| File: | build-scan/../src/resolve/resolved-link.c |
| Warning: | line 83, column 24 Use of memory after it is freed |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
| 1 | /* SPDX-License-Identifier: LGPL-2.1+ */ | ||||
| 2 | |||||
| 3 | #include <net/if.h> | ||||
| 4 | #include <stdio_ext.h> | ||||
| 5 | |||||
| 6 | #include "sd-network.h" | ||||
| 7 | |||||
| 8 | #include "alloc-util.h" | ||||
| 9 | #include "fd-util.h" | ||||
| 10 | #include "fileio.h" | ||||
| 11 | #include "missing.h" | ||||
| 12 | #include "mkdir.h" | ||||
| 13 | #include "parse-util.h" | ||||
| 14 | #include "resolved-link.h" | ||||
| 15 | #include "resolved-llmnr.h" | ||||
| 16 | #include "resolved-mdns.h" | ||||
| 17 | #include "string-util.h" | ||||
| 18 | #include "strv.h" | ||||
| 19 | |||||
| 20 | int link_new(Manager *m, Link **ret, int ifindex) { | ||||
| 21 | _cleanup_(link_freep)__attribute__((cleanup(link_freep))) Link *l = NULL((void*)0); | ||||
| 22 | int r; | ||||
| 23 | |||||
| 24 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-link.c", 24 , __PRETTY_FUNCTION__); } while (0); | ||||
| 25 | assert(ifindex > 0)do { if ((__builtin_expect(!!(!(ifindex > 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("ifindex > 0"), "../src/resolve/resolved-link.c" , 25, __PRETTY_FUNCTION__); } while (0); | ||||
| 26 | |||||
| 27 | r = hashmap_ensure_allocated(&m->links, NULL)internal_hashmap_ensure_allocated(&m->links, ((void*)0 ) ); | ||||
| 28 | if (r < 0) | ||||
| 29 | return r; | ||||
| 30 | |||||
| 31 | l = new0(Link, 1)((Link*) calloc((1), sizeof(Link))); | ||||
| 32 | if (!l) | ||||
| 33 | return -ENOMEM12; | ||||
| 34 | |||||
| 35 | l->ifindex = ifindex; | ||||
| 36 | l->llmnr_support = RESOLVE_SUPPORT_YES; | ||||
| 37 | l->mdns_support = RESOLVE_SUPPORT_NO; | ||||
| 38 | l->dnssec_mode = _DNSSEC_MODE_INVALID; | ||||
| 39 | l->dns_over_tls_mode = _DNS_OVER_TLS_MODE_INVALID; | ||||
| 40 | l->operstate = IF_OPER_UNKNOWN0; | ||||
| 41 | |||||
| 42 | if (asprintf(&l->state_file, "/run/systemd/resolve/netif/%i", ifindex) < 0) | ||||
| 43 | return -ENOMEM12; | ||||
| 44 | |||||
| 45 | r = hashmap_put(m->links, INT_TO_PTR(ifindex)((void *) ((intptr_t) (ifindex))), l); | ||||
| 46 | if (r < 0) | ||||
| 47 | return r; | ||||
| 48 | |||||
| 49 | l->manager = m; | ||||
| 50 | |||||
| 51 | if (ret) | ||||
| 52 | *ret = l; | ||||
| 53 | l = NULL((void*)0); | ||||
| 54 | |||||
| 55 | return 0; | ||||
| 56 | } | ||||
| 57 | |||||
| 58 | void link_flush_settings(Link *l) { | ||||
| 59 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 59 , __PRETTY_FUNCTION__); } while (0); | ||||
| 60 | |||||
| 61 | l->llmnr_support = RESOLVE_SUPPORT_YES; | ||||
| 62 | l->mdns_support = RESOLVE_SUPPORT_NO; | ||||
| 63 | l->dnssec_mode = _DNSSEC_MODE_INVALID; | ||||
| 64 | l->dns_over_tls_mode = _DNS_OVER_TLS_MODE_INVALID; | ||||
| 65 | |||||
| 66 | dns_server_unlink_all(l->dns_servers); | ||||
| 67 | dns_search_domain_unlink_all(l->search_domains); | ||||
| 68 | |||||
| 69 | l->dnssec_negative_trust_anchors = set_free_free(l->dnssec_negative_trust_anchors); | ||||
| 70 | } | ||||
| 71 | |||||
| 72 | Link *link_free(Link *l) { | ||||
| 73 | if (!l) | ||||
| |||||
| 74 | return NULL((void*)0); | ||||
| 75 | |||||
| 76 | /* Send goodbye messages. */ | ||||
| 77 | dns_scope_announce(l->mdns_ipv4_scope, true1); | ||||
| 78 | dns_scope_announce(l->mdns_ipv6_scope, true1); | ||||
| 79 | |||||
| 80 | link_flush_settings(l); | ||||
| 81 | |||||
| 82 | while (l->addresses) | ||||
| 83 | (void) link_address_free(l->addresses); | ||||
| |||||
| 84 | |||||
| 85 | if (l->manager) | ||||
| 86 | hashmap_remove(l->manager->links, INT_TO_PTR(l->ifindex)((void *) ((intptr_t) (l->ifindex)))); | ||||
| 87 | |||||
| 88 | dns_scope_free(l->unicast_scope); | ||||
| 89 | dns_scope_free(l->llmnr_ipv4_scope); | ||||
| 90 | dns_scope_free(l->llmnr_ipv6_scope); | ||||
| 91 | dns_scope_free(l->mdns_ipv4_scope); | ||||
| 92 | dns_scope_free(l->mdns_ipv6_scope); | ||||
| 93 | |||||
| 94 | free(l->state_file); | ||||
| 95 | |||||
| 96 | return mfree(l); | ||||
| 97 | } | ||||
| 98 | |||||
| 99 | void link_allocate_scopes(Link *l) { | ||||
| 100 | bool_Bool unicast_relevant; | ||||
| 101 | int r; | ||||
| 102 | |||||
| 103 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 103 , __PRETTY_FUNCTION__); } while (0); | ||||
| 104 | |||||
| 105 | /* If a link that used to be relevant is no longer, or a link that did not use to be relevant now becomes | ||||
| 106 | * relevant, let's reinit the learnt global DNS server information, since we might talk to different servers | ||||
| 107 | * now, even if they have the same addresses as before. */ | ||||
| 108 | |||||
| 109 | unicast_relevant = link_relevant(l, AF_UNSPEC0, false0); | ||||
| 110 | if (unicast_relevant != l->unicast_relevant) { | ||||
| 111 | l->unicast_relevant = unicast_relevant; | ||||
| 112 | |||||
| 113 | dns_server_reset_features_all(l->manager->fallback_dns_servers); | ||||
| 114 | dns_server_reset_features_all(l->manager->dns_servers); | ||||
| 115 | |||||
| 116 | /* Also, flush the global unicast scope, to deal with split horizon setups, where talking through one | ||||
| 117 | * interface reveals different DNS zones than through others. */ | ||||
| 118 | if (l->manager->unicast_scope) | ||||
| 119 | dns_cache_flush(&l->manager->unicast_scope->cache); | ||||
| 120 | } | ||||
| 121 | |||||
| 122 | /* And now, allocate all scopes that makes sense now if we didn't have them yet, and drop those which we don't | ||||
| 123 | * need anymore */ | ||||
| 124 | |||||
| 125 | if (unicast_relevant && l->dns_servers) { | ||||
| 126 | if (!l->unicast_scope) { | ||||
| 127 | dns_server_reset_features_all(l->dns_servers); | ||||
| 128 | |||||
| 129 | r = dns_scope_new(l->manager, &l->unicast_scope, l, DNS_PROTOCOL_DNS, AF_UNSPEC0); | ||||
| 130 | if (r < 0) | ||||
| 131 | log_warning_errno(r, "Failed to allocate DNS scope: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 131, __func__, "Failed to allocate DNS scope: %m" ) : -abs(_e); }); | ||||
| 132 | } | ||||
| 133 | } else | ||||
| 134 | l->unicast_scope = dns_scope_free(l->unicast_scope); | ||||
| 135 | |||||
| 136 | if (link_relevant(l, AF_INET2, true1) && | ||||
| 137 | l->llmnr_support != RESOLVE_SUPPORT_NO && | ||||
| 138 | l->manager->llmnr_support != RESOLVE_SUPPORT_NO) { | ||||
| 139 | if (!l->llmnr_ipv4_scope) { | ||||
| 140 | r = dns_scope_new(l->manager, &l->llmnr_ipv4_scope, l, DNS_PROTOCOL_LLMNR, AF_INET2); | ||||
| 141 | if (r < 0) | ||||
| 142 | log_warning_errno(r, "Failed to allocate LLMNR IPv4 scope: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 142, __func__, "Failed to allocate LLMNR IPv4 scope: %m" ) : -abs(_e); }); | ||||
| 143 | } | ||||
| 144 | } else | ||||
| 145 | l->llmnr_ipv4_scope = dns_scope_free(l->llmnr_ipv4_scope); | ||||
| 146 | |||||
| 147 | if (link_relevant(l, AF_INET610, true1) && | ||||
| 148 | l->llmnr_support != RESOLVE_SUPPORT_NO && | ||||
| 149 | l->manager->llmnr_support != RESOLVE_SUPPORT_NO && | ||||
| 150 | socket_ipv6_is_supported()) { | ||||
| 151 | if (!l->llmnr_ipv6_scope) { | ||||
| 152 | r = dns_scope_new(l->manager, &l->llmnr_ipv6_scope, l, DNS_PROTOCOL_LLMNR, AF_INET610); | ||||
| 153 | if (r < 0) | ||||
| 154 | log_warning_errno(r, "Failed to allocate LLMNR IPv6 scope: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 154, __func__, "Failed to allocate LLMNR IPv6 scope: %m" ) : -abs(_e); }); | ||||
| 155 | } | ||||
| 156 | } else | ||||
| 157 | l->llmnr_ipv6_scope = dns_scope_free(l->llmnr_ipv6_scope); | ||||
| 158 | |||||
| 159 | if (link_relevant(l, AF_INET2, true1) && | ||||
| 160 | l->mdns_support != RESOLVE_SUPPORT_NO && | ||||
| 161 | l->manager->mdns_support != RESOLVE_SUPPORT_NO) { | ||||
| 162 | if (!l->mdns_ipv4_scope) { | ||||
| 163 | r = dns_scope_new(l->manager, &l->mdns_ipv4_scope, l, DNS_PROTOCOL_MDNS, AF_INET2); | ||||
| 164 | if (r < 0) | ||||
| 165 | log_warning_errno(r, "Failed to allocate mDNS IPv4 scope: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 165, __func__, "Failed to allocate mDNS IPv4 scope: %m" ) : -abs(_e); }); | ||||
| 166 | } | ||||
| 167 | } else | ||||
| 168 | l->mdns_ipv4_scope = dns_scope_free(l->mdns_ipv4_scope); | ||||
| 169 | |||||
| 170 | if (link_relevant(l, AF_INET610, true1) && | ||||
| 171 | l->mdns_support != RESOLVE_SUPPORT_NO && | ||||
| 172 | l->manager->mdns_support != RESOLVE_SUPPORT_NO) { | ||||
| 173 | if (!l->mdns_ipv6_scope) { | ||||
| 174 | r = dns_scope_new(l->manager, &l->mdns_ipv6_scope, l, DNS_PROTOCOL_MDNS, AF_INET610); | ||||
| 175 | if (r < 0) | ||||
| 176 | log_warning_errno(r, "Failed to allocate mDNS IPv6 scope: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 176, __func__, "Failed to allocate mDNS IPv6 scope: %m" ) : -abs(_e); }); | ||||
| 177 | } | ||||
| 178 | } else | ||||
| 179 | l->mdns_ipv6_scope = dns_scope_free(l->mdns_ipv6_scope); | ||||
| 180 | } | ||||
| 181 | |||||
| 182 | void link_add_rrs(Link *l, bool_Bool force_remove) { | ||||
| 183 | LinkAddress *a; | ||||
| 184 | int r; | ||||
| 185 | |||||
| 186 | LIST_FOREACH(addresses, a, l->addresses)for ((a) = (l->addresses); (a); (a) = (a)->addresses_next ) | ||||
| 187 | link_address_add_rrs(a, force_remove); | ||||
| 188 | |||||
| 189 | if (!force_remove && | ||||
| 190 | l->mdns_support == RESOLVE_SUPPORT_YES && | ||||
| 191 | l->manager->mdns_support == RESOLVE_SUPPORT_YES) { | ||||
| 192 | |||||
| 193 | if (l->mdns_ipv4_scope) { | ||||
| 194 | r = dns_scope_add_dnssd_services(l->mdns_ipv4_scope); | ||||
| 195 | if (r < 0) | ||||
| 196 | log_warning_errno(r, "Failed to add IPv4 DNS-SD services: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 196, __func__, "Failed to add IPv4 DNS-SD services: %m" ) : -abs(_e); }); | ||||
| 197 | } | ||||
| 198 | |||||
| 199 | if (l->mdns_ipv6_scope) { | ||||
| 200 | r = dns_scope_add_dnssd_services(l->mdns_ipv6_scope); | ||||
| 201 | if (r < 0) | ||||
| 202 | log_warning_errno(r, "Failed to add IPv6 DNS-SD services: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 202, __func__, "Failed to add IPv6 DNS-SD services: %m" ) : -abs(_e); }); | ||||
| 203 | } | ||||
| 204 | |||||
| 205 | } else { | ||||
| 206 | |||||
| 207 | if (l->mdns_ipv4_scope) { | ||||
| 208 | r = dns_scope_remove_dnssd_services(l->mdns_ipv4_scope); | ||||
| 209 | if (r < 0) | ||||
| 210 | log_warning_errno(r, "Failed to remove IPv4 DNS-SD services: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 210, __func__, "Failed to remove IPv4 DNS-SD services: %m" ) : -abs(_e); }); | ||||
| 211 | } | ||||
| 212 | |||||
| 213 | if (l->mdns_ipv6_scope) { | ||||
| 214 | r = dns_scope_remove_dnssd_services(l->mdns_ipv6_scope); | ||||
| 215 | if (r < 0) | ||||
| 216 | log_warning_errno(r, "Failed to remove IPv6 DNS-SD services: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 216, __func__, "Failed to remove IPv6 DNS-SD services: %m" ) : -abs(_e); }); | ||||
| 217 | } | ||||
| 218 | } | ||||
| 219 | } | ||||
| 220 | |||||
| 221 | int link_process_rtnl(Link *l, sd_netlink_message *m) { | ||||
| 222 | const char *n = NULL((void*)0); | ||||
| 223 | int r; | ||||
| 224 | |||||
| 225 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 225 , __PRETTY_FUNCTION__); } while (0); | ||||
| 226 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-link.c", 226 , __PRETTY_FUNCTION__); } while (0); | ||||
| 227 | |||||
| 228 | r = sd_rtnl_message_link_get_flags(m, &l->flags); | ||||
| 229 | if (r < 0) | ||||
| 230 | return r; | ||||
| 231 | |||||
| 232 | (void) sd_netlink_message_read_u32(m, IFLA_MTU, &l->mtu); | ||||
| 233 | (void) sd_netlink_message_read_u8(m, IFLA_OPERSTATE, &l->operstate); | ||||
| 234 | |||||
| 235 | if (sd_netlink_message_read_string(m, IFLA_IFNAME, &n) >= 0) { | ||||
| 236 | strncpy(l->name, n, sizeof(l->name)-1); | ||||
| 237 | char_array_0(l->name)l->name[sizeof(l->name)-1] = 0;; | ||||
| 238 | } | ||||
| 239 | |||||
| 240 | link_allocate_scopes(l); | ||||
| 241 | link_add_rrs(l, false0); | ||||
| 242 | |||||
| 243 | return 0; | ||||
| 244 | } | ||||
| 245 | |||||
| 246 | static int link_update_dns_server_one(Link *l, const char *name) { | ||||
| 247 | union in_addr_union a; | ||||
| 248 | DnsServer *s; | ||||
| 249 | int family, r; | ||||
| 250 | |||||
| 251 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 251 , __PRETTY_FUNCTION__); } while (0); | ||||
| 252 | assert(name)do { if ((__builtin_expect(!!(!(name)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("name"), "../src/resolve/resolved-link.c" , 252, __PRETTY_FUNCTION__); } while (0); | ||||
| 253 | |||||
| 254 | r = in_addr_from_string_auto(name, &family, &a); | ||||
| 255 | if (r < 0) | ||||
| 256 | return r; | ||||
| 257 | |||||
| 258 | s = dns_server_find(l->dns_servers, family, &a, 0); | ||||
| 259 | if (s) { | ||||
| 260 | dns_server_move_back_and_unmark(s); | ||||
| 261 | return 0; | ||||
| 262 | } | ||||
| 263 | |||||
| 264 | return dns_server_new(l->manager, NULL((void*)0), DNS_SERVER_LINK, l, family, &a, 0); | ||||
| 265 | } | ||||
| 266 | |||||
| 267 | static int link_update_dns_servers(Link *l) { | ||||
| 268 | _cleanup_strv_free___attribute__((cleanup(strv_freep))) char **nameservers = NULL((void*)0); | ||||
| 269 | char **nameserver; | ||||
| 270 | int r; | ||||
| 271 | |||||
| 272 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 272 , __PRETTY_FUNCTION__); } while (0); | ||||
| 273 | |||||
| 274 | r = sd_network_link_get_dns(l->ifindex, &nameservers); | ||||
| 275 | if (r == -ENODATA61) { | ||||
| 276 | r = 0; | ||||
| 277 | goto clear; | ||||
| 278 | } | ||||
| 279 | if (r < 0) | ||||
| 280 | goto clear; | ||||
| 281 | |||||
| 282 | dns_server_mark_all(l->dns_servers); | ||||
| 283 | |||||
| 284 | STRV_FOREACH(nameserver, nameservers)for ((nameserver) = (nameservers); (nameserver) && *( nameserver); (nameserver)++) { | ||||
| 285 | r = link_update_dns_server_one(l, *nameserver); | ||||
| 286 | if (r < 0) | ||||
| 287 | goto clear; | ||||
| 288 | } | ||||
| 289 | |||||
| 290 | dns_server_unlink_marked(l->dns_servers); | ||||
| 291 | return 0; | ||||
| 292 | |||||
| 293 | clear: | ||||
| 294 | dns_server_unlink_all(l->dns_servers); | ||||
| 295 | return r; | ||||
| 296 | } | ||||
| 297 | |||||
| 298 | static int link_update_llmnr_support(Link *l) { | ||||
| 299 | _cleanup_free___attribute__((cleanup(freep))) char *b = NULL((void*)0); | ||||
| 300 | int r; | ||||
| 301 | |||||
| 302 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 302 , __PRETTY_FUNCTION__); } while (0); | ||||
| 303 | |||||
| 304 | r = sd_network_link_get_llmnr(l->ifindex, &b); | ||||
| 305 | if (r == -ENODATA61) { | ||||
| 306 | r = 0; | ||||
| 307 | goto clear; | ||||
| 308 | } | ||||
| 309 | if (r < 0) | ||||
| 310 | goto clear; | ||||
| 311 | |||||
| 312 | l->llmnr_support = resolve_support_from_string(b); | ||||
| 313 | if (l->llmnr_support < 0) { | ||||
| 314 | r = -EINVAL22; | ||||
| 315 | goto clear; | ||||
| 316 | } | ||||
| 317 | |||||
| 318 | return 0; | ||||
| 319 | |||||
| 320 | clear: | ||||
| 321 | l->llmnr_support = RESOLVE_SUPPORT_YES; | ||||
| 322 | return r; | ||||
| 323 | } | ||||
| 324 | |||||
| 325 | static int link_update_mdns_support(Link *l) { | ||||
| 326 | _cleanup_free___attribute__((cleanup(freep))) char *b = NULL((void*)0); | ||||
| 327 | int r; | ||||
| 328 | |||||
| 329 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 329 , __PRETTY_FUNCTION__); } while (0); | ||||
| 330 | |||||
| 331 | r = sd_network_link_get_mdns(l->ifindex, &b); | ||||
| 332 | if (r == -ENODATA61) { | ||||
| 333 | r = 0; | ||||
| 334 | goto clear; | ||||
| 335 | } | ||||
| 336 | if (r < 0) | ||||
| 337 | goto clear; | ||||
| 338 | |||||
| 339 | l->mdns_support = resolve_support_from_string(b); | ||||
| 340 | if (l->mdns_support < 0) { | ||||
| 341 | r = -EINVAL22; | ||||
| 342 | goto clear; | ||||
| 343 | } | ||||
| 344 | |||||
| 345 | return 0; | ||||
| 346 | |||||
| 347 | clear: | ||||
| 348 | l->mdns_support = RESOLVE_SUPPORT_NO; | ||||
| 349 | return r; | ||||
| 350 | } | ||||
| 351 | |||||
| 352 | void link_set_dns_over_tls_mode(Link *l, DnsOverTlsMode mode) { | ||||
| 353 | |||||
| 354 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 354 , __PRETTY_FUNCTION__); } while (0); | ||||
| 355 | |||||
| 356 | #if ! ENABLE_DNS_OVER_TLS1 | ||||
| 357 | if (mode != DNS_OVER_TLS_NO) | ||||
| 358 | log_warning("DNS-over-TLS option for the link cannot be set to opportunistic when systemd-resolved is built without DNS-over-TLS support. Turning off DNS-over-TLS support.")({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 358, __func__, "DNS-over-TLS option for the link cannot be set to opportunistic when systemd-resolved is built without DNS-over-TLS support. Turning off DNS-over-TLS support." ) : -abs(_e); }); | ||||
| 359 | return; | ||||
| 360 | #endif | ||||
| 361 | |||||
| 362 | l->dns_over_tls_mode = mode; | ||||
| 363 | } | ||||
| 364 | |||||
| 365 | static int link_update_dns_over_tls_mode(Link *l) { | ||||
| 366 | _cleanup_free___attribute__((cleanup(freep))) char *b = NULL((void*)0); | ||||
| 367 | int r; | ||||
| 368 | |||||
| 369 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 369 , __PRETTY_FUNCTION__); } while (0); | ||||
| 370 | |||||
| 371 | r = sd_network_link_get_dns_over_tls(l->ifindex, &b); | ||||
| 372 | if (r == -ENODATA61) { | ||||
| 373 | r = 0; | ||||
| 374 | goto clear; | ||||
| 375 | } | ||||
| 376 | if (r < 0) | ||||
| 377 | goto clear; | ||||
| 378 | |||||
| 379 | l->dns_over_tls_mode = dns_over_tls_mode_from_string(b); | ||||
| 380 | if (l->dns_over_tls_mode < 0) { | ||||
| 381 | r = -EINVAL22; | ||||
| 382 | goto clear; | ||||
| 383 | } | ||||
| 384 | |||||
| 385 | return 0; | ||||
| 386 | |||||
| 387 | clear: | ||||
| 388 | l->dns_over_tls_mode = _DNS_OVER_TLS_MODE_INVALID; | ||||
| 389 | return r; | ||||
| 390 | } | ||||
| 391 | |||||
| 392 | void link_set_dnssec_mode(Link *l, DnssecMode mode) { | ||||
| 393 | |||||
| 394 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 394 , __PRETTY_FUNCTION__); } while (0); | ||||
| 395 | |||||
| 396 | #if ! HAVE_GCRYPT1 | ||||
| 397 | if (IN_SET(mode, DNSSEC_YES, DNSSEC_ALLOW_DOWNGRADE)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){DNSSEC_YES, DNSSEC_ALLOW_DOWNGRADE})/sizeof (int)]; switch(mode) { case DNSSEC_YES: case DNSSEC_ALLOW_DOWNGRADE : _found = 1; break; default: break; } _found; })) | ||||
| 398 | log_warning("DNSSEC option for the link cannot be enabled or set to allow-downgrade when systemd-resolved is built without gcrypt support. Turning off DNSSEC support.")({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 398, __func__, "DNSSEC option for the link cannot be enabled or set to allow-downgrade when systemd-resolved is built without gcrypt support. Turning off DNSSEC support." ) : -abs(_e); }); | ||||
| 399 | return; | ||||
| 400 | #endif | ||||
| 401 | |||||
| 402 | if (l->dnssec_mode == mode) | ||||
| 403 | return; | ||||
| 404 | |||||
| 405 | if ((l->dnssec_mode == _DNSSEC_MODE_INVALID) || | ||||
| 406 | (l->dnssec_mode == DNSSEC_NO && mode != DNSSEC_NO) || | ||||
| 407 | (l->dnssec_mode == DNSSEC_ALLOW_DOWNGRADE && mode == DNSSEC_YES)) { | ||||
| 408 | |||||
| 409 | /* When switching from non-DNSSEC mode to DNSSEC mode, flush the cache. Also when switching from the | ||||
| 410 | * allow-downgrade mode to full DNSSEC mode, flush it too. */ | ||||
| 411 | if (l->unicast_scope) | ||||
| 412 | dns_cache_flush(&l->unicast_scope->cache); | ||||
| 413 | } | ||||
| 414 | |||||
| 415 | l->dnssec_mode = mode; | ||||
| 416 | } | ||||
| 417 | |||||
| 418 | static int link_update_dnssec_mode(Link *l) { | ||||
| 419 | _cleanup_free___attribute__((cleanup(freep))) char *m = NULL((void*)0); | ||||
| 420 | DnssecMode mode; | ||||
| 421 | int r; | ||||
| 422 | |||||
| 423 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 423 , __PRETTY_FUNCTION__); } while (0); | ||||
| 424 | |||||
| 425 | r = sd_network_link_get_dnssec(l->ifindex, &m); | ||||
| 426 | if (r == -ENODATA61) { | ||||
| 427 | r = 0; | ||||
| 428 | goto clear; | ||||
| 429 | } | ||||
| 430 | if (r < 0) | ||||
| 431 | goto clear; | ||||
| 432 | |||||
| 433 | mode = dnssec_mode_from_string(m); | ||||
| 434 | if (mode < 0) { | ||||
| 435 | r = -EINVAL22; | ||||
| 436 | goto clear; | ||||
| 437 | } | ||||
| 438 | |||||
| 439 | link_set_dnssec_mode(l, mode); | ||||
| 440 | |||||
| 441 | return 0; | ||||
| 442 | |||||
| 443 | clear: | ||||
| 444 | l->dnssec_mode = _DNSSEC_MODE_INVALID; | ||||
| 445 | return r; | ||||
| 446 | } | ||||
| 447 | |||||
| 448 | static int link_update_dnssec_negative_trust_anchors(Link *l) { | ||||
| 449 | _cleanup_strv_free___attribute__((cleanup(strv_freep))) char **ntas = NULL((void*)0); | ||||
| 450 | _cleanup_set_free_free___attribute__((cleanup(set_free_freep))) Set *ns = NULL((void*)0); | ||||
| 451 | int r; | ||||
| 452 | |||||
| 453 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 453 , __PRETTY_FUNCTION__); } while (0); | ||||
| 454 | |||||
| 455 | r = sd_network_link_get_dnssec_negative_trust_anchors(l->ifindex, &ntas); | ||||
| 456 | if (r == -ENODATA61) { | ||||
| 457 | r = 0; | ||||
| 458 | goto clear; | ||||
| 459 | } | ||||
| 460 | if (r < 0) | ||||
| 461 | goto clear; | ||||
| 462 | |||||
| 463 | ns = set_new(&dns_name_hash_ops)internal_set_new(&dns_name_hash_ops ); | ||||
| 464 | if (!ns) | ||||
| 465 | return -ENOMEM12; | ||||
| 466 | |||||
| 467 | r = set_put_strdupv(ns, ntas); | ||||
| 468 | if (r < 0) | ||||
| 469 | return r; | ||||
| 470 | |||||
| 471 | set_free_free(l->dnssec_negative_trust_anchors); | ||||
| 472 | l->dnssec_negative_trust_anchors = TAKE_PTR(ns)({ typeof(ns) _ptr_ = (ns); (ns) = ((void*)0); _ptr_; }); | ||||
| 473 | |||||
| 474 | return 0; | ||||
| 475 | |||||
| 476 | clear: | ||||
| 477 | l->dnssec_negative_trust_anchors = set_free_free(l->dnssec_negative_trust_anchors); | ||||
| 478 | return r; | ||||
| 479 | } | ||||
| 480 | |||||
| 481 | static int link_update_search_domain_one(Link *l, const char *name, bool_Bool route_only) { | ||||
| 482 | DnsSearchDomain *d; | ||||
| 483 | int r; | ||||
| 484 | |||||
| 485 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 485 , __PRETTY_FUNCTION__); } while (0); | ||||
| 486 | assert(name)do { if ((__builtin_expect(!!(!(name)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("name"), "../src/resolve/resolved-link.c" , 486, __PRETTY_FUNCTION__); } while (0); | ||||
| 487 | |||||
| 488 | r = dns_search_domain_find(l->search_domains, name, &d); | ||||
| 489 | if (r < 0) | ||||
| 490 | return r; | ||||
| 491 | if (r > 0) | ||||
| 492 | dns_search_domain_move_back_and_unmark(d); | ||||
| 493 | else { | ||||
| 494 | r = dns_search_domain_new(l->manager, &d, DNS_SEARCH_DOMAIN_LINK, l, name); | ||||
| 495 | if (r < 0) | ||||
| 496 | return r; | ||||
| 497 | } | ||||
| 498 | |||||
| 499 | d->route_only = route_only; | ||||
| 500 | return 0; | ||||
| 501 | } | ||||
| 502 | |||||
| 503 | static int link_update_search_domains(Link *l) { | ||||
| 504 | _cleanup_strv_free___attribute__((cleanup(strv_freep))) char **sdomains = NULL((void*)0), **rdomains = NULL((void*)0); | ||||
| 505 | char **i; | ||||
| 506 | int r, q; | ||||
| 507 | |||||
| 508 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 508 , __PRETTY_FUNCTION__); } while (0); | ||||
| 509 | |||||
| 510 | r = sd_network_link_get_search_domains(l->ifindex, &sdomains); | ||||
| 511 | if (r < 0 && r != -ENODATA61) | ||||
| 512 | goto clear; | ||||
| 513 | |||||
| 514 | q = sd_network_link_get_route_domains(l->ifindex, &rdomains); | ||||
| 515 | if (q < 0 && q != -ENODATA61) { | ||||
| 516 | r = q; | ||||
| 517 | goto clear; | ||||
| 518 | } | ||||
| 519 | |||||
| 520 | if (r == -ENODATA61 && q == -ENODATA61) { | ||||
| 521 | /* networkd knows nothing about this interface, and that's fine. */ | ||||
| 522 | r = 0; | ||||
| 523 | goto clear; | ||||
| 524 | } | ||||
| 525 | |||||
| 526 | dns_search_domain_mark_all(l->search_domains); | ||||
| 527 | |||||
| 528 | STRV_FOREACH(i, sdomains)for ((i) = (sdomains); (i) && *(i); (i)++) { | ||||
| 529 | r = link_update_search_domain_one(l, *i, false0); | ||||
| 530 | if (r < 0) | ||||
| 531 | goto clear; | ||||
| 532 | } | ||||
| 533 | |||||
| 534 | STRV_FOREACH(i, rdomains)for ((i) = (rdomains); (i) && *(i); (i)++) { | ||||
| 535 | r = link_update_search_domain_one(l, *i, true1); | ||||
| 536 | if (r < 0) | ||||
| 537 | goto clear; | ||||
| 538 | } | ||||
| 539 | |||||
| 540 | dns_search_domain_unlink_marked(l->search_domains); | ||||
| 541 | return 0; | ||||
| 542 | |||||
| 543 | clear: | ||||
| 544 | dns_search_domain_unlink_all(l->search_domains); | ||||
| 545 | return r; | ||||
| 546 | } | ||||
| 547 | |||||
| 548 | static int link_is_managed(Link *l) { | ||||
| 549 | _cleanup_free___attribute__((cleanup(freep))) char *state = NULL((void*)0); | ||||
| 550 | int r; | ||||
| 551 | |||||
| 552 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 552 , __PRETTY_FUNCTION__); } while (0); | ||||
| 553 | |||||
| 554 | r = sd_network_link_get_setup_state(l->ifindex, &state); | ||||
| 555 | if (r == -ENODATA61) | ||||
| 556 | return 0; | ||||
| 557 | if (r < 0) | ||||
| 558 | return r; | ||||
| 559 | |||||
| 560 | return !STR_IN_SET(state, "pending", "unmanaged")(!!strv_find((((char**) ((const char*[]) { "pending", "unmanaged" , ((void*)0) }))), (state))); | ||||
| 561 | } | ||||
| 562 | |||||
| 563 | static void link_read_settings(Link *l) { | ||||
| 564 | int r; | ||||
| 565 | |||||
| 566 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 566 , __PRETTY_FUNCTION__); } while (0); | ||||
| 567 | |||||
| 568 | /* Read settings from networkd, except when networkd is not managing this interface. */ | ||||
| 569 | |||||
| 570 | r = link_is_managed(l); | ||||
| 571 | if (r < 0) { | ||||
| 572 | log_warning_errno(r, "Failed to determine whether interface %s is managed: %m", l->name)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 572, __func__, "Failed to determine whether interface %s is managed: %m" , l->name) : -abs(_e); }); | ||||
| 573 | return; | ||||
| 574 | } | ||||
| 575 | if (r == 0) { | ||||
| 576 | |||||
| 577 | /* If this link used to be managed, but is now unmanaged, flush all our settings — but only once. */ | ||||
| 578 | if (l->is_managed) | ||||
| 579 | link_flush_settings(l); | ||||
| 580 | |||||
| 581 | l->is_managed = false0; | ||||
| 582 | return; | ||||
| 583 | } | ||||
| 584 | |||||
| 585 | l->is_managed = true1; | ||||
| 586 | |||||
| 587 | r = link_update_dns_servers(l); | ||||
| 588 | if (r < 0) | ||||
| 589 | log_warning_errno(r, "Failed to read DNS servers for interface %s, ignoring: %m", l->name)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 589, __func__, "Failed to read DNS servers for interface %s, ignoring: %m" , l->name) : -abs(_e); }); | ||||
| 590 | |||||
| 591 | r = link_update_llmnr_support(l); | ||||
| 592 | if (r < 0) | ||||
| 593 | log_warning_errno(r, "Failed to read LLMNR support for interface %s, ignoring: %m", l->name)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 593, __func__, "Failed to read LLMNR support for interface %s, ignoring: %m" , l->name) : -abs(_e); }); | ||||
| 594 | |||||
| 595 | r = link_update_mdns_support(l); | ||||
| 596 | if (r < 0) | ||||
| 597 | log_warning_errno(r, "Failed to read mDNS support for interface %s, ignoring: %m", l->name)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 597, __func__, "Failed to read mDNS support for interface %s, ignoring: %m" , l->name) : -abs(_e); }); | ||||
| 598 | |||||
| 599 | r = link_update_dns_over_tls_mode(l); | ||||
| 600 | if (r < 0) | ||||
| 601 | log_warning_errno(r, "Failed to read DNS-over-TLS mode for interface %s, ignoring: %m", l->name)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 601, __func__, "Failed to read DNS-over-TLS mode for interface %s, ignoring: %m" , l->name) : -abs(_e); }); | ||||
| 602 | |||||
| 603 | r = link_update_dnssec_mode(l); | ||||
| 604 | if (r < 0) | ||||
| 605 | log_warning_errno(r, "Failed to read DNSSEC mode for interface %s, ignoring: %m", l->name)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 605, __func__, "Failed to read DNSSEC mode for interface %s, ignoring: %m" , l->name) : -abs(_e); }); | ||||
| 606 | |||||
| 607 | r = link_update_dnssec_negative_trust_anchors(l); | ||||
| 608 | if (r < 0) | ||||
| 609 | log_warning_errno(r, "Failed to read DNSSEC negative trust anchors for interface %s, ignoring: %m", l->name)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 609, __func__, "Failed to read DNSSEC negative trust anchors for interface %s, ignoring: %m" , l->name) : -abs(_e); }); | ||||
| 610 | |||||
| 611 | r = link_update_search_domains(l); | ||||
| 612 | if (r < 0) | ||||
| 613 | log_warning_errno(r, "Failed to read search domains for interface %s, ignoring: %m", l->name)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 613, __func__, "Failed to read search domains for interface %s, ignoring: %m" , l->name) : -abs(_e); }); | ||||
| 614 | } | ||||
| 615 | |||||
| 616 | int link_update(Link *l) { | ||||
| 617 | int r; | ||||
| 618 | |||||
| 619 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 619 , __PRETTY_FUNCTION__); } while (0); | ||||
| 620 | |||||
| 621 | link_read_settings(l); | ||||
| 622 | link_load_user(l); | ||||
| 623 | |||||
| 624 | if (l->llmnr_support != RESOLVE_SUPPORT_NO) { | ||||
| 625 | r = manager_llmnr_start(l->manager); | ||||
| 626 | if (r < 0) | ||||
| 627 | return r; | ||||
| 628 | } | ||||
| 629 | |||||
| 630 | if (l->mdns_support != RESOLVE_SUPPORT_NO) { | ||||
| 631 | r = manager_mdns_start(l->manager); | ||||
| 632 | if (r < 0) | ||||
| 633 | return r; | ||||
| 634 | } | ||||
| 635 | |||||
| 636 | link_allocate_scopes(l); | ||||
| 637 | link_add_rrs(l, false0); | ||||
| 638 | |||||
| 639 | return 0; | ||||
| 640 | } | ||||
| 641 | |||||
| 642 | bool_Bool link_relevant(Link *l, int family, bool_Bool local_multicast) { | ||||
| 643 | _cleanup_free___attribute__((cleanup(freep))) char *state = NULL((void*)0); | ||||
| 644 | LinkAddress *a; | ||||
| 645 | |||||
| 646 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 646 , __PRETTY_FUNCTION__); } while (0); | ||||
| 647 | |||||
| 648 | /* A link is relevant for local multicast traffic if it isn't a loopback device, has a link | ||||
| 649 | * beat, can do multicast and has at least one link-local (or better) IP address. | ||||
| 650 | * | ||||
| 651 | * A link is relevant for non-multicast traffic if it isn't a loopback device, has a link beat, and has at | ||||
| 652 | * least one routable address. */ | ||||
| 653 | |||||
| 654 | if (l->flags & (IFF_LOOPBACKIFF_LOOPBACK|IFF_DORMANT0x20000)) | ||||
| 655 | return false0; | ||||
| 656 | |||||
| 657 | if ((l->flags & (IFF_UPIFF_UP|IFF_LOWER_UP0x10000)) != (IFF_UPIFF_UP|IFF_LOWER_UP0x10000)) | ||||
| 658 | return false0; | ||||
| 659 | |||||
| 660 | if (local_multicast) { | ||||
| 661 | if ((l->flags & IFF_MULTICASTIFF_MULTICAST) != IFF_MULTICASTIFF_MULTICAST) | ||||
| 662 | return false0; | ||||
| 663 | } | ||||
| 664 | |||||
| 665 | /* Check kernel operstate | ||||
| 666 | * https://www.kernel.org/doc/Documentation/networking/operstates.txt */ | ||||
| 667 | if (!IN_SET(l->operstate, IF_OPER_UNKNOWN, IF_OPER_UP)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){0, 6})/sizeof(int)]; switch(l->operstate ) { case 0: case 6: _found = 1; break; default: break; } _found ; })) | ||||
| 668 | return false0; | ||||
| 669 | |||||
| 670 | (void) sd_network_link_get_operational_state(l->ifindex, &state); | ||||
| 671 | if (state && !STR_IN_SET(state, "unknown", "degraded", "routable")(!!strv_find((((char**) ((const char*[]) { "unknown", "degraded" , "routable", ((void*)0) }))), (state)))) | ||||
| 672 | return false0; | ||||
| 673 | |||||
| 674 | LIST_FOREACH(addresses, a, l->addresses)for ((a) = (l->addresses); (a); (a) = (a)->addresses_next ) | ||||
| 675 | if ((family == AF_UNSPEC0 || a->family == family) && link_address_relevant(a, local_multicast)) | ||||
| 676 | return true1; | ||||
| 677 | |||||
| 678 | return false0; | ||||
| 679 | } | ||||
| 680 | |||||
| 681 | LinkAddress *link_find_address(Link *l, int family, const union in_addr_union *in_addr) { | ||||
| 682 | LinkAddress *a; | ||||
| 683 | |||||
| 684 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 684 , __PRETTY_FUNCTION__); } while (0); | ||||
| 685 | |||||
| 686 | LIST_FOREACH(addresses, a, l->addresses)for ((a) = (l->addresses); (a); (a) = (a)->addresses_next ) | ||||
| 687 | if (a->family == family && in_addr_equal(family, &a->in_addr, in_addr)) | ||||
| 688 | return a; | ||||
| 689 | |||||
| 690 | return NULL((void*)0); | ||||
| 691 | } | ||||
| 692 | |||||
| 693 | DnsServer* link_set_dns_server(Link *l, DnsServer *s) { | ||||
| 694 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 694 , __PRETTY_FUNCTION__); } while (0); | ||||
| 695 | |||||
| 696 | if (l->current_dns_server == s) | ||||
| 697 | return s; | ||||
| 698 | |||||
| 699 | if (s) | ||||
| 700 | log_debug("Switching to DNS server %s for interface %s.", dns_server_string(s), l->name)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 700, __func__, "Switching to DNS server %s for interface %s." , dns_server_string(s), l->name) : -abs(_e); }); | ||||
| 701 | |||||
| 702 | dns_server_unref(l->current_dns_server); | ||||
| 703 | l->current_dns_server = dns_server_ref(s); | ||||
| 704 | |||||
| 705 | if (l->unicast_scope) | ||||
| 706 | dns_cache_flush(&l->unicast_scope->cache); | ||||
| 707 | |||||
| 708 | return s; | ||||
| 709 | } | ||||
| 710 | |||||
| 711 | DnsServer *link_get_dns_server(Link *l) { | ||||
| 712 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 712 , __PRETTY_FUNCTION__); } while (0); | ||||
| 713 | |||||
| 714 | if (!l->current_dns_server) | ||||
| 715 | link_set_dns_server(l, l->dns_servers); | ||||
| 716 | |||||
| 717 | return l->current_dns_server; | ||||
| 718 | } | ||||
| 719 | |||||
| 720 | void link_next_dns_server(Link *l) { | ||||
| 721 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 721 , __PRETTY_FUNCTION__); } while (0); | ||||
| 722 | |||||
| 723 | if (!l->current_dns_server) | ||||
| 724 | return; | ||||
| 725 | |||||
| 726 | /* Change to the next one, but make sure to follow the linked | ||||
| 727 | * list only if this server is actually still linked. */ | ||||
| 728 | if (l->current_dns_server->linked && l->current_dns_server->servers_next) { | ||||
| 729 | link_set_dns_server(l, l->current_dns_server->servers_next); | ||||
| 730 | return; | ||||
| 731 | } | ||||
| 732 | |||||
| 733 | link_set_dns_server(l, l->dns_servers); | ||||
| 734 | } | ||||
| 735 | |||||
| 736 | DnsOverTlsMode link_get_dns_over_tls_mode(Link *l) { | ||||
| 737 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 737 , __PRETTY_FUNCTION__); } while (0); | ||||
| 738 | |||||
| 739 | if (l->dns_over_tls_mode != _DNS_OVER_TLS_MODE_INVALID) | ||||
| 740 | return l->dns_over_tls_mode; | ||||
| 741 | |||||
| 742 | return manager_get_dns_over_tls_mode(l->manager); | ||||
| 743 | } | ||||
| 744 | |||||
| 745 | DnssecMode link_get_dnssec_mode(Link *l) { | ||||
| 746 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 746 , __PRETTY_FUNCTION__); } while (0); | ||||
| 747 | |||||
| 748 | if (l->dnssec_mode != _DNSSEC_MODE_INVALID) | ||||
| 749 | return l->dnssec_mode; | ||||
| 750 | |||||
| 751 | return manager_get_dnssec_mode(l->manager); | ||||
| 752 | } | ||||
| 753 | |||||
| 754 | bool_Bool link_dnssec_supported(Link *l) { | ||||
| 755 | DnsServer *server; | ||||
| 756 | |||||
| 757 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 757 , __PRETTY_FUNCTION__); } while (0); | ||||
| 758 | |||||
| 759 | if (link_get_dnssec_mode(l) == DNSSEC_NO) | ||||
| 760 | return false0; | ||||
| 761 | |||||
| 762 | server = link_get_dns_server(l); | ||||
| 763 | if (server) | ||||
| 764 | return dns_server_dnssec_supported(server); | ||||
| 765 | |||||
| 766 | return true1; | ||||
| 767 | } | ||||
| 768 | |||||
| 769 | int link_address_new(Link *l, LinkAddress **ret, int family, const union in_addr_union *in_addr) { | ||||
| 770 | LinkAddress *a; | ||||
| 771 | |||||
| 772 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 772 , __PRETTY_FUNCTION__); } while (0); | ||||
| 773 | assert(in_addr)do { if ((__builtin_expect(!!(!(in_addr)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("in_addr"), "../src/resolve/resolved-link.c" , 773, __PRETTY_FUNCTION__); } while (0); | ||||
| 774 | |||||
| 775 | a = new0(LinkAddress, 1)((LinkAddress*) calloc((1), sizeof(LinkAddress))); | ||||
| 776 | if (!a) | ||||
| 777 | return -ENOMEM12; | ||||
| 778 | |||||
| 779 | a->family = family; | ||||
| 780 | a->in_addr = *in_addr; | ||||
| 781 | |||||
| 782 | a->link = l; | ||||
| 783 | LIST_PREPEND(addresses, l->addresses, a)do { typeof(*(l->addresses)) **_head = &(l->addresses ), *_item = (a); do { if ((__builtin_expect(!!(!(_item)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("_item"), "../src/resolve/resolved-link.c" , 783, __PRETTY_FUNCTION__); } while (0); if ((_item->addresses_next = *_head)) _item->addresses_next->addresses_prev = _item ; _item->addresses_prev = ((void*)0); *_head = _item; } while (0); | ||||
| 784 | l->n_addresses++; | ||||
| 785 | |||||
| 786 | if (ret) | ||||
| 787 | *ret = a; | ||||
| 788 | |||||
| 789 | return 0; | ||||
| 790 | } | ||||
| 791 | |||||
| 792 | LinkAddress *link_address_free(LinkAddress *a) { | ||||
| 793 | if (!a
| ||||
| 794 | return NULL((void*)0); | ||||
| 795 | |||||
| 796 | if (a->link) { | ||||
| 797 | LIST_REMOVE(addresses, a->link->addresses, a)do { typeof(*(a->link->addresses)) **_head = &(a-> link->addresses), *_item = (a); do { if ((__builtin_expect (!!(!(_item)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("_item"), "../src/resolve/resolved-link.c", 797, __PRETTY_FUNCTION__ ); } while (0); if (_item->addresses_next) _item->addresses_next ->addresses_prev = _item->addresses_prev; if (_item-> addresses_prev) _item->addresses_prev->addresses_next = _item->addresses_next; else { do { if ((__builtin_expect( !!(!(*_head == _item)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD , ("*_head == _item"), "../src/resolve/resolved-link.c", 797, __PRETTY_FUNCTION__); } while (0); *_head = _item->addresses_next ; } _item->addresses_next = _item->addresses_prev = ((void *)0); } while (0); | ||||
| 798 | |||||
| 799 | assert(a->link->n_addresses > 0)do { if ((__builtin_expect(!!(!(a->link->n_addresses > 0)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("a->link->n_addresses > 0" ), "../src/resolve/resolved-link.c", 799, __PRETTY_FUNCTION__ ); } while (0); | ||||
| 800 | a->link->n_addresses--; | ||||
| 801 | |||||
| 802 | if (a->llmnr_address_rr) { | ||||
| 803 | if (a->family == AF_INET2 && a->link->llmnr_ipv4_scope) | ||||
| 804 | dns_zone_remove_rr(&a->link->llmnr_ipv4_scope->zone, a->llmnr_address_rr); | ||||
| 805 | else if (a->family == AF_INET610 && a->link->llmnr_ipv6_scope) | ||||
| 806 | dns_zone_remove_rr(&a->link->llmnr_ipv6_scope->zone, a->llmnr_address_rr); | ||||
| 807 | } | ||||
| 808 | |||||
| 809 | if (a->llmnr_ptr_rr) { | ||||
| 810 | if (a->family == AF_INET2 && a->link->llmnr_ipv4_scope) | ||||
| 811 | dns_zone_remove_rr(&a->link->llmnr_ipv4_scope->zone, a->llmnr_ptr_rr); | ||||
| 812 | else if (a->family == AF_INET610 && a->link->llmnr_ipv6_scope) | ||||
| 813 | dns_zone_remove_rr(&a->link->llmnr_ipv6_scope->zone, a->llmnr_ptr_rr); | ||||
| 814 | } | ||||
| 815 | |||||
| 816 | if (a->mdns_address_rr) { | ||||
| 817 | if (a->family == AF_INET2 && a->link->mdns_ipv4_scope) | ||||
| 818 | dns_zone_remove_rr(&a->link->mdns_ipv4_scope->zone, a->mdns_address_rr); | ||||
| 819 | else if (a->family == AF_INET610 && a->link->mdns_ipv6_scope) | ||||
| 820 | dns_zone_remove_rr(&a->link->mdns_ipv6_scope->zone, a->mdns_address_rr); | ||||
| 821 | } | ||||
| 822 | |||||
| 823 | if (a->mdns_ptr_rr) { | ||||
| 824 | if (a->family == AF_INET2 && a->link->mdns_ipv4_scope) | ||||
| 825 | dns_zone_remove_rr(&a->link->mdns_ipv4_scope->zone, a->mdns_ptr_rr); | ||||
| 826 | else if (a->family == AF_INET610 && a->link->mdns_ipv6_scope) | ||||
| 827 | dns_zone_remove_rr(&a->link->mdns_ipv6_scope->zone, a->mdns_ptr_rr); | ||||
| 828 | } | ||||
| 829 | } | ||||
| 830 | |||||
| 831 | dns_resource_record_unref(a->llmnr_address_rr); | ||||
| 832 | dns_resource_record_unref(a->llmnr_ptr_rr); | ||||
| 833 | dns_resource_record_unref(a->mdns_address_rr); | ||||
| 834 | dns_resource_record_unref(a->mdns_ptr_rr); | ||||
| 835 | |||||
| 836 | return mfree(a); | ||||
| 837 | } | ||||
| 838 | |||||
| 839 | void link_address_add_rrs(LinkAddress *a, bool_Bool force_remove) { | ||||
| 840 | int r; | ||||
| 841 | |||||
| 842 | assert(a)do { if ((__builtin_expect(!!(!(a)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("a"), "../src/resolve/resolved-link.c", 842 , __PRETTY_FUNCTION__); } while (0); | ||||
| 843 | |||||
| 844 | if (a->family == AF_INET2) { | ||||
| 845 | |||||
| 846 | if (!force_remove && | ||||
| 847 | link_address_relevant(a, true1) && | ||||
| 848 | a->link->llmnr_ipv4_scope && | ||||
| 849 | a->link->llmnr_support == RESOLVE_SUPPORT_YES && | ||||
| 850 | a->link->manager->llmnr_support == RESOLVE_SUPPORT_YES) { | ||||
| 851 | |||||
| 852 | if (!a->link->manager->llmnr_host_ipv4_key) { | ||||
| 853 | a->link->manager->llmnr_host_ipv4_key = dns_resource_key_new(DNS_CLASS_IN, DNS_TYPE_A, a->link->manager->llmnr_hostname); | ||||
| 854 | if (!a->link->manager->llmnr_host_ipv4_key) { | ||||
| 855 | r = -ENOMEM12; | ||||
| 856 | goto fail; | ||||
| 857 | } | ||||
| 858 | } | ||||
| 859 | |||||
| 860 | if (!a->llmnr_address_rr) { | ||||
| 861 | a->llmnr_address_rr = dns_resource_record_new(a->link->manager->llmnr_host_ipv4_key); | ||||
| 862 | if (!a->llmnr_address_rr) { | ||||
| 863 | r = -ENOMEM12; | ||||
| 864 | goto fail; | ||||
| 865 | } | ||||
| 866 | |||||
| 867 | a->llmnr_address_rr->a.in_addr = a->in_addr.in; | ||||
| 868 | a->llmnr_address_rr->ttl = LLMNR_DEFAULT_TTL(30); | ||||
| 869 | } | ||||
| 870 | |||||
| 871 | if (!a->llmnr_ptr_rr) { | ||||
| 872 | r = dns_resource_record_new_reverse(&a->llmnr_ptr_rr, a->family, &a->in_addr, a->link->manager->llmnr_hostname); | ||||
| 873 | if (r < 0) | ||||
| 874 | goto fail; | ||||
| 875 | |||||
| 876 | a->llmnr_ptr_rr->ttl = LLMNR_DEFAULT_TTL(30); | ||||
| 877 | } | ||||
| 878 | |||||
| 879 | r = dns_zone_put(&a->link->llmnr_ipv4_scope->zone, a->link->llmnr_ipv4_scope, a->llmnr_address_rr, true1); | ||||
| 880 | if (r < 0) | ||||
| 881 | log_warning_errno(r, "Failed to add A record to LLMNR zone: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 881, __func__, "Failed to add A record to LLMNR zone: %m" ) : -abs(_e); }); | ||||
| 882 | |||||
| 883 | r = dns_zone_put(&a->link->llmnr_ipv4_scope->zone, a->link->llmnr_ipv4_scope, a->llmnr_ptr_rr, false0); | ||||
| 884 | if (r < 0) | ||||
| 885 | log_warning_errno(r, "Failed to add IPv4 PTR record to LLMNR zone: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 885, __func__, "Failed to add IPv4 PTR record to LLMNR zone: %m" ) : -abs(_e); }); | ||||
| 886 | } else { | ||||
| 887 | if (a->llmnr_address_rr) { | ||||
| 888 | if (a->link->llmnr_ipv4_scope) | ||||
| 889 | dns_zone_remove_rr(&a->link->llmnr_ipv4_scope->zone, a->llmnr_address_rr); | ||||
| 890 | a->llmnr_address_rr = dns_resource_record_unref(a->llmnr_address_rr); | ||||
| 891 | } | ||||
| 892 | |||||
| 893 | if (a->llmnr_ptr_rr) { | ||||
| 894 | if (a->link->llmnr_ipv4_scope) | ||||
| 895 | dns_zone_remove_rr(&a->link->llmnr_ipv4_scope->zone, a->llmnr_ptr_rr); | ||||
| 896 | a->llmnr_ptr_rr = dns_resource_record_unref(a->llmnr_ptr_rr); | ||||
| 897 | } | ||||
| 898 | } | ||||
| 899 | |||||
| 900 | if (!force_remove && | ||||
| 901 | link_address_relevant(a, true1) && | ||||
| 902 | a->link->mdns_ipv4_scope && | ||||
| 903 | a->link->mdns_support == RESOLVE_SUPPORT_YES && | ||||
| 904 | a->link->manager->mdns_support == RESOLVE_SUPPORT_YES) { | ||||
| 905 | if (!a->link->manager->mdns_host_ipv4_key) { | ||||
| 906 | a->link->manager->mdns_host_ipv4_key = dns_resource_key_new(DNS_CLASS_IN, DNS_TYPE_A, a->link->manager->mdns_hostname); | ||||
| 907 | if (!a->link->manager->mdns_host_ipv4_key) { | ||||
| 908 | r = -ENOMEM12; | ||||
| 909 | goto fail; | ||||
| 910 | } | ||||
| 911 | } | ||||
| 912 | |||||
| 913 | if (!a->mdns_address_rr) { | ||||
| 914 | a->mdns_address_rr = dns_resource_record_new(a->link->manager->mdns_host_ipv4_key); | ||||
| 915 | if (!a->mdns_address_rr) { | ||||
| 916 | r = -ENOMEM12; | ||||
| 917 | goto fail; | ||||
| 918 | } | ||||
| 919 | |||||
| 920 | a->mdns_address_rr->a.in_addr = a->in_addr.in; | ||||
| 921 | a->mdns_address_rr->ttl = MDNS_DEFAULT_TTL(120); | ||||
| 922 | } | ||||
| 923 | |||||
| 924 | if (!a->mdns_ptr_rr) { | ||||
| 925 | r = dns_resource_record_new_reverse(&a->mdns_ptr_rr, a->family, &a->in_addr, a->link->manager->mdns_hostname); | ||||
| 926 | if (r < 0) | ||||
| 927 | goto fail; | ||||
| 928 | |||||
| 929 | a->mdns_ptr_rr->ttl = MDNS_DEFAULT_TTL(120); | ||||
| 930 | } | ||||
| 931 | |||||
| 932 | r = dns_zone_put(&a->link->mdns_ipv4_scope->zone, a->link->mdns_ipv4_scope, a->mdns_address_rr, true1); | ||||
| 933 | if (r < 0) | ||||
| 934 | log_warning_errno(r, "Failed to add A record to MDNS zone: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 934, __func__, "Failed to add A record to MDNS zone: %m" ) : -abs(_e); }); | ||||
| 935 | |||||
| 936 | r = dns_zone_put(&a->link->mdns_ipv4_scope->zone, a->link->mdns_ipv4_scope, a->mdns_ptr_rr, false0); | ||||
| 937 | if (r < 0) | ||||
| 938 | log_warning_errno(r, "Failed to add IPv4 PTR record to MDNS zone: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 938, __func__, "Failed to add IPv4 PTR record to MDNS zone: %m" ) : -abs(_e); }); | ||||
| 939 | } else { | ||||
| 940 | if (a->mdns_address_rr) { | ||||
| 941 | if (a->link->mdns_ipv4_scope) | ||||
| 942 | dns_zone_remove_rr(&a->link->mdns_ipv4_scope->zone, a->mdns_address_rr); | ||||
| 943 | a->mdns_address_rr = dns_resource_record_unref(a->mdns_address_rr); | ||||
| 944 | } | ||||
| 945 | |||||
| 946 | if (a->mdns_ptr_rr) { | ||||
| 947 | if (a->link->mdns_ipv4_scope) | ||||
| 948 | dns_zone_remove_rr(&a->link->mdns_ipv4_scope->zone, a->mdns_ptr_rr); | ||||
| 949 | a->mdns_ptr_rr = dns_resource_record_unref(a->mdns_ptr_rr); | ||||
| 950 | } | ||||
| 951 | } | ||||
| 952 | } | ||||
| 953 | |||||
| 954 | if (a->family == AF_INET610) { | ||||
| 955 | |||||
| 956 | if (!force_remove && | ||||
| 957 | link_address_relevant(a, true1) && | ||||
| 958 | a->link->llmnr_ipv6_scope && | ||||
| 959 | a->link->llmnr_support == RESOLVE_SUPPORT_YES && | ||||
| 960 | a->link->manager->llmnr_support == RESOLVE_SUPPORT_YES) { | ||||
| 961 | |||||
| 962 | if (!a->link->manager->llmnr_host_ipv6_key) { | ||||
| 963 | a->link->manager->llmnr_host_ipv6_key = dns_resource_key_new(DNS_CLASS_IN, DNS_TYPE_AAAA, a->link->manager->llmnr_hostname); | ||||
| 964 | if (!a->link->manager->llmnr_host_ipv6_key) { | ||||
| 965 | r = -ENOMEM12; | ||||
| 966 | goto fail; | ||||
| 967 | } | ||||
| 968 | } | ||||
| 969 | |||||
| 970 | if (!a->llmnr_address_rr) { | ||||
| 971 | a->llmnr_address_rr = dns_resource_record_new(a->link->manager->llmnr_host_ipv6_key); | ||||
| 972 | if (!a->llmnr_address_rr) { | ||||
| 973 | r = -ENOMEM12; | ||||
| 974 | goto fail; | ||||
| 975 | } | ||||
| 976 | |||||
| 977 | a->llmnr_address_rr->aaaa.in6_addr = a->in_addr.in6; | ||||
| 978 | a->llmnr_address_rr->ttl = LLMNR_DEFAULT_TTL(30); | ||||
| 979 | } | ||||
| 980 | |||||
| 981 | if (!a->llmnr_ptr_rr) { | ||||
| 982 | r = dns_resource_record_new_reverse(&a->llmnr_ptr_rr, a->family, &a->in_addr, a->link->manager->llmnr_hostname); | ||||
| 983 | if (r < 0) | ||||
| 984 | goto fail; | ||||
| 985 | |||||
| 986 | a->llmnr_ptr_rr->ttl = LLMNR_DEFAULT_TTL(30); | ||||
| 987 | } | ||||
| 988 | |||||
| 989 | r = dns_zone_put(&a->link->llmnr_ipv6_scope->zone, a->link->llmnr_ipv6_scope, a->llmnr_address_rr, true1); | ||||
| 990 | if (r < 0) | ||||
| 991 | log_warning_errno(r, "Failed to add AAAA record to LLMNR zone: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 991, __func__, "Failed to add AAAA record to LLMNR zone: %m" ) : -abs(_e); }); | ||||
| 992 | |||||
| 993 | r = dns_zone_put(&a->link->llmnr_ipv6_scope->zone, a->link->llmnr_ipv6_scope, a->llmnr_ptr_rr, false0); | ||||
| 994 | if (r < 0) | ||||
| 995 | log_warning_errno(r, "Failed to add IPv6 PTR record to LLMNR zone: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 995, __func__, "Failed to add IPv6 PTR record to LLMNR zone: %m" ) : -abs(_e); }); | ||||
| 996 | } else { | ||||
| 997 | if (a->llmnr_address_rr) { | ||||
| 998 | if (a->link->llmnr_ipv6_scope) | ||||
| 999 | dns_zone_remove_rr(&a->link->llmnr_ipv6_scope->zone, a->llmnr_address_rr); | ||||
| 1000 | a->llmnr_address_rr = dns_resource_record_unref(a->llmnr_address_rr); | ||||
| 1001 | } | ||||
| 1002 | |||||
| 1003 | if (a->llmnr_ptr_rr) { | ||||
| 1004 | if (a->link->llmnr_ipv6_scope) | ||||
| 1005 | dns_zone_remove_rr(&a->link->llmnr_ipv6_scope->zone, a->llmnr_ptr_rr); | ||||
| 1006 | a->llmnr_ptr_rr = dns_resource_record_unref(a->llmnr_ptr_rr); | ||||
| 1007 | } | ||||
| 1008 | } | ||||
| 1009 | |||||
| 1010 | if (!force_remove && | ||||
| 1011 | link_address_relevant(a, true1) && | ||||
| 1012 | a->link->mdns_ipv6_scope && | ||||
| 1013 | a->link->mdns_support == RESOLVE_SUPPORT_YES && | ||||
| 1014 | a->link->manager->mdns_support == RESOLVE_SUPPORT_YES) { | ||||
| 1015 | |||||
| 1016 | if (!a->link->manager->mdns_host_ipv6_key) { | ||||
| 1017 | a->link->manager->mdns_host_ipv6_key = dns_resource_key_new(DNS_CLASS_IN, DNS_TYPE_AAAA, a->link->manager->mdns_hostname); | ||||
| 1018 | if (!a->link->manager->mdns_host_ipv6_key) { | ||||
| 1019 | r = -ENOMEM12; | ||||
| 1020 | goto fail; | ||||
| 1021 | } | ||||
| 1022 | } | ||||
| 1023 | |||||
| 1024 | if (!a->mdns_address_rr) { | ||||
| 1025 | a->mdns_address_rr = dns_resource_record_new(a->link->manager->mdns_host_ipv6_key); | ||||
| 1026 | if (!a->mdns_address_rr) { | ||||
| 1027 | r = -ENOMEM12; | ||||
| 1028 | goto fail; | ||||
| 1029 | } | ||||
| 1030 | |||||
| 1031 | a->mdns_address_rr->aaaa.in6_addr = a->in_addr.in6; | ||||
| 1032 | a->mdns_address_rr->ttl = MDNS_DEFAULT_TTL(120); | ||||
| 1033 | } | ||||
| 1034 | |||||
| 1035 | if (!a->mdns_ptr_rr) { | ||||
| 1036 | r = dns_resource_record_new_reverse(&a->mdns_ptr_rr, a->family, &a->in_addr, a->link->manager->mdns_hostname); | ||||
| 1037 | if (r < 0) | ||||
| 1038 | goto fail; | ||||
| 1039 | |||||
| 1040 | a->mdns_ptr_rr->ttl = MDNS_DEFAULT_TTL(120); | ||||
| 1041 | } | ||||
| 1042 | |||||
| 1043 | r = dns_zone_put(&a->link->mdns_ipv6_scope->zone, a->link->mdns_ipv6_scope, a->mdns_address_rr, true1); | ||||
| 1044 | if (r < 0) | ||||
| 1045 | log_warning_errno(r, "Failed to add AAAA record to MDNS zone: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 1045, __func__, "Failed to add AAAA record to MDNS zone: %m" ) : -abs(_e); }); | ||||
| 1046 | |||||
| 1047 | r = dns_zone_put(&a->link->mdns_ipv6_scope->zone, a->link->mdns_ipv6_scope, a->mdns_ptr_rr, false0); | ||||
| 1048 | if (r < 0) | ||||
| 1049 | log_warning_errno(r, "Failed to add IPv6 PTR record to MDNS zone: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 1049, __func__, "Failed to add IPv6 PTR record to MDNS zone: %m" ) : -abs(_e); }); | ||||
| 1050 | } else { | ||||
| 1051 | if (a->mdns_address_rr) { | ||||
| 1052 | if (a->link->mdns_ipv6_scope) | ||||
| 1053 | dns_zone_remove_rr(&a->link->mdns_ipv6_scope->zone, a->mdns_address_rr); | ||||
| 1054 | a->mdns_address_rr = dns_resource_record_unref(a->mdns_address_rr); | ||||
| 1055 | } | ||||
| 1056 | |||||
| 1057 | if (a->mdns_ptr_rr) { | ||||
| 1058 | if (a->link->mdns_ipv6_scope) | ||||
| 1059 | dns_zone_remove_rr(&a->link->mdns_ipv6_scope->zone, a->mdns_ptr_rr); | ||||
| 1060 | a->mdns_ptr_rr = dns_resource_record_unref(a->mdns_ptr_rr); | ||||
| 1061 | } | ||||
| 1062 | } | ||||
| 1063 | } | ||||
| 1064 | |||||
| 1065 | return; | ||||
| 1066 | |||||
| 1067 | fail: | ||||
| 1068 | log_debug_errno(r, "Failed to update address RRs: %m")({ int _level = ((7)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 1068, __func__, "Failed to update address RRs: %m" ) : -abs(_e); }); | ||||
| 1069 | } | ||||
| 1070 | |||||
| 1071 | int link_address_update_rtnl(LinkAddress *a, sd_netlink_message *m) { | ||||
| 1072 | int r; | ||||
| 1073 | assert(a)do { if ((__builtin_expect(!!(!(a)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("a"), "../src/resolve/resolved-link.c", 1073 , __PRETTY_FUNCTION__); } while (0); | ||||
| 1074 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/resolve/resolved-link.c", 1074 , __PRETTY_FUNCTION__); } while (0); | ||||
| 1075 | |||||
| 1076 | r = sd_rtnl_message_addr_get_flags(m, &a->flags); | ||||
| 1077 | if (r < 0) | ||||
| 1078 | return r; | ||||
| 1079 | |||||
| 1080 | sd_rtnl_message_addr_get_scope(m, &a->scope); | ||||
| 1081 | |||||
| 1082 | link_allocate_scopes(a->link); | ||||
| 1083 | link_add_rrs(a->link, false0); | ||||
| 1084 | |||||
| 1085 | return 0; | ||||
| 1086 | } | ||||
| 1087 | |||||
| 1088 | bool_Bool link_address_relevant(LinkAddress *a, bool_Bool local_multicast) { | ||||
| 1089 | assert(a)do { if ((__builtin_expect(!!(!(a)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("a"), "../src/resolve/resolved-link.c", 1089 , __PRETTY_FUNCTION__); } while (0); | ||||
| 1090 | |||||
| 1091 | if (a->flags & (IFA_F_DEPRECATED0x20|IFA_F_TENTATIVE0x40)) | ||||
| 1092 | return false0; | ||||
| 1093 | |||||
| 1094 | if (a->scope >= (local_multicast ? RT_SCOPE_HOST : RT_SCOPE_LINK)) | ||||
| 1095 | return false0; | ||||
| 1096 | |||||
| 1097 | return true1; | ||||
| 1098 | } | ||||
| 1099 | |||||
| 1100 | static bool_Bool link_needs_save(Link *l) { | ||||
| 1101 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 1101 , __PRETTY_FUNCTION__); } while (0); | ||||
| 1102 | |||||
| 1103 | /* Returns true if any of the settings where set different from the default */ | ||||
| 1104 | |||||
| 1105 | if (l->is_managed) | ||||
| 1106 | return false0; | ||||
| 1107 | |||||
| 1108 | if (l->llmnr_support != RESOLVE_SUPPORT_YES || | ||||
| 1109 | l->mdns_support != RESOLVE_SUPPORT_NO || | ||||
| 1110 | l->dnssec_mode != _DNSSEC_MODE_INVALID) | ||||
| 1111 | return true1; | ||||
| 1112 | |||||
| 1113 | if (l->dns_servers || | ||||
| 1114 | l->search_domains) | ||||
| 1115 | return true1; | ||||
| 1116 | |||||
| 1117 | if (!set_isempty(l->dnssec_negative_trust_anchors)) | ||||
| 1118 | return true1; | ||||
| 1119 | |||||
| 1120 | return false0; | ||||
| 1121 | } | ||||
| 1122 | |||||
| 1123 | int link_save_user(Link *l) { | ||||
| 1124 | _cleanup_free___attribute__((cleanup(freep))) char *temp_path = NULL((void*)0); | ||||
| 1125 | _cleanup_fclose___attribute__((cleanup(fclosep))) FILE *f = NULL((void*)0); | ||||
| 1126 | const char *v; | ||||
| 1127 | int r; | ||||
| 1128 | |||||
| 1129 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 1129 , __PRETTY_FUNCTION__); } while (0); | ||||
| 1130 | assert(l->state_file)do { if ((__builtin_expect(!!(!(l->state_file)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l->state_file"), "../src/resolve/resolved-link.c" , 1130, __PRETTY_FUNCTION__); } while (0); | ||||
| 1131 | |||||
| 1132 | if (!link_needs_save(l)) { | ||||
| 1133 | (void) unlink(l->state_file); | ||||
| 1134 | return 0; | ||||
| 1135 | } | ||||
| 1136 | |||||
| 1137 | r = mkdir_parents(l->state_file, 0700); | ||||
| 1138 | if (r < 0) | ||||
| 1139 | goto fail; | ||||
| 1140 | |||||
| 1141 | r = fopen_temporary(l->state_file, &f, &temp_path); | ||||
| 1142 | if (r < 0) | ||||
| 1143 | goto fail; | ||||
| 1144 | |||||
| 1145 | (void) __fsetlocking(f, FSETLOCKING_BYCALLERFSETLOCKING_BYCALLER); | ||||
| 1146 | (void) fchmod(fileno(f), 0644); | ||||
| 1147 | |||||
| 1148 | fputs("# This is private data. Do not parse.\n", f); | ||||
| 1149 | |||||
| 1150 | v = resolve_support_to_string(l->llmnr_support); | ||||
| 1151 | if (v) | ||||
| 1152 | fprintf(f, "LLMNR=%s\n", v); | ||||
| 1153 | |||||
| 1154 | v = resolve_support_to_string(l->mdns_support); | ||||
| 1155 | if (v) | ||||
| 1156 | fprintf(f, "MDNS=%s\n", v); | ||||
| 1157 | |||||
| 1158 | v = dnssec_mode_to_string(l->dnssec_mode); | ||||
| 1159 | if (v) | ||||
| 1160 | fprintf(f, "DNSSEC=%s\n", v); | ||||
| 1161 | |||||
| 1162 | if (l->dns_servers) { | ||||
| 1163 | DnsServer *server; | ||||
| 1164 | |||||
| 1165 | fputs("SERVERS=", f); | ||||
| 1166 | LIST_FOREACH(servers, server, l->dns_servers)for ((server) = (l->dns_servers); (server); (server) = (server )->servers_next) { | ||||
| 1167 | |||||
| 1168 | if (server != l->dns_servers) | ||||
| 1169 | fputc(' ', f); | ||||
| 1170 | |||||
| 1171 | v = dns_server_string(server); | ||||
| 1172 | if (!v) { | ||||
| 1173 | r = -ENOMEM12; | ||||
| 1174 | goto fail; | ||||
| 1175 | } | ||||
| 1176 | |||||
| 1177 | fputs(v, f); | ||||
| 1178 | } | ||||
| 1179 | fputc('\n', f); | ||||
| 1180 | } | ||||
| 1181 | |||||
| 1182 | if (l->search_domains) { | ||||
| 1183 | DnsSearchDomain *domain; | ||||
| 1184 | |||||
| 1185 | fputs("DOMAINS=", f); | ||||
| 1186 | LIST_FOREACH(domains, domain, l->search_domains)for ((domain) = (l->search_domains); (domain); (domain) = ( domain)->domains_next) { | ||||
| 1187 | |||||
| 1188 | if (domain != l->search_domains) | ||||
| 1189 | fputc(' ', f); | ||||
| 1190 | |||||
| 1191 | if (domain->route_only) | ||||
| 1192 | fputc('~', f); | ||||
| 1193 | |||||
| 1194 | fputs(DNS_SEARCH_DOMAIN_NAME(domain), f); | ||||
| 1195 | } | ||||
| 1196 | fputc('\n', f); | ||||
| 1197 | } | ||||
| 1198 | |||||
| 1199 | if (!set_isempty(l->dnssec_negative_trust_anchors)) { | ||||
| 1200 | bool_Bool space = false0; | ||||
| 1201 | Iterator i; | ||||
| 1202 | char *nta; | ||||
| 1203 | |||||
| 1204 | fputs("NTAS=", f); | ||||
| 1205 | SET_FOREACH(nta, l->dnssec_negative_trust_anchors, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); set_iterate((l->dnssec_negative_trust_anchors ), &(i), (void**)&(nta)); ) { | ||||
| 1206 | |||||
| 1207 | if (space) | ||||
| 1208 | fputc(' ', f); | ||||
| 1209 | |||||
| 1210 | fputs(nta, f); | ||||
| 1211 | space = true1; | ||||
| 1212 | } | ||||
| 1213 | fputc('\n', f); | ||||
| 1214 | } | ||||
| 1215 | |||||
| 1216 | r = fflush_and_check(f); | ||||
| 1217 | if (r < 0) | ||||
| 1218 | goto fail; | ||||
| 1219 | |||||
| 1220 | if (rename(temp_path, l->state_file) < 0) { | ||||
| 1221 | r = -errno(*__errno_location ()); | ||||
| 1222 | goto fail; | ||||
| 1223 | } | ||||
| 1224 | |||||
| 1225 | return 0; | ||||
| 1226 | |||||
| 1227 | fail: | ||||
| 1228 | (void) unlink(l->state_file); | ||||
| 1229 | |||||
| 1230 | if (temp_path) | ||||
| 1231 | (void) unlink(temp_path); | ||||
| 1232 | |||||
| 1233 | return log_error_errno(r, "Failed to save link data %s: %m", l->state_file)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 1233, __func__, "Failed to save link data %s: %m" , l->state_file) : -abs(_e); }); | ||||
| 1234 | } | ||||
| 1235 | |||||
| 1236 | int link_load_user(Link *l) { | ||||
| 1237 | _cleanup_free___attribute__((cleanup(freep))) char | ||||
| 1238 | *llmnr = NULL((void*)0), | ||||
| 1239 | *mdns = NULL((void*)0), | ||||
| 1240 | *dnssec = NULL((void*)0), | ||||
| 1241 | *servers = NULL((void*)0), | ||||
| 1242 | *domains = NULL((void*)0), | ||||
| 1243 | *ntas = NULL((void*)0); | ||||
| 1244 | |||||
| 1245 | ResolveSupport s; | ||||
| 1246 | const char *p; | ||||
| 1247 | int r; | ||||
| 1248 | |||||
| 1249 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 1249 , __PRETTY_FUNCTION__); } while (0); | ||||
| 1250 | assert(l->state_file)do { if ((__builtin_expect(!!(!(l->state_file)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l->state_file"), "../src/resolve/resolved-link.c" , 1250, __PRETTY_FUNCTION__); } while (0); | ||||
| 1251 | |||||
| 1252 | /* Try to load only a single time */ | ||||
| 1253 | if (l->loaded) | ||||
| 1254 | return 0; | ||||
| 1255 | l->loaded = true1; | ||||
| 1256 | |||||
| 1257 | if (l->is_managed) | ||||
| 1258 | return 0; /* if the device is managed, then networkd is our configuration source, not the bus API */ | ||||
| 1259 | |||||
| 1260 | r = parse_env_file(NULL((void*)0), l->state_file, NEWLINE"\n\r", | ||||
| 1261 | "LLMNR", &llmnr, | ||||
| 1262 | "MDNS", &mdns, | ||||
| 1263 | "DNSSEC", &dnssec, | ||||
| 1264 | "SERVERS", &servers, | ||||
| 1265 | "DOMAINS", &domains, | ||||
| 1266 | "NTAS", &ntas, | ||||
| 1267 | NULL((void*)0)); | ||||
| 1268 | if (r == -ENOENT2) | ||||
| 1269 | return 0; | ||||
| 1270 | if (r < 0) | ||||
| 1271 | goto fail; | ||||
| 1272 | |||||
| 1273 | link_flush_settings(l); | ||||
| 1274 | |||||
| 1275 | /* If we can't recognize the LLMNR or MDNS setting we don't override the default */ | ||||
| 1276 | s = resolve_support_from_string(llmnr); | ||||
| 1277 | if (s >= 0) | ||||
| 1278 | l->llmnr_support = s; | ||||
| 1279 | |||||
| 1280 | s = resolve_support_from_string(mdns); | ||||
| 1281 | if (s >= 0) | ||||
| 1282 | l->mdns_support = s; | ||||
| 1283 | |||||
| 1284 | /* If we can't recognize the DNSSEC setting, then set it to invalid, so that the daemon default is used. */ | ||||
| 1285 | l->dnssec_mode = dnssec_mode_from_string(dnssec); | ||||
| 1286 | |||||
| 1287 | for (p = servers;;) { | ||||
| 1288 | _cleanup_free___attribute__((cleanup(freep))) char *word = NULL((void*)0); | ||||
| 1289 | |||||
| 1290 | r = extract_first_word(&p, &word, NULL((void*)0), 0); | ||||
| 1291 | if (r < 0) | ||||
| 1292 | goto fail; | ||||
| 1293 | if (r == 0) | ||||
| 1294 | break; | ||||
| 1295 | |||||
| 1296 | r = link_update_dns_server_one(l, word); | ||||
| 1297 | if (r < 0) { | ||||
| 1298 | log_debug_errno(r, "Failed to load DNS server '%s', ignoring: %m", word)({ int _level = ((7)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 1298, __func__, "Failed to load DNS server '%s', ignoring: %m" , word) : -abs(_e); }); | ||||
| 1299 | continue; | ||||
| 1300 | } | ||||
| 1301 | } | ||||
| 1302 | |||||
| 1303 | for (p = domains;;) { | ||||
| 1304 | _cleanup_free___attribute__((cleanup(freep))) char *word = NULL((void*)0); | ||||
| 1305 | const char *n; | ||||
| 1306 | bool_Bool is_route; | ||||
| 1307 | |||||
| 1308 | r = extract_first_word(&p, &word, NULL((void*)0), 0); | ||||
| 1309 | if (r < 0) | ||||
| 1310 | goto fail; | ||||
| 1311 | if (r == 0) | ||||
| 1312 | break; | ||||
| 1313 | |||||
| 1314 | is_route = word[0] == '~'; | ||||
| 1315 | n = is_route ? word + 1 : word; | ||||
| 1316 | |||||
| 1317 | r = link_update_search_domain_one(l, n, is_route); | ||||
| 1318 | if (r < 0) { | ||||
| 1319 | log_debug_errno(r, "Failed to load search domain '%s', ignoring: %m", word)({ int _level = ((7)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 1319, __func__, "Failed to load search domain '%s', ignoring: %m" , word) : -abs(_e); }); | ||||
| 1320 | continue; | ||||
| 1321 | } | ||||
| 1322 | } | ||||
| 1323 | |||||
| 1324 | if (ntas) { | ||||
| 1325 | _cleanup_set_free_free___attribute__((cleanup(set_free_freep))) Set *ns = NULL((void*)0); | ||||
| 1326 | |||||
| 1327 | ns = set_new(&dns_name_hash_ops)internal_set_new(&dns_name_hash_ops ); | ||||
| 1328 | if (!ns) { | ||||
| 1329 | r = -ENOMEM12; | ||||
| 1330 | goto fail; | ||||
| 1331 | } | ||||
| 1332 | |||||
| 1333 | r = set_put_strsplit(ns, ntas, NULL((void*)0), 0); | ||||
| 1334 | if (r < 0) | ||||
| 1335 | goto fail; | ||||
| 1336 | |||||
| 1337 | l->dnssec_negative_trust_anchors = TAKE_PTR(ns)({ typeof(ns) _ptr_ = (ns); (ns) = ((void*)0); _ptr_; }); | ||||
| 1338 | } | ||||
| 1339 | |||||
| 1340 | return 0; | ||||
| 1341 | |||||
| 1342 | fail: | ||||
| 1343 | return log_error_errno(r, "Failed to load link data %s: %m", l->state_file)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/resolve/resolved-link.c", 1343, __func__, "Failed to load link data %s: %m" , l->state_file) : -abs(_e); }); | ||||
| 1344 | } | ||||
| 1345 | |||||
| 1346 | void link_remove_user(Link *l) { | ||||
| 1347 | assert(l)do { if ((__builtin_expect(!!(!(l)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l"), "../src/resolve/resolved-link.c", 1347 , __PRETTY_FUNCTION__); } while (0); | ||||
| 1348 | assert(l->state_file)do { if ((__builtin_expect(!!(!(l->state_file)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("l->state_file"), "../src/resolve/resolved-link.c" , 1348, __PRETTY_FUNCTION__); } while (0); | ||||
| 1349 | |||||
| 1350 | (void) unlink(l->state_file); | ||||
| 1351 | } |
| 1 | /* SPDX-License-Identifier: LGPL-2.1+ */ |
| 2 | #pragma once |
| 3 | |
| 4 | #include <alloca.h> |
| 5 | #include <stddef.h> |
| 6 | #include <stdlib.h> |
| 7 | #include <string.h> |
| 8 | |
| 9 | #include "macro.h" |
| 10 | |
| 11 | #define new(t, n)((t*) malloc_multiply(sizeof(t), (n))) ((t*) malloc_multiply(sizeof(t), (n))) |
| 12 | |
| 13 | #define new0(t, n)((t*) calloc((n), sizeof(t))) ((t*) calloc((n), sizeof(t))) |
| 14 | |
| 15 | #define newa(t, n)({ do { if ((__builtin_expect(!!(!(!size_multiply_overflow(sizeof (t), n))),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("!size_multiply_overflow(sizeof(t), n)" ), "../src/basic/alloc-util.h", 15, __PRETTY_FUNCTION__); } while (0); (t*) __builtin_alloca (sizeof(t)*(n)); }) \ |
| 16 | ({ \ |
| 17 | assert(!size_multiply_overflow(sizeof(t), n))do { if ((__builtin_expect(!!(!(!size_multiply_overflow(sizeof (t), n))),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("!size_multiply_overflow(sizeof(t), n)" ), "../src/basic/alloc-util.h", 17, __PRETTY_FUNCTION__); } while (0); \ |
| 18 | (t*) alloca(sizeof(t)*(n))__builtin_alloca (sizeof(t)*(n)); \ |
| 19 | }) |
| 20 | |
| 21 | #define newa0(t, n)({ do { if ((__builtin_expect(!!(!(!size_multiply_overflow(sizeof (t), n))),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("!size_multiply_overflow(sizeof(t), n)" ), "../src/basic/alloc-util.h", 21, __PRETTY_FUNCTION__); } while (0); (t*) ({ char *_new_; size_t _len_ = sizeof(t)*(n); _new_ = __builtin_alloca (_len_); (void *) memset(_new_, 0, _len_) ; }); }) \ |
| 22 | ({ \ |
| 23 | assert(!size_multiply_overflow(sizeof(t), n))do { if ((__builtin_expect(!!(!(!size_multiply_overflow(sizeof (t), n))),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("!size_multiply_overflow(sizeof(t), n)" ), "../src/basic/alloc-util.h", 23, __PRETTY_FUNCTION__); } while (0); \ |
| 24 | (t*) alloca0(sizeof(t)*(n))({ char *_new_; size_t _len_ = sizeof(t)*(n); _new_ = __builtin_alloca (_len_); (void *) memset(_new_, 0, _len_); }); \ |
| 25 | }) |
| 26 | |
| 27 | #define newdup(t, p, n)((t*) memdup_multiply(p, sizeof(t), (n))) ((t*) memdup_multiply(p, sizeof(t), (n))) |
| 28 | |
| 29 | #define newdup_suffix0(t, p, n)((t*) memdup_suffix0_multiply(p, sizeof(t), (n))) ((t*) memdup_suffix0_multiply(p, sizeof(t), (n))) |
| 30 | |
| 31 | #define malloc0(n)(calloc(1, (n))) (calloc(1, (n))) |
| 32 | |
| 33 | static inline void *mfree(void *memory) { |
| 34 | free(memory); |
| 35 | return NULL((void*)0); |
| 36 | } |
| 37 | |
| 38 | #define free_and_replace(a, b)({ free(a); (a) = (b); (b) = ((void*)0); 0; }) \ |
| 39 | ({ \ |
| 40 | free(a); \ |
| 41 | (a) = (b); \ |
| 42 | (b) = NULL((void*)0); \ |
| 43 | 0; \ |
| 44 | }) |
| 45 | |
| 46 | void* memdup(const void *p, size_t l) _alloc_(2); |
| 47 | void* memdup_suffix0(const void *p, size_t l) _alloc_(2); |
| 48 | |
| 49 | static inline void freep(void *p) { |
| 50 | free(*(void**) p); |
| 51 | } |
| 52 | |
| 53 | #define _cleanup_free___attribute__((cleanup(freep))) _cleanup_(freep)__attribute__((cleanup(freep))) |
| 54 | |
| 55 | static inline bool_Bool size_multiply_overflow(size_t size, size_t need) { |
| 56 | return _unlikely_(need != 0 && size > (SIZE_MAX / need))(__builtin_expect(!!(need != 0 && size > ((18446744073709551615UL ) / need)),0)); |
| 57 | } |
| 58 | |
| 59 | _malloc___attribute__ ((malloc)) _alloc_(1, 2) static inline void *malloc_multiply(size_t size, size_t need) { |
| 60 | if (size_multiply_overflow(size, need)) |
| 61 | return NULL((void*)0); |
| 62 | |
| 63 | return malloc(size * need); |
| 64 | } |
| 65 | |
| 66 | #if !HAVE_REALLOCARRAY1 |
| 67 | _alloc_(2, 3) static inline void *reallocarray(void *p, size_t need, size_t size) { |
| 68 | if (size_multiply_overflow(size, need)) |
| 69 | return NULL((void*)0); |
| 70 | |
| 71 | return realloc(p, size * need); |
| 72 | } |
| 73 | #endif |
| 74 | |
| 75 | _alloc_(2, 3) static inline void *memdup_multiply(const void *p, size_t size, size_t need) { |
| 76 | if (size_multiply_overflow(size, need)) |
| 77 | return NULL((void*)0); |
| 78 | |
| 79 | return memdup(p, size * need); |
| 80 | } |
| 81 | |
| 82 | _alloc_(2, 3) static inline void *memdup_suffix0_multiply(const void *p, size_t size, size_t need) { |
| 83 | if (size_multiply_overflow(size, need)) |
| 84 | return NULL((void*)0); |
| 85 | |
| 86 | return memdup_suffix0(p, size * need); |
| 87 | } |
| 88 | |
| 89 | void* greedy_realloc(void **p, size_t *allocated, size_t need, size_t size); |
| 90 | void* greedy_realloc0(void **p, size_t *allocated, size_t need, size_t size); |
| 91 | |
| 92 | #define GREEDY_REALLOC(array, allocated, need)greedy_realloc((void**) &(array), &(allocated), (need ), sizeof((array)[0])) \ |
| 93 | greedy_realloc((void**) &(array), &(allocated), (need), sizeof((array)[0])) |
| 94 | |
| 95 | #define GREEDY_REALLOC0(array, allocated, need)greedy_realloc0((void**) &(array), &(allocated), (need ), sizeof((array)[0])) \ |
| 96 | greedy_realloc0((void**) &(array), &(allocated), (need), sizeof((array)[0])) |
| 97 | |
| 98 | #define alloca0(n)({ char *_new_; size_t _len_ = n; _new_ = __builtin_alloca (_len_ ); (void *) memset(_new_, 0, _len_); }) \ |
| 99 | ({ \ |
| 100 | char *_new_; \ |
| 101 | size_t _len_ = n; \ |
| 102 | _new_ = alloca(_len_)__builtin_alloca (_len_); \ |
| 103 | (void *) memset(_new_, 0, _len_); \ |
| 104 | }) |
| 105 | |
| 106 | /* It's not clear what alignment glibc/gcc alloca() guarantee, hence provide a guaranteed safe version */ |
| 107 | #define alloca_align(size, align)({ void *_ptr_; size_t _mask_ = (align) - 1; _ptr_ = __builtin_alloca ((size) + _mask_); (void*)(((uintptr_t)_ptr_ + _mask_) & ~_mask_); }) \ |
| 108 | ({ \ |
| 109 | void *_ptr_; \ |
| 110 | size_t _mask_ = (align) - 1; \ |
| 111 | _ptr_ = alloca((size) + _mask_)__builtin_alloca ((size) + _mask_); \ |
| 112 | (void*)(((uintptr_t)_ptr_ + _mask_) & ~_mask_); \ |
| 113 | }) |
| 114 | |
| 115 | #define alloca0_align(size, align)({ void *_new_; size_t _size_ = (size); _new_ = ({ void *_ptr_ ; size_t _mask_ = ((align)) - 1; _ptr_ = __builtin_alloca ((_size_ ) + _mask_); (void*)(((uintptr_t)_ptr_ + _mask_) & ~_mask_ ); }); (void*)memset(_new_, 0, _size_); }) \ |
| 116 | ({ \ |
| 117 | void *_new_; \ |
| 118 | size_t _size_ = (size); \ |
| 119 | _new_ = alloca_align(_size_, (align))({ void *_ptr_; size_t _mask_ = ((align)) - 1; _ptr_ = __builtin_alloca ((_size_) + _mask_); (void*)(((uintptr_t)_ptr_ + _mask_) & ~_mask_); }); \ |
| 120 | (void*)memset(_new_, 0, _size_); \ |
| 121 | }) |
| 122 | |
| 123 | /* Takes inspiration from Rusts's Option::take() method: reads and returns a pointer, but at the same time resets it to |
| 124 | * NULL. See: https://doc.rust-lang.org/std/option/enum.Option.html#method.take */ |
| 125 | #define TAKE_PTR(ptr)({ typeof(ptr) _ptr_ = (ptr); (ptr) = ((void*)0); _ptr_; }) \ |
| 126 | ({ \ |
| 127 | typeof(ptr) _ptr_ = (ptr); \ |
| 128 | (ptr) = NULL((void*)0); \ |
| 129 | _ptr_; \ |
| 130 | }) |