]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/network/networkd-setlink.c
Merge pull request #21664 from yuwata/network-tunnel-cleanups
[thirdparty/systemd.git] / src / network / networkd-setlink.c
CommitLineData
0fa8ee6c
YW
1/* SPDX-License-Identifier: LGPL-2.1-or-later */
2
93fabc10
YW
3#include <netinet/in.h>
4#include <linux/if.h>
7558f9e7 5#include <linux/if_arp.h>
ad851cae 6#include <linux/if_bridge.h>
93fabc10 7
0fa8ee6c 8#include "missing_network.h"
a8840714 9#include "netif-util.h"
0fa8ee6c 10#include "netlink-util.h"
3b6a3bde 11#include "networkd-address.h"
7558f9e7 12#include "networkd-can.h"
0fa8ee6c
YW
13#include "networkd-link.h"
14#include "networkd-manager.h"
15#include "networkd-queue.h"
9b682672 16#include "networkd-setlink.h"
0fa8ee6c
YW
17#include "string-table.h"
18
19static const char *const set_link_operation_table[_SET_LINK_OPERATION_MAX] = {
8e00e24c 20 [SET_LINK_ADDRESS_GENERATION_MODE] = "IPv6LL address generation mode",
5062b859 21 [SET_LINK_BOND] = "bond configurations",
7d5b232f 22 [SET_LINK_BRIDGE] = "bridge configurations",
8252fb44 23 [SET_LINK_BRIDGE_VLAN] = "bridge VLAN configurations",
7558f9e7 24 [SET_LINK_CAN] = "CAN interface configurations",
93fabc10 25 [SET_LINK_FLAGS] = "link flags",
cc4c8fb1 26 [SET_LINK_GROUP] = "interface group",
72e65e6f 27 [SET_LINK_IPOIB] = "IPoIB configurations",
a8e5e27c 28 [SET_LINK_MAC] = "MAC address",
d24bf1b5 29 [SET_LINK_MASTER] = "master interface",
0fa8ee6c
YW
30 [SET_LINK_MTU] = "MTU",
31};
32
33DEFINE_PRIVATE_STRING_TABLE_LOOKUP_TO_STRING(set_link_operation, SetLinkOperation);
34
1362bd6c
YW
35static int get_link_default_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
36 return link_getlink_handler_internal(rtnl, m, link, "Failed to sync link information");
37}
38
440d40dc
YW
39static int get_link_master_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
40 if (get_link_default_handler(rtnl, m, link) > 0)
41 link->master_set = true;
42 return 0;
43}
44
baa95d22
YW
45static int get_link_update_flag_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
46 assert(link);
47 assert(link->set_flags_messages > 0);
48
49 link->set_flags_messages--;
50
51 return get_link_default_handler(rtnl, m, link);
52}
53
1362bd6c
YW
54static int set_link_handler_internal(
55 sd_netlink *rtnl,
56 sd_netlink_message *m,
57 Link *link,
58 SetLinkOperation op,
59 bool ignore,
60 link_netlink_message_handler_t get_link_handler) {
61
0fa8ee6c
YW
62 int r;
63
64 assert(m);
65 assert(link);
66 assert(link->set_link_messages > 0);
67 assert(op >= 0 && op < _SET_LINK_OPERATION_MAX);
68
69 link->set_link_messages--;
70
71 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
baa95d22 72 goto on_error;
0fa8ee6c
YW
73
74 r = sd_netlink_message_get_errno(m);
75 if (r < 0) {
76 const char *error_msg;
77
78 error_msg = strjoina("Failed to set ", set_link_operation_to_string(op), ignore ? ", ignoring" : "");
79 log_link_message_warning_errno(link, m, r, error_msg);
80
81 if (!ignore)
82 link_enter_failed(link);
baa95d22 83 goto on_error;
0fa8ee6c
YW
84 }
85
86 log_link_debug(link, "%s set.", set_link_operation_to_string(op));
1362bd6c
YW
87
88 if (get_link_handler) {
89 r = link_call_getlink(link, get_link_handler);
90 if (r < 0) {
91 link_enter_failed(link);
baa95d22 92 goto on_error;
1362bd6c
YW
93 }
94 }
95
96 if (link->set_link_messages == 0)
97 link_check_ready(link);
98
0fa8ee6c 99 return 1;
baa95d22
YW
100
101on_error:
c347a982
YW
102 switch (op) {
103 case SET_LINK_FLAGS:
baa95d22
YW
104 assert(link->set_flags_messages > 0);
105 link->set_flags_messages--;
c347a982
YW
106 break;
107 case SET_LINK_MASTER:
108 link->master_set = true;
109 break;
110 default:
111 break;
baa95d22
YW
112 }
113
114 return 0;
0fa8ee6c
YW
115}
116
8e00e24c
YW
117static int link_set_addrgen_mode_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
118 int r;
119
17d808a8 120 r = set_link_handler_internal(rtnl, m, link, SET_LINK_ADDRESS_GENERATION_MODE, /* ignore = */ true, NULL);
8e00e24c
YW
121 if (r <= 0)
122 return r;
123
124 r = link_drop_ipv6ll_addresses(link);
125 if (r < 0) {
126 log_link_warning_errno(link, r, "Failed to drop IPv6LL addresses: %m");
127 link_enter_failed(link);
128 }
129
130 return 0;
131}
132
5062b859 133static int link_set_bond_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
17d808a8 134 return set_link_handler_internal(rtnl, m, link, SET_LINK_BOND, /* ignore = */ false, NULL);
5062b859
YW
135}
136
7d5b232f 137static int link_set_bridge_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
1171f3f0 138 return set_link_handler_internal(rtnl, m, link, SET_LINK_BRIDGE, /* ignore = */ true, NULL);
7d5b232f
YW
139}
140
8252fb44 141static int link_set_bridge_vlan_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
17d808a8 142 return set_link_handler_internal(rtnl, m, link, SET_LINK_BRIDGE_VLAN, /* ignore = */ false, NULL);
8252fb44
YW
143}
144
7558f9e7 145static int link_set_can_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
17d808a8 146 return set_link_handler_internal(rtnl, m, link, SET_LINK_CAN, /* ignore = */ false, NULL);
7558f9e7
YW
147}
148
93fabc10 149static int link_set_flags_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
17d808a8 150 return set_link_handler_internal(rtnl, m, link, SET_LINK_FLAGS, /* ignore = */ false, get_link_update_flag_handler);
93fabc10
YW
151}
152
cc4c8fb1 153static int link_set_group_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
17d808a8 154 return set_link_handler_internal(rtnl, m, link, SET_LINK_GROUP, /* ignore = */ false, NULL);
cc4c8fb1
YW
155}
156
72e65e6f
YW
157static int link_set_ipoib_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
158 return set_link_handler_internal(rtnl, m, link, SET_LINK_IPOIB, /* ignore = */ true, NULL);
159}
160
a8e5e27c 161static int link_set_mac_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
17d808a8 162 return set_link_handler_internal(rtnl, m, link, SET_LINK_MAC, /* ignore = */ true, get_link_default_handler);
a8e5e27c
YW
163}
164
d05c332c
YW
165static int link_set_mac_allow_retry_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
166 int r;
167
168 assert(m);
169 assert(link);
170 assert(link->set_link_messages > 0);
171
172 link->set_link_messages--;
173
174 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
175 return 0;
176
177 r = sd_netlink_message_get_errno(m);
178 if (r == -EBUSY) {
179 /* Most real network devices refuse to set its hardware address with -EBUSY when its
180 * operstate is not down. See, eth_prepare_mac_addr_change() in net/ethernet/eth.c
181 * of kernel. */
182
183 log_link_message_debug_errno(link, m, r, "Failed to set MAC address, retrying again: %m");
184
185 r = link_request_to_set_mac(link, /* allow_retry = */ false);
186 if (r < 0)
187 link_enter_failed(link);
188
189 return 0;
190 }
191
a8840714 192 /* set_link_mac_handler() also decrements set_link_messages, so increment the value once. */
d05c332c
YW
193 link->set_link_messages++;
194 return link_set_mac_handler(rtnl, m, link);
195}
196
d24bf1b5 197static int link_set_master_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
17d808a8 198 return set_link_handler_internal(rtnl, m, link, SET_LINK_MASTER, /* ignore = */ false, get_link_master_handler);
d24bf1b5
YW
199}
200
c347a982
YW
201static int link_unset_master_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
202 /* Some devices do not support setting master ifindex. Let's ignore error on unsetting master ifindex. */
203 return set_link_handler_internal(rtnl, m, link, SET_LINK_MASTER, /* ignore = */ true, get_link_master_handler);
204}
205
0fa8ee6c
YW
206static int link_set_mtu_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
207 int r;
208
17d808a8 209 r = set_link_handler_internal(rtnl, m, link, SET_LINK_MTU, /* ignore = */ true, get_link_default_handler);
0fa8ee6c
YW
210 if (r <= 0)
211 return r;
212
213 /* The kernel resets ipv6 mtu after changing device mtu;
214 * we must set this here, after we've set device mtu */
215 r = link_set_ipv6_mtu(link);
216 if (r < 0)
217 log_link_warning_errno(link, r, "Failed to set IPv6 MTU, ignoring: %m");
218
0fa8ee6c
YW
219 return 0;
220}
221
222static int link_configure(
223 Link *link,
224 SetLinkOperation op,
225 void *userdata,
226 link_netlink_message_handler_t callback) {
227
228 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
229 int r;
230
231 assert(link);
232 assert(link->manager);
233 assert(link->manager->rtnl);
234 assert(link->network);
235 assert(op >= 0 && op < _SET_LINK_OPERATION_MAX);
236 assert(callback);
237
238 log_link_debug(link, "Setting %s", set_link_operation_to_string(op));
239
1e8cce8f 240 if (op == SET_LINK_BOND) {
5062b859
YW
241 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_NEWLINK, link->master_ifindex);
242 if (r < 0)
243 return log_link_debug_errno(link, r, "Could not allocate RTM_NEWLINK message: %m");
72e65e6f 244 } else if (IN_SET(op, SET_LINK_CAN, SET_LINK_IPOIB)) {
1e8cce8f
YW
245 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_NEWLINK, link->ifindex);
246 if (r < 0)
247 return log_link_debug_errno(link, r, "Could not allocate RTM_NEWLINK message: %m");
5062b859
YW
248 } else {
249 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_SETLINK, link->ifindex);
250 if (r < 0)
251 return log_link_debug_errno(link, r, "Could not allocate RTM_SETLINK message: %m");
252 }
0fa8ee6c
YW
253
254 switch (op) {
8e00e24c
YW
255 case SET_LINK_ADDRESS_GENERATION_MODE:
256 r = sd_netlink_message_open_container(req, IFLA_AF_SPEC);
257 if (r < 0)
258 return log_link_debug_errno(link, r, "Could not open IFLA_AF_SPEC container: %m");
259
260 r = sd_netlink_message_open_container(req, AF_INET6);
261 if (r < 0)
262 return log_link_debug_errno(link, r, "Could not open AF_INET6 container: %m");
263
264 r = sd_netlink_message_append_u8(req, IFLA_INET6_ADDR_GEN_MODE, PTR_TO_UINT8(userdata));
265 if (r < 0)
266 return log_link_debug_errno(link, r, "Could not append IFLA_INET6_ADDR_GEN_MODE attribute: %m");
267
268 r = sd_netlink_message_close_container(req);
269 if (r < 0)
270 return log_link_debug_errno(link, r, "Could not close AF_INET6 container: %m");
271
272 r = sd_netlink_message_close_container(req);
273 if (r < 0)
274 return log_link_debug_errno(link, r, "Could not close IFLA_AF_SPEC container: %m");
275 break;
5062b859
YW
276 case SET_LINK_BOND:
277 r = sd_netlink_message_set_flags(req, NLM_F_REQUEST | NLM_F_ACK);
278 if (r < 0)
279 return log_link_debug_errno(link, r, "Could not set netlink message flags: %m");
280
281 r = sd_netlink_message_open_container(req, IFLA_LINKINFO);
282 if (r < 0)
283 return log_link_debug_errno(link, r, "Could not open IFLA_LINKINFO container: %m");
284
285 r = sd_netlink_message_open_container_union(req, IFLA_INFO_DATA, "bond");
286 if (r < 0)
287 return log_link_debug_errno(link, r, "Could not open IFLA_INFO_DATA container: %m");
288
289 if (link->network->active_slave) {
290 r = sd_netlink_message_append_u32(req, IFLA_BOND_ACTIVE_SLAVE, link->ifindex);
291 if (r < 0)
292 return log_link_debug_errno(link, r, "Could not append IFLA_BOND_ACTIVE_SLAVE attribute: %m");
293 }
294
295 if (link->network->primary_slave) {
296 r = sd_netlink_message_append_u32(req, IFLA_BOND_PRIMARY, link->ifindex);
297 if (r < 0)
298 return log_link_debug_errno(link, r, "Could not append IFLA_BOND_PRIMARY attribute: %m");
299 }
300
301 r = sd_netlink_message_close_container(req);
302 if (r < 0)
303 return log_link_debug_errno(link, r, "Could not close IFLA_INFO_DATA container: %m");
304
305 r = sd_netlink_message_close_container(req);
306 if (r < 0)
307 return log_link_debug_errno(link, r, "Could not close IFLA_LINKINFO container: %m");
308
309 break;
7d5b232f
YW
310 case SET_LINK_BRIDGE:
311 r = sd_rtnl_message_link_set_family(req, AF_BRIDGE);
312 if (r < 0)
313 return log_link_debug_errno(link, r, "Could not set message family: %m");
314
315 r = sd_netlink_message_open_container(req, IFLA_PROTINFO);
316 if (r < 0)
317 return log_link_debug_errno(link, r, "Could not open IFLA_PROTINFO container: %m");
318
319 if (link->network->use_bpdu >= 0) {
320 r = sd_netlink_message_append_u8(req, IFLA_BRPORT_GUARD, link->network->use_bpdu);
321 if (r < 0)
322 return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_GUARD attribute: %m");
323 }
324
325 if (link->network->hairpin >= 0) {
326 r = sd_netlink_message_append_u8(req, IFLA_BRPORT_MODE, link->network->hairpin);
327 if (r < 0)
328 return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_MODE attribute: %m");
329 }
330
331 if (link->network->fast_leave >= 0) {
332 r = sd_netlink_message_append_u8(req, IFLA_BRPORT_FAST_LEAVE, link->network->fast_leave);
333 if (r < 0)
334 return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_FAST_LEAVE attribute: %m");
335 }
336
337 if (link->network->allow_port_to_be_root >= 0) {
338 r = sd_netlink_message_append_u8(req, IFLA_BRPORT_PROTECT, link->network->allow_port_to_be_root);
339 if (r < 0)
340 return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_PROTECT attribute: %m");
341 }
342
343 if (link->network->unicast_flood >= 0) {
344 r = sd_netlink_message_append_u8(req, IFLA_BRPORT_UNICAST_FLOOD, link->network->unicast_flood);
345 if (r < 0)
346 return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_UNICAST_FLOOD attribute: %m");
347 }
348
349 if (link->network->multicast_flood >= 0) {
350 r = sd_netlink_message_append_u8(req, IFLA_BRPORT_MCAST_FLOOD, link->network->multicast_flood);
351 if (r < 0)
352 return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_MCAST_FLOOD attribute: %m");
353 }
354
355 if (link->network->multicast_to_unicast >= 0) {
356 r = sd_netlink_message_append_u8(req, IFLA_BRPORT_MCAST_TO_UCAST, link->network->multicast_to_unicast);
357 if (r < 0)
358 return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_MCAST_TO_UCAST attribute: %m");
359 }
360
361 if (link->network->neighbor_suppression >= 0) {
362 r = sd_netlink_message_append_u8(req, IFLA_BRPORT_NEIGH_SUPPRESS, link->network->neighbor_suppression);
363 if (r < 0)
364 return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_NEIGH_SUPPRESS attribute: %m");
365 }
366
367 if (link->network->learning >= 0) {
368 r = sd_netlink_message_append_u8(req, IFLA_BRPORT_LEARNING, link->network->learning);
369 if (r < 0)
370 return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_LEARNING attribute: %m");
371 }
372
373 if (link->network->bridge_proxy_arp >= 0) {
374 r = sd_netlink_message_append_u8(req, IFLA_BRPORT_PROXYARP, link->network->bridge_proxy_arp);
375 if (r < 0)
376 return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_PROXYARP attribute: %m");
377 }
378
379 if (link->network->bridge_proxy_arp_wifi >= 0) {
380 r = sd_netlink_message_append_u8(req, IFLA_BRPORT_PROXYARP_WIFI, link->network->bridge_proxy_arp_wifi);
381 if (r < 0)
382 return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_PROXYARP_WIFI attribute: %m");
383 }
384
385 if (link->network->cost != 0) {
386 r = sd_netlink_message_append_u32(req, IFLA_BRPORT_COST, link->network->cost);
387 if (r < 0)
388 return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_COST attribute: %m");
389 }
390
391 if (link->network->priority != LINK_BRIDGE_PORT_PRIORITY_INVALID) {
392 r = sd_netlink_message_append_u16(req, IFLA_BRPORT_PRIORITY, link->network->priority);
393 if (r < 0)
394 return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_PRIORITY attribute: %m");
395 }
396
397 if (link->network->multicast_router != _MULTICAST_ROUTER_INVALID) {
398 r = sd_netlink_message_append_u8(req, IFLA_BRPORT_MULTICAST_ROUTER, link->network->multicast_router);
399 if (r < 0)
400 return log_link_debug_errno(link, r, "Could not append IFLA_BRPORT_MULTICAST_ROUTER attribute: %m");
401 }
402
403 r = sd_netlink_message_close_container(req);
404 if (r < 0)
405 return log_link_debug_errno(link, r, "Could not close IFLA_PROTINFO container: %m");
406 break;
8252fb44
YW
407 case SET_LINK_BRIDGE_VLAN:
408 r = sd_rtnl_message_link_set_family(req, AF_BRIDGE);
409 if (r < 0)
410 return log_link_debug_errno(link, r, "Could not set message family: %m");
411
412 r = sd_netlink_message_open_container(req, IFLA_AF_SPEC);
413 if (r < 0)
414 return log_link_debug_errno(link, r, "Could not open IFLA_AF_SPEC container: %m");
415
571bf1aa 416 if (link->master_ifindex <= 0) {
7802194a 417 /* master needs BRIDGE_FLAGS_SELF flag */
8252fb44
YW
418 r = sd_netlink_message_append_u16(req, IFLA_BRIDGE_FLAGS, BRIDGE_FLAGS_SELF);
419 if (r < 0)
420 return log_link_debug_errno(link, r, "Could not append IFLA_BRIDGE_FLAGS attribute: %m");
421 }
422
423 r = bridge_vlan_append_info(link, req, link->network->pvid, link->network->br_vid_bitmap, link->network->br_untagged_bitmap);
424 if (r < 0)
425 return log_link_debug_errno(link, r, "Could not append VLANs: %m");
426
427 r = sd_netlink_message_close_container(req);
428 if (r < 0)
429 return log_link_debug_errno(link, r, "Could not close IFLA_AF_SPEC container: %m");
430
431 break;
7558f9e7
YW
432 case SET_LINK_CAN:
433 r = can_set_netlink_message(link, req);
434 if (r < 0)
435 return r;
436 break;
93fabc10
YW
437 case SET_LINK_FLAGS: {
438 unsigned ifi_change = 0, ifi_flags = 0;
439
440 if (link->network->arp >= 0) {
441 ifi_change |= IFF_NOARP;
442 SET_FLAG(ifi_flags, IFF_NOARP, link->network->arp == 0);
443 }
444
445 if (link->network->multicast >= 0) {
446 ifi_change |= IFF_MULTICAST;
447 SET_FLAG(ifi_flags, IFF_MULTICAST, link->network->multicast);
448 }
449
450 if (link->network->allmulticast >= 0) {
451 ifi_change |= IFF_ALLMULTI;
452 SET_FLAG(ifi_flags, IFF_ALLMULTI, link->network->allmulticast);
453 }
454
455 if (link->network->promiscuous >= 0) {
456 ifi_change |= IFF_PROMISC;
457 SET_FLAG(ifi_flags, IFF_PROMISC, link->network->promiscuous);
458 }
459
460 r = sd_rtnl_message_link_set_flags(req, ifi_flags, ifi_change);
461 if (r < 0)
462 return log_link_debug_errno(link, r, "Could not set link flags: %m");
463
464 break;
465 }
cc4c8fb1 466 case SET_LINK_GROUP:
10af8bb2 467 r = sd_netlink_message_append_u32(req, IFLA_GROUP, (uint32_t) link->network->group);
cc4c8fb1
YW
468 if (r < 0)
469 return log_link_debug_errno(link, r, "Could not append IFLA_GROUP attribute: %m");
470 break;
a8e5e27c 471 case SET_LINK_MAC:
a8840714 472 r = netlink_message_append_hw_addr(req, IFLA_ADDRESS, &link->requested_hw_addr);
a8e5e27c
YW
473 if (r < 0)
474 return log_link_debug_errno(link, r, "Could not append IFLA_ADDRESS attribute: %m");
475 break;
72e65e6f
YW
476 case SET_LINK_IPOIB:
477 r = ipoib_set_netlink_message(link, req);
478 if (r < 0)
479 return r;
480 break;
d24bf1b5
YW
481 case SET_LINK_MASTER:
482 r = sd_netlink_message_append_u32(req, IFLA_MASTER, PTR_TO_UINT32(userdata));
483 if (r < 0)
484 return log_link_debug_errno(link, r, "Could not append IFLA_MASTER attribute: %m");
485 break;
0fa8ee6c
YW
486 case SET_LINK_MTU:
487 r = sd_netlink_message_append_u32(req, IFLA_MTU, PTR_TO_UINT32(userdata));
488 if (r < 0)
489 return log_link_debug_errno(link, r, "Could not append IFLA_MTU attribute: %m");
490 break;
491 default:
04499a70 492 assert_not_reached();
0fa8ee6c
YW
493 }
494
495 r = netlink_call_async(link->manager->rtnl, NULL, req, callback,
496 link_netlink_destroy_callback, link);
497 if (r < 0)
498 return log_link_debug_errno(link, r, "Could not send RTM_SETLINK message: %m");
499
500 link_ref(link);
501 return 0;
502}
503
d24bf1b5
YW
504static bool netdev_is_ready(NetDev *netdev) {
505 assert(netdev);
506
507 if (netdev->state != NETDEV_STATE_READY)
508 return false;
509 if (netdev->ifindex == 0)
510 return false;
511
512 return true;
513}
514
0fa8ee6c 515static bool link_is_ready_to_call_set_link(Request *req) {
d24bf1b5 516 SetLinkOperation op;
0fa8ee6c 517 Link *link;
d24bf1b5 518 int r;
0fa8ee6c
YW
519
520 assert(req);
c3747f90
YW
521 assert(req->link);
522 assert(req->link->manager);
523 assert(req->link->network);
0fa8ee6c
YW
524
525 link = req->link;
9b682672 526 op = PTR_TO_INT(req->set_link_operation_ptr);
0fa8ee6c
YW
527
528 if (!IN_SET(link->state, LINK_STATE_INITIALIZED, LINK_STATE_CONFIGURING, LINK_STATE_CONFIGURED))
529 return false;
530
d24bf1b5 531 switch (op) {
440d40dc
YW
532 case SET_LINK_BOND:
533 case SET_LINK_BRIDGE:
57aef9d7
YW
534 if (!link->master_set)
535 return false;
536 if (link->network->keep_master && link->master_ifindex <= 0)
537 return false;
538 break;
440d40dc
YW
539 case SET_LINK_BRIDGE_VLAN:
540 if (!link->master_set)
541 return false;
57aef9d7
YW
542 if (link->network->keep_master && link->master_ifindex <= 0 && !streq_ptr(link->kind, "bridge"))
543 return false;
440d40dc 544 break;
7558f9e7 545 case SET_LINK_CAN:
baa95d22
YW
546 /* Do not check link->set_flgas_messages here, as it is ok even if link->flags
547 * is outdated, and checking the counter causes a deadlock. */
7558f9e7
YW
548 if (FLAGS_SET(link->flags, IFF_UP)) {
549 /* The CAN interface must be down to configure bitrate, etc... */
550 r = link_down(link);
551 if (r < 0) {
552 link_enter_failed(link);
553 return false;
554 }
555 }
556 break;
d05c332c
YW
557 case SET_LINK_MAC:
558 if (req->netlink_handler == link_set_mac_handler) {
36edc2c9 559 /* This is the second attempt to set hardware address. On the first attempt
d05c332c 560 * req->netlink_handler points to link_set_mac_allow_retry_handler().
36edc2c9 561 * The first attempt failed as the interface was up. */
d05c332c
YW
562 r = link_down(link);
563 if (r < 0) {
564 link_enter_failed(link);
565 return false;
566 }
567 }
568 break;
d24bf1b5
YW
569 case SET_LINK_MASTER: {
570 uint32_t m = 0;
5329a379
YW
571 Request req_mac = {
572 .link = link,
573 .type = REQUEST_TYPE_SET_LINK,
574 .set_link_operation_ptr = INT_TO_PTR(SET_LINK_MAC),
575 };
d24bf1b5 576
d24bf1b5
YW
577 if (link->network->batadv) {
578 if (!netdev_is_ready(link->network->batadv))
579 return false;
580 m = link->network->batadv->ifindex;
581 } else if (link->network->bond) {
5329a379
YW
582 if (ordered_set_contains(link->manager->request_queue, &req_mac))
583 return false;
d24bf1b5
YW
584 if (!netdev_is_ready(link->network->bond))
585 return false;
586 m = link->network->bond->ifindex;
587
baa95d22
YW
588 /* Do not check link->set_flgas_messages here, as it is ok even if link->flags
589 * is outdated, and checking the counter causes a deadlock. */
d24bf1b5
YW
590 if (FLAGS_SET(link->flags, IFF_UP)) {
591 /* link must be down when joining to bond master. */
112a0972 592 r = link_down(link);
d24bf1b5
YW
593 if (r < 0) {
594 link_enter_failed(link);
595 return false;
596 }
597 }
598 } else if (link->network->bridge) {
5329a379
YW
599 if (ordered_set_contains(link->manager->request_queue, &req_mac))
600 return false;
d24bf1b5
YW
601 if (!netdev_is_ready(link->network->bridge))
602 return false;
603 m = link->network->bridge->ifindex;
604 } else if (link->network->vrf) {
605 if (!netdev_is_ready(link->network->vrf))
606 return false;
607 m = link->network->vrf->ifindex;
608 }
609
610 req->userdata = UINT32_TO_PTR(m);
611 break;
612 }
c3747f90
YW
613 case SET_LINK_MTU: {
614 Request req_ipoib = {
615 .link = link,
616 .type = REQUEST_TYPE_SET_LINK,
617 .set_link_operation_ptr = INT_TO_PTR(SET_LINK_IPOIB),
618 };
619
620 return !ordered_set_contains(link->manager->request_queue, &req_ipoib);
621 }
d24bf1b5
YW
622 default:
623 break;
624 }
625
0fa8ee6c
YW
626 return true;
627}
628
629int request_process_set_link(Request *req) {
9b682672 630 SetLinkOperation op;
0fa8ee6c
YW
631 int r;
632
633 assert(req);
634 assert(req->link);
635 assert(req->type == REQUEST_TYPE_SET_LINK);
0fa8ee6c
YW
636 assert(req->netlink_handler);
637
9b682672
YW
638 op = PTR_TO_INT(req->set_link_operation_ptr);
639
640 assert(op >= 0 && op < _SET_LINK_OPERATION_MAX);
641
0fa8ee6c
YW
642 if (!link_is_ready_to_call_set_link(req))
643 return 0;
644
9b682672 645 r = link_configure(req->link, op, req->userdata, req->netlink_handler);
0fa8ee6c
YW
646 if (r < 0)
647 return log_link_error_errno(req->link, r, "Failed to set %s: %m",
9b682672 648 set_link_operation_to_string(op));
0fa8ee6c 649
9b682672 650 if (op == SET_LINK_FLAGS)
baa95d22
YW
651 req->link->set_flags_messages++;
652
0fa8ee6c
YW
653 return 1;
654}
655
656static int link_request_set_link(
657 Link *link,
658 SetLinkOperation op,
659 link_netlink_message_handler_t netlink_handler,
660 Request **ret) {
661
662 Request *req;
663 int r;
664
665 assert(link);
666 assert(op >= 0 && op < _SET_LINK_OPERATION_MAX);
667 assert(netlink_handler);
668
669 r = link_queue_request(link, REQUEST_TYPE_SET_LINK, INT_TO_PTR(op), false,
670 &link->set_link_messages, netlink_handler, &req);
671 if (r < 0)
672 return log_link_error_errno(link, r, "Failed to request to set %s: %m",
673 set_link_operation_to_string(op));
674
675 log_link_debug(link, "Requested to set %s", set_link_operation_to_string(op));
676
677 if (ret)
678 *ret = req;
679 return 0;
680}
681
8e00e24c
YW
682int link_request_to_set_addrgen_mode(Link *link) {
683 Request *req;
684 uint8_t mode;
685 int r;
686
687 assert(link);
688 assert(link->network);
689
690 if (!socket_ipv6_is_supported())
691 return 0;
692
693 if (!link_ipv6ll_enabled(link))
694 mode = IN6_ADDR_GEN_MODE_NONE;
695 else if (link->network->ipv6ll_address_gen_mode >= 0)
696 mode = link->network->ipv6ll_address_gen_mode;
9e1432d5
YW
697 else if (in6_addr_is_set(&link->network->ipv6ll_stable_secret))
698 mode = IN6_ADDR_GEN_MODE_STABLE_PRIVACY;
699 else
700 mode = IN6_ADDR_GEN_MODE_EUI64;
8e00e24c
YW
701
702 r = link_request_set_link(link, SET_LINK_ADDRESS_GENERATION_MODE, link_set_addrgen_mode_handler, &req);
703 if (r < 0)
704 return r;
705
706 req->userdata = UINT8_TO_PTR(mode);
707 return 0;
708}
709
5062b859
YW
710int link_request_to_set_bond(Link *link) {
711 assert(link);
712 assert(link->network);
713
57aef9d7
YW
714 if (!link->network->bond) {
715 Link *master;
716
717 if (!link->network->keep_master)
718 return 0;
719
720 if (link_get_master(link, &master) < 0)
721 return 0;
722
723 if (!streq_ptr(master->kind, "bond"))
724 return 0;
725 }
5062b859
YW
726
727 return link_request_set_link(link, SET_LINK_BOND, link_set_bond_handler, NULL);
728}
729
7d5b232f
YW
730int link_request_to_set_bridge(Link *link) {
731 assert(link);
732 assert(link->network);
733
57aef9d7
YW
734 if (!link->network->bridge) {
735 Link *master;
736
737 if (!link->network->keep_master)
738 return 0;
739
740 if (link_get_master(link, &master) < 0)
741 return 0;
742
743 if (!streq_ptr(master->kind, "bridge"))
744 return 0;
745 }
7d5b232f
YW
746
747 return link_request_set_link(link, SET_LINK_BRIDGE, link_set_bridge_handler, NULL);
748}
749
8252fb44
YW
750int link_request_to_set_bridge_vlan(Link *link) {
751 assert(link);
752 assert(link->network);
753
754 if (!link->network->use_br_vlan)
755 return 0;
756
57aef9d7
YW
757 if (!link->network->bridge && !streq_ptr(link->kind, "bridge")) {
758 Link *master;
759
760 if (!link->network->keep_master)
761 return 0;
762
763 if (link_get_master(link, &master) < 0)
764 return 0;
765
766 if (!streq_ptr(master->kind, "bridge"))
767 return 0;
768 }
8252fb44
YW
769
770 return link_request_set_link(link, SET_LINK_BRIDGE_VLAN, link_set_bridge_vlan_handler, NULL);
771}
772
7558f9e7
YW
773int link_request_to_set_can(Link *link) {
774 assert(link);
775 assert(link->network);
776
777 if (link->iftype != ARPHRD_CAN)
778 return 0;
779
780 if (!streq_ptr(link->kind, "can"))
781 return 0;
782
783 return link_request_set_link(link, SET_LINK_CAN, link_set_can_handler, NULL);
784}
785
93fabc10
YW
786int link_request_to_set_flags(Link *link) {
787 assert(link);
788 assert(link->network);
789
790 if (link->network->arp < 0 &&
791 link->network->multicast < 0 &&
792 link->network->allmulticast < 0 &&
793 link->network->promiscuous < 0)
794 return 0;
795
796 return link_request_set_link(link, SET_LINK_FLAGS, link_set_flags_handler, NULL);
797}
798
cc4c8fb1
YW
799int link_request_to_set_group(Link *link) {
800 assert(link);
801 assert(link->network);
802
10af8bb2 803 if (link->network->group < 0)
cc4c8fb1
YW
804 return 0;
805
806 return link_request_set_link(link, SET_LINK_GROUP, link_set_group_handler, NULL);
807}
808
d05c332c 809int link_request_to_set_mac(Link *link, bool allow_retry) {
a8840714
YW
810 int r;
811
a8e5e27c
YW
812 assert(link);
813 assert(link->network);
814
a8840714 815 if (link->network->hw_addr.length == 0)
a8e5e27c
YW
816 return 0;
817
a8840714 818 link->requested_hw_addr = link->network->hw_addr;
45aa0e84 819 r = net_verify_hardware_address(link->ifname, /* is_static = */ true,
a8840714
YW
820 link->iftype, &link->hw_addr, &link->requested_hw_addr);
821 if (r < 0)
822 return r;
5388e103 823
a8840714 824 if (hw_addr_equal(&link->hw_addr, &link->requested_hw_addr))
5388e103
YW
825 return 0;
826
d05c332c
YW
827 return link_request_set_link(link, SET_LINK_MAC,
828 allow_retry ? link_set_mac_allow_retry_handler : link_set_mac_handler,
829 NULL);
a8e5e27c
YW
830}
831
72e65e6f
YW
832int link_request_to_set_ipoib(Link *link) {
833 assert(link);
834 assert(link->network);
835
836 if (link->iftype != ARPHRD_INFINIBAND)
837 return 0;
838
839 if (link->network->ipoib_mode < 0 &&
840 link->network->ipoib_umcast < 0)
841 return 0;
842
843 return link_request_set_link(link, SET_LINK_IPOIB, link_set_ipoib_handler, NULL);
844}
845
d24bf1b5
YW
846int link_request_to_set_master(Link *link) {
847 assert(link);
c347a982 848 assert(link->network);
d24bf1b5 849
57aef9d7
YW
850 if (link->network->keep_master) {
851 link->master_set = true;
852 return 0;
853 }
854
440d40dc
YW
855 link->master_set = false;
856
c347a982
YW
857 if (link->network->batadv || link->network->bond || link->network->bridge || link->network->vrf)
858 return link_request_set_link(link, SET_LINK_MASTER, link_set_master_handler, NULL);
859 else
860 return link_request_set_link(link, SET_LINK_MASTER, link_unset_master_handler, NULL);
d24bf1b5
YW
861}
862
0fa8ee6c 863int link_request_to_set_mtu(Link *link, uint32_t mtu) {
59ca71a9 864 Request *req;
717ba5fc
YW
865 const char *origin;
866 uint32_t min_mtu;
0fa8ee6c
YW
867 int r;
868
869 assert(link);
717ba5fc
YW
870 assert(link->network);
871
872 min_mtu = link->min_mtu;
873 origin = "the minimum MTU of the interface";
874 if (link_ipv6_enabled(link)) {
875 /* IPv6 protocol requires a minimum MTU of IPV6_MTU_MIN(1280) bytes on the interface. Bump up
876 * MTU bytes to IPV6_MTU_MIN. */
877 if (min_mtu < IPV6_MIN_MTU) {
878 min_mtu = IPV6_MIN_MTU;
879 origin = "the minimum IPv6 MTU";
880 }
881 if (min_mtu < link->network->ipv6_mtu) {
882 min_mtu = link->network->ipv6_mtu;
883 origin = "the requested IPv6 MTU in IPv6MTUBytes=";
884 }
885 }
886
887 if (mtu < min_mtu) {
888 log_link_warning(link, "Bumping the requested MTU %"PRIu32" to %s (%"PRIu32")",
889 mtu, origin, min_mtu);
890 mtu = min_mtu;
891 }
0fa8ee6c 892
717ba5fc
YW
893 if (mtu > link->max_mtu) {
894 log_link_warning(link, "Reducing the requested MTU %"PRIu32" to the interface's maximum MTU %"PRIu32".",
895 mtu, link->max_mtu);
896 mtu = link->max_mtu;
0fa8ee6c
YW
897 }
898
899 if (link->mtu == mtu)
900 return 0;
901
902 r = link_request_set_link(link, SET_LINK_MTU, link_set_mtu_handler, &req);
903 if (r < 0)
904 return r;
905
906 req->userdata = UINT32_TO_PTR(mtu);
907 return 0;
908}
909
910static bool link_reduces_vlan_mtu(Link *link) {
911 /* See netif_reduces_vlan_mtu() in kernel. */
912 return streq_ptr(link->kind, "macsec");
913}
914
915static uint32_t link_get_requested_mtu_by_stacked_netdevs(Link *link) {
916 uint32_t mtu = 0;
917 NetDev *dev;
918
919 HASHMAP_FOREACH(dev, link->network->stacked_netdevs)
920 if (dev->kind == NETDEV_KIND_VLAN && dev->mtu > 0)
921 /* See vlan_dev_change_mtu() in kernel. */
922 mtu = MAX(mtu, link_reduces_vlan_mtu(link) ? dev->mtu + 4 : dev->mtu);
923
924 else if (dev->kind == NETDEV_KIND_MACVLAN && dev->mtu > mtu)
925 /* See macvlan_change_mtu() in kernel. */
926 mtu = dev->mtu;
927
928 return mtu;
929}
930
931int link_configure_mtu(Link *link) {
932 uint32_t mtu;
933
934 assert(link);
935 assert(link->network);
936
937 if (link->network->mtu > 0)
938 return link_request_to_set_mtu(link, link->network->mtu);
939
940 mtu = link_get_requested_mtu_by_stacked_netdevs(link);
941 if (link->mtu >= mtu)
942 return 0;
943
944 log_link_notice(link, "Bumping MTU bytes from %"PRIu32" to %"PRIu32" because of stacked device. "
945 "If it is not desired, then please explicitly specify MTUBytes= setting.",
946 link->mtu, mtu);
947
948 return link_request_to_set_mtu(link, mtu);
949}
112a0972
YW
950
951static int link_up_or_down_handler_internal(sd_netlink *rtnl, sd_netlink_message *m, Link *link, bool up, bool check_ready) {
952 int r;
953
954 assert(m);
955 assert(link);
956
957 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
baa95d22 958 goto on_error;
112a0972
YW
959
960 r = sd_netlink_message_get_errno(m);
961 if (r < 0)
962 log_link_message_warning_errno(link, m, r, up ?
963 "Could not bring up interface, ignoring" :
964 "Could not bring down interface, ignoring");
965
baa95d22
YW
966 r = link_call_getlink(link, get_link_update_flag_handler);
967 if (r < 0) {
968 link_enter_failed(link);
969 goto on_error;
970 }
971
112a0972
YW
972 if (check_ready) {
973 link->activated = true;
974 link_check_ready(link);
975 }
976
baa95d22
YW
977 return 1;
978
979on_error:
980 assert(link->set_flags_messages > 0);
981 link->set_flags_messages--;
982
112a0972
YW
983 return 0;
984}
985
986static int link_activate_up_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
987 return link_up_or_down_handler_internal(rtnl, m, link, true, true);
988}
989
990static int link_activate_down_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
991 return link_up_or_down_handler_internal(rtnl, m, link, false, true);
992}
993
994static int link_up_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
995 return link_up_or_down_handler_internal(rtnl, m, link, true, false);
996}
997
998static int link_down_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
999 return link_up_or_down_handler_internal(rtnl, m, link, false, false);
1000}
1001
68f52063
YW
1002static const char *up_or_down(bool up) {
1003 return up ? "up" : "down";
1004}
1005
112a0972
YW
1006static int link_up_or_down(Link *link, bool up, link_netlink_message_handler_t callback) {
1007 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
1008 int r;
1009
1010 assert(link);
1011 assert(link->manager);
1012 assert(link->manager->rtnl);
1013 assert(callback);
1014
68f52063 1015 log_link_debug(link, "Bringing link %s", up_or_down(up));
112a0972
YW
1016
1017 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_SETLINK, link->ifindex);
1018 if (r < 0)
1019 return log_link_debug_errno(link, r, "Could not allocate RTM_SETLINK message: %m");
1020
1021 r = sd_rtnl_message_link_set_flags(req, up ? IFF_UP : 0, IFF_UP);
1022 if (r < 0)
1023 return log_link_debug_errno(link, r, "Could not set link flags: %m");
1024
1025 r = netlink_call_async(link->manager->rtnl, NULL, req, callback,
1026 link_netlink_destroy_callback, link);
1027 if (r < 0)
1028 return log_link_debug_errno(link, r, "Could not send rtnetlink message: %m");
1029
1030 link_ref(link);
1031
1032 return 0;
1033}
1034
112a0972 1035int link_down(Link *link) {
7149bde4
YW
1036 int r;
1037
1038 assert(link);
1039
1040 r = link_up_or_down(link, false, link_down_handler);
1041 if (r < 0)
1042 return log_link_error_errno(link, r, "Failed to bring down interface: %m");
1043
1044 link->set_flags_messages++;
1045 return 0;
112a0972
YW
1046}
1047
1048static bool link_is_ready_to_activate(Link *link) {
1049 assert(link);
1050
1051 if (!IN_SET(link->state, LINK_STATE_INITIALIZED, LINK_STATE_CONFIGURING, LINK_STATE_CONFIGURED))
1052 return false;
1053
1054 if (link->set_link_messages > 0)
1055 return false;
1056
1057 return true;
1058}
1059
1060int request_process_activation(Request *req) {
1061 Link *link;
1062 bool up;
1063 int r;
1064
1065 assert(req);
1066 assert(req->link);
1067 assert(req->type == REQUEST_TYPE_ACTIVATE_LINK);
1068 assert(req->netlink_handler);
1069
1070 link = req->link;
1071 up = PTR_TO_INT(req->userdata);
1072
1073 if (!link_is_ready_to_activate(link))
1074 return 0;
1075
1076 r = link_up_or_down(link, up, req->netlink_handler);
1077 if (r < 0)
68f52063 1078 return log_link_error_errno(link, r, "Failed to bring %s: %m", up_or_down(up));
112a0972
YW
1079
1080 return 1;
1081}
1082
1083int link_request_to_activate(Link *link) {
1084 Request *req;
1085 bool up;
1086 int r;
1087
1088 assert(link);
1089 assert(link->network);
1090
1091 switch (link->network->activation_policy) {
1092 case ACTIVATION_POLICY_BOUND:
112a0972
YW
1093 r = link_handle_bound_to_list(link);
1094 if (r < 0)
1095 return r;
1096 _fallthrough_;
1097 case ACTIVATION_POLICY_MANUAL:
1098 link->activated = true;
1099 link_check_ready(link);
1100 return 0;
1101 case ACTIVATION_POLICY_UP:
1102 case ACTIVATION_POLICY_ALWAYS_UP:
1103 up = true;
1104 break;
1105 case ACTIVATION_POLICY_DOWN:
1106 case ACTIVATION_POLICY_ALWAYS_DOWN:
1107 up = false;
1108 break;
1109 default:
04499a70 1110 assert_not_reached();
112a0972
YW
1111 }
1112
1113 link->activated = false;
1114
baa95d22 1115 r = link_queue_request(link, REQUEST_TYPE_ACTIVATE_LINK, NULL, false, &link->set_flags_messages,
112a0972
YW
1116 up ? link_activate_up_handler : link_activate_down_handler, &req);
1117 if (r < 0)
1118 return log_link_error_errno(link, r, "Failed to request to activate link: %m");
1119
1120 req->userdata = INT_TO_PTR(up);
1121
1122 log_link_debug(link, "Requested to activate link");
1123 return 0;
1124}
68f52063
YW
1125
1126static bool link_is_ready_to_bring_up_or_down(Link *link) {
1127 assert(link);
1128
1129 if (link->state == LINK_STATE_UNMANAGED)
1130 return true;
1131
1132 if (!IN_SET(link->state, LINK_STATE_CONFIGURING, LINK_STATE_CONFIGURED))
1133 return false;
1134
1135 if (link->set_link_messages > 0)
1136 return false;
1137
1138 if (!link->activated)
1139 return false;
1140
1141 return true;
1142}
1143
1144int request_process_link_up_or_down(Request *req) {
1145 Link *link;
1146 bool up;
1147 int r;
1148
1149 assert(req);
1150 assert(req->link);
1151 assert(req->type == REQUEST_TYPE_UP_DOWN);
1152
1153 link = req->link;
1154 up = PTR_TO_INT(req->userdata);
1155
1156 if (!link_is_ready_to_bring_up_or_down(link))
1157 return 0;
1158
1159 r = link_up_or_down(link, up, req->netlink_handler);
1160 if (r < 0)
1161 return log_link_error_errno(link, r, "Failed to bring %s: %m", up_or_down(up));
1162
1163 return 1;
1164}
1165
1166int link_request_to_bring_up_or_down(Link *link, bool up) {
1167 Request *req;
1168 int r;
1169
1170 assert(link);
1171
baa95d22 1172 r = link_queue_request(link, REQUEST_TYPE_UP_DOWN, NULL, false, &link->set_flags_messages,
68f52063
YW
1173 up ? link_up_handler : link_down_handler, &req);
1174 if (r < 0)
1175 return log_link_error_errno(link, r, "Failed to request to bring %s link: %m",
1176 up_or_down(up));
1177
1178 req->userdata = INT_TO_PTR(up);
1179
1180 log_link_debug(link, "Requested to bring link %s", up_or_down(up));
1181 return 0;
1182}
63dc6025
YW
1183
1184static int link_remove_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
1185 int r;
1186
1187 assert(m);
1188 assert(link);
1189
1190 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
1191 return 0;
1192
1193 r = sd_netlink_message_get_errno(m);
1194 if (r < 0)
1195 log_link_message_warning_errno(link, m, r, "Could not remove interface, ignoring");
1196
1197 return 0;
1198}
1199
1200int link_remove(Link *link) {
1201 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
1202 int r;
1203
1204 assert(link);
1205 assert(link->manager);
1206 assert(link->manager->rtnl);
1207
1208 log_link_debug(link, "Removing link.");
1209
1210 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_DELLINK, link->ifindex);
1211 if (r < 0)
1212 return log_link_debug_errno(link, r, "Could not allocate RTM_DELLINK message: %m");
1213
1214 r = netlink_call_async(link->manager->rtnl, NULL, req, link_remove_handler,
1215 link_netlink_destroy_callback, link);
1216 if (r < 0)
1217 return log_link_debug_errno(link, r, "Could not send rtnetlink message: %m");
1218
1219 link_ref(link);
1220
1221 return 0;
1222}