interface: support "device" attribute and deprecate "ifname"
[project/netifd.git] / device.c
1 /*
2 * netifd - network interface daemon
3 * Copyright (C) 2012 Felix Fietkau <nbd@openwrt.org>
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2
7 * as published by the Free Software Foundation
8 *
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
13 */
14 #include <string.h>
15 #include <stdlib.h>
16 #include <stdio.h>
17 #include <assert.h>
18
19 #include <sys/types.h>
20 #include <sys/socket.h>
21
22 #include <libubox/list.h>
23
24 #include "netifd.h"
25 #include "system.h"
26 #include "config.h"
27
28 static struct list_head devtypes = LIST_HEAD_INIT(devtypes);
29 static struct avl_tree devices;
30
31 static const struct blobmsg_policy dev_attrs[__DEV_ATTR_MAX] = {
32 [DEV_ATTR_TYPE] = { .name = "type", .type = BLOBMSG_TYPE_STRING },
33 [DEV_ATTR_MTU] = { .name = "mtu", .type = BLOBMSG_TYPE_INT32 },
34 [DEV_ATTR_MTU6] = { .name = "mtu6", .type = BLOBMSG_TYPE_INT32 },
35 [DEV_ATTR_MACADDR] = { .name = "macaddr", .type = BLOBMSG_TYPE_STRING },
36 [DEV_ATTR_TXQUEUELEN] = { .name = "txqueuelen", .type = BLOBMSG_TYPE_INT32 },
37 [DEV_ATTR_ENABLED] = { .name = "enabled", .type = BLOBMSG_TYPE_BOOL },
38 [DEV_ATTR_IPV6] = { .name = "ipv6", .type = BLOBMSG_TYPE_BOOL },
39 [DEV_ATTR_IP6SEGMENTROUTING] = { .name = "ip6segmentrouting", .type = BLOBMSG_TYPE_BOOL },
40 [DEV_ATTR_PROMISC] = { .name = "promisc", .type = BLOBMSG_TYPE_BOOL },
41 [DEV_ATTR_RPFILTER] = { .name = "rpfilter", .type = BLOBMSG_TYPE_STRING },
42 [DEV_ATTR_ACCEPTLOCAL] = { .name = "acceptlocal", .type = BLOBMSG_TYPE_BOOL },
43 [DEV_ATTR_IGMPVERSION] = { .name = "igmpversion", .type = BLOBMSG_TYPE_INT32 },
44 [DEV_ATTR_MLDVERSION] = { .name = "mldversion", .type = BLOBMSG_TYPE_INT32 },
45 [DEV_ATTR_NEIGHREACHABLETIME] = { .name = "neighreachabletime", .type = BLOBMSG_TYPE_INT32 },
46 [DEV_ATTR_NEIGHGCSTALETIME] = { .name = "neighgcstaletime", .type = BLOBMSG_TYPE_INT32 },
47 [DEV_ATTR_DADTRANSMITS] = { .name = "dadtransmits", .type = BLOBMSG_TYPE_INT32 },
48 [DEV_ATTR_MULTICAST_TO_UNICAST] = { .name = "multicast_to_unicast", .type = BLOBMSG_TYPE_BOOL },
49 [DEV_ATTR_MULTICAST_ROUTER] = { .name = "multicast_router", .type = BLOBMSG_TYPE_INT32 },
50 [DEV_ATTR_MULTICAST_FAST_LEAVE] = { .name = "multicast_fast_leave", . type = BLOBMSG_TYPE_BOOL },
51 [DEV_ATTR_MULTICAST] = { .name ="multicast", .type = BLOBMSG_TYPE_BOOL },
52 [DEV_ATTR_LEARNING] = { .name ="learning", .type = BLOBMSG_TYPE_BOOL },
53 [DEV_ATTR_UNICAST_FLOOD] = { .name ="unicast_flood", .type = BLOBMSG_TYPE_BOOL },
54 [DEV_ATTR_SENDREDIRECTS] = { .name = "sendredirects", .type = BLOBMSG_TYPE_BOOL },
55 [DEV_ATTR_NEIGHLOCKTIME] = { .name = "neighlocktime", .type = BLOBMSG_TYPE_INT32 },
56 [DEV_ATTR_ISOLATE] = { .name = "isolate", .type = BLOBMSG_TYPE_BOOL },
57 [DEV_ATTR_DROP_V4_UNICAST_IN_L2_MULTICAST] = { .name = "drop_v4_unicast_in_l2_multicast", .type = BLOBMSG_TYPE_BOOL },
58 [DEV_ATTR_DROP_V6_UNICAST_IN_L2_MULTICAST] = { .name = "drop_v6_unicast_in_l2_multicast", .type = BLOBMSG_TYPE_BOOL },
59 [DEV_ATTR_DROP_GRATUITOUS_ARP] = { .name = "drop_gratuitous_arp", .type = BLOBMSG_TYPE_BOOL },
60 [DEV_ATTR_DROP_UNSOLICITED_NA] = { .name = "drop_unsolicited_na", .type = BLOBMSG_TYPE_BOOL },
61 [DEV_ATTR_ARP_ACCEPT] = { .name = "arp_accept", .type = BLOBMSG_TYPE_BOOL },
62 [DEV_ATTR_AUTH] = { .name = "auth", .type = BLOBMSG_TYPE_BOOL },
63 };
64
65 const struct uci_blob_param_list device_attr_list = {
66 .n_params = __DEV_ATTR_MAX,
67 .params = dev_attrs,
68 };
69
70 static int __devlock = 0;
71
72 int device_type_add(struct device_type *devtype)
73 {
74 if (device_type_get(devtype->name)) {
75 netifd_log_message(L_WARNING, "Device handler '%s' already exists\n",
76 devtype->name);
77 return 1;
78 }
79
80 netifd_log_message(L_NOTICE, "Added device handler type: %s\n",
81 devtype->name);
82
83 list_add(&devtype->list, &devtypes);
84 return 0;
85 }
86
87 struct device_type *
88 device_type_get(const char *tname)
89 {
90 struct device_type *cur;
91
92 list_for_each_entry(cur, &devtypes, list)
93 if (!strcmp(cur->name, tname))
94 return cur;
95
96 return NULL;
97 }
98
99 void device_lock(void)
100 {
101 __devlock++;
102 }
103
104 void device_unlock(void)
105 {
106 __devlock--;
107 if (!__devlock)
108 device_free_unused(NULL);
109 }
110
111 static int device_vlan_len(struct kvlist *kv, const void *data)
112 {
113 return sizeof(unsigned int);
114 }
115
116 void device_vlan_update(bool done)
117 {
118 struct device *dev;
119
120 avl_for_each_element(&devices, dev, avl) {
121 if (!dev->vlans.update)
122 continue;
123
124 if (!done) {
125 if (dev->vlan_aliases.get_len)
126 kvlist_free(&dev->vlan_aliases);
127 else
128 kvlist_init(&dev->vlan_aliases, device_vlan_len);
129 vlist_update(&dev->vlans);
130 } else {
131 vlist_flush(&dev->vlans);
132 }
133 }
134 }
135
136 static int set_device_state(struct device *dev, bool state)
137 {
138 if (state) {
139 /* Get ifindex for all devices being enabled so a valid */
140 /* ifindex is in place avoiding possible race conditions */
141 device_set_ifindex(dev, system_if_resolve(dev));
142 if (!dev->ifindex)
143 return -1;
144
145 system_if_get_settings(dev, &dev->orig_settings);
146 /* Only keep orig settings based on what needs to be set */
147 dev->orig_settings.valid_flags = dev->orig_settings.flags;
148 dev->orig_settings.flags &= dev->settings.flags;
149 system_if_apply_settings(dev, &dev->settings, dev->settings.flags);
150
151 system_if_up(dev);
152 } else {
153 system_if_down(dev);
154 system_if_apply_settings(dev, &dev->orig_settings, dev->orig_settings.flags);
155 }
156
157 return 0;
158 }
159
160 static int
161 simple_device_set_state(struct device *dev, bool state)
162 {
163 struct device *pdev;
164 int ret = 0;
165
166 pdev = dev->parent.dev;
167 if (state && !pdev) {
168 pdev = system_if_get_parent(dev);
169 if (pdev)
170 device_add_user(&dev->parent, pdev);
171 }
172
173 if (pdev) {
174 if (state)
175 ret = device_claim(&dev->parent);
176 else
177 device_release(&dev->parent);
178
179 if (ret < 0)
180 return ret;
181 }
182 return set_device_state(dev, state);
183 }
184
185 static struct device *
186 simple_device_create(const char *name, struct device_type *devtype,
187 struct blob_attr *attr)
188 {
189 struct blob_attr *tb[__DEV_ATTR_MAX];
190 struct device *dev = NULL;
191
192 /* device type is unused for simple devices */
193 devtype = NULL;
194
195 blobmsg_parse(dev_attrs, __DEV_ATTR_MAX, tb, blob_data(attr), blob_len(attr));
196 dev = device_get(name, true);
197 if (!dev)
198 return NULL;
199
200 dev->set_state = simple_device_set_state;
201 device_init_settings(dev, tb);
202
203 return dev;
204 }
205
206 static void simple_device_free(struct device *dev)
207 {
208 if (dev->parent.dev)
209 device_remove_user(&dev->parent);
210 free(dev);
211 }
212
213 struct device_type simple_device_type = {
214 .name = "Network device",
215 .config_params = &device_attr_list,
216
217 .create = simple_device_create,
218 .check_state = system_if_check,
219 .free = simple_device_free,
220 };
221
222 void
223 device_merge_settings(struct device *dev, struct device_settings *n)
224 {
225 struct device_settings *os = &dev->orig_settings;
226 struct device_settings *s = &dev->settings;
227
228 memset(n, 0, sizeof(*n));
229 n->mtu = s->flags & DEV_OPT_MTU ? s->mtu : os->mtu;
230 n->mtu6 = s->flags & DEV_OPT_MTU6 ? s->mtu6 : os->mtu6;
231 n->txqueuelen = s->flags & DEV_OPT_TXQUEUELEN ?
232 s->txqueuelen : os->txqueuelen;
233 memcpy(n->macaddr,
234 (s->flags & (DEV_OPT_MACADDR|DEV_OPT_DEFAULT_MACADDR) ? s->macaddr : os->macaddr),
235 sizeof(n->macaddr));
236 n->ipv6 = s->flags & DEV_OPT_IPV6 ? s->ipv6 : os->ipv6;
237 n->ip6segmentrouting = s->flags & DEV_OPT_IP6SEGMENTROUTING ? s->ip6segmentrouting : os->ip6segmentrouting;
238 n->promisc = s->flags & DEV_OPT_PROMISC ? s->promisc : os->promisc;
239 n->rpfilter = s->flags & DEV_OPT_RPFILTER ? s->rpfilter : os->rpfilter;
240 n->acceptlocal = s->flags & DEV_OPT_ACCEPTLOCAL ? s->acceptlocal : os->acceptlocal;
241 n->igmpversion = s->flags & DEV_OPT_IGMPVERSION ? s->igmpversion : os->igmpversion;
242 n->mldversion = s->flags & DEV_OPT_MLDVERSION ? s->mldversion : os->mldversion;
243 n->neigh4reachabletime = s->flags & DEV_OPT_NEIGHREACHABLETIME ?
244 s->neigh4reachabletime : os->neigh4reachabletime;
245 n->neigh6reachabletime = s->flags & DEV_OPT_NEIGHREACHABLETIME ?
246 s->neigh6reachabletime : os->neigh6reachabletime;
247 n->neigh4gcstaletime = s->flags & DEV_OPT_NEIGHGCSTALETIME ?
248 s->neigh4gcstaletime : os->neigh4gcstaletime;
249 n->neigh6gcstaletime = s->flags & DEV_OPT_NEIGHGCSTALETIME ?
250 s->neigh6gcstaletime : os->neigh6gcstaletime;
251 n->neigh4locktime = s->flags & DEV_OPT_NEIGHLOCKTIME ?
252 s->neigh4locktime : os->neigh4locktime;
253 n->dadtransmits = s->flags & DEV_OPT_DADTRANSMITS ?
254 s->dadtransmits : os->dadtransmits;
255 n->multicast = s->flags & DEV_OPT_MULTICAST ?
256 s->multicast : os->multicast;
257 n->multicast_to_unicast = s->multicast_to_unicast;
258 n->multicast_router = s->multicast_router;
259 n->multicast_fast_leave = s->multicast_fast_leave;
260 n->learning = s->learning;
261 n->unicast_flood = s->unicast_flood;
262 n->sendredirects = s->flags & DEV_OPT_SENDREDIRECTS ?
263 s->sendredirects : os->sendredirects;
264 n->drop_v4_unicast_in_l2_multicast = s->flags & DEV_OPT_DROP_V4_UNICAST_IN_L2_MULTICAST ?
265 s->drop_v4_unicast_in_l2_multicast : os->drop_v4_unicast_in_l2_multicast;
266 n->drop_v6_unicast_in_l2_multicast = s->flags & DEV_OPT_DROP_V6_UNICAST_IN_L2_MULTICAST ?
267 s->drop_v6_unicast_in_l2_multicast : os->drop_v6_unicast_in_l2_multicast;
268 n->drop_gratuitous_arp = s->flags & DEV_OPT_DROP_GRATUITOUS_ARP ?
269 s->drop_gratuitous_arp : os->drop_gratuitous_arp;
270 n->drop_unsolicited_na = s->flags & DEV_OPT_DROP_UNSOLICITED_NA ?
271 s->drop_unsolicited_na : os->drop_unsolicited_na;
272 n->arp_accept = s->flags & DEV_OPT_ARP_ACCEPT ?
273 s->arp_accept : os->arp_accept;
274 n->auth = s->flags & DEV_OPT_AUTH ? s->auth : os->auth;
275 n->flags = s->flags | os->flags | os->valid_flags;
276 }
277
278 void
279 device_init_settings(struct device *dev, struct blob_attr **tb)
280 {
281 struct device_settings *s = &dev->settings;
282 struct blob_attr *cur;
283 struct ether_addr *ea;
284 bool disabled = false;
285
286 s->flags = 0;
287 if ((cur = tb[DEV_ATTR_ENABLED]))
288 disabled = !blobmsg_get_bool(cur);
289
290 if ((cur = tb[DEV_ATTR_MTU]) && blobmsg_get_u32(cur) >= 68) {
291 s->mtu = blobmsg_get_u32(cur);
292 s->flags |= DEV_OPT_MTU;
293 }
294
295 if ((cur = tb[DEV_ATTR_MTU6]) && blobmsg_get_u32(cur) >= 1280) {
296 s->mtu6 = blobmsg_get_u32(cur);
297 s->flags |= DEV_OPT_MTU6;
298 }
299
300 if ((cur = tb[DEV_ATTR_TXQUEUELEN])) {
301 s->txqueuelen = blobmsg_get_u32(cur);
302 s->flags |= DEV_OPT_TXQUEUELEN;
303 }
304
305 if ((cur = tb[DEV_ATTR_MACADDR])) {
306 ea = ether_aton(blobmsg_data(cur));
307 if (ea) {
308 memcpy(s->macaddr, ea, 6);
309 s->flags |= DEV_OPT_MACADDR;
310 }
311 }
312
313 if ((cur = tb[DEV_ATTR_IPV6])) {
314 s->ipv6 = blobmsg_get_bool(cur);
315 s->flags |= DEV_OPT_IPV6;
316 }
317
318 if ((cur = tb[DEV_ATTR_IP6SEGMENTROUTING])) {
319 s->ip6segmentrouting = blobmsg_get_bool(cur);
320 s->flags |= DEV_OPT_IP6SEGMENTROUTING;
321 }
322
323 if ((cur = tb[DEV_ATTR_PROMISC])) {
324 s->promisc = blobmsg_get_bool(cur);
325 s->flags |= DEV_OPT_PROMISC;
326 }
327
328 if ((cur = tb[DEV_ATTR_RPFILTER])) {
329 if (system_resolve_rpfilter(blobmsg_data(cur), &s->rpfilter))
330 s->flags |= DEV_OPT_RPFILTER;
331 else
332 DPRINTF("Failed to resolve rpfilter: %s\n", (char *) blobmsg_data(cur));
333 }
334
335 if ((cur = tb[DEV_ATTR_ACCEPTLOCAL])) {
336 s->acceptlocal = blobmsg_get_bool(cur);
337 s->flags |= DEV_OPT_ACCEPTLOCAL;
338 }
339
340 if ((cur = tb[DEV_ATTR_IGMPVERSION])) {
341 s->igmpversion = blobmsg_get_u32(cur);
342 if (s->igmpversion >= 1 && s->igmpversion <= 3)
343 s->flags |= DEV_OPT_IGMPVERSION;
344 else
345 DPRINTF("Failed to resolve igmpversion: %d\n", blobmsg_get_u32(cur));
346 }
347
348 if ((cur = tb[DEV_ATTR_MLDVERSION])) {
349 s->mldversion = blobmsg_get_u32(cur);
350 if (s->mldversion >= 1 && s->mldversion <= 2)
351 s->flags |= DEV_OPT_MLDVERSION;
352 else
353 DPRINTF("Failed to resolve mldversion: %d\n", blobmsg_get_u32(cur));
354 }
355
356 if ((cur = tb[DEV_ATTR_NEIGHREACHABLETIME])) {
357 s->neigh6reachabletime = s->neigh4reachabletime = blobmsg_get_u32(cur);
358 s->flags |= DEV_OPT_NEIGHREACHABLETIME;
359 }
360
361 if ((cur = tb[DEV_ATTR_NEIGHGCSTALETIME])) {
362 s->neigh6gcstaletime = s->neigh4gcstaletime = blobmsg_get_u32(cur);
363 s->flags |= DEV_OPT_NEIGHGCSTALETIME;
364 }
365
366 if ((cur = tb[DEV_ATTR_NEIGHLOCKTIME])) {
367 s->neigh4locktime = blobmsg_get_u32(cur);
368 s->flags |= DEV_OPT_NEIGHLOCKTIME;
369 }
370
371 if ((cur = tb[DEV_ATTR_DADTRANSMITS])) {
372 s->dadtransmits = blobmsg_get_u32(cur);
373 s->flags |= DEV_OPT_DADTRANSMITS;
374 }
375
376 if ((cur = tb[DEV_ATTR_MULTICAST_TO_UNICAST])) {
377 s->multicast_to_unicast = blobmsg_get_bool(cur);
378 s->flags |= DEV_OPT_MULTICAST_TO_UNICAST;
379 }
380
381 if ((cur = tb[DEV_ATTR_MULTICAST_ROUTER])) {
382 s->multicast_router = blobmsg_get_u32(cur);
383 if (s->multicast_router <= 2)
384 s->flags |= DEV_OPT_MULTICAST_ROUTER;
385 else
386 DPRINTF("Invalid value: %d - (Use 0: never, 1: learn, 2: always)\n", blobmsg_get_u32(cur));
387 }
388
389 if ((cur = tb[DEV_ATTR_MULTICAST_FAST_LEAVE])) {
390 s->multicast_fast_leave = blobmsg_get_bool(cur);
391 s->flags |= DEV_OPT_MULTICAST_FAST_LEAVE;
392 }
393
394 if ((cur = tb[DEV_ATTR_MULTICAST])) {
395 s->multicast = blobmsg_get_bool(cur);
396 s->flags |= DEV_OPT_MULTICAST;
397 }
398
399 if ((cur = tb[DEV_ATTR_LEARNING])) {
400 s->learning = blobmsg_get_bool(cur);
401 s->flags |= DEV_OPT_LEARNING;
402 }
403
404 if ((cur = tb[DEV_ATTR_UNICAST_FLOOD])) {
405 s->unicast_flood = blobmsg_get_bool(cur);
406 s->flags |= DEV_OPT_UNICAST_FLOOD;
407 }
408
409 if ((cur = tb[DEV_ATTR_SENDREDIRECTS])) {
410 s->sendredirects = blobmsg_get_bool(cur);
411 s->flags |= DEV_OPT_SENDREDIRECTS;
412 }
413
414 if ((cur = tb[DEV_ATTR_ISOLATE])) {
415 s->isolate = blobmsg_get_bool(cur);
416 s->flags |= DEV_OPT_ISOLATE;
417 }
418
419 if ((cur = tb[DEV_ATTR_DROP_V4_UNICAST_IN_L2_MULTICAST])) {
420 s->drop_v4_unicast_in_l2_multicast = blobmsg_get_bool(cur);
421 s->flags |= DEV_OPT_DROP_V4_UNICAST_IN_L2_MULTICAST;
422 }
423
424 if ((cur = tb[DEV_ATTR_DROP_V6_UNICAST_IN_L2_MULTICAST])) {
425 s->drop_v6_unicast_in_l2_multicast = blobmsg_get_bool(cur);
426 s->flags |= DEV_OPT_DROP_V6_UNICAST_IN_L2_MULTICAST;
427 }
428
429 if ((cur = tb[DEV_ATTR_DROP_GRATUITOUS_ARP])) {
430 s->drop_gratuitous_arp = blobmsg_get_bool(cur);
431 s->flags |= DEV_OPT_DROP_GRATUITOUS_ARP;
432 }
433
434 if ((cur = tb[DEV_ATTR_DROP_UNSOLICITED_NA])) {
435 s->drop_unsolicited_na = blobmsg_get_bool(cur);
436 s->flags |= DEV_OPT_DROP_UNSOLICITED_NA;
437 }
438
439 if ((cur = tb[DEV_ATTR_ARP_ACCEPT])) {
440 s->arp_accept = blobmsg_get_bool(cur);
441 s->flags |= DEV_OPT_ARP_ACCEPT;
442 }
443
444 if ((cur = tb[DEV_ATTR_AUTH])) {
445 s->auth = blobmsg_get_bool(cur);
446 s->flags |= DEV_OPT_AUTH;
447 }
448
449 device_set_disabled(dev, disabled);
450 }
451
452 static void __init dev_init(void)
453 {
454 avl_init(&devices, avl_strcmp, true, NULL);
455 }
456
457 static int device_broadcast_cb(void *ctx, struct safe_list *list)
458 {
459 struct device_user *dep = container_of(list, struct device_user, list);
460 int *ev = ctx;
461
462 /* device might have been removed by an earlier callback */
463 if (!dep->dev)
464 return 0;
465
466 if (dep->cb)
467 dep->cb(dep, *ev);
468 return 0;
469 }
470
471 void device_broadcast_event(struct device *dev, enum device_event ev)
472 {
473 int dev_ev = ev;
474
475 safe_list_for_each(&dev->aliases, device_broadcast_cb, &dev_ev);
476 safe_list_for_each(&dev->users, device_broadcast_cb, &dev_ev);
477 }
478
479 static void
480 device_fill_default_settings(struct device *dev)
481 {
482 struct device_settings *s = &dev->settings;
483 struct ether_addr *ea;
484
485 if (!(s->flags & DEV_OPT_MACADDR)) {
486 ea = config_get_default_macaddr(dev->ifname);
487 if (ea) {
488 memcpy(s->macaddr, ea, 6);
489 s->flags |= DEV_OPT_DEFAULT_MACADDR;
490 }
491 }
492 }
493
494 int device_claim(struct device_user *dep)
495 {
496 struct device *dev = dep->dev;
497 int ret = 0;
498
499 if (dep->claimed)
500 return 0;
501
502 if (!dev)
503 return -1;
504
505 dep->claimed = true;
506 D(DEVICE, "Claim %s %s, new active count: %d\n", dev->type->name, dev->ifname, dev->active + 1);
507 if (++dev->active != 1)
508 return 0;
509
510 device_broadcast_event(dev, DEV_EVENT_SETUP);
511 device_fill_default_settings(dev);
512 if (dev->external) {
513 /* Get ifindex for external claimed devices so a valid */
514 /* ifindex is in place avoiding possible race conditions */
515 device_set_ifindex(dev, system_if_resolve(dev));
516 if (!dev->ifindex)
517 ret = -1;
518
519 system_if_get_settings(dev, &dev->orig_settings);
520 } else
521 ret = dev->set_state(dev, true);
522
523 if (ret == 0)
524 device_broadcast_event(dev, DEV_EVENT_UP);
525 else {
526 D(DEVICE, "claim %s %s failed: %d\n", dev->type->name, dev->ifname, ret);
527 dev->active = 0;
528 dep->claimed = false;
529 }
530
531 return ret;
532 }
533
534 void device_release(struct device_user *dep)
535 {
536 struct device *dev = dep->dev;
537
538 if (!dep->claimed)
539 return;
540
541 dep->claimed = false;
542 dev->active--;
543 D(DEVICE, "Release %s %s, new active count: %d\n", dev->type->name, dev->ifname, dev->active);
544 assert(dev->active >= 0);
545
546 if (dev->active)
547 return;
548
549 device_broadcast_event(dev, DEV_EVENT_TEARDOWN);
550 if (!dev->external)
551 dev->set_state(dev, false);
552
553 if (dev->active)
554 return;
555
556 device_broadcast_event(dev, DEV_EVENT_DOWN);
557 }
558
559 int device_check_state(struct device *dev)
560 {
561 if (!dev->type->check_state)
562 return simple_device_type.check_state(dev);
563
564 return dev->type->check_state(dev);
565 }
566
567 int device_init_virtual(struct device *dev, struct device_type *type, const char *name)
568 {
569 assert(dev);
570 assert(type);
571
572 D(DEVICE, "Initialize device '%s'\n", name ? name : "");
573 INIT_SAFE_LIST(&dev->users);
574 INIT_SAFE_LIST(&dev->aliases);
575 dev->type = type;
576
577 if (name) {
578 int ret;
579
580 ret = device_set_ifname(dev, name);
581 if (ret < 0)
582 return ret;
583 }
584
585 if (!dev->set_state)
586 dev->set_state = set_device_state;
587
588 return 0;
589 }
590
591 int device_init(struct device *dev, struct device_type *type, const char *ifname)
592 {
593 int ret;
594
595 ret = device_init_virtual(dev, type, ifname);
596 if (ret < 0)
597 return ret;
598
599 dev->avl.key = dev->ifname;
600
601 ret = avl_insert(&devices, &dev->avl);
602 if (ret < 0)
603 return ret;
604
605 system_if_clear_state(dev);
606
607 return 0;
608 }
609
610 static struct device *
611 device_create_default(const char *name, bool external)
612 {
613 struct device *dev;
614
615 if (!external && system_if_force_external(name))
616 return NULL;
617
618 D(DEVICE, "Create simple device '%s'\n", name);
619 dev = calloc(1, sizeof(*dev));
620 if (!dev)
621 return NULL;
622
623 dev->external = external;
624 dev->set_state = simple_device_set_state;
625
626 if (device_init(dev, &simple_device_type, name) < 0) {
627 device_cleanup(dev);
628 free(dev);
629 return NULL;
630 }
631
632 dev->default_config = true;
633 if (external)
634 system_if_apply_settings(dev, &dev->settings, dev->settings.flags);
635
636 device_check_state(dev);
637
638 return dev;
639 }
640
641 struct device *
642 device_find(const char *name)
643 {
644 struct device *dev;
645
646 return avl_find_element(&devices, name, dev, avl);
647 }
648
649 struct device *
650 device_get(const char *name, int create)
651 {
652 struct device *dev;
653
654 dev = avl_find_element(&devices, name, dev, avl);
655
656 if (!dev && strchr(name, '.'))
657 return get_vlan_device_chain(name, create);
658
659 if (name[0] == '@')
660 return device_alias_get(name + 1);
661
662 if (dev) {
663 if (create > 1 && !dev->external) {
664 system_if_apply_settings(dev, &dev->settings, dev->settings.flags);
665 dev->external = true;
666 device_set_present(dev, true);
667 }
668 return dev;
669 }
670
671 if (!create)
672 return NULL;
673
674 return device_create_default(name, create > 1);
675 }
676
677 static void
678 device_delete(struct device *dev)
679 {
680 if (!dev->avl.key)
681 return;
682
683 D(DEVICE, "Delete device '%s' from list\n", dev->ifname);
684 avl_delete(&devices, &dev->avl);
685 dev->avl.key = NULL;
686 }
687
688 static int device_cleanup_cb(void *ctx, struct safe_list *list)
689 {
690 struct device_user *dep = container_of(list, struct device_user, list);
691 if (dep->cb)
692 dep->cb(dep, DEV_EVENT_REMOVE);
693
694 device_release(dep);
695 return 0;
696 }
697
698 void device_cleanup(struct device *dev)
699 {
700 D(DEVICE, "Clean up device '%s'\n", dev->ifname);
701 safe_list_for_each(&dev->users, device_cleanup_cb, NULL);
702 safe_list_for_each(&dev->aliases, device_cleanup_cb, NULL);
703 device_delete(dev);
704 }
705
706 static void __device_set_present(struct device *dev, bool state)
707 {
708 if (dev->present == state)
709 return;
710
711 dev->present = state;
712 device_broadcast_event(dev, state ? DEV_EVENT_ADD : DEV_EVENT_REMOVE);
713 }
714
715 void
716 device_refresh_present(struct device *dev)
717 {
718 bool state = dev->sys_present;
719
720 if (dev->disabled || dev->deferred)
721 state = false;
722
723 __device_set_present(dev, state);
724 }
725
726 void
727 device_set_auth_status(struct device *dev, bool value)
728 {
729 if (dev->auth_status == value)
730 return;
731
732 dev->auth_status = value;
733 if (!dev->present)
734 return;
735
736 if (dev->auth_status) {
737 device_broadcast_event(dev, DEV_EVENT_AUTH_UP);
738 return;
739 }
740
741 device_broadcast_event(dev, DEV_EVENT_LINK_DOWN);
742 if (!dev->link_active)
743 return;
744
745 device_broadcast_event(dev, DEV_EVENT_LINK_UP);
746 }
747
748 void device_set_present(struct device *dev, bool state)
749 {
750 if (dev->sys_present == state)
751 return;
752
753 D(DEVICE, "%s '%s' %s present\n", dev->type->name, dev->ifname, state ? "is now" : "is no longer" );
754 dev->sys_present = state;
755 device_refresh_present(dev);
756 }
757
758 void device_set_link(struct device *dev, bool state)
759 {
760 if (dev->link_active == state)
761 return;
762
763 netifd_log_message(L_NOTICE, "%s '%s' link is %s\n", dev->type->name, dev->ifname, state ? "up" : "down" );
764
765 dev->link_active = state;
766 if (!state)
767 dev->auth_status = false;
768 device_broadcast_event(dev, state ? DEV_EVENT_LINK_UP : DEV_EVENT_LINK_DOWN);
769 }
770
771 void device_set_ifindex(struct device *dev, int ifindex)
772 {
773 if (dev->ifindex == ifindex)
774 return;
775
776 dev->ifindex = ifindex;
777 device_broadcast_event(dev, DEV_EVENT_UPDATE_IFINDEX);
778 }
779
780 int device_set_ifname(struct device *dev, const char *name)
781 {
782 int ret = 0;
783
784 if (!strcmp(dev->ifname, name))
785 return 0;
786
787 if (strlen(name) > sizeof(dev->ifname) - 1)
788 return -1;
789
790 if (dev->avl.key)
791 avl_delete(&devices, &dev->avl);
792
793 strcpy(dev->ifname, name);
794
795 if (dev->avl.key)
796 ret = avl_insert(&devices, &dev->avl);
797
798 if (ret == 0)
799 device_broadcast_event(dev, DEV_EVENT_UPDATE_IFNAME);
800
801 return ret;
802 }
803
804 static int device_refcount(struct device *dev)
805 {
806 struct list_head *list;
807 int count = 0;
808
809 list_for_each(list, &dev->users.list)
810 count++;
811
812 list_for_each(list, &dev->aliases.list)
813 count++;
814
815 return count;
816 }
817
818 static void
819 __device_add_user(struct device_user *dep, struct device *dev)
820 {
821 struct safe_list *head;
822
823 dep->dev = dev;
824
825 if (dep->alias)
826 head = &dev->aliases;
827 else
828 head = &dev->users;
829
830 safe_list_add(&dep->list, head);
831 D(DEVICE, "Add user for device '%s', refcount=%d\n", dev->ifname, device_refcount(dev));
832
833 if (dep->cb && dev->present) {
834 dep->cb(dep, DEV_EVENT_ADD);
835 if (dev->active)
836 dep->cb(dep, DEV_EVENT_UP);
837
838 if (dev->link_active)
839 dep->cb(dep, DEV_EVENT_LINK_UP);
840 }
841 }
842
843 void device_add_user(struct device_user *dep, struct device *dev)
844 {
845 if (dep->dev == dev)
846 return;
847
848 if (dep->dev)
849 device_remove_user(dep);
850
851 if (!dev)
852 return;
853
854 __device_add_user(dep, dev);
855 }
856
857 static void
858 device_free(struct device *dev)
859 {
860 __devlock++;
861 free(dev->config);
862 device_cleanup(dev);
863 dev->type->free(dev);
864 __devlock--;
865 }
866
867 static void
868 __device_free_unused(struct device *dev)
869 {
870 if (!safe_list_empty(&dev->users) ||
871 !safe_list_empty(&dev->aliases) ||
872 dev->current_config || __devlock)
873 return;
874
875 device_free(dev);
876 }
877
878 void device_remove_user(struct device_user *dep)
879 {
880 struct device *dev = dep->dev;
881
882 if (!dep->dev)
883 return;
884
885 dep->hotplug = false;
886 if (dep->claimed)
887 device_release(dep);
888
889 safe_list_del(&dep->list);
890 dep->dev = NULL;
891 D(DEVICE, "Remove user for device '%s', refcount=%d\n", dev->ifname, device_refcount(dev));
892 __device_free_unused(dev);
893 }
894
895 void
896 device_free_unused(struct device *dev)
897 {
898 struct device *tmp;
899
900 if (dev)
901 return __device_free_unused(dev);
902
903 avl_for_each_element_safe(&devices, dev, avl, tmp)
904 __device_free_unused(dev);
905 }
906
907 void
908 device_init_pending(void)
909 {
910 struct device *dev, *tmp;
911
912 avl_for_each_element_safe(&devices, dev, avl, tmp) {
913 if (!dev->config_pending)
914 continue;
915
916 dev->type->config_init(dev);
917 dev->config_pending = false;
918 device_check_state(dev);
919 }
920 }
921
922 bool
923 device_check_ip6segmentrouting(void)
924 {
925 struct device *dev;
926 bool ip6segmentrouting = false;
927
928 avl_for_each_element(&devices, dev, avl)
929 ip6segmentrouting |= dev->settings.ip6segmentrouting;
930
931 return ip6segmentrouting;
932 }
933
934 static enum dev_change_type
935 device_set_config(struct device *dev, struct device_type *type,
936 struct blob_attr *attr)
937 {
938 struct blob_attr *tb[__DEV_ATTR_MAX];
939 const struct uci_blob_param_list *cfg = type->config_params;
940
941 if (type != dev->type)
942 return DEV_CONFIG_RECREATE;
943
944 if (dev->type->reload)
945 return dev->type->reload(dev, attr);
946
947 if (uci_blob_check_equal(dev->config, attr, cfg))
948 return DEV_CONFIG_NO_CHANGE;
949
950 if (cfg == &device_attr_list) {
951 memset(tb, 0, sizeof(tb));
952
953 if (attr)
954 blobmsg_parse(dev_attrs, __DEV_ATTR_MAX, tb,
955 blob_data(attr), blob_len(attr));
956
957 device_init_settings(dev, tb);
958 return DEV_CONFIG_RESTART;
959 } else
960 return DEV_CONFIG_RECREATE;
961 }
962
963 enum dev_change_type
964 device_apply_config(struct device *dev, struct device_type *type,
965 struct blob_attr *config)
966 {
967 enum dev_change_type change;
968
969 change = device_set_config(dev, type, config);
970 if (dev->external) {
971 system_if_apply_settings(dev, &dev->settings, dev->settings.flags);
972 change = DEV_CONFIG_APPLIED;
973 }
974
975 switch (change) {
976 case DEV_CONFIG_RESTART:
977 case DEV_CONFIG_APPLIED:
978 D(DEVICE, "Device '%s': config applied\n", dev->ifname);
979 config = blob_memdup(config);
980 free(dev->config);
981 dev->config = config;
982 if (change == DEV_CONFIG_RESTART && dev->present) {
983 int ret = 0;
984
985 device_set_present(dev, false);
986 if (dev->active && !dev->external) {
987 ret = dev->set_state(dev, false);
988 if (!ret)
989 ret = dev->set_state(dev, true);
990 }
991 if (!ret)
992 device_set_present(dev, true);
993 }
994 break;
995 case DEV_CONFIG_NO_CHANGE:
996 D(DEVICE, "Device '%s': no configuration change\n", dev->ifname);
997 break;
998 case DEV_CONFIG_RECREATE:
999 break;
1000 }
1001
1002 return change;
1003 }
1004
1005 static void
1006 device_replace(struct device *dev, struct device *odev)
1007 {
1008 struct device_user *dep, *tmp;
1009
1010 __devlock++;
1011 if (odev->present)
1012 device_set_present(odev, false);
1013
1014 list_for_each_entry_safe(dep, tmp, &odev->users.list, list.list) {
1015 device_release(dep);
1016 safe_list_del(&dep->list);
1017 __device_add_user(dep, dev);
1018 }
1019 __devlock--;
1020
1021 device_free(odev);
1022 }
1023
1024 void
1025 device_reset_config(void)
1026 {
1027 struct device *dev;
1028
1029 avl_for_each_element(&devices, dev, avl)
1030 dev->current_config = false;
1031 }
1032
1033 void
1034 device_reset_old(void)
1035 {
1036 struct device *dev, *tmp, *ndev;
1037
1038 avl_for_each_element_safe(&devices, dev, avl, tmp) {
1039 if (dev->current_config || dev->default_config)
1040 continue;
1041
1042 if (dev->type != &simple_device_type)
1043 continue;
1044
1045 ndev = device_create_default(dev->ifname, dev->external);
1046 if (!ndev)
1047 continue;
1048
1049 device_replace(ndev, dev);
1050 }
1051 }
1052
1053 struct device *
1054 device_create(const char *name, struct device_type *type,
1055 struct blob_attr *config)
1056 {
1057 struct device *odev = NULL, *dev;
1058 enum dev_change_type change;
1059
1060 odev = device_find(name);
1061 if (odev) {
1062 odev->current_config = true;
1063 change = device_apply_config(odev, type, config);
1064 switch (change) {
1065 case DEV_CONFIG_RECREATE:
1066 D(DEVICE, "Device '%s': recreate device\n", odev->ifname);
1067 device_delete(odev);
1068 break;
1069 default:
1070 return odev;
1071 }
1072 } else
1073 D(DEVICE, "Create new device '%s' (%s)\n", name, type->name);
1074
1075 config = blob_memdup(config);
1076 if (!config)
1077 return NULL;
1078
1079 dev = type->create(name, type, config);
1080 if (!dev)
1081 return NULL;
1082
1083 dev->current_config = true;
1084 dev->config = config;
1085 if (odev)
1086 device_replace(dev, odev);
1087
1088 if (!config_init && dev->config_pending) {
1089 type->config_init(dev);
1090 dev->config_pending = false;
1091 }
1092
1093 device_check_state(dev);
1094
1095 return dev;
1096 }
1097
1098 void
1099 device_dump_status(struct blob_buf *b, struct device *dev)
1100 {
1101 struct device_settings st;
1102 void *c, *s;
1103
1104 if (!dev) {
1105 avl_for_each_element(&devices, dev, avl) {
1106 if (!dev->present)
1107 continue;
1108 c = blobmsg_open_table(b, dev->ifname);
1109 device_dump_status(b, dev);
1110 blobmsg_close_table(b, c);
1111 }
1112
1113 return;
1114 }
1115
1116 blobmsg_add_u8(b, "external", dev->external);
1117 blobmsg_add_u8(b, "present", dev->present);
1118 blobmsg_add_string(b, "type", dev->type->name);
1119
1120 if (!dev->present)
1121 return;
1122
1123 blobmsg_add_u8(b, "up", !!dev->active);
1124 blobmsg_add_u8(b, "carrier", !!dev->link_active);
1125 blobmsg_add_u8(b, "auth_status", !!dev->auth_status);
1126
1127 if (dev->type->dump_info)
1128 dev->type->dump_info(dev, b);
1129 else
1130 system_if_dump_info(dev, b);
1131
1132 if (dev->active) {
1133 device_merge_settings(dev, &st);
1134 if (st.flags & DEV_OPT_MTU)
1135 blobmsg_add_u32(b, "mtu", st.mtu);
1136 if (st.flags & DEV_OPT_MTU6)
1137 blobmsg_add_u32(b, "mtu6", st.mtu6);
1138 if (st.flags & DEV_OPT_MACADDR)
1139 blobmsg_add_string(b, "macaddr", format_macaddr(st.macaddr));
1140 if (st.flags & DEV_OPT_TXQUEUELEN)
1141 blobmsg_add_u32(b, "txqueuelen", st.txqueuelen);
1142 if (st.flags & DEV_OPT_IPV6)
1143 blobmsg_add_u8(b, "ipv6", st.ipv6);
1144 if (st.flags & DEV_OPT_IP6SEGMENTROUTING)
1145 blobmsg_add_u8(b, "ip6segmentrouting", st.ip6segmentrouting);
1146 if (st.flags & DEV_OPT_PROMISC)
1147 blobmsg_add_u8(b, "promisc", st.promisc);
1148 if (st.flags & DEV_OPT_RPFILTER)
1149 blobmsg_add_u32(b, "rpfilter", st.rpfilter);
1150 if (st.flags & DEV_OPT_ACCEPTLOCAL)
1151 blobmsg_add_u8(b, "acceptlocal", st.acceptlocal);
1152 if (st.flags & DEV_OPT_IGMPVERSION)
1153 blobmsg_add_u32(b, "igmpversion", st.igmpversion);
1154 if (st.flags & DEV_OPT_MLDVERSION)
1155 blobmsg_add_u32(b, "mldversion", st.mldversion);
1156 if (st.flags & DEV_OPT_NEIGHREACHABLETIME) {
1157 blobmsg_add_u32(b, "neigh4reachabletime", st.neigh4reachabletime);
1158 blobmsg_add_u32(b, "neigh6reachabletime", st.neigh6reachabletime);
1159 }
1160 if (st.flags & DEV_OPT_NEIGHGCSTALETIME) {
1161 blobmsg_add_u32(b, "neigh4gcstaletime", st.neigh4gcstaletime);
1162 blobmsg_add_u32(b, "neigh6gcstaletime", st.neigh6gcstaletime);
1163 }
1164 if (st.flags & DEV_OPT_NEIGHLOCKTIME)
1165 blobmsg_add_u32(b, "neigh4locktime", st.neigh4locktime);
1166 if (st.flags & DEV_OPT_DADTRANSMITS)
1167 blobmsg_add_u32(b, "dadtransmits", st.dadtransmits);
1168 if (st.flags & DEV_OPT_MULTICAST_TO_UNICAST)
1169 blobmsg_add_u8(b, "multicast_to_unicast", st.multicast_to_unicast);
1170 if (st.flags & DEV_OPT_MULTICAST_ROUTER)
1171 blobmsg_add_u32(b, "multicast_router", st.multicast_router);
1172 if (st.flags & DEV_OPT_MULTICAST_FAST_LEAVE)
1173 blobmsg_add_u8(b, "multicast_fast_leave", st.multicast_fast_leave);
1174 if (st.flags & DEV_OPT_MULTICAST)
1175 blobmsg_add_u8(b, "multicast", st.multicast);
1176 if (st.flags & DEV_OPT_LEARNING)
1177 blobmsg_add_u8(b, "learning", st.learning);
1178 if (st.flags & DEV_OPT_UNICAST_FLOOD)
1179 blobmsg_add_u8(b, "unicast_flood", st.unicast_flood);
1180 if (st.flags & DEV_OPT_SENDREDIRECTS)
1181 blobmsg_add_u8(b, "sendredirects", st.sendredirects);
1182 if (st.flags & DEV_OPT_DROP_V4_UNICAST_IN_L2_MULTICAST)
1183 blobmsg_add_u8(b, "drop_v4_unicast_in_l2_multicast", st.drop_v4_unicast_in_l2_multicast);
1184 if (st.flags & DEV_OPT_DROP_V6_UNICAST_IN_L2_MULTICAST)
1185 blobmsg_add_u8(b, "drop_v6_unicast_in_l2_multicast", st.drop_v6_unicast_in_l2_multicast);
1186 if (st.flags & DEV_OPT_DROP_GRATUITOUS_ARP)
1187 blobmsg_add_u8(b, "drop_gratuitous_arp", st.drop_gratuitous_arp);
1188 if (st.flags & DEV_OPT_DROP_UNSOLICITED_NA)
1189 blobmsg_add_u8(b, "drop_unsolicited_na", st.drop_unsolicited_na);
1190 if (st.flags & DEV_OPT_ARP_ACCEPT)
1191 blobmsg_add_u8(b, "arp_accept", st.arp_accept);
1192 if (st.flags & DEV_OPT_AUTH)
1193 blobmsg_add_u8(b, "auth", st.auth);
1194 }
1195
1196 s = blobmsg_open_table(b, "statistics");
1197 if (dev->type->dump_stats)
1198 dev->type->dump_stats(dev, b);
1199 else
1200 system_if_dump_stats(dev, b);
1201 blobmsg_close_table(b, s);
1202 }
1203
1204 static void __init simple_device_type_init(void)
1205 {
1206 device_type_add(&simple_device_type);
1207 }