2013-10-17 03:18:36 +02:00
|
|
|
/***
|
|
|
|
This file is part of systemd.
|
|
|
|
|
|
|
|
Copyright 2013 Tom Gundersen <teg@jklm.no>
|
|
|
|
|
|
|
|
systemd is free software; you can redistribute it and/or modify it
|
|
|
|
under the terms of the GNU Lesser General Public License as published by
|
|
|
|
the Free Software Foundation; either version 2.1 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
systemd is distributed in the hope that it will be useful, but
|
|
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
Lesser General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU Lesser General Public License
|
|
|
|
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
***/
|
|
|
|
|
|
|
|
#include <net/if.h>
|
|
|
|
|
2015-10-27 03:01:06 +01:00
|
|
|
#include "alloc-util.h"
|
2013-10-17 03:18:36 +02:00
|
|
|
#include "conf-parser.h"
|
2015-06-15 13:50:43 +02:00
|
|
|
#include "firewall-util.h"
|
2015-08-27 13:59:06 +02:00
|
|
|
#include "netlink-util.h"
|
2015-10-26 16:18:16 +01:00
|
|
|
#include "networkd-address.h"
|
2016-11-13 04:59:06 +01:00
|
|
|
#include "networkd-manager.h"
|
2015-10-26 16:18:16 +01:00
|
|
|
#include "parse-util.h"
|
2015-09-22 17:54:27 +02:00
|
|
|
#include "set.h"
|
2016-05-06 21:20:59 +02:00
|
|
|
#include "socket-util.h"
|
2015-10-24 22:58:24 +02:00
|
|
|
#include "string-util.h"
|
2015-09-22 17:54:27 +02:00
|
|
|
#include "utf8.h"
|
|
|
|
#include "util.h"
|
2013-10-17 03:18:36 +02:00
|
|
|
|
2016-06-03 19:51:48 +02:00
|
|
|
#define ADDRESSES_PER_LINK_MAX 2048U
|
2016-06-03 19:14:12 +02:00
|
|
|
#define STATIC_ADDRESSES_PER_NETWORK_MAX 1024U
|
|
|
|
|
2015-09-21 15:53:40 +02:00
|
|
|
int address_new(Address **ret) {
|
|
|
|
_cleanup_address_free_ Address *address = NULL;
|
|
|
|
|
|
|
|
address = new0(Address, 1);
|
|
|
|
if (!address)
|
|
|
|
return -ENOMEM;
|
2014-04-02 21:31:12 +02:00
|
|
|
|
|
|
|
address->family = AF_UNSPEC;
|
|
|
|
address->scope = RT_SCOPE_UNIVERSE;
|
|
|
|
address->cinfo.ifa_prefered = CACHE_INFO_INFINITY_LIFE_TIME;
|
|
|
|
address->cinfo.ifa_valid = CACHE_INFO_INFINITY_LIFE_TIME;
|
2015-09-21 15:53:40 +02:00
|
|
|
|
|
|
|
*ret = address;
|
|
|
|
address = NULL;
|
|
|
|
|
|
|
|
return 0;
|
2014-04-02 21:31:12 +02:00
|
|
|
}
|
|
|
|
|
2017-02-15 05:30:35 +01:00
|
|
|
int address_new_static(Network *network, const char *filename, unsigned section_line, Address **ret) {
|
|
|
|
_cleanup_network_config_section_free_ NetworkConfigSection *n = NULL;
|
2013-10-17 03:18:36 +02:00
|
|
|
_cleanup_address_free_ Address *address = NULL;
|
2015-09-21 15:53:40 +02:00
|
|
|
int r;
|
2013-10-17 03:18:36 +02:00
|
|
|
|
2016-06-03 19:14:12 +02:00
|
|
|
assert(network);
|
|
|
|
assert(ret);
|
2017-02-17 15:34:25 +01:00
|
|
|
assert(!!filename == (section_line > 0));
|
2016-06-03 19:14:12 +02:00
|
|
|
|
2017-02-17 15:34:25 +01:00
|
|
|
if (filename) {
|
2017-02-15 05:30:35 +01:00
|
|
|
r = network_config_section_new(filename, section_line, &n);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
address = hashmap_get(network->addresses_by_section, n);
|
2013-11-19 16:54:42 +01:00
|
|
|
if (address) {
|
|
|
|
*ret = address;
|
|
|
|
address = NULL;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-06-03 19:14:12 +02:00
|
|
|
if (network->n_static_addresses >= STATIC_ADDRESSES_PER_NETWORK_MAX)
|
|
|
|
return -E2BIG;
|
|
|
|
|
2015-09-21 15:53:40 +02:00
|
|
|
r = address_new(&address);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2014-01-28 20:00:47 +01:00
|
|
|
|
2017-02-17 15:34:25 +01:00
|
|
|
if (filename) {
|
2017-02-15 05:30:35 +01:00
|
|
|
address->section = n;
|
2017-02-22 06:25:03 +01:00
|
|
|
n = NULL;
|
|
|
|
|
2017-02-22 06:41:28 +01:00
|
|
|
r = hashmap_put(network->addresses_by_section, address->section, address);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2013-11-19 16:54:42 +01:00
|
|
|
}
|
|
|
|
|
2016-04-25 09:08:56 +02:00
|
|
|
address->network = network;
|
|
|
|
LIST_APPEND(addresses, network->static_addresses, address);
|
2016-06-03 19:14:12 +02:00
|
|
|
network->n_static_addresses++;
|
2016-04-25 09:08:56 +02:00
|
|
|
|
2013-10-17 03:18:36 +02:00
|
|
|
*ret = address;
|
|
|
|
address = NULL;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void address_free(Address *address) {
|
|
|
|
if (!address)
|
|
|
|
return;
|
|
|
|
|
2014-01-01 15:16:10 +01:00
|
|
|
if (address->network) {
|
2014-05-15 20:10:33 +02:00
|
|
|
LIST_REMOVE(addresses, address->network->static_addresses, address);
|
2016-06-03 19:14:12 +02:00
|
|
|
assert(address->network->n_static_addresses > 0);
|
|
|
|
address->network->n_static_addresses--;
|
2013-10-17 03:18:36 +02:00
|
|
|
|
2017-02-15 05:30:35 +01:00
|
|
|
if (address->section) {
|
|
|
|
hashmap_remove(address->network->addresses_by_section, address->section);
|
|
|
|
network_config_section_free(address->section);
|
|
|
|
}
|
2014-01-01 15:16:10 +01:00
|
|
|
}
|
2013-11-19 16:54:42 +01:00
|
|
|
|
2015-09-30 14:01:44 +02:00
|
|
|
if (address->link) {
|
2015-09-23 01:53:29 +02:00
|
|
|
set_remove(address->link->addresses, address);
|
2015-09-30 14:01:44 +02:00
|
|
|
set_remove(address->link->addresses_foreign, address);
|
2016-05-18 14:49:40 +02:00
|
|
|
|
|
|
|
if (in_addr_equal(AF_INET6, &address->in_addr, (const union in_addr_union *) &address->link->ipv6ll_address))
|
|
|
|
memzero(&address->link->ipv6ll_address, sizeof(struct in6_addr));
|
2015-09-30 14:01:44 +02:00
|
|
|
}
|
2015-09-23 01:53:29 +02:00
|
|
|
|
2013-10-17 03:18:36 +02:00
|
|
|
free(address);
|
|
|
|
}
|
|
|
|
|
2015-09-22 17:54:27 +02:00
|
|
|
static void address_hash_func(const void *b, struct siphash *state) {
|
|
|
|
const Address *a = b;
|
|
|
|
|
|
|
|
assert(a);
|
|
|
|
|
|
|
|
siphash24_compress(&a->family, sizeof(a->family), state);
|
|
|
|
|
|
|
|
switch (a->family) {
|
|
|
|
case AF_INET:
|
|
|
|
siphash24_compress(&a->prefixlen, sizeof(a->prefixlen), state);
|
|
|
|
|
|
|
|
/* peer prefix */
|
|
|
|
if (a->prefixlen != 0) {
|
|
|
|
uint32_t prefix;
|
|
|
|
|
|
|
|
if (a->in_addr_peer.in.s_addr != 0)
|
|
|
|
prefix = be32toh(a->in_addr_peer.in.s_addr) >> (32 - a->prefixlen);
|
|
|
|
else
|
|
|
|
prefix = be32toh(a->in_addr.in.s_addr) >> (32 - a->prefixlen);
|
|
|
|
|
|
|
|
siphash24_compress(&prefix, sizeof(prefix), state);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* fallthrough */
|
|
|
|
case AF_INET6:
|
|
|
|
/* local address */
|
|
|
|
siphash24_compress(&a->in_addr, FAMILY_ADDRESS_SIZE(a->family), state);
|
|
|
|
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
/* treat any other address family as AF_UNSPEC */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int address_compare_func(const void *c1, const void *c2) {
|
|
|
|
const Address *a1 = c1, *a2 = c2;
|
|
|
|
|
|
|
|
if (a1->family < a2->family)
|
|
|
|
return -1;
|
|
|
|
if (a1->family > a2->family)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
switch (a1->family) {
|
|
|
|
/* use the same notion of equality as the kernel does */
|
|
|
|
case AF_INET:
|
|
|
|
if (a1->prefixlen < a2->prefixlen)
|
|
|
|
return -1;
|
|
|
|
if (a1->prefixlen > a2->prefixlen)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
/* compare the peer prefixes */
|
|
|
|
if (a1->prefixlen != 0) {
|
|
|
|
/* make sure we don't try to shift by 32.
|
|
|
|
* See ISO/IEC 9899:TC3 § 6.5.7.3. */
|
|
|
|
uint32_t b1, b2;
|
|
|
|
|
|
|
|
if (a1->in_addr_peer.in.s_addr != 0)
|
|
|
|
b1 = be32toh(a1->in_addr_peer.in.s_addr) >> (32 - a1->prefixlen);
|
|
|
|
else
|
|
|
|
b1 = be32toh(a1->in_addr.in.s_addr) >> (32 - a1->prefixlen);
|
|
|
|
|
|
|
|
if (a2->in_addr_peer.in.s_addr != 0)
|
|
|
|
b2 = be32toh(a2->in_addr_peer.in.s_addr) >> (32 - a1->prefixlen);
|
|
|
|
else
|
|
|
|
b2 = be32toh(a2->in_addr.in.s_addr) >> (32 - a1->prefixlen);
|
|
|
|
|
|
|
|
if (b1 < b2)
|
|
|
|
return -1;
|
|
|
|
if (b1 > b2)
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* fall-through */
|
|
|
|
case AF_INET6:
|
|
|
|
return memcmp(&a1->in_addr, &a2->in_addr, FAMILY_ADDRESS_SIZE(a1->family));
|
|
|
|
default:
|
|
|
|
/* treat any other address family as AF_UNSPEC */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct hash_ops address_hash_ops = {
|
|
|
|
.hash = address_hash_func,
|
|
|
|
.compare = address_compare_func
|
|
|
|
};
|
|
|
|
|
|
|
|
bool address_equal(Address *a1, Address *a2) {
|
|
|
|
if (a1 == a2)
|
|
|
|
return true;
|
|
|
|
|
|
|
|
if (!a1 || !a2)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
return address_compare_func(a1, a2) == 0;
|
|
|
|
}
|
|
|
|
|
2015-09-24 15:25:20 +02:00
|
|
|
static int address_establish(Address *address, Link *link) {
|
|
|
|
bool masq;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(address);
|
|
|
|
assert(link);
|
|
|
|
|
|
|
|
masq = link->network &&
|
2015-09-30 14:07:12 +02:00
|
|
|
link->network->ip_masquerade &&
|
|
|
|
address->family == AF_INET &&
|
|
|
|
address->scope < RT_SCOPE_LINK;
|
2015-09-24 15:25:20 +02:00
|
|
|
|
|
|
|
/* Add firewall entry if this is requested */
|
|
|
|
if (address->ip_masquerade_done != masq) {
|
|
|
|
union in_addr_union masked = address->in_addr;
|
|
|
|
in_addr_mask(address->family, &masked, address->prefixlen);
|
|
|
|
|
|
|
|
r = fw_add_masquerade(masq, AF_INET, 0, &masked, address->prefixlen, NULL, NULL, 0);
|
|
|
|
if (r < 0)
|
|
|
|
log_link_warning_errno(link, r, "Could not enable IP masquerading: %m");
|
|
|
|
|
|
|
|
address->ip_masquerade_done = masq;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-09-30 14:01:44 +02:00
|
|
|
static int address_add_internal(Link *link, Set **addresses,
|
|
|
|
int family,
|
|
|
|
const union in_addr_union *in_addr,
|
|
|
|
unsigned char prefixlen,
|
|
|
|
Address **ret) {
|
2015-09-24 01:22:05 +02:00
|
|
|
_cleanup_address_free_ Address *address = NULL;
|
2015-09-23 01:53:29 +02:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(link);
|
2015-09-30 14:01:44 +02:00
|
|
|
assert(addresses);
|
2015-09-24 01:22:05 +02:00
|
|
|
assert(in_addr);
|
|
|
|
|
|
|
|
r = address_new(&address);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
address->family = family;
|
|
|
|
address->in_addr = *in_addr;
|
|
|
|
address->prefixlen = prefixlen;
|
2015-11-10 13:52:34 +01:00
|
|
|
/* Consider address tentative until we get the real flags from the kernel */
|
|
|
|
address->flags = IFA_F_TENTATIVE;
|
2015-09-23 01:53:29 +02:00
|
|
|
|
2015-09-30 14:01:44 +02:00
|
|
|
r = set_ensure_allocated(addresses, &address_hash_ops);
|
2015-09-23 01:53:29 +02:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
2015-09-30 14:01:44 +02:00
|
|
|
r = set_put(*addresses, address);
|
2015-09-23 01:53:29 +02:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
address->link = link;
|
|
|
|
|
2015-09-30 14:01:44 +02:00
|
|
|
if (ret)
|
|
|
|
*ret = address;
|
|
|
|
|
2015-09-24 01:22:05 +02:00
|
|
|
address = NULL;
|
|
|
|
|
2015-09-23 01:53:29 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-09-30 14:01:44 +02:00
|
|
|
int address_add_foreign(Link *link, int family, const union in_addr_union *in_addr, unsigned char prefixlen, Address **ret) {
|
|
|
|
return address_add_internal(link, &link->addresses_foreign, family, in_addr, prefixlen, ret);
|
|
|
|
}
|
|
|
|
|
2015-10-01 21:14:06 +02:00
|
|
|
int address_add(Link *link, int family, const union in_addr_union *in_addr, unsigned char prefixlen, Address **ret) {
|
2015-10-26 11:40:02 +01:00
|
|
|
Address *address;
|
2015-09-30 15:32:16 +02:00
|
|
|
int r;
|
|
|
|
|
2015-10-26 11:40:02 +01:00
|
|
|
r = address_get(link, family, in_addr, prefixlen, &address);
|
|
|
|
if (r == -ENOENT) {
|
|
|
|
/* Address does not exist, create a new one */
|
|
|
|
r = address_add_internal(link, &link->addresses, family, in_addr, prefixlen, &address);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
} else if (r == 0) {
|
|
|
|
/* Take over a foreign address */
|
|
|
|
r = set_ensure_allocated(&link->addresses, &address_hash_ops);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
r = set_put(link->addresses, address);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
set_remove(link->addresses_foreign, address);
|
|
|
|
} else if (r == 1) {
|
|
|
|
/* Already exists, do nothing */
|
|
|
|
;
|
|
|
|
} else
|
2015-09-30 15:32:16 +02:00
|
|
|
return r;
|
|
|
|
|
2015-10-26 11:40:02 +01:00
|
|
|
if (ret)
|
|
|
|
*ret = address;
|
2015-09-30 15:32:16 +02:00
|
|
|
|
|
|
|
return 0;
|
2015-09-30 14:01:44 +02:00
|
|
|
}
|
|
|
|
|
2015-09-30 14:07:12 +02:00
|
|
|
static int address_release(Address *address) {
|
2015-01-13 13:47:08 +01:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(address);
|
2015-09-30 14:07:12 +02:00
|
|
|
assert(address->link);
|
2015-01-13 13:47:08 +01:00
|
|
|
|
2015-09-24 15:25:20 +02:00
|
|
|
/* Remove masquerading firewall entry if it was added */
|
|
|
|
if (address->ip_masquerade_done) {
|
2015-01-13 13:47:08 +01:00
|
|
|
union in_addr_union masked = address->in_addr;
|
|
|
|
in_addr_mask(address->family, &masked, address->prefixlen);
|
|
|
|
|
2015-09-24 15:25:20 +02:00
|
|
|
r = fw_add_masquerade(false, AF_INET, 0, &masked, address->prefixlen, NULL, NULL, 0);
|
2015-01-13 13:47:08 +01:00
|
|
|
if (r < 0)
|
2015-09-30 14:07:12 +02:00
|
|
|
log_link_warning_errno(address->link, r, "Failed to disable IP masquerading: %m");
|
2015-01-13 13:47:08 +01:00
|
|
|
|
2015-09-24 15:25:20 +02:00
|
|
|
address->ip_masquerade_done = false;
|
2015-01-13 13:47:08 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-06-03 19:54:35 +02:00
|
|
|
int address_update(
|
|
|
|
Address *address,
|
|
|
|
unsigned char flags,
|
|
|
|
unsigned char scope,
|
|
|
|
const struct ifa_cacheinfo *cinfo) {
|
|
|
|
|
2015-09-28 17:16:12 +02:00
|
|
|
bool ready;
|
2015-11-10 21:30:59 +01:00
|
|
|
int r;
|
2015-09-28 17:16:12 +02:00
|
|
|
|
|
|
|
assert(address);
|
|
|
|
assert(cinfo);
|
networkd: do not update state or IPv6LL address if link is failed or lingering
This is partial fix for #2228 and #2977, #3204.
bridge-test: netdev ready
docker0: Gained IPv6LL
wlan0: Gained IPv6LL
eth0: Gained IPv6LL
Enumeration completed
bridge-test: netdev exists, using existing without changing its
parameters
vboxnet0: IPv6 enabled for interface: Success
lo: Configured
docker0: Could not drop address: No such process
vboxnet0: Gained carrier
wlan0: Could not drop address: No such process
eth0: Could not drop address: No such process
eth0: Could not drop address: No such process
eth0: Could not drop address: No such process
vboxnet0: Gained IPv6LL
vboxnet0: Could not set NDisc route or address: Invalid argument
vboxnet0: Failed
[New Thread 0x7ffff6505700 (LWP 1111)]
[Thread 0x7ffff6505700 (LWP 1111) exited]
Assertion 'link->state == LINK_STATE_SETTING_ROUTES' failed at
src/network/networkd-link.c:672, function link_enter_configured().
Aborting.
Program received signal SIGABRT, Aborted.
0x00007ffff6dc6a98 in raise () from /lib64/libc.so.6
Missing separate debuginfos, use: dnf debuginfo-install
iptables-1.4.21-15.fc23.x86_64 libattr-2.4.47-14.fc23.x86_64
libidn-1.32-1.fc23.x86_64 pcre-8.38-7.fc23.x86_64
Debugging
(gdb) bt
"link->state == LINK_STATE_SETTING_ROUTES", file=0x5555556a34c8
"src/network/networkd-link.c", line=672,
func=0x5555556a56d0 <__PRETTY_FUNCTION__.14850>
"link_enter_configured") at src/basic/log.c:788
src/network/networkd-link.c:672
src/network/networkd-link.c:720
flags=0 '\000', scope=0 '\000', cinfo=0x7fffffffe020) at
src/network/networkd-address.c:344
(rtnl=0x5555556eded0, message=0x55555570ff20, userdata=0x5555556ec590)
at src/network/networkd-manager.c:604
m=0x55555570ff20) at src/libsystemd/sd-netlink/sd-netlink.c:365
at src/libsystemd/sd-netlink/sd-netlink.c:395
ret=0x0) at src/libsystemd/sd-netlink/sd-netlink.c:429
revents=1, userdata=0x5555556eded0) at
src/libsystemd/sd-netlink/sd-netlink.c:723
src/libsystemd/sd-event/sd-event.c:2268
src/libsystemd/sd-event/sd-event.c:2629
timeout=18446744073709551615) at src/libsystemd/sd-event/sd-event.c:2688
bus=0x5555556eeba0, name=0x55555568a2f5 "org.freedesktop.network1",
timeout=30000000,
check_idle=0x55555556adb6 <manager_check_idle>,
userdata=0x5555556ec590) at src/shared/bus-util.c:134
src/network/networkd-manager.c:1130
src/network/networkd.c:127
(gdb) f 3
src/network/networkd-link.c:672
672 assert(link->state == LINK_STATE_SETTING_ROUTES);
(gdb) p link->state
$1 = LINK_STATE_FAILED
We should not be in this state .
even if vboxnet0 failed we went into this state.
vboxnet0: Could not set NDisc route or address: Invalid argument
vboxnet0: Failed
2016-05-18 04:59:56 +02:00
|
|
|
assert_return(address->link, 1);
|
|
|
|
|
|
|
|
if (IN_SET(address->link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
|
|
|
|
return 1;
|
2015-09-28 17:16:12 +02:00
|
|
|
|
|
|
|
ready = address_is_ready(address);
|
|
|
|
|
|
|
|
address->flags = flags;
|
|
|
|
address->scope = scope;
|
|
|
|
address->cinfo = *cinfo;
|
|
|
|
|
networkd: do not update state or IPv6LL address if link is failed or lingering
This is partial fix for #2228 and #2977, #3204.
bridge-test: netdev ready
docker0: Gained IPv6LL
wlan0: Gained IPv6LL
eth0: Gained IPv6LL
Enumeration completed
bridge-test: netdev exists, using existing without changing its
parameters
vboxnet0: IPv6 enabled for interface: Success
lo: Configured
docker0: Could not drop address: No such process
vboxnet0: Gained carrier
wlan0: Could not drop address: No such process
eth0: Could not drop address: No such process
eth0: Could not drop address: No such process
eth0: Could not drop address: No such process
vboxnet0: Gained IPv6LL
vboxnet0: Could not set NDisc route or address: Invalid argument
vboxnet0: Failed
[New Thread 0x7ffff6505700 (LWP 1111)]
[Thread 0x7ffff6505700 (LWP 1111) exited]
Assertion 'link->state == LINK_STATE_SETTING_ROUTES' failed at
src/network/networkd-link.c:672, function link_enter_configured().
Aborting.
Program received signal SIGABRT, Aborted.
0x00007ffff6dc6a98 in raise () from /lib64/libc.so.6
Missing separate debuginfos, use: dnf debuginfo-install
iptables-1.4.21-15.fc23.x86_64 libattr-2.4.47-14.fc23.x86_64
libidn-1.32-1.fc23.x86_64 pcre-8.38-7.fc23.x86_64
Debugging
(gdb) bt
"link->state == LINK_STATE_SETTING_ROUTES", file=0x5555556a34c8
"src/network/networkd-link.c", line=672,
func=0x5555556a56d0 <__PRETTY_FUNCTION__.14850>
"link_enter_configured") at src/basic/log.c:788
src/network/networkd-link.c:672
src/network/networkd-link.c:720
flags=0 '\000', scope=0 '\000', cinfo=0x7fffffffe020) at
src/network/networkd-address.c:344
(rtnl=0x5555556eded0, message=0x55555570ff20, userdata=0x5555556ec590)
at src/network/networkd-manager.c:604
m=0x55555570ff20) at src/libsystemd/sd-netlink/sd-netlink.c:365
at src/libsystemd/sd-netlink/sd-netlink.c:395
ret=0x0) at src/libsystemd/sd-netlink/sd-netlink.c:429
revents=1, userdata=0x5555556eded0) at
src/libsystemd/sd-netlink/sd-netlink.c:723
src/libsystemd/sd-event/sd-event.c:2268
src/libsystemd/sd-event/sd-event.c:2629
timeout=18446744073709551615) at src/libsystemd/sd-event/sd-event.c:2688
bus=0x5555556eeba0, name=0x55555568a2f5 "org.freedesktop.network1",
timeout=30000000,
check_idle=0x55555556adb6 <manager_check_idle>,
userdata=0x5555556ec590) at src/shared/bus-util.c:134
src/network/networkd-manager.c:1130
src/network/networkd.c:127
(gdb) f 3
src/network/networkd-link.c:672
672 assert(link->state == LINK_STATE_SETTING_ROUTES);
(gdb) p link->state
$1 = LINK_STATE_FAILED
We should not be in this state .
even if vboxnet0 failed we went into this state.
vboxnet0: Could not set NDisc route or address: Invalid argument
vboxnet0: Failed
2016-05-18 04:59:56 +02:00
|
|
|
link_update_operstate(address->link);
|
|
|
|
|
|
|
|
if (!ready && address_is_ready(address)) {
|
|
|
|
link_check_ready(address->link);
|
|
|
|
|
|
|
|
if (address->family == AF_INET6 &&
|
|
|
|
in_addr_is_link_local(AF_INET6, &address->in_addr) > 0 &&
|
|
|
|
in_addr_is_null(AF_INET6, (const union in_addr_union*) &address->link->ipv6ll_address) > 0) {
|
|
|
|
|
|
|
|
r = link_ipv6ll_gained(address->link, &address->in_addr.in6);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2015-11-10 21:30:59 +01:00
|
|
|
}
|
2015-10-27 00:06:10 +01:00
|
|
|
}
|
2015-09-28 17:16:12 +02:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-09-24 15:25:20 +02:00
|
|
|
int address_drop(Address *address) {
|
2015-09-28 13:38:43 +02:00
|
|
|
Link *link;
|
|
|
|
bool ready;
|
|
|
|
|
2015-01-13 13:47:08 +01:00
|
|
|
assert(address);
|
2015-09-24 15:25:20 +02:00
|
|
|
|
2015-09-28 13:38:43 +02:00
|
|
|
ready = address_is_ready(address);
|
|
|
|
link = address->link;
|
|
|
|
|
2015-09-30 14:07:12 +02:00
|
|
|
address_release(address);
|
2015-09-24 15:25:20 +02:00
|
|
|
address_free(address);
|
|
|
|
|
2015-09-30 18:17:43 +02:00
|
|
|
link_update_operstate(link);
|
|
|
|
|
2015-09-28 13:38:43 +02:00
|
|
|
if (link && !ready)
|
|
|
|
link_check_ready(link);
|
|
|
|
|
2015-09-24 15:25:20 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-06-03 19:51:48 +02:00
|
|
|
int address_get(Link *link,
|
|
|
|
int family,
|
|
|
|
const union in_addr_union *in_addr,
|
|
|
|
unsigned char prefixlen,
|
|
|
|
Address **ret) {
|
|
|
|
|
|
|
|
Address address, *existing;
|
2015-09-24 15:25:20 +02:00
|
|
|
|
2015-01-13 13:47:08 +01:00
|
|
|
assert(link);
|
2015-09-24 15:25:20 +02:00
|
|
|
assert(in_addr);
|
2015-01-13 13:47:08 +01:00
|
|
|
|
2016-06-03 19:51:48 +02:00
|
|
|
address = (Address) {
|
|
|
|
.family = family,
|
|
|
|
.in_addr = *in_addr,
|
|
|
|
.prefixlen = prefixlen,
|
|
|
|
};
|
2015-01-13 13:47:08 +01:00
|
|
|
|
2015-09-24 15:25:20 +02:00
|
|
|
existing = set_get(link->addresses, &address);
|
2015-10-26 11:40:02 +01:00
|
|
|
if (existing) {
|
2016-06-03 19:51:48 +02:00
|
|
|
if (ret)
|
|
|
|
*ret = existing;
|
2015-10-26 11:40:02 +01:00
|
|
|
return 1;
|
2015-09-30 14:01:44 +02:00
|
|
|
}
|
2015-01-13 13:47:08 +01:00
|
|
|
|
2016-06-03 19:51:48 +02:00
|
|
|
existing = set_get(link->addresses_foreign, &address);
|
|
|
|
if (existing) {
|
|
|
|
if (ret)
|
|
|
|
*ret = existing;
|
|
|
|
return 0;
|
|
|
|
}
|
2015-01-13 13:47:08 +01:00
|
|
|
|
2016-06-03 19:51:48 +02:00
|
|
|
return -ENOENT;
|
2015-01-13 13:47:08 +01:00
|
|
|
}
|
|
|
|
|
2016-05-15 16:22:40 +02:00
|
|
|
int address_remove(
|
|
|
|
Address *address,
|
|
|
|
Link *link,
|
|
|
|
sd_netlink_message_handler_t callback) {
|
|
|
|
|
tree-wide: expose "p"-suffix unref calls in public APIs to make gcc cleanup easy
GLIB has recently started to officially support the gcc cleanup
attribute in its public API, hence let's do the same for our APIs.
With this patch we'll define an xyz_unrefp() call for each public
xyz_unref() call, to make it easy to use inside a
__attribute__((cleanup())) expression. Then, all code is ported over to
make use of this.
The new calls are also documented in the man pages, with examples how to
use them (well, I only added docs where the _unref() call itself already
had docs, and the examples, only cover sd_bus_unrefp() and
sd_event_unrefp()).
This also renames sd_lldp_free() to sd_lldp_unref(), since that's how we
tend to call our destructors these days.
Note that this defines no public macro that wraps gcc's attribute and
makes it easier to use. While I think it's our duty in the library to
make our stuff easy to use, I figure it's not our duty to make gcc's own
features easy to use on its own. Most likely, client code which wants to
make use of this should define its own:
#define _cleanup_(function) __attribute__((cleanup(function)))
Or similar, to make the gcc feature easier to use.
Making this logic public has the benefit that we can remove three header
files whose only purpose was to define these functions internally.
See #2008.
2015-11-27 19:13:45 +01:00
|
|
|
_cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
|
2013-12-31 17:31:50 +01:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(address);
|
|
|
|
assert(address->family == AF_INET || address->family == AF_INET6);
|
|
|
|
assert(link);
|
|
|
|
assert(link->ifindex > 0);
|
|
|
|
assert(link->manager);
|
|
|
|
assert(link->manager->rtnl);
|
|
|
|
|
2014-02-19 23:54:58 +01:00
|
|
|
r = sd_rtnl_message_new_addr(link->manager->rtnl, &req, RTM_DELADDR,
|
|
|
|
link->ifindex, address->family);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
|
|
|
return log_error_errno(r, "Could not allocate RTM_DELADDR message: %m");
|
2013-12-31 17:31:50 +01:00
|
|
|
|
2014-01-21 15:55:57 +01:00
|
|
|
r = sd_rtnl_message_addr_set_prefixlen(req, address->prefixlen);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
|
|
|
return log_error_errno(r, "Could not set prefixlen: %m");
|
2014-01-21 15:55:57 +01:00
|
|
|
|
2013-12-31 17:31:50 +01:00
|
|
|
if (address->family == AF_INET)
|
2015-06-12 16:31:33 +02:00
|
|
|
r = sd_netlink_message_append_in_addr(req, IFA_LOCAL, &address->in_addr.in);
|
2013-12-31 17:31:50 +01:00
|
|
|
else if (address->family == AF_INET6)
|
2015-06-12 16:31:33 +02:00
|
|
|
r = sd_netlink_message_append_in6_addr(req, IFA_LOCAL, &address->in_addr.in6);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
|
|
|
return log_error_errno(r, "Could not append IFA_LOCAL attribute: %m");
|
2013-12-31 17:31:50 +01:00
|
|
|
|
2015-06-12 16:31:33 +02:00
|
|
|
r = sd_netlink_call_async(link->manager->rtnl, req, callback, link, 0, NULL);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
|
|
|
return log_error_errno(r, "Could not send rtnetlink message: %m");
|
2013-12-31 17:31:50 +01:00
|
|
|
|
2014-07-03 09:43:31 +02:00
|
|
|
link_ref(link);
|
|
|
|
|
2013-12-31 17:31:50 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-06-18 18:22:14 +02:00
|
|
|
static int address_acquire(Link *link, Address *original, Address **ret) {
|
|
|
|
union in_addr_union in_addr = {};
|
|
|
|
struct in_addr broadcast = {};
|
2014-06-30 07:05:48 +02:00
|
|
|
_cleanup_address_free_ Address *na = NULL;
|
2014-06-18 18:22:14 +02:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(link);
|
|
|
|
assert(original);
|
|
|
|
assert(ret);
|
|
|
|
|
|
|
|
/* Something useful was configured? just use it */
|
2014-07-30 00:48:59 +02:00
|
|
|
if (in_addr_is_null(original->family, &original->in_addr) <= 0)
|
2014-06-18 18:22:14 +02:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* The address is configured to be 0.0.0.0 or [::] by the user?
|
|
|
|
* Then let's acquire something more useful from the pool. */
|
|
|
|
r = manager_address_pool_acquire(link->manager, original->family, original->prefixlen, &in_addr);
|
2015-04-21 17:40:18 +02:00
|
|
|
if (r < 0)
|
|
|
|
return log_link_error_errno(link, r, "Failed to acquire address from pool: %m");
|
2014-06-18 18:22:14 +02:00
|
|
|
if (r == 0) {
|
2014-11-27 20:20:23 +01:00
|
|
|
log_link_error(link, "Couldn't find free address for interface, all taken.");
|
2014-06-18 18:22:14 +02:00
|
|
|
return -EBUSY;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (original->family == AF_INET) {
|
2014-12-10 20:00:04 +01:00
|
|
|
/* Pick first address in range for ourselves ... */
|
2014-06-18 18:22:14 +02:00
|
|
|
in_addr.in.s_addr = in_addr.in.s_addr | htobe32(1);
|
|
|
|
|
|
|
|
/* .. and use last as broadcast address */
|
|
|
|
broadcast.s_addr = in_addr.in.s_addr | htobe32(0xFFFFFFFFUL >> original->prefixlen);
|
|
|
|
} else if (original->family == AF_INET6)
|
|
|
|
in_addr.in6.s6_addr[15] |= 1;
|
|
|
|
|
2015-09-21 15:53:40 +02:00
|
|
|
r = address_new(&na);
|
2014-06-18 18:22:14 +02:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
na->family = original->family;
|
|
|
|
na->prefixlen = original->prefixlen;
|
|
|
|
na->scope = original->scope;
|
|
|
|
na->cinfo = original->cinfo;
|
|
|
|
|
|
|
|
if (original->label) {
|
|
|
|
na->label = strdup(original->label);
|
2014-06-30 07:05:48 +02:00
|
|
|
if (!na->label)
|
2014-06-18 18:22:14 +02:00
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
na->broadcast = broadcast;
|
|
|
|
na->in_addr = in_addr;
|
|
|
|
|
|
|
|
LIST_PREPEND(addresses, link->pool_addresses, na);
|
|
|
|
|
|
|
|
*ret = na;
|
2014-06-30 07:05:48 +02:00
|
|
|
na = NULL;
|
|
|
|
|
2014-06-18 18:22:14 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-06-03 19:51:48 +02:00
|
|
|
int address_configure(
|
|
|
|
Address *address,
|
|
|
|
Link *link,
|
|
|
|
sd_netlink_message_handler_t callback,
|
|
|
|
bool update) {
|
|
|
|
|
tree-wide: expose "p"-suffix unref calls in public APIs to make gcc cleanup easy
GLIB has recently started to officially support the gcc cleanup
attribute in its public API, hence let's do the same for our APIs.
With this patch we'll define an xyz_unrefp() call for each public
xyz_unref() call, to make it easy to use inside a
__attribute__((cleanup())) expression. Then, all code is ported over to
make use of this.
The new calls are also documented in the man pages, with examples how to
use them (well, I only added docs where the _unref() call itself already
had docs, and the examples, only cover sd_bus_unrefp() and
sd_event_unrefp()).
This also renames sd_lldp_free() to sd_lldp_unref(), since that's how we
tend to call our destructors these days.
Note that this defines no public macro that wraps gcc's attribute and
makes it easier to use. While I think it's our duty in the library to
make our stuff easy to use, I figure it's not our duty to make gcc's own
features easy to use on its own. Most likely, client code which wants to
make use of this should define its own:
#define _cleanup_(function) __attribute__((cleanup(function)))
Or similar, to make the gcc feature easier to use.
Making this logic public has the benefit that we can remove three header
files whose only purpose was to define these functions internally.
See #2008.
2015-11-27 19:13:45 +01:00
|
|
|
_cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
|
2013-10-17 03:18:36 +02:00
|
|
|
int r;
|
|
|
|
|
2013-11-24 23:36:58 +01:00
|
|
|
assert(address);
|
|
|
|
assert(address->family == AF_INET || address->family == AF_INET6);
|
|
|
|
assert(link);
|
|
|
|
assert(link->ifindex > 0);
|
2013-11-14 16:22:51 +01:00
|
|
|
assert(link->manager);
|
2013-11-24 23:36:58 +01:00
|
|
|
assert(link->manager->rtnl);
|
2013-11-14 16:22:51 +01:00
|
|
|
|
2016-06-03 19:51:48 +02:00
|
|
|
/* If this is a new address, then refuse adding more than the limit */
|
|
|
|
if (address_get(link, address->family, &address->in_addr, address->prefixlen, NULL) <= 0 &&
|
|
|
|
set_size(link->addresses) >= ADDRESSES_PER_LINK_MAX)
|
|
|
|
return -E2BIG;
|
|
|
|
|
2014-06-18 18:22:14 +02:00
|
|
|
r = address_acquire(link, address, &address);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
2015-10-01 17:31:14 +02:00
|
|
|
if (update)
|
|
|
|
r = sd_rtnl_message_new_addr_update(link->manager->rtnl, &req,
|
|
|
|
link->ifindex, address->family);
|
|
|
|
else
|
|
|
|
r = sd_rtnl_message_new_addr(link->manager->rtnl, &req, RTM_NEWADDR,
|
|
|
|
link->ifindex, address->family);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
|
|
|
return log_error_errno(r, "Could not allocate RTM_NEWADDR message: %m");
|
2013-10-17 03:18:36 +02:00
|
|
|
|
2014-01-21 15:55:57 +01:00
|
|
|
r = sd_rtnl_message_addr_set_prefixlen(req, address->prefixlen);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
|
|
|
return log_error_errno(r, "Could not set prefixlen: %m");
|
2014-01-21 15:55:57 +01:00
|
|
|
|
2015-02-02 12:13:17 +01:00
|
|
|
address->flags |= IFA_F_PERMANENT;
|
|
|
|
|
2016-10-08 13:05:41 +02:00
|
|
|
if (address->home_address)
|
|
|
|
address->flags |= IFA_F_HOMEADDRESS;
|
|
|
|
|
|
|
|
if (address->duplicate_address_detection)
|
|
|
|
address->flags |= IFA_F_NODAD;
|
|
|
|
|
|
|
|
if (address->manage_temporary_address)
|
|
|
|
address->flags |= IFA_F_MANAGETEMPADDR;
|
|
|
|
|
|
|
|
if (address->prefix_route)
|
|
|
|
address->flags |= IFA_F_NOPREFIXROUTE;
|
|
|
|
|
|
|
|
if (address->autojoin)
|
|
|
|
address->flags |= IFA_F_MCAUTOJOIN;
|
|
|
|
|
2015-02-02 12:13:17 +01:00
|
|
|
r = sd_rtnl_message_addr_set_flags(req, (address->flags & 0xff));
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
|
|
|
return log_error_errno(r, "Could not set flags: %m");
|
2014-01-21 15:55:57 +01:00
|
|
|
|
2015-02-02 12:13:17 +01:00
|
|
|
if (address->flags & ~0xff) {
|
2015-06-12 16:31:33 +02:00
|
|
|
r = sd_netlink_message_append_u32(req, IFA_FLAGS, address->flags);
|
2015-02-02 12:13:17 +01:00
|
|
|
if (r < 0)
|
|
|
|
return log_error_errno(r, "Could not set extended flags: %m");
|
|
|
|
}
|
|
|
|
|
2014-02-28 16:10:20 +01:00
|
|
|
r = sd_rtnl_message_addr_set_scope(req, address->scope);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
|
|
|
return log_error_errno(r, "Could not set scope: %m");
|
2014-01-21 15:55:57 +01:00
|
|
|
|
2013-12-15 14:00:20 +01:00
|
|
|
if (address->family == AF_INET)
|
2015-06-12 16:31:33 +02:00
|
|
|
r = sd_netlink_message_append_in_addr(req, IFA_LOCAL, &address->in_addr.in);
|
2013-12-15 14:00:20 +01:00
|
|
|
else if (address->family == AF_INET6)
|
2015-06-12 16:31:33 +02:00
|
|
|
r = sd_netlink_message_append_in6_addr(req, IFA_LOCAL, &address->in_addr.in6);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
|
|
|
return log_error_errno(r, "Could not append IFA_LOCAL attribute: %m");
|
2013-10-17 03:18:36 +02:00
|
|
|
|
2014-07-30 00:48:59 +02:00
|
|
|
if (!in_addr_is_null(address->family, &address->in_addr_peer)) {
|
2014-07-07 11:28:56 +02:00
|
|
|
if (address->family == AF_INET)
|
2015-06-12 16:31:33 +02:00
|
|
|
r = sd_netlink_message_append_in_addr(req, IFA_ADDRESS, &address->in_addr_peer.in);
|
2014-07-07 11:28:56 +02:00
|
|
|
else if (address->family == AF_INET6)
|
2015-06-12 16:31:33 +02:00
|
|
|
r = sd_netlink_message_append_in6_addr(req, IFA_ADDRESS, &address->in_addr_peer.in6);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
|
|
|
return log_error_errno(r, "Could not append IFA_ADDRESS attribute: %m");
|
2014-07-07 11:28:56 +02:00
|
|
|
} else {
|
|
|
|
if (address->family == AF_INET) {
|
2015-06-12 16:31:33 +02:00
|
|
|
r = sd_netlink_message_append_in_addr(req, IFA_BROADCAST, &address->broadcast);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
|
|
|
return log_error_errno(r, "Could not append IFA_BROADCAST attribute: %m");
|
2014-07-07 11:28:56 +02:00
|
|
|
}
|
2013-10-17 03:18:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (address->label) {
|
2015-06-12 16:31:33 +02:00
|
|
|
r = sd_netlink_message_append_string(req, IFA_LABEL, address->label);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
|
|
|
return log_error_errno(r, "Could not append IFA_LABEL attribute: %m");
|
2013-10-17 03:18:36 +02:00
|
|
|
}
|
|
|
|
|
2015-06-12 16:31:33 +02:00
|
|
|
r = sd_netlink_message_append_cache_info(req, IFA_CACHEINFO,
|
2014-06-26 15:18:43 +02:00
|
|
|
&address->cinfo);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
|
|
|
return log_error_errno(r, "Could not append IFA_CACHEINFO attribute: %m");
|
2014-06-26 15:18:43 +02:00
|
|
|
|
2015-09-30 14:07:12 +02:00
|
|
|
r = address_establish(address, link);
|
2014-11-28 17:34:26 +01:00
|
|
|
if (r < 0)
|
2015-09-30 14:07:12 +02:00
|
|
|
return r;
|
|
|
|
|
|
|
|
r = sd_netlink_call_async(link->manager->rtnl, req, callback, link, 0, NULL);
|
|
|
|
if (r < 0) {
|
|
|
|
address_release(address);
|
2014-11-28 17:34:26 +01:00
|
|
|
return log_error_errno(r, "Could not send rtnetlink message: %m");
|
2015-09-30 14:07:12 +02:00
|
|
|
}
|
2013-10-17 03:18:36 +02:00
|
|
|
|
2014-07-03 09:43:31 +02:00
|
|
|
link_ref(link);
|
|
|
|
|
2015-09-30 14:01:44 +02:00
|
|
|
r = address_add(link, address->family, &address->in_addr, address->prefixlen, NULL);
|
|
|
|
if (r < 0) {
|
|
|
|
address_release(address);
|
|
|
|
return log_error_errno(r, "Could not add address: %m");
|
|
|
|
}
|
|
|
|
|
2013-10-17 03:18:36 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-08-11 22:44:51 +02:00
|
|
|
int config_parse_broadcast(
|
|
|
|
const char *unit,
|
2014-01-28 20:01:37 +01:00
|
|
|
const char *filename,
|
|
|
|
unsigned line,
|
|
|
|
const char *section,
|
|
|
|
unsigned section_line,
|
|
|
|
const char *lvalue,
|
|
|
|
int ltype,
|
|
|
|
const char *rvalue,
|
|
|
|
void *data,
|
|
|
|
void *userdata) {
|
2014-08-11 22:44:51 +02:00
|
|
|
|
2014-01-28 20:01:37 +01:00
|
|
|
Network *network = userdata;
|
|
|
|
_cleanup_address_free_ Address *n = NULL;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(filename);
|
|
|
|
assert(section);
|
|
|
|
assert(lvalue);
|
|
|
|
assert(rvalue);
|
|
|
|
assert(data);
|
|
|
|
|
2017-02-15 05:30:35 +01:00
|
|
|
r = address_new_static(network, filename, section_line, &n);
|
2014-01-28 20:01:37 +01:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
2014-02-18 15:48:30 +01:00
|
|
|
if (n->family == AF_INET6) {
|
2015-09-30 18:22:42 +02:00
|
|
|
log_syntax(unit, LOG_ERR, filename, line, 0, "Broadcast is not valid for IPv6 addresses, ignoring assignment: %s", rvalue);
|
2014-02-18 15:48:30 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-08-11 22:44:51 +02:00
|
|
|
r = in_addr_from_string(AF_INET, rvalue, (union in_addr_union*) &n->broadcast);
|
2014-01-28 20:01:37 +01:00
|
|
|
if (r < 0) {
|
2015-09-30 18:22:42 +02:00
|
|
|
log_syntax(unit, LOG_ERR, filename, line, r, "Broadcast is invalid, ignoring assignment: %s", rvalue);
|
2014-01-28 20:01:37 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-08-11 22:44:51 +02:00
|
|
|
n->family = AF_INET;
|
2014-01-28 20:01:37 +01:00
|
|
|
n = NULL;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-10-17 03:18:36 +02:00
|
|
|
int config_parse_address(const char *unit,
|
|
|
|
const char *filename,
|
|
|
|
unsigned line,
|
|
|
|
const char *section,
|
2013-11-19 16:17:55 +01:00
|
|
|
unsigned section_line,
|
2013-10-17 03:18:36 +02:00
|
|
|
const char *lvalue,
|
|
|
|
int ltype,
|
|
|
|
const char *rvalue,
|
|
|
|
void *data,
|
|
|
|
void *userdata) {
|
2014-08-11 22:44:51 +02:00
|
|
|
|
2013-11-19 16:54:42 +01:00
|
|
|
Network *network = userdata;
|
2013-10-17 03:18:36 +02:00
|
|
|
_cleanup_address_free_ Address *n = NULL;
|
2014-08-11 22:44:51 +02:00
|
|
|
const char *address, *e;
|
|
|
|
union in_addr_union buffer;
|
|
|
|
int r, f;
|
2013-10-17 03:18:36 +02:00
|
|
|
|
|
|
|
assert(filename);
|
2013-11-19 16:54:42 +01:00
|
|
|
assert(section);
|
2013-10-17 03:18:36 +02:00
|
|
|
assert(lvalue);
|
|
|
|
assert(rvalue);
|
|
|
|
assert(data);
|
|
|
|
|
2013-11-28 17:17:04 +01:00
|
|
|
if (streq(section, "Network")) {
|
|
|
|
/* we are not in an Address section, so treat
|
|
|
|
* this as the special '0' section */
|
2017-02-15 05:30:35 +01:00
|
|
|
r = address_new_static(network, NULL, 0, &n);
|
|
|
|
} else
|
|
|
|
r = address_new_static(network, filename, section_line, &n);
|
2013-11-28 17:17:04 +01:00
|
|
|
|
2013-10-17 03:18:36 +02:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
/* Address=address/prefixlen */
|
|
|
|
|
|
|
|
/* prefixlen */
|
|
|
|
e = strchr(rvalue, '/');
|
|
|
|
if (e) {
|
|
|
|
unsigned i;
|
2015-09-30 18:22:42 +02:00
|
|
|
|
2013-10-17 03:18:36 +02:00
|
|
|
r = safe_atou(e + 1, &i);
|
|
|
|
if (r < 0) {
|
2015-09-30 18:22:42 +02:00
|
|
|
log_syntax(unit, LOG_ERR, filename, line, r, "Prefix length is invalid, ignoring assignment: %s", e + 1);
|
2013-10-17 03:18:36 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
n->prefixlen = (unsigned char) i;
|
2013-11-17 21:01:20 +01:00
|
|
|
|
2014-08-11 22:44:51 +02:00
|
|
|
address = strndupa(rvalue, e - rvalue);
|
|
|
|
} else
|
|
|
|
address = rvalue;
|
2013-10-17 03:18:36 +02:00
|
|
|
|
2014-08-11 22:44:51 +02:00
|
|
|
r = in_addr_from_string_auto(address, &f, &buffer);
|
2013-10-17 03:18:36 +02:00
|
|
|
if (r < 0) {
|
2015-09-30 18:22:42 +02:00
|
|
|
log_syntax(unit, LOG_ERR, filename, line, r, "Address is invalid, ignoring assignment: %s", address);
|
2013-10-17 03:18:36 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-10-27 17:39:18 +01:00
|
|
|
if (!e && f == AF_INET) {
|
|
|
|
r = in_addr_default_prefixlen(&buffer.in, &n->prefixlen);
|
|
|
|
if (r < 0) {
|
2015-09-30 18:22:42 +02:00
|
|
|
log_syntax(unit, LOG_ERR, filename, line, r, "Prefix length not specified, and a default one can not be deduced for '%s', ignoring assignment", address);
|
2014-10-27 17:39:18 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-08-11 22:44:51 +02:00
|
|
|
if (n->family != AF_UNSPEC && f != n->family) {
|
2015-09-30 18:22:42 +02:00
|
|
|
log_syntax(unit, LOG_ERR, filename, line, 0, "Address is incompatible, ignoring assignment: %s", address);
|
2014-08-11 22:44:51 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
n->family = f;
|
|
|
|
|
|
|
|
if (streq(lvalue, "Address"))
|
|
|
|
n->in_addr = buffer;
|
|
|
|
else
|
|
|
|
n->in_addr_peer = buffer;
|
|
|
|
|
|
|
|
if (n->family == AF_INET && n->broadcast.s_addr == 0)
|
|
|
|
n->broadcast.s_addr = n->in_addr.in.s_addr | htonl(0xfffffffflu >> n->prefixlen);
|
2014-01-28 20:01:37 +01:00
|
|
|
|
2013-10-17 03:18:36 +02:00
|
|
|
n = NULL;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2013-11-19 16:54:42 +01:00
|
|
|
|
2016-05-06 21:20:59 +02:00
|
|
|
int config_parse_label(
|
|
|
|
const char *unit,
|
2013-11-19 16:54:42 +01:00
|
|
|
const char *filename,
|
|
|
|
unsigned line,
|
|
|
|
const char *section,
|
|
|
|
unsigned section_line,
|
|
|
|
const char *lvalue,
|
|
|
|
int ltype,
|
|
|
|
const char *rvalue,
|
|
|
|
void *data,
|
|
|
|
void *userdata) {
|
2016-05-06 21:20:59 +02:00
|
|
|
|
2013-11-19 16:54:42 +01:00
|
|
|
_cleanup_address_free_ Address *n = NULL;
|
2016-05-06 21:20:59 +02:00
|
|
|
Network *network = userdata;
|
2013-11-19 16:54:42 +01:00
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(filename);
|
|
|
|
assert(section);
|
|
|
|
assert(lvalue);
|
|
|
|
assert(rvalue);
|
|
|
|
assert(data);
|
|
|
|
|
2017-02-15 05:30:35 +01:00
|
|
|
r = address_new_static(network, filename, section_line, &n);
|
2013-11-19 16:54:42 +01:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
2017-02-28 12:24:33 +01:00
|
|
|
if (!address_label_valid(rvalue)) {
|
|
|
|
log_syntax(unit, LOG_ERR, filename, line, 0, "Interface label is too long or invalid, ignoring assignment: %s", rvalue);
|
2013-11-19 16:54:42 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-05-06 21:20:59 +02:00
|
|
|
r = free_and_strdup(&n->label, rvalue);
|
|
|
|
if (r < 0)
|
|
|
|
return log_oom();
|
2013-11-19 16:54:42 +01:00
|
|
|
|
|
|
|
n = NULL;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2015-09-28 13:30:10 +02:00
|
|
|
|
2016-05-03 21:54:26 +02:00
|
|
|
int config_parse_lifetime(const char *unit,
|
|
|
|
const char *filename,
|
|
|
|
unsigned line,
|
|
|
|
const char *section,
|
|
|
|
unsigned section_line,
|
|
|
|
const char *lvalue,
|
|
|
|
int ltype,
|
|
|
|
const char *rvalue,
|
|
|
|
void *data,
|
|
|
|
void *userdata) {
|
|
|
|
Network *network = userdata;
|
|
|
|
_cleanup_address_free_ Address *n = NULL;
|
|
|
|
unsigned k;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(filename);
|
|
|
|
assert(section);
|
|
|
|
assert(lvalue);
|
|
|
|
assert(rvalue);
|
|
|
|
assert(data);
|
|
|
|
|
2017-02-15 05:30:35 +01:00
|
|
|
r = address_new_static(network, filename, section_line, &n);
|
2016-05-03 21:54:26 +02:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
if (STR_IN_SET(rvalue, "forever", "infinity")) {
|
|
|
|
n->cinfo.ifa_prefered = CACHE_INFO_INFINITY_LIFE_TIME;
|
|
|
|
n = NULL;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
r = safe_atou(rvalue, &k);
|
|
|
|
if (r < 0) {
|
|
|
|
log_syntax(unit, LOG_ERR, filename, line, r, "Failed to parse PreferredLifetime, ignoring: %s", rvalue);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (k != 0)
|
|
|
|
log_syntax(unit, LOG_ERR, filename, line, 0, "Invalid PreferredLifetime value, ignoring: %d", k);
|
|
|
|
else {
|
|
|
|
n->cinfo.ifa_prefered = k;
|
|
|
|
n = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-10-08 13:05:41 +02:00
|
|
|
int config_parse_address_flags(const char *unit,
|
|
|
|
const char *filename,
|
|
|
|
unsigned line,
|
|
|
|
const char *section,
|
|
|
|
unsigned section_line,
|
|
|
|
const char *lvalue,
|
|
|
|
int ltype,
|
|
|
|
const char *rvalue,
|
|
|
|
void *data,
|
|
|
|
void *userdata) {
|
|
|
|
Network *network = userdata;
|
|
|
|
_cleanup_address_free_ Address *n = NULL;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(filename);
|
|
|
|
assert(section);
|
|
|
|
assert(lvalue);
|
|
|
|
assert(rvalue);
|
|
|
|
assert(data);
|
|
|
|
|
2017-02-15 05:30:35 +01:00
|
|
|
r = address_new_static(network, filename, section_line, &n);
|
2016-10-08 13:05:41 +02:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
r = parse_boolean(rvalue);
|
|
|
|
if (r < 0) {
|
|
|
|
log_syntax(unit, LOG_ERR, filename, line, r, "Failed to parse address flag, ignoring: %s", rvalue);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (streq(lvalue, "HomeAddress"))
|
|
|
|
n->home_address = r;
|
|
|
|
else if (streq(lvalue, "DuplicateAddressDetection"))
|
|
|
|
n->duplicate_address_detection = r;
|
|
|
|
else if (streq(lvalue, "ManageTemporaryAddress"))
|
|
|
|
n->manage_temporary_address = r;
|
|
|
|
else if (streq(lvalue, "PrefixRoute"))
|
|
|
|
n->prefix_route = r;
|
|
|
|
else if (streq(lvalue, "AutoJoin"))
|
|
|
|
n->autojoin = r;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-09-28 13:30:10 +02:00
|
|
|
bool address_is_ready(const Address *a) {
|
|
|
|
assert(a);
|
|
|
|
|
2015-11-10 13:52:34 +01:00
|
|
|
return !(a->flags & (IFA_F_TENTATIVE | IFA_F_DEPRECATED));
|
2015-09-28 13:30:10 +02:00
|
|
|
}
|
2017-05-12 15:48:28 +02:00
|
|
|
|
2017-05-12 15:48:30 +02:00
|
|
|
int config_parse_router_preference(const char *unit,
|
|
|
|
const char *filename,
|
|
|
|
unsigned line,
|
|
|
|
const char *section,
|
|
|
|
unsigned section_line,
|
|
|
|
const char *lvalue,
|
|
|
|
int ltype,
|
|
|
|
const char *rvalue,
|
|
|
|
void *data,
|
|
|
|
void *userdata) {
|
|
|
|
Network *network = userdata;
|
|
|
|
|
|
|
|
assert(filename);
|
|
|
|
assert(section);
|
|
|
|
assert(lvalue);
|
|
|
|
assert(rvalue);
|
|
|
|
assert(data);
|
|
|
|
|
|
|
|
if (streq(rvalue, "high"))
|
|
|
|
network->router_preference = SD_NDISC_PREFERENCE_HIGH;
|
|
|
|
else if (STR_IN_SET(rvalue, "medium", "normal", "default"))
|
|
|
|
network->router_preference = SD_NDISC_PREFERENCE_MEDIUM;
|
|
|
|
else if (streq(rvalue, "low"))
|
|
|
|
network->router_preference = SD_NDISC_PREFERENCE_LOW;
|
|
|
|
else
|
|
|
|
log_syntax(unit, LOG_ERR, filename, line, -EINVAL, "Router preference '%s' is invalid, ignoring assignment: %m", rvalue);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-05-12 15:48:28 +02:00
|
|
|
void prefix_free(Prefix *prefix) {
|
|
|
|
if (!prefix)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (prefix->network) {
|
|
|
|
LIST_REMOVE(prefixes, prefix->network->static_prefixes, prefix);
|
|
|
|
assert(prefix->network->n_static_prefixes > 0);
|
|
|
|
prefix->network->n_static_prefixes--;
|
|
|
|
|
|
|
|
if (prefix->section)
|
|
|
|
hashmap_remove(prefix->network->prefixes_by_section,
|
|
|
|
prefix->section);
|
|
|
|
}
|
|
|
|
|
2017-05-12 15:48:29 +02:00
|
|
|
prefix->radv_prefix = sd_radv_prefix_unref(prefix->radv_prefix);
|
|
|
|
|
2017-05-12 15:48:28 +02:00
|
|
|
free(prefix);
|
|
|
|
}
|
|
|
|
|
|
|
|
int prefix_new(Prefix **ret) {
|
|
|
|
Prefix *prefix = NULL;
|
|
|
|
|
|
|
|
prefix = new0(Prefix, 1);
|
|
|
|
if (!prefix)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2017-05-12 15:48:29 +02:00
|
|
|
if (sd_radv_prefix_new(&prefix->radv_prefix) < 0)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2017-05-12 15:48:28 +02:00
|
|
|
*ret = prefix;
|
|
|
|
prefix = NULL;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int prefix_new_static(Network *network, const char *filename,
|
|
|
|
unsigned section_line, Prefix **ret) {
|
|
|
|
_cleanup_network_config_section_free_ NetworkConfigSection *n = NULL;
|
|
|
|
_cleanup_prefix_free_ Prefix *prefix = NULL;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(network);
|
|
|
|
assert(ret);
|
|
|
|
assert(!!filename == (section_line > 0));
|
|
|
|
|
|
|
|
if (filename) {
|
|
|
|
r = network_config_section_new(filename, section_line, &n);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
if (section_line) {
|
|
|
|
prefix = hashmap_get(network->prefixes_by_section, n);
|
|
|
|
if (prefix) {
|
|
|
|
*ret = prefix;
|
|
|
|
prefix = NULL;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
r = prefix_new(&prefix);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
if (filename) {
|
|
|
|
prefix->section = n;
|
|
|
|
n = NULL;
|
|
|
|
|
|
|
|
r = hashmap_put(network->prefixes_by_section, prefix->section,
|
|
|
|
prefix);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
prefix->network = network;
|
|
|
|
LIST_APPEND(prefixes, network->static_prefixes, prefix);
|
|
|
|
network->n_static_prefixes++;
|
|
|
|
|
|
|
|
*ret = prefix;
|
|
|
|
prefix = NULL;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2017-05-12 15:48:29 +02:00
|
|
|
|
|
|
|
int config_parse_prefix(const char *unit,
|
|
|
|
const char *filename,
|
|
|
|
unsigned line,
|
|
|
|
const char *section,
|
|
|
|
unsigned section_line,
|
|
|
|
const char *lvalue,
|
|
|
|
int ltype,
|
|
|
|
const char *rvalue,
|
|
|
|
void *data,
|
|
|
|
void *userdata) {
|
|
|
|
|
|
|
|
Network *network = userdata;
|
|
|
|
_cleanup_prefix_free_ Prefix *p = NULL;
|
|
|
|
uint8_t prefixlen = 64;
|
|
|
|
union in_addr_union in6addr;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(filename);
|
|
|
|
assert(section);
|
|
|
|
assert(lvalue);
|
|
|
|
assert(rvalue);
|
|
|
|
assert(data);
|
|
|
|
|
|
|
|
r = prefix_new_static(network, filename, section_line, &p);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
r = in_addr_prefix_from_string(rvalue, AF_INET6, &in6addr, &prefixlen);
|
|
|
|
if (r < 0) {
|
|
|
|
log_syntax(unit, LOG_ERR, filename, line, r, "Prefix is invalid, ignoring assignment: %s", rvalue);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sd_radv_prefix_set_prefix(p->radv_prefix, &in6addr.in6, prefixlen) < 0)
|
|
|
|
return -EADDRNOTAVAIL;
|
|
|
|
|
|
|
|
log_syntax(unit, LOG_INFO, filename, line, r, "Found prefix %s", rvalue);
|
|
|
|
|
|
|
|
p = NULL;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int config_parse_prefix_flags(const char *unit,
|
|
|
|
const char *filename,
|
|
|
|
unsigned line,
|
|
|
|
const char *section,
|
|
|
|
unsigned section_line,
|
|
|
|
const char *lvalue,
|
|
|
|
int ltype,
|
|
|
|
const char *rvalue,
|
|
|
|
void *data,
|
|
|
|
void *userdata) {
|
|
|
|
Network *network = userdata;
|
|
|
|
_cleanup_prefix_free_ Prefix *p = NULL;
|
|
|
|
int r, val;
|
|
|
|
|
|
|
|
assert(filename);
|
|
|
|
assert(section);
|
|
|
|
assert(lvalue);
|
|
|
|
assert(rvalue);
|
|
|
|
assert(data);
|
|
|
|
|
|
|
|
r = prefix_new_static(network, filename, section_line, &p);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
r = parse_boolean(rvalue);
|
|
|
|
if (r < 0) {
|
|
|
|
log_syntax(unit, LOG_ERR, filename, line, r, "Failed to parse address flag, ignoring: %s", rvalue);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
val = r;
|
|
|
|
|
|
|
|
if (streq(lvalue, "OnLink"))
|
|
|
|
r = sd_radv_prefix_set_onlink(p->radv_prefix, val);
|
|
|
|
else if (streq(lvalue, "AddressAutoconfiguration"))
|
|
|
|
r = sd_radv_prefix_set_address_autoconfiguration(p->radv_prefix, val);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
p = NULL;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int config_parse_prefix_lifetime(const char *unit,
|
|
|
|
const char *filename,
|
|
|
|
unsigned line,
|
|
|
|
const char *section,
|
|
|
|
unsigned section_line,
|
|
|
|
const char *lvalue,
|
|
|
|
int ltype,
|
|
|
|
const char *rvalue,
|
|
|
|
void *data,
|
|
|
|
void *userdata) {
|
|
|
|
Network *network = userdata;
|
|
|
|
_cleanup_prefix_free_ Prefix *p = NULL;
|
|
|
|
usec_t usec;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(filename);
|
|
|
|
assert(section);
|
|
|
|
assert(lvalue);
|
|
|
|
assert(rvalue);
|
|
|
|
assert(data);
|
|
|
|
|
|
|
|
r = prefix_new_static(network, filename, section_line, &p);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
r = parse_sec(rvalue, &usec);
|
|
|
|
if (r < 0) {
|
|
|
|
log_syntax(unit, LOG_ERR, filename, line, r, "Lifetime is invalid, ignoring assignment: %s", rvalue);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-06-16 08:07:13 +02:00
|
|
|
/* a value of 0xffffffff represents infinity */
|
2017-05-12 15:48:29 +02:00
|
|
|
if (streq(lvalue, "PreferredLifetimeSec"))
|
|
|
|
r = sd_radv_prefix_set_preferred_lifetime(p->radv_prefix,
|
2017-06-16 08:09:35 +02:00
|
|
|
DIV_ROUND_UP(usec, USEC_PER_SEC));
|
2017-05-12 15:48:29 +02:00
|
|
|
else if (streq(lvalue, "ValidLifetimeSec"))
|
|
|
|
r = sd_radv_prefix_set_valid_lifetime(p->radv_prefix,
|
2017-06-16 08:09:35 +02:00
|
|
|
DIV_ROUND_UP(usec, USEC_PER_SEC));
|
2017-05-12 15:48:29 +02:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
p = NULL;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
};
|