2 This file is part of systemd.
4 Copyright 2014 Lennart Poettering
6 systemd is free software; you can redistribute it and/or modify it
7 under the terms of the GNU Lesser General Public License as published by
8 the Free Software Foundation; either version 2.1 of the License, or
9 (at your option) any later version.
11 systemd is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 Lesser General Public License for more details.
16 You should have received a copy of the GNU Lesser General Public License
17 along with systemd; If not, see <http://www.gnu.org/licenses/>.
22 #include "sd-network.h"
24 #include "alloc-util.h"
29 #include "parse-util.h"
30 #include "resolved-link.h"
31 #include "resolved-llmnr.h"
32 #include "resolved-mdns.h"
33 #include "string-util.h"
36 int link_new(Manager
*m
, Link
**ret
, int ifindex
) {
37 _cleanup_(link_freep
) Link
*l
= NULL
;
43 r
= hashmap_ensure_allocated(&m
->links
, NULL
);
52 l
->llmnr_support
= RESOLVE_SUPPORT_YES
;
53 l
->mdns_support
= RESOLVE_SUPPORT_NO
;
54 l
->dnssec_mode
= _DNSSEC_MODE_INVALID
;
55 l
->operstate
= IF_OPER_UNKNOWN
;
57 if (asprintf(&l
->state_file
, "/run/systemd/resolve/netif/%i", ifindex
) < 0)
60 r
= hashmap_put(m
->links
, INT_TO_PTR(ifindex
), l
);
73 void link_flush_settings(Link
*l
) {
76 l
->llmnr_support
= RESOLVE_SUPPORT_YES
;
77 l
->mdns_support
= RESOLVE_SUPPORT_NO
;
78 l
->dnssec_mode
= _DNSSEC_MODE_INVALID
;
80 dns_server_unlink_all(l
->dns_servers
);
81 dns_search_domain_unlink_all(l
->search_domains
);
83 l
->dnssec_negative_trust_anchors
= set_free_free(l
->dnssec_negative_trust_anchors
);
86 Link
*link_free(Link
*l
) {
90 /* Send goodbye messages. */
91 dns_scope_announce(l
->mdns_ipv4_scope
, true);
92 dns_scope_announce(l
->mdns_ipv6_scope
, true);
94 link_flush_settings(l
);
97 (void) link_address_free(l
->addresses
);
100 hashmap_remove(l
->manager
->links
, INT_TO_PTR(l
->ifindex
));
102 dns_scope_free(l
->unicast_scope
);
103 dns_scope_free(l
->llmnr_ipv4_scope
);
104 dns_scope_free(l
->llmnr_ipv6_scope
);
105 dns_scope_free(l
->mdns_ipv4_scope
);
106 dns_scope_free(l
->mdns_ipv6_scope
);
113 void link_allocate_scopes(Link
*l
) {
118 if (link_relevant(l
, AF_UNSPEC
, false) &&
120 if (!l
->unicast_scope
) {
121 r
= dns_scope_new(l
->manager
, &l
->unicast_scope
, l
, DNS_PROTOCOL_DNS
, AF_UNSPEC
);
123 log_warning_errno(r
, "Failed to allocate DNS scope: %m");
126 l
->unicast_scope
= dns_scope_free(l
->unicast_scope
);
128 if (link_relevant(l
, AF_INET
, true) &&
129 l
->llmnr_support
!= RESOLVE_SUPPORT_NO
&&
130 l
->manager
->llmnr_support
!= RESOLVE_SUPPORT_NO
) {
131 if (!l
->llmnr_ipv4_scope
) {
132 r
= dns_scope_new(l
->manager
, &l
->llmnr_ipv4_scope
, l
, DNS_PROTOCOL_LLMNR
, AF_INET
);
134 log_warning_errno(r
, "Failed to allocate LLMNR IPv4 scope: %m");
137 l
->llmnr_ipv4_scope
= dns_scope_free(l
->llmnr_ipv4_scope
);
139 if (link_relevant(l
, AF_INET6
, true) &&
140 l
->llmnr_support
!= RESOLVE_SUPPORT_NO
&&
141 l
->manager
->llmnr_support
!= RESOLVE_SUPPORT_NO
&&
142 socket_ipv6_is_supported()) {
143 if (!l
->llmnr_ipv6_scope
) {
144 r
= dns_scope_new(l
->manager
, &l
->llmnr_ipv6_scope
, l
, DNS_PROTOCOL_LLMNR
, AF_INET6
);
146 log_warning_errno(r
, "Failed to allocate LLMNR IPv6 scope: %m");
149 l
->llmnr_ipv6_scope
= dns_scope_free(l
->llmnr_ipv6_scope
);
151 if (link_relevant(l
, AF_INET
, true) &&
152 l
->mdns_support
!= RESOLVE_SUPPORT_NO
&&
153 l
->manager
->mdns_support
!= RESOLVE_SUPPORT_NO
) {
154 if (!l
->mdns_ipv4_scope
) {
155 r
= dns_scope_new(l
->manager
, &l
->mdns_ipv4_scope
, l
, DNS_PROTOCOL_MDNS
, AF_INET
);
157 log_warning_errno(r
, "Failed to allocate mDNS IPv4 scope: %m");
160 l
->mdns_ipv4_scope
= dns_scope_free(l
->mdns_ipv4_scope
);
162 if (link_relevant(l
, AF_INET6
, true) &&
163 l
->mdns_support
!= RESOLVE_SUPPORT_NO
&&
164 l
->manager
->mdns_support
!= RESOLVE_SUPPORT_NO
) {
165 if (!l
->mdns_ipv6_scope
) {
166 r
= dns_scope_new(l
->manager
, &l
->mdns_ipv6_scope
, l
, DNS_PROTOCOL_MDNS
, AF_INET6
);
168 log_warning_errno(r
, "Failed to allocate mDNS IPv6 scope: %m");
171 l
->mdns_ipv6_scope
= dns_scope_free(l
->mdns_ipv6_scope
);
174 void link_add_rrs(Link
*l
, bool force_remove
) {
177 LIST_FOREACH(addresses
, a
, l
->addresses
)
178 link_address_add_rrs(a
, force_remove
);
181 int link_process_rtnl(Link
*l
, sd_netlink_message
*m
) {
182 const char *n
= NULL
;
188 r
= sd_rtnl_message_link_get_flags(m
, &l
->flags
);
192 (void) sd_netlink_message_read_u32(m
, IFLA_MTU
, &l
->mtu
);
193 (void) sd_netlink_message_read_u8(m
, IFLA_OPERSTATE
, &l
->operstate
);
195 if (sd_netlink_message_read_string(m
, IFLA_IFNAME
, &n
) >= 0) {
196 strncpy(l
->name
, n
, sizeof(l
->name
)-1);
197 char_array_0(l
->name
);
200 link_allocate_scopes(l
);
201 link_add_rrs(l
, false);
206 static int link_update_dns_server_one(Link
*l
, const char *name
) {
207 union in_addr_union a
;
214 r
= in_addr_from_string_auto(name
, &family
, &a
);
218 s
= dns_server_find(l
->dns_servers
, family
, &a
, 0);
220 dns_server_move_back_and_unmark(s
);
224 return dns_server_new(l
->manager
, NULL
, DNS_SERVER_LINK
, l
, family
, &a
, 0);
227 static int link_update_dns_servers(Link
*l
) {
228 _cleanup_strv_free_
char **nameservers
= NULL
;
234 r
= sd_network_link_get_dns(l
->ifindex
, &nameservers
);
242 dns_server_mark_all(l
->dns_servers
);
244 STRV_FOREACH(nameserver
, nameservers
) {
245 r
= link_update_dns_server_one(l
, *nameserver
);
250 dns_server_unlink_marked(l
->dns_servers
);
254 dns_server_unlink_all(l
->dns_servers
);
258 static int link_update_llmnr_support(Link
*l
) {
259 _cleanup_free_
char *b
= NULL
;
264 r
= sd_network_link_get_llmnr(l
->ifindex
, &b
);
272 l
->llmnr_support
= resolve_support_from_string(b
);
273 if (l
->llmnr_support
< 0) {
281 l
->llmnr_support
= RESOLVE_SUPPORT_YES
;
285 static int link_update_mdns_support(Link
*l
) {
286 _cleanup_free_
char *b
= NULL
;
291 r
= sd_network_link_get_mdns(l
->ifindex
, &b
);
299 l
->mdns_support
= resolve_support_from_string(b
);
300 if (l
->mdns_support
< 0) {
308 l
->mdns_support
= RESOLVE_SUPPORT_NO
;
312 void link_set_dnssec_mode(Link
*l
, DnssecMode mode
) {
317 if (IN_SET(mode
, DNSSEC_YES
, DNSSEC_ALLOW_DOWNGRADE
))
318 log_warning("DNSSEC option for the link cannot be enabled or set to allow-downgrade when systemd-resolved is built without gcrypt support. Turning off DNSSEC support.");
322 if (l
->dnssec_mode
== mode
)
325 if ((l
->dnssec_mode
== _DNSSEC_MODE_INVALID
) ||
326 (l
->dnssec_mode
== DNSSEC_NO
&& mode
!= DNSSEC_NO
) ||
327 (l
->dnssec_mode
== DNSSEC_ALLOW_DOWNGRADE
&& mode
== DNSSEC_YES
)) {
329 /* When switching from non-DNSSEC mode to DNSSEC mode, flush the cache. Also when switching from the
330 * allow-downgrade mode to full DNSSEC mode, flush it too. */
331 if (l
->unicast_scope
)
332 dns_cache_flush(&l
->unicast_scope
->cache
);
335 l
->dnssec_mode
= mode
;
338 static int link_update_dnssec_mode(Link
*l
) {
339 _cleanup_free_
char *m
= NULL
;
345 r
= sd_network_link_get_dnssec(l
->ifindex
, &m
);
353 mode
= dnssec_mode_from_string(m
);
359 link_set_dnssec_mode(l
, mode
);
364 l
->dnssec_mode
= _DNSSEC_MODE_INVALID
;
368 static int link_update_dnssec_negative_trust_anchors(Link
*l
) {
369 _cleanup_strv_free_
char **ntas
= NULL
;
370 _cleanup_set_free_free_ Set
*ns
= NULL
;
375 r
= sd_network_link_get_dnssec_negative_trust_anchors(l
->ifindex
, &ntas
);
383 ns
= set_new(&dns_name_hash_ops
);
387 r
= set_put_strdupv(ns
, ntas
);
391 set_free_free(l
->dnssec_negative_trust_anchors
);
392 l
->dnssec_negative_trust_anchors
= ns
;
398 l
->dnssec_negative_trust_anchors
= set_free_free(l
->dnssec_negative_trust_anchors
);
402 static int link_update_search_domain_one(Link
*l
, const char *name
, bool route_only
) {
409 r
= dns_search_domain_find(l
->search_domains
, name
, &d
);
413 dns_search_domain_move_back_and_unmark(d
);
415 r
= dns_search_domain_new(l
->manager
, &d
, DNS_SEARCH_DOMAIN_LINK
, l
, name
);
420 d
->route_only
= route_only
;
424 static int link_update_search_domains(Link
*l
) {
425 _cleanup_strv_free_
char **sdomains
= NULL
, **rdomains
= NULL
;
431 r
= sd_network_link_get_search_domains(l
->ifindex
, &sdomains
);
432 if (r
< 0 && r
!= -ENODATA
)
435 q
= sd_network_link_get_route_domains(l
->ifindex
, &rdomains
);
436 if (q
< 0 && q
!= -ENODATA
) {
441 if (r
== -ENODATA
&& q
== -ENODATA
) {
442 /* networkd knows nothing about this interface, and that's fine. */
447 dns_search_domain_mark_all(l
->search_domains
);
449 STRV_FOREACH(i
, sdomains
) {
450 r
= link_update_search_domain_one(l
, *i
, false);
455 STRV_FOREACH(i
, rdomains
) {
456 r
= link_update_search_domain_one(l
, *i
, true);
461 dns_search_domain_unlink_marked(l
->search_domains
);
465 dns_search_domain_unlink_all(l
->search_domains
);
469 static int link_is_managed(Link
*l
) {
470 _cleanup_free_
char *state
= NULL
;
475 r
= sd_network_link_get_setup_state(l
->ifindex
, &state
);
481 return !STR_IN_SET(state
, "pending", "unmanaged");
484 static void link_read_settings(Link
*l
) {
489 /* Read settings from networkd, except when networkd is not managing this interface. */
491 r
= link_is_managed(l
);
493 log_warning_errno(r
, "Failed to determine whether interface %s is managed: %m", l
->name
);
498 /* If this link used to be managed, but is now unmanaged, flush all our settings — but only once. */
500 link_flush_settings(l
);
502 l
->is_managed
= false;
506 l
->is_managed
= true;
508 r
= link_update_dns_servers(l
);
510 log_warning_errno(r
, "Failed to read DNS servers for interface %s, ignoring: %m", l
->name
);
512 r
= link_update_llmnr_support(l
);
514 log_warning_errno(r
, "Failed to read LLMNR support for interface %s, ignoring: %m", l
->name
);
516 r
= link_update_mdns_support(l
);
518 log_warning_errno(r
, "Failed to read mDNS support for interface %s, ignoring: %m", l
->name
);
520 r
= link_update_dnssec_mode(l
);
522 log_warning_errno(r
, "Failed to read DNSSEC mode for interface %s, ignoring: %m", l
->name
);
524 r
= link_update_dnssec_negative_trust_anchors(l
);
526 log_warning_errno(r
, "Failed to read DNSSEC negative trust anchors for interface %s, ignoring: %m", l
->name
);
528 r
= link_update_search_domains(l
);
530 log_warning_errno(r
, "Failed to read search domains for interface %s, ignoring: %m", l
->name
);
533 int link_update(Link
*l
) {
538 link_read_settings(l
);
541 if (l
->llmnr_support
!= RESOLVE_SUPPORT_NO
) {
542 r
= manager_llmnr_start(l
->manager
);
547 if (l
->mdns_support
!= RESOLVE_SUPPORT_NO
) {
548 r
= manager_mdns_start(l
->manager
);
553 link_allocate_scopes(l
);
554 link_add_rrs(l
, false);
559 bool link_relevant(Link
*l
, int family
, bool local_multicast
) {
560 _cleanup_free_
char *state
= NULL
;
565 /* A link is relevant for local multicast traffic if it isn't a loopback device, has a link
566 * beat, can do multicast and has at least one link-local (or better) IP address.
568 * A link is relevant for non-multicast traffic if it isn't a loopback device, has a link beat, and has at
569 * least one routable address. */
571 if (l
->flags
& (IFF_LOOPBACK
|IFF_DORMANT
))
574 if ((l
->flags
& (IFF_UP
|IFF_LOWER_UP
)) != (IFF_UP
|IFF_LOWER_UP
))
577 if (local_multicast
) {
578 if ((l
->flags
& IFF_MULTICAST
) != IFF_MULTICAST
)
582 /* Check kernel operstate
583 * https://www.kernel.org/doc/Documentation/networking/operstates.txt */
584 if (!IN_SET(l
->operstate
, IF_OPER_UNKNOWN
, IF_OPER_UP
))
587 (void) sd_network_link_get_operational_state(l
->ifindex
, &state
);
588 if (state
&& !STR_IN_SET(state
, "unknown", "degraded", "routable"))
591 LIST_FOREACH(addresses
, a
, l
->addresses
)
592 if ((family
== AF_UNSPEC
|| a
->family
== family
) && link_address_relevant(a
, local_multicast
))
598 LinkAddress
*link_find_address(Link
*l
, int family
, const union in_addr_union
*in_addr
) {
603 LIST_FOREACH(addresses
, a
, l
->addresses
)
604 if (a
->family
== family
&& in_addr_equal(family
, &a
->in_addr
, in_addr
))
610 DnsServer
* link_set_dns_server(Link
*l
, DnsServer
*s
) {
613 if (l
->current_dns_server
== s
)
617 log_debug("Switching to DNS server %s for interface %s.", dns_server_string(s
), l
->name
);
619 dns_server_unref(l
->current_dns_server
);
620 l
->current_dns_server
= dns_server_ref(s
);
622 if (l
->unicast_scope
)
623 dns_cache_flush(&l
->unicast_scope
->cache
);
628 DnsServer
*link_get_dns_server(Link
*l
) {
631 if (!l
->current_dns_server
)
632 link_set_dns_server(l
, l
->dns_servers
);
634 return l
->current_dns_server
;
637 void link_next_dns_server(Link
*l
) {
640 if (!l
->current_dns_server
)
643 /* Change to the next one, but make sure to follow the linked
644 * list only if this server is actually still linked. */
645 if (l
->current_dns_server
->linked
&& l
->current_dns_server
->servers_next
) {
646 link_set_dns_server(l
, l
->current_dns_server
->servers_next
);
650 link_set_dns_server(l
, l
->dns_servers
);
653 DnssecMode
link_get_dnssec_mode(Link
*l
) {
656 if (l
->dnssec_mode
!= _DNSSEC_MODE_INVALID
)
657 return l
->dnssec_mode
;
659 return manager_get_dnssec_mode(l
->manager
);
662 bool link_dnssec_supported(Link
*l
) {
667 if (link_get_dnssec_mode(l
) == DNSSEC_NO
)
670 server
= link_get_dns_server(l
);
672 return dns_server_dnssec_supported(server
);
677 int link_address_new(Link
*l
, LinkAddress
**ret
, int family
, const union in_addr_union
*in_addr
) {
683 a
= new0(LinkAddress
, 1);
688 a
->in_addr
= *in_addr
;
691 LIST_PREPEND(addresses
, l
->addresses
, a
);
700 LinkAddress
*link_address_free(LinkAddress
*a
) {
705 LIST_REMOVE(addresses
, a
->link
->addresses
, a
);
707 assert(a
->link
->n_addresses
> 0);
708 a
->link
->n_addresses
--;
710 if (a
->llmnr_address_rr
) {
711 if (a
->family
== AF_INET
&& a
->link
->llmnr_ipv4_scope
)
712 dns_zone_remove_rr(&a
->link
->llmnr_ipv4_scope
->zone
, a
->llmnr_address_rr
);
713 else if (a
->family
== AF_INET6
&& a
->link
->llmnr_ipv6_scope
)
714 dns_zone_remove_rr(&a
->link
->llmnr_ipv6_scope
->zone
, a
->llmnr_address_rr
);
717 if (a
->llmnr_ptr_rr
) {
718 if (a
->family
== AF_INET
&& a
->link
->llmnr_ipv4_scope
)
719 dns_zone_remove_rr(&a
->link
->llmnr_ipv4_scope
->zone
, a
->llmnr_ptr_rr
);
720 else if (a
->family
== AF_INET6
&& a
->link
->llmnr_ipv6_scope
)
721 dns_zone_remove_rr(&a
->link
->llmnr_ipv6_scope
->zone
, a
->llmnr_ptr_rr
);
724 if (a
->mdns_address_rr
) {
725 if (a
->family
== AF_INET
&& a
->link
->mdns_ipv4_scope
)
726 dns_zone_remove_rr(&a
->link
->mdns_ipv4_scope
->zone
, a
->mdns_address_rr
);
727 else if (a
->family
== AF_INET6
&& a
->link
->mdns_ipv6_scope
)
728 dns_zone_remove_rr(&a
->link
->mdns_ipv6_scope
->zone
, a
->mdns_address_rr
);
731 if (a
->mdns_ptr_rr
) {
732 if (a
->family
== AF_INET
&& a
->link
->mdns_ipv4_scope
)
733 dns_zone_remove_rr(&a
->link
->mdns_ipv4_scope
->zone
, a
->mdns_ptr_rr
);
734 else if (a
->family
== AF_INET6
&& a
->link
->mdns_ipv6_scope
)
735 dns_zone_remove_rr(&a
->link
->mdns_ipv6_scope
->zone
, a
->mdns_ptr_rr
);
739 dns_resource_record_unref(a
->llmnr_address_rr
);
740 dns_resource_record_unref(a
->llmnr_ptr_rr
);
741 dns_resource_record_unref(a
->mdns_address_rr
);
742 dns_resource_record_unref(a
->mdns_ptr_rr
);
747 void link_address_add_rrs(LinkAddress
*a
, bool force_remove
) {
752 if (a
->family
== AF_INET
) {
755 link_address_relevant(a
, true) &&
756 a
->link
->llmnr_ipv4_scope
&&
757 a
->link
->llmnr_support
== RESOLVE_SUPPORT_YES
&&
758 a
->link
->manager
->llmnr_support
== RESOLVE_SUPPORT_YES
) {
760 if (!a
->link
->manager
->llmnr_host_ipv4_key
) {
761 a
->link
->manager
->llmnr_host_ipv4_key
= dns_resource_key_new(DNS_CLASS_IN
, DNS_TYPE_A
, a
->link
->manager
->llmnr_hostname
);
762 if (!a
->link
->manager
->llmnr_host_ipv4_key
) {
768 if (!a
->llmnr_address_rr
) {
769 a
->llmnr_address_rr
= dns_resource_record_new(a
->link
->manager
->llmnr_host_ipv4_key
);
770 if (!a
->llmnr_address_rr
) {
775 a
->llmnr_address_rr
->a
.in_addr
= a
->in_addr
.in
;
776 a
->llmnr_address_rr
->ttl
= LLMNR_DEFAULT_TTL
;
779 if (!a
->llmnr_ptr_rr
) {
780 r
= dns_resource_record_new_reverse(&a
->llmnr_ptr_rr
, a
->family
, &a
->in_addr
, a
->link
->manager
->llmnr_hostname
);
784 a
->llmnr_ptr_rr
->ttl
= LLMNR_DEFAULT_TTL
;
787 r
= dns_zone_put(&a
->link
->llmnr_ipv4_scope
->zone
, a
->link
->llmnr_ipv4_scope
, a
->llmnr_address_rr
, true);
789 log_warning_errno(r
, "Failed to add A record to LLMNR zone: %m");
791 r
= dns_zone_put(&a
->link
->llmnr_ipv4_scope
->zone
, a
->link
->llmnr_ipv4_scope
, a
->llmnr_ptr_rr
, false);
793 log_warning_errno(r
, "Failed to add IPv4 PTR record to LLMNR zone: %m");
795 if (a
->llmnr_address_rr
) {
796 if (a
->link
->llmnr_ipv4_scope
)
797 dns_zone_remove_rr(&a
->link
->llmnr_ipv4_scope
->zone
, a
->llmnr_address_rr
);
798 a
->llmnr_address_rr
= dns_resource_record_unref(a
->llmnr_address_rr
);
801 if (a
->llmnr_ptr_rr
) {
802 if (a
->link
->llmnr_ipv4_scope
)
803 dns_zone_remove_rr(&a
->link
->llmnr_ipv4_scope
->zone
, a
->llmnr_ptr_rr
);
804 a
->llmnr_ptr_rr
= dns_resource_record_unref(a
->llmnr_ptr_rr
);
809 link_address_relevant(a
, true) &&
810 a
->link
->mdns_ipv4_scope
&&
811 a
->link
->mdns_support
== RESOLVE_SUPPORT_YES
&&
812 a
->link
->manager
->mdns_support
== RESOLVE_SUPPORT_YES
) {
813 if (!a
->link
->manager
->mdns_host_ipv4_key
) {
814 a
->link
->manager
->mdns_host_ipv4_key
= dns_resource_key_new(DNS_CLASS_IN
, DNS_TYPE_A
, a
->link
->manager
->mdns_hostname
);
815 if (!a
->link
->manager
->mdns_host_ipv4_key
) {
821 if (!a
->mdns_address_rr
) {
822 a
->mdns_address_rr
= dns_resource_record_new(a
->link
->manager
->mdns_host_ipv4_key
);
823 if (!a
->mdns_address_rr
) {
828 a
->mdns_address_rr
->a
.in_addr
= a
->in_addr
.in
;
829 a
->mdns_address_rr
->ttl
= MDNS_DEFAULT_TTL
;
832 if (!a
->mdns_ptr_rr
) {
833 r
= dns_resource_record_new_reverse(&a
->mdns_ptr_rr
, a
->family
, &a
->in_addr
, a
->link
->manager
->mdns_hostname
);
837 a
->mdns_ptr_rr
->ttl
= MDNS_DEFAULT_TTL
;
840 r
= dns_zone_put(&a
->link
->mdns_ipv4_scope
->zone
, a
->link
->mdns_ipv4_scope
, a
->mdns_address_rr
, true);
842 log_warning_errno(r
, "Failed to add A record to MDNS zone: %m");
844 r
= dns_zone_put(&a
->link
->mdns_ipv4_scope
->zone
, a
->link
->mdns_ipv4_scope
, a
->mdns_ptr_rr
, false);
846 log_warning_errno(r
, "Failed to add IPv4 PTR record to MDNS zone: %m");
848 if (a
->mdns_address_rr
) {
849 if (a
->link
->mdns_ipv4_scope
)
850 dns_zone_remove_rr(&a
->link
->mdns_ipv4_scope
->zone
, a
->mdns_address_rr
);
851 a
->mdns_address_rr
= dns_resource_record_unref(a
->mdns_address_rr
);
854 if (a
->mdns_ptr_rr
) {
855 if (a
->link
->mdns_ipv4_scope
)
856 dns_zone_remove_rr(&a
->link
->mdns_ipv4_scope
->zone
, a
->mdns_ptr_rr
);
857 a
->mdns_ptr_rr
= dns_resource_record_unref(a
->mdns_ptr_rr
);
862 if (a
->family
== AF_INET6
) {
865 link_address_relevant(a
, true) &&
866 a
->link
->llmnr_ipv6_scope
&&
867 a
->link
->llmnr_support
== RESOLVE_SUPPORT_YES
&&
868 a
->link
->manager
->llmnr_support
== RESOLVE_SUPPORT_YES
) {
870 if (!a
->link
->manager
->llmnr_host_ipv6_key
) {
871 a
->link
->manager
->llmnr_host_ipv6_key
= dns_resource_key_new(DNS_CLASS_IN
, DNS_TYPE_AAAA
, a
->link
->manager
->llmnr_hostname
);
872 if (!a
->link
->manager
->llmnr_host_ipv6_key
) {
878 if (!a
->llmnr_address_rr
) {
879 a
->llmnr_address_rr
= dns_resource_record_new(a
->link
->manager
->llmnr_host_ipv6_key
);
880 if (!a
->llmnr_address_rr
) {
885 a
->llmnr_address_rr
->aaaa
.in6_addr
= a
->in_addr
.in6
;
886 a
->llmnr_address_rr
->ttl
= LLMNR_DEFAULT_TTL
;
889 if (!a
->llmnr_ptr_rr
) {
890 r
= dns_resource_record_new_reverse(&a
->llmnr_ptr_rr
, a
->family
, &a
->in_addr
, a
->link
->manager
->llmnr_hostname
);
894 a
->llmnr_ptr_rr
->ttl
= LLMNR_DEFAULT_TTL
;
897 r
= dns_zone_put(&a
->link
->llmnr_ipv6_scope
->zone
, a
->link
->llmnr_ipv6_scope
, a
->llmnr_address_rr
, true);
899 log_warning_errno(r
, "Failed to add AAAA record to LLMNR zone: %m");
901 r
= dns_zone_put(&a
->link
->llmnr_ipv6_scope
->zone
, a
->link
->llmnr_ipv6_scope
, a
->llmnr_ptr_rr
, false);
903 log_warning_errno(r
, "Failed to add IPv6 PTR record to LLMNR zone: %m");
905 if (a
->llmnr_address_rr
) {
906 if (a
->link
->llmnr_ipv6_scope
)
907 dns_zone_remove_rr(&a
->link
->llmnr_ipv6_scope
->zone
, a
->llmnr_address_rr
);
908 a
->llmnr_address_rr
= dns_resource_record_unref(a
->llmnr_address_rr
);
911 if (a
->llmnr_ptr_rr
) {
912 if (a
->link
->llmnr_ipv6_scope
)
913 dns_zone_remove_rr(&a
->link
->llmnr_ipv6_scope
->zone
, a
->llmnr_ptr_rr
);
914 a
->llmnr_ptr_rr
= dns_resource_record_unref(a
->llmnr_ptr_rr
);
919 link_address_relevant(a
, true) &&
920 a
->link
->mdns_ipv6_scope
&&
921 a
->link
->mdns_support
== RESOLVE_SUPPORT_YES
&&
922 a
->link
->manager
->mdns_support
== RESOLVE_SUPPORT_YES
) {
924 if (!a
->link
->manager
->mdns_host_ipv6_key
) {
925 a
->link
->manager
->mdns_host_ipv6_key
= dns_resource_key_new(DNS_CLASS_IN
, DNS_TYPE_AAAA
, a
->link
->manager
->mdns_hostname
);
926 if (!a
->link
->manager
->mdns_host_ipv6_key
) {
932 if (!a
->mdns_address_rr
) {
933 a
->mdns_address_rr
= dns_resource_record_new(a
->link
->manager
->mdns_host_ipv6_key
);
934 if (!a
->mdns_address_rr
) {
939 a
->mdns_address_rr
->aaaa
.in6_addr
= a
->in_addr
.in6
;
940 a
->mdns_address_rr
->ttl
= MDNS_DEFAULT_TTL
;
943 if (!a
->mdns_ptr_rr
) {
944 r
= dns_resource_record_new_reverse(&a
->mdns_ptr_rr
, a
->family
, &a
->in_addr
, a
->link
->manager
->mdns_hostname
);
948 a
->mdns_ptr_rr
->ttl
= MDNS_DEFAULT_TTL
;
951 r
= dns_zone_put(&a
->link
->mdns_ipv6_scope
->zone
, a
->link
->mdns_ipv6_scope
, a
->mdns_address_rr
, true);
953 log_warning_errno(r
, "Failed to add AAAA record to MDNS zone: %m");
955 r
= dns_zone_put(&a
->link
->mdns_ipv6_scope
->zone
, a
->link
->mdns_ipv6_scope
, a
->mdns_ptr_rr
, false);
957 log_warning_errno(r
, "Failed to add IPv6 PTR record to MDNS zone: %m");
959 if (a
->mdns_address_rr
) {
960 if (a
->link
->mdns_ipv6_scope
)
961 dns_zone_remove_rr(&a
->link
->mdns_ipv6_scope
->zone
, a
->mdns_address_rr
);
962 a
->mdns_address_rr
= dns_resource_record_unref(a
->mdns_address_rr
);
965 if (a
->mdns_ptr_rr
) {
966 if (a
->link
->mdns_ipv6_scope
)
967 dns_zone_remove_rr(&a
->link
->mdns_ipv6_scope
->zone
, a
->mdns_ptr_rr
);
968 a
->mdns_ptr_rr
= dns_resource_record_unref(a
->mdns_ptr_rr
);
976 log_debug_errno(r
, "Failed to update address RRs: %m");
979 int link_address_update_rtnl(LinkAddress
*a
, sd_netlink_message
*m
) {
984 r
= sd_rtnl_message_addr_get_flags(m
, &a
->flags
);
988 sd_rtnl_message_addr_get_scope(m
, &a
->scope
);
990 link_allocate_scopes(a
->link
);
991 link_add_rrs(a
->link
, false);
996 bool link_address_relevant(LinkAddress
*a
, bool local_multicast
) {
999 if (a
->flags
& (IFA_F_DEPRECATED
|IFA_F_TENTATIVE
))
1002 if (a
->scope
>= (local_multicast
? RT_SCOPE_HOST
: RT_SCOPE_LINK
))
1008 static bool link_needs_save(Link
*l
) {
1011 /* Returns true if any of the settings where set different from the default */
1016 if (l
->llmnr_support
!= RESOLVE_SUPPORT_YES
||
1017 l
->mdns_support
!= RESOLVE_SUPPORT_NO
||
1018 l
->dnssec_mode
!= _DNSSEC_MODE_INVALID
)
1021 if (l
->dns_servers
||
1025 if (!set_isempty(l
->dnssec_negative_trust_anchors
))
1031 int link_save_user(Link
*l
) {
1032 _cleanup_free_
char *temp_path
= NULL
;
1033 _cleanup_fclose_
FILE *f
= NULL
;
1038 assert(l
->state_file
);
1040 if (!link_needs_save(l
)) {
1041 (void) unlink(l
->state_file
);
1045 r
= mkdir_parents(l
->state_file
, 0700);
1049 r
= fopen_temporary(l
->state_file
, &f
, &temp_path
);
1053 fputs_unlocked("# This is private data. Do not parse.\n", f
);
1055 v
= resolve_support_to_string(l
->llmnr_support
);
1057 fprintf(f
, "LLMNR=%s\n", v
);
1059 v
= resolve_support_to_string(l
->mdns_support
);
1061 fprintf(f
, "MDNS=%s\n", v
);
1063 v
= dnssec_mode_to_string(l
->dnssec_mode
);
1065 fprintf(f
, "DNSSEC=%s\n", v
);
1067 if (l
->dns_servers
) {
1070 fputs_unlocked("SERVERS=", f
);
1071 LIST_FOREACH(servers
, server
, l
->dns_servers
) {
1073 if (server
!= l
->dns_servers
)
1074 fputc_unlocked(' ', f
);
1076 v
= dns_server_string(server
);
1082 fputs_unlocked(v
, f
);
1084 fputc_unlocked('\n', f
);
1087 if (l
->search_domains
) {
1088 DnsSearchDomain
*domain
;
1090 fputs_unlocked("DOMAINS=", f
);
1091 LIST_FOREACH(domains
, domain
, l
->search_domains
) {
1093 if (domain
!= l
->search_domains
)
1094 fputc_unlocked(' ', f
);
1096 if (domain
->route_only
)
1097 fputc_unlocked('~', f
);
1099 fputs_unlocked(DNS_SEARCH_DOMAIN_NAME(domain
), f
);
1101 fputc_unlocked('\n', f
);
1104 if (!set_isempty(l
->dnssec_negative_trust_anchors
)) {
1109 fputs_unlocked("NTAS=", f
);
1110 SET_FOREACH(nta
, l
->dnssec_negative_trust_anchors
, i
) {
1113 fputc_unlocked(' ', f
);
1115 fputs_unlocked(nta
, f
);
1118 fputc_unlocked('\n', f
);
1121 r
= fflush_and_check(f
);
1125 if (rename(temp_path
, l
->state_file
) < 0) {
1133 (void) unlink(l
->state_file
);
1136 (void) unlink(temp_path
);
1138 return log_error_errno(r
, "Failed to save link data %s: %m", l
->state_file
);
1141 int link_load_user(Link
*l
) {
1155 assert(l
->state_file
);
1157 /* Try to load only a single time */
1163 return 0; /* if the device is managed, then networkd is our configuration source, not the bus API */
1165 r
= parse_env_file(l
->state_file
, NEWLINE
,
1169 "SERVERS", &servers
,
1170 "DOMAINS", &domains
,
1178 link_flush_settings(l
);
1180 /* If we can't recognize the LLMNR or MDNS setting we don't override the default */
1181 s
= resolve_support_from_string(llmnr
);
1183 l
->llmnr_support
= s
;
1185 s
= resolve_support_from_string(mdns
);
1187 l
->mdns_support
= s
;
1189 /* If we can't recognize the DNSSEC setting, then set it to invalid, so that the daemon default is used. */
1190 l
->dnssec_mode
= dnssec_mode_from_string(dnssec
);
1192 for (p
= servers
;;) {
1193 _cleanup_free_
char *word
= NULL
;
1195 r
= extract_first_word(&p
, &word
, NULL
, 0);
1201 r
= link_update_dns_server_one(l
, word
);
1203 log_debug_errno(r
, "Failed to load DNS server '%s', ignoring: %m", word
);
1208 for (p
= domains
;;) {
1209 _cleanup_free_
char *word
= NULL
;
1213 r
= extract_first_word(&p
, &word
, NULL
, 0);
1219 is_route
= word
[0] == '~';
1220 n
= is_route
? word
+ 1 : word
;
1222 r
= link_update_search_domain_one(l
, n
, is_route
);
1224 log_debug_errno(r
, "Failed to load search domain '%s', ignoring: %m", word
);
1230 _cleanup_set_free_free_ Set
*ns
= NULL
;
1232 ns
= set_new(&dns_name_hash_ops
);
1238 r
= set_put_strsplit(ns
, ntas
, NULL
, 0);
1242 l
->dnssec_negative_trust_anchors
= ns
;
1249 return log_error_errno(r
, "Failed to load link data %s: %m", l
->state_file
);
1252 void link_remove_user(Link
*l
) {
1254 assert(l
->state_file
);
1256 (void) unlink(l
->state_file
);