]>
Commit | Line | Data |
---|---|---|
0fa8ee6c YW |
1 | /* SPDX-License-Identifier: LGPL-2.1-or-later */ |
2 | ||
93fabc10 YW |
3 | #include <netinet/in.h> |
4 | #include <linux/if.h> | |
7558f9e7 | 5 | #include <linux/if_arp.h> |
93fabc10 | 6 | |
0fa8ee6c YW |
7 | #include "missing_network.h" |
8 | #include "netlink-util.h" | |
7558f9e7 | 9 | #include "networkd-can.h" |
0fa8ee6c YW |
10 | #include "networkd-link.h" |
11 | #include "networkd-manager.h" | |
12 | #include "networkd-queue.h" | |
13 | #include "string-table.h" | |
8e00e24c | 14 | #include "sysctl-util.h" |
0fa8ee6c YW |
15 | |
16 | static const char *const set_link_operation_table[_SET_LINK_OPERATION_MAX] = { | |
8e00e24c | 17 | [SET_LINK_ADDRESS_GENERATION_MODE] = "IPv6LL address generation mode", |
5062b859 | 18 | [SET_LINK_BOND] = "bond configurations", |
7d5b232f | 19 | [SET_LINK_BRIDGE] = "bridge configurations", |
8252fb44 | 20 | [SET_LINK_BRIDGE_VLAN] = "bridge VLAN configurations", |
7558f9e7 | 21 | [SET_LINK_CAN] = "CAN interface configurations", |
93fabc10 | 22 | [SET_LINK_FLAGS] = "link flags", |
cc4c8fb1 | 23 | [SET_LINK_GROUP] = "interface group", |
a8e5e27c | 24 | [SET_LINK_MAC] = "MAC address", |
d24bf1b5 | 25 | [SET_LINK_MASTER] = "master interface", |
0fa8ee6c YW |
26 | [SET_LINK_MTU] = "MTU", |
27 | }; | |
28 | ||
29 | DEFINE_PRIVATE_STRING_TABLE_LOOKUP_TO_STRING(set_link_operation, SetLinkOperation); | |
30 | ||
1362bd6c YW |
31 | static int get_link_default_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) { |
32 | return link_getlink_handler_internal(rtnl, m, link, "Failed to sync link information"); | |
33 | } | |
34 | ||
440d40dc YW |
35 | static int get_link_master_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) { |
36 | if (get_link_default_handler(rtnl, m, link) > 0) | |
37 | link->master_set = true; | |
38 | return 0; | |
39 | } | |
40 | ||
baa95d22 YW |
41 | static int get_link_update_flag_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) { |
42 | assert(link); | |
43 | assert(link->set_flags_messages > 0); | |
44 | ||
45 | link->set_flags_messages--; | |
46 | ||
47 | return get_link_default_handler(rtnl, m, link); | |
48 | } | |
49 | ||
1362bd6c YW |
50 | static int set_link_handler_internal( |
51 | sd_netlink *rtnl, | |
52 | sd_netlink_message *m, | |
53 | Link *link, | |
54 | SetLinkOperation op, | |
55 | bool ignore, | |
56 | link_netlink_message_handler_t get_link_handler) { | |
57 | ||
0fa8ee6c YW |
58 | int r; |
59 | ||
60 | assert(m); | |
61 | assert(link); | |
62 | assert(link->set_link_messages > 0); | |
63 | assert(op >= 0 && op < _SET_LINK_OPERATION_MAX); | |
64 | ||
65 | link->set_link_messages--; | |
66 | ||
67 | if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER)) | |
baa95d22 | 68 | goto on_error; |
0fa8ee6c YW |
69 | |
70 | r = sd_netlink_message_get_errno(m); | |
71 | if (r < 0) { | |
72 | const char *error_msg; | |
73 | ||
74 | error_msg = strjoina("Failed to set ", set_link_operation_to_string(op), ignore ? ", ignoring" : ""); | |
75 | log_link_message_warning_errno(link, m, r, error_msg); | |
76 | ||
77 | if (!ignore) | |
78 | link_enter_failed(link); | |
baa95d22 | 79 | goto on_error; |
0fa8ee6c YW |
80 | } |
81 | ||
82 | log_link_debug(link, "%s set.", set_link_operation_to_string(op)); | |
1362bd6c YW |
83 | |
84 | if (get_link_handler) { | |
85 | r = link_call_getlink(link, get_link_handler); | |
86 | if (r < 0) { | |
87 | link_enter_failed(link); | |
baa95d22 | 88 | goto on_error; |
1362bd6c YW |
89 | } |
90 | } | |
91 | ||
92 | if (link->set_link_messages == 0) | |
93 | link_check_ready(link); | |
94 | ||
0fa8ee6c | 95 | return 1; |
baa95d22 YW |
96 | |
97 | on_error: | |
98 | if (op == SET_LINK_FLAGS) { | |
99 | assert(link->set_flags_messages > 0); | |
100 | link->set_flags_messages--; | |
101 | } | |
102 | ||
103 | return 0; | |
0fa8ee6c YW |
104 | } |
105 | ||
8e00e24c YW |
106 | static int link_set_addrgen_mode_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) { |
107 | int r; | |
108 | ||
1362bd6c | 109 | r = set_link_handler_internal(rtnl, m, link, SET_LINK_ADDRESS_GENERATION_MODE, true, NULL); |
8e00e24c YW |
110 | if (r <= 0) |
111 | return r; | |
112 | ||
113 | r = link_drop_ipv6ll_addresses(link); | |
114 | if (r < 0) { | |
115 | log_link_warning_errno(link, r, "Failed to drop IPv6LL addresses: %m"); | |
116 | link_enter_failed(link); | |
117 | } | |
118 | ||
119 | return 0; | |
120 | } | |
121 | ||
5062b859 | 122 | static int link_set_bond_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) { |
2a057a73 | 123 | return set_link_handler_internal(rtnl, m, link, SET_LINK_BOND, false, NULL); |
5062b859 YW |
124 | } |
125 | ||
7d5b232f | 126 | static int link_set_bridge_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) { |
2a057a73 | 127 | return set_link_handler_internal(rtnl, m, link, SET_LINK_BRIDGE, false, NULL); |
7d5b232f YW |
128 | } |
129 | ||
8252fb44 | 130 | static int link_set_bridge_vlan_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) { |
2a057a73 | 131 | return set_link_handler_internal(rtnl, m, link, SET_LINK_BRIDGE_VLAN, false, NULL); |
8252fb44 YW |
132 | } |
133 | ||
7558f9e7 YW |
134 | static int link_set_can_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) { |
135 | return set_link_handler_internal(rtnl, m, link, SET_LINK_CAN, false, NULL); | |
136 | } | |
137 | ||
93fabc10 | 138 | static int link_set_flags_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) { |
baa95d22 | 139 | return set_link_handler_internal(rtnl, m, link, SET_LINK_FLAGS, false, get_link_update_flag_handler); |
93fabc10 YW |
140 | } |
141 | ||
cc4c8fb1 | 142 | static int link_set_group_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) { |
2a057a73 | 143 | return set_link_handler_internal(rtnl, m, link, SET_LINK_GROUP, false, NULL); |
cc4c8fb1 YW |
144 | } |
145 | ||
a8e5e27c | 146 | static int link_set_mac_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) { |
1362bd6c | 147 | return set_link_handler_internal(rtnl, m, link, SET_LINK_MAC, true, get_link_default_handler); |
a8e5e27c YW |
148 | } |
149 | ||
d24bf1b5 | 150 | static int link_set_master_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) { |
2a057a73 | 151 | return set_link_handler_internal(rtnl, m, link, SET_LINK_MASTER, false, get_link_master_handler); |
d24bf1b5 YW |
152 | } |
153 | ||
0fa8ee6c YW |
154 | static int link_set_mtu_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) { |
155 | int r; | |
156 | ||
1362bd6c | 157 | r = set_link_handler_internal(rtnl, m, link, SET_LINK_MTU, true, get_link_default_handler); |
0fa8ee6c YW |
158 | if (r <= 0) |
159 | return r; | |
160 | ||
161 | /* The kernel resets ipv6 mtu after changing device mtu; | |
162 | * we must set this here, after we've set device mtu */ | |
163 | r = link_set_ipv6_mtu(link); | |
164 | if (r < 0) | |
165 | log_link_warning_errno(link, r, "Failed to set IPv6 MTU, ignoring: %m"); | |
166 | ||
0fa8ee6c YW |
167 | return 0; |
168 | } | |
169 | ||
170 | static int link_configure( | |
171 | Link *link, | |
172 | SetLinkOperation op, | |
173 | void *userdata, | |
174 | link_netlink_message_handler_t callback) { | |
175 | ||
176 | _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL; | |
177 | int r; | |
178 | ||
179 | assert(link); | |
180 | assert(link->manager); | |
181 | assert(link->manager->rtnl); | |
182 | assert(link->network); | |
183 | assert(op >= 0 && op < _SET_LINK_OPERATION_MAX); | |
184 | assert(callback); | |
185 | ||
186 | log_link_debug(link, "Setting %s", set_link_operation_to_string(op)); | |
187 | ||
7558f9e7 | 188 | if (IN_SET(op, SET_LINK_BOND, SET_LINK_CAN)) { |
5062b859 YW |
189 | r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_NEWLINK, link->master_ifindex); |
190 | if (r < 0) | |
191 | return log_link_debug_errno(link, r, "Could not allocate RTM_NEWLINK message: %m"); | |
192 | } else { | |
193 | r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_SETLINK, link->ifindex); | |
194 | if (r < 0) | |
195 | return log_link_debug_errno(link, r, "Could not allocate RTM_SETLINK message: %m"); | |
196 | } | |
0fa8ee6c YW |
197 | |
198 | switch (op) { | |
8e00e24c YW |
199 | case SET_LINK_ADDRESS_GENERATION_MODE: |
200 | r = sd_netlink_message_open_container(req, IFLA_AF_SPEC); | |
201 | if (r < 0) | |
202 | return log_link_debug_errno(link, r, "Could not open IFLA_AF_SPEC container: %m"); | |
203 | ||
204 | r = sd_netlink_message_open_container(req, AF_INET6); | |
205 | if (r < 0) | |
206 | return log_link_debug_errno(link, r, "Could not open AF_INET6 container: %m"); | |
207 | ||
208 | r = sd_netlink_message_append_u8(req, IFLA_INET6_ADDR_GEN_MODE, PTR_TO_UINT8(userdata)); | |
209 | if (r < 0) | |
210 | return log_link_debug_errno(link, r, "Could not append IFLA_INET6_ADDR_GEN_MODE attribute: %m"); | |
211 | ||
212 | r = sd_netlink_message_close_container(req); | |
213 | if (r < 0) | |
214 | return log_link_debug_errno(link, r, "Could not close AF_INET6 container: %m"); | |
215 | ||
216 | r = sd_netlink_message_close_container(req); | |
217 | if (r < 0) | |
218 | return log_link_debug_errno(link, r, "Could not close IFLA_AF_SPEC container: %m"); | |
219 | break; | |
5062b859 YW |
220 | case SET_LINK_BOND: |
221 | r = sd_netlink_message_set_flags(req, NLM_F_REQUEST | NLM_F_ACK); | |
222 | if (r < 0) | |
223 | return log_link_debug_errno(link, r, "Could not set netlink message flags: %m"); | |
224 | ||
225 | r = sd_netlink_message_open_container(req, IFLA_LINKINFO); | |
226 | if (r < 0) | |
227 | return log_link_debug_errno(link, r, "Could not open IFLA_LINKINFO container: %m"); | |
228 | ||
229 | r = sd_netlink_message_open_container_union(req, IFLA_INFO_DATA, "bond"); | |
230 | if (r < 0) | |
231 | return log_link_debug_errno(link, r, "Could not open IFLA_INFO_DATA container: %m"); | |
232 | ||
233 | if (link->network->active_slave) { | |
234 | r = sd_netlink_message_append_u32(req, IFLA_BOND_ACTIVE_SLAVE, link->ifindex); | |
235 | if (r < 0) | |
236 | return log_link_debug_errno(link, r, "Could not append IFLA_BOND_ACTIVE_SLAVE attribute: %m"); | |
237 | } | |
238 | ||
239 | if (link->network->primary_slave) { | |
240 | r = sd_netlink_message_append_u32(req, IFLA_BOND_PRIMARY, link->ifindex); | |
241 | if (r < 0) | |
242 | return log_link_debug_errno(link, r, "Could not append IFLA_BOND_PRIMARY attribute: %m"); | |
243 | } | |
244 | ||
245 | r = sd_netlink_message_close_container(req); | |
246 | if (r < 0) | |
247 | return log_link_debug_errno(link, r, "Could not close IFLA_INFO_DATA container: %m"); | |
248 | ||
249 | r = sd_netlink_message_close_container(req); | |
250 | if (r < 0) | |
251 | return log_link_debug_errno(link, r, "Could not close IFLA_LINKINFO container: %m"); | |
252 | ||
253 | break; | |
7d5b232f YW |
254 | case SET_LINK_BRIDGE: |
255 | r = sd_rtnl_message_link_set_family(req, AF_BRIDGE); | |
256 | if (r < 0) | |
257 | return log_link_debug_errno(link, r, "Could not set message family: %m"); | |
258 | ||
259 | r = sd_netlink_message_open_container(req, IFLA_PROTINFO); | |
260 | if (r < 0) | |
261 | return log_link_debug_errno(link, r, "Could not open IFLA_PROTINFO container: %m"); | |
262 | ||
263 | if (link->network->use_bpdu >= 0) { | |
264 | r = sd_netlink_message_append_u8(req, IFLA_BRPORT_GUARD, link->network->use_bpdu); | |
265 | if (r < 0) | |
266 | return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_GUARD attribute: %m"); | |
267 | } | |
268 | ||
269 | if (link->network->hairpin >= 0) { | |
270 | r = sd_netlink_message_append_u8(req, IFLA_BRPORT_MODE, link->network->hairpin); | |
271 | if (r < 0) | |
272 | return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_MODE attribute: %m"); | |
273 | } | |
274 | ||
275 | if (link->network->fast_leave >= 0) { | |
276 | r = sd_netlink_message_append_u8(req, IFLA_BRPORT_FAST_LEAVE, link->network->fast_leave); | |
277 | if (r < 0) | |
278 | return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_FAST_LEAVE attribute: %m"); | |
279 | } | |
280 | ||
281 | if (link->network->allow_port_to_be_root >= 0) { | |
282 | r = sd_netlink_message_append_u8(req, IFLA_BRPORT_PROTECT, link->network->allow_port_to_be_root); | |
283 | if (r < 0) | |
284 | return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_PROTECT attribute: %m"); | |
285 | } | |
286 | ||
287 | if (link->network->unicast_flood >= 0) { | |
288 | r = sd_netlink_message_append_u8(req, IFLA_BRPORT_UNICAST_FLOOD, link->network->unicast_flood); | |
289 | if (r < 0) | |
290 | return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_UNICAST_FLOOD attribute: %m"); | |
291 | } | |
292 | ||
293 | if (link->network->multicast_flood >= 0) { | |
294 | r = sd_netlink_message_append_u8(req, IFLA_BRPORT_MCAST_FLOOD, link->network->multicast_flood); | |
295 | if (r < 0) | |
296 | return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_MCAST_FLOOD attribute: %m"); | |
297 | } | |
298 | ||
299 | if (link->network->multicast_to_unicast >= 0) { | |
300 | r = sd_netlink_message_append_u8(req, IFLA_BRPORT_MCAST_TO_UCAST, link->network->multicast_to_unicast); | |
301 | if (r < 0) | |
302 | return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_MCAST_TO_UCAST attribute: %m"); | |
303 | } | |
304 | ||
305 | if (link->network->neighbor_suppression >= 0) { | |
306 | r = sd_netlink_message_append_u8(req, IFLA_BRPORT_NEIGH_SUPPRESS, link->network->neighbor_suppression); | |
307 | if (r < 0) | |
308 | return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_NEIGH_SUPPRESS attribute: %m"); | |
309 | } | |
310 | ||
311 | if (link->network->learning >= 0) { | |
312 | r = sd_netlink_message_append_u8(req, IFLA_BRPORT_LEARNING, link->network->learning); | |
313 | if (r < 0) | |
314 | return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_LEARNING attribute: %m"); | |
315 | } | |
316 | ||
317 | if (link->network->bridge_proxy_arp >= 0) { | |
318 | r = sd_netlink_message_append_u8(req, IFLA_BRPORT_PROXYARP, link->network->bridge_proxy_arp); | |
319 | if (r < 0) | |
320 | return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_PROXYARP attribute: %m"); | |
321 | } | |
322 | ||
323 | if (link->network->bridge_proxy_arp_wifi >= 0) { | |
324 | r = sd_netlink_message_append_u8(req, IFLA_BRPORT_PROXYARP_WIFI, link->network->bridge_proxy_arp_wifi); | |
325 | if (r < 0) | |
326 | return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_PROXYARP_WIFI attribute: %m"); | |
327 | } | |
328 | ||
329 | if (link->network->cost != 0) { | |
330 | r = sd_netlink_message_append_u32(req, IFLA_BRPORT_COST, link->network->cost); | |
331 | if (r < 0) | |
332 | return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_COST attribute: %m"); | |
333 | } | |
334 | ||
335 | if (link->network->priority != LINK_BRIDGE_PORT_PRIORITY_INVALID) { | |
336 | r = sd_netlink_message_append_u16(req, IFLA_BRPORT_PRIORITY, link->network->priority); | |
337 | if (r < 0) | |
338 | return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_PRIORITY attribute: %m"); | |
339 | } | |
340 | ||
341 | if (link->network->multicast_router != _MULTICAST_ROUTER_INVALID) { | |
342 | r = sd_netlink_message_append_u8(req, IFLA_BRPORT_MULTICAST_ROUTER, link->network->multicast_router); | |
343 | if (r < 0) | |
344 | return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_MULTICAST_ROUTER attribute: %m"); | |
345 | } | |
346 | ||
347 | r = sd_netlink_message_close_container(req); | |
348 | if (r < 0) | |
349 | return log_link_debug_errno(link, r, "Could not close IFLA_PROTINFO container: %m"); | |
350 | break; | |
8252fb44 YW |
351 | case SET_LINK_BRIDGE_VLAN: |
352 | r = sd_rtnl_message_link_set_family(req, AF_BRIDGE); | |
353 | if (r < 0) | |
354 | return log_link_debug_errno(link, r, "Could not set message family: %m"); | |
355 | ||
356 | r = sd_netlink_message_open_container(req, IFLA_AF_SPEC); | |
357 | if (r < 0) | |
358 | return log_link_debug_errno(link, r, "Could not open IFLA_AF_SPEC container: %m"); | |
359 | ||
360 | if (!link->network->bridge) { | |
361 | /* master needs BRIDGE_FLAGS_SELF flag*/ | |
362 | r = sd_netlink_message_append_u16(req, IFLA_BRIDGE_FLAGS, BRIDGE_FLAGS_SELF); | |
363 | if (r < 0) | |
364 | return log_link_debug_errno(link, r, "Could not append IFLA_BRIDGE_FLAGS attribute: %m"); | |
365 | } | |
366 | ||
367 | r = bridge_vlan_append_info(link, req, link->network->pvid, link->network->br_vid_bitmap, link->network->br_untagged_bitmap); | |
368 | if (r < 0) | |
369 | return log_link_debug_errno(link, r, "Could not append VLANs: %m"); | |
370 | ||
371 | r = sd_netlink_message_close_container(req); | |
372 | if (r < 0) | |
373 | return log_link_debug_errno(link, r, "Could not close IFLA_AF_SPEC container: %m"); | |
374 | ||
375 | break; | |
7558f9e7 YW |
376 | case SET_LINK_CAN: |
377 | r = can_set_netlink_message(link, req); | |
378 | if (r < 0) | |
379 | return r; | |
380 | break; | |
93fabc10 YW |
381 | case SET_LINK_FLAGS: { |
382 | unsigned ifi_change = 0, ifi_flags = 0; | |
383 | ||
384 | if (link->network->arp >= 0) { | |
385 | ifi_change |= IFF_NOARP; | |
386 | SET_FLAG(ifi_flags, IFF_NOARP, link->network->arp == 0); | |
387 | } | |
388 | ||
389 | if (link->network->multicast >= 0) { | |
390 | ifi_change |= IFF_MULTICAST; | |
391 | SET_FLAG(ifi_flags, IFF_MULTICAST, link->network->multicast); | |
392 | } | |
393 | ||
394 | if (link->network->allmulticast >= 0) { | |
395 | ifi_change |= IFF_ALLMULTI; | |
396 | SET_FLAG(ifi_flags, IFF_ALLMULTI, link->network->allmulticast); | |
397 | } | |
398 | ||
399 | if (link->network->promiscuous >= 0) { | |
400 | ifi_change |= IFF_PROMISC; | |
401 | SET_FLAG(ifi_flags, IFF_PROMISC, link->network->promiscuous); | |
402 | } | |
403 | ||
404 | r = sd_rtnl_message_link_set_flags(req, ifi_flags, ifi_change); | |
405 | if (r < 0) | |
406 | return log_link_debug_errno(link, r, "Could not set link flags: %m"); | |
407 | ||
408 | break; | |
409 | } | |
cc4c8fb1 YW |
410 | case SET_LINK_GROUP: |
411 | r = sd_netlink_message_append_u32(req, IFLA_GROUP, link->network->group); | |
412 | if (r < 0) | |
413 | return log_link_debug_errno(link, r, "Could not append IFLA_GROUP attribute: %m"); | |
414 | break; | |
a8e5e27c YW |
415 | case SET_LINK_MAC: |
416 | r = sd_netlink_message_append_ether_addr(req, IFLA_ADDRESS, link->network->mac); | |
417 | if (r < 0) | |
418 | return log_link_debug_errno(link, r, "Could not append IFLA_ADDRESS attribute: %m"); | |
419 | break; | |
d24bf1b5 YW |
420 | case SET_LINK_MASTER: |
421 | r = sd_netlink_message_append_u32(req, IFLA_MASTER, PTR_TO_UINT32(userdata)); | |
422 | if (r < 0) | |
423 | return log_link_debug_errno(link, r, "Could not append IFLA_MASTER attribute: %m"); | |
424 | break; | |
0fa8ee6c YW |
425 | case SET_LINK_MTU: |
426 | r = sd_netlink_message_append_u32(req, IFLA_MTU, PTR_TO_UINT32(userdata)); | |
427 | if (r < 0) | |
428 | return log_link_debug_errno(link, r, "Could not append IFLA_MTU attribute: %m"); | |
429 | break; | |
430 | default: | |
431 | assert_not_reached("Invalid set link operation"); | |
432 | } | |
433 | ||
434 | r = netlink_call_async(link->manager->rtnl, NULL, req, callback, | |
435 | link_netlink_destroy_callback, link); | |
436 | if (r < 0) | |
437 | return log_link_debug_errno(link, r, "Could not send RTM_SETLINK message: %m"); | |
438 | ||
439 | link_ref(link); | |
440 | return 0; | |
441 | } | |
442 | ||
d24bf1b5 YW |
443 | static bool netdev_is_ready(NetDev *netdev) { |
444 | assert(netdev); | |
445 | ||
446 | if (netdev->state != NETDEV_STATE_READY) | |
447 | return false; | |
448 | if (netdev->ifindex == 0) | |
449 | return false; | |
450 | ||
451 | return true; | |
452 | } | |
453 | ||
0fa8ee6c | 454 | static bool link_is_ready_to_call_set_link(Request *req) { |
d24bf1b5 | 455 | SetLinkOperation op; |
0fa8ee6c | 456 | Link *link; |
d24bf1b5 | 457 | int r; |
0fa8ee6c YW |
458 | |
459 | assert(req); | |
460 | ||
461 | link = req->link; | |
d24bf1b5 | 462 | op = req->set_link_operation; |
0fa8ee6c YW |
463 | |
464 | if (!IN_SET(link->state, LINK_STATE_INITIALIZED, LINK_STATE_CONFIGURING, LINK_STATE_CONFIGURED)) | |
465 | return false; | |
466 | ||
d24bf1b5 | 467 | switch (op) { |
440d40dc YW |
468 | case SET_LINK_BOND: |
469 | case SET_LINK_BRIDGE: | |
470 | case SET_LINK_BRIDGE_VLAN: | |
471 | if (!link->master_set) | |
472 | return false; | |
473 | break; | |
7558f9e7 | 474 | case SET_LINK_CAN: |
baa95d22 YW |
475 | /* Do not check link->set_flgas_messages here, as it is ok even if link->flags |
476 | * is outdated, and checking the counter causes a deadlock. */ | |
7558f9e7 YW |
477 | if (FLAGS_SET(link->flags, IFF_UP)) { |
478 | /* The CAN interface must be down to configure bitrate, etc... */ | |
479 | r = link_down(link); | |
480 | if (r < 0) { | |
481 | link_enter_failed(link); | |
482 | return false; | |
483 | } | |
484 | } | |
485 | break; | |
d24bf1b5 YW |
486 | case SET_LINK_MASTER: { |
487 | uint32_t m = 0; | |
488 | ||
489 | assert(link->network); | |
490 | ||
491 | if (link->network->batadv) { | |
492 | if (!netdev_is_ready(link->network->batadv)) | |
493 | return false; | |
494 | m = link->network->batadv->ifindex; | |
495 | } else if (link->network->bond) { | |
496 | if (!netdev_is_ready(link->network->bond)) | |
497 | return false; | |
498 | m = link->network->bond->ifindex; | |
499 | ||
baa95d22 YW |
500 | /* Do not check link->set_flgas_messages here, as it is ok even if link->flags |
501 | * is outdated, and checking the counter causes a deadlock. */ | |
d24bf1b5 YW |
502 | if (FLAGS_SET(link->flags, IFF_UP)) { |
503 | /* link must be down when joining to bond master. */ | |
112a0972 | 504 | r = link_down(link); |
d24bf1b5 YW |
505 | if (r < 0) { |
506 | link_enter_failed(link); | |
507 | return false; | |
508 | } | |
509 | } | |
510 | } else if (link->network->bridge) { | |
511 | if (!netdev_is_ready(link->network->bridge)) | |
512 | return false; | |
513 | m = link->network->bridge->ifindex; | |
514 | } else if (link->network->vrf) { | |
515 | if (!netdev_is_ready(link->network->vrf)) | |
516 | return false; | |
517 | m = link->network->vrf->ifindex; | |
518 | } | |
519 | ||
520 | req->userdata = UINT32_TO_PTR(m); | |
521 | break; | |
522 | } | |
523 | default: | |
524 | break; | |
525 | } | |
526 | ||
0fa8ee6c YW |
527 | return true; |
528 | } | |
529 | ||
530 | int request_process_set_link(Request *req) { | |
531 | int r; | |
532 | ||
533 | assert(req); | |
534 | assert(req->link); | |
535 | assert(req->type == REQUEST_TYPE_SET_LINK); | |
536 | assert(req->set_link_operation >= 0 && req->set_link_operation < _SET_LINK_OPERATION_MAX); | |
537 | assert(req->netlink_handler); | |
538 | ||
539 | if (!link_is_ready_to_call_set_link(req)) | |
540 | return 0; | |
541 | ||
542 | r = link_configure(req->link, req->set_link_operation, req->userdata, req->netlink_handler); | |
543 | if (r < 0) | |
544 | return log_link_error_errno(req->link, r, "Failed to set %s: %m", | |
545 | set_link_operation_to_string(req->set_link_operation)); | |
546 | ||
baa95d22 YW |
547 | if (req->set_link_operation == SET_LINK_FLAGS) |
548 | req->link->set_flags_messages++; | |
549 | ||
0fa8ee6c YW |
550 | return 1; |
551 | } | |
552 | ||
553 | static int link_request_set_link( | |
554 | Link *link, | |
555 | SetLinkOperation op, | |
556 | link_netlink_message_handler_t netlink_handler, | |
557 | Request **ret) { | |
558 | ||
559 | Request *req; | |
560 | int r; | |
561 | ||
562 | assert(link); | |
563 | assert(op >= 0 && op < _SET_LINK_OPERATION_MAX); | |
564 | assert(netlink_handler); | |
565 | ||
566 | r = link_queue_request(link, REQUEST_TYPE_SET_LINK, INT_TO_PTR(op), false, | |
567 | &link->set_link_messages, netlink_handler, &req); | |
568 | if (r < 0) | |
569 | return log_link_error_errno(link, r, "Failed to request to set %s: %m", | |
570 | set_link_operation_to_string(op)); | |
571 | ||
572 | log_link_debug(link, "Requested to set %s", set_link_operation_to_string(op)); | |
573 | ||
574 | if (ret) | |
575 | *ret = req; | |
576 | return 0; | |
577 | } | |
578 | ||
8e00e24c YW |
579 | int link_request_to_set_addrgen_mode(Link *link) { |
580 | Request *req; | |
581 | uint8_t mode; | |
582 | int r; | |
583 | ||
584 | assert(link); | |
585 | assert(link->network); | |
586 | ||
587 | if (!socket_ipv6_is_supported()) | |
588 | return 0; | |
589 | ||
590 | if (!link_ipv6ll_enabled(link)) | |
591 | mode = IN6_ADDR_GEN_MODE_NONE; | |
592 | else if (link->network->ipv6ll_address_gen_mode >= 0) | |
593 | mode = link->network->ipv6ll_address_gen_mode; | |
9e1432d5 YW |
594 | else if (in6_addr_is_set(&link->network->ipv6ll_stable_secret)) |
595 | mode = IN6_ADDR_GEN_MODE_STABLE_PRIVACY; | |
596 | else | |
597 | mode = IN6_ADDR_GEN_MODE_EUI64; | |
8e00e24c YW |
598 | |
599 | r = link_request_set_link(link, SET_LINK_ADDRESS_GENERATION_MODE, link_set_addrgen_mode_handler, &req); | |
600 | if (r < 0) | |
601 | return r; | |
602 | ||
603 | req->userdata = UINT8_TO_PTR(mode); | |
604 | return 0; | |
605 | } | |
606 | ||
5062b859 YW |
607 | int link_request_to_set_bond(Link *link) { |
608 | assert(link); | |
609 | assert(link->network); | |
610 | ||
611 | if (!link->network->bond) | |
612 | return 0; | |
613 | ||
614 | return link_request_set_link(link, SET_LINK_BOND, link_set_bond_handler, NULL); | |
615 | } | |
616 | ||
7d5b232f YW |
617 | int link_request_to_set_bridge(Link *link) { |
618 | assert(link); | |
619 | assert(link->network); | |
620 | ||
621 | if (!link->network->bridge) | |
622 | return 0; | |
623 | ||
624 | return link_request_set_link(link, SET_LINK_BRIDGE, link_set_bridge_handler, NULL); | |
625 | } | |
626 | ||
8252fb44 YW |
627 | int link_request_to_set_bridge_vlan(Link *link) { |
628 | assert(link); | |
629 | assert(link->network); | |
630 | ||
631 | if (!link->network->use_br_vlan) | |
632 | return 0; | |
633 | ||
634 | if (!link->network->bridge && !streq_ptr(link->kind, "bridge")) | |
635 | return 0; | |
636 | ||
637 | return link_request_set_link(link, SET_LINK_BRIDGE_VLAN, link_set_bridge_vlan_handler, NULL); | |
638 | } | |
639 | ||
7558f9e7 YW |
640 | int link_request_to_set_can(Link *link) { |
641 | assert(link); | |
642 | assert(link->network); | |
643 | ||
644 | if (link->iftype != ARPHRD_CAN) | |
645 | return 0; | |
646 | ||
647 | if (!streq_ptr(link->kind, "can")) | |
648 | return 0; | |
649 | ||
650 | return link_request_set_link(link, SET_LINK_CAN, link_set_can_handler, NULL); | |
651 | } | |
652 | ||
93fabc10 YW |
653 | int link_request_to_set_flags(Link *link) { |
654 | assert(link); | |
655 | assert(link->network); | |
656 | ||
657 | if (link->network->arp < 0 && | |
658 | link->network->multicast < 0 && | |
659 | link->network->allmulticast < 0 && | |
660 | link->network->promiscuous < 0) | |
661 | return 0; | |
662 | ||
663 | return link_request_set_link(link, SET_LINK_FLAGS, link_set_flags_handler, NULL); | |
664 | } | |
665 | ||
cc4c8fb1 YW |
666 | int link_request_to_set_group(Link *link) { |
667 | assert(link); | |
668 | assert(link->network); | |
669 | ||
670 | if (!link->network->group_set) | |
671 | return 0; | |
672 | ||
673 | return link_request_set_link(link, SET_LINK_GROUP, link_set_group_handler, NULL); | |
674 | } | |
675 | ||
a8e5e27c YW |
676 | int link_request_to_set_mac(Link *link) { |
677 | assert(link); | |
678 | assert(link->network); | |
679 | ||
680 | if (!link->network->mac) | |
681 | return 0; | |
682 | ||
5388e103 YW |
683 | if (link->hw_addr.length != sizeof(struct ether_addr)) { |
684 | /* Note that for now we only support changing hardware addresses on Ethernet. */ | |
685 | log_link_debug(link, "Size of the hardware address (%zu) does not match the size of MAC address (%zu), ignoring.", | |
686 | link->hw_addr.length, sizeof(struct ether_addr)); | |
687 | return 0; | |
688 | } | |
689 | ||
690 | if (ether_addr_equal(&link->hw_addr.ether, link->network->mac)) | |
691 | return 0; | |
692 | ||
a8e5e27c YW |
693 | return link_request_set_link(link, SET_LINK_MAC, link_set_mac_handler, NULL); |
694 | } | |
695 | ||
d24bf1b5 YW |
696 | int link_request_to_set_master(Link *link) { |
697 | assert(link); | |
698 | ||
440d40dc YW |
699 | link->master_set = false; |
700 | ||
d24bf1b5 YW |
701 | return link_request_set_link(link, SET_LINK_MASTER, link_set_master_handler, NULL); |
702 | } | |
703 | ||
0fa8ee6c | 704 | int link_request_to_set_mtu(Link *link, uint32_t mtu) { |
59ca71a9 | 705 | Request *req; |
717ba5fc YW |
706 | const char *origin; |
707 | uint32_t min_mtu; | |
0fa8ee6c YW |
708 | int r; |
709 | ||
710 | assert(link); | |
717ba5fc YW |
711 | assert(link->network); |
712 | ||
713 | min_mtu = link->min_mtu; | |
714 | origin = "the minimum MTU of the interface"; | |
715 | if (link_ipv6_enabled(link)) { | |
716 | /* IPv6 protocol requires a minimum MTU of IPV6_MTU_MIN(1280) bytes on the interface. Bump up | |
717 | * MTU bytes to IPV6_MTU_MIN. */ | |
718 | if (min_mtu < IPV6_MIN_MTU) { | |
719 | min_mtu = IPV6_MIN_MTU; | |
720 | origin = "the minimum IPv6 MTU"; | |
721 | } | |
722 | if (min_mtu < link->network->ipv6_mtu) { | |
723 | min_mtu = link->network->ipv6_mtu; | |
724 | origin = "the requested IPv6 MTU in IPv6MTUBytes="; | |
725 | } | |
726 | } | |
727 | ||
728 | if (mtu < min_mtu) { | |
729 | log_link_warning(link, "Bumping the requested MTU %"PRIu32" to %s (%"PRIu32")", | |
730 | mtu, origin, min_mtu); | |
731 | mtu = min_mtu; | |
732 | } | |
0fa8ee6c | 733 | |
717ba5fc YW |
734 | if (mtu > link->max_mtu) { |
735 | log_link_warning(link, "Reducing the requested MTU %"PRIu32" to the interface's maximum MTU %"PRIu32".", | |
736 | mtu, link->max_mtu); | |
737 | mtu = link->max_mtu; | |
0fa8ee6c YW |
738 | } |
739 | ||
740 | if (link->mtu == mtu) | |
741 | return 0; | |
742 | ||
743 | r = link_request_set_link(link, SET_LINK_MTU, link_set_mtu_handler, &req); | |
744 | if (r < 0) | |
745 | return r; | |
746 | ||
747 | req->userdata = UINT32_TO_PTR(mtu); | |
748 | return 0; | |
749 | } | |
750 | ||
751 | static bool link_reduces_vlan_mtu(Link *link) { | |
752 | /* See netif_reduces_vlan_mtu() in kernel. */ | |
753 | return streq_ptr(link->kind, "macsec"); | |
754 | } | |
755 | ||
756 | static uint32_t link_get_requested_mtu_by_stacked_netdevs(Link *link) { | |
757 | uint32_t mtu = 0; | |
758 | NetDev *dev; | |
759 | ||
760 | HASHMAP_FOREACH(dev, link->network->stacked_netdevs) | |
761 | if (dev->kind == NETDEV_KIND_VLAN && dev->mtu > 0) | |
762 | /* See vlan_dev_change_mtu() in kernel. */ | |
763 | mtu = MAX(mtu, link_reduces_vlan_mtu(link) ? dev->mtu + 4 : dev->mtu); | |
764 | ||
765 | else if (dev->kind == NETDEV_KIND_MACVLAN && dev->mtu > mtu) | |
766 | /* See macvlan_change_mtu() in kernel. */ | |
767 | mtu = dev->mtu; | |
768 | ||
769 | return mtu; | |
770 | } | |
771 | ||
772 | int link_configure_mtu(Link *link) { | |
773 | uint32_t mtu; | |
774 | ||
775 | assert(link); | |
776 | assert(link->network); | |
777 | ||
778 | if (link->network->mtu > 0) | |
779 | return link_request_to_set_mtu(link, link->network->mtu); | |
780 | ||
781 | mtu = link_get_requested_mtu_by_stacked_netdevs(link); | |
782 | if (link->mtu >= mtu) | |
783 | return 0; | |
784 | ||
785 | log_link_notice(link, "Bumping MTU bytes from %"PRIu32" to %"PRIu32" because of stacked device. " | |
786 | "If it is not desired, then please explicitly specify MTUBytes= setting.", | |
787 | link->mtu, mtu); | |
788 | ||
789 | return link_request_to_set_mtu(link, mtu); | |
790 | } | |
112a0972 YW |
791 | |
792 | static int link_up_or_down_handler_internal(sd_netlink *rtnl, sd_netlink_message *m, Link *link, bool up, bool check_ready) { | |
793 | int r; | |
794 | ||
795 | assert(m); | |
796 | assert(link); | |
797 | ||
798 | if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER)) | |
baa95d22 | 799 | goto on_error; |
112a0972 YW |
800 | |
801 | r = sd_netlink_message_get_errno(m); | |
802 | if (r < 0) | |
803 | log_link_message_warning_errno(link, m, r, up ? | |
804 | "Could not bring up interface, ignoring" : | |
805 | "Could not bring down interface, ignoring"); | |
806 | ||
baa95d22 YW |
807 | r = link_call_getlink(link, get_link_update_flag_handler); |
808 | if (r < 0) { | |
809 | link_enter_failed(link); | |
810 | goto on_error; | |
811 | } | |
812 | ||
112a0972 YW |
813 | if (check_ready) { |
814 | link->activated = true; | |
815 | link_check_ready(link); | |
816 | } | |
817 | ||
baa95d22 YW |
818 | return 1; |
819 | ||
820 | on_error: | |
821 | assert(link->set_flags_messages > 0); | |
822 | link->set_flags_messages--; | |
823 | ||
112a0972 YW |
824 | return 0; |
825 | } | |
826 | ||
827 | static int link_activate_up_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) { | |
828 | return link_up_or_down_handler_internal(rtnl, m, link, true, true); | |
829 | } | |
830 | ||
831 | static int link_activate_down_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) { | |
832 | return link_up_or_down_handler_internal(rtnl, m, link, false, true); | |
833 | } | |
834 | ||
835 | static int link_up_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) { | |
836 | return link_up_or_down_handler_internal(rtnl, m, link, true, false); | |
837 | } | |
838 | ||
839 | static int link_down_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) { | |
840 | return link_up_or_down_handler_internal(rtnl, m, link, false, false); | |
841 | } | |
842 | ||
68f52063 YW |
843 | static const char *up_or_down(bool up) { |
844 | return up ? "up" : "down"; | |
845 | } | |
846 | ||
112a0972 YW |
847 | static int link_up_or_down(Link *link, bool up, link_netlink_message_handler_t callback) { |
848 | _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL; | |
849 | int r; | |
850 | ||
851 | assert(link); | |
852 | assert(link->manager); | |
853 | assert(link->manager->rtnl); | |
854 | assert(callback); | |
855 | ||
68f52063 | 856 | log_link_debug(link, "Bringing link %s", up_or_down(up)); |
112a0972 YW |
857 | |
858 | r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_SETLINK, link->ifindex); | |
859 | if (r < 0) | |
860 | return log_link_debug_errno(link, r, "Could not allocate RTM_SETLINK message: %m"); | |
861 | ||
862 | r = sd_rtnl_message_link_set_flags(req, up ? IFF_UP : 0, IFF_UP); | |
863 | if (r < 0) | |
864 | return log_link_debug_errno(link, r, "Could not set link flags: %m"); | |
865 | ||
866 | r = netlink_call_async(link->manager->rtnl, NULL, req, callback, | |
867 | link_netlink_destroy_callback, link); | |
868 | if (r < 0) | |
869 | return log_link_debug_errno(link, r, "Could not send rtnetlink message: %m"); | |
870 | ||
871 | link_ref(link); | |
872 | ||
873 | return 0; | |
874 | } | |
875 | ||
112a0972 YW |
876 | int link_down(Link *link) { |
877 | return link_up_or_down(link, false, link_down_handler); | |
878 | } | |
879 | ||
880 | static bool link_is_ready_to_activate(Link *link) { | |
881 | assert(link); | |
882 | ||
883 | if (!IN_SET(link->state, LINK_STATE_INITIALIZED, LINK_STATE_CONFIGURING, LINK_STATE_CONFIGURED)) | |
884 | return false; | |
885 | ||
886 | if (link->set_link_messages > 0) | |
887 | return false; | |
888 | ||
889 | return true; | |
890 | } | |
891 | ||
892 | int request_process_activation(Request *req) { | |
893 | Link *link; | |
894 | bool up; | |
895 | int r; | |
896 | ||
897 | assert(req); | |
898 | assert(req->link); | |
899 | assert(req->type == REQUEST_TYPE_ACTIVATE_LINK); | |
900 | assert(req->netlink_handler); | |
901 | ||
902 | link = req->link; | |
903 | up = PTR_TO_INT(req->userdata); | |
904 | ||
905 | if (!link_is_ready_to_activate(link)) | |
906 | return 0; | |
907 | ||
908 | r = link_up_or_down(link, up, req->netlink_handler); | |
909 | if (r < 0) | |
68f52063 | 910 | return log_link_error_errno(link, r, "Failed to bring %s: %m", up_or_down(up)); |
112a0972 YW |
911 | |
912 | return 1; | |
913 | } | |
914 | ||
915 | int link_request_to_activate(Link *link) { | |
916 | Request *req; | |
917 | bool up; | |
918 | int r; | |
919 | ||
920 | assert(link); | |
921 | assert(link->network); | |
922 | ||
923 | switch (link->network->activation_policy) { | |
924 | case ACTIVATION_POLICY_BOUND: | |
112a0972 YW |
925 | r = link_handle_bound_to_list(link); |
926 | if (r < 0) | |
927 | return r; | |
928 | _fallthrough_; | |
929 | case ACTIVATION_POLICY_MANUAL: | |
930 | link->activated = true; | |
931 | link_check_ready(link); | |
932 | return 0; | |
933 | case ACTIVATION_POLICY_UP: | |
934 | case ACTIVATION_POLICY_ALWAYS_UP: | |
935 | up = true; | |
936 | break; | |
937 | case ACTIVATION_POLICY_DOWN: | |
938 | case ACTIVATION_POLICY_ALWAYS_DOWN: | |
939 | up = false; | |
940 | break; | |
941 | default: | |
942 | assert_not_reached("invalid activation policy"); | |
943 | } | |
944 | ||
945 | link->activated = false; | |
946 | ||
baa95d22 | 947 | r = link_queue_request(link, REQUEST_TYPE_ACTIVATE_LINK, NULL, false, &link->set_flags_messages, |
112a0972 YW |
948 | up ? link_activate_up_handler : link_activate_down_handler, &req); |
949 | if (r < 0) | |
950 | return log_link_error_errno(link, r, "Failed to request to activate link: %m"); | |
951 | ||
952 | req->userdata = INT_TO_PTR(up); | |
953 | ||
954 | log_link_debug(link, "Requested to activate link"); | |
955 | return 0; | |
956 | } | |
68f52063 YW |
957 | |
958 | static bool link_is_ready_to_bring_up_or_down(Link *link) { | |
959 | assert(link); | |
960 | ||
961 | if (link->state == LINK_STATE_UNMANAGED) | |
962 | return true; | |
963 | ||
964 | if (!IN_SET(link->state, LINK_STATE_CONFIGURING, LINK_STATE_CONFIGURED)) | |
965 | return false; | |
966 | ||
967 | if (link->set_link_messages > 0) | |
968 | return false; | |
969 | ||
970 | if (!link->activated) | |
971 | return false; | |
972 | ||
973 | return true; | |
974 | } | |
975 | ||
976 | int request_process_link_up_or_down(Request *req) { | |
977 | Link *link; | |
978 | bool up; | |
979 | int r; | |
980 | ||
981 | assert(req); | |
982 | assert(req->link); | |
983 | assert(req->type == REQUEST_TYPE_UP_DOWN); | |
984 | ||
985 | link = req->link; | |
986 | up = PTR_TO_INT(req->userdata); | |
987 | ||
988 | if (!link_is_ready_to_bring_up_or_down(link)) | |
989 | return 0; | |
990 | ||
991 | r = link_up_or_down(link, up, req->netlink_handler); | |
992 | if (r < 0) | |
993 | return log_link_error_errno(link, r, "Failed to bring %s: %m", up_or_down(up)); | |
994 | ||
995 | return 1; | |
996 | } | |
997 | ||
998 | int link_request_to_bring_up_or_down(Link *link, bool up) { | |
999 | Request *req; | |
1000 | int r; | |
1001 | ||
1002 | assert(link); | |
1003 | ||
baa95d22 | 1004 | r = link_queue_request(link, REQUEST_TYPE_UP_DOWN, NULL, false, &link->set_flags_messages, |
68f52063 YW |
1005 | up ? link_up_handler : link_down_handler, &req); |
1006 | if (r < 0) | |
1007 | return log_link_error_errno(link, r, "Failed to request to bring %s link: %m", | |
1008 | up_or_down(up)); | |
1009 | ||
1010 | req->userdata = INT_TO_PTR(up); | |
1011 | ||
1012 | log_link_debug(link, "Requested to bring link %s", up_or_down(up)); | |
1013 | return 0; | |
1014 | } |