]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/network/networkd-link.c
Merge pull request #5319 from keszybz/test-execute
[thirdparty/systemd.git] / src / network / networkd-link.c
1 /***
2 This file is part of systemd.
3
4 Copyright 2013 Tom Gundersen <teg@jklm.no>
5
6 systemd is free software; you can redistribute it and/or modify it
7 under the terms of the GNU Lesser General Public License as published by
8 the Free Software Foundation; either version 2.1 of the License, or
9 (at your option) any later version.
10
11 systemd is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 Lesser General Public License for more details.
15
16 You should have received a copy of the GNU Lesser General Public License
17 along with systemd; If not, see <http://www.gnu.org/licenses/>.
18 ***/
19
20 #include <netinet/ether.h>
21 #include <linux/if.h>
22 #include <unistd.h>
23
24 #include "alloc-util.h"
25 #include "bus-util.h"
26 #include "dhcp-lease-internal.h"
27 #include "fd-util.h"
28 #include "fileio.h"
29 #include "netlink-util.h"
30 #include "network-internal.h"
31 #include "networkd-ipv6-proxy-ndp.h"
32 #include "networkd-lldp-tx.h"
33 #include "networkd-manager.h"
34 #include "networkd-ndisc.h"
35 #include "set.h"
36 #include "socket-util.h"
37 #include "stdio-util.h"
38 #include "string-table.h"
39 #include "udev-util.h"
40 #include "util.h"
41 #include "virt.h"
42
43 static bool link_dhcp6_enabled(Link *link) {
44 assert(link);
45
46 if (!socket_ipv6_is_supported())
47 return false;
48
49 if (link->flags & IFF_LOOPBACK)
50 return false;
51
52 if (!link->network)
53 return false;
54
55 return link->network->dhcp & ADDRESS_FAMILY_IPV6;
56 }
57
58 static bool link_dhcp4_enabled(Link *link) {
59 assert(link);
60
61 if (link->flags & IFF_LOOPBACK)
62 return false;
63
64 if (!link->network)
65 return false;
66
67 return link->network->dhcp & ADDRESS_FAMILY_IPV4;
68 }
69
70 static bool link_dhcp4_server_enabled(Link *link) {
71 assert(link);
72
73 if (link->flags & IFF_LOOPBACK)
74 return false;
75
76 if (!link->network)
77 return false;
78
79 return link->network->dhcp_server;
80 }
81
82 static bool link_ipv4ll_enabled(Link *link) {
83 assert(link);
84
85 if (link->flags & IFF_LOOPBACK)
86 return false;
87
88 if (!link->network)
89 return false;
90
91 return link->network->link_local & ADDRESS_FAMILY_IPV4;
92 }
93
94 static bool link_ipv6ll_enabled(Link *link) {
95 assert(link);
96
97 if (!socket_ipv6_is_supported())
98 return false;
99
100 if (link->flags & IFF_LOOPBACK)
101 return false;
102
103 if (!link->network)
104 return false;
105
106 return link->network->link_local & ADDRESS_FAMILY_IPV6;
107 }
108
109 static bool link_ipv6_enabled(Link *link) {
110 assert(link);
111
112 if (!socket_ipv6_is_supported())
113 return false;
114
115 if (link->network->bridge)
116 return false;
117
118 /* DHCPv6 client will not be started if no IPv6 link-local address is configured. */
119 return link_ipv6ll_enabled(link) || network_has_static_ipv6_addresses(link->network);
120 }
121
122 static bool link_lldp_rx_enabled(Link *link) {
123 assert(link);
124
125 if (link->flags & IFF_LOOPBACK)
126 return false;
127
128 if (link->iftype != ARPHRD_ETHER)
129 return false;
130
131 if (!link->network)
132 return false;
133
134 if (link->network->bridge)
135 return false;
136
137 return link->network->lldp_mode != LLDP_MODE_NO;
138 }
139
140 static bool link_lldp_emit_enabled(Link *link) {
141 assert(link);
142
143 if (link->flags & IFF_LOOPBACK)
144 return false;
145
146 if (link->iftype != ARPHRD_ETHER)
147 return false;
148
149 if (!link->network)
150 return false;
151
152 return link->network->lldp_emit != LLDP_EMIT_NO;
153 }
154
155 static bool link_ipv4_forward_enabled(Link *link) {
156 assert(link);
157
158 if (link->flags & IFF_LOOPBACK)
159 return false;
160
161 if (!link->network)
162 return false;
163
164 if (link->network->ip_forward == _ADDRESS_FAMILY_BOOLEAN_INVALID)
165 return false;
166
167 return link->network->ip_forward & ADDRESS_FAMILY_IPV4;
168 }
169
170 static bool link_ipv6_forward_enabled(Link *link) {
171 assert(link);
172
173 if (!socket_ipv6_is_supported())
174 return false;
175
176 if (link->flags & IFF_LOOPBACK)
177 return false;
178
179 if (!link->network)
180 return false;
181
182 if (link->network->ip_forward == _ADDRESS_FAMILY_BOOLEAN_INVALID)
183 return false;
184
185 return link->network->ip_forward & ADDRESS_FAMILY_IPV6;
186 }
187
188 static bool link_proxy_arp_enabled(Link *link) {
189 assert(link);
190
191 if (link->flags & IFF_LOOPBACK)
192 return false;
193
194 if (!link->network)
195 return false;
196
197 if (link->network->proxy_arp < 0)
198 return false;
199
200 return true;
201 }
202
203 static bool link_ipv6_accept_ra_enabled(Link *link) {
204 assert(link);
205
206 if (!socket_ipv6_is_supported())
207 return false;
208
209 if (link->flags & IFF_LOOPBACK)
210 return false;
211
212 if (!link->network)
213 return false;
214
215 /* If unset use system default (enabled if local forwarding is disabled.
216 * disabled if local forwarding is enabled).
217 * If set, ignore or enforce RA independent of local forwarding state.
218 */
219 if (link->network->ipv6_accept_ra < 0)
220 /* default to accept RA if ip_forward is disabled and ignore RA if ip_forward is enabled */
221 return !link_ipv6_forward_enabled(link);
222 else if (link->network->ipv6_accept_ra > 0)
223 /* accept RA even if ip_forward is enabled */
224 return true;
225 else
226 /* ignore RA */
227 return false;
228 }
229
230 static IPv6PrivacyExtensions link_ipv6_privacy_extensions(Link *link) {
231 assert(link);
232
233 if (!socket_ipv6_is_supported())
234 return _IPV6_PRIVACY_EXTENSIONS_INVALID;
235
236 if (link->flags & IFF_LOOPBACK)
237 return _IPV6_PRIVACY_EXTENSIONS_INVALID;
238
239 if (!link->network)
240 return _IPV6_PRIVACY_EXTENSIONS_INVALID;
241
242 return link->network->ipv6_privacy_extensions;
243 }
244
245 static int link_enable_ipv6(Link *link) {
246 const char *p = NULL;
247 bool disabled;
248 int r;
249
250 if (link->flags & IFF_LOOPBACK)
251 return 0;
252
253 disabled = !link_ipv6_enabled(link);
254
255 p = strjoina("/proc/sys/net/ipv6/conf/", link->ifname, "/disable_ipv6");
256
257 r = write_string_file(p, one_zero(disabled), WRITE_STRING_FILE_VERIFY_ON_FAILURE);
258 if (r < 0)
259 log_link_warning_errno(link, r, "Cannot %s IPv6 for interface %s: %m",
260 enable_disable(!disabled), link->ifname);
261 else
262 log_link_info(link, "IPv6 successfully %sd", enable_disable(!disabled));
263
264 return 0;
265 }
266
267 void link_update_operstate(Link *link) {
268 LinkOperationalState operstate;
269 assert(link);
270
271 if (link->kernel_operstate == IF_OPER_DORMANT)
272 operstate = LINK_OPERSTATE_DORMANT;
273 else if (link_has_carrier(link)) {
274 Address *address;
275 uint8_t scope = RT_SCOPE_NOWHERE;
276 Iterator i;
277
278 /* if we have carrier, check what addresses we have */
279 SET_FOREACH(address, link->addresses, i) {
280 if (!address_is_ready(address))
281 continue;
282
283 if (address->scope < scope)
284 scope = address->scope;
285 }
286
287 /* for operstate we also take foreign addresses into account */
288 SET_FOREACH(address, link->addresses_foreign, i) {
289 if (!address_is_ready(address))
290 continue;
291
292 if (address->scope < scope)
293 scope = address->scope;
294 }
295
296 if (scope < RT_SCOPE_SITE)
297 /* universally accessible addresses found */
298 operstate = LINK_OPERSTATE_ROUTABLE;
299 else if (scope < RT_SCOPE_HOST)
300 /* only link or site local addresses found */
301 operstate = LINK_OPERSTATE_DEGRADED;
302 else
303 /* no useful addresses found */
304 operstate = LINK_OPERSTATE_CARRIER;
305 } else if (link->flags & IFF_UP)
306 operstate = LINK_OPERSTATE_NO_CARRIER;
307 else
308 operstate = LINK_OPERSTATE_OFF;
309
310 if (link->operstate != operstate) {
311 link->operstate = operstate;
312 link_send_changed(link, "OperationalState", NULL);
313 link_dirty(link);
314 }
315 }
316
317 #define FLAG_STRING(string, flag, old, new) \
318 (((old ^ new) & flag) \
319 ? ((old & flag) ? (" -" string) : (" +" string)) \
320 : "")
321
322 static int link_update_flags(Link *link, sd_netlink_message *m) {
323 unsigned flags, unknown_flags_added, unknown_flags_removed, unknown_flags;
324 uint8_t operstate;
325 int r;
326
327 assert(link);
328
329 r = sd_rtnl_message_link_get_flags(m, &flags);
330 if (r < 0)
331 return log_link_warning_errno(link, r, "Could not get link flags: %m");
332
333 r = sd_netlink_message_read_u8(m, IFLA_OPERSTATE, &operstate);
334 if (r < 0)
335 /* if we got a message without operstate, take it to mean
336 the state was unchanged */
337 operstate = link->kernel_operstate;
338
339 if ((link->flags == flags) && (link->kernel_operstate == operstate))
340 return 0;
341
342 if (link->flags != flags) {
343 log_link_debug(link, "Flags change:%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s",
344 FLAG_STRING("LOOPBACK", IFF_LOOPBACK, link->flags, flags),
345 FLAG_STRING("MASTER", IFF_MASTER, link->flags, flags),
346 FLAG_STRING("SLAVE", IFF_SLAVE, link->flags, flags),
347 FLAG_STRING("UP", IFF_UP, link->flags, flags),
348 FLAG_STRING("DORMANT", IFF_DORMANT, link->flags, flags),
349 FLAG_STRING("LOWER_UP", IFF_LOWER_UP, link->flags, flags),
350 FLAG_STRING("RUNNING", IFF_RUNNING, link->flags, flags),
351 FLAG_STRING("MULTICAST", IFF_MULTICAST, link->flags, flags),
352 FLAG_STRING("BROADCAST", IFF_BROADCAST, link->flags, flags),
353 FLAG_STRING("POINTOPOINT", IFF_POINTOPOINT, link->flags, flags),
354 FLAG_STRING("PROMISC", IFF_PROMISC, link->flags, flags),
355 FLAG_STRING("ALLMULTI", IFF_ALLMULTI, link->flags, flags),
356 FLAG_STRING("PORTSEL", IFF_PORTSEL, link->flags, flags),
357 FLAG_STRING("AUTOMEDIA", IFF_AUTOMEDIA, link->flags, flags),
358 FLAG_STRING("DYNAMIC", IFF_DYNAMIC, link->flags, flags),
359 FLAG_STRING("NOARP", IFF_NOARP, link->flags, flags),
360 FLAG_STRING("NOTRAILERS", IFF_NOTRAILERS, link->flags, flags),
361 FLAG_STRING("DEBUG", IFF_DEBUG, link->flags, flags),
362 FLAG_STRING("ECHO", IFF_ECHO, link->flags, flags));
363
364 unknown_flags = ~(IFF_LOOPBACK | IFF_MASTER | IFF_SLAVE | IFF_UP |
365 IFF_DORMANT | IFF_LOWER_UP | IFF_RUNNING |
366 IFF_MULTICAST | IFF_BROADCAST | IFF_POINTOPOINT |
367 IFF_PROMISC | IFF_ALLMULTI | IFF_PORTSEL |
368 IFF_AUTOMEDIA | IFF_DYNAMIC | IFF_NOARP |
369 IFF_NOTRAILERS | IFF_DEBUG | IFF_ECHO);
370 unknown_flags_added = ((link->flags ^ flags) & flags & unknown_flags);
371 unknown_flags_removed = ((link->flags ^ flags) & link->flags & unknown_flags);
372
373 /* link flags are currently at most 18 bits, let's align to
374 * printing 20 */
375 if (unknown_flags_added)
376 log_link_debug(link,
377 "Unknown link flags gained: %#.5x (ignoring)",
378 unknown_flags_added);
379
380 if (unknown_flags_removed)
381 log_link_debug(link,
382 "Unknown link flags lost: %#.5x (ignoring)",
383 unknown_flags_removed);
384 }
385
386 link->flags = flags;
387 link->kernel_operstate = operstate;
388
389 link_update_operstate(link);
390
391 return 0;
392 }
393
394 static int link_new(Manager *manager, sd_netlink_message *message, Link **ret) {
395 _cleanup_link_unref_ Link *link = NULL;
396 uint16_t type;
397 const char *ifname, *kind = NULL;
398 int r, ifindex;
399 unsigned short iftype;
400
401 assert(manager);
402 assert(message);
403 assert(ret);
404
405 /* check for link kind */
406 r = sd_netlink_message_enter_container(message, IFLA_LINKINFO);
407 if (r == 0) {
408 (void)sd_netlink_message_read_string(message, IFLA_INFO_KIND, &kind);
409 r = sd_netlink_message_exit_container(message);
410 if (r < 0)
411 return r;
412 }
413
414 r = sd_netlink_message_get_type(message, &type);
415 if (r < 0)
416 return r;
417 else if (type != RTM_NEWLINK)
418 return -EINVAL;
419
420 r = sd_rtnl_message_link_get_ifindex(message, &ifindex);
421 if (r < 0)
422 return r;
423 else if (ifindex <= 0)
424 return -EINVAL;
425
426 r = sd_rtnl_message_link_get_type(message, &iftype);
427 if (r < 0)
428 return r;
429
430 r = sd_netlink_message_read_string(message, IFLA_IFNAME, &ifname);
431 if (r < 0)
432 return r;
433
434 link = new0(Link, 1);
435 if (!link)
436 return -ENOMEM;
437
438 link->n_ref = 1;
439 link->manager = manager;
440 link->state = LINK_STATE_PENDING;
441 link->rtnl_extended_attrs = true;
442 link->ifindex = ifindex;
443 link->iftype = iftype;
444 link->ifname = strdup(ifname);
445 if (!link->ifname)
446 return -ENOMEM;
447
448 if (kind) {
449 link->kind = strdup(kind);
450 if (!link->kind)
451 return -ENOMEM;
452 }
453
454 r = sd_netlink_message_read_ether_addr(message, IFLA_ADDRESS, &link->mac);
455 if (r < 0)
456 log_link_debug_errno(link, r, "MAC address not found for new device, continuing without");
457
458 if (asprintf(&link->state_file, "/run/systemd/netif/links/%d", link->ifindex) < 0)
459 return -ENOMEM;
460
461 if (asprintf(&link->lease_file, "/run/systemd/netif/leases/%d", link->ifindex) < 0)
462 return -ENOMEM;
463
464 if (asprintf(&link->lldp_file, "/run/systemd/netif/lldp/%d", link->ifindex) < 0)
465 return -ENOMEM;
466
467 r = hashmap_ensure_allocated(&manager->links, NULL);
468 if (r < 0)
469 return r;
470
471 r = hashmap_put(manager->links, INT_TO_PTR(link->ifindex), link);
472 if (r < 0)
473 return r;
474
475 r = link_update_flags(link, message);
476 if (r < 0)
477 return r;
478
479 *ret = link;
480 link = NULL;
481
482 return 0;
483 }
484
485 static void link_free(Link *link) {
486 Address *address;
487 Iterator i;
488 Link *carrier;
489
490 if (!link)
491 return;
492
493 while (!set_isempty(link->addresses))
494 address_free(set_first(link->addresses));
495
496 while (!set_isempty(link->addresses_foreign))
497 address_free(set_first(link->addresses_foreign));
498
499 link->addresses = set_free(link->addresses);
500
501 link->addresses_foreign = set_free(link->addresses_foreign);
502
503 while ((address = link->pool_addresses)) {
504 LIST_REMOVE(addresses, link->pool_addresses, address);
505 address_free(address);
506 }
507
508 sd_dhcp_server_unref(link->dhcp_server);
509 sd_dhcp_client_unref(link->dhcp_client);
510 sd_dhcp_lease_unref(link->dhcp_lease);
511
512 link_lldp_emit_stop(link);
513
514 free(link->lease_file);
515
516 sd_lldp_unref(link->lldp);
517 free(link->lldp_file);
518
519 ndisc_flush(link);
520
521 sd_ipv4ll_unref(link->ipv4ll);
522 sd_dhcp6_client_unref(link->dhcp6_client);
523 sd_ndisc_unref(link->ndisc);
524
525 if (link->manager)
526 hashmap_remove(link->manager->links, INT_TO_PTR(link->ifindex));
527
528 free(link->ifname);
529
530 free(link->kind);
531
532 (void)unlink(link->state_file);
533 free(link->state_file);
534
535 udev_device_unref(link->udev_device);
536
537 HASHMAP_FOREACH (carrier, link->bound_to_links, i)
538 hashmap_remove(link->bound_to_links, INT_TO_PTR(carrier->ifindex));
539 hashmap_free(link->bound_to_links);
540
541 HASHMAP_FOREACH (carrier, link->bound_by_links, i)
542 hashmap_remove(link->bound_by_links, INT_TO_PTR(carrier->ifindex));
543 hashmap_free(link->bound_by_links);
544
545 free(link);
546 }
547
548 Link *link_unref(Link *link) {
549 if (!link)
550 return NULL;
551
552 assert(link->n_ref > 0);
553
554 link->n_ref--;
555
556 if (link->n_ref > 0)
557 return NULL;
558
559 link_free(link);
560
561 return NULL;
562 }
563
564 Link *link_ref(Link *link) {
565 if (!link)
566 return NULL;
567
568 assert(link->n_ref > 0);
569
570 link->n_ref++;
571
572 return link;
573 }
574
575 int link_get(Manager *m, int ifindex, Link **ret) {
576 Link *link;
577
578 assert(m);
579 assert(ifindex);
580 assert(ret);
581
582 link = hashmap_get(m->links, INT_TO_PTR(ifindex));
583 if (!link)
584 return -ENODEV;
585
586 *ret = link;
587
588 return 0;
589 }
590
591 static void link_set_state(Link *link, LinkState state) {
592 assert(link);
593
594 if (link->state == state)
595 return;
596
597 link->state = state;
598
599 link_send_changed(link, "AdministrativeState", NULL);
600 }
601
602 static void link_enter_unmanaged(Link *link) {
603 assert(link);
604
605 log_link_debug(link, "Unmanaged");
606
607 link_set_state(link, LINK_STATE_UNMANAGED);
608
609 link_dirty(link);
610 }
611
612 static int link_stop_clients(Link *link) {
613 int r = 0, k;
614
615 assert(link);
616 assert(link->manager);
617 assert(link->manager->event);
618
619 if (link->dhcp_client) {
620 k = sd_dhcp_client_stop(link->dhcp_client);
621 if (k < 0)
622 r = log_link_warning_errno(link, k, "Could not stop DHCPv4 client: %m");
623 }
624
625 if (link->ipv4ll) {
626 k = sd_ipv4ll_stop(link->ipv4ll);
627 if (k < 0)
628 r = log_link_warning_errno(link, k, "Could not stop IPv4 link-local: %m");
629 }
630
631 if (link->dhcp6_client) {
632 k = sd_dhcp6_client_stop(link->dhcp6_client);
633 if (k < 0)
634 r = log_link_warning_errno(link, k, "Could not stop DHCPv6 client: %m");
635 }
636
637 if (link->ndisc) {
638 k = sd_ndisc_stop(link->ndisc);
639 if (k < 0)
640 r = log_link_warning_errno(link, k, "Could not stop IPv6 Router Discovery: %m");
641 }
642
643 link_lldp_emit_stop(link);
644 return r;
645 }
646
647 void link_enter_failed(Link *link) {
648 assert(link);
649
650 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
651 return;
652
653 log_link_warning(link, "Failed");
654
655 link_set_state(link, LINK_STATE_FAILED);
656
657 link_stop_clients(link);
658
659 link_dirty(link);
660 }
661
662 static Address* link_find_dhcp_server_address(Link *link) {
663 Address *address;
664
665 assert(link);
666 assert(link->network);
667
668 /* The first statically configured address if there is any */
669 LIST_FOREACH(addresses, address, link->network->static_addresses) {
670
671 if (address->family != AF_INET)
672 continue;
673
674 if (in_addr_is_null(address->family, &address->in_addr))
675 continue;
676
677 return address;
678 }
679
680 /* If that didn't work, find a suitable address we got from the pool */
681 LIST_FOREACH(addresses, address, link->pool_addresses) {
682 if (address->family != AF_INET)
683 continue;
684
685 return address;
686 }
687
688 return NULL;
689 }
690
691 static void link_enter_configured(Link *link) {
692 assert(link);
693 assert(link->network);
694
695 if (link->state != LINK_STATE_SETTING_ROUTES)
696 return;
697
698 log_link_info(link, "Configured");
699
700 link_set_state(link, LINK_STATE_CONFIGURED);
701
702 link_dirty(link);
703 }
704
705 void link_check_ready(Link *link) {
706 Address *a;
707 Iterator i;
708
709 assert(link);
710
711 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
712 return;
713
714 if (!link->network)
715 return;
716
717 if (!link->static_configured)
718 return;
719
720 if (link_ipv4ll_enabled(link))
721 if (!link->ipv4ll_address ||
722 !link->ipv4ll_route)
723 return;
724
725 if (link_ipv6ll_enabled(link))
726 if (in_addr_is_null(AF_INET6, (const union in_addr_union*) &link->ipv6ll_address) > 0)
727 return;
728
729 if ((link_dhcp4_enabled(link) && !link_dhcp6_enabled(link) &&
730 !link->dhcp4_configured) ||
731 (link_dhcp6_enabled(link) && !link_dhcp4_enabled(link) &&
732 !link->dhcp6_configured) ||
733 (link_dhcp4_enabled(link) && link_dhcp6_enabled(link) &&
734 !link->dhcp4_configured && !link->dhcp6_configured))
735 return;
736
737 if (link_ipv6_accept_ra_enabled(link) && !link->ndisc_configured)
738 return;
739
740 SET_FOREACH(a, link->addresses, i)
741 if (!address_is_ready(a))
742 return;
743
744 if (link->state != LINK_STATE_CONFIGURED)
745 link_enter_configured(link);
746
747 return;
748 }
749
750 static int route_handler(sd_netlink *rtnl, sd_netlink_message *m, void *userdata) {
751 _cleanup_link_unref_ Link *link = userdata;
752 int r;
753
754 assert(link->link_messages > 0);
755 assert(IN_SET(link->state, LINK_STATE_SETTING_ADDRESSES,
756 LINK_STATE_SETTING_ROUTES, LINK_STATE_FAILED,
757 LINK_STATE_LINGER));
758
759 link->link_messages--;
760
761 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
762 return 1;
763
764 r = sd_netlink_message_get_errno(m);
765 if (r < 0 && r != -EEXIST)
766 log_link_warning_errno(link, r, "Could not set route: %m");
767
768 if (link->link_messages == 0) {
769 log_link_debug(link, "Routes set");
770 link->static_configured = true;
771 link_check_ready(link);
772 }
773
774 return 1;
775 }
776
777 static int link_enter_set_routes(Link *link) {
778 Route *rt;
779 int r;
780
781 assert(link);
782 assert(link->network);
783 assert(link->state == LINK_STATE_SETTING_ADDRESSES);
784
785 link_set_state(link, LINK_STATE_SETTING_ROUTES);
786
787 LIST_FOREACH(routes, rt, link->network->static_routes) {
788 r = route_configure(rt, link, route_handler);
789 if (r < 0) {
790 log_link_warning_errno(link, r, "Could not set routes: %m");
791 link_enter_failed(link);
792 return r;
793 }
794
795 link->link_messages++;
796 }
797
798 if (link->link_messages == 0) {
799 link->static_configured = true;
800 link_check_ready(link);
801 } else
802 log_link_debug(link, "Setting routes");
803
804 return 0;
805 }
806
807 int link_route_remove_handler(sd_netlink *rtnl, sd_netlink_message *m, void *userdata) {
808 _cleanup_link_unref_ Link *link = userdata;
809 int r;
810
811 assert(m);
812 assert(link);
813 assert(link->ifname);
814
815 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
816 return 1;
817
818 r = sd_netlink_message_get_errno(m);
819 if (r < 0 && r != -ESRCH)
820 log_link_warning_errno(link, r, "Could not drop route: %m");
821
822 return 1;
823 }
824
825 static int address_handler(sd_netlink *rtnl, sd_netlink_message *m, void *userdata) {
826 _cleanup_link_unref_ Link *link = userdata;
827 int r;
828
829 assert(rtnl);
830 assert(m);
831 assert(link);
832 assert(link->ifname);
833 assert(link->link_messages > 0);
834 assert(IN_SET(link->state, LINK_STATE_SETTING_ADDRESSES,
835 LINK_STATE_FAILED, LINK_STATE_LINGER));
836
837 link->link_messages--;
838
839 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
840 return 1;
841
842 r = sd_netlink_message_get_errno(m);
843 if (r < 0 && r != -EEXIST)
844 log_link_warning_errno(link, r, "could not set address: %m");
845 else if (r >= 0)
846 manager_rtnl_process_address(rtnl, m, link->manager);
847
848 if (link->link_messages == 0) {
849 log_link_debug(link, "Addresses set");
850 link_enter_set_routes(link);
851 }
852
853 return 1;
854 }
855
856 static int link_push_uplink_dns_to_dhcp_server(Link *link, sd_dhcp_server *s) {
857 _cleanup_free_ struct in_addr *addresses = NULL;
858 size_t n_addresses = 0, n_allocated = 0;
859 unsigned i;
860
861 log_debug("Copying DNS server information from %s", link->ifname);
862
863 if (!link->network)
864 return 0;
865
866 for (i = 0; i < link->network->n_dns; i++) {
867 struct in_addr ia;
868
869 /* Only look for IPv4 addresses */
870 if (link->network->dns[i].family != AF_INET)
871 continue;
872
873 ia = link->network->dns[i].address.in;
874
875 /* Never propagate obviously borked data */
876 if (in4_addr_is_null(&ia) || in4_addr_is_localhost(&ia))
877 continue;
878
879 if (!GREEDY_REALLOC(addresses, n_allocated, n_addresses + 1))
880 return log_oom();
881
882 addresses[n_addresses++] = ia;
883 }
884
885 if (link->network->dhcp_use_dns && link->dhcp_lease) {
886 const struct in_addr *da = NULL;
887 int n;
888
889 n = sd_dhcp_lease_get_dns(link->dhcp_lease, &da);
890 if (n > 0) {
891
892 if (!GREEDY_REALLOC(addresses, n_allocated, n_addresses + n))
893 return log_oom();
894
895 memcpy(addresses + n_addresses, da, n * sizeof(struct in_addr));
896 n_addresses += n;
897 }
898 }
899
900 if (n_addresses <= 0)
901 return 0;
902
903 return sd_dhcp_server_set_dns(s, addresses, n_addresses);
904 }
905
906 static int link_push_uplink_ntp_to_dhcp_server(Link *link, sd_dhcp_server *s) {
907 _cleanup_free_ struct in_addr *addresses = NULL;
908 size_t n_addresses = 0, n_allocated = 0;
909 char **a;
910
911 if (!link->network)
912 return 0;
913
914 log_debug("Copying NTP server information from %s", link->ifname);
915
916 STRV_FOREACH(a, link->network->ntp) {
917 struct in_addr ia;
918
919 /* Only look for IPv4 addresses */
920 if (inet_pton(AF_INET, *a, &ia) <= 0)
921 continue;
922
923 /* Never propagate obviously borked data */
924 if (in4_addr_is_null(&ia) || in4_addr_is_localhost(&ia))
925 continue;
926
927 if (!GREEDY_REALLOC(addresses, n_allocated, n_addresses + 1))
928 return log_oom();
929
930 addresses[n_addresses++] = ia;
931 }
932
933 if (link->network->dhcp_use_ntp && link->dhcp_lease) {
934 const struct in_addr *da = NULL;
935 int n;
936
937 n = sd_dhcp_lease_get_ntp(link->dhcp_lease, &da);
938 if (n > 0) {
939
940 if (!GREEDY_REALLOC(addresses, n_allocated, n_addresses + n))
941 return log_oom();
942
943 memcpy(addresses + n_addresses, da, n * sizeof(struct in_addr));
944 n_addresses += n;
945 }
946 }
947
948 if (n_addresses <= 0)
949 return 0;
950
951 return sd_dhcp_server_set_ntp(s, addresses, n_addresses);
952 }
953
954 static int link_set_bridge_fdb(Link *link) {
955 FdbEntry *fdb_entry;
956 int r;
957
958 LIST_FOREACH(static_fdb_entries, fdb_entry, link->network->static_fdb_entries) {
959 r = fdb_entry_configure(link, fdb_entry);
960 if (r < 0)
961 return log_link_error_errno(link, r, "Failed to add MAC entry to static MAC table: %m");
962 }
963
964 return 0;
965 }
966
967 static int link_enter_set_addresses(Link *link) {
968 Address *ad;
969 int r;
970
971 assert(link);
972 assert(link->network);
973 assert(link->state != _LINK_STATE_INVALID);
974
975 r = link_set_bridge_fdb(link);
976 if (r < 0)
977 return r;
978
979 link_set_state(link, LINK_STATE_SETTING_ADDRESSES);
980
981 LIST_FOREACH(addresses, ad, link->network->static_addresses) {
982 r = address_configure(ad, link, address_handler, false);
983 if (r < 0) {
984 log_link_warning_errno(link, r, "Could not set addresses: %m");
985 link_enter_failed(link);
986 return r;
987 }
988
989 link->link_messages++;
990 }
991
992 /* now that we can figure out a default address for the dhcp server,
993 start it */
994 if (link_dhcp4_server_enabled(link)) {
995 Address *address;
996 Link *uplink = NULL;
997 bool acquired_uplink = false;
998
999 address = link_find_dhcp_server_address(link);
1000 if (!address) {
1001 log_link_warning(link, "Failed to find suitable address for DHCPv4 server instance.");
1002 link_enter_failed(link);
1003 return 0;
1004 }
1005
1006 /* use the server address' subnet as the pool */
1007 r = sd_dhcp_server_configure_pool(link->dhcp_server, &address->in_addr.in, address->prefixlen,
1008 link->network->dhcp_server_pool_offset, link->network->dhcp_server_pool_size);
1009 if (r < 0)
1010 return r;
1011
1012 /* TODO:
1013 r = sd_dhcp_server_set_router(link->dhcp_server,
1014 &main_address->in_addr.in);
1015 if (r < 0)
1016 return r;
1017 */
1018
1019 if (link->network->dhcp_server_max_lease_time_usec > 0) {
1020 r = sd_dhcp_server_set_max_lease_time(
1021 link->dhcp_server,
1022 DIV_ROUND_UP(link->network->dhcp_server_max_lease_time_usec, USEC_PER_SEC));
1023 if (r < 0)
1024 return r;
1025 }
1026
1027 if (link->network->dhcp_server_default_lease_time_usec > 0) {
1028 r = sd_dhcp_server_set_default_lease_time(
1029 link->dhcp_server,
1030 DIV_ROUND_UP(link->network->dhcp_server_default_lease_time_usec, USEC_PER_SEC));
1031 if (r < 0)
1032 return r;
1033 }
1034
1035 if (link->network->dhcp_server_emit_dns) {
1036
1037 if (link->network->n_dhcp_server_dns > 0)
1038 r = sd_dhcp_server_set_dns(link->dhcp_server, link->network->dhcp_server_dns, link->network->n_dhcp_server_dns);
1039 else {
1040 uplink = manager_find_uplink(link->manager, link);
1041 acquired_uplink = true;
1042
1043 if (!uplink) {
1044 log_link_debug(link, "Not emitting DNS server information on link, couldn't find suitable uplink.");
1045 r = 0;
1046 } else
1047 r = link_push_uplink_dns_to_dhcp_server(uplink, link->dhcp_server);
1048 }
1049 if (r < 0)
1050 log_link_warning_errno(link, r, "Failed to set DNS server for DHCP server, ignoring: %m");
1051 }
1052
1053
1054 if (link->network->dhcp_server_emit_ntp) {
1055
1056 if (link->network->n_dhcp_server_ntp > 0)
1057 r = sd_dhcp_server_set_ntp(link->dhcp_server, link->network->dhcp_server_ntp, link->network->n_dhcp_server_ntp);
1058 else {
1059 if (!acquired_uplink)
1060 uplink = manager_find_uplink(link->manager, link);
1061
1062 if (!uplink) {
1063 log_link_debug(link, "Not emitting NTP server information on link, couldn't find suitable uplink.");
1064 r = 0;
1065 } else
1066 r = link_push_uplink_ntp_to_dhcp_server(uplink, link->dhcp_server);
1067
1068 }
1069 if (r < 0)
1070 log_link_warning_errno(link, r, "Failed to set NTP server for DHCP server, ignoring: %m");
1071 }
1072
1073 r = sd_dhcp_server_set_emit_router(link->dhcp_server, link->network->dhcp_server_emit_router);
1074 if (r < 0) {
1075 log_link_warning_errno(link, r, "Failed to set router emission for DHCP server: %m");
1076 return r;
1077 }
1078
1079 if (link->network->dhcp_server_emit_timezone) {
1080 _cleanup_free_ char *buffer = NULL;
1081 const char *tz = NULL;
1082
1083 if (link->network->dhcp_server_timezone)
1084 tz = link->network->dhcp_server_timezone;
1085 else {
1086 r = get_timezone(&buffer);
1087 if (r < 0)
1088 log_warning_errno(r, "Failed to determine timezone: %m");
1089 else
1090 tz = buffer;
1091 }
1092
1093 if (tz) {
1094 r = sd_dhcp_server_set_timezone(link->dhcp_server, tz);
1095 if (r < 0)
1096 return r;
1097 }
1098 }
1099
1100 r = sd_dhcp_server_start(link->dhcp_server);
1101 if (r < 0) {
1102 log_link_warning_errno(link, r, "Could not start DHCPv4 server instance: %m");
1103
1104 link_enter_failed(link);
1105
1106 return 0;
1107 }
1108
1109 log_link_debug(link, "Offering DHCPv4 leases");
1110 }
1111
1112 if (link->link_messages == 0)
1113 link_enter_set_routes(link);
1114 else
1115 log_link_debug(link, "Setting addresses");
1116
1117 return 0;
1118 }
1119
1120 int link_address_remove_handler(sd_netlink *rtnl, sd_netlink_message *m, void *userdata) {
1121 _cleanup_link_unref_ Link *link = userdata;
1122 int r;
1123
1124 assert(m);
1125 assert(link);
1126 assert(link->ifname);
1127
1128 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
1129 return 1;
1130
1131 r = sd_netlink_message_get_errno(m);
1132 if (r < 0 && r != -EADDRNOTAVAIL)
1133 log_link_warning_errno(link, r, "Could not drop address: %m");
1134
1135 return 1;
1136 }
1137
1138 static int link_set_bridge_vlan(Link *link) {
1139 int r = 0;
1140
1141 r = br_vlan_configure(link, link->network->pvid, link->network->br_vid_bitmap, link->network->br_untagged_bitmap);
1142 if (r < 0)
1143 log_link_error_errno(link, r, "Failed to assign VLANs to bridge port: %m");
1144
1145 return r;
1146 }
1147
1148 static int link_set_proxy_arp(Link *link) {
1149 const char *p = NULL;
1150 int r;
1151
1152 if (!link_proxy_arp_enabled(link))
1153 return 0;
1154
1155 p = strjoina("/proc/sys/net/ipv4/conf/", link->ifname, "/proxy_arp");
1156
1157 r = write_string_file(p, one_zero(link->network->proxy_arp), WRITE_STRING_FILE_VERIFY_ON_FAILURE);
1158 if (r < 0)
1159 log_link_warning_errno(link, r, "Cannot configure proxy ARP for interface: %m");
1160
1161 return 0;
1162 }
1163
1164 static int link_set_handler(sd_netlink *rtnl, sd_netlink_message *m, void *userdata) {
1165 _cleanup_link_unref_ Link *link = userdata;
1166 int r;
1167
1168 log_link_debug(link, "Set link");
1169
1170 r = sd_netlink_message_get_errno(m);
1171 if (r < 0 && r != -EEXIST) {
1172 log_link_error_errno(link, r, "Could not join netdev: %m");
1173 link_enter_failed(link);
1174 return 1;
1175 }
1176
1177 return 0;
1178 }
1179
1180 static int set_mtu_handler(sd_netlink *rtnl, sd_netlink_message *m, void *userdata) {
1181 _cleanup_link_unref_ Link *link = userdata;
1182 int r;
1183
1184 assert(m);
1185 assert(link);
1186 assert(link->ifname);
1187
1188 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
1189 return 1;
1190
1191 r = sd_netlink_message_get_errno(m);
1192 if (r < 0)
1193 log_link_warning_errno(link, r, "Could not set MTU: %m");
1194
1195 return 1;
1196 }
1197
1198 int link_set_mtu(Link *link, uint32_t mtu) {
1199 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
1200 int r;
1201
1202 assert(link);
1203 assert(link->manager);
1204 assert(link->manager->rtnl);
1205
1206 log_link_debug(link, "Setting MTU: %" PRIu32, mtu);
1207
1208 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_SETLINK, link->ifindex);
1209 if (r < 0)
1210 return log_link_error_errno(link, r, "Could not allocate RTM_SETLINK message: %m");
1211
1212 r = sd_netlink_message_append_u32(req, IFLA_MTU, mtu);
1213 if (r < 0)
1214 return log_link_error_errno(link, r, "Could not append MTU: %m");
1215
1216 r = sd_netlink_call_async(link->manager->rtnl, req, set_mtu_handler, link, 0, NULL);
1217 if (r < 0)
1218 return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
1219
1220 link_ref(link);
1221
1222 return 0;
1223 }
1224
1225 static int set_flags_handler(sd_netlink *rtnl, sd_netlink_message *m, void *userdata) {
1226 _cleanup_link_unref_ Link *link = userdata;
1227 int r;
1228
1229 assert(m);
1230 assert(link);
1231 assert(link->ifname);
1232
1233 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
1234 return 1;
1235
1236 r = sd_netlink_message_get_errno(m);
1237 if (r < 0)
1238 log_link_warning_errno(link, r, "Could not set link flags: %m");
1239
1240 return 1;
1241 }
1242
1243 static int link_set_flags(Link *link) {
1244 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
1245 unsigned ifi_change = 0;
1246 unsigned ifi_flags = 0;
1247 int r;
1248
1249 assert(link);
1250 assert(link->manager);
1251 assert(link->manager->rtnl);
1252
1253 if (link->flags & IFF_LOOPBACK)
1254 return 0;
1255
1256 if (!link->network)
1257 return 0;
1258
1259 if (link->network->arp < 0)
1260 return 0;
1261
1262 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_SETLINK, link->ifindex);
1263 if (r < 0)
1264 return log_link_error_errno(link, r, "Could not allocate RTM_SETLINK message: %m");
1265
1266 if (link->network->arp >= 0) {
1267 ifi_change |= IFF_NOARP;
1268 ifi_flags |= link->network->arp ? 0 : IFF_NOARP;
1269 }
1270
1271 r = sd_rtnl_message_link_set_flags(req, ifi_flags, ifi_change);
1272 if (r < 0)
1273 return log_link_error_errno(link, r, "Could not set link flags: %m");
1274
1275 r = sd_netlink_call_async(link->manager->rtnl, req, set_flags_handler, link, 0, NULL);
1276 if (r < 0)
1277 return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
1278
1279 link_ref(link);
1280
1281 return 0;
1282 }
1283
1284 static int link_set_bridge(Link *link) {
1285 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
1286 int r;
1287
1288 assert(link);
1289 assert(link->network);
1290
1291 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_SETLINK, link->ifindex);
1292 if (r < 0)
1293 return log_link_error_errno(link, r, "Could not allocate RTM_SETLINK message: %m");
1294
1295 r = sd_rtnl_message_link_set_family(req, PF_BRIDGE);
1296 if (r < 0)
1297 return log_link_error_errno(link, r, "Could not set message family: %m");
1298
1299 r = sd_netlink_message_open_container(req, IFLA_PROTINFO);
1300 if (r < 0)
1301 return log_link_error_errno(link, r, "Could not append IFLA_PROTINFO attribute: %m");
1302
1303 r = sd_netlink_message_append_u8(req, IFLA_BRPORT_GUARD, !link->network->use_bpdu);
1304 if (r < 0)
1305 return log_link_error_errno(link, r, "Could not append IFLA_BRPORT_GUARD attribute: %m");
1306
1307 r = sd_netlink_message_append_u8(req, IFLA_BRPORT_MODE, link->network->hairpin);
1308 if (r < 0)
1309 return log_link_error_errno(link, r, "Could not append IFLA_BRPORT_MODE attribute: %m");
1310
1311 r = sd_netlink_message_append_u8(req, IFLA_BRPORT_FAST_LEAVE, link->network->fast_leave);
1312 if (r < 0)
1313 return log_link_error_errno(link, r, "Could not append IFLA_BRPORT_FAST_LEAVE attribute: %m");
1314
1315 r = sd_netlink_message_append_u8(req, IFLA_BRPORT_PROTECT, !link->network->allow_port_to_be_root);
1316 if (r < 0)
1317 return log_link_error_errno(link, r, "Could not append IFLA_BRPORT_PROTECT attribute: %m");
1318
1319 r = sd_netlink_message_append_u8(req, IFLA_BRPORT_UNICAST_FLOOD, link->network->unicast_flood);
1320 if (r < 0)
1321 return log_link_error_errno(link, r, "Could not append IFLA_BRPORT_UNICAST_FLOOD attribute: %m");
1322
1323 if (link->network->cost != 0) {
1324 r = sd_netlink_message_append_u32(req, IFLA_BRPORT_COST, link->network->cost);
1325 if (r < 0)
1326 return log_link_error_errno(link, r, "Could not append IFLA_BRPORT_COST attribute: %m");
1327 }
1328
1329 r = sd_netlink_message_close_container(req);
1330 if (r < 0)
1331 return log_link_error_errno(link, r, "Could not append IFLA_LINKINFO attribute: %m");
1332
1333 r = sd_netlink_call_async(link->manager->rtnl, req, link_set_handler, link, 0, NULL);
1334 if (r < 0)
1335 return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
1336
1337 link_ref(link);
1338
1339 return r;
1340 }
1341
1342 static int link_bond_set(Link *link) {
1343 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
1344 int r;
1345
1346 assert(link);
1347 assert(link->network);
1348
1349 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_NEWLINK, link->network->bond->ifindex);
1350 if (r < 0)
1351 return log_link_error_errno(link, r, "Could not allocate RTM_SETLINK message: %m");
1352
1353 r = sd_netlink_message_set_flags(req, NLM_F_REQUEST | NLM_F_ACK);
1354 if (r < 0)
1355 return log_link_error_errno(link, r, "Could not set netlink flags: %m");
1356
1357 r = sd_netlink_message_open_container(req, IFLA_LINKINFO);
1358 if (r < 0)
1359 return log_link_error_errno(link, r, "Could not append IFLA_PROTINFO attribute: %m");
1360
1361 r = sd_netlink_message_open_container_union(req, IFLA_INFO_DATA, "bond");
1362 if (r < 0)
1363 return log_link_error_errno(link, r, "Could not append IFLA_INFO_DATA attribute: %m");
1364
1365 if (link->network->active_slave) {
1366 r = sd_netlink_message_append_u32(req, IFLA_BOND_ACTIVE_SLAVE, link->ifindex);
1367 if (r < 0)
1368 return log_link_error_errno(link, r, "Could not append IFLA_BOND_ACTIVE_SLAVE attribute: %m");
1369 }
1370
1371 if (link->network->primary_slave) {
1372 r = sd_netlink_message_append_u32(req, IFLA_BOND_PRIMARY, link->ifindex);
1373 if (r < 0)
1374 return log_link_error_errno(link, r, "Could not append IFLA_BOND_PRIMARY attribute: %m");
1375 }
1376
1377 r = sd_netlink_message_close_container(req);
1378 if (r < 0)
1379 return log_link_error_errno(link, r, "Could not append IFLA_LINKINFO attribute: %m");
1380
1381 r = sd_netlink_message_close_container(req);
1382 if (r < 0)
1383 return log_link_error_errno(link, r, "Could not append IFLA_INFO_DATA attribute: %m");
1384
1385 r = sd_netlink_call_async(link->manager->rtnl, req, set_flags_handler, link, 0, NULL);
1386 if (r < 0)
1387 return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
1388
1389 link_ref(link);
1390
1391 return r;
1392 }
1393
1394 static int link_lldp_save(Link *link) {
1395 _cleanup_free_ char *temp_path = NULL;
1396 _cleanup_fclose_ FILE *f = NULL;
1397 sd_lldp_neighbor **l = NULL;
1398 int n = 0, r, i;
1399
1400 assert(link);
1401 assert(link->lldp_file);
1402
1403 if (!link->lldp) {
1404 (void) unlink(link->lldp_file);
1405 return 0;
1406 }
1407
1408 r = sd_lldp_get_neighbors(link->lldp, &l);
1409 if (r < 0)
1410 goto finish;
1411 if (r == 0) {
1412 (void) unlink(link->lldp_file);
1413 goto finish;
1414 }
1415
1416 n = r;
1417
1418 r = fopen_temporary(link->lldp_file, &f, &temp_path);
1419 if (r < 0)
1420 goto finish;
1421
1422 fchmod(fileno(f), 0644);
1423
1424 for (i = 0; i < n; i++) {
1425 const void *p;
1426 le64_t u;
1427 size_t sz;
1428
1429 r = sd_lldp_neighbor_get_raw(l[i], &p, &sz);
1430 if (r < 0)
1431 goto finish;
1432
1433 u = htole64(sz);
1434 (void) fwrite(&u, 1, sizeof(u), f);
1435 (void) fwrite(p, 1, sz, f);
1436 }
1437
1438 r = fflush_and_check(f);
1439 if (r < 0)
1440 goto finish;
1441
1442 if (rename(temp_path, link->lldp_file) < 0) {
1443 r = -errno;
1444 goto finish;
1445 }
1446
1447 finish:
1448 if (r < 0) {
1449 (void) unlink(link->lldp_file);
1450 if (temp_path)
1451 (void) unlink(temp_path);
1452
1453 log_link_error_errno(link, r, "Failed to save LLDP data to %s: %m", link->lldp_file);
1454 }
1455
1456 if (l) {
1457 for (i = 0; i < n; i++)
1458 sd_lldp_neighbor_unref(l[i]);
1459 free(l);
1460 }
1461
1462 return r;
1463 }
1464
1465 static void lldp_handler(sd_lldp *lldp, sd_lldp_event event, sd_lldp_neighbor *n, void *userdata) {
1466 Link *link = userdata;
1467 int r;
1468
1469 assert(link);
1470
1471 (void) link_lldp_save(link);
1472
1473 if (link_lldp_emit_enabled(link) && event == SD_LLDP_EVENT_ADDED) {
1474 /* If we received information about a new neighbor, restart the LLDP "fast" logic */
1475
1476 log_link_debug(link, "Received LLDP datagram from previously unknown neighbor, restarting 'fast' LLDP transmission.");
1477
1478 r = link_lldp_emit_start(link);
1479 if (r < 0)
1480 log_link_warning_errno(link, r, "Failed to restart LLDP transmission: %m");
1481 }
1482 }
1483
1484 static int link_acquire_ipv6_conf(Link *link) {
1485 int r;
1486
1487 assert(link);
1488
1489 if (link_dhcp6_enabled(link)) {
1490 assert(link->dhcp6_client);
1491 assert(in_addr_is_link_local(AF_INET6, (const union in_addr_union*)&link->ipv6ll_address) > 0);
1492
1493 /* start DHCPv6 client in stateless mode */
1494 r = dhcp6_request_address(link, true);
1495 if (r < 0 && r != -EBUSY)
1496 return log_link_warning_errno(link, r, "Could not acquire DHCPv6 lease: %m");
1497 else
1498 log_link_debug(link, "Acquiring DHCPv6 lease");
1499 }
1500
1501 if (link_ipv6_accept_ra_enabled(link)) {
1502 assert(link->ndisc);
1503
1504 log_link_debug(link, "Discovering IPv6 routers");
1505
1506 r = sd_ndisc_start(link->ndisc);
1507 if (r < 0 && r != -EBUSY)
1508 return log_link_warning_errno(link, r, "Could not start IPv6 Router Discovery: %m");
1509 }
1510
1511 return 0;
1512 }
1513
1514 static int link_acquire_ipv4_conf(Link *link) {
1515 int r;
1516
1517 assert(link);
1518 assert(link->network);
1519 assert(link->manager);
1520 assert(link->manager->event);
1521
1522 if (link_ipv4ll_enabled(link)) {
1523 assert(link->ipv4ll);
1524
1525 log_link_debug(link, "Acquiring IPv4 link-local address");
1526
1527 r = sd_ipv4ll_start(link->ipv4ll);
1528 if (r < 0)
1529 return log_link_warning_errno(link, r, "Could not acquire IPv4 link-local address: %m");
1530 }
1531
1532 if (link_dhcp4_enabled(link)) {
1533 assert(link->dhcp_client);
1534
1535 log_link_debug(link, "Acquiring DHCPv4 lease");
1536
1537 r = sd_dhcp_client_start(link->dhcp_client);
1538 if (r < 0)
1539 return log_link_warning_errno(link, r, "Could not acquire DHCPv4 lease: %m");
1540 }
1541
1542 return 0;
1543 }
1544
1545 static int link_acquire_conf(Link *link) {
1546 int r;
1547
1548 assert(link);
1549
1550 r = link_acquire_ipv4_conf(link);
1551 if (r < 0)
1552 return r;
1553
1554 if (in_addr_is_null(AF_INET6, (const union in_addr_union*) &link->ipv6ll_address) == 0) {
1555 r = link_acquire_ipv6_conf(link);
1556 if (r < 0)
1557 return r;
1558 }
1559
1560 if (link_lldp_emit_enabled(link)) {
1561 r = link_lldp_emit_start(link);
1562 if (r < 0)
1563 return log_link_warning_errno(link, r, "Failed to start LLDP transmission: %m");
1564 }
1565
1566 return 0;
1567 }
1568
1569 bool link_has_carrier(Link *link) {
1570 /* see Documentation/networking/operstates.txt in the kernel sources */
1571
1572 if (link->kernel_operstate == IF_OPER_UP)
1573 return true;
1574
1575 if (link->kernel_operstate == IF_OPER_UNKNOWN)
1576 /* operstate may not be implemented, so fall back to flags */
1577 if ((link->flags & IFF_LOWER_UP) && !(link->flags & IFF_DORMANT))
1578 return true;
1579
1580 return false;
1581 }
1582
1583 static int link_up_handler(sd_netlink *rtnl, sd_netlink_message *m, void *userdata) {
1584 _cleanup_link_unref_ Link *link = userdata;
1585 int r;
1586
1587 assert(link);
1588
1589 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
1590 return 1;
1591
1592 r = sd_netlink_message_get_errno(m);
1593 if (r < 0)
1594 /* we warn but don't fail the link, as it may be
1595 brought up later */
1596 log_link_warning_errno(link, r, "Could not bring up interface: %m");
1597
1598 return 1;
1599 }
1600
1601 static int link_up(Link *link) {
1602 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
1603 uint8_t ipv6ll_mode;
1604 int r;
1605
1606 assert(link);
1607 assert(link->network);
1608 assert(link->manager);
1609 assert(link->manager->rtnl);
1610
1611 log_link_debug(link, "Bringing link up");
1612
1613 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_SETLINK, link->ifindex);
1614 if (r < 0)
1615 return log_link_error_errno(link, r, "Could not allocate RTM_SETLINK message: %m");
1616
1617 /* set it free if not enslaved with networkd */
1618 if (!link->network->bridge && !link->network->bond && !link->network->vrf) {
1619 r = sd_netlink_message_append_u32(req, IFLA_MASTER, 0);
1620 if (r < 0)
1621 return log_link_error_errno(link, r, "Could not append IFLA_MASTER attribute: %m");
1622 }
1623
1624 r = sd_rtnl_message_link_set_flags(req, IFF_UP, IFF_UP);
1625 if (r < 0)
1626 return log_link_error_errno(link, r, "Could not set link flags: %m");
1627
1628 if (link->network->mac) {
1629 r = sd_netlink_message_append_ether_addr(req, IFLA_ADDRESS, link->network->mac);
1630 if (r < 0)
1631 return log_link_error_errno(link, r, "Could not set MAC address: %m");
1632 }
1633
1634 /* If IPv6 not configured (no static IPv6 address and IPv6LL autoconfiguration is disabled)
1635 for this interface, or if it is a bridge slave, then disable IPv6 else enable it. */
1636 (void) link_enable_ipv6(link);
1637
1638 if (link->network->mtu) {
1639 /* IPv6 protocol requires a minimum MTU of IPV6_MTU_MIN(1280) bytes
1640 on the interface. Bump up MTU bytes to IPV6_MTU_MIN. */
1641 if (link_ipv6_enabled(link) && link->network->mtu < IPV6_MIN_MTU) {
1642
1643 log_link_warning(link, "Bumping MTU to " STRINGIFY(IPV6_MIN_MTU) ", as "
1644 "IPv6 is requested and requires a minimum MTU of " STRINGIFY(IPV6_MIN_MTU) " bytes: %m");
1645
1646 link->network->mtu = IPV6_MIN_MTU;
1647 }
1648
1649 r = sd_netlink_message_append_u32(req, IFLA_MTU, link->network->mtu);
1650 if (r < 0)
1651 return log_link_error_errno(link, r, "Could not set MTU: %m");
1652 }
1653
1654 r = sd_netlink_message_open_container(req, IFLA_AF_SPEC);
1655 if (r < 0)
1656 return log_link_error_errno(link, r, "Could not open IFLA_AF_SPEC container: %m");
1657
1658 if (link_ipv6_enabled(link)) {
1659 /* if the kernel lacks ipv6 support setting IFF_UP fails if any ipv6 options are passed */
1660 r = sd_netlink_message_open_container(req, AF_INET6);
1661 if (r < 0)
1662 return log_link_error_errno(link, r, "Could not open AF_INET6 container: %m");
1663
1664 if (!link_ipv6ll_enabled(link))
1665 ipv6ll_mode = IN6_ADDR_GEN_MODE_NONE;
1666 else {
1667 const char *p = NULL;
1668 _cleanup_free_ char *stable_secret = NULL;
1669
1670 p = strjoina("/proc/sys/net/ipv6/conf/", link->ifname, "/stable_secret");
1671 r = read_one_line_file(p, &stable_secret);
1672
1673 if (r < 0)
1674 ipv6ll_mode = IN6_ADDR_GEN_MODE_EUI64;
1675 else
1676 ipv6ll_mode = IN6_ADDR_GEN_MODE_STABLE_PRIVACY;
1677 }
1678 r = sd_netlink_message_append_u8(req, IFLA_INET6_ADDR_GEN_MODE, ipv6ll_mode);
1679 if (r < 0)
1680 return log_link_error_errno(link, r, "Could not append IFLA_INET6_ADDR_GEN_MODE: %m");
1681
1682 if (!in_addr_is_null(AF_INET6, &link->network->ipv6_token)) {
1683 r = sd_netlink_message_append_in6_addr(req, IFLA_INET6_TOKEN, &link->network->ipv6_token.in6);
1684 if (r < 0)
1685 return log_link_error_errno(link, r, "Could not append IFLA_INET6_TOKEN: %m");
1686 }
1687
1688 r = sd_netlink_message_close_container(req);
1689 if (r < 0)
1690 return log_link_error_errno(link, r, "Could not close AF_INET6 container: %m");
1691 }
1692
1693 r = sd_netlink_message_close_container(req);
1694 if (r < 0)
1695 return log_link_error_errno(link, r, "Could not close IFLA_AF_SPEC container: %m");
1696
1697 r = sd_netlink_call_async(link->manager->rtnl, req, link_up_handler, link, 0, NULL);
1698 if (r < 0)
1699 return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
1700
1701 link_ref(link);
1702
1703 return 0;
1704 }
1705
1706 static int link_down_handler(sd_netlink *rtnl, sd_netlink_message *m, void *userdata) {
1707 _cleanup_link_unref_ Link *link = userdata;
1708 int r;
1709
1710 assert(link);
1711
1712 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
1713 return 1;
1714
1715 r = sd_netlink_message_get_errno(m);
1716 if (r < 0)
1717 log_link_warning_errno(link, r, "Could not bring down interface: %m");
1718
1719 return 1;
1720 }
1721
1722 static int link_down(Link *link) {
1723 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
1724 int r;
1725
1726 assert(link);
1727 assert(link->manager);
1728 assert(link->manager->rtnl);
1729
1730 log_link_debug(link, "Bringing link down");
1731
1732 r = sd_rtnl_message_new_link(link->manager->rtnl, &req,
1733 RTM_SETLINK, link->ifindex);
1734 if (r < 0)
1735 return log_link_error_errno(link, r, "Could not allocate RTM_SETLINK message: %m");
1736
1737 r = sd_rtnl_message_link_set_flags(req, 0, IFF_UP);
1738 if (r < 0)
1739 return log_link_error_errno(link, r, "Could not set link flags: %m");
1740
1741 r = sd_netlink_call_async(link->manager->rtnl, req, link_down_handler, link, 0, NULL);
1742 if (r < 0)
1743 return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
1744
1745 link_ref(link);
1746
1747 return 0;
1748 }
1749
1750 static int link_up_can(Link *link) {
1751 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
1752 int r;
1753
1754 assert(link);
1755
1756 log_link_debug(link, "Bringing CAN link up");
1757
1758 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_SETLINK, link->ifindex);
1759 if (r < 0)
1760 return log_link_error_errno(link, r, "Could not allocate RTM_SETLINK message: %m");
1761
1762 r = sd_rtnl_message_link_set_flags(req, IFF_UP, IFF_UP);
1763 if (r < 0)
1764 return log_link_error_errno(link, r, "Could not set link flags: %m");
1765
1766 r = sd_netlink_call_async(link->manager->rtnl, req, link_up_handler, link, 0, NULL);
1767 if (r < 0)
1768 return log_link_error_errno(link, r, "Could not send rtnetlink message: %m");
1769
1770 link_ref(link);
1771
1772 return 0;
1773 }
1774
1775 static int link_handle_bound_to_list(Link *link) {
1776 Link *l;
1777 Iterator i;
1778 int r;
1779 bool required_up = false;
1780 bool link_is_up = false;
1781
1782 assert(link);
1783
1784 if (hashmap_isempty(link->bound_to_links))
1785 return 0;
1786
1787 if (link->flags & IFF_UP)
1788 link_is_up = true;
1789
1790 HASHMAP_FOREACH (l, link->bound_to_links, i)
1791 if (link_has_carrier(l)) {
1792 required_up = true;
1793 break;
1794 }
1795
1796 if (!required_up && link_is_up) {
1797 r = link_down(link);
1798 if (r < 0)
1799 return r;
1800 } else if (required_up && !link_is_up) {
1801 r = link_up(link);
1802 if (r < 0)
1803 return r;
1804 }
1805
1806 return 0;
1807 }
1808
1809 static int link_handle_bound_by_list(Link *link) {
1810 Iterator i;
1811 Link *l;
1812 int r;
1813
1814 assert(link);
1815
1816 if (hashmap_isempty(link->bound_by_links))
1817 return 0;
1818
1819 HASHMAP_FOREACH (l, link->bound_by_links, i) {
1820 r = link_handle_bound_to_list(l);
1821 if (r < 0)
1822 return r;
1823 }
1824
1825 return 0;
1826 }
1827
1828 static int link_put_carrier(Link *link, Link *carrier, Hashmap **h) {
1829 int r;
1830
1831 assert(link);
1832 assert(carrier);
1833
1834 if (link == carrier)
1835 return 0;
1836
1837 if (hashmap_get(*h, INT_TO_PTR(carrier->ifindex)))
1838 return 0;
1839
1840 r = hashmap_ensure_allocated(h, NULL);
1841 if (r < 0)
1842 return r;
1843
1844 r = hashmap_put(*h, INT_TO_PTR(carrier->ifindex), carrier);
1845 if (r < 0)
1846 return r;
1847
1848 return 0;
1849 }
1850
1851 static int link_new_bound_by_list(Link *link) {
1852 Manager *m;
1853 Link *carrier;
1854 Iterator i;
1855 int r;
1856 bool list_updated = false;
1857
1858 assert(link);
1859 assert(link->manager);
1860
1861 m = link->manager;
1862
1863 HASHMAP_FOREACH(carrier, m->links, i) {
1864 if (!carrier->network)
1865 continue;
1866
1867 if (strv_isempty(carrier->network->bind_carrier))
1868 continue;
1869
1870 if (strv_fnmatch(carrier->network->bind_carrier, link->ifname, 0)) {
1871 r = link_put_carrier(link, carrier, &link->bound_by_links);
1872 if (r < 0)
1873 return r;
1874
1875 list_updated = true;
1876 }
1877 }
1878
1879 if (list_updated)
1880 link_dirty(link);
1881
1882 HASHMAP_FOREACH(carrier, link->bound_by_links, i) {
1883 r = link_put_carrier(carrier, link, &carrier->bound_to_links);
1884 if (r < 0)
1885 return r;
1886
1887 link_dirty(carrier);
1888 }
1889
1890 return 0;
1891 }
1892
1893 static int link_new_bound_to_list(Link *link) {
1894 Manager *m;
1895 Link *carrier;
1896 Iterator i;
1897 int r;
1898 bool list_updated = false;
1899
1900 assert(link);
1901 assert(link->manager);
1902
1903 if (!link->network)
1904 return 0;
1905
1906 if (strv_isempty(link->network->bind_carrier))
1907 return 0;
1908
1909 m = link->manager;
1910
1911 HASHMAP_FOREACH (carrier, m->links, i) {
1912 if (strv_fnmatch(link->network->bind_carrier, carrier->ifname, 0)) {
1913 r = link_put_carrier(link, carrier, &link->bound_to_links);
1914 if (r < 0)
1915 return r;
1916
1917 list_updated = true;
1918 }
1919 }
1920
1921 if (list_updated)
1922 link_dirty(link);
1923
1924 HASHMAP_FOREACH (carrier, link->bound_to_links, i) {
1925 r = link_put_carrier(carrier, link, &carrier->bound_by_links);
1926 if (r < 0)
1927 return r;
1928
1929 link_dirty(carrier);
1930 }
1931
1932 return 0;
1933 }
1934
1935 static int link_new_carrier_maps(Link *link) {
1936 int r;
1937
1938 r = link_new_bound_by_list(link);
1939 if (r < 0)
1940 return r;
1941
1942 r = link_handle_bound_by_list(link);
1943 if (r < 0)
1944 return r;
1945
1946 r = link_new_bound_to_list(link);
1947 if (r < 0)
1948 return r;
1949
1950 r = link_handle_bound_to_list(link);
1951 if (r < 0)
1952 return r;
1953
1954 return 0;
1955 }
1956
1957 static void link_free_bound_to_list(Link *link) {
1958 Link *bound_to;
1959 Iterator i;
1960
1961 HASHMAP_FOREACH (bound_to, link->bound_to_links, i) {
1962 hashmap_remove(link->bound_to_links, INT_TO_PTR(bound_to->ifindex));
1963
1964 if (hashmap_remove(bound_to->bound_by_links, INT_TO_PTR(link->ifindex)))
1965 link_dirty(bound_to);
1966 }
1967
1968 return;
1969 }
1970
1971 static void link_free_bound_by_list(Link *link) {
1972 Link *bound_by;
1973 Iterator i;
1974
1975 HASHMAP_FOREACH (bound_by, link->bound_by_links, i) {
1976 hashmap_remove(link->bound_by_links, INT_TO_PTR(bound_by->ifindex));
1977
1978 if (hashmap_remove(bound_by->bound_to_links, INT_TO_PTR(link->ifindex))) {
1979 link_dirty(bound_by);
1980 link_handle_bound_to_list(bound_by);
1981 }
1982 }
1983
1984 return;
1985 }
1986
1987 static void link_free_carrier_maps(Link *link) {
1988 bool list_updated = false;
1989
1990 assert(link);
1991
1992 if (!hashmap_isempty(link->bound_to_links)) {
1993 link_free_bound_to_list(link);
1994 list_updated = true;
1995 }
1996
1997 if (!hashmap_isempty(link->bound_by_links)) {
1998 link_free_bound_by_list(link);
1999 list_updated = true;
2000 }
2001
2002 if (list_updated)
2003 link_dirty(link);
2004
2005 return;
2006 }
2007
2008 void link_drop(Link *link) {
2009 if (!link || link->state == LINK_STATE_LINGER)
2010 return;
2011
2012 link_set_state(link, LINK_STATE_LINGER);
2013
2014 link_free_carrier_maps(link);
2015
2016 log_link_debug(link, "Link removed");
2017
2018 (void)unlink(link->state_file);
2019 link_unref(link);
2020
2021 return;
2022 }
2023
2024 static int link_joined(Link *link) {
2025 int r;
2026
2027 assert(link);
2028 assert(link->network);
2029
2030 if (!hashmap_isempty(link->bound_to_links)) {
2031 r = link_handle_bound_to_list(link);
2032 if (r < 0)
2033 return r;
2034 } else if (!(link->flags & IFF_UP)) {
2035 r = link_up(link);
2036 if (r < 0) {
2037 link_enter_failed(link);
2038 return r;
2039 }
2040 }
2041
2042 if (link->network->bridge) {
2043 r = link_set_bridge(link);
2044 if (r < 0)
2045 log_link_error_errno(link, r, "Could not set bridge message: %m");
2046 }
2047
2048 if (link->network->bond) {
2049 r = link_bond_set(link);
2050 if (r < 0)
2051 log_link_error_errno(link, r, "Could not set bond message: %m");
2052 }
2053
2054 if (link->network->use_br_vlan &&
2055 (link->network->bridge || streq_ptr("bridge", link->kind))) {
2056 r = link_set_bridge_vlan(link);
2057 if (r < 0)
2058 log_link_error_errno(link, r, "Could not set bridge vlan: %m");
2059 }
2060
2061 return link_enter_set_addresses(link);
2062 }
2063
2064 static int netdev_join_handler(sd_netlink *rtnl, sd_netlink_message *m, void *userdata) {
2065 _cleanup_link_unref_ Link *link = userdata;
2066 int r;
2067
2068 assert(link);
2069 assert(link->network);
2070
2071 link->enslaving--;
2072
2073 if (IN_SET(link->state, LINK_STATE_FAILED, LINK_STATE_LINGER))
2074 return 1;
2075
2076 r = sd_netlink_message_get_errno(m);
2077 if (r < 0 && r != -EEXIST) {
2078 log_link_error_errno(link, r, "Could not join netdev: %m");
2079 link_enter_failed(link);
2080 return 1;
2081 } else
2082 log_link_debug(link, "Joined netdev");
2083
2084 if (link->enslaving <= 0)
2085 link_joined(link);
2086
2087 return 1;
2088 }
2089
2090 static int link_enter_join_netdev(Link *link) {
2091 NetDev *netdev;
2092 Iterator i;
2093 int r;
2094
2095 assert(link);
2096 assert(link->network);
2097 assert(link->state == LINK_STATE_PENDING);
2098
2099 link_set_state(link, LINK_STATE_ENSLAVING);
2100
2101 link_dirty(link);
2102
2103 if (!link->network->bridge &&
2104 !link->network->bond &&
2105 !link->network->vrf &&
2106 hashmap_isempty(link->network->stacked_netdevs))
2107 return link_joined(link);
2108
2109 if (link->network->bond) {
2110 log_struct(LOG_DEBUG,
2111 LOG_LINK_INTERFACE(link),
2112 LOG_NETDEV_INTERFACE(link->network->bond),
2113 LOG_LINK_MESSAGE(link, "Enslaving by '%s'", link->network->bond->ifname),
2114 NULL);
2115
2116 r = netdev_join(link->network->bond, link, netdev_join_handler);
2117 if (r < 0) {
2118 log_struct_errno(LOG_WARNING, r,
2119 LOG_LINK_INTERFACE(link),
2120 LOG_NETDEV_INTERFACE(link->network->bond),
2121 LOG_LINK_MESSAGE(link, "Could not join netdev '%s': %m", link->network->bond->ifname),
2122 NULL);
2123
2124 link_enter_failed(link);
2125 return r;
2126 }
2127
2128 link->enslaving++;
2129 }
2130
2131 if (link->network->bridge) {
2132 log_struct(LOG_DEBUG,
2133 LOG_LINK_INTERFACE(link),
2134 LOG_NETDEV_INTERFACE(link->network->bridge),
2135 LOG_LINK_MESSAGE(link, "Enslaving by '%s'", link->network->bridge->ifname),
2136 NULL);
2137
2138 r = netdev_join(link->network->bridge, link, netdev_join_handler);
2139 if (r < 0) {
2140 log_struct_errno(LOG_WARNING, r,
2141 LOG_LINK_INTERFACE(link),
2142 LOG_NETDEV_INTERFACE(link->network->bridge),
2143 LOG_LINK_MESSAGE(link, "Could not join netdev '%s': %m", link->network->bridge->ifname),
2144 NULL),
2145 link_enter_failed(link);
2146 return r;
2147 }
2148
2149 link->enslaving++;
2150 }
2151
2152 if (link->network->vrf) {
2153 log_struct(LOG_DEBUG,
2154 LOG_LINK_INTERFACE(link),
2155 LOG_NETDEV_INTERFACE(link->network->vrf),
2156 LOG_LINK_MESSAGE(link, "Enslaving by '%s'", link->network->vrf->ifname),
2157 NULL);
2158 r = netdev_join(link->network->vrf, link, netdev_join_handler);
2159 if (r < 0) {
2160 log_struct_errno(LOG_WARNING, r,
2161 LOG_LINK_INTERFACE(link),
2162 LOG_NETDEV_INTERFACE(link->network->vrf),
2163 LOG_LINK_MESSAGE(link, "Could not join netdev '%s': %m", link->network->vrf->ifname),
2164 NULL);
2165 link_enter_failed(link);
2166 return r;
2167 }
2168
2169 link->enslaving++;
2170 }
2171
2172 HASHMAP_FOREACH(netdev, link->network->stacked_netdevs, i) {
2173
2174 log_struct(LOG_DEBUG,
2175 LOG_LINK_INTERFACE(link),
2176 LOG_NETDEV_INTERFACE(netdev),
2177 LOG_LINK_MESSAGE(link, "Enslaving by '%s'", netdev->ifname),
2178 NULL);
2179
2180 r = netdev_join(netdev, link, netdev_join_handler);
2181 if (r < 0) {
2182 log_struct_errno(LOG_WARNING, r,
2183 LOG_LINK_INTERFACE(link),
2184 LOG_NETDEV_INTERFACE(netdev),
2185 LOG_LINK_MESSAGE(link, "Could not join netdev '%s': %m", netdev->ifname),
2186 NULL);
2187 link_enter_failed(link);
2188 return r;
2189 }
2190
2191 link->enslaving++;
2192 }
2193
2194 return 0;
2195 }
2196
2197 static int link_set_ipv4_forward(Link *link) {
2198 int r;
2199
2200 if (!link_ipv4_forward_enabled(link))
2201 return 0;
2202
2203 /* We propagate the forwarding flag from one interface to the
2204 * global setting one way. This means: as long as at least one
2205 * interface was configured at any time that had IP forwarding
2206 * enabled the setting will stay on for good. We do this
2207 * primarily to keep IPv4 and IPv6 packet forwarding behaviour
2208 * somewhat in sync (see below). */
2209
2210 r = write_string_file("/proc/sys/net/ipv4/ip_forward", "1", WRITE_STRING_FILE_VERIFY_ON_FAILURE);
2211 if (r < 0)
2212 log_link_warning_errno(link, r, "Cannot turn on IPv4 packet forwarding, ignoring: %m");
2213
2214 return 0;
2215 }
2216
2217 static int link_set_ipv6_forward(Link *link) {
2218 int r;
2219
2220 if (!link_ipv6_forward_enabled(link))
2221 return 0;
2222
2223 /* On Linux, the IPv6 stack does not know a per-interface
2224 * packet forwarding setting: either packet forwarding is on
2225 * for all, or off for all. We hence don't bother with a
2226 * per-interface setting, but simply propagate the interface
2227 * flag, if it is set, to the global flag, one-way. Note that
2228 * while IPv4 would allow a per-interface flag, we expose the
2229 * same behaviour there and also propagate the setting from
2230 * one to all, to keep things simple (see above). */
2231
2232 r = write_string_file("/proc/sys/net/ipv6/conf/all/forwarding", "1", WRITE_STRING_FILE_VERIFY_ON_FAILURE);
2233 if (r < 0)
2234 log_link_warning_errno(link, r, "Cannot configure IPv6 packet forwarding, ignoring: %m");
2235
2236 return 0;
2237 }
2238
2239 static int link_set_ipv6_privacy_extensions(Link *link) {
2240 char buf[DECIMAL_STR_MAX(unsigned) + 1];
2241 IPv6PrivacyExtensions s;
2242 const char *p = NULL;
2243 int r;
2244
2245 s = link_ipv6_privacy_extensions(link);
2246 if (s < 0)
2247 return 0;
2248
2249 p = strjoina("/proc/sys/net/ipv6/conf/", link->ifname, "/use_tempaddr");
2250 xsprintf(buf, "%u", (unsigned) link->network->ipv6_privacy_extensions);
2251
2252 r = write_string_file(p, buf, WRITE_STRING_FILE_VERIFY_ON_FAILURE);
2253 if (r < 0)
2254 log_link_warning_errno(link, r, "Cannot configure IPv6 privacy extension for interface: %m");
2255
2256 return 0;
2257 }
2258
2259 static int link_set_ipv6_accept_ra(Link *link) {
2260 const char *p = NULL;
2261 int r;
2262
2263 /* Make this a NOP if IPv6 is not available */
2264 if (!socket_ipv6_is_supported())
2265 return 0;
2266
2267 if (link->flags & IFF_LOOPBACK)
2268 return 0;
2269
2270 if (!link->network)
2271 return 0;
2272
2273 p = strjoina("/proc/sys/net/ipv6/conf/", link->ifname, "/accept_ra");
2274
2275 /* We handle router advertisements ourselves, tell the kernel to GTFO */
2276 r = write_string_file(p, "0", WRITE_STRING_FILE_VERIFY_ON_FAILURE);
2277 if (r < 0)
2278 log_link_warning_errno(link, r, "Cannot disable kernel IPv6 accept_ra for interface: %m");
2279
2280 return 0;
2281 }
2282
2283 static int link_set_ipv6_dad_transmits(Link *link) {
2284 char buf[DECIMAL_STR_MAX(int) + 1];
2285 const char *p = NULL;
2286 int r;
2287
2288 /* Make this a NOP if IPv6 is not available */
2289 if (!socket_ipv6_is_supported())
2290 return 0;
2291
2292 if (link->flags & IFF_LOOPBACK)
2293 return 0;
2294
2295 if (!link->network)
2296 return 0;
2297
2298 if (link->network->ipv6_dad_transmits < 0)
2299 return 0;
2300
2301 p = strjoina("/proc/sys/net/ipv6/conf/", link->ifname, "/dad_transmits");
2302 xsprintf(buf, "%i", link->network->ipv6_dad_transmits);
2303
2304 r = write_string_file(p, buf, WRITE_STRING_FILE_VERIFY_ON_FAILURE);
2305 if (r < 0)
2306 log_link_warning_errno(link, r, "Cannot set IPv6 dad transmits for interface: %m");
2307
2308 return 0;
2309 }
2310
2311 static int link_set_ipv6_hop_limit(Link *link) {
2312 char buf[DECIMAL_STR_MAX(int) + 1];
2313 const char *p = NULL;
2314 int r;
2315
2316 /* Make this a NOP if IPv6 is not available */
2317 if (!socket_ipv6_is_supported())
2318 return 0;
2319
2320 if (link->flags & IFF_LOOPBACK)
2321 return 0;
2322
2323 if (!link->network)
2324 return 0;
2325
2326 if (link->network->ipv6_hop_limit < 0)
2327 return 0;
2328
2329 p = strjoina("/proc/sys/net/ipv6/conf/", link->ifname, "/hop_limit");
2330 xsprintf(buf, "%i", link->network->ipv6_hop_limit);
2331
2332 r = write_string_file(p, buf, WRITE_STRING_FILE_VERIFY_ON_FAILURE);
2333 if (r < 0)
2334 log_link_warning_errno(link, r, "Cannot set IPv6 hop limit for interface: %m");
2335
2336 return 0;
2337 }
2338
2339 static int link_drop_foreign_config(Link *link) {
2340 Address *address;
2341 Route *route;
2342 Iterator i;
2343 int r;
2344
2345 SET_FOREACH(address, link->addresses_foreign, i) {
2346 /* we consider IPv6LL addresses to be managed by the kernel */
2347 if (address->family == AF_INET6 && in_addr_is_link_local(AF_INET6, &address->in_addr) == 1)
2348 continue;
2349
2350 r = address_remove(address, link, link_address_remove_handler);
2351 if (r < 0)
2352 return r;
2353 }
2354
2355 SET_FOREACH(route, link->routes_foreign, i) {
2356 /* do not touch routes managed by the kernel */
2357 if (route->protocol == RTPROT_KERNEL)
2358 continue;
2359
2360 r = route_remove(route, link, link_route_remove_handler);
2361 if (r < 0)
2362 return r;
2363 }
2364
2365 return 0;
2366 }
2367
2368 static int link_drop_config(Link *link) {
2369 Address *address;
2370 Route *route;
2371 Iterator i;
2372 int r;
2373
2374 SET_FOREACH(address, link->addresses, i) {
2375 /* we consider IPv6LL addresses to be managed by the kernel */
2376 if (address->family == AF_INET6 && in_addr_is_link_local(AF_INET6, &address->in_addr) == 1)
2377 continue;
2378
2379 r = address_remove(address, link, link_address_remove_handler);
2380 if (r < 0)
2381 return r;
2382 }
2383
2384 SET_FOREACH(route, link->routes, i) {
2385 /* do not touch routes managed by the kernel */
2386 if (route->protocol == RTPROT_KERNEL)
2387 continue;
2388
2389 r = route_remove(route, link, link_route_remove_handler);
2390 if (r < 0)
2391 return r;
2392 }
2393
2394 ndisc_flush(link);
2395
2396 return 0;
2397 }
2398
2399 static int link_update_lldp(Link *link) {
2400 int r;
2401
2402 assert(link);
2403
2404 if (!link->lldp)
2405 return 0;
2406
2407 if (link->flags & IFF_UP) {
2408 r = sd_lldp_start(link->lldp);
2409 if (r > 0)
2410 log_link_debug(link, "Started LLDP.");
2411 } else {
2412 r = sd_lldp_stop(link->lldp);
2413 if (r > 0)
2414 log_link_debug(link, "Stopped LLDP.");
2415 }
2416
2417 return r;
2418 }
2419
2420 static int link_configure(Link *link) {
2421 int r;
2422
2423 assert(link);
2424 assert(link->network);
2425 assert(link->state == LINK_STATE_PENDING);
2426
2427 if (streq_ptr(link->kind, "vcan")) {
2428
2429 if (!(link->flags & IFF_UP)) {
2430 r = link_up_can(link);
2431 if (r < 0) {
2432 link_enter_failed(link);
2433 return r;
2434 }
2435 }
2436
2437 return 0;
2438 }
2439
2440 /* Drop foreign config, but ignore loopback or critical devices.
2441 * We do not want to remove loopback address or addresses used for root NFS. */
2442 if (!(link->flags & IFF_LOOPBACK) && !(link->network->dhcp_critical)) {
2443 r = link_drop_foreign_config(link);
2444 if (r < 0)
2445 return r;
2446 }
2447
2448 r = link_set_proxy_arp(link);
2449 if (r < 0)
2450 return r;
2451
2452 r = ipv6_proxy_ndp_addresses_configure(link);
2453 if (r < 0)
2454 return r;
2455
2456 r = link_set_ipv4_forward(link);
2457 if (r < 0)
2458 return r;
2459
2460 r = link_set_ipv6_forward(link);
2461 if (r < 0)
2462 return r;
2463
2464 r = link_set_ipv6_privacy_extensions(link);
2465 if (r < 0)
2466 return r;
2467
2468 r = link_set_ipv6_accept_ra(link);
2469 if (r < 0)
2470 return r;
2471
2472 r = link_set_ipv6_dad_transmits(link);
2473 if (r < 0)
2474 return r;
2475
2476 r = link_set_ipv6_hop_limit(link);
2477 if (r < 0)
2478 return r;
2479
2480 r = link_set_flags(link);
2481 if (r < 0)
2482 return r;
2483
2484 if (link_ipv4ll_enabled(link)) {
2485 r = ipv4ll_configure(link);
2486 if (r < 0)
2487 return r;
2488 }
2489
2490 if (link_dhcp4_enabled(link)) {
2491 r = dhcp4_configure(link);
2492 if (r < 0)
2493 return r;
2494 }
2495
2496 if (link_dhcp4_server_enabled(link)) {
2497 r = sd_dhcp_server_new(&link->dhcp_server, link->ifindex);
2498 if (r < 0)
2499 return r;
2500
2501 r = sd_dhcp_server_attach_event(link->dhcp_server, NULL, 0);
2502 if (r < 0)
2503 return r;
2504 }
2505
2506 if (link_dhcp6_enabled(link) ||
2507 link_ipv6_accept_ra_enabled(link)) {
2508 r = dhcp6_configure(link);
2509 if (r < 0)
2510 return r;
2511 }
2512
2513 if (link_ipv6_accept_ra_enabled(link)) {
2514 r = ndisc_configure(link);
2515 if (r < 0)
2516 return r;
2517 }
2518
2519 if (link_lldp_rx_enabled(link)) {
2520 r = sd_lldp_new(&link->lldp);
2521 if (r < 0)
2522 return r;
2523
2524 r = sd_lldp_set_ifindex(link->lldp, link->ifindex);
2525 if (r < 0)
2526 return r;
2527
2528 r = sd_lldp_match_capabilities(link->lldp,
2529 link->network->lldp_mode == LLDP_MODE_ROUTERS_ONLY ?
2530 SD_LLDP_SYSTEM_CAPABILITIES_ALL_ROUTERS :
2531 SD_LLDP_SYSTEM_CAPABILITIES_ALL);
2532 if (r < 0)
2533 return r;
2534
2535 r = sd_lldp_set_filter_address(link->lldp, &link->mac);
2536 if (r < 0)
2537 return r;
2538
2539 r = sd_lldp_attach_event(link->lldp, NULL, 0);
2540 if (r < 0)
2541 return r;
2542
2543 r = sd_lldp_set_callback(link->lldp, lldp_handler, link);
2544 if (r < 0)
2545 return r;
2546
2547 r = link_update_lldp(link);
2548 if (r < 0)
2549 return r;
2550 }
2551
2552 if (link_has_carrier(link)) {
2553 r = link_acquire_conf(link);
2554 if (r < 0)
2555 return r;
2556 }
2557
2558 return link_enter_join_netdev(link);
2559 }
2560
2561 static int link_initialized_and_synced(sd_netlink *rtnl, sd_netlink_message *m,
2562 void *userdata) {
2563 _cleanup_link_unref_ Link *link = userdata;
2564 Network *network;
2565 int r;
2566
2567 assert(link);
2568 assert(link->ifname);
2569 assert(link->manager);
2570
2571 if (link->state != LINK_STATE_PENDING)
2572 return 1;
2573
2574 log_link_debug(link, "Link state is up-to-date");
2575
2576 r = link_new_bound_by_list(link);
2577 if (r < 0)
2578 return r;
2579
2580 r = link_handle_bound_by_list(link);
2581 if (r < 0)
2582 return r;
2583
2584 if (!link->network) {
2585 r = network_get(link->manager, link->udev_device, link->ifname,
2586 &link->mac, &network);
2587 if (r == -ENOENT) {
2588 link_enter_unmanaged(link);
2589 return 1;
2590 } else if (r == 0 && network->unmanaged) {
2591 link_enter_unmanaged(link);
2592 return 0;
2593 } else if (r < 0)
2594 return r;
2595
2596 if (link->flags & IFF_LOOPBACK) {
2597 if (network->link_local != ADDRESS_FAMILY_NO)
2598 log_link_debug(link, "Ignoring link-local autoconfiguration for loopback link");
2599
2600 if (network->dhcp != ADDRESS_FAMILY_NO)
2601 log_link_debug(link, "Ignoring DHCP clients for loopback link");
2602
2603 if (network->dhcp_server)
2604 log_link_debug(link, "Ignoring DHCP server for loopback link");
2605 }
2606
2607 r = network_apply(network, link);
2608 if (r < 0)
2609 return r;
2610 }
2611
2612 r = link_new_bound_to_list(link);
2613 if (r < 0)
2614 return r;
2615
2616 r = link_configure(link);
2617 if (r < 0)
2618 return r;
2619
2620 return 1;
2621 }
2622
2623 int link_initialized(Link *link, struct udev_device *device) {
2624 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
2625 int r;
2626
2627 assert(link);
2628 assert(link->manager);
2629 assert(link->manager->rtnl);
2630 assert(device);
2631
2632 if (link->state != LINK_STATE_PENDING)
2633 return 0;
2634
2635 if (link->udev_device)
2636 return 0;
2637
2638 log_link_debug(link, "udev initialized link");
2639
2640 link->udev_device = udev_device_ref(device);
2641
2642 /* udev has initialized the link, but we don't know if we have yet
2643 * processed the NEWLINK messages with the latest state. Do a GETLINK,
2644 * when it returns we know that the pending NEWLINKs have already been
2645 * processed and that we are up-to-date */
2646
2647 r = sd_rtnl_message_new_link(link->manager->rtnl, &req, RTM_GETLINK,
2648 link->ifindex);
2649 if (r < 0)
2650 return r;
2651
2652 r = sd_netlink_call_async(link->manager->rtnl, req,
2653 link_initialized_and_synced, link, 0, NULL);
2654 if (r < 0)
2655 return r;
2656
2657 link_ref(link);
2658
2659 return 0;
2660 }
2661
2662 static int link_load(Link *link) {
2663 _cleanup_free_ char *network_file = NULL,
2664 *addresses = NULL,
2665 *routes = NULL,
2666 *dhcp4_address = NULL,
2667 *ipv4ll_address = NULL;
2668 union in_addr_union address;
2669 union in_addr_union route_dst;
2670 const char *p;
2671 int r;
2672
2673 assert(link);
2674
2675 r = parse_env_file(link->state_file, NEWLINE,
2676 "NETWORK_FILE", &network_file,
2677 "ADDRESSES", &addresses,
2678 "ROUTES", &routes,
2679 "DHCP4_ADDRESS", &dhcp4_address,
2680 "IPV4LL_ADDRESS", &ipv4ll_address,
2681 NULL);
2682 if (r < 0 && r != -ENOENT)
2683 return log_link_error_errno(link, r, "Failed to read %s: %m", link->state_file);
2684
2685 if (network_file) {
2686 Network *network;
2687 char *suffix;
2688
2689 /* drop suffix */
2690 suffix = strrchr(network_file, '.');
2691 if (!suffix) {
2692 log_link_debug(link, "Failed to get network name from %s", network_file);
2693 goto network_file_fail;
2694 }
2695 *suffix = '\0';
2696
2697 r = network_get_by_name(link->manager, basename(network_file), &network);
2698 if (r < 0) {
2699 log_link_debug_errno(link, r, "Failed to get network %s: %m", basename(network_file));
2700 goto network_file_fail;
2701 }
2702
2703 r = network_apply(network, link);
2704 if (r < 0)
2705 return log_link_error_errno(link, r, "Failed to apply network %s: %m", basename(network_file));
2706 }
2707
2708 network_file_fail:
2709
2710 if (addresses) {
2711 p = addresses;
2712
2713 for (;;) {
2714 _cleanup_free_ char *address_str = NULL;
2715 char *prefixlen_str;
2716 int family;
2717 unsigned char prefixlen;
2718
2719 r = extract_first_word(&p, &address_str, NULL, 0);
2720 if (r < 0) {
2721 log_link_debug_errno(link, r, "Failed to extract next address string: %m");
2722 continue;
2723 }
2724 if (r == 0)
2725 break;
2726
2727 prefixlen_str = strchr(address_str, '/');
2728 if (!prefixlen_str) {
2729 log_link_debug(link, "Failed to parse address and prefix length %s", address_str);
2730 continue;
2731 }
2732
2733 *prefixlen_str++ = '\0';
2734
2735 r = sscanf(prefixlen_str, "%hhu", &prefixlen);
2736 if (r != 1) {
2737 log_link_error(link, "Failed to parse prefixlen %s", prefixlen_str);
2738 continue;
2739 }
2740
2741 r = in_addr_from_string_auto(address_str, &family, &address);
2742 if (r < 0) {
2743 log_link_debug_errno(link, r, "Failed to parse address %s: %m", address_str);
2744 continue;
2745 }
2746
2747 r = address_add(link, family, &address, prefixlen, NULL);
2748 if (r < 0)
2749 return log_link_error_errno(link, r, "Failed to add address: %m");
2750 }
2751 }
2752
2753 if (routes) {
2754 p = routes;
2755
2756 for (;;) {
2757 Route *route;
2758 _cleanup_free_ char *route_str = NULL;
2759 _cleanup_(sd_event_source_unrefp) sd_event_source *expire = NULL;
2760 usec_t lifetime;
2761 char *prefixlen_str;
2762 int family;
2763 unsigned char prefixlen, tos, table;
2764 uint32_t priority;
2765
2766 r = extract_first_word(&p, &route_str, NULL, 0);
2767 if (r < 0) {
2768 log_link_debug_errno(link, r, "Failed to extract next route string: %m");
2769 continue;
2770 }
2771 if (r == 0)
2772 break;
2773
2774 prefixlen_str = strchr(route_str, '/');
2775 if (!prefixlen_str) {
2776 log_link_debug(link, "Failed to parse route %s", route_str);
2777 continue;
2778 }
2779
2780 *prefixlen_str++ = '\0';
2781
2782 r = sscanf(prefixlen_str, "%hhu/%hhu/%"SCNu32"/%hhu/"USEC_FMT, &prefixlen, &tos, &priority, &table, &lifetime);
2783 if (r != 5) {
2784 log_link_debug(link,
2785 "Failed to parse destination prefix length, tos, priority, table or expiration %s",
2786 prefixlen_str);
2787 continue;
2788 }
2789
2790 r = in_addr_from_string_auto(route_str, &family, &route_dst);
2791 if (r < 0) {
2792 log_link_debug_errno(link, r, "Failed to parse route destination %s: %m", route_str);
2793 continue;
2794 }
2795
2796 r = route_add(link, family, &route_dst, prefixlen, tos, priority, table, &route);
2797 if (r < 0)
2798 return log_link_error_errno(link, r, "Failed to add route: %m");
2799
2800 if (lifetime != USEC_INFINITY) {
2801 r = sd_event_add_time(link->manager->event, &expire, clock_boottime_or_monotonic(), lifetime,
2802 0, route_expire_handler, route);
2803 if (r < 0)
2804 log_link_warning_errno(link, r, "Could not arm route expiration handler: %m");
2805 }
2806
2807 route->lifetime = lifetime;
2808 sd_event_source_unref(route->expire);
2809 route->expire = expire;
2810 expire = NULL;
2811 }
2812 }
2813
2814 if (dhcp4_address) {
2815 r = in_addr_from_string(AF_INET, dhcp4_address, &address);
2816 if (r < 0) {
2817 log_link_debug_errno(link, r, "Failed to parse DHCPv4 address %s: %m", dhcp4_address);
2818 goto dhcp4_address_fail;
2819 }
2820
2821 r = sd_dhcp_client_new(&link->dhcp_client);
2822 if (r < 0)
2823 return log_link_error_errno(link, r, "Failed to create DHCPv4 client: %m");
2824
2825 r = sd_dhcp_client_set_request_address(link->dhcp_client, &address.in);
2826 if (r < 0)
2827 return log_link_error_errno(link, r, "Failed to set initial DHCPv4 address %s: %m", dhcp4_address);
2828 }
2829
2830 dhcp4_address_fail:
2831
2832 if (ipv4ll_address) {
2833 r = in_addr_from_string(AF_INET, ipv4ll_address, &address);
2834 if (r < 0) {
2835 log_link_debug_errno(link, r, "Failed to parse IPv4LL address %s: %m", ipv4ll_address);
2836 goto ipv4ll_address_fail;
2837 }
2838
2839 r = sd_ipv4ll_new(&link->ipv4ll);
2840 if (r < 0)
2841 return log_link_error_errno(link, r, "Failed to create IPv4LL client: %m");
2842
2843 r = sd_ipv4ll_set_address(link->ipv4ll, &address.in);
2844 if (r < 0)
2845 return log_link_error_errno(link, r, "Failed to set initial IPv4LL address %s: %m", ipv4ll_address);
2846 }
2847
2848 ipv4ll_address_fail:
2849
2850 return 0;
2851 }
2852
2853 int link_add(Manager *m, sd_netlink_message *message, Link **ret) {
2854 Link *link;
2855 _cleanup_udev_device_unref_ struct udev_device *device = NULL;
2856 char ifindex_str[2 + DECIMAL_STR_MAX(int)];
2857 int r;
2858
2859 assert(m);
2860 assert(m->rtnl);
2861 assert(message);
2862 assert(ret);
2863
2864 r = link_new(m, message, ret);
2865 if (r < 0)
2866 return r;
2867
2868 link = *ret;
2869
2870 log_link_debug(link, "Link %d added", link->ifindex);
2871
2872 r = link_load(link);
2873 if (r < 0)
2874 return r;
2875
2876 if (detect_container() <= 0) {
2877 /* not in a container, udev will be around */
2878 sprintf(ifindex_str, "n%d", link->ifindex);
2879 device = udev_device_new_from_device_id(m->udev, ifindex_str);
2880 if (!device) {
2881 r = log_link_warning_errno(link, errno, "Could not find udev device: %m");
2882 goto failed;
2883 }
2884
2885 if (udev_device_get_is_initialized(device) <= 0) {
2886 /* not yet ready */
2887 log_link_debug(link, "link pending udev initialization...");
2888 return 0;
2889 }
2890
2891 r = link_initialized(link, device);
2892 if (r < 0)
2893 goto failed;
2894 } else {
2895 /* we are calling a callback directly, so must take a ref */
2896 link_ref(link);
2897
2898 r = link_initialized_and_synced(m->rtnl, NULL, link);
2899 if (r < 0)
2900 goto failed;
2901 }
2902
2903 return 0;
2904 failed:
2905 link_enter_failed(link);
2906 return r;
2907 }
2908
2909 int link_ipv6ll_gained(Link *link, const struct in6_addr *address) {
2910 int r;
2911
2912 assert(link);
2913
2914 log_link_info(link, "Gained IPv6LL");
2915
2916 link->ipv6ll_address = *address;
2917 link_check_ready(link);
2918
2919 if (!IN_SET(link->state, LINK_STATE_PENDING, LINK_STATE_UNMANAGED, LINK_STATE_FAILED)) {
2920 r = link_acquire_ipv6_conf(link);
2921 if (r < 0) {
2922 link_enter_failed(link);
2923 return r;
2924 }
2925 }
2926
2927 return 0;
2928 }
2929
2930 static int link_carrier_gained(Link *link) {
2931 int r;
2932
2933 assert(link);
2934
2935 if (!IN_SET(link->state, LINK_STATE_PENDING, LINK_STATE_UNMANAGED, LINK_STATE_FAILED)) {
2936 r = link_acquire_conf(link);
2937 if (r < 0) {
2938 link_enter_failed(link);
2939 return r;
2940 }
2941
2942 r = link_enter_set_addresses(link);
2943 if (r < 0)
2944 return r;
2945 }
2946
2947 r = link_handle_bound_by_list(link);
2948 if (r < 0)
2949 return r;
2950
2951 return 0;
2952 }
2953
2954 static int link_carrier_lost(Link *link) {
2955 int r;
2956
2957 assert(link);
2958
2959 r = link_stop_clients(link);
2960 if (r < 0) {
2961 link_enter_failed(link);
2962 return r;
2963 }
2964
2965 r = link_drop_config(link);
2966 if (r < 0)
2967 return r;
2968
2969 if (!IN_SET(link->state, LINK_STATE_UNMANAGED, LINK_STATE_PENDING)) {
2970 log_link_debug(link, "State is %s, dropping config", link_state_to_string(link->state));
2971 r = link_drop_foreign_config(link);
2972 if (r < 0)
2973 return r;
2974 }
2975
2976 r = link_handle_bound_by_list(link);
2977 if (r < 0)
2978 return r;
2979
2980 return 0;
2981 }
2982
2983 int link_carrier_reset(Link *link) {
2984 int r;
2985
2986 assert(link);
2987
2988 if (link_has_carrier(link)) {
2989 r = link_carrier_lost(link);
2990 if (r < 0)
2991 return r;
2992
2993 r = link_carrier_gained(link);
2994 if (r < 0)
2995 return r;
2996
2997 log_link_info(link, "Reset carrier");
2998 }
2999
3000 return 0;
3001 }
3002
3003 int link_update(Link *link, sd_netlink_message *m) {
3004 struct ether_addr mac;
3005 const char *ifname;
3006 uint32_t mtu;
3007 bool had_carrier, carrier_gained, carrier_lost;
3008 int r;
3009
3010 assert(link);
3011 assert(link->ifname);
3012 assert(m);
3013
3014 if (link->state == LINK_STATE_LINGER) {
3015 link_ref(link);
3016 log_link_info(link, "Link readded");
3017 link_set_state(link, LINK_STATE_ENSLAVING);
3018
3019 r = link_new_carrier_maps(link);
3020 if (r < 0)
3021 return r;
3022 }
3023
3024 r = sd_netlink_message_read_string(m, IFLA_IFNAME, &ifname);
3025 if (r >= 0 && !streq(ifname, link->ifname)) {
3026 log_link_info(link, "Renamed to %s", ifname);
3027
3028 link_free_carrier_maps(link);
3029
3030 r = free_and_strdup(&link->ifname, ifname);
3031 if (r < 0)
3032 return r;
3033
3034 r = link_new_carrier_maps(link);
3035 if (r < 0)
3036 return r;
3037 }
3038
3039 r = sd_netlink_message_read_u32(m, IFLA_MTU, &mtu);
3040 if (r >= 0 && mtu > 0) {
3041 link->mtu = mtu;
3042 if (!link->original_mtu) {
3043 link->original_mtu = mtu;
3044 log_link_debug(link, "Saved original MTU: %" PRIu32, link->original_mtu);
3045 }
3046
3047 if (link->dhcp_client) {
3048 r = sd_dhcp_client_set_mtu(link->dhcp_client,
3049 link->mtu);
3050 if (r < 0) {
3051 log_link_warning_errno(link, r, "Could not update MTU in DHCP client: %m");
3052 return r;
3053 }
3054 }
3055 }
3056
3057 /* The kernel may broadcast NEWLINK messages without the MAC address
3058 set, simply ignore them. */
3059 r = sd_netlink_message_read_ether_addr(m, IFLA_ADDRESS, &mac);
3060 if (r >= 0) {
3061 if (memcmp(link->mac.ether_addr_octet, mac.ether_addr_octet,
3062 ETH_ALEN)) {
3063
3064 memcpy(link->mac.ether_addr_octet, mac.ether_addr_octet,
3065 ETH_ALEN);
3066
3067 log_link_debug(link, "MAC address: "
3068 "%02hhx:%02hhx:%02hhx:%02hhx:%02hhx:%02hhx",
3069 mac.ether_addr_octet[0],
3070 mac.ether_addr_octet[1],
3071 mac.ether_addr_octet[2],
3072 mac.ether_addr_octet[3],
3073 mac.ether_addr_octet[4],
3074 mac.ether_addr_octet[5]);
3075
3076 if (link->ipv4ll) {
3077 r = sd_ipv4ll_set_mac(link->ipv4ll, &link->mac);
3078 if (r < 0)
3079 return log_link_warning_errno(link, r, "Could not update MAC address in IPv4LL client: %m");
3080 }
3081
3082 if (link->dhcp_client) {
3083 const DUID *duid = link_duid(link);
3084
3085 r = sd_dhcp_client_set_mac(link->dhcp_client,
3086 (const uint8_t *) &link->mac,
3087 sizeof (link->mac),
3088 ARPHRD_ETHER);
3089 if (r < 0)
3090 return log_link_warning_errno(link, r, "Could not update MAC address in DHCP client: %m");
3091
3092 r = sd_dhcp_client_set_iaid_duid(link->dhcp_client,
3093 link->network->iaid,
3094 duid->type,
3095 duid->raw_data_len > 0 ? duid->raw_data : NULL,
3096 duid->raw_data_len);
3097 if (r < 0)
3098 return log_link_warning_errno(link, r, "Could not update DUID/IAID in DHCP client: %m");
3099 }
3100
3101 if (link->dhcp6_client) {
3102 const DUID* duid = link_duid(link);
3103
3104 r = sd_dhcp6_client_set_mac(link->dhcp6_client,
3105 (const uint8_t *) &link->mac,
3106 sizeof (link->mac),
3107 ARPHRD_ETHER);
3108 if (r < 0)
3109 return log_link_warning_errno(link, r, "Could not update MAC address in DHCPv6 client: %m");
3110
3111 r = sd_dhcp6_client_set_iaid(link->dhcp6_client,
3112 link->network->iaid);
3113 if (r < 0)
3114 return log_link_warning_errno(link, r, "Could not update DHCPv6 IAID: %m");
3115
3116 r = sd_dhcp6_client_set_duid(link->dhcp6_client,
3117 duid->type,
3118 duid->raw_data_len > 0 ? duid->raw_data : NULL,
3119 duid->raw_data_len);
3120 if (r < 0)
3121 return log_link_warning_errno(link, r, "Could not update DHCPv6 DUID: %m");
3122 }
3123 }
3124 }
3125
3126 had_carrier = link_has_carrier(link);
3127
3128 r = link_update_flags(link, m);
3129 if (r < 0)
3130 return r;
3131
3132 r = link_update_lldp(link);
3133 if (r < 0)
3134 return r;
3135
3136 carrier_gained = !had_carrier && link_has_carrier(link);
3137 carrier_lost = had_carrier && !link_has_carrier(link);
3138
3139 if (carrier_gained) {
3140 log_link_info(link, "Gained carrier");
3141
3142 r = link_carrier_gained(link);
3143 if (r < 0)
3144 return r;
3145 } else if (carrier_lost) {
3146 log_link_info(link, "Lost carrier");
3147
3148 r = link_carrier_lost(link);
3149 if (r < 0)
3150 return r;
3151 }
3152
3153 return 0;
3154 }
3155
3156 static void print_link_hashmap(FILE *f, const char *prefix, Hashmap* h) {
3157 bool space = false;
3158 Iterator i;
3159 Link *link;
3160
3161 assert(f);
3162 assert(prefix);
3163
3164 if (hashmap_isempty(h))
3165 return;
3166
3167 fputs(prefix, f);
3168 HASHMAP_FOREACH(link, h, i) {
3169 if (space)
3170 fputc(' ', f);
3171
3172 fprintf(f, "%i", link->ifindex);
3173 space = true;
3174 }
3175
3176 fputc('\n', f);
3177 }
3178
3179 int link_save(Link *link) {
3180 _cleanup_free_ char *temp_path = NULL;
3181 _cleanup_fclose_ FILE *f = NULL;
3182 const char *admin_state, *oper_state;
3183 Address *a;
3184 Route *route;
3185 Iterator i;
3186 int r;
3187
3188 assert(link);
3189 assert(link->state_file);
3190 assert(link->lease_file);
3191 assert(link->manager);
3192
3193 if (link->state == LINK_STATE_LINGER) {
3194 unlink(link->state_file);
3195 return 0;
3196 }
3197
3198 link_lldp_save(link);
3199
3200 admin_state = link_state_to_string(link->state);
3201 assert(admin_state);
3202
3203 oper_state = link_operstate_to_string(link->operstate);
3204 assert(oper_state);
3205
3206 r = fopen_temporary(link->state_file, &f, &temp_path);
3207 if (r < 0)
3208 goto fail;
3209
3210 (void) fchmod(fileno(f), 0644);
3211
3212 fprintf(f,
3213 "# This is private data. Do not parse.\n"
3214 "ADMIN_STATE=%s\n"
3215 "OPER_STATE=%s\n",
3216 admin_state, oper_state);
3217
3218 if (link->network) {
3219 bool space;
3220 sd_dhcp6_lease *dhcp6_lease = NULL;
3221 const char *dhcp_domainname = NULL;
3222 char **dhcp6_domains = NULL;
3223 unsigned j;
3224
3225 if (link->dhcp6_client) {
3226 r = sd_dhcp6_client_get_lease(link->dhcp6_client, &dhcp6_lease);
3227 if (r < 0 && r != -ENOMSG)
3228 log_link_debug(link, "No DHCPv6 lease");
3229 }
3230
3231 fprintf(f, "NETWORK_FILE=%s\n", link->network->filename);
3232
3233 fputs("DNS=", f);
3234 space = false;
3235
3236 for (j = 0; j < link->network->n_dns; j++) {
3237 _cleanup_free_ char *b = NULL;
3238
3239 r = in_addr_to_string(link->network->dns[j].family,
3240 &link->network->dns[j].address, &b);
3241 if (r < 0) {
3242 log_debug_errno(r, "Failed to format address, ignoring: %m");
3243 continue;
3244 }
3245
3246 if (space)
3247 fputc(' ', f);
3248 fputs(b, f);
3249 space = true;
3250 }
3251
3252 if (link->network->dhcp_use_dns &&
3253 link->dhcp_lease) {
3254 const struct in_addr *addresses;
3255
3256 r = sd_dhcp_lease_get_dns(link->dhcp_lease, &addresses);
3257 if (r > 0) {
3258 if (space)
3259 fputc(' ', f);
3260 serialize_in_addrs(f, addresses, r);
3261 space = true;
3262 }
3263 }
3264
3265 if (link->network->dhcp_use_dns && dhcp6_lease) {
3266 struct in6_addr *in6_addrs;
3267
3268 r = sd_dhcp6_lease_get_dns(dhcp6_lease, &in6_addrs);
3269 if (r > 0) {
3270 if (space)
3271 fputc(' ', f);
3272 serialize_in6_addrs(f, in6_addrs, r);
3273 space = true;
3274 }
3275 }
3276
3277 /* Make sure to flush out old entries before we use the NDISC data */
3278 ndisc_vacuum(link);
3279
3280 if (link->network->dhcp_use_dns && link->ndisc_rdnss) {
3281 NDiscRDNSS *dd;
3282
3283 SET_FOREACH(dd, link->ndisc_rdnss, i) {
3284 if (space)
3285 fputc(' ', f);
3286
3287 serialize_in6_addrs(f, &dd->address, 1);
3288 space = true;
3289 }
3290 }
3291
3292 fputc('\n', f);
3293
3294 fputs("NTP=", f);
3295 space = false;
3296 fputstrv(f, link->network->ntp, NULL, &space);
3297
3298 if (link->network->dhcp_use_ntp &&
3299 link->dhcp_lease) {
3300 const struct in_addr *addresses;
3301
3302 r = sd_dhcp_lease_get_ntp(link->dhcp_lease, &addresses);
3303 if (r > 0) {
3304 if (space)
3305 fputc(' ', f);
3306 serialize_in_addrs(f, addresses, r);
3307 space = true;
3308 }
3309 }
3310
3311 if (link->network->dhcp_use_ntp && dhcp6_lease) {
3312 struct in6_addr *in6_addrs;
3313 char **hosts;
3314
3315 r = sd_dhcp6_lease_get_ntp_addrs(dhcp6_lease,
3316 &in6_addrs);
3317 if (r > 0) {
3318 if (space)
3319 fputc(' ', f);
3320 serialize_in6_addrs(f, in6_addrs, r);
3321 space = true;
3322 }
3323
3324 r = sd_dhcp6_lease_get_ntp_fqdn(dhcp6_lease, &hosts);
3325 if (r > 0)
3326 fputstrv(f, hosts, NULL, &space);
3327 }
3328
3329 fputc('\n', f);
3330
3331 if (link->network->dhcp_use_domains != DHCP_USE_DOMAINS_NO) {
3332 if (link->dhcp_lease)
3333 (void) sd_dhcp_lease_get_domainname(link->dhcp_lease, &dhcp_domainname);
3334 if (dhcp6_lease)
3335 (void) sd_dhcp6_lease_get_domains(dhcp6_lease, &dhcp6_domains);
3336 }
3337
3338 fputs("DOMAINS=", f);
3339 fputstrv(f, link->network->search_domains, NULL, &space);
3340
3341 if (link->network->dhcp_use_domains == DHCP_USE_DOMAINS_YES) {
3342 NDiscDNSSL *dd;
3343
3344 if (dhcp_domainname)
3345 fputs_with_space(f, dhcp_domainname, NULL, &space);
3346 if (dhcp6_domains)
3347 fputstrv(f, dhcp6_domains, NULL, &space);
3348
3349 SET_FOREACH(dd, link->ndisc_dnssl, i)
3350 fputs_with_space(f, NDISC_DNSSL_DOMAIN(dd), NULL, &space);
3351 }
3352
3353 fputc('\n', f);
3354
3355 fputs("ROUTE_DOMAINS=", f);
3356 fputstrv(f, link->network->route_domains, NULL, NULL);
3357
3358 if (link->network->dhcp_use_domains == DHCP_USE_DOMAINS_ROUTE) {
3359 NDiscDNSSL *dd;
3360
3361 if (dhcp_domainname)
3362 fputs_with_space(f, dhcp_domainname, NULL, &space);
3363 if (dhcp6_domains)
3364 fputstrv(f, dhcp6_domains, NULL, &space);
3365
3366 SET_FOREACH(dd, link->ndisc_dnssl, i)
3367 fputs_with_space(f, NDISC_DNSSL_DOMAIN(dd), NULL, &space);
3368 }
3369
3370 fputc('\n', f);
3371
3372 fprintf(f, "LLMNR=%s\n",
3373 resolve_support_to_string(link->network->llmnr));
3374 fprintf(f, "MDNS=%s\n",
3375 resolve_support_to_string(link->network->mdns));
3376
3377 if (link->network->dnssec_mode != _DNSSEC_MODE_INVALID)
3378 fprintf(f, "DNSSEC=%s\n",
3379 dnssec_mode_to_string(link->network->dnssec_mode));
3380
3381 if (!set_isempty(link->network->dnssec_negative_trust_anchors)) {
3382 const char *n;
3383
3384 fputs("DNSSEC_NTA=", f);
3385 space = false;
3386 SET_FOREACH(n, link->network->dnssec_negative_trust_anchors, i)
3387 fputs_with_space(f, n, NULL, &space);
3388 fputc('\n', f);
3389 }
3390
3391 fputs("ADDRESSES=", f);
3392 space = false;
3393 SET_FOREACH(a, link->addresses, i) {
3394 _cleanup_free_ char *address_str = NULL;
3395
3396 r = in_addr_to_string(a->family, &a->in_addr, &address_str);
3397 if (r < 0)
3398 goto fail;
3399
3400 fprintf(f, "%s%s/%u", space ? " " : "", address_str, a->prefixlen);
3401 space = true;
3402 }
3403 fputc('\n', f);
3404
3405 fputs("ROUTES=", f);
3406 space = false;
3407 SET_FOREACH(route, link->routes, i) {
3408 _cleanup_free_ char *route_str = NULL;
3409
3410 r = in_addr_to_string(route->family, &route->dst, &route_str);
3411 if (r < 0)
3412 goto fail;
3413
3414 fprintf(f, "%s%s/%hhu/%hhu/%"PRIu32"/%hhu/"USEC_FMT, space ? " " : "", route_str,
3415 route->dst_prefixlen, route->tos, route->priority, route->table, route->lifetime);
3416 space = true;
3417 }
3418
3419 fputc('\n', f);
3420 }
3421
3422 print_link_hashmap(f, "CARRIER_BOUND_TO=", link->bound_to_links);
3423 print_link_hashmap(f, "CARRIER_BOUND_BY=", link->bound_by_links);
3424
3425 if (link->dhcp_lease) {
3426 struct in_addr address;
3427 const char *tz = NULL;
3428
3429 assert(link->network);
3430
3431 r = sd_dhcp_lease_get_timezone(link->dhcp_lease, &tz);
3432 if (r >= 0)
3433 fprintf(f, "TIMEZONE=%s\n", tz);
3434
3435 r = sd_dhcp_lease_get_address(link->dhcp_lease, &address);
3436 if (r >= 0) {
3437 fputs("DHCP4_ADDRESS=", f);
3438 serialize_in_addrs(f, &address, 1);
3439 fputc('\n', f);
3440 }
3441
3442 r = dhcp_lease_save(link->dhcp_lease, link->lease_file);
3443 if (r < 0)
3444 goto fail;
3445
3446 fprintf(f,
3447 "DHCP_LEASE=%s\n",
3448 link->lease_file);
3449 } else
3450 unlink(link->lease_file);
3451
3452 if (link->ipv4ll) {
3453 struct in_addr address;
3454
3455 r = sd_ipv4ll_get_address(link->ipv4ll, &address);
3456 if (r >= 0) {
3457 fputs("IPV4LL_ADDRESS=", f);
3458 serialize_in_addrs(f, &address, 1);
3459 fputc('\n', f);
3460 }
3461 }
3462
3463 r = fflush_and_check(f);
3464 if (r < 0)
3465 goto fail;
3466
3467 if (rename(temp_path, link->state_file) < 0) {
3468 r = -errno;
3469 goto fail;
3470 }
3471
3472 return 0;
3473
3474 fail:
3475 (void) unlink(link->state_file);
3476 if (temp_path)
3477 (void) unlink(temp_path);
3478
3479 return log_link_error_errno(link, r, "Failed to save link data to %s: %m", link->state_file);
3480 }
3481
3482 /* The serialized state in /run is no longer up-to-date. */
3483 void link_dirty(Link *link) {
3484 int r;
3485
3486 assert(link);
3487
3488 /* mark manager dirty as link is dirty */
3489 manager_dirty(link->manager);
3490
3491 r = set_ensure_allocated(&link->manager->dirty_links, NULL);
3492 if (r < 0)
3493 /* allocation errors are ignored */
3494 return;
3495
3496 r = set_put(link->manager->dirty_links, link);
3497 if (r <= 0)
3498 /* don't take another ref if the link was already dirty */
3499 return;
3500
3501 link_ref(link);
3502 }
3503
3504 /* The serialized state in /run is up-to-date */
3505 void link_clean(Link *link) {
3506 assert(link);
3507 assert(link->manager);
3508
3509 set_remove(link->manager->dirty_links, link);
3510 link_unref(link);
3511 }
3512
3513 static const char* const link_state_table[_LINK_STATE_MAX] = {
3514 [LINK_STATE_PENDING] = "pending",
3515 [LINK_STATE_ENSLAVING] = "configuring",
3516 [LINK_STATE_SETTING_ADDRESSES] = "configuring",
3517 [LINK_STATE_SETTING_ROUTES] = "configuring",
3518 [LINK_STATE_CONFIGURED] = "configured",
3519 [LINK_STATE_UNMANAGED] = "unmanaged",
3520 [LINK_STATE_FAILED] = "failed",
3521 [LINK_STATE_LINGER] = "linger",
3522 };
3523
3524 DEFINE_STRING_TABLE_LOOKUP(link_state, LinkState);
3525
3526 static const char* const link_operstate_table[_LINK_OPERSTATE_MAX] = {
3527 [LINK_OPERSTATE_OFF] = "off",
3528 [LINK_OPERSTATE_NO_CARRIER] = "no-carrier",
3529 [LINK_OPERSTATE_DORMANT] = "dormant",
3530 [LINK_OPERSTATE_CARRIER] = "carrier",
3531 [LINK_OPERSTATE_DEGRADED] = "degraded",
3532 [LINK_OPERSTATE_ROUTABLE] = "routable",
3533 };
3534
3535 DEFINE_STRING_TABLE_LOOKUP(link_operstate, LinkOperationalState);