]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/network/netdev/netdev.c
tree-wide: beautify remaining copyright statements
[thirdparty/systemd.git] / src / network / netdev / netdev.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2 /***
3 Copyright © 2013 Tom Gundersen <teg@jklm.no>
4 ***/
5
6 #include <net/if.h>
7
8 #include "alloc-util.h"
9 #include "conf-files.h"
10 #include "conf-parser.h"
11 #include "fd-util.h"
12 #include "list.h"
13 #include "netlink-util.h"
14 #include "network-internal.h"
15 #include "netdev/netdev.h"
16 #include "networkd-manager.h"
17 #include "networkd-link.h"
18 #include "siphash24.h"
19 #include "stat-util.h"
20 #include "string-table.h"
21 #include "string-util.h"
22
23 #include "netdev/bridge.h"
24 #include "netdev/bond.h"
25 #include "netdev/geneve.h"
26 #include "netdev/vlan.h"
27 #include "netdev/macvlan.h"
28 #include "netdev/ipvlan.h"
29 #include "netdev/vxlan.h"
30 #include "netdev/tunnel.h"
31 #include "netdev/tuntap.h"
32 #include "netdev/veth.h"
33 #include "netdev/dummy.h"
34 #include "netdev/vrf.h"
35 #include "netdev/vcan.h"
36 #include "netdev/vxcan.h"
37 #include "netdev/wireguard.h"
38 #include "netdev/netdevsim.h"
39
40 const NetDevVTable * const netdev_vtable[_NETDEV_KIND_MAX] = {
41 [NETDEV_KIND_BRIDGE] = &bridge_vtable,
42 [NETDEV_KIND_BOND] = &bond_vtable,
43 [NETDEV_KIND_VLAN] = &vlan_vtable,
44 [NETDEV_KIND_MACVLAN] = &macvlan_vtable,
45 [NETDEV_KIND_MACVTAP] = &macvtap_vtable,
46 [NETDEV_KIND_IPVLAN] = &ipvlan_vtable,
47 [NETDEV_KIND_VXLAN] = &vxlan_vtable,
48 [NETDEV_KIND_IPIP] = &ipip_vtable,
49 [NETDEV_KIND_GRE] = &gre_vtable,
50 [NETDEV_KIND_GRETAP] = &gretap_vtable,
51 [NETDEV_KIND_IP6GRE] = &ip6gre_vtable,
52 [NETDEV_KIND_IP6GRETAP] = &ip6gretap_vtable,
53 [NETDEV_KIND_SIT] = &sit_vtable,
54 [NETDEV_KIND_VTI] = &vti_vtable,
55 [NETDEV_KIND_VTI6] = &vti6_vtable,
56 [NETDEV_KIND_VETH] = &veth_vtable,
57 [NETDEV_KIND_DUMMY] = &dummy_vtable,
58 [NETDEV_KIND_TUN] = &tun_vtable,
59 [NETDEV_KIND_TAP] = &tap_vtable,
60 [NETDEV_KIND_IP6TNL] = &ip6tnl_vtable,
61 [NETDEV_KIND_VRF] = &vrf_vtable,
62 [NETDEV_KIND_VCAN] = &vcan_vtable,
63 [NETDEV_KIND_GENEVE] = &geneve_vtable,
64 [NETDEV_KIND_VXCAN] = &vxcan_vtable,
65 [NETDEV_KIND_WIREGUARD] = &wireguard_vtable,
66 [NETDEV_KIND_NETDEVSIM] = &netdevsim_vtable,
67 };
68
69 static const char* const netdev_kind_table[_NETDEV_KIND_MAX] = {
70 [NETDEV_KIND_BRIDGE] = "bridge",
71 [NETDEV_KIND_BOND] = "bond",
72 [NETDEV_KIND_VLAN] = "vlan",
73 [NETDEV_KIND_MACVLAN] = "macvlan",
74 [NETDEV_KIND_MACVTAP] = "macvtap",
75 [NETDEV_KIND_IPVLAN] = "ipvlan",
76 [NETDEV_KIND_VXLAN] = "vxlan",
77 [NETDEV_KIND_IPIP] = "ipip",
78 [NETDEV_KIND_GRE] = "gre",
79 [NETDEV_KIND_GRETAP] = "gretap",
80 [NETDEV_KIND_IP6GRE] = "ip6gre",
81 [NETDEV_KIND_IP6GRETAP] = "ip6gretap",
82 [NETDEV_KIND_SIT] = "sit",
83 [NETDEV_KIND_VETH] = "veth",
84 [NETDEV_KIND_VTI] = "vti",
85 [NETDEV_KIND_VTI6] = "vti6",
86 [NETDEV_KIND_DUMMY] = "dummy",
87 [NETDEV_KIND_TUN] = "tun",
88 [NETDEV_KIND_TAP] = "tap",
89 [NETDEV_KIND_IP6TNL] = "ip6tnl",
90 [NETDEV_KIND_VRF] = "vrf",
91 [NETDEV_KIND_VCAN] = "vcan",
92 [NETDEV_KIND_GENEVE] = "geneve",
93 [NETDEV_KIND_VXCAN] = "vxcan",
94 [NETDEV_KIND_WIREGUARD] = "wireguard",
95 [NETDEV_KIND_NETDEVSIM] = "netdevsim",
96 };
97
98 DEFINE_STRING_TABLE_LOOKUP(netdev_kind, NetDevKind);
99 DEFINE_CONFIG_PARSE_ENUM(config_parse_netdev_kind, netdev_kind, NetDevKind, "Failed to parse netdev kind");
100
101 static void netdev_cancel_callbacks(NetDev *netdev) {
102 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *m = NULL;
103 netdev_join_callback *callback;
104
105 if (!netdev || !netdev->manager)
106 return;
107
108 rtnl_message_new_synthetic_error(netdev->manager->rtnl, -ENODEV, 0, &m);
109
110 while ((callback = netdev->callbacks)) {
111 if (m) {
112 assert(callback->link);
113 assert(callback->callback);
114 assert(netdev->manager);
115 assert(netdev->manager->rtnl);
116
117 callback->callback(netdev->manager->rtnl, m, callback->link);
118 }
119
120 LIST_REMOVE(callbacks, netdev->callbacks, callback);
121 link_unref(callback->link);
122 free(callback);
123 }
124 }
125
126 static void netdev_free(NetDev *netdev) {
127 if (!netdev)
128 return;
129
130 netdev_cancel_callbacks(netdev);
131
132 if (netdev->ifname && netdev->manager)
133 hashmap_remove(netdev->manager->netdevs, netdev->ifname);
134
135 free(netdev->filename);
136
137 free(netdev->description);
138 free(netdev->ifname);
139 free(netdev->mac);
140
141 condition_free_list(netdev->match_host);
142 condition_free_list(netdev->match_virt);
143 condition_free_list(netdev->match_kernel_cmdline);
144 condition_free_list(netdev->match_kernel_version);
145 condition_free_list(netdev->match_arch);
146
147 /* Invoke the per-kind done() destructor, but only if the state field is initialized. We conditionalize that
148 * because we parse .netdev files twice: once to determine the kind (with a short, minimal NetDev structure
149 * allocation, with no room for per-kind fields), and once to read the kind's properties (with a full,
150 * comprehensive NetDev structure allocation with enough space for whatever the specific kind needs). Now, in
151 * the first case we shouldn't try to destruct the per-kind NetDev fields on destruction, in the second case we
152 * should. We use the state field to discern the two cases: it's _NETDEV_STATE_INVALID on the first "raw"
153 * call. */
154 if (netdev->state != _NETDEV_STATE_INVALID &&
155 NETDEV_VTABLE(netdev) &&
156 NETDEV_VTABLE(netdev)->done)
157 NETDEV_VTABLE(netdev)->done(netdev);
158
159 free(netdev);
160 }
161
162 NetDev *netdev_unref(NetDev *netdev) {
163 if (netdev && (-- netdev->n_ref <= 0))
164 netdev_free(netdev);
165
166 return NULL;
167 }
168
169 NetDev *netdev_ref(NetDev *netdev) {
170 if (netdev)
171 assert_se(++ netdev->n_ref >= 2);
172
173 return netdev;
174 }
175
176 void netdev_drop(NetDev *netdev) {
177 if (!netdev || netdev->state == NETDEV_STATE_LINGER)
178 return;
179
180 netdev->state = NETDEV_STATE_LINGER;
181
182 log_netdev_debug(netdev, "netdev removed");
183
184 netdev_cancel_callbacks(netdev);
185
186 netdev_unref(netdev);
187
188 return;
189 }
190
191 int netdev_get(Manager *manager, const char *name, NetDev **ret) {
192 NetDev *netdev;
193
194 assert(manager);
195 assert(name);
196 assert(ret);
197
198 netdev = hashmap_get(manager->netdevs, name);
199 if (!netdev) {
200 *ret = NULL;
201 return -ENOENT;
202 }
203
204 *ret = netdev;
205
206 return 0;
207 }
208
209 static int netdev_enter_failed(NetDev *netdev) {
210 netdev->state = NETDEV_STATE_FAILED;
211
212 netdev_cancel_callbacks(netdev);
213
214 return 0;
215 }
216
217 static int netdev_enslave_ready(NetDev *netdev, Link* link, sd_netlink_message_handler_t callback) {
218 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
219 int r;
220
221 assert(netdev);
222 assert(netdev->state == NETDEV_STATE_READY);
223 assert(netdev->manager);
224 assert(netdev->manager->rtnl);
225 assert(IN_SET(netdev->kind, NETDEV_KIND_BRIDGE, NETDEV_KIND_BOND, NETDEV_KIND_VRF));
226 assert(link);
227 assert(callback);
228
229 if (link->flags & IFF_UP && netdev->kind == NETDEV_KIND_BOND) {
230 log_netdev_debug(netdev, "Link '%s' was up when attempting to enslave it. Bringing link down.", link->ifname);
231 r = link_down(link);
232 if (r < 0)
233 return log_netdev_error_errno(netdev, r, "Could not bring link down: %m");
234 }
235
236 r = sd_rtnl_message_new_link(netdev->manager->rtnl, &req, RTM_SETLINK, link->ifindex);
237 if (r < 0)
238 return log_netdev_error_errno(netdev, r, "Could not allocate RTM_SETLINK message: %m");
239
240 r = sd_netlink_message_append_u32(req, IFLA_MASTER, netdev->ifindex);
241 if (r < 0)
242 return log_netdev_error_errno(netdev, r, "Could not append IFLA_MASTER attribute: %m");
243
244 r = sd_netlink_call_async(netdev->manager->rtnl, req, callback, link, 0, NULL);
245 if (r < 0)
246 return log_netdev_error_errno(netdev, r, "Could not send rtnetlink message: %m");
247
248 link_ref(link);
249
250 log_netdev_debug(netdev, "Enslaving link '%s'", link->ifname);
251
252 return 0;
253 }
254
255 static int netdev_enter_ready(NetDev *netdev) {
256 netdev_join_callback *callback, *callback_next;
257 int r;
258
259 assert(netdev);
260 assert(netdev->ifname);
261
262 if (netdev->state != NETDEV_STATE_CREATING)
263 return 0;
264
265 netdev->state = NETDEV_STATE_READY;
266
267 log_netdev_info(netdev, "netdev ready");
268
269 LIST_FOREACH_SAFE(callbacks, callback, callback_next, netdev->callbacks) {
270 /* enslave the links that were attempted to be enslaved before the
271 * link was ready */
272 r = netdev_enslave_ready(netdev, callback->link, callback->callback);
273 if (r < 0)
274 return r;
275
276 LIST_REMOVE(callbacks, netdev->callbacks, callback);
277 link_unref(callback->link);
278 free(callback);
279 }
280
281 if (NETDEV_VTABLE(netdev)->post_create)
282 NETDEV_VTABLE(netdev)->post_create(netdev, NULL, NULL);
283
284 return 0;
285 }
286
287 /* callback for netdev's created without a backing Link */
288 static int netdev_create_handler(sd_netlink *rtnl, sd_netlink_message *m, void *userdata) {
289 _cleanup_(netdev_unrefp) NetDev *netdev = userdata;
290 int r;
291
292 assert(netdev->state != _NETDEV_STATE_INVALID);
293
294 r = sd_netlink_message_get_errno(m);
295 if (r == -EEXIST)
296 log_netdev_info(netdev, "netdev exists, using existing without changing its parameters");
297 else if (r < 0) {
298 log_netdev_warning_errno(netdev, r, "netdev could not be created: %m");
299 netdev_drop(netdev);
300
301 return 1;
302 }
303
304 log_netdev_debug(netdev, "Created");
305
306 return 1;
307 }
308
309 int netdev_enslave(NetDev *netdev, Link *link, sd_netlink_message_handler_t callback) {
310 int r;
311
312 assert(netdev);
313 assert(netdev->manager);
314 assert(netdev->manager->rtnl);
315 assert(IN_SET(netdev->kind, NETDEV_KIND_BRIDGE, NETDEV_KIND_BOND, NETDEV_KIND_VRF));
316
317 if (netdev->state == NETDEV_STATE_READY) {
318 r = netdev_enslave_ready(netdev, link, callback);
319 if (r < 0)
320 return r;
321 } else if (IN_SET(netdev->state, NETDEV_STATE_LINGER, NETDEV_STATE_FAILED)) {
322 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *m = NULL;
323
324 r = rtnl_message_new_synthetic_error(netdev->manager->rtnl, -ENODEV, 0, &m);
325 if (r >= 0)
326 callback(netdev->manager->rtnl, m, link);
327 } else {
328 /* the netdev is not yet read, save this request for when it is */
329 netdev_join_callback *cb;
330
331 cb = new0(netdev_join_callback, 1);
332 if (!cb)
333 return log_oom();
334
335 cb->callback = callback;
336 cb->link = link;
337 link_ref(link);
338
339 LIST_PREPEND(callbacks, netdev->callbacks, cb);
340
341 log_netdev_debug(netdev, "Will enslave '%s', when ready", link->ifname);
342 }
343
344 return 0;
345 }
346
347 int netdev_set_ifindex(NetDev *netdev, sd_netlink_message *message) {
348 uint16_t type;
349 const char *kind;
350 const char *received_kind;
351 const char *received_name;
352 int r, ifindex;
353
354 assert(netdev);
355 assert(message);
356
357 r = sd_netlink_message_get_type(message, &type);
358 if (r < 0)
359 return log_netdev_error_errno(netdev, r, "Could not get rtnl message type: %m");
360
361 if (type != RTM_NEWLINK) {
362 log_netdev_error(netdev, "Cannot set ifindex from unexpected rtnl message type.");
363 return -EINVAL;
364 }
365
366 r = sd_rtnl_message_link_get_ifindex(message, &ifindex);
367 if (r < 0) {
368 log_netdev_error_errno(netdev, r, "Could not get ifindex: %m");
369 netdev_enter_failed(netdev);
370 return r;
371 } else if (ifindex <= 0) {
372 log_netdev_error(netdev, "Got invalid ifindex: %d", ifindex);
373 netdev_enter_failed(netdev);
374 return -EINVAL;
375 }
376
377 if (netdev->ifindex > 0) {
378 if (netdev->ifindex != ifindex) {
379 log_netdev_error(netdev, "Could not set ifindex to %d, already set to %d",
380 ifindex, netdev->ifindex);
381 netdev_enter_failed(netdev);
382 return -EEXIST;
383 } else
384 /* ifindex already set to the same for this netdev */
385 return 0;
386 }
387
388 r = sd_netlink_message_read_string(message, IFLA_IFNAME, &received_name);
389 if (r < 0)
390 return log_netdev_error_errno(netdev, r, "Could not get IFNAME: %m");
391
392 if (!streq(netdev->ifname, received_name)) {
393 log_netdev_error(netdev, "Received newlink with wrong IFNAME %s", received_name);
394 netdev_enter_failed(netdev);
395 return r;
396 }
397
398 r = sd_netlink_message_enter_container(message, IFLA_LINKINFO);
399 if (r < 0)
400 return log_netdev_error_errno(netdev, r, "Could not get LINKINFO: %m");
401
402 r = sd_netlink_message_read_string(message, IFLA_INFO_KIND, &received_kind);
403 if (r < 0)
404 return log_netdev_error_errno(netdev, r, "Could not get KIND: %m");
405
406 r = sd_netlink_message_exit_container(message);
407 if (r < 0)
408 return log_netdev_error_errno(netdev, r, "Could not exit container: %m");
409
410 if (netdev->kind == NETDEV_KIND_TAP)
411 /* the kernel does not distinguish between tun and tap */
412 kind = "tun";
413 else {
414 kind = netdev_kind_to_string(netdev->kind);
415 if (!kind) {
416 log_netdev_error(netdev, "Could not get kind");
417 netdev_enter_failed(netdev);
418 return -EINVAL;
419 }
420 }
421
422 if (!streq(kind, received_kind)) {
423 log_netdev_error(netdev,
424 "Received newlink with wrong KIND %s, "
425 "expected %s", received_kind, kind);
426 netdev_enter_failed(netdev);
427 return r;
428 }
429
430 netdev->ifindex = ifindex;
431
432 log_netdev_debug(netdev, "netdev has index %d", netdev->ifindex);
433
434 netdev_enter_ready(netdev);
435
436 return 0;
437 }
438
439 #define HASH_KEY SD_ID128_MAKE(52,e1,45,bd,00,6f,29,96,21,c6,30,6d,83,71,04,48)
440
441 int netdev_get_mac(const char *ifname, struct ether_addr **ret) {
442 _cleanup_free_ struct ether_addr *mac = NULL;
443 uint64_t result;
444 size_t l, sz;
445 uint8_t *v;
446 int r;
447
448 assert(ifname);
449 assert(ret);
450
451 mac = new0(struct ether_addr, 1);
452 if (!mac)
453 return -ENOMEM;
454
455 l = strlen(ifname);
456 sz = sizeof(sd_id128_t) + l;
457 v = alloca(sz);
458
459 /* fetch some persistent data unique to the machine */
460 r = sd_id128_get_machine((sd_id128_t*) v);
461 if (r < 0)
462 return r;
463
464 /* combine with some data unique (on this machine) to this
465 * netdev */
466 memcpy(v + sizeof(sd_id128_t), ifname, l);
467
468 /* Let's hash the host machine ID plus the container name. We
469 * use a fixed, but originally randomly created hash key here. */
470 result = siphash24(v, sz, HASH_KEY.bytes);
471
472 assert_cc(ETH_ALEN <= sizeof(result));
473 memcpy(mac->ether_addr_octet, &result, ETH_ALEN);
474
475 /* see eth_random_addr in the kernel */
476 mac->ether_addr_octet[0] &= 0xfe; /* clear multicast bit */
477 mac->ether_addr_octet[0] |= 0x02; /* set local assignment bit (IEEE802) */
478
479 *ret = TAKE_PTR(mac);
480
481 return 0;
482 }
483
484 static int netdev_create(NetDev *netdev, Link *link,
485 sd_netlink_message_handler_t callback) {
486 int r;
487
488 assert(netdev);
489 assert(!link || callback);
490
491 /* create netdev */
492 if (NETDEV_VTABLE(netdev)->create) {
493 assert(!link);
494
495 r = NETDEV_VTABLE(netdev)->create(netdev);
496 if (r < 0)
497 return r;
498
499 log_netdev_debug(netdev, "Created");
500 } else {
501 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *m = NULL;
502
503 r = sd_rtnl_message_new_link(netdev->manager->rtnl, &m, RTM_NEWLINK, 0);
504 if (r < 0)
505 return log_netdev_error_errno(netdev, r, "Could not allocate RTM_NEWLINK message: %m");
506
507 r = sd_netlink_message_append_string(m, IFLA_IFNAME, netdev->ifname);
508 if (r < 0)
509 return log_netdev_error_errno(netdev, r, "Could not append IFLA_IFNAME, attribute: %m");
510
511 if (netdev->mac) {
512 r = sd_netlink_message_append_ether_addr(m, IFLA_ADDRESS, netdev->mac);
513 if (r < 0)
514 return log_netdev_error_errno(netdev, r, "Could not append IFLA_ADDRESS attribute: %m");
515 }
516
517 if (netdev->mtu) {
518 r = sd_netlink_message_append_u32(m, IFLA_MTU, netdev->mtu);
519 if (r < 0)
520 return log_netdev_error_errno(netdev, r, "Could not append IFLA_MTU attribute: %m");
521 }
522
523 if (link) {
524 r = sd_netlink_message_append_u32(m, IFLA_LINK, link->ifindex);
525 if (r < 0)
526 return log_netdev_error_errno(netdev, r, "Could not append IFLA_LINK attribute: %m");
527 }
528
529 r = sd_netlink_message_open_container(m, IFLA_LINKINFO);
530 if (r < 0)
531 return log_netdev_error_errno(netdev, r, "Could not append IFLA_LINKINFO attribute: %m");
532
533 r = sd_netlink_message_open_container_union(m, IFLA_INFO_DATA, netdev_kind_to_string(netdev->kind));
534 if (r < 0)
535 return log_netdev_error_errno(netdev, r, "Could not append IFLA_INFO_DATA attribute: %m");
536
537 if (NETDEV_VTABLE(netdev)->fill_message_create) {
538 r = NETDEV_VTABLE(netdev)->fill_message_create(netdev, link, m);
539 if (r < 0)
540 return r;
541 }
542
543 r = sd_netlink_message_close_container(m);
544 if (r < 0)
545 return log_netdev_error_errno(netdev, r, "Could not append IFLA_INFO_DATA attribute: %m");
546
547 r = sd_netlink_message_close_container(m);
548 if (r < 0)
549 return log_netdev_error_errno(netdev, r, "Could not append IFLA_LINKINFO attribute: %m");
550
551 if (link) {
552 r = sd_netlink_call_async(netdev->manager->rtnl, m, callback, link, 0, NULL);
553 if (r < 0)
554 return log_netdev_error_errno(netdev, r, "Could not send rtnetlink message: %m");
555
556 link_ref(link);
557 } else {
558 r = sd_netlink_call_async(netdev->manager->rtnl, m, netdev_create_handler, netdev, 0, NULL);
559 if (r < 0)
560 return log_netdev_error_errno(netdev, r, "Could not send rtnetlink message: %m");
561
562 netdev_ref(netdev);
563 }
564
565 netdev->state = NETDEV_STATE_CREATING;
566
567 log_netdev_debug(netdev, "Creating");
568 }
569
570 return 0;
571 }
572
573 /* the callback must be called, possibly after a timeout, as otherwise the Link will hang */
574 int netdev_join(NetDev *netdev, Link *link, sd_netlink_message_handler_t callback) {
575 int r;
576
577 assert(netdev);
578 assert(netdev->manager);
579 assert(netdev->manager->rtnl);
580 assert(NETDEV_VTABLE(netdev));
581
582 switch (NETDEV_VTABLE(netdev)->create_type) {
583 case NETDEV_CREATE_MASTER:
584 r = netdev_enslave(netdev, link, callback);
585 if (r < 0)
586 return r;
587
588 break;
589 case NETDEV_CREATE_STACKED:
590 r = netdev_create(netdev, link, callback);
591 if (r < 0)
592 return r;
593
594 break;
595 default:
596 assert_not_reached("Can not join independent netdev");
597 }
598
599 return 0;
600 }
601
602 static int netdev_load_one(Manager *manager, const char *filename) {
603 _cleanup_(netdev_unrefp) NetDev *netdev_raw = NULL, *netdev = NULL;
604 _cleanup_fclose_ FILE *file = NULL;
605 const char *dropin_dirname;
606 bool independent = false;
607 int r;
608
609 assert(manager);
610 assert(filename);
611
612 file = fopen(filename, "re");
613 if (!file) {
614 if (errno == ENOENT)
615 return 0;
616
617 return -errno;
618 }
619
620 if (null_or_empty_fd(fileno(file))) {
621 log_debug("Skipping empty file: %s", filename);
622 return 0;
623 }
624
625 netdev_raw = new0(NetDev, 1);
626 if (!netdev_raw)
627 return log_oom();
628
629 netdev_raw->n_ref = 1;
630 netdev_raw->kind = _NETDEV_KIND_INVALID;
631 netdev_raw->state = _NETDEV_STATE_INVALID; /* an invalid state means done() of the implementation won't be called on destruction */
632
633 dropin_dirname = strjoina(basename(filename), ".d");
634 r = config_parse_many(filename, network_dirs, dropin_dirname,
635 "Match\0NetDev\0",
636 config_item_perf_lookup, network_netdev_gperf_lookup,
637 CONFIG_PARSE_WARN|CONFIG_PARSE_RELAXED, netdev_raw);
638 if (r < 0)
639 return r;
640
641 /* skip out early if configuration does not match the environment */
642 if (net_match_config(NULL, NULL, NULL, NULL, NULL,
643 netdev_raw->match_host, netdev_raw->match_virt,
644 netdev_raw->match_kernel_cmdline, netdev_raw->match_kernel_version,
645 netdev_raw->match_arch,
646 NULL, NULL, NULL, NULL, NULL, NULL) <= 0)
647 return 0;
648
649 if (netdev_raw->kind == _NETDEV_KIND_INVALID) {
650 log_warning("NetDev has no Kind configured in %s. Ignoring", filename);
651 return 0;
652 }
653
654 if (!netdev_raw->ifname) {
655 log_warning("NetDev without Name configured in %s. Ignoring", filename);
656 return 0;
657 }
658
659 r = fseek(file, 0, SEEK_SET);
660 if (r < 0)
661 return -errno;
662
663 netdev = malloc0(NETDEV_VTABLE(netdev_raw)->object_size);
664 if (!netdev)
665 return log_oom();
666
667 netdev->n_ref = 1;
668 netdev->manager = manager;
669 netdev->kind = netdev_raw->kind;
670 netdev->state = NETDEV_STATE_LOADING; /* we initialize the state here for the first time, so that done() will be called on destruction */
671
672 if (NETDEV_VTABLE(netdev)->init)
673 NETDEV_VTABLE(netdev)->init(netdev);
674
675 r = config_parse(NULL, filename, file,
676 NETDEV_VTABLE(netdev)->sections,
677 config_item_perf_lookup, network_netdev_gperf_lookup,
678 CONFIG_PARSE_WARN, netdev);
679 if (r < 0)
680 return r;
681
682 /* verify configuration */
683 if (NETDEV_VTABLE(netdev)->config_verify) {
684 r = NETDEV_VTABLE(netdev)->config_verify(netdev, filename);
685 if (r < 0)
686 return 0;
687 }
688
689 netdev->filename = strdup(filename);
690 if (!netdev->filename)
691 return log_oom();
692
693 if (!netdev->mac && netdev->kind != NETDEV_KIND_VLAN) {
694 r = netdev_get_mac(netdev->ifname, &netdev->mac);
695 if (r < 0)
696 return log_error_errno(r, "Failed to generate predictable MAC address for %s: %m", netdev->ifname);
697 }
698
699 r = hashmap_put(netdev->manager->netdevs, netdev->ifname, netdev);
700 if (r < 0)
701 return r;
702
703 LIST_HEAD_INIT(netdev->callbacks);
704
705 log_netdev_debug(netdev, "loaded %s", netdev_kind_to_string(netdev->kind));
706
707 switch (NETDEV_VTABLE(netdev)->create_type) {
708 case NETDEV_CREATE_MASTER:
709 case NETDEV_CREATE_INDEPENDENT:
710 r = netdev_create(netdev, NULL, NULL);
711 if (r < 0)
712 return r;
713
714 break;
715 default:
716 break;
717 }
718
719 switch (netdev->kind) {
720 case NETDEV_KIND_IPIP:
721 independent = IPIP(netdev)->independent;
722 break;
723 case NETDEV_KIND_GRE:
724 independent = GRE(netdev)->independent;
725 break;
726 case NETDEV_KIND_GRETAP:
727 independent = GRETAP(netdev)->independent;
728 break;
729 case NETDEV_KIND_IP6GRE:
730 independent = IP6GRE(netdev)->independent;
731 break;
732 case NETDEV_KIND_IP6GRETAP:
733 independent = IP6GRETAP(netdev)->independent;
734 break;
735 case NETDEV_KIND_SIT:
736 independent = SIT(netdev)->independent;
737 break;
738 case NETDEV_KIND_VTI:
739 independent = VTI(netdev)->independent;
740 break;
741 case NETDEV_KIND_VTI6:
742 independent = VTI6(netdev)->independent;
743 break;
744 case NETDEV_KIND_IP6TNL:
745 independent = IP6TNL(netdev)->independent;
746 break;
747 default:
748 break;
749 }
750
751 if (independent) {
752 r = netdev_create(netdev, NULL, NULL);
753 if (r < 0)
754 return r;
755 }
756
757 netdev = NULL;
758
759 return 0;
760 }
761
762 int netdev_load(Manager *manager) {
763 _cleanup_strv_free_ char **files = NULL;
764 NetDev *netdev;
765 char **f;
766 int r;
767
768 assert(manager);
769
770 while ((netdev = hashmap_first(manager->netdevs)))
771 netdev_unref(netdev);
772
773 r = conf_files_list_strv(&files, ".netdev", NULL, 0, network_dirs);
774 if (r < 0)
775 return log_error_errno(r, "Failed to enumerate netdev files: %m");
776
777 STRV_FOREACH_BACKWARDS(f, files) {
778 r = netdev_load_one(manager, *f);
779 if (r < 0)
780 return r;
781 }
782
783 return 0;
784 }