]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/network/networkd-manager.c
42c6371be5b18cbc98607f4242ad31f2a92424ef
[thirdparty/systemd.git] / src / network / networkd-manager.c
1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
2
3 #include <netinet/in.h>
4 #include <sys/socket.h>
5 #include <unistd.h>
6 #include <linux/if.h>
7 #include <linux/fib_rules.h>
8 #include <linux/nexthop.h>
9 #include <linux/nl80211.h>
10
11 #include "sd-netlink.h"
12
13 #include "alloc-util.h"
14 #include "bus-error.h"
15 #include "bus-locator.h"
16 #include "bus-log-control-api.h"
17 #include "bus-polkit.h"
18 #include "bus-util.h"
19 #include "common-signal.h"
20 #include "conf-parser.h"
21 #include "constants.h"
22 #include "daemon-util.h"
23 #include "device-private.h"
24 #include "device-util.h"
25 #include "dns-domain.h"
26 #include "fd-util.h"
27 #include "fileio.h"
28 #include "firewall-util.h"
29 #include "fs-util.h"
30 #include "initrd-util.h"
31 #include "local-addresses.h"
32 #include "netlink-util.h"
33 #include "network-internal.h"
34 #include "networkd-address-pool.h"
35 #include "networkd-address.h"
36 #include "networkd-dhcp-server-bus.h"
37 #include "networkd-dhcp6.h"
38 #include "networkd-link-bus.h"
39 #include "networkd-manager.h"
40 #include "networkd-manager-bus.h"
41 #include "networkd-manager-varlink.h"
42 #include "networkd-neighbor.h"
43 #include "networkd-network-bus.h"
44 #include "networkd-nexthop.h"
45 #include "networkd-queue.h"
46 #include "networkd-route.h"
47 #include "networkd-routing-policy-rule.h"
48 #include "networkd-speed-meter.h"
49 #include "networkd-state-file.h"
50 #include "networkd-wifi.h"
51 #include "networkd-wiphy.h"
52 #include "ordered-set.h"
53 #include "path-lookup.h"
54 #include "path-util.h"
55 #include "qdisc.h"
56 #include "selinux-util.h"
57 #include "set.h"
58 #include "signal-util.h"
59 #include "stat-util.h"
60 #include "strv.h"
61 #include "sysctl-util.h"
62 #include "tclass.h"
63 #include "tmpfile-util.h"
64 #include "tuntap.h"
65 #include "udev-util.h"
66
67 /* use 128 MB for receive socket kernel queue. */
68 #define RCVBUF_SIZE (128*1024*1024)
69
70 static int match_prepare_for_sleep(sd_bus_message *message, void *userdata, sd_bus_error *ret_error) {
71 Manager *m = ASSERT_PTR(userdata);
72 Link *link;
73 int b, r;
74
75 assert(message);
76
77 r = sd_bus_message_read(message, "b", &b);
78 if (r < 0) {
79 bus_log_parse_error(r);
80 return 0;
81 }
82
83 if (b)
84 return 0;
85
86 log_debug("Coming back from suspend, reconfiguring all connections...");
87
88 HASHMAP_FOREACH(link, m->links_by_index) {
89 r = link_reconfigure(link, /* force = */ true);
90 if (r < 0) {
91 log_link_warning_errno(link, r, "Failed to reconfigure interface: %m");
92 link_enter_failed(link);
93 }
94 }
95
96 return 0;
97 }
98
99 static int on_connected(sd_bus_message *message, void *userdata, sd_bus_error *ret_error) {
100 Manager *m = ASSERT_PTR(userdata);
101
102 assert(message);
103
104 /* Did we get a timezone or transient hostname from DHCP while D-Bus wasn't up yet? */
105 if (m->dynamic_hostname)
106 (void) manager_set_hostname(m, m->dynamic_hostname);
107 if (m->dynamic_timezone)
108 (void) manager_set_timezone(m, m->dynamic_timezone);
109 if (m->product_uuid_requested)
110 (void) manager_request_product_uuid(m);
111
112 return 0;
113 }
114
115 static int manager_connect_bus(Manager *m) {
116 int r;
117
118 assert(m);
119 assert(!m->bus);
120
121 r = bus_open_system_watch_bind_with_description(&m->bus, "bus-api-network");
122 if (r < 0)
123 return log_error_errno(r, "Failed to connect to bus: %m");
124
125 r = bus_add_implementation(m->bus, &manager_object, m);
126 if (r < 0)
127 return r;
128
129 r = bus_log_control_api_register(m->bus);
130 if (r < 0)
131 return r;
132
133 r = sd_bus_request_name_async(m->bus, NULL, "org.freedesktop.network1", 0, NULL, NULL);
134 if (r < 0)
135 return log_error_errno(r, "Failed to request name: %m");
136
137 r = sd_bus_attach_event(m->bus, m->event, 0);
138 if (r < 0)
139 return log_error_errno(r, "Failed to attach bus to event loop: %m");
140
141 r = sd_bus_match_signal_async(
142 m->bus,
143 NULL,
144 "org.freedesktop.DBus.Local",
145 NULL,
146 "org.freedesktop.DBus.Local",
147 "Connected",
148 on_connected, NULL, m);
149 if (r < 0)
150 return log_error_errno(r, "Failed to request match on Connected signal: %m");
151
152 r = bus_match_signal_async(
153 m->bus,
154 NULL,
155 bus_login_mgr,
156 "PrepareForSleep",
157 match_prepare_for_sleep, NULL, m);
158 if (r < 0)
159 log_warning_errno(r, "Failed to request match for PrepareForSleep, ignoring: %m");
160
161 return 0;
162 }
163
164 static int manager_process_uevent(sd_device_monitor *monitor, sd_device *device, void *userdata) {
165 Manager *m = ASSERT_PTR(userdata);
166 sd_device_action_t action;
167 int r;
168
169 assert(device);
170
171 r = sd_device_get_action(device, &action);
172 if (r < 0)
173 return log_device_warning_errno(device, r, "Failed to get udev action, ignoring: %m");
174
175 if (device_in_subsystem(device, "net"))
176 r = manager_udev_process_link(m, device, action);
177 else if (device_in_subsystem(device, "ieee80211"))
178 r = manager_udev_process_wiphy(m, device, action);
179 else if (device_in_subsystem(device, "rfkill"))
180 r = manager_udev_process_rfkill(m, device, action);
181 if (r < 0)
182 log_device_warning_errno(device, r, "Failed to process \"%s\" uevent, ignoring: %m",
183 device_action_to_string(action));
184
185 return 0;
186 }
187
188 static int manager_connect_udev(Manager *m) {
189 int r;
190
191 /* udev does not initialize devices inside containers, so we rely on them being already
192 * initialized before entering the container. */
193 if (!udev_available())
194 return 0;
195
196 r = sd_device_monitor_new(&m->device_monitor);
197 if (r < 0)
198 return log_error_errno(r, "Failed to initialize device monitor: %m");
199
200 r = sd_device_monitor_filter_add_match_subsystem_devtype(m->device_monitor, "net", NULL);
201 if (r < 0)
202 return log_error_errno(r, "Could not add device monitor filter for net subsystem: %m");
203
204 r = sd_device_monitor_filter_add_match_subsystem_devtype(m->device_monitor, "ieee80211", NULL);
205 if (r < 0)
206 return log_error_errno(r, "Could not add device monitor filter for ieee80211 subsystem: %m");
207
208 r = sd_device_monitor_filter_add_match_subsystem_devtype(m->device_monitor, "rfkill", NULL);
209 if (r < 0)
210 return log_error_errno(r, "Could not add device monitor filter for rfkill subsystem: %m");
211
212 r = sd_device_monitor_attach_event(m->device_monitor, m->event);
213 if (r < 0)
214 return log_error_errno(r, "Failed to attach event to device monitor: %m");
215
216 r = sd_device_monitor_start(m->device_monitor, manager_process_uevent, m);
217 if (r < 0)
218 return log_error_errno(r, "Failed to start device monitor: %m");
219
220 return 0;
221 }
222
223 static int manager_listen_fds(Manager *m, int *ret_rtnl_fd) {
224 _cleanup_strv_free_ char **names = NULL;
225 int n, rtnl_fd = -EBADF;
226
227 assert(m);
228 assert(ret_rtnl_fd);
229
230 n = sd_listen_fds_with_names(/* unset_environment = */ true, &names);
231 if (n < 0)
232 return n;
233
234 if (strv_length(names) != (size_t) n)
235 return -EINVAL;
236
237 for (int i = 0; i < n; i++) {
238 int fd = i + SD_LISTEN_FDS_START;
239
240 if (sd_is_socket(fd, AF_NETLINK, SOCK_RAW, -1) > 0) {
241 if (rtnl_fd >= 0) {
242 log_debug("Received multiple netlink socket, ignoring.");
243 safe_close(fd);
244 continue;
245 }
246
247 rtnl_fd = fd;
248 continue;
249 }
250
251 if (manager_add_tuntap_fd(m, fd, names[i]) >= 0)
252 continue;
253
254 if (m->test_mode)
255 safe_close(fd);
256 else
257 close_and_notify_warn(fd, names[i]);
258 }
259
260 *ret_rtnl_fd = rtnl_fd;
261 return 0;
262 }
263
264 static int manager_connect_genl(Manager *m) {
265 int r;
266
267 assert(m);
268
269 r = sd_genl_socket_open(&m->genl);
270 if (r < 0)
271 return r;
272
273 r = sd_netlink_increase_rxbuf(m->genl, RCVBUF_SIZE);
274 if (r < 0)
275 log_warning_errno(r, "Failed to increase receive buffer size for general netlink socket, ignoring: %m");
276
277 r = sd_netlink_attach_event(m->genl, m->event, 0);
278 if (r < 0)
279 return r;
280
281 r = genl_add_match(m->genl, NULL, NL80211_GENL_NAME, NL80211_MULTICAST_GROUP_CONFIG, 0,
282 &manager_genl_process_nl80211_config, NULL, m, "network-genl_process_nl80211_config");
283 if (r < 0 && r != -EOPNOTSUPP)
284 return r;
285
286 r = genl_add_match(m->genl, NULL, NL80211_GENL_NAME, NL80211_MULTICAST_GROUP_MLME, 0,
287 &manager_genl_process_nl80211_mlme, NULL, m, "network-genl_process_nl80211_mlme");
288 if (r < 0 && r != -EOPNOTSUPP)
289 return r;
290
291 return 0;
292 }
293
294 static int manager_setup_rtnl_filter(Manager *manager) {
295 struct sock_filter filter[] = {
296 /* Check the packet length. */
297 BPF_STMT(BPF_LD + BPF_W + BPF_LEN, 0), /* A <- packet length */
298 BPF_JUMP(BPF_JMP + BPF_JGE + BPF_K, sizeof(struct nlmsghdr), 1, 0), /* A (packet length) >= sizeof(struct nlmsghdr) ? */
299 BPF_STMT(BPF_RET + BPF_K, 0), /* reject */
300 /* Always accept multipart message. */
301 BPF_STMT(BPF_LD + BPF_H + BPF_ABS, offsetof(struct nlmsghdr, nlmsg_flags)), /* A <- message flags */
302 BPF_JUMP(BPF_JMP + BPF_JSET + BPF_K, htobe16(NLM_F_MULTI), 0, 1), /* message flags has NLM_F_MULTI ? */
303 BPF_STMT(BPF_RET + BPF_K, UINT32_MAX), /* accept */
304 /* Accept all message types except for RTM_NEWNEIGH or RTM_DELNEIGH. */
305 BPF_STMT(BPF_LD + BPF_H + BPF_ABS, offsetof(struct nlmsghdr, nlmsg_type)), /* A <- message type */
306 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, htobe16(RTM_NEWNEIGH), 2, 0), /* message type == RTM_NEWNEIGH ? */
307 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, htobe16(RTM_DELNEIGH), 1, 0), /* message type == RTM_DELNEIGH ? */
308 BPF_STMT(BPF_RET + BPF_K, UINT32_MAX), /* accept */
309 /* Check the packet length. */
310 BPF_STMT(BPF_LD + BPF_W + BPF_LEN, 0), /* A <- packet length */
311 BPF_JUMP(BPF_JMP + BPF_JGE + BPF_K, sizeof(struct nlmsghdr) + sizeof(struct ndmsg), 1, 0),
312 /* packet length >= sizeof(struct nlmsghdr) + sizeof(struct ndmsg) ? */
313 BPF_STMT(BPF_RET + BPF_K, 0), /* reject */
314 /* Reject the message when the neighbor state does not have NUD_PERMANENT flag. */
315 BPF_STMT(BPF_LD + BPF_H + BPF_ABS, sizeof(struct nlmsghdr) + offsetof(struct ndmsg, ndm_state)),
316 /* A <- neighbor state */
317 BPF_JUMP(BPF_JMP + BPF_JSET + BPF_K, htobe16(NUD_PERMANENT), 1, 0), /* neighbor state has NUD_PERMANENT ? */
318 BPF_STMT(BPF_RET + BPF_K, 0), /* reject */
319 BPF_STMT(BPF_RET + BPF_K, UINT32_MAX), /* accept */
320 };
321
322 assert(manager);
323 assert(manager->rtnl);
324
325 return sd_netlink_attach_filter(manager->rtnl, ELEMENTSOF(filter), filter);
326 }
327
328 static int manager_connect_rtnl(Manager *m, int fd) {
329 _unused_ _cleanup_close_ int fd_close = fd;
330 int r;
331
332 assert(m);
333
334 /* This takes input fd. */
335
336 if (fd < 0)
337 r = sd_netlink_open(&m->rtnl);
338 else
339 r = sd_netlink_open_fd(&m->rtnl, fd);
340 if (r < 0)
341 return r;
342 TAKE_FD(fd_close);
343
344 /* Bump receiver buffer, but only if we are not called via socket activation, as in that
345 * case systemd sets the receive buffer size for us, and the value in the .socket unit
346 * should take full effect. */
347 if (fd < 0) {
348 r = sd_netlink_increase_rxbuf(m->rtnl, RCVBUF_SIZE);
349 if (r < 0)
350 log_warning_errno(r, "Failed to increase receive buffer size for rtnl socket, ignoring: %m");
351 }
352
353 r = sd_netlink_attach_event(m->rtnl, m->event, 0);
354 if (r < 0)
355 return r;
356
357 r = netlink_add_match(m->rtnl, NULL, RTM_NEWLINK, &manager_rtnl_process_link, NULL, m, "network-rtnl_process_link");
358 if (r < 0)
359 return r;
360
361 r = netlink_add_match(m->rtnl, NULL, RTM_DELLINK, &manager_rtnl_process_link, NULL, m, "network-rtnl_process_link");
362 if (r < 0)
363 return r;
364
365 r = netlink_add_match(m->rtnl, NULL, RTM_NEWQDISC, &manager_rtnl_process_qdisc, NULL, m, "network-rtnl_process_qdisc");
366 if (r < 0)
367 return r;
368
369 r = netlink_add_match(m->rtnl, NULL, RTM_DELQDISC, &manager_rtnl_process_qdisc, NULL, m, "network-rtnl_process_qdisc");
370 if (r < 0)
371 return r;
372
373 r = netlink_add_match(m->rtnl, NULL, RTM_NEWTCLASS, &manager_rtnl_process_tclass, NULL, m, "network-rtnl_process_tclass");
374 if (r < 0)
375 return r;
376
377 r = netlink_add_match(m->rtnl, NULL, RTM_DELTCLASS, &manager_rtnl_process_tclass, NULL, m, "network-rtnl_process_tclass");
378 if (r < 0)
379 return r;
380
381 r = netlink_add_match(m->rtnl, NULL, RTM_NEWADDR, &manager_rtnl_process_address, NULL, m, "network-rtnl_process_address");
382 if (r < 0)
383 return r;
384
385 r = netlink_add_match(m->rtnl, NULL, RTM_DELADDR, &manager_rtnl_process_address, NULL, m, "network-rtnl_process_address");
386 if (r < 0)
387 return r;
388
389 r = netlink_add_match(m->rtnl, NULL, RTM_NEWNEIGH, &manager_rtnl_process_neighbor, NULL, m, "network-rtnl_process_neighbor");
390 if (r < 0)
391 return r;
392
393 r = netlink_add_match(m->rtnl, NULL, RTM_DELNEIGH, &manager_rtnl_process_neighbor, NULL, m, "network-rtnl_process_neighbor");
394 if (r < 0)
395 return r;
396
397 r = netlink_add_match(m->rtnl, NULL, RTM_NEWROUTE, &manager_rtnl_process_route, NULL, m, "network-rtnl_process_route");
398 if (r < 0)
399 return r;
400
401 r = netlink_add_match(m->rtnl, NULL, RTM_DELROUTE, &manager_rtnl_process_route, NULL, m, "network-rtnl_process_route");
402 if (r < 0)
403 return r;
404
405 r = netlink_add_match(m->rtnl, NULL, RTM_NEWRULE, &manager_rtnl_process_rule, NULL, m, "network-rtnl_process_rule");
406 if (r < 0)
407 return r;
408
409 r = netlink_add_match(m->rtnl, NULL, RTM_DELRULE, &manager_rtnl_process_rule, NULL, m, "network-rtnl_process_rule");
410 if (r < 0)
411 return r;
412
413 r = netlink_add_match(m->rtnl, NULL, RTM_NEWNEXTHOP, &manager_rtnl_process_nexthop, NULL, m, "network-rtnl_process_nexthop");
414 if (r < 0)
415 return r;
416
417 r = netlink_add_match(m->rtnl, NULL, RTM_DELNEXTHOP, &manager_rtnl_process_nexthop, NULL, m, "network-rtnl_process_nexthop");
418 if (r < 0)
419 return r;
420
421 return manager_setup_rtnl_filter(m);
422 }
423
424 static int manager_post_handler(sd_event_source *s, void *userdata) {
425 Manager *manager = ASSERT_PTR(userdata);
426
427 (void) manager_process_remove_requests(manager);
428 (void) manager_process_requests(manager);
429 (void) manager_clean_all(manager);
430 return 0;
431 }
432
433 static int signal_terminate_callback(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
434 Manager *m = ASSERT_PTR(userdata);
435
436 m->restarting = false;
437
438 log_debug("Terminate operation initiated.");
439
440 return sd_event_exit(sd_event_source_get_event(s), 0);
441 }
442
443 static int signal_restart_callback(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
444 Manager *m = ASSERT_PTR(userdata);
445
446 m->restarting = true;
447
448 log_debug("Restart operation initiated.");
449
450 return sd_event_exit(sd_event_source_get_event(s), 0);
451 }
452
453 static int signal_reload_callback(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
454 Manager *m = ASSERT_PTR(userdata);
455
456 (void) manager_reload(m, /* message = */ NULL);
457
458 return 0;
459 }
460
461 static int manager_set_keep_configuration(Manager *m) {
462 int r;
463
464 assert(m);
465
466 if (in_initrd()) {
467 log_debug("Running in initrd, keep DHCPv4 addresses on stopping networkd by default.");
468 m->keep_configuration = KEEP_CONFIGURATION_DHCP_ON_STOP;
469 return 0;
470 }
471
472 r = path_is_network_fs("/");
473 if (r < 0)
474 return log_error_errno(r, "Failed to detect if root is network filesystem: %m");
475 if (r == 0) {
476 m->keep_configuration = _KEEP_CONFIGURATION_INVALID;
477 return 0;
478 }
479
480 log_debug("Running on network filesystem, enabling KeepConfiguration= by default.");
481 m->keep_configuration = KEEP_CONFIGURATION_YES;
482 return 0;
483 }
484
485 int manager_setup(Manager *m) {
486 _cleanup_close_ int rtnl_fd = -EBADF;
487 int r;
488
489 assert(m);
490
491 r = sd_event_default(&m->event);
492 if (r < 0)
493 return r;
494
495 (void) sd_event_set_watchdog(m->event, true);
496 (void) sd_event_add_signal(m->event, NULL, SIGTERM | SD_EVENT_SIGNAL_PROCMASK, signal_terminate_callback, m);
497 (void) sd_event_add_signal(m->event, NULL, SIGINT | SD_EVENT_SIGNAL_PROCMASK, signal_terminate_callback, m);
498 (void) sd_event_add_signal(m->event, NULL, SIGUSR2 | SD_EVENT_SIGNAL_PROCMASK, signal_restart_callback, m);
499 (void) sd_event_add_signal(m->event, NULL, SIGHUP | SD_EVENT_SIGNAL_PROCMASK, signal_reload_callback, m);
500 (void) sd_event_add_signal(m->event, NULL, (SIGRTMIN+18) | SD_EVENT_SIGNAL_PROCMASK, sigrtmin18_handler, NULL);
501
502 r = sd_event_add_memory_pressure(m->event, NULL, NULL, NULL);
503 if (r < 0)
504 log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
505
506 r = sd_event_add_post(m->event, NULL, manager_post_handler, m);
507 if (r < 0)
508 return r;
509
510 r = manager_listen_fds(m, &rtnl_fd);
511 if (r < 0)
512 return r;
513
514 r = manager_connect_rtnl(m, TAKE_FD(rtnl_fd));
515 if (r < 0)
516 return r;
517
518 r = manager_connect_genl(m);
519 if (r < 0)
520 return r;
521
522 if (m->test_mode)
523 return 0;
524
525 r = manager_connect_varlink(m);
526 if (r < 0)
527 return r;
528
529 r = manager_connect_bus(m);
530 if (r < 0)
531 return r;
532
533 r = manager_connect_udev(m);
534 if (r < 0)
535 return r;
536
537 r = sd_resolve_default(&m->resolve);
538 if (r < 0)
539 return r;
540
541 r = sd_resolve_attach_event(m->resolve, m->event, 0);
542 if (r < 0)
543 return r;
544
545 r = address_pool_setup_default(m);
546 if (r < 0)
547 return r;
548
549 r = manager_set_keep_configuration(m);
550 if (r < 0)
551 return r;
552
553 m->state_file = strdup("/run/systemd/netif/state");
554 if (!m->state_file)
555 return -ENOMEM;
556
557 return 0;
558 }
559
560 int manager_new(Manager **ret, bool test_mode) {
561 _cleanup_(manager_freep) Manager *m = NULL;
562
563 m = new(Manager, 1);
564 if (!m)
565 return -ENOMEM;
566
567 *m = (Manager) {
568 .keep_configuration = _KEEP_CONFIGURATION_INVALID,
569 .ipv6_privacy_extensions = IPV6_PRIVACY_EXTENSIONS_NO,
570 .test_mode = test_mode,
571 .speed_meter_interval_usec = SPEED_METER_DEFAULT_TIME_INTERVAL,
572 .online_state = _LINK_ONLINE_STATE_INVALID,
573 .manage_foreign_routes = true,
574 .manage_foreign_rules = true,
575 .manage_foreign_nexthops = true,
576 .ethtool_fd = -EBADF,
577 .dhcp_duid.type = DUID_TYPE_EN,
578 .dhcp6_duid.type = DUID_TYPE_EN,
579 .duid_product_uuid.type = DUID_TYPE_UUID,
580 };
581
582 *ret = TAKE_PTR(m);
583 return 0;
584 }
585
586 Manager* manager_free(Manager *m) {
587 Link *link;
588
589 if (!m)
590 return NULL;
591
592 free(m->state_file);
593
594 HASHMAP_FOREACH(link, m->links_by_index)
595 (void) link_stop_engines(link, true);
596
597 m->request_queue = ordered_set_free(m->request_queue);
598 m->remove_request_queue = ordered_set_free(m->remove_request_queue);
599
600 m->dirty_links = set_free_with_destructor(m->dirty_links, link_unref);
601 m->new_wlan_ifindices = set_free(m->new_wlan_ifindices);
602 m->links_by_name = hashmap_free(m->links_by_name);
603 m->links_by_hw_addr = hashmap_free(m->links_by_hw_addr);
604 m->links_by_dhcp_pd_subnet_prefix = hashmap_free(m->links_by_dhcp_pd_subnet_prefix);
605 m->links_by_index = hashmap_free_with_destructor(m->links_by_index, link_unref);
606
607 m->dhcp_pd_subnet_ids = set_free(m->dhcp_pd_subnet_ids);
608 m->networks = ordered_hashmap_free_with_destructor(m->networks, network_unref);
609
610 m->netdevs = hashmap_free_with_destructor(m->netdevs, netdev_unref);
611
612 m->tuntap_fds_by_name = hashmap_free(m->tuntap_fds_by_name);
613
614 m->wiphy_by_name = hashmap_free(m->wiphy_by_name);
615 m->wiphy_by_index = hashmap_free_with_destructor(m->wiphy_by_index, wiphy_free);
616
617 ordered_set_free_free(m->address_pools);
618
619 hashmap_free(m->route_table_names_by_number);
620 hashmap_free(m->route_table_numbers_by_name);
621
622 set_free(m->rules);
623
624 sd_netlink_unref(m->rtnl);
625 sd_netlink_unref(m->genl);
626 sd_resolve_unref(m->resolve);
627
628 /* reject (e.g. unreachable) type routes are managed by Manager, but may be referenced by a
629 * link. E.g., DHCP6 with prefix delegation creates unreachable routes, and they are referenced
630 * by the upstream link. And the links may be referenced by netlink slots. Hence, two
631 * set_free() must be called after the above sd_netlink_unref(). */
632 m->routes = set_free(m->routes);
633
634 m->nexthops_by_id = hashmap_free(m->nexthops_by_id);
635 m->nexthop_ids = set_free(m->nexthop_ids);
636
637 sd_event_source_unref(m->speed_meter_event_source);
638 sd_event_unref(m->event);
639
640 sd_device_monitor_unref(m->device_monitor);
641
642 manager_varlink_done(m);
643 hashmap_free(m->polkit_registry);
644 sd_bus_flush_close_unref(m->bus);
645
646 free(m->dynamic_timezone);
647 free(m->dynamic_hostname);
648
649 safe_close(m->ethtool_fd);
650
651 m->fw_ctx = fw_ctx_free(m->fw_ctx);
652
653 return mfree(m);
654 }
655
656 int manager_start(Manager *m) {
657 Link *link;
658 int r;
659
660 assert(m);
661
662 r = manager_start_speed_meter(m);
663 if (r < 0)
664 return log_error_errno(r, "Failed to initialize speed meter: %m");
665
666 /* The dirty handler will deal with future serialization, but the first one
667 must be done explicitly. */
668
669 r = manager_save(m);
670 if (r < 0)
671 log_warning_errno(r, "Failed to update state file %s, ignoring: %m", m->state_file);
672
673 HASHMAP_FOREACH(link, m->links_by_index) {
674 r = link_save_and_clean(link);
675 if (r < 0)
676 log_link_warning_errno(link, r, "Failed to update link state file %s, ignoring: %m", link->state_file);
677 }
678
679 return 0;
680 }
681
682 int manager_load_config(Manager *m) {
683 int r;
684
685 r = netdev_load(m, false);
686 if (r < 0)
687 return r;
688
689 manager_clear_unmanaged_tuntap_fds(m);
690
691 r = network_load(m, &m->networks);
692 if (r < 0)
693 return r;
694
695 r = manager_build_dhcp_pd_subnet_ids(m);
696 if (r < 0)
697 return r;
698
699 r = manager_build_nexthop_ids(m);
700 if (r < 0)
701 return r;
702
703 return 0;
704 }
705
706 int manager_enumerate_internal(
707 Manager *m,
708 sd_netlink *nl,
709 sd_netlink_message *req,
710 int (*process)(sd_netlink *, sd_netlink_message *, Manager *)) {
711
712 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *reply = NULL;
713 int r;
714
715 assert(m);
716 assert(nl);
717 assert(req);
718 assert(process);
719
720 r = sd_netlink_message_set_request_dump(req, true);
721 if (r < 0)
722 return r;
723
724 r = sd_netlink_call(nl, req, 0, &reply);
725 if (r < 0)
726 return r;
727
728 m->enumerating = true;
729 for (sd_netlink_message *reply_one = reply; reply_one; reply_one = sd_netlink_message_next(reply_one))
730 RET_GATHER(r, process(nl, reply_one, m));
731 m->enumerating = false;
732
733 return r;
734 }
735
736 static int manager_enumerate_links(Manager *m) {
737 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
738 int r;
739
740 assert(m);
741 assert(m->rtnl);
742
743 r = sd_rtnl_message_new_link(m->rtnl, &req, RTM_GETLINK, 0);
744 if (r < 0)
745 return r;
746
747 r = manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_link);
748 if (r < 0)
749 return r;
750
751 req = sd_netlink_message_unref(req);
752
753 r = sd_rtnl_message_new_link(m->rtnl, &req, RTM_GETLINK, 0);
754 if (r < 0)
755 return r;
756
757 r = sd_rtnl_message_link_set_family(req, AF_BRIDGE);
758 if (r < 0)
759 return r;
760
761 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_link);
762 }
763
764 static int manager_enumerate_qdisc(Manager *m) {
765 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
766 int r;
767
768 assert(m);
769 assert(m->rtnl);
770
771 r = sd_rtnl_message_new_traffic_control(m->rtnl, &req, RTM_GETQDISC, 0, 0, 0);
772 if (r < 0)
773 return r;
774
775 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_qdisc);
776 }
777
778 static int manager_enumerate_tclass(Manager *m) {
779 Link *link;
780 int r = 0;
781
782 assert(m);
783 assert(m->rtnl);
784
785 /* TC class can be enumerated only per link. See tc_dump_tclass() in net/sched/sched_api.c. */
786
787 HASHMAP_FOREACH(link, m->links_by_index)
788 RET_GATHER(r, link_enumerate_tclass(link, 0));
789
790 return r;
791 }
792
793 static int manager_enumerate_addresses(Manager *m) {
794 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
795 int r;
796
797 assert(m);
798 assert(m->rtnl);
799
800 r = sd_rtnl_message_new_addr(m->rtnl, &req, RTM_GETADDR, 0, 0);
801 if (r < 0)
802 return r;
803
804 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_address);
805 }
806
807 static int manager_enumerate_neighbors(Manager *m) {
808 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
809 int r;
810
811 assert(m);
812 assert(m->rtnl);
813
814 r = sd_rtnl_message_new_neigh(m->rtnl, &req, RTM_GETNEIGH, 0, AF_UNSPEC);
815 if (r < 0)
816 return r;
817
818 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_neighbor);
819 }
820
821 static int manager_enumerate_routes(Manager *m) {
822 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
823 int r;
824
825 assert(m);
826 assert(m->rtnl);
827
828 if (!m->manage_foreign_routes)
829 return 0;
830
831 r = sd_rtnl_message_new_route(m->rtnl, &req, RTM_GETROUTE, 0, 0);
832 if (r < 0)
833 return r;
834
835 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_route);
836 }
837
838 static int manager_enumerate_rules(Manager *m) {
839 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
840 int r;
841
842 assert(m);
843 assert(m->rtnl);
844
845 if (!m->manage_foreign_rules)
846 return 0;
847
848 r = sd_rtnl_message_new_routing_policy_rule(m->rtnl, &req, RTM_GETRULE, 0);
849 if (r < 0)
850 return r;
851
852 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_rule);
853 }
854
855 static int manager_enumerate_nexthop(Manager *m) {
856 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
857 int r;
858
859 assert(m);
860 assert(m->rtnl);
861
862 if (!m->manage_foreign_nexthops)
863 return 0;
864
865 r = sd_rtnl_message_new_nexthop(m->rtnl, &req, RTM_GETNEXTHOP, 0, 0);
866 if (r < 0)
867 return r;
868
869 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_nexthop);
870 }
871
872 static int manager_enumerate_nl80211_wiphy(Manager *m) {
873 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
874 int r;
875
876 assert(m);
877 assert(m->genl);
878
879 r = sd_genl_message_new(m->genl, NL80211_GENL_NAME, NL80211_CMD_GET_WIPHY, &req);
880 if (r < 0)
881 return r;
882
883 return manager_enumerate_internal(m, m->genl, req, manager_genl_process_nl80211_wiphy);
884 }
885
886 static int manager_enumerate_nl80211_config(Manager *m) {
887 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
888 int r;
889
890 assert(m);
891 assert(m->genl);
892
893 r = sd_genl_message_new(m->genl, NL80211_GENL_NAME, NL80211_CMD_GET_INTERFACE, &req);
894 if (r < 0)
895 return r;
896
897 return manager_enumerate_internal(m, m->genl, req, manager_genl_process_nl80211_config);
898 }
899
900 static int manager_enumerate_nl80211_mlme(Manager *m) {
901 Link *link;
902 int r;
903
904 assert(m);
905 assert(m->genl);
906
907 HASHMAP_FOREACH(link, m->links_by_index) {
908 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
909
910 if (link->wlan_iftype != NL80211_IFTYPE_STATION)
911 continue;
912
913 r = sd_genl_message_new(m->genl, NL80211_GENL_NAME, NL80211_CMD_GET_STATION, &req);
914 if (r < 0)
915 return r;
916
917 r = sd_netlink_message_append_u32(req, NL80211_ATTR_IFINDEX, link->ifindex);
918 if (r < 0)
919 return r;
920
921 r = manager_enumerate_internal(m, m->genl, req, manager_genl_process_nl80211_mlme);
922 if (r < 0)
923 return r;
924 }
925
926 return 0;
927 }
928
929 int manager_enumerate(Manager *m) {
930 int r;
931
932 r = manager_enumerate_links(m);
933 if (r < 0)
934 return log_error_errno(r, "Could not enumerate links: %m");
935
936 r = manager_enumerate_qdisc(m);
937 if (r == -EOPNOTSUPP)
938 log_debug_errno(r, "Could not enumerate QDiscs, ignoring: %m");
939 else if (r < 0)
940 return log_error_errno(r, "Could not enumerate QDisc: %m");
941
942 r = manager_enumerate_tclass(m);
943 if (r == -EOPNOTSUPP)
944 log_debug_errno(r, "Could not enumerate TClasses, ignoring: %m");
945 else if (r < 0)
946 return log_error_errno(r, "Could not enumerate TClass: %m");
947
948 r = manager_enumerate_addresses(m);
949 if (r < 0)
950 return log_error_errno(r, "Could not enumerate addresses: %m");
951
952 r = manager_enumerate_neighbors(m);
953 if (r < 0)
954 return log_error_errno(r, "Could not enumerate neighbors: %m");
955
956 /* NextHop support is added in kernel v5.3 (65ee00a9409f751188a8cdc0988167858eb4a536),
957 * and older kernels return -EOPNOTSUPP, or -EINVAL if SELinux is enabled. */
958 r = manager_enumerate_nexthop(m);
959 if (r == -EOPNOTSUPP || (r == -EINVAL && mac_selinux_enforcing()))
960 log_debug_errno(r, "Could not enumerate nexthops, ignoring: %m");
961 else if (r < 0)
962 return log_error_errno(r, "Could not enumerate nexthops: %m");
963
964 r = manager_enumerate_routes(m);
965 if (r < 0)
966 return log_error_errno(r, "Could not enumerate routes: %m");
967
968 /* If kernel is built with CONFIG_FIB_RULES=n, it returns -EOPNOTSUPP. */
969 r = manager_enumerate_rules(m);
970 if (r == -EOPNOTSUPP)
971 log_debug_errno(r, "Could not enumerate routing policy rules, ignoring: %m");
972 else if (r < 0)
973 return log_error_errno(r, "Could not enumerate routing policy rules: %m");
974
975 r = manager_enumerate_nl80211_wiphy(m);
976 if (r == -EOPNOTSUPP)
977 log_debug_errno(r, "Could not enumerate wireless LAN phy, ignoring: %m");
978 else if (r < 0)
979 return log_error_errno(r, "Could not enumerate wireless LAN phy: %m");
980
981 r = manager_enumerate_nl80211_config(m);
982 if (r == -EOPNOTSUPP)
983 log_debug_errno(r, "Could not enumerate wireless LAN interfaces, ignoring: %m");
984 else if (r < 0)
985 return log_error_errno(r, "Could not enumerate wireless LAN interfaces: %m");
986
987 r = manager_enumerate_nl80211_mlme(m);
988 if (r == -EOPNOTSUPP)
989 log_debug_errno(r, "Could not enumerate wireless LAN stations, ignoring: %m");
990 else if (r < 0)
991 return log_error_errno(r, "Could not enumerate wireless LAN stations: %m");
992
993 return 0;
994 }
995
996 static int set_hostname_handler(sd_bus_message *m, void *userdata, sd_bus_error *ret_error) {
997 const sd_bus_error *e;
998 int r;
999
1000 assert(m);
1001
1002 e = sd_bus_message_get_error(m);
1003 if (e) {
1004 r = sd_bus_error_get_errno(e);
1005 log_warning_errno(r, "Could not set hostname: %s", bus_error_message(e, r));
1006 }
1007
1008 return 1;
1009 }
1010
1011 int manager_set_hostname(Manager *m, const char *hostname) {
1012 int r;
1013
1014 log_debug("Setting transient hostname: '%s'", strna(hostname));
1015
1016 r = free_and_strdup_warn(&m->dynamic_hostname, hostname);
1017 if (r < 0)
1018 return r;
1019
1020 if (sd_bus_is_ready(m->bus) <= 0) {
1021 log_debug("Not connected to system bus, setting system hostname later.");
1022 return 0;
1023 }
1024
1025 r = bus_call_method_async(
1026 m->bus,
1027 NULL,
1028 bus_hostname,
1029 "SetHostname",
1030 set_hostname_handler,
1031 m,
1032 "sb",
1033 hostname,
1034 false);
1035 if (r < 0)
1036 return log_error_errno(r, "Could not set transient hostname: %m");
1037
1038 return 0;
1039 }
1040
1041 static int set_timezone_handler(sd_bus_message *m, void *userdata, sd_bus_error *ret_error) {
1042 const sd_bus_error *e;
1043 int r;
1044
1045 assert(m);
1046
1047 e = sd_bus_message_get_error(m);
1048 if (e) {
1049 r = sd_bus_error_get_errno(e);
1050 log_warning_errno(r, "Could not set timezone: %s", bus_error_message(e, r));
1051 }
1052
1053 return 1;
1054 }
1055
1056 int manager_set_timezone(Manager *m, const char *tz) {
1057 int r;
1058
1059 assert(m);
1060 assert(tz);
1061
1062 log_debug("Setting system timezone: '%s'", tz);
1063 r = free_and_strdup_warn(&m->dynamic_timezone, tz);
1064 if (r < 0)
1065 return r;
1066
1067 if (sd_bus_is_ready(m->bus) <= 0) {
1068 log_debug("Not connected to system bus, setting system timezone later.");
1069 return 0;
1070 }
1071
1072 r = bus_call_method_async(
1073 m->bus,
1074 NULL,
1075 bus_timedate,
1076 "SetTimezone",
1077 set_timezone_handler,
1078 m,
1079 "sb",
1080 tz,
1081 false);
1082 if (r < 0)
1083 return log_error_errno(r, "Could not set timezone: %m");
1084
1085 return 0;
1086 }
1087
1088 int manager_reload(Manager *m, sd_bus_message *message) {
1089 Link *link;
1090 int r;
1091
1092 assert(m);
1093
1094 (void) sd_notifyf(/* unset= */ false,
1095 "RELOADING=1\n"
1096 "STATUS=Reloading configuration...\n"
1097 "MONOTONIC_USEC=" USEC_FMT, now(CLOCK_MONOTONIC));
1098
1099 r = netdev_load(m, /* reload= */ true);
1100 if (r < 0)
1101 goto finish;
1102
1103 r = network_reload(m);
1104 if (r < 0)
1105 goto finish;
1106
1107 HASHMAP_FOREACH(link, m->links_by_index) {
1108 if (message)
1109 r = link_reconfigure_on_bus_method_reload(link, message);
1110 else
1111 r = link_reconfigure(link, /* force = */ false);
1112 if (r < 0) {
1113 log_link_warning_errno(link, r, "Failed to reconfigure the interface: %m");
1114 link_enter_failed(link);
1115 }
1116 }
1117
1118 r = 0;
1119 finish:
1120 (void) sd_notify(/* unset= */ false, NOTIFY_READY);
1121 return r;
1122 }