]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/network/networkd-address.c
network: drop all checks of ipv6_disabled sysctl
[thirdparty/systemd.git] / src / network / networkd-address.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2
3 #include <net/if.h>
4
5 #include "alloc-util.h"
6 #include "conf-parser.h"
7 #include "firewall-util.h"
8 #include "memory-util.h"
9 #include "missing_network.h"
10 #include "netlink-util.h"
11 #include "networkd-address.h"
12 #include "networkd-manager.h"
13 #include "parse-util.h"
14 #include "set.h"
15 #include "socket-util.h"
16 #include "string-util.h"
17 #include "strv.h"
18 #include "utf8.h"
19
20 #define ADDRESSES_PER_LINK_MAX 2048U
21 #define STATIC_ADDRESSES_PER_NETWORK_MAX 1024U
22
23 int address_new(Address **ret) {
24 _cleanup_(address_freep) Address *address = NULL;
25
26 address = new(Address, 1);
27 if (!address)
28 return -ENOMEM;
29
30 *address = (Address) {
31 .family = AF_UNSPEC,
32 .scope = RT_SCOPE_UNIVERSE,
33 .cinfo.ifa_prefered = CACHE_INFO_INFINITY_LIFE_TIME,
34 .cinfo.ifa_valid = CACHE_INFO_INFINITY_LIFE_TIME,
35 };
36
37 *ret = TAKE_PTR(address);
38
39 return 0;
40 }
41
42 static int address_new_static(Network *network, const char *filename, unsigned section_line, Address **ret) {
43 _cleanup_(network_config_section_freep) NetworkConfigSection *n = NULL;
44 _cleanup_(address_freep) Address *address = NULL;
45 int r;
46
47 assert(network);
48 assert(ret);
49 assert(!!filename == (section_line > 0));
50
51 if (filename) {
52 r = network_config_section_new(filename, section_line, &n);
53 if (r < 0)
54 return r;
55
56 address = hashmap_get(network->addresses_by_section, n);
57 if (address) {
58 *ret = TAKE_PTR(address);
59
60 return 0;
61 }
62 }
63
64 if (network->n_static_addresses >= STATIC_ADDRESSES_PER_NETWORK_MAX)
65 return -E2BIG;
66
67 r = address_new(&address);
68 if (r < 0)
69 return r;
70
71 address->network = network;
72 LIST_APPEND(addresses, network->static_addresses, address);
73 network->n_static_addresses++;
74
75 if (filename) {
76 address->section = TAKE_PTR(n);
77
78 r = hashmap_ensure_allocated(&network->addresses_by_section, &network_config_hash_ops);
79 if (r < 0)
80 return r;
81
82 r = hashmap_put(network->addresses_by_section, address->section, address);
83 if (r < 0)
84 return r;
85 }
86
87 *ret = TAKE_PTR(address);
88
89 return 0;
90 }
91
92 void address_free(Address *address) {
93 if (!address)
94 return;
95
96 if (address->network) {
97 LIST_REMOVE(addresses, address->network->static_addresses, address);
98 assert(address->network->n_static_addresses > 0);
99 address->network->n_static_addresses--;
100
101 if (address->section)
102 hashmap_remove(address->network->addresses_by_section, address->section);
103 }
104
105 if (address->link) {
106 set_remove(address->link->addresses, address);
107 set_remove(address->link->addresses_foreign, address);
108
109 if (in_addr_equal(AF_INET6, &address->in_addr, (const union in_addr_union *) &address->link->ipv6ll_address))
110 memzero(&address->link->ipv6ll_address, sizeof(struct in6_addr));
111 }
112
113 network_config_section_free(address->section);
114 free(address->label);
115 free(address);
116 }
117
118 static void address_hash_func(const Address *a, struct siphash *state) {
119 assert(a);
120
121 siphash24_compress(&a->family, sizeof(a->family), state);
122
123 switch (a->family) {
124 case AF_INET:
125 siphash24_compress(&a->prefixlen, sizeof(a->prefixlen), state);
126
127 /* peer prefix */
128 if (a->prefixlen != 0) {
129 uint32_t prefix;
130
131 if (a->in_addr_peer.in.s_addr != 0)
132 prefix = be32toh(a->in_addr_peer.in.s_addr) >> (32 - a->prefixlen);
133 else
134 prefix = be32toh(a->in_addr.in.s_addr) >> (32 - a->prefixlen);
135
136 siphash24_compress(&prefix, sizeof(prefix), state);
137 }
138
139 _fallthrough_;
140 case AF_INET6:
141 /* local address */
142 siphash24_compress(&a->in_addr, FAMILY_ADDRESS_SIZE(a->family), state);
143
144 break;
145 default:
146 /* treat any other address family as AF_UNSPEC */
147 break;
148 }
149 }
150
151 static int address_compare_func(const Address *a1, const Address *a2) {
152 int r;
153
154 r = CMP(a1->family, a2->family);
155 if (r != 0)
156 return r;
157
158 switch (a1->family) {
159 /* use the same notion of equality as the kernel does */
160 case AF_INET:
161 r = CMP(a1->prefixlen, a2->prefixlen);
162 if (r != 0)
163 return r;
164
165 /* compare the peer prefixes */
166 if (a1->prefixlen != 0) {
167 /* make sure we don't try to shift by 32.
168 * See ISO/IEC 9899:TC3 ยง 6.5.7.3. */
169 uint32_t b1, b2;
170
171 if (a1->in_addr_peer.in.s_addr != 0)
172 b1 = be32toh(a1->in_addr_peer.in.s_addr) >> (32 - a1->prefixlen);
173 else
174 b1 = be32toh(a1->in_addr.in.s_addr) >> (32 - a1->prefixlen);
175
176 if (a2->in_addr_peer.in.s_addr != 0)
177 b2 = be32toh(a2->in_addr_peer.in.s_addr) >> (32 - a1->prefixlen);
178 else
179 b2 = be32toh(a2->in_addr.in.s_addr) >> (32 - a1->prefixlen);
180
181 r = CMP(b1, b2);
182 if (r != 0)
183 return r;
184 }
185
186 _fallthrough_;
187 case AF_INET6:
188 return memcmp(&a1->in_addr, &a2->in_addr, FAMILY_ADDRESS_SIZE(a1->family));
189 default:
190 /* treat any other address family as AF_UNSPEC */
191 return 0;
192 }
193 }
194
195 DEFINE_PRIVATE_HASH_OPS(address_hash_ops, Address, address_hash_func, address_compare_func);
196
197 bool address_equal(Address *a1, Address *a2) {
198 if (a1 == a2)
199 return true;
200
201 if (!a1 || !a2)
202 return false;
203
204 return address_compare_func(a1, a2) == 0;
205 }
206
207 static int address_establish(Address *address, Link *link) {
208 bool masq;
209 int r;
210
211 assert(address);
212 assert(link);
213
214 masq = link->network &&
215 link->network->ip_masquerade &&
216 address->family == AF_INET &&
217 address->scope < RT_SCOPE_LINK;
218
219 /* Add firewall entry if this is requested */
220 if (address->ip_masquerade_done != masq) {
221 union in_addr_union masked = address->in_addr;
222 in_addr_mask(address->family, &masked, address->prefixlen);
223
224 r = fw_add_masquerade(masq, AF_INET, 0, &masked, address->prefixlen, NULL, NULL, 0);
225 if (r < 0)
226 return r;
227
228 address->ip_masquerade_done = masq;
229 }
230
231 return 0;
232 }
233
234 static int address_add_internal(Link *link, Set **addresses,
235 int family,
236 const union in_addr_union *in_addr,
237 unsigned char prefixlen,
238 Address **ret) {
239 _cleanup_(address_freep) Address *address = NULL;
240 int r;
241
242 assert(link);
243 assert(addresses);
244 assert(in_addr);
245
246 r = address_new(&address);
247 if (r < 0)
248 return r;
249
250 address->family = family;
251 address->in_addr = *in_addr;
252 address->prefixlen = prefixlen;
253 /* Consider address tentative until we get the real flags from the kernel */
254 address->flags = IFA_F_TENTATIVE;
255
256 r = set_ensure_allocated(addresses, &address_hash_ops);
257 if (r < 0)
258 return r;
259
260 r = set_put(*addresses, address);
261 if (r < 0)
262 return r;
263 if (r == 0)
264 return -EEXIST;
265
266 address->link = link;
267
268 if (ret)
269 *ret = address;
270
271 address = NULL;
272
273 return 0;
274 }
275
276 int address_add_foreign(Link *link, int family, const union in_addr_union *in_addr, unsigned char prefixlen, Address **ret) {
277 return address_add_internal(link, &link->addresses_foreign, family, in_addr, prefixlen, ret);
278 }
279
280 int address_add(Link *link, int family, const union in_addr_union *in_addr, unsigned char prefixlen, Address **ret) {
281 Address *address;
282 int r;
283
284 r = address_get(link, family, in_addr, prefixlen, &address);
285 if (r == -ENOENT) {
286 /* Address does not exist, create a new one */
287 r = address_add_internal(link, &link->addresses, family, in_addr, prefixlen, &address);
288 if (r < 0)
289 return r;
290 } else if (r == 0) {
291 /* Take over a foreign address */
292 r = set_ensure_allocated(&link->addresses, &address_hash_ops);
293 if (r < 0)
294 return r;
295
296 r = set_put(link->addresses, address);
297 if (r < 0)
298 return r;
299
300 set_remove(link->addresses_foreign, address);
301 } else if (r == 1) {
302 /* Already exists, do nothing */
303 ;
304 } else
305 return r;
306
307 if (ret)
308 *ret = address;
309
310 return 0;
311 }
312
313 static int address_release(Address *address) {
314 int r;
315
316 assert(address);
317 assert(address->link);
318
319 /* Remove masquerading firewall entry if it was added */
320 if (address->ip_masquerade_done) {
321 union in_addr_union masked = address->in_addr;
322 in_addr_mask(address->family, &masked, address->prefixlen);
323
324 r = fw_add_masquerade(false, AF_INET, 0, &masked, address->prefixlen, NULL, NULL, 0);
325 if (r < 0)
326 return r;
327
328 address->ip_masquerade_done = false;
329 }
330
331 return 0;
332 }
333
334 int address_update(
335 Address *address,
336 unsigned char flags,
337 unsigned char scope,
338 const struct ifa_cacheinfo *cinfo) {
339
340 bool ready;
341 int r;
342
343 assert(address);
344 assert(cinfo);
345 assert_return(address->link, 1);
346
347 if (IN_SET(address->link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
348 return 1;
349
350 ready = address_is_ready(address);
351
352 address->flags = flags;
353 address->scope = scope;
354 address->cinfo = *cinfo;
355
356 link_update_operstate(address->link, true);
357 link_check_ready(address->link);
358
359 if (!ready &&
360 address_is_ready(address) &&
361 address->family == AF_INET6 &&
362 in_addr_is_link_local(AF_INET6, &address->in_addr) > 0 &&
363 in_addr_is_null(AF_INET6, (const union in_addr_union*) &address->link->ipv6ll_address) > 0) {
364
365 r = link_ipv6ll_gained(address->link, &address->in_addr.in6);
366 if (r < 0)
367 return r;
368 }
369
370 return 0;
371 }
372
373 int address_drop(Address *address) {
374 Link *link;
375 bool ready;
376 int r;
377
378 assert(address);
379
380 ready = address_is_ready(address);
381 link = address->link;
382
383 r = address_release(address);
384 if (r < 0)
385 log_link_warning_errno(link, r, "Failed to disable IP masquerading, ignoring: %m");
386
387 address_free(address);
388
389 link_update_operstate(link, true);
390
391 if (link && !ready)
392 link_check_ready(link);
393
394 return 0;
395 }
396
397 int address_get(Link *link,
398 int family,
399 const union in_addr_union *in_addr,
400 unsigned char prefixlen,
401 Address **ret) {
402
403 Address address, *existing;
404
405 assert(link);
406 assert(in_addr);
407
408 address = (Address) {
409 .family = family,
410 .in_addr = *in_addr,
411 .prefixlen = prefixlen,
412 };
413
414 existing = set_get(link->addresses, &address);
415 if (existing) {
416 if (ret)
417 *ret = existing;
418 return 1;
419 }
420
421 existing = set_get(link->addresses_foreign, &address);
422 if (existing) {
423 if (ret)
424 *ret = existing;
425 return 0;
426 }
427
428 return -ENOENT;
429 }
430
431 static int address_remove_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
432 int r;
433
434 assert(m);
435 assert(link);
436 assert(link->ifname);
437
438 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
439 return 1;
440
441 r = sd_netlink_message_get_errno(m);
442 if (r < 0 && r != -EADDRNOTAVAIL)
443 log_link_warning_errno(link, r, "Could not drop address: %m");
444
445 return 1;
446 }
447
448 int address_remove(
449 Address *address,
450 Link *link,
451 link_netlink_message_handler_t callback) {
452
453 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
454 int r;
455
456 assert(address);
457 assert(IN_SET(address->family, AF_INET, AF_INET6));
458 assert(link);
459 assert(link->ifindex > 0);
460 assert(link->manager);
461 assert(link->manager->rtnl);
462
463 if (DEBUG_LOGGING) {
464 _cleanup_free_ char *b = NULL;
465
466 (void) in_addr_to_string(address->family, &address->in_addr, &b);
467 log_link_debug(link, "Removing address %s", strna(b));
468 }
469
470 r = sd_rtnl_message_new_addr(link->manager->rtnl, &req, RTM_DELADDR,
471 link->ifindex, address->family);
472 if (r < 0)
473 return log_link_error_errno(link, r, "Could not allocate RTM_DELADDR message: %m");
474
475 r = sd_rtnl_message_addr_set_prefixlen(req, address->prefixlen);
476 if (r < 0)
477 return log_link_error_errno(link, r, "Could not set prefixlen: %m");
478
479 r = netlink_message_append_in_addr_union(req, IFA_LOCAL, address->family, &address->in_addr);
480 if (r < 0)
481 return log_link_error_errno(link, r, "Could not append IFA_LOCAL attribute: %m");
482
483 r = netlink_call_async(link->manager->rtnl, NULL, req,
484 callback ?: address_remove_handler,
485 link_netlink_destroy_callback, link);
486 if (r < 0)
487 return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
488
489 link_ref(link);
490
491 return 0;
492 }
493
494 static int address_acquire(Link *link, Address *original, Address **ret) {
495 union in_addr_union in_addr = IN_ADDR_NULL;
496 struct in_addr broadcast = {};
497 _cleanup_(address_freep) Address *na = NULL;
498 int r;
499
500 assert(link);
501 assert(original);
502 assert(ret);
503
504 /* Something useful was configured? just use it */
505 r = in_addr_is_null(original->family, &original->in_addr);
506 if (r <= 0)
507 return r;
508
509 /* The address is configured to be 0.0.0.0 or [::] by the user?
510 * Then let's acquire something more useful from the pool. */
511 r = manager_address_pool_acquire(link->manager, original->family, original->prefixlen, &in_addr);
512 if (r < 0)
513 return r;
514 if (r == 0)
515 return -EBUSY;
516
517 if (original->family == AF_INET) {
518 /* Pick first address in range for ourselves ... */
519 in_addr.in.s_addr = in_addr.in.s_addr | htobe32(1);
520
521 /* .. and use last as broadcast address */
522 if (original->prefixlen > 30)
523 broadcast.s_addr = 0;
524 else
525 broadcast.s_addr = in_addr.in.s_addr | htobe32(0xFFFFFFFFUL >> original->prefixlen);
526 } else if (original->family == AF_INET6)
527 in_addr.in6.s6_addr[15] |= 1;
528
529 r = address_new(&na);
530 if (r < 0)
531 return r;
532
533 na->family = original->family;
534 na->prefixlen = original->prefixlen;
535 na->scope = original->scope;
536 na->cinfo = original->cinfo;
537
538 if (original->label) {
539 na->label = strdup(original->label);
540 if (!na->label)
541 return -ENOMEM;
542 }
543
544 na->broadcast = broadcast;
545 na->in_addr = in_addr;
546
547 LIST_PREPEND(addresses, link->pool_addresses, na);
548
549 *ret = TAKE_PTR(na);
550
551 return 0;
552 }
553
554 int address_configure(
555 Address *address,
556 Link *link,
557 link_netlink_message_handler_t callback,
558 bool update) {
559
560 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
561 int r;
562
563 assert(address);
564 assert(IN_SET(address->family, AF_INET, AF_INET6));
565 assert(link);
566 assert(link->ifindex > 0);
567 assert(link->manager);
568 assert(link->manager->rtnl);
569 assert(callback);
570
571 /* If this is a new address, then refuse adding more than the limit */
572 if (address_get(link, address->family, &address->in_addr, address->prefixlen, NULL) <= 0 &&
573 set_size(link->addresses) >= ADDRESSES_PER_LINK_MAX)
574 return log_link_error_errno(link, SYNTHETIC_ERRNO(E2BIG),
575 "Too many addresses are configured, refusing: %m");
576
577 r = address_acquire(link, address, &address);
578 if (r < 0)
579 return log_link_error_errno(link, r, "Failed to acquire an address from pool: %m");
580
581 if (update)
582 r = sd_rtnl_message_new_addr_update(link->manager->rtnl, &req,
583 link->ifindex, address->family);
584 else
585 r = sd_rtnl_message_new_addr(link->manager->rtnl, &req, RTM_NEWADDR,
586 link->ifindex, address->family);
587 if (r < 0)
588 return log_link_error_errno(link, r, "Could not allocate RTM_NEWADDR message: %m");
589
590 r = sd_rtnl_message_addr_set_prefixlen(req, address->prefixlen);
591 if (r < 0)
592 return log_link_error_errno(link, r, "Could not set prefixlen: %m");
593
594 address->flags |= IFA_F_PERMANENT;
595
596 if (address->home_address)
597 address->flags |= IFA_F_HOMEADDRESS;
598
599 if (address->duplicate_address_detection)
600 address->flags |= IFA_F_NODAD;
601
602 if (address->manage_temporary_address)
603 address->flags |= IFA_F_MANAGETEMPADDR;
604
605 if (address->prefix_route)
606 address->flags |= IFA_F_NOPREFIXROUTE;
607
608 if (address->autojoin)
609 address->flags |= IFA_F_MCAUTOJOIN;
610
611 r = sd_rtnl_message_addr_set_flags(req, (address->flags & 0xff));
612 if (r < 0)
613 return log_link_error_errno(link, r, "Could not set flags: %m");
614
615 if (address->flags & ~0xff) {
616 r = sd_netlink_message_append_u32(req, IFA_FLAGS, address->flags);
617 if (r < 0)
618 return log_link_error_errno(link, r, "Could not set extended flags: %m");
619 }
620
621 r = sd_rtnl_message_addr_set_scope(req, address->scope);
622 if (r < 0)
623 return log_link_error_errno(link, r, "Could not set scope: %m");
624
625 r = netlink_message_append_in_addr_union(req, IFA_LOCAL, address->family, &address->in_addr);
626 if (r < 0)
627 return log_link_error_errno(link, r, "Could not append IFA_LOCAL attribute: %m");
628
629 if (in_addr_is_null(address->family, &address->in_addr_peer) == 0) {
630 r = netlink_message_append_in_addr_union(req, IFA_ADDRESS, address->family, &address->in_addr_peer);
631 if (r < 0)
632 return log_link_error_errno(link, r, "Could not append IFA_ADDRESS attribute: %m");
633 } else if (address->family == AF_INET && address->prefixlen <= 30) {
634 r = sd_netlink_message_append_in_addr(req, IFA_BROADCAST, &address->broadcast);
635 if (r < 0)
636 return log_link_error_errno(link, r, "Could not append IFA_BROADCAST attribute: %m");
637 }
638
639 if (address->label) {
640 r = sd_netlink_message_append_string(req, IFA_LABEL, address->label);
641 if (r < 0)
642 return log_link_error_errno(link, r, "Could not append IFA_LABEL attribute: %m");
643 }
644
645 r = sd_netlink_message_append_cache_info(req, IFA_CACHEINFO, &address->cinfo);
646 if (r < 0)
647 return log_link_error_errno(link, r, "Could not append IFA_CACHEINFO attribute: %m");
648
649 r = address_establish(address, link);
650 if (r < 0)
651 log_link_warning_errno(link, r, "Could not enable IP masquerading, ignoring: %m");
652
653 r = netlink_call_async(link->manager->rtnl, NULL, req, callback, link_netlink_destroy_callback, link);
654 if (r < 0) {
655 address_release(address);
656 return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
657 }
658
659 link_ref(link);
660
661 if (address->family == AF_INET6 && !in_addr_is_null(address->family, &address->in_addr_peer))
662 r = address_add(link, address->family, &address->in_addr_peer, address->prefixlen, NULL);
663 else
664 r = address_add(link, address->family, &address->in_addr, address->prefixlen, NULL);
665 if (r < 0) {
666 address_release(address);
667 return log_link_error_errno(link, r, "Could not add address: %m");
668 }
669
670 return 1;
671 }
672
673 int config_parse_broadcast(
674 const char *unit,
675 const char *filename,
676 unsigned line,
677 const char *section,
678 unsigned section_line,
679 const char *lvalue,
680 int ltype,
681 const char *rvalue,
682 void *data,
683 void *userdata) {
684
685 Network *network = userdata;
686 _cleanup_(address_free_or_set_invalidp) Address *n = NULL;
687 int r;
688
689 assert(filename);
690 assert(section);
691 assert(lvalue);
692 assert(rvalue);
693 assert(data);
694
695 r = address_new_static(network, filename, section_line, &n);
696 if (r < 0)
697 return r;
698
699 if (n->family == AF_INET6) {
700 log_syntax(unit, LOG_ERR, filename, line, 0,
701 "Broadcast is not valid for IPv6 addresses, ignoring assignment: %s", rvalue);
702 return 0;
703 }
704
705 r = in_addr_from_string(AF_INET, rvalue, (union in_addr_union*) &n->broadcast);
706 if (r < 0) {
707 log_syntax(unit, LOG_ERR, filename, line, r,
708 "Broadcast is invalid, ignoring assignment: %s", rvalue);
709 return 0;
710 }
711
712 n->family = AF_INET;
713 n = NULL;
714
715 return 0;
716 }
717
718 int config_parse_address(const char *unit,
719 const char *filename,
720 unsigned line,
721 const char *section,
722 unsigned section_line,
723 const char *lvalue,
724 int ltype,
725 const char *rvalue,
726 void *data,
727 void *userdata) {
728
729 Network *network = userdata;
730 _cleanup_(address_free_or_set_invalidp) Address *n = NULL;
731 union in_addr_union buffer;
732 unsigned char prefixlen;
733 int r, f;
734
735 assert(filename);
736 assert(section);
737 assert(lvalue);
738 assert(rvalue);
739 assert(data);
740
741 if (streq(section, "Network")) {
742 /* we are not in an Address section, so treat
743 * this as the special '0' section */
744 r = address_new_static(network, NULL, 0, &n);
745 } else
746 r = address_new_static(network, filename, section_line, &n);
747
748 if (r < 0)
749 return r;
750
751 /* Address=address/prefixlen */
752 r = in_addr_prefix_from_string_auto_internal(rvalue, PREFIXLEN_REFUSE, &f, &buffer, &prefixlen);
753 if (r == -ENOANO) {
754 log_syntax(unit, LOG_ERR, filename, line, r,
755 "An address '%s' is specified without prefix length. "
756 "The behavior of parsing addresses without prefix length will be changed in the future release. "
757 "Please specify prefix length explicitly.", rvalue);
758
759 r = in_addr_prefix_from_string_auto_internal(rvalue, PREFIXLEN_LEGACY, &f, &buffer, &prefixlen);
760 }
761 if (r < 0) {
762 log_syntax(unit, LOG_ERR, filename, line, r, "Invalid address '%s', ignoring assignment: %m", rvalue);
763 return 0;
764 }
765
766 if (n->family != AF_UNSPEC && f != n->family) {
767 log_syntax(unit, LOG_ERR, filename, line, 0, "Address is incompatible, ignoring assignment: %s", rvalue);
768 return 0;
769 }
770
771 if (in_addr_is_null(f, &buffer)) {
772 /* Will use address from address pool. Note that for ipv6 case, prefix of the address
773 * pool is 8, but 40 bit is used by the global ID and 16 bit by the subnet ID. So,
774 * let's limit the prefix length to 64 or larger. See RFC4193. */
775 if ((f == AF_INET && prefixlen < 8) ||
776 (f == AF_INET6 && prefixlen < 64)) {
777 log_syntax(unit, LOG_ERR, filename, line, 0,
778 "Null address with invalid prefixlen='%u', ignoring assignment: %s",
779 prefixlen, rvalue);
780 return 0;
781 }
782 }
783
784 n->family = f;
785 n->prefixlen = prefixlen;
786
787 if (streq(lvalue, "Address"))
788 n->in_addr = buffer;
789 else
790 n->in_addr_peer = buffer;
791
792 if (n->family == AF_INET && n->broadcast.s_addr == 0 && n->prefixlen <= 30)
793 n->broadcast.s_addr = n->in_addr.in.s_addr | htobe32(0xfffffffflu >> n->prefixlen);
794
795 n = NULL;
796
797 return 0;
798 }
799
800 int config_parse_label(
801 const char *unit,
802 const char *filename,
803 unsigned line,
804 const char *section,
805 unsigned section_line,
806 const char *lvalue,
807 int ltype,
808 const char *rvalue,
809 void *data,
810 void *userdata) {
811
812 _cleanup_(address_free_or_set_invalidp) Address *n = NULL;
813 Network *network = userdata;
814 int r;
815
816 assert(filename);
817 assert(section);
818 assert(lvalue);
819 assert(rvalue);
820 assert(data);
821
822 r = address_new_static(network, filename, section_line, &n);
823 if (r < 0)
824 return r;
825
826 if (!address_label_valid(rvalue)) {
827 log_syntax(unit, LOG_ERR, filename, line, 0,
828 "Interface label is too long or invalid, ignoring assignment: %s", rvalue);
829 return 0;
830 }
831
832 r = free_and_strdup(&n->label, rvalue);
833 if (r < 0)
834 return log_oom();
835
836 n = NULL;
837 return 0;
838 }
839
840 int config_parse_lifetime(const char *unit,
841 const char *filename,
842 unsigned line,
843 const char *section,
844 unsigned section_line,
845 const char *lvalue,
846 int ltype,
847 const char *rvalue,
848 void *data,
849 void *userdata) {
850 Network *network = userdata;
851 _cleanup_(address_free_or_set_invalidp) Address *n = NULL;
852 unsigned k;
853 int r;
854
855 assert(filename);
856 assert(section);
857 assert(lvalue);
858 assert(rvalue);
859 assert(data);
860
861 r = address_new_static(network, filename, section_line, &n);
862 if (r < 0)
863 return r;
864
865 /* We accept only "forever", "infinity", or "0". */
866 if (STR_IN_SET(rvalue, "forever", "infinity"))
867 k = CACHE_INFO_INFINITY_LIFE_TIME;
868 else if (streq(rvalue, "0"))
869 k = 0;
870 else {
871 log_syntax(unit, LOG_ERR, filename, line, 0,
872 "Invalid PreferredLifetime= value, ignoring: %s", rvalue);
873 return 0;
874 }
875
876 n->cinfo.ifa_prefered = k;
877 n = NULL;
878
879 return 0;
880 }
881
882 int config_parse_address_flags(const char *unit,
883 const char *filename,
884 unsigned line,
885 const char *section,
886 unsigned section_line,
887 const char *lvalue,
888 int ltype,
889 const char *rvalue,
890 void *data,
891 void *userdata) {
892 Network *network = userdata;
893 _cleanup_(address_free_or_set_invalidp) Address *n = NULL;
894 int r;
895
896 assert(filename);
897 assert(section);
898 assert(lvalue);
899 assert(rvalue);
900 assert(data);
901
902 r = address_new_static(network, filename, section_line, &n);
903 if (r < 0)
904 return r;
905
906 r = parse_boolean(rvalue);
907 if (r < 0) {
908 log_syntax(unit, LOG_ERR, filename, line, r,
909 "Failed to parse address flag, ignoring: %s", rvalue);
910 return 0;
911 }
912
913 if (streq(lvalue, "HomeAddress"))
914 n->home_address = r;
915 else if (streq(lvalue, "DuplicateAddressDetection"))
916 n->duplicate_address_detection = r;
917 else if (streq(lvalue, "ManageTemporaryAddress"))
918 n->manage_temporary_address = r;
919 else if (streq(lvalue, "PrefixRoute"))
920 n->prefix_route = r;
921 else if (streq(lvalue, "AutoJoin"))
922 n->autojoin = r;
923 else
924 assert_not_reached("Invalid address flag type.");
925
926 n = NULL;
927 return 0;
928 }
929
930 int config_parse_address_scope(const char *unit,
931 const char *filename,
932 unsigned line,
933 const char *section,
934 unsigned section_line,
935 const char *lvalue,
936 int ltype,
937 const char *rvalue,
938 void *data,
939 void *userdata) {
940 Network *network = userdata;
941 _cleanup_(address_free_or_set_invalidp) Address *n = NULL;
942 int r;
943
944 assert(filename);
945 assert(section);
946 assert(lvalue);
947 assert(rvalue);
948 assert(data);
949
950 r = address_new_static(network, filename, section_line, &n);
951 if (r < 0)
952 return r;
953
954 if (streq(rvalue, "host"))
955 n->scope = RT_SCOPE_HOST;
956 else if (streq(rvalue, "link"))
957 n->scope = RT_SCOPE_LINK;
958 else if (streq(rvalue, "global"))
959 n->scope = RT_SCOPE_UNIVERSE;
960 else {
961 r = safe_atou8(rvalue , &n->scope);
962 if (r < 0) {
963 log_syntax(unit, LOG_ERR, filename, line, r,
964 "Could not parse address scope \"%s\", ignoring assignment: %m", rvalue);
965 return 0;
966 }
967 }
968
969 n = NULL;
970 return 0;
971 }
972
973 bool address_is_ready(const Address *a) {
974 assert(a);
975
976 return !(a->flags & IFA_F_TENTATIVE);
977 }
978
979 int address_section_verify(Address *address) {
980 if (section_is_invalid(address->section))
981 return -EINVAL;
982
983 if (address->family == AF_UNSPEC) {
984 assert(address->section);
985
986 return log_warning_errno(SYNTHETIC_ERRNO(EINVAL),
987 "%s: Address section without Address= field configured. "
988 "Ignoring [Address] section from line %u.",
989 address->section->filename, address->section->line);
990 }
991
992 return 0;
993 }