]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/network/netdev/netdev.c
networkd: introduce netdev "Netdevsim" Driver
[thirdparty/systemd.git] / src / network / netdev / netdev.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2 /***
3 This file is part of systemd.
4
5 Copyright 2013 Tom Gundersen <teg@jklm.no>
6 ***/
7
8 #include <net/if.h>
9
10 #include "alloc-util.h"
11 #include "conf-files.h"
12 #include "conf-parser.h"
13 #include "fd-util.h"
14 #include "list.h"
15 #include "netlink-util.h"
16 #include "network-internal.h"
17 #include "netdev/netdev.h"
18 #include "networkd-manager.h"
19 #include "networkd-link.h"
20 #include "siphash24.h"
21 #include "stat-util.h"
22 #include "string-table.h"
23 #include "string-util.h"
24
25 #include "netdev/bridge.h"
26 #include "netdev/bond.h"
27 #include "netdev/geneve.h"
28 #include "netdev/vlan.h"
29 #include "netdev/macvlan.h"
30 #include "netdev/ipvlan.h"
31 #include "netdev/vxlan.h"
32 #include "netdev/tunnel.h"
33 #include "netdev/tuntap.h"
34 #include "netdev/veth.h"
35 #include "netdev/dummy.h"
36 #include "netdev/vrf.h"
37 #include "netdev/vcan.h"
38 #include "netdev/vxcan.h"
39 #include "netdev/wireguard.h"
40 #include "netdev/netdevsim.h"
41
42 const NetDevVTable * const netdev_vtable[_NETDEV_KIND_MAX] = {
43 [NETDEV_KIND_BRIDGE] = &bridge_vtable,
44 [NETDEV_KIND_BOND] = &bond_vtable,
45 [NETDEV_KIND_VLAN] = &vlan_vtable,
46 [NETDEV_KIND_MACVLAN] = &macvlan_vtable,
47 [NETDEV_KIND_MACVTAP] = &macvtap_vtable,
48 [NETDEV_KIND_IPVLAN] = &ipvlan_vtable,
49 [NETDEV_KIND_VXLAN] = &vxlan_vtable,
50 [NETDEV_KIND_IPIP] = &ipip_vtable,
51 [NETDEV_KIND_GRE] = &gre_vtable,
52 [NETDEV_KIND_GRETAP] = &gretap_vtable,
53 [NETDEV_KIND_IP6GRE] = &ip6gre_vtable,
54 [NETDEV_KIND_IP6GRETAP] = &ip6gretap_vtable,
55 [NETDEV_KIND_SIT] = &sit_vtable,
56 [NETDEV_KIND_VTI] = &vti_vtable,
57 [NETDEV_KIND_VTI6] = &vti6_vtable,
58 [NETDEV_KIND_VETH] = &veth_vtable,
59 [NETDEV_KIND_DUMMY] = &dummy_vtable,
60 [NETDEV_KIND_TUN] = &tun_vtable,
61 [NETDEV_KIND_TAP] = &tap_vtable,
62 [NETDEV_KIND_IP6TNL] = &ip6tnl_vtable,
63 [NETDEV_KIND_VRF] = &vrf_vtable,
64 [NETDEV_KIND_VCAN] = &vcan_vtable,
65 [NETDEV_KIND_GENEVE] = &geneve_vtable,
66 [NETDEV_KIND_VXCAN] = &vxcan_vtable,
67 [NETDEV_KIND_WIREGUARD] = &wireguard_vtable,
68 [NETDEV_KIND_NETDEVSIM] = &netdevsim_vtable,
69 };
70
71 static const char* const netdev_kind_table[_NETDEV_KIND_MAX] = {
72 [NETDEV_KIND_BRIDGE] = "bridge",
73 [NETDEV_KIND_BOND] = "bond",
74 [NETDEV_KIND_VLAN] = "vlan",
75 [NETDEV_KIND_MACVLAN] = "macvlan",
76 [NETDEV_KIND_MACVTAP] = "macvtap",
77 [NETDEV_KIND_IPVLAN] = "ipvlan",
78 [NETDEV_KIND_VXLAN] = "vxlan",
79 [NETDEV_KIND_IPIP] = "ipip",
80 [NETDEV_KIND_GRE] = "gre",
81 [NETDEV_KIND_GRETAP] = "gretap",
82 [NETDEV_KIND_IP6GRE] = "ip6gre",
83 [NETDEV_KIND_IP6GRETAP] = "ip6gretap",
84 [NETDEV_KIND_SIT] = "sit",
85 [NETDEV_KIND_VETH] = "veth",
86 [NETDEV_KIND_VTI] = "vti",
87 [NETDEV_KIND_VTI6] = "vti6",
88 [NETDEV_KIND_DUMMY] = "dummy",
89 [NETDEV_KIND_TUN] = "tun",
90 [NETDEV_KIND_TAP] = "tap",
91 [NETDEV_KIND_IP6TNL] = "ip6tnl",
92 [NETDEV_KIND_VRF] = "vrf",
93 [NETDEV_KIND_VCAN] = "vcan",
94 [NETDEV_KIND_GENEVE] = "geneve",
95 [NETDEV_KIND_VXCAN] = "vxcan",
96 [NETDEV_KIND_WIREGUARD] = "wireguard",
97 [NETDEV_KIND_NETDEVSIM] = "netdevsim",
98 };
99
100 DEFINE_STRING_TABLE_LOOKUP(netdev_kind, NetDevKind);
101 DEFINE_CONFIG_PARSE_ENUM(config_parse_netdev_kind, netdev_kind, NetDevKind, "Failed to parse netdev kind");
102
103 static void netdev_cancel_callbacks(NetDev *netdev) {
104 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *m = NULL;
105 netdev_join_callback *callback;
106
107 if (!netdev || !netdev->manager)
108 return;
109
110 rtnl_message_new_synthetic_error(netdev->manager->rtnl, -ENODEV, 0, &m);
111
112 while ((callback = netdev->callbacks)) {
113 if (m) {
114 assert(callback->link);
115 assert(callback->callback);
116 assert(netdev->manager);
117 assert(netdev->manager->rtnl);
118
119 callback->callback(netdev->manager->rtnl, m, callback->link);
120 }
121
122 LIST_REMOVE(callbacks, netdev->callbacks, callback);
123 link_unref(callback->link);
124 free(callback);
125 }
126 }
127
128 static void netdev_free(NetDev *netdev) {
129 if (!netdev)
130 return;
131
132 netdev_cancel_callbacks(netdev);
133
134 if (netdev->ifname && netdev->manager)
135 hashmap_remove(netdev->manager->netdevs, netdev->ifname);
136
137 free(netdev->filename);
138
139 free(netdev->description);
140 free(netdev->ifname);
141 free(netdev->mac);
142
143 condition_free_list(netdev->match_host);
144 condition_free_list(netdev->match_virt);
145 condition_free_list(netdev->match_kernel_cmdline);
146 condition_free_list(netdev->match_kernel_version);
147 condition_free_list(netdev->match_arch);
148
149 /* Invoke the per-kind done() destructor, but only if the state field is initialized. We conditionalize that
150 * because we parse .netdev files twice: once to determine the kind (with a short, minimal NetDev structure
151 * allocation, with no room for per-kind fields), and once to read the kind's properties (with a full,
152 * comprehensive NetDev structure allocation with enough space for whatever the specific kind needs). Now, in
153 * the first case we shouldn't try to destruct the per-kind NetDev fields on destruction, in the second case we
154 * should. We use the state field to discern the two cases: it's _NETDEV_STATE_INVALID on the first "raw"
155 * call. */
156 if (netdev->state != _NETDEV_STATE_INVALID &&
157 NETDEV_VTABLE(netdev) &&
158 NETDEV_VTABLE(netdev)->done)
159 NETDEV_VTABLE(netdev)->done(netdev);
160
161 free(netdev);
162 }
163
164 NetDev *netdev_unref(NetDev *netdev) {
165 if (netdev && (-- netdev->n_ref <= 0))
166 netdev_free(netdev);
167
168 return NULL;
169 }
170
171 NetDev *netdev_ref(NetDev *netdev) {
172 if (netdev)
173 assert_se(++ netdev->n_ref >= 2);
174
175 return netdev;
176 }
177
178 void netdev_drop(NetDev *netdev) {
179 if (!netdev || netdev->state == NETDEV_STATE_LINGER)
180 return;
181
182 netdev->state = NETDEV_STATE_LINGER;
183
184 log_netdev_debug(netdev, "netdev removed");
185
186 netdev_cancel_callbacks(netdev);
187
188 netdev_unref(netdev);
189
190 return;
191 }
192
193 int netdev_get(Manager *manager, const char *name, NetDev **ret) {
194 NetDev *netdev;
195
196 assert(manager);
197 assert(name);
198 assert(ret);
199
200 netdev = hashmap_get(manager->netdevs, name);
201 if (!netdev) {
202 *ret = NULL;
203 return -ENOENT;
204 }
205
206 *ret = netdev;
207
208 return 0;
209 }
210
211 static int netdev_enter_failed(NetDev *netdev) {
212 netdev->state = NETDEV_STATE_FAILED;
213
214 netdev_cancel_callbacks(netdev);
215
216 return 0;
217 }
218
219 static int netdev_enslave_ready(NetDev *netdev, Link* link, sd_netlink_message_handler_t callback) {
220 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
221 int r;
222
223 assert(netdev);
224 assert(netdev->state == NETDEV_STATE_READY);
225 assert(netdev->manager);
226 assert(netdev->manager->rtnl);
227 assert(IN_SET(netdev->kind, NETDEV_KIND_BRIDGE, NETDEV_KIND_BOND, NETDEV_KIND_VRF));
228 assert(link);
229 assert(callback);
230
231 if (link->flags & IFF_UP && netdev->kind == NETDEV_KIND_BOND) {
232 log_netdev_debug(netdev, "Link '%s' was up when attempting to enslave it. Bringing link down.", link->ifname);
233 r = link_down(link);
234 if (r < 0)
235 return log_netdev_error_errno(netdev, r, "Could not bring link down: %m");
236 }
237
238 r = sd_rtnl_message_new_link(netdev->manager->rtnl, &req, RTM_SETLINK, link->ifindex);
239 if (r < 0)
240 return log_netdev_error_errno(netdev, r, "Could not allocate RTM_SETLINK message: %m");
241
242 r = sd_netlink_message_append_u32(req, IFLA_MASTER, netdev->ifindex);
243 if (r < 0)
244 return log_netdev_error_errno(netdev, r, "Could not append IFLA_MASTER attribute: %m");
245
246 r = sd_netlink_call_async(netdev->manager->rtnl, req, callback, link, 0, NULL);
247 if (r < 0)
248 return log_netdev_error(netdev, "Could not send rtnetlink message: %m");
249
250 link_ref(link);
251
252 log_netdev_debug(netdev, "Enslaving link '%s'", link->ifname);
253
254 return 0;
255 }
256
257 static int netdev_enter_ready(NetDev *netdev) {
258 netdev_join_callback *callback, *callback_next;
259 int r;
260
261 assert(netdev);
262 assert(netdev->ifname);
263
264 if (netdev->state != NETDEV_STATE_CREATING)
265 return 0;
266
267 netdev->state = NETDEV_STATE_READY;
268
269 log_netdev_info(netdev, "netdev ready");
270
271 LIST_FOREACH_SAFE(callbacks, callback, callback_next, netdev->callbacks) {
272 /* enslave the links that were attempted to be enslaved before the
273 * link was ready */
274 r = netdev_enslave_ready(netdev, callback->link, callback->callback);
275 if (r < 0)
276 return r;
277
278 LIST_REMOVE(callbacks, netdev->callbacks, callback);
279 link_unref(callback->link);
280 free(callback);
281 }
282
283 if (NETDEV_VTABLE(netdev)->post_create)
284 NETDEV_VTABLE(netdev)->post_create(netdev, NULL, NULL);
285
286 return 0;
287 }
288
289 /* callback for netdev's created without a backing Link */
290 static int netdev_create_handler(sd_netlink *rtnl, sd_netlink_message *m, void *userdata) {
291 _cleanup_(netdev_unrefp) NetDev *netdev = userdata;
292 int r;
293
294 assert(netdev->state != _NETDEV_STATE_INVALID);
295
296 r = sd_netlink_message_get_errno(m);
297 if (r == -EEXIST)
298 log_netdev_info(netdev, "netdev exists, using existing without changing its parameters");
299 else if (r < 0) {
300 log_netdev_warning_errno(netdev, r, "netdev could not be created: %m");
301 netdev_drop(netdev);
302
303 return 1;
304 }
305
306 log_netdev_debug(netdev, "Created");
307
308 return 1;
309 }
310
311 int netdev_enslave(NetDev *netdev, Link *link, sd_netlink_message_handler_t callback) {
312 int r;
313
314 assert(netdev);
315 assert(netdev->manager);
316 assert(netdev->manager->rtnl);
317 assert(IN_SET(netdev->kind, NETDEV_KIND_BRIDGE, NETDEV_KIND_BOND, NETDEV_KIND_VRF));
318
319 if (netdev->state == NETDEV_STATE_READY) {
320 r = netdev_enslave_ready(netdev, link, callback);
321 if (r < 0)
322 return r;
323 } else if (IN_SET(netdev->state, NETDEV_STATE_LINGER, NETDEV_STATE_FAILED)) {
324 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *m = NULL;
325
326 r = rtnl_message_new_synthetic_error(netdev->manager->rtnl, -ENODEV, 0, &m);
327 if (r >= 0)
328 callback(netdev->manager->rtnl, m, link);
329 } else {
330 /* the netdev is not yet read, save this request for when it is */
331 netdev_join_callback *cb;
332
333 cb = new0(netdev_join_callback, 1);
334 if (!cb)
335 return log_oom();
336
337 cb->callback = callback;
338 cb->link = link;
339 link_ref(link);
340
341 LIST_PREPEND(callbacks, netdev->callbacks, cb);
342
343 log_netdev_debug(netdev, "Will enslave '%s', when ready", link->ifname);
344 }
345
346 return 0;
347 }
348
349 int netdev_set_ifindex(NetDev *netdev, sd_netlink_message *message) {
350 uint16_t type;
351 const char *kind;
352 const char *received_kind;
353 const char *received_name;
354 int r, ifindex;
355
356 assert(netdev);
357 assert(message);
358
359 r = sd_netlink_message_get_type(message, &type);
360 if (r < 0)
361 return log_netdev_error_errno(netdev, r, "Could not get rtnl message type: %m");
362
363 if (type != RTM_NEWLINK) {
364 log_netdev_error(netdev, "Cannot set ifindex from unexpected rtnl message type.");
365 return -EINVAL;
366 }
367
368 r = sd_rtnl_message_link_get_ifindex(message, &ifindex);
369 if (r < 0) {
370 log_netdev_error_errno(netdev, r, "Could not get ifindex: %m");
371 netdev_enter_failed(netdev);
372 return r;
373 } else if (ifindex <= 0) {
374 log_netdev_error(netdev, "Got invalid ifindex: %d", ifindex);
375 netdev_enter_failed(netdev);
376 return -EINVAL;
377 }
378
379 if (netdev->ifindex > 0) {
380 if (netdev->ifindex != ifindex) {
381 log_netdev_error(netdev, "Could not set ifindex to %d, already set to %d",
382 ifindex, netdev->ifindex);
383 netdev_enter_failed(netdev);
384 return -EEXIST;
385 } else
386 /* ifindex already set to the same for this netdev */
387 return 0;
388 }
389
390 r = sd_netlink_message_read_string(message, IFLA_IFNAME, &received_name);
391 if (r < 0)
392 return log_netdev_error_errno(netdev, r, "Could not get IFNAME: %m");
393
394 if (!streq(netdev->ifname, received_name)) {
395 log_netdev_error(netdev, "Received newlink with wrong IFNAME %s", received_name);
396 netdev_enter_failed(netdev);
397 return r;
398 }
399
400 r = sd_netlink_message_enter_container(message, IFLA_LINKINFO);
401 if (r < 0)
402 return log_netdev_error_errno(netdev, r, "Could not get LINKINFO: %m");
403
404 r = sd_netlink_message_read_string(message, IFLA_INFO_KIND, &received_kind);
405 if (r < 0)
406 return log_netdev_error_errno(netdev, r, "Could not get KIND: %m");
407
408 r = sd_netlink_message_exit_container(message);
409 if (r < 0)
410 return log_netdev_error_errno(netdev, r, "Could not exit container: %m");
411
412 if (netdev->kind == NETDEV_KIND_TAP)
413 /* the kernel does not distinguish between tun and tap */
414 kind = "tun";
415 else {
416 kind = netdev_kind_to_string(netdev->kind);
417 if (!kind) {
418 log_netdev_error(netdev, "Could not get kind");
419 netdev_enter_failed(netdev);
420 return -EINVAL;
421 }
422 }
423
424 if (!streq(kind, received_kind)) {
425 log_netdev_error(netdev,
426 "Received newlink with wrong KIND %s, "
427 "expected %s", received_kind, kind);
428 netdev_enter_failed(netdev);
429 return r;
430 }
431
432 netdev->ifindex = ifindex;
433
434 log_netdev_debug(netdev, "netdev has index %d", netdev->ifindex);
435
436 netdev_enter_ready(netdev);
437
438 return 0;
439 }
440
441 #define HASH_KEY SD_ID128_MAKE(52,e1,45,bd,00,6f,29,96,21,c6,30,6d,83,71,04,48)
442
443 int netdev_get_mac(const char *ifname, struct ether_addr **ret) {
444 _cleanup_free_ struct ether_addr *mac = NULL;
445 uint64_t result;
446 size_t l, sz;
447 uint8_t *v;
448 int r;
449
450 assert(ifname);
451 assert(ret);
452
453 mac = new0(struct ether_addr, 1);
454 if (!mac)
455 return -ENOMEM;
456
457 l = strlen(ifname);
458 sz = sizeof(sd_id128_t) + l;
459 v = alloca(sz);
460
461 /* fetch some persistent data unique to the machine */
462 r = sd_id128_get_machine((sd_id128_t*) v);
463 if (r < 0)
464 return r;
465
466 /* combine with some data unique (on this machine) to this
467 * netdev */
468 memcpy(v + sizeof(sd_id128_t), ifname, l);
469
470 /* Let's hash the host machine ID plus the container name. We
471 * use a fixed, but originally randomly created hash key here. */
472 result = siphash24(v, sz, HASH_KEY.bytes);
473
474 assert_cc(ETH_ALEN <= sizeof(result));
475 memcpy(mac->ether_addr_octet, &result, ETH_ALEN);
476
477 /* see eth_random_addr in the kernel */
478 mac->ether_addr_octet[0] &= 0xfe; /* clear multicast bit */
479 mac->ether_addr_octet[0] |= 0x02; /* set local assignment bit (IEEE802) */
480
481 *ret = TAKE_PTR(mac);
482
483 return 0;
484 }
485
486 static int netdev_create(NetDev *netdev, Link *link,
487 sd_netlink_message_handler_t callback) {
488 int r;
489
490 assert(netdev);
491 assert(!link || callback);
492
493 /* create netdev */
494 if (NETDEV_VTABLE(netdev)->create) {
495 assert(!link);
496
497 r = NETDEV_VTABLE(netdev)->create(netdev);
498 if (r < 0)
499 return r;
500
501 log_netdev_debug(netdev, "Created");
502 } else {
503 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *m = NULL;
504
505 r = sd_rtnl_message_new_link(netdev->manager->rtnl, &m, RTM_NEWLINK, 0);
506 if (r < 0)
507 return log_netdev_error_errno(netdev, r, "Could not allocate RTM_NEWLINK message: %m");
508
509 r = sd_netlink_message_append_string(m, IFLA_IFNAME, netdev->ifname);
510 if (r < 0)
511 return log_netdev_error_errno(netdev, r, "Could not append IFLA_IFNAME, attribute: %m");
512
513 if (netdev->mac) {
514 r = sd_netlink_message_append_ether_addr(m, IFLA_ADDRESS, netdev->mac);
515 if (r < 0)
516 return log_netdev_error_errno(netdev, r, "Could not append IFLA_ADDRESS attribute: %m");
517 }
518
519 if (netdev->mtu) {
520 r = sd_netlink_message_append_u32(m, IFLA_MTU, netdev->mtu);
521 if (r < 0)
522 return log_netdev_error_errno(netdev, r, "Could not append IFLA_MTU attribute: %m");
523 }
524
525 if (link) {
526 r = sd_netlink_message_append_u32(m, IFLA_LINK, link->ifindex);
527 if (r < 0)
528 return log_netdev_error_errno(netdev, r, "Could not append IFLA_LINK attribute: %m");
529 }
530
531 r = sd_netlink_message_open_container(m, IFLA_LINKINFO);
532 if (r < 0)
533 return log_netdev_error_errno(netdev, r, "Could not append IFLA_LINKINFO attribute: %m");
534
535 r = sd_netlink_message_open_container_union(m, IFLA_INFO_DATA, netdev_kind_to_string(netdev->kind));
536 if (r < 0)
537 return log_netdev_error_errno(netdev, r, "Could not append IFLA_INFO_DATA attribute: %m");
538
539 if (NETDEV_VTABLE(netdev)->fill_message_create) {
540 r = NETDEV_VTABLE(netdev)->fill_message_create(netdev, link, m);
541 if (r < 0)
542 return r;
543 }
544
545 r = sd_netlink_message_close_container(m);
546 if (r < 0)
547 return log_netdev_error_errno(netdev, r, "Could not append IFLA_INFO_DATA attribute: %m");
548
549 r = sd_netlink_message_close_container(m);
550 if (r < 0)
551 return log_netdev_error_errno(netdev, r, "Could not append IFLA_LINKINFO attribute: %m");
552
553 if (link) {
554 r = sd_netlink_call_async(netdev->manager->rtnl, m, callback, link, 0, NULL);
555 if (r < 0)
556 return log_netdev_error_errno(netdev, r, "Could not send rtnetlink message: %m");
557
558 link_ref(link);
559 } else {
560 r = sd_netlink_call_async(netdev->manager->rtnl, m, netdev_create_handler, netdev, 0, NULL);
561 if (r < 0)
562 return log_netdev_error_errno(netdev, r, "Could not send rtnetlink message: %m");
563
564 netdev_ref(netdev);
565 }
566
567 netdev->state = NETDEV_STATE_CREATING;
568
569 log_netdev_debug(netdev, "Creating");
570 }
571
572 return 0;
573 }
574
575 /* the callback must be called, possibly after a timeout, as otherwise the Link will hang */
576 int netdev_join(NetDev *netdev, Link *link, sd_netlink_message_handler_t callback) {
577 int r;
578
579 assert(netdev);
580 assert(netdev->manager);
581 assert(netdev->manager->rtnl);
582 assert(NETDEV_VTABLE(netdev));
583
584 switch (NETDEV_VTABLE(netdev)->create_type) {
585 case NETDEV_CREATE_MASTER:
586 r = netdev_enslave(netdev, link, callback);
587 if (r < 0)
588 return r;
589
590 break;
591 case NETDEV_CREATE_STACKED:
592 r = netdev_create(netdev, link, callback);
593 if (r < 0)
594 return r;
595
596 break;
597 default:
598 assert_not_reached("Can not join independent netdev");
599 }
600
601 return 0;
602 }
603
604 static int netdev_load_one(Manager *manager, const char *filename) {
605 _cleanup_(netdev_unrefp) NetDev *netdev_raw = NULL, *netdev = NULL;
606 _cleanup_fclose_ FILE *file = NULL;
607 const char *dropin_dirname;
608 bool independent = false;
609 int r;
610
611 assert(manager);
612 assert(filename);
613
614 file = fopen(filename, "re");
615 if (!file) {
616 if (errno == ENOENT)
617 return 0;
618
619 return -errno;
620 }
621
622 if (null_or_empty_fd(fileno(file))) {
623 log_debug("Skipping empty file: %s", filename);
624 return 0;
625 }
626
627 netdev_raw = new0(NetDev, 1);
628 if (!netdev_raw)
629 return log_oom();
630
631 netdev_raw->n_ref = 1;
632 netdev_raw->kind = _NETDEV_KIND_INVALID;
633 netdev_raw->state = _NETDEV_STATE_INVALID; /* an invalid state means done() of the implementation won't be called on destruction */
634
635 dropin_dirname = strjoina(basename(filename), ".d");
636 r = config_parse_many(filename, network_dirs, dropin_dirname,
637 "Match\0NetDev\0",
638 config_item_perf_lookup, network_netdev_gperf_lookup,
639 CONFIG_PARSE_WARN|CONFIG_PARSE_RELAXED, netdev_raw);
640 if (r < 0)
641 return r;
642
643 /* skip out early if configuration does not match the environment */
644 if (net_match_config(NULL, NULL, NULL, NULL, NULL,
645 netdev_raw->match_host, netdev_raw->match_virt,
646 netdev_raw->match_kernel_cmdline, netdev_raw->match_kernel_version,
647 netdev_raw->match_arch,
648 NULL, NULL, NULL, NULL, NULL, NULL) <= 0)
649 return 0;
650
651 if (netdev_raw->kind == _NETDEV_KIND_INVALID) {
652 log_warning("NetDev has no Kind configured in %s. Ignoring", filename);
653 return 0;
654 }
655
656 if (!netdev_raw->ifname) {
657 log_warning("NetDev without Name configured in %s. Ignoring", filename);
658 return 0;
659 }
660
661 r = fseek(file, 0, SEEK_SET);
662 if (r < 0)
663 return -errno;
664
665 netdev = malloc0(NETDEV_VTABLE(netdev_raw)->object_size);
666 if (!netdev)
667 return log_oom();
668
669 netdev->n_ref = 1;
670 netdev->manager = manager;
671 netdev->kind = netdev_raw->kind;
672 netdev->state = NETDEV_STATE_LOADING; /* we initialize the state here for the first time, so that done() will be called on destruction */
673
674 if (NETDEV_VTABLE(netdev)->init)
675 NETDEV_VTABLE(netdev)->init(netdev);
676
677 r = config_parse(NULL, filename, file,
678 NETDEV_VTABLE(netdev)->sections,
679 config_item_perf_lookup, network_netdev_gperf_lookup,
680 CONFIG_PARSE_WARN, netdev);
681 if (r < 0)
682 return r;
683
684 /* verify configuration */
685 if (NETDEV_VTABLE(netdev)->config_verify) {
686 r = NETDEV_VTABLE(netdev)->config_verify(netdev, filename);
687 if (r < 0)
688 return 0;
689 }
690
691 netdev->filename = strdup(filename);
692 if (!netdev->filename)
693 return log_oom();
694
695 if (!netdev->mac && netdev->kind != NETDEV_KIND_VLAN) {
696 r = netdev_get_mac(netdev->ifname, &netdev->mac);
697 if (r < 0)
698 return log_error_errno(r, "Failed to generate predictable MAC address for %s: %m", netdev->ifname);
699 }
700
701 r = hashmap_put(netdev->manager->netdevs, netdev->ifname, netdev);
702 if (r < 0)
703 return r;
704
705 LIST_HEAD_INIT(netdev->callbacks);
706
707 log_netdev_debug(netdev, "loaded %s", netdev_kind_to_string(netdev->kind));
708
709 switch (NETDEV_VTABLE(netdev)->create_type) {
710 case NETDEV_CREATE_MASTER:
711 case NETDEV_CREATE_INDEPENDENT:
712 r = netdev_create(netdev, NULL, NULL);
713 if (r < 0)
714 return r;
715
716 break;
717 default:
718 break;
719 }
720
721 switch (netdev->kind) {
722 case NETDEV_KIND_IPIP:
723 independent = IPIP(netdev)->independent;
724 break;
725 case NETDEV_KIND_GRE:
726 independent = GRE(netdev)->independent;
727 break;
728 case NETDEV_KIND_GRETAP:
729 independent = GRETAP(netdev)->independent;
730 break;
731 case NETDEV_KIND_IP6GRE:
732 independent = IP6GRE(netdev)->independent;
733 break;
734 case NETDEV_KIND_IP6GRETAP:
735 independent = IP6GRETAP(netdev)->independent;
736 break;
737 case NETDEV_KIND_SIT:
738 independent = SIT(netdev)->independent;
739 break;
740 case NETDEV_KIND_VTI:
741 independent = VTI(netdev)->independent;
742 break;
743 case NETDEV_KIND_VTI6:
744 independent = VTI6(netdev)->independent;
745 break;
746 case NETDEV_KIND_IP6TNL:
747 independent = IP6TNL(netdev)->independent;
748 break;
749 default:
750 break;
751 }
752
753 if (independent) {
754 r = netdev_create(netdev, NULL, NULL);
755 if (r < 0)
756 return r;
757 }
758
759 netdev = NULL;
760
761 return 0;
762 }
763
764 int netdev_load(Manager *manager) {
765 _cleanup_strv_free_ char **files = NULL;
766 NetDev *netdev;
767 char **f;
768 int r;
769
770 assert(manager);
771
772 while ((netdev = hashmap_first(manager->netdevs)))
773 netdev_unref(netdev);
774
775 r = conf_files_list_strv(&files, ".netdev", NULL, 0, network_dirs);
776 if (r < 0)
777 return log_error_errno(r, "Failed to enumerate netdev files: %m");
778
779 STRV_FOREACH_BACKWARDS(f, files) {
780 r = netdev_load_one(manager, *f);
781 if (r < 0)
782 return r;
783 }
784
785 return 0;
786 }