 SET_FLAG(p->opt.flags, ND_OPT_PI_FLAG_AUTO, true);
719 p->opt.preferred_lifetime = htobe32(604800);
720 p->opt.valid_lifetime = htobe32(2592000);
721
204f99d2
PF
722 LIST_INIT(prefix, p);
723
1cc6c93a 724 *ret = TAKE_PTR(p);
04473969
PF
725
726 return 0;
727}
728
8301aa0b 729DEFINE_PUBLIC_TRIVIAL_REF_UNREF_FUNC(sd_radv_prefix, sd_radv_prefix, mfree);
04473969 730
f5a5706a 731_public_ int sd_radv_prefix_set_prefix(sd_radv_prefix *p, const struct in6_addr *in6_addr,
04473969
PF
732 unsigned char prefixlen) {
733 assert_return(p, -EINVAL);
734 assert_return(in6_addr, -EINVAL);
735
736 if (prefixlen < 3 || prefixlen > 128)
737 return -EINVAL;
738
739 if (prefixlen > 64)
740 /* unusual but allowed, log it */
741 log_radv("Unusual prefix length %d greater than 64", prefixlen);
742
743 p->opt.in6_addr = *in6_addr;
744 p->opt.prefixlen = prefixlen;
745
746 return 0;
747}
748
749_public_ int sd_radv_prefix_set_onlink(sd_radv_prefix *p, int onlink) {
750 assert_return(p, -EINVAL);
751
752 SET_FLAG(p->opt.flags, ND_OPT_PI_FLAG_ONLINK, onlink);
753
754 return 0;
755}
756
757_public_ int sd_radv_prefix_set_address_autoconfiguration(sd_radv_prefix *p,
758 int address_autoconfiguration) {
759 assert_return(p, -EINVAL);
760
761 SET_FLAG(p->opt.flags, ND_OPT_PI_FLAG_AUTO, address_autoconfiguration);
762
763 return 0;
764}
765
766_public_ int sd_radv_prefix_set_valid_lifetime(sd_radv_prefix *p,
767 uint32_t valid_lifetime) {
768 assert_return(p, -EINVAL);
769
770 p->opt.valid_lifetime = htobe32(valid_lifetime);
771
772 return 0;
773}
774
775_public_ int sd_radv_prefix_set_preferred_lifetime(sd_radv_prefix *p,
776 uint32_t preferred_lifetime) {
777 assert_return(p, -EINVAL);
778
779 p->opt.preferred_lifetime = htobe32(preferred_lifetime);
780
781 return 0;
782}