]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/network/netdev/vxlan.c
tree-wide: use ASSERT_PTR more
[thirdparty/systemd.git] / src / network / netdev / vxlan.c
CommitLineData
db9ecf05 1/* SPDX-License-Identifier: LGPL-2.1-or-later */
326cb406 2
326cb406 3#include <net/if.h>
9f0cf80d
YW
4#include <netinet/in.h>
5#include <linux/if_arp.h>
326cb406 6
85a8eeee 7#include "conf-parser.h"
ea0288d1 8#include "alloc-util.h"
634f0f98 9#include "extract-word.h"
1189c00a 10#include "string-table.h"
d35e5d37
SS
11#include "string-util.h"
12#include "strv.h"
ea0288d1 13#include "parse-util.h"
737f1405 14#include "vxlan.h"
326cb406 15
1189c00a
SS
16static const char* const df_table[_NETDEV_VXLAN_DF_MAX] = {
17 [NETDEV_VXLAN_DF_NO] = "no",
18 [NETDEV_VXLAN_DF_YES] = "yes",
19 [NETDEV_VXLAN_DF_INHERIT] = "inherit",
20};
21
22DEFINE_STRING_TABLE_LOOKUP_WITH_BOOLEAN(df, VxLanDF, NETDEV_VXLAN_DF_YES);
23DEFINE_CONFIG_PARSE_ENUM(config_parse_df, df, VxLanDF, "Failed to parse VXLAN IPDoNotFragment= setting");
24
b886649c
YW
25static int vxlan_get_local_address(VxLan *v, Link *link, int *ret_family, union in_addr_union *ret_address) {
26 assert(v);
27
28 if (v->local_type < 0) {
29 if (ret_family)
30 *ret_family = v->local_family;
31 if (ret_address)
32 *ret_address = v->local;
33 return 0;
34 }
35
36 return link_get_local_address(link, v->local_type, v->local_family, ret_family, ret_address);
37}
38
1c4baffc 39static int netdev_vxlan_fill_message_create(NetDev *netdev, Link *link, sd_netlink_message *m) {
b886649c
YW
40 union in_addr_union local;
41 int local_family, r;
c2353b2f 42 VxLan *v;
326cb406 43
3be1d7e0 44 assert(netdev);
326cb406
SS
45 assert(m);
46
c2353b2f
SS
47 v = VXLAN(netdev);
48
49 assert(v);
326cb406 50
6f213e4a
SS
51 if (v->vni <= VXLAN_VID_MAX) {
52 r = sd_netlink_message_append_u32(m, IFLA_VXLAN_ID, v->vni);
f545680e 53 if (r < 0)
5b80ecea 54 return r;
326cb406
SS
55 }
56
94876904 57 if (in_addr_is_set(v->group_family, &v->group)) {
7c9b2690
SS
58 if (v->group_family == AF_INET)
59 r = sd_netlink_message_append_in_addr(m, IFLA_VXLAN_GROUP, &v->group.in);
d35e5d37 60 else
7c9b2690 61 r = sd_netlink_message_append_in6_addr(m, IFLA_VXLAN_GROUP6, &v->group.in6);
d35e5d37 62 if (r < 0)
5b80ecea 63 return r;
94876904 64 } else if (in_addr_is_set(v->remote_family, &v->remote)) {
fc1d9c7b
SS
65 if (v->remote_family == AF_INET)
66 r = sd_netlink_message_append_in_addr(m, IFLA_VXLAN_GROUP, &v->remote.in);
67 else
68 r = sd_netlink_message_append_in6_addr(m, IFLA_VXLAN_GROUP6, &v->remote.in6);
69 if (r < 0)
5b80ecea 70 return r;
d35e5d37
SS
71 }
72
b886649c
YW
73 r = vxlan_get_local_address(v, link, &local_family, &local);
74 if (r < 0)
5b80ecea 75 return r;
b886649c
YW
76
77 if (in_addr_is_set(local_family, &local)) {
78 if (local_family == AF_INET)
79 r = sd_netlink_message_append_in_addr(m, IFLA_VXLAN_LOCAL, &local.in);
d35e5d37 80 else
b886649c 81 r = sd_netlink_message_append_in6_addr(m, IFLA_VXLAN_LOCAL6, &local.in6);
d35e5d37 82 if (r < 0)
5b80ecea 83 return r;
d35e5d37 84 }
326cb406 85
a9b8450b 86 r = sd_netlink_message_append_u32(m, IFLA_VXLAN_LINK, link ? link->ifindex : 0);
f545680e 87 if (r < 0)
5b80ecea 88 return r;
326cb406 89
f4a8ca32
SS
90 if (v->inherit) {
91 r = sd_netlink_message_append_flag(m, IFLA_VXLAN_TTL_INHERIT);
92 if (r < 0)
5b80ecea 93 return r;
f4a8ca32 94 } else {
1c4baffc 95 r = sd_netlink_message_append_u8(m, IFLA_VXLAN_TTL, v->ttl);
f545680e 96 if (r < 0)
5b80ecea 97 return r;
326cb406
SS
98 }
99
7b3b9822 100 if (v->tos != 0) {
1c4baffc 101 r = sd_netlink_message_append_u8(m, IFLA_VXLAN_TOS, v->tos);
f545680e 102 if (r < 0)
5b80ecea 103 return r;
326cb406
SS
104 }
105
1c4baffc 106 r = sd_netlink_message_append_u8(m, IFLA_VXLAN_LEARNING, v->learning);
f545680e 107 if (r < 0)
5b80ecea 108 return r;
326cb406 109
1c4baffc 110 r = sd_netlink_message_append_u8(m, IFLA_VXLAN_RSC, v->route_short_circuit);
f545680e 111 if (r < 0)
5b80ecea 112 return r;
85a8eeee 113
1c4baffc 114 r = sd_netlink_message_append_u8(m, IFLA_VXLAN_PROXY, v->arp_proxy);
f545680e 115 if (r < 0)
5b80ecea 116 return r;
85a8eeee 117
1c4baffc 118 r = sd_netlink_message_append_u8(m, IFLA_VXLAN_L2MISS, v->l2miss);
f545680e 119 if (r < 0)
5b80ecea 120 return r;
85a8eeee 121
1c4baffc 122 r = sd_netlink_message_append_u8(m, IFLA_VXLAN_L3MISS, v->l3miss);
f545680e 123 if (r < 0)
5b80ecea 124 return r;
85a8eeee 125
7b3b9822 126 if (v->fdb_ageing != 0) {
1c4baffc 127 r = sd_netlink_message_append_u32(m, IFLA_VXLAN_AGEING, v->fdb_ageing / USEC_PER_SEC);
f545680e 128 if (r < 0)
5b80ecea 129 return r;
85a8eeee
SS
130 }
131
7b3b9822 132 if (v->max_fdb != 0) {
3dbcf579
SS
133 r = sd_netlink_message_append_u32(m, IFLA_VXLAN_LIMIT, v->max_fdb);
134 if (r < 0)
5b80ecea 135 return r;
3dbcf579
SS
136 }
137
1c4baffc 138 r = sd_netlink_message_append_u8(m, IFLA_VXLAN_UDP_CSUM, v->udpcsum);
f545680e 139 if (r < 0)
5b80ecea 140 return r;
cffacc74 141
1c4baffc 142 r = sd_netlink_message_append_u8(m, IFLA_VXLAN_UDP_ZERO_CSUM6_TX, v->udp6zerocsumtx);
f545680e 143 if (r < 0)
5b80ecea 144 return r;
cffacc74 145
1c4baffc 146 r = sd_netlink_message_append_u8(m, IFLA_VXLAN_UDP_ZERO_CSUM6_RX, v->udp6zerocsumrx);
f545680e 147 if (r < 0)
5b80ecea 148 return r;
cffacc74 149
16441027
SS
150 r = sd_netlink_message_append_u8(m, IFLA_VXLAN_REMCSUM_TX, v->remote_csum_tx);
151 if (r < 0)
5b80ecea 152 return r;
16441027
SS
153
154 r = sd_netlink_message_append_u8(m, IFLA_VXLAN_REMCSUM_RX, v->remote_csum_rx);
155 if (r < 0)
5b80ecea 156 return r;
16441027 157
ea0288d1
SS
158 r = sd_netlink_message_append_u16(m, IFLA_VXLAN_PORT, htobe16(v->dest_port));
159 if (r < 0)
5b80ecea 160 return r;
ea0288d1 161
173a6e29 162 if (v->port_range.low != 0 || v->port_range.high != 0) {
ea0288d1
SS
163 struct ifla_vxlan_port_range port_range;
164
165 port_range.low = htobe16(v->port_range.low);
166 port_range.high = htobe16(v->port_range.high);
167
168 r = sd_netlink_message_append_data(m, IFLA_VXLAN_PORT_RANGE, &port_range, sizeof(port_range));
169 if (r < 0)
5b80ecea 170 return r;
ea0288d1
SS
171 }
172
d8653945
SS
173 r = sd_netlink_message_append_u32(m, IFLA_VXLAN_LABEL, htobe32(v->flow_label));
174 if (r < 0)
5b80ecea 175 return r;
d8653945 176
ea84fd5c
SS
177 if (v->group_policy) {
178 r = sd_netlink_message_append_flag(m, IFLA_VXLAN_GBP);
179 if (r < 0)
5b80ecea 180 return r;
ea84fd5c
SS
181 }
182
4cc0fd75
SS
183 if (v->generic_protocol_extension) {
184 r = sd_netlink_message_append_flag(m, IFLA_VXLAN_GPE);
185 if (r < 0)
5b80ecea 186 return r;
4cc0fd75
SS
187 }
188
1189c00a
SS
189 if (v->df != _NETDEV_VXLAN_DF_INVALID) {
190 r = sd_netlink_message_append_u8(m, IFLA_VXLAN_DF, v->df);
191 if (r < 0)
5b80ecea 192 return r;
1189c00a
SS
193 }
194
5b80ecea 195 return 0;
326cb406
SS
196}
197
63481576
YW
198int config_parse_vxlan_address(
199 const char *unit,
200 const char *filename,
201 unsigned line,
202 const char *section,
203 unsigned section_line,
204 const char *lvalue,
205 int ltype,
206 const char *rvalue,
207 void *data,
208 void *userdata) {
209
99534007 210 VxLan *v = ASSERT_PTR(userdata);
85a8eeee 211 union in_addr_union *addr = data, buffer;
b886649c 212 int *family, f, r;
85a8eeee
SS
213
214 assert(filename);
215 assert(lvalue);
216 assert(rvalue);
217 assert(data);
b886649c
YW
218
219 if (streq(lvalue, "Local"))
220 family = &v->local_family;
221 else if (streq(lvalue, "Remote"))
222 family = &v->remote_family;
223 else if (streq(lvalue, "Group"))
224 family = &v->group_family;
225 else
226 assert_not_reached();
227
228 if (isempty(rvalue)) {
229 *addr = IN_ADDR_NULL;
230 *family = AF_UNSPEC;
231 return 0;
232 }
233
234 if (streq(lvalue, "Local")) {
235 NetDevLocalAddressType t;
236
237 t = netdev_local_address_type_from_string(rvalue);
238 if (t >= 0) {
239 v->local = IN_ADDR_NULL;
240 v->local_family = AF_UNSPEC;
241 v->local_type = t;
242 return 0;
243 }
244 }
85a8eeee
SS
245
246 r = in_addr_from_string_auto(rvalue, &f, &buffer);
247 if (r < 0) {
b886649c
YW
248 log_syntax(unit, LOG_WARNING, filename, line, r,
249 "Failed to parse %s=, ignoring assignment: %s", lvalue, rvalue);
85a8eeee
SS
250 return 0;
251 }
252
d35e5d37
SS
253 r = in_addr_is_multicast(f, &buffer);
254
bf443be9 255 if (streq(lvalue, "Group")) {
d35e5d37 256 if (r <= 0) {
b886649c
YW
257 log_syntax(unit, LOG_WARNING, filename, line, 0,
258 "%s= must be a multicast address, ignoring assignment: %s", lvalue, rvalue);
d35e5d37
SS
259 return 0;
260 }
d35e5d37
SS
261 } else {
262 if (r > 0) {
b886649c
YW
263 log_syntax(unit, LOG_WARNING, filename, line, 0,
264 "%s= cannot be a multicast address, ignoring assignment: %s", lvalue, rvalue);
d35e5d37
SS
265 return 0;
266 }
85a8eeee
SS
267 }
268
b886649c
YW
269 if (streq(lvalue, "Local"))
270 v->local_type = _NETDEV_LOCAL_ADDRESS_TYPE_INVALID;
85a8eeee 271 *addr = buffer;
b886649c 272 *family = f;
85a8eeee
SS
273
274 return 0;
275}
276
63481576
YW
277int config_parse_port_range(
278 const char *unit,
279 const char *filename,
280 unsigned line,
281 const char *section,
282 unsigned section_line,
283 const char *lvalue,
284 int ltype,
285 const char *rvalue,
286 void *data,
287 void *userdata) {
288
ea0288d1 289 VxLan *v = userdata;
173a6e29 290 uint16_t low, high;
ea0288d1
SS
291 int r;
292
293 assert(filename);
294 assert(lvalue);
295 assert(rvalue);
296 assert(data);
297
173a6e29 298 r = parse_ip_port_range(rvalue, &low, &high);
ea0288d1 299 if (r < 0) {
d96edb2c 300 log_syntax(unit, LOG_WARNING, filename, line, r,
173a6e29 301 "Failed to parse VXLAN port range '%s'. Port should be greater than 0 and less than 65535.", rvalue);
ea0288d1
SS
302 return 0;
303 }
304
305 v->port_range.low = low;
306 v->port_range.high = high;
307
308 return 0;
309}
310
63481576
YW
311int config_parse_flow_label(
312 const char *unit,
313 const char *filename,
314 unsigned line,
315 const char *section,
316 unsigned section_line,
317 const char *lvalue,
318 int ltype,
319 const char *rvalue,
320 void *data,
321 void *userdata) {
322
d8653945
SS
323 VxLan *v = userdata;
324 unsigned f;
325 int r;
326
327 assert(filename);
328 assert(lvalue);
329 assert(rvalue);
330 assert(data);
331
332 r = safe_atou(rvalue, &f);
333 if (r < 0) {
d96edb2c 334 log_syntax(unit, LOG_WARNING, filename, line, r, "Failed to parse VXLAN flow label '%s'.", rvalue);
d8653945
SS
335 return 0;
336 }
337
338 if (f & ~VXLAN_FLOW_LABEL_MAX_MASK) {
d96edb2c 339 log_syntax(unit, LOG_WARNING, filename, line, r,
d8653945
SS
340 "VXLAN flow label '%s' not valid. Flow label range should be [0-1048575].", rvalue);
341 return 0;
342 }
343
344 v->flow_label = f;
345
346 return 0;
347}
348
63481576
YW
349int config_parse_vxlan_ttl(
350 const char *unit,
351 const char *filename,
352 unsigned line,
353 const char *section,
354 unsigned section_line,
355 const char *lvalue,
356 int ltype,
357 const char *rvalue,
358 void *data,
359 void *userdata) {
360
f4a8ca32
SS
361 VxLan *v = userdata;
362 unsigned f;
363 int r;
364
365 assert(filename);
366 assert(lvalue);
367 assert(rvalue);
368 assert(data);
369
370 if (streq(rvalue, "inherit"))
371 v->inherit = true;
372 else {
373 r = safe_atou(rvalue, &f);
374 if (r < 0) {
d96edb2c 375 log_syntax(unit, LOG_WARNING, filename, line, r,
f4a8ca32
SS
376 "Failed to parse VXLAN TTL '%s', ignoring assignment: %m", rvalue);
377 return 0;
378 }
379
380 if (f > 255) {
d96edb2c 381 log_syntax(unit, LOG_WARNING, filename, line, 0,
f4a8ca32
SS
382 "Invalid VXLAN TTL '%s'. TTL must be <= 255. Ignoring assignment.", rvalue);
383 return 0;
384 }
385
386 v->ttl = f;
387 }
388
389 return 0;
390}
391
3be1d7e0 392static int netdev_vxlan_verify(NetDev *netdev, const char *filename) {
aa9f1140
TG
393 VxLan *v = VXLAN(netdev);
394
326cb406 395 assert(netdev);
aa9f1140 396 assert(v);
3be1d7e0 397 assert(filename);
326cb406 398
76fbd4d7
SS
399 if (v->vni > VXLAN_VID_MAX)
400 return log_netdev_warning_errno(netdev, SYNTHETIC_ERRNO(EINVAL),
401 "%s: VXLAN without valid VNI (or VXLAN Segment ID) configured. Ignoring.",
402 filename);
403
404 if (v->ttl > 255)
405 return log_netdev_warning_errno(netdev, SYNTHETIC_ERRNO(EINVAL),
406 "%s: VXLAN TTL must be <= 255. Ignoring.",
407 filename);
326cb406 408
1c8b0ecc
SS
409 if (!v->dest_port && v->generic_protocol_extension)
410 v->dest_port = 4790;
411
94876904 412 if (in_addr_is_set(v->group_family, &v->group) && in_addr_is_set(v->remote_family, &v->remote))
fc1d9c7b
SS
413 return log_netdev_warning_errno(netdev, SYNTHETIC_ERRNO(EINVAL),
414 "%s: VXLAN both 'Group=' and 'Remote=' cannot be specified. Ignoring.",
415 filename);
416
b886649c
YW
417 if (v->independent && v->local_type >= 0)
418 return log_netdev_error_errno(netdev, SYNTHETIC_ERRNO(EINVAL),
419 "The local address cannot be '%s' when Independent= is enabled, ignoring.",
420 strna(netdev_local_address_type_to_string(v->local_type)));
421
326cb406
SS
422 return 0;
423}
3be1d7e0 424
b886649c
YW
425static int netdev_vxlan_is_ready_to_create(NetDev *netdev, Link *link) {
426 VxLan *v;
427
428 assert(netdev);
b886649c
YW
429
430 v = VXLAN(netdev);
431
432 assert(v);
433
5d4a925a
YW
434 if (v->independent)
435 return true;
436
b886649c
YW
437 return vxlan_get_local_address(v, link, NULL, NULL) >= 0;
438}
439
aa9f1140 440static void vxlan_init(NetDev *netdev) {
c2353b2f 441 VxLan *v;
aa9f1140
TG
442
443 assert(netdev);
c2353b2f
SS
444
445 v = VXLAN(netdev);
446
aa9f1140
TG
447 assert(v);
448
b886649c 449 v->local_type = _NETDEV_LOCAL_ADDRESS_TYPE_INVALID;
6f213e4a 450 v->vni = VXLAN_VID_MAX + 1;
1189c00a 451 v->df = _NETDEV_VXLAN_DF_INVALID;
aa9f1140 452 v->learning = true;
cffacc74
SS
453 v->udpcsum = false;
454 v->udp6zerocsumtx = false;
455 v->udp6zerocsumrx = false;
aa9f1140
TG
456}
457
3be1d7e0 458const NetDevVTable vxlan_vtable = {
aa9f1140
TG
459 .object_size = sizeof(VxLan),
460 .init = vxlan_init,
130b812f 461 .sections = NETDEV_COMMON_SECTIONS "VXLAN\0",
aa9f1140
TG
462 .fill_message_create = netdev_vxlan_fill_message_create,
463 .create_type = NETDEV_CREATE_STACKED,
b886649c 464 .is_ready_to_create = netdev_vxlan_is_ready_to_create,
3be1d7e0 465 .config_verify = netdev_vxlan_verify,
9f0cf80d 466 .iftype = ARPHRD_ETHER,
daf0f8ca 467 .generate_mac = true,
3be1d7e0 468};