2017-11-18 17:09:20 +01:00
|
|
|
/* SPDX-License-Identifier: LGPL-2.1+ */
|
2013-10-17 03:18:36 +02:00
|
|
|
|
|
|
|
#include <net/if.h>
|
|
|
|
|
2015-10-27 03:01:06 +01:00
|
|
|
#include "alloc-util.h"
|
2013-10-17 03:18:36 +02:00
|
|
|
#include "conf-parser.h"
|
2015-06-15 13:50:43 +02:00
|
|
|
#include "firewall-util.h"
|
2019-03-13 12:02:21 +01:00
|
|
|
#include "memory-util.h"
|
2019-02-03 18:33:39 +01:00
|
|
|
#include "missing_network.h"
|
2015-08-27 13:59:06 +02:00
|
|
|
#include "netlink-util.h"
|
2015-10-26 16:18:16 +01:00
|
|
|
#include "networkd-address.h"
|
2016-11-13 04:59:06 +01:00
|
|
|
#include "networkd-manager.h"
|
2015-10-26 16:18:16 +01:00
|
|
|
#include "parse-util.h"
|
2015-09-22 17:54:27 +02:00
|
|
|
#include "set.h"
|
2016-05-06 21:20:59 +02:00
|
|
|
#include "socket-util.h"
|
2015-10-24 22:58:24 +02:00
|
|
|
#include "string-util.h"
|
2018-08-22 07:30:49 +02:00
|
|
|
#include "strv.h"
|
2015-09-22 17:54:27 +02:00
|
|
|
#include "utf8.h"
|
2013-10-17 03:18:36 +02:00
|
|
|
|
2016-06-03 19:51:48 +02:00
|
|
|
#define ADDRESSES_PER_LINK_MAX 2048U
|
2016-06-03 19:14:12 +02:00
|
|
|
#define STATIC_ADDRESSES_PER_NETWORK_MAX 1024U
|
|
|
|
|
2020-02-27 12:40:57 +01:00
|
|
|
int generate_ipv6_eui_64_address(Link *link, struct in6_addr *ret) {
|
|
|
|
assert(link);
|
|
|
|
assert(ret);
|
|
|
|
|
|
|
|
/* see RFC4291 section 2.5.1 */
|
|
|
|
ret->s6_addr[8] = link->mac.ether_addr_octet[0];
|
|
|
|
ret->s6_addr[8] ^= 1 << 1;
|
|
|
|
ret->s6_addr[9] = link->mac.ether_addr_octet[1];
|
|
|
|
ret->s6_addr[10] = link->mac.ether_addr_octet[2];
|
|
|
|
ret->s6_addr[11] = 0xff;
|
|
|
|
ret->s6_addr[12] = 0xfe;
|
|
|
|
ret->s6_addr[13] = link->mac.ether_addr_octet[3];
|
|
|
|
ret->s6_addr[14] = link->mac.ether_addr_octet[4];
|
|
|
|
ret->s6_addr[15] = link->mac.ether_addr_octet[5];
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-09-21 15:53:40 +02:00
|
|
|
int address_new(Address **ret) {
|
tree-wide: drop redundant _cleanup_ macros (#8810)
This drops a good number of type-specific _cleanup_ macros, and patches
all users to just use the generic ones.
In most recent code we abstained from defining type-specific macros, and
this basically removes all those added already, with the exception of
the really low-level ones.
Having explicit macros for this is not too useful, as the expression
without the extra macro is generally just 2ch wider. We should generally
emphesize generic code, unless there are really good reasons for
specific code, hence let's follow this in this case too.
Note that _cleanup_free_ and similar really low-level, libc'ish, Linux
API'ish macros continue to be defined, only the really high-level OO
ones are dropped. From now on this should really be the rule: for really
low-level stuff, such as memory allocation, fd handling and so one, go
ahead and define explicit per-type macros, but for high-level, specific
program code, just use the generic _cleanup_() macro directly, in order
to keep things simple and as readable as possible for the uninitiated.
Note that before this patch some of the APIs (notable libudev ones) were
already used with the high-level macros at some places and with the
generic _cleanup_ macro at others. With this patch we hence unify on the
latter.
2018-04-25 12:31:45 +02:00
|
|
|
_cleanup_(address_freep) Address *address = NULL;
|
2015-09-21 15:53:40 +02:00
|
|
|
|
2018-11-12 06:55:52 +01:00
|
|
|
address = new(Address, 1);
|
2015-09-21 15:53:40 +02:00
|
|
|
if (!address)
|
|
|
|
return -ENOMEM;
|
2014-04-02 21:31:12 +02:00
|
|
|
|
2018-11-12 06:55:52 +01:00
|
|
|
*address = (Address) {
|
|
|
|
.family = AF_UNSPEC,
|
|
|
|
.scope = RT_SCOPE_UNIVERSE,
|
|
|
|
.cinfo.ifa_prefered = CACHE_INFO_INFINITY_LIFE_TIME,
|
|
|
|
.cinfo.ifa_valid = CACHE_INFO_INFINITY_LIFE_TIME,
|
2019-11-21 16:54:52 +01:00
|
|
|
.duplicate_address_detection = ADDRESS_FAMILY_IPV6,
|
2019-12-07 16:32:36 +01:00
|
|
|
.prefix_route = true,
|
2018-11-12 06:55:52 +01:00
|
|
|
};
|
2015-09-21 15:53:40 +02:00
|
|
|
|
2018-04-05 07:26:26 +02:00
|
|
|
*ret = TAKE_PTR(address);
|
2015-09-21 15:53:40 +02:00
|
|
|
|
|
|
|
return 0;
|
2014-04-02 21:31:12 +02:00
|
|
|
}
|
|
|
|
|
2019-03-01 05:19:53 +01:00
|
|
|
static int address_new_static(Network *network, const char *filename, unsigned section_line, Address **ret) {
|
tree-wide: drop redundant _cleanup_ macros (#8810)
This drops a good number of type-specific _cleanup_ macros, and patches
all users to just use the generic ones.
In most recent code we abstained from defining type-specific macros, and
this basically removes all those added already, with the exception of
the really low-level ones.
Having explicit macros for this is not too useful, as the expression
without the extra macro is generally just 2ch wider. We should generally
emphesize generic code, unless there are really good reasons for
specific code, hence let's follow this in this case too.
Note that _cleanup_free_ and similar really low-level, libc'ish, Linux
API'ish macros continue to be defined, only the really high-level OO
ones are dropped. From now on this should really be the rule: for really
low-level stuff, such as memory allocation, fd handling and so one, go
ahead and define explicit per-type macros, but for high-level, specific
program code, just use the generic _cleanup_() macro directly, in order
to keep things simple and as readable as possible for the uninitiated.
Note that before this patch some of the APIs (notable libudev ones) were
already used with the high-level macros at some places and with the
generic _cleanup_ macro at others. With this patch we hence unify on the
latter.
2018-04-25 12:31:45 +02:00
|
|
|
_cleanup_(network_config_section_freep) NetworkConfigSection *n = NULL;
|
|
|
|
_cleanup_(address_freep) Address *address = NULL;
|
2015-09-21 15:53:40 +02:00
|
|
|
int r;
|
2013-10-17 03:18:36 +02:00
|
|
|
|
2016-06-03 19:14:12 +02:00
|
|
|
assert(network);
|
|
|
|
assert(ret);
|
2017-02-17 15:34:25 +01:00
|
|
|
assert(!!filename == (section_line > 0));
|
2016-06-03 19:14:12 +02:00
|
|
|
|
2017-02-17 15:34:25 +01:00
|
|
|
if (filename) {
|
2017-02-15 05:30:35 +01:00
|
|
|
r = network_config_section_new(filename, section_line, &n);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
address = hashmap_get(network->addresses_by_section, n);
|
2013-11-19 16:54:42 +01:00
|
|
|
if (address) {
|
2018-04-05 07:26:26 +02:00
|
|
|
*ret = TAKE_PTR(address);
|
2013-11-19 16:54:42 +01:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-06-03 19:14:12 +02:00
|
|
|
if (network->n_static_addresses >= STATIC_ADDRESSES_PER_NETWORK_MAX)
|
|
|
|
return -E2BIG;
|
|
|
|
|
2015-09-21 15:53:40 +02:00
|
|
|
r = address_new(&address);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2014-01-28 20:00:47 +01:00
|
|
|
|
2018-11-12 06:57:04 +01:00
|
|
|
address->network = network;
|
|
|
|
LIST_APPEND(addresses, network->static_addresses, address);
|
|
|
|
network->n_static_addresses++;
|
|
|
|
|
2017-02-17 15:34:25 +01:00
|
|
|
if (filename) {
|
2018-04-05 07:26:26 +02:00
|
|
|
address->section = TAKE_PTR(n);
|
2017-02-22 06:25:03 +01:00
|
|
|
|
2018-11-12 07:24:11 +01:00
|
|
|
r = hashmap_ensure_allocated(&network->addresses_by_section, &network_config_hash_ops);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
2017-02-22 06:41:28 +01:00
|
|
|
r = hashmap_put(network->addresses_by_section, address->section, address);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2013-11-19 16:54:42 +01:00
|
|
|
}
|
|
|
|
|
2018-04-05 07:26:26 +02:00
|
|
|
*ret = TAKE_PTR(address);
|
2013-10-17 03:18:36 +02:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void address_free(Address *address) {
|
|
|
|
if (!address)
|
|
|
|
return;
|
|
|
|
|
2014-01-01 15:16:10 +01:00
|
|
|
if (address->network) {
|
2014-05-15 20:10:33 +02:00
|
|
|
LIST_REMOVE(addresses, address->network->static_addresses, address);
|
2016-06-03 19:14:12 +02:00
|
|
|
assert(address->network->n_static_addresses > 0);
|
|
|
|
address->network->n_static_addresses--;
|
2013-10-17 03:18:36 +02:00
|
|
|
|
2018-11-03 07:44:34 +01:00
|
|
|
if (address->section)
|
2017-02-15 05:30:35 +01:00
|
|
|
hashmap_remove(address->network->addresses_by_section, address->section);
|
2014-01-01 15:16:10 +01:00
|
|
|
}
|
2013-11-19 16:54:42 +01:00
|
|
|
|
2019-11-21 16:54:52 +01:00
|
|
|
if (address->link && !address->acd) {
|
2015-09-23 01:53:29 +02:00
|
|
|
set_remove(address->link->addresses, address);
|
2015-09-30 14:01:44 +02:00
|
|
|
set_remove(address->link->addresses_foreign, address);
|
2020-07-21 16:06:51 +02:00
|
|
|
if (address->link->dhcp_address == address)
|
|
|
|
address->link->dhcp_address = NULL;
|
|
|
|
if (address->link->dhcp_address_old == address)
|
|
|
|
address->link->dhcp_address_old = NULL;
|
2020-07-22 20:13:42 +02:00
|
|
|
set_remove(address->link->dhcp6_addresses, address);
|
|
|
|
set_remove(address->link->dhcp6_addresses_old, address);
|
|
|
|
set_remove(address->link->dhcp6_pd_addresses, address);
|
|
|
|
set_remove(address->link->dhcp6_pd_addresses_old, address);
|
2020-07-22 04:55:07 +02:00
|
|
|
set_remove(address->link->ndisc_addresses, address);
|
|
|
|
set_remove(address->link->ndisc_addresses_old, address);
|
2016-05-18 14:49:40 +02:00
|
|
|
|
|
|
|
if (in_addr_equal(AF_INET6, &address->in_addr, (const union in_addr_union *) &address->link->ipv6ll_address))
|
|
|
|
memzero(&address->link->ipv6ll_address, sizeof(struct in6_addr));
|
2015-09-30 14:01:44 +02:00
|
|
|
}
|
2015-09-23 01:53:29 +02:00
|
|
|
|
2019-11-21 16:54:52 +01:00
|
|
|
sd_ipv4acd_unref(address->acd);
|
|
|
|
|
2018-11-03 07:44:34 +01:00
|
|
|
network_config_section_free(address->section);
|
|
|
|
free(address->label);
|
2013-10-17 03:18:36 +02:00
|
|
|
free(address);
|
|
|
|
}
|
|
|
|
|
2019-09-17 19:09:57 +02:00
|
|
|
static uint32_t address_prefix(const Address *a) {
|
|
|
|
assert(a);
|
|
|
|
|
|
|
|
/* make sure we don't try to shift by 32.
|
|
|
|
* See ISO/IEC 9899:TC3 § 6.5.7.3. */
|
|
|
|
if (a->prefixlen == 0)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (a->in_addr_peer.in.s_addr != 0)
|
|
|
|
return be32toh(a->in_addr_peer.in.s_addr) >> (32 - a->prefixlen);
|
|
|
|
else
|
|
|
|
return be32toh(a->in_addr.in.s_addr) >> (32 - a->prefixlen);
|
|
|
|
}
|
|
|
|
|
2018-11-27 14:25:20 +01:00
|
|
|
static void address_hash_func(const Address *a, struct siphash *state) {
|
2015-09-22 17:54:27 +02:00
|
|
|
assert(a);
|
|
|
|
|
|
|
|
siphash24_compress(&a->family, sizeof(a->family), state);
|
|
|
|
|
|
|
|
switch (a->family) {
|
|
|
|
case AF_INET:
|
|
|
|
siphash24_compress(&a->prefixlen, sizeof(a->prefixlen), state);
|
|
|
|
|
|
|
|
/* peer prefix */
|
2019-09-17 19:09:57 +02:00
|
|
|
uint32_t prefix = address_prefix(a);
|
|
|
|
siphash24_compress(&prefix, sizeof(prefix), state);
|
2015-09-22 17:54:27 +02:00
|
|
|
|
2017-11-19 19:06:10 +01:00
|
|
|
_fallthrough_;
|
2015-09-22 17:54:27 +02:00
|
|
|
case AF_INET6:
|
|
|
|
/* local address */
|
|
|
|
siphash24_compress(&a->in_addr, FAMILY_ADDRESS_SIZE(a->family), state);
|
|
|
|
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
/* treat any other address family as AF_UNSPEC */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-11-27 14:25:20 +01:00
|
|
|
static int address_compare_func(const Address *a1, const Address *a2) {
|
2018-08-03 01:43:37 +02:00
|
|
|
int r;
|
2015-09-22 17:54:27 +02:00
|
|
|
|
2018-08-03 01:43:37 +02:00
|
|
|
r = CMP(a1->family, a2->family);
|
|
|
|
if (r != 0)
|
|
|
|
return r;
|
2015-09-22 17:54:27 +02:00
|
|
|
|
|
|
|
switch (a1->family) {
|
|
|
|
/* use the same notion of equality as the kernel does */
|
|
|
|
case AF_INET:
|
2018-08-03 01:43:37 +02:00
|
|
|
r = CMP(a1->prefixlen, a2->prefixlen);
|
|
|
|
if (r != 0)
|
|
|
|
return r;
|
2015-09-22 17:54:27 +02:00
|
|
|
|
2019-09-17 19:09:57 +02:00
|
|
|
uint32_t prefix1 = address_prefix(a1);
|
|
|
|
uint32_t prefix2 = address_prefix(a2);
|
|
|
|
r = CMP(prefix1, prefix2);
|
|
|
|
if (r != 0)
|
|
|
|
return r;
|
2015-09-22 17:54:27 +02:00
|
|
|
|
2017-11-19 19:06:10 +01:00
|
|
|
_fallthrough_;
|
2015-09-22 17:54:27 +02:00
|
|
|
case AF_INET6:
|
|
|
|
return memcmp(&a1->in_addr, &a2->in_addr, FAMILY_ADDRESS_SIZE(a1->family));
|
|
|
|
default:
|
|
|
|
/* treat any other address family as AF_UNSPEC */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-22 01:22:55 +02:00
|
|
|
DEFINE_HASH_OPS_WITH_KEY_DESTRUCTOR(address_hash_ops, Address, address_hash_func, address_compare_func, address_free);
|
2015-09-22 17:54:27 +02:00
|
|
|
|
|
|
|
bool address_equal(Address *a1, Address *a2) {
|
|
|
|
if (a1 == a2)
|
|
|
|
return true;
|
|
|
|
|
|
|
|
if (!a1 || !a2)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
return address_compare_func(a1, a2) == 0;
|
|
|
|
}
|
|
|
|
|
2015-09-24 15:25:20 +02:00
|
|
|
static int address_establish(Address *address, Link *link) {
|
|
|
|
bool masq;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(address);
|
|
|
|
assert(link);
|
|
|
|
|
|
|
|
masq = link->network &&
|
2015-09-30 14:07:12 +02:00
|
|
|
link->network->ip_masquerade &&
|
|
|
|
address->family == AF_INET &&
|
|
|
|
address->scope < RT_SCOPE_LINK;
|
2015-09-24 15:25:20 +02:00
|
|
|
|
|
|
|
/* Add firewall entry if this is requested */
|
|
|
|
if (address->ip_masquerade_done != masq) {
|
|
|
|
union in_addr_union masked = address->in_addr;
|
|
|
|
in_addr_mask(address->family, &masked, address->prefixlen);
|
|
|
|
|
|
|
|
r = fw_add_masquerade(masq, AF_INET, 0, &masked, address->prefixlen, NULL, NULL, 0);
|
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return r;
|
2015-09-24 15:25:20 +02:00
|
|
|
|
|
|
|
address->ip_masquerade_done = masq;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-09-30 14:01:44 +02:00
|
|
|
static int address_add_internal(Link *link, Set **addresses,
|
|
|
|
int family,
|
|
|
|
const union in_addr_union *in_addr,
|
|
|
|
unsigned char prefixlen,
|
|
|
|
Address **ret) {
|
tree-wide: drop redundant _cleanup_ macros (#8810)
This drops a good number of type-specific _cleanup_ macros, and patches
all users to just use the generic ones.
In most recent code we abstained from defining type-specific macros, and
this basically removes all those added already, with the exception of
the really low-level ones.
Having explicit macros for this is not too useful, as the expression
without the extra macro is generally just 2ch wider. We should generally
emphesize generic code, unless there are really good reasons for
specific code, hence let's follow this in this case too.
Note that _cleanup_free_ and similar really low-level, libc'ish, Linux
API'ish macros continue to be defined, only the really high-level OO
ones are dropped. From now on this should really be the rule: for really
low-level stuff, such as memory allocation, fd handling and so one, go
ahead and define explicit per-type macros, but for high-level, specific
program code, just use the generic _cleanup_() macro directly, in order
to keep things simple and as readable as possible for the uninitiated.
Note that before this patch some of the APIs (notable libudev ones) were
already used with the high-level macros at some places and with the
generic _cleanup_ macro at others. With this patch we hence unify on the
latter.
2018-04-25 12:31:45 +02:00
|
|
|
_cleanup_(address_freep) Address *address = NULL;
|
2015-09-23 01:53:29 +02:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(link);
|
2015-09-30 14:01:44 +02:00
|
|
|
assert(addresses);
|
2015-09-24 01:22:05 +02:00
|
|
|
assert(in_addr);
|
|
|
|
|
|
|
|
r = address_new(&address);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
address->family = family;
|
|
|
|
address->in_addr = *in_addr;
|
|
|
|
address->prefixlen = prefixlen;
|
2015-11-10 13:52:34 +01:00
|
|
|
/* Consider address tentative until we get the real flags from the kernel */
|
|
|
|
address->flags = IFA_F_TENTATIVE;
|
2015-09-23 01:53:29 +02:00
|
|
|
|
2020-06-05 15:12:29 +02:00
|
|
|
r = set_ensure_put(addresses, &address_hash_ops, address);
|
2015-09-23 01:53:29 +02:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2019-08-11 01:56:37 +02:00
|
|
|
if (r == 0)
|
|
|
|
return -EEXIST;
|
2015-09-23 01:53:29 +02:00
|
|
|
|
|
|
|
address->link = link;
|
|
|
|
|
2015-09-30 14:01:44 +02:00
|
|
|
if (ret)
|
|
|
|
*ret = address;
|
2020-06-05 15:12:29 +02:00
|
|
|
TAKE_PTR(address);
|
2015-09-23 01:53:29 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-09-30 14:01:44 +02:00
|
|
|
int address_add_foreign(Link *link, int family, const union in_addr_union *in_addr, unsigned char prefixlen, Address **ret) {
|
|
|
|
return address_add_internal(link, &link->addresses_foreign, family, in_addr, prefixlen, ret);
|
|
|
|
}
|
|
|
|
|
2015-10-01 21:14:06 +02:00
|
|
|
int address_add(Link *link, int family, const union in_addr_union *in_addr, unsigned char prefixlen, Address **ret) {
|
2015-10-26 11:40:02 +01:00
|
|
|
Address *address;
|
2015-09-30 15:32:16 +02:00
|
|
|
int r;
|
|
|
|
|
2015-10-26 11:40:02 +01:00
|
|
|
r = address_get(link, family, in_addr, prefixlen, &address);
|
|
|
|
if (r == -ENOENT) {
|
|
|
|
/* Address does not exist, create a new one */
|
|
|
|
r = address_add_internal(link, &link->addresses, family, in_addr, prefixlen, &address);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
} else if (r == 0) {
|
|
|
|
/* Take over a foreign address */
|
2020-06-05 15:12:29 +02:00
|
|
|
r = set_ensure_put(&link->addresses, &address_hash_ops, address);
|
2015-10-26 11:40:02 +01:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
set_remove(link->addresses_foreign, address);
|
|
|
|
} else if (r == 1) {
|
|
|
|
/* Already exists, do nothing */
|
|
|
|
;
|
|
|
|
} else
|
2015-09-30 15:32:16 +02:00
|
|
|
return r;
|
|
|
|
|
2015-10-26 11:40:02 +01:00
|
|
|
if (ret)
|
|
|
|
*ret = address;
|
2015-09-30 15:32:16 +02:00
|
|
|
|
|
|
|
return 0;
|
2015-09-30 14:01:44 +02:00
|
|
|
}
|
|
|
|
|
2015-09-30 14:07:12 +02:00
|
|
|
static int address_release(Address *address) {
|
2015-01-13 13:47:08 +01:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(address);
|
2015-09-30 14:07:12 +02:00
|
|
|
assert(address->link);
|
2015-01-13 13:47:08 +01:00
|
|
|
|
2015-09-24 15:25:20 +02:00
|
|
|
/* Remove masquerading firewall entry if it was added */
|
|
|
|
if (address->ip_masquerade_done) {
|
2015-01-13 13:47:08 +01:00
|
|
|
union in_addr_union masked = address->in_addr;
|
|
|
|
in_addr_mask(address->family, &masked, address->prefixlen);
|
|
|
|
|
2015-09-24 15:25:20 +02:00
|
|
|
r = fw_add_masquerade(false, AF_INET, 0, &masked, address->prefixlen, NULL, NULL, 0);
|
2015-01-13 13:47:08 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return r;
|
2015-01-13 13:47:08 +01:00
|
|
|
|
2015-09-24 15:25:20 +02:00
|
|
|
address->ip_masquerade_done = false;
|
2015-01-13 13:47:08 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-06-03 19:54:35 +02:00
|
|
|
int address_update(
|
|
|
|
Address *address,
|
|
|
|
unsigned char flags,
|
|
|
|
unsigned char scope,
|
|
|
|
const struct ifa_cacheinfo *cinfo) {
|
|
|
|
|
2015-09-28 17:16:12 +02:00
|
|
|
bool ready;
|
2015-11-10 21:30:59 +01:00
|
|
|
int r;
|
2015-09-28 17:16:12 +02:00
|
|
|
|
|
|
|
assert(address);
|
|
|
|
assert(cinfo);
|
networkd: do not update state or IPv6LL address if link is failed or lingering
This is partial fix for #2228 and #2977, #3204.
bridge-test: netdev ready
docker0: Gained IPv6LL
wlan0: Gained IPv6LL
eth0: Gained IPv6LL
Enumeration completed
bridge-test: netdev exists, using existing without changing its
parameters
vboxnet0: IPv6 enabled for interface: Success
lo: Configured
docker0: Could not drop address: No such process
vboxnet0: Gained carrier
wlan0: Could not drop address: No such process
eth0: Could not drop address: No such process
eth0: Could not drop address: No such process
eth0: Could not drop address: No such process
vboxnet0: Gained IPv6LL
vboxnet0: Could not set NDisc route or address: Invalid argument
vboxnet0: Failed
[New Thread 0x7ffff6505700 (LWP 1111)]
[Thread 0x7ffff6505700 (LWP 1111) exited]
Assertion 'link->state == LINK_STATE_SETTING_ROUTES' failed at
src/network/networkd-link.c:672, function link_enter_configured().
Aborting.
Program received signal SIGABRT, Aborted.
0x00007ffff6dc6a98 in raise () from /lib64/libc.so.6
Missing separate debuginfos, use: dnf debuginfo-install
iptables-1.4.21-15.fc23.x86_64 libattr-2.4.47-14.fc23.x86_64
libidn-1.32-1.fc23.x86_64 pcre-8.38-7.fc23.x86_64
Debugging
(gdb) bt
"link->state == LINK_STATE_SETTING_ROUTES", file=0x5555556a34c8
"src/network/networkd-link.c", line=672,
func=0x5555556a56d0 <__PRETTY_FUNCTION__.14850>
"link_enter_configured") at src/basic/log.c:788
src/network/networkd-link.c:672
src/network/networkd-link.c:720
flags=0 '\000', scope=0 '\000', cinfo=0x7fffffffe020) at
src/network/networkd-address.c:344
(rtnl=0x5555556eded0, message=0x55555570ff20, userdata=0x5555556ec590)
at src/network/networkd-manager.c:604
m=0x55555570ff20) at src/libsystemd/sd-netlink/sd-netlink.c:365
at src/libsystemd/sd-netlink/sd-netlink.c:395
ret=0x0) at src/libsystemd/sd-netlink/sd-netlink.c:429
revents=1, userdata=0x5555556eded0) at
src/libsystemd/sd-netlink/sd-netlink.c:723
src/libsystemd/sd-event/sd-event.c:2268
src/libsystemd/sd-event/sd-event.c:2629
timeout=18446744073709551615) at src/libsystemd/sd-event/sd-event.c:2688
bus=0x5555556eeba0, name=0x55555568a2f5 "org.freedesktop.network1",
timeout=30000000,
check_idle=0x55555556adb6 <manager_check_idle>,
userdata=0x5555556ec590) at src/shared/bus-util.c:134
src/network/networkd-manager.c:1130
src/network/networkd.c:127
(gdb) f 3
src/network/networkd-link.c:672
672 assert(link->state == LINK_STATE_SETTING_ROUTES);
(gdb) p link->state
$1 = LINK_STATE_FAILED
We should not be in this state .
even if vboxnet0 failed we went into this state.
vboxnet0: Could not set NDisc route or address: Invalid argument
vboxnet0: Failed
2016-05-18 04:59:56 +02:00
|
|
|
assert_return(address->link, 1);
|
|
|
|
|
|
|
|
if (IN_SET(address->link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
|
|
|
|
return 1;
|
2015-09-28 17:16:12 +02:00
|
|
|
|
|
|
|
ready = address_is_ready(address);
|
|
|
|
|
|
|
|
address->flags = flags;
|
|
|
|
address->scope = scope;
|
|
|
|
address->cinfo = *cinfo;
|
|
|
|
|
2019-02-12 22:32:48 +01:00
|
|
|
link_update_operstate(address->link, true);
|
2018-12-21 07:52:33 +01:00
|
|
|
link_check_ready(address->link);
|
networkd: do not update state or IPv6LL address if link is failed or lingering
This is partial fix for #2228 and #2977, #3204.
bridge-test: netdev ready
docker0: Gained IPv6LL
wlan0: Gained IPv6LL
eth0: Gained IPv6LL
Enumeration completed
bridge-test: netdev exists, using existing without changing its
parameters
vboxnet0: IPv6 enabled for interface: Success
lo: Configured
docker0: Could not drop address: No such process
vboxnet0: Gained carrier
wlan0: Could not drop address: No such process
eth0: Could not drop address: No such process
eth0: Could not drop address: No such process
eth0: Could not drop address: No such process
vboxnet0: Gained IPv6LL
vboxnet0: Could not set NDisc route or address: Invalid argument
vboxnet0: Failed
[New Thread 0x7ffff6505700 (LWP 1111)]
[Thread 0x7ffff6505700 (LWP 1111) exited]
Assertion 'link->state == LINK_STATE_SETTING_ROUTES' failed at
src/network/networkd-link.c:672, function link_enter_configured().
Aborting.
Program received signal SIGABRT, Aborted.
0x00007ffff6dc6a98 in raise () from /lib64/libc.so.6
Missing separate debuginfos, use: dnf debuginfo-install
iptables-1.4.21-15.fc23.x86_64 libattr-2.4.47-14.fc23.x86_64
libidn-1.32-1.fc23.x86_64 pcre-8.38-7.fc23.x86_64
Debugging
(gdb) bt
"link->state == LINK_STATE_SETTING_ROUTES", file=0x5555556a34c8
"src/network/networkd-link.c", line=672,
func=0x5555556a56d0 <__PRETTY_FUNCTION__.14850>
"link_enter_configured") at src/basic/log.c:788
src/network/networkd-link.c:672
src/network/networkd-link.c:720
flags=0 '\000', scope=0 '\000', cinfo=0x7fffffffe020) at
src/network/networkd-address.c:344
(rtnl=0x5555556eded0, message=0x55555570ff20, userdata=0x5555556ec590)
at src/network/networkd-manager.c:604
m=0x55555570ff20) at src/libsystemd/sd-netlink/sd-netlink.c:365
at src/libsystemd/sd-netlink/sd-netlink.c:395
ret=0x0) at src/libsystemd/sd-netlink/sd-netlink.c:429
revents=1, userdata=0x5555556eded0) at
src/libsystemd/sd-netlink/sd-netlink.c:723
src/libsystemd/sd-event/sd-event.c:2268
src/libsystemd/sd-event/sd-event.c:2629
timeout=18446744073709551615) at src/libsystemd/sd-event/sd-event.c:2688
bus=0x5555556eeba0, name=0x55555568a2f5 "org.freedesktop.network1",
timeout=30000000,
check_idle=0x55555556adb6 <manager_check_idle>,
userdata=0x5555556ec590) at src/shared/bus-util.c:134
src/network/networkd-manager.c:1130
src/network/networkd.c:127
(gdb) f 3
src/network/networkd-link.c:672
672 assert(link->state == LINK_STATE_SETTING_ROUTES);
(gdb) p link->state
$1 = LINK_STATE_FAILED
We should not be in this state .
even if vboxnet0 failed we went into this state.
vboxnet0: Could not set NDisc route or address: Invalid argument
vboxnet0: Failed
2016-05-18 04:59:56 +02:00
|
|
|
|
2020-07-21 16:02:35 +02:00
|
|
|
if (!ready && address_is_ready(address)) {
|
|
|
|
if (address->callback) {
|
|
|
|
r = address->callback(address);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
}
|
networkd: do not update state or IPv6LL address if link is failed or lingering
This is partial fix for #2228 and #2977, #3204.
bridge-test: netdev ready
docker0: Gained IPv6LL
wlan0: Gained IPv6LL
eth0: Gained IPv6LL
Enumeration completed
bridge-test: netdev exists, using existing without changing its
parameters
vboxnet0: IPv6 enabled for interface: Success
lo: Configured
docker0: Could not drop address: No such process
vboxnet0: Gained carrier
wlan0: Could not drop address: No such process
eth0: Could not drop address: No such process
eth0: Could not drop address: No such process
eth0: Could not drop address: No such process
vboxnet0: Gained IPv6LL
vboxnet0: Could not set NDisc route or address: Invalid argument
vboxnet0: Failed
[New Thread 0x7ffff6505700 (LWP 1111)]
[Thread 0x7ffff6505700 (LWP 1111) exited]
Assertion 'link->state == LINK_STATE_SETTING_ROUTES' failed at
src/network/networkd-link.c:672, function link_enter_configured().
Aborting.
Program received signal SIGABRT, Aborted.
0x00007ffff6dc6a98 in raise () from /lib64/libc.so.6
Missing separate debuginfos, use: dnf debuginfo-install
iptables-1.4.21-15.fc23.x86_64 libattr-2.4.47-14.fc23.x86_64
libidn-1.32-1.fc23.x86_64 pcre-8.38-7.fc23.x86_64
Debugging
(gdb) bt
"link->state == LINK_STATE_SETTING_ROUTES", file=0x5555556a34c8
"src/network/networkd-link.c", line=672,
func=0x5555556a56d0 <__PRETTY_FUNCTION__.14850>
"link_enter_configured") at src/basic/log.c:788
src/network/networkd-link.c:672
src/network/networkd-link.c:720
flags=0 '\000', scope=0 '\000', cinfo=0x7fffffffe020) at
src/network/networkd-address.c:344
(rtnl=0x5555556eded0, message=0x55555570ff20, userdata=0x5555556ec590)
at src/network/networkd-manager.c:604
m=0x55555570ff20) at src/libsystemd/sd-netlink/sd-netlink.c:365
at src/libsystemd/sd-netlink/sd-netlink.c:395
ret=0x0) at src/libsystemd/sd-netlink/sd-netlink.c:429
revents=1, userdata=0x5555556eded0) at
src/libsystemd/sd-netlink/sd-netlink.c:723
src/libsystemd/sd-event/sd-event.c:2268
src/libsystemd/sd-event/sd-event.c:2629
timeout=18446744073709551615) at src/libsystemd/sd-event/sd-event.c:2688
bus=0x5555556eeba0, name=0x55555568a2f5 "org.freedesktop.network1",
timeout=30000000,
check_idle=0x55555556adb6 <manager_check_idle>,
userdata=0x5555556ec590) at src/shared/bus-util.c:134
src/network/networkd-manager.c:1130
src/network/networkd.c:127
(gdb) f 3
src/network/networkd-link.c:672
672 assert(link->state == LINK_STATE_SETTING_ROUTES);
(gdb) p link->state
$1 = LINK_STATE_FAILED
We should not be in this state .
even if vboxnet0 failed we went into this state.
vboxnet0: Could not set NDisc route or address: Invalid argument
vboxnet0: Failed
2016-05-18 04:59:56 +02:00
|
|
|
|
2020-07-21 16:02:35 +02:00
|
|
|
if (address->family == AF_INET6 &&
|
|
|
|
in_addr_is_link_local(AF_INET6, &address->in_addr) > 0 &&
|
|
|
|
IN6_IS_ADDR_UNSPECIFIED(&address->link->ipv6ll_address) > 0) {
|
|
|
|
|
|
|
|
r = link_ipv6ll_gained(address->link, &address->in_addr.in6);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
}
|
2015-10-27 00:06:10 +01:00
|
|
|
}
|
2015-09-28 17:16:12 +02:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-09-24 15:25:20 +02:00
|
|
|
int address_drop(Address *address) {
|
2015-09-28 13:38:43 +02:00
|
|
|
Link *link;
|
|
|
|
bool ready;
|
2019-03-11 06:30:45 +01:00
|
|
|
int r;
|
2015-09-28 13:38:43 +02:00
|
|
|
|
2015-01-13 13:47:08 +01:00
|
|
|
assert(address);
|
2015-09-24 15:25:20 +02:00
|
|
|
|
2015-09-28 13:38:43 +02:00
|
|
|
ready = address_is_ready(address);
|
|
|
|
link = address->link;
|
|
|
|
|
2019-03-11 06:30:45 +01:00
|
|
|
r = address_release(address);
|
|
|
|
if (r < 0)
|
|
|
|
log_link_warning_errno(link, r, "Failed to disable IP masquerading, ignoring: %m");
|
|
|
|
|
2015-09-24 15:25:20 +02:00
|
|
|
address_free(address);
|
|
|
|
|
2019-02-12 22:32:48 +01:00
|
|
|
link_update_operstate(link, true);
|
2015-09-30 18:17:43 +02:00
|
|
|
|
2015-09-28 13:38:43 +02:00
|
|
|
if (link && !ready)
|
|
|
|
link_check_ready(link);
|
|
|
|
|
2015-09-24 15:25:20 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-06-03 19:51:48 +02:00
|
|
|
int address_get(Link *link,
|
|
|
|
int family,
|
|
|
|
const union in_addr_union *in_addr,
|
|
|
|
unsigned char prefixlen,
|
|
|
|
Address **ret) {
|
|
|
|
|
|
|
|
Address address, *existing;
|
2015-09-24 15:25:20 +02:00
|
|
|
|
2015-01-13 13:47:08 +01:00
|
|
|
assert(link);
|
2015-09-24 15:25:20 +02:00
|
|
|
assert(in_addr);
|
2015-01-13 13:47:08 +01:00
|
|
|
|
2016-06-03 19:51:48 +02:00
|
|
|
address = (Address) {
|
|
|
|
.family = family,
|
|
|
|
.in_addr = *in_addr,
|
|
|
|
.prefixlen = prefixlen,
|
|
|
|
};
|
2015-01-13 13:47:08 +01:00
|
|
|
|
2015-09-24 15:25:20 +02:00
|
|
|
existing = set_get(link->addresses, &address);
|
2015-10-26 11:40:02 +01:00
|
|
|
if (existing) {
|
2016-06-03 19:51:48 +02:00
|
|
|
if (ret)
|
|
|
|
*ret = existing;
|
2015-10-26 11:40:02 +01:00
|
|
|
return 1;
|
2015-09-30 14:01:44 +02:00
|
|
|
}
|
2015-01-13 13:47:08 +01:00
|
|
|
|
2016-06-03 19:51:48 +02:00
|
|
|
existing = set_get(link->addresses_foreign, &address);
|
|
|
|
if (existing) {
|
|
|
|
if (ret)
|
|
|
|
*ret = existing;
|
|
|
|
return 0;
|
|
|
|
}
|
2015-01-13 13:47:08 +01:00
|
|
|
|
2016-06-03 19:51:48 +02:00
|
|
|
return -ENOENT;
|
2015-01-13 13:47:08 +01:00
|
|
|
}
|
|
|
|
|
2020-07-17 22:42:59 +02:00
|
|
|
static bool address_exists_internal(Set *addresses, int family, const union in_addr_union *in_addr) {
|
|
|
|
Address *address;
|
|
|
|
Iterator i;
|
|
|
|
|
|
|
|
SET_FOREACH(address, addresses, i) {
|
|
|
|
if (address->family != family)
|
|
|
|
continue;
|
|
|
|
if (in_addr_equal(address->family, &address->in_addr, in_addr))
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool address_exists(Link *link, int family, const union in_addr_union *in_addr) {
|
|
|
|
assert(link);
|
|
|
|
assert(IN_SET(family, AF_INET, AF_INET6));
|
|
|
|
assert(in_addr);
|
|
|
|
|
|
|
|
if (address_exists_internal(link->addresses, family, in_addr))
|
|
|
|
return true;
|
|
|
|
if (address_exists_internal(link->addresses_foreign, family, in_addr))
|
|
|
|
return true;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2018-11-28 21:06:52 +01:00
|
|
|
static int address_remove_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
|
2018-11-28 21:22:08 +01:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(m);
|
|
|
|
assert(link);
|
|
|
|
assert(link->ifname);
|
|
|
|
|
|
|
|
if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
r = sd_netlink_message_get_errno(m);
|
|
|
|
if (r < 0 && r != -EADDRNOTAVAIL)
|
2019-11-30 07:54:07 +01:00
|
|
|
log_link_message_warning_errno(link, m, r, "Could not drop address");
|
2020-07-14 19:00:06 +02:00
|
|
|
else
|
|
|
|
(void) manager_rtnl_process_address(rtnl, m, link->manager);
|
2018-11-28 21:22:08 +01:00
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2016-05-15 16:22:40 +02:00
|
|
|
int address_remove(
|
|
|
|
Address *address,
|
|
|
|
Link *link,
|
2018-11-28 21:06:52 +01:00
|
|
|
link_netlink_message_handler_t callback) {
|
2016-05-15 16:22:40 +02:00
|
|
|
|
tree-wide: expose "p"-suffix unref calls in public APIs to make gcc cleanup easy
GLIB has recently started to officially support the gcc cleanup
attribute in its public API, hence let's do the same for our APIs.
With this patch we'll define an xyz_unrefp() call for each public
xyz_unref() call, to make it easy to use inside a
__attribute__((cleanup())) expression. Then, all code is ported over to
make use of this.
The new calls are also documented in the man pages, with examples how to
use them (well, I only added docs where the _unref() call itself already
had docs, and the examples, only cover sd_bus_unrefp() and
sd_event_unrefp()).
This also renames sd_lldp_free() to sd_lldp_unref(), since that's how we
tend to call our destructors these days.
Note that this defines no public macro that wraps gcc's attribute and
makes it easier to use. While I think it's our duty in the library to
make our stuff easy to use, I figure it's not our duty to make gcc's own
features easy to use on its own. Most likely, client code which wants to
make use of this should define its own:
#define _cleanup_(function) __attribute__((cleanup(function)))
Or similar, to make the gcc feature easier to use.
Making this logic public has the benefit that we can remove three header
files whose only purpose was to define these functions internally.
See #2008.
2015-11-27 19:13:45 +01:00
|
|
|
_cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
|
2013-12-31 17:31:50 +01:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(address);
|
2017-10-04 16:01:32 +02:00
|
|
|
assert(IN_SET(address->family, AF_INET, AF_INET6));
|
2013-12-31 17:31:50 +01:00
|
|
|
assert(link);
|
|
|
|
assert(link->ifindex > 0);
|
|
|
|
assert(link->manager);
|
|
|
|
assert(link->manager->rtnl);
|
|
|
|
|
2018-10-31 13:33:54 +01:00
|
|
|
if (DEBUG_LOGGING) {
|
2019-03-11 06:30:45 +01:00
|
|
|
_cleanup_free_ char *b = NULL;
|
|
|
|
|
|
|
|
(void) in_addr_to_string(address->family, &address->in_addr, &b);
|
|
|
|
log_link_debug(link, "Removing address %s", strna(b));
|
2018-10-31 13:33:54 +01:00
|
|
|
}
|
|
|
|
|
2014-02-19 23:54:58 +01:00
|
|
|
r = sd_rtnl_message_new_addr(link->manager->rtnl, &req, RTM_DELADDR,
|
|
|
|
link->ifindex, address->family);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not allocate RTM_DELADDR message: %m");
|
2013-12-31 17:31:50 +01:00
|
|
|
|
2014-01-21 15:55:57 +01:00
|
|
|
r = sd_rtnl_message_addr_set_prefixlen(req, address->prefixlen);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not set prefixlen: %m");
|
2014-01-21 15:55:57 +01:00
|
|
|
|
2019-02-03 01:47:25 +01:00
|
|
|
r = netlink_message_append_in_addr_union(req, IFA_LOCAL, address->family, &address->in_addr);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not append IFA_LOCAL attribute: %m");
|
2013-12-31 17:31:50 +01:00
|
|
|
|
2018-11-28 21:06:52 +01:00
|
|
|
r = netlink_call_async(link->manager->rtnl, NULL, req,
|
|
|
|
callback ?: address_remove_handler,
|
|
|
|
link_netlink_destroy_callback, link);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
|
2013-12-31 17:31:50 +01:00
|
|
|
|
2014-07-03 09:43:31 +02:00
|
|
|
link_ref(link);
|
|
|
|
|
2013-12-31 17:31:50 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-06-18 18:22:14 +02:00
|
|
|
static int address_acquire(Link *link, Address *original, Address **ret) {
|
2019-05-04 20:14:08 +02:00
|
|
|
union in_addr_union in_addr = IN_ADDR_NULL;
|
2014-06-18 18:22:14 +02:00
|
|
|
struct in_addr broadcast = {};
|
tree-wide: drop redundant _cleanup_ macros (#8810)
This drops a good number of type-specific _cleanup_ macros, and patches
all users to just use the generic ones.
In most recent code we abstained from defining type-specific macros, and
this basically removes all those added already, with the exception of
the really low-level ones.
Having explicit macros for this is not too useful, as the expression
without the extra macro is generally just 2ch wider. We should generally
emphesize generic code, unless there are really good reasons for
specific code, hence let's follow this in this case too.
Note that _cleanup_free_ and similar really low-level, libc'ish, Linux
API'ish macros continue to be defined, only the really high-level OO
ones are dropped. From now on this should really be the rule: for really
low-level stuff, such as memory allocation, fd handling and so one, go
ahead and define explicit per-type macros, but for high-level, specific
program code, just use the generic _cleanup_() macro directly, in order
to keep things simple and as readable as possible for the uninitiated.
Note that before this patch some of the APIs (notable libudev ones) were
already used with the high-level macros at some places and with the
generic _cleanup_ macro at others. With this patch we hence unify on the
latter.
2018-04-25 12:31:45 +02:00
|
|
|
_cleanup_(address_freep) Address *na = NULL;
|
2014-06-18 18:22:14 +02:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(link);
|
|
|
|
assert(original);
|
|
|
|
assert(ret);
|
|
|
|
|
|
|
|
/* Something useful was configured? just use it */
|
2019-02-21 03:46:51 +01:00
|
|
|
r = in_addr_is_null(original->family, &original->in_addr);
|
|
|
|
if (r <= 0)
|
|
|
|
return r;
|
2014-06-18 18:22:14 +02:00
|
|
|
|
|
|
|
/* The address is configured to be 0.0.0.0 or [::] by the user?
|
|
|
|
* Then let's acquire something more useful from the pool. */
|
|
|
|
r = manager_address_pool_acquire(link->manager, original->family, original->prefixlen, &in_addr);
|
2015-04-21 17:40:18 +02:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return r;
|
|
|
|
if (r == 0)
|
2014-06-18 18:22:14 +02:00
|
|
|
return -EBUSY;
|
|
|
|
|
|
|
|
if (original->family == AF_INET) {
|
2014-12-10 20:00:04 +01:00
|
|
|
/* Pick first address in range for ourselves ... */
|
2014-06-18 18:22:14 +02:00
|
|
|
in_addr.in.s_addr = in_addr.in.s_addr | htobe32(1);
|
|
|
|
|
|
|
|
/* .. and use last as broadcast address */
|
2017-11-20 19:16:01 +01:00
|
|
|
if (original->prefixlen > 30)
|
|
|
|
broadcast.s_addr = 0;
|
|
|
|
else
|
|
|
|
broadcast.s_addr = in_addr.in.s_addr | htobe32(0xFFFFFFFFUL >> original->prefixlen);
|
2014-06-18 18:22:14 +02:00
|
|
|
} else if (original->family == AF_INET6)
|
|
|
|
in_addr.in6.s6_addr[15] |= 1;
|
|
|
|
|
2015-09-21 15:53:40 +02:00
|
|
|
r = address_new(&na);
|
2014-06-18 18:22:14 +02:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
na->family = original->family;
|
|
|
|
na->prefixlen = original->prefixlen;
|
|
|
|
na->scope = original->scope;
|
|
|
|
na->cinfo = original->cinfo;
|
|
|
|
|
|
|
|
if (original->label) {
|
|
|
|
na->label = strdup(original->label);
|
2014-06-30 07:05:48 +02:00
|
|
|
if (!na->label)
|
2014-06-18 18:22:14 +02:00
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
na->broadcast = broadcast;
|
|
|
|
na->in_addr = in_addr;
|
|
|
|
|
|
|
|
LIST_PREPEND(addresses, link->pool_addresses, na);
|
|
|
|
|
2018-04-05 07:26:26 +02:00
|
|
|
*ret = TAKE_PTR(na);
|
2014-06-30 07:05:48 +02:00
|
|
|
|
2014-06-18 18:22:14 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-06-03 19:51:48 +02:00
|
|
|
int address_configure(
|
|
|
|
Address *address,
|
|
|
|
Link *link,
|
2018-11-28 21:06:52 +01:00
|
|
|
link_netlink_message_handler_t callback,
|
2020-07-22 02:41:30 +02:00
|
|
|
bool update,
|
|
|
|
Address **ret) {
|
2016-06-03 19:51:48 +02:00
|
|
|
|
tree-wide: expose "p"-suffix unref calls in public APIs to make gcc cleanup easy
GLIB has recently started to officially support the gcc cleanup
attribute in its public API, hence let's do the same for our APIs.
With this patch we'll define an xyz_unrefp() call for each public
xyz_unref() call, to make it easy to use inside a
__attribute__((cleanup())) expression. Then, all code is ported over to
make use of this.
The new calls are also documented in the man pages, with examples how to
use them (well, I only added docs where the _unref() call itself already
had docs, and the examples, only cover sd_bus_unrefp() and
sd_event_unrefp()).
This also renames sd_lldp_free() to sd_lldp_unref(), since that's how we
tend to call our destructors these days.
Note that this defines no public macro that wraps gcc's attribute and
makes it easier to use. While I think it's our duty in the library to
make our stuff easy to use, I figure it's not our duty to make gcc's own
features easy to use on its own. Most likely, client code which wants to
make use of this should define its own:
#define _cleanup_(function) __attribute__((cleanup(function)))
Or similar, to make the gcc feature easier to use.
Making this logic public has the benefit that we can remove three header
files whose only purpose was to define these functions internally.
See #2008.
2015-11-27 19:13:45 +01:00
|
|
|
_cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
|
2020-07-22 02:41:30 +02:00
|
|
|
Address *a;
|
2013-10-17 03:18:36 +02:00
|
|
|
int r;
|
|
|
|
|
2013-11-24 23:36:58 +01:00
|
|
|
assert(address);
|
2017-10-04 16:01:32 +02:00
|
|
|
assert(IN_SET(address->family, AF_INET, AF_INET6));
|
2013-11-24 23:36:58 +01:00
|
|
|
assert(link);
|
|
|
|
assert(link->ifindex > 0);
|
2013-11-14 16:22:51 +01:00
|
|
|
assert(link->manager);
|
2013-11-24 23:36:58 +01:00
|
|
|
assert(link->manager->rtnl);
|
2018-11-28 21:29:09 +01:00
|
|
|
assert(callback);
|
2013-11-14 16:22:51 +01:00
|
|
|
|
2016-06-03 19:51:48 +02:00
|
|
|
/* If this is a new address, then refuse adding more than the limit */
|
|
|
|
if (address_get(link, address->family, &address->in_addr, address->prefixlen, NULL) <= 0 &&
|
|
|
|
set_size(link->addresses) >= ADDRESSES_PER_LINK_MAX)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, SYNTHETIC_ERRNO(E2BIG),
|
|
|
|
"Too many addresses are configured, refusing: %m");
|
2016-06-03 19:51:48 +02:00
|
|
|
|
2014-06-18 18:22:14 +02:00
|
|
|
r = address_acquire(link, address, &address);
|
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Failed to acquire an address from pool: %m");
|
2014-06-18 18:22:14 +02:00
|
|
|
|
2020-06-03 03:11:08 +02:00
|
|
|
if (DEBUG_LOGGING) {
|
|
|
|
_cleanup_free_ char *str = NULL;
|
|
|
|
|
|
|
|
(void) in_addr_to_string(address->family, &address->in_addr, &str);
|
|
|
|
log_link_debug(link, "%s address: %s", update ? "Updating" : "Configuring", strna(str));
|
|
|
|
}
|
|
|
|
|
2015-10-01 17:31:14 +02:00
|
|
|
if (update)
|
|
|
|
r = sd_rtnl_message_new_addr_update(link->manager->rtnl, &req,
|
|
|
|
link->ifindex, address->family);
|
|
|
|
else
|
|
|
|
r = sd_rtnl_message_new_addr(link->manager->rtnl, &req, RTM_NEWADDR,
|
|
|
|
link->ifindex, address->family);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not allocate RTM_NEWADDR message: %m");
|
2013-10-17 03:18:36 +02:00
|
|
|
|
2014-01-21 15:55:57 +01:00
|
|
|
r = sd_rtnl_message_addr_set_prefixlen(req, address->prefixlen);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not set prefixlen: %m");
|
2014-01-21 15:55:57 +01:00
|
|
|
|
2015-02-02 12:13:17 +01:00
|
|
|
address->flags |= IFA_F_PERMANENT;
|
|
|
|
|
2016-10-08 13:05:41 +02:00
|
|
|
if (address->home_address)
|
|
|
|
address->flags |= IFA_F_HOMEADDRESS;
|
|
|
|
|
2019-11-21 16:54:52 +01:00
|
|
|
if (!FLAGS_SET(address->duplicate_address_detection, ADDRESS_FAMILY_IPV6))
|
2016-10-08 13:05:41 +02:00
|
|
|
address->flags |= IFA_F_NODAD;
|
|
|
|
|
|
|
|
if (address->manage_temporary_address)
|
|
|
|
address->flags |= IFA_F_MANAGETEMPADDR;
|
|
|
|
|
2019-12-07 16:32:36 +01:00
|
|
|
if (!address->prefix_route)
|
2016-10-08 13:05:41 +02:00
|
|
|
address->flags |= IFA_F_NOPREFIXROUTE;
|
|
|
|
|
|
|
|
if (address->autojoin)
|
|
|
|
address->flags |= IFA_F_MCAUTOJOIN;
|
|
|
|
|
2015-02-02 12:13:17 +01:00
|
|
|
r = sd_rtnl_message_addr_set_flags(req, (address->flags & 0xff));
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not set flags: %m");
|
2014-01-21 15:55:57 +01:00
|
|
|
|
2015-02-02 12:13:17 +01:00
|
|
|
if (address->flags & ~0xff) {
|
2015-06-12 16:31:33 +02:00
|
|
|
r = sd_netlink_message_append_u32(req, IFA_FLAGS, address->flags);
|
2015-02-02 12:13:17 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not set extended flags: %m");
|
2015-02-02 12:13:17 +01:00
|
|
|
}
|
|
|
|
|
2014-02-28 16:10:20 +01:00
|
|
|
r = sd_rtnl_message_addr_set_scope(req, address->scope);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not set scope: %m");
|
2014-01-21 15:55:57 +01:00
|
|
|
|
2019-02-03 01:47:25 +01:00
|
|
|
r = netlink_message_append_in_addr_union(req, IFA_LOCAL, address->family, &address->in_addr);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not append IFA_LOCAL attribute: %m");
|
2013-10-17 03:18:36 +02:00
|
|
|
|
2019-02-03 00:09:13 +01:00
|
|
|
if (in_addr_is_null(address->family, &address->in_addr_peer) == 0) {
|
2019-02-03 01:47:25 +01:00
|
|
|
r = netlink_message_append_in_addr_union(req, IFA_ADDRESS, address->family, &address->in_addr_peer);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not append IFA_ADDRESS attribute: %m");
|
2018-12-21 03:31:00 +01:00
|
|
|
} else if (address->family == AF_INET && address->prefixlen <= 30) {
|
|
|
|
r = sd_netlink_message_append_in_addr(req, IFA_BROADCAST, &address->broadcast);
|
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not append IFA_BROADCAST attribute: %m");
|
2013-10-17 03:18:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (address->label) {
|
2015-06-12 16:31:33 +02:00
|
|
|
r = sd_netlink_message_append_string(req, IFA_LABEL, address->label);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not append IFA_LABEL attribute: %m");
|
2013-10-17 03:18:36 +02:00
|
|
|
}
|
|
|
|
|
2018-12-21 03:31:00 +01:00
|
|
|
r = sd_netlink_message_append_cache_info(req, IFA_CACHEINFO, &address->cinfo);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not append IFA_CACHEINFO attribute: %m");
|
2014-06-26 15:18:43 +02:00
|
|
|
|
2015-09-30 14:07:12 +02:00
|
|
|
r = address_establish(address, link);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
log_link_warning_errno(link, r, "Could not enable IP masquerading, ignoring: %m");
|
2015-09-30 14:07:12 +02:00
|
|
|
|
2018-12-10 18:05:40 +01:00
|
|
|
r = netlink_call_async(link->manager->rtnl, NULL, req, callback, link_netlink_destroy_callback, link);
|
2015-09-30 14:07:12 +02:00
|
|
|
if (r < 0) {
|
|
|
|
address_release(address);
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
|
2015-09-30 14:07:12 +02:00
|
|
|
}
|
2013-10-17 03:18:36 +02:00
|
|
|
|
2014-07-03 09:43:31 +02:00
|
|
|
link_ref(link);
|
|
|
|
|
2018-12-10 18:05:40 +01:00
|
|
|
if (address->family == AF_INET6 && !in_addr_is_null(address->family, &address->in_addr_peer))
|
2020-07-22 02:41:30 +02:00
|
|
|
r = address_add(link, address->family, &address->in_addr_peer, address->prefixlen, &a);
|
2018-12-10 18:05:40 +01:00
|
|
|
else
|
2020-07-22 02:41:30 +02:00
|
|
|
r = address_add(link, address->family, &address->in_addr, address->prefixlen, &a);
|
2015-09-30 14:01:44 +02:00
|
|
|
if (r < 0) {
|
|
|
|
address_release(address);
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not add address: %m");
|
2015-09-30 14:01:44 +02:00
|
|
|
}
|
|
|
|
|
2019-11-21 16:54:52 +01:00
|
|
|
if (address->acd) {
|
|
|
|
assert(address->family == AF_INET);
|
|
|
|
if (DEBUG_LOGGING) {
|
|
|
|
_cleanup_free_ char *pretty = NULL;
|
|
|
|
|
|
|
|
(void) in_addr_to_string(address->family, &address->in_addr, &pretty);
|
2020-01-07 04:53:19 +01:00
|
|
|
log_link_debug(link, "Starting IPv4ACD client. Probing address %s", strna(pretty));
|
2019-11-21 16:54:52 +01:00
|
|
|
}
|
|
|
|
|
2019-12-10 17:27:31 +01:00
|
|
|
r = sd_ipv4acd_start(address->acd, true);
|
2019-11-21 16:54:52 +01:00
|
|
|
if (r < 0)
|
|
|
|
log_link_warning_errno(link, r, "Failed to start IPv4ACD client, ignoring: %m");
|
|
|
|
}
|
|
|
|
|
2020-07-22 02:41:30 +02:00
|
|
|
if (ret)
|
|
|
|
*ret = a;
|
|
|
|
|
2019-06-11 16:20:56 +02:00
|
|
|
return 1;
|
2013-10-17 03:18:36 +02:00
|
|
|
}
|
|
|
|
|
2019-11-21 16:54:52 +01:00
|
|
|
static void static_address_on_acd(sd_ipv4acd *acd, int event, void *userdata) {
|
|
|
|
_cleanup_free_ char *pretty = NULL;
|
|
|
|
Address *address;
|
|
|
|
Link *link;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(acd);
|
|
|
|
assert(userdata);
|
|
|
|
|
|
|
|
address = (Address *) userdata;
|
|
|
|
link = address->link;
|
|
|
|
|
|
|
|
(void) in_addr_to_string(address->family, &address->in_addr, &pretty);
|
|
|
|
switch (event) {
|
|
|
|
case SD_IPV4ACD_EVENT_STOP:
|
|
|
|
log_link_debug(link, "Stopping ACD client...");
|
|
|
|
return;
|
|
|
|
|
|
|
|
case SD_IPV4ACD_EVENT_BIND:
|
|
|
|
log_link_debug(link, "Successfully claimed address %s", strna(pretty));
|
|
|
|
link_check_ready(link);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SD_IPV4ACD_EVENT_CONFLICT:
|
|
|
|
log_link_warning(link, "DAD conflict. Dropping address %s", strna(pretty));
|
|
|
|
r = address_remove(address, link, NULL);
|
|
|
|
if (r < 0)
|
|
|
|
log_link_error_errno(link, r, "Failed to drop DAD conflicted address %s", strna(pretty));;
|
|
|
|
|
|
|
|
link_check_ready(link);
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
assert_not_reached("Invalid IPv4ACD event.");
|
|
|
|
}
|
|
|
|
|
|
|
|
sd_ipv4acd_stop(acd);
|
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
int configure_ipv4_duplicate_address_detection(Link *link, Address *address) {
|
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(link);
|
|
|
|
assert(address);
|
|
|
|
assert(address->family == AF_INET);
|
|
|
|
assert(!address->link && address->network);
|
|
|
|
|
|
|
|
address->link = link;
|
|
|
|
|
|
|
|
r = sd_ipv4acd_new(&address->acd);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
r = sd_ipv4acd_attach_event(address->acd, NULL, 0);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
r = sd_ipv4acd_set_ifindex(address->acd, link->ifindex);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
r = sd_ipv4acd_set_mac(address->acd, &link->mac);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
r = sd_ipv4acd_set_address(address->acd, &address->in_addr.in);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
r = sd_ipv4acd_set_callback(address->acd, static_address_on_acd, address);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-08-11 22:44:51 +02:00
|
|
|
int config_parse_broadcast(
|
|
|
|
const char *unit,
|
2014-01-28 20:01:37 +01:00
|
|
|
const char *filename,
|
|
|
|
unsigned line,
|
|
|
|
const char *section,
|
|
|
|
unsigned section_line,
|
|
|
|
const char *lvalue,
|
|
|
|
int ltype,
|
|
|
|
const char *rvalue,
|
|
|
|
void *data,
|
|
|
|
void *userdata) {
|
2014-08-11 22:44:51 +02:00
|
|
|
|
2014-01-28 20:01:37 +01:00
|
|
|
Network *network = userdata;
|
2019-03-01 05:27:47 +01:00
|
|
|
_cleanup_(address_free_or_set_invalidp) Address *n = NULL;
|
2014-01-28 20:01:37 +01:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(filename);
|
|
|
|
assert(section);
|
|
|
|
assert(lvalue);
|
|
|
|
assert(rvalue);
|
|
|
|
assert(data);
|
|
|
|
|
2017-02-15 05:30:35 +01:00
|
|
|
r = address_new_static(network, filename, section_line, &n);
|
2020-07-16 07:48:08 +02:00
|
|
|
if (r == -ENOMEM)
|
|
|
|
return log_oom();
|
|
|
|
if (r < 0) {
|
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r,
|
|
|
|
"Failed to allocate new address, ignoring assignment: %m");
|
|
|
|
return 0;
|
|
|
|
}
|
2014-01-28 20:01:37 +01:00
|
|
|
|
2014-02-18 15:48:30 +01:00
|
|
|
if (n->family == AF_INET6) {
|
2020-07-16 07:48:08 +02:00
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, 0,
|
2019-02-28 02:57:20 +01:00
|
|
|
"Broadcast is not valid for IPv6 addresses, ignoring assignment: %s", rvalue);
|
2014-02-18 15:48:30 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-08-11 22:44:51 +02:00
|
|
|
r = in_addr_from_string(AF_INET, rvalue, (union in_addr_union*) &n->broadcast);
|
2014-01-28 20:01:37 +01:00
|
|
|
if (r < 0) {
|
2020-07-16 07:48:08 +02:00
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r,
|
2019-02-28 02:57:20 +01:00
|
|
|
"Broadcast is invalid, ignoring assignment: %s", rvalue);
|
2014-01-28 20:01:37 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-08-11 22:44:51 +02:00
|
|
|
n->family = AF_INET;
|
2014-01-28 20:01:37 +01:00
|
|
|
n = NULL;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-10-17 03:18:36 +02:00
|
|
|
int config_parse_address(const char *unit,
|
|
|
|
const char *filename,
|
|
|
|
unsigned line,
|
|
|
|
const char *section,
|
2013-11-19 16:17:55 +01:00
|
|
|
unsigned section_line,
|
2013-10-17 03:18:36 +02:00
|
|
|
const char *lvalue,
|
|
|
|
int ltype,
|
|
|
|
const char *rvalue,
|
|
|
|
void *data,
|
|
|
|
void *userdata) {
|
2014-08-11 22:44:51 +02:00
|
|
|
|
2013-11-19 16:54:42 +01:00
|
|
|
Network *network = userdata;
|
2019-03-01 05:27:47 +01:00
|
|
|
_cleanup_(address_free_or_set_invalidp) Address *n = NULL;
|
2014-08-11 22:44:51 +02:00
|
|
|
union in_addr_union buffer;
|
2018-11-05 08:21:38 +01:00
|
|
|
unsigned char prefixlen;
|
2014-08-11 22:44:51 +02:00
|
|
|
int r, f;
|
2013-10-17 03:18:36 +02:00
|
|
|
|
|
|
|
assert(filename);
|
2013-11-19 16:54:42 +01:00
|
|
|
assert(section);
|
2013-10-17 03:18:36 +02:00
|
|
|
assert(lvalue);
|
|
|
|
assert(rvalue);
|
|
|
|
assert(data);
|
|
|
|
|
2013-11-28 17:17:04 +01:00
|
|
|
if (streq(section, "Network")) {
|
|
|
|
/* we are not in an Address section, so treat
|
|
|
|
* this as the special '0' section */
|
2017-02-15 05:30:35 +01:00
|
|
|
r = address_new_static(network, NULL, 0, &n);
|
|
|
|
} else
|
|
|
|
r = address_new_static(network, filename, section_line, &n);
|
2020-07-16 07:48:08 +02:00
|
|
|
if (r == -ENOMEM)
|
|
|
|
return log_oom();
|
|
|
|
if (r < 0) {
|
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r,
|
|
|
|
"Failed to allocate new address, ignoring assignment: %m");
|
|
|
|
return 0;
|
|
|
|
}
|
2013-10-17 03:18:36 +02:00
|
|
|
|
|
|
|
/* Address=address/prefixlen */
|
2019-01-28 15:29:54 +01:00
|
|
|
r = in_addr_prefix_from_string_auto_internal(rvalue, PREFIXLEN_REFUSE, &f, &buffer, &prefixlen);
|
|
|
|
if (r == -ENOANO) {
|
2020-07-16 07:48:08 +02:00
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r,
|
2019-01-28 15:29:54 +01:00
|
|
|
"An address '%s' is specified without prefix length. "
|
|
|
|
"The behavior of parsing addresses without prefix length will be changed in the future release. "
|
|
|
|
"Please specify prefix length explicitly.", rvalue);
|
|
|
|
|
|
|
|
r = in_addr_prefix_from_string_auto_internal(rvalue, PREFIXLEN_LEGACY, &f, &buffer, &prefixlen);
|
|
|
|
}
|
2013-10-17 03:18:36 +02:00
|
|
|
if (r < 0) {
|
2020-07-16 07:48:08 +02:00
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r, "Invalid address '%s', ignoring assignment: %m", rvalue);
|
2013-10-17 03:18:36 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-08-11 22:44:51 +02:00
|
|
|
if (n->family != AF_UNSPEC && f != n->family) {
|
2020-07-16 07:48:08 +02:00
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, 0, "Address is incompatible, ignoring assignment: %s", rvalue);
|
2014-08-11 22:44:51 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-02-20 10:36:17 +01:00
|
|
|
if (in_addr_is_null(f, &buffer)) {
|
|
|
|
/* Will use address from address pool. Note that for ipv6 case, prefix of the address
|
|
|
|
* pool is 8, but 40 bit is used by the global ID and 16 bit by the subnet ID. So,
|
|
|
|
* let's limit the prefix length to 64 or larger. See RFC4193. */
|
|
|
|
if ((f == AF_INET && prefixlen < 8) ||
|
|
|
|
(f == AF_INET6 && prefixlen < 64)) {
|
2020-07-16 07:48:08 +02:00
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, 0,
|
2019-02-20 10:36:17 +01:00
|
|
|
"Null address with invalid prefixlen='%u', ignoring assignment: %s",
|
|
|
|
prefixlen, rvalue);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-08-11 22:44:51 +02:00
|
|
|
n->family = f;
|
2018-11-05 08:21:38 +01:00
|
|
|
n->prefixlen = prefixlen;
|
2014-08-11 22:44:51 +02:00
|
|
|
|
|
|
|
if (streq(lvalue, "Address"))
|
|
|
|
n->in_addr = buffer;
|
|
|
|
else
|
|
|
|
n->in_addr_peer = buffer;
|
|
|
|
|
2019-06-03 16:29:07 +02:00
|
|
|
if (n->family == AF_INET && n->broadcast.s_addr == 0 && n->prefixlen <= 30)
|
2019-06-19 23:34:05 +02:00
|
|
|
n->broadcast.s_addr = n->in_addr.in.s_addr | htobe32(0xfffffffflu >> n->prefixlen);
|
2014-01-28 20:01:37 +01:00
|
|
|
|
2013-10-17 03:18:36 +02:00
|
|
|
n = NULL;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2013-11-19 16:54:42 +01:00
|
|
|
|
2016-05-06 21:20:59 +02:00
|
|
|
int config_parse_label(
|
|
|
|
const char *unit,
|
2013-11-19 16:54:42 +01:00
|
|
|
const char *filename,
|
|
|
|
unsigned line,
|
|
|
|
const char *section,
|
|
|
|
unsigned section_line,
|
|
|
|
const char *lvalue,
|
|
|
|
int ltype,
|
|
|
|
const char *rvalue,
|
|
|
|
void *data,
|
|
|
|
void *userdata) {
|
2016-05-06 21:20:59 +02:00
|
|
|
|
2019-03-01 05:27:47 +01:00
|
|
|
_cleanup_(address_free_or_set_invalidp) Address *n = NULL;
|
2016-05-06 21:20:59 +02:00
|
|
|
Network *network = userdata;
|
2013-11-19 16:54:42 +01:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(filename);
|
|
|
|
assert(section);
|
|
|
|
assert(lvalue);
|
|
|
|
assert(rvalue);
|
|
|
|
assert(data);
|
|
|
|
|
2017-02-15 05:30:35 +01:00
|
|
|
r = address_new_static(network, filename, section_line, &n);
|
2020-07-16 07:48:08 +02:00
|
|
|
if (r == -ENOMEM)
|
|
|
|
return log_oom();
|
|
|
|
if (r < 0) {
|
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r,
|
|
|
|
"Failed to allocate new address, ignoring assignment: %m");
|
|
|
|
return 0;
|
|
|
|
}
|
2013-11-19 16:54:42 +01:00
|
|
|
|
2017-02-28 12:24:33 +01:00
|
|
|
if (!address_label_valid(rvalue)) {
|
2020-07-16 07:48:08 +02:00
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, 0,
|
2019-02-28 02:57:20 +01:00
|
|
|
"Interface label is too long or invalid, ignoring assignment: %s", rvalue);
|
2013-11-19 16:54:42 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-05-06 21:20:59 +02:00
|
|
|
r = free_and_strdup(&n->label, rvalue);
|
|
|
|
if (r < 0)
|
|
|
|
return log_oom();
|
2013-11-19 16:54:42 +01:00
|
|
|
|
|
|
|
n = NULL;
|
|
|
|
return 0;
|
|
|
|
}
|
2015-09-28 13:30:10 +02:00
|
|
|
|
2016-05-03 21:54:26 +02:00
|
|
|
int config_parse_lifetime(const char *unit,
|
|
|
|
const char *filename,
|
|
|
|
unsigned line,
|
|
|
|
const char *section,
|
|
|
|
unsigned section_line,
|
|
|
|
const char *lvalue,
|
|
|
|
int ltype,
|
|
|
|
const char *rvalue,
|
|
|
|
void *data,
|
|
|
|
void *userdata) {
|
|
|
|
Network *network = userdata;
|
2019-03-01 05:27:47 +01:00
|
|
|
_cleanup_(address_free_or_set_invalidp) Address *n = NULL;
|
2020-05-21 08:17:45 +02:00
|
|
|
uint32_t k;
|
2016-05-03 21:54:26 +02:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(filename);
|
|
|
|
assert(section);
|
|
|
|
assert(lvalue);
|
|
|
|
assert(rvalue);
|
|
|
|
assert(data);
|
|
|
|
|
2017-02-15 05:30:35 +01:00
|
|
|
r = address_new_static(network, filename, section_line, &n);
|
2020-07-16 07:48:08 +02:00
|
|
|
if (r == -ENOMEM)
|
|
|
|
return log_oom();
|
|
|
|
if (r < 0) {
|
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r,
|
|
|
|
"Failed to allocate new address, ignoring assignment: %m");
|
|
|
|
return 0;
|
|
|
|
}
|
2016-05-03 21:54:26 +02:00
|
|
|
|
2020-05-21 08:36:01 +02:00
|
|
|
/* We accept only "forever", "infinity", empty, or "0". */
|
|
|
|
if (STR_IN_SET(rvalue, "forever", "infinity", ""))
|
2019-02-28 02:56:33 +01:00
|
|
|
k = CACHE_INFO_INFINITY_LIFE_TIME;
|
|
|
|
else if (streq(rvalue, "0"))
|
|
|
|
k = 0;
|
|
|
|
else {
|
2020-07-16 07:48:08 +02:00
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, 0,
|
2019-02-28 02:56:33 +01:00
|
|
|
"Invalid PreferredLifetime= value, ignoring: %s", rvalue);
|
2016-05-03 21:54:26 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-02-28 02:56:33 +01:00
|
|
|
n->cinfo.ifa_prefered = k;
|
2020-05-21 08:17:45 +02:00
|
|
|
TAKE_PTR(n);
|
2016-05-03 21:54:26 +02:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-10-08 13:05:41 +02:00
|
|
|
int config_parse_address_flags(const char *unit,
|
|
|
|
const char *filename,
|
|
|
|
unsigned line,
|
|
|
|
const char *section,
|
|
|
|
unsigned section_line,
|
|
|
|
const char *lvalue,
|
|
|
|
int ltype,
|
|
|
|
const char *rvalue,
|
|
|
|
void *data,
|
|
|
|
void *userdata) {
|
|
|
|
Network *network = userdata;
|
2019-03-01 05:27:47 +01:00
|
|
|
_cleanup_(address_free_or_set_invalidp) Address *n = NULL;
|
2016-10-08 13:05:41 +02:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(filename);
|
|
|
|
assert(section);
|
|
|
|
assert(lvalue);
|
|
|
|
assert(rvalue);
|
|
|
|
assert(data);
|
|
|
|
|
2017-02-15 05:30:35 +01:00
|
|
|
r = address_new_static(network, filename, section_line, &n);
|
2020-07-16 07:48:08 +02:00
|
|
|
if (r == -ENOMEM)
|
|
|
|
return log_oom();
|
|
|
|
if (r < 0) {
|
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r,
|
|
|
|
"Failed to allocate new address, ignoring assignment: %m");
|
|
|
|
return 0;
|
|
|
|
}
|
2016-10-08 13:05:41 +02:00
|
|
|
|
|
|
|
r = parse_boolean(rvalue);
|
|
|
|
if (r < 0) {
|
2020-07-16 07:48:08 +02:00
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r,
|
2019-11-21 16:54:52 +01:00
|
|
|
"Failed to parse %s=, ignoring: %s", lvalue, rvalue);
|
2016-10-08 13:05:41 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (streq(lvalue, "HomeAddress"))
|
|
|
|
n->home_address = r;
|
|
|
|
else if (streq(lvalue, "ManageTemporaryAddress"))
|
|
|
|
n->manage_temporary_address = r;
|
|
|
|
else if (streq(lvalue, "PrefixRoute"))
|
2019-12-07 16:32:36 +01:00
|
|
|
n->prefix_route = !r;
|
|
|
|
else if (streq(lvalue, "AddPrefixRoute"))
|
2016-10-08 13:05:41 +02:00
|
|
|
n->prefix_route = r;
|
|
|
|
else if (streq(lvalue, "AutoJoin"))
|
|
|
|
n->autojoin = r;
|
2019-02-28 02:57:20 +01:00
|
|
|
else
|
|
|
|
assert_not_reached("Invalid address flag type.");
|
2016-10-08 13:05:41 +02:00
|
|
|
|
2019-02-28 02:54:17 +01:00
|
|
|
n = NULL;
|
2016-10-08 13:05:41 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-08-01 09:44:08 +02:00
|
|
|
int config_parse_address_scope(const char *unit,
|
|
|
|
const char *filename,
|
|
|
|
unsigned line,
|
|
|
|
const char *section,
|
|
|
|
unsigned section_line,
|
|
|
|
const char *lvalue,
|
|
|
|
int ltype,
|
|
|
|
const char *rvalue,
|
|
|
|
void *data,
|
|
|
|
void *userdata) {
|
|
|
|
Network *network = userdata;
|
2019-03-01 05:27:47 +01:00
|
|
|
_cleanup_(address_free_or_set_invalidp) Address *n = NULL;
|
2017-08-01 09:44:08 +02:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(filename);
|
|
|
|
assert(section);
|
|
|
|
assert(lvalue);
|
|
|
|
assert(rvalue);
|
|
|
|
assert(data);
|
|
|
|
|
|
|
|
r = address_new_static(network, filename, section_line, &n);
|
2020-07-16 07:48:08 +02:00
|
|
|
if (r == -ENOMEM)
|
|
|
|
return log_oom();
|
|
|
|
if (r < 0) {
|
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r,
|
|
|
|
"Failed to allocate new address, ignoring assignment: %m");
|
|
|
|
return 0;
|
|
|
|
}
|
2017-08-01 09:44:08 +02:00
|
|
|
|
|
|
|
if (streq(rvalue, "host"))
|
|
|
|
n->scope = RT_SCOPE_HOST;
|
|
|
|
else if (streq(rvalue, "link"))
|
|
|
|
n->scope = RT_SCOPE_LINK;
|
|
|
|
else if (streq(rvalue, "global"))
|
|
|
|
n->scope = RT_SCOPE_UNIVERSE;
|
|
|
|
else {
|
|
|
|
r = safe_atou8(rvalue , &n->scope);
|
|
|
|
if (r < 0) {
|
2020-07-16 07:48:08 +02:00
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r,
|
2019-02-28 02:57:20 +01:00
|
|
|
"Could not parse address scope \"%s\", ignoring assignment: %m", rvalue);
|
2017-08-01 09:44:08 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-27 18:10:15 +01:00
|
|
|
n->scope_set = true;
|
2017-08-01 09:44:08 +02:00
|
|
|
n = NULL;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-11-21 16:54:52 +01:00
|
|
|
int config_parse_duplicate_address_detection(
|
|
|
|
const char *unit,
|
|
|
|
const char *filename,
|
|
|
|
unsigned line,
|
|
|
|
const char *section,
|
|
|
|
unsigned section_line,
|
|
|
|
const char *lvalue,
|
|
|
|
int ltype,
|
|
|
|
const char *rvalue,
|
|
|
|
void *data,
|
|
|
|
void *userdata) {
|
|
|
|
Network *network = userdata;
|
|
|
|
_cleanup_(address_free_or_set_invalidp) Address *n = NULL;
|
|
|
|
AddressFamily a;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(filename);
|
|
|
|
assert(section);
|
|
|
|
assert(lvalue);
|
|
|
|
assert(rvalue);
|
|
|
|
assert(data);
|
|
|
|
|
|
|
|
r = address_new_static(network, filename, section_line, &n);
|
2020-07-16 07:48:08 +02:00
|
|
|
if (r == -ENOMEM)
|
|
|
|
return log_oom();
|
|
|
|
if (r < 0) {
|
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r,
|
|
|
|
"Failed to allocate new address, ignoring assignment: %m");
|
|
|
|
return 0;
|
|
|
|
}
|
2019-11-21 16:54:52 +01:00
|
|
|
|
|
|
|
r = parse_boolean(rvalue);
|
|
|
|
if (r >= 0) {
|
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, 0,
|
|
|
|
"For historical reasons, %s=%s means %s=%s. "
|
|
|
|
"Please use 'both', 'ipv4', 'ipv6' or 'none' instead.",
|
|
|
|
lvalue, rvalue, lvalue, r ? "none" : "both");
|
|
|
|
n->duplicate_address_detection = r ? ADDRESS_FAMILY_NO : ADDRESS_FAMILY_YES;
|
|
|
|
n = NULL;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
a = duplicate_address_detection_address_family_from_string(rvalue);
|
|
|
|
if (a < 0) {
|
2020-07-16 07:48:08 +02:00
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, SYNTHETIC_ERRNO(EINVAL),
|
2019-11-21 16:54:52 +01:00
|
|
|
"Failed to parse %s=, ignoring: %s", lvalue, rvalue);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
n->duplicate_address_detection = a;
|
|
|
|
n = NULL;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-09-28 13:30:10 +02:00
|
|
|
bool address_is_ready(const Address *a) {
|
|
|
|
assert(a);
|
|
|
|
|
2019-08-18 17:04:37 +02:00
|
|
|
return !(a->flags & IFA_F_TENTATIVE);
|
2015-09-28 13:30:10 +02:00
|
|
|
}
|
2019-03-01 05:27:47 +01:00
|
|
|
|
|
|
|
int address_section_verify(Address *address) {
|
|
|
|
if (section_is_invalid(address->section))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (address->family == AF_UNSPEC) {
|
|
|
|
assert(address->section);
|
|
|
|
|
|
|
|
return log_warning_errno(SYNTHETIC_ERRNO(EINVAL),
|
|
|
|
"%s: Address section without Address= field configured. "
|
|
|
|
"Ignoring [Address] section from line %u.",
|
|
|
|
address->section->filename, address->section->line);
|
|
|
|
}
|
|
|
|
|
2020-02-27 18:10:15 +01:00
|
|
|
if (!address->scope_set && in_addr_is_localhost(address->family, &address->in_addr) > 0)
|
|
|
|
address->scope = RT_SCOPE_HOST;
|
|
|
|
|
2019-03-01 05:27:47 +01:00
|
|
|
return 0;
|
|
|
|
}
|