]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/libsystemd-network/sd-ipv4ll.c
tree-wide: drop license boilerplate
[thirdparty/systemd.git] / src / libsystemd-network / sd-ipv4ll.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2 /***
3 This file is part of systemd.
4
5 Copyright (C) 2014 Axis Communications AB. All rights reserved.
6 Copyright (C) 2015 Tom Gundersen
7 ***/
8
9 #include <arpa/inet.h>
10 #include <errno.h>
11 #include <stdio.h>
12 #include <stdlib.h>
13 #include <string.h>
14
15 #include "sd-id128.h"
16 #include "sd-ipv4acd.h"
17 #include "sd-ipv4ll.h"
18
19 #include "alloc-util.h"
20 #include "ether-addr-util.h"
21 #include "in-addr-util.h"
22 #include "list.h"
23 #include "random-util.h"
24 #include "siphash24.h"
25 #include "sparse-endian.h"
26 #include "string-util.h"
27 #include "util.h"
28
29 #define IPV4LL_NETWORK UINT32_C(0xA9FE0000)
30 #define IPV4LL_NETMASK UINT32_C(0xFFFF0000)
31
32 #define IPV4LL_DONT_DESTROY(ll) \
33 _cleanup_(sd_ipv4ll_unrefp) _unused_ sd_ipv4ll *_dont_destroy_##ll = sd_ipv4ll_ref(ll)
34
35 struct sd_ipv4ll {
36 unsigned n_ref;
37
38 sd_ipv4acd *acd;
39
40 be32_t address; /* the address pushed to ACD */
41 struct ether_addr mac;
42
43 struct {
44 le64_t value;
45 le64_t generation;
46 } seed;
47 bool seed_set;
48
49 /* External */
50 be32_t claimed_address;
51
52 sd_ipv4ll_callback_t callback;
53 void* userdata;
54 };
55
56 #define log_ipv4ll_errno(ll, error, fmt, ...) log_internal(LOG_DEBUG, error, __FILE__, __LINE__, __func__, "IPV4LL: " fmt, ##__VA_ARGS__)
57 #define log_ipv4ll(ll, fmt, ...) log_ipv4ll_errno(ll, 0, fmt, ##__VA_ARGS__)
58
59 static void ipv4ll_on_acd(sd_ipv4acd *ll, int event, void *userdata);
60
61 sd_ipv4ll *sd_ipv4ll_ref(sd_ipv4ll *ll) {
62 if (!ll)
63 return NULL;
64
65 assert(ll->n_ref >= 1);
66 ll->n_ref++;
67
68 return ll;
69 }
70
71 sd_ipv4ll *sd_ipv4ll_unref(sd_ipv4ll *ll) {
72 if (!ll)
73 return NULL;
74
75 assert(ll->n_ref >= 1);
76 ll->n_ref--;
77
78 if (ll->n_ref > 0)
79 return NULL;
80
81 sd_ipv4acd_unref(ll->acd);
82 return mfree(ll);
83 }
84
85 int sd_ipv4ll_new(sd_ipv4ll **ret) {
86 _cleanup_(sd_ipv4ll_unrefp) sd_ipv4ll *ll = NULL;
87 int r;
88
89 assert_return(ret, -EINVAL);
90
91 ll = new0(sd_ipv4ll, 1);
92 if (!ll)
93 return -ENOMEM;
94
95 ll->n_ref = 1;
96
97 r = sd_ipv4acd_new(&ll->acd);
98 if (r < 0)
99 return r;
100
101 r = sd_ipv4acd_set_callback(ll->acd, ipv4ll_on_acd, ll);
102 if (r < 0)
103 return r;
104
105 *ret = TAKE_PTR(ll);
106
107 return 0;
108 }
109
110 int sd_ipv4ll_stop(sd_ipv4ll *ll) {
111 assert_return(ll, -EINVAL);
112
113 return sd_ipv4acd_stop(ll->acd);
114 }
115
116 int sd_ipv4ll_set_ifindex(sd_ipv4ll *ll, int ifindex) {
117 assert_return(ll, -EINVAL);
118 assert_return(ifindex > 0, -EINVAL);
119 assert_return(sd_ipv4ll_is_running(ll) == 0, -EBUSY);
120
121 return sd_ipv4acd_set_ifindex(ll->acd, ifindex);
122 }
123
124 int sd_ipv4ll_set_mac(sd_ipv4ll *ll, const struct ether_addr *addr) {
125 int r;
126
127 assert_return(ll, -EINVAL);
128 assert_return(addr, -EINVAL);
129 assert_return(sd_ipv4ll_is_running(ll) == 0, -EBUSY);
130
131 r = sd_ipv4acd_set_mac(ll->acd, addr);
132 if (r < 0)
133 return r;
134
135 ll->mac = *addr;
136 return 0;
137 }
138
139 int sd_ipv4ll_detach_event(sd_ipv4ll *ll) {
140 assert_return(ll, -EINVAL);
141
142 return sd_ipv4acd_detach_event(ll->acd);
143 }
144
145 int sd_ipv4ll_attach_event(sd_ipv4ll *ll, sd_event *event, int64_t priority) {
146 assert_return(ll, -EINVAL);
147
148 return sd_ipv4acd_attach_event(ll->acd, event, priority);
149 }
150
151 int sd_ipv4ll_set_callback(sd_ipv4ll *ll, sd_ipv4ll_callback_t cb, void *userdata) {
152 assert_return(ll, -EINVAL);
153
154 ll->callback = cb;
155 ll->userdata = userdata;
156
157 return 0;
158 }
159
160 int sd_ipv4ll_get_address(sd_ipv4ll *ll, struct in_addr *address) {
161 assert_return(ll, -EINVAL);
162 assert_return(address, -EINVAL);
163
164 if (ll->claimed_address == 0)
165 return -ENOENT;
166
167 address->s_addr = ll->claimed_address;
168
169 return 0;
170 }
171
172 int sd_ipv4ll_set_address_seed(sd_ipv4ll *ll, uint64_t seed) {
173 assert_return(ll, -EINVAL);
174 assert_return(sd_ipv4ll_is_running(ll) == 0, -EBUSY);
175
176 ll->seed.value = htole64(seed);
177 ll->seed_set = true;
178
179 return 0;
180 }
181
182 int sd_ipv4ll_is_running(sd_ipv4ll *ll) {
183 assert_return(ll, false);
184
185 return sd_ipv4acd_is_running(ll->acd);
186 }
187
188 static bool ipv4ll_address_is_valid(const struct in_addr *address) {
189 assert(address);
190
191 if (!in_addr_is_link_local(AF_INET, (const union in_addr_union *) address))
192 return false;
193
194 return !IN_SET(be32toh(address->s_addr) & 0x0000FF00U, 0x0000U, 0xFF00U);
195 }
196
197 int sd_ipv4ll_set_address(sd_ipv4ll *ll, const struct in_addr *address) {
198 int r;
199
200 assert_return(ll, -EINVAL);
201 assert_return(address, -EINVAL);
202 assert_return(ipv4ll_address_is_valid(address), -EINVAL);
203
204 r = sd_ipv4acd_set_address(ll->acd, address);
205 if (r < 0)
206 return r;
207
208 ll->address = address->s_addr;
209
210 return 0;
211 }
212
213 #define PICK_HASH_KEY SD_ID128_MAKE(15,ac,82,a6,d6,3f,49,78,98,77,5d,0c,69,02,94,0b)
214
215 static int ipv4ll_pick_address(sd_ipv4ll *ll) {
216 _cleanup_free_ char *address = NULL;
217 be32_t addr;
218
219 assert(ll);
220
221 do {
222 uint64_t h;
223
224 h = siphash24(&ll->seed, sizeof(ll->seed), PICK_HASH_KEY.bytes);
225
226 /* Increase the generation counter by one */
227 ll->seed.generation = htole64(le64toh(ll->seed.generation) + 1);
228
229 addr = htobe32((h & UINT32_C(0x0000FFFF)) | IPV4LL_NETWORK);
230 } while (addr == ll->address ||
231 IN_SET(be32toh(addr) & 0x0000FF00U, 0x0000U, 0xFF00U));
232
233 (void) in_addr_to_string(AF_INET, &(union in_addr_union) { .in.s_addr = addr }, &address);
234 log_ipv4ll(ll, "Picked new IP address %s.", strna(address));
235
236 return sd_ipv4ll_set_address(ll, &(struct in_addr) { addr });
237 }
238
239 int sd_ipv4ll_restart(sd_ipv4ll *ll) {
240 ll->address = 0;
241
242 return sd_ipv4ll_start(ll);
243 }
244
245 #define MAC_HASH_KEY SD_ID128_MAKE(df,04,22,98,3f,ad,14,52,f9,87,2e,d1,9c,70,e2,f2)
246
247 int sd_ipv4ll_start(sd_ipv4ll *ll) {
248 int r;
249 bool picked_address = false;
250
251 assert_return(ll, -EINVAL);
252 assert_return(!ether_addr_is_null(&ll->mac), -EINVAL);
253 assert_return(sd_ipv4ll_is_running(ll) == 0, -EBUSY);
254
255 /* If no random seed is set, generate some from the MAC address */
256 if (!ll->seed_set)
257 ll->seed.value = htole64(siphash24(ll->mac.ether_addr_octet, ETH_ALEN, MAC_HASH_KEY.bytes));
258
259 /* Restart the generation counter. */
260 ll->seed.generation = 0;
261
262 if (ll->address == 0) {
263 r = ipv4ll_pick_address(ll);
264 if (r < 0)
265 return r;
266
267 picked_address = true;
268 }
269
270 r = sd_ipv4acd_start(ll->acd);
271 if (r < 0) {
272
273 /* We couldn't start? If so, let's forget the picked address again, the user might make a change and
274 * retry, and we want the new data to take effect when picking an address. */
275 if (picked_address)
276 ll->address = 0;
277
278 return r;
279 }
280
281 return 0;
282 }
283
284 static void ipv4ll_client_notify(sd_ipv4ll *ll, int event) {
285 assert(ll);
286
287 if (ll->callback)
288 ll->callback(ll, event, ll->userdata);
289 }
290
291 void ipv4ll_on_acd(sd_ipv4acd *acd, int event, void *userdata) {
292 sd_ipv4ll *ll = userdata;
293 IPV4LL_DONT_DESTROY(ll);
294 int r;
295
296 assert(acd);
297 assert(ll);
298
299 switch (event) {
300
301 case SD_IPV4ACD_EVENT_STOP:
302 ipv4ll_client_notify(ll, SD_IPV4LL_EVENT_STOP);
303 ll->claimed_address = 0;
304 break;
305
306 case SD_IPV4ACD_EVENT_BIND:
307 ll->claimed_address = ll->address;
308 ipv4ll_client_notify(ll, SD_IPV4LL_EVENT_BIND);
309 break;
310
311 case SD_IPV4ACD_EVENT_CONFLICT:
312 /* if an address was already bound we must call up to the
313 user to handle this, otherwise we just try again */
314 if (ll->claimed_address != 0) {
315 ipv4ll_client_notify(ll, SD_IPV4LL_EVENT_CONFLICT);
316
317 ll->claimed_address = 0;
318 } else {
319 r = ipv4ll_pick_address(ll);
320 if (r < 0)
321 goto error;
322
323 r = sd_ipv4acd_start(ll->acd);
324 if (r < 0)
325 goto error;
326 }
327
328 break;
329
330 default:
331 assert_not_reached("Invalid IPv4ACD event.");
332 }
333
334 return;
335
336 error:
337 ipv4ll_client_notify(ll, SD_IPV4LL_EVENT_STOP);
338 }