1
0
mirror of https://github.com/systemd/systemd synced 2026-03-27 01:04:53 +01:00

Compare commits

..

No commits in common. "5bf20f3a0d551e1181a9698368b781a23ee410ed" and "c29537f39e4f413a6cbfe9669fa121bdd6d8b36f" have entirely different histories.

11 changed files with 55 additions and 198 deletions

View File

@ -427,8 +427,7 @@
has been unsuccessful for some time. (IPv4 link-local address autoconfiguration will usually
happen in parallel with repeated attempts to acquire a DHCPv4 lease).</para>
<para>Defaults to <option>no</option> when <varname>KeepMaster=</varname> or
<varname>Bridge=</varname> is set or when the specified
<para>Defaults to <option>no</option> when <varname>Bridge=</varname> is set or when the specified
<varname>MACVLAN=</varname>/<varname>MACVTAP=</varname> has <varname>Mode=passthru</varname>, or
<option>ipv6</option> otherwise.</para>
</listitem>
@ -924,20 +923,6 @@ IPv6Token=prefixstable:2002:da8:1::</programlisting></para>
An integer greater than or equal to 1280 bytes. When unset, the kernel's default will be used.
</para></listitem>
</varlistentry>
<varlistentry>
<term><varname>KeepMaster=</varname></term>
<term><varname>Bond=</varname></term>
<term><varname>Bridge=</varname></term>
<term><varname>VRF=</varname></term>
<listitem>
<para>Takes a boolean value. When enabled, the current master interface index will not be
changed, and <varname>BatmanAdvanced=</varname>, <varname>Bond=</varname>,
<varname>Bridge=</varname>, and <varname>VRF=</varname> settings are ignored. This may be
useful when a netdev with a master interface is created by another program, e.g.
<citerefentry><refentrytitle>systemd-nspawn</refentrytitle><manvolnum>1</manvolnum></citerefentry>.
Defaults to false.</para>
</listitem>
</varlistentry>
<varlistentry>
<term><varname>BatmanAdvanced=</varname></term>
<term><varname>Bond=</varname></term>

View File

@ -1,22 +0,0 @@
# SPDX-License-Identifier: LGPL-2.1-or-later
#
# This file is part of systemd.
#
# systemd is free software; you can redistribute it and/or modify it
# under the terms of the GNU Lesser General Public License as published by
# the Free Software Foundation; either version 2.1 of the License, or
# (at your option) any later version.
# This network file matches the host-side of the virtual Ethernet link
# created by systemd-nspawn's --network-veth switch with --network-bridge or
# --network-zone switch. See systemd-nspawn(1) for details.
[Match]
Name=vb-*
Driver=veth
[Network]
KeepMaster=yes
LinkLocalAddressing=no
LLDP=yes
EmitLLDP=nearest-bridge

View File

@ -92,7 +92,7 @@ static int bridge_mdb_configure_handler(sd_netlink *rtnl, sd_netlink_message *m,
return 1;
r = sd_netlink_message_get_errno(m);
if (r == -EINVAL && streq_ptr(link->kind, "bridge") && link->master_ifindex <= 0) {
if (r == -EINVAL && streq_ptr(link->kind, "bridge") && (!link->network || !link->network->bridge)) {
/* To configure bridge MDB entries on bridge master, 1bc844ee0faa1b92e3ede00bdd948021c78d7088 (v5.4) is required. */
if (!link->manager->bridge_mdb_on_master_not_supported) {
log_link_warning_errno(link, r, "Kernel seems not to support bridge MDB entries on bridge master, ignoring: %m");
@ -112,11 +112,23 @@ static int bridge_mdb_configure_handler(sd_netlink *rtnl, sd_netlink_message *m,
return 1;
}
static int link_get_bridge_master_ifindex(Link *link) {
assert(link);
if (link->network && link->network->bridge)
return link->network->bridge->ifindex;
if (streq_ptr(link->kind, "bridge"))
return link->ifindex;
return 0;
}
/* send a request to the kernel to add an MDB entry */
static int bridge_mdb_configure(BridgeMDB *mdb, Link *link, link_netlink_message_handler_t callback) {
_cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
struct br_mdb_entry entry;
int r;
int master, r;
assert(mdb);
assert(link);
@ -132,10 +144,14 @@ static int bridge_mdb_configure(BridgeMDB *mdb, Link *link, link_netlink_message
strna(a), mdb->vlan_id);
}
master = link_get_bridge_master_ifindex(link);
if (master <= 0)
return log_link_error_errno(link, SYNTHETIC_ERRNO(EINVAL), "Invalid bridge master ifindex %i", master);
entry = (struct br_mdb_entry) {
/* If MDB entry is added on bridge master, then the state must be MDB_TEMPORARY.
* See br_mdb_add_group() in net/bridge/br_mdb.c of kernel. */
.state = link->master_ifindex <= 0 ? MDB_TEMPORARY : MDB_PERMANENT,
.state = master == link->ifindex ? MDB_TEMPORARY : MDB_PERMANENT,
.ifindex = link->ifindex,
.vid = mdb->vlan_id,
};
@ -156,8 +172,7 @@ static int bridge_mdb_configure(BridgeMDB *mdb, Link *link, link_netlink_message
}
/* create new RTM message */
r = sd_rtnl_message_new_mdb(link->manager->rtnl, &req, RTM_NEWMDB,
link->master_ifindex > 0 ? link->master_ifindex : link->ifindex);
r = sd_rtnl_message_new_mdb(link->manager->rtnl, &req, RTM_NEWMDB, master);
if (r < 0)
return log_link_error_errno(link, r, "Could not create RTM_NEWMDB message: %m");
@ -190,6 +205,16 @@ int link_request_static_bridge_mdb(Link *link) {
if (hashmap_isempty(link->network->bridge_mdb_entries_by_section))
goto finish;
if (!link->network->bridge) {
if (!streq_ptr(link->kind, "bridge")) {
log_link_warning(link, "Link is neither a bridge master nor a bridge port, ignoring [BridgeMDB] sections.");
goto finish;
} else if (link->manager->bridge_mdb_on_master_not_supported) {
log_link_debug(link, "Kernel seems not to support bridge MDB entries on bridge master, ignoring [BridgeMDB] sections.");
goto finish;
}
}
HASHMAP_FOREACH(mdb, link->network->bridge_mdb_entries_by_section) {
r = link_queue_request(link, REQUEST_TYPE_BRIDGE_MDB, mdb, false,
&link->static_bridge_mdb_messages, bridge_mdb_configure_handler, NULL);
@ -215,13 +240,16 @@ static bool bridge_mdb_is_ready_to_configure(Link *link) {
if (!link_is_ready_to_configure(link, false))
return false;
if (!link->master_set)
return false;
if (link->master_ifindex <= 0 && streq_ptr(link->kind, "bridge"))
if (!link->network->bridge)
return true; /* The interface is bridge master. */
if (link_get_master(link, &master) < 0)
if (link->master_ifindex <= 0)
return false;
if (link->master_ifindex != link->network->bridge->ifindex)
return false;
if (link_get_by_index(link->manager, link->master_ifindex, &master) < 0)
return false;
if (!streq_ptr(master->kind, "bridge"))

View File

@ -1689,11 +1689,17 @@ bool link_has_carrier(Link *link) {
static bool link_is_enslaved(Link *link) {
if (link->flags & IFF_SLAVE)
/* Even if the link is not managed by networkd, honor IFF_SLAVE flag. */
return true;
if (link->master_ifindex > 0)
if (!link->network)
return false;
if (link->master_ifindex > 0 && link->network->bridge)
return true;
/* TODO: add conditions for other netdevs. */
return false;
}
@ -2009,9 +2015,6 @@ static int link_update_master(Link *link, sd_netlink_message *message) {
if (r < 0)
return log_link_debug_errno(link, r, "rtnl: failed to read master ifindex: %m");
if (master_ifindex == link->ifindex)
master_ifindex = 0;
if (master_ifindex == link->master_ifindex)
return 0;

View File

@ -79,7 +79,6 @@ SR-IOV.Trust, config_parse_sr_iov_boolean,
SR-IOV.LinkState, config_parse_sr_iov_link_state, 0, 0
SR-IOV.MACAddress, config_parse_sr_iov_mac, 0, 0
Network.Description, config_parse_string, 0, offsetof(Network, description)
Network.KeepMaster, config_parse_bool, 0, offsetof(Network, keep_master)
Network.BatmanAdvanced, config_parse_ifname, 0, offsetof(Network, batadv_name)
Network.Bond, config_parse_ifname, 0, offsetof(Network, bond_name)
Network.Bridge, config_parse_ifname, 0, offsetof(Network, bridge_name)

View File

@ -135,26 +135,6 @@ int network_verify(Network *network) {
"%s: Conditions in the file do not match the system environment, skipping.",
network->filename);
if (network->keep_master) {
if (network->batadv_name)
log_warning("%s: BatmanAdvanced= set with KeepMaster= enabled, ignoring BatmanAdvanced=.",
network->filename);
if (network->bond_name)
log_warning("%s: Bond= set with KeepMaster= enabled, ignoring Bond=.",
network->filename);
if (network->bridge_name)
log_warning("%s: Bridge= set with KeepMaster= enabled, ignoring Bridge=.",
network->filename);
if (network->vrf_name)
log_warning("%s: VRF= set with KeepMaster= enabled, ignoring VRF=.",
network->filename);
network->batadv_name = mfree(network->batadv_name);
network->bond_name = mfree(network->bond_name);
network->bridge_name = mfree(network->bridge_name);
network->vrf_name = mfree(network->vrf_name);
}
(void) network_resolve_netdev_one(network, network->batadv_name, NETDEV_KIND_BATADV, &network->batadv);
(void) network_resolve_netdev_one(network, network->bond_name, NETDEV_KIND_BOND, &network->bond);
(void) network_resolve_netdev_one(network, network->bridge_name, NETDEV_KIND_BRIDGE, &network->bridge);
@ -194,7 +174,7 @@ int network_verify(Network *network) {
if (network->link_local < 0) {
network->link_local = ADDRESS_FAMILY_IPV6;
if (network->keep_master || network->bridge)
if (network->bridge)
network->link_local = ADDRESS_FAMILY_NO;
else {
NetDev *netdev;

View File

@ -84,7 +84,6 @@ struct Network {
LIST_HEAD(Condition, conditions);
/* Master or stacked netdevs */
bool keep_master;
NetDev *batadv;
NetDev *bridge;
NetDev *bond;

View File

@ -405,7 +405,7 @@ static int link_configure(
if (r < 0)
return log_link_debug_errno(link, r, "Could not open IFLA_AF_SPEC container: %m");
if (link->master_ifindex <= 0) {
if (!link->network->bridge) {
/* master needs BRIDGE_FLAGS_SELF flag */
r = sd_netlink_message_append_u16(req, IFLA_BRIDGE_FLAGS, BRIDGE_FLAGS_SELF);
if (r < 0)
@ -515,16 +515,9 @@ static bool link_is_ready_to_call_set_link(Request *req) {
switch (op) {
case SET_LINK_BOND:
case SET_LINK_BRIDGE:
if (!link->master_set)
return false;
if (link->network->keep_master && link->master_ifindex <= 0)
return false;
break;
case SET_LINK_BRIDGE_VLAN:
if (!link->master_set)
return false;
if (link->network->keep_master && link->master_ifindex <= 0 && !streq_ptr(link->kind, "bridge"))
return false;
break;
case SET_LINK_CAN:
/* Do not check link->set_flgas_messages here, as it is ok even if link->flags
@ -679,19 +672,9 @@ int link_request_to_set_bond(Link *link) {
assert(link);
assert(link->network);
if (!link->network->bond) {
Link *master;
if (!link->network->keep_master)
if (!link->network->bond)
return 0;
if (link_get_master(link, &master) < 0)
return 0;
if (!streq_ptr(master->kind, "bond"))
return 0;
}
return link_request_set_link(link, SET_LINK_BOND, link_set_bond_handler, NULL);
}
@ -699,19 +682,9 @@ int link_request_to_set_bridge(Link *link) {
assert(link);
assert(link->network);
if (!link->network->bridge) {
Link *master;
if (!link->network->keep_master)
if (!link->network->bridge)
return 0;
if (link_get_master(link, &master) < 0)
return 0;
if (!streq_ptr(master->kind, "bridge"))
return 0;
}
return link_request_set_link(link, SET_LINK_BRIDGE, link_set_bridge_handler, NULL);
}
@ -722,19 +695,9 @@ int link_request_to_set_bridge_vlan(Link *link) {
if (!link->network->use_br_vlan)
return 0;
if (!link->network->bridge && !streq_ptr(link->kind, "bridge")) {
Link *master;
if (!link->network->keep_master)
if (!link->network->bridge && !streq_ptr(link->kind, "bridge"))
return 0;
if (link_get_master(link, &master) < 0)
return 0;
if (!streq_ptr(master->kind, "bridge"))
return 0;
}
return link_request_set_link(link, SET_LINK_BRIDGE_VLAN, link_set_bridge_vlan_handler, NULL);
}
@ -800,11 +763,6 @@ int link_request_to_set_master(Link *link) {
assert(link);
assert(link->network);
if (link->network->keep_master) {
link->master_set = true;
return 0;
}
link->master_set = false;
if (link->network->batadv || link->network->bond || link->network->bridge || link->network->vrf)

View File

@ -178,7 +178,6 @@ MultiPathRoute=
TCPAdvertisedMaximumSegmentSize=
NextHop=
[Network]
KeepMaster=
IPv6DuplicateAddressDetection=
IPMasquerade=
ProxyARP=

View File

@ -1,21 +0,0 @@
[Match]
Name=dummy98
[Network]
LinkLocalAddressing=no
IPv6AcceptRA=no
KeepMaster=true
ActiveSlave=true
[Bridge]
Cost=400
HairPin = true
FastLeave = true
UnicastFlood = true
MulticastFlood = false
MulticastToUnicast = true
NeighborSuppression = true
Learning = false
Priority = 23
UseBPDU = true
AllowPortToBeRoot=true

View File

@ -3388,7 +3388,6 @@ class NetworkdBondTests(unittest.TestCase, Utilities):
'12-dummy.netdev',
'23-active-slave.network',
'23-bond199.network',
'23-keep-master.network',
'23-primary-slave.network',
'25-bond-active-backup-slave.netdev',
'25-bond.netdev',
@ -3404,23 +3403,6 @@ class NetworkdBondTests(unittest.TestCase, Utilities):
remove_unit_from_networkd_path(self.units)
stop_networkd(show_logs=True)
def test_bond_keep_master(self):
check_output('ip link add bond199 type bond mode active-backup')
check_output('ip link add dummy98 type dummy')
check_output('ip link set dummy98 master bond199')
copy_unit_to_networkd_unit_path('23-keep-master.network')
start_networkd()
self.wait_online(['dummy98:enslaved'])
output = check_output('ip -d link show bond199')
print(output)
self.assertRegex(output, 'active_slave dummy98')
output = check_output('ip -d link show dummy98')
print(output)
self.assertRegex(output, 'master bond199')
def test_bond_active_slave(self):
copy_unit_to_networkd_unit_path('23-active-slave.network', '23-bond199.network', '25-bond-active-backup-slave.netdev', '12-dummy.netdev')
start_networkd()
@ -3497,7 +3479,6 @@ class NetworkdBridgeTests(unittest.TestCase, Utilities):
'12-dummy.netdev',
'21-vlan.netdev',
'21-vlan.network',
'23-keep-master.network',
'26-bridge.netdev',
'26-bridge-configure-without-carrier.network',
'26-bridge-issue-20373.netdev',
@ -3581,38 +3562,6 @@ class NetworkdBridgeTests(unittest.TestCase, Utilities):
self.assertRegex(output, 'dev bridge99 port bridge99 grp ff02:aaaa:fee5::1:4 temp *vid 4066')
self.assertRegex(output, 'dev bridge99 port bridge99 grp 224.0.1.2 temp *vid 4067')
def test_bridge_keep_master(self):
check_output('ip link add bridge99 type bridge')
check_output('ip link set bridge99 up')
check_output('ip link add dummy98 type dummy')
check_output('ip link set dummy98 master bridge99')
copy_unit_to_networkd_unit_path('23-keep-master.network')
start_networkd()
self.wait_online(['dummy98:enslaved'])
output = check_output('ip -d link show dummy98')
print(output)
self.assertRegex(output, 'master bridge99')
self.assertRegex(output, 'bridge')
output = check_output('bridge -d link show dummy98')
print(output)
self.assertEqual(read_bridge_port_attr('bridge99', 'dummy98', 'path_cost'), '400')
self.assertEqual(read_bridge_port_attr('bridge99', 'dummy98', 'hairpin_mode'), '1')
self.assertEqual(read_bridge_port_attr('bridge99', 'dummy98', 'multicast_fast_leave'), '1')
self.assertEqual(read_bridge_port_attr('bridge99', 'dummy98', 'unicast_flood'), '1')
self.assertEqual(read_bridge_port_attr('bridge99', 'dummy98', 'multicast_flood'), '0')
# CONFIG_BRIDGE_IGMP_SNOOPING=y
if (os.path.exists('/sys/devices/virtual/net/bridge00/lower_dummy98/brport/multicast_to_unicast')):
self.assertEqual(read_bridge_port_attr('bridge99', 'dummy98', 'multicast_to_unicast'), '1')
if (os.path.exists('/sys/devices/virtual/net/bridge99/lower_dummy98/brport/neigh_suppress')):
self.assertEqual(read_bridge_port_attr('bridge99', 'dummy98', 'neigh_suppress'), '1')
self.assertEqual(read_bridge_port_attr('bridge99', 'dummy98', 'learning'), '0')
self.assertEqual(read_bridge_port_attr('bridge99', 'dummy98', 'priority'), '23')
self.assertEqual(read_bridge_port_attr('bridge99', 'dummy98', 'bpdu_guard'), '1')
self.assertEqual(read_bridge_port_attr('bridge99', 'dummy98', 'root_block'), '1')
def test_bridge_property(self):
copy_unit_to_networkd_unit_path('11-dummy.netdev', '12-dummy.netdev', '26-bridge.netdev',
'26-bridge-slave-interface-1.network', '26-bridge-slave-interface-2.network',