]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/network/netdev/netdev.c
tree-wide: make sure net/if.h is included before any linux/ header
[thirdparty/systemd.git] / src / network / netdev / netdev.c
CommitLineData
db9ecf05 1/* SPDX-License-Identifier: LGPL-2.1-or-later */
02b59d57 2
edda10f2 3/* Make sure the net/if.h header is included before any linux/ one */
987efa17 4#include <net/if.h>
f2000933 5#include <netinet/in.h>
007899f4 6#include <linux/if_arp.h>
a0b191b7 7#include <unistd.h>
987efa17 8
b5efdb8a 9#include "alloc-util.h"
007899f4 10#include "arphrd-util.h"
e6980c72 11#include "bareudp.h"
c0267a59 12#include "batadv.h"
737f1405
YW
13#include "bond.h"
14#include "bridge.h"
02b59d57
TG
15#include "conf-files.h"
16#include "conf-parser.h"
737f1405 17#include "dummy.h"
3ffd4af2 18#include "fd-util.h"
737f1405
YW
19#include "fou-tunnel.h"
20#include "geneve.h"
3295a461 21#include "ifb.h"
b90d0f83 22#include "ipoib.h"
737f1405
YW
23#include "ipvlan.h"
24#include "l2tp-tunnel.h"
02b59d57 25#include "list.h"
737f1405
YW
26#include "macsec.h"
27#include "macvlan.h"
28#include "netdev.h"
29#include "netdevsim.h"
007899f4 30#include "netif-util.h"
3a56e697 31#include "netlink-util.h"
3a56e697 32#include "networkd-manager.h"
71a754f7 33#include "networkd-queue.h"
9b682672 34#include "networkd-setlink.h"
e33232d4 35#include "networkd-sriov.h"
737f1405 36#include "nlmon.h"
b0c82192 37#include "path-lookup.h"
3a56e697
SS
38#include "siphash24.h"
39#include "stat-util.h"
40#include "string-table.h"
41#include "string-util.h"
42#include "strv.h"
737f1405
YW
43#include "tunnel.h"
44#include "tuntap.h"
45#include "vcan.h"
46#include "veth.h"
47#include "vlan.h"
48#include "vrf.h"
49#include "vxcan.h"
50#include "vxlan.h"
51#include "wireguard.h"
dedf2d00 52#include "wlan.h"
737f1405 53#include "xfrm.h"
23f53b99 54
3be1d7e0 55const NetDevVTable * const netdev_vtable[_NETDEV_KIND_MAX] = {
bc945c2b
YW
56 [NETDEV_KIND_BAREUDP] = &bare_udp_vtable,
57 [NETDEV_KIND_BATADV] = &batadv_vtable,
58 [NETDEV_KIND_BOND] = &bond_vtable,
59 [NETDEV_KIND_BRIDGE] = &bridge_vtable,
60 [NETDEV_KIND_DUMMY] = &dummy_vtable,
61 [NETDEV_KIND_ERSPAN] = &erspan_vtable,
62 [NETDEV_KIND_FOU] = &foutnl_vtable,
63 [NETDEV_KIND_GENEVE] = &geneve_vtable,
64 [NETDEV_KIND_GRE] = &gre_vtable,
65 [NETDEV_KIND_GRETAP] = &gretap_vtable,
66 [NETDEV_KIND_IFB] = &ifb_vtable,
67 [NETDEV_KIND_IP6GRE] = &ip6gre_vtable,
b16492f8 68 [NETDEV_KIND_IP6GRETAP] = &ip6gretap_vtable,
bc945c2b
YW
69 [NETDEV_KIND_IP6TNL] = &ip6tnl_vtable,
70 [NETDEV_KIND_IPIP] = &ipip_vtable,
b90d0f83 71 [NETDEV_KIND_IPOIB] = &ipoib_vtable,
bc945c2b
YW
72 [NETDEV_KIND_IPVLAN] = &ipvlan_vtable,
73 [NETDEV_KIND_IPVTAP] = &ipvtap_vtable,
74 [NETDEV_KIND_L2TP] = &l2tptnl_vtable,
75 [NETDEV_KIND_MACSEC] = &macsec_vtable,
76 [NETDEV_KIND_MACVLAN] = &macvlan_vtable,
77 [NETDEV_KIND_MACVTAP] = &macvtap_vtable,
56e7fb50 78 [NETDEV_KIND_NETDEVSIM] = &netdevsim_vtable,
bc945c2b
YW
79 [NETDEV_KIND_NLMON] = &nlmon_vtable,
80 [NETDEV_KIND_SIT] = &sit_vtable,
81 [NETDEV_KIND_TAP] = &tap_vtable,
82 [NETDEV_KIND_TUN] = &tun_vtable,
83 [NETDEV_KIND_VCAN] = &vcan_vtable,
84 [NETDEV_KIND_VETH] = &veth_vtable,
85 [NETDEV_KIND_VLAN] = &vlan_vtable,
86 [NETDEV_KIND_VRF] = &vrf_vtable,
87 [NETDEV_KIND_VTI6] = &vti6_vtable,
88 [NETDEV_KIND_VTI] = &vti_vtable,
89 [NETDEV_KIND_VXCAN] = &vxcan_vtable,
90 [NETDEV_KIND_VXLAN] = &vxlan_vtable,
91 [NETDEV_KIND_WIREGUARD] = &wireguard_vtable,
dedf2d00 92 [NETDEV_KIND_WLAN] = &wlan_vtable,
bc945c2b 93 [NETDEV_KIND_XFRM] = &xfrm_vtable,
3be1d7e0
TG
94};
95
2c5859af 96static const char* const netdev_kind_table[_NETDEV_KIND_MAX] = {
bc945c2b
YW
97 [NETDEV_KIND_BAREUDP] = "bareudp",
98 [NETDEV_KIND_BATADV] = "batadv",
99 [NETDEV_KIND_BOND] = "bond",
100 [NETDEV_KIND_BRIDGE] = "bridge",
101 [NETDEV_KIND_DUMMY] = "dummy",
102 [NETDEV_KIND_ERSPAN] = "erspan",
103 [NETDEV_KIND_FOU] = "fou",
104 [NETDEV_KIND_GENEVE] = "geneve",
105 [NETDEV_KIND_GRE] = "gre",
106 [NETDEV_KIND_GRETAP] = "gretap",
107 [NETDEV_KIND_IFB] = "ifb",
108 [NETDEV_KIND_IP6GRE] = "ip6gre",
b16492f8 109 [NETDEV_KIND_IP6GRETAP] = "ip6gretap",
bc945c2b
YW
110 [NETDEV_KIND_IP6TNL] = "ip6tnl",
111 [NETDEV_KIND_IPIP] = "ipip",
b90d0f83 112 [NETDEV_KIND_IPOIB] = "ipoib",
bc945c2b
YW
113 [NETDEV_KIND_IPVLAN] = "ipvlan",
114 [NETDEV_KIND_IPVTAP] = "ipvtap",
115 [NETDEV_KIND_L2TP] = "l2tp",
116 [NETDEV_KIND_MACSEC] = "macsec",
117 [NETDEV_KIND_MACVLAN] = "macvlan",
118 [NETDEV_KIND_MACVTAP] = "macvtap",
56e7fb50 119 [NETDEV_KIND_NETDEVSIM] = "netdevsim",
bc945c2b
YW
120 [NETDEV_KIND_NLMON] = "nlmon",
121 [NETDEV_KIND_SIT] = "sit",
122 [NETDEV_KIND_TAP] = "tap",
123 [NETDEV_KIND_TUN] = "tun",
124 [NETDEV_KIND_VCAN] = "vcan",
125 [NETDEV_KIND_VETH] = "veth",
126 [NETDEV_KIND_VLAN] = "vlan",
127 [NETDEV_KIND_VRF] = "vrf",
128 [NETDEV_KIND_VTI6] = "vti6",
129 [NETDEV_KIND_VTI] = "vti",
130 [NETDEV_KIND_VXCAN] = "vxcan",
131 [NETDEV_KIND_VXLAN] = "vxlan",
132 [NETDEV_KIND_WIREGUARD] = "wireguard",
ec4954d9 133 [NETDEV_KIND_WLAN] = "wlan",
bc945c2b 134 [NETDEV_KIND_XFRM] = "xfrm",
52433f6b 135};
02b59d57 136
1a436809 137DEFINE_STRING_TABLE_LOOKUP(netdev_kind, NetDevKind);
62facba1 138
9e2bbf99
YW
139bool netdev_is_managed(NetDev *netdev) {
140 if (!netdev || !netdev->manager || !netdev->ifname)
141 return false;
142
143 return hashmap_get(netdev->manager->netdevs, netdev->ifname) == netdev;
144}
145
798e5dc8
YW
146static bool netdev_is_stacked_and_independent(NetDev *netdev) {
147 assert(netdev);
148
3d24b0dd 149 if (netdev_get_create_type(netdev) != NETDEV_CREATE_STACKED)
798e5dc8
YW
150 return false;
151
152 switch (netdev->kind) {
153 case NETDEV_KIND_ERSPAN:
154 return ERSPAN(netdev)->independent;
155 case NETDEV_KIND_GRE:
156 return GRE(netdev)->independent;
157 case NETDEV_KIND_GRETAP:
158 return GRETAP(netdev)->independent;
159 case NETDEV_KIND_IP6GRE:
160 return IP6GRE(netdev)->independent;
161 case NETDEV_KIND_IP6GRETAP:
162 return IP6GRETAP(netdev)->independent;
163 case NETDEV_KIND_IP6TNL:
164 return IP6TNL(netdev)->independent;
165 case NETDEV_KIND_IPIP:
166 return IPIP(netdev)->independent;
167 case NETDEV_KIND_SIT:
168 return SIT(netdev)->independent;
169 case NETDEV_KIND_VTI:
170 return VTI(netdev)->independent;
171 case NETDEV_KIND_VTI6:
172 return VTI6(netdev)->independent;
173 case NETDEV_KIND_VXLAN:
174 return VXLAN(netdev)->independent;
175 case NETDEV_KIND_XFRM:
176 return XFRM(netdev)->independent;
177 default:
178 return false;
179 }
180}
181
2f117922
YW
182static bool netdev_is_stacked(NetDev *netdev) {
183 assert(netdev);
184
3d24b0dd 185 if (netdev_get_create_type(netdev) != NETDEV_CREATE_STACKED)
2f117922
YW
186 return false;
187
188 if (netdev_is_stacked_and_independent(netdev))
189 return false;
190
191 return true;
192}
193
c4397d94
YW
194static void netdev_detach_from_manager(NetDev *netdev) {
195 if (netdev->ifname && netdev->manager)
196 hashmap_remove(netdev->manager->netdevs, netdev->ifname);
c4397d94
YW
197}
198
8301aa0b
YW
199static NetDev *netdev_free(NetDev *netdev) {
200 assert(netdev);
59cb64e6 201
f3c33b23
LP
202 /* Invoke the per-kind done() destructor, but only if the state field is initialized. We conditionalize that
203 * because we parse .netdev files twice: once to determine the kind (with a short, minimal NetDev structure
204 * allocation, with no room for per-kind fields), and once to read the kind's properties (with a full,
205 * comprehensive NetDev structure allocation with enough space for whatever the specific kind needs). Now, in
206 * the first case we shouldn't try to destruct the per-kind NetDev fields on destruction, in the second case we
207 * should. We use the state field to discern the two cases: it's _NETDEV_STATE_INVALID on the first "raw"
208 * call. */
209 if (netdev->state != _NETDEV_STATE_INVALID &&
210 NETDEV_VTABLE(netdev) &&
aa9f1140
TG
211 NETDEV_VTABLE(netdev)->done)
212 NETDEV_VTABLE(netdev)->done(netdev);
213
f475584e
YW
214 netdev_detach_from_manager(netdev);
215
216 condition_free_list(netdev->conditions);
217 free(netdev->filename);
218 free(netdev->description);
219 free(netdev->ifname);
220
8301aa0b 221 return mfree(netdev);
14b746f7
TG
222}
223
8301aa0b 224DEFINE_TRIVIAL_REF_UNREF_FUNC(NetDev, netdev, netdev_free);
14b746f7 225
2cc7e981 226void netdev_drop(NetDev *netdev) {
2f117922 227 if (!netdev)
2cc7e981
TG
228 return;
229
2f117922
YW
230 if (netdev_is_stacked(netdev)) {
231 /* The netdev may be removed due to the underlying device removal, and the device may
232 * be re-added later. */
233 netdev->state = NETDEV_STATE_LOADING;
234 netdev->ifindex = 0;
235
236 log_netdev_debug(netdev, "netdev removed");
237 return;
238 }
239
af7a86b8
YW
240 if (NETDEV_VTABLE(netdev) && NETDEV_VTABLE(netdev)->drop)
241 NETDEV_VTABLE(netdev)->drop(netdev);
242
2cc7e981
TG
243 netdev->state = NETDEV_STATE_LINGER;
244
79008bdd 245 log_netdev_debug(netdev, "netdev removed");
370e9930 246
c4397d94 247 netdev_detach_from_manager(netdev);
2cc7e981 248 netdev_unref(netdev);
2cc7e981
TG
249 return;
250}
251
1a436809
TG
252int netdev_get(Manager *manager, const char *name, NetDev **ret) {
253 NetDev *netdev;
02b59d57
TG
254
255 assert(manager);
256 assert(name);
257 assert(ret);
258
52433f6b 259 netdev = hashmap_get(manager->netdevs, name);
fef805b9 260 if (!netdev)
02b59d57 261 return -ENOENT;
02b59d57 262
52433f6b 263 *ret = netdev;
02b59d57
TG
264
265 return 0;
266}
267
8f65304c 268void netdev_enter_failed(NetDev *netdev) {
52433f6b 269 netdev->state = NETDEV_STATE_FAILED;
02b59d57
TG
270}
271
1a436809 272static int netdev_enter_ready(NetDev *netdev) {
52433f6b 273 assert(netdev);
af4e9e2c 274 assert(netdev->ifname);
924fe430 275
ba5596ec
TG
276 if (netdev->state != NETDEV_STATE_CREATING)
277 return 0;
278
52433f6b 279 netdev->state = NETDEV_STATE_READY;
02b59d57 280
98b32556 281 log_netdev_info(netdev, "netdev ready");
02b59d57 282
540eb5f0 283 if (NETDEV_VTABLE(netdev)->post_create)
c2b19b8f 284 NETDEV_VTABLE(netdev)->post_create(netdev, NULL);
540eb5f0 285
02b59d57
TG
286 return 0;
287}
8469c1d3 288
d5b3d845 289/* callback for netdev's created without a backing Link */
302a796f 290static int netdev_create_handler(sd_netlink *rtnl, sd_netlink_message *m, NetDev *netdev) {
172f6635 291 int r;
02b59d57 292
1046bf9b 293 assert(netdev);
52433f6b 294 assert(netdev->state != _NETDEV_STATE_INVALID);
02b59d57 295
1c4baffc 296 r = sd_netlink_message_get_errno(m);
e09826dc 297 if (r == -EEXIST)
98b32556 298 log_netdev_info(netdev, "netdev exists, using existing without changing its parameters");
505f8da7 299 else if (r < 0) {
6a7a4e4d 300 log_netdev_warning_errno(netdev, r, "netdev could not be created: %m");
8f65304c 301 netdev_enter_failed(netdev);
dd3efc09
TG
302
303 return 1;
02b59d57
TG
304 }
305
6a7a4e4d 306 log_netdev_debug(netdev, "Created");
aa9f1140 307
dd3efc09 308 return 1;
02b59d57
TG
309}
310
1c4baffc 311int netdev_set_ifindex(NetDev *netdev, sd_netlink_message *message) {
c3ebdce3 312 uint16_t type;
d39edfc7 313 const char *kind;
ca4e095a
LP
314 const char *received_kind;
315 const char *received_name;
d39edfc7
TG
316 int r, ifindex;
317
50add290 318 assert(netdev);
c3ebdce3 319 assert(message);
02b59d57 320
1c4baffc 321 r = sd_netlink_message_get_type(message, &type);
6a7a4e4d
LP
322 if (r < 0)
323 return log_netdev_error_errno(netdev, r, "Could not get rtnl message type: %m");
c3ebdce3 324
5a9494be
YW
325 if (type != RTM_NEWLINK)
326 return log_netdev_error_errno(netdev, SYNTHETIC_ERRNO(EINVAL), "Cannot set ifindex from unexpected rtnl message type.");
d39edfc7 327
a21df104
TG
328 r = sd_rtnl_message_link_get_ifindex(message, &ifindex);
329 if (r < 0) {
6a7a4e4d 330 log_netdev_error_errno(netdev, r, "Could not get ifindex: %m");
a21df104
TG
331 netdev_enter_failed(netdev);
332 return r;
333 } else if (ifindex <= 0) {
79008bdd 334 log_netdev_error(netdev, "Got invalid ifindex: %d", ifindex);
a21df104 335 netdev_enter_failed(netdev);
6a7a4e4d 336 return -EINVAL;
a21df104
TG
337 }
338
a21df104
TG
339 if (netdev->ifindex > 0) {
340 if (netdev->ifindex != ifindex) {
79008bdd 341 log_netdev_error(netdev, "Could not set ifindex to %d, already set to %d",
a21df104
TG
342 ifindex, netdev->ifindex);
343 netdev_enter_failed(netdev);
344 return -EEXIST;
345 } else
346 /* ifindex already set to the same for this netdev */
347 return 0;
348 }
349
1c4baffc 350 r = sd_netlink_message_read_string(message, IFLA_IFNAME, &received_name);
6a7a4e4d
LP
351 if (r < 0)
352 return log_netdev_error_errno(netdev, r, "Could not get IFNAME: %m");
c6315a7a 353
af4e9e2c 354 if (!streq(netdev->ifname, received_name)) {
6a7a4e4d 355 log_netdev_error(netdev, "Received newlink with wrong IFNAME %s", received_name);
c6315a7a 356 netdev_enter_failed(netdev);
72f09281 357 return -EINVAL;
c6315a7a
TG
358 }
359
1d4312d5
YW
360 if (!NETDEV_VTABLE(netdev)->skip_netdev_kind_check) {
361
362 r = sd_netlink_message_enter_container(message, IFLA_LINKINFO);
363 if (r < 0)
364 return log_netdev_error_errno(netdev, r, "Could not get LINKINFO: %m");
365
366 r = sd_netlink_message_read_string(message, IFLA_INFO_KIND, &received_kind);
367 if (r < 0)
368 return log_netdev_error_errno(netdev, r, "Could not get KIND: %m");
369
370 r = sd_netlink_message_exit_container(message);
371 if (r < 0)
372 return log_netdev_error_errno(netdev, r, "Could not exit container: %m");
373
374 if (netdev->kind == NETDEV_KIND_TAP)
375 /* the kernel does not distinguish between tun and tap */
376 kind = "tun";
377 else {
378 kind = netdev_kind_to_string(netdev->kind);
379 if (!kind) {
380 log_netdev_error(netdev, "Could not get kind");
381 netdev_enter_failed(netdev);
382 return -EINVAL;
383 }
384 }
d39edfc7 385
1d4312d5
YW
386 if (!streq(kind, received_kind)) {
387 log_netdev_error(netdev, "Received newlink with wrong KIND %s, expected %s",
388 received_kind, kind);
30ae9dfd
SS
389 netdev_enter_failed(netdev);
390 return -EINVAL;
391 }
c3ebdce3
TG
392 }
393
50add290 394 netdev->ifindex = ifindex;
52433f6b 395
79008bdd 396 log_netdev_debug(netdev, "netdev has index %d", netdev->ifindex);
5261692f 397
52433f6b 398 netdev_enter_ready(netdev);
02b59d57
TG
399
400 return 0;
401}
402
5c8f858d
TG
403#define HASH_KEY SD_ID128_MAKE(52,e1,45,bd,00,6f,29,96,21,c6,30,6d,83,71,04,48)
404
a8ee2b8e
YW
405int netdev_generate_hw_addr(
406 NetDev *netdev,
b90d0f83 407 Link *parent,
a8ee2b8e
YW
408 const char *name,
409 const struct hw_addr_data *hw_addr,
410 struct hw_addr_data *ret) {
411
412 struct hw_addr_data a = HW_ADDR_NULL;
45aa0e84 413 bool is_static = false;
5c8f858d
TG
414 int r;
415
007899f4
YW
416 assert(netdev);
417 assert(name);
418 assert(hw_addr);
a8ee2b8e 419 assert(ret);
5c8f858d 420
a8ee2b8e
YW
421 if (hw_addr_equal(hw_addr, &HW_ADDR_NONE)) {
422 *ret = HW_ADDR_NULL;
aaa5ca57 423 return 0;
a8ee2b8e 424 }
aaa5ca57 425
007899f4
YW
426 if (hw_addr->length == 0) {
427 uint64_t result;
5c8f858d 428
007899f4 429 /* HardwareAddress= is not specified. */
5c8f858d 430
007899f4 431 if (!NETDEV_VTABLE(netdev)->generate_mac)
a8ee2b8e 432 goto finalize;
5c8f858d 433
b90d0f83 434 if (!IN_SET(NETDEV_VTABLE(netdev)->iftype, ARPHRD_ETHER, ARPHRD_INFINIBAND))
a8ee2b8e 435 goto finalize;
5c8f858d 436
007899f4
YW
437 r = net_get_unique_predictable_data_from_name(name, &HASH_KEY, &result);
438 if (r < 0) {
439 log_netdev_warning_errno(netdev, r,
440 "Failed to generate persistent MAC address, ignoring: %m");
a8ee2b8e 441 goto finalize;
007899f4 442 }
5c8f858d 443
007899f4 444 a.length = arphrd_to_hw_addr_len(NETDEV_VTABLE(netdev)->iftype);
5c8f858d 445
b90d0f83
YW
446 switch (NETDEV_VTABLE(netdev)->iftype) {
447 case ARPHRD_ETHER:
448 assert(a.length <= sizeof(result));
449 memcpy(a.bytes, &result, a.length);
450
451 if (ether_addr_is_null(&a.ether) || ether_addr_is_broadcast(&a.ether)) {
452 log_netdev_warning_errno(netdev, SYNTHETIC_ERRNO(EINVAL),
453 "Failed to generate persistent MAC address, ignoring: %m");
454 a = HW_ADDR_NULL;
455 goto finalize;
456 }
457
458 break;
459 case ARPHRD_INFINIBAND:
460 if (result == 0) {
461 log_netdev_warning_errno(netdev, SYNTHETIC_ERRNO(EINVAL),
462 "Failed to generate persistent MAC address: %m");
463 goto finalize;
464 }
465
466 assert(a.length >= sizeof(result));
467 memzero(a.bytes, a.length - sizeof(result));
468 memcpy(a.bytes + a.length - sizeof(result), &result, sizeof(result));
469 break;
470 default:
471 assert_not_reached();
007899f4 472 }
b90d0f83 473
007899f4
YW
474 } else {
475 a = *hw_addr;
45aa0e84 476 is_static = true;
007899f4
YW
477 }
478
45aa0e84 479 r = net_verify_hardware_address(name, is_static, NETDEV_VTABLE(netdev)->iftype,
b90d0f83 480 parent ? &parent->hw_addr : NULL, &a);
007899f4
YW
481 if (r < 0)
482 return r;
483
a8ee2b8e
YW
484finalize:
485 *ret = a;
5c8f858d
TG
486 return 0;
487}
488
0c50cb50 489static int netdev_create_message(NetDev *netdev, Link *link, sd_netlink_message *m) {
aa9f1140
TG
490 int r;
491
28a8cc0a
YW
492 r = sd_netlink_message_append_string(m, IFLA_IFNAME, netdev->ifname);
493 if (r < 0)
0c50cb50 494 return r;
aa9f1140 495
0c50cb50 496 struct hw_addr_data hw_addr;
b90d0f83 497 r = netdev_generate_hw_addr(netdev, link, netdev->ifname, &netdev->hw_addr, &hw_addr);
a8ee2b8e
YW
498 if (r < 0)
499 return r;
500
501 if (hw_addr.length > 0) {
502 log_netdev_debug(netdev, "Using MAC address: %s", HW_ADDR_TO_STR(&hw_addr));
503 r = netlink_message_append_hw_addr(m, IFLA_ADDRESS, &hw_addr);
6a7a4e4d 504 if (r < 0)
0c50cb50 505 return r;
28a8cc0a 506 }
aa9f1140 507
28a8cc0a
YW
508 if (netdev->mtu != 0) {
509 r = sd_netlink_message_append_u32(m, IFLA_MTU, netdev->mtu);
6a7a4e4d 510 if (r < 0)
0c50cb50 511 return r;
28a8cc0a 512 }
aa9f1140 513
28a8cc0a
YW
514 if (link) {
515 r = sd_netlink_message_append_u32(m, IFLA_LINK, link->ifindex);
516 if (r < 0)
0c50cb50 517 return r;
28a8cc0a 518 }
aa9f1140 519
28a8cc0a
YW
520 r = sd_netlink_message_open_container(m, IFLA_LINKINFO);
521 if (r < 0)
0c50cb50 522 return r;
aa9f1140 523
28a8cc0a
YW
524 if (NETDEV_VTABLE(netdev)->fill_message_create) {
525 r = sd_netlink_message_open_container_union(m, IFLA_INFO_DATA, netdev_kind_to_string(netdev->kind));
526 if (r < 0)
0c50cb50 527 return r;
aa9f1140 528
28a8cc0a 529 r = NETDEV_VTABLE(netdev)->fill_message_create(netdev, link, m);
6a7a4e4d 530 if (r < 0)
0c50cb50 531 return r;
aa9f1140 532
1c4baffc 533 r = sd_netlink_message_close_container(m);
6a7a4e4d 534 if (r < 0)
0c50cb50 535 return r;
28a8cc0a
YW
536 } else {
537 r = sd_netlink_message_append_string(m, IFLA_INFO_KIND, netdev_kind_to_string(netdev->kind));
538 if (r < 0)
0c50cb50 539 return r;
28a8cc0a 540 }
aa9f1140 541
28a8cc0a
YW
542 r = sd_netlink_message_close_container(m);
543 if (r < 0)
0c50cb50
ZJS
544 return r;
545
546 return 0;
547}
548
b4d6ae63 549static int independent_netdev_create(NetDev *netdev) {
0c50cb50
ZJS
550 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *m = NULL;
551 int r;
552
553 assert(netdev);
0c50cb50
ZJS
554
555 /* create netdev */
556 if (NETDEV_VTABLE(netdev)->create) {
0c50cb50
ZJS
557 r = NETDEV_VTABLE(netdev)->create(netdev);
558 if (r < 0)
559 return r;
560
561 log_netdev_debug(netdev, "Created");
562 return 0;
563 }
564
565 r = sd_rtnl_message_new_link(netdev->manager->rtnl, &m, RTM_NEWLINK, 0);
566 if (r < 0)
b4d6ae63 567 return r;
0c50cb50 568
b4d6ae63 569 r = netdev_create_message(netdev, NULL, m);
0c50cb50 570 if (r < 0)
b4d6ae63 571 return r;
aa9f1140 572
b4d6ae63
YW
573 r = netlink_call_async(netdev->manager->rtnl, NULL, m, netdev_create_handler,
574 netdev_destroy_callback, netdev);
575 if (r < 0)
576 return r;
28a8cc0a 577
b4d6ae63 578 netdev_ref(netdev);
aa9f1140 579
28a8cc0a 580 netdev->state = NETDEV_STATE_CREATING;
28a8cc0a 581 log_netdev_debug(netdev, "Creating");
aa9f1140
TG
582 return 0;
583}
584
54ff39f7 585static int stacked_netdev_create(NetDev *netdev, Link *link, Request *req) {
b4d6ae63 586 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *m = NULL;
aa9f1140
TG
587 int r;
588
589 assert(netdev);
590 assert(netdev->manager);
b4d6ae63 591 assert(link);
54ff39f7 592 assert(req);
aa9f1140 593
b4d6ae63
YW
594 r = sd_rtnl_message_new_link(netdev->manager->rtnl, &m, RTM_NEWLINK, 0);
595 if (r < 0)
596 return r;
aa9f1140 597
b4d6ae63
YW
598 r = netdev_create_message(netdev, link, m);
599 if (r < 0)
600 return r;
601
80d62d4f 602 r = request_call_netlink_async(netdev->manager->rtnl, m, req);
b4d6ae63
YW
603 if (r < 0)
604 return r;
605
b4d6ae63
YW
606 netdev->state = NETDEV_STATE_CREATING;
607 log_netdev_debug(netdev, "Creating");
aa9f1140
TG
608 return 0;
609}
610
e33232d4 611static bool link_is_ready_to_create_stacked_netdev_one(Link *link, bool allow_unmanaged) {
00117f88
YW
612 assert(link);
613
e33232d4 614 if (!IN_SET(link->state, LINK_STATE_CONFIGURING, LINK_STATE_CONFIGURED, LINK_STATE_UNMANAGED))
00117f88
YW
615 return false;
616
e33232d4
YW
617 if (!link->network)
618 return allow_unmanaged;
619
00117f88
YW
620 if (link->set_link_messages > 0)
621 return false;
622
623 /* If stacked netdevs are created before the underlying interface being activated, then
624 * the activation policy for the netdevs are ignored. See issue #22593. */
625 if (!link->activated)
626 return false;
627
628 return true;
629}
630
e33232d4
YW
631static bool link_is_ready_to_create_stacked_netdev(Link *link) {
632 return check_ready_for_all_sr_iov_ports(link, /* allow_unmanaged = */ false,
633 link_is_ready_to_create_stacked_netdev_one);
634}
635
d708bc6e 636static int netdev_is_ready_to_create(NetDev *netdev, Link *link) {
71a754f7 637 assert(netdev);
71a754f7
YW
638
639 if (netdev->state != NETDEV_STATE_LOADING)
640 return false;
543240f5 641
00117f88
YW
642 if (link && !link_is_ready_to_create_stacked_netdev(link))
643 return false;
71a754f7 644
562729d7
YW
645 if (NETDEV_VTABLE(netdev)->is_ready_to_create)
646 return NETDEV_VTABLE(netdev)->is_ready_to_create(netdev, link);
647
71a754f7
YW
648 return true;
649}
650
09d09207 651static int stacked_netdev_process_request(Request *req, Link *link, void *userdata) {
ff51134c 652 NetDev *netdev = ASSERT_PTR(userdata);
71a754f7
YW
653 int r;
654
655 assert(req);
ff51134c 656 assert(link);
b4d6ae63
YW
657
658 r = netdev_is_ready_to_create(netdev, link);
d708bc6e
YW
659 if (r <= 0)
660 return r;
71a754f7 661
54ff39f7 662 r = stacked_netdev_create(netdev, link, req);
71a754f7 663 if (r < 0)
b4d6ae63 664 return log_netdev_warning_errno(netdev, r, "Failed to create netdev: %m");
71a754f7
YW
665
666 return 1;
667}
668
80d62d4f 669static int create_stacked_netdev_handler(sd_netlink *rtnl, sd_netlink_message *m, Request *req, Link *link, void *userdata) {
71a754f7
YW
670 int r;
671
672 assert(m);
673 assert(link);
71a754f7
YW
674
675 r = sd_netlink_message_get_errno(m);
676 if (r < 0 && r != -EEXIST) {
677 log_link_message_warning_errno(link, m, r, "Could not create stacked netdev");
678 link_enter_failed(link);
679 return 0;
680 }
681
71a754f7
YW
682 if (link->create_stacked_netdev_messages == 0) {
683 link->stacked_netdevs_created = true;
684 log_link_debug(link, "Stacked netdevs created.");
bb916f35 685 link_check_ready(link);
71a754f7
YW
686 }
687
688 return 0;
689}
690
b14686ff 691int link_request_stacked_netdev(Link *link, NetDev *netdev) {
71a754f7
YW
692 int r;
693
694 assert(link);
695 assert(netdev);
696
2f117922 697 if (!netdev_is_stacked(netdev))
71a754f7
YW
698 return -EINVAL;
699
2f117922
YW
700 if (!IN_SET(netdev->state, NETDEV_STATE_LOADING, NETDEV_STATE_FAILED) || netdev->ifindex > 0)
701 return 0; /* Already created. */
71a754f7 702
3d24b0dd 703 link->stacked_netdevs_created = false;
09d09207 704 r = link_queue_request_full(link, REQUEST_TYPE_NETDEV_STACKED,
d256945f 705 netdev, (mfree_func_t) netdev_unref,
09d09207
YW
706 trivial_hash_func, trivial_compare_func,
707 stacked_netdev_process_request,
708 &link->create_stacked_netdev_messages,
709 create_stacked_netdev_handler, NULL);
71a754f7 710 if (r < 0)
b14686ff 711 return log_link_error_errno(link, r, "Failed to request stacked netdev '%s': %m",
71a754f7 712 netdev->ifname);
d256945f
YW
713 if (r == 0)
714 return 0;
71a754f7 715
d256945f 716 netdev_ref(netdev);
b14686ff 717 log_link_debug(link, "Requested stacked netdev '%s'", netdev->ifname);
d256945f 718 return 1;
71a754f7
YW
719}
720
09d09207 721static int independent_netdev_process_request(Request *req, Link *link, void *userdata) {
ff51134c 722 NetDev *netdev = ASSERT_PTR(userdata);
5d4a925a
YW
723 int r;
724
ff51134c 725 assert(!link);
b4d6ae63
YW
726
727 r = netdev_is_ready_to_create(netdev, NULL);
5d4a925a
YW
728 if (r <= 0)
729 return r;
730
b4d6ae63 731 r = independent_netdev_create(netdev);
5d4a925a 732 if (r < 0)
b4d6ae63 733 return log_netdev_warning_errno(netdev, r, "Failed to create netdev: %m");
5d4a925a
YW
734
735 return 1;
736}
737
b4d6ae63 738static int netdev_request_to_create(NetDev *netdev) {
5d4a925a
YW
739 int r;
740
741 assert(netdev);
4f6ae866
YW
742 assert(netdev->manager);
743
744 if (netdev->manager->test_mode)
745 return 0;
5d4a925a 746
eae0d010 747 if (netdev_is_stacked(netdev))
5d4a925a
YW
748 return 0;
749
750 r = netdev_is_ready_to_create(netdev, NULL);
751 if (r < 0)
752 return r;
b4d6ae63 753 if (r > 0) {
5d4a925a 754 /* If the netdev has no dependency, then create it now. */
b4d6ae63
YW
755 r = independent_netdev_create(netdev);
756 if (r < 0)
757 return log_netdev_warning_errno(netdev, r, "Failed to create netdev: %m");
758
759 } else {
760 /* Otherwise, wait for the dependencies being resolved. */
09d09207 761 r = netdev_queue_request(netdev, independent_netdev_process_request, NULL);
b4d6ae63 762 if (r < 0)
09d09207 763 return log_netdev_warning_errno(netdev, r, "Failed to request to create netdev: %m");
b4d6ae63 764 }
5d4a925a 765
b4d6ae63 766 return 0;
5d4a925a
YW
767}
768
e27aac11 769int netdev_load_one(Manager *manager, const char *filename) {
8e766630 770 _cleanup_(netdev_unrefp) NetDev *netdev_raw = NULL, *netdev = NULL;
2cc34d5b 771 const char *dropin_dirname;
02b59d57
TG
772 int r;
773
bf1bc670
TA
774 assert(manager);
775 assert(filename);
776
4e54a17d 777 r = null_or_empty_path(filename);
4e54a17d 778 if (r < 0)
61ec7bea 779 return log_warning_errno(r, "Failed to check if \"%s\" is empty: %m", filename);
4e54a17d 780 if (r > 0) {
ed88bcfb
ZJS
781 log_debug("Skipping empty file: %s", filename);
782 return 0;
783 }
784
17f9c355 785 netdev_raw = new(NetDev, 1);
aa9f1140 786 if (!netdev_raw)
02b59d57
TG
787 return log_oom();
788
17f9c355
YW
789 *netdev_raw = (NetDev) {
790 .n_ref = 1,
791 .kind = _NETDEV_KIND_INVALID,
792 .state = _NETDEV_STATE_INVALID, /* an invalid state means done() of the implementation won't be called on destruction */
793 };
02b59d57 794
281bb5c1 795 dropin_dirname = strjoina(basename(filename), ".d");
4f9ff96a 796 r = config_parse_many(
947f59ba 797 STRV_MAKE_CONST(filename), NETWORK_DIRS, dropin_dirname, /* root = */ NULL,
4f9ff96a
LP
798 NETDEV_COMMON_SECTIONS NETDEV_OTHER_SECTIONS,
799 config_item_perf_lookup, network_netdev_gperf_lookup,
800 CONFIG_PARSE_WARN,
801 netdev_raw,
ead3a3fc 802 NULL,
4f9ff96a 803 NULL);
36f822c4 804 if (r < 0)
61ec7bea 805 return r; /* config_parse_many() logs internally. */
02b59d57 806
2023dc8a 807 /* skip out early if configuration does not match the environment */
a0b191b7 808 if (!condition_test_list(netdev_raw->conditions, environ, NULL, NULL, NULL)) {
a6779fec 809 log_debug("%s: Conditions in the file do not match the system environment, skipping.", filename);
2023dc8a 810 return 0;
a6779fec 811 }
2023dc8a 812
61ec7bea
YW
813 if (netdev_raw->kind == _NETDEV_KIND_INVALID)
814 return log_warning_errno(SYNTHETIC_ERRNO(EINVAL), "NetDev has no Kind= configured in \"%s\", ignoring.", filename);
2023dc8a 815
61ec7bea
YW
816 if (!netdev_raw->ifname)
817 return log_warning_errno(SYNTHETIC_ERRNO(EINVAL), "NetDev without Name= configured in \"%s\", ignoring.", filename);
326cb406 818
aa9f1140
TG
819 netdev = malloc0(NETDEV_VTABLE(netdev_raw)->object_size);
820 if (!netdev)
821 return log_oom();
fe6b2d55 822
aa9f1140
TG
823 netdev->n_ref = 1;
824 netdev->manager = manager;
aa9f1140 825 netdev->kind = netdev_raw->kind;
c6e77d7b
YW
826 netdev->state = NETDEV_STATE_LOADING; /* we initialize the state here for the first time,
827 so that done() will be called on destruction */
326cb406 828
aa9f1140
TG
829 if (NETDEV_VTABLE(netdev)->init)
830 NETDEV_VTABLE(netdev)->init(netdev);
831
4f9ff96a 832 r = config_parse_many(
947f59ba 833 STRV_MAKE_CONST(filename), NETWORK_DIRS, dropin_dirname, /* root = */ NULL,
4f9ff96a
LP
834 NETDEV_VTABLE(netdev)->sections,
835 config_item_perf_lookup, network_netdev_gperf_lookup,
836 CONFIG_PARSE_WARN,
ead3a3fc 837 netdev, NULL, NULL);
aa9f1140 838 if (r < 0)
61ec7bea 839 return r; /* config_parse_many() logs internally. */
aa9f1140
TG
840
841 /* verify configuration */
842 if (NETDEV_VTABLE(netdev)->config_verify) {
843 r = NETDEV_VTABLE(netdev)->config_verify(netdev, filename);
844 if (r < 0)
61ec7bea 845 return r; /* config_verify() logs internally. */
fe6b2d55
TG
846 }
847
52433f6b
TG
848 netdev->filename = strdup(filename);
849 if (!netdev->filename)
02b59d57
TG
850 return log_oom();
851
c26f9a9d
SS
852 r = hashmap_ensure_put(&netdev->manager->netdevs, &string_hash_ops, netdev->ifname, netdev);
853 if (r == -ENOMEM)
854 return log_oom();
b519908c
YW
855 if (r == -EEXIST) {
856 NetDev *n = hashmap_get(netdev->manager->netdevs, netdev->ifname);
857
858 assert(n);
e272b621
YW
859 if (!streq(netdev->filename, n->filename))
860 log_netdev_warning_errno(netdev, r,
61ec7bea 861 "Device was already configured by \"%s\", ignoring %s.",
74bd6ad0 862 n->filename, netdev->filename);
b519908c
YW
863
864 /* Clear ifname before netdev_free() is called. Otherwise, the NetDev object 'n' is
865 * removed from the hashmap 'manager->netdevs'. */
866 netdev->ifname = mfree(netdev->ifname);
61ec7bea 867 return -EEXIST;
b519908c 868 }
61ec7bea 869 assert(r > 0);
02b59d57 870
61ec7bea 871 log_netdev_debug(netdev, "loaded \"%s\"", netdev_kind_to_string(netdev->kind));
3be1d7e0 872
b4d6ae63 873 r = netdev_request_to_create(netdev);
5d4a925a 874 if (r < 0)
61ec7bea 875 return r; /* netdev_request_to_create() logs internally. */
02b59d57 876
5d4a925a 877 TAKE_PTR(netdev);
02b59d57
TG
878 return 0;
879}
880
e272b621 881int netdev_load(Manager *manager, bool reload) {
6a7a4e4d 882 _cleanup_strv_free_ char **files = NULL;
02b59d57
TG
883 int r;
884
885 assert(manager);
886
e272b621
YW
887 if (!reload)
888 hashmap_clear_with_destructor(manager->netdevs, netdev_unref);
02b59d57 889
dc0d4078 890 r = conf_files_list_strv(&files, ".netdev", NULL, 0, NETWORK_DIRS);
f647962d
MS
891 if (r < 0)
892 return log_error_errno(r, "Failed to enumerate netdev files: %m");
02b59d57 893
61ec7bea
YW
894 STRV_FOREACH(f, files)
895 (void) netdev_load_one(manager, *f);
02b59d57 896
02b59d57
TG
897 return 0;
898}
5dcc5b1a
YW
899
900int config_parse_netdev_kind(
901 const char *unit,
902 const char *filename,
903 unsigned line,
904 const char *section,
905 unsigned section_line,
906 const char *lvalue,
907 int ltype,
908 const char *rvalue,
909 void *data,
910 void *userdata) {
911
99534007 912 NetDevKind k, *kind = ASSERT_PTR(data);
5dcc5b1a
YW
913
914 assert(filename);
915 assert(rvalue);
5dcc5b1a
YW
916
917 k = netdev_kind_from_string(rvalue);
918 if (k < 0) {
919 log_syntax(unit, LOG_WARNING, filename, line, k, "Failed to parse netdev kind, ignoring assignment: %s", rvalue);
920 return 0;
921 }
922
923 if (*kind != _NETDEV_KIND_INVALID && *kind != k) {
924 log_syntax(unit, LOG_WARNING, filename, line, 0,
925 "Specified netdev kind is different from the previous value '%s', ignoring assignment: %s",
926 netdev_kind_to_string(*kind), rvalue);
927 return 0;
928 }
929
930 *kind = k;
931
932 return 0;
933}
aaa5ca57
YW
934
935int config_parse_netdev_hw_addr(
936 const char *unit,
937 const char *filename,
938 unsigned line,
939 const char *section,
940 unsigned section_line,
941 const char *lvalue,
942 int ltype,
943 const char *rvalue,
944 void *data,
945 void *userdata) {
946
99534007 947 struct hw_addr_data *hw_addr = ASSERT_PTR(data);
aaa5ca57
YW
948
949 assert(rvalue);
aaa5ca57
YW
950
951 if (streq(rvalue, "none")) {
952 *hw_addr = HW_ADDR_NONE;
953 return 0;
954 }
955
956 return config_parse_hw_addr(unit, filename, line, section, section_line, lvalue, ltype, rvalue, data, userdata);
957}