Annika Wickert
c0267a592a
network: Implement B.A.T.M.A.N. Advanced interface type
2021-02-25 01:57:29 +09:00
Susant Sahani
dca0a4e131
network: macvlan - add support to configure rx queue for broadcast/multicast
2021-01-17 08:39:28 +01:00
Susant Sahani
ea07086285
network: Allow to configure VLan egress qos maps
2021-01-12 14:31:03 +01:00
Susant Sahani
0d9b8913e2
network: Allow to configure VLan egress qos maps
2021-01-12 14:30:56 +01:00
walbit-de
2d453f3597
network: add Protocol= to vlan netdev ( #17794 )
2020-12-02 14:58:02 +01:00
Yu Watanabe
dc0e90d2e0
Merge pull request #16929 from ssahani/network-bare-udp
...
network: introduce Bare UDP Tunnelling
2020-09-17 20:34:15 +09:00
Susant Sahani
a9b8450bd4
network: Allow vxlan to be created without .network file
2020-09-17 15:49:36 +09:00
Susant Sahani
e6980c7270
network: Introduce bare UDP
2020-09-17 15:05:58 +09:00
Alvin Šipraga
0d0de133f0
network: add support for MACVLAN source mode
...
Add support for creating a MACVLAN interface in "source" mode by
specifying Mode=source in the [MACVLAN] section of a .netdev file.
A list of allowed MAC addresses for the corresponding MACVLAN can also
be specified with the SourceMACAddress= option of the [MACVLAN] section.
An example .netdev file:
[NetDev]
Name=macvlan0
Kind=macvlan
MACAddress=02:DE:AD:BE:EF:00
[MACVLAN]
Mode=source
SourceMACAddress=02:AB:AB:AB:AB:01 02:CD:CD:CD:CD:01
SourceMACAddress=02:EF:EF:EF:EF:01
The same keys can also be specified in [MACVTAP] for MACVTAP kinds of
interfaces, with the same semantics.
2020-07-08 18:01:52 +02:00
Zbigniew Jędrzejewski-Szmek
804a436582
fuzz-netdev-parser: add test case for earlier version of preceding patches
...
AddressSanitizer:DEADLYSIGNAL
=================================================================
==12==ERROR: AddressSanitizer: ABRT on unknown address 0x00000000000c (pc 0x7f0a518b3428 bp 0x7fffa463bfd0 sp 0x7fffa463be68 T0)
SCARINESS: 10 (signal)
#0 0x7f0a518b3428 in raise (/lib/x86_64-linux-gnu/libc.so.6+0x35428)
#1 0x7f0a518b5029 in abort (/lib/x86_64-linux-gnu/libc.so.6+0x37029)
#2 0x7f0a52ca635a in log_assert_failed_realm /work/build/../../src/systemd/src/basic/log.c:819:9
#3 0x4eea92 in config_parse_wireguard_endpoint /work/build/../../src/systemd/src/network/netdev/wireguard.c:808:9
#4 0x7f0a52b2f74e in next_assignment /work/build/../../src/systemd/src/shared/conf-parser.c:133:32
#5 0x7f0a52b2954e in parse_line /work/build/../../src/systemd/src/shared/conf-parser.c:242:16
#6 0x7f0a52b28911 in config_parse /work/build/../../src/systemd/src/shared/conf-parser.c:377:21
#7 0x7f0a52b29ec6 in config_parse_many_files /work/build/../../src/systemd/src/shared/conf-parser.c:439:21
#8 0x7f0a52b2a5a6 in config_parse_many /work/build/../../src/systemd/src/shared/conf-parser.c:507:16
#9 0x4d8d6c in netdev_load_one /work/build/../../src/systemd/src/network/netdev/netdev.c:732:13
#10 0x4d3e2b in LLVMFuzzerTestOneInput /work/build/../../src/systemd/src/network/fuzz-netdev-parser.c:23:16
#11 0x6b3266 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:558:15
#12 0x6af860 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool*) /src/libfuzzer/FuzzerLoop.cpp:470:3
#13 0x6b6970 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__1::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/libfuzzer/FuzzerLoop.cpp:770:7
#14 0x6b7376 in fuzzer::Fuzzer::Loop(std::__1::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/libfuzzer/FuzzerLoop.cpp:799:3
#15 0x67573f in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:846:6
#16 0x667097 in main /src/libfuzzer/FuzzerMain.cpp:19:10
#17 0x7f0a5189e82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
#18 0x4295a8 in _start (out/fuzz-netdev-parser+0x4295a8)
DEDUP_TOKEN: raise--abort--log_assert_failed_realm
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: ABRT (/lib/x86_64-linux-gnu/libc.so.6+0x35428) in raise
==12==ABORTING
2020-06-22 16:32:37 +02:00
Yu Watanabe
0e77fc66bc
network: fix double free in macsec_receive_channel_free()
...
Fixes #15941 .
Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22547
2020-06-01 09:39:46 +02:00
Evgeny Vereshchagin
fdd156dd99
tests: add a testcase triggering https://github.com/systemd/systemd/issues/15968
...
It's just a follow-up to https://github.com/systemd/systemd/pull/15976
2020-05-31 21:39:37 +02:00
Rubens Figueiredo
4df4df5b56
network: allow setting VLAN protocol on bridges
...
Signed-off-by: Rubens Figueiredo <rubens.figueiredo@bisdn.de >
2020-05-14 17:59:57 +02:00
Yu Watanabe
e8489008cb
network: rename IGMPVersion= -> MulticastIGMPVersion=
2019-07-26 11:00:56 +09:00
Susant Sahani
afa51e2dfb
networkd: bridge add support to set IGMP version
2019-07-25 10:05:06 +09:00
Yu Watanabe
8c9c703c55
network: add AssignToLoopback= setting to [Tunnel] section
...
networkd does not manage loopback interface lo. So, previously, we have
no way to assign tunnel devices to lo.
2019-07-11 09:59:06 +09:00
1848
98d20a17a9
Added support for xfrm interfaces
2019-07-10 23:02:19 +09:00
Yu Watanabe
75eed300a9
network: Allow IFF_VNET_HDR to also be set for tun devices
...
f5f07dbf06 adds VnetHeader= for tap
devices, but the flag is also used for tun devices.
This adds VnetHeader= setting in [Tun] section.
2019-05-22 17:58:46 +09:00
Susant Sahani
8f02c9b085
networkd: FOU netdev add support to configure peer port
2019-05-18 10:25:36 +09:00
Yu Watanabe
db439337f9
Merge pull request #12576 from ssahani/fou
...
networkd: FOU tunnel support Local and Peer tunnel addresses
2019-05-16 05:10:35 +02:00
Susant Sahani
4502a61c8a
networkd: FOU tunnel support Local and Peer tunnel addresses
2019-05-16 10:24:48 +09:00
Susant Sahani
69c317a07f
networkd: introduce netdev ipvtap
...
This patch adds netdev ipvtap that is based on the
IP-VLAN network interface, called ipvtap. An ipvtap device can be created
in the same way as an ipvlan device, using 'kind ipvtap', and then accessed
using the tap user space interface.
2019-05-16 09:48:53 +09:00
Susant Sahani
aac350192b
networkd: Geneve add support configure IP don't fragment
2019-05-10 22:45:26 +09:00
Susant Sahani
1189c00a3c
networkd: VXLAN add support to configure IP Don't fragment.
...
Allow users to set the IPv4 DF bit in outgoing packets, or to inherit its
value from the IPv4 inner header. If the encapsulated protocol is IPv6 and
DF is configured to be inherited, always set it.
2019-05-09 06:40:33 +02:00
Zbigniew Jędrzejewski-Szmek
29e19a6f19
fuzz: fix spelling of MACsec and MACAddress in the corpus
2019-05-08 06:53:07 +05:30