]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/network/networkd-address.c
networkd: wait for kernel to reply ipv6 peer address
[thirdparty/systemd.git] / src / network / networkd-address.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2
3 #include <net/if.h>
4
5 #include "alloc-util.h"
6 #include "conf-parser.h"
7 #include "firewall-util.h"
8 #include "netlink-util.h"
9 #include "networkd-address.h"
10 #include "networkd-manager.h"
11 #include "parse-util.h"
12 #include "set.h"
13 #include "socket-util.h"
14 #include "string-util.h"
15 #include "strv.h"
16 #include "utf8.h"
17 #include "util.h"
18
19 #define ADDRESSES_PER_LINK_MAX 2048U
20 #define STATIC_ADDRESSES_PER_NETWORK_MAX 1024U
21
22 int address_new(Address **ret) {
23 _cleanup_(address_freep) Address *address = NULL;
24
25 address = new(Address, 1);
26 if (!address)
27 return -ENOMEM;
28
29 *address = (Address) {
30 .family = AF_UNSPEC,
31 .scope = RT_SCOPE_UNIVERSE,
32 .cinfo.ifa_prefered = CACHE_INFO_INFINITY_LIFE_TIME,
33 .cinfo.ifa_valid = CACHE_INFO_INFINITY_LIFE_TIME,
34 };
35
36 *ret = TAKE_PTR(address);
37
38 return 0;
39 }
40
41 int address_new_static(Network *network, const char *filename, unsigned section_line, Address **ret) {
42 _cleanup_(network_config_section_freep) NetworkConfigSection *n = NULL;
43 _cleanup_(address_freep) Address *address = NULL;
44 int r;
45
46 assert(network);
47 assert(ret);
48 assert(!!filename == (section_line > 0));
49
50 if (filename) {
51 r = network_config_section_new(filename, section_line, &n);
52 if (r < 0)
53 return r;
54
55 address = hashmap_get(network->addresses_by_section, n);
56 if (address) {
57 *ret = TAKE_PTR(address);
58
59 return 0;
60 }
61 }
62
63 if (network->n_static_addresses >= STATIC_ADDRESSES_PER_NETWORK_MAX)
64 return -E2BIG;
65
66 r = address_new(&address);
67 if (r < 0)
68 return r;
69
70 address->network = network;
71 LIST_APPEND(addresses, network->static_addresses, address);
72 network->n_static_addresses++;
73
74 if (filename) {
75 address->section = TAKE_PTR(n);
76
77 r = hashmap_ensure_allocated(&network->addresses_by_section, &network_config_hash_ops);
78 if (r < 0)
79 return r;
80
81 r = hashmap_put(network->addresses_by_section, address->section, address);
82 if (r < 0)
83 return r;
84 }
85
86 *ret = TAKE_PTR(address);
87
88 return 0;
89 }
90
91 void address_free(Address *address) {
92 if (!address)
93 return;
94
95 if (address->network) {
96 LIST_REMOVE(addresses, address->network->static_addresses, address);
97 assert(address->network->n_static_addresses > 0);
98 address->network->n_static_addresses--;
99
100 if (address->section)
101 hashmap_remove(address->network->addresses_by_section, address->section);
102 }
103
104 if (address->link) {
105 set_remove(address->link->addresses, address);
106 set_remove(address->link->addresses_foreign, address);
107
108 if (in_addr_equal(AF_INET6, &address->in_addr, (const union in_addr_union *) &address->link->ipv6ll_address))
109 memzero(&address->link->ipv6ll_address, sizeof(struct in6_addr));
110 }
111
112 network_config_section_free(address->section);
113 free(address->label);
114 free(address);
115 }
116
117 static void address_hash_func(const Address *a, struct siphash *state) {
118 assert(a);
119
120 siphash24_compress(&a->family, sizeof(a->family), state);
121
122 switch (a->family) {
123 case AF_INET:
124 siphash24_compress(&a->prefixlen, sizeof(a->prefixlen), state);
125
126 /* peer prefix */
127 if (a->prefixlen != 0) {
128 uint32_t prefix;
129
130 if (a->in_addr_peer.in.s_addr != 0)
131 prefix = be32toh(a->in_addr_peer.in.s_addr) >> (32 - a->prefixlen);
132 else
133 prefix = be32toh(a->in_addr.in.s_addr) >> (32 - a->prefixlen);
134
135 siphash24_compress(&prefix, sizeof(prefix), state);
136 }
137
138 _fallthrough_;
139 case AF_INET6:
140 /* local address */
141 siphash24_compress(&a->in_addr, FAMILY_ADDRESS_SIZE(a->family), state);
142
143 break;
144 default:
145 /* treat any other address family as AF_UNSPEC */
146 break;
147 }
148 }
149
150 static int address_compare_func(const Address *a1, const Address *a2) {
151 int r;
152
153 r = CMP(a1->family, a2->family);
154 if (r != 0)
155 return r;
156
157 switch (a1->family) {
158 /* use the same notion of equality as the kernel does */
159 case AF_INET:
160 r = CMP(a1->prefixlen, a2->prefixlen);
161 if (r != 0)
162 return r;
163
164 /* compare the peer prefixes */
165 if (a1->prefixlen != 0) {
166 /* make sure we don't try to shift by 32.
167 * See ISO/IEC 9899:TC3 ยง 6.5.7.3. */
168 uint32_t b1, b2;
169
170 if (a1->in_addr_peer.in.s_addr != 0)
171 b1 = be32toh(a1->in_addr_peer.in.s_addr) >> (32 - a1->prefixlen);
172 else
173 b1 = be32toh(a1->in_addr.in.s_addr) >> (32 - a1->prefixlen);
174
175 if (a2->in_addr_peer.in.s_addr != 0)
176 b2 = be32toh(a2->in_addr_peer.in.s_addr) >> (32 - a1->prefixlen);
177 else
178 b2 = be32toh(a2->in_addr.in.s_addr) >> (32 - a1->prefixlen);
179
180 r = CMP(b1, b2);
181 if (r != 0)
182 return r;
183 }
184
185 _fallthrough_;
186 case AF_INET6:
187 return memcmp(&a1->in_addr, &a2->in_addr, FAMILY_ADDRESS_SIZE(a1->family));
188 default:
189 /* treat any other address family as AF_UNSPEC */
190 return 0;
191 }
192 }
193
194 DEFINE_PRIVATE_HASH_OPS(address_hash_ops, Address, address_hash_func, address_compare_func);
195
196 bool address_equal(Address *a1, Address *a2) {
197 if (a1 == a2)
198 return true;
199
200 if (!a1 || !a2)
201 return false;
202
203 return address_compare_func(a1, a2) == 0;
204 }
205
206 static int address_establish(Address *address, Link *link) {
207 bool masq;
208 int r;
209
210 assert(address);
211 assert(link);
212
213 masq = link->network &&
214 link->network->ip_masquerade &&
215 address->family == AF_INET &&
216 address->scope < RT_SCOPE_LINK;
217
218 /* Add firewall entry if this is requested */
219 if (address->ip_masquerade_done != masq) {
220 union in_addr_union masked = address->in_addr;
221 in_addr_mask(address->family, &masked, address->prefixlen);
222
223 r = fw_add_masquerade(masq, AF_INET, 0, &masked, address->prefixlen, NULL, NULL, 0);
224 if (r < 0)
225 log_link_warning_errno(link, r, "Could not enable IP masquerading: %m");
226
227 address->ip_masquerade_done = masq;
228 }
229
230 return 0;
231 }
232
233 static int address_add_internal(Link *link, Set **addresses,
234 int family,
235 const union in_addr_union *in_addr,
236 unsigned char prefixlen,
237 Address **ret) {
238 _cleanup_(address_freep) Address *address = NULL;
239 int r;
240
241 assert(link);
242 assert(addresses);
243 assert(in_addr);
244
245 r = address_new(&address);
246 if (r < 0)
247 return r;
248
249 address->family = family;
250 address->in_addr = *in_addr;
251 address->prefixlen = prefixlen;
252 /* Consider address tentative until we get the real flags from the kernel */
253 address->flags = IFA_F_TENTATIVE;
254
255 r = set_ensure_allocated(addresses, &address_hash_ops);
256 if (r < 0)
257 return r;
258
259 r = set_put(*addresses, address);
260 if (r < 0)
261 return r;
262
263 address->link = link;
264
265 if (ret)
266 *ret = address;
267
268 address = NULL;
269
270 return 0;
271 }
272
273 int address_add_foreign(Link *link, int family, const union in_addr_union *in_addr, unsigned char prefixlen, Address **ret) {
274 return address_add_internal(link, &link->addresses_foreign, family, in_addr, prefixlen, ret);
275 }
276
277 int address_add(Link *link, int family, const union in_addr_union *in_addr, unsigned char prefixlen, Address **ret) {
278 Address *address;
279 int r;
280
281 r = address_get(link, family, in_addr, prefixlen, &address);
282 if (r == -ENOENT) {
283 /* Address does not exist, create a new one */
284 r = address_add_internal(link, &link->addresses, family, in_addr, prefixlen, &address);
285 if (r < 0)
286 return r;
287 } else if (r == 0) {
288 /* Take over a foreign address */
289 r = set_ensure_allocated(&link->addresses, &address_hash_ops);
290 if (r < 0)
291 return r;
292
293 r = set_put(link->addresses, address);
294 if (r < 0)
295 return r;
296
297 set_remove(link->addresses_foreign, address);
298 } else if (r == 1) {
299 /* Already exists, do nothing */
300 ;
301 } else
302 return r;
303
304 if (ret)
305 *ret = address;
306
307 return 0;
308 }
309
310 static int address_release(Address *address) {
311 int r;
312
313 assert(address);
314 assert(address->link);
315
316 /* Remove masquerading firewall entry if it was added */
317 if (address->ip_masquerade_done) {
318 union in_addr_union masked = address->in_addr;
319 in_addr_mask(address->family, &masked, address->prefixlen);
320
321 r = fw_add_masquerade(false, AF_INET, 0, &masked, address->prefixlen, NULL, NULL, 0);
322 if (r < 0)
323 log_link_warning_errno(address->link, r, "Failed to disable IP masquerading: %m");
324
325 address->ip_masquerade_done = false;
326 }
327
328 return 0;
329 }
330
331 int address_update(
332 Address *address,
333 unsigned char flags,
334 unsigned char scope,
335 const struct ifa_cacheinfo *cinfo) {
336
337 bool ready;
338 int r;
339
340 assert(address);
341 assert(cinfo);
342 assert_return(address->link, 1);
343
344 if (IN_SET(address->link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
345 return 1;
346
347 ready = address_is_ready(address);
348
349 address->flags = flags;
350 address->scope = scope;
351 address->cinfo = *cinfo;
352
353 link_update_operstate(address->link);
354 link_check_ready(address->link);
355
356 if (!ready &&
357 address_is_ready(address) &&
358 address->family == AF_INET6 &&
359 in_addr_is_link_local(AF_INET6, &address->in_addr) > 0 &&
360 in_addr_is_null(AF_INET6, (const union in_addr_union*) &address->link->ipv6ll_address) > 0) {
361
362 r = link_ipv6ll_gained(address->link, &address->in_addr.in6);
363 if (r < 0)
364 return r;
365 }
366
367 return 0;
368 }
369
370 int address_drop(Address *address) {
371 Link *link;
372 bool ready;
373
374 assert(address);
375
376 ready = address_is_ready(address);
377 link = address->link;
378
379 address_release(address);
380 address_free(address);
381
382 link_update_operstate(link);
383
384 if (link && !ready)
385 link_check_ready(link);
386
387 return 0;
388 }
389
390 int address_get(Link *link,
391 int family,
392 const union in_addr_union *in_addr,
393 unsigned char prefixlen,
394 Address **ret) {
395
396 Address address, *existing;
397
398 assert(link);
399 assert(in_addr);
400
401 address = (Address) {
402 .family = family,
403 .in_addr = *in_addr,
404 .prefixlen = prefixlen,
405 };
406
407 existing = set_get(link->addresses, &address);
408 if (existing) {
409 if (ret)
410 *ret = existing;
411 return 1;
412 }
413
414 existing = set_get(link->addresses_foreign, &address);
415 if (existing) {
416 if (ret)
417 *ret = existing;
418 return 0;
419 }
420
421 return -ENOENT;
422 }
423
424 static int address_remove_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
425 int r;
426
427 assert(m);
428 assert(link);
429 assert(link->ifname);
430
431 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
432 return 1;
433
434 r = sd_netlink_message_get_errno(m);
435 if (r < 0 && r != -EADDRNOTAVAIL)
436 log_link_warning_errno(link, r, "Could not drop address: %m");
437
438 return 1;
439 }
440
441 int address_remove(
442 Address *address,
443 Link *link,
444 link_netlink_message_handler_t callback) {
445
446 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
447 _cleanup_free_ char *b = NULL;
448 int r;
449
450 assert(address);
451 assert(IN_SET(address->family, AF_INET, AF_INET6));
452 assert(link);
453 assert(link->ifindex > 0);
454 assert(link->manager);
455 assert(link->manager->rtnl);
456
457 if (DEBUG_LOGGING) {
458 if (in_addr_to_string(address->family, &address->in_addr, &b) >= 0)
459 log_link_debug(link, "Removing address %s", b);
460 }
461
462 r = sd_rtnl_message_new_addr(link->manager->rtnl, &req, RTM_DELADDR,
463 link->ifindex, address->family);
464 if (r < 0)
465 return log_error_errno(r, "Could not allocate RTM_DELADDR message: %m");
466
467 r = sd_rtnl_message_addr_set_prefixlen(req, address->prefixlen);
468 if (r < 0)
469 return log_error_errno(r, "Could not set prefixlen: %m");
470
471 if (address->family == AF_INET)
472 r = sd_netlink_message_append_in_addr(req, IFA_LOCAL, &address->in_addr.in);
473 else if (address->family == AF_INET6)
474 r = sd_netlink_message_append_in6_addr(req, IFA_LOCAL, &address->in_addr.in6);
475 if (r < 0)
476 return log_error_errno(r, "Could not append IFA_LOCAL attribute: %m");
477
478 r = netlink_call_async(link->manager->rtnl, NULL, req,
479 callback ?: address_remove_handler,
480 link_netlink_destroy_callback, link);
481 if (r < 0)
482 return log_error_errno(r, "Could not send rtnetlink message: %m");
483
484 link_ref(link);
485
486 return 0;
487 }
488
489 static int address_acquire(Link *link, Address *original, Address **ret) {
490 union in_addr_union in_addr = {};
491 struct in_addr broadcast = {};
492 _cleanup_(address_freep) Address *na = NULL;
493 int r;
494
495 assert(link);
496 assert(original);
497 assert(ret);
498
499 /* Something useful was configured? just use it */
500 if (in_addr_is_null(original->family, &original->in_addr) <= 0)
501 return 0;
502
503 /* The address is configured to be 0.0.0.0 or [::] by the user?
504 * Then let's acquire something more useful from the pool. */
505 r = manager_address_pool_acquire(link->manager, original->family, original->prefixlen, &in_addr);
506 if (r < 0)
507 return log_link_error_errno(link, r, "Failed to acquire address from pool: %m");
508 if (r == 0) {
509 log_link_error(link, "Couldn't find free address for interface, all taken.");
510 return -EBUSY;
511 }
512
513 if (original->family == AF_INET) {
514 /* Pick first address in range for ourselves ... */
515 in_addr.in.s_addr = in_addr.in.s_addr | htobe32(1);
516
517 /* .. and use last as broadcast address */
518 if (original->prefixlen > 30)
519 broadcast.s_addr = 0;
520 else
521 broadcast.s_addr = in_addr.in.s_addr | htobe32(0xFFFFFFFFUL >> original->prefixlen);
522 } else if (original->family == AF_INET6)
523 in_addr.in6.s6_addr[15] |= 1;
524
525 r = address_new(&na);
526 if (r < 0)
527 return r;
528
529 na->family = original->family;
530 na->prefixlen = original->prefixlen;
531 na->scope = original->scope;
532 na->cinfo = original->cinfo;
533
534 if (original->label) {
535 na->label = strdup(original->label);
536 if (!na->label)
537 return -ENOMEM;
538 }
539
540 na->broadcast = broadcast;
541 na->in_addr = in_addr;
542
543 LIST_PREPEND(addresses, link->pool_addresses, na);
544
545 *ret = TAKE_PTR(na);
546
547 return 0;
548 }
549
550 int address_configure(
551 Address *address,
552 Link *link,
553 link_netlink_message_handler_t callback,
554 bool update) {
555
556 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
557 int r;
558
559 assert(address);
560 assert(IN_SET(address->family, AF_INET, AF_INET6));
561 assert(link);
562 assert(link->ifindex > 0);
563 assert(link->manager);
564 assert(link->manager->rtnl);
565 assert(callback);
566
567 /* If this is a new address, then refuse adding more than the limit */
568 if (address_get(link, address->family, &address->in_addr, address->prefixlen, NULL) <= 0 &&
569 set_size(link->addresses) >= ADDRESSES_PER_LINK_MAX)
570 return -E2BIG;
571
572 r = address_acquire(link, address, &address);
573 if (r < 0)
574 return r;
575
576 if (update)
577 r = sd_rtnl_message_new_addr_update(link->manager->rtnl, &req,
578 link->ifindex, address->family);
579 else
580 r = sd_rtnl_message_new_addr(link->manager->rtnl, &req, RTM_NEWADDR,
581 link->ifindex, address->family);
582 if (r < 0)
583 return log_error_errno(r, "Could not allocate RTM_NEWADDR message: %m");
584
585 r = sd_rtnl_message_addr_set_prefixlen(req, address->prefixlen);
586 if (r < 0)
587 return log_error_errno(r, "Could not set prefixlen: %m");
588
589 address->flags |= IFA_F_PERMANENT;
590
591 if (address->home_address)
592 address->flags |= IFA_F_HOMEADDRESS;
593
594 if (address->duplicate_address_detection)
595 address->flags |= IFA_F_NODAD;
596
597 if (address->manage_temporary_address)
598 address->flags |= IFA_F_MANAGETEMPADDR;
599
600 if (address->prefix_route)
601 address->flags |= IFA_F_NOPREFIXROUTE;
602
603 if (address->autojoin)
604 address->flags |= IFA_F_MCAUTOJOIN;
605
606 r = sd_rtnl_message_addr_set_flags(req, (address->flags & 0xff));
607 if (r < 0)
608 return log_error_errno(r, "Could not set flags: %m");
609
610 if (address->flags & ~0xff) {
611 r = sd_netlink_message_append_u32(req, IFA_FLAGS, address->flags);
612 if (r < 0)
613 return log_error_errno(r, "Could not set extended flags: %m");
614 }
615
616 r = sd_rtnl_message_addr_set_scope(req, address->scope);
617 if (r < 0)
618 return log_error_errno(r, "Could not set scope: %m");
619
620 if (address->family == AF_INET)
621 r = sd_netlink_message_append_in_addr(req, IFA_LOCAL, &address->in_addr.in);
622 else if (address->family == AF_INET6)
623 r = sd_netlink_message_append_in6_addr(req, IFA_LOCAL, &address->in_addr.in6);
624 if (r < 0)
625 return log_error_errno(r, "Could not append IFA_LOCAL attribute: %m");
626
627 if (!in_addr_is_null(address->family, &address->in_addr_peer)) {
628 if (address->family == AF_INET)
629 r = sd_netlink_message_append_in_addr(req, IFA_ADDRESS, &address->in_addr_peer.in);
630 else if (address->family == AF_INET6)
631 r = sd_netlink_message_append_in6_addr(req, IFA_ADDRESS, &address->in_addr_peer.in6);
632 if (r < 0)
633 return log_error_errno(r, "Could not append IFA_ADDRESS attribute: %m");
634 } else if (address->family == AF_INET && address->prefixlen <= 30) {
635 r = sd_netlink_message_append_in_addr(req, IFA_BROADCAST, &address->broadcast);
636 if (r < 0)
637 return log_error_errno(r, "Could not append IFA_BROADCAST attribute: %m");
638 }
639
640 if (address->label) {
641 r = sd_netlink_message_append_string(req, IFA_LABEL, address->label);
642 if (r < 0)
643 return log_error_errno(r, "Could not append IFA_LABEL attribute: %m");
644 }
645
646 r = sd_netlink_message_append_cache_info(req, IFA_CACHEINFO, &address->cinfo);
647 if (r < 0)
648 return log_error_errno(r, "Could not append IFA_CACHEINFO attribute: %m");
649
650 r = address_establish(address, link);
651 if (r < 0)
652 return r;
653
654 r = netlink_call_async(link->manager->rtnl, NULL, req, callback, link_netlink_destroy_callback, link);
655 if (r < 0) {
656 address_release(address);
657 return log_error_errno(r, "Could not send rtnetlink message: %m");
658 }
659
660 link_ref(link);
661
662 if (address->family == AF_INET6 && !in_addr_is_null(address->family, &address->in_addr_peer))
663 r = address_add(link, address->family, &address->in_addr_peer, address->prefixlen, NULL);
664 else
665 r = address_add(link, address->family, &address->in_addr, address->prefixlen, NULL);
666 if (r < 0) {
667 address_release(address);
668 return log_error_errno(r, "Could not add address: %m");
669 }
670
671 return 0;
672 }
673
674 int config_parse_broadcast(
675 const char *unit,
676 const char *filename,
677 unsigned line,
678 const char *section,
679 unsigned section_line,
680 const char *lvalue,
681 int ltype,
682 const char *rvalue,
683 void *data,
684 void *userdata) {
685
686 Network *network = userdata;
687 _cleanup_(address_freep) Address *n = NULL;
688 int r;
689
690 assert(filename);
691 assert(section);
692 assert(lvalue);
693 assert(rvalue);
694 assert(data);
695
696 r = address_new_static(network, filename, section_line, &n);
697 if (r < 0)
698 return r;
699
700 if (n->family == AF_INET6) {
701 log_syntax(unit, LOG_ERR, filename, line, 0, "Broadcast is not valid for IPv6 addresses, ignoring assignment: %s", rvalue);
702 return 0;
703 }
704
705 r = in_addr_from_string(AF_INET, rvalue, (union in_addr_union*) &n->broadcast);
706 if (r < 0) {
707 log_syntax(unit, LOG_ERR, filename, line, r, "Broadcast is invalid, ignoring assignment: %s", rvalue);
708 return 0;
709 }
710
711 n->family = AF_INET;
712 n = NULL;
713
714 return 0;
715 }
716
717 int config_parse_address(const char *unit,
718 const char *filename,
719 unsigned line,
720 const char *section,
721 unsigned section_line,
722 const char *lvalue,
723 int ltype,
724 const char *rvalue,
725 void *data,
726 void *userdata) {
727
728 Network *network = userdata;
729 _cleanup_(address_freep) Address *n = NULL;
730 union in_addr_union buffer;
731 unsigned char prefixlen;
732 int r, f;
733
734 assert(filename);
735 assert(section);
736 assert(lvalue);
737 assert(rvalue);
738 assert(data);
739
740 if (streq(section, "Network")) {
741 /* we are not in an Address section, so treat
742 * this as the special '0' section */
743 r = address_new_static(network, NULL, 0, &n);
744 } else
745 r = address_new_static(network, filename, section_line, &n);
746
747 if (r < 0)
748 return r;
749
750 /* Address=address/prefixlen */
751 r = in_addr_default_prefix_from_string_auto(rvalue, &f, &buffer, &prefixlen);
752 if (r < 0) {
753 log_syntax(unit, LOG_ERR, filename, line, r, "Invalid address '%s', ignoring assignment: %m", rvalue);
754 return 0;
755 }
756
757 if (n->family != AF_UNSPEC && f != n->family) {
758 log_syntax(unit, LOG_ERR, filename, line, 0, "Address is incompatible, ignoring assignment: %s", rvalue);
759 return 0;
760 }
761
762 n->family = f;
763 n->prefixlen = prefixlen;
764
765 if (streq(lvalue, "Address"))
766 n->in_addr = buffer;
767 else
768 n->in_addr_peer = buffer;
769
770 if (n->family == AF_INET && n->broadcast.s_addr == 0)
771 n->broadcast.s_addr = n->in_addr.in.s_addr | htonl(0xfffffffflu >> n->prefixlen);
772
773 n = NULL;
774
775 return 0;
776 }
777
778 int config_parse_label(
779 const char *unit,
780 const char *filename,
781 unsigned line,
782 const char *section,
783 unsigned section_line,
784 const char *lvalue,
785 int ltype,
786 const char *rvalue,
787 void *data,
788 void *userdata) {
789
790 _cleanup_(address_freep) Address *n = NULL;
791 Network *network = userdata;
792 int r;
793
794 assert(filename);
795 assert(section);
796 assert(lvalue);
797 assert(rvalue);
798 assert(data);
799
800 r = address_new_static(network, filename, section_line, &n);
801 if (r < 0)
802 return r;
803
804 if (!address_label_valid(rvalue)) {
805 log_syntax(unit, LOG_ERR, filename, line, 0, "Interface label is too long or invalid, ignoring assignment: %s", rvalue);
806 return 0;
807 }
808
809 r = free_and_strdup(&n->label, rvalue);
810 if (r < 0)
811 return log_oom();
812
813 n = NULL;
814
815 return 0;
816 }
817
818 int config_parse_lifetime(const char *unit,
819 const char *filename,
820 unsigned line,
821 const char *section,
822 unsigned section_line,
823 const char *lvalue,
824 int ltype,
825 const char *rvalue,
826 void *data,
827 void *userdata) {
828 Network *network = userdata;
829 _cleanup_(address_freep) Address *n = NULL;
830 unsigned k;
831 int r;
832
833 assert(filename);
834 assert(section);
835 assert(lvalue);
836 assert(rvalue);
837 assert(data);
838
839 r = address_new_static(network, filename, section_line, &n);
840 if (r < 0)
841 return r;
842
843 if (STR_IN_SET(rvalue, "forever", "infinity")) {
844 n->cinfo.ifa_prefered = CACHE_INFO_INFINITY_LIFE_TIME;
845 n = NULL;
846
847 return 0;
848 }
849
850 r = safe_atou(rvalue, &k);
851 if (r < 0) {
852 log_syntax(unit, LOG_ERR, filename, line, r, "Failed to parse PreferredLifetime, ignoring: %s", rvalue);
853 return 0;
854 }
855
856 if (k != 0)
857 log_syntax(unit, LOG_ERR, filename, line, 0, "Invalid PreferredLifetime value, ignoring: %d", k);
858 else {
859 n->cinfo.ifa_prefered = k;
860 n = NULL;
861 }
862
863 return 0;
864 }
865
866 int config_parse_address_flags(const char *unit,
867 const char *filename,
868 unsigned line,
869 const char *section,
870 unsigned section_line,
871 const char *lvalue,
872 int ltype,
873 const char *rvalue,
874 void *data,
875 void *userdata) {
876 Network *network = userdata;
877 _cleanup_(address_freep) Address *n = NULL;
878 int r;
879
880 assert(filename);
881 assert(section);
882 assert(lvalue);
883 assert(rvalue);
884 assert(data);
885
886 r = address_new_static(network, filename, section_line, &n);
887 if (r < 0)
888 return r;
889
890 r = parse_boolean(rvalue);
891 if (r < 0) {
892 log_syntax(unit, LOG_ERR, filename, line, r, "Failed to parse address flag, ignoring: %s", rvalue);
893 return 0;
894 }
895
896 if (streq(lvalue, "HomeAddress"))
897 n->home_address = r;
898 else if (streq(lvalue, "DuplicateAddressDetection"))
899 n->duplicate_address_detection = r;
900 else if (streq(lvalue, "ManageTemporaryAddress"))
901 n->manage_temporary_address = r;
902 else if (streq(lvalue, "PrefixRoute"))
903 n->prefix_route = r;
904 else if (streq(lvalue, "AutoJoin"))
905 n->autojoin = r;
906
907 return 0;
908 }
909
910 int config_parse_address_scope(const char *unit,
911 const char *filename,
912 unsigned line,
913 const char *section,
914 unsigned section_line,
915 const char *lvalue,
916 int ltype,
917 const char *rvalue,
918 void *data,
919 void *userdata) {
920 Network *network = userdata;
921 _cleanup_(address_freep) Address *n = NULL;
922 int r;
923
924 assert(filename);
925 assert(section);
926 assert(lvalue);
927 assert(rvalue);
928 assert(data);
929
930 r = address_new_static(network, filename, section_line, &n);
931 if (r < 0)
932 return r;
933
934 if (streq(rvalue, "host"))
935 n->scope = RT_SCOPE_HOST;
936 else if (streq(rvalue, "link"))
937 n->scope = RT_SCOPE_LINK;
938 else if (streq(rvalue, "global"))
939 n->scope = RT_SCOPE_UNIVERSE;
940 else {
941 r = safe_atou8(rvalue , &n->scope);
942 if (r < 0) {
943 log_syntax(unit, LOG_ERR, filename, line, r, "Could not parse address scope \"%s\", ignoring assignment: %m", rvalue);
944 return 0;
945 }
946 }
947
948 n = NULL;
949
950 return 0;
951 }
952
953 bool address_is_ready(const Address *a) {
954 assert(a);
955
956 if (a->family == AF_INET6)
957 return !(a->flags & IFA_F_TENTATIVE);
958 else
959 return !(a->flags & (IFA_F_TENTATIVE | IFA_F_DEPRECATED));
960 }