2020-11-09 05:23:58 +01:00
|
|
|
/* SPDX-License-Identifier: LGPL-2.1-or-later */
|
2013-10-17 03:18:36 +02:00
|
|
|
|
|
|
|
#include <net/if.h>
|
2020-10-26 18:07:49 +01:00
|
|
|
#include <net/if_arp.h>
|
2013-10-17 03:18:36 +02:00
|
|
|
|
2015-10-27 03:01:06 +01:00
|
|
|
#include "alloc-util.h"
|
2015-06-15 13:50:43 +02:00
|
|
|
#include "firewall-util.h"
|
2019-03-13 12:02:21 +01:00
|
|
|
#include "memory-util.h"
|
2015-08-27 13:59:06 +02:00
|
|
|
#include "netlink-util.h"
|
2020-10-02 07:46:29 +02:00
|
|
|
#include "networkd-address-pool.h"
|
2015-10-26 16:18:16 +01:00
|
|
|
#include "networkd-address.h"
|
2016-11-13 04:59:06 +01:00
|
|
|
#include "networkd-manager.h"
|
2020-10-02 07:01:59 +02:00
|
|
|
#include "networkd-network.h"
|
2015-10-26 16:18:16 +01:00
|
|
|
#include "parse-util.h"
|
2015-10-24 22:58:24 +02:00
|
|
|
#include "string-util.h"
|
2018-08-22 07:30:49 +02:00
|
|
|
#include "strv.h"
|
2013-10-17 03:18:36 +02:00
|
|
|
|
2016-06-03 19:51:48 +02:00
|
|
|
#define ADDRESSES_PER_LINK_MAX 2048U
|
2016-06-03 19:14:12 +02:00
|
|
|
#define STATIC_ADDRESSES_PER_NETWORK_MAX 1024U
|
|
|
|
|
2020-10-13 08:06:44 +02:00
|
|
|
int generate_ipv6_eui_64_address(const Link *link, struct in6_addr *ret) {
|
2020-02-27 12:40:57 +01:00
|
|
|
assert(link);
|
|
|
|
assert(ret);
|
|
|
|
|
2020-10-26 18:07:49 +01:00
|
|
|
if (link->iftype == ARPHRD_INFINIBAND) {
|
|
|
|
/* see RFC4391 section 8 */
|
|
|
|
memcpy(&ret->s6_addr[8], &link->hw_addr.addr.infiniband[12], 8);
|
|
|
|
ret->s6_addr[8] ^= 1 << 1;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-02-27 12:40:57 +01:00
|
|
|
/* see RFC4291 section 2.5.1 */
|
2020-10-26 18:07:49 +01:00
|
|
|
ret->s6_addr[8] = link->hw_addr.addr.ether.ether_addr_octet[0];
|
2020-02-27 12:40:57 +01:00
|
|
|
ret->s6_addr[8] ^= 1 << 1;
|
2020-10-26 18:07:49 +01:00
|
|
|
ret->s6_addr[9] = link->hw_addr.addr.ether.ether_addr_octet[1];
|
|
|
|
ret->s6_addr[10] = link->hw_addr.addr.ether.ether_addr_octet[2];
|
2020-02-27 12:40:57 +01:00
|
|
|
ret->s6_addr[11] = 0xff;
|
|
|
|
ret->s6_addr[12] = 0xfe;
|
2020-10-26 18:07:49 +01:00
|
|
|
ret->s6_addr[13] = link->hw_addr.addr.ether.ether_addr_octet[3];
|
|
|
|
ret->s6_addr[14] = link->hw_addr.addr.ether.ether_addr_octet[4];
|
|
|
|
ret->s6_addr[15] = link->hw_addr.addr.ether.ether_addr_octet[5];
|
2020-02-27 12:40:57 +01:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-09-21 15:53:40 +02:00
|
|
|
int address_new(Address **ret) {
|
tree-wide: drop redundant _cleanup_ macros (#8810)
This drops a good number of type-specific _cleanup_ macros, and patches
all users to just use the generic ones.
In most recent code we abstained from defining type-specific macros, and
this basically removes all those added already, with the exception of
the really low-level ones.
Having explicit macros for this is not too useful, as the expression
without the extra macro is generally just 2ch wider. We should generally
emphesize generic code, unless there are really good reasons for
specific code, hence let's follow this in this case too.
Note that _cleanup_free_ and similar really low-level, libc'ish, Linux
API'ish macros continue to be defined, only the really high-level OO
ones are dropped. From now on this should really be the rule: for really
low-level stuff, such as memory allocation, fd handling and so one, go
ahead and define explicit per-type macros, but for high-level, specific
program code, just use the generic _cleanup_() macro directly, in order
to keep things simple and as readable as possible for the uninitiated.
Note that before this patch some of the APIs (notable libudev ones) were
already used with the high-level macros at some places and with the
generic _cleanup_ macro at others. With this patch we hence unify on the
latter.
2018-04-25 12:31:45 +02:00
|
|
|
_cleanup_(address_freep) Address *address = NULL;
|
2015-09-21 15:53:40 +02:00
|
|
|
|
2018-11-12 06:55:52 +01:00
|
|
|
address = new(Address, 1);
|
2015-09-21 15:53:40 +02:00
|
|
|
if (!address)
|
|
|
|
return -ENOMEM;
|
2014-04-02 21:31:12 +02:00
|
|
|
|
2018-11-12 06:55:52 +01:00
|
|
|
*address = (Address) {
|
|
|
|
.family = AF_UNSPEC,
|
|
|
|
.scope = RT_SCOPE_UNIVERSE,
|
|
|
|
.cinfo.ifa_prefered = CACHE_INFO_INFINITY_LIFE_TIME,
|
|
|
|
.cinfo.ifa_valid = CACHE_INFO_INFINITY_LIFE_TIME,
|
2019-11-21 16:54:52 +01:00
|
|
|
.duplicate_address_detection = ADDRESS_FAMILY_IPV6,
|
2018-11-12 06:55:52 +01:00
|
|
|
};
|
2015-09-21 15:53:40 +02:00
|
|
|
|
2018-04-05 07:26:26 +02:00
|
|
|
*ret = TAKE_PTR(address);
|
2015-09-21 15:53:40 +02:00
|
|
|
|
|
|
|
return 0;
|
2014-04-02 21:31:12 +02:00
|
|
|
}
|
|
|
|
|
2019-03-01 05:19:53 +01:00
|
|
|
static int address_new_static(Network *network, const char *filename, unsigned section_line, Address **ret) {
|
tree-wide: drop redundant _cleanup_ macros (#8810)
This drops a good number of type-specific _cleanup_ macros, and patches
all users to just use the generic ones.
In most recent code we abstained from defining type-specific macros, and
this basically removes all those added already, with the exception of
the really low-level ones.
Having explicit macros for this is not too useful, as the expression
without the extra macro is generally just 2ch wider. We should generally
emphesize generic code, unless there are really good reasons for
specific code, hence let's follow this in this case too.
Note that _cleanup_free_ and similar really low-level, libc'ish, Linux
API'ish macros continue to be defined, only the really high-level OO
ones are dropped. From now on this should really be the rule: for really
low-level stuff, such as memory allocation, fd handling and so one, go
ahead and define explicit per-type macros, but for high-level, specific
program code, just use the generic _cleanup_() macro directly, in order
to keep things simple and as readable as possible for the uninitiated.
Note that before this patch some of the APIs (notable libudev ones) were
already used with the high-level macros at some places and with the
generic _cleanup_ macro at others. With this patch we hence unify on the
latter.
2018-04-25 12:31:45 +02:00
|
|
|
_cleanup_(network_config_section_freep) NetworkConfigSection *n = NULL;
|
|
|
|
_cleanup_(address_freep) Address *address = NULL;
|
2015-09-21 15:53:40 +02:00
|
|
|
int r;
|
2013-10-17 03:18:36 +02:00
|
|
|
|
2016-06-03 19:14:12 +02:00
|
|
|
assert(network);
|
|
|
|
assert(ret);
|
2020-10-02 05:34:19 +02:00
|
|
|
assert(filename);
|
|
|
|
assert(section_line > 0);
|
2017-02-15 05:30:35 +01:00
|
|
|
|
2020-10-02 05:34:19 +02:00
|
|
|
r = network_config_section_new(filename, section_line, &n);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2013-11-19 16:54:42 +01:00
|
|
|
|
2020-10-02 05:34:19 +02:00
|
|
|
address = ordered_hashmap_get(network->addresses_by_section, n);
|
|
|
|
if (address) {
|
|
|
|
*ret = TAKE_PTR(address);
|
|
|
|
return 0;
|
2013-11-19 16:54:42 +01:00
|
|
|
}
|
|
|
|
|
2020-10-02 05:34:19 +02:00
|
|
|
if (ordered_hashmap_size(network->addresses_by_section) >= STATIC_ADDRESSES_PER_NETWORK_MAX)
|
2016-06-03 19:14:12 +02:00
|
|
|
return -E2BIG;
|
|
|
|
|
2015-09-21 15:53:40 +02:00
|
|
|
r = address_new(&address);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2014-01-28 20:00:47 +01:00
|
|
|
|
2018-11-12 06:57:04 +01:00
|
|
|
address->network = network;
|
2020-10-02 05:34:19 +02:00
|
|
|
address->section = TAKE_PTR(n);
|
2018-11-12 06:57:04 +01:00
|
|
|
|
2020-10-02 05:34:19 +02:00
|
|
|
r = ordered_hashmap_ensure_allocated(&network->addresses_by_section, &network_config_hash_ops);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2018-11-12 07:24:11 +01:00
|
|
|
|
2020-10-02 05:34:19 +02:00
|
|
|
r = ordered_hashmap_put(network->addresses_by_section, address->section, address);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2013-11-19 16:54:42 +01:00
|
|
|
|
2018-04-05 07:26:26 +02:00
|
|
|
*ret = TAKE_PTR(address);
|
2013-10-17 03:18:36 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-10-02 05:18:37 +02:00
|
|
|
Address *address_free(Address *address) {
|
2013-10-17 03:18:36 +02:00
|
|
|
if (!address)
|
2020-10-02 05:18:37 +02:00
|
|
|
return NULL;
|
2013-10-17 03:18:36 +02:00
|
|
|
|
2014-01-01 15:16:10 +01:00
|
|
|
if (address->network) {
|
2020-10-02 05:34:19 +02:00
|
|
|
assert(address->section);
|
|
|
|
ordered_hashmap_remove(address->network->addresses_by_section, address->section);
|
2014-01-01 15:16:10 +01:00
|
|
|
}
|
2013-11-19 16:54:42 +01:00
|
|
|
|
2020-10-04 02:14:15 +02:00
|
|
|
if (address->link) {
|
2020-08-14 10:45:44 +02:00
|
|
|
NDiscAddress *n;
|
|
|
|
|
2015-09-23 01:53:29 +02:00
|
|
|
set_remove(address->link->addresses, address);
|
2015-09-30 14:01:44 +02:00
|
|
|
set_remove(address->link->addresses_foreign, address);
|
2020-07-23 17:52:32 +02:00
|
|
|
set_remove(address->link->static_addresses, address);
|
2020-07-21 16:06:51 +02:00
|
|
|
if (address->link->dhcp_address == address)
|
|
|
|
address->link->dhcp_address = NULL;
|
|
|
|
if (address->link->dhcp_address_old == address)
|
|
|
|
address->link->dhcp_address_old = NULL;
|
2020-07-22 20:13:42 +02:00
|
|
|
set_remove(address->link->dhcp6_addresses, address);
|
|
|
|
set_remove(address->link->dhcp6_addresses_old, address);
|
|
|
|
set_remove(address->link->dhcp6_pd_addresses, address);
|
|
|
|
set_remove(address->link->dhcp6_pd_addresses_old, address);
|
2020-09-08 11:58:29 +02:00
|
|
|
SET_FOREACH(n, address->link->ndisc_addresses)
|
2020-08-14 10:45:44 +02:00
|
|
|
if (n->address == address)
|
|
|
|
free(set_remove(address->link->ndisc_addresses, n));
|
2016-05-18 14:49:40 +02:00
|
|
|
|
|
|
|
if (in_addr_equal(AF_INET6, &address->in_addr, (const union in_addr_union *) &address->link->ipv6ll_address))
|
|
|
|
memzero(&address->link->ipv6ll_address, sizeof(struct in6_addr));
|
2015-09-30 14:01:44 +02:00
|
|
|
}
|
2015-09-23 01:53:29 +02:00
|
|
|
|
2019-11-21 16:54:52 +01:00
|
|
|
sd_ipv4acd_unref(address->acd);
|
|
|
|
|
2018-11-03 07:44:34 +01:00
|
|
|
network_config_section_free(address->section);
|
|
|
|
free(address->label);
|
2020-10-02 05:18:37 +02:00
|
|
|
return mfree(address);
|
2013-10-17 03:18:36 +02:00
|
|
|
}
|
|
|
|
|
2020-12-03 02:19:35 +01:00
|
|
|
static bool address_may_have_broadcast(const Address *a) {
|
|
|
|
assert(a);
|
|
|
|
|
|
|
|
/* A /31 or /32 IPv4 address does not have a broadcast address.
|
|
|
|
* See https://tools.ietf.org/html/rfc3021 */
|
|
|
|
|
|
|
|
return a->family == AF_INET && in4_addr_is_null(&a->in_addr_peer.in) && a->prefixlen <= 30;
|
|
|
|
}
|
|
|
|
|
2020-09-04 03:55:40 +02:00
|
|
|
void address_hash_func(const Address *a, struct siphash *state) {
|
2015-09-22 17:54:27 +02:00
|
|
|
assert(a);
|
|
|
|
|
|
|
|
siphash24_compress(&a->family, sizeof(a->family), state);
|
|
|
|
|
2020-12-03 02:19:35 +01:00
|
|
|
if (!IN_SET(a->family, AF_INET, AF_INET6))
|
|
|
|
/* treat non-IPv4 or IPv6 address family as AF_UNSPEC */
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (a->family == AF_INET)
|
2020-10-13 07:53:46 +02:00
|
|
|
siphash24_compress_string(a->label, state);
|
2015-09-22 17:54:27 +02:00
|
|
|
|
2020-12-03 02:19:35 +01:00
|
|
|
siphash24_compress(&a->prefixlen, sizeof(a->prefixlen), state);
|
|
|
|
/* local address */
|
|
|
|
siphash24_compress(&a->in_addr, FAMILY_ADDRESS_SIZE(a->family), state);
|
|
|
|
/* peer address */
|
|
|
|
siphash24_compress(&a->in_addr_peer, FAMILY_ADDRESS_SIZE(a->family), state);
|
2015-09-22 17:54:27 +02:00
|
|
|
|
2020-12-03 02:19:35 +01:00
|
|
|
if (address_may_have_broadcast(a))
|
|
|
|
siphash24_compress(&a->broadcast, sizeof(a->broadcast), state);
|
2015-09-22 17:54:27 +02:00
|
|
|
}
|
|
|
|
|
2020-09-04 03:55:40 +02:00
|
|
|
int address_compare_func(const Address *a1, const Address *a2) {
|
2018-08-03 01:43:37 +02:00
|
|
|
int r;
|
2015-09-22 17:54:27 +02:00
|
|
|
|
2018-08-03 01:43:37 +02:00
|
|
|
r = CMP(a1->family, a2->family);
|
|
|
|
if (r != 0)
|
|
|
|
return r;
|
2015-09-22 17:54:27 +02:00
|
|
|
|
2020-12-03 02:19:35 +01:00
|
|
|
if (!IN_SET(a1->family, AF_INET, AF_INET6))
|
|
|
|
/* treat non-IPv4 or IPv6 address family as AF_UNSPEC */
|
|
|
|
return 0;
|
2015-09-22 17:54:27 +02:00
|
|
|
|
2020-12-03 02:19:35 +01:00
|
|
|
if (a1->family == AF_INET) {
|
2020-10-13 07:53:46 +02:00
|
|
|
r = strcmp_ptr(a1->label, a2->label);
|
2019-09-17 19:09:57 +02:00
|
|
|
if (r != 0)
|
|
|
|
return r;
|
2020-12-03 02:19:35 +01:00
|
|
|
}
|
2015-09-22 17:54:27 +02:00
|
|
|
|
2020-12-03 02:19:35 +01:00
|
|
|
r = CMP(a1->prefixlen, a2->prefixlen);
|
|
|
|
if (r != 0)
|
|
|
|
return r;
|
2020-10-13 07:53:46 +02:00
|
|
|
|
2020-12-03 02:19:35 +01:00
|
|
|
r = memcmp(&a1->in_addr, &a2->in_addr, FAMILY_ADDRESS_SIZE(a1->family));
|
|
|
|
if (r != 0)
|
|
|
|
return r;
|
2020-10-13 07:53:46 +02:00
|
|
|
|
2020-12-03 02:19:35 +01:00
|
|
|
r = memcmp(&a1->in_addr_peer, &a2->in_addr_peer, FAMILY_ADDRESS_SIZE(a1->family));
|
|
|
|
if (r != 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
if (address_may_have_broadcast(a1))
|
|
|
|
return CMP(a1->broadcast.s_addr, a2->broadcast.s_addr);
|
|
|
|
|
|
|
|
return 0;
|
2015-09-22 17:54:27 +02:00
|
|
|
}
|
|
|
|
|
2020-07-22 01:22:55 +02:00
|
|
|
DEFINE_HASH_OPS_WITH_KEY_DESTRUCTOR(address_hash_ops, Address, address_hash_func, address_compare_func, address_free);
|
2015-09-22 17:54:27 +02:00
|
|
|
|
2020-10-13 08:06:44 +02:00
|
|
|
bool address_equal(const Address *a1, const Address *a2) {
|
2015-09-22 17:54:27 +02:00
|
|
|
if (a1 == a2)
|
|
|
|
return true;
|
|
|
|
|
|
|
|
if (!a1 || !a2)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
return address_compare_func(a1, a2) == 0;
|
|
|
|
}
|
|
|
|
|
2020-10-04 01:47:42 +02:00
|
|
|
static int address_copy(Address *dest, const Address *src) {
|
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(dest);
|
|
|
|
assert(src);
|
|
|
|
|
2020-12-03 02:19:35 +01:00
|
|
|
if (src->family == AF_INET) {
|
|
|
|
r = free_and_strdup(&dest->label, src->label);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
}
|
2020-10-04 01:47:42 +02:00
|
|
|
|
|
|
|
dest->family = src->family;
|
|
|
|
dest->prefixlen = src->prefixlen;
|
|
|
|
dest->scope = src->scope;
|
|
|
|
dest->flags = src->flags;
|
|
|
|
dest->cinfo = src->cinfo;
|
|
|
|
dest->in_addr = src->in_addr;
|
|
|
|
dest->in_addr_peer = src->in_addr_peer;
|
2020-12-03 02:19:35 +01:00
|
|
|
if (address_may_have_broadcast(src))
|
|
|
|
dest->broadcast = src->broadcast;
|
2020-10-04 01:47:42 +02:00
|
|
|
dest->duplicate_address_detection = src->duplicate_address_detection;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-10-04 04:06:23 +02:00
|
|
|
static int address_set_masquerade(Address *address, bool add) {
|
|
|
|
union in_addr_union masked;
|
2015-09-24 15:25:20 +02:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(address);
|
2020-10-04 04:06:23 +02:00
|
|
|
assert(address->link);
|
2015-09-24 15:25:20 +02:00
|
|
|
|
2020-10-04 04:06:23 +02:00
|
|
|
if (!address->link->network)
|
|
|
|
return 0;
|
2015-09-24 15:25:20 +02:00
|
|
|
|
2020-10-04 04:06:23 +02:00
|
|
|
if (!address->link->network->ip_masquerade)
|
|
|
|
return 0;
|
2015-09-24 15:25:20 +02:00
|
|
|
|
2020-10-04 04:06:23 +02:00
|
|
|
if (address->family != AF_INET)
|
|
|
|
return 0;
|
2015-09-24 15:25:20 +02:00
|
|
|
|
2020-10-04 04:06:23 +02:00
|
|
|
if (address->scope >= RT_SCOPE_LINK)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (address->ip_masquerade_done == add)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
masked = address->in_addr;
|
|
|
|
r = in_addr_mask(address->family, &masked, address->prefixlen);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
r = fw_add_masquerade(add, AF_INET, 0, &masked, address->prefixlen, NULL, NULL, 0);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
address->ip_masquerade_done = add;
|
2015-09-24 15:25:20 +02:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-10-13 07:53:46 +02:00
|
|
|
static int address_add_internal(Link *link, Set **addresses, const Address *in, Address **ret) {
|
tree-wide: drop redundant _cleanup_ macros (#8810)
This drops a good number of type-specific _cleanup_ macros, and patches
all users to just use the generic ones.
In most recent code we abstained from defining type-specific macros, and
this basically removes all those added already, with the exception of
the really low-level ones.
Having explicit macros for this is not too useful, as the expression
without the extra macro is generally just 2ch wider. We should generally
emphesize generic code, unless there are really good reasons for
specific code, hence let's follow this in this case too.
Note that _cleanup_free_ and similar really low-level, libc'ish, Linux
API'ish macros continue to be defined, only the really high-level OO
ones are dropped. From now on this should really be the rule: for really
low-level stuff, such as memory allocation, fd handling and so one, go
ahead and define explicit per-type macros, but for high-level, specific
program code, just use the generic _cleanup_() macro directly, in order
to keep things simple and as readable as possible for the uninitiated.
Note that before this patch some of the APIs (notable libudev ones) were
already used with the high-level macros at some places and with the
generic _cleanup_ macro at others. With this patch we hence unify on the
latter.
2018-04-25 12:31:45 +02:00
|
|
|
_cleanup_(address_freep) Address *address = NULL;
|
2015-09-23 01:53:29 +02:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(link);
|
2015-09-30 14:01:44 +02:00
|
|
|
assert(addresses);
|
2020-10-13 07:53:46 +02:00
|
|
|
assert(in);
|
2015-09-24 01:22:05 +02:00
|
|
|
|
|
|
|
r = address_new(&address);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
2020-10-13 07:53:46 +02:00
|
|
|
r = address_copy(address, in);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
2015-11-10 13:52:34 +01:00
|
|
|
/* Consider address tentative until we get the real flags from the kernel */
|
|
|
|
address->flags = IFA_F_TENTATIVE;
|
2015-09-23 01:53:29 +02:00
|
|
|
|
2020-06-05 15:12:29 +02:00
|
|
|
r = set_ensure_put(addresses, &address_hash_ops, address);
|
2015-09-23 01:53:29 +02:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2019-08-11 01:56:37 +02:00
|
|
|
if (r == 0)
|
|
|
|
return -EEXIST;
|
2015-09-23 01:53:29 +02:00
|
|
|
|
|
|
|
address->link = link;
|
|
|
|
|
2015-09-30 14:01:44 +02:00
|
|
|
if (ret)
|
|
|
|
*ret = address;
|
2020-06-05 15:12:29 +02:00
|
|
|
TAKE_PTR(address);
|
2015-09-23 01:53:29 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-10-13 07:53:46 +02:00
|
|
|
static int address_add_foreign(Link *link, const Address *in, Address **ret) {
|
|
|
|
return address_add_internal(link, &link->addresses_foreign, in, ret);
|
2015-09-30 14:01:44 +02:00
|
|
|
}
|
|
|
|
|
2020-10-13 07:53:46 +02:00
|
|
|
static int address_add(Link *link, const Address *in, Address **ret) {
|
2015-10-26 11:40:02 +01:00
|
|
|
Address *address;
|
2015-09-30 15:32:16 +02:00
|
|
|
int r;
|
|
|
|
|
2020-10-13 07:53:46 +02:00
|
|
|
assert(link);
|
|
|
|
assert(in);
|
|
|
|
|
|
|
|
r = address_get(link, in, &address);
|
2015-10-26 11:40:02 +01:00
|
|
|
if (r == -ENOENT) {
|
|
|
|
/* Address does not exist, create a new one */
|
2020-10-13 07:53:46 +02:00
|
|
|
r = address_add_internal(link, &link->addresses, in, &address);
|
2015-10-26 11:40:02 +01:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
} else if (r == 0) {
|
|
|
|
/* Take over a foreign address */
|
2020-06-05 15:12:29 +02:00
|
|
|
r = set_ensure_put(&link->addresses, &address_hash_ops, address);
|
2015-10-26 11:40:02 +01:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
set_remove(link->addresses_foreign, address);
|
|
|
|
} else if (r == 1) {
|
|
|
|
/* Already exists, do nothing */
|
|
|
|
;
|
|
|
|
} else
|
2015-09-30 15:32:16 +02:00
|
|
|
return r;
|
|
|
|
|
2015-10-26 11:40:02 +01:00
|
|
|
if (ret)
|
|
|
|
*ret = address;
|
2015-09-30 15:32:16 +02:00
|
|
|
|
|
|
|
return 0;
|
2015-09-30 14:01:44 +02:00
|
|
|
}
|
|
|
|
|
2020-10-13 07:53:46 +02:00
|
|
|
static int address_update(Address *address, const Address *src) {
|
2015-09-28 17:16:12 +02:00
|
|
|
bool ready;
|
2015-11-10 21:30:59 +01:00
|
|
|
int r;
|
2015-09-28 17:16:12 +02:00
|
|
|
|
|
|
|
assert(address);
|
2020-07-24 00:18:39 +02:00
|
|
|
assert(address->link);
|
2020-10-13 07:53:46 +02:00
|
|
|
assert(src);
|
2015-09-28 17:16:12 +02:00
|
|
|
|
|
|
|
ready = address_is_ready(address);
|
|
|
|
|
2020-10-13 07:53:46 +02:00
|
|
|
address->flags = src->flags;
|
|
|
|
address->scope = src->scope;
|
|
|
|
address->cinfo = src->cinfo;
|
2015-09-28 17:16:12 +02:00
|
|
|
|
2020-07-24 00:18:39 +02:00
|
|
|
if (IN_SET(address->link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
|
|
|
|
return 0;
|
|
|
|
|
2019-02-12 22:32:48 +01:00
|
|
|
link_update_operstate(address->link, true);
|
2018-12-21 07:52:33 +01:00
|
|
|
link_check_ready(address->link);
|
networkd: do not update state or IPv6LL address if link is failed or lingering
This is partial fix for #2228 and #2977, #3204.
bridge-test: netdev ready
docker0: Gained IPv6LL
wlan0: Gained IPv6LL
eth0: Gained IPv6LL
Enumeration completed
bridge-test: netdev exists, using existing without changing its
parameters
vboxnet0: IPv6 enabled for interface: Success
lo: Configured
docker0: Could not drop address: No such process
vboxnet0: Gained carrier
wlan0: Could not drop address: No such process
eth0: Could not drop address: No such process
eth0: Could not drop address: No such process
eth0: Could not drop address: No such process
vboxnet0: Gained IPv6LL
vboxnet0: Could not set NDisc route or address: Invalid argument
vboxnet0: Failed
[New Thread 0x7ffff6505700 (LWP 1111)]
[Thread 0x7ffff6505700 (LWP 1111) exited]
Assertion 'link->state == LINK_STATE_SETTING_ROUTES' failed at
src/network/networkd-link.c:672, function link_enter_configured().
Aborting.
Program received signal SIGABRT, Aborted.
0x00007ffff6dc6a98 in raise () from /lib64/libc.so.6
Missing separate debuginfos, use: dnf debuginfo-install
iptables-1.4.21-15.fc23.x86_64 libattr-2.4.47-14.fc23.x86_64
libidn-1.32-1.fc23.x86_64 pcre-8.38-7.fc23.x86_64
Debugging
(gdb) bt
"link->state == LINK_STATE_SETTING_ROUTES", file=0x5555556a34c8
"src/network/networkd-link.c", line=672,
func=0x5555556a56d0 <__PRETTY_FUNCTION__.14850>
"link_enter_configured") at src/basic/log.c:788
src/network/networkd-link.c:672
src/network/networkd-link.c:720
flags=0 '\000', scope=0 '\000', cinfo=0x7fffffffe020) at
src/network/networkd-address.c:344
(rtnl=0x5555556eded0, message=0x55555570ff20, userdata=0x5555556ec590)
at src/network/networkd-manager.c:604
m=0x55555570ff20) at src/libsystemd/sd-netlink/sd-netlink.c:365
at src/libsystemd/sd-netlink/sd-netlink.c:395
ret=0x0) at src/libsystemd/sd-netlink/sd-netlink.c:429
revents=1, userdata=0x5555556eded0) at
src/libsystemd/sd-netlink/sd-netlink.c:723
src/libsystemd/sd-event/sd-event.c:2268
src/libsystemd/sd-event/sd-event.c:2629
timeout=18446744073709551615) at src/libsystemd/sd-event/sd-event.c:2688
bus=0x5555556eeba0, name=0x55555568a2f5 "org.freedesktop.network1",
timeout=30000000,
check_idle=0x55555556adb6 <manager_check_idle>,
userdata=0x5555556ec590) at src/shared/bus-util.c:134
src/network/networkd-manager.c:1130
src/network/networkd.c:127
(gdb) f 3
src/network/networkd-link.c:672
672 assert(link->state == LINK_STATE_SETTING_ROUTES);
(gdb) p link->state
$1 = LINK_STATE_FAILED
We should not be in this state .
even if vboxnet0 failed we went into this state.
vboxnet0: Could not set NDisc route or address: Invalid argument
vboxnet0: Failed
2016-05-18 04:59:56 +02:00
|
|
|
|
2020-07-21 16:02:35 +02:00
|
|
|
if (!ready && address_is_ready(address)) {
|
|
|
|
if (address->callback) {
|
|
|
|
r = address->callback(address);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
}
|
networkd: do not update state or IPv6LL address if link is failed or lingering
This is partial fix for #2228 and #2977, #3204.
bridge-test: netdev ready
docker0: Gained IPv6LL
wlan0: Gained IPv6LL
eth0: Gained IPv6LL
Enumeration completed
bridge-test: netdev exists, using existing without changing its
parameters
vboxnet0: IPv6 enabled for interface: Success
lo: Configured
docker0: Could not drop address: No such process
vboxnet0: Gained carrier
wlan0: Could not drop address: No such process
eth0: Could not drop address: No such process
eth0: Could not drop address: No such process
eth0: Could not drop address: No such process
vboxnet0: Gained IPv6LL
vboxnet0: Could not set NDisc route or address: Invalid argument
vboxnet0: Failed
[New Thread 0x7ffff6505700 (LWP 1111)]
[Thread 0x7ffff6505700 (LWP 1111) exited]
Assertion 'link->state == LINK_STATE_SETTING_ROUTES' failed at
src/network/networkd-link.c:672, function link_enter_configured().
Aborting.
Program received signal SIGABRT, Aborted.
0x00007ffff6dc6a98 in raise () from /lib64/libc.so.6
Missing separate debuginfos, use: dnf debuginfo-install
iptables-1.4.21-15.fc23.x86_64 libattr-2.4.47-14.fc23.x86_64
libidn-1.32-1.fc23.x86_64 pcre-8.38-7.fc23.x86_64
Debugging
(gdb) bt
"link->state == LINK_STATE_SETTING_ROUTES", file=0x5555556a34c8
"src/network/networkd-link.c", line=672,
func=0x5555556a56d0 <__PRETTY_FUNCTION__.14850>
"link_enter_configured") at src/basic/log.c:788
src/network/networkd-link.c:672
src/network/networkd-link.c:720
flags=0 '\000', scope=0 '\000', cinfo=0x7fffffffe020) at
src/network/networkd-address.c:344
(rtnl=0x5555556eded0, message=0x55555570ff20, userdata=0x5555556ec590)
at src/network/networkd-manager.c:604
m=0x55555570ff20) at src/libsystemd/sd-netlink/sd-netlink.c:365
at src/libsystemd/sd-netlink/sd-netlink.c:395
ret=0x0) at src/libsystemd/sd-netlink/sd-netlink.c:429
revents=1, userdata=0x5555556eded0) at
src/libsystemd/sd-netlink/sd-netlink.c:723
src/libsystemd/sd-event/sd-event.c:2268
src/libsystemd/sd-event/sd-event.c:2629
timeout=18446744073709551615) at src/libsystemd/sd-event/sd-event.c:2688
bus=0x5555556eeba0, name=0x55555568a2f5 "org.freedesktop.network1",
timeout=30000000,
check_idle=0x55555556adb6 <manager_check_idle>,
userdata=0x5555556ec590) at src/shared/bus-util.c:134
src/network/networkd-manager.c:1130
src/network/networkd.c:127
(gdb) f 3
src/network/networkd-link.c:672
672 assert(link->state == LINK_STATE_SETTING_ROUTES);
(gdb) p link->state
$1 = LINK_STATE_FAILED
We should not be in this state .
even if vboxnet0 failed we went into this state.
vboxnet0: Could not set NDisc route or address: Invalid argument
vboxnet0: Failed
2016-05-18 04:59:56 +02:00
|
|
|
|
2020-07-21 16:02:35 +02:00
|
|
|
if (address->family == AF_INET6 &&
|
|
|
|
in_addr_is_link_local(AF_INET6, &address->in_addr) > 0 &&
|
|
|
|
IN6_IS_ADDR_UNSPECIFIED(&address->link->ipv6ll_address) > 0) {
|
|
|
|
|
|
|
|
r = link_ipv6ll_gained(address->link, &address->in_addr.in6);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
}
|
2015-10-27 00:06:10 +01:00
|
|
|
}
|
2015-09-28 17:16:12 +02:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-10-02 06:50:36 +02:00
|
|
|
static int address_drop(Address *address) {
|
2015-09-28 13:38:43 +02:00
|
|
|
Link *link;
|
|
|
|
bool ready;
|
2019-03-11 06:30:45 +01:00
|
|
|
int r;
|
2015-09-28 13:38:43 +02:00
|
|
|
|
2015-01-13 13:47:08 +01:00
|
|
|
assert(address);
|
2015-09-24 15:25:20 +02:00
|
|
|
|
2015-09-28 13:38:43 +02:00
|
|
|
ready = address_is_ready(address);
|
|
|
|
link = address->link;
|
|
|
|
|
2020-10-04 04:06:23 +02:00
|
|
|
r = address_set_masquerade(address, false);
|
2019-03-11 06:30:45 +01:00
|
|
|
if (r < 0)
|
|
|
|
log_link_warning_errno(link, r, "Failed to disable IP masquerading, ignoring: %m");
|
|
|
|
|
2015-09-24 15:25:20 +02:00
|
|
|
address_free(address);
|
|
|
|
|
2019-02-12 22:32:48 +01:00
|
|
|
link_update_operstate(link, true);
|
2015-09-30 18:17:43 +02:00
|
|
|
|
2015-09-28 13:38:43 +02:00
|
|
|
if (link && !ready)
|
|
|
|
link_check_ready(link);
|
|
|
|
|
2015-09-24 15:25:20 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-10-13 07:53:46 +02:00
|
|
|
int address_get(Link *link, const Address *in, Address **ret) {
|
|
|
|
Address *existing;
|
2015-09-24 15:25:20 +02:00
|
|
|
|
2015-01-13 13:47:08 +01:00
|
|
|
assert(link);
|
2020-10-13 07:53:46 +02:00
|
|
|
assert(in);
|
2015-01-13 13:47:08 +01:00
|
|
|
|
2020-10-13 07:53:46 +02:00
|
|
|
existing = set_get(link->addresses, in);
|
2015-10-26 11:40:02 +01:00
|
|
|
if (existing) {
|
2016-06-03 19:51:48 +02:00
|
|
|
if (ret)
|
|
|
|
*ret = existing;
|
2015-10-26 11:40:02 +01:00
|
|
|
return 1;
|
2015-09-30 14:01:44 +02:00
|
|
|
}
|
2015-01-13 13:47:08 +01:00
|
|
|
|
2020-10-13 07:53:46 +02:00
|
|
|
existing = set_get(link->addresses_foreign, in);
|
2016-06-03 19:51:48 +02:00
|
|
|
if (existing) {
|
|
|
|
if (ret)
|
|
|
|
*ret = existing;
|
|
|
|
return 0;
|
|
|
|
}
|
2015-01-13 13:47:08 +01:00
|
|
|
|
2016-06-03 19:51:48 +02:00
|
|
|
return -ENOENT;
|
2015-01-13 13:47:08 +01:00
|
|
|
}
|
|
|
|
|
2020-07-17 22:42:59 +02:00
|
|
|
static bool address_exists_internal(Set *addresses, int family, const union in_addr_union *in_addr) {
|
|
|
|
Address *address;
|
|
|
|
|
2020-09-08 11:58:29 +02:00
|
|
|
SET_FOREACH(address, addresses) {
|
2020-07-17 22:42:59 +02:00
|
|
|
if (address->family != family)
|
|
|
|
continue;
|
|
|
|
if (in_addr_equal(address->family, &address->in_addr, in_addr))
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool address_exists(Link *link, int family, const union in_addr_union *in_addr) {
|
|
|
|
assert(link);
|
|
|
|
assert(IN_SET(family, AF_INET, AF_INET6));
|
|
|
|
assert(in_addr);
|
|
|
|
|
|
|
|
if (address_exists_internal(link->addresses, family, in_addr))
|
|
|
|
return true;
|
|
|
|
if (address_exists_internal(link->addresses_foreign, family, in_addr))
|
|
|
|
return true;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2018-11-28 21:06:52 +01:00
|
|
|
static int address_remove_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
|
2018-11-28 21:22:08 +01:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(m);
|
|
|
|
assert(link);
|
|
|
|
assert(link->ifname);
|
|
|
|
|
|
|
|
if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
r = sd_netlink_message_get_errno(m);
|
|
|
|
if (r < 0 && r != -EADDRNOTAVAIL)
|
2019-11-30 07:54:07 +01:00
|
|
|
log_link_message_warning_errno(link, m, r, "Could not drop address");
|
2020-08-08 05:31:12 +02:00
|
|
|
else if (r >= 0)
|
2020-07-14 19:00:06 +02:00
|
|
|
(void) manager_rtnl_process_address(rtnl, m, link->manager);
|
2018-11-28 21:22:08 +01:00
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2016-05-15 16:22:40 +02:00
|
|
|
int address_remove(
|
2020-10-13 08:06:44 +02:00
|
|
|
const Address *address,
|
2016-05-15 16:22:40 +02:00
|
|
|
Link *link,
|
2018-11-28 21:06:52 +01:00
|
|
|
link_netlink_message_handler_t callback) {
|
2016-05-15 16:22:40 +02:00
|
|
|
|
tree-wide: expose "p"-suffix unref calls in public APIs to make gcc cleanup easy
GLIB has recently started to officially support the gcc cleanup
attribute in its public API, hence let's do the same for our APIs.
With this patch we'll define an xyz_unrefp() call for each public
xyz_unref() call, to make it easy to use inside a
__attribute__((cleanup())) expression. Then, all code is ported over to
make use of this.
The new calls are also documented in the man pages, with examples how to
use them (well, I only added docs where the _unref() call itself already
had docs, and the examples, only cover sd_bus_unrefp() and
sd_event_unrefp()).
This also renames sd_lldp_free() to sd_lldp_unref(), since that's how we
tend to call our destructors these days.
Note that this defines no public macro that wraps gcc's attribute and
makes it easier to use. While I think it's our duty in the library to
make our stuff easy to use, I figure it's not our duty to make gcc's own
features easy to use on its own. Most likely, client code which wants to
make use of this should define its own:
#define _cleanup_(function) __attribute__((cleanup(function)))
Or similar, to make the gcc feature easier to use.
Making this logic public has the benefit that we can remove three header
files whose only purpose was to define these functions internally.
See #2008.
2015-11-27 19:13:45 +01:00
|
|
|
_cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
|
2013-12-31 17:31:50 +01:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(address);
|
2017-10-04 16:01:32 +02:00
|
|
|
assert(IN_SET(address->family, AF_INET, AF_INET6));
|
2013-12-31 17:31:50 +01:00
|
|
|
assert(link);
|
|
|
|
assert(link->ifindex > 0);
|
|
|
|
assert(link->manager);
|
|
|
|
assert(link->manager->rtnl);
|
|
|
|
|
2018-10-31 13:33:54 +01:00
|
|
|
if (DEBUG_LOGGING) {
|
2019-03-11 06:30:45 +01:00
|
|
|
_cleanup_free_ char *b = NULL;
|
|
|
|
|
|
|
|
(void) in_addr_to_string(address->family, &address->in_addr, &b);
|
|
|
|
log_link_debug(link, "Removing address %s", strna(b));
|
2018-10-31 13:33:54 +01:00
|
|
|
}
|
|
|
|
|
2014-02-19 23:54:58 +01:00
|
|
|
r = sd_rtnl_message_new_addr(link->manager->rtnl, &req, RTM_DELADDR,
|
|
|
|
link->ifindex, address->family);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not allocate RTM_DELADDR message: %m");
|
2013-12-31 17:31:50 +01:00
|
|
|
|
2014-01-21 15:55:57 +01:00
|
|
|
r = sd_rtnl_message_addr_set_prefixlen(req, address->prefixlen);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not set prefixlen: %m");
|
2014-01-21 15:55:57 +01:00
|
|
|
|
2019-02-03 01:47:25 +01:00
|
|
|
r = netlink_message_append_in_addr_union(req, IFA_LOCAL, address->family, &address->in_addr);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not append IFA_LOCAL attribute: %m");
|
2013-12-31 17:31:50 +01:00
|
|
|
|
2018-11-28 21:06:52 +01:00
|
|
|
r = netlink_call_async(link->manager->rtnl, NULL, req,
|
|
|
|
callback ?: address_remove_handler,
|
|
|
|
link_netlink_destroy_callback, link);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
|
2013-12-31 17:31:50 +01:00
|
|
|
|
2014-07-03 09:43:31 +02:00
|
|
|
link_ref(link);
|
|
|
|
|
2013-12-31 17:31:50 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-10-13 08:06:44 +02:00
|
|
|
static bool link_is_static_address_configured(const Link *link, const Address *address) {
|
2020-10-02 04:26:12 +02:00
|
|
|
Address *net_address;
|
|
|
|
|
|
|
|
assert(link);
|
|
|
|
assert(address);
|
|
|
|
|
|
|
|
if (!link->network)
|
|
|
|
return false;
|
|
|
|
|
2020-10-02 05:34:19 +02:00
|
|
|
ORDERED_HASHMAP_FOREACH(net_address, link->network->addresses_by_section)
|
2020-10-02 04:26:12 +02:00
|
|
|
if (address_equal(net_address, address))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-10-28 06:16:22 +01:00
|
|
|
bool link_address_is_dynamic(const Link *link, const Address *address) {
|
2020-10-02 04:26:12 +02:00
|
|
|
Route *route;
|
|
|
|
|
|
|
|
assert(link);
|
|
|
|
assert(address);
|
|
|
|
|
|
|
|
if (address->cinfo.ifa_prefered != CACHE_INFO_INFINITY_LIFE_TIME)
|
|
|
|
return true;
|
|
|
|
|
|
|
|
/* Even when the address is leased from a DHCP server, networkd assign the address
|
|
|
|
* without lifetime when KeepConfiguration=dhcp. So, let's check that we have
|
|
|
|
* corresponding routes with RTPROT_DHCP. */
|
|
|
|
SET_FOREACH(route, link->routes_foreign) {
|
|
|
|
if (route->protocol != RTPROT_DHCP)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (address->family != route->family)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (in_addr_equal(address->family, &address->in_addr, &route->prefsrc))
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-10-03 23:50:55 +02:00
|
|
|
static int link_enumerate_ipv6_tentative_addresses(Link *link) {
|
|
|
|
_cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
|
|
|
|
sd_netlink_message *addr;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(link);
|
|
|
|
assert(link->manager);
|
|
|
|
assert(link->manager->rtnl);
|
|
|
|
|
|
|
|
r = sd_rtnl_message_new_addr(link->manager->rtnl, &req, RTM_GETADDR, 0, AF_INET6);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
r = sd_netlink_call(link->manager->rtnl, req, 0, &reply);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
for (addr = reply; addr; addr = sd_netlink_message_next(addr)) {
|
|
|
|
unsigned char flags;
|
|
|
|
int ifindex;
|
|
|
|
|
|
|
|
r = sd_rtnl_message_addr_get_ifindex(addr, &ifindex);
|
|
|
|
if (r < 0) {
|
|
|
|
log_link_warning_errno(link, r, "rtnl: invalid ifindex, ignoring: %m");
|
|
|
|
continue;
|
|
|
|
} else if (link->ifindex != ifindex)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
r = sd_rtnl_message_addr_get_flags(addr, &flags);
|
|
|
|
if (r < 0) {
|
|
|
|
log_link_warning_errno(link, r, "rtnl: received address message with invalid flags, ignoring: %m");
|
|
|
|
continue;
|
|
|
|
} else if (!(flags & IFA_F_TENTATIVE))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
log_link_debug(link, "Found tentative ipv6 link-local address");
|
|
|
|
(void) manager_rtnl_process_address(link->manager->rtnl, addr, link->manager);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-10-02 04:26:12 +02:00
|
|
|
int link_drop_foreign_addresses(Link *link) {
|
|
|
|
Address *address;
|
|
|
|
int k, r = 0;
|
|
|
|
|
|
|
|
assert(link);
|
|
|
|
|
2020-10-03 23:50:55 +02:00
|
|
|
/* The kernel doesn't notify us about tentative addresses;
|
|
|
|
* so if ipv6ll is disabled, we need to enumerate them now so we can drop them below */
|
|
|
|
if (!link_ipv6ll_enabled(link)) {
|
|
|
|
r = link_enumerate_ipv6_tentative_addresses(link);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2020-10-02 04:26:12 +02:00
|
|
|
SET_FOREACH(address, link->addresses_foreign) {
|
|
|
|
/* we consider IPv6LL addresses to be managed by the kernel */
|
|
|
|
if (address->family == AF_INET6 && in_addr_is_link_local(AF_INET6, &address->in_addr) == 1 && link_ipv6ll_enabled(link))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (link_address_is_dynamic(link, address)) {
|
|
|
|
if (link->network && FLAGS_SET(link->network->keep_configuration, KEEP_CONFIGURATION_DHCP))
|
|
|
|
continue;
|
|
|
|
} else if (link->network && FLAGS_SET(link->network->keep_configuration, KEEP_CONFIGURATION_STATIC))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (link_is_static_address_configured(link, address)) {
|
2020-10-13 07:53:46 +02:00
|
|
|
k = address_add(link, address, NULL);
|
2020-10-02 04:26:12 +02:00
|
|
|
if (k < 0) {
|
|
|
|
log_link_error_errno(link, k, "Failed to add address: %m");
|
|
|
|
if (r >= 0)
|
|
|
|
r = k;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
k = address_remove(address, link, NULL);
|
|
|
|
if (k < 0 && r >= 0)
|
|
|
|
r = k;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2020-10-02 04:30:33 +02:00
|
|
|
static int remove_static_address_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
|
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(m);
|
|
|
|
assert(link);
|
|
|
|
assert(link->ifname);
|
|
|
|
assert(link->address_remove_messages > 0);
|
|
|
|
|
|
|
|
link->address_remove_messages--;
|
|
|
|
|
|
|
|
if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
r = sd_netlink_message_get_errno(m);
|
|
|
|
if (r < 0 && r != -EADDRNOTAVAIL)
|
|
|
|
log_link_message_warning_errno(link, m, r, "Could not drop address");
|
|
|
|
else if (r >= 0)
|
|
|
|
(void) manager_rtnl_process_address(rtnl, m, link->manager);
|
|
|
|
|
|
|
|
if (link->address_remove_messages == 0 && link->request_static_addresses) {
|
|
|
|
link_set_state(link, LINK_STATE_CONFIGURING);
|
|
|
|
r = link_set_addresses(link);
|
|
|
|
if (r < 0)
|
|
|
|
link_enter_failed(link);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int link_drop_addresses(Link *link) {
|
|
|
|
Address *address, *pool_address;
|
|
|
|
int k, r = 0;
|
|
|
|
|
|
|
|
assert(link);
|
|
|
|
|
|
|
|
SET_FOREACH(address, link->addresses) {
|
|
|
|
/* we consider IPv6LL addresses to be managed by the kernel */
|
|
|
|
if (address->family == AF_INET6 && in_addr_is_link_local(AF_INET6, &address->in_addr) == 1 && link_ipv6ll_enabled(link))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
k = address_remove(address, link, remove_static_address_handler);
|
|
|
|
if (k < 0 && r >= 0) {
|
|
|
|
r = k;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
link->address_remove_messages++;
|
|
|
|
|
2020-10-02 06:39:02 +02:00
|
|
|
SET_FOREACH(pool_address, link->pool_addresses)
|
|
|
|
if (address_equal(address, pool_address))
|
|
|
|
address_free(set_remove(link->pool_addresses, pool_address));
|
2020-10-02 04:30:33 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2020-10-06 19:57:54 +02:00
|
|
|
static int address_acquire(Link *link, const Address *original, Address **ret) {
|
2019-05-04 20:14:08 +02:00
|
|
|
union in_addr_union in_addr = IN_ADDR_NULL;
|
2014-06-18 18:22:14 +02:00
|
|
|
struct in_addr broadcast = {};
|
tree-wide: drop redundant _cleanup_ macros (#8810)
This drops a good number of type-specific _cleanup_ macros, and patches
all users to just use the generic ones.
In most recent code we abstained from defining type-specific macros, and
this basically removes all those added already, with the exception of
the really low-level ones.
Having explicit macros for this is not too useful, as the expression
without the extra macro is generally just 2ch wider. We should generally
emphesize generic code, unless there are really good reasons for
specific code, hence let's follow this in this case too.
Note that _cleanup_free_ and similar really low-level, libc'ish, Linux
API'ish macros continue to be defined, only the really high-level OO
ones are dropped. From now on this should really be the rule: for really
low-level stuff, such as memory allocation, fd handling and so one, go
ahead and define explicit per-type macros, but for high-level, specific
program code, just use the generic _cleanup_() macro directly, in order
to keep things simple and as readable as possible for the uninitiated.
Note that before this patch some of the APIs (notable libudev ones) were
already used with the high-level macros at some places and with the
generic _cleanup_ macro at others. With this patch we hence unify on the
latter.
2018-04-25 12:31:45 +02:00
|
|
|
_cleanup_(address_freep) Address *na = NULL;
|
2014-06-18 18:22:14 +02:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(link);
|
|
|
|
assert(original);
|
|
|
|
assert(ret);
|
|
|
|
|
|
|
|
/* Something useful was configured? just use it */
|
2019-02-21 03:46:51 +01:00
|
|
|
r = in_addr_is_null(original->family, &original->in_addr);
|
2020-10-02 06:39:02 +02:00
|
|
|
if (r < 0)
|
2019-02-21 03:46:51 +01:00
|
|
|
return r;
|
2020-10-02 06:39:02 +02:00
|
|
|
if (r == 0) {
|
|
|
|
*ret = NULL;
|
|
|
|
return 0;
|
|
|
|
}
|
2014-06-18 18:22:14 +02:00
|
|
|
|
|
|
|
/* The address is configured to be 0.0.0.0 or [::] by the user?
|
|
|
|
* Then let's acquire something more useful from the pool. */
|
2020-10-02 07:15:57 +02:00
|
|
|
r = address_pool_acquire(link->manager, original->family, original->prefixlen, &in_addr);
|
2015-04-21 17:40:18 +02:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return r;
|
|
|
|
if (r == 0)
|
2014-06-18 18:22:14 +02:00
|
|
|
return -EBUSY;
|
|
|
|
|
|
|
|
if (original->family == AF_INET) {
|
2014-12-10 20:00:04 +01:00
|
|
|
/* Pick first address in range for ourselves ... */
|
2014-06-18 18:22:14 +02:00
|
|
|
in_addr.in.s_addr = in_addr.in.s_addr | htobe32(1);
|
|
|
|
|
|
|
|
/* .. and use last as broadcast address */
|
2017-11-20 19:16:01 +01:00
|
|
|
if (original->prefixlen > 30)
|
|
|
|
broadcast.s_addr = 0;
|
|
|
|
else
|
|
|
|
broadcast.s_addr = in_addr.in.s_addr | htobe32(0xFFFFFFFFUL >> original->prefixlen);
|
2014-06-18 18:22:14 +02:00
|
|
|
} else if (original->family == AF_INET6)
|
|
|
|
in_addr.in6.s6_addr[15] |= 1;
|
|
|
|
|
2015-09-21 15:53:40 +02:00
|
|
|
r = address_new(&na);
|
2014-06-18 18:22:14 +02:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
2020-10-04 01:47:42 +02:00
|
|
|
r = address_copy(na, original);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2014-06-18 18:22:14 +02:00
|
|
|
|
|
|
|
na->broadcast = broadcast;
|
|
|
|
na->in_addr = in_addr;
|
|
|
|
|
2020-10-02 06:39:02 +02:00
|
|
|
r = set_ensure_put(&link->pool_addresses, &address_hash_ops, na);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
if (r == 0)
|
|
|
|
return -EEXIST;
|
2014-06-18 18:22:14 +02:00
|
|
|
|
2018-04-05 07:26:26 +02:00
|
|
|
*ret = TAKE_PTR(na);
|
2020-10-02 06:39:02 +02:00
|
|
|
return 1;
|
2014-06-18 18:22:14 +02:00
|
|
|
}
|
|
|
|
|
2020-10-04 02:14:15 +02:00
|
|
|
static int ipv4_dad_configure(Address *address);
|
|
|
|
|
2016-06-03 19:51:48 +02:00
|
|
|
int address_configure(
|
2020-10-13 08:06:44 +02:00
|
|
|
const Address *address,
|
2016-06-03 19:51:48 +02:00
|
|
|
Link *link,
|
2018-11-28 21:06:52 +01:00
|
|
|
link_netlink_message_handler_t callback,
|
2020-07-22 02:41:30 +02:00
|
|
|
bool update,
|
|
|
|
Address **ret) {
|
2016-06-03 19:51:48 +02:00
|
|
|
|
tree-wide: expose "p"-suffix unref calls in public APIs to make gcc cleanup easy
GLIB has recently started to officially support the gcc cleanup
attribute in its public API, hence let's do the same for our APIs.
With this patch we'll define an xyz_unrefp() call for each public
xyz_unref() call, to make it easy to use inside a
__attribute__((cleanup())) expression. Then, all code is ported over to
make use of this.
The new calls are also documented in the man pages, with examples how to
use them (well, I only added docs where the _unref() call itself already
had docs, and the examples, only cover sd_bus_unrefp() and
sd_event_unrefp()).
This also renames sd_lldp_free() to sd_lldp_unref(), since that's how we
tend to call our destructors these days.
Note that this defines no public macro that wraps gcc's attribute and
makes it easier to use. While I think it's our duty in the library to
make our stuff easy to use, I figure it's not our duty to make gcc's own
features easy to use on its own. Most likely, client code which wants to
make use of this should define its own:
#define _cleanup_(function) __attribute__((cleanup(function)))
Or similar, to make the gcc feature easier to use.
Making this logic public has the benefit that we can remove three header
files whose only purpose was to define these functions internally.
See #2008.
2015-11-27 19:13:45 +01:00
|
|
|
_cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
|
2020-10-02 06:39:02 +02:00
|
|
|
Address *acquired_address, *a;
|
2020-10-04 01:27:14 +02:00
|
|
|
uint32_t flags;
|
2013-10-17 03:18:36 +02:00
|
|
|
int r;
|
|
|
|
|
2013-11-24 23:36:58 +01:00
|
|
|
assert(address);
|
2017-10-04 16:01:32 +02:00
|
|
|
assert(IN_SET(address->family, AF_INET, AF_INET6));
|
2013-11-24 23:36:58 +01:00
|
|
|
assert(link);
|
|
|
|
assert(link->ifindex > 0);
|
2013-11-14 16:22:51 +01:00
|
|
|
assert(link->manager);
|
2013-11-24 23:36:58 +01:00
|
|
|
assert(link->manager->rtnl);
|
2018-11-28 21:29:09 +01:00
|
|
|
assert(callback);
|
2013-11-14 16:22:51 +01:00
|
|
|
|
2016-06-03 19:51:48 +02:00
|
|
|
/* If this is a new address, then refuse adding more than the limit */
|
2020-10-13 07:53:46 +02:00
|
|
|
if (address_get(link, address, NULL) <= 0 &&
|
2016-06-03 19:51:48 +02:00
|
|
|
set_size(link->addresses) >= ADDRESSES_PER_LINK_MAX)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, SYNTHETIC_ERRNO(E2BIG),
|
|
|
|
"Too many addresses are configured, refusing: %m");
|
2016-06-03 19:51:48 +02:00
|
|
|
|
2020-10-02 06:39:02 +02:00
|
|
|
r = address_acquire(link, address, &acquired_address);
|
2014-06-18 18:22:14 +02:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Failed to acquire an address from pool: %m");
|
2020-10-02 06:39:02 +02:00
|
|
|
if (acquired_address)
|
|
|
|
address = acquired_address;
|
2014-06-18 18:22:14 +02:00
|
|
|
|
2020-06-03 03:11:08 +02:00
|
|
|
if (DEBUG_LOGGING) {
|
|
|
|
_cleanup_free_ char *str = NULL;
|
|
|
|
|
|
|
|
(void) in_addr_to_string(address->family, &address->in_addr, &str);
|
|
|
|
log_link_debug(link, "%s address: %s", update ? "Updating" : "Configuring", strna(str));
|
|
|
|
}
|
|
|
|
|
2015-10-01 17:31:14 +02:00
|
|
|
if (update)
|
|
|
|
r = sd_rtnl_message_new_addr_update(link->manager->rtnl, &req,
|
|
|
|
link->ifindex, address->family);
|
|
|
|
else
|
|
|
|
r = sd_rtnl_message_new_addr(link->manager->rtnl, &req, RTM_NEWADDR,
|
|
|
|
link->ifindex, address->family);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not allocate RTM_NEWADDR message: %m");
|
2013-10-17 03:18:36 +02:00
|
|
|
|
2014-01-21 15:55:57 +01:00
|
|
|
r = sd_rtnl_message_addr_set_prefixlen(req, address->prefixlen);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not set prefixlen: %m");
|
2014-01-21 15:55:57 +01:00
|
|
|
|
2020-10-04 01:27:14 +02:00
|
|
|
flags = address->flags | IFA_F_PERMANENT;
|
|
|
|
r = sd_rtnl_message_addr_set_flags(req, flags & 0xff);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not set flags: %m");
|
2014-01-21 15:55:57 +01:00
|
|
|
|
2020-10-04 01:27:14 +02:00
|
|
|
if (flags & ~0xff) {
|
|
|
|
r = sd_netlink_message_append_u32(req, IFA_FLAGS, flags);
|
2015-02-02 12:13:17 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not set extended flags: %m");
|
2015-02-02 12:13:17 +01:00
|
|
|
}
|
|
|
|
|
2014-02-28 16:10:20 +01:00
|
|
|
r = sd_rtnl_message_addr_set_scope(req, address->scope);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not set scope: %m");
|
2014-01-21 15:55:57 +01:00
|
|
|
|
2019-02-03 01:47:25 +01:00
|
|
|
r = netlink_message_append_in_addr_union(req, IFA_LOCAL, address->family, &address->in_addr);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not append IFA_LOCAL attribute: %m");
|
2013-10-17 03:18:36 +02:00
|
|
|
|
2019-02-03 00:09:13 +01:00
|
|
|
if (in_addr_is_null(address->family, &address->in_addr_peer) == 0) {
|
2019-02-03 01:47:25 +01:00
|
|
|
r = netlink_message_append_in_addr_union(req, IFA_ADDRESS, address->family, &address->in_addr_peer);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not append IFA_ADDRESS attribute: %m");
|
2020-12-03 02:19:35 +01:00
|
|
|
} else if (address_may_have_broadcast(address)) {
|
2018-12-21 03:31:00 +01:00
|
|
|
r = sd_netlink_message_append_in_addr(req, IFA_BROADCAST, &address->broadcast);
|
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not append IFA_BROADCAST attribute: %m");
|
2013-10-17 03:18:36 +02:00
|
|
|
}
|
|
|
|
|
2020-12-03 02:19:35 +01:00
|
|
|
if (address->family == AF_INET && address->label) {
|
2015-06-12 16:31:33 +02:00
|
|
|
r = sd_netlink_message_append_string(req, IFA_LABEL, address->label);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not append IFA_LABEL attribute: %m");
|
2013-10-17 03:18:36 +02:00
|
|
|
}
|
|
|
|
|
2018-12-21 03:31:00 +01:00
|
|
|
r = sd_netlink_message_append_cache_info(req, IFA_CACHEINFO, &address->cinfo);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not append IFA_CACHEINFO attribute: %m");
|
2014-06-26 15:18:43 +02:00
|
|
|
|
2020-10-13 07:53:46 +02:00
|
|
|
r = address_add(link, address, &a);
|
2020-10-04 04:06:23 +02:00
|
|
|
if (r < 0)
|
|
|
|
return log_link_error_errno(link, r, "Could not add address: %m");
|
|
|
|
|
|
|
|
r = address_set_masquerade(a, true);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2019-03-11 06:30:45 +01:00
|
|
|
log_link_warning_errno(link, r, "Could not enable IP masquerading, ignoring: %m");
|
2015-09-30 14:07:12 +02:00
|
|
|
|
2018-12-10 18:05:40 +01:00
|
|
|
r = netlink_call_async(link->manager->rtnl, NULL, req, callback, link_netlink_destroy_callback, link);
|
2015-09-30 14:07:12 +02:00
|
|
|
if (r < 0) {
|
2020-10-04 04:06:23 +02:00
|
|
|
(void) address_set_masquerade(a, false);
|
2019-03-11 06:30:45 +01:00
|
|
|
return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
|
2015-09-30 14:07:12 +02:00
|
|
|
}
|
2013-10-17 03:18:36 +02:00
|
|
|
|
2014-07-03 09:43:31 +02:00
|
|
|
link_ref(link);
|
|
|
|
|
2020-10-04 02:14:15 +02:00
|
|
|
if (FLAGS_SET(address->duplicate_address_detection, ADDRESS_FAMILY_IPV4)) {
|
|
|
|
r = ipv4_dad_configure(a);
|
2019-11-21 16:54:52 +01:00
|
|
|
if (r < 0)
|
|
|
|
log_link_warning_errno(link, r, "Failed to start IPv4ACD client, ignoring: %m");
|
|
|
|
}
|
|
|
|
|
2020-07-22 02:41:30 +02:00
|
|
|
if (ret)
|
|
|
|
*ret = a;
|
|
|
|
|
2019-06-11 16:20:56 +02:00
|
|
|
return 1;
|
2013-10-17 03:18:36 +02:00
|
|
|
}
|
|
|
|
|
2020-10-02 04:17:49 +02:00
|
|
|
static int static_address_ready_callback(Address *address) {
|
|
|
|
Address *a;
|
|
|
|
Link *link;
|
|
|
|
|
|
|
|
assert(address);
|
|
|
|
assert(address->link);
|
|
|
|
|
|
|
|
link = address->link;
|
|
|
|
|
|
|
|
if (!link->addresses_configured)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
SET_FOREACH(a, link->static_addresses)
|
|
|
|
if (!address_is_ready(a)) {
|
|
|
|
_cleanup_free_ char *str = NULL;
|
|
|
|
|
|
|
|
(void) in_addr_to_string(a->family, &a->in_addr, &str);
|
|
|
|
log_link_debug(link, "an address %s/%u is not ready", strnull(str), a->prefixlen);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* This should not be called again */
|
|
|
|
SET_FOREACH(a, link->static_addresses)
|
|
|
|
a->callback = NULL;
|
|
|
|
|
|
|
|
link->addresses_ready = true;
|
|
|
|
|
|
|
|
return link_set_routes(link);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int address_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
|
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(rtnl);
|
|
|
|
assert(m);
|
|
|
|
assert(link);
|
|
|
|
assert(link->ifname);
|
|
|
|
assert(link->address_messages > 0);
|
|
|
|
assert(IN_SET(link->state, LINK_STATE_CONFIGURING,
|
|
|
|
LINK_STATE_FAILED, LINK_STATE_LINGER));
|
|
|
|
|
|
|
|
link->address_messages--;
|
|
|
|
|
|
|
|
if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
r = sd_netlink_message_get_errno(m);
|
|
|
|
if (r < 0 && r != -EEXIST) {
|
|
|
|
log_link_message_warning_errno(link, m, r, "Could not set address");
|
|
|
|
link_enter_failed(link);
|
|
|
|
return 1;
|
|
|
|
} else if (r >= 0)
|
|
|
|
(void) manager_rtnl_process_address(rtnl, m, link->manager);
|
|
|
|
|
|
|
|
if (link->address_messages == 0) {
|
|
|
|
Address *a;
|
|
|
|
|
|
|
|
log_link_debug(link, "Addresses set");
|
|
|
|
link->addresses_configured = true;
|
|
|
|
|
|
|
|
/* When all static addresses are already ready, then static_address_ready_callback()
|
|
|
|
* will not be called automatically. So, call it here. */
|
|
|
|
a = set_first(link->static_addresses);
|
|
|
|
if (!a) {
|
|
|
|
log_link_warning(link, "No static address is stored.");
|
|
|
|
link_enter_failed(link);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
if (!a->callback) {
|
|
|
|
log_link_warning(link, "Address ready callback is not set.");
|
|
|
|
link_enter_failed(link);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
r = a->callback(a);
|
|
|
|
if (r < 0)
|
|
|
|
link_enter_failed(link);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2020-10-13 08:06:44 +02:00
|
|
|
static int static_address_configure(const Address *address, Link *link, bool update) {
|
2020-10-02 04:17:49 +02:00
|
|
|
Address *ret;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(address);
|
|
|
|
assert(link);
|
|
|
|
|
|
|
|
r = address_configure(address, link, address_handler, update, &ret);
|
|
|
|
if (r < 0)
|
|
|
|
return log_link_warning_errno(link, r, "Could not configure static address: %m");
|
|
|
|
|
|
|
|
link->address_messages++;
|
|
|
|
|
|
|
|
r = set_ensure_put(&link->static_addresses, &address_hash_ops, ret);
|
|
|
|
if (r < 0)
|
|
|
|
return log_link_warning_errno(link, r, "Failed to store static address: %m");
|
|
|
|
|
|
|
|
ret->callback = static_address_ready_callback;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int link_set_addresses(Link *link) {
|
|
|
|
Address *ad;
|
2020-10-16 08:48:50 +02:00
|
|
|
Prefix *p;
|
2020-10-02 04:17:49 +02:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(link);
|
|
|
|
assert(link->network);
|
|
|
|
|
|
|
|
if (link->address_remove_messages != 0) {
|
|
|
|
log_link_debug(link, "Removing old addresses, new addresses will be configured later.");
|
|
|
|
link->request_static_addresses = true;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-10-02 05:34:19 +02:00
|
|
|
ORDERED_HASHMAP_FOREACH(ad, link->network->addresses_by_section) {
|
2020-10-02 04:17:49 +02:00
|
|
|
bool update;
|
|
|
|
|
2020-10-13 07:53:46 +02:00
|
|
|
update = address_get(link, ad, NULL) > 0;
|
2020-10-02 04:17:49 +02:00
|
|
|
r = static_address_configure(ad, link, update);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2020-10-16 08:48:50 +02:00
|
|
|
HASHMAP_FOREACH(p, link->network->prefixes_by_section) {
|
|
|
|
_cleanup_(address_freep) Address *address = NULL;
|
2020-10-02 04:17:49 +02:00
|
|
|
|
2020-10-16 08:48:50 +02:00
|
|
|
if (!p->assign)
|
|
|
|
continue;
|
2020-10-02 04:17:49 +02:00
|
|
|
|
2020-10-16 08:48:50 +02:00
|
|
|
r = address_new(&address);
|
|
|
|
if (r < 0)
|
|
|
|
return log_oom();
|
2020-10-02 04:17:49 +02:00
|
|
|
|
2020-10-16 08:48:50 +02:00
|
|
|
r = sd_radv_prefix_get_prefix(p->radv_prefix, &address->in_addr.in6, &address->prefixlen);
|
|
|
|
if (r < 0)
|
|
|
|
return log_link_warning_errno(link, r, "Could not get RA prefix: %m");
|
2020-10-02 04:17:49 +02:00
|
|
|
|
2020-10-16 08:48:50 +02:00
|
|
|
r = generate_ipv6_eui_64_address(link, &address->in_addr.in6);
|
|
|
|
if (r < 0)
|
|
|
|
return log_link_warning_errno(link, r, "Could not generate EUI64 address: %m");
|
2020-10-02 04:17:49 +02:00
|
|
|
|
2020-10-16 08:48:50 +02:00
|
|
|
address->family = AF_INET6;
|
|
|
|
r = static_address_configure(address, link, true);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2020-10-02 04:17:49 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (link->address_messages == 0) {
|
|
|
|
link->addresses_configured = true;
|
|
|
|
link->addresses_ready = true;
|
|
|
|
r = link_set_routes(link);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
} else {
|
|
|
|
log_link_debug(link, "Setting addresses");
|
|
|
|
link_set_state(link, LINK_STATE_CONFIGURING);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-10-02 04:32:35 +02:00
|
|
|
int manager_rtnl_process_address(sd_netlink *rtnl, sd_netlink_message *message, Manager *m) {
|
2020-10-13 07:53:46 +02:00
|
|
|
_cleanup_(address_freep) Address *tmp = NULL;
|
|
|
|
_cleanup_free_ char *buf = NULL, *buf_peer = NULL;
|
2020-10-02 04:32:35 +02:00
|
|
|
Link *link = NULL;
|
|
|
|
uint16_t type;
|
2020-10-13 07:53:46 +02:00
|
|
|
unsigned char flags;
|
2020-10-02 04:32:35 +02:00
|
|
|
Address *address = NULL;
|
|
|
|
char valid_buf[FORMAT_TIMESPAN_MAX];
|
|
|
|
const char *valid_str = NULL;
|
2020-10-13 07:53:46 +02:00
|
|
|
int ifindex, r;
|
|
|
|
bool has_peer = false;
|
2020-10-02 04:32:35 +02:00
|
|
|
|
|
|
|
assert(rtnl);
|
|
|
|
assert(message);
|
|
|
|
assert(m);
|
|
|
|
|
|
|
|
if (sd_netlink_message_is_error(message)) {
|
|
|
|
r = sd_netlink_message_get_errno(message);
|
|
|
|
if (r < 0)
|
|
|
|
log_message_warning_errno(message, r, "rtnl: failed to receive address message, ignoring");
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
r = sd_netlink_message_get_type(message, &type);
|
|
|
|
if (r < 0) {
|
|
|
|
log_warning_errno(r, "rtnl: could not get message type, ignoring: %m");
|
|
|
|
return 0;
|
|
|
|
} else if (!IN_SET(type, RTM_NEWADDR, RTM_DELADDR)) {
|
|
|
|
log_warning("rtnl: received unexpected message type %u when processing address, ignoring.", type);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
r = sd_rtnl_message_addr_get_ifindex(message, &ifindex);
|
|
|
|
if (r < 0) {
|
|
|
|
log_warning_errno(r, "rtnl: could not get ifindex from message, ignoring: %m");
|
|
|
|
return 0;
|
|
|
|
} else if (ifindex <= 0) {
|
|
|
|
log_warning("rtnl: received address message with invalid ifindex %d, ignoring.", ifindex);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
r = link_get(m, ifindex, &link);
|
|
|
|
if (r < 0 || !link) {
|
|
|
|
/* when enumerating we might be out of sync, but we will get the address again, so just
|
|
|
|
* ignore it */
|
|
|
|
if (!m->enumerating)
|
|
|
|
log_warning("rtnl: received address for link '%d' we don't know about, ignoring.", ifindex);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-10-13 07:53:46 +02:00
|
|
|
r = address_new(&tmp);
|
|
|
|
if (r < 0)
|
|
|
|
return log_oom();
|
|
|
|
|
|
|
|
r = sd_rtnl_message_addr_get_family(message, &tmp->family);
|
2020-10-02 04:32:35 +02:00
|
|
|
if (r < 0) {
|
|
|
|
log_link_warning(link, "rtnl: received address message without family, ignoring.");
|
|
|
|
return 0;
|
2020-10-13 07:53:46 +02:00
|
|
|
} else if (!IN_SET(tmp->family, AF_INET, AF_INET6)) {
|
|
|
|
log_link_debug(link, "rtnl: received address message with invalid family '%i', ignoring.", tmp->family);
|
2020-10-02 04:32:35 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-10-13 07:53:46 +02:00
|
|
|
r = sd_rtnl_message_addr_get_prefixlen(message, &tmp->prefixlen);
|
2020-10-02 04:32:35 +02:00
|
|
|
if (r < 0) {
|
2020-10-06 19:49:11 +02:00
|
|
|
log_link_warning_errno(link, r, "rtnl: received address message without prefixlen, ignoring: %m");
|
2020-10-02 04:32:35 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-10-13 07:53:46 +02:00
|
|
|
r = sd_rtnl_message_addr_get_scope(message, &tmp->scope);
|
2020-10-02 04:32:35 +02:00
|
|
|
if (r < 0) {
|
2020-10-06 19:49:11 +02:00
|
|
|
log_link_warning_errno(link, r, "rtnl: received address message without scope, ignoring: %m");
|
2020-10-02 04:32:35 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
r = sd_rtnl_message_addr_get_flags(message, &flags);
|
|
|
|
if (r < 0) {
|
2020-10-06 19:49:11 +02:00
|
|
|
log_link_warning_errno(link, r, "rtnl: received address message without flags, ignoring: %m");
|
2020-10-02 04:32:35 +02:00
|
|
|
return 0;
|
|
|
|
}
|
2020-10-13 07:53:46 +02:00
|
|
|
tmp->flags = flags;
|
2020-10-02 04:32:35 +02:00
|
|
|
|
2020-10-13 07:53:46 +02:00
|
|
|
switch (tmp->family) {
|
2020-10-02 04:32:35 +02:00
|
|
|
case AF_INET:
|
2020-10-13 07:53:46 +02:00
|
|
|
r = sd_netlink_message_read_in_addr(message, IFA_LOCAL, &tmp->in_addr.in);
|
2020-10-02 04:32:35 +02:00
|
|
|
if (r < 0) {
|
|
|
|
log_link_warning_errno(link, r, "rtnl: received address message without valid address, ignoring: %m");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-10-13 07:53:46 +02:00
|
|
|
r = sd_netlink_message_read_in_addr(message, IFA_ADDRESS, &tmp->in_addr_peer.in);
|
|
|
|
if (r < 0 && r != -ENODATA) {
|
|
|
|
log_link_warning_errno(link, r, "rtnl: could not get peer address from address message, ignoring: %m");
|
|
|
|
return 0;
|
|
|
|
} else if (r >= 0) {
|
|
|
|
if (in4_addr_equal(&tmp->in_addr.in, &tmp->in_addr_peer.in))
|
|
|
|
tmp->in_addr_peer = IN_ADDR_NULL;
|
|
|
|
else
|
|
|
|
has_peer = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
r = sd_netlink_message_read_in_addr(message, IFA_BROADCAST, &tmp->broadcast);
|
|
|
|
if (r < 0 && r != -ENODATA) {
|
|
|
|
log_link_warning_errno(link, r, "rtnl: could not get broadcast from address message, ignoring: %m");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
r = sd_netlink_message_read_string_strdup(message, IFA_LABEL, &tmp->label);
|
|
|
|
if (r < 0 && r != -ENODATA) {
|
|
|
|
log_link_warning_errno(link, r, "rtnl: could not get label from address message, ignoring: %m");
|
|
|
|
return 0;
|
|
|
|
} else if (r >= 0 && streq_ptr(tmp->label, link->ifname))
|
|
|
|
tmp->label = mfree(tmp->label);
|
|
|
|
|
2020-10-02 04:32:35 +02:00
|
|
|
break;
|
|
|
|
|
|
|
|
case AF_INET6:
|
2020-10-13 07:53:46 +02:00
|
|
|
r = sd_netlink_message_read_in6_addr(message, IFA_LOCAL, &tmp->in_addr.in6);
|
|
|
|
if (r >= 0) {
|
|
|
|
/* Have peer address. */
|
|
|
|
r = sd_netlink_message_read_in6_addr(message, IFA_ADDRESS, &tmp->in_addr_peer.in6);
|
|
|
|
if (r < 0) {
|
|
|
|
log_link_warning_errno(link, r, "rtnl: could not get peer address from address message, ignoring: %m");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
has_peer = true;
|
|
|
|
} else if (r == -ENODATA) {
|
|
|
|
/* Does not have peer address. */
|
|
|
|
r = sd_netlink_message_read_in6_addr(message, IFA_ADDRESS, &tmp->in_addr.in6);
|
|
|
|
if (r < 0) {
|
|
|
|
log_link_warning_errno(link, r, "rtnl: received address message without valid address, ignoring: %m");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
log_link_warning_errno(link, r, "rtnl: could not get local address from address message, ignoring: %m");
|
2020-10-02 04:32:35 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
assert_not_reached("Received unsupported address family");
|
|
|
|
}
|
|
|
|
|
2020-10-13 07:53:46 +02:00
|
|
|
(void) in_addr_to_string(tmp->family, &tmp->in_addr, &buf);
|
|
|
|
(void) in_addr_to_string(tmp->family, &tmp->in_addr_peer, &buf_peer);
|
2020-10-02 04:32:35 +02:00
|
|
|
|
2020-10-13 07:53:46 +02:00
|
|
|
r = sd_netlink_message_read_cache_info(message, IFA_CACHEINFO, &tmp->cinfo);
|
2020-10-02 04:32:35 +02:00
|
|
|
if (r < 0 && r != -ENODATA) {
|
|
|
|
log_link_warning_errno(link, r, "rtnl: cannot get IFA_CACHEINFO attribute, ignoring: %m");
|
|
|
|
return 0;
|
2020-10-13 07:53:46 +02:00
|
|
|
} else if (r >= 0 && tmp->cinfo.ifa_valid != CACHE_INFO_INFINITY_LIFE_TIME)
|
2020-10-02 04:32:35 +02:00
|
|
|
valid_str = format_timespan(valid_buf, FORMAT_TIMESPAN_MAX,
|
2020-10-13 07:53:46 +02:00
|
|
|
tmp->cinfo.ifa_valid * USEC_PER_SEC,
|
2020-10-02 04:32:35 +02:00
|
|
|
USEC_PER_SEC);
|
|
|
|
|
2020-10-13 07:53:46 +02:00
|
|
|
(void) address_get(link, tmp, &address);
|
2020-10-02 04:32:35 +02:00
|
|
|
|
|
|
|
switch (type) {
|
|
|
|
case RTM_NEWADDR:
|
|
|
|
if (address)
|
2020-10-13 07:53:46 +02:00
|
|
|
log_link_debug(link, "Remembering updated address: %s%s%s/%u (valid %s%s)",
|
|
|
|
strnull(buf), has_peer ? " peer " : "",
|
|
|
|
has_peer ? strnull(buf_peer) : "", tmp->prefixlen,
|
2020-10-02 04:32:35 +02:00
|
|
|
valid_str ? "for " : "forever", strempty(valid_str));
|
|
|
|
else {
|
|
|
|
/* An address appeared that we did not request */
|
2020-10-13 07:53:46 +02:00
|
|
|
r = address_add_foreign(link, tmp, &address);
|
2020-10-02 04:32:35 +02:00
|
|
|
if (r < 0) {
|
|
|
|
log_link_warning_errno(link, r, "Failed to remember foreign address %s/%u, ignoring: %m",
|
2020-10-13 07:53:46 +02:00
|
|
|
strnull(buf), tmp->prefixlen);
|
2020-10-02 04:32:35 +02:00
|
|
|
return 0;
|
|
|
|
} else
|
2020-10-13 07:53:46 +02:00
|
|
|
log_link_debug(link, "Remembering foreign address: %s%s%s/%u (valid %s%s)",
|
|
|
|
strnull(buf), has_peer ? " peer " : "",
|
|
|
|
has_peer ? strnull(buf_peer) : "", tmp->prefixlen,
|
2020-10-02 04:32:35 +02:00
|
|
|
valid_str ? "for " : "forever", strempty(valid_str));
|
|
|
|
}
|
|
|
|
|
|
|
|
/* address_update() logs internally, so we don't need to here. */
|
2020-10-13 07:53:46 +02:00
|
|
|
r = address_update(address, tmp);
|
2020-10-02 04:32:35 +02:00
|
|
|
if (r < 0)
|
|
|
|
link_enter_failed(link);
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
case RTM_DELADDR:
|
|
|
|
if (address) {
|
2020-10-13 07:53:46 +02:00
|
|
|
log_link_debug(link, "Forgetting address: %s%s%s/%u (valid %s%s)",
|
|
|
|
strnull(buf), has_peer ? " peer " : "",
|
|
|
|
has_peer ? strnull(buf_peer) : "", tmp->prefixlen,
|
2020-10-02 04:32:35 +02:00
|
|
|
valid_str ? "for " : "forever", strempty(valid_str));
|
|
|
|
(void) address_drop(address);
|
|
|
|
} else
|
2020-10-13 07:53:46 +02:00
|
|
|
log_link_debug(link, "Kernel removed an address we don't remember: %s%s%s/%u (valid %s%s), ignoring.",
|
|
|
|
strnull(buf), has_peer ? " peer " : "",
|
|
|
|
has_peer ? strnull(buf_peer) : "", tmp->prefixlen,
|
2020-10-02 04:32:35 +02:00
|
|
|
valid_str ? "for " : "forever", strempty(valid_str));
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
assert_not_reached("Received invalid RTNL message type");
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2019-11-21 16:54:52 +01:00
|
|
|
static void static_address_on_acd(sd_ipv4acd *acd, int event, void *userdata) {
|
|
|
|
_cleanup_free_ char *pretty = NULL;
|
|
|
|
Address *address;
|
|
|
|
Link *link;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(acd);
|
|
|
|
assert(userdata);
|
|
|
|
|
|
|
|
address = (Address *) userdata;
|
|
|
|
link = address->link;
|
|
|
|
|
|
|
|
(void) in_addr_to_string(address->family, &address->in_addr, &pretty);
|
|
|
|
switch (event) {
|
|
|
|
case SD_IPV4ACD_EVENT_STOP:
|
|
|
|
log_link_debug(link, "Stopping ACD client...");
|
|
|
|
return;
|
|
|
|
|
|
|
|
case SD_IPV4ACD_EVENT_BIND:
|
|
|
|
log_link_debug(link, "Successfully claimed address %s", strna(pretty));
|
|
|
|
link_check_ready(link);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SD_IPV4ACD_EVENT_CONFLICT:
|
|
|
|
log_link_warning(link, "DAD conflict. Dropping address %s", strna(pretty));
|
|
|
|
r = address_remove(address, link, NULL);
|
|
|
|
if (r < 0)
|
|
|
|
log_link_error_errno(link, r, "Failed to drop DAD conflicted address %s", strna(pretty));;
|
|
|
|
|
|
|
|
link_check_ready(link);
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
assert_not_reached("Invalid IPv4ACD event.");
|
|
|
|
}
|
|
|
|
|
2020-10-15 00:39:40 +02:00
|
|
|
(void) sd_ipv4acd_stop(acd);
|
2019-11-21 16:54:52 +01:00
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-10-04 02:14:15 +02:00
|
|
|
static int ipv4_dad_configure(Address *address) {
|
2019-11-21 16:54:52 +01:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(address);
|
2020-10-04 02:14:15 +02:00
|
|
|
assert(address->link);
|
2019-11-21 16:54:52 +01:00
|
|
|
|
2020-10-04 02:14:15 +02:00
|
|
|
if (address->family != AF_INET)
|
|
|
|
return 0;
|
2019-11-21 16:54:52 +01:00
|
|
|
|
2020-10-04 02:14:15 +02:00
|
|
|
if (DEBUG_LOGGING) {
|
|
|
|
_cleanup_free_ char *pretty = NULL;
|
2019-11-21 16:54:52 +01:00
|
|
|
|
2020-10-04 02:14:15 +02:00
|
|
|
(void) in_addr_to_string(address->family, &address->in_addr, &pretty);
|
|
|
|
log_link_debug(address->link, "Starting IPv4ACD client. Probing address %s", strna(pretty));
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!address->acd) {
|
|
|
|
r = sd_ipv4acd_new(&address->acd);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
r = sd_ipv4acd_attach_event(address->acd, address->link->manager->event, 0);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
}
|
2019-11-21 16:54:52 +01:00
|
|
|
|
2020-10-04 02:14:15 +02:00
|
|
|
r = sd_ipv4acd_set_ifindex(address->acd, address->link->ifindex);
|
2019-11-21 16:54:52 +01:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
2020-10-26 18:07:49 +01:00
|
|
|
r = sd_ipv4acd_set_mac(address->acd, &address->link->hw_addr.addr.ether);
|
2019-11-21 16:54:52 +01:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
r = sd_ipv4acd_set_address(address->acd, &address->in_addr.in);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
r = sd_ipv4acd_set_callback(address->acd, static_address_on_acd, address);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
2020-10-04 02:14:15 +02:00
|
|
|
return sd_ipv4acd_start(address->acd, true);
|
2019-11-21 16:54:52 +01:00
|
|
|
}
|
|
|
|
|
2020-10-04 02:27:42 +02:00
|
|
|
static int ipv4_dad_update_mac_one(Address *address) {
|
|
|
|
bool running;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(address);
|
|
|
|
|
|
|
|
if (!address->acd)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
running = sd_ipv4acd_is_running(address->acd);
|
|
|
|
|
2020-10-15 00:39:55 +02:00
|
|
|
r = sd_ipv4acd_stop(address->acd);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2020-10-04 02:27:42 +02:00
|
|
|
|
2020-10-26 18:07:49 +01:00
|
|
|
r = sd_ipv4acd_set_mac(address->acd, &address->link->hw_addr.addr.ether);
|
2020-10-04 02:27:42 +02:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
if (running) {
|
|
|
|
r = sd_ipv4acd_start(address->acd, true);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int ipv4_dad_update_mac(Link *link) {
|
|
|
|
Address *address;
|
|
|
|
int k, r = 0;
|
|
|
|
|
|
|
|
assert(link);
|
|
|
|
|
|
|
|
SET_FOREACH(address, link->addresses) {
|
|
|
|
k = ipv4_dad_update_mac_one(address);
|
|
|
|
if (k < 0 && r >= 0)
|
|
|
|
r = k;
|
|
|
|
}
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2020-10-04 02:14:15 +02:00
|
|
|
int ipv4_dad_stop(Link *link) {
|
2020-10-02 05:12:25 +02:00
|
|
|
Address *address;
|
|
|
|
int k, r = 0;
|
|
|
|
|
|
|
|
assert(link);
|
|
|
|
|
2020-10-04 02:14:15 +02:00
|
|
|
SET_FOREACH(address, link->addresses) {
|
2020-10-02 05:12:25 +02:00
|
|
|
k = sd_ipv4acd_stop(address->acd);
|
|
|
|
if (k < 0 && r >= 0)
|
|
|
|
r = k;
|
|
|
|
}
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2020-10-15 01:11:29 +02:00
|
|
|
void ipv4_dad_unref(Link *link) {
|
|
|
|
Address *address;
|
|
|
|
|
|
|
|
assert(link);
|
|
|
|
|
|
|
|
SET_FOREACH(address, link->addresses)
|
|
|
|
address->acd = sd_ipv4acd_unref(address->acd);
|
|
|
|
}
|
|
|
|
|
2014-08-11 22:44:51 +02:00
|
|
|
int config_parse_broadcast(
|
|
|
|
const char *unit,
|
2014-01-28 20:01:37 +01:00
|
|
|
const char *filename,
|
|
|
|
unsigned line,
|
|
|
|
const char *section,
|
|
|
|
unsigned section_line,
|
|
|
|
const char *lvalue,
|
|
|
|
int ltype,
|
|
|
|
const char *rvalue,
|
|
|
|
void *data,
|
|
|
|
void *userdata) {
|
2014-08-11 22:44:51 +02:00
|
|
|
|
2014-01-28 20:01:37 +01:00
|
|
|
Network *network = userdata;
|
2019-03-01 05:27:47 +01:00
|
|
|
_cleanup_(address_free_or_set_invalidp) Address *n = NULL;
|
2014-01-28 20:01:37 +01:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(filename);
|
|
|
|
assert(section);
|
|
|
|
assert(lvalue);
|
|
|
|
assert(rvalue);
|
|
|
|
assert(data);
|
|
|
|
|
2017-02-15 05:30:35 +01:00
|
|
|
r = address_new_static(network, filename, section_line, &n);
|
2020-07-16 07:48:08 +02:00
|
|
|
if (r == -ENOMEM)
|
|
|
|
return log_oom();
|
|
|
|
if (r < 0) {
|
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r,
|
|
|
|
"Failed to allocate new address, ignoring assignment: %m");
|
|
|
|
return 0;
|
|
|
|
}
|
2014-01-28 20:01:37 +01:00
|
|
|
|
2014-02-18 15:48:30 +01:00
|
|
|
if (n->family == AF_INET6) {
|
2020-07-16 07:48:08 +02:00
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, 0,
|
2019-02-28 02:57:20 +01:00
|
|
|
"Broadcast is not valid for IPv6 addresses, ignoring assignment: %s", rvalue);
|
2014-02-18 15:48:30 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-08-11 22:44:51 +02:00
|
|
|
r = in_addr_from_string(AF_INET, rvalue, (union in_addr_union*) &n->broadcast);
|
2014-01-28 20:01:37 +01:00
|
|
|
if (r < 0) {
|
2020-07-16 07:48:08 +02:00
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r,
|
2019-02-28 02:57:20 +01:00
|
|
|
"Broadcast is invalid, ignoring assignment: %s", rvalue);
|
2014-01-28 20:01:37 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-08-11 22:44:51 +02:00
|
|
|
n->family = AF_INET;
|
2014-01-28 20:01:37 +01:00
|
|
|
n = NULL;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-10-04 01:14:27 +02:00
|
|
|
int config_parse_address(
|
|
|
|
const char *unit,
|
2013-10-17 03:18:36 +02:00
|
|
|
const char *filename,
|
|
|
|
unsigned line,
|
|
|
|
const char *section,
|
2013-11-19 16:17:55 +01:00
|
|
|
unsigned section_line,
|
2013-10-17 03:18:36 +02:00
|
|
|
const char *lvalue,
|
|
|
|
int ltype,
|
|
|
|
const char *rvalue,
|
|
|
|
void *data,
|
|
|
|
void *userdata) {
|
2014-08-11 22:44:51 +02:00
|
|
|
|
2013-11-19 16:54:42 +01:00
|
|
|
Network *network = userdata;
|
2019-03-01 05:27:47 +01:00
|
|
|
_cleanup_(address_free_or_set_invalidp) Address *n = NULL;
|
2014-08-11 22:44:51 +02:00
|
|
|
union in_addr_union buffer;
|
2018-11-05 08:21:38 +01:00
|
|
|
unsigned char prefixlen;
|
2014-08-11 22:44:51 +02:00
|
|
|
int r, f;
|
2013-10-17 03:18:36 +02:00
|
|
|
|
|
|
|
assert(filename);
|
2013-11-19 16:54:42 +01:00
|
|
|
assert(section);
|
2013-10-17 03:18:36 +02:00
|
|
|
assert(lvalue);
|
|
|
|
assert(rvalue);
|
|
|
|
assert(data);
|
|
|
|
|
2020-10-02 05:34:19 +02:00
|
|
|
if (streq(section, "Network"))
|
|
|
|
/* we are not in an Address section, so use line number instead. */
|
|
|
|
r = address_new_static(network, filename, line, &n);
|
|
|
|
else
|
2017-02-15 05:30:35 +01:00
|
|
|
r = address_new_static(network, filename, section_line, &n);
|
2020-07-16 07:48:08 +02:00
|
|
|
if (r == -ENOMEM)
|
|
|
|
return log_oom();
|
|
|
|
if (r < 0) {
|
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r,
|
|
|
|
"Failed to allocate new address, ignoring assignment: %m");
|
|
|
|
return 0;
|
|
|
|
}
|
2013-10-17 03:18:36 +02:00
|
|
|
|
|
|
|
/* Address=address/prefixlen */
|
2019-01-28 15:29:54 +01:00
|
|
|
r = in_addr_prefix_from_string_auto_internal(rvalue, PREFIXLEN_REFUSE, &f, &buffer, &prefixlen);
|
|
|
|
if (r == -ENOANO) {
|
2020-07-16 07:48:08 +02:00
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r,
|
2019-01-28 15:29:54 +01:00
|
|
|
"An address '%s' is specified without prefix length. "
|
|
|
|
"The behavior of parsing addresses without prefix length will be changed in the future release. "
|
|
|
|
"Please specify prefix length explicitly.", rvalue);
|
|
|
|
|
|
|
|
r = in_addr_prefix_from_string_auto_internal(rvalue, PREFIXLEN_LEGACY, &f, &buffer, &prefixlen);
|
|
|
|
}
|
2013-10-17 03:18:36 +02:00
|
|
|
if (r < 0) {
|
2020-07-16 07:48:08 +02:00
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r, "Invalid address '%s', ignoring assignment: %m", rvalue);
|
2013-10-17 03:18:36 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-08-11 22:44:51 +02:00
|
|
|
if (n->family != AF_UNSPEC && f != n->family) {
|
2020-07-16 07:48:08 +02:00
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, 0, "Address is incompatible, ignoring assignment: %s", rvalue);
|
2014-08-11 22:44:51 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-02-20 10:36:17 +01:00
|
|
|
if (in_addr_is_null(f, &buffer)) {
|
|
|
|
/* Will use address from address pool. Note that for ipv6 case, prefix of the address
|
|
|
|
* pool is 8, but 40 bit is used by the global ID and 16 bit by the subnet ID. So,
|
|
|
|
* let's limit the prefix length to 64 or larger. See RFC4193. */
|
|
|
|
if ((f == AF_INET && prefixlen < 8) ||
|
|
|
|
(f == AF_INET6 && prefixlen < 64)) {
|
2020-07-16 07:48:08 +02:00
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, 0,
|
2019-02-20 10:36:17 +01:00
|
|
|
"Null address with invalid prefixlen='%u', ignoring assignment: %s",
|
|
|
|
prefixlen, rvalue);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-08-11 22:44:51 +02:00
|
|
|
n->family = f;
|
2018-11-05 08:21:38 +01:00
|
|
|
n->prefixlen = prefixlen;
|
2014-08-11 22:44:51 +02:00
|
|
|
|
|
|
|
if (streq(lvalue, "Address"))
|
|
|
|
n->in_addr = buffer;
|
|
|
|
else
|
|
|
|
n->in_addr_peer = buffer;
|
|
|
|
|
2013-10-17 03:18:36 +02:00
|
|
|
n = NULL;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2013-11-19 16:54:42 +01:00
|
|
|
|
2016-05-06 21:20:59 +02:00
|
|
|
int config_parse_label(
|
|
|
|
const char *unit,
|
2013-11-19 16:54:42 +01:00
|
|
|
const char *filename,
|
|
|
|
unsigned line,
|
|
|
|
const char *section,
|
|
|
|
unsigned section_line,
|
|
|
|
const char *lvalue,
|
|
|
|
int ltype,
|
|
|
|
const char *rvalue,
|
|
|
|
void *data,
|
|
|
|
void *userdata) {
|
2016-05-06 21:20:59 +02:00
|
|
|
|
2019-03-01 05:27:47 +01:00
|
|
|
_cleanup_(address_free_or_set_invalidp) Address *n = NULL;
|
2016-05-06 21:20:59 +02:00
|
|
|
Network *network = userdata;
|
2013-11-19 16:54:42 +01:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(filename);
|
|
|
|
assert(section);
|
|
|
|
assert(lvalue);
|
|
|
|
assert(rvalue);
|
|
|
|
assert(data);
|
|
|
|
|
2017-02-15 05:30:35 +01:00
|
|
|
r = address_new_static(network, filename, section_line, &n);
|
2020-07-16 07:48:08 +02:00
|
|
|
if (r == -ENOMEM)
|
|
|
|
return log_oom();
|
|
|
|
if (r < 0) {
|
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r,
|
|
|
|
"Failed to allocate new address, ignoring assignment: %m");
|
|
|
|
return 0;
|
|
|
|
}
|
2013-11-19 16:54:42 +01:00
|
|
|
|
2017-02-28 12:24:33 +01:00
|
|
|
if (!address_label_valid(rvalue)) {
|
2020-07-16 07:48:08 +02:00
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, 0,
|
2019-02-28 02:57:20 +01:00
|
|
|
"Interface label is too long or invalid, ignoring assignment: %s", rvalue);
|
2013-11-19 16:54:42 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-05-06 21:20:59 +02:00
|
|
|
r = free_and_strdup(&n->label, rvalue);
|
|
|
|
if (r < 0)
|
|
|
|
return log_oom();
|
2013-11-19 16:54:42 +01:00
|
|
|
|
|
|
|
n = NULL;
|
|
|
|
return 0;
|
|
|
|
}
|
2015-09-28 13:30:10 +02:00
|
|
|
|
2020-10-04 01:14:27 +02:00
|
|
|
int config_parse_lifetime(
|
|
|
|
const char *unit,
|
|
|
|
const char *filename,
|
|
|
|
unsigned line,
|
|
|
|
const char *section,
|
|
|
|
unsigned section_line,
|
|
|
|
const char *lvalue,
|
|
|
|
int ltype,
|
|
|
|
const char *rvalue,
|
|
|
|
void *data,
|
|
|
|
void *userdata) {
|
|
|
|
|
2016-05-03 21:54:26 +02:00
|
|
|
Network *network = userdata;
|
2019-03-01 05:27:47 +01:00
|
|
|
_cleanup_(address_free_or_set_invalidp) Address *n = NULL;
|
2020-05-21 08:17:45 +02:00
|
|
|
uint32_t k;
|
2016-05-03 21:54:26 +02:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(filename);
|
|
|
|
assert(section);
|
|
|
|
assert(lvalue);
|
|
|
|
assert(rvalue);
|
|
|
|
assert(data);
|
|
|
|
|
2017-02-15 05:30:35 +01:00
|
|
|
r = address_new_static(network, filename, section_line, &n);
|
2020-07-16 07:48:08 +02:00
|
|
|
if (r == -ENOMEM)
|
|
|
|
return log_oom();
|
|
|
|
if (r < 0) {
|
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r,
|
|
|
|
"Failed to allocate new address, ignoring assignment: %m");
|
|
|
|
return 0;
|
|
|
|
}
|
2016-05-03 21:54:26 +02:00
|
|
|
|
2020-05-21 08:36:01 +02:00
|
|
|
/* We accept only "forever", "infinity", empty, or "0". */
|
|
|
|
if (STR_IN_SET(rvalue, "forever", "infinity", ""))
|
2019-02-28 02:56:33 +01:00
|
|
|
k = CACHE_INFO_INFINITY_LIFE_TIME;
|
|
|
|
else if (streq(rvalue, "0"))
|
|
|
|
k = 0;
|
|
|
|
else {
|
2020-07-16 07:48:08 +02:00
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, 0,
|
2019-02-28 02:56:33 +01:00
|
|
|
"Invalid PreferredLifetime= value, ignoring: %s", rvalue);
|
2016-05-03 21:54:26 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-02-28 02:56:33 +01:00
|
|
|
n->cinfo.ifa_prefered = k;
|
2020-05-21 08:17:45 +02:00
|
|
|
TAKE_PTR(n);
|
2016-05-03 21:54:26 +02:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-10-04 01:14:27 +02:00
|
|
|
int config_parse_address_flags(
|
|
|
|
const char *unit,
|
|
|
|
const char *filename,
|
|
|
|
unsigned line,
|
|
|
|
const char *section,
|
|
|
|
unsigned section_line,
|
|
|
|
const char *lvalue,
|
|
|
|
int ltype,
|
|
|
|
const char *rvalue,
|
|
|
|
void *data,
|
|
|
|
void *userdata) {
|
|
|
|
|
2016-10-08 13:05:41 +02:00
|
|
|
Network *network = userdata;
|
2019-03-01 05:27:47 +01:00
|
|
|
_cleanup_(address_free_or_set_invalidp) Address *n = NULL;
|
2016-10-08 13:05:41 +02:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(filename);
|
|
|
|
assert(section);
|
|
|
|
assert(lvalue);
|
|
|
|
assert(rvalue);
|
|
|
|
assert(data);
|
|
|
|
|
2017-02-15 05:30:35 +01:00
|
|
|
r = address_new_static(network, filename, section_line, &n);
|
2020-07-16 07:48:08 +02:00
|
|
|
if (r == -ENOMEM)
|
|
|
|
return log_oom();
|
|
|
|
if (r < 0) {
|
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r,
|
|
|
|
"Failed to allocate new address, ignoring assignment: %m");
|
|
|
|
return 0;
|
|
|
|
}
|
2016-10-08 13:05:41 +02:00
|
|
|
|
|
|
|
r = parse_boolean(rvalue);
|
|
|
|
if (r < 0) {
|
2020-07-16 07:48:08 +02:00
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r,
|
2019-11-21 16:54:52 +01:00
|
|
|
"Failed to parse %s=, ignoring: %s", lvalue, rvalue);
|
2016-10-08 13:05:41 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-10-04 01:27:14 +02:00
|
|
|
if (streq(lvalue, "AddPrefixRoute"))
|
|
|
|
r = !r;
|
|
|
|
|
|
|
|
SET_FLAG(n->flags, ltype, r);
|
2016-10-08 13:05:41 +02:00
|
|
|
|
2019-02-28 02:54:17 +01:00
|
|
|
n = NULL;
|
2016-10-08 13:05:41 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-10-04 01:14:27 +02:00
|
|
|
int config_parse_address_scope(
|
|
|
|
const char *unit,
|
|
|
|
const char *filename,
|
|
|
|
unsigned line,
|
|
|
|
const char *section,
|
|
|
|
unsigned section_line,
|
|
|
|
const char *lvalue,
|
|
|
|
int ltype,
|
|
|
|
const char *rvalue,
|
|
|
|
void *data,
|
|
|
|
void *userdata) {
|
|
|
|
|
2017-08-01 09:44:08 +02:00
|
|
|
Network *network = userdata;
|
2019-03-01 05:27:47 +01:00
|
|
|
_cleanup_(address_free_or_set_invalidp) Address *n = NULL;
|
2017-08-01 09:44:08 +02:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(filename);
|
|
|
|
assert(section);
|
|
|
|
assert(lvalue);
|
|
|
|
assert(rvalue);
|
|
|
|
assert(data);
|
|
|
|
|
|
|
|
r = address_new_static(network, filename, section_line, &n);
|
2020-07-16 07:48:08 +02:00
|
|
|
if (r == -ENOMEM)
|
|
|
|
return log_oom();
|
|
|
|
if (r < 0) {
|
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r,
|
|
|
|
"Failed to allocate new address, ignoring assignment: %m");
|
|
|
|
return 0;
|
|
|
|
}
|
2017-08-01 09:44:08 +02:00
|
|
|
|
|
|
|
if (streq(rvalue, "host"))
|
|
|
|
n->scope = RT_SCOPE_HOST;
|
|
|
|
else if (streq(rvalue, "link"))
|
|
|
|
n->scope = RT_SCOPE_LINK;
|
|
|
|
else if (streq(rvalue, "global"))
|
|
|
|
n->scope = RT_SCOPE_UNIVERSE;
|
|
|
|
else {
|
|
|
|
r = safe_atou8(rvalue , &n->scope);
|
|
|
|
if (r < 0) {
|
2020-07-16 07:48:08 +02:00
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r,
|
2019-02-28 02:57:20 +01:00
|
|
|
"Could not parse address scope \"%s\", ignoring assignment: %m", rvalue);
|
2017-08-01 09:44:08 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-27 18:10:15 +01:00
|
|
|
n->scope_set = true;
|
2017-08-01 09:44:08 +02:00
|
|
|
n = NULL;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-11-21 16:54:52 +01:00
|
|
|
int config_parse_duplicate_address_detection(
|
|
|
|
const char *unit,
|
|
|
|
const char *filename,
|
|
|
|
unsigned line,
|
|
|
|
const char *section,
|
|
|
|
unsigned section_line,
|
|
|
|
const char *lvalue,
|
|
|
|
int ltype,
|
|
|
|
const char *rvalue,
|
|
|
|
void *data,
|
|
|
|
void *userdata) {
|
2020-10-04 01:14:27 +02:00
|
|
|
|
2019-11-21 16:54:52 +01:00
|
|
|
Network *network = userdata;
|
|
|
|
_cleanup_(address_free_or_set_invalidp) Address *n = NULL;
|
|
|
|
AddressFamily a;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(filename);
|
|
|
|
assert(section);
|
|
|
|
assert(lvalue);
|
|
|
|
assert(rvalue);
|
|
|
|
assert(data);
|
|
|
|
|
|
|
|
r = address_new_static(network, filename, section_line, &n);
|
2020-07-16 07:48:08 +02:00
|
|
|
if (r == -ENOMEM)
|
|
|
|
return log_oom();
|
|
|
|
if (r < 0) {
|
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, r,
|
|
|
|
"Failed to allocate new address, ignoring assignment: %m");
|
|
|
|
return 0;
|
|
|
|
}
|
2019-11-21 16:54:52 +01:00
|
|
|
|
|
|
|
r = parse_boolean(rvalue);
|
|
|
|
if (r >= 0) {
|
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, 0,
|
|
|
|
"For historical reasons, %s=%s means %s=%s. "
|
|
|
|
"Please use 'both', 'ipv4', 'ipv6' or 'none' instead.",
|
|
|
|
lvalue, rvalue, lvalue, r ? "none" : "both");
|
|
|
|
n->duplicate_address_detection = r ? ADDRESS_FAMILY_NO : ADDRESS_FAMILY_YES;
|
|
|
|
n = NULL;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
a = duplicate_address_detection_address_family_from_string(rvalue);
|
|
|
|
if (a < 0) {
|
2020-07-16 07:48:08 +02:00
|
|
|
log_syntax(unit, LOG_WARNING, filename, line, SYNTHETIC_ERRNO(EINVAL),
|
2019-11-21 16:54:52 +01:00
|
|
|
"Failed to parse %s=, ignoring: %s", lvalue, rvalue);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
n->duplicate_address_detection = a;
|
|
|
|
n = NULL;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-09-28 13:30:10 +02:00
|
|
|
bool address_is_ready(const Address *a) {
|
|
|
|
assert(a);
|
|
|
|
|
2019-08-18 17:04:37 +02:00
|
|
|
return !(a->flags & IFA_F_TENTATIVE);
|
2015-09-28 13:30:10 +02:00
|
|
|
}
|
2019-03-01 05:27:47 +01:00
|
|
|
|
2020-10-02 04:35:44 +02:00
|
|
|
static int address_section_verify(Address *address) {
|
2019-03-01 05:27:47 +01:00
|
|
|
if (section_is_invalid(address->section))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (address->family == AF_UNSPEC) {
|
|
|
|
assert(address->section);
|
|
|
|
|
|
|
|
return log_warning_errno(SYNTHETIC_ERRNO(EINVAL),
|
|
|
|
"%s: Address section without Address= field configured. "
|
|
|
|
"Ignoring [Address] section from line %u.",
|
|
|
|
address->section->filename, address->section->line);
|
|
|
|
}
|
|
|
|
|
2020-12-03 02:19:35 +01:00
|
|
|
if (address_may_have_broadcast(address)) {
|
2020-12-02 11:26:41 +01:00
|
|
|
if (address->broadcast.s_addr == 0)
|
|
|
|
address->broadcast.s_addr = address->in_addr.in.s_addr | htobe32(0xfffffffflu >> address->prefixlen);
|
|
|
|
} else if (address->broadcast.s_addr != 0) {
|
2020-10-13 07:53:46 +02:00
|
|
|
log_warning("%s: broadcast address is set for IPv6 address or IPv4 address with prefixlength larger than 30. "
|
|
|
|
"Ignoring Broadcast= setting in the [Address] section from line %u.",
|
|
|
|
address->section->filename, address->section->line);
|
|
|
|
|
|
|
|
address->broadcast.s_addr = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (address->family == AF_INET6 && address->label) {
|
|
|
|
log_warning("%s: address label is set for IPv6 address in the [Address] section from line %u. "
|
|
|
|
"Ignoring Label= setting.",
|
|
|
|
address->section->filename, address->section->line);
|
|
|
|
|
|
|
|
address->label = mfree(address->label);
|
|
|
|
}
|
|
|
|
|
2020-10-04 03:57:03 +02:00
|
|
|
if (in_addr_is_localhost(address->family, &address->in_addr) > 0 &&
|
|
|
|
(address->family == AF_INET || !address->scope_set)) {
|
|
|
|
/* For IPv4, scope must be always RT_SCOPE_HOST.
|
|
|
|
* For IPv6, use RT_SCOPE_HOST only when it is not explicitly specified. */
|
|
|
|
|
|
|
|
if (address->scope_set && address->scope != RT_SCOPE_HOST)
|
|
|
|
log_warning_errno(SYNTHETIC_ERRNO(EINVAL),
|
|
|
|
"%s: non-host scope is set in the [Address] section from line %u. "
|
|
|
|
"Ignoring Scope= setting.",
|
|
|
|
address->section->filename, address->section->line);
|
|
|
|
|
2020-02-27 18:10:15 +01:00
|
|
|
address->scope = RT_SCOPE_HOST;
|
2020-10-04 03:57:03 +02:00
|
|
|
}
|
2020-02-27 18:10:15 +01:00
|
|
|
|
2020-10-04 01:27:14 +02:00
|
|
|
if (!FLAGS_SET(address->duplicate_address_detection, ADDRESS_FAMILY_IPV6))
|
|
|
|
address->flags |= IFA_F_NODAD;
|
|
|
|
|
2019-03-01 05:27:47 +01:00
|
|
|
return 0;
|
|
|
|
}
|
2020-10-02 04:35:44 +02:00
|
|
|
|
2020-10-06 20:21:59 +02:00
|
|
|
void network_drop_invalid_addresses(Network *network) {
|
2020-10-02 05:34:19 +02:00
|
|
|
Address *address;
|
2020-10-02 04:35:44 +02:00
|
|
|
|
|
|
|
assert(network);
|
|
|
|
|
2020-10-02 05:34:19 +02:00
|
|
|
ORDERED_HASHMAP_FOREACH(address, network->addresses_by_section)
|
2020-10-02 04:35:44 +02:00
|
|
|
if (address_section_verify(address) < 0)
|
|
|
|
address_free(address);
|
|
|
|
}
|