]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/network/netdev/netdev.c
network: replace udev_device by sd_device
[thirdparty/systemd.git] / src / network / netdev / netdev.c
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
02b59d57 2
987efa17
TG
3#include <net/if.h>
4
b5efdb8a 5#include "alloc-util.h"
02b59d57
TG
6#include "conf-files.h"
7#include "conf-parser.h"
3ffd4af2 8#include "fd-util.h"
02b59d57 9#include "list.h"
fc2f9534
LP
10#include "netlink-util.h"
11#include "network-internal.h"
441e9ae4 12#include "netdev/netdev.h"
23f53b99 13#include "networkd-manager.h"
14b6bb77 14#include "networkd-link.h"
07630cea 15#include "siphash24.h"
8fcde012 16#include "stat-util.h"
8b43440b 17#include "string-table.h"
07630cea 18#include "string-util.h"
51517f9e 19#include "strv.h"
02b59d57 20
23f53b99
TG
21#include "netdev/bridge.h"
22#include "netdev/bond.h"
6598e046 23#include "netdev/geneve.h"
23f53b99
TG
24#include "netdev/vlan.h"
25#include "netdev/macvlan.h"
26#include "netdev/ipvlan.h"
27#include "netdev/vxlan.h"
28#include "netdev/tunnel.h"
29#include "netdev/tuntap.h"
30#include "netdev/veth.h"
31#include "netdev/dummy.h"
32#include "netdev/vrf.h"
33#include "netdev/vcan.h"
d6df583c 34#include "netdev/vxcan.h"
e5719363 35#include "netdev/wireguard.h"
56e7fb50 36#include "netdev/netdevsim.h"
23f53b99 37
3be1d7e0
TG
38const NetDevVTable * const netdev_vtable[_NETDEV_KIND_MAX] = {
39 [NETDEV_KIND_BRIDGE] = &bridge_vtable,
40 [NETDEV_KIND_BOND] = &bond_vtable,
41 [NETDEV_KIND_VLAN] = &vlan_vtable,
42 [NETDEV_KIND_MACVLAN] = &macvlan_vtable,
f33ff02b 43 [NETDEV_KIND_MACVTAP] = &macvtap_vtable,
c4a5ddc9 44 [NETDEV_KIND_IPVLAN] = &ipvlan_vtable,
3be1d7e0
TG
45 [NETDEV_KIND_VXLAN] = &vxlan_vtable,
46 [NETDEV_KIND_IPIP] = &ipip_vtable,
47 [NETDEV_KIND_GRE] = &gre_vtable,
1af2536a 48 [NETDEV_KIND_GRETAP] = &gretap_vtable,
b16492f8
SS
49 [NETDEV_KIND_IP6GRE] = &ip6gre_vtable,
50 [NETDEV_KIND_IP6GRETAP] = &ip6gretap_vtable,
3be1d7e0
TG
51 [NETDEV_KIND_SIT] = &sit_vtable,
52 [NETDEV_KIND_VTI] = &vti_vtable,
9011ce77 53 [NETDEV_KIND_VTI6] = &vti6_vtable,
3be1d7e0
TG
54 [NETDEV_KIND_VETH] = &veth_vtable,
55 [NETDEV_KIND_DUMMY] = &dummy_vtable,
56 [NETDEV_KIND_TUN] = &tun_vtable,
57 [NETDEV_KIND_TAP] = &tap_vtable,
855ee1a1 58 [NETDEV_KIND_IP6TNL] = &ip6tnl_vtable,
20897a0d 59 [NETDEV_KIND_VRF] = &vrf_vtable,
92c918b0 60 [NETDEV_KIND_VCAN] = &vcan_vtable,
6598e046 61 [NETDEV_KIND_GENEVE] = &geneve_vtable,
d6df583c 62 [NETDEV_KIND_VXCAN] = &vxcan_vtable,
e5719363 63 [NETDEV_KIND_WIREGUARD] = &wireguard_vtable,
56e7fb50 64 [NETDEV_KIND_NETDEVSIM] = &netdevsim_vtable,
3be1d7e0
TG
65};
66
2c5859af 67static const char* const netdev_kind_table[_NETDEV_KIND_MAX] = {
52433f6b 68 [NETDEV_KIND_BRIDGE] = "bridge",
54abf461
TG
69 [NETDEV_KIND_BOND] = "bond",
70 [NETDEV_KIND_VLAN] = "vlan",
fe6b2d55 71 [NETDEV_KIND_MACVLAN] = "macvlan",
f33ff02b 72 [NETDEV_KIND_MACVTAP] = "macvtap",
c4a5ddc9 73 [NETDEV_KIND_IPVLAN] = "ipvlan",
326cb406 74 [NETDEV_KIND_VXLAN] = "vxlan",
7951dea2
SS
75 [NETDEV_KIND_IPIP] = "ipip",
76 [NETDEV_KIND_GRE] = "gre",
1af2536a 77 [NETDEV_KIND_GRETAP] = "gretap",
b16492f8
SS
78 [NETDEV_KIND_IP6GRE] = "ip6gre",
79 [NETDEV_KIND_IP6GRETAP] = "ip6gretap",
7951dea2 80 [NETDEV_KIND_SIT] = "sit",
10142d75 81 [NETDEV_KIND_VETH] = "veth",
9e358851 82 [NETDEV_KIND_VTI] = "vti",
9011ce77 83 [NETDEV_KIND_VTI6] = "vti6",
9e358851 84 [NETDEV_KIND_DUMMY] = "dummy",
30ae9dfd
SS
85 [NETDEV_KIND_TUN] = "tun",
86 [NETDEV_KIND_TAP] = "tap",
855ee1a1 87 [NETDEV_KIND_IP6TNL] = "ip6tnl",
20897a0d 88 [NETDEV_KIND_VRF] = "vrf",
92c918b0 89 [NETDEV_KIND_VCAN] = "vcan",
6598e046 90 [NETDEV_KIND_GENEVE] = "geneve",
d6df583c 91 [NETDEV_KIND_VXCAN] = "vxcan",
e5719363 92 [NETDEV_KIND_WIREGUARD] = "wireguard",
56e7fb50 93 [NETDEV_KIND_NETDEVSIM] = "netdevsim",
52433f6b 94};
02b59d57 95
1a436809
TG
96DEFINE_STRING_TABLE_LOOKUP(netdev_kind, NetDevKind);
97DEFINE_CONFIG_PARSE_ENUM(config_parse_netdev_kind, netdev_kind, NetDevKind, "Failed to parse netdev kind");
52433f6b 98
59cb64e6 99static void netdev_cancel_callbacks(NetDev *netdev) {
4afd3348 100 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *m = NULL;
3f265037 101 netdev_join_callback *callback;
52433f6b 102
22699541 103 if (!netdev || !netdev->manager)
02b59d57
TG
104 return;
105
05d0c2e3 106 rtnl_message_new_synthetic_error(netdev->manager->rtnl, -ENODEV, 0, &m);
59cb64e6 107
52433f6b 108 while ((callback = netdev->callbacks)) {
59cb64e6
TG
109 if (m) {
110 assert(callback->link);
111 assert(callback->callback);
112 assert(netdev->manager);
113 assert(netdev->manager->rtnl);
114
b024a9cf 115 callback->callback(netdev->manager->rtnl, m, callback->link);
59cb64e6
TG
116 }
117
52433f6b 118 LIST_REMOVE(callbacks, netdev->callbacks, callback);
62e2d5bb 119 link_unref(callback->link);
02b59d57
TG
120 free(callback);
121 }
59cb64e6
TG
122}
123
124static void netdev_free(NetDev *netdev) {
125 if (!netdev)
126 return;
127
128 netdev_cancel_callbacks(netdev);
02b59d57 129
281bb5c1 130 if (netdev->ifname && netdev->manager)
af4e9e2c 131 hashmap_remove(netdev->manager->netdevs, netdev->ifname);
02b59d57 132
52433f6b 133 free(netdev->filename);
02b59d57 134
52433f6b 135 free(netdev->description);
af4e9e2c 136 free(netdev->ifname);
96c90742 137 free(netdev->mac);
02b59d57 138
79e16ce3
LP
139 condition_free_list(netdev->match_host);
140 condition_free_list(netdev->match_virt);
5022f08a
LP
141 condition_free_list(netdev->match_kernel_cmdline);
142 condition_free_list(netdev->match_kernel_version);
79e16ce3
LP
143 condition_free_list(netdev->match_arch);
144
f3c33b23
LP
145 /* Invoke the per-kind done() destructor, but only if the state field is initialized. We conditionalize that
146 * because we parse .netdev files twice: once to determine the kind (with a short, minimal NetDev structure
147 * allocation, with no room for per-kind fields), and once to read the kind's properties (with a full,
148 * comprehensive NetDev structure allocation with enough space for whatever the specific kind needs). Now, in
149 * the first case we shouldn't try to destruct the per-kind NetDev fields on destruction, in the second case we
150 * should. We use the state field to discern the two cases: it's _NETDEV_STATE_INVALID on the first "raw"
151 * call. */
152 if (netdev->state != _NETDEV_STATE_INVALID &&
153 NETDEV_VTABLE(netdev) &&
aa9f1140
TG
154 NETDEV_VTABLE(netdev)->done)
155 NETDEV_VTABLE(netdev)->done(netdev);
156
52433f6b 157 free(netdev);
02b59d57
TG
158}
159
14b746f7
TG
160NetDev *netdev_unref(NetDev *netdev) {
161 if (netdev && (-- netdev->n_ref <= 0))
162 netdev_free(netdev);
163
164 return NULL;
165}
166
167NetDev *netdev_ref(NetDev *netdev) {
168 if (netdev)
169 assert_se(++ netdev->n_ref >= 2);
170
171 return netdev;
172}
173
2cc7e981
TG
174void netdev_drop(NetDev *netdev) {
175 if (!netdev || netdev->state == NETDEV_STATE_LINGER)
176 return;
177
178 netdev->state = NETDEV_STATE_LINGER;
179
79008bdd 180 log_netdev_debug(netdev, "netdev removed");
370e9930 181
2cc7e981
TG
182 netdev_cancel_callbacks(netdev);
183
184 netdev_unref(netdev);
185
186 return;
187}
188
1a436809
TG
189int netdev_get(Manager *manager, const char *name, NetDev **ret) {
190 NetDev *netdev;
02b59d57
TG
191
192 assert(manager);
193 assert(name);
194 assert(ret);
195
52433f6b
TG
196 netdev = hashmap_get(manager->netdevs, name);
197 if (!netdev) {
02b59d57
TG
198 *ret = NULL;
199 return -ENOENT;
200 }
201
52433f6b 202 *ret = netdev;
02b59d57
TG
203
204 return 0;
205}
206
1a436809 207static int netdev_enter_failed(NetDev *netdev) {
52433f6b 208 netdev->state = NETDEV_STATE_FAILED;
02b59d57 209
62e2d5bb
TG
210 netdev_cancel_callbacks(netdev);
211
02b59d57
TG
212 return 0;
213}
214
1c4baffc 215static int netdev_enslave_ready(NetDev *netdev, Link* link, sd_netlink_message_handler_t callback) {
4afd3348 216 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
02b59d57
TG
217 int r;
218
52433f6b
TG
219 assert(netdev);
220 assert(netdev->state == NETDEV_STATE_READY);
4fb7242c
TG
221 assert(netdev->manager);
222 assert(netdev->manager->rtnl);
6cb955c6 223 assert(IN_SET(netdev->kind, NETDEV_KIND_BRIDGE, NETDEV_KIND_BOND, NETDEV_KIND_VRF));
02b59d57
TG
224 assert(link);
225 assert(callback);
226
4c387986 227 if (link->flags & IFF_UP && netdev->kind == NETDEV_KIND_BOND) {
14b6bb77
RW
228 log_netdev_debug(netdev, "Link '%s' was up when attempting to enslave it. Bringing link down.", link->ifname);
229 r = link_down(link);
230 if (r < 0)
231 return log_netdev_error_errno(netdev, r, "Could not bring link down: %m");
232 }
233
6a7a4e4d
LP
234 r = sd_rtnl_message_new_link(netdev->manager->rtnl, &req, RTM_SETLINK, link->ifindex);
235 if (r < 0)
236 return log_netdev_error_errno(netdev, r, "Could not allocate RTM_SETLINK message: %m");
02b59d57 237
1c4baffc 238 r = sd_netlink_message_append_u32(req, IFLA_MASTER, netdev->ifindex);
6a7a4e4d
LP
239 if (r < 0)
240 return log_netdev_error_errno(netdev, r, "Could not append IFLA_MASTER attribute: %m");
02b59d57 241
1c4baffc 242 r = sd_netlink_call_async(netdev->manager->rtnl, req, callback, link, 0, NULL);
6a7a4e4d 243 if (r < 0)
b8b846d7 244 return log_netdev_error_errno(netdev, r, "Could not send rtnetlink message: %m");
02b59d57 245
563c69c6
TG
246 link_ref(link);
247
6a7a4e4d 248 log_netdev_debug(netdev, "Enslaving link '%s'", link->ifname);
ab47d620 249
02b59d57
TG
250 return 0;
251}
252
1a436809 253static int netdev_enter_ready(NetDev *netdev) {
3f265037 254 netdev_join_callback *callback, *callback_next;
ad0774e6 255 int r;
02b59d57 256
52433f6b 257 assert(netdev);
af4e9e2c 258 assert(netdev->ifname);
924fe430 259
ba5596ec
TG
260 if (netdev->state != NETDEV_STATE_CREATING)
261 return 0;
262
52433f6b 263 netdev->state = NETDEV_STATE_READY;
02b59d57 264
98b32556 265 log_netdev_info(netdev, "netdev ready");
02b59d57 266
ad0774e6 267 LIST_FOREACH_SAFE(callbacks, callback, callback_next, netdev->callbacks) {
b226d99b 268 /* enslave the links that were attempted to be enslaved before the
02b59d57 269 * link was ready */
ad0774e6
TG
270 r = netdev_enslave_ready(netdev, callback->link, callback->callback);
271 if (r < 0)
272 return r;
273
274 LIST_REMOVE(callbacks, netdev->callbacks, callback);
275 link_unref(callback->link);
276 free(callback);
02b59d57
TG
277 }
278
540eb5f0
SS
279 if (NETDEV_VTABLE(netdev)->post_create)
280 NETDEV_VTABLE(netdev)->post_create(netdev, NULL, NULL);
281
02b59d57
TG
282 return 0;
283}
8469c1d3 284
d5b3d845 285/* callback for netdev's created without a backing Link */
1c4baffc 286static int netdev_create_handler(sd_netlink *rtnl, sd_netlink_message *m, void *userdata) {
8e766630 287 _cleanup_(netdev_unrefp) NetDev *netdev = userdata;
172f6635 288 int r;
02b59d57 289
52433f6b 290 assert(netdev->state != _NETDEV_STATE_INVALID);
02b59d57 291
1c4baffc 292 r = sd_netlink_message_get_errno(m);
e09826dc 293 if (r == -EEXIST)
98b32556 294 log_netdev_info(netdev, "netdev exists, using existing without changing its parameters");
505f8da7 295 else if (r < 0) {
6a7a4e4d 296 log_netdev_warning_errno(netdev, r, "netdev could not be created: %m");
37ebeb77 297 netdev_drop(netdev);
dd3efc09
TG
298
299 return 1;
02b59d57
TG
300 }
301
6a7a4e4d 302 log_netdev_debug(netdev, "Created");
aa9f1140 303
dd3efc09 304 return 1;
02b59d57
TG
305}
306
1c4baffc 307int netdev_enslave(NetDev *netdev, Link *link, sd_netlink_message_handler_t callback) {
b226d99b
TG
308 int r;
309
3f265037 310 assert(netdev);
62e2d5bb
TG
311 assert(netdev->manager);
312 assert(netdev->manager->rtnl);
6cb955c6 313 assert(IN_SET(netdev->kind, NETDEV_KIND_BRIDGE, NETDEV_KIND_BOND, NETDEV_KIND_VRF));
7951dea2 314
52433f6b 315 if (netdev->state == NETDEV_STATE_READY) {
b226d99b
TG
316 r = netdev_enslave_ready(netdev, link, callback);
317 if (r < 0)
318 return r;
62e2d5bb 319 } else if (IN_SET(netdev->state, NETDEV_STATE_LINGER, NETDEV_STATE_FAILED)) {
4afd3348 320 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *m = NULL;
62e2d5bb 321
05d0c2e3 322 r = rtnl_message_new_synthetic_error(netdev->manager->rtnl, -ENODEV, 0, &m);
62e2d5bb
TG
323 if (r >= 0)
324 callback(netdev->manager->rtnl, m, link);
02b59d57 325 } else {
d076c6f9 326 /* the netdev is not yet read, save this request for when it is */
3f265037 327 netdev_join_callback *cb;
02b59d57 328
3f265037 329 cb = new0(netdev_join_callback, 1);
02b59d57
TG
330 if (!cb)
331 return log_oom();
332
333 cb->callback = callback;
334 cb->link = link;
563c69c6 335 link_ref(link);
02b59d57 336
52433f6b 337 LIST_PREPEND(callbacks, netdev->callbacks, cb);
3be1d7e0 338
6a7a4e4d 339 log_netdev_debug(netdev, "Will enslave '%s', when ready", link->ifname);
aa9f1140 340 }
3f265037
TG
341
342 return 0;
343}
344
1c4baffc 345int netdev_set_ifindex(NetDev *netdev, sd_netlink_message *message) {
c3ebdce3 346 uint16_t type;
d39edfc7 347 const char *kind;
ca4e095a
LP
348 const char *received_kind;
349 const char *received_name;
d39edfc7
TG
350 int r, ifindex;
351
50add290 352 assert(netdev);
c3ebdce3 353 assert(message);
02b59d57 354
1c4baffc 355 r = sd_netlink_message_get_type(message, &type);
6a7a4e4d
LP
356 if (r < 0)
357 return log_netdev_error_errno(netdev, r, "Could not get rtnl message type: %m");
c3ebdce3 358
ba5596ec 359 if (type != RTM_NEWLINK) {
6a7a4e4d 360 log_netdev_error(netdev, "Cannot set ifindex from unexpected rtnl message type.");
c3ebdce3 361 return -EINVAL;
ba5596ec 362 }
d39edfc7 363
a21df104
TG
364 r = sd_rtnl_message_link_get_ifindex(message, &ifindex);
365 if (r < 0) {
6a7a4e4d 366 log_netdev_error_errno(netdev, r, "Could not get ifindex: %m");
a21df104
TG
367 netdev_enter_failed(netdev);
368 return r;
369 } else if (ifindex <= 0) {
79008bdd 370 log_netdev_error(netdev, "Got invalid ifindex: %d", ifindex);
a21df104 371 netdev_enter_failed(netdev);
6a7a4e4d 372 return -EINVAL;
a21df104
TG
373 }
374
a21df104
TG
375 if (netdev->ifindex > 0) {
376 if (netdev->ifindex != ifindex) {
79008bdd 377 log_netdev_error(netdev, "Could not set ifindex to %d, already set to %d",
a21df104
TG
378 ifindex, netdev->ifindex);
379 netdev_enter_failed(netdev);
380 return -EEXIST;
381 } else
382 /* ifindex already set to the same for this netdev */
383 return 0;
384 }
385
1c4baffc 386 r = sd_netlink_message_read_string(message, IFLA_IFNAME, &received_name);
6a7a4e4d
LP
387 if (r < 0)
388 return log_netdev_error_errno(netdev, r, "Could not get IFNAME: %m");
c6315a7a 389
af4e9e2c 390 if (!streq(netdev->ifname, received_name)) {
6a7a4e4d 391 log_netdev_error(netdev, "Received newlink with wrong IFNAME %s", received_name);
c6315a7a
TG
392 netdev_enter_failed(netdev);
393 return r;
394 }
395
1c4baffc 396 r = sd_netlink_message_enter_container(message, IFLA_LINKINFO);
6a7a4e4d
LP
397 if (r < 0)
398 return log_netdev_error_errno(netdev, r, "Could not get LINKINFO: %m");
d39edfc7 399
1c4baffc 400 r = sd_netlink_message_read_string(message, IFLA_INFO_KIND, &received_kind);
6a7a4e4d
LP
401 if (r < 0)
402 return log_netdev_error_errno(netdev, r, "Could not get KIND: %m");
d39edfc7 403
1c4baffc 404 r = sd_netlink_message_exit_container(message);
6a7a4e4d
LP
405 if (r < 0)
406 return log_netdev_error_errno(netdev, r, "Could not exit container: %m");
505f8da7 407
30ae9dfd
SS
408 if (netdev->kind == NETDEV_KIND_TAP)
409 /* the kernel does not distinguish between tun and tap */
410 kind = "tun";
411 else {
412 kind = netdev_kind_to_string(netdev->kind);
413 if (!kind) {
79008bdd 414 log_netdev_error(netdev, "Could not get kind");
30ae9dfd
SS
415 netdev_enter_failed(netdev);
416 return -EINVAL;
417 }
c3ebdce3
TG
418 }
419
d39edfc7 420 if (!streq(kind, received_kind)) {
79008bdd 421 log_netdev_error(netdev,
30ae9dfd 422 "Received newlink with wrong KIND %s, "
c6315a7a 423 "expected %s", received_kind, kind);
d39edfc7
TG
424 netdev_enter_failed(netdev);
425 return r;
426 }
427
50add290 428 netdev->ifindex = ifindex;
52433f6b 429
79008bdd 430 log_netdev_debug(netdev, "netdev has index %d", netdev->ifindex);
5261692f 431
52433f6b 432 netdev_enter_ready(netdev);
02b59d57
TG
433
434 return 0;
435}
436
5c8f858d
TG
437#define HASH_KEY SD_ID128_MAKE(52,e1,45,bd,00,6f,29,96,21,c6,30,6d,83,71,04,48)
438
3be1d7e0 439int netdev_get_mac(const char *ifname, struct ether_addr **ret) {
5c8f858d 440 _cleanup_free_ struct ether_addr *mac = NULL;
dbe81cbd 441 uint64_t result;
5c8f858d
TG
442 size_t l, sz;
443 uint8_t *v;
444 int r;
445
446 assert(ifname);
447 assert(ret);
448
449 mac = new0(struct ether_addr, 1);
450 if (!mac)
451 return -ENOMEM;
452
453 l = strlen(ifname);
454 sz = sizeof(sd_id128_t) + l;
455 v = alloca(sz);
456
457 /* fetch some persistent data unique to the machine */
458 r = sd_id128_get_machine((sd_id128_t*) v);
459 if (r < 0)
460 return r;
461
462 /* combine with some data unique (on this machine) to this
463 * netdev */
464 memcpy(v + sizeof(sd_id128_t), ifname, l);
465
466 /* Let's hash the host machine ID plus the container name. We
467 * use a fixed, but originally randomly created hash key here. */
933f9cae 468 result = siphash24(v, sz, HASH_KEY.bytes);
5c8f858d
TG
469
470 assert_cc(ETH_ALEN <= sizeof(result));
dbe81cbd 471 memcpy(mac->ether_addr_octet, &result, ETH_ALEN);
5c8f858d
TG
472
473 /* see eth_random_addr in the kernel */
474 mac->ether_addr_octet[0] &= 0xfe; /* clear multicast bit */
475 mac->ether_addr_octet[0] |= 0x02; /* set local assignment bit (IEEE802) */
476
ae2a15bc 477 *ret = TAKE_PTR(mac);
5c8f858d
TG
478
479 return 0;
480}
481
6c3e68e7 482static int netdev_create(NetDev *netdev, Link *link,
1c4baffc 483 sd_netlink_message_handler_t callback) {
aa9f1140
TG
484 int r;
485
486 assert(netdev);
6c3e68e7 487 assert(!link || callback);
aa9f1140
TG
488
489 /* create netdev */
490 if (NETDEV_VTABLE(netdev)->create) {
6c3e68e7
TG
491 assert(!link);
492
aa9f1140
TG
493 r = NETDEV_VTABLE(netdev)->create(netdev);
494 if (r < 0)
495 return r;
496
6a7a4e4d 497 log_netdev_debug(netdev, "Created");
aa9f1140 498 } else {
4afd3348 499 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *m = NULL;
aa9f1140
TG
500
501 r = sd_rtnl_message_new_link(netdev->manager->rtnl, &m, RTM_NEWLINK, 0);
6a7a4e4d
LP
502 if (r < 0)
503 return log_netdev_error_errno(netdev, r, "Could not allocate RTM_NEWLINK message: %m");
aa9f1140 504
1c4baffc 505 r = sd_netlink_message_append_string(m, IFLA_IFNAME, netdev->ifname);
6a7a4e4d
LP
506 if (r < 0)
507 return log_netdev_error_errno(netdev, r, "Could not append IFLA_IFNAME, attribute: %m");
aa9f1140
TG
508
509 if (netdev->mac) {
1c4baffc 510 r = sd_netlink_message_append_ether_addr(m, IFLA_ADDRESS, netdev->mac);
6a7a4e4d
LP
511 if (r < 0)
512 return log_netdev_error_errno(netdev, r, "Could not append IFLA_ADDRESS attribute: %m");
aa9f1140
TG
513 }
514
515 if (netdev->mtu) {
1c4baffc 516 r = sd_netlink_message_append_u32(m, IFLA_MTU, netdev->mtu);
6a7a4e4d
LP
517 if (r < 0)
518 return log_netdev_error_errno(netdev, r, "Could not append IFLA_MTU attribute: %m");
aa9f1140
TG
519 }
520
521 if (link) {
1c4baffc 522 r = sd_netlink_message_append_u32(m, IFLA_LINK, link->ifindex);
6a7a4e4d
LP
523 if (r < 0)
524 return log_netdev_error_errno(netdev, r, "Could not append IFLA_LINK attribute: %m");
aa9f1140
TG
525 }
526
1c4baffc 527 r = sd_netlink_message_open_container(m, IFLA_LINKINFO);
6a7a4e4d
LP
528 if (r < 0)
529 return log_netdev_error_errno(netdev, r, "Could not append IFLA_LINKINFO attribute: %m");
aa9f1140 530
1c4baffc 531 r = sd_netlink_message_open_container_union(m, IFLA_INFO_DATA, netdev_kind_to_string(netdev->kind));
6a7a4e4d
LP
532 if (r < 0)
533 return log_netdev_error_errno(netdev, r, "Could not append IFLA_INFO_DATA attribute: %m");
aa9f1140
TG
534
535 if (NETDEV_VTABLE(netdev)->fill_message_create) {
536 r = NETDEV_VTABLE(netdev)->fill_message_create(netdev, link, m);
537 if (r < 0)
538 return r;
539 }
540
1c4baffc 541 r = sd_netlink_message_close_container(m);
6a7a4e4d 542 if (r < 0)
9b53e129 543 return log_netdev_error_errno(netdev, r, "Could not append IFLA_INFO_DATA attribute: %m");
aa9f1140 544
1c4baffc 545 r = sd_netlink_message_close_container(m);
6a7a4e4d
LP
546 if (r < 0)
547 return log_netdev_error_errno(netdev, r, "Could not append IFLA_LINKINFO attribute: %m");
aa9f1140 548
6c3e68e7 549 if (link) {
1c4baffc 550 r = sd_netlink_call_async(netdev->manager->rtnl, m, callback, link, 0, NULL);
6a7a4e4d
LP
551 if (r < 0)
552 return log_netdev_error_errno(netdev, r, "Could not send rtnetlink message: %m");
aa9f1140 553
6c3e68e7
TG
554 link_ref(link);
555 } else {
1c4baffc 556 r = sd_netlink_call_async(netdev->manager->rtnl, m, netdev_create_handler, netdev, 0, NULL);
6a7a4e4d
LP
557 if (r < 0)
558 return log_netdev_error_errno(netdev, r, "Could not send rtnetlink message: %m");
6c3e68e7
TG
559
560 netdev_ref(netdev);
561 }
aa9f1140
TG
562
563 netdev->state = NETDEV_STATE_CREATING;
564
6a7a4e4d 565 log_netdev_debug(netdev, "Creating");
aa9f1140
TG
566 }
567
568 return 0;
569}
570
571/* the callback must be called, possibly after a timeout, as otherwise the Link will hang */
1c4baffc 572int netdev_join(NetDev *netdev, Link *link, sd_netlink_message_handler_t callback) {
aa9f1140
TG
573 int r;
574
575 assert(netdev);
576 assert(netdev->manager);
577 assert(netdev->manager->rtnl);
578 assert(NETDEV_VTABLE(netdev));
579
580 switch (NETDEV_VTABLE(netdev)->create_type) {
581 case NETDEV_CREATE_MASTER:
582 r = netdev_enslave(netdev, link, callback);
583 if (r < 0)
584 return r;
585
586 break;
587 case NETDEV_CREATE_STACKED:
6c3e68e7 588 r = netdev_create(netdev, link, callback);
aa9f1140
TG
589 if (r < 0)
590 return r;
591
592 break;
593 default:
594 assert_not_reached("Can not join independent netdev");
595 }
596
597 return 0;
598}
599
52433f6b 600static int netdev_load_one(Manager *manager, const char *filename) {
8e766630 601 _cleanup_(netdev_unrefp) NetDev *netdev_raw = NULL, *netdev = NULL;
02b59d57 602 _cleanup_fclose_ FILE *file = NULL;
2cc34d5b 603 const char *dropin_dirname;
4d7fa6de 604 bool independent = false;
02b59d57
TG
605 int r;
606
bf1bc670
TA
607 assert(manager);
608 assert(filename);
609
02b59d57
TG
610 file = fopen(filename, "re");
611 if (!file) {
612 if (errno == ENOENT)
613 return 0;
f3c33b23
LP
614
615 return -errno;
02b59d57
TG
616 }
617
ed88bcfb
ZJS
618 if (null_or_empty_fd(fileno(file))) {
619 log_debug("Skipping empty file: %s", filename);
620 return 0;
621 }
622
aa9f1140
TG
623 netdev_raw = new0(NetDev, 1);
624 if (!netdev_raw)
02b59d57
TG
625 return log_oom();
626
281bb5c1 627 netdev_raw->n_ref = 1;
aa9f1140 628 netdev_raw->kind = _NETDEV_KIND_INVALID;
f3c33b23 629 netdev_raw->state = _NETDEV_STATE_INVALID; /* an invalid state means done() of the implementation won't be called on destruction */
02b59d57 630
281bb5c1 631 dropin_dirname = strjoina(basename(filename), ".d");
2cc34d5b
ZJS
632 r = config_parse_many(filename, network_dirs, dropin_dirname,
633 "Match\0NetDev\0",
634 config_item_perf_lookup, network_netdev_gperf_lookup,
5360d771 635 CONFIG_PARSE_WARN|CONFIG_PARSE_RELAXED, netdev_raw);
36f822c4 636 if (r < 0)
02b59d57 637 return r;
02b59d57 638
2023dc8a
TG
639 /* skip out early if configuration does not match the environment */
640 if (net_match_config(NULL, NULL, NULL, NULL, NULL,
aa9f1140 641 netdev_raw->match_host, netdev_raw->match_virt,
5022f08a
LP
642 netdev_raw->match_kernel_cmdline, netdev_raw->match_kernel_version,
643 netdev_raw->match_arch,
32bc8adc 644 NULL, NULL, NULL, NULL, NULL, NULL) <= 0)
2023dc8a
TG
645 return 0;
646
2f27e2c5 647 if (netdev_raw->kind == _NETDEV_KIND_INVALID) {
881e6b5e 648 log_warning("NetDev has no Kind configured in %s. Ignoring", filename);
52433f6b 649 return 0;
3be1d7e0 650 }
2023dc8a 651
aa9f1140 652 if (!netdev_raw->ifname) {
1a436809 653 log_warning("NetDev without Name configured in %s. Ignoring", filename);
326cb406
SS
654 return 0;
655 }
656
281bb5c1
ZJS
657 r = fseek(file, 0, SEEK_SET);
658 if (r < 0)
659 return -errno;
660
aa9f1140
TG
661 netdev = malloc0(NETDEV_VTABLE(netdev_raw)->object_size);
662 if (!netdev)
663 return log_oom();
fe6b2d55 664
aa9f1140
TG
665 netdev->n_ref = 1;
666 netdev->manager = manager;
aa9f1140 667 netdev->kind = netdev_raw->kind;
f3c33b23 668 netdev->state = NETDEV_STATE_LOADING; /* we initialize the state here for the first time, so that done() will be called on destruction */
326cb406 669
aa9f1140
TG
670 if (NETDEV_VTABLE(netdev)->init)
671 NETDEV_VTABLE(netdev)->init(netdev);
672
673 r = config_parse(NULL, filename, file,
674 NETDEV_VTABLE(netdev)->sections,
675 config_item_perf_lookup, network_netdev_gperf_lookup,
bcde742e 676 CONFIG_PARSE_WARN, netdev);
aa9f1140
TG
677 if (r < 0)
678 return r;
679
680 /* verify configuration */
681 if (NETDEV_VTABLE(netdev)->config_verify) {
682 r = NETDEV_VTABLE(netdev)->config_verify(netdev, filename);
683 if (r < 0)
684 return 0;
fe6b2d55
TG
685 }
686
52433f6b
TG
687 netdev->filename = strdup(filename);
688 if (!netdev->filename)
02b59d57
TG
689 return log_oom();
690
bc48c51f 691 if (!netdev->mac && netdev->kind != NETDEV_KIND_VLAN) {
5c8f858d 692 r = netdev_get_mac(netdev->ifname, &netdev->mac);
6a7a4e4d
LP
693 if (r < 0)
694 return log_error_errno(r, "Failed to generate predictable MAC address for %s: %m", netdev->ifname);
5c8f858d
TG
695 }
696
af4e9e2c 697 r = hashmap_put(netdev->manager->netdevs, netdev->ifname, netdev);
02b59d57
TG
698 if (r < 0)
699 return r;
700
52433f6b 701 LIST_HEAD_INIT(netdev->callbacks);
02b59d57 702
79008bdd 703 log_netdev_debug(netdev, "loaded %s", netdev_kind_to_string(netdev->kind));
3be1d7e0 704
aa9f1140
TG
705 switch (NETDEV_VTABLE(netdev)->create_type) {
706 case NETDEV_CREATE_MASTER:
707 case NETDEV_CREATE_INDEPENDENT:
6c3e68e7 708 r = netdev_create(netdev, NULL, NULL);
9e358851 709 if (r < 0)
4d7fa6de
SS
710 return r;
711
712 break;
713 default:
714 break;
715 }
9e358851 716
4d7fa6de
SS
717 switch (netdev->kind) {
718 case NETDEV_KIND_IPIP:
719 independent = IPIP(netdev)->independent;
720 break;
721 case NETDEV_KIND_GRE:
722 independent = GRE(netdev)->independent;
723 break;
724 case NETDEV_KIND_GRETAP:
725 independent = GRETAP(netdev)->independent;
726 break;
727 case NETDEV_KIND_IP6GRE:
728 independent = IP6GRE(netdev)->independent;
729 break;
730 case NETDEV_KIND_IP6GRETAP:
731 independent = IP6GRETAP(netdev)->independent;
732 break;
733 case NETDEV_KIND_SIT:
734 independent = SIT(netdev)->independent;
735 break;
736 case NETDEV_KIND_VTI:
737 independent = VTI(netdev)->independent;
738 break;
739 case NETDEV_KIND_VTI6:
740 independent = VTI6(netdev)->independent;
741 break;
742 case NETDEV_KIND_IP6TNL:
743 independent = IP6TNL(netdev)->independent;
aa9f1140
TG
744 break;
745 default:
746 break;
54abf461 747 }
02b59d57 748
4d7fa6de
SS
749 if (independent) {
750 r = netdev_create(netdev, NULL, NULL);
751 if (r < 0)
752 return r;
753 }
754
52433f6b 755 netdev = NULL;
02b59d57
TG
756
757 return 0;
758}
759
52433f6b 760int netdev_load(Manager *manager) {
6a7a4e4d 761 _cleanup_strv_free_ char **files = NULL;
1a436809 762 NetDev *netdev;
6a7a4e4d 763 char **f;
02b59d57
TG
764 int r;
765
766 assert(manager);
767
52433f6b 768 while ((netdev = hashmap_first(manager->netdevs)))
14b746f7 769 netdev_unref(netdev);
02b59d57 770
b5084605 771 r = conf_files_list_strv(&files, ".netdev", NULL, 0, network_dirs);
f647962d
MS
772 if (r < 0)
773 return log_error_errno(r, "Failed to enumerate netdev files: %m");
02b59d57
TG
774
775 STRV_FOREACH_BACKWARDS(f, files) {
52433f6b 776 r = netdev_load_one(manager, *f);
02b59d57
TG
777 if (r < 0)
778 return r;
779 }
780
02b59d57
TG
781 return 0;
782}