]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/libsystemd-network/sd-radv.c
sd-radv: normalize function parameters a bit
[thirdparty/systemd.git] / src / libsystemd-network / sd-radv.c
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
04473969
PF
2/***
3 This file is part of systemd.
4
5 Copyright (C) 2017 Intel Corporation. All rights reserved.
04473969
PF
6***/
7
8#include <netinet/icmp6.h>
9#include <netinet/in.h>
204f99d2 10#include <arpa/inet.h>
04473969
PF
11
12#include "sd-radv.h"
13
204f99d2 14#include "macro.h"
04473969 15#include "alloc-util.h"
e965d6ab 16#include "dns-domain.h"
04473969
PF
17#include "fd-util.h"
18#include "icmp6-util.h"
19#include "in-addr-util.h"
20#include "radv-internal.h"
21#include "socket-util.h"
22#include "string-util.h"
e965d6ab 23#include "strv.h"
04473969 24#include "util.h"
204fb681 25#include "random-util.h"
04473969 26
204f99d2
PF
27_public_ int sd_radv_new(sd_radv **ret) {
28 _cleanup_(sd_radv_unrefp) sd_radv *ra = NULL;
29
30 assert_return(ret, -EINVAL);
31
32 ra = new0(sd_radv, 1);
33 if (!ra)
34 return -ENOMEM;
35
36 ra->n_ref = 1;
77baf5ae 37 ra->fd = -1;
204f99d2
PF
38
39 LIST_HEAD_INIT(ra->prefixes);
40
1cc6c93a 41 *ret = TAKE_PTR(ra);
204f99d2
PF
42
43 return 0;
44}
45
46_public_ int sd_radv_attach_event(sd_radv *ra, sd_event *event, int64_t priority) {
47 int r;
48
49 assert_return(ra, -EINVAL);
50 assert_return(!ra->event, -EBUSY);
51
52 if (event)
53 ra->event = sd_event_ref(event);
54 else {
55 r = sd_event_default(&ra->event);
56 if (r < 0)
57 return 0;
58 }
59
60 ra->event_priority = priority;
61
62 return 0;
63}
64
65_public_ int sd_radv_detach_event(sd_radv *ra) {
66
67 assert_return(ra, -EINVAL);
68
69 ra->event = sd_event_unref(ra->event);
70 return 0;
71}
72
73_public_ sd_event *sd_radv_get_event(sd_radv *ra) {
74 assert_return(ra, NULL);
75
76 return ra->event;
77}
78
204fb681 79static void radv_reset(sd_radv *ra) {
c4b6dda0 80 assert(ra);
204fb681
PF
81
82 ra->timeout_event_source =
83 sd_event_source_unref(ra->timeout_event_source);
84
88d5a3db
PF
85 ra->recv_event_source =
86 sd_event_source_unref(ra->recv_event_source);
87
204fb681
PF
88 ra->ra_sent = 0;
89}
90
204f99d2
PF
91_public_ sd_radv *sd_radv_ref(sd_radv *ra) {
92 if (!ra)
93 return NULL;
94
95 assert(ra->n_ref > 0);
96 ra->n_ref++;
97
98 return ra;
99}
100
101_public_ sd_radv *sd_radv_unref(sd_radv *ra) {
102 if (!ra)
103 return NULL;
104
105 assert(ra->n_ref > 0);
106 ra->n_ref--;
107
108 if (ra->n_ref > 0)
109 return NULL;
110
111 while (ra->prefixes) {
112 sd_radv_prefix *p = ra->prefixes;
113
114 LIST_REMOVE(prefix, ra->prefixes, p);
115 sd_radv_prefix_unref(p);
116 }
117
e9c6da38 118 free(ra->rdnss);
f9aa5417 119 free(ra->dnssl);
e9c6da38 120
204fb681
PF
121 radv_reset(ra);
122
204f99d2 123 sd_radv_detach_event(ra);
c4b6dda0
LP
124
125 ra->fd = safe_close(ra->fd);
126
204f99d2
PF
127 return mfree(ra);
128}
129
204fb681
PF
130static int radv_send(sd_radv *ra, const struct in6_addr *dst,
131 const uint32_t router_lifetime) {
77baf5ae
PF
132 static const struct ether_addr mac_zero = {};
133 sd_radv_prefix *p;
134 struct sockaddr_in6 dst_addr = {
135 .sin6_family = AF_INET6,
136 .sin6_addr = IN6ADDR_ALL_NODES_MULTICAST_INIT,
137 };
138 struct nd_router_advert adv = {};
139 struct {
140 struct nd_opt_hdr opthdr;
141 struct ether_addr slladdr;
142 } _packed_ opt_mac = {
143 .opthdr = {
144 .nd_opt_type = ND_OPT_SOURCE_LINKADDR,
145 .nd_opt_len = (sizeof(struct nd_opt_hdr) +
146 sizeof(struct ether_addr) - 1) /8 + 1,
147 },
148 };
149 struct nd_opt_mtu opt_mtu = {
150 .nd_opt_mtu_type = ND_OPT_MTU,
151 .nd_opt_mtu_len = 1,
152 };
6852c0f6
PF
153 /* Reserve iov space for RA header, linkaddr, MTU, N prefixes, RDNSS
154 and DNSSL */
155 struct iovec iov[5 + ra->n_prefixes];
77baf5ae
PF
156 struct msghdr msg = {
157 .msg_name = &dst_addr,
158 .msg_namelen = sizeof(dst_addr),
159 .msg_iov = iov,
160 };
d601b566
PF
161 usec_t time_now;
162 int r;
163
164 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
165 if (r < 0)
166 return r;
77baf5ae 167
88d5a3db 168 if (dst && !in_addr_is_null(AF_INET6, (union in_addr_union*) dst))
77baf5ae 169 dst_addr.sin6_addr = *dst;
88d5a3db 170
77baf5ae
PF
171 adv.nd_ra_type = ND_ROUTER_ADVERT;
172 adv.nd_ra_curhoplimit = ra->hop_limit;
173 adv.nd_ra_flags_reserved = ra->flags;
174 adv.nd_ra_router_lifetime = htobe16(router_lifetime);
175 iov[msg.msg_iovlen].iov_base = &adv;
176 iov[msg.msg_iovlen].iov_len = sizeof(adv);
177 msg.msg_iovlen++;
178
179 /* MAC address is optional, either because the link does not use L2
180 addresses or load sharing is desired. See RFC 4861, Section 4.2 */
181 if (memcmp(&mac_zero, &ra->mac_addr, sizeof(mac_zero))) {
182 opt_mac.slladdr = ra->mac_addr;
183 iov[msg.msg_iovlen].iov_base = &opt_mac;
184 iov[msg.msg_iovlen].iov_len = sizeof(opt_mac);
185 msg.msg_iovlen++;
186 }
187
188 if (ra->mtu) {
189 opt_mtu.nd_opt_mtu_mtu = htobe32(ra->mtu);
190 iov[msg.msg_iovlen].iov_base = &opt_mtu;
191 iov[msg.msg_iovlen].iov_len = sizeof(opt_mtu);
192 msg.msg_iovlen++;
193 }
194
195 LIST_FOREACH(prefix, p, ra->prefixes) {
d601b566
PF
196 if (p->valid_until) {
197
198 if (time_now > p->valid_until)
199 p->opt.valid_lifetime = 0;
200 else
201 p->opt.valid_lifetime = htobe32((p->valid_until - time_now) / USEC_PER_SEC);
202
203 if (time_now > p->preferred_until)
204 p->opt.preferred_lifetime = 0;
205 else
206 p->opt.preferred_lifetime = htobe32((p->preferred_until - time_now) / USEC_PER_SEC);
207 }
77baf5ae
PF
208 iov[msg.msg_iovlen].iov_base = &p->opt;
209 iov[msg.msg_iovlen].iov_len = sizeof(p->opt);
210 msg.msg_iovlen++;
211 }
212
e9c6da38
PF
213 if (ra->rdnss) {
214 iov[msg.msg_iovlen].iov_base = ra->rdnss;
215 iov[msg.msg_iovlen].iov_len = ra->rdnss->length * 8;
216 msg.msg_iovlen++;
217 }
218
e965d6ab
PF
219 if (ra->dnssl) {
220 iov[msg.msg_iovlen].iov_base = ra->dnssl;
221 iov[msg.msg_iovlen].iov_len = ra->dnssl->length * 8;
222 msg.msg_iovlen++;
223 }
224
77baf5ae
PF
225 if (sendmsg(ra->fd, &msg, 0) < 0)
226 return -errno;
204fb681 227
77baf5ae 228 return 0;
204fb681
PF
229}
230
88d5a3db
PF
231static int radv_recv(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
232 sd_radv *ra = userdata;
233 _cleanup_free_ char *addr = NULL;
234 struct in6_addr src;
235 triple_timestamp timestamp;
236 int r;
237 ssize_t buflen;
238 _cleanup_free_ char *buf = NULL;
239
240 assert(s);
241 assert(ra);
242 assert(ra->event);
243
244 buflen = next_datagram_size_fd(fd);
245
246 if ((unsigned) buflen < sizeof(struct nd_router_solicit))
247 return log_radv("Too short packet received");
248
249 buf = new0(char, buflen);
250 if (!buf)
251 return 0;
252
253 r = icmp6_receive(fd, buf, buflen, &src, &timestamp);
254 if (r < 0) {
255 switch (r) {
256 case -EADDRNOTAVAIL:
257 (void) in_addr_to_string(AF_INET6, (union in_addr_union*) &src, &addr);
258 log_radv("Received RS from non-link-local address %s. Ignoring", addr);
259 break;
260
261 case -EMULTIHOP:
262 log_radv("Received RS with invalid hop limit. Ignoring.");
263 break;
264
265 case -EPFNOSUPPORT:
266 log_radv("Received invalid source address from ICMPv6 socket. Ignoring.");
267 break;
268
269 default:
270 log_radv_warning_errno(r, "Error receiving from ICMPv6 socket: %m");
271 break;
272 }
273
274 return 0;
275 }
276
277 (void) in_addr_to_string(AF_INET6, (union in_addr_union*) &src, &addr);
278
279 r = radv_send(ra, &src, ra->lifetime);
280 if (r < 0)
281 log_radv_warning_errno(r, "Unable to send solicited Router Advertisment to %s: %m", addr);
282 else
283 log_radv("Sent solicited Router Advertisement to %s", addr);
284
285 return 0;
286}
287
204fb681
PF
288static usec_t radv_compute_timeout(usec_t min, usec_t max) {
289 assert_return(min <= max, SD_RADV_DEFAULT_MIN_TIMEOUT_USEC);
290
291 return min + (random_u32() % (max - min));
292}
293
294static int radv_timeout(sd_event_source *s, uint64_t usec, void *userdata) {
295 int r;
296 sd_radv *ra = userdata;
297 usec_t min_timeout = SD_RADV_DEFAULT_MIN_TIMEOUT_USEC;
298 usec_t max_timeout = SD_RADV_DEFAULT_MAX_TIMEOUT_USEC;
299 usec_t time_now, timeout;
300 char time_string[FORMAT_TIMESPAN_MAX];
301
302 assert(s);
303 assert(ra);
304 assert(ra->event);
305
306 ra->timeout_event_source = sd_event_source_unref(ra->timeout_event_source);
307
308 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
309 if (r < 0)
310 goto fail;
311
312 r = radv_send(ra, NULL, ra->lifetime);
313 if (r < 0)
314 log_radv_warning_errno(r, "Unable to send Router Advertisement: %m");
315
316 /* RFC 4861, Section 6.2.4, sending initial Router Advertisements */
317 if (ra->ra_sent < SD_RADV_MAX_INITIAL_RTR_ADVERTISEMENTS) {
318 max_timeout = SD_RADV_MAX_INITIAL_RTR_ADVERT_INTERVAL_USEC;
319 min_timeout = SD_RADV_MAX_INITIAL_RTR_ADVERT_INTERVAL_USEC / 3;
320 }
321
322 timeout = radv_compute_timeout(min_timeout, max_timeout);
323
324 log_radv("Next Router Advertisement in %s",
325 format_timespan(time_string, FORMAT_TIMESPAN_MAX,
326 timeout, USEC_PER_SEC));
327
328 r = sd_event_add_time(ra->event, &ra->timeout_event_source,
329 clock_boottime_or_monotonic(),
330 time_now + timeout, MSEC_PER_SEC,
331 radv_timeout, ra);
332 if (r < 0)
333 goto fail;
334
335 r = sd_event_source_set_priority(ra->timeout_event_source,
336 ra->event_priority);
337 if (r < 0)
338 goto fail;
339
340 r = sd_event_source_set_description(ra->timeout_event_source,
341 "radv-timeout");
342 if (r < 0)
343 goto fail;
344
345 ra->ra_sent++;
346
347fail:
348 if (r < 0)
349 sd_radv_stop(ra);
350
351 return 0;
352}
353
204f99d2 354_public_ int sd_radv_stop(sd_radv *ra) {
204fb681
PF
355 int r;
356
204f99d2
PF
357 assert_return(ra, -EINVAL);
358
6f8a8b84
SS
359 if (ra->state == SD_RADV_STATE_IDLE)
360 return 0;
361
204f99d2
PF
362 log_radv("Stopping IPv6 Router Advertisement daemon");
363
204fb681
PF
364 /* RFC 4861, Section 6.2.5, send at least one Router Advertisement
365 with zero lifetime */
366 r = radv_send(ra, NULL, 0);
367 if (r < 0)
368 log_radv_warning_errno(r, "Unable to send last Router Advertisement with router lifetime set to zero: %m");
369
370 radv_reset(ra);
77baf5ae 371 ra->fd = safe_close(ra->fd);
204f99d2
PF
372 ra->state = SD_RADV_STATE_IDLE;
373
374 return 0;
375}
376
377_public_ int sd_radv_start(sd_radv *ra) {
204fb681
PF
378 int r = 0;
379
204f99d2
PF
380 assert_return(ra, -EINVAL);
381 assert_return(ra->event, -EINVAL);
382 assert_return(ra->ifindex > 0, -EINVAL);
383
384 if (ra->state != SD_RADV_STATE_IDLE)
385 return 0;
386
204fb681
PF
387 r = sd_event_add_time(ra->event, &ra->timeout_event_source,
388 clock_boottime_or_monotonic(), 0, 0,
389 radv_timeout, ra);
390 if (r < 0)
391 goto fail;
392
393 r = sd_event_source_set_priority(ra->timeout_event_source,
394 ra->event_priority);
395 if (r < 0)
396 goto fail;
397
398 (void) sd_event_source_set_description(ra->timeout_event_source,
399 "radv-timeout");
400
77baf5ae
PF
401 r = icmp6_bind_router_advertisement(ra->ifindex);
402 if (r < 0)
403 goto fail;
404
405 ra->fd = r;
88d5a3db
PF
406
407 r = sd_event_add_io(ra->event, &ra->recv_event_source, ra->fd, EPOLLIN, radv_recv, ra);
408 if (r < 0)
409 goto fail;
410
411 r = sd_event_source_set_priority(ra->recv_event_source, ra->event_priority);
412 if (r < 0)
413 goto fail;
414
415 (void) sd_event_source_set_description(ra->recv_event_source, "radv-receive-message");
77baf5ae 416
204f99d2
PF
417 ra->state = SD_RADV_STATE_ADVERTISING;
418
419 log_radv("Started IPv6 Router Advertisement daemon");
420
421 return 0;
204fb681
PF
422
423 fail:
424 radv_reset(ra);
425
426 return r;
204f99d2
PF
427}
428
429_public_ int sd_radv_set_ifindex(sd_radv *ra, int ifindex) {
430 assert_return(ra, -EINVAL);
431 assert_return(ifindex >= -1, -EINVAL);
432
433 if (ra->state != SD_RADV_STATE_IDLE)
434 return -EBUSY;
435
436 ra->ifindex = ifindex;
437
438 return 0;
439}
440
441_public_ int sd_radv_set_mac(sd_radv *ra, const struct ether_addr *mac_addr) {
442 assert_return(ra, -EINVAL);
443
444 if (ra->state != SD_RADV_STATE_IDLE)
445 return -EBUSY;
446
447 if (mac_addr)
448 ra->mac_addr = *mac_addr;
449 else
450 zero(ra->mac_addr);
451
452 return 0;
453}
454
455_public_ int sd_radv_set_mtu(sd_radv *ra, uint32_t mtu) {
456 assert_return(ra, -EINVAL);
457 assert_return(mtu >= 1280, -EINVAL);
458
204f99d2
PF
459 ra->mtu = mtu;
460
461 return 0;
462}
463
464_public_ int sd_radv_set_hop_limit(sd_radv *ra, uint8_t hop_limit) {
465 assert_return(ra, -EINVAL);
466
467 if (ra->state != SD_RADV_STATE_IDLE)
468 return -EBUSY;
469
470 ra->hop_limit = hop_limit;
471
472 return 0;
473}
474
475_public_ int sd_radv_set_router_lifetime(sd_radv *ra, uint32_t router_lifetime) {
476 assert_return(ra, -EINVAL);
477
478 if (ra->state != SD_RADV_STATE_IDLE)
479 return -EBUSY;
480
481 /* RFC 4191, Section 2.2, "...If the Router Lifetime is zero, the
482 preference value MUST be set to (00) by the sender..." */
483 if (router_lifetime == 0 &&
484 (ra->flags & (0x3 << 3)) != (SD_NDISC_PREFERENCE_MEDIUM << 3))
485 return -ETIME;
486
487 ra->lifetime = router_lifetime;
488
489 return 0;
490}
491
492_public_ int sd_radv_set_managed_information(sd_radv *ra, int managed) {
493 assert_return(ra, -EINVAL);
494
495 if (ra->state != SD_RADV_STATE_IDLE)
496 return -EBUSY;
497
498 SET_FLAG(ra->flags, ND_RA_FLAG_MANAGED, managed);
499
500 return 0;
501}
502
503_public_ int sd_radv_set_other_information(sd_radv *ra, int other) {
504 assert_return(ra, -EINVAL);
505
506 if (ra->state != SD_RADV_STATE_IDLE)
507 return -EBUSY;
508
509 SET_FLAG(ra->flags, ND_RA_FLAG_OTHER, other);
510
511 return 0;
512}
513
514_public_ int sd_radv_set_preference(sd_radv *ra, unsigned preference) {
515 int r = 0;
516
517 assert_return(ra, -EINVAL);
518 assert_return(IN_SET(preference,
519 SD_NDISC_PREFERENCE_LOW,
520 SD_NDISC_PREFERENCE_MEDIUM,
521 SD_NDISC_PREFERENCE_HIGH), -EINVAL);
522
523 ra->flags = (ra->flags & ~(0x3 << 3)) | (preference << 3);
524
525 return r;
526}
527
d601b566 528_public_ int sd_radv_add_prefix(sd_radv *ra, sd_radv_prefix *p, bool dynamic) {
204f99d2 529 sd_radv_prefix *cur;
d601b566 530 int r;
204f99d2 531 _cleanup_free_ char *addr_p = NULL;
d601b566
PF
532 char time_string_preferred[FORMAT_TIMESPAN_MAX];
533 char time_string_valid[FORMAT_TIMESPAN_MAX];
534 usec_t time_now, valid, preferred, valid_until, preferred_until;
204f99d2
PF
535
536 assert_return(ra, -EINVAL);
537
538 if (!p)
539 return -EINVAL;
540
541 LIST_FOREACH(prefix, cur, ra->prefixes) {
204f99d2
PF
542
543 r = in_addr_prefix_intersect(AF_INET6,
544 (union in_addr_union*) &cur->opt.in6_addr,
545 cur->opt.prefixlen,
546 (union in_addr_union*) &p->opt.in6_addr,
547 p->opt.prefixlen);
548 if (r > 0) {
549 _cleanup_free_ char *addr_cur = NULL;
550
204f99d2
PF
551 (void) in_addr_to_string(AF_INET6,
552 (union in_addr_union*) &p->opt.in6_addr,
553 &addr_p);
554
d601b566
PF
555 if (dynamic && cur->opt.prefixlen == p->opt.prefixlen)
556 goto update;
557
558 (void) in_addr_to_string(AF_INET6,
559 (union in_addr_union*) &cur->opt.in6_addr,
560 &addr_cur);
204f99d2
PF
561 log_radv("IPv6 prefix %s/%u already configured, ignoring %s/%u",
562 addr_cur, cur->opt.prefixlen,
563 addr_p, p->opt.prefixlen);
564
565 return -EEXIST;
566 }
567 }
568
569 p = sd_radv_prefix_ref(p);
570
571 LIST_APPEND(prefix, ra->prefixes, p);
572
573 ra->n_prefixes++;
574
575 (void) in_addr_to_string(AF_INET6, (union in_addr_union*) &p->opt.in6_addr, &addr_p);
d601b566
PF
576
577 if (!dynamic) {
578 log_radv("Added prefix %s/%d", addr_p, p->opt.prefixlen);
579 return 0;
580 }
581
582 cur = p;
583
584 update:
585 r = sd_event_now(ra->event, clock_boottime_or_monotonic(), &time_now);
586 if (r < 0)
587 return r;
588
589 valid = be32toh(p->opt.valid_lifetime) * USEC_PER_SEC;
590 valid_until = usec_add(valid, time_now);
591 if (valid_until == USEC_INFINITY)
592 return -EOVERFLOW;
593
594 preferred = be32toh(p->opt.preferred_lifetime) * USEC_PER_SEC;
595 preferred_until = usec_add(preferred, time_now);
596 if (preferred_until == USEC_INFINITY)
597 return -EOVERFLOW;
598
599 cur->valid_until = valid_until;
600 cur->preferred_until = preferred_until;
601
602 log_radv("%s prefix %s/%u preferred %s valid %s",
603 cur? "Updated": "Added",
604 addr_p, p->opt.prefixlen,
605 format_timespan(time_string_preferred, FORMAT_TIMESPAN_MAX,
606 preferred, USEC_PER_SEC),
607 format_timespan(time_string_valid, FORMAT_TIMESPAN_MAX,
608 valid, USEC_PER_SEC));
204f99d2
PF
609
610 return 0;
611}
612
34c169c4 613_public_ sd_radv_prefix *sd_radv_remove_prefix(sd_radv *ra,
f5a5706a
LP
614 const struct in6_addr *prefix,
615 unsigned char prefixlen) {
34c169c4
PF
616 sd_radv_prefix *cur, *next;
617
618 assert_return(ra, NULL);
619 assert_return(prefix, NULL);
620
621 LIST_FOREACH_SAFE(prefix, cur, next, ra->prefixes) {
622 if (prefixlen != cur->opt.prefixlen)
623 continue;
624
625 if (!in_addr_equal(AF_INET6,
626 (union in_addr_union *)prefix,
627 (union in_addr_union *)&cur->opt.in6_addr))
628 continue;
629
630 LIST_REMOVE(prefix, ra->prefixes, cur);
631 ra->n_prefixes--;
632
633 break;
634 }
635
636 return cur;
637}
638
e9c6da38
PF
639_public_ int sd_radv_set_rdnss(sd_radv *ra, uint32_t lifetime,
640 const struct in6_addr *dns, size_t n_dns) {
641 _cleanup_free_ struct sd_radv_opt_dns *opt_rdnss = NULL;
642 size_t len;
643
644 assert_return(ra, -EINVAL);
645 assert_return(n_dns < 128, -EINVAL);
646
647 if (!dns || n_dns == 0) {
648 ra->rdnss = mfree(ra->rdnss);
649 ra->n_rdnss = 0;
650
651 return 0;
652 }
653
654 len = sizeof(struct sd_radv_opt_dns) + sizeof(struct in6_addr) * n_dns;
655
656 opt_rdnss = malloc0(len);
657 if (!opt_rdnss)
658 return -ENOMEM;
659
660 opt_rdnss->type = SD_RADV_OPT_RDNSS;
661 opt_rdnss->length = len / 8;
662 opt_rdnss->lifetime = htobe32(lifetime);
663
664 memcpy(opt_rdnss + 1, dns, n_dns * sizeof(struct in6_addr));
665
1cc6c93a 666 free_and_replace(ra->rdnss, opt_rdnss);
e9c6da38
PF
667
668 ra->n_rdnss = n_dns;
669
670 return 0;
671}
672
e965d6ab
PF
673_public_ int sd_radv_set_dnssl(sd_radv *ra, uint32_t lifetime,
674 char **search_list) {
675 _cleanup_free_ struct sd_radv_opt_dns *opt_dnssl = NULL;
676 size_t len = 0;
677 char **s;
678 uint8_t *p;
679
680 assert_return(ra, -EINVAL);
681
682 if (!search_list || *search_list == NULL) {
683 ra->dnssl = mfree(ra->dnssl);
684
685 return 0;
686 }
687
688 STRV_FOREACH(s, search_list)
689 len += strlen(*s) + 2;
690
691 len = (sizeof(struct sd_radv_opt_dns) + len + 7) & ~0x7;
692
693 opt_dnssl = malloc0(len);
694 if (!opt_dnssl)
695 return -ENOMEM;
696
697 opt_dnssl->type = SD_RADV_OPT_DNSSL;
698 opt_dnssl->length = len / 8;
699 opt_dnssl->lifetime = htobe32(lifetime);
700
701 p = (uint8_t *)(opt_dnssl + 1);
702 len -= sizeof(struct sd_radv_opt_dns);
703
704 STRV_FOREACH(s, search_list) {
705 int r;
706
707 r = dns_name_to_wire_format(*s, p, len, false);
708 if (r < 0)
709 return r;
710
711 if (len < (size_t)r)
712 return -ENOBUFS;
713
714 p += r;
715 len -= r;
716 }
717
1cc6c93a 718 free_and_replace(ra->dnssl, opt_dnssl);
e965d6ab
PF
719
720 return 0;
721}
722
04473969
PF
723_public_ int sd_radv_prefix_new(sd_radv_prefix **ret) {
724 _cleanup_(sd_radv_prefix_unrefp) sd_radv_prefix *p = NULL;
725
726 assert_return(ret, -EINVAL);
727
728 p = new0(sd_radv_prefix, 1);
729 if (!p)
730 return -ENOMEM;
731
732 p->n_ref = 1;
733
734 p->opt.type = ND_OPT_PREFIX_INFORMATION;
735 p->opt.length = (sizeof(p->opt) - 1) /8 + 1;
736
737 p->opt.prefixlen = 64;
738
739 /* RFC 4861, Section 6.2.1 */
740 SET_FLAG(p->opt.flags, ND_OPT_PI_FLAG_ONLINK, true);
741 SET_FLAG(p->opt.flags, ND_OPT_PI_FLAG_AUTO, true);
742 p->opt.preferred_lifetime = htobe32(604800);
743 p->opt.valid_lifetime = htobe32(2592000);
744
204f99d2
PF
745 LIST_INIT(prefix, p);
746
1cc6c93a 747 *ret = TAKE_PTR(p);
04473969
PF
748
749 return 0;
750}
751
752_public_ sd_radv_prefix *sd_radv_prefix_ref(sd_radv_prefix *p) {
753 if (!p)
754 return NULL;
755
756 assert(p->n_ref > 0);
757 p->n_ref++;
758
759 return p;
760}
761
762_public_ sd_radv_prefix *sd_radv_prefix_unref(sd_radv_prefix *p) {
763 if (!p)
764 return NULL;
765
766 assert(p->n_ref > 0);
767 p->n_ref--;
768
769 if (p->n_ref > 0)
770 return NULL;
771
772 return mfree(p);
773}
774
f5a5706a 775_public_ int sd_radv_prefix_set_prefix(sd_radv_prefix *p, const struct in6_addr *in6_addr,
04473969
PF
776 unsigned char prefixlen) {
777 assert_return(p, -EINVAL);
778 assert_return(in6_addr, -EINVAL);
779
780 if (prefixlen < 3 || prefixlen > 128)
781 return -EINVAL;
782
783 if (prefixlen > 64)
784 /* unusual but allowed, log it */
785 log_radv("Unusual prefix length %d greater than 64", prefixlen);
786
787 p->opt.in6_addr = *in6_addr;
788 p->opt.prefixlen = prefixlen;
789
790 return 0;
791}
792
793_public_ int sd_radv_prefix_set_onlink(sd_radv_prefix *p, int onlink) {
794 assert_return(p, -EINVAL);
795
796 SET_FLAG(p->opt.flags, ND_OPT_PI_FLAG_ONLINK, onlink);
797
798 return 0;
799}
800
801_public_ int sd_radv_prefix_set_address_autoconfiguration(sd_radv_prefix *p,
802 int address_autoconfiguration) {
803 assert_return(p, -EINVAL);
804
805 SET_FLAG(p->opt.flags, ND_OPT_PI_FLAG_AUTO, address_autoconfiguration);
806
807 return 0;
808}
809
810_public_ int sd_radv_prefix_set_valid_lifetime(sd_radv_prefix *p,
811 uint32_t valid_lifetime) {
812 assert_return(p, -EINVAL);
813
814 p->opt.valid_lifetime = htobe32(valid_lifetime);
815
816 return 0;
817}
818
819_public_ int sd_radv_prefix_set_preferred_lifetime(sd_radv_prefix *p,
820 uint32_t preferred_lifetime) {
821 assert_return(p, -EINVAL);
822
823 p->opt.preferred_lifetime = htobe32(preferred_lifetime);
824
825 return 0;
826}