Merge pull request #13382 from keszybz/network-ipv6-enable
Network ipv6 enable
This commit is contained in:
commit
6c431a16c3
|
@ -568,11 +568,6 @@ int address_configure(
|
||||||
assert(link->manager->rtnl);
|
assert(link->manager->rtnl);
|
||||||
assert(callback);
|
assert(callback);
|
||||||
|
|
||||||
if (address->family == AF_INET6 && link_sysctl_ipv6_enabled(link) == 0) {
|
|
||||||
log_link_warning(link, "An IPv6 address is requested, but IPv6 is disabled by sysctl, ignoring.");
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* If this is a new address, then refuse adding more than the limit */
|
/* If this is a new address, then refuse adding more than the limit */
|
||||||
if (address_get(link, address->family, &address->in_addr, address->prefixlen, NULL) <= 0 &&
|
if (address_get(link, address->family, &address->in_addr, address->prefixlen, NULL) <= 0 &&
|
||||||
set_size(link->addresses) >= ADDRESSES_PER_LINK_MAX)
|
set_size(link->addresses) >= ADDRESSES_PER_LINK_MAX)
|
||||||
|
|
|
@ -123,11 +123,6 @@ int fdb_entry_configure(Link *link, FdbEntry *fdb_entry) {
|
||||||
assert(link->manager);
|
assert(link->manager);
|
||||||
assert(fdb_entry);
|
assert(fdb_entry);
|
||||||
|
|
||||||
if (fdb_entry->family == AF_INET6 && link_sysctl_ipv6_enabled(link) == 0) {
|
|
||||||
log_link_warning(link, "An IPv6 fdb entry is requested, but IPv6 is disabled by sysctl, ignoring.");
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* create new RTM message */
|
/* create new RTM message */
|
||||||
r = sd_rtnl_message_new_neigh(link->manager->rtnl, &req, RTM_NEWNEIGH, link->ifindex, PF_BRIDGE);
|
r = sd_rtnl_message_new_neigh(link->manager->rtnl, &req, RTM_NEWNEIGH, link->ifindex, PF_BRIDGE);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
|
|
|
@ -69,27 +69,6 @@ DUID* link_get_duid(Link *link) {
|
||||||
return &link->manager->duid;
|
return &link->manager->duid;
|
||||||
}
|
}
|
||||||
|
|
||||||
int link_sysctl_ipv6_enabled(Link *link) {
|
|
||||||
_cleanup_free_ char *value = NULL;
|
|
||||||
int r;
|
|
||||||
|
|
||||||
assert(link);
|
|
||||||
assert(link->ifname);
|
|
||||||
|
|
||||||
if (link->sysctl_ipv6_enabled >= 0)
|
|
||||||
return link->sysctl_ipv6_enabled;
|
|
||||||
|
|
||||||
const char *ifname = link->ifname; /* work around bogus gcc warning */
|
|
||||||
r = sysctl_read_ip_property(AF_INET6, ifname, "disable_ipv6", &value);
|
|
||||||
if (r < 0)
|
|
||||||
return log_link_warning_errno(link, r,
|
|
||||||
"Failed to read net.ipv6.conf.%s.disable_ipv6 sysctl property: %m",
|
|
||||||
ifname);
|
|
||||||
|
|
||||||
link->sysctl_ipv6_enabled = value[0] == '0';
|
|
||||||
return link->sysctl_ipv6_enabled;
|
|
||||||
}
|
|
||||||
|
|
||||||
static bool link_dhcp6_enabled(Link *link) {
|
static bool link_dhcp6_enabled(Link *link) {
|
||||||
assert(link);
|
assert(link);
|
||||||
|
|
||||||
|
@ -108,9 +87,6 @@ static bool link_dhcp6_enabled(Link *link) {
|
||||||
if (link->iftype == ARPHRD_CAN)
|
if (link->iftype == ARPHRD_CAN)
|
||||||
return false;
|
return false;
|
||||||
|
|
||||||
if (link_sysctl_ipv6_enabled(link) == 0)
|
|
||||||
return false;
|
|
||||||
|
|
||||||
return link->network->dhcp & ADDRESS_FAMILY_IPV6;
|
return link->network->dhcp & ADDRESS_FAMILY_IPV6;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -199,9 +175,6 @@ static bool link_ipv6ll_enabled(Link *link) {
|
||||||
if (link->network->bond)
|
if (link->network->bond)
|
||||||
return false;
|
return false;
|
||||||
|
|
||||||
if (link_sysctl_ipv6_enabled(link) == 0)
|
|
||||||
return false;
|
|
||||||
|
|
||||||
return link->network->link_local & ADDRESS_FAMILY_IPV6;
|
return link->network->link_local & ADDRESS_FAMILY_IPV6;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -214,9 +187,6 @@ static bool link_ipv6_enabled(Link *link) {
|
||||||
if (link->network->bond)
|
if (link->network->bond)
|
||||||
return false;
|
return false;
|
||||||
|
|
||||||
if (link_sysctl_ipv6_enabled(link) == 0)
|
|
||||||
return false;
|
|
||||||
|
|
||||||
if (link->iftype == ARPHRD_CAN)
|
if (link->iftype == ARPHRD_CAN)
|
||||||
return false;
|
return false;
|
||||||
|
|
||||||
|
@ -263,9 +233,6 @@ static bool link_ipv6_forward_enabled(Link *link) {
|
||||||
if (link->network->ip_forward == _ADDRESS_FAMILY_INVALID)
|
if (link->network->ip_forward == _ADDRESS_FAMILY_INVALID)
|
||||||
return false;
|
return false;
|
||||||
|
|
||||||
if (link_sysctl_ipv6_enabled(link) == 0)
|
|
||||||
return false;
|
|
||||||
|
|
||||||
return link->network->ip_forward & ADDRESS_FAMILY_IPV6;
|
return link->network->ip_forward & ADDRESS_FAMILY_IPV6;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -329,20 +296,21 @@ static IPv6PrivacyExtensions link_ipv6_privacy_extensions(Link *link) {
|
||||||
return link->network->ipv6_privacy_extensions;
|
return link->network->ipv6_privacy_extensions;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int link_enable_ipv6(Link *link) {
|
static int link_update_ipv6_sysctl(Link *link) {
|
||||||
bool disabled;
|
bool enabled;
|
||||||
int r;
|
int r;
|
||||||
|
|
||||||
if (link->flags & IFF_LOOPBACK)
|
if (link->flags & IFF_LOOPBACK)
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
disabled = !link_ipv6_enabled(link);
|
enabled = link_ipv6_enabled(link);
|
||||||
|
if (enabled) {
|
||||||
|
r = sysctl_write_ip_property_boolean(AF_INET6, link->ifname, "disable_ipv6", false);
|
||||||
|
if (r < 0)
|
||||||
|
return log_link_warning_errno(link, r, "Cannot enable IPv6: %m");
|
||||||
|
|
||||||
r = sysctl_write_ip_property_boolean(AF_INET6, link->ifname, "disable_ipv6", disabled);
|
log_link_info(link, "IPv6 successfully enabled");
|
||||||
if (r < 0)
|
}
|
||||||
log_link_warning_errno(link, r, "Cannot %s IPv6: %m", enable_disable(!disabled));
|
|
||||||
else
|
|
||||||
log_link_info(link, "IPv6 successfully %sd", enable_disable(!disabled));
|
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
@ -614,7 +582,6 @@ static int link_new(Manager *manager, sd_netlink_message *message, Link **ret) {
|
||||||
.state = LINK_STATE_PENDING,
|
.state = LINK_STATE_PENDING,
|
||||||
.ifindex = ifindex,
|
.ifindex = ifindex,
|
||||||
.iftype = iftype,
|
.iftype = iftype,
|
||||||
.sysctl_ipv6_enabled = -1,
|
|
||||||
|
|
||||||
.n_dns = (unsigned) -1,
|
.n_dns = (unsigned) -1,
|
||||||
.dns_default_route = -1,
|
.dns_default_route = -1,
|
||||||
|
@ -1281,10 +1248,6 @@ int link_set_mtu(Link *link, uint32_t mtu) {
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return log_link_error_errno(link, r, "Could not allocate RTM_SETLINK message: %m");
|
return log_link_error_errno(link, r, "Could not allocate RTM_SETLINK message: %m");
|
||||||
|
|
||||||
/* If IPv6 not configured (no static IPv6 address and IPv6LL autoconfiguration is disabled)
|
|
||||||
* for this interface, then disable IPv6 else enable it. */
|
|
||||||
(void) link_enable_ipv6(link);
|
|
||||||
|
|
||||||
/* IPv6 protocol requires a minimum MTU of IPV6_MTU_MIN(1280) bytes
|
/* IPv6 protocol requires a minimum MTU of IPV6_MTU_MIN(1280) bytes
|
||||||
* on the interface. Bump up MTU bytes to IPV6_MTU_MIN. */
|
* on the interface. Bump up MTU bytes to IPV6_MTU_MIN. */
|
||||||
if (link_ipv6_enabled(link) && mtu < IPV6_MIN_MTU) {
|
if (link_ipv6_enabled(link) && mtu < IPV6_MIN_MTU) {
|
||||||
|
@ -2554,6 +2517,10 @@ static int link_configure(Link *link) {
|
||||||
return r;
|
return r;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* If IPv6 configured that is static IPv6 address and IPv6LL autoconfiguration is enabled
|
||||||
|
* for this interface, then enable IPv6 */
|
||||||
|
(void) link_update_ipv6_sysctl(link);
|
||||||
|
|
||||||
r = link_set_proxy_arp(link);
|
r = link_set_proxy_arp(link);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return r;
|
return r;
|
||||||
|
|
|
@ -133,7 +133,6 @@ typedef struct Link {
|
||||||
struct rtnl_link_stats64 stats_old, stats_new;
|
struct rtnl_link_stats64 stats_old, stats_new;
|
||||||
bool stats_updated;
|
bool stats_updated;
|
||||||
|
|
||||||
int sysctl_ipv6_enabled;
|
|
||||||
|
|
||||||
/* All kinds of DNS configuration */
|
/* All kinds of DNS configuration */
|
||||||
struct in_addr_data *dns;
|
struct in_addr_data *dns;
|
||||||
|
@ -200,8 +199,6 @@ uint32_t link_get_dhcp_route_table(Link *link);
|
||||||
uint32_t link_get_ipv6_accept_ra_route_table(Link *link);
|
uint32_t link_get_ipv6_accept_ra_route_table(Link *link);
|
||||||
int link_request_set_routes(Link *link);
|
int link_request_set_routes(Link *link);
|
||||||
|
|
||||||
int link_sysctl_ipv6_enabled(Link *link);
|
|
||||||
|
|
||||||
#define ADDRESS_FMT_VAL(address) \
|
#define ADDRESS_FMT_VAL(address) \
|
||||||
be32toh((address).s_addr) >> 24, \
|
be32toh((address).s_addr) >> 24, \
|
||||||
(be32toh((address).s_addr) >> 16) & 0xFFu, \
|
(be32toh((address).s_addr) >> 16) & 0xFFu, \
|
||||||
|
|
|
@ -636,11 +636,6 @@ int route_configure(
|
||||||
assert(IN_SET(route->family, AF_INET, AF_INET6));
|
assert(IN_SET(route->family, AF_INET, AF_INET6));
|
||||||
assert(callback);
|
assert(callback);
|
||||||
|
|
||||||
if (route->family == AF_INET6 && link_sysctl_ipv6_enabled(link) == 0) {
|
|
||||||
log_link_warning(link, "An IPv6 route is requested, but IPv6 is disabled by sysctl, ignoring.");
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (route_get(link, route->family, &route->dst, route->dst_prefixlen, &route->gw, route->tos, route->priority, route->table, NULL) <= 0 &&
|
if (route_get(link, route->family, &route->dst, route->dst_prefixlen, &route->gw, route->tos, route->priority, route->table, NULL) <= 0 &&
|
||||||
set_size(link->routes) >= routes_max())
|
set_size(link->routes) >= routes_max())
|
||||||
return log_link_error_errno(link, SYNTHETIC_ERRNO(E2BIG),
|
return log_link_error_errno(link, SYNTHETIC_ERRNO(E2BIG),
|
||||||
|
|
|
@ -453,11 +453,6 @@ int routing_policy_rule_configure(RoutingPolicyRule *rule, Link *link, link_netl
|
||||||
assert(link->manager);
|
assert(link->manager);
|
||||||
assert(link->manager->rtnl);
|
assert(link->manager->rtnl);
|
||||||
|
|
||||||
if (rule->family == AF_INET6 && link_sysctl_ipv6_enabled(link) == 0) {
|
|
||||||
log_link_warning(link, "An IPv6 routing policy rule is requested, but IPv6 is disabled by sysctl, ignoring.");
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
r = sd_rtnl_message_new_routing_policy_rule(link->manager->rtnl, &m, RTM_NEWRULE, rule->family);
|
r = sd_rtnl_message_new_routing_policy_rule(link->manager->rtnl, &m, RTM_NEWRULE, rule->family);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return log_error_errno(r, "Could not allocate RTM_NEWRULE message: %m");
|
return log_error_errno(r, "Could not allocate RTM_NEWRULE message: %m");
|
||||||
|
|
|
@ -1842,13 +1842,14 @@ class NetworkdNetworkTests(unittest.TestCase, Utilities):
|
||||||
self.assertRegex(output, 'inet 10.2.3.4/16 brd 10.2.255.255 scope global dummy98')
|
self.assertRegex(output, 'inet 10.2.3.4/16 brd 10.2.255.255 scope global dummy98')
|
||||||
output = check_output('ip -6 address show dummy98')
|
output = check_output('ip -6 address show dummy98')
|
||||||
print(output)
|
print(output)
|
||||||
self.assertEqual(output, '')
|
self.assertRegex(output, 'inet6 2607:5300:203:3906::/64 scope global')
|
||||||
|
self.assertRegex(output, 'inet6 .* scope link')
|
||||||
output = check_output('ip -4 route show dev dummy98')
|
output = check_output('ip -4 route show dev dummy98')
|
||||||
print(output)
|
print(output)
|
||||||
self.assertEqual(output, '10.2.0.0/16 proto kernel scope link src 10.2.3.4')
|
self.assertEqual(output, '10.2.0.0/16 proto kernel scope link src 10.2.3.4')
|
||||||
output = check_output('ip -6 route show dev dummy98')
|
output = check_output('ip -6 route show dev dummy98')
|
||||||
print(output)
|
print(output)
|
||||||
self.assertEqual(output, '')
|
self.assertRegex(output, 'default via 2607:5300:203:39ff:ff:ff:ff:ff proto static')
|
||||||
|
|
||||||
check_output('ip link del dummy98')
|
check_output('ip link del dummy98')
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue