2 This file is part of systemd.
4 Copyright 2013 Tom Gundersen <teg@jklm.no>
6 systemd is free software; you can redistribute it and/or modify it
7 under the terms of the GNU Lesser General Public License as published by
8 the Free Software Foundation; either version 2.1 of the License, or
9 (at your option) any later version.
11 systemd is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 Lesser General Public License for more details.
16 You should have received a copy of the GNU Lesser General Public License
17 along with systemd; If not, see <http://www.gnu.org/licenses/>.
22 #include "alloc-util.h"
23 #include "conf-files.h"
24 #include "conf-parser.h"
27 #include "netlink-util.h"
28 #include "network-internal.h"
29 #include "netdev/netdev.h"
30 #include "networkd-manager.h"
31 #include "siphash24.h"
32 #include "stat-util.h"
33 #include "string-table.h"
34 #include "string-util.h"
36 #include "netdev/bridge.h"
37 #include "netdev/bond.h"
38 #include "netdev/vlan.h"
39 #include "netdev/macvlan.h"
40 #include "netdev/ipvlan.h"
41 #include "netdev/vxlan.h"
42 #include "netdev/tunnel.h"
43 #include "netdev/tuntap.h"
44 #include "netdev/veth.h"
45 #include "netdev/dummy.h"
46 #include "netdev/vrf.h"
47 #include "netdev/vcan.h"
49 const NetDevVTable
* const netdev_vtable
[_NETDEV_KIND_MAX
] = {
50 [NETDEV_KIND_BRIDGE
] = &bridge_vtable
,
51 [NETDEV_KIND_BOND
] = &bond_vtable
,
52 [NETDEV_KIND_VLAN
] = &vlan_vtable
,
53 [NETDEV_KIND_MACVLAN
] = &macvlan_vtable
,
54 [NETDEV_KIND_MACVTAP
] = &macvtap_vtable
,
55 [NETDEV_KIND_IPVLAN
] = &ipvlan_vtable
,
56 [NETDEV_KIND_VXLAN
] = &vxlan_vtable
,
57 [NETDEV_KIND_IPIP
] = &ipip_vtable
,
58 [NETDEV_KIND_GRE
] = &gre_vtable
,
59 [NETDEV_KIND_GRETAP
] = &gretap_vtable
,
60 [NETDEV_KIND_IP6GRE
] = &ip6gre_vtable
,
61 [NETDEV_KIND_IP6GRETAP
] = &ip6gretap_vtable
,
62 [NETDEV_KIND_SIT
] = &sit_vtable
,
63 [NETDEV_KIND_VTI
] = &vti_vtable
,
64 [NETDEV_KIND_VTI6
] = &vti6_vtable
,
65 [NETDEV_KIND_VETH
] = &veth_vtable
,
66 [NETDEV_KIND_DUMMY
] = &dummy_vtable
,
67 [NETDEV_KIND_TUN
] = &tun_vtable
,
68 [NETDEV_KIND_TAP
] = &tap_vtable
,
69 [NETDEV_KIND_IP6TNL
] = &ip6tnl_vtable
,
70 [NETDEV_KIND_VRF
] = &vrf_vtable
,
71 [NETDEV_KIND_VCAN
] = &vcan_vtable
,
74 static const char* const netdev_kind_table
[_NETDEV_KIND_MAX
] = {
75 [NETDEV_KIND_BRIDGE
] = "bridge",
76 [NETDEV_KIND_BOND
] = "bond",
77 [NETDEV_KIND_VLAN
] = "vlan",
78 [NETDEV_KIND_MACVLAN
] = "macvlan",
79 [NETDEV_KIND_MACVTAP
] = "macvtap",
80 [NETDEV_KIND_IPVLAN
] = "ipvlan",
81 [NETDEV_KIND_VXLAN
] = "vxlan",
82 [NETDEV_KIND_IPIP
] = "ipip",
83 [NETDEV_KIND_GRE
] = "gre",
84 [NETDEV_KIND_GRETAP
] = "gretap",
85 [NETDEV_KIND_IP6GRE
] = "ip6gre",
86 [NETDEV_KIND_IP6GRETAP
] = "ip6gretap",
87 [NETDEV_KIND_SIT
] = "sit",
88 [NETDEV_KIND_VETH
] = "veth",
89 [NETDEV_KIND_VTI
] = "vti",
90 [NETDEV_KIND_VTI6
] = "vti6",
91 [NETDEV_KIND_DUMMY
] = "dummy",
92 [NETDEV_KIND_TUN
] = "tun",
93 [NETDEV_KIND_TAP
] = "tap",
94 [NETDEV_KIND_IP6TNL
] = "ip6tnl",
95 [NETDEV_KIND_VRF
] = "vrf",
96 [NETDEV_KIND_VCAN
] = "vcan",
99 DEFINE_STRING_TABLE_LOOKUP(netdev_kind
, NetDevKind
);
100 DEFINE_CONFIG_PARSE_ENUM(config_parse_netdev_kind
, netdev_kind
, NetDevKind
, "Failed to parse netdev kind");
102 static void netdev_cancel_callbacks(NetDev
*netdev
) {
103 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*m
= NULL
;
104 netdev_join_callback
*callback
;
109 rtnl_message_new_synthetic_error(-ENODEV
, 0, &m
);
111 while ((callback
= netdev
->callbacks
)) {
113 assert(callback
->link
);
114 assert(callback
->callback
);
115 assert(netdev
->manager
);
116 assert(netdev
->manager
->rtnl
);
118 callback
->callback(netdev
->manager
->rtnl
, m
, callback
->link
);
121 LIST_REMOVE(callbacks
, netdev
->callbacks
, callback
);
122 link_unref(callback
->link
);
127 static void netdev_free(NetDev
*netdev
) {
131 netdev_cancel_callbacks(netdev
);
134 hashmap_remove(netdev
->manager
->netdevs
, netdev
->ifname
);
136 free(netdev
->filename
);
138 free(netdev
->description
);
139 free(netdev
->ifname
);
142 condition_free_list(netdev
->match_host
);
143 condition_free_list(netdev
->match_virt
);
144 condition_free_list(netdev
->match_kernel
);
145 condition_free_list(netdev
->match_arch
);
147 if (NETDEV_VTABLE(netdev
) &&
148 NETDEV_VTABLE(netdev
)->done
)
149 NETDEV_VTABLE(netdev
)->done(netdev
);
154 NetDev
*netdev_unref(NetDev
*netdev
) {
155 if (netdev
&& (-- netdev
->n_ref
<= 0))
161 NetDev
*netdev_ref(NetDev
*netdev
) {
163 assert_se(++ netdev
->n_ref
>= 2);
168 void netdev_drop(NetDev
*netdev
) {
169 if (!netdev
|| netdev
->state
== NETDEV_STATE_LINGER
)
172 netdev
->state
= NETDEV_STATE_LINGER
;
174 log_netdev_debug(netdev
, "netdev removed");
176 netdev_cancel_callbacks(netdev
);
178 netdev_unref(netdev
);
183 int netdev_get(Manager
*manager
, const char *name
, NetDev
**ret
) {
190 netdev
= hashmap_get(manager
->netdevs
, name
);
201 static int netdev_enter_failed(NetDev
*netdev
) {
202 netdev
->state
= NETDEV_STATE_FAILED
;
204 netdev_cancel_callbacks(netdev
);
209 static int netdev_enslave_ready(NetDev
*netdev
, Link
* link
, sd_netlink_message_handler_t callback
) {
210 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*req
= NULL
;
214 assert(netdev
->state
== NETDEV_STATE_READY
);
215 assert(netdev
->manager
);
216 assert(netdev
->manager
->rtnl
);
217 assert(IN_SET(netdev
->kind
, NETDEV_KIND_BRIDGE
, NETDEV_KIND_BOND
, NETDEV_KIND_VRF
));
221 r
= sd_rtnl_message_new_link(netdev
->manager
->rtnl
, &req
, RTM_SETLINK
, link
->ifindex
);
223 return log_netdev_error_errno(netdev
, r
, "Could not allocate RTM_SETLINK message: %m");
225 r
= sd_netlink_message_append_u32(req
, IFLA_MASTER
, netdev
->ifindex
);
227 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_MASTER attribute: %m");
229 r
= sd_netlink_call_async(netdev
->manager
->rtnl
, req
, callback
, link
, 0, NULL
);
231 return log_netdev_error(netdev
, "Could not send rtnetlink message: %m");
235 log_netdev_debug(netdev
, "Enslaving link '%s'", link
->ifname
);
240 static int netdev_enter_ready(NetDev
*netdev
) {
241 netdev_join_callback
*callback
, *callback_next
;
245 assert(netdev
->ifname
);
247 if (netdev
->state
!= NETDEV_STATE_CREATING
)
250 netdev
->state
= NETDEV_STATE_READY
;
252 log_netdev_info(netdev
, "netdev ready");
254 LIST_FOREACH_SAFE(callbacks
, callback
, callback_next
, netdev
->callbacks
) {
255 /* enslave the links that were attempted to be enslaved before the
257 r
= netdev_enslave_ready(netdev
, callback
->link
, callback
->callback
);
261 LIST_REMOVE(callbacks
, netdev
->callbacks
, callback
);
262 link_unref(callback
->link
);
266 if (NETDEV_VTABLE(netdev
)->post_create
)
267 NETDEV_VTABLE(netdev
)->post_create(netdev
, NULL
, NULL
);
272 /* callback for netdev's created without a backing Link */
273 static int netdev_create_handler(sd_netlink
*rtnl
, sd_netlink_message
*m
, void *userdata
) {
274 _cleanup_netdev_unref_ NetDev
*netdev
= userdata
;
277 assert(netdev
->state
!= _NETDEV_STATE_INVALID
);
279 r
= sd_netlink_message_get_errno(m
);
281 log_netdev_info(netdev
, "netdev exists, using existing without changing its parameters");
283 log_netdev_warning_errno(netdev
, r
, "netdev could not be created: %m");
289 log_netdev_debug(netdev
, "Created");
294 int netdev_enslave(NetDev
*netdev
, Link
*link
, sd_netlink_message_handler_t callback
) {
298 assert(netdev
->manager
);
299 assert(netdev
->manager
->rtnl
);
300 assert(IN_SET(netdev
->kind
, NETDEV_KIND_BRIDGE
, NETDEV_KIND_BOND
, NETDEV_KIND_VRF
));
302 if (netdev
->state
== NETDEV_STATE_READY
) {
303 r
= netdev_enslave_ready(netdev
, link
, callback
);
306 } else if (IN_SET(netdev
->state
, NETDEV_STATE_LINGER
, NETDEV_STATE_FAILED
)) {
307 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*m
= NULL
;
309 r
= rtnl_message_new_synthetic_error(-ENODEV
, 0, &m
);
311 callback(netdev
->manager
->rtnl
, m
, link
);
313 /* the netdev is not yet read, save this request for when it is */
314 netdev_join_callback
*cb
;
316 cb
= new0(netdev_join_callback
, 1);
320 cb
->callback
= callback
;
324 LIST_PREPEND(callbacks
, netdev
->callbacks
, cb
);
326 log_netdev_debug(netdev
, "Will enslave '%s', when ready", link
->ifname
);
332 int netdev_set_ifindex(NetDev
*netdev
, sd_netlink_message
*message
) {
335 const char *received_kind
;
336 const char *received_name
;
342 r
= sd_netlink_message_get_type(message
, &type
);
344 return log_netdev_error_errno(netdev
, r
, "Could not get rtnl message type: %m");
346 if (type
!= RTM_NEWLINK
) {
347 log_netdev_error(netdev
, "Cannot set ifindex from unexpected rtnl message type.");
351 r
= sd_rtnl_message_link_get_ifindex(message
, &ifindex
);
353 log_netdev_error_errno(netdev
, r
, "Could not get ifindex: %m");
354 netdev_enter_failed(netdev
);
356 } else if (ifindex
<= 0) {
357 log_netdev_error(netdev
, "Got invalid ifindex: %d", ifindex
);
358 netdev_enter_failed(netdev
);
362 if (netdev
->ifindex
> 0) {
363 if (netdev
->ifindex
!= ifindex
) {
364 log_netdev_error(netdev
, "Could not set ifindex to %d, already set to %d",
365 ifindex
, netdev
->ifindex
);
366 netdev_enter_failed(netdev
);
369 /* ifindex already set to the same for this netdev */
373 r
= sd_netlink_message_read_string(message
, IFLA_IFNAME
, &received_name
);
375 return log_netdev_error_errno(netdev
, r
, "Could not get IFNAME: %m");
377 if (!streq(netdev
->ifname
, received_name
)) {
378 log_netdev_error(netdev
, "Received newlink with wrong IFNAME %s", received_name
);
379 netdev_enter_failed(netdev
);
383 r
= sd_netlink_message_enter_container(message
, IFLA_LINKINFO
);
385 return log_netdev_error_errno(netdev
, r
, "Could not get LINKINFO: %m");
387 r
= sd_netlink_message_read_string(message
, IFLA_INFO_KIND
, &received_kind
);
389 return log_netdev_error_errno(netdev
, r
, "Could not get KIND: %m");
391 r
= sd_netlink_message_exit_container(message
);
393 return log_netdev_error_errno(netdev
, r
, "Could not exit container: %m");
395 if (netdev
->kind
== NETDEV_KIND_TAP
)
396 /* the kernel does not distinguish between tun and tap */
399 kind
= netdev_kind_to_string(netdev
->kind
);
401 log_netdev_error(netdev
, "Could not get kind");
402 netdev_enter_failed(netdev
);
407 if (!streq(kind
, received_kind
)) {
408 log_netdev_error(netdev
,
409 "Received newlink with wrong KIND %s, "
410 "expected %s", received_kind
, kind
);
411 netdev_enter_failed(netdev
);
415 netdev
->ifindex
= ifindex
;
417 log_netdev_debug(netdev
, "netdev has index %d", netdev
->ifindex
);
419 netdev_enter_ready(netdev
);
424 #define HASH_KEY SD_ID128_MAKE(52,e1,45,bd,00,6f,29,96,21,c6,30,6d,83,71,04,48)
426 int netdev_get_mac(const char *ifname
, struct ether_addr
**ret
) {
427 _cleanup_free_
struct ether_addr
*mac
= NULL
;
436 mac
= new0(struct ether_addr
, 1);
441 sz
= sizeof(sd_id128_t
) + l
;
444 /* fetch some persistent data unique to the machine */
445 r
= sd_id128_get_machine((sd_id128_t
*) v
);
449 /* combine with some data unique (on this machine) to this
451 memcpy(v
+ sizeof(sd_id128_t
), ifname
, l
);
453 /* Let's hash the host machine ID plus the container name. We
454 * use a fixed, but originally randomly created hash key here. */
455 result
= siphash24(v
, sz
, HASH_KEY
.bytes
);
457 assert_cc(ETH_ALEN
<= sizeof(result
));
458 memcpy(mac
->ether_addr_octet
, &result
, ETH_ALEN
);
460 /* see eth_random_addr in the kernel */
461 mac
->ether_addr_octet
[0] &= 0xfe; /* clear multicast bit */
462 mac
->ether_addr_octet
[0] |= 0x02; /* set local assignment bit (IEEE802) */
470 static int netdev_create(NetDev
*netdev
, Link
*link
,
471 sd_netlink_message_handler_t callback
) {
475 assert(!link
|| callback
);
478 if (NETDEV_VTABLE(netdev
)->create
) {
481 r
= NETDEV_VTABLE(netdev
)->create(netdev
);
485 log_netdev_debug(netdev
, "Created");
487 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*m
= NULL
;
489 r
= sd_rtnl_message_new_link(netdev
->manager
->rtnl
, &m
, RTM_NEWLINK
, 0);
491 return log_netdev_error_errno(netdev
, r
, "Could not allocate RTM_NEWLINK message: %m");
493 r
= sd_netlink_message_append_string(m
, IFLA_IFNAME
, netdev
->ifname
);
495 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_IFNAME, attribute: %m");
498 r
= sd_netlink_message_append_ether_addr(m
, IFLA_ADDRESS
, netdev
->mac
);
500 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_ADDRESS attribute: %m");
504 r
= sd_netlink_message_append_u32(m
, IFLA_MTU
, netdev
->mtu
);
506 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_MTU attribute: %m");
510 r
= sd_netlink_message_append_u32(m
, IFLA_LINK
, link
->ifindex
);
512 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_LINK attribute: %m");
515 r
= sd_netlink_message_open_container(m
, IFLA_LINKINFO
);
517 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_LINKINFO attribute: %m");
519 r
= sd_netlink_message_open_container_union(m
, IFLA_INFO_DATA
, netdev_kind_to_string(netdev
->kind
));
521 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_INFO_DATA attribute: %m");
523 if (NETDEV_VTABLE(netdev
)->fill_message_create
) {
524 r
= NETDEV_VTABLE(netdev
)->fill_message_create(netdev
, link
, m
);
529 r
= sd_netlink_message_close_container(m
);
531 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_INFO_DATA attribute: %m");
533 r
= sd_netlink_message_close_container(m
);
535 return log_netdev_error_errno(netdev
, r
, "Could not append IFLA_LINKINFO attribute: %m");
538 r
= sd_netlink_call_async(netdev
->manager
->rtnl
, m
, callback
, link
, 0, NULL
);
540 return log_netdev_error_errno(netdev
, r
, "Could not send rtnetlink message: %m");
544 r
= sd_netlink_call_async(netdev
->manager
->rtnl
, m
, netdev_create_handler
, netdev
, 0, NULL
);
546 return log_netdev_error_errno(netdev
, r
, "Could not send rtnetlink message: %m");
551 netdev
->state
= NETDEV_STATE_CREATING
;
553 log_netdev_debug(netdev
, "Creating");
559 /* the callback must be called, possibly after a timeout, as otherwise the Link will hang */
560 int netdev_join(NetDev
*netdev
, Link
*link
, sd_netlink_message_handler_t callback
) {
564 assert(netdev
->manager
);
565 assert(netdev
->manager
->rtnl
);
566 assert(NETDEV_VTABLE(netdev
));
568 switch (NETDEV_VTABLE(netdev
)->create_type
) {
569 case NETDEV_CREATE_MASTER
:
570 r
= netdev_enslave(netdev
, link
, callback
);
575 case NETDEV_CREATE_STACKED
:
576 r
= netdev_create(netdev
, link
, callback
);
582 assert_not_reached("Can not join independent netdev");
588 static int netdev_load_one(Manager
*manager
, const char *filename
) {
589 _cleanup_netdev_unref_ NetDev
*netdev
= NULL
;
590 _cleanup_free_ NetDev
*netdev_raw
= NULL
;
591 _cleanup_fclose_
FILE *file
= NULL
;
592 const char *dropin_dirname
;
598 file
= fopen(filename
, "re");
606 if (null_or_empty_fd(fileno(file
))) {
607 log_debug("Skipping empty file: %s", filename
);
611 netdev_raw
= new0(NetDev
, 1);
615 netdev_raw
->kind
= _NETDEV_KIND_INVALID
;
616 dropin_dirname
= strjoina(basename(filename
), ".d");
618 r
= config_parse_many(filename
, network_dirs
, dropin_dirname
,
620 config_item_perf_lookup
, network_netdev_gperf_lookup
,
625 r
= fseek(file
, 0, SEEK_SET
);
629 /* skip out early if configuration does not match the environment */
630 if (net_match_config(NULL
, NULL
, NULL
, NULL
, NULL
,
631 netdev_raw
->match_host
, netdev_raw
->match_virt
,
632 netdev_raw
->match_kernel
, netdev_raw
->match_arch
,
633 NULL
, NULL
, NULL
, NULL
, NULL
, NULL
) <= 0)
636 if (netdev_raw
->kind
== _NETDEV_KIND_INVALID
) {
637 log_warning("NetDev has no Kind configured in %s. Ignoring", filename
);
641 if (!netdev_raw
->ifname
) {
642 log_warning("NetDev without Name configured in %s. Ignoring", filename
);
646 netdev
= malloc0(NETDEV_VTABLE(netdev_raw
)->object_size
);
651 netdev
->manager
= manager
;
652 netdev
->state
= _NETDEV_STATE_INVALID
;
653 netdev
->kind
= netdev_raw
->kind
;
654 netdev
->ifname
= netdev_raw
->ifname
;
656 if (NETDEV_VTABLE(netdev
)->init
)
657 NETDEV_VTABLE(netdev
)->init(netdev
);
659 r
= config_parse(NULL
, filename
, file
,
660 NETDEV_VTABLE(netdev
)->sections
,
661 config_item_perf_lookup
, network_netdev_gperf_lookup
,
662 false, false, false, netdev
);
666 /* verify configuration */
667 if (NETDEV_VTABLE(netdev
)->config_verify
) {
668 r
= NETDEV_VTABLE(netdev
)->config_verify(netdev
, filename
);
673 netdev
->filename
= strdup(filename
);
674 if (!netdev
->filename
)
677 if (!netdev
->mac
&& netdev
->kind
!= NETDEV_KIND_VLAN
) {
678 r
= netdev_get_mac(netdev
->ifname
, &netdev
->mac
);
680 return log_error_errno(r
, "Failed to generate predictable MAC address for %s: %m", netdev
->ifname
);
683 r
= hashmap_put(netdev
->manager
->netdevs
, netdev
->ifname
, netdev
);
687 LIST_HEAD_INIT(netdev
->callbacks
);
689 log_netdev_debug(netdev
, "loaded %s", netdev_kind_to_string(netdev
->kind
));
691 switch (NETDEV_VTABLE(netdev
)->create_type
) {
692 case NETDEV_CREATE_MASTER
:
693 case NETDEV_CREATE_INDEPENDENT
:
694 r
= netdev_create(netdev
, NULL
, NULL
);
708 int netdev_load(Manager
*manager
) {
709 _cleanup_strv_free_
char **files
= NULL
;
716 while ((netdev
= hashmap_first(manager
->netdevs
)))
717 netdev_unref(netdev
);
719 r
= conf_files_list_strv(&files
, ".netdev", NULL
, network_dirs
);
721 return log_error_errno(r
, "Failed to enumerate netdev files: %m");
723 STRV_FOREACH_BACKWARDS(f
, files
) {
724 r
= netdev_load_one(manager
, *f
);