void link_allocate_scopes(Link *l) { int r; assert(l); if (link_relevant(l, AF_UNSPEC, false) && l->dns_servers) { if (!l->unicast_scope) { r = dns_scope_new(l->manager, &l->unicast_scope, l, DNS_PROTOCOL_DNS, AF_UNSPEC); if (r < 0) log_warning_errno(r, "Failed to allocate DNS scope: %m"); } } else l->unicast_scope = dns_scope_free(l->unicast_scope); if (link_relevant(l, AF_INET, true) && l->llmnr_support != RESOLVE_SUPPORT_NO && l->manager->llmnr_support != RESOLVE_SUPPORT_NO) { if (!l->llmnr_ipv4_scope) { r = dns_scope_new(l->manager, &l->llmnr_ipv4_scope, l, DNS_PROTOCOL_LLMNR, AF_INET); if (r < 0) log_warning_errno(r, "Failed to allocate LLMNR IPv4 scope: %m"); } } else l->llmnr_ipv4_scope = dns_scope_free(l->llmnr_ipv4_scope); if (link_relevant(l, AF_INET6, true) && l->llmnr_support != RESOLVE_SUPPORT_NO && l->manager->llmnr_support != RESOLVE_SUPPORT_NO && socket_ipv6_is_supported()) { if (!l->llmnr_ipv6_scope) { r = dns_scope_new(l->manager, &l->llmnr_ipv6_scope, l, DNS_PROTOCOL_LLMNR, AF_INET6); if (r < 0) log_warning_errno(r, "Failed to allocate LLMNR IPv6 scope: %m"); } } else l->llmnr_ipv6_scope = dns_scope_free(l->llmnr_ipv6_scope); if (link_relevant(l, AF_INET, true) && l->mdns_support != RESOLVE_SUPPORT_NO && l->manager->mdns_support != RESOLVE_SUPPORT_NO) { if (!l->mdns_ipv4_scope) { r = dns_scope_new(l->manager, &l->mdns_ipv4_scope, l, DNS_PROTOCOL_MDNS, AF_INET); if (r < 0) log_warning_errno(r, "Failed to allocate mDNS IPv4 scope: %m"); } } else l->mdns_ipv4_scope = dns_scope_free(l->mdns_ipv4_scope); if (link_relevant(l, AF_INET6, true) && l->mdns_support != RESOLVE_SUPPORT_NO && l->manager->mdns_support != RESOLVE_SUPPORT_NO) { if (!l->mdns_ipv6_scope) { r = dns_scope_new(l->manager, &l->mdns_ipv6_scope, l, DNS_PROTOCOL_MDNS, AF_INET6); if (r < 0) log_warning_errno(r, "Failed to allocate mDNS IPv6 scope: %m"); } } else l->mdns_ipv6_scope = dns_scope_free(l->mdns_ipv6_scope); }
int socket_address_parse(SocketAddress *a, const char *s) { char *e, *n; unsigned u; int r; assert(a); assert(s); zero(*a); a->type = SOCK_STREAM; if (*s == '[') { /* IPv6 in [x:.....:z]:p notation */ if (!socket_ipv6_is_supported()) { log_warning("Binding to IPv6 address not available since kernel does not support IPv6."); return -EAFNOSUPPORT; } e = strchr(s+1, ']'); if (!e) return -EINVAL; n = strndupa(s+1, e-s-1); errno = 0; if (inet_pton(AF_INET6, n, &a->sockaddr.in6.sin6_addr) <= 0) return errno > 0 ? -errno : -EINVAL; e++; if (*e != ':') return -EINVAL; e++; r = safe_atou(e, &u); if (r < 0) return r; if (u <= 0 || u > 0xFFFF) return -EINVAL; a->sockaddr.in6.sin6_family = AF_INET6; a->sockaddr.in6.sin6_port = htons((uint16_t) u); a->size = sizeof(struct sockaddr_in6); } else if (*s == '/') { /* AF_UNIX socket */ size_t l; l = strlen(s); if (l >= sizeof(a->sockaddr.un.sun_path)) return -EINVAL; a->sockaddr.un.sun_family = AF_UNIX; memcpy(a->sockaddr.un.sun_path, s, l); a->size = offsetof(struct sockaddr_un, sun_path) + l + 1; } else if (*s == '@') {
static int add_adresses(int fd, int if_loopback, unsigned *requests) { union { struct sockaddr sa; struct sockaddr_nl nl; } sa; union { struct nlmsghdr header; uint8_t buf[NLMSG_ALIGN(sizeof(struct nlmsghdr)) + NLMSG_ALIGN(sizeof(struct ifaddrmsg)) + RTA_LENGTH(sizeof(struct in6_addr))]; } request; struct ifaddrmsg *ifaddrmsg; uint32_t ipv4_address = htonl(INADDR_LOOPBACK); int r; zero(request); request.header.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifaddrmsg)); request.header.nlmsg_type = RTM_NEWADDR; request.header.nlmsg_flags = NLM_F_REQUEST|NLM_F_CREATE|NLM_F_ACK; request.header.nlmsg_seq = *requests + 1; ifaddrmsg = NLMSG_DATA(&request.header); ifaddrmsg->ifa_family = AF_INET; ifaddrmsg->ifa_prefixlen = 8; ifaddrmsg->ifa_flags = IFA_F_PERMANENT; ifaddrmsg->ifa_scope = RT_SCOPE_HOST; ifaddrmsg->ifa_index = if_loopback; if ((r = add_rtattr(&request.header, sizeof(request), IFA_LOCAL, &ipv4_address, sizeof(ipv4_address))) < 0) return r; zero(sa); sa.nl.nl_family = AF_NETLINK; if (sendto_loop(fd, &request, request.header.nlmsg_len, 0, &sa.sa, sizeof(sa)) < 0) return -errno; (*requests)++; if (!socket_ipv6_is_supported()) return 0; request.header.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifaddrmsg)); request.header.nlmsg_seq = *requests + 1; ifaddrmsg->ifa_family = AF_INET6; ifaddrmsg->ifa_prefixlen = 128; if ((r = add_rtattr(&request.header, sizeof(request), IFA_LOCAL, &in6addr_loopback, sizeof(in6addr_loopback))) < 0) return r; if (sendto_loop(fd, &request, request.header.nlmsg_len, 0, &sa.sa, sizeof(sa)) < 0) return -errno; (*requests)++; return 0; }
static void test_socket_address_parse(void) { SocketAddress a; assert_se(socket_address_parse(&a, "junk") < 0); assert_se(socket_address_parse(&a, "192.168.1.1") < 0); assert_se(socket_address_parse(&a, ".168.1.1") < 0); assert_se(socket_address_parse(&a, "989.168.1.1") < 0); assert_se(socket_address_parse(&a, "192.168.1.1:65536") < 0); assert_se(socket_address_parse(&a, "192.168.1.1:0") < 0); assert_se(socket_address_parse(&a, "0") < 0); assert_se(socket_address_parse(&a, "65536") < 0); assert_se(socket_address_parse(&a, "65535") >= 0); if (socket_ipv6_is_supported()) { assert_se(socket_address_parse(&a, "[::1]") < 0); assert_se(socket_address_parse(&a, "[::1]8888") < 0); assert_se(socket_address_parse(&a, "::1") < 0); assert_se(socket_address_parse(&a, "[::1]:0") < 0); assert_se(socket_address_parse(&a, "[::1]:65536") < 0); assert_se(socket_address_parse(&a, "[a:b:1]:8888") < 0); assert_se(socket_address_parse(&a, "8888") >= 0); assert_se(a.sockaddr.sa.sa_family == AF_INET6); assert_se(socket_address_parse(&a, "[2001:0db8:0000:85a3:0000:0000:ac1f:8001]:8888") >= 0); assert_se(a.sockaddr.sa.sa_family == AF_INET6); assert_se(socket_address_parse(&a, "[::1]:8888") >= 0); assert_se(a.sockaddr.sa.sa_family == AF_INET6); } else { assert_se(socket_address_parse(&a, "[::1]:8888") < 0); assert_se(socket_address_parse(&a, "8888") >= 0); assert_se(a.sockaddr.sa.sa_family == AF_INET); } assert_se(socket_address_parse(&a, "192.168.1.254:8888") >= 0); assert_se(a.sockaddr.sa.sa_family == AF_INET); assert_se(socket_address_parse(&a, "/foo/bar") >= 0); assert_se(a.sockaddr.sa.sa_family == AF_UNIX); assert_se(socket_address_parse(&a, "@abstract") >= 0); assert_se(a.sockaddr.sa.sa_family == AF_UNIX); }
int manager_llmnr_start(Manager *m) { int r; assert(m); if (m->llmnr_support == SUPPORT_NO) return 0; r = manager_llmnr_ipv4_udp_fd(m); if (r == -EADDRINUSE) goto eaddrinuse; if (r < 0) return r; r = manager_llmnr_ipv4_tcp_fd(m); if (r == -EADDRINUSE) goto eaddrinuse; if (r < 0) return r; if (socket_ipv6_is_supported()) { r = manager_llmnr_ipv6_udp_fd(m); if (r == -EADDRINUSE) goto eaddrinuse; if (r < 0) return r; r = manager_llmnr_ipv6_tcp_fd(m); if (r == -EADDRINUSE) goto eaddrinuse; if (r < 0) return r; } return 0; eaddrinuse: log_warning("There appears to be another LLMNR responder running. Turning off LLMNR support."); m->llmnr_support = SUPPORT_NO; manager_llmnr_stop(m); return 0; }
int socket_address_listen( const SocketAddress *a, int flags, int backlog, SocketAddressBindIPv6Only only, const char *bind_to_device, bool free_bind, bool transparent, mode_t directory_mode, mode_t socket_mode, const char *label) { _cleanup_close_ int fd = -1; int r, one; assert(a); r = socket_address_verify(a); if (r < 0) return r; if (socket_address_family(a) == AF_INET6 && !socket_ipv6_is_supported()) return -EAFNOSUPPORT; if (label) { r = mac_selinux_create_socket_prepare(label); if (r < 0) return r; } fd = socket(socket_address_family(a), a->type | flags, a->protocol); r = fd < 0 ? -errno : 0; if (label) mac_selinux_create_socket_clear(); if (r < 0) return r; if (socket_address_family(a) == AF_INET6 && only != SOCKET_ADDRESS_DEFAULT) { int flag = only == SOCKET_ADDRESS_IPV6_ONLY; if (setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, &flag, sizeof(flag)) < 0) return -errno; } if (socket_address_family(a) == AF_INET || socket_address_family(a) == AF_INET6) { if (bind_to_device) if (setsockopt(fd, SOL_SOCKET, SO_BINDTODEVICE, bind_to_device, strlen(bind_to_device)+1) < 0) return -errno; if (free_bind) { one = 1; if (setsockopt(fd, IPPROTO_IP, IP_FREEBIND, &one, sizeof(one)) < 0) log_warning_errno(errno, "IP_FREEBIND failed: %m"); } if (transparent) { one = 1; if (setsockopt(fd, IPPROTO_IP, IP_TRANSPARENT, &one, sizeof(one)) < 0) log_warning_errno(errno, "IP_TRANSPARENT failed: %m"); } } one = 1; if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one)) < 0) return -errno; if (socket_address_family(a) == AF_UNIX && a->sockaddr.un.sun_path[0] != 0) { mode_t old_mask; /* Create parents */ mkdir_parents_label(a->sockaddr.un.sun_path, directory_mode); /* Enforce the right access mode for the socket */ old_mask = umask(~ socket_mode); /* Include the original umask in our mask */ umask(~socket_mode | old_mask); r = mac_selinux_bind(fd, &a->sockaddr.sa, a->size); if (r < 0 && errno == EADDRINUSE) { /* Unlink and try again */ unlink(a->sockaddr.un.sun_path); r = bind(fd, &a->sockaddr.sa, a->size); } umask(old_mask); } else r = bind(fd, &a->sockaddr.sa, a->size); if (r < 0) return -errno; if (socket_address_can_accept(a)) if (listen(fd, backlog) < 0) return -errno; r = fd; fd = -1; return r; }
static int add_adresses(int fd, int if_loopback, unsigned *requests) { union { struct sockaddr sa; struct sockaddr_nl nl; } sa = { .nl.nl_family = AF_NETLINK, }; union { struct nlmsghdr header; uint8_t buf[NLMSG_ALIGN(sizeof(struct nlmsghdr)) + NLMSG_ALIGN(sizeof(struct ifaddrmsg)) + RTA_LENGTH(sizeof(struct in6_addr))]; } request = { .header.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifaddrmsg)), .header.nlmsg_type = RTM_NEWADDR, .header.nlmsg_flags = NLM_F_REQUEST|NLM_F_CREATE|NLM_F_ACK, .header.nlmsg_seq = *requests + 1, }; struct ifaddrmsg *ifaddrmsg; uint32_t ipv4_address = htonl(INADDR_LOOPBACK); int r; ifaddrmsg = NLMSG_DATA(&request.header); ifaddrmsg->ifa_family = AF_INET; ifaddrmsg->ifa_prefixlen = 8; ifaddrmsg->ifa_flags = IFA_F_PERMANENT; ifaddrmsg->ifa_scope = RT_SCOPE_HOST; ifaddrmsg->ifa_index = if_loopback; r = add_rtattr(&request.header, sizeof(request), IFA_LOCAL, &ipv4_address, sizeof(ipv4_address)); if (r < 0) return r; if (sendto_loop(fd, &request, request.header.nlmsg_len, 0, &sa.sa, sizeof(sa)) < 0) return -errno; (*requests)++; if (!socket_ipv6_is_supported()) return 0; request.header.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifaddrmsg)); request.header.nlmsg_seq = *requests + 1; ifaddrmsg->ifa_family = AF_INET6; ifaddrmsg->ifa_prefixlen = 128; r = add_rtattr(&request.header, sizeof(request), IFA_LOCAL, &in6addr_loopback, sizeof(in6addr_loopback)); if (r < 0) return r; if (sendto_loop(fd, &request, request.header.nlmsg_len, 0, &sa.sa, sizeof(sa)) < 0) return -errno; (*requests)++; return 0; } static int start_interface(int fd, int if_loopback, unsigned *requests) { union { struct sockaddr sa; struct sockaddr_nl nl; } sa = { .nl.nl_family = AF_NETLINK, }; union { struct nlmsghdr header; uint8_t buf[NLMSG_ALIGN(sizeof(struct nlmsghdr)) + NLMSG_ALIGN(sizeof(struct ifinfomsg))]; } request = { .header.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg)), .header.nlmsg_type = RTM_NEWLINK, .header.nlmsg_flags = NLM_F_REQUEST|NLM_F_ACK, .header.nlmsg_seq = *requests + 1, }; struct ifinfomsg *ifinfomsg; ifinfomsg = NLMSG_DATA(&request.header); ifinfomsg->ifi_family = AF_UNSPEC; ifinfomsg->ifi_index = if_loopback; ifinfomsg->ifi_flags = IFF_UP; ifinfomsg->ifi_change = IFF_UP; if (sendto_loop(fd, &request, request.header.nlmsg_len, 0, &sa.sa, sizeof(sa)) < 0) return -errno; (*requests)++; return 0; } static int read_response(int fd, unsigned requests_max) { union { struct sockaddr sa; struct sockaddr_nl nl; } sa; union { struct nlmsghdr header; uint8_t buf[NLMSG_ALIGN(sizeof(struct nlmsghdr)) + NLMSG_ALIGN(sizeof(struct nlmsgerr))]; } response; ssize_t l; socklen_t sa_len = sizeof(sa); struct nlmsgerr *nlmsgerr; l = recvfrom_loop(fd, &response, sizeof(response), 0, &sa.sa, &sa_len); if (l < 0) return -errno; if (sa_len != sizeof(sa.nl) || sa.nl.nl_family != AF_NETLINK) return -EIO; if (sa.nl.nl_pid != 0) return 0; if ((size_t) l < sizeof(struct nlmsghdr)) return -EIO; if (response.header.nlmsg_type != NLMSG_ERROR || (pid_t) response.header.nlmsg_pid != getpid() || response.header.nlmsg_seq >= requests_max) return 0; if ((size_t) l < NLMSG_LENGTH(sizeof(struct nlmsgerr)) || response.header.nlmsg_len < NLMSG_LENGTH(sizeof(struct nlmsgerr))) return -EIO; nlmsgerr = NLMSG_DATA(&response.header); if (nlmsgerr->error < 0 && nlmsgerr->error != -EEXIST) return nlmsgerr->error; return response.header.nlmsg_seq; } static int check_loopback(void) { int r; _cleanup_close_ int fd; union { struct sockaddr sa; struct sockaddr_in in; } sa = { .in.sin_family = AF_INET, .in.sin_addr.s_addr = INADDR_LOOPBACK, }; /* If we failed to set up the loop back device, check whether * it might already be set up */ fd = socket(AF_INET, SOCK_DGRAM|SOCK_NONBLOCK|SOCK_CLOEXEC, 0); if (fd < 0) return -errno; if (bind(fd, &sa.sa, sizeof(sa.in)) >= 0) r = 1; else r = errno == EADDRNOTAVAIL ? 0 : -errno; return r; } int loopback_setup(void) { int r, if_loopback; union { struct sockaddr sa; struct sockaddr_nl nl; } sa = { .nl.nl_family = AF_NETLINK, }; unsigned requests = 0, i; _cleanup_close_ int fd = -1; bool eperm = false; errno = 0; if_loopback = (int) if_nametoindex("lo"); if (if_loopback <= 0) return errno ? -errno : -ENODEV; fd = socket(PF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (fd < 0) return -errno; if (bind(fd, &sa.sa, sizeof(sa)) < 0) { r = -errno; goto error; } r = add_adresses(fd, if_loopback, &requests); if (r < 0) goto error; r = start_interface(fd, if_loopback, &requests); if (r < 0) goto error; for (i = 0; i < requests; i++) { r = read_response(fd, requests); if (r == -EPERM) eperm = true; else if (r < 0) goto error; } if (eperm && check_loopback() < 0) { r = -EPERM; goto error; } return 0; error: log_warning("Failed to configure loopback device: %s", strerror(-r)); return r; }
void link_allocate_scopes(Link *l) { bool unicast_relevant; int r; assert(l); /* If a link that used to be relevant is no longer, or a link that did not use to be relevant now becomes * relevant, let's reinit the learnt global DNS server information, since we might talk to different servers * now, even if they have the same addresses as before. */ unicast_relevant = link_relevant(l, AF_UNSPEC, false); if (unicast_relevant != l->unicast_relevant) { l->unicast_relevant = unicast_relevant; dns_server_reset_features_all(l->manager->fallback_dns_servers); dns_server_reset_features_all(l->manager->dns_servers); } /* And now, allocate all scopes that makes sense now if we didn't have them yet, and drop those which we don't * need anymore */ if (unicast_relevant && l->dns_servers) { if (!l->unicast_scope) { dns_server_reset_features_all(l->dns_servers); r = dns_scope_new(l->manager, &l->unicast_scope, l, DNS_PROTOCOL_DNS, AF_UNSPEC); if (r < 0) log_warning_errno(r, "Failed to allocate DNS scope: %m"); } } else l->unicast_scope = dns_scope_free(l->unicast_scope); if (link_relevant(l, AF_INET, true) && l->llmnr_support != RESOLVE_SUPPORT_NO && l->manager->llmnr_support != RESOLVE_SUPPORT_NO) { if (!l->llmnr_ipv4_scope) { r = dns_scope_new(l->manager, &l->llmnr_ipv4_scope, l, DNS_PROTOCOL_LLMNR, AF_INET); if (r < 0) log_warning_errno(r, "Failed to allocate LLMNR IPv4 scope: %m"); } } else l->llmnr_ipv4_scope = dns_scope_free(l->llmnr_ipv4_scope); if (link_relevant(l, AF_INET6, true) && l->llmnr_support != RESOLVE_SUPPORT_NO && l->manager->llmnr_support != RESOLVE_SUPPORT_NO && socket_ipv6_is_supported()) { if (!l->llmnr_ipv6_scope) { r = dns_scope_new(l->manager, &l->llmnr_ipv6_scope, l, DNS_PROTOCOL_LLMNR, AF_INET6); if (r < 0) log_warning_errno(r, "Failed to allocate LLMNR IPv6 scope: %m"); } } else l->llmnr_ipv6_scope = dns_scope_free(l->llmnr_ipv6_scope); if (link_relevant(l, AF_INET, true) && l->mdns_support != RESOLVE_SUPPORT_NO && l->manager->mdns_support != RESOLVE_SUPPORT_NO) { if (!l->mdns_ipv4_scope) { r = dns_scope_new(l->manager, &l->mdns_ipv4_scope, l, DNS_PROTOCOL_MDNS, AF_INET); if (r < 0) log_warning_errno(r, "Failed to allocate mDNS IPv4 scope: %m"); } } else l->mdns_ipv4_scope = dns_scope_free(l->mdns_ipv4_scope); if (link_relevant(l, AF_INET6, true) && l->mdns_support != RESOLVE_SUPPORT_NO && l->manager->mdns_support != RESOLVE_SUPPORT_NO) { if (!l->mdns_ipv6_scope) { r = dns_scope_new(l->manager, &l->mdns_ipv6_scope, l, DNS_PROTOCOL_MDNS, AF_INET6); if (r < 0) log_warning_errno(r, "Failed to allocate mDNS IPv6 scope: %m"); } } else l->mdns_ipv6_scope = dns_scope_free(l->mdns_ipv6_scope); }