2 * netifd - network interface daemon
3 * Copyright (C) 2012 Felix Fietkau <nbd@openwrt.org>
4 * Copyright (C) 2012 Steven Barth <steven@midlink.org>
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2
8 * as published by the Free Software Foundation
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
22 #include <arpa/inet.h>
23 #include <netinet/in.h>
27 #include "interface.h"
28 #include "interface-ip.h"
50 static const struct blobmsg_policy route_attr
[__ROUTE_MAX
] = {
51 [ROUTE_INTERFACE
] = { .name
= "interface", .type
= BLOBMSG_TYPE_STRING
},
52 [ROUTE_TARGET
] = { .name
= "target", .type
= BLOBMSG_TYPE_STRING
},
53 [ROUTE_MASK
] = { .name
= "netmask", .type
= BLOBMSG_TYPE_STRING
},
54 [ROUTE_GATEWAY
] = { .name
= "gateway", .type
= BLOBMSG_TYPE_STRING
},
55 [ROUTE_METRIC
] = { .name
= "metric", .type
= BLOBMSG_TYPE_INT32
},
56 [ROUTE_MTU
] = { .name
= "mtu", .type
= BLOBMSG_TYPE_INT32
},
57 [ROUTE_TABLE
] = { .name
= "table", .type
= BLOBMSG_TYPE_STRING
},
58 [ROUTE_VALID
] = { .name
= "valid", .type
= BLOBMSG_TYPE_INT32
},
59 [ROUTE_SOURCE
] = { .name
= "source", .type
= BLOBMSG_TYPE_STRING
},
60 [ROUTE_ONLINK
] = { .name
= "onlink", .type
= BLOBMSG_TYPE_BOOL
},
61 [ROUTE_TYPE
] = { .name
= "type", .type
= BLOBMSG_TYPE_STRING
},
62 [ROUTE_PROTO
] = { .name
= "proto", .type
= BLOBMSG_TYPE_STRING
},
63 [ROUTE_DISABLED
] = { .name
= "disabled", .type
= BLOBMSG_TYPE_BOOL
},
66 const struct uci_blob_param_list route_attr_list
= {
67 .n_params
= __ROUTE_MAX
,
80 static const struct blobmsg_policy neighbor_attr
[__NEIGHBOR_MAX
]={
81 [NEIGHBOR_INTERFACE
]= { .name
= "interface", .type
= BLOBMSG_TYPE_STRING
},
82 [NEIGHBOR_ADDRESS
]= { .name
= "ipaddr", .type
= BLOBMSG_TYPE_STRING
},
83 [NEIGHBOR_MAC
]= { .name
= "mac", .type
= BLOBMSG_TYPE_STRING
},
84 [NEIGHBOR_PROXY
]= { .name
= "proxy", .type
= BLOBMSG_TYPE_BOOL
},
85 [NEIGHBOR_ROUTER
]= {.name
= "router", .type
= BLOBMSG_TYPE_BOOL
},
88 const struct uci_blob_param_list neighbor_attr_list
= {
89 .n_params
= __NEIGHBOR_MAX
,
90 .params
= neighbor_attr
,
94 struct list_head prefixes
= LIST_HEAD_INIT(prefixes
);
95 static struct device_prefix
*ula_prefix
= NULL
;
96 static struct uloop_timeout valid_until_timeout
;
100 clear_if_addr(union if_addr
*a
, int mask
)
102 size_t m_bytes
= (mask
+ 7) / 8;
103 uint8_t m_clear
= (1 << (m_bytes
* 8 - mask
)) - 1;
104 uint8_t *p
= (uint8_t *) a
;
106 if (m_bytes
< sizeof(*a
))
107 memset(p
+ m_bytes
, 0, sizeof(*a
) - m_bytes
);
109 p
[m_bytes
- 1] &= ~m_clear
;
113 match_if_addr(union if_addr
*a1
, union if_addr
*a2
, int mask
)
115 union if_addr
*p1
, *p2
;
117 p1
= alloca(sizeof(*a1
));
118 p2
= alloca(sizeof(*a2
));
120 memcpy(p1
, a1
, sizeof(*a1
));
121 clear_if_addr(p1
, mask
);
122 memcpy(p2
, a2
, sizeof(*a2
));
123 clear_if_addr(p2
, mask
);
125 return !memcmp(p1
, p2
, sizeof(*p1
));
128 static int set_ip_source_policy(bool add
, bool v6
, unsigned int priority
,
129 const union if_addr
*addr
, uint8_t mask
, unsigned int table
,
130 struct interface
*in_iface
, const char *action
, bool src
)
132 struct iprule rule
= {
133 .flags
= IPRULE_PRIORITY
,
139 rule
.flags
|= IPRULE_SRC
;
140 rule
.src_addr
= *addr
;
141 rule
.src_mask
= mask
;
143 rule
.flags
|= IPRULE_DEST
;
144 rule
.dest_addr
= *addr
;
145 rule
.dest_mask
= mask
;
150 rule
.flags
|= IPRULE_LOOKUP
;
156 rule
.flags
|= IPRULE_ACTION
;
157 system_resolve_iprule_action(action
, &rule
.action
);
160 if (in_iface
&& in_iface
->l3_dev
.dev
) {
161 rule
.flags
|= IPRULE_IN
;
162 strcpy(rule
.in_dev
, in_iface
->l3_dev
.dev
->ifname
);
165 rule
.flags
|= (v6
) ? IPRULE_INET6
: IPRULE_INET4
;
167 return (add
) ? system_add_iprule(&rule
) : system_del_iprule(&rule
);
170 static int set_ip_lo_policy(bool add
, bool v6
, struct interface
*iface
)
172 struct iprule rule
= {
173 .flags
= IPRULE_IN
| IPRULE_LOOKUP
| IPRULE_PRIORITY
,
174 .priority
= IPRULE_PRIORITY_NW
+ iface
->l3_dev
.dev
->ifindex
,
175 .lookup
= (v6
) ? iface
->ip6table
: iface
->ip4table
,
182 rule
.flags
|= (v6
) ? IPRULE_INET6
: IPRULE_INET4
;
184 return (add
) ? system_add_iprule(&rule
) : system_del_iprule(&rule
);
188 __find_ip_addr_target(struct interface_ip_settings
*ip
, union if_addr
*a
, bool v6
)
190 struct device_addr
*addr
;
192 vlist_for_each_element(&ip
->addr
, addr
, node
) {
196 if (v6
!= ((addr
->flags
& DEVADDR_FAMILY
) == DEVADDR_INET6
))
199 if (((addr
->flags
& DEVADDR_FAMILY
) == DEVADDR_INET4
) &&
200 addr
->point_to_point
&& a
->in
.s_addr
== addr
->point_to_point
)
203 /* Handle offlink addresses correctly */
204 unsigned int mask
= addr
->mask
;
205 if ((addr
->flags
& DEVADDR_FAMILY
) == DEVADDR_INET6
&&
206 (addr
->flags
& DEVADDR_OFFLINK
))
209 if (!match_if_addr(&addr
->addr
, a
, mask
))
219 __find_ip_route_target(struct interface_ip_settings
*ip
, union if_addr
*a
,
220 bool v6
, struct device_route
**res
)
222 struct device_route
*route
;
224 vlist_for_each_element(&ip
->route
, route
, node
) {
228 if (v6
!= ((route
->flags
& DEVADDR_FAMILY
) == DEVADDR_INET6
))
231 if (!match_if_addr(&route
->addr
, a
, route
->mask
))
234 if (route
->flags
& DEVROUTE_TABLE
)
237 if (!*res
|| route
->mask
> (*res
)->mask
||
238 ((route
->mask
== (*res
)->mask
) && (route
->flags
& DEVROUTE_METRIC
)
239 && (route
->metric
< (*res
)->metric
)))
245 interface_ip_find_addr_target(struct interface
*iface
, union if_addr
*a
, bool v6
)
247 return __find_ip_addr_target(&iface
->proto_ip
, a
, v6
) ||
248 __find_ip_addr_target(&iface
->config_ip
, a
, v6
);
252 interface_ip_find_route_target(struct interface
*iface
, union if_addr
*a
,
253 bool v6
, struct device_route
**route
)
255 __find_ip_route_target(&iface
->proto_ip
, a
, v6
, route
);
256 __find_ip_route_target(&iface
->config_ip
, a
, v6
, route
);
260 interface_ip_add_target_route(union if_addr
*addr
, bool v6
, struct interface
*iface
,
263 struct device_route
*route
, *r_next
= NULL
;
264 bool defaultroute_target
= false;
265 union if_addr addr_zero
;
266 int addrsize
= v6
? sizeof(addr
->in6
) : sizeof(addr
->in
);
267 struct interface
*exclude_iface
= NULL
;
270 exclude_iface
= iface
;
274 memset(&addr_zero
, 0, sizeof(addr_zero
));
275 if (memcmp(&addr_zero
, addr
, addrsize
) == 0)
276 defaultroute_target
= true;
279 /* look for locally addressable target first */
280 if (interface_ip_find_addr_target(iface
, addr
, v6
))
283 /* do not stop at the first route, let the lookup compare
284 * masks to find the best match */
285 interface_ip_find_route_target(iface
, addr
, v6
, &r_next
);
287 vlist_for_each_element(&interfaces
, iface
, node
) {
288 if (iface
== exclude_iface
)
291 /* look for locally addressable target first */
292 if (interface_ip_find_addr_target(iface
, addr
, v6
))
295 /* do not stop at the first route, let the lookup compare
296 * masks to find the best match */
297 interface_ip_find_route_target(iface
, addr
, v6
, &r_next
);
304 iface
= r_next
->iface
;
305 if (defaultroute_target
)
308 route
= calloc(1, sizeof(*route
));
312 route
->flags
= v6
? DEVADDR_INET6
: DEVADDR_INET4
;
313 route
->mask
= v6
? 128 : 32;
314 memcpy(&route
->addr
, addr
, addrsize
);
315 memcpy(&route
->nexthop
, &r_next
->nexthop
, sizeof(route
->nexthop
));
316 route
->mtu
= r_next
->mtu
;
317 route
->metric
= r_next
->metric
;
318 route
->table
= r_next
->table
;
319 route
->iface
= iface
;
320 vlist_add(&iface
->host_routes
, &route
->node
, route
);
326 interface_set_route_info(struct interface
*iface
, struct device_route
*route
)
328 bool v6
= ((route
->flags
& DEVADDR_FAMILY
) == DEVADDR_INET6
);
333 if (!(route
->flags
& DEVROUTE_METRIC
))
334 route
->metric
= iface
->metric
;
336 if (!(route
->flags
& DEVROUTE_TABLE
)) {
337 route
->table
= (v6
) ? iface
->ip6table
: iface
->ip4table
;
339 route
->flags
|= DEVROUTE_SRCTABLE
;
344 interface_ip_add_neighbor(struct interface
*iface
, struct blob_attr
*attr
, bool v6
)
346 struct interface_ip_settings
*ip
;
347 struct blob_attr
*tb
[__NEIGHBOR_MAX
], *cur
;
348 struct device_neighbor
*neighbor
;
349 int af
= v6
? AF_INET6
: AF_INET
;
350 struct ether_addr
*ea
;
352 blobmsg_parse(neighbor_attr
, __NEIGHBOR_MAX
, tb
, blobmsg_data(attr
), blobmsg_data_len(attr
));
355 if ((cur
= tb
[NEIGHBOR_INTERFACE
]) == NULL
)
358 iface
= vlist_find(&interfaces
, blobmsg_data(cur
), iface
, node
);
363 ip
= &iface
->config_ip
;
365 ip
= &iface
->proto_ip
;
367 neighbor
= calloc(1,sizeof(*neighbor
));
371 neighbor
->flags
= v6
? DEVADDR_INET6
: DEVADDR_INET4
;
373 if ((cur
= tb
[NEIGHBOR_ADDRESS
]) != NULL
){
374 if (!inet_pton(af
, blobmsg_data(cur
), &neighbor
->addr
))
379 if ((cur
= tb
[NEIGHBOR_MAC
]) != NULL
) {
380 neighbor
->flags
|= DEVNEIGH_MAC
;
381 ea
= ether_aton(blobmsg_data(cur
));
385 memcpy(neighbor
->macaddr
, ea
, 6);
388 if ((cur
= tb
[NEIGHBOR_PROXY
]) != NULL
)
389 neighbor
->proxy
= blobmsg_get_bool(cur
);
391 if ((cur
= tb
[NEIGHBOR_ROUTER
]) != NULL
)
392 neighbor
->router
= blobmsg_get_bool(cur
);
394 vlist_add(&ip
->neighbor
, &neighbor
->node
, neighbor
);
402 interface_ip_add_route(struct interface
*iface
, struct blob_attr
*attr
, bool v6
)
404 struct interface_ip_settings
*ip
;
405 struct blob_attr
*tb
[__ROUTE_MAX
], *cur
;
406 struct device_route
*route
;
407 int af
= v6
? AF_INET6
: AF_INET
;
408 bool no_device
= false;
410 blobmsg_parse(route_attr
, __ROUTE_MAX
, tb
, blobmsg_data(attr
), blobmsg_data_len(attr
));
412 if ((cur
= tb
[ROUTE_DISABLED
]) != NULL
&& blobmsg_get_bool(cur
))
416 if ((cur
= tb
[ROUTE_INTERFACE
]) == NULL
) {
417 iface
= vlist_find(&interfaces
, "loopback", iface
, node
);
420 iface
= vlist_find(&interfaces
, blobmsg_data(cur
), iface
, node
);
426 ip
= &iface
->config_ip
;
428 ip
= &iface
->proto_ip
;
431 route
= calloc(1, sizeof(*route
));
435 route
->flags
= v6
? DEVADDR_INET6
: DEVADDR_INET4
;
436 route
->mask
= v6
? 128 : 32;
437 if ((cur
= tb
[ROUTE_MASK
]) != NULL
) {
438 route
->mask
= parse_netmask_string(blobmsg_data(cur
), v6
);
439 if (route
->mask
> (v6
? 128 : 32))
443 if ((cur
= tb
[ROUTE_TARGET
]) != NULL
) {
444 if (!parse_ip_and_netmask(af
, blobmsg_data(cur
), &route
->addr
, &route
->mask
)) {
445 D(INTERFACE
, "Failed to parse route target: %s", (char *) blobmsg_data(cur
));
449 /* Mask out IPv4 host bits to avoid "Invalid prefix for given prefix length" */
450 if (af
== AF_INET
&& route
->mask
< 32)
451 clear_if_addr(&route
->addr
, route
->mask
);
454 if ((cur
= tb
[ROUTE_GATEWAY
]) != NULL
) {
455 if (!inet_pton(af
, blobmsg_data(cur
), &route
->nexthop
)) {
456 D(INTERFACE
, "Failed to parse route gateway: %s", (char *) blobmsg_data(cur
));
461 if ((cur
= tb
[ROUTE_METRIC
]) != NULL
) {
462 route
->metric
= blobmsg_get_u32(cur
);
463 route
->flags
|= DEVROUTE_METRIC
;
466 if ((cur
= tb
[ROUTE_MTU
]) != NULL
) {
467 route
->mtu
= blobmsg_get_u32(cur
);
468 route
->flags
|= DEVROUTE_MTU
;
471 /* Use source-based routing */
472 if ((cur
= tb
[ROUTE_SOURCE
]) != NULL
) {
473 char *saveptr
, *source
= alloca(blobmsg_data_len(cur
));
474 memcpy(source
, blobmsg_data(cur
), blobmsg_data_len(cur
));
476 const char *addr
= strtok_r(source
, "/", &saveptr
);
477 const char *mask
= strtok_r(NULL
, "/", &saveptr
);
479 if (!addr
|| inet_pton(af
, addr
, &route
->source
) < 1) {
480 D(INTERFACE
, "Failed to parse route source: %s", addr
? addr
: "NULL");
484 route
->sourcemask
= (mask
) ? atoi(mask
) : ((af
== AF_INET6
) ? 128 : 32);
487 if ((cur
= tb
[ROUTE_ONLINK
]) != NULL
&& blobmsg_get_bool(cur
))
488 route
->flags
|= DEVROUTE_ONLINK
;
490 if ((cur
= tb
[ROUTE_TABLE
]) != NULL
) {
491 if (!system_resolve_rt_table(blobmsg_data(cur
), &route
->table
)) {
492 D(INTERFACE
, "Failed to resolve routing table: %s", (char *) blobmsg_data(cur
));
496 /* only set the table flag if not using the main (default) table */
497 if (system_is_default_rt_table(route
->table
))
501 route
->flags
|= DEVROUTE_TABLE
;
504 if ((cur
= tb
[ROUTE_VALID
]) != NULL
) {
505 int64_t valid
= blobmsg_get_u32(cur
);
506 int64_t valid_until
= valid
+ (int64_t)system_get_rtime();
507 if (valid_until
<= LONG_MAX
&& valid
!= 0xffffffffLL
) /* Catch overflow */
508 route
->valid_until
= valid_until
;
511 if ((cur
= tb
[ROUTE_TYPE
]) != NULL
) {
512 if (!system_resolve_rt_type(blobmsg_data(cur
), &route
->type
)) {
513 D(INTERFACE
, "Failed to resolve routing type: %s", (char *) blobmsg_data(cur
));
516 route
->flags
|= DEVROUTE_TYPE
;
519 if ((cur
= tb
[ROUTE_PROTO
]) != NULL
) {
520 if (!system_resolve_rt_proto(blobmsg_data(cur
), &route
->proto
)) {
521 D(INTERFACE
, "Failed to resolve proto type: %s", (char *) blobmsg_data(cur
));
524 route
->flags
|= DEVROUTE_PROTO
;
528 route
->flags
|= DEVROUTE_NODEV
;
530 interface_set_route_info(iface
, route
);
532 vlist_add(&ip
->route
, &route
->node
, route
);
540 addr_cmp(const void *k1
, const void *k2
, void *ptr
)
542 const struct device_addr
*a1
= k1
;
543 const struct device_addr
*a2
= k2
;
544 const int cmp_offset
= offsetof(struct device_addr
, flags
);
545 const int cmp_size
= sizeof(struct device_addr
) - cmp_offset
;
547 if (a1
->index
!= a2
->index
)
548 return a1
->index
- a2
->index
;
549 return memcmp(k1
+cmp_offset
, k2
+cmp_offset
, cmp_size
);
553 neighbor_cmp(const void *k1
, const void *k2
, void *ptr
)
555 const struct device_neighbor
*n1
= k1
, *n2
= k2
;
557 return memcmp(&n1
->addr
, &n2
->addr
, sizeof(n2
->addr
));
561 route_cmp(const void *k1
, const void *k2
, void *ptr
)
563 const struct device_route
*r1
= k1
, *r2
= k2
;
565 if (r1
->mask
!= r2
->mask
)
566 return r2
->mask
- r1
->mask
;
568 if (r1
->metric
!= r2
->metric
)
569 return r1
->metric
- r2
->metric
;
571 if (r1
->flags
!= r2
->flags
)
572 return r2
->flags
- r1
->flags
;
574 if (r1
->sourcemask
!= r2
->sourcemask
)
575 return r1
->sourcemask
- r2
->sourcemask
;
577 if (r1
->table
!= r2
->table
)
578 return r1
->table
- r2
->table
;
580 int maskcmp
= memcmp(&r1
->source
, &r2
->source
, sizeof(r1
->source
));
584 return memcmp(&r1
->addr
, &r2
->addr
, sizeof(r1
->addr
));
588 prefix_cmp(const void *k1
, const void *k2
, void *ptr
)
590 return memcmp(k1
, k2
, offsetof(struct device_prefix
, pclass
) -
591 offsetof(struct device_prefix
, addr
));
595 interface_handle_subnet_route(struct interface
*iface
, struct device_addr
*addr
, bool add
)
597 struct device
*dev
= iface
->l3_dev
.dev
;
598 struct device_route
*r
= &addr
->subnet
;
600 if (addr
->flags
& DEVADDR_OFFLINK
)
604 if (!addr
->subnet
.iface
)
607 system_del_route(dev
, r
);
608 memset(r
, 0, sizeof(*r
));
613 r
->flags
= addr
->flags
;
614 r
->mask
= addr
->mask
;
615 memcpy(&r
->addr
, &addr
->addr
, sizeof(r
->addr
));
616 clear_if_addr(&r
->addr
, r
->mask
);
618 if (!system_resolve_rt_proto("kernel", &r
->proto
))
621 r
->flags
|= DEVROUTE_PROTO
;
622 system_del_route(dev
, r
);
624 r
->flags
&= ~DEVROUTE_PROTO
;
625 interface_set_route_info(iface
, r
);
627 system_add_route(dev
, r
);
631 interface_add_addr_rules(struct device_addr
*addr
, bool enabled
)
633 bool v6
= (addr
->flags
& DEVADDR_FAMILY
) == DEVADDR_INET6
;
635 set_ip_source_policy(enabled
, v6
, IPRULE_PRIORITY_ADDR
, &addr
->addr
,
636 (v6
) ? 128 : 32, addr
->policy_table
, NULL
, NULL
,
638 set_ip_source_policy(enabled
, v6
, IPRULE_PRIORITY_ADDR_MASK
,
639 &addr
->addr
, addr
->mask
, addr
->policy_table
, NULL
,
644 interface_update_proto_addr(struct vlist_tree
*tree
,
645 struct vlist_node
*node_new
,
646 struct vlist_node
*node_old
)
648 struct interface_ip_settings
*ip
;
649 struct interface
*iface
;
651 struct device_addr
*a_new
= NULL
, *a_old
= NULL
;
652 bool replace
= false;
656 ip
= container_of(tree
, struct interface_ip_settings
, addr
);
658 dev
= iface
->l3_dev
.dev
;
660 if (!node_new
|| !node_old
)
661 iface
->updated
|= IUF_ADDRESS
;
664 a_new
= container_of(node_new
, struct device_addr
, node
);
666 if ((a_new
->flags
& DEVADDR_FAMILY
) == DEVADDR_INET4
&&
669 /* /31 and /32 addressing need 255.255.255.255
670 * as broadcast address. */
671 if (a_new
->mask
>= 31) {
672 a_new
->broadcast
= (uint32_t) ~0;
675 uint32_t *a
= (uint32_t *) &a_new
->addr
;
677 mask
>>= a_new
->mask
;
678 a_new
->broadcast
= *a
| htonl(mask
);
684 a_old
= container_of(node_old
, struct device_addr
, node
);
686 if (a_new
&& a_old
) {
689 if (a_old
->flags
!= a_new
->flags
|| a_old
->failed
)
692 if (a_old
->valid_until
!= a_new
->valid_until
||
693 a_old
->preferred_until
!= a_new
->preferred_until
)
696 if (((a_new
->flags
& DEVADDR_FAMILY
) == DEVADDR_INET4
) &&
697 (a_new
->broadcast
!= a_old
->broadcast
||
698 a_new
->point_to_point
!= a_old
->point_to_point
))
703 if (a_old
->enabled
&& !keep
) {
705 * This is needed for source routing to work correctly. If a device
706 * has two connections to a network using the same subnet, adding
707 * only the network-rule will cause packets to be routed through the
708 * first matching network (source IP matches both masks)
710 if (a_old
->policy_table
)
711 interface_add_addr_rules(a_old
, false);
713 if (!(a_old
->flags
& DEVADDR_EXTERNAL
)) {
714 interface_handle_subnet_route(iface
, a_old
, false);
715 system_del_address(dev
, a_old
);
717 if ((a_old
->flags
& DEVADDR_OFFLINK
) && (a_old
->mask
< (v6
? 128 : 32))) {
718 struct device_route route
;
720 memset(&route
, 0, sizeof(route
));
721 route
.flags
= v6
? DEVADDR_INET6
: DEVADDR_INET4
;
722 route
.metric
= INT32_MAX
;
723 route
.mask
= a_old
->mask
;
724 route
.addr
= a_old
->addr
;
726 clear_if_addr(&route
.addr
, route
.mask
);
728 /* Delete null-route */
729 system_del_route(NULL
, &route
);
739 a_new
->enabled
= true;
741 if ((a_new
->flags
& DEVADDR_FAMILY
) == DEVADDR_INET6
)
744 a_new
->policy_table
= (v6
) ? iface
->ip6table
: iface
->ip4table
;
746 if (!keep
|| replace
) {
747 if (!(a_new
->flags
& DEVADDR_EXTERNAL
)) {
748 if (system_add_address(dev
, a_new
))
749 a_new
->failed
= true;
751 if (iface
->metric
|| a_new
->policy_table
)
752 interface_handle_subnet_route(iface
, a_new
, true);
756 if (!(a_new
->flags
& DEVADDR_EXTERNAL
) &&
757 (a_new
->flags
& DEVADDR_OFFLINK
) &&
758 (a_new
->mask
< (v6
? 128 : 32))) {
759 struct device_route route
;
761 memset(&route
, 0, sizeof(route
));
762 route
.flags
= v6
? DEVADDR_INET6
: DEVADDR_INET4
;
763 route
.metric
= INT32_MAX
;
764 route
.mask
= a_new
->mask
;
765 route
.addr
= a_new
->addr
;
767 clear_if_addr(&route
.addr
, route
.mask
);
770 * In case off link is specifed as address property
771 * add null-route to avoid routing loops
773 system_add_route(NULL
, &route
);
776 if (a_new
->policy_table
)
777 interface_add_addr_rules(a_new
, true);
784 enable_route(struct interface_ip_settings
*ip
, struct device_route
*route
)
786 if (ip
->no_defaultroute
&& !route
->mask
)
793 interface_update_proto_neighbor(struct vlist_tree
*tree
,
794 struct vlist_node
* node_new
,
795 struct vlist_node
*node_old
)
798 struct device_neighbor
*neighbor_old
, *neighbor_new
;
799 struct interface_ip_settings
*ip
;
802 ip
= container_of(tree
, struct interface_ip_settings
, neighbor
);
803 dev
= ip
->iface
->l3_dev
.dev
;
805 neighbor_old
= container_of(node_old
, struct device_neighbor
, node
);
806 neighbor_new
= container_of(node_new
, struct device_neighbor
, node
);
808 if (node_old
&& node_new
) {
809 keep
= (!memcmp(neighbor_old
->macaddr
, neighbor_new
->macaddr
, sizeof(neighbor_old
->macaddr
)) &&
810 (neighbor_old
->proxy
== neighbor_new
->proxy
) &&
811 (neighbor_old
->router
== neighbor_new
->router
));
815 if (!keep
&& neighbor_old
->enabled
)
816 system_del_neighbor(dev
, neighbor_old
);
822 if (!keep
&& ip
->enabled
)
823 if (system_add_neighbor(dev
, neighbor_new
))
824 neighbor_new
->failed
= true;
826 neighbor_new
->enabled
= ip
->enabled
;
831 __interface_update_route(struct interface_ip_settings
*ip
,
832 struct vlist_node
*node_new
,
833 struct vlist_node
*node_old
)
835 struct interface
*iface
= ip
->iface
;
837 struct device_route
*route_old
, *route_new
;
840 dev
= iface
->l3_dev
.dev
;
842 if (!node_new
|| !node_old
)
843 iface
->updated
|= IUF_ROUTE
;
845 route_old
= container_of(node_old
, struct device_route
, node
);
846 route_new
= container_of(node_new
, struct device_route
, node
);
848 if (node_old
&& node_new
)
849 keep
= !memcmp(&route_old
->nexthop
, &route_new
->nexthop
, sizeof(route_old
->nexthop
)) &&
850 (route_old
->mtu
== route_new
->mtu
) && (route_old
->type
== route_new
->type
) &&
851 (route_old
->proto
== route_new
->proto
) && !route_old
->failed
;
854 if (!(route_old
->flags
& DEVADDR_EXTERNAL
) && route_old
->enabled
&& !keep
)
855 system_del_route(dev
, route_old
);
861 bool _enabled
= enable_route(ip
, route_new
);
863 if (!(route_new
->flags
& DEVADDR_EXTERNAL
) && !keep
&& _enabled
)
864 if (system_add_route(dev
, route_new
))
865 route_new
->failed
= true;
867 route_new
->iface
= iface
;
868 route_new
->enabled
= _enabled
;
873 interface_update_proto_route(struct vlist_tree
*tree
,
874 struct vlist_node
*node_new
,
875 struct vlist_node
*node_old
)
877 struct interface_ip_settings
*ip
;
879 ip
= container_of(tree
, struct interface_ip_settings
, route
);
880 __interface_update_route(ip
, node_new
, node_old
);
884 interface_update_host_route(struct vlist_tree
*tree
,
885 struct vlist_node
*node_new
,
886 struct vlist_node
*node_old
)
888 struct interface
*iface
;
890 iface
= container_of(tree
, struct interface
, host_routes
);
891 __interface_update_route(&iface
->proto_ip
, node_new
, node_old
);
895 random_ifaceid(struct in6_addr
*addr
)
897 static bool initialized
= false;
902 gettimeofday(&t
, NULL
);
903 seed
= t
.tv_sec
^ t
.tv_usec
^ getpid();
907 addr
->s6_addr32
[2] = (uint32_t)mrand48();
908 addr
->s6_addr32
[3] = (uint32_t)mrand48();
912 eui64_ifaceid(struct interface
*iface
, struct in6_addr
*addr
)
914 struct device_settings st
;
916 device_merge_settings(iface
->l3_dev
.dev
, &st
);
918 if (!(st
.flags
& DEV_OPT_MACADDR
))
921 /* get mac address */
922 uint8_t *ifaceid
= addr
->s6_addr
+ 8;
923 memcpy(ifaceid
, st
.macaddr
, 3);
924 memcpy(ifaceid
+ 5, st
.macaddr
+ 3, 3);
933 generate_ifaceid(struct interface
*iface
, struct in6_addr
*addr
)
937 /* generate new iface id */
938 switch (iface
->assignment_iface_id_selection
) {
941 /* copy host part from assignment_fixed_iface_id */
942 memcpy(addr
->s6_addr
+ 8, iface
->assignment_fixed_iface_id
.s6_addr
+ 8, 8);
945 /* randomize last 64 bits */
946 random_ifaceid(addr
);
950 ret
= eui64_ifaceid(iface
, addr
);
960 interface_set_prefix_address(struct device_prefix_assignment
*assignment
,
961 const struct device_prefix
*prefix
, struct interface
*iface
, bool add
)
963 const struct interface
*uplink
= prefix
->iface
;
964 if (!iface
->l3_dev
.dev
)
967 struct device
*l3_downlink
= iface
->l3_dev
.dev
;
969 struct device_addr addr
;
970 struct device_route route
;
971 memset(&addr
, 0, sizeof(addr
));
972 memset(&route
, 0, sizeof(route
));
974 addr
.addr
.in6
= assignment
->addr
;
975 addr
.mask
= assignment
->length
;
976 addr
.flags
= DEVADDR_INET6
;
977 addr
.preferred_until
= prefix
->preferred_until
;
978 addr
.valid_until
= prefix
->valid_until
;
980 route
.flags
= DEVADDR_INET6
;
981 route
.mask
= addr
.mask
< 64 ? 64 : addr
.mask
;
982 route
.addr
= addr
.addr
;
984 if (!add
&& assignment
->enabled
) {
985 time_t now
= system_get_rtime();
987 if (addr
.valid_until
&& addr
.valid_until
- 1 <= now
) {
988 addr
.valid_until
= 0;
989 addr
.preferred_until
= 0;
991 /* Address is still valid; pass its ownership to kernel (see L-14 RFC 7084). */
992 addr
.preferred_until
= now
;
994 if (!addr
.valid_until
|| addr
.valid_until
> now
+ 7200)
995 addr
.valid_until
= now
+ 7200;
999 set_ip_source_policy(false, true, IPRULE_PRIORITY_ADDR_MASK
, &addr
.addr
,
1000 addr
.mask
< 64 ? 64 : addr
.mask
, iface
->ip6table
, NULL
, NULL
, false);
1002 if (prefix
->iface
) {
1003 if (prefix
->iface
->ip6table
)
1004 set_ip_source_policy(false, true, IPRULE_PRIORITY_NW
, &addr
.addr
,
1005 addr
.mask
, prefix
->iface
->ip6table
, iface
, NULL
, true);
1007 set_ip_source_policy(false, true, IPRULE_PRIORITY_REJECT
, &addr
.addr
,
1008 addr
.mask
, 0, iface
, "unreachable", true);
1011 clear_if_addr(&route
.addr
, route
.mask
);
1012 interface_set_route_info(iface
, &route
);
1014 system_del_route(l3_downlink
, &route
);
1015 if (addr
.valid_until
)
1016 system_add_address(l3_downlink
, &addr
);
1018 system_del_address(l3_downlink
, &addr
);
1020 assignment
->addr
= in6addr_any
;
1021 assignment
->enabled
= false;
1022 } else if (add
&& (iface
->state
== IFS_UP
|| iface
->state
== IFS_SETUP
)) {
1023 if (IN6_IS_ADDR_UNSPECIFIED(&addr
.addr
.in6
)) {
1024 addr
.addr
.in6
= prefix
->addr
;
1025 addr
.addr
.in6
.s6_addr32
[1] |= htonl(assignment
->assigned
);
1026 if (!generate_ifaceid(iface
, &addr
.addr
.in6
))
1029 assignment
->addr
= addr
.addr
.in6
;
1030 route
.addr
= addr
.addr
;
1033 addr
.flags
|= DEVADDR_OFFLINK
;
1034 if (system_add_address(l3_downlink
, &addr
))
1037 if (!assignment
->enabled
) {
1038 if (iface
->ip6table
)
1039 set_ip_source_policy(true, true, IPRULE_PRIORITY_ADDR_MASK
, &addr
.addr
,
1040 addr
.mask
< 64 ? 64 : addr
.mask
, iface
->ip6table
, NULL
, NULL
, false);
1042 if (prefix
->iface
) {
1043 set_ip_source_policy(true, true, IPRULE_PRIORITY_REJECT
, &addr
.addr
,
1044 addr
.mask
, 0, iface
, "unreachable", true);
1046 if (prefix
->iface
->ip6table
)
1047 set_ip_source_policy(true, true, IPRULE_PRIORITY_NW
, &addr
.addr
,
1048 addr
.mask
, prefix
->iface
->ip6table
, iface
, NULL
, true);
1052 clear_if_addr(&route
.addr
, route
.mask
);
1053 interface_set_route_info(iface
, &route
);
1055 system_add_route(l3_downlink
, &route
);
1057 if (uplink
&& uplink
->l3_dev
.dev
&& !(l3_downlink
->settings
.flags
& DEV_OPT_MTU6
)) {
1058 int mtu
= system_update_ipv6_mtu(uplink
->l3_dev
.dev
, 0);
1059 int mtu_old
= system_update_ipv6_mtu(l3_downlink
, 0);
1061 if (mtu
> 0 && mtu_old
!= mtu
) {
1062 if (system_update_ipv6_mtu(l3_downlink
, mtu
) < 0 && mtu
< mtu_old
)
1063 netifd_log_message(L_WARNING
, "Failed to set IPv6 mtu to %d "
1064 "on interface '%s'\n", mtu
, iface
->name
);
1068 assignment
->enabled
= true;
1072 static bool interface_prefix_assign(struct list_head
*list
,
1073 struct device_prefix_assignment
*assign
)
1075 int32_t current
= 0, asize
= (1 << (64 - assign
->length
)) - 1;
1076 struct device_prefix_assignment
*c
;
1077 list_for_each_entry(c
, list
, head
) {
1078 if (assign
->assigned
!= -1) {
1079 if (assign
->assigned
>= current
&& assign
->assigned
+ asize
< c
->assigned
) {
1080 list_add_tail(&assign
->head
, &c
->head
);
1083 } else if (assign
->assigned
== -1) {
1084 current
= (current
+ asize
) & (~asize
);
1085 if (current
+ asize
< c
->assigned
) {
1086 assign
->assigned
= current
;
1087 list_add_tail(&assign
->head
, &c
->head
);
1091 current
= (c
->assigned
+ (1 << (64 - c
->length
)));
1097 * Sorting of assignment entries:
1098 * Primary on assignment length: smallest assignment first
1099 * Secondary on assignment weight: highest weight first
1100 * Finally alphabetical order of interface names
1102 static int prefix_assignment_cmp(const void *k1
, const void *k2
, void *ptr
)
1104 const struct device_prefix_assignment
*a1
= k1
, *a2
= k2
;
1106 if (a1
->length
!= a2
->length
)
1107 return a1
->length
- a2
->length
;
1109 if (a1
->weight
!= a2
->weight
)
1110 return a2
->weight
- a1
->weight
;
1112 return strcmp(a1
->name
, a2
->name
);
1115 static void interface_update_prefix_assignments(struct device_prefix
*prefix
, bool setup
)
1117 struct device_prefix_assignment
*c
;
1118 struct interface
*iface
;
1120 /* Delete all assignments */
1121 while (!list_empty(&prefix
->assignments
)) {
1122 c
= list_first_entry(&prefix
->assignments
,
1123 struct device_prefix_assignment
, head
);
1124 if ((iface
= vlist_find(&interfaces
, c
->name
, iface
, node
)))
1125 interface_set_prefix_address(c
, prefix
, iface
, false);
1133 /* End-of-assignment sentinel */
1134 c
= malloc(sizeof(*c
) + 1);
1138 c
->assigned
= 1 << (64 - prefix
->length
);
1141 c
->addr
= in6addr_any
;
1142 list_add(&c
->head
, &prefix
->assignments
);
1144 /* Excluded prefix */
1145 if (prefix
->excl_length
> 0) {
1146 const char name
[] = "!excluded";
1147 c
= malloc(sizeof(*c
) + sizeof(name
));
1149 c
->assigned
= ntohl(prefix
->excl_addr
.s6_addr32
[1]) &
1150 ((1 << (64 - prefix
->length
)) - 1);
1151 c
->length
= prefix
->excl_length
;
1152 c
->addr
= in6addr_any
;
1153 memcpy(c
->name
, name
, sizeof(name
));
1154 list_add(&c
->head
, &prefix
->assignments
);
1158 bool assigned_any
= false;
1160 struct avl_node node
;
1162 struct avl_tree assign_later
;
1164 avl_init(&assign_later
, prefix_assignment_cmp
, false, NULL
);
1166 vlist_for_each_element(&interfaces
, iface
, node
) {
1167 if (iface
->assignment_length
< 48 ||
1168 iface
->assignment_length
> 64)
1171 /* Test whether there is a matching class */
1172 if (!list_empty(&iface
->assignment_classes
)) {
1175 struct interface_assignment_class
*c
;
1176 list_for_each_entry(c
, &iface
->assignment_classes
, head
) {
1177 if (!strcmp(c
->name
, prefix
->pclass
)) {
1187 size_t namelen
= strlen(iface
->name
) + 1;
1188 c
= malloc(sizeof(*c
) + namelen
);
1192 c
->length
= iface
->assignment_length
;
1193 c
->assigned
= iface
->assignment_hint
;
1194 c
->weight
= iface
->assignment_weight
;
1195 c
->addr
= in6addr_any
;
1197 memcpy(c
->name
, iface
->name
, namelen
);
1199 /* First process all custom assignments, put all others in later-list */
1200 if (c
->assigned
== -1 || !interface_prefix_assign(&prefix
->assignments
, c
)) {
1201 if (c
->assigned
!= -1) {
1203 netifd_log_message(L_WARNING
, "Failed to assign requested subprefix "
1204 "of size %hhu for %s, trying other\n", c
->length
, c
->name
);
1207 entry
= calloc(1, sizeof(*entry
));
1213 entry
->node
.key
= c
;
1214 avl_insert(&assign_later
, &entry
->node
);
1217 if (c
->assigned
!= -1)
1218 assigned_any
= true;
1221 /* Then try to assign all other + failed custom assignments */
1222 avl_for_each_element_safe(&assign_later
, entry
, node
, n_entry
) {
1223 bool assigned
= false;
1225 c
= (struct device_prefix_assignment
*)entry
->node
.key
;
1226 avl_delete(&assign_later
, &entry
->node
);
1229 assigned
= interface_prefix_assign(&prefix
->assignments
, c
);
1230 } while (!assigned
&& ++c
->length
<= 64);
1233 netifd_log_message(L_WARNING
, "Failed to assign subprefix "
1234 "of size %hhu for %s\n", c
->length
, c
->name
);
1237 assigned_any
= true;
1242 list_for_each_entry(c
, &prefix
->assignments
, head
)
1243 if ((iface
= vlist_find(&interfaces
, c
->name
, iface
, node
)))
1244 interface_set_prefix_address(c
, prefix
, iface
, true);
1247 netifd_log_message(L_WARNING
, "You have delegated IPv6-prefixes but haven't assigned them "
1248 "to any interface. Did you forget to set option ip6assign on your lan-interfaces?");
1252 void interface_refresh_assignments(bool hint
)
1254 static bool refresh
= false;
1255 if (!hint
&& refresh
) {
1256 struct device_prefix
*p
;
1257 time_t now
= system_get_rtime();
1259 list_for_each_entry(p
, &prefixes
, head
) {
1260 bool valid
= !(p
->valid_until
&& p
->valid_until
- 1 <= now
);
1262 interface_update_prefix_assignments(p
, valid
);
1268 void interface_update_prefix_delegation(struct interface_ip_settings
*ip
)
1270 struct device_prefix
*prefix
;
1271 time_t now
= system_get_rtime();
1273 vlist_for_each_element(&ip
->prefix
, prefix
, node
) {
1274 bool valid
= !(prefix
->valid_until
&& prefix
->valid_until
- 1 <= now
);
1276 interface_update_prefix_assignments(prefix
, !ip
->no_delegation
&& valid
);
1278 if (ip
->no_delegation
) {
1279 if (prefix
->head
.next
)
1280 list_del(&prefix
->head
);
1282 list_add(&prefix
->head
, &prefixes
);
1287 interface_update_prefix(struct vlist_tree
*tree
,
1288 struct vlist_node
*node_new
,
1289 struct vlist_node
*node_old
)
1291 struct device_prefix
*prefix_old
, *prefix_new
;
1292 prefix_old
= container_of(node_old
, struct device_prefix
, node
);
1293 prefix_new
= container_of(node_new
, struct device_prefix
, node
);
1295 struct interface_ip_settings
*ip
= container_of(tree
, struct interface_ip_settings
, prefix
);
1296 if (tree
&& (!node_new
|| !node_old
))
1297 ip
->iface
->updated
|= IUF_PREFIX
;
1299 struct device_route route
;
1300 memset(&route
, 0, sizeof(route
));
1301 route
.flags
= DEVADDR_INET6
;
1302 route
.metric
= INT32_MAX
;
1303 route
.mask
= (node_new
) ? prefix_new
->length
: prefix_old
->length
;
1304 route
.addr
.in6
= (node_new
) ? prefix_new
->addr
: prefix_old
->addr
;
1306 struct device_prefix_assignment
*c
;
1307 struct interface
*iface
;
1308 bool new_valid
= node_new
&& !(prefix_new
->valid_until
&& prefix_new
->valid_until
- 1 <= system_get_rtime());
1310 if (node_old
&& node_new
) {
1311 /* Move assignments and refresh addresses to update valid times */
1312 list_splice(&prefix_old
->assignments
, &prefix_new
->assignments
);
1314 list_for_each_entry(c
, &prefix_new
->assignments
, head
)
1315 if ((iface
= vlist_find(&interfaces
, c
->name
, iface
, node
)))
1316 interface_set_prefix_address(c
, prefix_new
, iface
, new_valid
);
1318 if (prefix_new
->preferred_until
!= prefix_old
->preferred_until
||
1319 prefix_new
->valid_until
!= prefix_old
->valid_until
)
1320 ip
->iface
->updated
|= IUF_PREFIX
;
1321 } else if (node_new
) {
1322 /* Set null-route to avoid routing loops */
1323 system_add_route(NULL
, &route
);
1325 if (!prefix_new
->iface
|| !prefix_new
->iface
->proto_ip
.no_delegation
)
1326 interface_update_prefix_assignments(prefix_new
, new_valid
);
1327 } else if (node_old
) {
1328 /* Remove null-route */
1329 interface_update_prefix_assignments(prefix_old
, false);
1330 system_del_route(NULL
, &route
);
1334 if (prefix_old
->head
.next
)
1335 list_del(&prefix_old
->head
);
1339 if (node_new
&& (!prefix_new
->iface
|| !prefix_new
->iface
->proto_ip
.no_delegation
))
1340 list_add(&prefix_new
->head
, &prefixes
);
1344 struct device_prefix
*
1345 interface_ip_add_device_prefix(struct interface
*iface
, struct in6_addr
*addr
,
1346 uint8_t length
, time_t valid_until
, time_t preferred_until
,
1347 struct in6_addr
*excl_addr
, uint8_t excl_length
, const char *pclass
)
1349 union if_addr a
= { .in6
= *addr
};
1352 pclass
= (iface
) ? iface
->name
: "local";
1354 struct device_prefix
*prefix
= calloc(1, sizeof(*prefix
) + strlen(pclass
) + 1);
1358 clear_if_addr(&a
, length
);
1360 prefix
->length
= length
;
1361 prefix
->addr
= a
.in6
;
1362 prefix
->preferred_until
= preferred_until
;
1363 prefix
->valid_until
= valid_until
;
1364 prefix
->iface
= iface
;
1365 INIT_LIST_HEAD(&prefix
->assignments
);
1368 prefix
->excl_addr
= *excl_addr
;
1369 prefix
->excl_length
= excl_length
;
1372 strcpy(prefix
->pclass
, pclass
);
1375 vlist_add(&iface
->proto_ip
.prefix
, &prefix
->node
, &prefix
->addr
);
1377 interface_update_prefix(NULL
, &prefix
->node
, NULL
);
1383 interface_ip_set_ula_prefix(const char *prefix
)
1385 char buf
[INET6_ADDRSTRLEN
+ 4] = {0}, *saveptr
;
1387 strncpy(buf
, prefix
, sizeof(buf
) - 1);
1388 char *prefixaddr
= strtok_r(buf
, "/", &saveptr
);
1390 struct in6_addr addr
;
1391 if (!prefixaddr
|| inet_pton(AF_INET6
, prefixaddr
, &addr
) < 1) {
1393 interface_update_prefix(NULL
, NULL
, &ula_prefix
->node
);
1400 char *prefixlen
= strtok_r(NULL
, ",", &saveptr
);
1401 if (!prefixlen
|| (length
= atoi(prefixlen
)) < 1 || length
> 64)
1404 if (!ula_prefix
|| !IN6_ARE_ADDR_EQUAL(&addr
, &ula_prefix
->addr
) ||
1405 ula_prefix
->length
!= length
) {
1407 interface_update_prefix(NULL
, NULL
, &ula_prefix
->node
);
1409 ula_prefix
= interface_ip_add_device_prefix(NULL
, &addr
, length
,
1410 0, 0, NULL
, 0, NULL
);
1415 interface_add_dns_server(struct interface_ip_settings
*ip
, const char *str
)
1417 struct dns_server
*s
;
1419 s
= calloc(1, sizeof(*s
));
1424 if (inet_pton(s
->af
, str
, &s
->addr
.in
))
1428 if (inet_pton(s
->af
, str
, &s
->addr
.in
))
1435 D(INTERFACE
, "Add IPv%c DNS server: %s",
1436 s
->af
== AF_INET6
? '6' : '4', str
);
1437 vlist_simple_add(&ip
->dns_servers
, &s
->node
);
1441 interface_add_dns_server_list(struct interface_ip_settings
*ip
, struct blob_attr
*list
)
1443 struct blob_attr
*cur
;
1446 blobmsg_for_each_attr(cur
, list
, rem
) {
1447 if (blobmsg_type(cur
) != BLOBMSG_TYPE_STRING
)
1450 if (!blobmsg_check_attr(cur
, false))
1453 interface_add_dns_server(ip
, blobmsg_data(cur
));
1458 interface_add_dns_search_domain(struct interface_ip_settings
*ip
, const char *str
)
1460 struct dns_search_domain
*s
;
1461 int len
= strlen(str
);
1463 s
= calloc(1, sizeof(*s
) + len
+ 1);
1467 D(INTERFACE
, "Add DNS search domain: %s", str
);
1468 memcpy(s
->name
, str
, len
);
1469 vlist_simple_add(&ip
->dns_search
, &s
->node
);
1473 interface_add_dns_search_list(struct interface_ip_settings
*ip
, struct blob_attr
*list
)
1475 struct blob_attr
*cur
;
1478 blobmsg_for_each_attr(cur
, list
, rem
) {
1479 if (blobmsg_type(cur
) != BLOBMSG_TYPE_STRING
)
1482 if (!blobmsg_check_attr(cur
, false))
1485 interface_add_dns_search_domain(ip
, blobmsg_data(cur
));
1490 write_resolv_conf_entries(FILE *f
, struct interface_ip_settings
*ip
, const char *dev
)
1492 struct dns_server
*s
;
1493 struct dns_search_domain
*d
;
1495 char buf
[INET6_ADDRSTRLEN
];
1497 vlist_simple_for_each_element(&ip
->dns_servers
, s
, node
) {
1498 str
= inet_ntop(s
->af
, &s
->addr
, buf
, sizeof(buf
));
1502 if (s
->af
== AF_INET6
&& IN6_IS_ADDR_LINKLOCAL(&s
->addr
.in6
))
1503 fprintf(f
, "nameserver %s%%%s\n", str
, dev
);
1505 fprintf(f
, "nameserver %s\n", str
);
1508 vlist_simple_for_each_element(&ip
->dns_search
, d
, node
) {
1509 fprintf(f
, "search %s\n", d
->name
);
1513 /* Sorting of interface resolver entries : */
1514 /* Primary on interface dns_metric : lowest metric first */
1515 /* Secondary on interface metric : lowest metric first */
1516 /* Finally alphabetical order of interface names */
1517 static int resolv_conf_iface_cmp(const void *k1
, const void *k2
, void *ptr
)
1519 const struct interface
*iface1
= k1
, *iface2
= k2
;
1521 if (iface1
->dns_metric
!= iface2
->dns_metric
)
1522 return iface1
->dns_metric
- iface2
->dns_metric
;
1524 if (iface1
->metric
!= iface2
->metric
)
1525 return iface1
->metric
- iface2
->metric
;
1527 return strcmp(iface1
->name
, iface2
->name
);
1531 __interface_write_dns_entries(FILE *f
, const char *jail
)
1533 struct interface
*iface
;
1535 struct avl_node node
;
1537 struct avl_tree resolv_conf_iface_entries
;
1539 avl_init(&resolv_conf_iface_entries
, resolv_conf_iface_cmp
, false, NULL
);
1541 vlist_for_each_element(&interfaces
, iface
, node
) {
1542 if (iface
->state
!= IFS_UP
)
1545 if (jail
&& (!iface
->jail
|| strcmp(jail
, iface
->jail
)))
1548 if (vlist_simple_empty(&iface
->proto_ip
.dns_search
) &&
1549 vlist_simple_empty(&iface
->proto_ip
.dns_servers
) &&
1550 vlist_simple_empty(&iface
->config_ip
.dns_search
) &&
1551 vlist_simple_empty(&iface
->config_ip
.dns_servers
))
1554 entry
= calloc(1, sizeof(*entry
));
1558 entry
->node
.key
= iface
;
1559 avl_insert(&resolv_conf_iface_entries
, &entry
->node
);
1562 avl_for_each_element(&resolv_conf_iface_entries
, entry
, node
) {
1563 iface
= (struct interface
*)entry
->node
.key
;
1564 struct device
*dev
= iface
->l3_dev
.dev
;
1566 fprintf(f
, "# Interface %s\n", iface
->name
);
1568 write_resolv_conf_entries(f
, &iface
->config_ip
, dev
->ifname
);
1570 if (!iface
->proto_ip
.no_dns
)
1571 write_resolv_conf_entries(f
, &iface
->proto_ip
, dev
->ifname
);
1574 avl_remove_all_elements(&resolv_conf_iface_entries
, entry
, node
, n_entry
)
1579 interface_write_resolv_conf(const char *jail
)
1581 size_t plen
= (jail
? strlen(jail
) + 1 : 0 ) +
1582 (strlen(resolv_conf
) >= strlen(DEFAULT_RESOLV_CONF
) ?
1583 strlen(resolv_conf
) : strlen(DEFAULT_RESOLV_CONF
) ) + 1;
1584 char *path
= alloca(plen
);
1585 char *dpath
= alloca(plen
);
1586 char *tmppath
= alloca(plen
+ 4);
1588 uint32_t crcold
, crcnew
;
1591 sprintf(path
, "/tmp/resolv.conf-%s.d/resolv.conf.auto", jail
);
1592 strcpy(dpath
, path
);
1593 dpath
= dirname(dpath
);
1596 strcpy(path
, resolv_conf
);
1599 sprintf(tmppath
, "%s.tmp", path
);
1601 f
= fopen(tmppath
, "w+");
1603 D(INTERFACE
, "Failed to open %s for writing", path
);
1607 __interface_write_dns_entries(f
, jail
);
1611 crcnew
= crc32_file(f
);
1614 crcold
= crcnew
+ 1;
1615 f
= fopen(path
, "r");
1617 crcold
= crc32_file(f
);
1621 if (crcold
== crcnew
) {
1623 } else if (rename(tmppath
, path
) < 0) {
1624 D(INTERFACE
, "Failed to replace %s", path
);
1630 interface_ip_set_route_enabled(struct interface_ip_settings
*ip
,
1631 struct device_route
*route
, bool enabled
)
1633 struct device
*dev
= ip
->iface
->l3_dev
.dev
;
1635 if (route
->flags
& DEVADDR_EXTERNAL
)
1638 if (!enable_route(ip
, route
))
1641 if (route
->enabled
== enabled
)
1645 interface_set_route_info(ip
->iface
, route
);
1647 if (system_add_route(dev
, route
))
1648 route
->failed
= true;
1650 system_del_route(dev
, route
);
1652 route
->enabled
= enabled
;
1655 void interface_ip_set_enabled(struct interface_ip_settings
*ip
, bool enabled
)
1657 struct device_addr
*addr
;
1658 struct device_route
*route
;
1659 struct device_neighbor
*neighbor
;
1661 struct interface
*iface
;
1663 ip
->enabled
= enabled
;
1665 dev
= iface
->l3_dev
.dev
;
1669 vlist_for_each_element(&ip
->addr
, addr
, node
) {
1670 bool v6
= ((addr
->flags
& DEVADDR_FAMILY
) == DEVADDR_INET6
) ? true : false;
1672 if (addr
->flags
& DEVADDR_EXTERNAL
)
1675 if (addr
->enabled
== enabled
)
1679 system_add_address(dev
, addr
);
1681 addr
->policy_table
= (v6
) ? iface
->ip6table
: iface
->ip4table
;
1682 if (iface
->metric
|| addr
->policy_table
)
1683 interface_handle_subnet_route(iface
, addr
, true);
1685 if ((addr
->flags
& DEVADDR_OFFLINK
) && (addr
->mask
< (v6
? 128 : 32))) {
1686 struct device_route route
;
1688 memset(&route
, 0, sizeof(route
));
1689 route
.flags
= v6
? DEVADDR_INET6
: DEVADDR_INET4
;
1690 route
.metric
= INT32_MAX
;
1691 route
.mask
= addr
->mask
;
1692 route
.addr
= addr
->addr
;
1694 clear_if_addr(&route
.addr
, route
.mask
);
1697 * In case off link is specifed as address property
1698 * add null-route to avoid routing loops
1700 system_add_route(NULL
, &route
);
1703 if (addr
->policy_table
)
1704 interface_add_addr_rules(addr
, true);
1706 interface_handle_subnet_route(iface
, addr
, false);
1707 system_del_address(dev
, addr
);
1709 if ((addr
->flags
& DEVADDR_OFFLINK
) && (addr
->mask
< (v6
? 128 : 32))) {
1710 struct device_route route
;
1712 memset(&route
, 0, sizeof(route
));
1713 route
.flags
= v6
? DEVADDR_INET6
: DEVADDR_INET4
;
1714 route
.metric
= INT32_MAX
;
1715 route
.mask
= addr
->mask
;
1716 route
.addr
= addr
->addr
;
1718 clear_if_addr(&route
.addr
, route
.mask
);
1720 /* Delete null-route */
1721 system_del_route(NULL
, &route
);
1724 if (addr
->policy_table
)
1725 interface_add_addr_rules(addr
, false);
1727 addr
->enabled
= enabled
;
1730 vlist_for_each_element(&ip
->route
, route
, node
)
1731 interface_ip_set_route_enabled(ip
, route
, enabled
);
1732 if (ip
== &iface
->proto_ip
)
1733 vlist_for_each_element(&iface
->host_routes
, route
, node
)
1734 interface_ip_set_route_enabled(ip
, route
, enabled
);
1736 vlist_for_each_element(&ip
->neighbor
, neighbor
, node
) {
1737 if (neighbor
->enabled
== enabled
)
1741 if(system_add_neighbor(dev
, neighbor
))
1742 neighbor
->failed
= true;
1744 system_del_neighbor(dev
, neighbor
);
1746 neighbor
->enabled
= enabled
;
1749 struct device_prefix
*c
;
1750 struct device_prefix_assignment
*a
;
1751 list_for_each_entry(c
, &prefixes
, head
)
1752 list_for_each_entry(a
, &c
->assignments
, head
)
1753 if (!strcmp(a
->name
, ip
->iface
->name
))
1754 interface_set_prefix_address(a
, c
, ip
->iface
, enabled
);
1756 if (ip
->iface
->policy_rules_set
!= enabled
&&
1757 ip
->iface
->l3_dev
.dev
) {
1758 if (ip
->iface
->l3_dev
.dev
->settings
.ipv6
) {
1759 set_ip_lo_policy(enabled
, true, ip
->iface
);
1760 set_ip_source_policy(enabled
, true, IPRULE_PRIORITY_REJECT
+ ip
->iface
->l3_dev
.dev
->ifindex
,
1761 NULL
, 0, 0, ip
->iface
, "failed_policy", true);
1763 set_ip_lo_policy(enabled
, false, ip
->iface
);
1765 ip
->iface
->policy_rules_set
= enabled
;
1770 interface_ip_update_start(struct interface_ip_settings
*ip
)
1772 if (ip
!= &ip
->iface
->config_ip
) {
1773 vlist_simple_update(&ip
->dns_servers
);
1774 vlist_simple_update(&ip
->dns_search
);
1776 vlist_update(&ip
->route
);
1777 vlist_update(&ip
->addr
);
1778 vlist_update(&ip
->prefix
);
1779 vlist_update(&ip
->neighbor
);
1783 interface_ip_update_complete(struct interface_ip_settings
*ip
)
1785 vlist_simple_flush(&ip
->dns_servers
);
1786 vlist_simple_flush(&ip
->dns_search
);
1787 vlist_flush(&ip
->route
);
1788 vlist_flush(&ip
->addr
);
1789 vlist_flush(&ip
->prefix
);
1790 vlist_flush(&ip
->neighbor
);
1791 interface_write_resolv_conf(ip
->iface
->jail
);
1795 interface_ip_flush(struct interface_ip_settings
*ip
)
1797 if (ip
== &ip
->iface
->proto_ip
)
1798 vlist_flush_all(&ip
->iface
->host_routes
);
1799 vlist_simple_flush_all(&ip
->dns_servers
);
1800 vlist_simple_flush_all(&ip
->dns_search
);
1801 vlist_flush_all(&ip
->route
);
1802 vlist_flush_all(&ip
->addr
);
1803 vlist_flush_all(&ip
->neighbor
);
1804 vlist_flush_all(&ip
->prefix
);
1808 __interface_ip_init(struct interface_ip_settings
*ip
, struct interface
*iface
)
1812 vlist_simple_init(&ip
->dns_search
, struct dns_search_domain
, node
);
1813 vlist_simple_init(&ip
->dns_servers
, struct dns_server
, node
);
1814 vlist_init(&ip
->route
, route_cmp
, interface_update_proto_route
);
1815 vlist_init(&ip
->neighbor
, neighbor_cmp
, interface_update_proto_neighbor
);
1816 vlist_init(&ip
->addr
, addr_cmp
, interface_update_proto_addr
);
1817 vlist_init(&ip
->prefix
, prefix_cmp
, interface_update_prefix
);
1821 interface_ip_init(struct interface
*iface
)
1823 __interface_ip_init(&iface
->proto_ip
, iface
);
1824 __interface_ip_init(&iface
->config_ip
, iface
);
1825 vlist_init(&iface
->host_routes
, route_cmp
, interface_update_host_route
);
1829 interface_ip_valid_until_handler(struct uloop_timeout
*t
)
1831 time_t now
= system_get_rtime();
1832 struct interface
*iface
;
1833 vlist_for_each_element(&interfaces
, iface
, node
) {
1834 if (iface
->state
!= IFS_UP
)
1837 struct device_addr
*addr
, *addrp
;
1838 struct device_route
*route
, *routep
;
1839 struct device_prefix
*pref
, *prefp
;
1841 vlist_for_each_element_safe(&iface
->proto_ip
.addr
, addr
, node
, addrp
)
1842 if (addr
->valid_until
&& addr
->valid_until
< now
)
1843 vlist_delete(&iface
->proto_ip
.addr
, &addr
->node
);
1845 vlist_for_each_element_safe(&iface
->proto_ip
.route
, route
, node
, routep
)
1846 if (route
->valid_until
&& route
->valid_until
< now
)
1847 vlist_delete(&iface
->proto_ip
.route
, &route
->node
);
1849 vlist_for_each_element_safe(&iface
->proto_ip
.prefix
, pref
, node
, prefp
)
1850 if (pref
->valid_until
&& pref
->valid_until
< now
)
1851 vlist_delete(&iface
->proto_ip
.prefix
, &pref
->node
);
1855 uloop_timeout_set(t
, 1000);
1859 interface_ip_init_worker(void)
1861 valid_until_timeout
.cb
= interface_ip_valid_until_handler
;
1862 uloop_timeout_set(&valid_until_timeout
, 1000);