]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/network/networkd-fdb.c
Merge pull request #12753 from jrouleau/fix/hibernate-resume-timeout
[thirdparty/systemd.git] / src / network / networkd-fdb.c
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
b98b483b 2/***
810adae9 3 Copyright © 2014 Intel Corporation. All rights reserved.
b98b483b
AR
4***/
5
b98b483b 6#include <net/ethernet.h>
cf0fbc49 7#include <net/if.h>
b98b483b 8
b5efdb8a 9#include "alloc-util.h"
b98b483b 10#include "conf-parser.h"
23f53b99 11#include "netdev/bridge.h"
61b824c5 12#include "netdev/vxlan.h"
fc2f9534 13#include "netlink-util.h"
fc2f9534 14#include "networkd-fdb.h"
23f53b99 15#include "networkd-manager.h"
61b824c5
SS
16#include "parse-util.h"
17#include "string-util.h"
bdb397ed 18#include "string-table.h"
b5efdb8a 19#include "util.h"
0e83e7a5 20#include "vlan-util.h"
b98b483b 21
8c34b963
LP
22#define STATIC_FDB_ENTRIES_PER_NETWORK_MAX 1024U
23
bdb397ed
SS
24static const char* const fdb_ntf_flags_table[_NEIGHBOR_CACHE_ENTRY_FLAGS_MAX] = {
25 [NEIGHBOR_CACHE_ENTRY_FLAGS_USE] = "use",
26 [NEIGHBOR_CACHE_ENTRY_FLAGS_SELF] = "self",
27 [NEIGHBOR_CACHE_ENTRY_FLAGS_MASTER] = "master",
28 [NEIGHBOR_CACHE_ENTRY_FLAGS_ROUTER] = "router",
29};
30
31DEFINE_STRING_TABLE_LOOKUP(fdb_ntf_flags, NeighborCacheEntryFlags);
32
b98b483b 33/* create a new FDB entry or get an existing one. */
9560e5b3 34static int fdb_entry_new_static(
8c34b963 35 Network *network,
1a75764a
YW
36 const char *filename,
37 unsigned section_line,
8c34b963
LP
38 FdbEntry **ret) {
39
1a75764a 40 _cleanup_(network_config_section_freep) NetworkConfigSection *n = NULL;
8e766630 41 _cleanup_(fdb_entry_freep) FdbEntry *fdb_entry = NULL;
1a75764a
YW
42 _cleanup_free_ struct ether_addr *mac_addr = NULL;
43 int r;
b98b483b
AR
44
45 assert(network);
8c34b963 46 assert(ret);
1a75764a 47 assert(!!filename == (section_line > 0));
b98b483b
AR
48
49 /* search entry in hashmap first. */
1a75764a
YW
50 if (filename) {
51 r = network_config_section_new(filename, section_line, &n);
52 if (r < 0)
53 return r;
54
55 fdb_entry = hashmap_get(network->fdb_entries_by_section, n);
b98b483b 56 if (fdb_entry) {
1cc6c93a 57 *ret = TAKE_PTR(fdb_entry);
b98b483b
AR
58
59 return 0;
60 }
61 }
62
8c34b963
LP
63 if (network->n_static_fdb_entries >= STATIC_FDB_ENTRIES_PER_NETWORK_MAX)
64 return -E2BIG;
65
b98b483b
AR
66 /* allocate space for MAC address. */
67 mac_addr = new0(struct ether_addr, 1);
68 if (!mac_addr)
69 return -ENOMEM;
70
71 /* allocate space for and FDB entry. */
1a75764a
YW
72 fdb_entry = new(FdbEntry, 1);
73 if (!fdb_entry)
b98b483b 74 return -ENOMEM;
b98b483b
AR
75
76 /* init FDB structure. */
1a75764a
YW
77 *fdb_entry = (FdbEntry) {
78 .network = network,
79 .mac_addr = TAKE_PTR(mac_addr),
61b824c5 80 .vni = VXLAN_VID_MAX + 1,
bdb397ed 81 .fdb_ntf_flags = NEIGHBOR_CACHE_ENTRY_FLAGS_SELF,
1a75764a 82 };
b98b483b
AR
83
84 LIST_PREPEND(static_fdb_entries, network->static_fdb_entries, fdb_entry);
8c34b963 85 network->n_static_fdb_entries++;
b98b483b 86
1a75764a
YW
87 if (filename) {
88 fdb_entry->section = TAKE_PTR(n);
89
3e570042
YW
90 r = hashmap_ensure_allocated(&network->fdb_entries_by_section, &network_config_hash_ops);
91 if (r < 0)
92 return r;
93
1a75764a
YW
94 r = hashmap_put(network->fdb_entries_by_section, fdb_entry->section, fdb_entry);
95 if (r < 0)
96 return r;
b98b483b
AR
97 }
98
99 /* return allocated FDB structure. */
1cc6c93a 100 *ret = TAKE_PTR(fdb_entry);
b98b483b
AR
101
102 return 0;
103}
104
302a796f 105static int set_fdb_handler(sd_netlink *rtnl, sd_netlink_message *m, Link *link) {
b98b483b
AR
106 int r;
107
ea6ec096 108 assert(link);
b98b483b 109
1c4baffc 110 r = sd_netlink_message_get_errno(m);
ea6ec096 111 if (r < 0 && r != -EEXIST)
6a7a4e4d 112 log_link_error_errno(link, r, "Could not add FDB entry: %m");
b98b483b
AR
113
114 return 1;
115}
116
117/* send a request to the kernel to add a FDB entry in its static MAC table. */
a60a720c 118int fdb_entry_configure(Link *link, FdbEntry *fdb_entry) {
4afd3348 119 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
61b824c5 120 int r;
b98b483b 121
ea6ec096 122 assert(link);
f6bb7ac5 123 assert(link->network);
ea6ec096 124 assert(link->manager);
b98b483b 125 assert(fdb_entry);
ea6ec096 126
bafa9641 127 if (fdb_entry->family == AF_INET6 && link_sysctl_ipv6_enabled(link) == 0) {
b0ab85a2
YW
128 log_link_warning(link, "An IPv6 fdb entry is requested, but IPv6 is disabled by sysctl, ignoring.");
129 return 0;
130 }
131
b98b483b 132 /* create new RTM message */
bdb397ed 133 r = sd_rtnl_message_new_neigh(link->manager->rtnl, &req, RTM_NEWNEIGH, link->ifindex, PF_BRIDGE);
b98b483b
AR
134 if (r < 0)
135 return rtnl_log_create_error(r);
136
bdb397ed 137 r = sd_rtnl_message_neigh_set_flags(req, fdb_entry->fdb_ntf_flags);
b98b483b
AR
138 if (r < 0)
139 return rtnl_log_create_error(r);
140
141 /* only NUD_PERMANENT state supported. */
142 r = sd_rtnl_message_neigh_set_state(req, NUD_NOARP | NUD_PERMANENT);
143 if (r < 0)
144 return rtnl_log_create_error(r);
145
1c4baffc 146 r = sd_netlink_message_append_ether_addr(req, NDA_LLADDR, fdb_entry->mac_addr);
b98b483b
AR
147 if (r < 0)
148 return rtnl_log_create_error(r);
149
150 /* VLAN Id is optional. We'll add VLAN Id only if it's specified. */
f143c650 151 if (fdb_entry->vlan_id > 0) {
1c4baffc 152 r = sd_netlink_message_append_u16(req, NDA_VLAN, fdb_entry->vlan_id);
b98b483b
AR
153 if (r < 0)
154 return rtnl_log_create_error(r);
155 }
156
c2c2793f
SS
157 if (!in_addr_is_null(fdb_entry->family, &fdb_entry->destination_addr)) {
158 r = netlink_message_append_in_addr_union(req, NDA_DST, fdb_entry->family, &fdb_entry->destination_addr);
159 if (r < 0)
160 return log_link_error_errno(link, r, "Could not append NDA_DST attribute: %m");
161 }
162
61b824c5
SS
163 if (fdb_entry->vni <= VXLAN_VID_MAX) {
164 r = sd_netlink_message_append_u32(req, NDA_VNI, fdb_entry->vni);
165 if (r < 0)
166 return log_link_error_errno(link, r, "Could not append NDA_VNI attribute: %m");
167 }
168
b98b483b 169 /* send message to the kernel to update its internal static MAC table. */
bdb397ed 170 r = netlink_call_async(link->manager->rtnl, NULL, req, set_fdb_handler,
302a796f 171 link_netlink_destroy_callback, link);
6a7a4e4d
LP
172 if (r < 0)
173 return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
b98b483b 174
1046bf9b
YW
175 link_ref(link);
176
b0ab85a2 177 return 1;
b98b483b
AR
178}
179
180/* remove and FDB entry. */
181void fdb_entry_free(FdbEntry *fdb_entry) {
9ed794a3 182 if (!fdb_entry)
b98b483b
AR
183 return;
184
9ed794a3 185 if (fdb_entry->network) {
8c34b963 186 LIST_REMOVE(static_fdb_entries, fdb_entry->network->static_fdb_entries, fdb_entry);
8c34b963
LP
187 assert(fdb_entry->network->n_static_fdb_entries > 0);
188 fdb_entry->network->n_static_fdb_entries--;
b98b483b 189
8519d8f5 190 if (fdb_entry->section)
1a75764a 191 hashmap_remove(fdb_entry->network->fdb_entries_by_section, fdb_entry->section);
b98b483b
AR
192 }
193
1a75764a 194 network_config_section_free(fdb_entry->section);
b98b483b 195 free(fdb_entry->mac_addr);
b98b483b
AR
196 free(fdb_entry);
197}
198
199/* parse the HW address from config files. */
8519d8f5
LP
200int config_parse_fdb_hwaddr(
201 const char *unit,
202 const char *filename,
203 unsigned line,
204 const char *section,
205 unsigned section_line,
206 const char *lvalue,
207 int ltype,
208 const char *rvalue,
209 void *data,
210 void *userdata) {
211
b98b483b 212 Network *network = userdata;
fcbf4cb7 213 _cleanup_(fdb_entry_free_or_set_invalidp) FdbEntry *fdb_entry = NULL;
b98b483b
AR
214 int r;
215
216 assert(filename);
217 assert(section);
218 assert(lvalue);
219 assert(rvalue);
220 assert(data);
221
1a75764a 222 r = fdb_entry_new_static(network, filename, section_line, &fdb_entry);
6a7a4e4d
LP
223 if (r < 0)
224 return log_oom();
b98b483b
AR
225
226 /* read in the MAC address for the FDB table. */
227 r = sscanf(rvalue, "%02hhx:%02hhx:%02hhx:%02hhx:%02hhx:%02hhx",
228 &fdb_entry->mac_addr->ether_addr_octet[0],
229 &fdb_entry->mac_addr->ether_addr_octet[1],
230 &fdb_entry->mac_addr->ether_addr_octet[2],
231 &fdb_entry->mac_addr->ether_addr_octet[3],
232 &fdb_entry->mac_addr->ether_addr_octet[4],
233 &fdb_entry->mac_addr->ether_addr_octet[5]);
234
8627d112 235 if (r != ETHER_ADDR_LEN) {
12ca818f 236 log_syntax(unit, LOG_ERR, filename, line, 0, "Not a valid MAC address, ignoring assignment: %s", rvalue);
b98b483b
AR
237 return 0;
238 }
239
240 fdb_entry = NULL;
241
242 return 0;
243}
244
245/* parse the VLAN Id from config files. */
8519d8f5
LP
246int config_parse_fdb_vlan_id(
247 const char *unit,
248 const char *filename,
249 unsigned line,
250 const char *section,
251 unsigned section_line,
252 const char *lvalue,
253 int ltype,
254 const char *rvalue,
255 void *data,
256 void *userdata) {
257
b98b483b 258 Network *network = userdata;
fcbf4cb7 259 _cleanup_(fdb_entry_free_or_set_invalidp) FdbEntry *fdb_entry = NULL;
b98b483b
AR
260 int r;
261
262 assert(filename);
263 assert(section);
264 assert(lvalue);
265 assert(rvalue);
266 assert(data);
267
1a75764a 268 r = fdb_entry_new_static(network, filename, section_line, &fdb_entry);
6a7a4e4d
LP
269 if (r < 0)
270 return log_oom();
b98b483b 271
0e83e7a5
TJ
272 r = config_parse_vlanid(unit, filename, line, section,
273 section_line, lvalue, ltype,
274 rvalue, &fdb_entry->vlan_id, userdata);
6a7a4e4d 275 if (r < 0)
b98b483b 276 return r;
b98b483b
AR
277
278 fdb_entry = NULL;
279
280 return 0;
281}
c2c2793f
SS
282
283int config_parse_fdb_destination(
284 const char *unit,
285 const char *filename,
286 unsigned line,
287 const char *section,
288 unsigned section_line,
289 const char *lvalue,
290 int ltype,
291 const char *rvalue,
292 void *data,
293 void *userdata) {
294
295 _cleanup_(fdb_entry_free_or_set_invalidp) FdbEntry *fdb_entry = NULL;
296 Network *network = userdata;
297 int r;
298
299 assert(filename);
300 assert(section);
301 assert(lvalue);
302 assert(rvalue);
303 assert(data);
304
305 r = fdb_entry_new_static(network, filename, section_line, &fdb_entry);
306 if (r < 0)
307 return log_oom();
308
309 r = in_addr_from_string_auto(rvalue, &fdb_entry->family, &fdb_entry->destination_addr);
310 if (r < 0)
311 return log_syntax(unit, LOG_ERR, filename, line, r,
312 "FDB destination IP address is invalid, ignoring assignment: %s",
313 rvalue);
314
315 fdb_entry = NULL;
316
317 return 0;
318}
61b824c5
SS
319
320int config_parse_fdb_vxlan_vni(
321 const char *unit,
322 const char *filename,
323 unsigned line,
324 const char *section,
325 unsigned section_line,
326 const char *lvalue,
327 int ltype,
328 const char *rvalue,
329 void *data,
330 void *userdata) {
331
332 _cleanup_(fdb_entry_free_or_set_invalidp) FdbEntry *fdb_entry = NULL;
333 Network *network = userdata;
334 uint32_t vni;
335 int r;
336
337 assert(filename);
338 assert(section);
339 assert(lvalue);
340 assert(rvalue);
341 assert(data);
342
343 r = fdb_entry_new_static(network, filename, section_line, &fdb_entry);
344 if (r < 0)
345 return log_oom();
346
347 r = safe_atou32(rvalue, &vni);
348 if (r < 0) {
349 log_syntax(unit, LOG_ERR, filename, line, r,
350 "Failed to parse VXLAN Network Identifier (VNI), ignoring assignment: %s",
351 rvalue);
352 return 0;
353 }
354
355 if (vni > VXLAN_VID_MAX) {
356 log_syntax(unit, LOG_ERR, filename, line, 0,
357 "FDB invalid VXLAN Network Identifier (VNI), ignoring assignment: %s",
358 rvalue);
359 return 0;
360 }
361
362 fdb_entry->vni = vni;
363 fdb_entry = NULL;
364
365 return 0;
366}
bdb397ed
SS
367
368
369int config_parse_fdb_ntf_flags(
370 const char *unit,
371 const char *filename,
372 unsigned line,
373 const char *section,
374 unsigned section_line,
375 const char *lvalue,
376 int ltype,
377 const char *rvalue,
378 void *data,
379 void *userdata) {
380
381 _cleanup_(fdb_entry_free_or_set_invalidp) FdbEntry *fdb_entry = NULL;
382 Network *network = userdata;
383 NeighborCacheEntryFlags f;
384 int r;
385
386 assert(filename);
387 assert(section);
388 assert(lvalue);
389 assert(rvalue);
390 assert(data);
391
392 r = fdb_entry_new_static(network, filename, section_line, &fdb_entry);
393 if (r < 0)
394 return log_oom();
395
396 f = fdb_ntf_flags_from_string(rvalue);
397 if (f < 0) {
398 log_syntax(unit, LOG_ERR, filename, line, 0,
399 "FDB failed to parse AssociatedWith=, ignoring assignment: %s",
400 rvalue);
401 return 0;
402 }
403
404 fdb_entry->fdb_ntf_flags = f;
405 fdb_entry = NULL;
406
407 return 0;
408}