]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/network/networkd-link.c
DHCP DUID, IAID configuration options
[thirdparty/systemd.git] / src / network / networkd-link.c
1 /***
2 This file is part of systemd.
3
4 Copyright 2013 Tom Gundersen <teg@jklm.no>
5
6 systemd is free software; you can redistribute it and/or modify it
7 under the terms of the GNU Lesser General Public License as published by
8 the Free Software Foundation; either version 2.1 of the License, or
9 (at your option) any later version.
10
11 systemd is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 Lesser General Public License for more details.
15
16 You should have received a copy of the GNU Lesser General Public License
17 along with systemd; If not, see <http://www.gnu.org/licenses/>.
18 ***/
19
20 #include <netinet/ether.h>
21 #include <linux/if.h>
22 #include <unistd.h>
23
24 #include "alloc-util.h"
25 #include "bus-util.h"
26 #include "dhcp-lease-internal.h"
27 #include "fd-util.h"
28 #include "fileio.h"
29 #include "lldp.h"
30 #include "netlink-util.h"
31 #include "network-internal.h"
32 #include "networkd-link.h"
33 #include "networkd-lldp-tx.h"
34 #include "networkd-netdev.h"
35 #include "set.h"
36 #include "socket-util.h"
37 #include "stdio-util.h"
38 #include "string-table.h"
39 #include "udev-util.h"
40 #include "util.h"
41 #include "virt.h"
42
43 static bool link_dhcp6_enabled(Link *link) {
44 assert(link);
45
46 if (link->flags & IFF_LOOPBACK)
47 return false;
48
49 if (!link->network)
50 return false;
51
52 return link->network->dhcp & ADDRESS_FAMILY_IPV6;
53 }
54
55 static bool link_dhcp4_enabled(Link *link) {
56 assert(link);
57
58 if (link->flags & IFF_LOOPBACK)
59 return false;
60
61 if (!link->network)
62 return false;
63
64 return link->network->dhcp & ADDRESS_FAMILY_IPV4;
65 }
66
67 static bool link_dhcp4_server_enabled(Link *link) {
68 assert(link);
69
70 if (link->flags & IFF_LOOPBACK)
71 return false;
72
73 if (!link->network)
74 return false;
75
76 return link->network->dhcp_server;
77 }
78
79 static bool link_ipv4ll_enabled(Link *link) {
80 assert(link);
81
82 if (link->flags & IFF_LOOPBACK)
83 return false;
84
85 if (!link->network)
86 return false;
87
88 return link->network->link_local & ADDRESS_FAMILY_IPV4;
89 }
90
91 static bool link_ipv6ll_enabled(Link *link) {
92 assert(link);
93
94 if (link->flags & IFF_LOOPBACK)
95 return false;
96
97 if (!link->network)
98 return false;
99
100 return link->network->link_local & ADDRESS_FAMILY_IPV6;
101 }
102
103 static bool link_lldp_rx_enabled(Link *link) {
104 assert(link);
105
106 if (link->flags & IFF_LOOPBACK)
107 return false;
108
109 if (link->iftype != ARPHRD_ETHER)
110 return false;
111
112 if (!link->network)
113 return false;
114
115 if (link->network->bridge)
116 return false;
117
118 return link->network->lldp_mode != LLDP_MODE_NO;
119 }
120
121 static bool link_lldp_tx_enabled(Link *link) {
122 assert(link);
123
124 if (link->flags & IFF_LOOPBACK)
125 return false;
126
127 if (link->iftype != ARPHRD_ETHER)
128 return false;
129
130 if (!link->network)
131 return false;
132
133 return link->network->lldp_emit;
134 }
135
136 static bool link_ipv4_forward_enabled(Link *link) {
137 assert(link);
138
139 if (link->flags & IFF_LOOPBACK)
140 return false;
141
142 if (!link->network)
143 return false;
144
145 if (link->network->ip_forward == _ADDRESS_FAMILY_BOOLEAN_INVALID)
146 return false;
147
148 return link->network->ip_forward & ADDRESS_FAMILY_IPV4;
149 }
150
151 static bool link_ipv6_forward_enabled(Link *link) {
152 assert(link);
153
154 if (!socket_ipv6_is_supported())
155 return false;
156
157 if (link->flags & IFF_LOOPBACK)
158 return false;
159
160 if (!link->network)
161 return false;
162
163 if (link->network->ip_forward == _ADDRESS_FAMILY_BOOLEAN_INVALID)
164 return false;
165
166 return link->network->ip_forward & ADDRESS_FAMILY_IPV6;
167 }
168
169 static bool link_ipv6_accept_ra_enabled(Link *link) {
170 assert(link);
171
172 if (link->flags & IFF_LOOPBACK)
173 return false;
174
175 if (!link->network)
176 return false;
177
178 /* If unset use system default (enabled if local forwarding is disabled.
179 * disabled if local forwarding is enabled).
180 * If set, ignore or enforce RA independent of local forwarding state.
181 */
182 if (link->network->ipv6_accept_ra < 0)
183 /* default to accept RA if ip_forward is disabled and ignore RA if ip_forward is enabled */
184 return !link_ipv6_forward_enabled(link);
185 else if (link->network->ipv6_accept_ra > 0)
186 /* accept RA even if ip_forward is enabled */
187 return true;
188 else
189 /* ignore RA */
190 return false;
191 }
192
193 static IPv6PrivacyExtensions link_ipv6_privacy_extensions(Link *link) {
194
195 if (!socket_ipv6_is_supported())
196 return _IPV6_PRIVACY_EXTENSIONS_INVALID;
197
198 if (link->flags & IFF_LOOPBACK)
199 return _IPV6_PRIVACY_EXTENSIONS_INVALID;
200
201 if (!link->network)
202 return _IPV6_PRIVACY_EXTENSIONS_INVALID;
203
204 return link->network->ipv6_privacy_extensions;
205 }
206
207 void link_update_operstate(Link *link) {
208 LinkOperationalState operstate;
209 assert(link);
210
211 if (link->kernel_operstate == IF_OPER_DORMANT)
212 operstate = LINK_OPERSTATE_DORMANT;
213 else if (link_has_carrier(link)) {
214 Address *address;
215 uint8_t scope = RT_SCOPE_NOWHERE;
216 Iterator i;
217
218 /* if we have carrier, check what addresses we have */
219 SET_FOREACH(address, link->addresses, i) {
220 if (!address_is_ready(address))
221 continue;
222
223 if (address->scope < scope)
224 scope = address->scope;
225 }
226
227 /* for operstate we also take foreign addresses into account */
228 SET_FOREACH(address, link->addresses_foreign, i) {
229 if (!address_is_ready(address))
230 continue;
231
232 if (address->scope < scope)
233 scope = address->scope;
234 }
235
236 if (scope < RT_SCOPE_SITE)
237 /* universally accessible addresses found */
238 operstate = LINK_OPERSTATE_ROUTABLE;
239 else if (scope < RT_SCOPE_HOST)
240 /* only link or site local addresses found */
241 operstate = LINK_OPERSTATE_DEGRADED;
242 else
243 /* no useful addresses found */
244 operstate = LINK_OPERSTATE_CARRIER;
245 } else if (link->flags & IFF_UP)
246 operstate = LINK_OPERSTATE_NO_CARRIER;
247 else
248 operstate = LINK_OPERSTATE_OFF;
249
250 if (link->operstate != operstate) {
251 link->operstate = operstate;
252 link_send_changed(link, "OperationalState", NULL);
253 link_dirty(link);
254 manager_dirty(link->manager);
255 }
256 }
257
258 #define FLAG_STRING(string, flag, old, new) \
259 (((old ^ new) & flag) \
260 ? ((old & flag) ? (" -" string) : (" +" string)) \
261 : "")
262
263 static int link_update_flags(Link *link, sd_netlink_message *m) {
264 unsigned flags, unknown_flags_added, unknown_flags_removed, unknown_flags;
265 uint8_t operstate;
266 int r;
267
268 assert(link);
269
270 r = sd_rtnl_message_link_get_flags(m, &flags);
271 if (r < 0)
272 return log_link_warning_errno(link, r, "Could not get link flags: %m");
273
274 r = sd_netlink_message_read_u8(m, IFLA_OPERSTATE, &operstate);
275 if (r < 0)
276 /* if we got a message without operstate, take it to mean
277 the state was unchanged */
278 operstate = link->kernel_operstate;
279
280 if ((link->flags == flags) && (link->kernel_operstate == operstate))
281 return 0;
282
283 if (link->flags != flags) {
284 log_link_debug(link, "Flags change:%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s",
285 FLAG_STRING("LOOPBACK", IFF_LOOPBACK, link->flags, flags),
286 FLAG_STRING("MASTER", IFF_MASTER, link->flags, flags),
287 FLAG_STRING("SLAVE", IFF_SLAVE, link->flags, flags),
288 FLAG_STRING("UP", IFF_UP, link->flags, flags),
289 FLAG_STRING("DORMANT", IFF_DORMANT, link->flags, flags),
290 FLAG_STRING("LOWER_UP", IFF_LOWER_UP, link->flags, flags),
291 FLAG_STRING("RUNNING", IFF_RUNNING, link->flags, flags),
292 FLAG_STRING("MULTICAST", IFF_MULTICAST, link->flags, flags),
293 FLAG_STRING("BROADCAST", IFF_BROADCAST, link->flags, flags),
294 FLAG_STRING("POINTOPOINT", IFF_POINTOPOINT, link->flags, flags),
295 FLAG_STRING("PROMISC", IFF_PROMISC, link->flags, flags),
296 FLAG_STRING("ALLMULTI", IFF_ALLMULTI, link->flags, flags),
297 FLAG_STRING("PORTSEL", IFF_PORTSEL, link->flags, flags),
298 FLAG_STRING("AUTOMEDIA", IFF_AUTOMEDIA, link->flags, flags),
299 FLAG_STRING("DYNAMIC", IFF_DYNAMIC, link->flags, flags),
300 FLAG_STRING("NOARP", IFF_NOARP, link->flags, flags),
301 FLAG_STRING("NOTRAILERS", IFF_NOTRAILERS, link->flags, flags),
302 FLAG_STRING("DEBUG", IFF_DEBUG, link->flags, flags),
303 FLAG_STRING("ECHO", IFF_ECHO, link->flags, flags));
304
305 unknown_flags = ~(IFF_LOOPBACK | IFF_MASTER | IFF_SLAVE | IFF_UP |
306 IFF_DORMANT | IFF_LOWER_UP | IFF_RUNNING |
307 IFF_MULTICAST | IFF_BROADCAST | IFF_POINTOPOINT |
308 IFF_PROMISC | IFF_ALLMULTI | IFF_PORTSEL |
309 IFF_AUTOMEDIA | IFF_DYNAMIC | IFF_NOARP |
310 IFF_NOTRAILERS | IFF_DEBUG | IFF_ECHO);
311 unknown_flags_added = ((link->flags ^ flags) & flags & unknown_flags);
312 unknown_flags_removed = ((link->flags ^ flags) & link->flags & unknown_flags);
313
314 /* link flags are currently at most 18 bits, let's align to
315 * printing 20 */
316 if (unknown_flags_added)
317 log_link_debug(link,
318 "Unknown link flags gained: %#.5x (ignoring)",
319 unknown_flags_added);
320
321 if (unknown_flags_removed)
322 log_link_debug(link,
323 "Unknown link flags lost: %#.5x (ignoring)",
324 unknown_flags_removed);
325 }
326
327 link->flags = flags;
328 link->kernel_operstate = operstate;
329
330 link_update_operstate(link);
331
332 return 0;
333 }
334
335 static int link_new(Manager *manager, sd_netlink_message *message, Link **ret) {
336 _cleanup_link_unref_ Link *link = NULL;
337 uint16_t type;
338 const char *ifname;
339 int r, ifindex;
340 unsigned short iftype;
341
342 assert(manager);
343 assert(message);
344 assert(ret);
345
346 r = sd_netlink_message_get_type(message, &type);
347 if (r < 0)
348 return r;
349 else if (type != RTM_NEWLINK)
350 return -EINVAL;
351
352 r = sd_rtnl_message_link_get_ifindex(message, &ifindex);
353 if (r < 0)
354 return r;
355 else if (ifindex <= 0)
356 return -EINVAL;
357
358 r = sd_rtnl_message_link_get_type(message, &iftype);
359 if (r < 0)
360 return r;
361
362 r = sd_netlink_message_read_string(message, IFLA_IFNAME, &ifname);
363 if (r < 0)
364 return r;
365
366 link = new0(Link, 1);
367 if (!link)
368 return -ENOMEM;
369
370 link->n_ref = 1;
371 link->manager = manager;
372 link->state = LINK_STATE_PENDING;
373 link->rtnl_extended_attrs = true;
374 link->ifindex = ifindex;
375 link->iftype = iftype;
376 link->ifname = strdup(ifname);
377 if (!link->ifname)
378 return -ENOMEM;
379
380 r = sd_netlink_message_read_ether_addr(message, IFLA_ADDRESS, &link->mac);
381 if (r < 0)
382 log_link_debug_errno(link, r, "MAC address not found for new device, continuing without");
383
384 if (asprintf(&link->state_file, "/run/systemd/netif/links/%d", link->ifindex) < 0)
385 return -ENOMEM;
386
387 if (asprintf(&link->lease_file, "/run/systemd/netif/leases/%d", link->ifindex) < 0)
388 return -ENOMEM;
389
390 if (asprintf(&link->lldp_file, "/run/systemd/netif/lldp/%d", link->ifindex) < 0)
391 return -ENOMEM;
392
393 r = hashmap_ensure_allocated(&manager->links, NULL);
394 if (r < 0)
395 return r;
396
397 r = hashmap_put(manager->links, INT_TO_PTR(link->ifindex), link);
398 if (r < 0)
399 return r;
400
401 r = link_update_flags(link, message);
402 if (r < 0)
403 return r;
404
405 *ret = link;
406 link = NULL;
407
408 return 0;
409 }
410
411 static void link_free(Link *link) {
412 Address *address;
413 Iterator i;
414 Link *carrier;
415
416 if (!link)
417 return;
418
419 while (!set_isempty(link->addresses))
420 address_free(set_first(link->addresses));
421
422 while (!set_isempty(link->addresses_foreign))
423 address_free(set_first(link->addresses_foreign));
424
425 link->addresses = set_free(link->addresses);
426
427 link->addresses_foreign = set_free(link->addresses_foreign);
428
429 while ((address = link->pool_addresses)) {
430 LIST_REMOVE(addresses, link->pool_addresses, address);
431 address_free(address);
432 }
433
434 sd_dhcp_server_unref(link->dhcp_server);
435 sd_dhcp_client_unref(link->dhcp_client);
436 sd_dhcp_lease_unref(link->dhcp_lease);
437
438 link_lldp_tx_stop(link);
439
440 free(link->lease_file);
441
442 sd_lldp_unref(link->lldp);
443 free(link->lldp_file);
444
445 sd_ipv4ll_unref(link->ipv4ll);
446 sd_dhcp6_client_unref(link->dhcp6_client);
447 sd_ndisc_unref(link->ndisc_router_discovery);
448
449 if (link->manager)
450 hashmap_remove(link->manager->links, INT_TO_PTR(link->ifindex));
451
452 free(link->ifname);
453
454 (void)unlink(link->state_file);
455 free(link->state_file);
456
457 udev_device_unref(link->udev_device);
458
459 HASHMAP_FOREACH (carrier, link->bound_to_links, i)
460 hashmap_remove(link->bound_to_links, INT_TO_PTR(carrier->ifindex));
461 hashmap_free(link->bound_to_links);
462
463 HASHMAP_FOREACH (carrier, link->bound_by_links, i)
464 hashmap_remove(link->bound_by_links, INT_TO_PTR(carrier->ifindex));
465 hashmap_free(link->bound_by_links);
466
467 free(link);
468 }
469
470 Link *link_unref(Link *link) {
471 if (!link)
472 return NULL;
473
474 assert(link->n_ref > 0);
475
476 link->n_ref--;
477
478 if (link->n_ref > 0)
479 return NULL;
480
481 link_free(link);
482
483 return NULL;
484 }
485
486 Link *link_ref(Link *link) {
487 if (!link)
488 return NULL;
489
490 assert(link->n_ref > 0);
491
492 link->n_ref++;
493
494 return link;
495 }
496
497 int link_get(Manager *m, int ifindex, Link **ret) {
498 Link *link;
499
500 assert(m);
501 assert(ifindex);
502 assert(ret);
503
504 link = hashmap_get(m->links, INT_TO_PTR(ifindex));
505 if (!link)
506 return -ENODEV;
507
508 *ret = link;
509
510 return 0;
511 }
512
513 static void link_set_state(Link *link, LinkState state) {
514 assert(link);
515
516 if (link->state == state)
517 return;
518
519 link->state = state;
520
521 link_send_changed(link, "AdministrativeState", NULL);
522
523 return;
524 }
525
526 static void link_enter_unmanaged(Link *link) {
527 assert(link);
528
529 log_link_debug(link, "Unmanaged");
530
531 link_set_state(link, LINK_STATE_UNMANAGED);
532
533 link_dirty(link);
534 }
535
536 static int link_stop_clients(Link *link) {
537 int r = 0, k;
538
539 assert(link);
540 assert(link->manager);
541 assert(link->manager->event);
542
543 if (link->dhcp_client) {
544 k = sd_dhcp_client_stop(link->dhcp_client);
545 if (k < 0)
546 r = log_link_warning_errno(link, k, "Could not stop DHCPv4 client: %m");
547 }
548
549 if (link->ipv4ll) {
550 k = sd_ipv4ll_stop(link->ipv4ll);
551 if (k < 0)
552 r = log_link_warning_errno(link, k, "Could not stop IPv4 link-local: %m");
553 }
554
555 if (link->dhcp6_client) {
556 k = sd_dhcp6_client_stop(link->dhcp6_client);
557 if (k < 0)
558 r = log_link_warning_errno(link, k, "Could not stop DHCPv6 client: %m");
559 }
560
561 if (link->ndisc_router_discovery) {
562 k = sd_ndisc_stop(link->ndisc_router_discovery);
563 if (k < 0)
564 r = log_link_warning_errno(link, k, "Could not stop IPv6 Router Discovery: %m");
565 }
566
567 link_lldp_tx_stop(link);
568 return r;
569 }
570
571 void link_enter_failed(Link *link) {
572 assert(link);
573
574 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
575 return;
576
577 log_link_warning(link, "Failed");
578
579 link_set_state(link, LINK_STATE_FAILED);
580
581 link_stop_clients(link);
582
583 link_dirty(link);
584 }
585
586 static Address* link_find_dhcp_server_address(Link *link) {
587 Address *address;
588
589 assert(link);
590 assert(link->network);
591
592 /* The first statically configured address if there is any */
593 LIST_FOREACH(addresses, address, link->network->static_addresses) {
594
595 if (address->family != AF_INET)
596 continue;
597
598 if (in_addr_is_null(address->family, &address->in_addr))
599 continue;
600
601 return address;
602 }
603
604 /* If that didn't work, find a suitable address we got from the pool */
605 LIST_FOREACH(addresses, address, link->pool_addresses) {
606 if (address->family != AF_INET)
607 continue;
608
609 return address;
610 }
611
612 return NULL;
613 }
614
615 static int link_enter_configured(Link *link) {
616 assert(link);
617 assert(link->network);
618 assert(link->state == LINK_STATE_SETTING_ROUTES);
619
620 log_link_info(link, "Configured");
621
622 link_set_state(link, LINK_STATE_CONFIGURED);
623
624 link_dirty(link);
625
626 return 0;
627 }
628
629 void link_check_ready(Link *link) {
630 Address *a;
631 Iterator i;
632
633 assert(link);
634
635 if (!link->network)
636 return;
637
638 if (!link->static_configured)
639 return;
640
641 if (link_ipv4ll_enabled(link))
642 if (!link->ipv4ll_address ||
643 !link->ipv4ll_route)
644 return;
645
646 if (link_ipv6ll_enabled(link))
647 if (in_addr_is_null(AF_INET6, (const union in_addr_union*) &link->ipv6ll_address) > 0)
648 return;
649
650 if ((link_dhcp4_enabled(link) && !link_dhcp6_enabled(link) &&
651 !link->dhcp4_configured) ||
652 (link_dhcp6_enabled(link) && !link_dhcp4_enabled(link) &&
653 !link->dhcp6_configured) ||
654 (link_dhcp4_enabled(link) && link_dhcp6_enabled(link) &&
655 !link->dhcp4_configured && !link->dhcp6_configured))
656 return;
657
658 if (link_ipv6_accept_ra_enabled(link) && !link->ndisc_configured)
659 return;
660
661 SET_FOREACH(a, link->addresses, i)
662 if (!address_is_ready(a))
663 return;
664
665 if (link->state != LINK_STATE_CONFIGURED)
666 link_enter_configured(link);
667
668 return;
669 }
670
671 static int route_handler(sd_netlink *rtnl, sd_netlink_message *m, void *userdata) {
672 _cleanup_link_unref_ Link *link = userdata;
673 int r;
674
675 assert(link->link_messages > 0);
676 assert(IN_SET(link->state, LINK_STATE_SETTING_ADDRESSES,
677 LINK_STATE_SETTING_ROUTES, LINK_STATE_FAILED,
678 LINK_STATE_LINGER));
679
680 link->link_messages--;
681
682 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
683 return 1;
684
685 r = sd_netlink_message_get_errno(m);
686 if (r < 0 && r != -EEXIST)
687 log_link_warning_errno(link, r, "Could not set route: %m");
688
689 if (link->link_messages == 0) {
690 log_link_debug(link, "Routes set");
691 link->static_configured = true;
692 link_check_ready(link);
693 }
694
695 return 1;
696 }
697
698 static int link_enter_set_routes(Link *link) {
699 Route *rt;
700 int r;
701
702 assert(link);
703 assert(link->network);
704 assert(link->state == LINK_STATE_SETTING_ADDRESSES);
705
706 link_set_state(link, LINK_STATE_SETTING_ROUTES);
707
708 LIST_FOREACH(routes, rt, link->network->static_routes) {
709 r = route_configure(rt, link, &route_handler);
710 if (r < 0) {
711 log_link_warning_errno(link, r, "Could not set routes: %m");
712 link_enter_failed(link);
713 return r;
714 }
715
716 link->link_messages++;
717 }
718
719 if (link->link_messages == 0) {
720 link->static_configured = true;
721 link_check_ready(link);
722 } else
723 log_link_debug(link, "Setting routes");
724
725 return 0;
726 }
727
728 int link_route_remove_handler(sd_netlink *rtnl, sd_netlink_message *m, void *userdata) {
729 _cleanup_link_unref_ Link *link = userdata;
730 int r;
731
732 assert(m);
733 assert(link);
734 assert(link->ifname);
735
736 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
737 return 1;
738
739 r = sd_netlink_message_get_errno(m);
740 if (r < 0 && r != -ESRCH)
741 log_link_warning_errno(link, r, "Could not drop route: %m");
742
743 return 1;
744 }
745
746 static int address_handler(sd_netlink *rtnl, sd_netlink_message *m, void *userdata) {
747 _cleanup_link_unref_ Link *link = userdata;
748 int r;
749
750 assert(rtnl);
751 assert(m);
752 assert(link);
753 assert(link->ifname);
754 assert(link->link_messages > 0);
755 assert(IN_SET(link->state, LINK_STATE_SETTING_ADDRESSES,
756 LINK_STATE_FAILED, LINK_STATE_LINGER));
757
758 link->link_messages--;
759
760 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
761 return 1;
762
763 r = sd_netlink_message_get_errno(m);
764 if (r < 0 && r != -EEXIST)
765 log_link_warning_errno(link, r, "could not set address: %m");
766 else if (r >= 0)
767 manager_rtnl_process_address(rtnl, m, link->manager);
768
769 if (link->link_messages == 0) {
770 log_link_debug(link, "Addresses set");
771 link_enter_set_routes(link);
772 }
773
774 return 1;
775 }
776
777 static int link_push_dns_to_dhcp_server(Link *link, sd_dhcp_server *s) {
778 _cleanup_free_ struct in_addr *addresses = NULL;
779 size_t n_addresses = 0, n_allocated = 0;
780 char **a;
781
782 log_debug("Copying DNS server information from %s", link->ifname);
783
784 if (!link->network)
785 return 0;
786
787 STRV_FOREACH(a, link->network->dns) {
788 struct in_addr ia;
789
790 /* Only look for IPv4 addresses */
791 if (inet_pton(AF_INET, *a, &ia) <= 0)
792 continue;
793
794 if (!GREEDY_REALLOC(addresses, n_allocated, n_addresses + 1))
795 return log_oom();
796
797 addresses[n_addresses++] = ia;
798 }
799
800 if (link->network->dhcp_use_dns &&
801 link->dhcp_lease) {
802 const struct in_addr *da = NULL;
803 int n;
804
805 n = sd_dhcp_lease_get_dns(link->dhcp_lease, &da);
806 if (n > 0) {
807
808 if (!GREEDY_REALLOC(addresses, n_allocated, n_addresses + n))
809 return log_oom();
810
811 memcpy(addresses + n_addresses, da, n * sizeof(struct in_addr));
812 n_addresses += n;
813 }
814 }
815
816 if (n_addresses <= 0)
817 return 0;
818
819 return sd_dhcp_server_set_dns(s, addresses, n_addresses);
820 }
821
822 static int link_push_ntp_to_dhcp_server(Link *link, sd_dhcp_server *s) {
823 _cleanup_free_ struct in_addr *addresses = NULL;
824 size_t n_addresses = 0, n_allocated = 0;
825 char **a;
826
827 if (!link->network)
828 return 0;
829
830 log_debug("Copying NTP server information from %s", link->ifname);
831
832 STRV_FOREACH(a, link->network->ntp) {
833 struct in_addr ia;
834
835 /* Only look for IPv4 addresses */
836 if (inet_pton(AF_INET, *a, &ia) <= 0)
837 continue;
838
839 if (!GREEDY_REALLOC(addresses, n_allocated, n_addresses + 1))
840 return log_oom();
841
842 addresses[n_addresses++] = ia;
843 }
844
845 if (link->network->dhcp_use_ntp &&
846 link->dhcp_lease) {
847 const struct in_addr *da = NULL;
848 int n;
849
850 n = sd_dhcp_lease_get_ntp(link->dhcp_lease, &da);
851 if (n > 0) {
852
853 if (!GREEDY_REALLOC(addresses, n_allocated, n_addresses + n))
854 return log_oom();
855
856 memcpy(addresses + n_addresses, da, n * sizeof(struct in_addr));
857 n_addresses += n;
858 }
859 }
860
861 if (n_addresses <= 0)
862 return 0;
863
864 return sd_dhcp_server_set_ntp(s, addresses, n_addresses);
865 }
866
867 static int link_enter_set_addresses(Link *link) {
868 Address *ad;
869 int r;
870
871 assert(link);
872 assert(link->network);
873 assert(link->state != _LINK_STATE_INVALID);
874
875 link_set_state(link, LINK_STATE_SETTING_ADDRESSES);
876
877 LIST_FOREACH(addresses, ad, link->network->static_addresses) {
878 r = address_configure(ad, link, &address_handler, false);
879 if (r < 0) {
880 log_link_warning_errno(link, r, "Could not set addresses: %m");
881 link_enter_failed(link);
882 return r;
883 }
884
885 link->link_messages++;
886 }
887
888 /* now that we can figure out a default address for the dhcp server,
889 start it */
890 if (link_dhcp4_server_enabled(link)) {
891 Address *address;
892 Link *uplink = NULL;
893 bool acquired_uplink = false;
894
895 address = link_find_dhcp_server_address(link);
896 if (!address) {
897 log_link_warning(link, "Failed to find suitable address for DHCPv4 server instance.");
898 link_enter_failed(link);
899 return 0;
900 }
901
902 /* use the server address' subnet as the pool */
903 r = sd_dhcp_server_configure_pool(link->dhcp_server, &address->in_addr.in, address->prefixlen,
904 link->network->dhcp_server_pool_offset, link->network->dhcp_server_pool_size);
905 if (r < 0)
906 return r;
907
908 /* TODO:
909 r = sd_dhcp_server_set_router(link->dhcp_server,
910 &main_address->in_addr.in);
911 if (r < 0)
912 return r;
913 */
914
915 if (link->network->dhcp_server_max_lease_time_usec > 0) {
916 r = sd_dhcp_server_set_max_lease_time(
917 link->dhcp_server,
918 DIV_ROUND_UP(link->network->dhcp_server_max_lease_time_usec, USEC_PER_SEC));
919 if (r < 0)
920 return r;
921 }
922
923 if (link->network->dhcp_server_default_lease_time_usec > 0) {
924 r = sd_dhcp_server_set_default_lease_time(
925 link->dhcp_server,
926 DIV_ROUND_UP(link->network->dhcp_server_default_lease_time_usec, USEC_PER_SEC));
927 if (r < 0)
928 return r;
929 }
930
931 if (link->network->dhcp_server_emit_dns) {
932
933 if (link->network->n_dhcp_server_dns > 0)
934 r = sd_dhcp_server_set_dns(link->dhcp_server, link->network->dhcp_server_dns, link->network->n_dhcp_server_dns);
935 else {
936 uplink = manager_find_uplink(link->manager, link);
937 acquired_uplink = true;
938
939 if (!uplink) {
940 log_link_debug(link, "Not emitting DNS server information on link, couldn't find suitable uplink.");
941 r = 0;
942 } else
943 r = link_push_dns_to_dhcp_server(uplink, link->dhcp_server);
944 }
945 if (r < 0)
946 log_link_warning_errno(link, r, "Failed to set DNS server for DHCP server, ignoring: %m");
947 }
948
949
950 if (link->network->dhcp_server_emit_ntp) {
951
952 if (link->network->n_dhcp_server_ntp > 0)
953 r = sd_dhcp_server_set_ntp(link->dhcp_server, link->network->dhcp_server_ntp, link->network->n_dhcp_server_ntp);
954 else {
955 if (!acquired_uplink)
956 uplink = manager_find_uplink(link->manager, link);
957
958 if (!uplink) {
959 log_link_debug(link, "Not emitting NTP server information on link, couldn't find suitable uplink.");
960 r = 0;
961 } else
962 r = link_push_ntp_to_dhcp_server(uplink, link->dhcp_server);
963
964 }
965 if (r < 0)
966 log_link_warning_errno(link, r, "Failed to set NTP server for DHCP server, ignoring: %m");
967 }
968
969 if (link->network->dhcp_server_emit_timezone) {
970 _cleanup_free_ char *buffer = NULL;
971 const char *tz = NULL;
972
973 if (link->network->dhcp_server_timezone)
974 tz = link->network->dhcp_server_timezone;
975 else {
976 r = get_timezone(&buffer);
977 if (r < 0)
978 log_warning_errno(r, "Failed to determine timezone: %m");
979 else
980 tz = buffer;
981 }
982
983 if (tz) {
984 r = sd_dhcp_server_set_timezone(link->dhcp_server, tz);
985 if (r < 0)
986 return r;
987 }
988 }
989
990 r = sd_dhcp_server_start(link->dhcp_server);
991 if (r < 0) {
992 log_link_warning_errno(link, r, "Could not start DHCPv4 server instance: %m");
993
994 link_enter_failed(link);
995
996 return 0;
997 }
998
999 log_link_debug(link, "Offering DHCPv4 leases");
1000 }
1001
1002 if (link->link_messages == 0)
1003 link_enter_set_routes(link);
1004 else
1005 log_link_debug(link, "Setting addresses");
1006
1007 return 0;
1008 }
1009
1010 int link_address_remove_handler(sd_netlink *rtnl, sd_netlink_message *m, void *userdata) {
1011 _cleanup_link_unref_ Link *link = userdata;
1012 int r;
1013
1014 assert(m);
1015 assert(link);
1016 assert(link->ifname);
1017
1018 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
1019 return 1;
1020
1021 r = sd_netlink_message_get_errno(m);
1022 if (r < 0 && r != -EADDRNOTAVAIL)
1023 log_link_warning_errno(link, r, "Could not drop address: %m");
1024
1025 return 1;
1026 }
1027
1028 static int link_set_bridge_fdb(Link *const link) {
1029 FdbEntry *fdb_entry;
1030 int r = 0;
1031
1032 LIST_FOREACH(static_fdb_entries, fdb_entry, link->network->static_fdb_entries) {
1033 r = fdb_entry_configure(link, fdb_entry);
1034 if (r < 0) {
1035 log_link_error_errno(link, r, "Failed to add MAC entry to static MAC table: %m");
1036 break;
1037 }
1038 }
1039
1040 return r;
1041 }
1042
1043 static int link_set_handler(sd_netlink *rtnl, sd_netlink_message *m, void *userdata) {
1044 _cleanup_link_unref_ Link *link = userdata;
1045 int r;
1046
1047 log_link_debug(link, "Set link");
1048
1049 r = sd_netlink_message_get_errno(m);
1050 if (r < 0 && r != -EEXIST) {
1051 log_link_error_errno(link, r, "Could not join netdev: %m");
1052 link_enter_failed(link);
1053 return 1;
1054 }
1055
1056 return 0;
1057 }
1058
1059 static int set_hostname_handler(sd_bus_message *m, void *userdata, sd_bus_error *ret_error) {
1060 _cleanup_link_unref_ Link *link = userdata;
1061 const sd_bus_error *e;
1062
1063 assert(m);
1064 assert(link);
1065
1066 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
1067 return 1;
1068
1069 e = sd_bus_message_get_error(m);
1070 if (e)
1071 log_link_warning_errno(link, sd_bus_error_get_errno(e), "Could not set hostname: %s", e->message);
1072
1073 return 1;
1074 }
1075
1076 int link_set_hostname(Link *link, const char *hostname) {
1077 int r;
1078
1079 assert(link);
1080 assert(link->manager);
1081
1082 log_link_debug(link, "Setting transient hostname: '%s'", strna(hostname));
1083
1084 if (!link->manager->bus) {
1085 /* TODO: replace by assert when we can rely on kdbus */
1086 log_link_info(link, "Not connected to system bus, ignoring transient hostname.");
1087 return 0;
1088 }
1089
1090 r = sd_bus_call_method_async(
1091 link->manager->bus,
1092 NULL,
1093 "org.freedesktop.hostname1",
1094 "/org/freedesktop/hostname1",
1095 "org.freedesktop.hostname1",
1096 "SetHostname",
1097 set_hostname_handler,
1098 link,
1099 "sb",
1100 hostname,
1101 false);
1102
1103 if (r < 0)
1104 return log_link_error_errno(link, r, "Could not set transient hostname: %m");
1105
1106 link_ref(link);
1107
1108 return 0;
1109 }
1110
1111 static int set_timezone_handler(sd_bus_message *m, void *userdata, sd_bus_error *ret_error) {
1112 _cleanup_link_unref_ Link *link = userdata;
1113 const sd_bus_error *e;
1114
1115 assert(m);
1116 assert(link);
1117
1118 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
1119 return 1;
1120
1121 e = sd_bus_message_get_error(m);
1122 if (e)
1123 log_link_warning_errno(link, sd_bus_error_get_errno(e), "Could not set timezone: %s", e->message);
1124
1125 return 1;
1126 }
1127
1128 int link_set_timezone(Link *link, const char *tz) {
1129 int r;
1130
1131 assert(link);
1132 assert(link->manager);
1133 assert(tz);
1134
1135 log_link_debug(link, "Setting system timezone: '%s'", tz);
1136
1137 if (!link->manager->bus) {
1138 log_link_info(link, "Not connected to system bus, ignoring timezone.");
1139 return 0;
1140 }
1141
1142 r = sd_bus_call_method_async(
1143 link->manager->bus,
1144 NULL,
1145 "org.freedesktop.timedate1",
1146 "/org/freedesktop/timedate1",
1147 "org.freedesktop.timedate1",
1148 "SetTimezone",
1149 set_timezone_handler,
1150 link,
1151 "sb",
1152 tz,
1153 false);
1154 if (r < 0)
1155 return log_link_error_errno(link, r, "Could not set timezone: %m");
1156
1157 link_ref(link);
1158
1159 return 0;
1160 }
1161
1162 static int set_mtu_handler(sd_netlink *rtnl, sd_netlink_message *m, void *userdata) {
1163 _cleanup_link_unref_ Link *link = userdata;
1164 int r;
1165
1166 assert(m);
1167 assert(link);
1168 assert(link->ifname);
1169
1170 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
1171 return 1;
1172
1173 r = sd_netlink_message_get_errno(m);
1174 if (r < 0)
1175 log_link_warning_errno(link, r, "Could not set MTU: %m");
1176
1177 return 1;
1178 }
1179
1180 int link_set_mtu(Link *link, uint32_t mtu) {
1181 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
1182 int r;
1183
1184 assert(link);
1185 assert(link->manager);
1186 assert(link->manager->rtnl);
1187
1188 log_link_debug(link, "Setting MTU: %" PRIu32, mtu);
1189
1190 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_SETLINK, link->ifindex);
1191 if (r < 0)
1192 return log_link_error_errno(link, r, "Could not allocate RTM_SETLINK message: %m");
1193
1194 r = sd_netlink_message_append_u32(req, IFLA_MTU, mtu);
1195 if (r < 0)
1196 return log_link_error_errno(link, r, "Could not append MTU: %m");
1197
1198 r = sd_netlink_call_async(link->manager->rtnl, req, set_mtu_handler, link, 0, NULL);
1199 if (r < 0)
1200 return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
1201
1202 link_ref(link);
1203
1204 return 0;
1205 }
1206
1207 static int link_set_bridge(Link *link) {
1208 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
1209 int r;
1210
1211 assert(link);
1212 assert(link->network);
1213
1214 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_SETLINK, link->ifindex);
1215 if (r < 0)
1216 return log_link_error_errno(link, r, "Could not allocate RTM_SETLINK message: %m");
1217
1218 r = sd_rtnl_message_link_set_family(req, PF_BRIDGE);
1219 if (r < 0)
1220 return log_link_error_errno(link, r, "Could not set message family: %m");
1221
1222 r = sd_netlink_message_open_container(req, IFLA_PROTINFO);
1223 if (r < 0)
1224 return log_link_error_errno(link, r, "Could not append IFLA_PROTINFO attribute: %m");
1225
1226 r = sd_netlink_message_append_u8(req, IFLA_BRPORT_GUARD, !link->network->use_bpdu);
1227 if (r < 0)
1228 return log_link_error_errno(link, r, "Could not append IFLA_BRPORT_GUARD attribute: %m");
1229
1230 r = sd_netlink_message_append_u8(req, IFLA_BRPORT_MODE, link->network->hairpin);
1231 if (r < 0)
1232 return log_link_error_errno(link, r, "Could not append IFLA_BRPORT_MODE attribute: %m");
1233
1234 r = sd_netlink_message_append_u8(req, IFLA_BRPORT_FAST_LEAVE, link->network->fast_leave);
1235 if (r < 0)
1236 return log_link_error_errno(link, r, "Could not append IFLA_BRPORT_FAST_LEAVE attribute: %m");
1237
1238 r = sd_netlink_message_append_u8(req, IFLA_BRPORT_PROTECT, !link->network->allow_port_to_be_root);
1239 if (r < 0)
1240 return log_link_error_errno(link, r, "Could not append IFLA_BRPORT_PROTECT attribute: %m");
1241
1242 r = sd_netlink_message_append_u8(req, IFLA_BRPORT_UNICAST_FLOOD, link->network->unicast_flood);
1243 if (r < 0)
1244 return log_link_error_errno(link, r, "Could not append IFLA_BRPORT_UNICAST_FLOOD attribute: %m");
1245
1246 if (link->network->cost != 0) {
1247 r = sd_netlink_message_append_u32(req, IFLA_BRPORT_COST, link->network->cost);
1248 if (r < 0)
1249 return log_link_error_errno(link, r, "Could not append IFLA_BRPORT_COST attribute: %m");
1250 }
1251
1252 r = sd_netlink_message_close_container(req);
1253 if (r < 0)
1254 return log_link_error_errno(link, r, "Could not append IFLA_LINKINFO attribute: %m");
1255
1256 r = sd_netlink_call_async(link->manager->rtnl, req, link_set_handler, link, 0, NULL);
1257 if (r < 0)
1258 return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
1259
1260 link_ref(link);
1261
1262 return r;
1263 }
1264
1265 static int link_lldp_save(Link *link) {
1266 _cleanup_free_ char *temp_path = NULL;
1267 _cleanup_fclose_ FILE *f = NULL;
1268 sd_lldp_neighbor **l = NULL;
1269 int n = 0, r, i;
1270
1271 assert(link);
1272 assert(link->lldp_file);
1273
1274 if (!link->lldp) {
1275 (void) unlink(link->lldp_file);
1276 return 0;
1277 }
1278
1279 r = sd_lldp_get_neighbors(link->lldp, &l);
1280 if (r < 0)
1281 goto finish;
1282 if (r == 0) {
1283 (void) unlink(link->lldp_file);
1284 goto finish;
1285 }
1286
1287 n = r;
1288
1289 r = fopen_temporary(link->lldp_file, &f, &temp_path);
1290 if (r < 0)
1291 goto finish;
1292
1293 fchmod(fileno(f), 0644);
1294
1295 for (i = 0; i < n; i++) {
1296 const void *p;
1297 le64_t u;
1298 size_t sz;
1299
1300 r = sd_lldp_neighbor_get_raw(l[i], &p, &sz);
1301 if (r < 0)
1302 goto finish;
1303
1304 u = htole64(sz);
1305 (void) fwrite(&u, 1, sizeof(u), f);
1306 (void) fwrite(p, 1, sz, f);
1307 }
1308
1309 r = fflush_and_check(f);
1310 if (r < 0)
1311 goto finish;
1312
1313 if (rename(temp_path, link->lldp_file) < 0) {
1314 r = -errno;
1315 goto finish;
1316 }
1317
1318 finish:
1319 if (r < 0) {
1320 (void) unlink(link->lldp_file);
1321 if (temp_path)
1322 (void) unlink(temp_path);
1323
1324 log_link_error_errno(link, r, "Failed to save LLDP data to %s: %m", link->lldp_file);
1325 }
1326
1327 if (l) {
1328 for (i = 0; i < n; i++)
1329 sd_lldp_neighbor_unref(l[i]);
1330 free(l);
1331 }
1332
1333 return r;
1334 }
1335
1336 static void lldp_handler(sd_lldp *lldp, sd_lldp_event event, sd_lldp_neighbor *n, void *userdata) {
1337 Link *link = userdata;
1338 int r;
1339
1340 assert(link);
1341
1342 (void) link_lldp_save(link);
1343
1344 if (link_lldp_tx_enabled(link) && event == SD_LLDP_EVENT_ADDED) {
1345 /* If we received information about a new neighbor, restart the LLDP "fast" logic */
1346
1347 log_link_debug(link, "Received LLDP datagram from previously unknown neighbor, restarting 'fast' LLDP transmission.");
1348
1349 r = link_lldp_tx_start(link);
1350 if (r < 0)
1351 log_link_warning_errno(link, r, "Failed to restart LLDP transmission: %m");
1352 }
1353 }
1354
1355 static int link_acquire_ipv6_conf(Link *link) {
1356 int r;
1357
1358 assert(link);
1359
1360 if (link_dhcp6_enabled(link)) {
1361 assert(link->dhcp6_client);
1362 assert(in_addr_is_link_local(AF_INET6, (const union in_addr_union*)&link->ipv6ll_address) > 0);
1363
1364 log_link_debug(link, "Acquiring DHCPv6 lease");
1365
1366 r = sd_dhcp6_client_set_local_address(link->dhcp6_client, &link->ipv6ll_address);
1367 if (r < 0 && r != -EBUSY)
1368 return log_link_warning_errno(link, r, "Could not set IPv6LL address in DHCP client: %m");
1369
1370 r = sd_dhcp6_client_start(link->dhcp6_client);
1371 if (r < 0 && r != -EBUSY)
1372 return log_link_warning_errno(link, r, "Could not acquire DHCPv6 lease: %m");
1373 }
1374
1375 if (link_ipv6_accept_ra_enabled(link)) {
1376 assert(link->ndisc_router_discovery);
1377
1378 log_link_debug(link, "Discovering IPv6 routers");
1379
1380 r = sd_ndisc_router_discovery_start(link->ndisc_router_discovery);
1381 if (r < 0 && r != -EBUSY)
1382 return log_link_warning_errno(link, r, "Could not start IPv6 Router Discovery: %m");
1383 }
1384
1385 return 0;
1386 }
1387
1388 static int link_acquire_conf(Link *link) {
1389 int r;
1390
1391 assert(link);
1392 assert(link->network);
1393 assert(link->manager);
1394 assert(link->manager->event);
1395
1396 if (link_ipv4ll_enabled(link)) {
1397 assert(link->ipv4ll);
1398
1399 log_link_debug(link, "Acquiring IPv4 link-local address");
1400
1401 r = sd_ipv4ll_start(link->ipv4ll);
1402 if (r < 0)
1403 return log_link_warning_errno(link, r, "Could not acquire IPv4 link-local address: %m");
1404 }
1405
1406 if (link_dhcp4_enabled(link)) {
1407 assert(link->dhcp_client);
1408
1409 log_link_debug(link, "Acquiring DHCPv4 lease");
1410
1411 r = sd_dhcp_client_start(link->dhcp_client);
1412 if (r < 0)
1413 return log_link_warning_errno(link, r, "Could not acquire DHCPv4 lease: %m");
1414 }
1415
1416 if (link_lldp_tx_enabled(link)) {
1417 r = link_lldp_tx_start(link);
1418 if (r < 0)
1419 return log_link_warning_errno(link, r, "Failed to start LLDP transmission: %m");
1420 }
1421
1422 return 0;
1423 }
1424
1425 bool link_has_carrier(Link *link) {
1426 /* see Documentation/networking/operstates.txt in the kernel sources */
1427
1428 if (link->kernel_operstate == IF_OPER_UP)
1429 return true;
1430
1431 if (link->kernel_operstate == IF_OPER_UNKNOWN)
1432 /* operstate may not be implemented, so fall back to flags */
1433 if ((link->flags & IFF_LOWER_UP) && !(link->flags & IFF_DORMANT))
1434 return true;
1435
1436 return false;
1437 }
1438
1439 static int link_up_handler(sd_netlink *rtnl, sd_netlink_message *m, void *userdata) {
1440 _cleanup_link_unref_ Link *link = userdata;
1441 int r;
1442
1443 assert(link);
1444
1445 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
1446 return 1;
1447
1448 r = sd_netlink_message_get_errno(m);
1449 if (r < 0)
1450 /* we warn but don't fail the link, as it may be
1451 brought up later */
1452 log_link_warning_errno(link, r, "Could not bring up interface: %m");
1453
1454 return 1;
1455 }
1456
1457 static int link_up(Link *link) {
1458 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
1459 uint8_t ipv6ll_mode;
1460 int r;
1461
1462 assert(link);
1463 assert(link->network);
1464 assert(link->manager);
1465 assert(link->manager->rtnl);
1466
1467 log_link_debug(link, "Bringing link up");
1468
1469 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_SETLINK, link->ifindex);
1470 if (r < 0)
1471 return log_link_error_errno(link, r, "Could not allocate RTM_SETLINK message: %m");
1472
1473 r = sd_rtnl_message_link_set_flags(req, IFF_UP, IFF_UP);
1474 if (r < 0)
1475 return log_link_error_errno(link, r, "Could not set link flags: %m");
1476
1477 if (link->network->mac) {
1478 r = sd_netlink_message_append_ether_addr(req, IFLA_ADDRESS, link->network->mac);
1479 if (r < 0)
1480 return log_link_error_errno(link, r, "Could not set MAC address: %m");
1481 }
1482
1483 if (link->network->mtu) {
1484 r = sd_netlink_message_append_u32(req, IFLA_MTU, link->network->mtu);
1485 if (r < 0)
1486 return log_link_error_errno(link, r, "Could not set MTU: %m");
1487 }
1488
1489 r = sd_netlink_message_open_container(req, IFLA_AF_SPEC);
1490 if (r < 0)
1491 return log_link_error_errno(link, r, "Could not open IFLA_AF_SPEC container: %m");
1492
1493 if (socket_ipv6_is_supported()) {
1494 /* if the kernel lacks ipv6 support setting IFF_UP fails if any ipv6 options are passed */
1495 r = sd_netlink_message_open_container(req, AF_INET6);
1496 if (r < 0)
1497 return log_link_error_errno(link, r, "Could not open AF_INET6 container: %m");
1498
1499 ipv6ll_mode = link_ipv6ll_enabled(link) ? IN6_ADDR_GEN_MODE_EUI64 : IN6_ADDR_GEN_MODE_NONE;
1500 r = sd_netlink_message_append_u8(req, IFLA_INET6_ADDR_GEN_MODE, ipv6ll_mode);
1501 if (r < 0)
1502 return log_link_error_errno(link, r, "Could not append IFLA_INET6_ADDR_GEN_MODE: %m");
1503
1504 if (!in_addr_is_null(AF_INET6, &link->network->ipv6_token)) {
1505 r = sd_netlink_message_append_in6_addr(req, IFLA_INET6_TOKEN, &link->network->ipv6_token.in6);
1506 if (r < 0)
1507 return log_link_error_errno(link, r, "Could not append IFLA_INET6_TOKEN: %m");
1508 }
1509
1510 r = sd_netlink_message_close_container(req);
1511 if (r < 0)
1512 return log_link_error_errno(link, r, "Could not close AF_INET6 container: %m");
1513 }
1514
1515 r = sd_netlink_message_close_container(req);
1516 if (r < 0)
1517 return log_link_error_errno(link, r, "Could not close IFLA_AF_SPEC container: %m");
1518
1519 r = sd_netlink_call_async(link->manager->rtnl, req, link_up_handler, link, 0, NULL);
1520 if (r < 0)
1521 return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
1522
1523 link_ref(link);
1524
1525 return 0;
1526 }
1527
1528 static int link_down_handler(sd_netlink *rtnl, sd_netlink_message *m, void *userdata) {
1529 _cleanup_link_unref_ Link *link = userdata;
1530 int r;
1531
1532 assert(link);
1533
1534 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
1535 return 1;
1536
1537 r = sd_netlink_message_get_errno(m);
1538 if (r < 0)
1539 log_link_warning_errno(link, r, "Could not bring down interface: %m");
1540
1541 return 1;
1542 }
1543
1544 static int link_down(Link *link) {
1545 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
1546 int r;
1547
1548 assert(link);
1549 assert(link->manager);
1550 assert(link->manager->rtnl);
1551
1552 log_link_debug(link, "Bringing link down");
1553
1554 r = sd_rtnl_message_new_link(link->manager->rtnl, &req,
1555 RTM_SETLINK, link->ifindex);
1556 if (r < 0)
1557 return log_link_error_errno(link, r, "Could not allocate RTM_SETLINK message: %m");
1558
1559 r = sd_rtnl_message_link_set_flags(req, 0, IFF_UP);
1560 if (r < 0)
1561 return log_link_error_errno(link, r, "Could not set link flags: %m");
1562
1563 r = sd_netlink_call_async(link->manager->rtnl, req, link_down_handler, link, 0, NULL);
1564 if (r < 0)
1565 return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
1566
1567 link_ref(link);
1568
1569 return 0;
1570 }
1571
1572 static int link_handle_bound_to_list(Link *link) {
1573 Link *l;
1574 Iterator i;
1575 int r;
1576 bool required_up = false;
1577 bool link_is_up = false;
1578
1579 assert(link);
1580
1581 if (hashmap_isempty(link->bound_to_links))
1582 return 0;
1583
1584 if (link->flags & IFF_UP)
1585 link_is_up = true;
1586
1587 HASHMAP_FOREACH (l, link->bound_to_links, i)
1588 if (link_has_carrier(l)) {
1589 required_up = true;
1590 break;
1591 }
1592
1593 if (!required_up && link_is_up) {
1594 r = link_down(link);
1595 if (r < 0)
1596 return r;
1597 } else if (required_up && !link_is_up) {
1598 r = link_up(link);
1599 if (r < 0)
1600 return r;
1601 }
1602
1603 return 0;
1604 }
1605
1606 static int link_handle_bound_by_list(Link *link) {
1607 Iterator i;
1608 Link *l;
1609 int r;
1610
1611 assert(link);
1612
1613 if (hashmap_isempty(link->bound_by_links))
1614 return 0;
1615
1616 HASHMAP_FOREACH (l, link->bound_by_links, i) {
1617 r = link_handle_bound_to_list(l);
1618 if (r < 0)
1619 return r;
1620 }
1621
1622 return 0;
1623 }
1624
1625 static int link_put_carrier(Link *link, Link *carrier, Hashmap **h) {
1626 int r;
1627
1628 assert(link);
1629 assert(carrier);
1630
1631 if (link == carrier)
1632 return 0;
1633
1634 if (hashmap_get(*h, INT_TO_PTR(carrier->ifindex)))
1635 return 0;
1636
1637 r = hashmap_ensure_allocated(h, NULL);
1638 if (r < 0)
1639 return r;
1640
1641 r = hashmap_put(*h, INT_TO_PTR(carrier->ifindex), carrier);
1642 if (r < 0)
1643 return r;
1644
1645 return 0;
1646 }
1647
1648 static int link_new_bound_by_list(Link *link) {
1649 Manager *m;
1650 Link *carrier;
1651 Iterator i;
1652 int r;
1653 bool list_updated = false;
1654
1655 assert(link);
1656 assert(link->manager);
1657
1658 m = link->manager;
1659
1660 HASHMAP_FOREACH(carrier, m->links, i) {
1661 if (!carrier->network)
1662 continue;
1663
1664 if (strv_isempty(carrier->network->bind_carrier))
1665 continue;
1666
1667 if (strv_fnmatch(carrier->network->bind_carrier, link->ifname, 0)) {
1668 r = link_put_carrier(link, carrier, &link->bound_by_links);
1669 if (r < 0)
1670 return r;
1671
1672 list_updated = true;
1673 }
1674 }
1675
1676 if (list_updated)
1677 link_dirty(link);
1678
1679 HASHMAP_FOREACH(carrier, link->bound_by_links, i) {
1680 r = link_put_carrier(carrier, link, &carrier->bound_to_links);
1681 if (r < 0)
1682 return r;
1683
1684 link_dirty(carrier);
1685 }
1686
1687 return 0;
1688 }
1689
1690 static int link_new_bound_to_list(Link *link) {
1691 Manager *m;
1692 Link *carrier;
1693 Iterator i;
1694 int r;
1695 bool list_updated = false;
1696
1697 assert(link);
1698 assert(link->manager);
1699
1700 if (!link->network)
1701 return 0;
1702
1703 if (strv_isempty(link->network->bind_carrier))
1704 return 0;
1705
1706 m = link->manager;
1707
1708 HASHMAP_FOREACH (carrier, m->links, i) {
1709 if (strv_fnmatch(link->network->bind_carrier, carrier->ifname, 0)) {
1710 r = link_put_carrier(link, carrier, &link->bound_to_links);
1711 if (r < 0)
1712 return r;
1713
1714 list_updated = true;
1715 }
1716 }
1717
1718 if (list_updated)
1719 link_dirty(link);
1720
1721 HASHMAP_FOREACH (carrier, link->bound_to_links, i) {
1722 r = link_put_carrier(carrier, link, &carrier->bound_by_links);
1723 if (r < 0)
1724 return r;
1725
1726 link_dirty(carrier);
1727 }
1728
1729 return 0;
1730 }
1731
1732 static int link_new_carrier_maps(Link *link) {
1733 int r;
1734
1735 r = link_new_bound_by_list(link);
1736 if (r < 0)
1737 return r;
1738
1739 r = link_handle_bound_by_list(link);
1740 if (r < 0)
1741 return r;
1742
1743 r = link_new_bound_to_list(link);
1744 if (r < 0)
1745 return r;
1746
1747 r = link_handle_bound_to_list(link);
1748 if (r < 0)
1749 return r;
1750
1751 return 0;
1752 }
1753
1754 static void link_free_bound_to_list(Link *link) {
1755 Link *bound_to;
1756 Iterator i;
1757
1758 HASHMAP_FOREACH (bound_to, link->bound_to_links, i) {
1759 hashmap_remove(link->bound_to_links, INT_TO_PTR(bound_to->ifindex));
1760
1761 if (hashmap_remove(bound_to->bound_by_links, INT_TO_PTR(link->ifindex)))
1762 link_dirty(bound_to);
1763 }
1764
1765 return;
1766 }
1767
1768 static void link_free_bound_by_list(Link *link) {
1769 Link *bound_by;
1770 Iterator i;
1771
1772 HASHMAP_FOREACH (bound_by, link->bound_by_links, i) {
1773 hashmap_remove(link->bound_by_links, INT_TO_PTR(bound_by->ifindex));
1774
1775 if (hashmap_remove(bound_by->bound_to_links, INT_TO_PTR(link->ifindex))) {
1776 link_dirty(bound_by);
1777 link_handle_bound_to_list(bound_by);
1778 }
1779 }
1780
1781 return;
1782 }
1783
1784 static void link_free_carrier_maps(Link *link) {
1785 bool list_updated = false;
1786
1787 assert(link);
1788
1789 if (!hashmap_isempty(link->bound_to_links)) {
1790 link_free_bound_to_list(link);
1791 list_updated = true;
1792 }
1793
1794 if (!hashmap_isempty(link->bound_by_links)) {
1795 link_free_bound_by_list(link);
1796 list_updated = true;
1797 }
1798
1799 if (list_updated)
1800 link_dirty(link);
1801
1802 return;
1803 }
1804
1805 void link_drop(Link *link) {
1806 if (!link || link->state == LINK_STATE_LINGER)
1807 return;
1808
1809 link_set_state(link, LINK_STATE_LINGER);
1810
1811 link_free_carrier_maps(link);
1812
1813 log_link_debug(link, "Link removed");
1814
1815 (void)unlink(link->state_file);
1816 link_unref(link);
1817
1818 return;
1819 }
1820
1821 static int link_joined(Link *link) {
1822 int r;
1823
1824 assert(link);
1825 assert(link->network);
1826
1827 if (!hashmap_isempty(link->bound_to_links)) {
1828 r = link_handle_bound_to_list(link);
1829 if (r < 0)
1830 return r;
1831 } else if (!(link->flags & IFF_UP)) {
1832 r = link_up(link);
1833 if (r < 0) {
1834 link_enter_failed(link);
1835 return r;
1836 }
1837 }
1838
1839 if (link->network->bridge) {
1840 r = link_set_bridge(link);
1841 if (r < 0)
1842 log_link_error_errno(link, r, "Could not set bridge message: %m");
1843 }
1844
1845 return link_enter_set_addresses(link);
1846 }
1847
1848 static int netdev_join_handler(sd_netlink *rtnl, sd_netlink_message *m, void *userdata) {
1849 _cleanup_link_unref_ Link *link = userdata;
1850 int r;
1851
1852 assert(link);
1853 assert(link->network);
1854
1855 link->enslaving--;
1856
1857 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
1858 return 1;
1859
1860 r = sd_netlink_message_get_errno(m);
1861 if (r < 0 && r != -EEXIST) {
1862 log_link_error_errno(link, r, "Could not join netdev: %m");
1863 link_enter_failed(link);
1864 return 1;
1865 } else
1866 log_link_debug(link, "Joined netdev");
1867
1868 if (link->enslaving <= 0)
1869 link_joined(link);
1870
1871 return 1;
1872 }
1873
1874 static int link_enter_join_netdev(Link *link) {
1875 NetDev *netdev;
1876 Iterator i;
1877 int r;
1878
1879 assert(link);
1880 assert(link->network);
1881 assert(link->state == LINK_STATE_PENDING);
1882
1883 link_set_state(link, LINK_STATE_ENSLAVING);
1884
1885 link_dirty(link);
1886
1887 if (!link->network->bridge &&
1888 !link->network->bond &&
1889 hashmap_isempty(link->network->stacked_netdevs))
1890 return link_joined(link);
1891
1892 if (link->network->bond) {
1893 log_struct(LOG_DEBUG,
1894 LOG_LINK_INTERFACE(link),
1895 LOG_NETDEV_INTERFACE(link->network->bond),
1896 LOG_LINK_MESSAGE(link, "Enslaving by '%s'", link->network->bond->ifname),
1897 NULL);
1898
1899 r = netdev_join(link->network->bond, link, netdev_join_handler);
1900 if (r < 0) {
1901 log_struct_errno(LOG_WARNING, r,
1902 LOG_LINK_INTERFACE(link),
1903 LOG_NETDEV_INTERFACE(link->network->bond),
1904 LOG_LINK_MESSAGE(link, "Could not join netdev '%s': %m", link->network->bond->ifname),
1905 NULL);
1906
1907 link_enter_failed(link);
1908 return r;
1909 }
1910
1911 link->enslaving++;
1912 }
1913
1914 if (link->network->bridge) {
1915 log_struct(LOG_DEBUG,
1916 LOG_LINK_INTERFACE(link),
1917 LOG_NETDEV_INTERFACE(link->network->bridge),
1918 LOG_LINK_MESSAGE(link, "Enslaving by '%s'", link->network->bridge->ifname),
1919 NULL);
1920
1921 r = netdev_join(link->network->bridge, link, netdev_join_handler);
1922 if (r < 0) {
1923 log_struct_errno(LOG_WARNING, r,
1924 LOG_LINK_INTERFACE(link),
1925 LOG_NETDEV_INTERFACE(link->network->bridge),
1926 LOG_LINK_MESSAGE(link, "Could not join netdev '%s': %m", link->network->bridge->ifname),
1927 NULL),
1928 link_enter_failed(link);
1929 return r;
1930 }
1931
1932 link->enslaving++;
1933 }
1934
1935 HASHMAP_FOREACH(netdev, link->network->stacked_netdevs, i) {
1936
1937 log_struct(LOG_DEBUG,
1938 LOG_LINK_INTERFACE(link),
1939 LOG_NETDEV_INTERFACE(netdev),
1940 LOG_LINK_MESSAGE(link, "Enslaving by '%s'", netdev->ifname),
1941 NULL);
1942
1943 r = netdev_join(netdev, link, netdev_join_handler);
1944 if (r < 0) {
1945 log_struct_errno(LOG_WARNING, r,
1946 LOG_LINK_INTERFACE(link),
1947 LOG_NETDEV_INTERFACE(netdev),
1948 LOG_LINK_MESSAGE(link, "Could not join netdev '%s': %m", netdev->ifname),
1949 NULL);
1950 link_enter_failed(link);
1951 return r;
1952 }
1953
1954 link->enslaving++;
1955 }
1956
1957 return 0;
1958 }
1959
1960 static int link_set_ipv4_forward(Link *link) {
1961 int r;
1962
1963 if (!link_ipv4_forward_enabled(link))
1964 return 0;
1965
1966 /* We propagate the forwarding flag from one interface to the
1967 * global setting one way. This means: as long as at least one
1968 * interface was configured at any time that had IP forwarding
1969 * enabled the setting will stay on for good. We do this
1970 * primarily to keep IPv4 and IPv6 packet forwarding behaviour
1971 * somewhat in sync (see below). */
1972
1973 r = write_string_file("/proc/sys/net/ipv4/ip_forward", "1", WRITE_STRING_FILE_VERIFY_ON_FAILURE);
1974 if (r < 0)
1975 log_link_warning_errno(link, r, "Cannot turn on IPv4 packet forwarding, ignoring: %m");
1976
1977 return 0;
1978 }
1979
1980 static int link_set_ipv6_forward(Link *link) {
1981 int r;
1982
1983 if (!link_ipv6_forward_enabled(link))
1984 return 0;
1985
1986 /* On Linux, the IPv6 stack does not not know a per-interface
1987 * packet forwarding setting: either packet forwarding is on
1988 * for all, or off for all. We hence don't bother with a
1989 * per-interface setting, but simply propagate the interface
1990 * flag, if it is set, to the global flag, one-way. Note that
1991 * while IPv4 would allow a per-interface flag, we expose the
1992 * same behaviour there and also propagate the setting from
1993 * one to all, to keep things simple (see above). */
1994
1995 r = write_string_file("/proc/sys/net/ipv6/conf/all/forwarding", "1", WRITE_STRING_FILE_VERIFY_ON_FAILURE);
1996 if (r < 0)
1997 log_link_warning_errno(link, r, "Cannot configure IPv6 packet forwarding, ignoring: %m");
1998
1999 return 0;
2000 }
2001
2002 static int link_set_ipv6_privacy_extensions(Link *link) {
2003 char buf[DECIMAL_STR_MAX(unsigned) + 1];
2004 IPv6PrivacyExtensions s;
2005 const char *p = NULL;
2006 int r;
2007
2008 s = link_ipv6_privacy_extensions(link);
2009 if (s < 0)
2010 return 0;
2011
2012 p = strjoina("/proc/sys/net/ipv6/conf/", link->ifname, "/use_tempaddr");
2013 xsprintf(buf, "%u", (unsigned) link->network->ipv6_privacy_extensions);
2014
2015 r = write_string_file(p, buf, WRITE_STRING_FILE_VERIFY_ON_FAILURE);
2016 if (r < 0)
2017 log_link_warning_errno(link, r, "Cannot configure IPv6 privacy extension for interface: %m");
2018
2019 return 0;
2020 }
2021
2022 static int link_set_ipv6_accept_ra(Link *link) {
2023 const char *p = NULL;
2024 int r;
2025
2026 /* Make this a NOP if IPv6 is not available */
2027 if (!socket_ipv6_is_supported())
2028 return 0;
2029
2030 if (link->flags & IFF_LOOPBACK)
2031 return 0;
2032
2033 if (!link->network)
2034 return 0;
2035
2036 p = strjoina("/proc/sys/net/ipv6/conf/", link->ifname, "/accept_ra");
2037
2038 /* We handle router advertisments ourselves, tell the kernel to GTFO */
2039 r = write_string_file(p, "0", WRITE_STRING_FILE_VERIFY_ON_FAILURE);
2040 if (r < 0)
2041 log_link_warning_errno(link, r, "Cannot disable kernel IPv6 accept_ra for interface: %m");
2042
2043 return 0;
2044 }
2045
2046 static int link_set_ipv6_dad_transmits(Link *link) {
2047 char buf[DECIMAL_STR_MAX(int) + 1];
2048 const char *p = NULL;
2049 int r;
2050
2051 /* Make this a NOP if IPv6 is not available */
2052 if (!socket_ipv6_is_supported())
2053 return 0;
2054
2055 if (link->flags & IFF_LOOPBACK)
2056 return 0;
2057
2058 if (!link->network)
2059 return 0;
2060
2061 if (link->network->ipv6_dad_transmits < 0)
2062 return 0;
2063
2064 p = strjoina("/proc/sys/net/ipv6/conf/", link->ifname, "/dad_transmits");
2065 xsprintf(buf, "%i", link->network->ipv6_dad_transmits);
2066
2067 r = write_string_file(p, buf, WRITE_STRING_FILE_VERIFY_ON_FAILURE);
2068 if (r < 0)
2069 log_link_warning_errno(link, r, "Cannot set IPv6 dad transmits for interface: %m");
2070
2071 return 0;
2072 }
2073
2074 static int link_set_ipv6_hop_limit(Link *link) {
2075 char buf[DECIMAL_STR_MAX(int) + 1];
2076 const char *p = NULL;
2077 int r;
2078
2079 /* Make this a NOP if IPv6 is not available */
2080 if (!socket_ipv6_is_supported())
2081 return 0;
2082
2083 if (link->flags & IFF_LOOPBACK)
2084 return 0;
2085
2086 if (!link->network)
2087 return 0;
2088
2089 if (link->network->ipv6_hop_limit < 0)
2090 return 0;
2091
2092 p = strjoina("/proc/sys/net/ipv6/conf/", link->ifname, "/hop_limit");
2093 xsprintf(buf, "%i", link->network->ipv6_hop_limit);
2094
2095 r = write_string_file(p, buf, WRITE_STRING_FILE_VERIFY_ON_FAILURE);
2096 if (r < 0)
2097 log_link_warning_errno(link, r, "Cannot set IPv6 hop limit for interface: %m");
2098
2099 return 0;
2100 }
2101
2102 static int link_drop_foreign_config(Link *link) {
2103 Address *address;
2104 Route *route;
2105 Iterator i;
2106 int r;
2107
2108 SET_FOREACH(address, link->addresses_foreign, i) {
2109 /* we consider IPv6LL addresses to be managed by the kernel */
2110 if (address->family == AF_INET6 && in_addr_is_link_local(AF_INET6, &address->in_addr) == 1)
2111 continue;
2112
2113 r = address_remove(address, link, link_address_remove_handler);
2114 if (r < 0)
2115 return r;
2116 }
2117
2118 SET_FOREACH(route, link->routes_foreign, i) {
2119 /* do not touch routes managed by the kernel */
2120 if (route->protocol == RTPROT_KERNEL)
2121 continue;
2122
2123 r = route_remove(route, link, link_address_remove_handler);
2124 if (r < 0)
2125 return r;
2126 }
2127
2128 return 0;
2129 }
2130
2131 static int link_update_lldp(Link *link) {
2132 int r;
2133
2134 assert(link);
2135
2136 if (!link->lldp)
2137 return 0;
2138
2139 if (link->flags & IFF_UP) {
2140 r = sd_lldp_start(link->lldp);
2141 if (r > 0)
2142 log_link_debug(link, "Started LLDP.");
2143 } else {
2144 r = sd_lldp_stop(link->lldp);
2145 if (r > 0)
2146 log_link_debug(link, "Stopped LLDP.");
2147 }
2148
2149 return r;
2150 }
2151
2152 static int link_configure(Link *link) {
2153 int r;
2154
2155 assert(link);
2156 assert(link->network);
2157 assert(link->state == LINK_STATE_PENDING);
2158
2159 /* Drop foreign config, but ignore loopback or critical devices.
2160 * We do not want to remove loopback address or addresses used for root NFS. */
2161 if (!(link->flags & IFF_LOOPBACK) && !(link->network->dhcp_critical)) {
2162 r = link_drop_foreign_config(link);
2163 if (r < 0)
2164 return r;
2165 }
2166
2167 r = link_set_bridge_fdb(link);
2168 if (r < 0)
2169 return r;
2170
2171 r = link_set_ipv4_forward(link);
2172 if (r < 0)
2173 return r;
2174
2175 r = link_set_ipv6_forward(link);
2176 if (r < 0)
2177 return r;
2178
2179 r = link_set_ipv6_privacy_extensions(link);
2180 if (r < 0)
2181 return r;
2182
2183 r = link_set_ipv6_accept_ra(link);
2184 if (r < 0)
2185 return r;
2186
2187 r = link_set_ipv6_dad_transmits(link);
2188 if (r < 0)
2189 return r;
2190
2191 r = link_set_ipv6_hop_limit(link);
2192 if (r < 0)
2193 return r;
2194
2195 if (link_ipv4ll_enabled(link)) {
2196 r = ipv4ll_configure(link);
2197 if (r < 0)
2198 return r;
2199 }
2200
2201 if (link_dhcp4_enabled(link)) {
2202 r = dhcp4_configure(link);
2203 if (r < 0)
2204 return r;
2205 }
2206
2207 if (link_dhcp4_server_enabled(link)) {
2208 r = sd_dhcp_server_new(&link->dhcp_server, link->ifindex);
2209 if (r < 0)
2210 return r;
2211
2212 r = sd_dhcp_server_attach_event(link->dhcp_server, NULL, 0);
2213 if (r < 0)
2214 return r;
2215 }
2216
2217 if (link_dhcp6_enabled(link) ||
2218 link_ipv6_accept_ra_enabled(link)) {
2219 r = dhcp6_configure(link);
2220 if (r < 0)
2221 return r;
2222 }
2223
2224 if (link_ipv6_accept_ra_enabled(link)) {
2225 r = ndisc_configure(link);
2226 if (r < 0)
2227 return r;
2228 }
2229
2230 if (link_lldp_rx_enabled(link)) {
2231 r = sd_lldp_new(&link->lldp, link->ifindex);
2232 if (r < 0)
2233 return r;
2234
2235 r = sd_lldp_match_capabilities(link->lldp,
2236 link->network->lldp_mode == LLDP_MODE_ROUTERS_ONLY ?
2237 _LLDP_SYSTEM_CAPABILITIES_ALL_ROUTERS :
2238 _LLDP_SYSTEM_CAPABILITIES_ALL);
2239 if (r < 0)
2240 return r;
2241
2242 r = sd_lldp_set_filter_address(link->lldp, &link->mac);
2243 if (r < 0)
2244 return r;
2245
2246 r = sd_lldp_attach_event(link->lldp, NULL, 0);
2247 if (r < 0)
2248 return r;
2249
2250 r = sd_lldp_set_callback(link->lldp, lldp_handler, link);
2251 if (r < 0)
2252 return r;
2253
2254 r = link_update_lldp(link);
2255 if (r < 0)
2256 return r;
2257 }
2258
2259 if (link_has_carrier(link)) {
2260 r = link_acquire_conf(link);
2261 if (r < 0)
2262 return r;
2263
2264 if (in_addr_is_null(AF_INET6, (const union in_addr_union*) &link->ipv6ll_address) == 0) {
2265 r = link_acquire_ipv6_conf(link);
2266 if (r < 0)
2267 return r;
2268 }
2269 }
2270
2271 return link_enter_join_netdev(link);
2272 }
2273
2274 static int link_initialized_and_synced(sd_netlink *rtnl, sd_netlink_message *m,
2275 void *userdata) {
2276 _cleanup_link_unref_ Link *link = userdata;
2277 Network *network;
2278 int r;
2279
2280 assert(link);
2281 assert(link->ifname);
2282 assert(link->manager);
2283
2284 if (link->state != LINK_STATE_PENDING)
2285 return 1;
2286
2287 log_link_debug(link, "Link state is up-to-date");
2288
2289 r = link_new_bound_by_list(link);
2290 if (r < 0)
2291 return r;
2292
2293 r = link_handle_bound_by_list(link);
2294 if (r < 0)
2295 return r;
2296
2297 if (!link->network) {
2298 r = network_get(link->manager, link->udev_device, link->ifname,
2299 &link->mac, &network);
2300 if (r == -ENOENT) {
2301 link_enter_unmanaged(link);
2302 return 1;
2303 } else if (r < 0)
2304 return r;
2305
2306 if (link->flags & IFF_LOOPBACK) {
2307 if (network->link_local != ADDRESS_FAMILY_NO)
2308 log_link_debug(link, "Ignoring link-local autoconfiguration for loopback link");
2309
2310 if (network->dhcp != ADDRESS_FAMILY_NO)
2311 log_link_debug(link, "Ignoring DHCP clients for loopback link");
2312
2313 if (network->dhcp_server)
2314 log_link_debug(link, "Ignoring DHCP server for loopback link");
2315 }
2316
2317 r = network_apply(link->manager, network, link);
2318 if (r < 0)
2319 return r;
2320 }
2321
2322 r = link_new_bound_to_list(link);
2323 if (r < 0)
2324 return r;
2325
2326 r = link_configure(link);
2327 if (r < 0)
2328 return r;
2329
2330 return 1;
2331 }
2332
2333 int link_initialized(Link *link, struct udev_device *device) {
2334 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
2335 int r;
2336
2337 assert(link);
2338 assert(link->manager);
2339 assert(link->manager->rtnl);
2340 assert(device);
2341
2342 if (link->state != LINK_STATE_PENDING)
2343 return 0;
2344
2345 if (link->udev_device)
2346 return 0;
2347
2348 log_link_debug(link, "udev initialized link");
2349
2350 link->udev_device = udev_device_ref(device);
2351
2352 /* udev has initialized the link, but we don't know if we have yet
2353 * processed the NEWLINK messages with the latest state. Do a GETLINK,
2354 * when it returns we know that the pending NEWLINKs have already been
2355 * processed and that we are up-to-date */
2356
2357 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_GETLINK,
2358 link->ifindex);
2359 if (r < 0)
2360 return r;
2361
2362 r = sd_netlink_call_async(link->manager->rtnl, req,
2363 link_initialized_and_synced, link, 0, NULL);
2364 if (r < 0)
2365 return r;
2366
2367 link_ref(link);
2368
2369 return 0;
2370 }
2371
2372 static int link_load(Link *link) {
2373 _cleanup_free_ char *network_file = NULL,
2374 *addresses = NULL,
2375 *routes = NULL,
2376 *dhcp4_address = NULL,
2377 *ipv4ll_address = NULL;
2378 union in_addr_union address;
2379 union in_addr_union route_dst;
2380 const char *p;
2381 int r;
2382
2383 assert(link);
2384
2385 r = parse_env_file(link->state_file, NEWLINE,
2386 "NETWORK_FILE", &network_file,
2387 "ADDRESSES", &addresses,
2388 "ROUTES", &routes,
2389 "DHCP4_ADDRESS", &dhcp4_address,
2390 "IPV4LL_ADDRESS", &ipv4ll_address,
2391 NULL);
2392 if (r < 0 && r != -ENOENT)
2393 return log_link_error_errno(link, r, "Failed to read %s: %m", link->state_file);
2394
2395 if (network_file) {
2396 Network *network;
2397 char *suffix;
2398
2399 /* drop suffix */
2400 suffix = strrchr(network_file, '.');
2401 if (!suffix) {
2402 log_link_debug(link, "Failed to get network name from %s", network_file);
2403 goto network_file_fail;
2404 }
2405 *suffix = '\0';
2406
2407 r = network_get_by_name(link->manager, basename(network_file), &network);
2408 if (r < 0) {
2409 log_link_debug_errno(link, r, "Failed to get network %s: %m", basename(network_file));
2410 goto network_file_fail;
2411 }
2412
2413 r = network_apply(link->manager, network, link);
2414 if (r < 0)
2415 return log_link_error_errno(link, r, "Failed to apply network %s: %m", basename(network_file));
2416 }
2417
2418 network_file_fail:
2419
2420 if (addresses) {
2421 p = addresses;
2422
2423 for (;;) {
2424 _cleanup_free_ char *address_str = NULL;
2425 char *prefixlen_str;
2426 int family;
2427 unsigned char prefixlen;
2428
2429 r = extract_first_word(&p, &address_str, NULL, 0);
2430 if (r < 0) {
2431 log_link_debug_errno(link, r, "Failed to extract next address string: %m");
2432 continue;
2433 }
2434 if (r == 0)
2435 break;
2436
2437 prefixlen_str = strchr(address_str, '/');
2438 if (!prefixlen_str) {
2439 log_link_debug(link, "Failed to parse address and prefix length %s", address_str);
2440 continue;
2441 }
2442
2443 *prefixlen_str++ = '\0';
2444
2445 r = sscanf(prefixlen_str, "%hhu", &prefixlen);
2446 if (r != 1) {
2447 log_link_error(link, "Failed to parse prefixlen %s", prefixlen_str);
2448 continue;
2449 }
2450
2451 r = in_addr_from_string_auto(address_str, &family, &address);
2452 if (r < 0) {
2453 log_link_debug_errno(link, r, "Failed to parse address %s: %m", address_str);
2454 continue;
2455 }
2456
2457 r = address_add(link, family, &address, prefixlen, NULL);
2458 if (r < 0)
2459 return log_link_error_errno(link, r, "Failed to add address: %m");
2460 }
2461 }
2462
2463 if (routes) {
2464 p = routes;
2465
2466 for (;;) {
2467 Route *route;
2468 _cleanup_free_ char *route_str = NULL;
2469 _cleanup_(sd_event_source_unrefp) sd_event_source *expire = NULL;
2470 usec_t lifetime;
2471 char *prefixlen_str;
2472 int family;
2473 unsigned char prefixlen, tos, table;
2474 uint32_t priority;
2475
2476 r = extract_first_word(&p, &route_str, NULL, 0);
2477 if (r < 0) {
2478 log_link_debug_errno(link, r, "Failed to extract next route string: %m");
2479 continue;
2480 }
2481 if (r == 0)
2482 break;
2483
2484 prefixlen_str = strchr(route_str, '/');
2485 if (!prefixlen_str) {
2486 log_link_debug(link, "Failed to parse route %s", route_str);
2487 continue;
2488 }
2489
2490 *prefixlen_str++ = '\0';
2491
2492 r = sscanf(prefixlen_str, "%hhu/%hhu/%"SCNu32"/%hhu/"USEC_FMT, &prefixlen, &tos, &priority, &table, &lifetime);
2493 if (r != 5) {
2494 log_link_debug(link,
2495 "Failed to parse destination prefix length, tos, priority, table or expiration %s",
2496 prefixlen_str);
2497 continue;
2498 }
2499
2500 r = in_addr_from_string_auto(route_str, &family, &route_dst);
2501 if (r < 0) {
2502 log_link_debug_errno(link, r, "Failed to parse route destination %s: %m", route_str);
2503 continue;
2504 }
2505
2506 r = route_add(link, family, &route_dst, prefixlen, tos, priority, table, &route);
2507 if (r < 0)
2508 return log_link_error_errno(link, r, "Failed to add route: %m");
2509
2510 if (lifetime != USEC_INFINITY) {
2511 r = sd_event_add_time(link->manager->event, &expire, clock_boottime_or_monotonic(), lifetime,
2512 0, route_expire_handler, route);
2513 if (r < 0)
2514 log_link_warning_errno(link, r, "Could not arm route expiration handler: %m");
2515 }
2516
2517 route->lifetime = lifetime;
2518 sd_event_source_unref(route->expire);
2519 route->expire = expire;
2520 expire = NULL;
2521 }
2522 }
2523
2524 if (dhcp4_address) {
2525 r = in_addr_from_string(AF_INET, dhcp4_address, &address);
2526 if (r < 0) {
2527 log_link_debug_errno(link, r, "Falied to parse DHCPv4 address %s: %m", dhcp4_address);
2528 goto dhcp4_address_fail;
2529 }
2530
2531 r = sd_dhcp_client_new(&link->dhcp_client);
2532 if (r < 0)
2533 return log_link_error_errno(link, r, "Falied to create DHCPv4 client: %m");
2534
2535 r = sd_dhcp_client_set_request_address(link->dhcp_client, &address.in);
2536 if (r < 0)
2537 return log_link_error_errno(link, r, "Falied to set inital DHCPv4 address %s: %m", dhcp4_address);
2538 }
2539
2540 dhcp4_address_fail:
2541
2542 if (ipv4ll_address) {
2543 r = in_addr_from_string(AF_INET, ipv4ll_address, &address);
2544 if (r < 0) {
2545 log_link_debug_errno(link, r, "Falied to parse IPv4LL address %s: %m", ipv4ll_address);
2546 goto ipv4ll_address_fail;
2547 }
2548
2549 r = sd_ipv4ll_new(&link->ipv4ll);
2550 if (r < 0)
2551 return log_link_error_errno(link, r, "Falied to create IPv4LL client: %m");
2552
2553 r = sd_ipv4ll_set_address(link->ipv4ll, &address.in);
2554 if (r < 0)
2555 return log_link_error_errno(link, r, "Falied to set inital IPv4LL address %s: %m", ipv4ll_address);
2556 }
2557
2558 ipv4ll_address_fail:
2559
2560 return 0;
2561 }
2562
2563 int link_add(Manager *m, sd_netlink_message *message, Link **ret) {
2564 Link *link;
2565 _cleanup_udev_device_unref_ struct udev_device *device = NULL;
2566 char ifindex_str[2 + DECIMAL_STR_MAX(int)];
2567 int r;
2568
2569 assert(m);
2570 assert(m->rtnl);
2571 assert(message);
2572 assert(ret);
2573
2574 r = link_new(m, message, ret);
2575 if (r < 0)
2576 return r;
2577
2578 link = *ret;
2579
2580 log_link_debug(link, "Link %d added", link->ifindex);
2581
2582 r = link_load(link);
2583 if (r < 0)
2584 return r;
2585
2586 if (detect_container() <= 0) {
2587 /* not in a container, udev will be around */
2588 sprintf(ifindex_str, "n%d", link->ifindex);
2589 device = udev_device_new_from_device_id(m->udev, ifindex_str);
2590 if (!device) {
2591 r = log_link_warning_errno(link, errno, "Could not find udev device: %m");
2592 goto failed;
2593 }
2594
2595 if (udev_device_get_is_initialized(device) <= 0) {
2596 /* not yet ready */
2597 log_link_debug(link, "link pending udev initialization...");
2598 return 0;
2599 }
2600
2601 r = link_initialized(link, device);
2602 if (r < 0)
2603 goto failed;
2604 } else {
2605 /* we are calling a callback directly, so must take a ref */
2606 link_ref(link);
2607
2608 r = link_initialized_and_synced(m->rtnl, NULL, link);
2609 if (r < 0)
2610 goto failed;
2611 }
2612
2613 return 0;
2614 failed:
2615 link_enter_failed(link);
2616 return r;
2617 }
2618
2619 int link_ipv6ll_gained(Link *link, const struct in6_addr *address) {
2620 int r;
2621
2622 assert(link);
2623
2624 log_link_info(link, "Gained IPv6LL");
2625
2626 link->ipv6ll_address = *address;
2627 link_check_ready(link);
2628
2629 if (!IN_SET(link->state, LINK_STATE_PENDING, LINK_STATE_UNMANAGED, LINK_STATE_FAILED)) {
2630 r = link_acquire_ipv6_conf(link);
2631 if (r < 0) {
2632 link_enter_failed(link);
2633 return r;
2634 }
2635 }
2636
2637 return 0;
2638 }
2639
2640 static int link_carrier_gained(Link *link) {
2641 int r;
2642
2643 assert(link);
2644
2645 if (!IN_SET(link->state, LINK_STATE_PENDING, LINK_STATE_UNMANAGED, LINK_STATE_FAILED)) {
2646 r = link_acquire_conf(link);
2647 if (r < 0) {
2648 link_enter_failed(link);
2649 return r;
2650 }
2651 }
2652
2653 r = link_handle_bound_by_list(link);
2654 if (r < 0)
2655 return r;
2656
2657 return 0;
2658 }
2659
2660 static int link_carrier_lost(Link *link) {
2661 int r;
2662
2663 assert(link);
2664
2665 r = link_stop_clients(link);
2666 if (r < 0) {
2667 link_enter_failed(link);
2668 return r;
2669 }
2670
2671 r = link_handle_bound_by_list(link);
2672 if (r < 0)
2673 return r;
2674
2675 return 0;
2676 }
2677
2678 int link_carrier_reset(Link *link) {
2679 int r;
2680
2681 assert(link);
2682
2683 if (link_has_carrier(link)) {
2684 r = link_carrier_lost(link);
2685 if (r < 0)
2686 return r;
2687
2688 r = link_carrier_gained(link);
2689 if (r < 0)
2690 return r;
2691
2692 log_link_info(link, "Reset carrier");
2693 }
2694
2695 return 0;
2696 }
2697
2698 int link_update(Link *link, sd_netlink_message *m) {
2699 struct ether_addr mac;
2700 const char *ifname;
2701 uint32_t mtu;
2702 bool had_carrier, carrier_gained, carrier_lost;
2703 int r;
2704
2705 assert(link);
2706 assert(link->ifname);
2707 assert(m);
2708
2709 if (link->state == LINK_STATE_LINGER) {
2710 link_ref(link);
2711 log_link_info(link, "Link readded");
2712 link_set_state(link, LINK_STATE_ENSLAVING);
2713
2714 r = link_new_carrier_maps(link);
2715 if (r < 0)
2716 return r;
2717 }
2718
2719 r = sd_netlink_message_read_string(m, IFLA_IFNAME, &ifname);
2720 if (r >= 0 && !streq(ifname, link->ifname)) {
2721 log_link_info(link, "Renamed to %s", ifname);
2722
2723 link_free_carrier_maps(link);
2724
2725 r = free_and_strdup(&link->ifname, ifname);
2726 if (r < 0)
2727 return r;
2728
2729 r = link_new_carrier_maps(link);
2730 if (r < 0)
2731 return r;
2732 }
2733
2734 r = sd_netlink_message_read_u32(m, IFLA_MTU, &mtu);
2735 if (r >= 0 && mtu > 0) {
2736 link->mtu = mtu;
2737 if (!link->original_mtu) {
2738 link->original_mtu = mtu;
2739 log_link_debug(link, "Saved original MTU: %" PRIu32, link->original_mtu);
2740 }
2741
2742 if (link->dhcp_client) {
2743 r = sd_dhcp_client_set_mtu(link->dhcp_client,
2744 link->mtu);
2745 if (r < 0) {
2746 log_link_warning_errno(link, r, "Could not update MTU in DHCP client: %m");
2747 return r;
2748 }
2749 }
2750 }
2751
2752 /* The kernel may broadcast NEWLINK messages without the MAC address
2753 set, simply ignore them. */
2754 r = sd_netlink_message_read_ether_addr(m, IFLA_ADDRESS, &mac);
2755 if (r >= 0) {
2756 if (memcmp(link->mac.ether_addr_octet, mac.ether_addr_octet,
2757 ETH_ALEN)) {
2758
2759 memcpy(link->mac.ether_addr_octet, mac.ether_addr_octet,
2760 ETH_ALEN);
2761
2762 log_link_debug(link, "MAC address: "
2763 "%02hhx:%02hhx:%02hhx:%02hhx:%02hhx:%02hhx",
2764 mac.ether_addr_octet[0],
2765 mac.ether_addr_octet[1],
2766 mac.ether_addr_octet[2],
2767 mac.ether_addr_octet[3],
2768 mac.ether_addr_octet[4],
2769 mac.ether_addr_octet[5]);
2770
2771 if (link->ipv4ll) {
2772 r = sd_ipv4ll_set_mac(link->ipv4ll, &link->mac);
2773 if (r < 0)
2774 return log_link_warning_errno(link, r, "Could not update MAC address in IPv4LL client: %m");
2775 }
2776
2777 if (link->dhcp_client) {
2778 r = sd_dhcp_client_set_mac(link->dhcp_client,
2779 (const uint8_t *) &link->mac,
2780 sizeof (link->mac),
2781 ARPHRD_ETHER);
2782 if (r < 0)
2783 return log_link_warning_errno(link, r, "Could not update MAC address in DHCP client: %m");
2784
2785 if (link->network->duid_type != _DUID_TYPE_INVALID)
2786 r = sd_dhcp_client_set_iaid_duid(link->dhcp_client,
2787 link->network->iaid,
2788 link->network->dhcp_duid_type,
2789 link->network->dhcp_duid,
2790 link->network->dhcp_duid_len);
2791 else
2792 r = sd_dhcp_client_set_iaid_duid(link->dhcp_client,
2793 link->network->iaid,
2794 link->manager->dhcp_duid_type,
2795 link->manager->dhcp_duid,
2796 link->manager->dhcp_duid_len);
2797 if (r < 0)
2798 return log_link_warning_errno(link, r, "Could not update DUID/IAID in DHCP client: %m");
2799 }
2800
2801 if (link->dhcp6_client) {
2802 r = sd_dhcp6_client_set_mac(link->dhcp6_client,
2803 (const uint8_t *) &link->mac,
2804 sizeof (link->mac),
2805 ARPHRD_ETHER);
2806 if (r < 0)
2807 return log_link_warning_errno(link, r, "Could not update MAC address in DHCPv6 client: %m");
2808
2809 r = sd_dhcp6_client_set_iaid(link->dhcp6_client,
2810 link->network->iaid);
2811 if (r < 0)
2812 return log_link_warning_errno(link, r, "Could not update DHCPv6 IAID: %m");
2813
2814 if (link->network->duid_type != _DUID_TYPE_INVALID)
2815 r = sd_dhcp6_client_set_duid(link->dhcp6_client,
2816 link->network->dhcp_duid_type,
2817 link->network->dhcp_duid,
2818 link->network->dhcp_duid_len);
2819 else
2820 r = sd_dhcp6_client_set_duid(link->dhcp6_client,
2821 link->manager->dhcp_duid_type,
2822 link->manager->dhcp_duid,
2823 link->manager->dhcp_duid_len);
2824 if (r < 0)
2825 return log_link_warning_errno(link, r, "Could not update DHCPv6 DUID: %m");
2826 }
2827 }
2828 }
2829
2830 had_carrier = link_has_carrier(link);
2831
2832 r = link_update_flags(link, m);
2833 if (r < 0)
2834 return r;
2835
2836 r = link_update_lldp(link);
2837 if (r < 0)
2838 return r;
2839
2840 carrier_gained = !had_carrier && link_has_carrier(link);
2841 carrier_lost = had_carrier && !link_has_carrier(link);
2842
2843 if (carrier_gained) {
2844 log_link_info(link, "Gained carrier");
2845
2846 r = link_carrier_gained(link);
2847 if (r < 0)
2848 return r;
2849 } else if (carrier_lost) {
2850 log_link_info(link, "Lost carrier");
2851
2852 r = link_carrier_lost(link);
2853 if (r < 0)
2854 return r;
2855 }
2856
2857 return 0;
2858 }
2859
2860 static void print_link_hashmap(FILE *f, const char *prefix, Hashmap* h) {
2861 bool space = false;
2862 Iterator i;
2863 Link *link;
2864
2865 assert(f);
2866 assert(prefix);
2867
2868 if (hashmap_isempty(h))
2869 return;
2870
2871 fputs(prefix, f);
2872 HASHMAP_FOREACH(link, h, i) {
2873 if (space)
2874 fputc(' ', f);
2875
2876 fprintf(f, "%i", link->ifindex);
2877 space = true;
2878 }
2879
2880 fputc('\n', f);
2881 }
2882
2883 int link_save(Link *link) {
2884 _cleanup_free_ char *temp_path = NULL;
2885 _cleanup_fclose_ FILE *f = NULL;
2886 const char *admin_state, *oper_state;
2887 Address *a;
2888 Route *route;
2889 Iterator i;
2890 int r;
2891
2892 assert(link);
2893 assert(link->state_file);
2894 assert(link->lease_file);
2895 assert(link->manager);
2896
2897 if (link->state == LINK_STATE_LINGER) {
2898 unlink(link->state_file);
2899 return 0;
2900 }
2901
2902 link_lldp_save(link);
2903
2904 admin_state = link_state_to_string(link->state);
2905 assert(admin_state);
2906
2907 oper_state = link_operstate_to_string(link->operstate);
2908 assert(oper_state);
2909
2910 r = fopen_temporary(link->state_file, &f, &temp_path);
2911 if (r < 0)
2912 goto fail;
2913
2914 fchmod(fileno(f), 0644);
2915
2916 fprintf(f,
2917 "# This is private data. Do not parse.\n"
2918 "ADMIN_STATE=%s\n"
2919 "OPER_STATE=%s\n",
2920 admin_state, oper_state);
2921
2922 if (link->network) {
2923 bool space;
2924 sd_dhcp6_lease *dhcp6_lease = NULL;
2925 const char *dhcp_domainname = NULL;
2926 char **dhcp6_domains = NULL;
2927
2928 if (link->dhcp6_client) {
2929 r = sd_dhcp6_client_get_lease(link->dhcp6_client, &dhcp6_lease);
2930 if (r < 0 && r != -ENOMSG)
2931 log_link_debug(link, "No DHCPv6 lease");
2932 }
2933
2934 fprintf(f, "NETWORK_FILE=%s\n", link->network->filename);
2935
2936 fputs("DNS=", f);
2937 space = false;
2938 fputstrv(f, link->network->dns, NULL, &space);
2939
2940 if (link->network->dhcp_use_dns &&
2941 link->dhcp_lease) {
2942 const struct in_addr *addresses;
2943
2944 r = sd_dhcp_lease_get_dns(link->dhcp_lease, &addresses);
2945 if (r > 0) {
2946 if (space)
2947 fputc(' ', f);
2948 serialize_in_addrs(f, addresses, r);
2949 space = true;
2950 }
2951 }
2952
2953 if (link->network->dhcp_use_dns && dhcp6_lease) {
2954 struct in6_addr *in6_addrs;
2955
2956 r = sd_dhcp6_lease_get_dns(dhcp6_lease, &in6_addrs);
2957 if (r > 0) {
2958 if (space)
2959 fputc(' ', f);
2960 serialize_in6_addrs(f, in6_addrs, r);
2961 }
2962 }
2963
2964 fputc('\n', f);
2965
2966 fputs("NTP=", f);
2967 space = false;
2968 fputstrv(f, link->network->ntp, NULL, &space);
2969
2970 if (link->network->dhcp_use_ntp &&
2971 link->dhcp_lease) {
2972 const struct in_addr *addresses;
2973
2974 r = sd_dhcp_lease_get_ntp(link->dhcp_lease, &addresses);
2975 if (r > 0) {
2976 if (space)
2977 fputc(' ', f);
2978 serialize_in_addrs(f, addresses, r);
2979 space = true;
2980 }
2981 }
2982
2983 if (link->network->dhcp_use_ntp && dhcp6_lease) {
2984 struct in6_addr *in6_addrs;
2985 char **hosts;
2986
2987 r = sd_dhcp6_lease_get_ntp_addrs(dhcp6_lease,
2988 &in6_addrs);
2989 if (r > 0) {
2990 if (space)
2991 fputc(' ', f);
2992 serialize_in6_addrs(f, in6_addrs, r);
2993 space = true;
2994 }
2995
2996 r = sd_dhcp6_lease_get_ntp_fqdn(dhcp6_lease, &hosts);
2997 if (r > 0)
2998 fputstrv(f, hosts, NULL, &space);
2999 }
3000
3001 fputc('\n', f);
3002
3003 if (link->network->dhcp_use_domains != DHCP_USE_DOMAINS_NO) {
3004 if (link->dhcp_lease)
3005 (void) sd_dhcp_lease_get_domainname(link->dhcp_lease, &dhcp_domainname);
3006
3007 if (dhcp6_lease)
3008 (void) sd_dhcp6_lease_get_domains(dhcp6_lease, &dhcp6_domains);
3009 }
3010
3011 fputs("DOMAINS=", f);
3012 fputstrv(f, link->network->search_domains, NULL, &space);
3013
3014 if (link->network->dhcp_use_domains == DHCP_USE_DOMAINS_YES && dhcp_domainname)
3015 fputs_with_space(f, dhcp_domainname, NULL, &space);
3016
3017 if (link->network->dhcp_use_domains == DHCP_USE_DOMAINS_YES && dhcp6_domains)
3018 fputstrv(f, dhcp6_domains, NULL, &space);
3019
3020 fputc('\n', f);
3021
3022 fputs("ROUTE_DOMAINS=", f);
3023 fputstrv(f, link->network->route_domains, NULL, NULL);
3024
3025 if (link->network->dhcp_use_domains == DHCP_USE_DOMAINS_ROUTE && dhcp_domainname)
3026 fputs_with_space(f, dhcp_domainname, NULL, &space);
3027
3028 if (link->network->dhcp_use_domains == DHCP_USE_DOMAINS_ROUTE && dhcp6_domains)
3029 fputstrv(f, dhcp6_domains, NULL, &space);
3030
3031 fputc('\n', f);
3032
3033 fprintf(f, "LLMNR=%s\n",
3034 resolve_support_to_string(link->network->llmnr));
3035 fprintf(f, "MDNS=%s\n",
3036 resolve_support_to_string(link->network->mdns));
3037
3038 if (link->network->dnssec_mode != _DNSSEC_MODE_INVALID)
3039 fprintf(f, "DNSSEC=%s\n",
3040 dnssec_mode_to_string(link->network->dnssec_mode));
3041
3042 if (!set_isempty(link->network->dnssec_negative_trust_anchors)) {
3043 const char *n;
3044
3045 fputs("DNSSEC_NTA=", f);
3046 space = false;
3047 SET_FOREACH(n, link->network->dnssec_negative_trust_anchors, i)
3048 fputs_with_space(f, n, NULL, &space);
3049 fputc('\n', f);
3050 }
3051
3052 fputs("ADDRESSES=", f);
3053 space = false;
3054 SET_FOREACH(a, link->addresses, i) {
3055 _cleanup_free_ char *address_str = NULL;
3056
3057 r = in_addr_to_string(a->family, &a->in_addr, &address_str);
3058 if (r < 0)
3059 goto fail;
3060
3061 fprintf(f, "%s%s/%u", space ? " " : "", address_str, a->prefixlen);
3062 space = true;
3063 }
3064 fputc('\n', f);
3065
3066 fputs("ROUTES=", f);
3067 space = false;
3068 SET_FOREACH(route, link->routes, i) {
3069 _cleanup_free_ char *route_str = NULL;
3070
3071 r = in_addr_to_string(route->family, &route->dst, &route_str);
3072 if (r < 0)
3073 goto fail;
3074
3075 fprintf(f, "%s%s/%hhu/%hhu/%"PRIu32"/%hhu/"USEC_FMT, space ? " " : "", route_str,
3076 route->dst_prefixlen, route->tos, route->priority, route->table, route->lifetime);
3077 space = true;
3078 }
3079
3080 fputc('\n', f);
3081 }
3082
3083 print_link_hashmap(f, "CARRIER_BOUND_TO=", link->bound_to_links);
3084 print_link_hashmap(f, "CARRIER_BOUND_BY=", link->bound_by_links);
3085
3086 if (link->dhcp_lease) {
3087 struct in_addr address;
3088 const char *tz = NULL;
3089
3090 assert(link->network);
3091
3092 r = sd_dhcp_lease_get_timezone(link->dhcp_lease, &tz);
3093 if (r >= 0)
3094 fprintf(f, "TIMEZONE=%s\n", tz);
3095
3096 r = sd_dhcp_lease_get_address(link->dhcp_lease, &address);
3097 if (r >= 0) {
3098 fputs("DHCP4_ADDRESS=", f);
3099 serialize_in_addrs(f, &address, 1);
3100 fputc('\n', f);
3101 }
3102
3103 r = dhcp_lease_save(link->dhcp_lease, link->lease_file);
3104 if (r < 0)
3105 goto fail;
3106
3107 fprintf(f,
3108 "DHCP_LEASE=%s\n",
3109 link->lease_file);
3110 } else
3111 unlink(link->lease_file);
3112
3113 if (link->ipv4ll) {
3114 struct in_addr address;
3115
3116 r = sd_ipv4ll_get_address(link->ipv4ll, &address);
3117 if (r >= 0) {
3118 fputs("IPV4LL_ADDRESS=", f);
3119 serialize_in_addrs(f, &address, 1);
3120 fputc('\n', f);
3121 }
3122 }
3123
3124 r = fflush_and_check(f);
3125 if (r < 0)
3126 goto fail;
3127
3128 if (rename(temp_path, link->state_file) < 0) {
3129 r = -errno;
3130 goto fail;
3131 }
3132
3133 return 0;
3134
3135 fail:
3136 (void) unlink(link->state_file);
3137 if (temp_path)
3138 (void) unlink(temp_path);
3139
3140 return log_link_error_errno(link, r, "Failed to save link data to %s: %m", link->state_file);
3141 }
3142
3143 /* The serialized state in /run is no longer up-to-date. */
3144 void link_dirty(Link *link) {
3145 int r;
3146
3147 assert(link);
3148
3149 r = set_ensure_allocated(&link->manager->dirty_links, NULL);
3150 if (r < 0)
3151 /* allocation errors are ignored */
3152 return;
3153
3154 r = set_put(link->manager->dirty_links, link);
3155 if (r < 0)
3156 /* allocation errors are ignored */
3157 return;
3158
3159 link_ref(link);
3160 }
3161
3162 /* The serialized state in /run is up-to-date */
3163 void link_clean(Link *link) {
3164 assert(link);
3165 assert(link->manager);
3166
3167 set_remove(link->manager->dirty_links, link);
3168 link_unref(link);
3169 }
3170
3171 static const char* const link_state_table[_LINK_STATE_MAX] = {
3172 [LINK_STATE_PENDING] = "pending",
3173 [LINK_STATE_ENSLAVING] = "configuring",
3174 [LINK_STATE_SETTING_ADDRESSES] = "configuring",
3175 [LINK_STATE_SETTING_ROUTES] = "configuring",
3176 [LINK_STATE_CONFIGURED] = "configured",
3177 [LINK_STATE_UNMANAGED] = "unmanaged",
3178 [LINK_STATE_FAILED] = "failed",
3179 [LINK_STATE_LINGER] = "linger",
3180 };
3181
3182 DEFINE_STRING_TABLE_LOOKUP(link_state, LinkState);
3183
3184 static const char* const link_operstate_table[_LINK_OPERSTATE_MAX] = {
3185 [LINK_OPERSTATE_OFF] = "off",
3186 [LINK_OPERSTATE_NO_CARRIER] = "no-carrier",
3187 [LINK_OPERSTATE_DORMANT] = "dormant",
3188 [LINK_OPERSTATE_CARRIER] = "carrier",
3189 [LINK_OPERSTATE_DEGRADED] = "degraded",
3190 [LINK_OPERSTATE_ROUTABLE] = "routable",
3191 };
3192
3193 DEFINE_STRING_TABLE_LOOKUP(link_operstate, LinkOperationalState);