]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/network/networkd-link.c
Merge pull request #18007 from fw-strlen/ipv6_masq_and_dnat
[thirdparty/systemd.git] / src / network / networkd-link.c
1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
2
3 #include <netinet/in.h>
4 #include <linux/if.h>
5 #include <linux/if_arp.h>
6 #include <linux/if_link.h>
7 #include <unistd.h>
8
9 #include "alloc-util.h"
10 #include "bond.h"
11 #include "bridge.h"
12 #include "bus-util.h"
13 #include "dhcp-identifier.h"
14 #include "dhcp-lease-internal.h"
15 #include "env-file.h"
16 #include "ethtool-util.h"
17 #include "fd-util.h"
18 #include "fileio.h"
19 #include "fs-util.h"
20 #include "ipvlan.h"
21 #include "missing_network.h"
22 #include "netlink-util.h"
23 #include "network-internal.h"
24 #include "networkd-address-label.h"
25 #include "networkd-address.h"
26 #include "networkd-can.h"
27 #include "networkd-dhcp-server.h"
28 #include "networkd-dhcp4.h"
29 #include "networkd-dhcp6.h"
30 #include "networkd-fdb.h"
31 #include "networkd-ipv4ll.h"
32 #include "networkd-link-bus.h"
33 #include "networkd-link.h"
34 #include "networkd-lldp-tx.h"
35 #include "networkd-manager.h"
36 #include "networkd-mdb.h"
37 #include "networkd-ndisc.h"
38 #include "networkd-neighbor.h"
39 #include "networkd-nexthop.h"
40 #include "networkd-sriov.h"
41 #include "networkd-sysctl.h"
42 #include "networkd-radv.h"
43 #include "networkd-routing-policy-rule.h"
44 #include "networkd-wifi.h"
45 #include "set.h"
46 #include "socket-util.h"
47 #include "stat-util.h"
48 #include "stdio-util.h"
49 #include "string-table.h"
50 #include "strv.h"
51 #include "sysctl-util.h"
52 #include "tc.h"
53 #include "tmpfile-util.h"
54 #include "udev-util.h"
55 #include "util.h"
56 #include "vrf.h"
57
58 bool link_ipv4ll_enabled(Link *link) {
59 assert(link);
60
61 if (link->flags & IFF_LOOPBACK)
62 return false;
63
64 if (!link->network)
65 return false;
66
67 if (link->iftype == ARPHRD_CAN)
68 return false;
69
70 if (STRPTR_IN_SET(link->kind,
71 "vrf", "wireguard", "ipip", "gre", "ip6gre","ip6tnl", "sit", "vti",
72 "vti6", "nlmon", "xfrm", "bareudp"))
73 return false;
74
75 /* L3 or L3S mode do not support ARP. */
76 if (IN_SET(link_get_ipvlan_mode(link), NETDEV_IPVLAN_MODE_L3, NETDEV_IPVLAN_MODE_L3S))
77 return false;
78
79 if (link->network->bond)
80 return false;
81
82 return link->network->link_local & ADDRESS_FAMILY_IPV4;
83 }
84
85 bool link_ipv6ll_enabled(Link *link) {
86 assert(link);
87
88 if (!socket_ipv6_is_supported())
89 return false;
90
91 if (link->flags & IFF_LOOPBACK)
92 return false;
93
94 if (!link->network)
95 return false;
96
97 if (link->iftype == ARPHRD_CAN)
98 return false;
99
100 if (STRPTR_IN_SET(link->kind, "vrf", "wireguard", "ipip", "gre", "sit", "vti", "nlmon"))
101 return false;
102
103 if (link->network->bond)
104 return false;
105
106 return link->network->link_local & ADDRESS_FAMILY_IPV6;
107 }
108
109 bool link_ipv6_enabled(Link *link) {
110 assert(link);
111
112 if (!socket_ipv6_is_supported())
113 return false;
114
115 if (link->network->bond)
116 return false;
117
118 if (link->iftype == ARPHRD_CAN)
119 return false;
120
121 /* DHCPv6 client will not be started if no IPv6 link-local address is configured. */
122 if (link_ipv6ll_enabled(link))
123 return true;
124
125 if (network_has_static_ipv6_configurations(link->network))
126 return true;
127
128 return false;
129 }
130
131 static bool link_is_enslaved(Link *link) {
132 if (link->flags & IFF_SLAVE)
133 /* Even if the link is not managed by networkd, honor IFF_SLAVE flag. */
134 return true;
135
136 if (!link->network)
137 return false;
138
139 if (link->master_ifindex > 0 && link->network->bridge)
140 return true;
141
142 /* TODO: add conditions for other netdevs. */
143
144 return false;
145 }
146
147 static void link_update_master_operstate(Link *link, NetDev *netdev) {
148 Link *master;
149
150 if (!netdev)
151 return;
152
153 if (netdev->ifindex <= 0)
154 return;
155
156 if (link_get(link->manager, netdev->ifindex, &master) < 0)
157 return;
158
159 link_update_operstate(master, true);
160 }
161
162 void link_update_operstate(Link *link, bool also_update_master) {
163 LinkOperationalState operstate;
164 LinkCarrierState carrier_state;
165 LinkAddressState address_state;
166 _cleanup_strv_free_ char **p = NULL;
167 uint8_t scope = RT_SCOPE_NOWHERE;
168 bool changed = false;
169 Address *address;
170
171 assert(link);
172
173 if (link->kernel_operstate == IF_OPER_DORMANT)
174 carrier_state = LINK_CARRIER_STATE_DORMANT;
175 else if (link_has_carrier(link)) {
176 if (link_is_enslaved(link))
177 carrier_state = LINK_CARRIER_STATE_ENSLAVED;
178 else
179 carrier_state = LINK_CARRIER_STATE_CARRIER;
180 } else if (link->flags & IFF_UP)
181 carrier_state = LINK_CARRIER_STATE_NO_CARRIER;
182 else
183 carrier_state = LINK_CARRIER_STATE_OFF;
184
185 if (carrier_state >= LINK_CARRIER_STATE_CARRIER) {
186 Link *slave;
187
188 SET_FOREACH(slave, link->slaves) {
189 link_update_operstate(slave, false);
190
191 if (slave->carrier_state < LINK_CARRIER_STATE_CARRIER)
192 carrier_state = LINK_CARRIER_STATE_DEGRADED_CARRIER;
193 }
194 }
195
196 SET_FOREACH(address, link->addresses) {
197 if (!address_is_ready(address))
198 continue;
199
200 if (address->scope < scope)
201 scope = address->scope;
202 }
203
204 /* for operstate we also take foreign addresses into account */
205 SET_FOREACH(address, link->addresses_foreign) {
206 if (!address_is_ready(address))
207 continue;
208
209 if (address->scope < scope)
210 scope = address->scope;
211 }
212
213 if (scope < RT_SCOPE_SITE)
214 /* universally accessible addresses found */
215 address_state = LINK_ADDRESS_STATE_ROUTABLE;
216 else if (scope < RT_SCOPE_HOST)
217 /* only link or site local addresses found */
218 address_state = LINK_ADDRESS_STATE_DEGRADED;
219 else
220 /* no useful addresses found */
221 address_state = LINK_ADDRESS_STATE_OFF;
222
223 /* Mapping of address and carrier state vs operational state
224 * carrier state
225 * | off | no-carrier | dormant | degraded-carrier | carrier | enslaved
226 * ------------------------------------------------------------------------------
227 * off | off | no-carrier | dormant | degraded-carrier | carrier | enslaved
228 * address_state degraded | off | no-carrier | dormant | degraded-carrier | degraded | enslaved
229 * routable | off | no-carrier | dormant | degraded-carrier | routable | routable
230 */
231
232 if (carrier_state < LINK_CARRIER_STATE_CARRIER || address_state == LINK_ADDRESS_STATE_OFF)
233 operstate = (LinkOperationalState) carrier_state;
234 else if (address_state == LINK_ADDRESS_STATE_ROUTABLE)
235 operstate = LINK_OPERSTATE_ROUTABLE;
236 else if (carrier_state == LINK_CARRIER_STATE_CARRIER)
237 operstate = LINK_OPERSTATE_DEGRADED;
238 else
239 operstate = LINK_OPERSTATE_ENSLAVED;
240
241 if (link->carrier_state != carrier_state) {
242 link->carrier_state = carrier_state;
243 changed = true;
244 if (strv_extend(&p, "CarrierState") < 0)
245 log_oom();
246 }
247
248 if (link->address_state != address_state) {
249 link->address_state = address_state;
250 changed = true;
251 if (strv_extend(&p, "AddressState") < 0)
252 log_oom();
253 }
254
255 if (link->operstate != operstate) {
256 link->operstate = operstate;
257 changed = true;
258 if (strv_extend(&p, "OperationalState") < 0)
259 log_oom();
260 }
261
262 if (p)
263 link_send_changed_strv(link, p);
264 if (changed)
265 link_dirty(link);
266
267 if (also_update_master && link->network) {
268 link_update_master_operstate(link, link->network->bond);
269 link_update_master_operstate(link, link->network->bridge);
270 }
271 }
272
273 #define FLAG_STRING(string, flag, old, new) \
274 (((old ^ new) & flag) \
275 ? ((old & flag) ? (" -" string) : (" +" string)) \
276 : "")
277
278 static int link_update_flags(Link *link, sd_netlink_message *m, bool force_update_operstate) {
279 unsigned flags, unknown_flags_added, unknown_flags_removed, unknown_flags;
280 uint8_t operstate;
281 int r;
282
283 assert(link);
284
285 r = sd_rtnl_message_link_get_flags(m, &flags);
286 if (r < 0)
287 return log_link_warning_errno(link, r, "Could not get link flags: %m");
288
289 r = sd_netlink_message_read_u8(m, IFLA_OPERSTATE, &operstate);
290 if (r < 0)
291 /* if we got a message without operstate, take it to mean
292 the state was unchanged */
293 operstate = link->kernel_operstate;
294
295 if (!force_update_operstate && (link->flags == flags) && (link->kernel_operstate == operstate))
296 return 0;
297
298 if (link->flags != flags) {
299 log_link_debug(link, "Flags change:%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s",
300 FLAG_STRING("LOOPBACK", IFF_LOOPBACK, link->flags, flags),
301 FLAG_STRING("MASTER", IFF_MASTER, link->flags, flags),
302 FLAG_STRING("SLAVE", IFF_SLAVE, link->flags, flags),
303 FLAG_STRING("UP", IFF_UP, link->flags, flags),
304 FLAG_STRING("DORMANT", IFF_DORMANT, link->flags, flags),
305 FLAG_STRING("LOWER_UP", IFF_LOWER_UP, link->flags, flags),
306 FLAG_STRING("RUNNING", IFF_RUNNING, link->flags, flags),
307 FLAG_STRING("MULTICAST", IFF_MULTICAST, link->flags, flags),
308 FLAG_STRING("BROADCAST", IFF_BROADCAST, link->flags, flags),
309 FLAG_STRING("POINTOPOINT", IFF_POINTOPOINT, link->flags, flags),
310 FLAG_STRING("PROMISC", IFF_PROMISC, link->flags, flags),
311 FLAG_STRING("ALLMULTI", IFF_ALLMULTI, link->flags, flags),
312 FLAG_STRING("PORTSEL", IFF_PORTSEL, link->flags, flags),
313 FLAG_STRING("AUTOMEDIA", IFF_AUTOMEDIA, link->flags, flags),
314 FLAG_STRING("DYNAMIC", IFF_DYNAMIC, link->flags, flags),
315 FLAG_STRING("NOARP", IFF_NOARP, link->flags, flags),
316 FLAG_STRING("NOTRAILERS", IFF_NOTRAILERS, link->flags, flags),
317 FLAG_STRING("DEBUG", IFF_DEBUG, link->flags, flags),
318 FLAG_STRING("ECHO", IFF_ECHO, link->flags, flags));
319
320 unknown_flags = ~(IFF_LOOPBACK | IFF_MASTER | IFF_SLAVE | IFF_UP |
321 IFF_DORMANT | IFF_LOWER_UP | IFF_RUNNING |
322 IFF_MULTICAST | IFF_BROADCAST | IFF_POINTOPOINT |
323 IFF_PROMISC | IFF_ALLMULTI | IFF_PORTSEL |
324 IFF_AUTOMEDIA | IFF_DYNAMIC | IFF_NOARP |
325 IFF_NOTRAILERS | IFF_DEBUG | IFF_ECHO);
326 unknown_flags_added = ((link->flags ^ flags) & flags & unknown_flags);
327 unknown_flags_removed = ((link->flags ^ flags) & link->flags & unknown_flags);
328
329 /* link flags are currently at most 18 bits, let's align to
330 * printing 20 */
331 if (unknown_flags_added)
332 log_link_debug(link,
333 "Unknown link flags gained: %#.5x (ignoring)",
334 unknown_flags_added);
335
336 if (unknown_flags_removed)
337 log_link_debug(link,
338 "Unknown link flags lost: %#.5x (ignoring)",
339 unknown_flags_removed);
340 }
341
342 link->flags = flags;
343 link->kernel_operstate = operstate;
344
345 link_update_operstate(link, true);
346
347 return 0;
348 }
349
350 static int link_new(Manager *manager, sd_netlink_message *message, Link **ret) {
351 _cleanup_(link_unrefp) Link *link = NULL;
352 const char *ifname, *kind = NULL;
353 unsigned short iftype;
354 int r, ifindex;
355 uint16_t type;
356
357 assert(manager);
358 assert(message);
359 assert(ret);
360
361 /* check for link kind */
362 r = sd_netlink_message_enter_container(message, IFLA_LINKINFO);
363 if (r == 0) {
364 (void) sd_netlink_message_read_string(message, IFLA_INFO_KIND, &kind);
365 r = sd_netlink_message_exit_container(message);
366 if (r < 0)
367 return r;
368 }
369
370 r = sd_netlink_message_get_type(message, &type);
371 if (r < 0)
372 return r;
373 else if (type != RTM_NEWLINK)
374 return -EINVAL;
375
376 r = sd_rtnl_message_link_get_ifindex(message, &ifindex);
377 if (r < 0)
378 return r;
379 else if (ifindex <= 0)
380 return -EINVAL;
381
382 r = sd_rtnl_message_link_get_type(message, &iftype);
383 if (r < 0)
384 return r;
385
386 r = sd_netlink_message_read_string(message, IFLA_IFNAME, &ifname);
387 if (r < 0)
388 return r;
389
390 link = new(Link, 1);
391 if (!link)
392 return -ENOMEM;
393
394 *link = (Link) {
395 .n_ref = 1,
396 .manager = manager,
397 .state = LINK_STATE_PENDING,
398 .ifindex = ifindex,
399 .iftype = iftype,
400
401 .n_dns = (unsigned) -1,
402 .dns_default_route = -1,
403 .llmnr = _RESOLVE_SUPPORT_INVALID,
404 .mdns = _RESOLVE_SUPPORT_INVALID,
405 .dnssec_mode = _DNSSEC_MODE_INVALID,
406 .dns_over_tls_mode = _DNS_OVER_TLS_MODE_INVALID,
407 };
408
409 link->ifname = strdup(ifname);
410 if (!link->ifname)
411 return -ENOMEM;
412
413 if (kind) {
414 link->kind = strdup(kind);
415 if (!link->kind)
416 return -ENOMEM;
417 }
418
419 r = sd_netlink_message_read_u32(message, IFLA_MASTER, (uint32_t *)&link->master_ifindex);
420 if (r < 0)
421 log_link_debug_errno(link, r, "New device has no master, continuing without");
422
423 r = netlink_message_read_hw_addr(message, IFLA_ADDRESS, &link->hw_addr);
424 if (r < 0)
425 log_link_debug_errno(link, r, "Hardware address not found for new device, continuing without");
426
427 r = netlink_message_read_hw_addr(message, IFLA_BROADCAST, &link->bcast_addr);
428 if (r < 0)
429 log_link_debug_errno(link, r, "Broadcast address not found for new device, continuing without");
430
431 r = ethtool_get_permanent_macaddr(&manager->ethtool_fd, link->ifname, &link->permanent_mac);
432 if (r < 0)
433 log_link_debug_errno(link, r, "Permanent MAC address not found for new device, continuing without: %m");
434
435 r = ethtool_get_driver(&manager->ethtool_fd, link->ifname, &link->driver);
436 if (r < 0)
437 log_link_debug_errno(link, r, "Failed to get driver, continuing without: %m");
438
439 r = sd_netlink_message_read_strv(message, IFLA_PROP_LIST, IFLA_ALT_IFNAME, &link->alternative_names);
440 if (r < 0 && r != -ENODATA)
441 return r;
442
443 if (asprintf(&link->state_file, "/run/systemd/netif/links/%d", link->ifindex) < 0)
444 return -ENOMEM;
445
446 if (asprintf(&link->lease_file, "/run/systemd/netif/leases/%d", link->ifindex) < 0)
447 return -ENOMEM;
448
449 if (asprintf(&link->lldp_file, "/run/systemd/netif/lldp/%d", link->ifindex) < 0)
450 return -ENOMEM;
451
452 r = hashmap_ensure_put(&manager->links, NULL, INT_TO_PTR(link->ifindex), link);
453 if (r < 0)
454 return r;
455
456 r = link_update_flags(link, message, false);
457 if (r < 0)
458 return r;
459
460 *ret = TAKE_PTR(link);
461
462 return 0;
463 }
464
465 void link_ntp_settings_clear(Link *link) {
466 link->ntp = strv_free(link->ntp);
467 }
468
469 void link_dns_settings_clear(Link *link) {
470 if (link->n_dns != (unsigned) -1)
471 for (unsigned i = 0; i < link->n_dns; i++)
472 in_addr_full_free(link->dns[i]);
473 link->dns = mfree(link->dns);
474 link->n_dns = (unsigned) -1;
475
476 link->search_domains = ordered_set_free_free(link->search_domains);
477 link->route_domains = ordered_set_free_free(link->route_domains);
478
479 link->dns_default_route = -1;
480 link->llmnr = _RESOLVE_SUPPORT_INVALID;
481 link->mdns = _RESOLVE_SUPPORT_INVALID;
482 link->dnssec_mode = _DNSSEC_MODE_INVALID;
483 link->dns_over_tls_mode = _DNS_OVER_TLS_MODE_INVALID;
484
485 link->dnssec_negative_trust_anchors = set_free_free(link->dnssec_negative_trust_anchors);
486 }
487
488 static void link_free_engines(Link *link) {
489 if (!link)
490 return;
491
492 link->dhcp_server = sd_dhcp_server_unref(link->dhcp_server);
493 link->dhcp_client = sd_dhcp_client_unref(link->dhcp_client);
494 link->dhcp_lease = sd_dhcp_lease_unref(link->dhcp_lease);
495 link->dhcp_acd = sd_ipv4acd_unref(link->dhcp_acd);
496
497 link->lldp = sd_lldp_unref(link->lldp);
498 link_lldp_emit_stop(link);
499
500 ndisc_flush(link);
501
502 link->ipv4ll = sd_ipv4ll_unref(link->ipv4ll);
503 link->dhcp6_client = sd_dhcp6_client_unref(link->dhcp6_client);
504 link->dhcp6_lease = sd_dhcp6_lease_unref(link->dhcp6_lease);
505 link->ndisc = sd_ndisc_unref(link->ndisc);
506 link->radv = sd_radv_unref(link->radv);
507
508 ipv4_dad_unref(link);
509 }
510
511 static Link *link_free(Link *link) {
512 assert(link);
513
514 link_ntp_settings_clear(link);
515 link_dns_settings_clear(link);
516
517 link->routes = set_free(link->routes);
518 link->routes_foreign = set_free(link->routes_foreign);
519 link->dhcp_routes = set_free(link->dhcp_routes);
520 link->dhcp_routes_old = set_free(link->dhcp_routes_old);
521 link->dhcp6_routes = set_free(link->dhcp6_routes);
522 link->dhcp6_routes_old = set_free(link->dhcp6_routes_old);
523 link->dhcp6_pd_routes = set_free(link->dhcp6_pd_routes);
524 link->dhcp6_pd_routes_old = set_free(link->dhcp6_pd_routes_old);
525 link->ndisc_routes = set_free(link->ndisc_routes);
526
527 link->nexthops = set_free(link->nexthops);
528 link->nexthops_foreign = set_free(link->nexthops_foreign);
529
530 link->neighbors = set_free(link->neighbors);
531 link->neighbors_foreign = set_free(link->neighbors_foreign);
532
533 link->addresses = set_free(link->addresses);
534 link->addresses_foreign = set_free(link->addresses_foreign);
535 link->pool_addresses = set_free(link->pool_addresses);
536 link->static_addresses = set_free(link->static_addresses);
537 link->dhcp6_addresses = set_free(link->dhcp6_addresses);
538 link->dhcp6_addresses_old = set_free(link->dhcp6_addresses_old);
539 link->dhcp6_pd_addresses = set_free(link->dhcp6_pd_addresses);
540 link->dhcp6_pd_addresses_old = set_free(link->dhcp6_pd_addresses_old);
541 link->ndisc_addresses = set_free(link->ndisc_addresses);
542
543 link_free_engines(link);
544 free(link->lease_file);
545 free(link->lldp_file);
546
547 free(link->ifname);
548 strv_free(link->alternative_names);
549 free(link->kind);
550 free(link->ssid);
551 free(link->driver);
552
553 (void) unlink(link->state_file);
554 free(link->state_file);
555
556 sd_device_unref(link->sd_device);
557
558 hashmap_free(link->bound_to_links);
559 hashmap_free(link->bound_by_links);
560
561 set_free_with_destructor(link->slaves, link_unref);
562
563 network_unref(link->network);
564
565 return mfree(link);
566 }
567
568 DEFINE_TRIVIAL_REF_UNREF_FUNC(Link, link, link_free);
569
570 int link_get(Manager *m, int ifindex, Link **ret) {
571 Link *link;
572
573 assert(m);
574 assert(ifindex > 0);
575 assert(ret);
576
577 link = hashmap_get(m->links, INT_TO_PTR(ifindex));
578 if (!link)
579 return -ENODEV;
580
581 *ret = link;
582
583 return 0;
584 }
585
586 void link_set_state(Link *link, LinkState state) {
587 assert(link);
588
589 if (link->state == state)
590 return;
591
592 log_link_debug(link, "State changed: %s -> %s",
593 link_state_to_string(link->state),
594 link_state_to_string(state));
595
596 link->state = state;
597
598 link_send_changed(link, "AdministrativeState", NULL);
599 link_dirty(link);
600 }
601
602 static void link_enter_unmanaged(Link *link) {
603 assert(link);
604
605 link_set_state(link, LINK_STATE_UNMANAGED);
606 }
607
608 int link_stop_engines(Link *link, bool may_keep_dhcp) {
609 int r = 0, k;
610
611 assert(link);
612 assert(link->manager);
613 assert(link->manager->event);
614
615 bool keep_dhcp = may_keep_dhcp &&
616 link->network &&
617 (link->manager->restarting ||
618 FLAGS_SET(link->network->keep_configuration, KEEP_CONFIGURATION_DHCP_ON_STOP));
619
620 if (!keep_dhcp) {
621 k = sd_dhcp_client_stop(link->dhcp_client);
622 if (k < 0)
623 r = log_link_warning_errno(link, k, "Could not stop DHCPv4 client: %m");
624 }
625
626 k = sd_ipv4acd_stop(link->dhcp_acd);
627 if (k < 0)
628 r = log_link_warning_errno(link, k, "Could not stop IPv4 ACD client for DHCPv4: %m");
629
630 k = sd_dhcp_server_stop(link->dhcp_server);
631 if (k < 0)
632 r = log_link_warning_errno(link, k, "Could not stop DHCPv4 server: %m");
633
634 k = sd_lldp_stop(link->lldp);
635 if (k < 0)
636 r = log_link_warning_errno(link, k, "Could not stop LLDP: %m");
637
638 k = sd_ipv4ll_stop(link->ipv4ll);
639 if (k < 0)
640 r = log_link_warning_errno(link, k, "Could not stop IPv4 link-local: %m");
641
642 k = ipv4_dad_stop(link);
643 if (k < 0)
644 r = log_link_warning_errno(link, k, "Could not stop IPv4 ACD client: %m");
645
646 k = sd_dhcp6_client_stop(link->dhcp6_client);
647 if (k < 0)
648 r = log_link_warning_errno(link, k, "Could not stop DHCPv6 client: %m");
649
650 k = dhcp6_pd_remove(link);
651 if (k < 0)
652 r = log_link_warning_errno(link, k, "Could not remove DHCPv6 PD addresses and routes: %m");
653
654 k = sd_ndisc_stop(link->ndisc);
655 if (k < 0)
656 r = log_link_warning_errno(link, k, "Could not stop IPv6 Router Discovery: %m");
657
658 k = sd_radv_stop(link->radv);
659 if (k < 0)
660 r = log_link_warning_errno(link, k, "Could not stop IPv6 Router Advertisement: %m");
661
662 link_lldp_emit_stop(link);
663 return r;
664 }
665
666 void link_enter_failed(Link *link) {
667 assert(link);
668
669 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
670 return;
671
672 log_link_warning(link, "Failed");
673
674 link_set_state(link, LINK_STATE_FAILED);
675
676 (void) link_stop_engines(link, false);
677 }
678
679 static int link_join_netdevs_after_configured(Link *link) {
680 NetDev *netdev;
681 int r;
682
683 HASHMAP_FOREACH(netdev, link->network->stacked_netdevs) {
684 if (netdev->ifindex > 0)
685 /* Assume already enslaved. */
686 continue;
687
688 if (netdev_get_create_type(netdev) != NETDEV_CREATE_AFTER_CONFIGURED)
689 continue;
690
691 log_struct(LOG_DEBUG,
692 LOG_LINK_INTERFACE(link),
693 LOG_NETDEV_INTERFACE(netdev),
694 LOG_LINK_MESSAGE(link, "Enslaving by '%s'", netdev->ifname));
695
696 r = netdev_join(netdev, link, NULL);
697 if (r < 0)
698 return log_struct_errno(LOG_WARNING, r,
699 LOG_LINK_INTERFACE(link),
700 LOG_NETDEV_INTERFACE(netdev),
701 LOG_LINK_MESSAGE(link, "Could not join netdev '%s': %m", netdev->ifname));
702 }
703
704 return 0;
705 }
706
707 static void link_enter_configured(Link *link) {
708 assert(link);
709 assert(link->network);
710
711 if (link->state != LINK_STATE_CONFIGURING)
712 return;
713
714 link_set_state(link, LINK_STATE_CONFIGURED);
715
716 (void) link_join_netdevs_after_configured(link);
717 }
718
719 void link_check_ready(Link *link) {
720 Address *a;
721
722 assert(link);
723
724 if (link->state == LINK_STATE_CONFIGURED)
725 return;
726
727 if (link->state != LINK_STATE_CONFIGURING)
728 return (void) log_link_debug(link, "%s(): link is in %s state.", __func__, link_state_to_string(link->state));
729
730 if (!link->network)
731 return;
732
733 if (!link->addresses_configured)
734 return (void) log_link_debug(link, "%s(): static addresses are not configured.", __func__);
735
736 if (!link->neighbors_configured)
737 return (void) log_link_debug(link, "%s(): static neighbors are not configured.", __func__);
738
739 SET_FOREACH(a, link->addresses)
740 if (!address_is_ready(a)) {
741 _cleanup_free_ char *str = NULL;
742
743 (void) in_addr_to_string(a->family, &a->in_addr, &str);
744 return (void) log_link_debug(link, "%s(): an address %s/%d is not ready.", __func__, strnull(str), a->prefixlen);
745 }
746
747 if (!link->static_routes_configured)
748 return (void) log_link_debug(link, "%s(): static routes are not configured.", __func__);
749
750 if (!link->static_nexthops_configured)
751 return (void) log_link_debug(link, "%s(): static nexthops are not configured.", __func__);
752
753 if (!link->routing_policy_rules_configured)
754 return (void) log_link_debug(link, "%s(): static routing policy rules are not configured.", __func__);
755
756 if (!link->tc_configured)
757 return (void) log_link_debug(link, "%s(): traffic controls are not configured.", __func__);
758
759 if (!link->sr_iov_configured)
760 return (void) log_link_debug(link, "%s(): SR-IOV is not configured.", __func__);
761
762 if (!link->bridge_mdb_configured)
763 return (void) log_link_debug(link, "%s(): Bridge MDB is not configured.", __func__);
764
765 if (link_has_carrier(link) || !link->network->configure_without_carrier) {
766 bool has_ndisc_address = false;
767 NDiscAddress *n;
768
769 if (link_ipv6ll_enabled(link) &&
770 in_addr_is_null(AF_INET6, (const union in_addr_union*) &link->ipv6ll_address))
771 return (void) log_link_debug(link, "%s(): IPv6LL is not configured.", __func__);
772
773 SET_FOREACH(n, link->ndisc_addresses)
774 if (!n->marked) {
775 has_ndisc_address = true;
776 break;
777 }
778
779 if ((link_dhcp4_enabled(link) || link_dhcp6_enabled(link) || link_ipv4ll_enabled(link)) &&
780 !link->dhcp_address && set_isempty(link->dhcp6_addresses) && !has_ndisc_address &&
781 !link->ipv4ll_address_configured)
782 /* When DHCP[46] or IPv4LL is enabled, at least one address is acquired by them. */
783 return (void) log_link_debug(link, "%s(): DHCP4, DHCP6 or IPv4LL is enabled but no dynamic address is assigned yet.", __func__);
784
785 if (link_dhcp4_enabled(link) || link_dhcp6_enabled(link) || link_dhcp6_pd_is_enabled(link) ||
786 link_ipv6_accept_ra_enabled(link) || link_ipv4ll_enabled(link)) {
787 if (!link->dhcp4_configured &&
788 !(link->dhcp6_address_configured && link->dhcp6_route_configured) &&
789 !(link->dhcp6_pd_address_configured && link->dhcp6_pd_route_configured) &&
790 !(link->ndisc_addresses_configured && link->ndisc_routes_configured) &&
791 !link->ipv4ll_address_configured)
792 /* When DHCP[46], NDisc, or IPv4LL is enabled, at least one protocol must be finished. */
793 return (void) log_link_debug(link, "%s(): dynamic addresses or routes are not configured.", __func__);
794
795 log_link_debug(link, "%s(): dhcp4:%s ipv4ll:%s dhcp6_addresses:%s dhcp_routes:%s dhcp_pd_addresses:%s dhcp_pd_routes:%s ndisc_addresses:%s ndisc_routes:%s",
796 __func__,
797 yes_no(link->dhcp4_configured),
798 yes_no(link->ipv4ll_address_configured),
799 yes_no(link->dhcp6_address_configured),
800 yes_no(link->dhcp6_route_configured),
801 yes_no(link->dhcp6_pd_address_configured),
802 yes_no(link->dhcp6_pd_route_configured),
803 yes_no(link->ndisc_addresses_configured),
804 yes_no(link->ndisc_routes_configured));
805 }
806 }
807
808 link_enter_configured(link);
809 }
810
811 static int link_set_static_configs(Link *link) {
812 int r;
813
814 assert(link);
815 assert(link->network);
816 assert(link->state != _LINK_STATE_INVALID);
817
818 /* Reset all *_configured flags we are configuring. */
819 link->request_static_addresses = false;
820 link->addresses_configured = false;
821 link->addresses_ready = false;
822 link->neighbors_configured = false;
823 link->static_routes_configured = false;
824 link->static_nexthops_configured = false;
825 link->routing_policy_rules_configured = false;
826
827 r = link_set_bridge_fdb(link);
828 if (r < 0)
829 return r;
830
831 r = link_set_bridge_mdb(link);
832 if (r < 0)
833 return r;
834
835 r = link_set_neighbors(link);
836 if (r < 0)
837 return r;
838
839 r = link_set_addresses(link);
840 if (r < 0)
841 return r;
842
843 r = link_set_address_labels(link);
844 if (r < 0)
845 return r;
846
847 /* now that we can figure out a default address for the dhcp server, start it */
848 r = dhcp4_server_configure(link);
849 if (r < 0)
850 return r;
851
852 return 0;
853 }
854
855 static int link_configure_continue(Link *link);
856
857 static int link_mac_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
858 int r;
859
860 assert(link);
861
862 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
863 return 1;
864
865 r = sd_netlink_message_get_errno(m);
866 if (r < 0)
867 log_link_message_warning_errno(link, m, r, "Could not set MAC address, ignoring");
868 else
869 log_link_debug(link, "Setting MAC address done.");
870
871 return 1;
872 }
873
874 static int link_set_mac(Link *link) {
875 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
876 int r;
877
878 assert(link);
879 assert(link->network);
880 assert(link->manager);
881 assert(link->manager->rtnl);
882
883 if (!link->network->mac)
884 return 0;
885
886 log_link_debug(link, "Setting MAC address");
887
888 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_SETLINK, link->ifindex);
889 if (r < 0)
890 return log_link_error_errno(link, r, "Could not allocate RTM_SETLINK message: %m");
891
892 r = sd_netlink_message_append_ether_addr(req, IFLA_ADDRESS, link->network->mac);
893 if (r < 0)
894 return log_link_error_errno(link, r, "Could not set MAC address: %m");
895
896 r = netlink_call_async(link->manager->rtnl, NULL, req, link_mac_handler,
897 link_netlink_destroy_callback, link);
898 if (r < 0)
899 return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
900
901 link_ref(link);
902
903 return 0;
904 }
905
906 static int link_nomaster_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
907 int r;
908
909 assert(link);
910
911 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
912 return 1;
913
914 r = sd_netlink_message_get_errno(m);
915 if (r < 0)
916 log_link_message_warning_errno(link, m, r, "Could not set nomaster, ignoring");
917 else
918 log_link_debug(link, "Setting nomaster done.");
919
920 return 1;
921 }
922
923 static int link_set_nomaster(Link *link) {
924 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
925 int r;
926
927 assert(link);
928 assert(link->network);
929 assert(link->manager);
930 assert(link->manager->rtnl);
931
932 /* set it free if not enslaved with networkd */
933 if (link->network->bridge || link->network->bond || link->network->vrf)
934 return 0;
935
936 log_link_debug(link, "Setting nomaster");
937
938 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_SETLINK, link->ifindex);
939 if (r < 0)
940 return log_link_error_errno(link, r, "Could not allocate RTM_SETLINK message: %m");
941
942 r = sd_netlink_message_append_u32(req, IFLA_MASTER, 0);
943 if (r < 0)
944 return log_link_error_errno(link, r, "Could not append IFLA_MASTER attribute: %m");
945
946 r = netlink_call_async(link->manager->rtnl, NULL, req, link_nomaster_handler,
947 link_netlink_destroy_callback, link);
948 if (r < 0)
949 return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
950
951 link_ref(link);
952
953 return 0;
954 }
955
956 static int set_mtu_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
957 int r;
958
959 assert(m);
960 assert(link);
961 assert(link->ifname);
962
963 link->setting_mtu = false;
964
965 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
966 return 1;
967
968 r = sd_netlink_message_get_errno(m);
969 if (r < 0)
970 log_link_message_warning_errno(link, m, r, "Could not set MTU, ignoring");
971 else
972 log_link_debug(link, "Setting MTU done.");
973
974 if (link->state == LINK_STATE_INITIALIZED) {
975 r = link_configure_continue(link);
976 if (r < 0)
977 link_enter_failed(link);
978 }
979
980 return 1;
981 }
982
983 int link_set_mtu(Link *link, uint32_t mtu) {
984 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
985 int r;
986
987 assert(link);
988 assert(link->manager);
989 assert(link->manager->rtnl);
990
991 if (mtu == 0 || link->setting_mtu)
992 return 0;
993
994 if (link->mtu == mtu)
995 return 0;
996
997 log_link_debug(link, "Setting MTU: %" PRIu32, mtu);
998
999 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_SETLINK, link->ifindex);
1000 if (r < 0)
1001 return log_link_error_errno(link, r, "Could not allocate RTM_SETLINK message: %m");
1002
1003 /* IPv6 protocol requires a minimum MTU of IPV6_MTU_MIN(1280) bytes
1004 * on the interface. Bump up MTU bytes to IPV6_MTU_MIN. */
1005 if (link_ipv6_enabled(link) && mtu < IPV6_MIN_MTU) {
1006
1007 log_link_warning(link, "Bumping MTU to " STRINGIFY(IPV6_MIN_MTU) ", as "
1008 "IPv6 is requested and requires a minimum MTU of " STRINGIFY(IPV6_MIN_MTU) " bytes");
1009
1010 mtu = IPV6_MIN_MTU;
1011 }
1012
1013 r = sd_netlink_message_append_u32(req, IFLA_MTU, mtu);
1014 if (r < 0)
1015 return log_link_error_errno(link, r, "Could not append MTU: %m");
1016
1017 r = netlink_call_async(link->manager->rtnl, NULL, req, set_mtu_handler,
1018 link_netlink_destroy_callback, link);
1019 if (r < 0)
1020 return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
1021
1022 link_ref(link);
1023 link->setting_mtu = true;
1024
1025 return 0;
1026 }
1027
1028 static bool link_reduces_vlan_mtu(Link *link) {
1029 /* See netif_reduces_vlan_mtu() in kernel. */
1030 return streq_ptr(link->kind, "macsec");
1031 }
1032
1033 static uint32_t link_get_requested_mtu_by_stacked_netdevs(Link *link) {
1034 uint32_t mtu = 0;
1035 NetDev *dev;
1036
1037 HASHMAP_FOREACH(dev, link->network->stacked_netdevs)
1038 if (dev->kind == NETDEV_KIND_VLAN && dev->mtu > 0)
1039 /* See vlan_dev_change_mtu() in kernel. */
1040 mtu = MAX(mtu, link_reduces_vlan_mtu(link) ? dev->mtu + 4 : dev->mtu);
1041
1042 else if (dev->kind == NETDEV_KIND_MACVLAN && dev->mtu > mtu)
1043 /* See macvlan_change_mtu() in kernel. */
1044 mtu = dev->mtu;
1045
1046 return mtu;
1047 }
1048
1049 static int link_configure_mtu(Link *link) {
1050 uint32_t mtu;
1051
1052 assert(link);
1053 assert(link->network);
1054
1055 if (link->network->mtu > 0)
1056 return link_set_mtu(link, link->network->mtu);
1057
1058 mtu = link_get_requested_mtu_by_stacked_netdevs(link);
1059 if (link->mtu >= mtu)
1060 return 0;
1061
1062 log_link_notice(link, "Bumping MTU bytes from %"PRIu32" to %"PRIu32" because of stacked device. "
1063 "If it is not desired, then please explicitly specify MTUBytes= setting.",
1064 link->mtu, mtu);
1065
1066 return link_set_mtu(link, mtu);
1067 }
1068
1069 static int set_flags_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
1070 int r;
1071
1072 assert(m);
1073 assert(link);
1074 assert(link->ifname);
1075
1076 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
1077 return 1;
1078
1079 r = sd_netlink_message_get_errno(m);
1080 if (r < 0)
1081 log_link_message_warning_errno(link, m, r, "Could not set link flags, ignoring");
1082
1083 return 1;
1084 }
1085
1086 static int link_set_flags(Link *link) {
1087 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
1088 unsigned ifi_change = 0;
1089 unsigned ifi_flags = 0;
1090 int r;
1091
1092 assert(link);
1093 assert(link->manager);
1094 assert(link->manager->rtnl);
1095
1096 if (link->flags & IFF_LOOPBACK)
1097 return 0;
1098
1099 if (!link->network)
1100 return 0;
1101
1102 if (link->network->arp < 0 && link->network->multicast < 0 && link->network->allmulticast < 0 &&
1103 link->network->promiscuous < 0)
1104 return 0;
1105
1106 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_SETLINK, link->ifindex);
1107 if (r < 0)
1108 return log_link_error_errno(link, r, "Could not allocate RTM_SETLINK message: %m");
1109
1110 if (link->network->arp >= 0) {
1111 ifi_change |= IFF_NOARP;
1112 SET_FLAG(ifi_flags, IFF_NOARP, link->network->arp == 0);
1113 }
1114
1115 if (link->network->multicast >= 0) {
1116 ifi_change |= IFF_MULTICAST;
1117 SET_FLAG(ifi_flags, IFF_MULTICAST, link->network->multicast);
1118 }
1119
1120 if (link->network->allmulticast >= 0) {
1121 ifi_change |= IFF_ALLMULTI;
1122 SET_FLAG(ifi_flags, IFF_ALLMULTI, link->network->allmulticast);
1123 }
1124
1125 if (link->network->promiscuous >= 0) {
1126 ifi_change |= IFF_PROMISC;
1127 SET_FLAG(ifi_flags, IFF_PROMISC, link->network->promiscuous);
1128 }
1129
1130 r = sd_rtnl_message_link_set_flags(req, ifi_flags, ifi_change);
1131 if (r < 0)
1132 return log_link_error_errno(link, r, "Could not set link flags: %m");
1133
1134 r = netlink_call_async(link->manager->rtnl, NULL, req, set_flags_handler,
1135 link_netlink_destroy_callback, link);
1136 if (r < 0)
1137 return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
1138
1139 link_ref(link);
1140
1141 return 0;
1142 }
1143
1144 static int link_acquire_ipv6_conf(Link *link) {
1145 int r;
1146
1147 assert(link);
1148
1149 if (link->ndisc) {
1150 log_link_debug(link, "Discovering IPv6 routers");
1151
1152 r = sd_ndisc_start(link->ndisc);
1153 if (r < 0 && r != -EBUSY)
1154 return log_link_warning_errno(link, r, "Could not start IPv6 Router Discovery: %m");
1155 }
1156
1157 if (link->radv) {
1158 assert(link->radv);
1159 assert(in_addr_is_link_local(AF_INET6, (const union in_addr_union*)&link->ipv6ll_address) > 0);
1160
1161 log_link_debug(link, "Starting IPv6 Router Advertisements");
1162
1163 r = radv_emit_dns(link);
1164 if (r < 0)
1165 return log_link_warning_errno(link, r, "Failed to configure DNS or Domains in IPv6 Router Advertisement: %m");
1166
1167 r = sd_radv_start(link->radv);
1168 if (r < 0 && r != -EBUSY)
1169 return log_link_warning_errno(link, r, "Could not start IPv6 Router Advertisement: %m");
1170 }
1171
1172 if (link_dhcp6_enabled(link) && IN_SET(link->network->dhcp6_without_ra,
1173 DHCP6_CLIENT_START_MODE_INFORMATION_REQUEST,
1174 DHCP6_CLIENT_START_MODE_SOLICIT)) {
1175 assert(link->dhcp6_client);
1176 assert(in_addr_is_link_local(AF_INET6, (const union in_addr_union*)&link->ipv6ll_address) > 0);
1177
1178 r = dhcp6_request_address(link, link->network->dhcp6_without_ra == DHCP6_CLIENT_START_MODE_INFORMATION_REQUEST);
1179 if (r < 0 && r != -EBUSY)
1180 return log_link_warning_errno(link, r, "Could not acquire DHCPv6 lease: %m");
1181 else
1182 log_link_debug(link, "Acquiring DHCPv6 lease");
1183 }
1184
1185 r = dhcp6_request_prefix_delegation(link);
1186 if (r < 0)
1187 return log_link_warning_errno(link, r, "Failed to request DHCPv6 prefix delegation: %m");
1188
1189 return 0;
1190 }
1191
1192 static int link_acquire_ipv4_conf(Link *link) {
1193 int r;
1194
1195 assert(link);
1196 assert(link->manager);
1197 assert(link->manager->event);
1198
1199 if (link->dhcp_client) {
1200 log_link_debug(link, "Acquiring DHCPv4 lease");
1201
1202 r = sd_dhcp_client_start(link->dhcp_client);
1203 if (r < 0)
1204 return log_link_warning_errno(link, r, "Could not acquire DHCPv4 lease: %m");
1205
1206 } else if (link->ipv4ll) {
1207 log_link_debug(link, "Acquiring IPv4 link-local address");
1208
1209 r = sd_ipv4ll_start(link->ipv4ll);
1210 if (r < 0)
1211 return log_link_warning_errno(link, r, "Could not acquire IPv4 link-local address: %m");
1212 }
1213
1214 return 0;
1215 }
1216
1217 static int link_acquire_conf(Link *link) {
1218 int r;
1219
1220 assert(link);
1221
1222 r = link_acquire_ipv4_conf(link);
1223 if (r < 0)
1224 return r;
1225
1226 if (!in_addr_is_null(AF_INET6, (const union in_addr_union*) &link->ipv6ll_address)) {
1227 r = link_acquire_ipv6_conf(link);
1228 if (r < 0)
1229 return r;
1230 }
1231
1232 r = link_lldp_emit_start(link);
1233 if (r < 0)
1234 return log_link_warning_errno(link, r, "Failed to start LLDP transmission: %m");
1235
1236 return 0;
1237 }
1238
1239 bool link_has_carrier(Link *link) {
1240 /* see Documentation/networking/operstates.txt in the kernel sources */
1241
1242 if (link->kernel_operstate == IF_OPER_UP)
1243 return true;
1244
1245 if (link->kernel_operstate == IF_OPER_UNKNOWN)
1246 /* operstate may not be implemented, so fall back to flags */
1247 if (FLAGS_SET(link->flags, IFF_LOWER_UP | IFF_RUNNING) &&
1248 !FLAGS_SET(link->flags, IFF_DORMANT))
1249 return true;
1250
1251 return false;
1252 }
1253
1254 static int link_address_genmode_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
1255 int r;
1256
1257 assert(link);
1258
1259 link->setting_genmode = false;
1260
1261 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
1262 return 1;
1263
1264 r = sd_netlink_message_get_errno(m);
1265 if (r < 0)
1266 log_link_message_warning_errno(link, m, r, "Could not set address genmode for interface, ignoring");
1267 else
1268 log_link_debug(link, "Setting address genmode done.");
1269
1270 if (link->state == LINK_STATE_INITIALIZED) {
1271 r = link_configure_continue(link);
1272 if (r < 0)
1273 link_enter_failed(link);
1274 }
1275
1276 return 1;
1277 }
1278
1279 static int link_configure_addrgen_mode(Link *link) {
1280 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
1281 uint8_t ipv6ll_mode;
1282 int r;
1283
1284 assert(link);
1285 assert(link->network);
1286 assert(link->manager);
1287 assert(link->manager->rtnl);
1288
1289 if (!socket_ipv6_is_supported() || link->setting_genmode)
1290 return 0;
1291
1292 log_link_debug(link, "Setting address genmode for link");
1293
1294 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_SETLINK, link->ifindex);
1295 if (r < 0)
1296 return log_link_error_errno(link, r, "Could not allocate RTM_SETLINK message: %m");
1297
1298 r = sd_netlink_message_open_container(req, IFLA_AF_SPEC);
1299 if (r < 0)
1300 return log_link_error_errno(link, r, "Could not open IFLA_AF_SPEC container: %m");
1301
1302 r = sd_netlink_message_open_container(req, AF_INET6);
1303 if (r < 0)
1304 return log_link_error_errno(link, r, "Could not open AF_INET6 container: %m");
1305
1306 if (!link_ipv6ll_enabled(link))
1307 ipv6ll_mode = IN6_ADDR_GEN_MODE_NONE;
1308 else if (link->network->ipv6ll_address_gen_mode < 0) {
1309 r = sysctl_read_ip_property(AF_INET6, link->ifname, "stable_secret", NULL);
1310 if (r < 0) {
1311 /* The file may not exist. And even if it exists, when stable_secret is unset,
1312 * reading the file fails with EIO. */
1313 log_link_debug_errno(link, r, "Failed to read sysctl property stable_secret: %m");
1314
1315 ipv6ll_mode = IN6_ADDR_GEN_MODE_EUI64;
1316 } else
1317 ipv6ll_mode = IN6_ADDR_GEN_MODE_STABLE_PRIVACY;
1318 } else
1319 ipv6ll_mode = link->network->ipv6ll_address_gen_mode;
1320
1321 r = sd_netlink_message_append_u8(req, IFLA_INET6_ADDR_GEN_MODE, ipv6ll_mode);
1322 if (r < 0)
1323 return log_link_error_errno(link, r, "Could not append IFLA_INET6_ADDR_GEN_MODE: %m");
1324
1325 r = sd_netlink_message_close_container(req);
1326 if (r < 0)
1327 return log_link_error_errno(link, r, "Could not close AF_INET6 container: %m");
1328
1329 r = sd_netlink_message_close_container(req);
1330 if (r < 0)
1331 return log_link_error_errno(link, r, "Could not close IFLA_AF_SPEC container: %m");
1332
1333 r = netlink_call_async(link->manager->rtnl, NULL, req, link_address_genmode_handler,
1334 link_netlink_destroy_callback, link);
1335 if (r < 0)
1336 return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
1337
1338 link_ref(link);
1339 link->setting_genmode = true;
1340
1341 return 0;
1342 }
1343
1344 static int link_up_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
1345 int r;
1346
1347 assert(link);
1348
1349 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
1350 return 1;
1351
1352 r = sd_netlink_message_get_errno(m);
1353 if (r < 0)
1354 /* we warn but don't fail the link, as it may be brought up later */
1355 log_link_message_warning_errno(link, m, r, "Could not bring up interface");
1356
1357 return 1;
1358 }
1359
1360 static int link_up(Link *link) {
1361 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
1362 int r;
1363
1364 assert(link);
1365 assert(link->network);
1366 assert(link->manager);
1367 assert(link->manager->rtnl);
1368
1369 log_link_debug(link, "Bringing link up");
1370
1371 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_SETLINK, link->ifindex);
1372 if (r < 0)
1373 return log_link_error_errno(link, r, "Could not allocate RTM_SETLINK message: %m");
1374
1375 r = sd_rtnl_message_link_set_flags(req, IFF_UP, IFF_UP);
1376 if (r < 0)
1377 return log_link_error_errno(link, r, "Could not set link flags: %m");
1378
1379 r = netlink_call_async(link->manager->rtnl, NULL, req, link_up_handler,
1380 link_netlink_destroy_callback, link);
1381 if (r < 0)
1382 return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
1383
1384 link_ref(link);
1385
1386 return 0;
1387 }
1388
1389 static int link_down_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
1390 int r;
1391
1392 assert(link);
1393
1394 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
1395 return 1;
1396
1397 r = sd_netlink_message_get_errno(m);
1398 if (r < 0)
1399 log_link_message_warning_errno(link, m, r, "Could not bring down interface");
1400
1401 return 1;
1402 }
1403
1404 int link_down(Link *link, link_netlink_message_handler_t callback) {
1405 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
1406 int r;
1407
1408 assert(link);
1409 assert(link->manager);
1410 assert(link->manager->rtnl);
1411
1412 log_link_debug(link, "Bringing link down");
1413
1414 r = sd_rtnl_message_new_link(link->manager->rtnl, &req,
1415 RTM_SETLINK, link->ifindex);
1416 if (r < 0)
1417 return log_link_error_errno(link, r, "Could not allocate RTM_SETLINK message: %m");
1418
1419 r = sd_rtnl_message_link_set_flags(req, 0, IFF_UP);
1420 if (r < 0)
1421 return log_link_error_errno(link, r, "Could not set link flags: %m");
1422
1423 r = netlink_call_async(link->manager->rtnl, NULL, req,
1424 callback ?: link_down_handler,
1425 link_netlink_destroy_callback, link);
1426 if (r < 0)
1427 return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
1428
1429 link_ref(link);
1430
1431 return 0;
1432 }
1433
1434 static int link_group_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
1435 int r;
1436
1437 assert(link);
1438
1439 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
1440 return 1;
1441
1442 r = sd_netlink_message_get_errno(m);
1443 if (r < 0)
1444 log_link_message_warning_errno(link, m, r, "Could not set group for the interface");
1445
1446 return 1;
1447 }
1448
1449 static int link_set_group(Link *link) {
1450 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
1451 int r;
1452
1453 assert(link);
1454 assert(link->network);
1455 assert(link->manager);
1456 assert(link->manager->rtnl);
1457
1458 if (link->network->group <= 0)
1459 return 0;
1460
1461 log_link_debug(link, "Setting group");
1462
1463 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_SETLINK, link->ifindex);
1464 if (r < 0)
1465 return log_link_error_errno(link, r, "Could not allocate RTM_SETLINK message: %m");
1466
1467 r = sd_netlink_message_append_u32(req, IFLA_GROUP, link->network->group);
1468 if (r < 0)
1469 return log_link_error_errno(link, r, "Could not set link group: %m");
1470
1471 r = netlink_call_async(link->manager->rtnl, NULL, req, link_group_handler,
1472 link_netlink_destroy_callback, link);
1473 if (r < 0)
1474 return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
1475
1476 link_ref(link);
1477
1478 return 0;
1479 }
1480
1481 static int link_handle_bound_to_list(Link *link) {
1482 Link *l;
1483 int r;
1484 bool required_up = false;
1485 bool link_is_up = false;
1486
1487 assert(link);
1488
1489 if (hashmap_isempty(link->bound_to_links))
1490 return 0;
1491
1492 if (link->flags & IFF_UP)
1493 link_is_up = true;
1494
1495 HASHMAP_FOREACH (l, link->bound_to_links)
1496 if (link_has_carrier(l)) {
1497 required_up = true;
1498 break;
1499 }
1500
1501 if (!required_up && link_is_up) {
1502 r = link_down(link, NULL);
1503 if (r < 0)
1504 return r;
1505 } else if (required_up && !link_is_up) {
1506 r = link_up(link);
1507 if (r < 0)
1508 return r;
1509 }
1510
1511 return 0;
1512 }
1513
1514 static int link_handle_bound_by_list(Link *link) {
1515 Link *l;
1516 int r;
1517
1518 assert(link);
1519
1520 if (hashmap_isempty(link->bound_by_links))
1521 return 0;
1522
1523 HASHMAP_FOREACH (l, link->bound_by_links) {
1524 r = link_handle_bound_to_list(l);
1525 if (r < 0)
1526 return r;
1527 }
1528
1529 return 0;
1530 }
1531
1532 static int link_put_carrier(Link *link, Link *carrier, Hashmap **h) {
1533 int r;
1534
1535 assert(link);
1536 assert(carrier);
1537
1538 if (link == carrier)
1539 return 0;
1540
1541 if (hashmap_get(*h, INT_TO_PTR(carrier->ifindex)))
1542 return 0;
1543
1544 r = hashmap_ensure_put(h, NULL, INT_TO_PTR(carrier->ifindex), carrier);
1545 if (r < 0)
1546 return r;
1547
1548 link_dirty(link);
1549
1550 return 0;
1551 }
1552
1553 static int link_new_bound_by_list(Link *link) {
1554 Manager *m;
1555 Link *carrier;
1556 int r;
1557
1558 assert(link);
1559 assert(link->manager);
1560
1561 m = link->manager;
1562
1563 HASHMAP_FOREACH(carrier, m->links) {
1564 if (!carrier->network)
1565 continue;
1566
1567 if (strv_isempty(carrier->network->bind_carrier))
1568 continue;
1569
1570 if (strv_fnmatch(carrier->network->bind_carrier, link->ifname)) {
1571 r = link_put_carrier(link, carrier, &link->bound_by_links);
1572 if (r < 0)
1573 return r;
1574 }
1575 }
1576
1577 HASHMAP_FOREACH(carrier, link->bound_by_links) {
1578 r = link_put_carrier(carrier, link, &carrier->bound_to_links);
1579 if (r < 0)
1580 return r;
1581 }
1582
1583 return 0;
1584 }
1585
1586 static int link_new_bound_to_list(Link *link) {
1587 Manager *m;
1588 Link *carrier;
1589 int r;
1590
1591 assert(link);
1592 assert(link->manager);
1593
1594 if (!link->network)
1595 return 0;
1596
1597 if (strv_isempty(link->network->bind_carrier))
1598 return 0;
1599
1600 m = link->manager;
1601
1602 HASHMAP_FOREACH (carrier, m->links) {
1603 if (strv_fnmatch(link->network->bind_carrier, carrier->ifname)) {
1604 r = link_put_carrier(link, carrier, &link->bound_to_links);
1605 if (r < 0)
1606 return r;
1607 }
1608 }
1609
1610 HASHMAP_FOREACH (carrier, link->bound_to_links) {
1611 r = link_put_carrier(carrier, link, &carrier->bound_by_links);
1612 if (r < 0)
1613 return r;
1614 }
1615
1616 return 0;
1617 }
1618
1619 static int link_new_carrier_maps(Link *link) {
1620 int r;
1621
1622 r = link_new_bound_by_list(link);
1623 if (r < 0)
1624 return r;
1625
1626 r = link_handle_bound_by_list(link);
1627 if (r < 0)
1628 return r;
1629
1630 r = link_new_bound_to_list(link);
1631 if (r < 0)
1632 return r;
1633
1634 r = link_handle_bound_to_list(link);
1635 if (r < 0)
1636 return r;
1637
1638 return 0;
1639 }
1640
1641 static void link_free_bound_to_list(Link *link) {
1642 bool updated = false;
1643 Link *bound_to;
1644
1645 assert(link);
1646
1647 while ((bound_to = hashmap_steal_first(link->bound_to_links))) {
1648 updated = true;
1649
1650 if (hashmap_remove(bound_to->bound_by_links, INT_TO_PTR(link->ifindex)))
1651 link_dirty(bound_to);
1652 }
1653
1654 if (updated)
1655 link_dirty(link);
1656
1657 return;
1658 }
1659
1660 static void link_free_bound_by_list(Link *link) {
1661 bool updated = false;
1662 Link *bound_by;
1663
1664 assert(link);
1665
1666 while ((bound_by = hashmap_steal_first(link->bound_by_links))) {
1667 updated = true;
1668
1669 if (hashmap_remove(bound_by->bound_to_links, INT_TO_PTR(link->ifindex))) {
1670 link_dirty(bound_by);
1671 link_handle_bound_to_list(bound_by);
1672 }
1673 }
1674
1675 if (updated)
1676 link_dirty(link);
1677
1678 return;
1679 }
1680
1681 static void link_free_carrier_maps(Link *link) {
1682 assert(link);
1683
1684 link_free_bound_to_list(link);
1685 link_free_bound_by_list(link);
1686
1687 return;
1688 }
1689
1690 static int link_append_to_master(Link *link, NetDev *netdev) {
1691 Link *master;
1692 int r;
1693
1694 assert(link);
1695 assert(netdev);
1696
1697 r = link_get(link->manager, netdev->ifindex, &master);
1698 if (r < 0)
1699 return r;
1700
1701 r = set_ensure_put(&master->slaves, NULL, link);
1702 if (r <= 0)
1703 return r;
1704
1705 link_ref(link);
1706 return 0;
1707 }
1708
1709 static void link_drop_from_master(Link *link, NetDev *netdev) {
1710 Link *master;
1711
1712 assert(link);
1713
1714 if (!link->manager || !netdev)
1715 return;
1716
1717 if (link_get(link->manager, netdev->ifindex, &master) < 0)
1718 return;
1719
1720 link_unref(set_remove(master->slaves, link));
1721 }
1722
1723 static void link_detach_from_manager(Link *link) {
1724 if (!link || !link->manager)
1725 return;
1726
1727 link_unref(set_remove(link->manager->links_requesting_uuid, link));
1728 link_clean(link);
1729
1730 /* The following must be called at last. */
1731 assert_se(hashmap_remove(link->manager->links, INT_TO_PTR(link->ifindex)) == link);
1732 link_unref(link);
1733 }
1734
1735 void link_drop(Link *link) {
1736 if (!link || link->state == LINK_STATE_LINGER)
1737 return;
1738
1739 link_set_state(link, LINK_STATE_LINGER);
1740
1741 link_free_carrier_maps(link);
1742
1743 if (link->network) {
1744 link_drop_from_master(link, link->network->bridge);
1745 link_drop_from_master(link, link->network->bond);
1746 }
1747
1748 log_link_debug(link, "Link removed");
1749
1750 (void) unlink(link->state_file);
1751 link_detach_from_manager(link);
1752 }
1753
1754 static int link_joined(Link *link) {
1755 int r;
1756
1757 assert(link);
1758 assert(link->network);
1759
1760 switch (link->network->activation_policy) {
1761 case ACTIVATION_POLICY_BOUND:
1762 r = link_handle_bound_to_list(link);
1763 if (r < 0)
1764 return r;
1765 break;
1766 case ACTIVATION_POLICY_UP:
1767 if (link->activated)
1768 break;
1769 _fallthrough_;
1770 case ACTIVATION_POLICY_ALWAYS_UP:
1771 r = link_up(link);
1772 if (r < 0) {
1773 link_enter_failed(link);
1774 return r;
1775 }
1776 break;
1777 case ACTIVATION_POLICY_DOWN:
1778 if (link->activated)
1779 break;
1780 _fallthrough_;
1781 case ACTIVATION_POLICY_ALWAYS_DOWN:
1782 r = link_down(link, NULL);
1783 if (r < 0) {
1784 link_enter_failed(link);
1785 return r;
1786 }
1787 break;
1788 default:
1789 break;
1790 }
1791 link->activated = true;
1792
1793 if (link->network->bridge) {
1794 r = link_set_bridge(link);
1795 if (r < 0)
1796 log_link_error_errno(link, r, "Could not set bridge message: %m");
1797
1798 r = link_append_to_master(link, link->network->bridge);
1799 if (r < 0)
1800 log_link_error_errno(link, r, "Failed to add to bridge master's slave list: %m");
1801 }
1802
1803 if (link->network->bond) {
1804 r = link_set_bond(link);
1805 if (r < 0)
1806 log_link_error_errno(link, r, "Could not set bond message: %m");
1807
1808 r = link_append_to_master(link, link->network->bond);
1809 if (r < 0)
1810 log_link_error_errno(link, r, "Failed to add to bond master's slave list: %m");
1811 }
1812
1813 r = link_set_bridge_vlan(link);
1814 if (r < 0)
1815 log_link_error_errno(link, r, "Could not set bridge vlan: %m");
1816
1817 /* Skip setting up addresses until it gets carrier,
1818 or it would try to set addresses twice,
1819 which is bad for non-idempotent steps. */
1820 if (!link_has_carrier(link) && !link->network->configure_without_carrier)
1821 return 0;
1822
1823 link_set_state(link, LINK_STATE_CONFIGURING);
1824
1825 r = link_acquire_conf(link);
1826 if (r < 0)
1827 return r;
1828
1829 return link_set_static_configs(link);
1830 }
1831
1832 static int netdev_join_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
1833 int r;
1834
1835 assert(link);
1836 assert(link->network);
1837 assert(link->enslaving > 0);
1838
1839 link->enslaving--;
1840
1841 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
1842 return 1;
1843
1844 r = sd_netlink_message_get_errno(m);
1845 if (r < 0 && r != -EEXIST) {
1846 log_link_message_warning_errno(link, m, r, "Could not join netdev");
1847 link_enter_failed(link);
1848 return 1;
1849 }
1850
1851 log_link_debug(link, "Joined netdev");
1852
1853 if (link->enslaving == 0) {
1854 r = link_joined(link);
1855 if (r < 0)
1856 link_enter_failed(link);
1857 }
1858
1859 return 1;
1860 }
1861
1862 static int link_enter_join_netdev(Link *link) {
1863 NetDev *netdev;
1864 int r;
1865
1866 assert(link);
1867 assert(link->network);
1868 assert(link->state == LINK_STATE_INITIALIZED);
1869
1870 link_set_state(link, LINK_STATE_CONFIGURING);
1871
1872 link->enslaving = 0;
1873
1874 if (link->network->bond) {
1875 if (link->network->bond->state == NETDEV_STATE_READY &&
1876 link->network->bond->ifindex == link->master_ifindex)
1877 return link_joined(link);
1878
1879 log_struct(LOG_DEBUG,
1880 LOG_LINK_INTERFACE(link),
1881 LOG_NETDEV_INTERFACE(link->network->bond),
1882 LOG_LINK_MESSAGE(link, "Enslaving by '%s'", link->network->bond->ifname));
1883
1884 link->enslaving++;
1885
1886 r = netdev_join(link->network->bond, link, netdev_join_handler);
1887 if (r < 0) {
1888 log_struct_errno(LOG_WARNING, r,
1889 LOG_LINK_INTERFACE(link),
1890 LOG_NETDEV_INTERFACE(link->network->bond),
1891 LOG_LINK_MESSAGE(link, "Could not join netdev '%s': %m", link->network->bond->ifname));
1892 link_enter_failed(link);
1893 return r;
1894 }
1895 }
1896
1897 if (link->network->bridge) {
1898 log_struct(LOG_DEBUG,
1899 LOG_LINK_INTERFACE(link),
1900 LOG_NETDEV_INTERFACE(link->network->bridge),
1901 LOG_LINK_MESSAGE(link, "Enslaving by '%s'", link->network->bridge->ifname));
1902
1903 link->enslaving++;
1904
1905 r = netdev_join(link->network->bridge, link, netdev_join_handler);
1906 if (r < 0) {
1907 log_struct_errno(LOG_WARNING, r,
1908 LOG_LINK_INTERFACE(link),
1909 LOG_NETDEV_INTERFACE(link->network->bridge),
1910 LOG_LINK_MESSAGE(link, "Could not join netdev '%s': %m", link->network->bridge->ifname));
1911 link_enter_failed(link);
1912 return r;
1913 }
1914 }
1915
1916 if (link->network->vrf) {
1917 log_struct(LOG_DEBUG,
1918 LOG_LINK_INTERFACE(link),
1919 LOG_NETDEV_INTERFACE(link->network->vrf),
1920 LOG_LINK_MESSAGE(link, "Enslaving by '%s'", link->network->vrf->ifname));
1921
1922 link->enslaving++;
1923
1924 r = netdev_join(link->network->vrf, link, netdev_join_handler);
1925 if (r < 0) {
1926 log_struct_errno(LOG_WARNING, r,
1927 LOG_LINK_INTERFACE(link),
1928 LOG_NETDEV_INTERFACE(link->network->vrf),
1929 LOG_LINK_MESSAGE(link, "Could not join netdev '%s': %m", link->network->vrf->ifname));
1930 link_enter_failed(link);
1931 return r;
1932 }
1933 }
1934
1935 HASHMAP_FOREACH(netdev, link->network->stacked_netdevs) {
1936
1937 if (netdev->ifindex > 0)
1938 /* Assume already enslaved. */
1939 continue;
1940
1941 if (netdev_get_create_type(netdev) != NETDEV_CREATE_STACKED)
1942 continue;
1943
1944 log_struct(LOG_DEBUG,
1945 LOG_LINK_INTERFACE(link),
1946 LOG_NETDEV_INTERFACE(netdev),
1947 LOG_LINK_MESSAGE(link, "Enslaving by '%s'", netdev->ifname));
1948
1949 link->enslaving++;
1950
1951 r = netdev_join(netdev, link, netdev_join_handler);
1952 if (r < 0) {
1953 log_struct_errno(LOG_WARNING, r,
1954 LOG_LINK_INTERFACE(link),
1955 LOG_NETDEV_INTERFACE(netdev),
1956 LOG_LINK_MESSAGE(link, "Could not join netdev '%s': %m", netdev->ifname));
1957 link_enter_failed(link);
1958 return r;
1959 }
1960 }
1961
1962 if (link->enslaving == 0)
1963 return link_joined(link);
1964
1965 return 0;
1966 }
1967
1968 static int link_drop_foreign_config(Link *link) {
1969 int k, r;
1970
1971 assert(link);
1972 assert(link->manager);
1973
1974 r = link_drop_foreign_addresses(link);
1975
1976 k = link_drop_foreign_neighbors(link);
1977 if (k < 0 && r >= 0)
1978 r = k;
1979
1980 k = link_drop_foreign_routes(link);
1981 if (k < 0 && r >= 0)
1982 r = k;
1983
1984 k = manager_drop_foreign_routing_policy_rules(link->manager);
1985 if (k < 0 && r >= 0)
1986 r = k;
1987
1988 return r;
1989 }
1990
1991 static int link_drop_config(Link *link) {
1992 int k, r;
1993
1994 assert(link);
1995 assert(link->manager);
1996
1997 r = link_drop_addresses(link);
1998
1999 k = link_drop_neighbors(link);
2000 if (k < 0 && r >= 0)
2001 r = k;
2002
2003 k = link_drop_routes(link);
2004 if (k < 0 && r >= 0)
2005 r = k;
2006
2007 k = manager_drop_routing_policy_rules(link->manager, link);
2008 if (k < 0 && r >= 0)
2009 r = k;
2010
2011 ndisc_flush(link);
2012
2013 return r;
2014 }
2015
2016 int link_configure(Link *link) {
2017 int r;
2018
2019 assert(link);
2020 assert(link->network);
2021 assert(link->state == LINK_STATE_INITIALIZED);
2022
2023 r = link_configure_traffic_control(link);
2024 if (r < 0)
2025 return r;
2026
2027 r = link_configure_sr_iov(link);
2028 if (r < 0)
2029 return r;
2030
2031 if (link->iftype == ARPHRD_CAN)
2032 return link_configure_can(link);
2033
2034 r = link_set_sysctl(link);
2035 if (r < 0)
2036 return r;
2037
2038 r = link_set_mac(link);
2039 if (r < 0)
2040 return r;
2041
2042 r = link_set_nomaster(link);
2043 if (r < 0)
2044 return r;
2045
2046 r = link_set_flags(link);
2047 if (r < 0)
2048 return r;
2049
2050 r = link_set_group(link);
2051 if (r < 0)
2052 return r;
2053
2054 r = ipv4ll_configure(link);
2055 if (r < 0)
2056 return r;
2057
2058 r = dhcp4_configure(link);
2059 if (r < 0)
2060 return r;
2061
2062 r = dhcp6_configure(link);
2063 if (r < 0)
2064 return r;
2065
2066 r = ndisc_configure(link);
2067 if (r < 0)
2068 return r;
2069
2070 r = radv_configure(link);
2071 if (r < 0)
2072 return r;
2073
2074 r = link_lldp_rx_configure(link);
2075 if (r < 0)
2076 return r;
2077
2078 r = link_configure_mtu(link);
2079 if (r < 0)
2080 return r;
2081
2082 r = link_configure_addrgen_mode(link);
2083 if (r < 0)
2084 return r;
2085
2086 return link_configure_continue(link);
2087 }
2088
2089 /* The configuration continues in this separate function, instead of
2090 * including this in the above link_configure() function, for two
2091 * reasons:
2092 * 1) some devices reset the link when the mtu is set, which caused
2093 * an infinite loop here in networkd; see:
2094 * https://github.com/systemd/systemd/issues/6593
2095 * https://github.com/systemd/systemd/issues/9831
2096 * 2) if ipv6ll is disabled, then bringing the interface up must be
2097 * delayed until after we get confirmation from the kernel that
2098 * the addr_gen_mode parameter has been set (via netlink), see:
2099 * https://github.com/systemd/systemd/issues/13882
2100 */
2101 static int link_configure_continue(Link *link) {
2102 int r;
2103
2104 assert(link);
2105 assert(link->network);
2106 assert(link->state == LINK_STATE_INITIALIZED);
2107
2108 if (link->setting_mtu || link->setting_genmode)
2109 return 0;
2110
2111 /* Drop foreign config, but ignore loopback or critical devices.
2112 * We do not want to remove loopback address or addresses used for root NFS. */
2113 if (!(link->flags & IFF_LOOPBACK) &&
2114 link->network->keep_configuration != KEEP_CONFIGURATION_YES) {
2115 r = link_drop_foreign_config(link);
2116 if (r < 0)
2117 return r;
2118 }
2119
2120 /* The kernel resets ipv6 mtu after changing device mtu;
2121 * we must set this here, after we've set device mtu */
2122 r = link_set_ipv6_mtu(link);
2123 if (r < 0)
2124 log_link_warning_errno(link, r, "Cannot set IPv6 MTU for interface, ignoring: %m");
2125
2126 return link_enter_join_netdev(link);
2127 }
2128
2129 static int link_reconfigure_internal(Link *link, sd_netlink_message *m, bool force) {
2130 _cleanup_strv_free_ char **s = NULL;
2131 Network *network;
2132 int r;
2133
2134 assert(m);
2135
2136 r = sd_netlink_message_get_errno(m);
2137 if (r < 0)
2138 return r;
2139
2140 r = sd_netlink_message_read_strv(m, IFLA_PROP_LIST, IFLA_ALT_IFNAME, &s);
2141 if (r < 0 && r != -ENODATA)
2142 return r;
2143
2144 strv_free_and_replace(link->alternative_names, s);
2145
2146 r = network_get(link->manager, link->iftype, link->sd_device,
2147 link->ifname, link->alternative_names, link->driver,
2148 &link->hw_addr.addr.ether, &link->permanent_mac,
2149 link->wlan_iftype, link->ssid, &link->bssid, &network);
2150 if (r == -ENOENT) {
2151 link_enter_unmanaged(link);
2152 return 0;
2153 } else if (r == 0 && network->unmanaged) {
2154 link_enter_unmanaged(link);
2155 return 0;
2156 } else if (r < 0)
2157 return r;
2158
2159 if (link->network == network && !force)
2160 return 0;
2161
2162 log_link_info(link, "Re-configuring with %s", network->filename);
2163
2164 /* Dropping old .network file */
2165 r = link_stop_engines(link, false);
2166 if (r < 0)
2167 return r;
2168
2169 r = link_drop_config(link);
2170 if (r < 0)
2171 return r;
2172
2173 if (!IN_SET(link->state, LINK_STATE_UNMANAGED, LINK_STATE_PENDING, LINK_STATE_INITIALIZED)) {
2174 log_link_debug(link, "State is %s, dropping config", link_state_to_string(link->state));
2175 r = link_drop_foreign_config(link);
2176 if (r < 0)
2177 return r;
2178 }
2179
2180 link_free_carrier_maps(link);
2181 link_free_engines(link);
2182 link->network = network_unref(link->network);
2183 link_unref(set_remove(link->manager->links_requesting_uuid, link));
2184
2185 /* Then, apply new .network file */
2186 link->network = network_ref(network);
2187 link_dirty(link);
2188
2189 r = link_new_carrier_maps(link);
2190 if (r < 0)
2191 return r;
2192
2193 link_set_state(link, LINK_STATE_INITIALIZED);
2194 link->activated = false;
2195
2196 /* link_configure_duid() returns 0 if it requests product UUID. In that case,
2197 * link_configure() is called later asynchronously. */
2198 r = link_configure_duid(link);
2199 if (r <= 0)
2200 return r;
2201
2202 r = link_configure(link);
2203 if (r < 0)
2204 return r;
2205
2206 return 0;
2207 }
2208
2209 static int link_reconfigure_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
2210 int r;
2211
2212 r = link_reconfigure_internal(link, m, false);
2213 if (r < 0)
2214 link_enter_failed(link);
2215
2216 return 1;
2217 }
2218
2219 static int link_force_reconfigure_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
2220 int r;
2221
2222 r = link_reconfigure_internal(link, m, true);
2223 if (r < 0)
2224 link_enter_failed(link);
2225
2226 return 1;
2227 }
2228
2229 int link_reconfigure(Link *link, bool force) {
2230 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
2231 int r;
2232
2233 /* When link in pending or initialized state, then link_configure() will be called. To prevent
2234 * the function from being called multiple times simultaneously, refuse to reconfigure the
2235 * interface in these cases. */
2236 if (IN_SET(link->state, LINK_STATE_PENDING, LINK_STATE_INITIALIZED, LINK_STATE_LINGER))
2237 return 0; /* 0 means no-op. */
2238
2239 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_GETLINK,
2240 link->ifindex);
2241 if (r < 0)
2242 return r;
2243
2244 r = netlink_call_async(link->manager->rtnl, NULL, req,
2245 force ? link_force_reconfigure_handler : link_reconfigure_handler,
2246 link_netlink_destroy_callback, link);
2247 if (r < 0)
2248 return r;
2249
2250 link_ref(link);
2251
2252 return 1; /* 1 means the interface will be reconfigured. */
2253 }
2254
2255 static int link_initialized_and_synced(Link *link) {
2256 Network *network;
2257 int r;
2258
2259 assert(link);
2260 assert(link->ifname);
2261 assert(link->manager);
2262
2263 /* We may get called either from the asynchronous netlink callback,
2264 * or directly for link_add() if running in a container. See link_add(). */
2265 if (!IN_SET(link->state, LINK_STATE_PENDING, LINK_STATE_INITIALIZED))
2266 return 0;
2267
2268 log_link_debug(link, "Link state is up-to-date");
2269 link_set_state(link, LINK_STATE_INITIALIZED);
2270
2271 r = link_new_bound_by_list(link);
2272 if (r < 0)
2273 return r;
2274
2275 r = link_handle_bound_by_list(link);
2276 if (r < 0)
2277 return r;
2278
2279 if (!link->network) {
2280 r = wifi_get_info(link);
2281 if (r < 0)
2282 return r;
2283
2284 r = network_get(link->manager, link->iftype, link->sd_device,
2285 link->ifname, link->alternative_names, link->driver,
2286 &link->hw_addr.addr.ether, &link->permanent_mac,
2287 link->wlan_iftype, link->ssid, &link->bssid, &network);
2288 if (r == -ENOENT) {
2289 link_enter_unmanaged(link);
2290 return 0;
2291 } else if (r == 0 && network->unmanaged) {
2292 link_enter_unmanaged(link);
2293 return 0;
2294 } else if (r < 0)
2295 return r;
2296
2297 if (link->flags & IFF_LOOPBACK) {
2298 if (network->link_local != ADDRESS_FAMILY_NO)
2299 log_link_debug(link, "Ignoring link-local autoconfiguration for loopback link");
2300
2301 if (network->dhcp != ADDRESS_FAMILY_NO)
2302 log_link_debug(link, "Ignoring DHCP clients for loopback link");
2303
2304 if (network->dhcp_server)
2305 log_link_debug(link, "Ignoring DHCP server for loopback link");
2306 }
2307
2308 link->network = network_ref(network);
2309 link_dirty(link);
2310 }
2311
2312 r = link_new_bound_to_list(link);
2313 if (r < 0)
2314 return r;
2315
2316 /* link_configure_duid() returns 0 if it requests product UUID. In that case,
2317 * link_configure() is called later asynchronously. */
2318 r = link_configure_duid(link);
2319 if (r <= 0)
2320 return r;
2321
2322 r = link_configure(link);
2323 if (r < 0)
2324 return r;
2325
2326 return 0;
2327 }
2328
2329 static int link_initialized_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
2330 _cleanup_strv_free_ char **s = NULL;
2331 int r;
2332
2333 r = sd_netlink_message_get_errno(m);
2334 if (r < 0) {
2335 log_link_warning_errno(link, r, "Failed to wait for the interface to be initialized: %m");
2336 link_enter_failed(link);
2337 return 0;
2338 }
2339
2340 r = sd_netlink_message_read_strv(m, IFLA_PROP_LIST, IFLA_ALT_IFNAME, &s);
2341 if (r < 0 && r != -ENODATA) {
2342 link_enter_failed(link);
2343 return 0;
2344 }
2345
2346 strv_free_and_replace(link->alternative_names, s);
2347
2348 r = link_initialized_and_synced(link);
2349 if (r < 0)
2350 link_enter_failed(link);
2351 return 1;
2352 }
2353
2354 int link_initialized(Link *link, sd_device *device) {
2355 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
2356 int r;
2357
2358 assert(link);
2359 assert(link->manager);
2360 assert(link->manager->rtnl);
2361 assert(device);
2362
2363 if (link->state != LINK_STATE_PENDING)
2364 return 0;
2365
2366 if (link->sd_device)
2367 return 0;
2368
2369 log_link_debug(link, "udev initialized link");
2370 link_set_state(link, LINK_STATE_INITIALIZED);
2371
2372 link->sd_device = sd_device_ref(device);
2373
2374 /* udev has initialized the link, but we don't know if we have yet
2375 * processed the NEWLINK messages with the latest state. Do a GETLINK,
2376 * when it returns we know that the pending NEWLINKs have already been
2377 * processed and that we are up-to-date */
2378
2379 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_GETLINK,
2380 link->ifindex);
2381 if (r < 0)
2382 return r;
2383
2384 r = netlink_call_async(link->manager->rtnl, NULL, req, link_initialized_handler,
2385 link_netlink_destroy_callback, link);
2386 if (r < 0)
2387 return r;
2388
2389 link_ref(link);
2390
2391 return 0;
2392 }
2393
2394 int link_add(Manager *m, sd_netlink_message *message, Link **ret) {
2395 _cleanup_(sd_device_unrefp) sd_device *device = NULL;
2396 char ifindex_str[2 + DECIMAL_STR_MAX(int)];
2397 Link *link;
2398 int r;
2399
2400 assert(m);
2401 assert(m->rtnl);
2402 assert(message);
2403 assert(ret);
2404
2405 r = link_new(m, message, ret);
2406 if (r < 0)
2407 return r;
2408
2409 link = *ret;
2410
2411 log_link_debug(link, "Link %d added", link->ifindex);
2412
2413 if (path_is_read_only_fs("/sys") <= 0) {
2414 /* udev should be around */
2415 sprintf(ifindex_str, "n%d", link->ifindex);
2416 r = sd_device_new_from_device_id(&device, ifindex_str);
2417 if (r < 0) {
2418 log_link_warning_errno(link, r, "Could not find device, waiting for device initialization: %m");
2419 return 0;
2420 }
2421
2422 r = sd_device_get_is_initialized(device);
2423 if (r < 0) {
2424 log_link_warning_errno(link, r, "Could not determine whether the device is initialized: %m");
2425 goto failed;
2426 }
2427 if (r == 0) {
2428 /* not yet ready */
2429 log_link_debug(link, "link pending udev initialization...");
2430 return 0;
2431 }
2432
2433 r = device_is_renaming(device);
2434 if (r < 0) {
2435 log_link_warning_errno(link, r, "Failed to determine the device is being renamed: %m");
2436 goto failed;
2437 }
2438 if (r > 0) {
2439 log_link_debug(link, "Interface is being renamed, pending initialization.");
2440 return 0;
2441 }
2442
2443 r = link_initialized(link, device);
2444 if (r < 0)
2445 goto failed;
2446 } else {
2447 r = link_initialized_and_synced(link);
2448 if (r < 0)
2449 goto failed;
2450 }
2451
2452 return 0;
2453 failed:
2454 link_enter_failed(link);
2455 return r;
2456 }
2457
2458 int link_ipv6ll_gained(Link *link, const struct in6_addr *address) {
2459 int r;
2460
2461 assert(link);
2462
2463 log_link_info(link, "Gained IPv6LL");
2464
2465 link->ipv6ll_address = *address;
2466 link_check_ready(link);
2467
2468 if (IN_SET(link->state, LINK_STATE_CONFIGURING, LINK_STATE_CONFIGURED)) {
2469 r = link_acquire_ipv6_conf(link);
2470 if (r < 0) {
2471 link_enter_failed(link);
2472 return r;
2473 }
2474 }
2475
2476 return 0;
2477 }
2478
2479 static int link_carrier_gained(Link *link) {
2480 int r;
2481
2482 assert(link);
2483
2484 r = wifi_get_info(link);
2485 if (r < 0)
2486 return r;
2487 if (r > 0) {
2488 r = link_reconfigure(link, false);
2489 if (r < 0) {
2490 link_enter_failed(link);
2491 return r;
2492 }
2493 }
2494
2495 if (IN_SET(link->state, LINK_STATE_CONFIGURING, LINK_STATE_CONFIGURED)) {
2496 r = link_acquire_conf(link);
2497 if (r < 0) {
2498 link_enter_failed(link);
2499 return r;
2500 }
2501
2502 link_set_state(link, LINK_STATE_CONFIGURING);
2503 r = link_set_static_configs(link);
2504 if (r < 0)
2505 return r;
2506 }
2507
2508 r = link_handle_bound_by_list(link);
2509 if (r < 0)
2510 return r;
2511
2512 if (!link->bridge_mdb_configured) {
2513 r = link_set_bridge_mdb(link);
2514 if (r < 0)
2515 return r;
2516 }
2517
2518 if (streq_ptr(link->kind, "bridge")) {
2519 Link *slave;
2520
2521 SET_FOREACH(slave, link->slaves) {
2522 if (slave->bridge_mdb_configured)
2523 continue;
2524
2525 r = link_set_bridge_mdb(slave);
2526 if (r < 0)
2527 link_enter_failed(slave);
2528 }
2529 }
2530
2531 return 0;
2532 }
2533
2534 static int link_carrier_lost(Link *link) {
2535 int r;
2536
2537 assert(link);
2538
2539 if (link->network && link->network->ignore_carrier_loss)
2540 return 0;
2541
2542 /* Some devices reset itself while setting the MTU. This causes the DHCP client fall into a loop.
2543 * setting_mtu keep track whether the device got reset because of setting MTU and does not drop the
2544 * configuration and stop the clients as well. */
2545 if (link->setting_mtu)
2546 return 0;
2547
2548 r = link_stop_engines(link, false);
2549 if (r < 0) {
2550 link_enter_failed(link);
2551 return r;
2552 }
2553
2554 r = link_drop_config(link);
2555 if (r < 0)
2556 return r;
2557
2558 if (!IN_SET(link->state, LINK_STATE_UNMANAGED, LINK_STATE_PENDING, LINK_STATE_INITIALIZED)) {
2559 log_link_debug(link, "State is %s, dropping config", link_state_to_string(link->state));
2560 r = link_drop_foreign_config(link);
2561 if (r < 0)
2562 return r;
2563 }
2564
2565 r = link_handle_bound_by_list(link);
2566 if (r < 0)
2567 return r;
2568
2569 return 0;
2570 }
2571
2572 int link_carrier_reset(Link *link) {
2573 int r;
2574
2575 assert(link);
2576
2577 if (link_has_carrier(link)) {
2578 r = link_carrier_lost(link);
2579 if (r < 0)
2580 return r;
2581
2582 r = link_carrier_gained(link);
2583 if (r < 0)
2584 return r;
2585
2586 log_link_info(link, "Reset carrier");
2587 }
2588
2589 return 0;
2590 }
2591
2592 /* This is called every time an interface admin state changes to up;
2593 * specifically, when IFF_UP flag changes from unset to set */
2594 static int link_admin_state_up(Link *link) {
2595 int r;
2596
2597 assert(link);
2598
2599 if (!link->network)
2600 return 0;
2601
2602 if (link->network->activation_policy == ACTIVATION_POLICY_ALWAYS_DOWN) {
2603 log_link_info(link, "ActivationPolicy is \"always-off\", forcing link down");
2604 return link_down(link, NULL);
2605 }
2606
2607 /* We set the ipv6 mtu after the device mtu, but the kernel resets
2608 * ipv6 mtu on NETDEV_UP, so we need to reset it. The check for
2609 * ipv6_mtu_set prevents this from trying to set it too early before
2610 * the link->network has been setup; we only need to reset it
2611 * here if we've already set it during normal initialization. */
2612 if (link->ipv6_mtu_set) {
2613 r = link_set_ipv6_mtu(link);
2614 if (r < 0)
2615 return r;
2616 }
2617
2618 return 0;
2619 }
2620
2621 static int link_admin_state_down(Link *link) {
2622
2623 assert(link);
2624
2625 if (!link->network)
2626 return 0;
2627
2628 if (link->network->activation_policy == ACTIVATION_POLICY_ALWAYS_UP) {
2629 log_link_info(link, "ActivationPolicy is \"always-on\", forcing link up");
2630 return link_up(link);
2631 }
2632
2633 return 0;
2634 }
2635
2636 int link_update(Link *link, sd_netlink_message *m) {
2637 _cleanup_strv_free_ char **s = NULL;
2638 hw_addr_data hw_addr;
2639 const char *ifname;
2640 uint32_t mtu;
2641 bool had_carrier, carrier_gained, carrier_lost, link_was_admin_up;
2642 int old_master, r;
2643
2644 assert(link);
2645 assert(link->ifname);
2646 assert(m);
2647
2648 if (link->state == LINK_STATE_LINGER) {
2649 log_link_info(link, "Link re-added");
2650 link_set_state(link, LINK_STATE_CONFIGURING);
2651
2652 r = link_new_carrier_maps(link);
2653 if (r < 0)
2654 return r;
2655 }
2656
2657 r = sd_netlink_message_read_string(m, IFLA_IFNAME, &ifname);
2658 if (r >= 0 && !streq(ifname, link->ifname)) {
2659 Manager *manager = link->manager;
2660
2661 log_link_info(link, "Interface name change detected, %s has been renamed to %s.", link->ifname, ifname);
2662
2663 link_drop(link);
2664 r = link_add(manager, m, &link);
2665 if (r < 0)
2666 return r;
2667 }
2668
2669 r = sd_netlink_message_read_strv(m, IFLA_PROP_LIST, IFLA_ALT_IFNAME, &s);
2670 if (r >= 0)
2671 strv_free_and_replace(link->alternative_names, s);
2672
2673 r = sd_netlink_message_read_u32(m, IFLA_MTU, &mtu);
2674 if (r >= 0 && mtu > 0) {
2675 link->mtu = mtu;
2676 if (link->original_mtu == 0) {
2677 link->original_mtu = mtu;
2678 log_link_debug(link, "Saved original MTU: %" PRIu32, link->original_mtu);
2679 }
2680
2681 if (link->dhcp_client) {
2682 r = sd_dhcp_client_set_mtu(link->dhcp_client,
2683 link->mtu);
2684 if (r < 0)
2685 return log_link_warning_errno(link, r, "Could not update MTU in DHCP client: %m");
2686 }
2687
2688 if (link->radv) {
2689 r = sd_radv_set_mtu(link->radv, link->mtu);
2690 if (r < 0)
2691 return log_link_warning_errno(link, r, "Could not set MTU for Router Advertisement: %m");
2692 }
2693 }
2694
2695 /* The kernel may broadcast NEWLINK messages without the MAC address
2696 set, simply ignore them. */
2697 r = netlink_message_read_hw_addr(m, IFLA_ADDRESS, &hw_addr);
2698 if (r >= 0 && (link->hw_addr.length != hw_addr.length ||
2699 memcmp(link->hw_addr.addr.bytes, hw_addr.addr.bytes, hw_addr.length) != 0)) {
2700
2701 memcpy(link->hw_addr.addr.bytes, hw_addr.addr.bytes, hw_addr.length);
2702
2703 log_link_debug(link, "Gained new hardware address: %s", HW_ADDR_TO_STR(&hw_addr));
2704
2705 r = ipv4ll_update_mac(link);
2706 if (r < 0)
2707 return log_link_warning_errno(link, r, "Could not update MAC address in IPv4LL client: %m");
2708
2709 r = dhcp4_update_mac(link);
2710 if (r < 0)
2711 return log_link_warning_errno(link, r, "Could not update MAC address in DHCP client: %m");
2712
2713 r = dhcp6_update_mac(link);
2714 if (r < 0)
2715 return log_link_warning_errno(link, r, "Could not update MAC address in DHCPv6 client: %m");
2716
2717 r = radv_update_mac(link);
2718 if (r < 0)
2719 return log_link_warning_errno(link, r, "Could not update MAC address for Router Advertisement: %m");
2720
2721 if (link->ndisc) {
2722 r = sd_ndisc_set_mac(link->ndisc, &link->hw_addr.addr.ether);
2723 if (r < 0)
2724 return log_link_warning_errno(link, r, "Could not update MAC for NDisc: %m");
2725 }
2726
2727 r = ipv4_dad_update_mac(link);
2728 if (r < 0)
2729 return log_link_warning_errno(link, r, "Could not update MAC address in IPv4 ACD client: %m");
2730 }
2731
2732 old_master = link->master_ifindex;
2733 (void) sd_netlink_message_read_u32(m, IFLA_MASTER, (uint32_t *) &link->master_ifindex);
2734
2735 link_was_admin_up = link->flags & IFF_UP;
2736 had_carrier = link_has_carrier(link);
2737
2738 r = link_update_flags(link, m, old_master != link->master_ifindex);
2739 if (r < 0)
2740 return r;
2741
2742 if (!link_was_admin_up && (link->flags & IFF_UP)) {
2743 log_link_info(link, "Link UP");
2744
2745 r = link_admin_state_up(link);
2746 if (r < 0)
2747 return r;
2748 } else if (link_was_admin_up && !(link->flags & IFF_UP)) {
2749 log_link_info(link, "Link DOWN");
2750
2751 r = link_admin_state_down(link);
2752 if (r < 0)
2753 return r;
2754 }
2755
2756 r = link_update_lldp(link);
2757 if (r < 0)
2758 return r;
2759
2760 carrier_gained = !had_carrier && link_has_carrier(link);
2761 carrier_lost = had_carrier && !link_has_carrier(link);
2762
2763 if (carrier_gained) {
2764 log_link_info(link, "Gained carrier");
2765
2766 r = link_carrier_gained(link);
2767 if (r < 0)
2768 return r;
2769 } else if (carrier_lost) {
2770 log_link_info(link, "Lost carrier");
2771
2772 r = link_carrier_lost(link);
2773 if (r < 0)
2774 return r;
2775 }
2776
2777 return 0;
2778 }
2779
2780 static void print_link_hashmap(FILE *f, const char *prefix, Hashmap* h) {
2781 bool space = false;
2782 Link *link;
2783
2784 assert(f);
2785 assert(prefix);
2786
2787 if (hashmap_isempty(h))
2788 return;
2789
2790 fputs(prefix, f);
2791 HASHMAP_FOREACH(link, h) {
2792 if (space)
2793 fputc(' ', f);
2794
2795 fprintf(f, "%i", link->ifindex);
2796 space = true;
2797 }
2798
2799 fputc('\n', f);
2800 }
2801
2802 static void link_save_dns(Link *link, FILE *f, struct in_addr_full **dns, unsigned n_dns, bool *space) {
2803 for (unsigned j = 0; j < n_dns; j++) {
2804 const char *str;
2805
2806 if (dns[j]->ifindex != 0 && dns[j]->ifindex != link->ifindex)
2807 continue;
2808
2809 str = in_addr_full_to_string(dns[j]);
2810 if (!str)
2811 continue;
2812
2813 if (*space)
2814 fputc(' ', f);
2815 fputs(str, f);
2816 *space = true;
2817 }
2818 }
2819
2820 static void serialize_addresses(
2821 FILE *f,
2822 const char *lvalue,
2823 bool *space,
2824 char **addresses,
2825 sd_dhcp_lease *lease,
2826 bool conditional,
2827 sd_dhcp_lease_server_type what,
2828 sd_dhcp6_lease *lease6,
2829 bool conditional6,
2830 int (*lease6_get_addr)(sd_dhcp6_lease*, const struct in6_addr**),
2831 int (*lease6_get_fqdn)(sd_dhcp6_lease*, char ***)) {
2832 int r;
2833
2834 bool _space = false;
2835 if (!space)
2836 space = &_space;
2837
2838 if (lvalue)
2839 fprintf(f, "%s=", lvalue);
2840 fputstrv(f, addresses, NULL, space);
2841
2842 if (lease && conditional) {
2843 const struct in_addr *lease_addresses;
2844
2845 r = sd_dhcp_lease_get_servers(lease, what, &lease_addresses);
2846 if (r > 0)
2847 serialize_in_addrs(f, lease_addresses, r, space, in4_addr_is_non_local);
2848 }
2849
2850 if (lease6 && conditional6 && lease6_get_addr) {
2851 const struct in6_addr *in6_addrs;
2852
2853 r = lease6_get_addr(lease6, &in6_addrs);
2854 if (r > 0)
2855 serialize_in6_addrs(f, in6_addrs, r, space);
2856 }
2857
2858 if (lease6 && conditional6 && lease6_get_fqdn) {
2859 char **in6_hosts;
2860
2861 r = lease6_get_fqdn(lease6, &in6_hosts);
2862 if (r > 0)
2863 fputstrv(f, in6_hosts, NULL, space);
2864 }
2865
2866 if (lvalue)
2867 fputc('\n', f);
2868 }
2869
2870 int link_save(Link *link) {
2871 const char *admin_state, *oper_state, *carrier_state, *address_state;
2872 _cleanup_free_ char *temp_path = NULL;
2873 _cleanup_fclose_ FILE *f = NULL;
2874 int r;
2875
2876 assert(link);
2877 assert(link->state_file);
2878 assert(link->lease_file);
2879 assert(link->manager);
2880
2881 if (link->state == LINK_STATE_LINGER) {
2882 (void) unlink(link->state_file);
2883 return 0;
2884 }
2885
2886 link_lldp_save(link);
2887
2888 admin_state = link_state_to_string(link->state);
2889 assert(admin_state);
2890
2891 oper_state = link_operstate_to_string(link->operstate);
2892 assert(oper_state);
2893
2894 carrier_state = link_carrier_state_to_string(link->carrier_state);
2895 assert(carrier_state);
2896
2897 address_state = link_address_state_to_string(link->address_state);
2898 assert(address_state);
2899
2900 r = fopen_temporary(link->state_file, &f, &temp_path);
2901 if (r < 0)
2902 goto fail;
2903
2904 (void) fchmod(fileno(f), 0644);
2905
2906 fprintf(f,
2907 "# This is private data. Do not parse.\n"
2908 "ADMIN_STATE=%s\n"
2909 "OPER_STATE=%s\n"
2910 "CARRIER_STATE=%s\n"
2911 "ADDRESS_STATE=%s\n",
2912 admin_state, oper_state, carrier_state, address_state);
2913
2914 if (link->network) {
2915 char **dhcp6_domains = NULL, **dhcp_domains = NULL;
2916 const char *dhcp_domainname = NULL, *p;
2917 bool space;
2918
2919 fprintf(f, "REQUIRED_FOR_ONLINE=%s\n",
2920 yes_no(link->network->required_for_online));
2921
2922 LinkOperationalStateRange st = link->network->required_operstate_for_online;
2923 fprintf(f, "REQUIRED_OPER_STATE_FOR_ONLINE=%s%s%s\n",
2924 strempty(link_operstate_to_string(st.min)),
2925 st.max != LINK_OPERSTATE_RANGE_DEFAULT.max ? ":" : "",
2926 st.max != LINK_OPERSTATE_RANGE_DEFAULT.max ? strempty(link_operstate_to_string(st.max)) : "");
2927
2928 fprintf(f, "ACTIVATION_POLICY=%s\n",
2929 activation_policy_to_string(link->network->activation_policy));
2930
2931 fprintf(f, "NETWORK_FILE=%s\n", link->network->filename);
2932
2933 /************************************************************/
2934
2935 fputs("DNS=", f);
2936 space = false;
2937 if (link->n_dns != (unsigned) -1)
2938 link_save_dns(link, f, link->dns, link->n_dns, &space);
2939 else
2940 link_save_dns(link, f, link->network->dns, link->network->n_dns, &space);
2941
2942 serialize_addresses(f, NULL, &space,
2943 NULL,
2944 link->dhcp_lease,
2945 link->network->dhcp_use_dns,
2946 SD_DHCP_LEASE_DNS,
2947 link->dhcp6_lease,
2948 link->network->dhcp6_use_dns,
2949 sd_dhcp6_lease_get_dns,
2950 NULL);
2951
2952 /* Make sure to flush out old entries before we use the NDisc data */
2953 ndisc_vacuum(link);
2954
2955 if (link->network->ipv6_accept_ra_use_dns && link->ndisc_rdnss) {
2956 NDiscRDNSS *dd;
2957
2958 SET_FOREACH(dd, link->ndisc_rdnss)
2959 serialize_in6_addrs(f, &dd->address, 1, &space);
2960 }
2961
2962 fputc('\n', f);
2963
2964 /************************************************************/
2965
2966 serialize_addresses(f, "NTP", NULL,
2967 link->ntp ?: link->network->ntp,
2968 link->dhcp_lease,
2969 link->network->dhcp_use_ntp,
2970 SD_DHCP_LEASE_NTP,
2971 link->dhcp6_lease,
2972 link->network->dhcp6_use_ntp,
2973 sd_dhcp6_lease_get_ntp_addrs,
2974 sd_dhcp6_lease_get_ntp_fqdn);
2975
2976 serialize_addresses(f, "SIP", NULL,
2977 NULL,
2978 link->dhcp_lease,
2979 link->network->dhcp_use_sip,
2980 SD_DHCP_LEASE_SIP,
2981 NULL, false, NULL, NULL);
2982
2983 /************************************************************/
2984
2985 if (link->network->dhcp_use_domains != DHCP_USE_DOMAINS_NO) {
2986 if (link->dhcp_lease) {
2987 (void) sd_dhcp_lease_get_domainname(link->dhcp_lease, &dhcp_domainname);
2988 (void) sd_dhcp_lease_get_search_domains(link->dhcp_lease, &dhcp_domains);
2989 }
2990 if (link->dhcp6_lease)
2991 (void) sd_dhcp6_lease_get_domains(link->dhcp6_lease, &dhcp6_domains);
2992 }
2993
2994 fputs("DOMAINS=", f);
2995 space = false;
2996 ORDERED_SET_FOREACH(p, link->search_domains ?: link->network->search_domains)
2997 fputs_with_space(f, p, NULL, &space);
2998
2999 if (link->network->dhcp_use_domains == DHCP_USE_DOMAINS_YES) {
3000 if (dhcp_domainname)
3001 fputs_with_space(f, dhcp_domainname, NULL, &space);
3002 if (dhcp_domains)
3003 fputstrv(f, dhcp_domains, NULL, &space);
3004 if (dhcp6_domains)
3005 fputstrv(f, dhcp6_domains, NULL, &space);
3006 }
3007
3008 if (link->network->ipv6_accept_ra_use_domains == DHCP_USE_DOMAINS_YES) {
3009 NDiscDNSSL *dd;
3010
3011 SET_FOREACH(dd, link->ndisc_dnssl)
3012 fputs_with_space(f, NDISC_DNSSL_DOMAIN(dd), NULL, &space);
3013 }
3014
3015 fputc('\n', f);
3016
3017 /************************************************************/
3018
3019 fputs("ROUTE_DOMAINS=", f);
3020 space = false;
3021 ORDERED_SET_FOREACH(p, link->route_domains ?: link->network->route_domains)
3022 fputs_with_space(f, p, NULL, &space);
3023
3024 if (link->network->dhcp_use_domains == DHCP_USE_DOMAINS_ROUTE) {
3025 if (dhcp_domainname)
3026 fputs_with_space(f, dhcp_domainname, NULL, &space);
3027 if (dhcp_domains)
3028 fputstrv(f, dhcp_domains, NULL, &space);
3029 if (dhcp6_domains)
3030 fputstrv(f, dhcp6_domains, NULL, &space);
3031 }
3032
3033 if (link->network->ipv6_accept_ra_use_domains == DHCP_USE_DOMAINS_ROUTE) {
3034 NDiscDNSSL *dd;
3035
3036 SET_FOREACH(dd, link->ndisc_dnssl)
3037 fputs_with_space(f, NDISC_DNSSL_DOMAIN(dd), NULL, &space);
3038 }
3039
3040 fputc('\n', f);
3041
3042 /************************************************************/
3043
3044 fprintf(f, "LLMNR=%s\n",
3045 resolve_support_to_string(link->llmnr >= 0 ? link->llmnr : link->network->llmnr));
3046
3047 /************************************************************/
3048
3049 fprintf(f, "MDNS=%s\n",
3050 resolve_support_to_string(link->mdns >= 0 ? link->mdns : link->network->mdns));
3051
3052 /************************************************************/
3053
3054 int dns_default_route =
3055 link->dns_default_route >= 0 ? link->dns_default_route :
3056 link->network->dns_default_route;
3057 if (dns_default_route >= 0)
3058 fprintf(f, "DNS_DEFAULT_ROUTE=%s\n", yes_no(dns_default_route));
3059
3060 /************************************************************/
3061
3062 DnsOverTlsMode dns_over_tls_mode =
3063 link->dns_over_tls_mode != _DNS_OVER_TLS_MODE_INVALID ? link->dns_over_tls_mode :
3064 link->network->dns_over_tls_mode;
3065 if (dns_over_tls_mode != _DNS_OVER_TLS_MODE_INVALID)
3066 fprintf(f, "DNS_OVER_TLS=%s\n", dns_over_tls_mode_to_string(dns_over_tls_mode));
3067
3068 /************************************************************/
3069
3070 DnssecMode dnssec_mode =
3071 link->dnssec_mode != _DNSSEC_MODE_INVALID ? link->dnssec_mode :
3072 link->network->dnssec_mode;
3073 if (dnssec_mode != _DNSSEC_MODE_INVALID)
3074 fprintf(f, "DNSSEC=%s\n", dnssec_mode_to_string(dnssec_mode));
3075
3076 /************************************************************/
3077
3078 Set *nta_anchors = link->dnssec_negative_trust_anchors;
3079 if (set_isempty(nta_anchors))
3080 nta_anchors = link->network->dnssec_negative_trust_anchors;
3081
3082 if (!set_isempty(nta_anchors)) {
3083 const char *n;
3084
3085 fputs("DNSSEC_NTA=", f);
3086 space = false;
3087 SET_FOREACH(n, nta_anchors)
3088 fputs_with_space(f, n, NULL, &space);
3089 fputc('\n', f);
3090 }
3091 }
3092
3093 print_link_hashmap(f, "CARRIER_BOUND_TO=", link->bound_to_links);
3094 print_link_hashmap(f, "CARRIER_BOUND_BY=", link->bound_by_links);
3095
3096 if (link->dhcp_lease) {
3097 r = dhcp_lease_save(link->dhcp_lease, link->lease_file);
3098 if (r < 0)
3099 goto fail;
3100
3101 fprintf(f,
3102 "DHCP_LEASE=%s\n",
3103 link->lease_file);
3104 } else
3105 (void) unlink(link->lease_file);
3106
3107 r = link_serialize_dhcp6_client(link, f);
3108 if (r < 0)
3109 goto fail;
3110
3111 r = fflush_and_check(f);
3112 if (r < 0)
3113 goto fail;
3114
3115 r = conservative_rename(temp_path, link->state_file);
3116 if (r < 0)
3117 goto fail;
3118
3119 return 0;
3120
3121 fail:
3122 (void) unlink(link->state_file);
3123 if (temp_path)
3124 (void) unlink(temp_path);
3125
3126 return log_link_error_errno(link, r, "Failed to save link data to %s: %m", link->state_file);
3127 }
3128
3129 /* The serialized state in /run is no longer up-to-date. */
3130 void link_dirty(Link *link) {
3131 int r;
3132
3133 assert(link);
3134
3135 /* mark manager dirty as link is dirty */
3136 manager_dirty(link->manager);
3137
3138 r = set_ensure_put(&link->manager->dirty_links, NULL, link);
3139 if (r <= 0)
3140 /* Ignore allocation errors and don't take another ref if the link was already dirty */
3141 return;
3142 link_ref(link);
3143 }
3144
3145 /* The serialized state in /run is up-to-date */
3146 void link_clean(Link *link) {
3147 assert(link);
3148 assert(link->manager);
3149
3150 link_unref(set_remove(link->manager->dirty_links, link));
3151 }
3152
3153 int link_save_and_clean(Link *link) {
3154 int r;
3155
3156 r = link_save(link);
3157 if (r < 0)
3158 return r;
3159
3160 link_clean(link);
3161 return 0;
3162 }
3163
3164 static const char* const link_state_table[_LINK_STATE_MAX] = {
3165 [LINK_STATE_PENDING] = "pending",
3166 [LINK_STATE_INITIALIZED] = "initialized",
3167 [LINK_STATE_CONFIGURING] = "configuring",
3168 [LINK_STATE_CONFIGURED] = "configured",
3169 [LINK_STATE_UNMANAGED] = "unmanaged",
3170 [LINK_STATE_FAILED] = "failed",
3171 [LINK_STATE_LINGER] = "linger",
3172 };
3173
3174 DEFINE_STRING_TABLE_LOOKUP(link_state, LinkState);
3175
3176 int log_link_message_full_errno(Link *link, sd_netlink_message *m, int level, int err, const char *msg) {
3177 const char *err_msg = NULL;
3178
3179 (void) sd_netlink_message_read_string(m, NLMSGERR_ATTR_MSG, &err_msg);
3180 return log_link_full_errno(link, level, err,
3181 "%s: %s%s%s%m",
3182 msg,
3183 strempty(err_msg),
3184 err_msg && !endswith(err_msg, ".") ? "." : "",
3185 err_msg ? " " : "");
3186 }