1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
4 #include <netinet/in.h>
7 #include "alloc-util.h"
11 #include "conf-files.h"
12 #include "conf-parser.h"
15 #include "fou-tunnel.h"
19 #include "l2tp-tunnel.h"
24 #include "netdevsim.h"
25 #include "netlink-util.h"
26 #include "networkd-manager.h"
28 #include "path-lookup.h"
29 #include "siphash24.h"
30 #include "stat-util.h"
31 #include "string-table.h"
32 #include "string-util.h"
42 #include "wireguard.h"
45 const NetDevVTable
* const netdev_vtable
[_NETDEV_KIND_MAX
] = {
46 [NETDEV_KIND_BRIDGE
] = &bridge_vtable
,
47 [NETDEV_KIND_BOND
] = &bond_vtable
,
48 [NETDEV_KIND_VLAN
] = &vlan_vtable
,
49 [NETDEV_KIND_MACVLAN
] = &macvlan_vtable
,
50 [NETDEV_KIND_MACVTAP
] = &macvtap_vtable
,
51 [NETDEV_KIND_IPVLAN
] = &ipvlan_vtable
,
52 [NETDEV_KIND_IPVTAP
] = &ipvtap_vtable
,
53 [NETDEV_KIND_VXLAN
] = &vxlan_vtable
,
54 [NETDEV_KIND_IPIP
] = &ipip_vtable
,
55 [NETDEV_KIND_GRE
] = &gre_vtable
,
56 [NETDEV_KIND_GRETAP
] = &gretap_vtable
,
57 [NETDEV_KIND_IP6GRE
] = &ip6gre_vtable
,
58 [NETDEV_KIND_IP6GRETAP
] = &ip6gretap_vtable
,
59 [NETDEV_KIND_SIT
] = &sit_vtable
,
60 [NETDEV_KIND_VTI
] = &vti_vtable
,
61 [NETDEV_KIND_VTI6
] = &vti6_vtable
,
62 [NETDEV_KIND_VETH
] = &veth_vtable
,
63 [NETDEV_KIND_DUMMY
] = &dummy_vtable
,
64 [NETDEV_KIND_TUN
] = &tun_vtable
,
65 [NETDEV_KIND_TAP
] = &tap_vtable
,
66 [NETDEV_KIND_IP6TNL
] = &ip6tnl_vtable
,
67 [NETDEV_KIND_VRF
] = &vrf_vtable
,
68 [NETDEV_KIND_VCAN
] = &vcan_vtable
,
69 [NETDEV_KIND_GENEVE
] = &geneve_vtable
,
70 [NETDEV_KIND_VXCAN
] = &vxcan_vtable
,
71 [NETDEV_KIND_WIREGUARD
] = &wireguard_vtable
,
72 [NETDEV_KIND_NETDEVSIM
] = &netdevsim_vtable
,
73 [NETDEV_KIND_FOU
] = &foutnl_vtable
,
74 [NETDEV_KIND_ERSPAN
] = &erspan_vtable
,
75 [NETDEV_KIND_L2TP
] = &l2tptnl_vtable
,
76 [NETDEV_KIND_MACSEC
] = &macsec_vtable
,
77 [NETDEV_KIND_NLMON
] = &nlmon_vtable
,
78 [NETDEV_KIND_XFRM
] = &xfrm_vtable
,
79 [NETDEV_KIND_IFB
] = &ifb_vtable
,
80 [NETDEV_KIND_BAREUDP
] = &bare_udp_vtable
,
83 static const char* const netdev_kind_table
[_NETDEV_KIND_MAX
] = {
84 [NETDEV_KIND_BAREUDP
] = "bareudp",
85 [NETDEV_KIND_BRIDGE
] = "bridge",
86 [NETDEV_KIND_BOND
] = "bond",
87 [NETDEV_KIND_VLAN
] = "vlan",
88 [NETDEV_KIND_MACVLAN
] = "macvlan",
89 [NETDEV_KIND_MACVTAP
] = "macvtap",
90 [NETDEV_KIND_IPVLAN
] = "ipvlan",
91 [NETDEV_KIND_IPVTAP
] = "ipvtap",
92 [NETDEV_KIND_VXLAN
] = "vxlan",
93 [NETDEV_KIND_IPIP
] = "ipip",
94 [NETDEV_KIND_GRE
] = "gre",
95 [NETDEV_KIND_GRETAP
] = "gretap",
96 [NETDEV_KIND_IP6GRE
] = "ip6gre",
97 [NETDEV_KIND_IP6GRETAP
] = "ip6gretap",
98 [NETDEV_KIND_SIT
] = "sit",
99 [NETDEV_KIND_VETH
] = "veth",
100 [NETDEV_KIND_VTI
] = "vti",
101 [NETDEV_KIND_VTI6
] = "vti6",
102 [NETDEV_KIND_DUMMY
] = "dummy",
103 [NETDEV_KIND_TUN
] = "tun",
104 [NETDEV_KIND_TAP
] = "tap",
105 [NETDEV_KIND_IP6TNL
] = "ip6tnl",
106 [NETDEV_KIND_VRF
] = "vrf",
107 [NETDEV_KIND_VCAN
] = "vcan",
108 [NETDEV_KIND_GENEVE
] = "geneve",
109 [NETDEV_KIND_VXCAN
] = "vxcan",
110 [NETDEV_KIND_WIREGUARD
] = "wireguard",
111 [NETDEV_KIND_NETDEVSIM
] = "netdevsim",
112 [NETDEV_KIND_FOU
] = "fou",
113 [NETDEV_KIND_ERSPAN
] = "erspan",
114 [NETDEV_KIND_L2TP
] = "l2tp",
115 [NETDEV_KIND_MACSEC
] = "macsec",
116 [NETDEV_KIND_NLMON
] = "nlmon",
117 [NETDEV_KIND_XFRM
] = "xfrm",
118 [NETDEV_KIND_IFB
] = "ifb",
121 DEFINE_STRING_TABLE_LOOKUP(netdev_kind
, NetDevKind
);
123 int config_parse_netdev_kind(
125 const char *filename
,
128 unsigned section_line
,
135 NetDevKind k
, *kind
= data
;
140 k
= netdev_kind_from_string(rvalue
);
142 log_syntax(unit
, LOG_WARNING
, filename
, line
, 0, "Failed to parse netdev kind, ignoring assignment: %s", rvalue
);
146 if (*kind
!= _NETDEV_KIND_INVALID
&& *kind
!= k
) {
147 log_syntax(unit
, LOG_WARNING
, filename
, line
, 0,
148 "Specified netdev kind is different from the previous value '%s', ignoring assignment: %s",
149 netdev_kind_to_string(*kind
), rvalue
);
158 static void netdev_callbacks_clear(NetDev
*netdev
) {
159 netdev_join_callback
*callback
;
164 while ((callback
= netdev
->callbacks
)) {
165 LIST_REMOVE(callbacks
, netdev
->callbacks
, callback
);
166 link_unref(callback
->link
);
171 bool netdev_is_managed(NetDev
*netdev
) {
172 if (!netdev
|| !netdev
->manager
|| !netdev
->ifname
)
175 return hashmap_get(netdev
->manager
->netdevs
, netdev
->ifname
) == netdev
;
178 static void netdev_detach_from_manager(NetDev
*netdev
) {
179 if (netdev
->ifname
&& netdev
->manager
)
180 hashmap_remove(netdev
->manager
->netdevs
, netdev
->ifname
);
183 static NetDev
*netdev_free(NetDev
*netdev
) {
186 netdev_callbacks_clear(netdev
);
188 netdev_detach_from_manager(netdev
);
190 free(netdev
->filename
);
192 free(netdev
->description
);
193 free(netdev
->ifname
);
195 condition_free_list(netdev
->conditions
);
197 /* Invoke the per-kind done() destructor, but only if the state field is initialized. We conditionalize that
198 * because we parse .netdev files twice: once to determine the kind (with a short, minimal NetDev structure
199 * allocation, with no room for per-kind fields), and once to read the kind's properties (with a full,
200 * comprehensive NetDev structure allocation with enough space for whatever the specific kind needs). Now, in
201 * the first case we shouldn't try to destruct the per-kind NetDev fields on destruction, in the second case we
202 * should. We use the state field to discern the two cases: it's _NETDEV_STATE_INVALID on the first "raw"
204 if (netdev
->state
!= _NETDEV_STATE_INVALID
&&
205 NETDEV_VTABLE(netdev
) &&
206 NETDEV_VTABLE(netdev
)->done
)
207 NETDEV_VTABLE(netdev
)->done(netdev
);
209 return mfree(netdev
);
212 DEFINE_TRIVIAL_REF_UNREF_FUNC(NetDev
, netdev
, netdev_free
);
214 void netdev_drop(NetDev
*netdev
) {
215 if (!netdev
|| netdev
->state
== NETDEV_STATE_LINGER
)
218 netdev
->state
= NETDEV_STATE_LINGER
;
220 log_netdev_debug(netdev
, "netdev removed");
222 netdev_callbacks_clear(netdev
);
224 netdev_detach_from_manager(netdev
);
226 netdev_unref(netdev
);
231 int netdev_get(Manager
*manager
, const char *name
, NetDev
**ret
) {
238 netdev
= hashmap_get(manager
->netdevs
, name
);
249 static int netdev_enter_failed(NetDev
*netdev
) {
250 netdev
->state
= NETDEV_STATE_FAILED
;
252 netdev_callbacks_clear(netdev
);
257 static int netdev_enslave_ready(NetDev
*netdev
, Link
* link
, link_netlink_message_handler_t callback
) {
258 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*req
= NULL
;
262 assert(netdev
->state
== NETDEV_STATE_READY
);
263 assert(netdev
->manager
);
264 assert(netdev
->manager
->rtnl
);
265 assert(IN_SET(netdev
->kind
, NETDEV_KIND_BRIDGE
, NETDEV_KIND_BOND
, NETDEV_KIND_VRF
));
269 if (link
->flags
& IFF_UP
&& netdev
->kind
== NETDEV_KIND_BOND
) {
270 log_netdev_debug(netdev
, "Link '%s' was up when attempting to enslave it. Bringing link down.", link
->ifname
);
271 r
= link_down(link
, NULL
);
273 return log_netdev_error_errno(netdev
, r
, "Could not bring link down: %m");
276 r
= sd_rtnl_message_new_link(netdev
->manager
->rtnl
, &req
, RTM_SETLINK
, link
->ifindex
);
278 return log_netdev_error_errno(netdev
, r
, "Could not allocate RTM_SETLINK message: %m");
280 r
= sd_netlink_message_append_u32(req
, IFLA_MASTER
, netdev
->ifindex
);
282 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_MASTER attribute: %m");
284 r
= netlink_call_async(netdev
->manager
->rtnl
, NULL
, req
, callback
,
285 link_netlink_destroy_callback
, link
);
287 return log_netdev_error_errno(netdev
, r
, "Could not send rtnetlink message: %m");
291 log_netdev_debug(netdev
, "Enslaving link '%s'", link
->ifname
);
296 static int netdev_enter_ready(NetDev
*netdev
) {
297 netdev_join_callback
*callback
, *callback_next
;
301 assert(netdev
->ifname
);
303 if (netdev
->state
!= NETDEV_STATE_CREATING
)
306 netdev
->state
= NETDEV_STATE_READY
;
308 log_netdev_info(netdev
, "netdev ready");
310 LIST_FOREACH_SAFE(callbacks
, callback
, callback_next
, netdev
->callbacks
) {
311 /* enslave the links that were attempted to be enslaved before the
313 r
= netdev_enslave_ready(netdev
, callback
->link
, callback
->callback
);
317 LIST_REMOVE(callbacks
, netdev
->callbacks
, callback
);
318 link_unref(callback
->link
);
322 if (NETDEV_VTABLE(netdev
)->post_create
)
323 NETDEV_VTABLE(netdev
)->post_create(netdev
, NULL
, NULL
);
328 /* callback for netdev's created without a backing Link */
329 static int netdev_create_handler(sd_netlink
*rtnl
, sd_netlink_message
*m
, NetDev
*netdev
) {
333 assert(netdev
->state
!= _NETDEV_STATE_INVALID
);
335 r
= sd_netlink_message_get_errno(m
);
337 log_netdev_info(netdev
, "netdev exists, using existing without changing its parameters");
339 log_netdev_warning_errno(netdev
, r
, "netdev could not be created: %m");
345 log_netdev_debug(netdev
, "Created");
350 static int netdev_enslave(NetDev
*netdev
, Link
*link
, link_netlink_message_handler_t callback
) {
354 assert(netdev
->manager
);
355 assert(netdev
->manager
->rtnl
);
356 assert(IN_SET(netdev
->kind
, NETDEV_KIND_BRIDGE
, NETDEV_KIND_BOND
, NETDEV_KIND_VRF
));
358 if (netdev
->state
== NETDEV_STATE_READY
) {
359 r
= netdev_enslave_ready(netdev
, link
, callback
);
362 } else if (IN_SET(netdev
->state
, NETDEV_STATE_LINGER
, NETDEV_STATE_FAILED
)) {
363 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*m
= NULL
;
365 r
= rtnl_message_new_synthetic_error(netdev
->manager
->rtnl
, -ENODEV
, 0, &m
);
367 callback(netdev
->manager
->rtnl
, m
, link
);
369 /* the netdev is not yet ready, save this request for when it is */
370 netdev_join_callback
*cb
;
372 cb
= new(netdev_join_callback
, 1);
376 *cb
= (netdev_join_callback
) {
377 .callback
= callback
,
378 .link
= link_ref(link
),
381 LIST_PREPEND(callbacks
, netdev
->callbacks
, cb
);
383 log_netdev_debug(netdev
, "Will enslave '%s', when ready", link
->ifname
);
389 int netdev_set_ifindex(NetDev
*netdev
, sd_netlink_message
*message
) {
392 const char *received_kind
;
393 const char *received_name
;
399 r
= sd_netlink_message_get_type(message
, &type
);
401 return log_netdev_error_errno(netdev
, r
, "Could not get rtnl message type: %m");
403 if (type
!= RTM_NEWLINK
)
404 return log_netdev_error_errno(netdev
, SYNTHETIC_ERRNO(EINVAL
), "Cannot set ifindex from unexpected rtnl message type.");
406 r
= sd_rtnl_message_link_get_ifindex(message
, &ifindex
);
408 log_netdev_error_errno(netdev
, r
, "Could not get ifindex: %m");
409 netdev_enter_failed(netdev
);
411 } else if (ifindex
<= 0) {
412 log_netdev_error(netdev
, "Got invalid ifindex: %d", ifindex
);
413 netdev_enter_failed(netdev
);
417 if (netdev
->ifindex
> 0) {
418 if (netdev
->ifindex
!= ifindex
) {
419 log_netdev_error(netdev
, "Could not set ifindex to %d, already set to %d",
420 ifindex
, netdev
->ifindex
);
421 netdev_enter_failed(netdev
);
424 /* ifindex already set to the same for this netdev */
428 r
= sd_netlink_message_read_string(message
, IFLA_IFNAME
, &received_name
);
430 return log_netdev_error_errno(netdev
, r
, "Could not get IFNAME: %m");
432 if (!streq(netdev
->ifname
, received_name
)) {
433 log_netdev_error(netdev
, "Received newlink with wrong IFNAME %s", received_name
);
434 netdev_enter_failed(netdev
);
438 r
= sd_netlink_message_enter_container(message
, IFLA_LINKINFO
);
440 return log_netdev_error_errno(netdev
, r
, "Could not get LINKINFO: %m");
442 r
= sd_netlink_message_read_string(message
, IFLA_INFO_KIND
, &received_kind
);
444 return log_netdev_error_errno(netdev
, r
, "Could not get KIND: %m");
446 r
= sd_netlink_message_exit_container(message
);
448 return log_netdev_error_errno(netdev
, r
, "Could not exit container: %m");
450 if (netdev
->kind
== NETDEV_KIND_TAP
)
451 /* the kernel does not distinguish between tun and tap */
454 kind
= netdev_kind_to_string(netdev
->kind
);
456 log_netdev_error(netdev
, "Could not get kind");
457 netdev_enter_failed(netdev
);
462 if (!streq(kind
, received_kind
)) {
463 log_netdev_error(netdev
, "Received newlink with wrong KIND %s, expected %s",
464 received_kind
, kind
);
465 netdev_enter_failed(netdev
);
469 netdev
->ifindex
= ifindex
;
471 log_netdev_debug(netdev
, "netdev has index %d", netdev
->ifindex
);
473 netdev_enter_ready(netdev
);
478 #define HASH_KEY SD_ID128_MAKE(52,e1,45,bd,00,6f,29,96,21,c6,30,6d,83,71,04,48)
480 int netdev_get_mac(const char *ifname
, struct ether_addr
**ret
) {
481 _cleanup_free_
struct ether_addr
*mac
= NULL
;
490 mac
= new0(struct ether_addr
, 1);
495 sz
= sizeof(sd_id128_t
) + l
;
496 v
= newa(uint8_t, sz
);
498 /* fetch some persistent data unique to the machine */
499 r
= sd_id128_get_machine((sd_id128_t
*) v
);
503 /* combine with some data unique (on this machine) to this
505 memcpy(v
+ sizeof(sd_id128_t
), ifname
, l
);
507 /* Let's hash the host machine ID plus the container name. We
508 * use a fixed, but originally randomly created hash key here. */
509 result
= siphash24(v
, sz
, HASH_KEY
.bytes
);
511 assert_cc(ETH_ALEN
<= sizeof(result
));
512 memcpy(mac
->ether_addr_octet
, &result
, ETH_ALEN
);
514 /* see eth_random_addr in the kernel */
515 mac
->ether_addr_octet
[0] &= 0xfe; /* clear multicast bit */
516 mac
->ether_addr_octet
[0] |= 0x02; /* set local assignment bit (IEEE802) */
518 *ret
= TAKE_PTR(mac
);
523 static int netdev_create(NetDev
*netdev
, Link
*link
, link_netlink_message_handler_t callback
) {
527 assert(!link
|| callback
);
530 if (NETDEV_VTABLE(netdev
)->create
) {
533 r
= NETDEV_VTABLE(netdev
)->create(netdev
);
537 log_netdev_debug(netdev
, "Created");
539 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*m
= NULL
;
541 r
= sd_rtnl_message_new_link(netdev
->manager
->rtnl
, &m
, RTM_NEWLINK
, 0);
543 return log_netdev_error_errno(netdev
, r
, "Could not allocate RTM_NEWLINK message: %m");
545 r
= sd_netlink_message_append_string(m
, IFLA_IFNAME
, netdev
->ifname
);
547 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_IFNAME, attribute: %m");
550 r
= sd_netlink_message_append_ether_addr(m
, IFLA_ADDRESS
, netdev
->mac
);
552 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_ADDRESS attribute: %m");
555 if (netdev
->mtu
!= 0) {
556 r
= sd_netlink_message_append_u32(m
, IFLA_MTU
, netdev
->mtu
);
558 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_MTU attribute: %m");
562 r
= sd_netlink_message_append_u32(m
, IFLA_LINK
, link
->ifindex
);
564 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_LINK attribute: %m");
567 r
= sd_netlink_message_open_container(m
, IFLA_LINKINFO
);
569 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_LINKINFO attribute: %m");
571 r
= sd_netlink_message_open_container_union(m
, IFLA_INFO_DATA
, netdev_kind_to_string(netdev
->kind
));
573 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_INFO_DATA attribute: %m");
575 if (NETDEV_VTABLE(netdev
)->fill_message_create
) {
576 r
= NETDEV_VTABLE(netdev
)->fill_message_create(netdev
, link
, m
);
581 r
= sd_netlink_message_close_container(m
);
583 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_INFO_DATA attribute: %m");
585 r
= sd_netlink_message_close_container(m
);
587 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_LINKINFO attribute: %m");
590 r
= netlink_call_async(netdev
->manager
->rtnl
, NULL
, m
, callback
,
591 link_netlink_destroy_callback
, link
);
593 return log_netdev_error_errno(netdev
, r
, "Could not send rtnetlink message: %m");
597 r
= netlink_call_async(netdev
->manager
->rtnl
, NULL
, m
, netdev_create_handler
,
598 netdev_destroy_callback
, netdev
);
600 return log_netdev_error_errno(netdev
, r
, "Could not send rtnetlink message: %m");
605 netdev
->state
= NETDEV_STATE_CREATING
;
607 log_netdev_debug(netdev
, "Creating");
613 static int netdev_create_after_configured(NetDev
*netdev
, Link
*link
) {
616 assert(NETDEV_VTABLE(netdev
)->create_after_configured
);
618 return NETDEV_VTABLE(netdev
)->create_after_configured(netdev
, link
);
621 /* the callback must be called, possibly after a timeout, as otherwise the Link will hang */
622 int netdev_join(NetDev
*netdev
, Link
*link
, link_netlink_message_handler_t callback
) {
626 assert(netdev
->manager
);
627 assert(netdev
->manager
->rtnl
);
629 switch (netdev_get_create_type(netdev
)) {
630 case NETDEV_CREATE_MASTER
:
631 r
= netdev_enslave(netdev
, link
, callback
);
636 case NETDEV_CREATE_STACKED
:
637 r
= netdev_create(netdev
, link
, callback
);
642 case NETDEV_CREATE_AFTER_CONFIGURED
:
643 r
= netdev_create_after_configured(netdev
, link
);
648 assert_not_reached("Cannot join independent netdev");
654 int netdev_load_one(Manager
*manager
, const char *filename
) {
655 _cleanup_(netdev_unrefp
) NetDev
*netdev_raw
= NULL
, *netdev
= NULL
;
656 _cleanup_fclose_
FILE *file
= NULL
;
657 const char *dropin_dirname
;
658 bool independent
= false;
664 file
= fopen(filename
, "re");
672 if (null_or_empty_fd(fileno(file
))) {
673 log_debug("Skipping empty file: %s", filename
);
677 netdev_raw
= new(NetDev
, 1);
681 *netdev_raw
= (NetDev
) {
683 .kind
= _NETDEV_KIND_INVALID
,
684 .state
= _NETDEV_STATE_INVALID
, /* an invalid state means done() of the implementation won't be called on destruction */
687 dropin_dirname
= strjoina(basename(filename
), ".d");
688 r
= config_parse_many(
689 filename
, NETWORK_DIRS
, dropin_dirname
,
690 NETDEV_COMMON_SECTIONS NETDEV_OTHER_SECTIONS
,
691 config_item_perf_lookup
, network_netdev_gperf_lookup
,
698 /* skip out early if configuration does not match the environment */
699 if (!condition_test_list(netdev_raw
->conditions
, environ
, NULL
, NULL
, NULL
)) {
700 log_debug("%s: Conditions in the file do not match the system environment, skipping.", filename
);
704 if (netdev_raw
->kind
== _NETDEV_KIND_INVALID
) {
705 log_warning("NetDev has no Kind= configured in %s. Ignoring", filename
);
709 if (!netdev_raw
->ifname
) {
710 log_warning("NetDev without Name= configured in %s. Ignoring", filename
);
714 r
= fseek(file
, 0, SEEK_SET
);
718 netdev
= malloc0(NETDEV_VTABLE(netdev_raw
)->object_size
);
723 netdev
->manager
= manager
;
724 netdev
->kind
= netdev_raw
->kind
;
725 netdev
->state
= NETDEV_STATE_LOADING
; /* we initialize the state here for the first time,
726 so that done() will be called on destruction */
728 if (NETDEV_VTABLE(netdev
)->init
)
729 NETDEV_VTABLE(netdev
)->init(netdev
);
731 r
= config_parse_many(
732 filename
, NETWORK_DIRS
, dropin_dirname
,
733 NETDEV_VTABLE(netdev
)->sections
,
734 config_item_perf_lookup
, network_netdev_gperf_lookup
,
740 /* verify configuration */
741 if (NETDEV_VTABLE(netdev
)->config_verify
) {
742 r
= NETDEV_VTABLE(netdev
)->config_verify(netdev
, filename
);
747 netdev
->filename
= strdup(filename
);
748 if (!netdev
->filename
)
751 if (!netdev
->mac
&& NETDEV_VTABLE(netdev
)->generate_mac
) {
752 r
= netdev_get_mac(netdev
->ifname
, &netdev
->mac
);
754 return log_netdev_error_errno(netdev
, r
,
755 "Failed to generate predictable MAC address for %s: %m",
759 r
= hashmap_ensure_put(&netdev
->manager
->netdevs
, &string_hash_ops
, netdev
->ifname
, netdev
);
763 NetDev
*n
= hashmap_get(netdev
->manager
->netdevs
, netdev
->ifname
);
766 if (!streq(netdev
->filename
, n
->filename
))
767 log_netdev_warning_errno(netdev
, r
,
768 "The setting Name=%s in %s conflicts with the one in %s, ignoring",
769 netdev
->ifname
, netdev
->filename
, n
->filename
);
771 /* Clear ifname before netdev_free() is called. Otherwise, the NetDev object 'n' is
772 * removed from the hashmap 'manager->netdevs'. */
773 netdev
->ifname
= mfree(netdev
->ifname
);
779 LIST_HEAD_INIT(netdev
->callbacks
);
781 log_netdev_debug(netdev
, "loaded %s", netdev_kind_to_string(netdev
->kind
));
783 if (IN_SET(netdev_get_create_type(netdev
), NETDEV_CREATE_MASTER
, NETDEV_CREATE_INDEPENDENT
)) {
784 r
= netdev_create(netdev
, NULL
, NULL
);
789 switch (netdev
->kind
) {
790 case NETDEV_KIND_IPIP
:
791 independent
= IPIP(netdev
)->independent
;
793 case NETDEV_KIND_GRE
:
794 independent
= GRE(netdev
)->independent
;
796 case NETDEV_KIND_GRETAP
:
797 independent
= GRETAP(netdev
)->independent
;
799 case NETDEV_KIND_IP6GRE
:
800 independent
= IP6GRE(netdev
)->independent
;
802 case NETDEV_KIND_IP6GRETAP
:
803 independent
= IP6GRETAP(netdev
)->independent
;
805 case NETDEV_KIND_SIT
:
806 independent
= SIT(netdev
)->independent
;
808 case NETDEV_KIND_VTI
:
809 independent
= VTI(netdev
)->independent
;
811 case NETDEV_KIND_VTI6
:
812 independent
= VTI6(netdev
)->independent
;
814 case NETDEV_KIND_IP6TNL
:
815 independent
= IP6TNL(netdev
)->independent
;
817 case NETDEV_KIND_ERSPAN
:
818 independent
= ERSPAN(netdev
)->independent
;
820 case NETDEV_KIND_XFRM
:
821 independent
= XFRM(netdev
)->independent
;
823 case NETDEV_KIND_VXLAN
:
824 independent
= VXLAN(netdev
)->independent
;
831 r
= netdev_create(netdev
, NULL
, NULL
);
841 int netdev_load(Manager
*manager
, bool reload
) {
842 _cleanup_strv_free_
char **files
= NULL
;
849 hashmap_clear_with_destructor(manager
->netdevs
, netdev_unref
);
851 r
= conf_files_list_strv(&files
, ".netdev", NULL
, 0, NETWORK_DIRS
);
853 return log_error_errno(r
, "Failed to enumerate netdev files: %m");
855 STRV_FOREACH(f
, files
) {
856 r
= netdev_load_one(manager
, *f
);
858 log_error_errno(r
, "Failed to load %s, ignoring: %m", *f
);