1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
4 #include <netinet/in.h>
5 #include <linux/if_arp.h>
8 #include "alloc-util.h"
9 #include "arphrd-util.h"
14 #include "conf-files.h"
15 #include "conf-parser.h"
18 #include "fou-tunnel.h"
23 #include "l2tp-tunnel.h"
28 #include "netdevsim.h"
29 #include "netif-util.h"
30 #include "netlink-util.h"
31 #include "networkd-manager.h"
32 #include "networkd-queue.h"
33 #include "networkd-setlink.h"
34 #include "networkd-sriov.h"
36 #include "path-lookup.h"
37 #include "siphash24.h"
38 #include "stat-util.h"
39 #include "string-table.h"
40 #include "string-util.h"
50 #include "wireguard.h"
54 const NetDevVTable
* const netdev_vtable
[_NETDEV_KIND_MAX
] = {
55 [NETDEV_KIND_BAREUDP
] = &bare_udp_vtable
,
56 [NETDEV_KIND_BATADV
] = &batadv_vtable
,
57 [NETDEV_KIND_BOND
] = &bond_vtable
,
58 [NETDEV_KIND_BRIDGE
] = &bridge_vtable
,
59 [NETDEV_KIND_DUMMY
] = &dummy_vtable
,
60 [NETDEV_KIND_ERSPAN
] = &erspan_vtable
,
61 [NETDEV_KIND_FOU
] = &foutnl_vtable
,
62 [NETDEV_KIND_GENEVE
] = &geneve_vtable
,
63 [NETDEV_KIND_GRE
] = &gre_vtable
,
64 [NETDEV_KIND_GRETAP
] = &gretap_vtable
,
65 [NETDEV_KIND_IFB
] = &ifb_vtable
,
66 [NETDEV_KIND_IP6GRE
] = &ip6gre_vtable
,
67 [NETDEV_KIND_IP6GRETAP
] = &ip6gretap_vtable
,
68 [NETDEV_KIND_IP6TNL
] = &ip6tnl_vtable
,
69 [NETDEV_KIND_IPIP
] = &ipip_vtable
,
70 [NETDEV_KIND_IPOIB
] = &ipoib_vtable
,
71 [NETDEV_KIND_IPVLAN
] = &ipvlan_vtable
,
72 [NETDEV_KIND_IPVTAP
] = &ipvtap_vtable
,
73 [NETDEV_KIND_L2TP
] = &l2tptnl_vtable
,
74 [NETDEV_KIND_MACSEC
] = &macsec_vtable
,
75 [NETDEV_KIND_MACVLAN
] = &macvlan_vtable
,
76 [NETDEV_KIND_MACVTAP
] = &macvtap_vtable
,
77 [NETDEV_KIND_NETDEVSIM
] = &netdevsim_vtable
,
78 [NETDEV_KIND_NLMON
] = &nlmon_vtable
,
79 [NETDEV_KIND_SIT
] = &sit_vtable
,
80 [NETDEV_KIND_TAP
] = &tap_vtable
,
81 [NETDEV_KIND_TUN
] = &tun_vtable
,
82 [NETDEV_KIND_VCAN
] = &vcan_vtable
,
83 [NETDEV_KIND_VETH
] = &veth_vtable
,
84 [NETDEV_KIND_VLAN
] = &vlan_vtable
,
85 [NETDEV_KIND_VRF
] = &vrf_vtable
,
86 [NETDEV_KIND_VTI6
] = &vti6_vtable
,
87 [NETDEV_KIND_VTI
] = &vti_vtable
,
88 [NETDEV_KIND_VXCAN
] = &vxcan_vtable
,
89 [NETDEV_KIND_VXLAN
] = &vxlan_vtable
,
90 [NETDEV_KIND_WIREGUARD
] = &wireguard_vtable
,
91 [NETDEV_KIND_WLAN
] = &wlan_vtable
,
92 [NETDEV_KIND_XFRM
] = &xfrm_vtable
,
95 static const char* const netdev_kind_table
[_NETDEV_KIND_MAX
] = {
96 [NETDEV_KIND_BAREUDP
] = "bareudp",
97 [NETDEV_KIND_BATADV
] = "batadv",
98 [NETDEV_KIND_BOND
] = "bond",
99 [NETDEV_KIND_BRIDGE
] = "bridge",
100 [NETDEV_KIND_DUMMY
] = "dummy",
101 [NETDEV_KIND_ERSPAN
] = "erspan",
102 [NETDEV_KIND_FOU
] = "fou",
103 [NETDEV_KIND_GENEVE
] = "geneve",
104 [NETDEV_KIND_GRE
] = "gre",
105 [NETDEV_KIND_GRETAP
] = "gretap",
106 [NETDEV_KIND_IFB
] = "ifb",
107 [NETDEV_KIND_IP6GRE
] = "ip6gre",
108 [NETDEV_KIND_IP6GRETAP
] = "ip6gretap",
109 [NETDEV_KIND_IP6TNL
] = "ip6tnl",
110 [NETDEV_KIND_IPIP
] = "ipip",
111 [NETDEV_KIND_IPOIB
] = "ipoib",
112 [NETDEV_KIND_IPVLAN
] = "ipvlan",
113 [NETDEV_KIND_IPVTAP
] = "ipvtap",
114 [NETDEV_KIND_L2TP
] = "l2tp",
115 [NETDEV_KIND_MACSEC
] = "macsec",
116 [NETDEV_KIND_MACVLAN
] = "macvlan",
117 [NETDEV_KIND_MACVTAP
] = "macvtap",
118 [NETDEV_KIND_NETDEVSIM
] = "netdevsim",
119 [NETDEV_KIND_NLMON
] = "nlmon",
120 [NETDEV_KIND_SIT
] = "sit",
121 [NETDEV_KIND_TAP
] = "tap",
122 [NETDEV_KIND_TUN
] = "tun",
123 [NETDEV_KIND_VCAN
] = "vcan",
124 [NETDEV_KIND_VETH
] = "veth",
125 [NETDEV_KIND_VLAN
] = "vlan",
126 [NETDEV_KIND_VRF
] = "vrf",
127 [NETDEV_KIND_VTI6
] = "vti6",
128 [NETDEV_KIND_VTI
] = "vti",
129 [NETDEV_KIND_VXCAN
] = "vxcan",
130 [NETDEV_KIND_VXLAN
] = "vxlan",
131 [NETDEV_KIND_WIREGUARD
] = "wireguard",
132 [NETDEV_KIND_WLAN
] = "wlan",
133 [NETDEV_KIND_XFRM
] = "xfrm",
136 DEFINE_STRING_TABLE_LOOKUP(netdev_kind
, NetDevKind
);
138 bool netdev_is_managed(NetDev
*netdev
) {
139 if (!netdev
|| !netdev
->manager
|| !netdev
->ifname
)
142 return hashmap_get(netdev
->manager
->netdevs
, netdev
->ifname
) == netdev
;
145 static bool netdev_is_stacked_and_independent(NetDev
*netdev
) {
148 if (netdev_get_create_type(netdev
) != NETDEV_CREATE_STACKED
)
151 switch (netdev
->kind
) {
152 case NETDEV_KIND_ERSPAN
:
153 return ERSPAN(netdev
)->independent
;
154 case NETDEV_KIND_GRE
:
155 return GRE(netdev
)->independent
;
156 case NETDEV_KIND_GRETAP
:
157 return GRETAP(netdev
)->independent
;
158 case NETDEV_KIND_IP6GRE
:
159 return IP6GRE(netdev
)->independent
;
160 case NETDEV_KIND_IP6GRETAP
:
161 return IP6GRETAP(netdev
)->independent
;
162 case NETDEV_KIND_IP6TNL
:
163 return IP6TNL(netdev
)->independent
;
164 case NETDEV_KIND_IPIP
:
165 return IPIP(netdev
)->independent
;
166 case NETDEV_KIND_SIT
:
167 return SIT(netdev
)->independent
;
168 case NETDEV_KIND_VTI
:
169 return VTI(netdev
)->independent
;
170 case NETDEV_KIND_VTI6
:
171 return VTI6(netdev
)->independent
;
172 case NETDEV_KIND_VXLAN
:
173 return VXLAN(netdev
)->independent
;
174 case NETDEV_KIND_XFRM
:
175 return XFRM(netdev
)->independent
;
181 static bool netdev_is_stacked(NetDev
*netdev
) {
184 if (netdev_get_create_type(netdev
) != NETDEV_CREATE_STACKED
)
187 if (netdev_is_stacked_and_independent(netdev
))
193 static void netdev_detach_from_manager(NetDev
*netdev
) {
194 if (netdev
->ifname
&& netdev
->manager
)
195 hashmap_remove(netdev
->manager
->netdevs
, netdev
->ifname
);
198 static NetDev
*netdev_free(NetDev
*netdev
) {
201 netdev_detach_from_manager(netdev
);
203 free(netdev
->filename
);
205 free(netdev
->description
);
206 free(netdev
->ifname
);
207 condition_free_list(netdev
->conditions
);
209 /* Invoke the per-kind done() destructor, but only if the state field is initialized. We conditionalize that
210 * because we parse .netdev files twice: once to determine the kind (with a short, minimal NetDev structure
211 * allocation, with no room for per-kind fields), and once to read the kind's properties (with a full,
212 * comprehensive NetDev structure allocation with enough space for whatever the specific kind needs). Now, in
213 * the first case we shouldn't try to destruct the per-kind NetDev fields on destruction, in the second case we
214 * should. We use the state field to discern the two cases: it's _NETDEV_STATE_INVALID on the first "raw"
216 if (netdev
->state
!= _NETDEV_STATE_INVALID
&&
217 NETDEV_VTABLE(netdev
) &&
218 NETDEV_VTABLE(netdev
)->done
)
219 NETDEV_VTABLE(netdev
)->done(netdev
);
221 return mfree(netdev
);
224 DEFINE_TRIVIAL_REF_UNREF_FUNC(NetDev
, netdev
, netdev_free
);
226 void netdev_drop(NetDev
*netdev
) {
230 if (netdev_is_stacked(netdev
)) {
231 /* The netdev may be removed due to the underlying device removal, and the device may
232 * be re-added later. */
233 netdev
->state
= NETDEV_STATE_LOADING
;
236 log_netdev_debug(netdev
, "netdev removed");
240 if (NETDEV_VTABLE(netdev
) && NETDEV_VTABLE(netdev
)->drop
)
241 NETDEV_VTABLE(netdev
)->drop(netdev
);
243 netdev
->state
= NETDEV_STATE_LINGER
;
245 log_netdev_debug(netdev
, "netdev removed");
247 netdev_detach_from_manager(netdev
);
248 netdev_unref(netdev
);
252 int netdev_get(Manager
*manager
, const char *name
, NetDev
**ret
) {
259 netdev
= hashmap_get(manager
->netdevs
, name
);
268 void netdev_enter_failed(NetDev
*netdev
) {
269 netdev
->state
= NETDEV_STATE_FAILED
;
272 static int netdev_enter_ready(NetDev
*netdev
) {
274 assert(netdev
->ifname
);
276 if (netdev
->state
!= NETDEV_STATE_CREATING
)
279 netdev
->state
= NETDEV_STATE_READY
;
281 log_netdev_info(netdev
, "netdev ready");
283 if (NETDEV_VTABLE(netdev
)->post_create
)
284 NETDEV_VTABLE(netdev
)->post_create(netdev
, NULL
);
289 /* callback for netdev's created without a backing Link */
290 static int netdev_create_handler(sd_netlink
*rtnl
, sd_netlink_message
*m
, NetDev
*netdev
) {
294 assert(netdev
->state
!= _NETDEV_STATE_INVALID
);
296 r
= sd_netlink_message_get_errno(m
);
298 log_netdev_info(netdev
, "netdev exists, using existing without changing its parameters");
300 log_netdev_warning_errno(netdev
, r
, "netdev could not be created: %m");
301 netdev_enter_failed(netdev
);
306 log_netdev_debug(netdev
, "Created");
311 int netdev_set_ifindex(NetDev
*netdev
, sd_netlink_message
*message
) {
314 const char *received_kind
;
315 const char *received_name
;
321 r
= sd_netlink_message_get_type(message
, &type
);
323 return log_netdev_error_errno(netdev
, r
, "Could not get rtnl message type: %m");
325 if (type
!= RTM_NEWLINK
)
326 return log_netdev_error_errno(netdev
, SYNTHETIC_ERRNO(EINVAL
), "Cannot set ifindex from unexpected rtnl message type.");
328 r
= sd_rtnl_message_link_get_ifindex(message
, &ifindex
);
330 log_netdev_error_errno(netdev
, r
, "Could not get ifindex: %m");
331 netdev_enter_failed(netdev
);
333 } else if (ifindex
<= 0) {
334 log_netdev_error(netdev
, "Got invalid ifindex: %d", ifindex
);
335 netdev_enter_failed(netdev
);
339 if (netdev
->ifindex
> 0) {
340 if (netdev
->ifindex
!= ifindex
) {
341 log_netdev_error(netdev
, "Could not set ifindex to %d, already set to %d",
342 ifindex
, netdev
->ifindex
);
343 netdev_enter_failed(netdev
);
346 /* ifindex already set to the same for this netdev */
350 r
= sd_netlink_message_read_string(message
, IFLA_IFNAME
, &received_name
);
352 return log_netdev_error_errno(netdev
, r
, "Could not get IFNAME: %m");
354 if (!streq(netdev
->ifname
, received_name
)) {
355 log_netdev_error(netdev
, "Received newlink with wrong IFNAME %s", received_name
);
356 netdev_enter_failed(netdev
);
360 if (!NETDEV_VTABLE(netdev
)->skip_netdev_kind_check
) {
362 r
= sd_netlink_message_enter_container(message
, IFLA_LINKINFO
);
364 return log_netdev_error_errno(netdev
, r
, "Could not get LINKINFO: %m");
366 r
= sd_netlink_message_read_string(message
, IFLA_INFO_KIND
, &received_kind
);
368 return log_netdev_error_errno(netdev
, r
, "Could not get KIND: %m");
370 r
= sd_netlink_message_exit_container(message
);
372 return log_netdev_error_errno(netdev
, r
, "Could not exit container: %m");
374 if (netdev
->kind
== NETDEV_KIND_TAP
)
375 /* the kernel does not distinguish between tun and tap */
378 kind
= netdev_kind_to_string(netdev
->kind
);
380 log_netdev_error(netdev
, "Could not get kind");
381 netdev_enter_failed(netdev
);
386 if (!streq(kind
, received_kind
)) {
387 log_netdev_error(netdev
, "Received newlink with wrong KIND %s, expected %s",
388 received_kind
, kind
);
389 netdev_enter_failed(netdev
);
394 netdev
->ifindex
= ifindex
;
396 log_netdev_debug(netdev
, "netdev has index %d", netdev
->ifindex
);
398 netdev_enter_ready(netdev
);
403 #define HASH_KEY SD_ID128_MAKE(52,e1,45,bd,00,6f,29,96,21,c6,30,6d,83,71,04,48)
405 int netdev_generate_hw_addr(
409 const struct hw_addr_data
*hw_addr
,
410 struct hw_addr_data
*ret
) {
412 struct hw_addr_data a
= HW_ADDR_NULL
;
413 bool is_static
= false;
421 if (hw_addr_equal(hw_addr
, &HW_ADDR_NONE
)) {
426 if (hw_addr
->length
== 0) {
429 /* HardwareAddress= is not specified. */
431 if (!NETDEV_VTABLE(netdev
)->generate_mac
)
434 if (!IN_SET(NETDEV_VTABLE(netdev
)->iftype
, ARPHRD_ETHER
, ARPHRD_INFINIBAND
))
437 r
= net_get_unique_predictable_data_from_name(name
, &HASH_KEY
, &result
);
439 log_netdev_warning_errno(netdev
, r
,
440 "Failed to generate persistent MAC address, ignoring: %m");
444 a
.length
= arphrd_to_hw_addr_len(NETDEV_VTABLE(netdev
)->iftype
);
446 switch (NETDEV_VTABLE(netdev
)->iftype
) {
448 assert(a
.length
<= sizeof(result
));
449 memcpy(a
.bytes
, &result
, a
.length
);
451 if (ether_addr_is_null(&a
.ether
) || ether_addr_is_broadcast(&a
.ether
)) {
452 log_netdev_warning_errno(netdev
, SYNTHETIC_ERRNO(EINVAL
),
453 "Failed to generate persistent MAC address, ignoring: %m");
459 case ARPHRD_INFINIBAND
:
461 log_netdev_warning_errno(netdev
, SYNTHETIC_ERRNO(EINVAL
),
462 "Failed to generate persistent MAC address: %m");
466 assert(a
.length
>= sizeof(result
));
467 memzero(a
.bytes
, a
.length
- sizeof(result
));
468 memcpy(a
.bytes
+ a
.length
- sizeof(result
), &result
, sizeof(result
));
471 assert_not_reached();
479 r
= net_verify_hardware_address(name
, is_static
, NETDEV_VTABLE(netdev
)->iftype
,
480 parent
? &parent
->hw_addr
: NULL
, &a
);
489 static int netdev_create_message(NetDev
*netdev
, Link
*link
, sd_netlink_message
*m
) {
492 r
= sd_netlink_message_append_string(m
, IFLA_IFNAME
, netdev
->ifname
);
496 struct hw_addr_data hw_addr
;
497 r
= netdev_generate_hw_addr(netdev
, link
, netdev
->ifname
, &netdev
->hw_addr
, &hw_addr
);
501 if (hw_addr
.length
> 0) {
502 log_netdev_debug(netdev
, "Using MAC address: %s", HW_ADDR_TO_STR(&hw_addr
));
503 r
= netlink_message_append_hw_addr(m
, IFLA_ADDRESS
, &hw_addr
);
508 if (netdev
->mtu
!= 0) {
509 r
= sd_netlink_message_append_u32(m
, IFLA_MTU
, netdev
->mtu
);
515 r
= sd_netlink_message_append_u32(m
, IFLA_LINK
, link
->ifindex
);
520 r
= sd_netlink_message_open_container(m
, IFLA_LINKINFO
);
524 if (NETDEV_VTABLE(netdev
)->fill_message_create
) {
525 r
= sd_netlink_message_open_container_union(m
, IFLA_INFO_DATA
, netdev_kind_to_string(netdev
->kind
));
529 r
= NETDEV_VTABLE(netdev
)->fill_message_create(netdev
, link
, m
);
533 r
= sd_netlink_message_close_container(m
);
537 r
= sd_netlink_message_append_string(m
, IFLA_INFO_KIND
, netdev_kind_to_string(netdev
->kind
));
542 r
= sd_netlink_message_close_container(m
);
549 static int independent_netdev_create(NetDev
*netdev
) {
550 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*m
= NULL
;
556 if (NETDEV_VTABLE(netdev
)->create
) {
557 r
= NETDEV_VTABLE(netdev
)->create(netdev
);
561 log_netdev_debug(netdev
, "Created");
565 r
= sd_rtnl_message_new_link(netdev
->manager
->rtnl
, &m
, RTM_NEWLINK
, 0);
569 r
= netdev_create_message(netdev
, NULL
, m
);
573 r
= netlink_call_async(netdev
->manager
->rtnl
, NULL
, m
, netdev_create_handler
,
574 netdev_destroy_callback
, netdev
);
580 netdev
->state
= NETDEV_STATE_CREATING
;
581 log_netdev_debug(netdev
, "Creating");
585 static int stacked_netdev_create(NetDev
*netdev
, Link
*link
, Request
*req
) {
586 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*m
= NULL
;
590 assert(netdev
->manager
);
594 r
= sd_rtnl_message_new_link(netdev
->manager
->rtnl
, &m
, RTM_NEWLINK
, 0);
598 r
= netdev_create_message(netdev
, link
, m
);
602 r
= request_call_netlink_async(netdev
->manager
->rtnl
, m
, req
);
606 netdev
->state
= NETDEV_STATE_CREATING
;
607 log_netdev_debug(netdev
, "Creating");
611 static bool link_is_ready_to_create_stacked_netdev_one(Link
*link
, bool allow_unmanaged
) {
614 if (!IN_SET(link
->state
, LINK_STATE_CONFIGURING
, LINK_STATE_CONFIGURED
, LINK_STATE_UNMANAGED
))
618 return allow_unmanaged
;
620 if (link
->set_link_messages
> 0)
623 /* If stacked netdevs are created before the underlying interface being activated, then
624 * the activation policy for the netdevs are ignored. See issue #22593. */
625 if (!link
->activated
)
631 static bool link_is_ready_to_create_stacked_netdev(Link
*link
) {
632 return check_ready_for_all_sr_iov_ports(link
, /* allow_unmanaged = */ false,
633 link_is_ready_to_create_stacked_netdev_one
);
636 static int netdev_is_ready_to_create(NetDev
*netdev
, Link
*link
) {
639 if (netdev
->state
!= NETDEV_STATE_LOADING
)
642 if (link
&& !link_is_ready_to_create_stacked_netdev(link
))
645 if (NETDEV_VTABLE(netdev
)->is_ready_to_create
)
646 return NETDEV_VTABLE(netdev
)->is_ready_to_create(netdev
, link
);
651 static int stacked_netdev_process_request(Request
*req
, Link
*link
, void *userdata
) {
652 NetDev
*netdev
= ASSERT_PTR(userdata
);
658 r
= netdev_is_ready_to_create(netdev
, link
);
662 r
= stacked_netdev_create(netdev
, link
, req
);
664 return log_netdev_warning_errno(netdev
, r
, "Failed to create netdev: %m");
669 static int create_stacked_netdev_handler(sd_netlink
*rtnl
, sd_netlink_message
*m
, Request
*req
, Link
*link
, void *userdata
) {
675 r
= sd_netlink_message_get_errno(m
);
676 if (r
< 0 && r
!= -EEXIST
) {
677 log_link_message_warning_errno(link
, m
, r
, "Could not create stacked netdev");
678 link_enter_failed(link
);
682 if (link
->create_stacked_netdev_messages
== 0) {
683 link
->stacked_netdevs_created
= true;
684 log_link_debug(link
, "Stacked netdevs created.");
685 link_check_ready(link
);
691 int link_request_stacked_netdev(Link
*link
, NetDev
*netdev
) {
697 if (!netdev_is_stacked(netdev
))
700 if (!IN_SET(netdev
->state
, NETDEV_STATE_LOADING
, NETDEV_STATE_FAILED
) || netdev
->ifindex
> 0)
701 return 0; /* Already created. */
703 link
->stacked_netdevs_created
= false;
704 r
= link_queue_request_full(link
, REQUEST_TYPE_NETDEV_STACKED
,
705 netdev_ref(netdev
), (mfree_func_t
) netdev_unref
,
706 trivial_hash_func
, trivial_compare_func
,
707 stacked_netdev_process_request
,
708 &link
->create_stacked_netdev_messages
,
709 create_stacked_netdev_handler
, NULL
);
711 return log_link_error_errno(link
, r
, "Failed to request stacked netdev '%s': %m",
714 log_link_debug(link
, "Requested stacked netdev '%s'", netdev
->ifname
);
718 static int independent_netdev_process_request(Request
*req
, Link
*link
, void *userdata
) {
719 NetDev
*netdev
= ASSERT_PTR(userdata
);
724 r
= netdev_is_ready_to_create(netdev
, NULL
);
728 r
= independent_netdev_create(netdev
);
730 return log_netdev_warning_errno(netdev
, r
, "Failed to create netdev: %m");
735 static int netdev_request_to_create(NetDev
*netdev
) {
740 if (netdev_is_stacked(netdev
))
743 r
= netdev_is_ready_to_create(netdev
, NULL
);
747 /* If the netdev has no dependency, then create it now. */
748 r
= independent_netdev_create(netdev
);
750 return log_netdev_warning_errno(netdev
, r
, "Failed to create netdev: %m");
753 /* Otherwise, wait for the dependencies being resolved. */
754 r
= netdev_queue_request(netdev
, independent_netdev_process_request
, NULL
);
756 return log_netdev_warning_errno(netdev
, r
, "Failed to request to create netdev: %m");
762 int netdev_load_one(Manager
*manager
, const char *filename
) {
763 _cleanup_(netdev_unrefp
) NetDev
*netdev_raw
= NULL
, *netdev
= NULL
;
764 const char *dropin_dirname
;
770 r
= null_or_empty_path(filename
);
772 return log_warning_errno(r
, "Failed to check if \"%s\" is empty: %m", filename
);
774 log_debug("Skipping empty file: %s", filename
);
778 netdev_raw
= new(NetDev
, 1);
782 *netdev_raw
= (NetDev
) {
784 .kind
= _NETDEV_KIND_INVALID
,
785 .state
= _NETDEV_STATE_INVALID
, /* an invalid state means done() of the implementation won't be called on destruction */
788 dropin_dirname
= strjoina(basename(filename
), ".d");
789 r
= config_parse_many(
790 STRV_MAKE_CONST(filename
), NETWORK_DIRS
, dropin_dirname
,
791 NETDEV_COMMON_SECTIONS NETDEV_OTHER_SECTIONS
,
792 config_item_perf_lookup
, network_netdev_gperf_lookup
,
798 return r
; /* config_parse_many() logs internally. */
800 /* skip out early if configuration does not match the environment */
801 if (!condition_test_list(netdev_raw
->conditions
, environ
, NULL
, NULL
, NULL
)) {
802 log_debug("%s: Conditions in the file do not match the system environment, skipping.", filename
);
806 if (netdev_raw
->kind
== _NETDEV_KIND_INVALID
)
807 return log_warning_errno(SYNTHETIC_ERRNO(EINVAL
), "NetDev has no Kind= configured in \"%s\", ignoring.", filename
);
809 if (!netdev_raw
->ifname
)
810 return log_warning_errno(SYNTHETIC_ERRNO(EINVAL
), "NetDev without Name= configured in \"%s\", ignoring.", filename
);
812 netdev
= malloc0(NETDEV_VTABLE(netdev_raw
)->object_size
);
817 netdev
->manager
= manager
;
818 netdev
->kind
= netdev_raw
->kind
;
819 netdev
->state
= NETDEV_STATE_LOADING
; /* we initialize the state here for the first time,
820 so that done() will be called on destruction */
822 if (NETDEV_VTABLE(netdev
)->init
)
823 NETDEV_VTABLE(netdev
)->init(netdev
);
825 r
= config_parse_many(
826 STRV_MAKE_CONST(filename
), NETWORK_DIRS
, dropin_dirname
,
827 NETDEV_VTABLE(netdev
)->sections
,
828 config_item_perf_lookup
, network_netdev_gperf_lookup
,
832 return r
; /* config_parse_many() logs internally. */
834 /* verify configuration */
835 if (NETDEV_VTABLE(netdev
)->config_verify
) {
836 r
= NETDEV_VTABLE(netdev
)->config_verify(netdev
, filename
);
838 return r
; /* config_verify() logs internally. */
841 netdev
->filename
= strdup(filename
);
842 if (!netdev
->filename
)
845 r
= hashmap_ensure_put(&netdev
->manager
->netdevs
, &string_hash_ops
, netdev
->ifname
, netdev
);
849 NetDev
*n
= hashmap_get(netdev
->manager
->netdevs
, netdev
->ifname
);
852 if (!streq(netdev
->filename
, n
->filename
))
853 log_netdev_warning_errno(netdev
, r
,
854 "Device was already configured by \"%s\", ignoring %s.",
855 n
->filename
, netdev
->filename
);
857 /* Clear ifname before netdev_free() is called. Otherwise, the NetDev object 'n' is
858 * removed from the hashmap 'manager->netdevs'. */
859 netdev
->ifname
= mfree(netdev
->ifname
);
864 log_netdev_debug(netdev
, "loaded \"%s\"", netdev_kind_to_string(netdev
->kind
));
866 r
= netdev_request_to_create(netdev
);
868 return r
; /* netdev_request_to_create() logs internally. */
874 int netdev_load(Manager
*manager
, bool reload
) {
875 _cleanup_strv_free_
char **files
= NULL
;
881 hashmap_clear_with_destructor(manager
->netdevs
, netdev_unref
);
883 r
= conf_files_list_strv(&files
, ".netdev", NULL
, 0, NETWORK_DIRS
);
885 return log_error_errno(r
, "Failed to enumerate netdev files: %m");
887 STRV_FOREACH(f
, files
)
888 (void) netdev_load_one(manager
, *f
);
893 int config_parse_netdev_kind(
895 const char *filename
,
898 unsigned section_line
,
905 NetDevKind k
, *kind
= ASSERT_PTR(data
);
910 k
= netdev_kind_from_string(rvalue
);
912 log_syntax(unit
, LOG_WARNING
, filename
, line
, k
, "Failed to parse netdev kind, ignoring assignment: %s", rvalue
);
916 if (*kind
!= _NETDEV_KIND_INVALID
&& *kind
!= k
) {
917 log_syntax(unit
, LOG_WARNING
, filename
, line
, 0,
918 "Specified netdev kind is different from the previous value '%s', ignoring assignment: %s",
919 netdev_kind_to_string(*kind
), rvalue
);
928 int config_parse_netdev_hw_addr(
930 const char *filename
,
933 unsigned section_line
,
940 struct hw_addr_data
*hw_addr
= ASSERT_PTR(data
);
944 if (streq(rvalue
, "none")) {
945 *hw_addr
= HW_ADDR_NONE
;
949 return config_parse_hw_addr(unit
, filename
, line
, section
, section_line
, lvalue
, ltype
, rvalue
, data
, userdata
);