]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/network/networkd-address.c
Merge pull request #11357 from GiacintoCifelli/dbus_labels
[thirdparty/systemd.git] / src / network / networkd-address.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2
3 #include <net/if.h>
4
5 #include "alloc-util.h"
6 #include "conf-parser.h"
7 #include "firewall-util.h"
8 #include "missing_network.h"
9 #include "netlink-util.h"
10 #include "networkd-address.h"
11 #include "networkd-manager.h"
12 #include "parse-util.h"
13 #include "set.h"
14 #include "socket-util.h"
15 #include "string-util.h"
16 #include "strv.h"
17 #include "utf8.h"
18 #include "util.h"
19
20 #define ADDRESSES_PER_LINK_MAX 2048U
21 #define STATIC_ADDRESSES_PER_NETWORK_MAX 1024U
22
23 int address_new(Address **ret) {
24 _cleanup_(address_freep) Address *address = NULL;
25
26 address = new(Address, 1);
27 if (!address)
28 return -ENOMEM;
29
30 *address = (Address) {
31 .family = AF_UNSPEC,
32 .scope = RT_SCOPE_UNIVERSE,
33 .cinfo.ifa_prefered = CACHE_INFO_INFINITY_LIFE_TIME,
34 .cinfo.ifa_valid = CACHE_INFO_INFINITY_LIFE_TIME,
35 };
36
37 *ret = TAKE_PTR(address);
38
39 return 0;
40 }
41
42 int address_new_static(Network *network, const char *filename, unsigned section_line, Address **ret) {
43 _cleanup_(network_config_section_freep) NetworkConfigSection *n = NULL;
44 _cleanup_(address_freep) Address *address = NULL;
45 int r;
46
47 assert(network);
48 assert(ret);
49 assert(!!filename == (section_line > 0));
50
51 if (filename) {
52 r = network_config_section_new(filename, section_line, &n);
53 if (r < 0)
54 return r;
55
56 address = hashmap_get(network->addresses_by_section, n);
57 if (address) {
58 *ret = TAKE_PTR(address);
59
60 return 0;
61 }
62 }
63
64 if (network->n_static_addresses >= STATIC_ADDRESSES_PER_NETWORK_MAX)
65 return -E2BIG;
66
67 r = address_new(&address);
68 if (r < 0)
69 return r;
70
71 address->network = network;
72 LIST_APPEND(addresses, network->static_addresses, address);
73 network->n_static_addresses++;
74
75 if (filename) {
76 address->section = TAKE_PTR(n);
77
78 r = hashmap_ensure_allocated(&network->addresses_by_section, &network_config_hash_ops);
79 if (r < 0)
80 return r;
81
82 r = hashmap_put(network->addresses_by_section, address->section, address);
83 if (r < 0)
84 return r;
85 }
86
87 *ret = TAKE_PTR(address);
88
89 return 0;
90 }
91
92 void address_free(Address *address) {
93 if (!address)
94 return;
95
96 if (address->network) {
97 LIST_REMOVE(addresses, address->network->static_addresses, address);
98 assert(address->network->n_static_addresses > 0);
99 address->network->n_static_addresses--;
100
101 if (address->section)
102 hashmap_remove(address->network->addresses_by_section, address->section);
103 }
104
105 if (address->link) {
106 set_remove(address->link->addresses, address);
107 set_remove(address->link->addresses_foreign, address);
108
109 if (in_addr_equal(AF_INET6, &address->in_addr, (const union in_addr_union *) &address->link->ipv6ll_address))
110 memzero(&address->link->ipv6ll_address, sizeof(struct in6_addr));
111 }
112
113 network_config_section_free(address->section);
114 free(address->label);
115 free(address);
116 }
117
118 static void address_hash_func(const Address *a, struct siphash *state) {
119 assert(a);
120
121 siphash24_compress(&a->family, sizeof(a->family), state);
122
123 switch (a->family) {
124 case AF_INET:
125 siphash24_compress(&a->prefixlen, sizeof(a->prefixlen), state);
126
127 /* peer prefix */
128 if (a->prefixlen != 0) {
129 uint32_t prefix;
130
131 if (a->in_addr_peer.in.s_addr != 0)
132 prefix = be32toh(a->in_addr_peer.in.s_addr) >> (32 - a->prefixlen);
133 else
134 prefix = be32toh(a->in_addr.in.s_addr) >> (32 - a->prefixlen);
135
136 siphash24_compress(&prefix, sizeof(prefix), state);
137 }
138
139 _fallthrough_;
140 case AF_INET6:
141 /* local address */
142 siphash24_compress(&a->in_addr, FAMILY_ADDRESS_SIZE(a->family), state);
143
144 break;
145 default:
146 /* treat any other address family as AF_UNSPEC */
147 break;
148 }
149 }
150
151 static int address_compare_func(const Address *a1, const Address *a2) {
152 int r;
153
154 r = CMP(a1->family, a2->family);
155 if (r != 0)
156 return r;
157
158 switch (a1->family) {
159 /* use the same notion of equality as the kernel does */
160 case AF_INET:
161 r = CMP(a1->prefixlen, a2->prefixlen);
162 if (r != 0)
163 return r;
164
165 /* compare the peer prefixes */
166 if (a1->prefixlen != 0) {
167 /* make sure we don't try to shift by 32.
168 * See ISO/IEC 9899:TC3 ยง 6.5.7.3. */
169 uint32_t b1, b2;
170
171 if (a1->in_addr_peer.in.s_addr != 0)
172 b1 = be32toh(a1->in_addr_peer.in.s_addr) >> (32 - a1->prefixlen);
173 else
174 b1 = be32toh(a1->in_addr.in.s_addr) >> (32 - a1->prefixlen);
175
176 if (a2->in_addr_peer.in.s_addr != 0)
177 b2 = be32toh(a2->in_addr_peer.in.s_addr) >> (32 - a1->prefixlen);
178 else
179 b2 = be32toh(a2->in_addr.in.s_addr) >> (32 - a1->prefixlen);
180
181 r = CMP(b1, b2);
182 if (r != 0)
183 return r;
184 }
185
186 _fallthrough_;
187 case AF_INET6:
188 return memcmp(&a1->in_addr, &a2->in_addr, FAMILY_ADDRESS_SIZE(a1->family));
189 default:
190 /* treat any other address family as AF_UNSPEC */
191 return 0;
192 }
193 }
194
195 DEFINE_PRIVATE_HASH_OPS(address_hash_ops, Address, address_hash_func, address_compare_func);
196
197 bool address_equal(Address *a1, Address *a2) {
198 if (a1 == a2)
199 return true;
200
201 if (!a1 || !a2)
202 return false;
203
204 return address_compare_func(a1, a2) == 0;
205 }
206
207 static int address_establish(Address *address, Link *link) {
208 bool masq;
209 int r;
210
211 assert(address);
212 assert(link);
213
214 masq = link->network &&
215 link->network->ip_masquerade &&
216 address->family == AF_INET &&
217 address->scope < RT_SCOPE_LINK;
218
219 /* Add firewall entry if this is requested */
220 if (address->ip_masquerade_done != masq) {
221 union in_addr_union masked = address->in_addr;
222 in_addr_mask(address->family, &masked, address->prefixlen);
223
224 r = fw_add_masquerade(masq, AF_INET, 0, &masked, address->prefixlen, NULL, NULL, 0);
225 if (r < 0)
226 log_link_warning_errno(link, r, "Could not enable IP masquerading: %m");
227
228 address->ip_masquerade_done = masq;
229 }
230
231 return 0;
232 }
233
234 static int address_add_internal(Link *link, Set **addresses,
235 int family,
236 const union in_addr_union *in_addr,
237 unsigned char prefixlen,
238 Address **ret) {
239 _cleanup_(address_freep) Address *address = NULL;
240 int r;
241
242 assert(link);
243 assert(addresses);
244 assert(in_addr);
245
246 r = address_new(&address);
247 if (r < 0)
248 return r;
249
250 address->family = family;
251 address->in_addr = *in_addr;
252 address->prefixlen = prefixlen;
253 /* Consider address tentative until we get the real flags from the kernel */
254 address->flags = IFA_F_TENTATIVE;
255
256 r = set_ensure_allocated(addresses, &address_hash_ops);
257 if (r < 0)
258 return r;
259
260 r = set_put(*addresses, address);
261 if (r < 0)
262 return r;
263
264 address->link = link;
265
266 if (ret)
267 *ret = address;
268
269 address = NULL;
270
271 return 0;
272 }
273
274 int address_add_foreign(Link *link, int family, const union in_addr_union *in_addr, unsigned char prefixlen, Address **ret) {
275 return address_add_internal(link, &link->addresses_foreign, family, in_addr, prefixlen, ret);
276 }
277
278 int address_add(Link *link, int family, const union in_addr_union *in_addr, unsigned char prefixlen, Address **ret) {
279 Address *address;
280 int r;
281
282 r = address_get(link, family, in_addr, prefixlen, &address);
283 if (r == -ENOENT) {
284 /* Address does not exist, create a new one */
285 r = address_add_internal(link, &link->addresses, family, in_addr, prefixlen, &address);
286 if (r < 0)
287 return r;
288 } else if (r == 0) {
289 /* Take over a foreign address */
290 r = set_ensure_allocated(&link->addresses, &address_hash_ops);
291 if (r < 0)
292 return r;
293
294 r = set_put(link->addresses, address);
295 if (r < 0)
296 return r;
297
298 set_remove(link->addresses_foreign, address);
299 } else if (r == 1) {
300 /* Already exists, do nothing */
301 ;
302 } else
303 return r;
304
305 if (ret)
306 *ret = address;
307
308 return 0;
309 }
310
311 static int address_release(Address *address) {
312 int r;
313
314 assert(address);
315 assert(address->link);
316
317 /* Remove masquerading firewall entry if it was added */
318 if (address->ip_masquerade_done) {
319 union in_addr_union masked = address->in_addr;
320 in_addr_mask(address->family, &masked, address->prefixlen);
321
322 r = fw_add_masquerade(false, AF_INET, 0, &masked, address->prefixlen, NULL, NULL, 0);
323 if (r < 0)
324 log_link_warning_errno(address->link, r, "Failed to disable IP masquerading: %m");
325
326 address->ip_masquerade_done = false;
327 }
328
329 return 0;
330 }
331
332 int address_update(
333 Address *address,
334 unsigned char flags,
335 unsigned char scope,
336 const struct ifa_cacheinfo *cinfo) {
337
338 bool ready;
339 int r;
340
341 assert(address);
342 assert(cinfo);
343 assert_return(address->link, 1);
344
345 if (IN_SET(address->link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
346 return 1;
347
348 ready = address_is_ready(address);
349
350 address->flags = flags;
351 address->scope = scope;
352 address->cinfo = *cinfo;
353
354 link_update_operstate(address->link, true);
355 link_check_ready(address->link);
356
357 if (!ready &&
358 address_is_ready(address) &&
359 address->family == AF_INET6 &&
360 in_addr_is_link_local(AF_INET6, &address->in_addr) > 0 &&
361 in_addr_is_null(AF_INET6, (const union in_addr_union*) &address->link->ipv6ll_address) > 0) {
362
363 r = link_ipv6ll_gained(address->link, &address->in_addr.in6);
364 if (r < 0)
365 return r;
366 }
367
368 return 0;
369 }
370
371 int address_drop(Address *address) {
372 Link *link;
373 bool ready;
374
375 assert(address);
376
377 ready = address_is_ready(address);
378 link = address->link;
379
380 address_release(address);
381 address_free(address);
382
383 link_update_operstate(link, true);
384
385 if (link && !ready)
386 link_check_ready(link);
387
388 return 0;
389 }
390
391 int address_get(Link *link,
392 int family,
393 const union in_addr_union *in_addr,
394 unsigned char prefixlen,
395 Address **ret) {
396
397 Address address, *existing;
398
399 assert(link);
400 assert(in_addr);
401
402 address = (Address) {
403 .family = family,
404 .in_addr = *in_addr,
405 .prefixlen = prefixlen,
406 };
407
408 existing = set_get(link->addresses, &address);
409 if (existing) {
410 if (ret)
411 *ret = existing;
412 return 1;
413 }
414
415 existing = set_get(link->addresses_foreign, &address);
416 if (existing) {
417 if (ret)
418 *ret = existing;
419 return 0;
420 }
421
422 return -ENOENT;
423 }
424
425 static int address_remove_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
426 int r;
427
428 assert(m);
429 assert(link);
430 assert(link->ifname);
431
432 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
433 return 1;
434
435 r = sd_netlink_message_get_errno(m);
436 if (r < 0 && r != -EADDRNOTAVAIL)
437 log_link_warning_errno(link, r, "Could not drop address: %m");
438
439 return 1;
440 }
441
442 int address_remove(
443 Address *address,
444 Link *link,
445 link_netlink_message_handler_t callback) {
446
447 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
448 _cleanup_free_ char *b = NULL;
449 int r;
450
451 assert(address);
452 assert(IN_SET(address->family, AF_INET, AF_INET6));
453 assert(link);
454 assert(link->ifindex > 0);
455 assert(link->manager);
456 assert(link->manager->rtnl);
457
458 if (DEBUG_LOGGING) {
459 if (in_addr_to_string(address->family, &address->in_addr, &b) >= 0)
460 log_link_debug(link, "Removing address %s", b);
461 }
462
463 r = sd_rtnl_message_new_addr(link->manager->rtnl, &req, RTM_DELADDR,
464 link->ifindex, address->family);
465 if (r < 0)
466 return log_error_errno(r, "Could not allocate RTM_DELADDR message: %m");
467
468 r = sd_rtnl_message_addr_set_prefixlen(req, address->prefixlen);
469 if (r < 0)
470 return log_error_errno(r, "Could not set prefixlen: %m");
471
472 r = netlink_message_append_in_addr_union(req, IFA_LOCAL, address->family, &address->in_addr);
473 if (r < 0)
474 return log_error_errno(r, "Could not append IFA_LOCAL attribute: %m");
475
476 r = netlink_call_async(link->manager->rtnl, NULL, req,
477 callback ?: address_remove_handler,
478 link_netlink_destroy_callback, link);
479 if (r < 0)
480 return log_error_errno(r, "Could not send rtnetlink message: %m");
481
482 link_ref(link);
483
484 return 0;
485 }
486
487 static int address_acquire(Link *link, Address *original, Address **ret) {
488 union in_addr_union in_addr = {};
489 struct in_addr broadcast = {};
490 _cleanup_(address_freep) Address *na = NULL;
491 int r;
492
493 assert(link);
494 assert(original);
495 assert(ret);
496
497 /* Something useful was configured? just use it */
498 if (in_addr_is_null(original->family, &original->in_addr) <= 0)
499 return 0;
500
501 /* The address is configured to be 0.0.0.0 or [::] by the user?
502 * Then let's acquire something more useful from the pool. */
503 r = manager_address_pool_acquire(link->manager, original->family, original->prefixlen, &in_addr);
504 if (r < 0)
505 return log_link_error_errno(link, r, "Failed to acquire address from pool: %m");
506 if (r == 0) {
507 log_link_error(link, "Couldn't find free address for interface, all taken.");
508 return -EBUSY;
509 }
510
511 if (original->family == AF_INET) {
512 /* Pick first address in range for ourselves ... */
513 in_addr.in.s_addr = in_addr.in.s_addr | htobe32(1);
514
515 /* .. and use last as broadcast address */
516 if (original->prefixlen > 30)
517 broadcast.s_addr = 0;
518 else
519 broadcast.s_addr = in_addr.in.s_addr | htobe32(0xFFFFFFFFUL >> original->prefixlen);
520 } else if (original->family == AF_INET6)
521 in_addr.in6.s6_addr[15] |= 1;
522
523 r = address_new(&na);
524 if (r < 0)
525 return r;
526
527 na->family = original->family;
528 na->prefixlen = original->prefixlen;
529 na->scope = original->scope;
530 na->cinfo = original->cinfo;
531
532 if (original->label) {
533 na->label = strdup(original->label);
534 if (!na->label)
535 return -ENOMEM;
536 }
537
538 na->broadcast = broadcast;
539 na->in_addr = in_addr;
540
541 LIST_PREPEND(addresses, link->pool_addresses, na);
542
543 *ret = TAKE_PTR(na);
544
545 return 0;
546 }
547
548 int address_configure(
549 Address *address,
550 Link *link,
551 link_netlink_message_handler_t callback,
552 bool update) {
553
554 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
555 int r;
556
557 assert(address);
558 assert(IN_SET(address->family, AF_INET, AF_INET6));
559 assert(link);
560 assert(link->ifindex > 0);
561 assert(link->manager);
562 assert(link->manager->rtnl);
563 assert(callback);
564
565 /* If this is a new address, then refuse adding more than the limit */
566 if (address_get(link, address->family, &address->in_addr, address->prefixlen, NULL) <= 0 &&
567 set_size(link->addresses) >= ADDRESSES_PER_LINK_MAX)
568 return -E2BIG;
569
570 r = address_acquire(link, address, &address);
571 if (r < 0)
572 return r;
573
574 if (update)
575 r = sd_rtnl_message_new_addr_update(link->manager->rtnl, &req,
576 link->ifindex, address->family);
577 else
578 r = sd_rtnl_message_new_addr(link->manager->rtnl, &req, RTM_NEWADDR,
579 link->ifindex, address->family);
580 if (r < 0)
581 return log_error_errno(r, "Could not allocate RTM_NEWADDR message: %m");
582
583 r = sd_rtnl_message_addr_set_prefixlen(req, address->prefixlen);
584 if (r < 0)
585 return log_error_errno(r, "Could not set prefixlen: %m");
586
587 address->flags |= IFA_F_PERMANENT;
588
589 if (address->home_address)
590 address->flags |= IFA_F_HOMEADDRESS;
591
592 if (address->duplicate_address_detection)
593 address->flags |= IFA_F_NODAD;
594
595 if (address->manage_temporary_address)
596 address->flags |= IFA_F_MANAGETEMPADDR;
597
598 if (address->prefix_route)
599 address->flags |= IFA_F_NOPREFIXROUTE;
600
601 if (address->autojoin)
602 address->flags |= IFA_F_MCAUTOJOIN;
603
604 r = sd_rtnl_message_addr_set_flags(req, (address->flags & 0xff));
605 if (r < 0)
606 return log_error_errno(r, "Could not set flags: %m");
607
608 if (address->flags & ~0xff) {
609 r = sd_netlink_message_append_u32(req, IFA_FLAGS, address->flags);
610 if (r < 0)
611 return log_error_errno(r, "Could not set extended flags: %m");
612 }
613
614 r = sd_rtnl_message_addr_set_scope(req, address->scope);
615 if (r < 0)
616 return log_error_errno(r, "Could not set scope: %m");
617
618 r = netlink_message_append_in_addr_union(req, IFA_LOCAL, address->family, &address->in_addr);
619 if (r < 0)
620 return log_error_errno(r, "Could not append IFA_LOCAL attribute: %m");
621
622 if (in_addr_is_null(address->family, &address->in_addr_peer) == 0) {
623 r = netlink_message_append_in_addr_union(req, IFA_ADDRESS, address->family, &address->in_addr_peer);
624 if (r < 0)
625 return log_error_errno(r, "Could not append IFA_ADDRESS attribute: %m");
626 } else if (address->family == AF_INET && address->prefixlen <= 30) {
627 r = sd_netlink_message_append_in_addr(req, IFA_BROADCAST, &address->broadcast);
628 if (r < 0)
629 return log_error_errno(r, "Could not append IFA_BROADCAST attribute: %m");
630 }
631
632 if (address->label) {
633 r = sd_netlink_message_append_string(req, IFA_LABEL, address->label);
634 if (r < 0)
635 return log_error_errno(r, "Could not append IFA_LABEL attribute: %m");
636 }
637
638 r = sd_netlink_message_append_cache_info(req, IFA_CACHEINFO, &address->cinfo);
639 if (r < 0)
640 return log_error_errno(r, "Could not append IFA_CACHEINFO attribute: %m");
641
642 r = address_establish(address, link);
643 if (r < 0)
644 return r;
645
646 r = netlink_call_async(link->manager->rtnl, NULL, req, callback, link_netlink_destroy_callback, link);
647 if (r < 0) {
648 address_release(address);
649 return log_error_errno(r, "Could not send rtnetlink message: %m");
650 }
651
652 link_ref(link);
653
654 if (address->family == AF_INET6 && !in_addr_is_null(address->family, &address->in_addr_peer))
655 r = address_add(link, address->family, &address->in_addr_peer, address->prefixlen, NULL);
656 else
657 r = address_add(link, address->family, &address->in_addr, address->prefixlen, NULL);
658 if (r < 0) {
659 address_release(address);
660 return log_error_errno(r, "Could not add address: %m");
661 }
662
663 return 0;
664 }
665
666 int config_parse_broadcast(
667 const char *unit,
668 const char *filename,
669 unsigned line,
670 const char *section,
671 unsigned section_line,
672 const char *lvalue,
673 int ltype,
674 const char *rvalue,
675 void *data,
676 void *userdata) {
677
678 Network *network = userdata;
679 _cleanup_(address_freep) Address *n = NULL;
680 int r;
681
682 assert(filename);
683 assert(section);
684 assert(lvalue);
685 assert(rvalue);
686 assert(data);
687
688 r = address_new_static(network, filename, section_line, &n);
689 if (r < 0)
690 return r;
691
692 if (n->family == AF_INET6) {
693 log_syntax(unit, LOG_ERR, filename, line, 0, "Broadcast is not valid for IPv6 addresses, ignoring assignment: %s", rvalue);
694 return 0;
695 }
696
697 r = in_addr_from_string(AF_INET, rvalue, (union in_addr_union*) &n->broadcast);
698 if (r < 0) {
699 log_syntax(unit, LOG_ERR, filename, line, r, "Broadcast is invalid, ignoring assignment: %s", rvalue);
700 return 0;
701 }
702
703 n->family = AF_INET;
704 n = NULL;
705
706 return 0;
707 }
708
709 int config_parse_address(const char *unit,
710 const char *filename,
711 unsigned line,
712 const char *section,
713 unsigned section_line,
714 const char *lvalue,
715 int ltype,
716 const char *rvalue,
717 void *data,
718 void *userdata) {
719
720 Network *network = userdata;
721 _cleanup_(address_freep) Address *n = NULL;
722 union in_addr_union buffer;
723 unsigned char prefixlen;
724 int r, f;
725
726 assert(filename);
727 assert(section);
728 assert(lvalue);
729 assert(rvalue);
730 assert(data);
731
732 if (streq(section, "Network")) {
733 /* we are not in an Address section, so treat
734 * this as the special '0' section */
735 r = address_new_static(network, NULL, 0, &n);
736 } else
737 r = address_new_static(network, filename, section_line, &n);
738
739 if (r < 0)
740 return r;
741
742 /* Address=address/prefixlen */
743 r = in_addr_prefix_from_string_auto_internal(rvalue, PREFIXLEN_REFUSE, &f, &buffer, &prefixlen);
744 if (r == -ENOANO) {
745 log_syntax(unit, LOG_ERR, filename, line, r,
746 "An address '%s' is specified without prefix length. "
747 "The behavior of parsing addresses without prefix length will be changed in the future release. "
748 "Please specify prefix length explicitly.", rvalue);
749
750 r = in_addr_prefix_from_string_auto_internal(rvalue, PREFIXLEN_LEGACY, &f, &buffer, &prefixlen);
751 }
752 if (r < 0) {
753 log_syntax(unit, LOG_ERR, filename, line, r, "Invalid address '%s', ignoring assignment: %m", rvalue);
754 return 0;
755 }
756
757 if (n->family != AF_UNSPEC && f != n->family) {
758 log_syntax(unit, LOG_ERR, filename, line, 0, "Address is incompatible, ignoring assignment: %s", rvalue);
759 return 0;
760 }
761
762 n->family = f;
763 n->prefixlen = prefixlen;
764
765 if (streq(lvalue, "Address"))
766 n->in_addr = buffer;
767 else
768 n->in_addr_peer = buffer;
769
770 if (n->family == AF_INET && n->broadcast.s_addr == 0)
771 n->broadcast.s_addr = n->in_addr.in.s_addr | htonl(0xfffffffflu >> n->prefixlen);
772
773 n = NULL;
774
775 return 0;
776 }
777
778 int config_parse_label(
779 const char *unit,
780 const char *filename,
781 unsigned line,
782 const char *section,
783 unsigned section_line,
784 const char *lvalue,
785 int ltype,
786 const char *rvalue,
787 void *data,
788 void *userdata) {
789
790 _cleanup_(address_freep) Address *n = NULL;
791 Network *network = userdata;
792 int r;
793
794 assert(filename);
795 assert(section);
796 assert(lvalue);
797 assert(rvalue);
798 assert(data);
799
800 r = address_new_static(network, filename, section_line, &n);
801 if (r < 0)
802 return r;
803
804 if (!address_label_valid(rvalue)) {
805 log_syntax(unit, LOG_ERR, filename, line, 0, "Interface label is too long or invalid, ignoring assignment: %s", rvalue);
806 return 0;
807 }
808
809 r = free_and_strdup(&n->label, rvalue);
810 if (r < 0)
811 return log_oom();
812
813 n = NULL;
814
815 return 0;
816 }
817
818 int config_parse_lifetime(const char *unit,
819 const char *filename,
820 unsigned line,
821 const char *section,
822 unsigned section_line,
823 const char *lvalue,
824 int ltype,
825 const char *rvalue,
826 void *data,
827 void *userdata) {
828 Network *network = userdata;
829 _cleanup_(address_freep) Address *n = NULL;
830 unsigned k;
831 int r;
832
833 assert(filename);
834 assert(section);
835 assert(lvalue);
836 assert(rvalue);
837 assert(data);
838
839 r = address_new_static(network, filename, section_line, &n);
840 if (r < 0)
841 return r;
842
843 if (STR_IN_SET(rvalue, "forever", "infinity")) {
844 n->cinfo.ifa_prefered = CACHE_INFO_INFINITY_LIFE_TIME;
845 n = NULL;
846
847 return 0;
848 }
849
850 r = safe_atou(rvalue, &k);
851 if (r < 0) {
852 log_syntax(unit, LOG_ERR, filename, line, r, "Failed to parse PreferredLifetime, ignoring: %s", rvalue);
853 return 0;
854 }
855
856 if (k != 0)
857 log_syntax(unit, LOG_ERR, filename, line, 0, "Invalid PreferredLifetime value, ignoring: %d", k);
858 else {
859 n->cinfo.ifa_prefered = k;
860 n = NULL;
861 }
862
863 return 0;
864 }
865
866 int config_parse_address_flags(const char *unit,
867 const char *filename,
868 unsigned line,
869 const char *section,
870 unsigned section_line,
871 const char *lvalue,
872 int ltype,
873 const char *rvalue,
874 void *data,
875 void *userdata) {
876 Network *network = userdata;
877 _cleanup_(address_freep) Address *n = NULL;
878 int r;
879
880 assert(filename);
881 assert(section);
882 assert(lvalue);
883 assert(rvalue);
884 assert(data);
885
886 r = address_new_static(network, filename, section_line, &n);
887 if (r < 0)
888 return r;
889
890 r = parse_boolean(rvalue);
891 if (r < 0) {
892 log_syntax(unit, LOG_ERR, filename, line, r, "Failed to parse address flag, ignoring: %s", rvalue);
893 return 0;
894 }
895
896 if (streq(lvalue, "HomeAddress"))
897 n->home_address = r;
898 else if (streq(lvalue, "DuplicateAddressDetection"))
899 n->duplicate_address_detection = r;
900 else if (streq(lvalue, "ManageTemporaryAddress"))
901 n->manage_temporary_address = r;
902 else if (streq(lvalue, "PrefixRoute"))
903 n->prefix_route = r;
904 else if (streq(lvalue, "AutoJoin"))
905 n->autojoin = r;
906
907 return 0;
908 }
909
910 int config_parse_address_scope(const char *unit,
911 const char *filename,
912 unsigned line,
913 const char *section,
914 unsigned section_line,
915 const char *lvalue,
916 int ltype,
917 const char *rvalue,
918 void *data,
919 void *userdata) {
920 Network *network = userdata;
921 _cleanup_(address_freep) Address *n = NULL;
922 int r;
923
924 assert(filename);
925 assert(section);
926 assert(lvalue);
927 assert(rvalue);
928 assert(data);
929
930 r = address_new_static(network, filename, section_line, &n);
931 if (r < 0)
932 return r;
933
934 if (streq(rvalue, "host"))
935 n->scope = RT_SCOPE_HOST;
936 else if (streq(rvalue, "link"))
937 n->scope = RT_SCOPE_LINK;
938 else if (streq(rvalue, "global"))
939 n->scope = RT_SCOPE_UNIVERSE;
940 else {
941 r = safe_atou8(rvalue , &n->scope);
942 if (r < 0) {
943 log_syntax(unit, LOG_ERR, filename, line, r, "Could not parse address scope \"%s\", ignoring assignment: %m", rvalue);
944 return 0;
945 }
946 }
947
948 n = NULL;
949
950 return 0;
951 }
952
953 bool address_is_ready(const Address *a) {
954 assert(a);
955
956 if (a->family == AF_INET6)
957 return !(a->flags & IFA_F_TENTATIVE);
958 else
959 return !(a->flags & (IFA_F_TENTATIVE | IFA_F_DEPRECATED));
960 }