2 This file is part of systemd.
4 Copyright 2013 Tom Gundersen <teg@jklm.no>
6 systemd is free software; you can redistribute it and/or modify it
7 under the terms of the GNU Lesser General Public License as published by
8 the Free Software Foundation; either version 2.1 of the License, or
9 (at your option) any later version.
11 systemd is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 Lesser General Public License for more details.
16 You should have received a copy of the GNU Lesser General Public License
17 along with systemd; If not, see <http://www.gnu.org/licenses/>.
22 #include "alloc-util.h"
23 #include "conf-files.h"
24 #include "conf-parser.h"
27 #include "netlink-util.h"
28 #include "network-internal.h"
29 #include "netdev/netdev.h"
30 #include "networkd-manager.h"
31 #include "siphash24.h"
32 #include "stat-util.h"
33 #include "string-table.h"
34 #include "string-util.h"
36 #include "netdev/bridge.h"
37 #include "netdev/bond.h"
38 #include "netdev/geneve.h"
39 #include "netdev/vlan.h"
40 #include "netdev/macvlan.h"
41 #include "netdev/ipvlan.h"
42 #include "netdev/vxlan.h"
43 #include "netdev/tunnel.h"
44 #include "netdev/tuntap.h"
45 #include "netdev/veth.h"
46 #include "netdev/dummy.h"
47 #include "netdev/vrf.h"
48 #include "netdev/vcan.h"
50 const NetDevVTable
* const netdev_vtable
[_NETDEV_KIND_MAX
] = {
51 [NETDEV_KIND_BRIDGE
] = &bridge_vtable
,
52 [NETDEV_KIND_BOND
] = &bond_vtable
,
53 [NETDEV_KIND_VLAN
] = &vlan_vtable
,
54 [NETDEV_KIND_MACVLAN
] = &macvlan_vtable
,
55 [NETDEV_KIND_MACVTAP
] = &macvtap_vtable
,
56 [NETDEV_KIND_IPVLAN
] = &ipvlan_vtable
,
57 [NETDEV_KIND_VXLAN
] = &vxlan_vtable
,
58 [NETDEV_KIND_IPIP
] = &ipip_vtable
,
59 [NETDEV_KIND_GRE
] = &gre_vtable
,
60 [NETDEV_KIND_GRETAP
] = &gretap_vtable
,
61 [NETDEV_KIND_IP6GRE
] = &ip6gre_vtable
,
62 [NETDEV_KIND_IP6GRETAP
] = &ip6gretap_vtable
,
63 [NETDEV_KIND_SIT
] = &sit_vtable
,
64 [NETDEV_KIND_VTI
] = &vti_vtable
,
65 [NETDEV_KIND_VTI6
] = &vti6_vtable
,
66 [NETDEV_KIND_VETH
] = &veth_vtable
,
67 [NETDEV_KIND_DUMMY
] = &dummy_vtable
,
68 [NETDEV_KIND_TUN
] = &tun_vtable
,
69 [NETDEV_KIND_TAP
] = &tap_vtable
,
70 [NETDEV_KIND_IP6TNL
] = &ip6tnl_vtable
,
71 [NETDEV_KIND_VRF
] = &vrf_vtable
,
72 [NETDEV_KIND_VCAN
] = &vcan_vtable
,
73 [NETDEV_KIND_GENEVE
] = &geneve_vtable
,
76 static const char* const netdev_kind_table
[_NETDEV_KIND_MAX
] = {
77 [NETDEV_KIND_BRIDGE
] = "bridge",
78 [NETDEV_KIND_BOND
] = "bond",
79 [NETDEV_KIND_VLAN
] = "vlan",
80 [NETDEV_KIND_MACVLAN
] = "macvlan",
81 [NETDEV_KIND_MACVTAP
] = "macvtap",
82 [NETDEV_KIND_IPVLAN
] = "ipvlan",
83 [NETDEV_KIND_VXLAN
] = "vxlan",
84 [NETDEV_KIND_IPIP
] = "ipip",
85 [NETDEV_KIND_GRE
] = "gre",
86 [NETDEV_KIND_GRETAP
] = "gretap",
87 [NETDEV_KIND_IP6GRE
] = "ip6gre",
88 [NETDEV_KIND_IP6GRETAP
] = "ip6gretap",
89 [NETDEV_KIND_SIT
] = "sit",
90 [NETDEV_KIND_VETH
] = "veth",
91 [NETDEV_KIND_VTI
] = "vti",
92 [NETDEV_KIND_VTI6
] = "vti6",
93 [NETDEV_KIND_DUMMY
] = "dummy",
94 [NETDEV_KIND_TUN
] = "tun",
95 [NETDEV_KIND_TAP
] = "tap",
96 [NETDEV_KIND_IP6TNL
] = "ip6tnl",
97 [NETDEV_KIND_VRF
] = "vrf",
98 [NETDEV_KIND_VCAN
] = "vcan",
99 [NETDEV_KIND_GENEVE
] = "geneve",
102 DEFINE_STRING_TABLE_LOOKUP(netdev_kind
, NetDevKind
);
103 DEFINE_CONFIG_PARSE_ENUM(config_parse_netdev_kind
, netdev_kind
, NetDevKind
, "Failed to parse netdev kind");
105 static void netdev_cancel_callbacks(NetDev
*netdev
) {
106 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*m
= NULL
;
107 netdev_join_callback
*callback
;
112 rtnl_message_new_synthetic_error(-ENODEV
, 0, &m
);
114 while ((callback
= netdev
->callbacks
)) {
116 assert(callback
->link
);
117 assert(callback
->callback
);
118 assert(netdev
->manager
);
119 assert(netdev
->manager
->rtnl
);
121 callback
->callback(netdev
->manager
->rtnl
, m
, callback
->link
);
124 LIST_REMOVE(callbacks
, netdev
->callbacks
, callback
);
125 link_unref(callback
->link
);
130 static void netdev_free(NetDev
*netdev
) {
134 netdev_cancel_callbacks(netdev
);
137 hashmap_remove(netdev
->manager
->netdevs
, netdev
->ifname
);
139 free(netdev
->filename
);
141 free(netdev
->description
);
142 free(netdev
->ifname
);
145 condition_free_list(netdev
->match_host
);
146 condition_free_list(netdev
->match_virt
);
147 condition_free_list(netdev
->match_kernel
);
148 condition_free_list(netdev
->match_arch
);
150 if (NETDEV_VTABLE(netdev
) &&
151 NETDEV_VTABLE(netdev
)->done
)
152 NETDEV_VTABLE(netdev
)->done(netdev
);
157 NetDev
*netdev_unref(NetDev
*netdev
) {
158 if (netdev
&& (-- netdev
->n_ref
<= 0))
164 NetDev
*netdev_ref(NetDev
*netdev
) {
166 assert_se(++ netdev
->n_ref
>= 2);
171 void netdev_drop(NetDev
*netdev
) {
172 if (!netdev
|| netdev
->state
== NETDEV_STATE_LINGER
)
175 netdev
->state
= NETDEV_STATE_LINGER
;
177 log_netdev_debug(netdev
, "netdev removed");
179 netdev_cancel_callbacks(netdev
);
181 netdev_unref(netdev
);
186 int netdev_get(Manager
*manager
, const char *name
, NetDev
**ret
) {
193 netdev
= hashmap_get(manager
->netdevs
, name
);
204 static int netdev_enter_failed(NetDev
*netdev
) {
205 netdev
->state
= NETDEV_STATE_FAILED
;
207 netdev_cancel_callbacks(netdev
);
212 static int netdev_enslave_ready(NetDev
*netdev
, Link
* link
, sd_netlink_message_handler_t callback
) {
213 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*req
= NULL
;
217 assert(netdev
->state
== NETDEV_STATE_READY
);
218 assert(netdev
->manager
);
219 assert(netdev
->manager
->rtnl
);
220 assert(IN_SET(netdev
->kind
, NETDEV_KIND_BRIDGE
, NETDEV_KIND_BOND
, NETDEV_KIND_VRF
));
224 r
= sd_rtnl_message_new_link(netdev
->manager
->rtnl
, &req
, RTM_SETLINK
, link
->ifindex
);
226 return log_netdev_error_errno(netdev
, r
, "Could not allocate RTM_SETLINK message: %m");
228 r
= sd_netlink_message_append_u32(req
, IFLA_MASTER
, netdev
->ifindex
);
230 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_MASTER attribute: %m");
232 r
= sd_netlink_call_async(netdev
->manager
->rtnl
, req
, callback
, link
, 0, NULL
);
234 return log_netdev_error(netdev
, "Could not send rtnetlink message: %m");
238 log_netdev_debug(netdev
, "Enslaving link '%s'", link
->ifname
);
243 static int netdev_enter_ready(NetDev
*netdev
) {
244 netdev_join_callback
*callback
, *callback_next
;
248 assert(netdev
->ifname
);
250 if (netdev
->state
!= NETDEV_STATE_CREATING
)
253 netdev
->state
= NETDEV_STATE_READY
;
255 log_netdev_info(netdev
, "netdev ready");
257 LIST_FOREACH_SAFE(callbacks
, callback
, callback_next
, netdev
->callbacks
) {
258 /* enslave the links that were attempted to be enslaved before the
260 r
= netdev_enslave_ready(netdev
, callback
->link
, callback
->callback
);
264 LIST_REMOVE(callbacks
, netdev
->callbacks
, callback
);
265 link_unref(callback
->link
);
269 if (NETDEV_VTABLE(netdev
)->post_create
)
270 NETDEV_VTABLE(netdev
)->post_create(netdev
, NULL
, NULL
);
275 /* callback for netdev's created without a backing Link */
276 static int netdev_create_handler(sd_netlink
*rtnl
, sd_netlink_message
*m
, void *userdata
) {
277 _cleanup_netdev_unref_ NetDev
*netdev
= userdata
;
280 assert(netdev
->state
!= _NETDEV_STATE_INVALID
);
282 r
= sd_netlink_message_get_errno(m
);
284 log_netdev_info(netdev
, "netdev exists, using existing without changing its parameters");
286 log_netdev_warning_errno(netdev
, r
, "netdev could not be created: %m");
292 log_netdev_debug(netdev
, "Created");
297 int netdev_enslave(NetDev
*netdev
, Link
*link
, sd_netlink_message_handler_t callback
) {
301 assert(netdev
->manager
);
302 assert(netdev
->manager
->rtnl
);
303 assert(IN_SET(netdev
->kind
, NETDEV_KIND_BRIDGE
, NETDEV_KIND_BOND
, NETDEV_KIND_VRF
));
305 if (netdev
->state
== NETDEV_STATE_READY
) {
306 r
= netdev_enslave_ready(netdev
, link
, callback
);
309 } else if (IN_SET(netdev
->state
, NETDEV_STATE_LINGER
, NETDEV_STATE_FAILED
)) {
310 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*m
= NULL
;
312 r
= rtnl_message_new_synthetic_error(-ENODEV
, 0, &m
);
314 callback(netdev
->manager
->rtnl
, m
, link
);
316 /* the netdev is not yet read, save this request for when it is */
317 netdev_join_callback
*cb
;
319 cb
= new0(netdev_join_callback
, 1);
323 cb
->callback
= callback
;
327 LIST_PREPEND(callbacks
, netdev
->callbacks
, cb
);
329 log_netdev_debug(netdev
, "Will enslave '%s', when ready", link
->ifname
);
335 int netdev_set_ifindex(NetDev
*netdev
, sd_netlink_message
*message
) {
338 const char *received_kind
;
339 const char *received_name
;
345 r
= sd_netlink_message_get_type(message
, &type
);
347 return log_netdev_error_errno(netdev
, r
, "Could not get rtnl message type: %m");
349 if (type
!= RTM_NEWLINK
) {
350 log_netdev_error(netdev
, "Cannot set ifindex from unexpected rtnl message type.");
354 r
= sd_rtnl_message_link_get_ifindex(message
, &ifindex
);
356 log_netdev_error_errno(netdev
, r
, "Could not get ifindex: %m");
357 netdev_enter_failed(netdev
);
359 } else if (ifindex
<= 0) {
360 log_netdev_error(netdev
, "Got invalid ifindex: %d", ifindex
);
361 netdev_enter_failed(netdev
);
365 if (netdev
->ifindex
> 0) {
366 if (netdev
->ifindex
!= ifindex
) {
367 log_netdev_error(netdev
, "Could not set ifindex to %d, already set to %d",
368 ifindex
, netdev
->ifindex
);
369 netdev_enter_failed(netdev
);
372 /* ifindex already set to the same for this netdev */
376 r
= sd_netlink_message_read_string(message
, IFLA_IFNAME
, &received_name
);
378 return log_netdev_error_errno(netdev
, r
, "Could not get IFNAME: %m");
380 if (!streq(netdev
->ifname
, received_name
)) {
381 log_netdev_error(netdev
, "Received newlink with wrong IFNAME %s", received_name
);
382 netdev_enter_failed(netdev
);
386 r
= sd_netlink_message_enter_container(message
, IFLA_LINKINFO
);
388 return log_netdev_error_errno(netdev
, r
, "Could not get LINKINFO: %m");
390 r
= sd_netlink_message_read_string(message
, IFLA_INFO_KIND
, &received_kind
);
392 return log_netdev_error_errno(netdev
, r
, "Could not get KIND: %m");
394 r
= sd_netlink_message_exit_container(message
);
396 return log_netdev_error_errno(netdev
, r
, "Could not exit container: %m");
398 if (netdev
->kind
== NETDEV_KIND_TAP
)
399 /* the kernel does not distinguish between tun and tap */
402 kind
= netdev_kind_to_string(netdev
->kind
);
404 log_netdev_error(netdev
, "Could not get kind");
405 netdev_enter_failed(netdev
);
410 if (!streq(kind
, received_kind
)) {
411 log_netdev_error(netdev
,
412 "Received newlink with wrong KIND %s, "
413 "expected %s", received_kind
, kind
);
414 netdev_enter_failed(netdev
);
418 netdev
->ifindex
= ifindex
;
420 log_netdev_debug(netdev
, "netdev has index %d", netdev
->ifindex
);
422 netdev_enter_ready(netdev
);
427 #define HASH_KEY SD_ID128_MAKE(52,e1,45,bd,00,6f,29,96,21,c6,30,6d,83,71,04,48)
429 int netdev_get_mac(const char *ifname
, struct ether_addr
**ret
) {
430 _cleanup_free_
struct ether_addr
*mac
= NULL
;
439 mac
= new0(struct ether_addr
, 1);
444 sz
= sizeof(sd_id128_t
) + l
;
447 /* fetch some persistent data unique to the machine */
448 r
= sd_id128_get_machine((sd_id128_t
*) v
);
452 /* combine with some data unique (on this machine) to this
454 memcpy(v
+ sizeof(sd_id128_t
), ifname
, l
);
456 /* Let's hash the host machine ID plus the container name. We
457 * use a fixed, but originally randomly created hash key here. */
458 result
= siphash24(v
, sz
, HASH_KEY
.bytes
);
460 assert_cc(ETH_ALEN
<= sizeof(result
));
461 memcpy(mac
->ether_addr_octet
, &result
, ETH_ALEN
);
463 /* see eth_random_addr in the kernel */
464 mac
->ether_addr_octet
[0] &= 0xfe; /* clear multicast bit */
465 mac
->ether_addr_octet
[0] |= 0x02; /* set local assignment bit (IEEE802) */
473 static int netdev_create(NetDev
*netdev
, Link
*link
,
474 sd_netlink_message_handler_t callback
) {
478 assert(!link
|| callback
);
481 if (NETDEV_VTABLE(netdev
)->create
) {
484 r
= NETDEV_VTABLE(netdev
)->create(netdev
);
488 log_netdev_debug(netdev
, "Created");
490 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*m
= NULL
;
492 r
= sd_rtnl_message_new_link(netdev
->manager
->rtnl
, &m
, RTM_NEWLINK
, 0);
494 return log_netdev_error_errno(netdev
, r
, "Could not allocate RTM_NEWLINK message: %m");
496 r
= sd_netlink_message_append_string(m
, IFLA_IFNAME
, netdev
->ifname
);
498 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_IFNAME, attribute: %m");
501 r
= sd_netlink_message_append_ether_addr(m
, IFLA_ADDRESS
, netdev
->mac
);
503 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_ADDRESS attribute: %m");
507 r
= sd_netlink_message_append_u32(m
, IFLA_MTU
, netdev
->mtu
);
509 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_MTU attribute: %m");
513 r
= sd_netlink_message_append_u32(m
, IFLA_LINK
, link
->ifindex
);
515 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_LINK attribute: %m");
518 r
= sd_netlink_message_open_container(m
, IFLA_LINKINFO
);
520 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_LINKINFO attribute: %m");
522 r
= sd_netlink_message_open_container_union(m
, IFLA_INFO_DATA
, netdev_kind_to_string(netdev
->kind
));
524 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_INFO_DATA attribute: %m");
526 if (NETDEV_VTABLE(netdev
)->fill_message_create
) {
527 r
= NETDEV_VTABLE(netdev
)->fill_message_create(netdev
, link
, m
);
532 r
= sd_netlink_message_close_container(m
);
534 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_INFO_DATA attribute: %m");
536 r
= sd_netlink_message_close_container(m
);
538 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_LINKINFO attribute: %m");
541 r
= sd_netlink_call_async(netdev
->manager
->rtnl
, m
, callback
, link
, 0, NULL
);
543 return log_netdev_error_errno(netdev
, r
, "Could not send rtnetlink message: %m");
547 r
= sd_netlink_call_async(netdev
->manager
->rtnl
, m
, netdev_create_handler
, netdev
, 0, NULL
);
549 return log_netdev_error_errno(netdev
, r
, "Could not send rtnetlink message: %m");
554 netdev
->state
= NETDEV_STATE_CREATING
;
556 log_netdev_debug(netdev
, "Creating");
562 /* the callback must be called, possibly after a timeout, as otherwise the Link will hang */
563 int netdev_join(NetDev
*netdev
, Link
*link
, sd_netlink_message_handler_t callback
) {
567 assert(netdev
->manager
);
568 assert(netdev
->manager
->rtnl
);
569 assert(NETDEV_VTABLE(netdev
));
571 switch (NETDEV_VTABLE(netdev
)->create_type
) {
572 case NETDEV_CREATE_MASTER
:
573 r
= netdev_enslave(netdev
, link
, callback
);
578 case NETDEV_CREATE_STACKED
:
579 r
= netdev_create(netdev
, link
, callback
);
585 assert_not_reached("Can not join independent netdev");
591 static int netdev_load_one(Manager
*manager
, const char *filename
) {
592 _cleanup_netdev_unref_ NetDev
*netdev
= NULL
;
593 _cleanup_free_ NetDev
*netdev_raw
= NULL
;
594 _cleanup_fclose_
FILE *file
= NULL
;
595 const char *dropin_dirname
;
601 file
= fopen(filename
, "re");
609 if (null_or_empty_fd(fileno(file
))) {
610 log_debug("Skipping empty file: %s", filename
);
614 netdev_raw
= new0(NetDev
, 1);
618 netdev_raw
->kind
= _NETDEV_KIND_INVALID
;
619 dropin_dirname
= strjoina(basename(filename
), ".d");
621 r
= config_parse_many(filename
, network_dirs
, dropin_dirname
,
623 config_item_perf_lookup
, network_netdev_gperf_lookup
,
628 r
= fseek(file
, 0, SEEK_SET
);
632 /* skip out early if configuration does not match the environment */
633 if (net_match_config(NULL
, NULL
, NULL
, NULL
, NULL
,
634 netdev_raw
->match_host
, netdev_raw
->match_virt
,
635 netdev_raw
->match_kernel
, netdev_raw
->match_arch
,
636 NULL
, NULL
, NULL
, NULL
, NULL
, NULL
) <= 0)
639 if (netdev_raw
->kind
== _NETDEV_KIND_INVALID
) {
640 log_warning("NetDev has no Kind configured in %s. Ignoring", filename
);
644 if (!netdev_raw
->ifname
) {
645 log_warning("NetDev without Name configured in %s. Ignoring", filename
);
649 netdev
= malloc0(NETDEV_VTABLE(netdev_raw
)->object_size
);
654 netdev
->manager
= manager
;
655 netdev
->state
= _NETDEV_STATE_INVALID
;
656 netdev
->kind
= netdev_raw
->kind
;
657 netdev
->ifname
= netdev_raw
->ifname
;
659 if (NETDEV_VTABLE(netdev
)->init
)
660 NETDEV_VTABLE(netdev
)->init(netdev
);
662 r
= config_parse(NULL
, filename
, file
,
663 NETDEV_VTABLE(netdev
)->sections
,
664 config_item_perf_lookup
, network_netdev_gperf_lookup
,
665 false, false, false, netdev
);
669 /* verify configuration */
670 if (NETDEV_VTABLE(netdev
)->config_verify
) {
671 r
= NETDEV_VTABLE(netdev
)->config_verify(netdev
, filename
);
676 netdev
->filename
= strdup(filename
);
677 if (!netdev
->filename
)
680 if (!netdev
->mac
&& netdev
->kind
!= NETDEV_KIND_VLAN
) {
681 r
= netdev_get_mac(netdev
->ifname
, &netdev
->mac
);
683 return log_error_errno(r
, "Failed to generate predictable MAC address for %s: %m", netdev
->ifname
);
686 r
= hashmap_put(netdev
->manager
->netdevs
, netdev
->ifname
, netdev
);
690 LIST_HEAD_INIT(netdev
->callbacks
);
692 log_netdev_debug(netdev
, "loaded %s", netdev_kind_to_string(netdev
->kind
));
694 switch (NETDEV_VTABLE(netdev
)->create_type
) {
695 case NETDEV_CREATE_MASTER
:
696 case NETDEV_CREATE_INDEPENDENT
:
697 r
= netdev_create(netdev
, NULL
, NULL
);
711 int netdev_load(Manager
*manager
) {
712 _cleanup_strv_free_
char **files
= NULL
;
719 while ((netdev
= hashmap_first(manager
->netdevs
)))
720 netdev_unref(netdev
);
722 r
= conf_files_list_strv(&files
, ".netdev", NULL
, network_dirs
);
724 return log_error_errno(r
, "Failed to enumerate netdev files: %m");
726 STRV_FOREACH_BACKWARDS(f
, files
) {
727 r
= netdev_load_one(manager
, *f
);