1 /* SPDX-License-Identifier: LGPL-2.1+ */
5 #include <netinet/ether.h>
10 #include "alloc-util.h"
11 #include "condition.h"
12 #include "conf-parser.h"
13 #include "device-util.h"
14 #include "dhcp-lease-internal.h"
15 #include "ether-addr-util.h"
16 #include "hexdecoct.h"
18 #include "network-internal.h"
19 #include "parse-util.h"
20 #include "siphash24.h"
21 #include "socket-util.h"
22 #include "string-util.h"
27 const char *net_get_name(sd_device
*device
) {
28 const char *name
, *field
;
32 /* fetch some persistent data unique (on this machine) to this device */
33 FOREACH_STRING(field
, "ID_NET_NAME_ONBOARD", "ID_NET_NAME_SLOT", "ID_NET_NAME_PATH", "ID_NET_NAME_MAC")
34 if (sd_device_get_property_value(device
, field
, &name
) >= 0)
40 #define HASH_KEY SD_ID128_MAKE(d3,1e,48,fa,90,fe,4b,4c,9d,af,d5,d7,a1,b1,2e,8a)
42 int net_get_unique_predictable_data(sd_device
*device
, uint64_t *result
) {
50 /* net_get_name() will return one of the device names based on stable information about the
51 * device. If this is not available, we fall back to using the device name. */
52 name
= net_get_name(device
);
54 (void) sd_device_get_sysname(device
, &name
);
56 return log_device_debug_errno(device
, SYNTHETIC_ERRNO(ENODATA
),
57 "No stable identifying information found");
59 log_device_debug(device
, "Using \"%s\" as stable identifying information", name
);
61 sz
= sizeof(sd_id128_t
) + l
;
62 v
= newa(uint8_t, sz
);
64 /* Fetch some persistent data unique to this machine */
65 r
= sd_id128_get_machine((sd_id128_t
*) v
);
68 memcpy(v
+ sizeof(sd_id128_t
), name
, l
);
70 /* Let's hash the machine ID plus the device name. We use
71 * a fixed, but originally randomly created hash key here. */
72 *result
= htole64(siphash24(v
, sz
, HASH_KEY
.bytes
));
76 static bool net_condition_test_strv(char * const *raw_patterns
,
78 if (strv_isempty(raw_patterns
))
81 /* If the patterns begin with "!", edit it out and negate the test. */
82 if (raw_patterns
[0][0] == '!') {
86 length
= strv_length(raw_patterns
) + 1; /* Include the NULL. */
87 patterns
= newa(char*, length
);
88 patterns
[0] = raw_patterns
[0] + 1; /* Skip the "!". */
89 for (i
= 1; i
< length
; i
++)
90 patterns
[i
] = raw_patterns
[i
];
92 return !string
|| !strv_fnmatch(patterns
, string
, 0);
95 return string
&& strv_fnmatch(raw_patterns
, string
, 0);
98 bool net_match_config(Set
*match_mac
,
99 char * const *match_paths
,
100 char * const *match_drivers
,
101 char * const *match_types
,
102 char * const *match_names
,
103 Condition
*match_host
,
104 Condition
*match_virt
,
105 Condition
*match_kernel_cmdline
,
106 Condition
*match_kernel_version
,
107 Condition
*match_arch
,
108 const struct ether_addr
*dev_mac
,
109 const char *dev_path
,
110 const char *dev_parent_driver
,
111 const char *dev_driver
,
112 const char *dev_type
,
113 const char *dev_name
) {
115 if (match_host
&& condition_test(match_host
) <= 0)
118 if (match_virt
&& condition_test(match_virt
) <= 0)
121 if (match_kernel_cmdline
&& condition_test(match_kernel_cmdline
) <= 0)
124 if (match_kernel_version
&& condition_test(match_kernel_version
) <= 0)
127 if (match_arch
&& condition_test(match_arch
) <= 0)
130 if (match_mac
&& (!dev_mac
|| !set_contains(match_mac
, dev_mac
)))
133 if (!net_condition_test_strv(match_paths
, dev_path
))
136 if (!net_condition_test_strv(match_drivers
, dev_driver
))
139 if (!net_condition_test_strv(match_types
, dev_type
))
142 if (!net_condition_test_strv(match_names
, dev_name
))
148 int config_parse_net_condition(const char *unit
,
149 const char *filename
,
152 unsigned section_line
,
159 ConditionType cond
= ltype
;
160 Condition
**ret
= data
;
163 _cleanup_free_
char *s
= NULL
;
170 negate
= rvalue
[0] == '!';
178 c
= condition_new(cond
, s
, false, negate
);
183 condition_free(*ret
);
189 int config_parse_ifnames(
191 const char *filename
,
194 unsigned section_line
,
210 _cleanup_free_
char *word
= NULL
;
212 r
= extract_first_word(&rvalue
, &word
, NULL
, 0);
214 log_syntax(unit
, LOG_ERR
, filename
, line
, 0, "Failed to parse interface name list: %s", rvalue
);
220 if (!ifname_valid(word
)) {
221 log_syntax(unit
, LOG_ERR
, filename
, line
, 0, "Interface name is not valid or too long, ignoring assignment: %s", rvalue
);
225 r
= strv_push(sv
, word
);
235 int config_parse_ifalias(const char *unit
,
236 const char *filename
,
239 unsigned section_line
,
247 _cleanup_free_
char *n
= NULL
;
258 if (!ascii_is_valid(n
) || strlen(n
) >= IFALIASZ
) {
259 log_syntax(unit
, LOG_ERR
, filename
, line
, 0, "Interface alias is not ASCII clean or is too long, ignoring assignment: %s", rvalue
);
266 free_and_replace(*s
, n
);
271 int config_parse_hwaddr(const char *unit
,
272 const char *filename
,
275 unsigned section_line
,
282 _cleanup_free_
struct ether_addr
*n
= NULL
;
283 struct ether_addr
**hwaddr
= data
;
291 n
= new0(struct ether_addr
, 1);
295 r
= ether_addr_from_string(rvalue
, n
);
297 log_syntax(unit
, LOG_ERR
, filename
, line
, r
, "Not a valid MAC address, ignoring assignment: %s", rvalue
);
301 free_and_replace(*hwaddr
, n
);
306 int config_parse_hwaddrs(const char *unit
,
307 const char *filename
,
310 unsigned section_line
,
317 _cleanup_set_free_free_ Set
*s
= NULL
;
318 const char *p
= rvalue
;
319 Set
**hwaddrs
= data
;
327 if (isempty(rvalue
)) {
328 /* Empty assignment resets the list */
329 *hwaddrs
= set_free_free(*hwaddrs
);
333 s
= set_new(ðer_addr_hash_ops
);
338 _cleanup_free_
char *word
= NULL
;
339 _cleanup_free_
struct ether_addr
*n
= NULL
;
341 r
= extract_first_word(&p
, &word
, NULL
, 0);
347 log_syntax(unit
, LOG_WARNING
, filename
, line
, r
, "Invalid syntax, ignoring: %s", rvalue
);
351 n
= new(struct ether_addr
, 1);
355 r
= ether_addr_from_string(word
, n
);
357 log_syntax(unit
, LOG_ERR
, filename
, line
, 0, "Not a valid MAC address, ignoring: %s", word
);
365 n
= NULL
; /* avoid cleanup */
368 r
= set_ensure_allocated(hwaddrs
, ðer_addr_hash_ops
);
372 r
= set_move(*hwaddrs
, s
);
379 int config_parse_bridge_port_priority(
381 const char *filename
,
384 unsigned section_line
,
399 r
= safe_atou16(rvalue
, &i
);
401 log_syntax(unit
, LOG_ERR
, filename
, line
, r
,
402 "Failed to parse bridge port priority, ignoring: %s", rvalue
);
406 if (i
> LINK_BRIDGE_PORT_PRIORITY_MAX
) {
407 log_syntax(unit
, LOG_ERR
, filename
, line
, r
,
408 "Bridge port priority is larger than maximum %u, ignoring: %s", LINK_BRIDGE_PORT_PRIORITY_MAX
, rvalue
);
412 *((uint16_t *)data
) = i
;
417 void serialize_in_addrs(FILE *f
, const struct in_addr
*addresses
, size_t size
) {
424 for (i
= 0; i
< size
; i
++)
425 fprintf(f
, "%s%s", inet_ntoa(addresses
[i
]),
426 (i
< (size
- 1)) ? " ": "");
429 int deserialize_in_addrs(struct in_addr
**ret
, const char *string
) {
430 _cleanup_free_
struct in_addr
*addresses
= NULL
;
437 _cleanup_free_
char *word
= NULL
;
438 struct in_addr
*new_addresses
;
441 r
= extract_first_word(&string
, &word
, NULL
, 0);
447 new_addresses
= reallocarray(addresses
, size
+ 1, sizeof(struct in_addr
));
451 addresses
= new_addresses
;
453 r
= inet_pton(AF_INET
, word
, &(addresses
[size
]));
460 *ret
= TAKE_PTR(addresses
);
465 void serialize_in6_addrs(FILE *f
, const struct in6_addr
*addresses
, size_t size
) {
472 for (i
= 0; i
< size
; i
++) {
473 char buffer
[INET6_ADDRSTRLEN
];
475 fputs(inet_ntop(AF_INET6
, addresses
+i
, buffer
, sizeof(buffer
)), f
);
482 int deserialize_in6_addrs(struct in6_addr
**ret
, const char *string
) {
483 _cleanup_free_
struct in6_addr
*addresses
= NULL
;
490 _cleanup_free_
char *word
= NULL
;
491 struct in6_addr
*new_addresses
;
494 r
= extract_first_word(&string
, &word
, NULL
, 0);
500 new_addresses
= reallocarray(addresses
, size
+ 1, sizeof(struct in6_addr
));
504 addresses
= new_addresses
;
506 r
= inet_pton(AF_INET6
, word
, &(addresses
[size
]));
513 *ret
= TAKE_PTR(addresses
);
518 void serialize_dhcp_routes(FILE *f
, const char *key
, sd_dhcp_route
**routes
, size_t size
) {
526 fprintf(f
, "%s=", key
);
528 for (i
= 0; i
< size
; i
++) {
529 struct in_addr dest
, gw
;
532 assert_se(sd_dhcp_route_get_destination(routes
[i
], &dest
) >= 0);
533 assert_se(sd_dhcp_route_get_gateway(routes
[i
], &gw
) >= 0);
534 assert_se(sd_dhcp_route_get_destination_prefix_length(routes
[i
], &length
) >= 0);
536 fprintf(f
, "%s/%" PRIu8
, inet_ntoa(dest
), length
);
537 fprintf(f
, ",%s%s", inet_ntoa(gw
), (i
< (size
- 1)) ? " ": "");
543 int deserialize_dhcp_routes(struct sd_dhcp_route
**ret
, size_t *ret_size
, size_t *ret_allocated
, const char *string
) {
544 _cleanup_free_
struct sd_dhcp_route
*routes
= NULL
;
545 size_t size
= 0, allocated
= 0;
549 assert(ret_allocated
);
552 /* WORD FORMAT: dst_ip/dst_prefixlen,gw_ip */
554 _cleanup_free_
char *word
= NULL
;
559 r
= extract_first_word(&string
, &word
, NULL
, 0);
565 if (!GREEDY_REALLOC(routes
, allocated
, size
+ 1))
571 tok_end
= strchr(tok
, '/');
576 r
= inet_aton(tok
, &routes
[size
].dst_addr
);
582 /* get the prefixlen */
583 tok_end
= strchr(tok
, ',');
589 r
= safe_atou(tok
, &n
);
593 routes
[size
].dst_prefixlen
= (uint8_t) n
;
596 /* get the gateway */
597 r
= inet_aton(tok
, &routes
[size
].gw_addr
);
605 *ret_allocated
= allocated
;
606 *ret
= TAKE_PTR(routes
);
611 int serialize_dhcp_option(FILE *f
, const char *key
, const void *data
, size_t size
) {
612 _cleanup_free_
char *hex_buf
= NULL
;
618 hex_buf
= hexmem(data
, size
);
622 fprintf(f
, "%s=%s\n", key
, hex_buf
);