]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/network/networkd-manager.c
network/nexthop: cache requested nexthop IDs
[thirdparty/systemd.git] / src / network / networkd-manager.c
1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
2
3 #include <netinet/in.h>
4 #include <sys/socket.h>
5 #include <unistd.h>
6 #include <linux/if.h>
7 #include <linux/fib_rules.h>
8 #include <linux/nexthop.h>
9 #include <linux/nl80211.h>
10
11 #include "sd-netlink.h"
12
13 #include "alloc-util.h"
14 #include "bus-error.h"
15 #include "bus-locator.h"
16 #include "bus-log-control-api.h"
17 #include "bus-polkit.h"
18 #include "bus-util.h"
19 #include "common-signal.h"
20 #include "conf-parser.h"
21 #include "constants.h"
22 #include "daemon-util.h"
23 #include "device-private.h"
24 #include "device-util.h"
25 #include "dns-domain.h"
26 #include "fd-util.h"
27 #include "fileio.h"
28 #include "firewall-util.h"
29 #include "fs-util.h"
30 #include "initrd-util.h"
31 #include "local-addresses.h"
32 #include "netlink-util.h"
33 #include "network-internal.h"
34 #include "networkd-address-pool.h"
35 #include "networkd-address.h"
36 #include "networkd-dhcp-server-bus.h"
37 #include "networkd-dhcp6.h"
38 #include "networkd-link-bus.h"
39 #include "networkd-manager-bus.h"
40 #include "networkd-manager.h"
41 #include "networkd-neighbor.h"
42 #include "networkd-network-bus.h"
43 #include "networkd-nexthop.h"
44 #include "networkd-queue.h"
45 #include "networkd-route.h"
46 #include "networkd-routing-policy-rule.h"
47 #include "networkd-speed-meter.h"
48 #include "networkd-state-file.h"
49 #include "networkd-wifi.h"
50 #include "networkd-wiphy.h"
51 #include "ordered-set.h"
52 #include "path-lookup.h"
53 #include "path-util.h"
54 #include "qdisc.h"
55 #include "selinux-util.h"
56 #include "set.h"
57 #include "signal-util.h"
58 #include "stat-util.h"
59 #include "strv.h"
60 #include "sysctl-util.h"
61 #include "tclass.h"
62 #include "tmpfile-util.h"
63 #include "tuntap.h"
64 #include "udev-util.h"
65
66 /* use 128 MB for receive socket kernel queue. */
67 #define RCVBUF_SIZE (128*1024*1024)
68
69 static int match_prepare_for_sleep(sd_bus_message *message, void *userdata, sd_bus_error *ret_error) {
70 Manager *m = ASSERT_PTR(userdata);
71 Link *link;
72 int b, r;
73
74 assert(message);
75
76 r = sd_bus_message_read(message, "b", &b);
77 if (r < 0) {
78 bus_log_parse_error(r);
79 return 0;
80 }
81
82 if (b)
83 return 0;
84
85 log_debug("Coming back from suspend, reconfiguring all connections...");
86
87 HASHMAP_FOREACH(link, m->links_by_index) {
88 r = link_reconfigure(link, /* force = */ true);
89 if (r < 0) {
90 log_link_warning_errno(link, r, "Failed to reconfigure interface: %m");
91 link_enter_failed(link);
92 }
93 }
94
95 return 0;
96 }
97
98 static int on_connected(sd_bus_message *message, void *userdata, sd_bus_error *ret_error) {
99 Manager *m = ASSERT_PTR(userdata);
100
101 assert(message);
102
103 /* Did we get a timezone or transient hostname from DHCP while D-Bus wasn't up yet? */
104 if (m->dynamic_hostname)
105 (void) manager_set_hostname(m, m->dynamic_hostname);
106 if (m->dynamic_timezone)
107 (void) manager_set_timezone(m, m->dynamic_timezone);
108 if (m->product_uuid_requested)
109 (void) manager_request_product_uuid(m);
110
111 return 0;
112 }
113
114 static int manager_connect_bus(Manager *m) {
115 int r;
116
117 assert(m);
118 assert(!m->bus);
119
120 r = bus_open_system_watch_bind_with_description(&m->bus, "bus-api-network");
121 if (r < 0)
122 return log_error_errno(r, "Failed to connect to bus: %m");
123
124 r = bus_add_implementation(m->bus, &manager_object, m);
125 if (r < 0)
126 return r;
127
128 r = bus_log_control_api_register(m->bus);
129 if (r < 0)
130 return r;
131
132 r = sd_bus_request_name_async(m->bus, NULL, "org.freedesktop.network1", 0, NULL, NULL);
133 if (r < 0)
134 return log_error_errno(r, "Failed to request name: %m");
135
136 r = sd_bus_attach_event(m->bus, m->event, 0);
137 if (r < 0)
138 return log_error_errno(r, "Failed to attach bus to event loop: %m");
139
140 r = sd_bus_match_signal_async(
141 m->bus,
142 NULL,
143 "org.freedesktop.DBus.Local",
144 NULL,
145 "org.freedesktop.DBus.Local",
146 "Connected",
147 on_connected, NULL, m);
148 if (r < 0)
149 return log_error_errno(r, "Failed to request match on Connected signal: %m");
150
151 r = bus_match_signal_async(
152 m->bus,
153 NULL,
154 bus_login_mgr,
155 "PrepareForSleep",
156 match_prepare_for_sleep, NULL, m);
157 if (r < 0)
158 log_warning_errno(r, "Failed to request match for PrepareForSleep, ignoring: %m");
159
160 return 0;
161 }
162
163 static int manager_process_uevent(sd_device_monitor *monitor, sd_device *device, void *userdata) {
164 Manager *m = ASSERT_PTR(userdata);
165 sd_device_action_t action;
166 const char *s;
167 int r;
168
169 assert(device);
170
171 r = sd_device_get_action(device, &action);
172 if (r < 0)
173 return log_device_warning_errno(device, r, "Failed to get udev action, ignoring: %m");
174
175 r = sd_device_get_subsystem(device, &s);
176 if (r < 0)
177 return log_device_warning_errno(device, r, "Failed to get subsystem, ignoring: %m");
178
179 if (streq(s, "net"))
180 r = manager_udev_process_link(m, device, action);
181 else if (streq(s, "ieee80211"))
182 r = manager_udev_process_wiphy(m, device, action);
183 else if (streq(s, "rfkill"))
184 r = manager_udev_process_rfkill(m, device, action);
185 else {
186 log_device_debug(device, "Received device with unexpected subsystem \"%s\", ignoring.", s);
187 return 0;
188 }
189 if (r < 0)
190 log_device_warning_errno(device, r, "Failed to process \"%s\" uevent, ignoring: %m",
191 device_action_to_string(action));
192
193 return 0;
194 }
195
196 static int manager_connect_udev(Manager *m) {
197 int r;
198
199 /* udev does not initialize devices inside containers, so we rely on them being already
200 * initialized before entering the container. */
201 if (!udev_available())
202 return 0;
203
204 r = sd_device_monitor_new(&m->device_monitor);
205 if (r < 0)
206 return log_error_errno(r, "Failed to initialize device monitor: %m");
207
208 r = sd_device_monitor_filter_add_match_subsystem_devtype(m->device_monitor, "net", NULL);
209 if (r < 0)
210 return log_error_errno(r, "Could not add device monitor filter for net subsystem: %m");
211
212 r = sd_device_monitor_filter_add_match_subsystem_devtype(m->device_monitor, "ieee80211", NULL);
213 if (r < 0)
214 return log_error_errno(r, "Could not add device monitor filter for ieee80211 subsystem: %m");
215
216 r = sd_device_monitor_filter_add_match_subsystem_devtype(m->device_monitor, "rfkill", NULL);
217 if (r < 0)
218 return log_error_errno(r, "Could not add device monitor filter for rfkill subsystem: %m");
219
220 r = sd_device_monitor_attach_event(m->device_monitor, m->event);
221 if (r < 0)
222 return log_error_errno(r, "Failed to attach event to device monitor: %m");
223
224 r = sd_device_monitor_start(m->device_monitor, manager_process_uevent, m);
225 if (r < 0)
226 return log_error_errno(r, "Failed to start device monitor: %m");
227
228 return 0;
229 }
230
231 static int manager_listen_fds(Manager *m, int *ret_rtnl_fd) {
232 _cleanup_strv_free_ char **names = NULL;
233 int n, rtnl_fd = -EBADF;
234
235 assert(m);
236 assert(ret_rtnl_fd);
237
238 n = sd_listen_fds_with_names(/* unset_environment = */ true, &names);
239 if (n < 0)
240 return n;
241
242 if (strv_length(names) != (size_t) n)
243 return -EINVAL;
244
245 for (int i = 0; i < n; i++) {
246 int fd = i + SD_LISTEN_FDS_START;
247
248 if (sd_is_socket(fd, AF_NETLINK, SOCK_RAW, -1) > 0) {
249 if (rtnl_fd >= 0) {
250 log_debug("Received multiple netlink socket, ignoring.");
251 safe_close(fd);
252 continue;
253 }
254
255 rtnl_fd = fd;
256 continue;
257 }
258
259 if (manager_add_tuntap_fd(m, fd, names[i]) >= 0)
260 continue;
261
262 if (m->test_mode)
263 safe_close(fd);
264 else
265 close_and_notify_warn(fd, names[i]);
266 }
267
268 *ret_rtnl_fd = rtnl_fd;
269 return 0;
270 }
271
272 static int manager_connect_genl(Manager *m) {
273 int r;
274
275 assert(m);
276
277 r = sd_genl_socket_open(&m->genl);
278 if (r < 0)
279 return r;
280
281 r = sd_netlink_increase_rxbuf(m->genl, RCVBUF_SIZE);
282 if (r < 0)
283 log_warning_errno(r, "Failed to increase receive buffer size for general netlink socket, ignoring: %m");
284
285 r = sd_netlink_attach_event(m->genl, m->event, 0);
286 if (r < 0)
287 return r;
288
289 r = genl_add_match(m->genl, NULL, NL80211_GENL_NAME, NL80211_MULTICAST_GROUP_CONFIG, 0,
290 &manager_genl_process_nl80211_config, NULL, m, "network-genl_process_nl80211_config");
291 if (r < 0 && r != -EOPNOTSUPP)
292 return r;
293
294 r = genl_add_match(m->genl, NULL, NL80211_GENL_NAME, NL80211_MULTICAST_GROUP_MLME, 0,
295 &manager_genl_process_nl80211_mlme, NULL, m, "network-genl_process_nl80211_mlme");
296 if (r < 0 && r != -EOPNOTSUPP)
297 return r;
298
299 return 0;
300 }
301
302 static int manager_setup_rtnl_filter(Manager *manager) {
303 struct sock_filter filter[] = {
304 /* Check the packet length. */
305 BPF_STMT(BPF_LD + BPF_W + BPF_LEN, 0), /* A <- packet length */
306 BPF_JUMP(BPF_JMP + BPF_JGE + BPF_K, sizeof(struct nlmsghdr), 1, 0), /* A (packet length) >= sizeof(struct nlmsghdr) ? */
307 BPF_STMT(BPF_RET + BPF_K, 0), /* reject */
308 /* Always accept multipart message. */
309 BPF_STMT(BPF_LD + BPF_H + BPF_ABS, offsetof(struct nlmsghdr, nlmsg_flags)), /* A <- message flags */
310 BPF_JUMP(BPF_JMP + BPF_JSET + BPF_K, htobe16(NLM_F_MULTI), 0, 1), /* message flags has NLM_F_MULTI ? */
311 BPF_STMT(BPF_RET + BPF_K, UINT32_MAX), /* accept */
312 /* Accept all message types except for RTM_NEWNEIGH or RTM_DELNEIGH. */
313 BPF_STMT(BPF_LD + BPF_H + BPF_ABS, offsetof(struct nlmsghdr, nlmsg_type)), /* A <- message type */
314 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, htobe16(RTM_NEWNEIGH), 2, 0), /* message type == RTM_NEWNEIGH ? */
315 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, htobe16(RTM_DELNEIGH), 1, 0), /* message type == RTM_DELNEIGH ? */
316 BPF_STMT(BPF_RET + BPF_K, UINT32_MAX), /* accept */
317 /* Check the packet length. */
318 BPF_STMT(BPF_LD + BPF_W + BPF_LEN, 0), /* A <- packet length */
319 BPF_JUMP(BPF_JMP + BPF_JGE + BPF_K, sizeof(struct nlmsghdr) + sizeof(struct ndmsg), 1, 0),
320 /* packet length >= sizeof(struct nlmsghdr) + sizeof(struct ndmsg) ? */
321 BPF_STMT(BPF_RET + BPF_K, 0), /* reject */
322 /* Reject the message when the neighbor state does not have NUD_PERMANENT flag. */
323 BPF_STMT(BPF_LD + BPF_H + BPF_ABS, sizeof(struct nlmsghdr) + offsetof(struct ndmsg, ndm_state)),
324 /* A <- neighbor state */
325 BPF_JUMP(BPF_JMP + BPF_JSET + BPF_K, htobe16(NUD_PERMANENT), 1, 0), /* neighbor state has NUD_PERMANENT ? */
326 BPF_STMT(BPF_RET + BPF_K, 0), /* reject */
327 BPF_STMT(BPF_RET + BPF_K, UINT32_MAX), /* accept */
328 };
329
330 assert(manager);
331 assert(manager->rtnl);
332
333 return sd_netlink_attach_filter(manager->rtnl, ELEMENTSOF(filter), filter);
334 }
335
336 static int manager_connect_rtnl(Manager *m, int fd) {
337 _unused_ _cleanup_close_ int fd_close = fd;
338 int r;
339
340 assert(m);
341
342 /* This takes input fd. */
343
344 if (fd < 0)
345 r = sd_netlink_open(&m->rtnl);
346 else
347 r = sd_netlink_open_fd(&m->rtnl, fd);
348 if (r < 0)
349 return r;
350 TAKE_FD(fd_close);
351
352 /* Bump receiver buffer, but only if we are not called via socket activation, as in that
353 * case systemd sets the receive buffer size for us, and the value in the .socket unit
354 * should take full effect. */
355 if (fd < 0) {
356 r = sd_netlink_increase_rxbuf(m->rtnl, RCVBUF_SIZE);
357 if (r < 0)
358 log_warning_errno(r, "Failed to increase receive buffer size for rtnl socket, ignoring: %m");
359 }
360
361 r = sd_netlink_attach_event(m->rtnl, m->event, 0);
362 if (r < 0)
363 return r;
364
365 r = netlink_add_match(m->rtnl, NULL, RTM_NEWLINK, &manager_rtnl_process_link, NULL, m, "network-rtnl_process_link");
366 if (r < 0)
367 return r;
368
369 r = netlink_add_match(m->rtnl, NULL, RTM_DELLINK, &manager_rtnl_process_link, NULL, m, "network-rtnl_process_link");
370 if (r < 0)
371 return r;
372
373 r = netlink_add_match(m->rtnl, NULL, RTM_NEWQDISC, &manager_rtnl_process_qdisc, NULL, m, "network-rtnl_process_qdisc");
374 if (r < 0)
375 return r;
376
377 r = netlink_add_match(m->rtnl, NULL, RTM_DELQDISC, &manager_rtnl_process_qdisc, NULL, m, "network-rtnl_process_qdisc");
378 if (r < 0)
379 return r;
380
381 r = netlink_add_match(m->rtnl, NULL, RTM_NEWTCLASS, &manager_rtnl_process_tclass, NULL, m, "network-rtnl_process_tclass");
382 if (r < 0)
383 return r;
384
385 r = netlink_add_match(m->rtnl, NULL, RTM_DELTCLASS, &manager_rtnl_process_tclass, NULL, m, "network-rtnl_process_tclass");
386 if (r < 0)
387 return r;
388
389 r = netlink_add_match(m->rtnl, NULL, RTM_NEWADDR, &manager_rtnl_process_address, NULL, m, "network-rtnl_process_address");
390 if (r < 0)
391 return r;
392
393 r = netlink_add_match(m->rtnl, NULL, RTM_DELADDR, &manager_rtnl_process_address, NULL, m, "network-rtnl_process_address");
394 if (r < 0)
395 return r;
396
397 r = netlink_add_match(m->rtnl, NULL, RTM_NEWNEIGH, &manager_rtnl_process_neighbor, NULL, m, "network-rtnl_process_neighbor");
398 if (r < 0)
399 return r;
400
401 r = netlink_add_match(m->rtnl, NULL, RTM_DELNEIGH, &manager_rtnl_process_neighbor, NULL, m, "network-rtnl_process_neighbor");
402 if (r < 0)
403 return r;
404
405 r = netlink_add_match(m->rtnl, NULL, RTM_NEWROUTE, &manager_rtnl_process_route, NULL, m, "network-rtnl_process_route");
406 if (r < 0)
407 return r;
408
409 r = netlink_add_match(m->rtnl, NULL, RTM_DELROUTE, &manager_rtnl_process_route, NULL, m, "network-rtnl_process_route");
410 if (r < 0)
411 return r;
412
413 r = netlink_add_match(m->rtnl, NULL, RTM_NEWRULE, &manager_rtnl_process_rule, NULL, m, "network-rtnl_process_rule");
414 if (r < 0)
415 return r;
416
417 r = netlink_add_match(m->rtnl, NULL, RTM_DELRULE, &manager_rtnl_process_rule, NULL, m, "network-rtnl_process_rule");
418 if (r < 0)
419 return r;
420
421 r = netlink_add_match(m->rtnl, NULL, RTM_NEWNEXTHOP, &manager_rtnl_process_nexthop, NULL, m, "network-rtnl_process_nexthop");
422 if (r < 0)
423 return r;
424
425 r = netlink_add_match(m->rtnl, NULL, RTM_DELNEXTHOP, &manager_rtnl_process_nexthop, NULL, m, "network-rtnl_process_nexthop");
426 if (r < 0)
427 return r;
428
429 return manager_setup_rtnl_filter(m);
430 }
431
432 static int manager_dirty_handler(sd_event_source *s, void *userdata) {
433 Manager *m = ASSERT_PTR(userdata);
434 Link *link;
435 int r;
436
437 if (m->dirty) {
438 r = manager_save(m);
439 if (r < 0)
440 log_warning_errno(r, "Failed to update state file %s, ignoring: %m", m->state_file);
441 }
442
443 SET_FOREACH(link, m->dirty_links) {
444 r = link_save_and_clean(link);
445 if (r < 0)
446 log_link_warning_errno(link, r, "Failed to update link state file %s, ignoring: %m", link->state_file);
447 }
448
449 return 1;
450 }
451
452 static int signal_terminate_callback(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
453 Manager *m = ASSERT_PTR(userdata);
454
455 m->restarting = false;
456
457 log_debug("Terminate operation initiated.");
458
459 return sd_event_exit(sd_event_source_get_event(s), 0);
460 }
461
462 static int signal_restart_callback(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
463 Manager *m = ASSERT_PTR(userdata);
464
465 m->restarting = true;
466
467 log_debug("Restart operation initiated.");
468
469 return sd_event_exit(sd_event_source_get_event(s), 0);
470 }
471
472 static int signal_reload_callback(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
473 Manager *m = ASSERT_PTR(userdata);
474
475 manager_reload(m);
476
477 return 0;
478 }
479
480 static int manager_set_keep_configuration(Manager *m) {
481 int r;
482
483 assert(m);
484
485 if (in_initrd()) {
486 log_debug("Running in initrd, keep DHCPv4 addresses on stopping networkd by default.");
487 m->keep_configuration = KEEP_CONFIGURATION_DHCP_ON_STOP;
488 return 0;
489 }
490
491 r = path_is_network_fs("/");
492 if (r < 0)
493 return log_error_errno(r, "Failed to detect if root is network filesystem: %m");
494 if (r == 0) {
495 m->keep_configuration = _KEEP_CONFIGURATION_INVALID;
496 return 0;
497 }
498
499 log_debug("Running on network filesystem, enabling KeepConfiguration= by default.");
500 m->keep_configuration = KEEP_CONFIGURATION_YES;
501 return 0;
502 }
503
504 int manager_setup(Manager *m) {
505 _cleanup_close_ int rtnl_fd = -EBADF;
506 int r;
507
508 assert(m);
509
510 r = sd_event_default(&m->event);
511 if (r < 0)
512 return r;
513
514 (void) sd_event_set_watchdog(m->event, true);
515 (void) sd_event_add_signal(m->event, NULL, SIGTERM | SD_EVENT_SIGNAL_PROCMASK, signal_terminate_callback, m);
516 (void) sd_event_add_signal(m->event, NULL, SIGINT | SD_EVENT_SIGNAL_PROCMASK, signal_terminate_callback, m);
517 (void) sd_event_add_signal(m->event, NULL, SIGUSR2 | SD_EVENT_SIGNAL_PROCMASK, signal_restart_callback, m);
518 (void) sd_event_add_signal(m->event, NULL, SIGHUP | SD_EVENT_SIGNAL_PROCMASK, signal_reload_callback, m);
519 (void) sd_event_add_signal(m->event, NULL, (SIGRTMIN+18) | SD_EVENT_SIGNAL_PROCMASK, sigrtmin18_handler, NULL);
520
521 r = sd_event_add_memory_pressure(m->event, NULL, NULL, NULL);
522 if (r < 0)
523 log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
524
525 r = sd_event_add_post(m->event, NULL, manager_dirty_handler, m);
526 if (r < 0)
527 return r;
528
529 r = sd_event_add_post(m->event, NULL, manager_process_requests, m);
530 if (r < 0)
531 return r;
532
533 r = manager_listen_fds(m, &rtnl_fd);
534 if (r < 0)
535 return r;
536
537 r = manager_connect_rtnl(m, TAKE_FD(rtnl_fd));
538 if (r < 0)
539 return r;
540
541 r = manager_connect_genl(m);
542 if (r < 0)
543 return r;
544
545 if (m->test_mode)
546 return 0;
547
548 r = manager_connect_bus(m);
549 if (r < 0)
550 return r;
551
552 r = manager_connect_udev(m);
553 if (r < 0)
554 return r;
555
556 r = sd_resolve_default(&m->resolve);
557 if (r < 0)
558 return r;
559
560 r = sd_resolve_attach_event(m->resolve, m->event, 0);
561 if (r < 0)
562 return r;
563
564 r = address_pool_setup_default(m);
565 if (r < 0)
566 return r;
567
568 r = manager_set_keep_configuration(m);
569 if (r < 0)
570 return r;
571
572 m->state_file = strdup("/run/systemd/netif/state");
573 if (!m->state_file)
574 return -ENOMEM;
575
576 return 0;
577 }
578
579 int manager_new(Manager **ret, bool test_mode) {
580 _cleanup_(manager_freep) Manager *m = NULL;
581
582 m = new(Manager, 1);
583 if (!m)
584 return -ENOMEM;
585
586 *m = (Manager) {
587 .keep_configuration = _KEEP_CONFIGURATION_INVALID,
588 .ipv6_privacy_extensions = IPV6_PRIVACY_EXTENSIONS_NO,
589 .test_mode = test_mode,
590 .speed_meter_interval_usec = SPEED_METER_DEFAULT_TIME_INTERVAL,
591 .online_state = _LINK_ONLINE_STATE_INVALID,
592 .manage_foreign_routes = true,
593 .manage_foreign_rules = true,
594 .manage_foreign_nexthops = true,
595 .ethtool_fd = -EBADF,
596 .dhcp_duid.type = DUID_TYPE_EN,
597 .dhcp6_duid.type = DUID_TYPE_EN,
598 .duid_product_uuid.type = DUID_TYPE_UUID,
599 };
600
601 *ret = TAKE_PTR(m);
602 return 0;
603 }
604
605 Manager* manager_free(Manager *m) {
606 Link *link;
607
608 if (!m)
609 return NULL;
610
611 free(m->state_file);
612
613 HASHMAP_FOREACH(link, m->links_by_index)
614 (void) link_stop_engines(link, true);
615
616 m->request_queue = ordered_set_free(m->request_queue);
617
618 m->dirty_links = set_free_with_destructor(m->dirty_links, link_unref);
619 m->new_wlan_ifindices = set_free(m->new_wlan_ifindices);
620 m->links_by_name = hashmap_free(m->links_by_name);
621 m->links_by_hw_addr = hashmap_free(m->links_by_hw_addr);
622 m->links_by_dhcp_pd_subnet_prefix = hashmap_free(m->links_by_dhcp_pd_subnet_prefix);
623 m->links_by_index = hashmap_free_with_destructor(m->links_by_index, link_unref);
624
625 m->dhcp_pd_subnet_ids = set_free(m->dhcp_pd_subnet_ids);
626 m->networks = ordered_hashmap_free_with_destructor(m->networks, network_unref);
627
628 m->netdevs = hashmap_free_with_destructor(m->netdevs, netdev_unref);
629
630 m->tuntap_fds_by_name = hashmap_free(m->tuntap_fds_by_name);
631
632 m->wiphy_by_name = hashmap_free(m->wiphy_by_name);
633 m->wiphy_by_index = hashmap_free_with_destructor(m->wiphy_by_index, wiphy_free);
634
635 ordered_set_free_free(m->address_pools);
636
637 hashmap_free(m->route_table_names_by_number);
638 hashmap_free(m->route_table_numbers_by_name);
639
640 set_free(m->rules);
641
642 sd_netlink_unref(m->rtnl);
643 sd_netlink_unref(m->genl);
644 sd_resolve_unref(m->resolve);
645
646 /* reject (e.g. unreachable) type routes are managed by Manager, but may be referenced by a
647 * link. E.g., DHCP6 with prefix delegation creates unreachable routes, and they are referenced
648 * by the upstream link. And the links may be referenced by netlink slots. Hence, two
649 * set_free() must be called after the above sd_netlink_unref(). */
650 m->routes = set_free(m->routes);
651
652 m->nexthops_by_id = hashmap_free(m->nexthops_by_id);
653 m->nexthop_ids = set_free(m->nexthop_ids);
654
655 sd_event_source_unref(m->speed_meter_event_source);
656 sd_event_unref(m->event);
657
658 sd_device_monitor_unref(m->device_monitor);
659
660 bus_verify_polkit_async_registry_free(m->polkit_registry);
661 sd_bus_flush_close_unref(m->bus);
662
663 free(m->dynamic_timezone);
664 free(m->dynamic_hostname);
665
666 safe_close(m->ethtool_fd);
667
668 m->fw_ctx = fw_ctx_free(m->fw_ctx);
669
670 return mfree(m);
671 }
672
673 int manager_start(Manager *m) {
674 Link *link;
675 int r;
676
677 assert(m);
678
679 r = manager_start_speed_meter(m);
680 if (r < 0)
681 return log_error_errno(r, "Failed to initialize speed meter: %m");
682
683 /* The dirty handler will deal with future serialization, but the first one
684 must be done explicitly. */
685
686 r = manager_save(m);
687 if (r < 0)
688 log_warning_errno(r, "Failed to update state file %s, ignoring: %m", m->state_file);
689
690 HASHMAP_FOREACH(link, m->links_by_index) {
691 r = link_save_and_clean(link);
692 if (r < 0)
693 log_link_warning_errno(link, r, "Failed to update link state file %s, ignoring: %m", link->state_file);
694 }
695
696 return 0;
697 }
698
699 int manager_load_config(Manager *m) {
700 int r;
701
702 r = netdev_load(m, false);
703 if (r < 0)
704 return r;
705
706 manager_clear_unmanaged_tuntap_fds(m);
707
708 r = network_load(m, &m->networks);
709 if (r < 0)
710 return r;
711
712 r = manager_build_dhcp_pd_subnet_ids(m);
713 if (r < 0)
714 return r;
715
716 r = manager_build_nexthop_ids(m);
717 if (r < 0)
718 return r;
719
720 return 0;
721 }
722
723 int manager_enumerate_internal(
724 Manager *m,
725 sd_netlink *nl,
726 sd_netlink_message *req,
727 int (*process)(sd_netlink *, sd_netlink_message *, Manager *)) {
728
729 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *reply = NULL;
730 int r;
731
732 assert(m);
733 assert(nl);
734 assert(req);
735 assert(process);
736
737 r = sd_netlink_message_set_request_dump(req, true);
738 if (r < 0)
739 return r;
740
741 r = sd_netlink_call(nl, req, 0, &reply);
742 if (r < 0)
743 return r;
744
745 m->enumerating = true;
746 for (sd_netlink_message *reply_one = reply; reply_one; reply_one = sd_netlink_message_next(reply_one))
747 RET_GATHER(r, process(nl, reply_one, m));
748 m->enumerating = false;
749
750 return r;
751 }
752
753 static int manager_enumerate_links(Manager *m) {
754 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
755 int r;
756
757 assert(m);
758 assert(m->rtnl);
759
760 r = sd_rtnl_message_new_link(m->rtnl, &req, RTM_GETLINK, 0);
761 if (r < 0)
762 return r;
763
764 r = manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_link);
765 if (r < 0)
766 return r;
767
768 req = sd_netlink_message_unref(req);
769
770 r = sd_rtnl_message_new_link(m->rtnl, &req, RTM_GETLINK, 0);
771 if (r < 0)
772 return r;
773
774 r = sd_rtnl_message_link_set_family(req, AF_BRIDGE);
775 if (r < 0)
776 return r;
777
778 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_link);
779 }
780
781 static int manager_enumerate_qdisc(Manager *m) {
782 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
783 int r;
784
785 assert(m);
786 assert(m->rtnl);
787
788 r = sd_rtnl_message_new_traffic_control(m->rtnl, &req, RTM_GETQDISC, 0, 0, 0);
789 if (r < 0)
790 return r;
791
792 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_qdisc);
793 }
794
795 static int manager_enumerate_tclass(Manager *m) {
796 Link *link;
797 int r = 0;
798
799 assert(m);
800 assert(m->rtnl);
801
802 /* TC class can be enumerated only per link. See tc_dump_tclass() in net/sched/sched_api.c. */
803
804 HASHMAP_FOREACH(link, m->links_by_index)
805 RET_GATHER(r, link_enumerate_tclass(link, 0));
806
807 return r;
808 }
809
810 static int manager_enumerate_addresses(Manager *m) {
811 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
812 int r;
813
814 assert(m);
815 assert(m->rtnl);
816
817 r = sd_rtnl_message_new_addr(m->rtnl, &req, RTM_GETADDR, 0, 0);
818 if (r < 0)
819 return r;
820
821 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_address);
822 }
823
824 static int manager_enumerate_neighbors(Manager *m) {
825 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
826 int r;
827
828 assert(m);
829 assert(m->rtnl);
830
831 r = sd_rtnl_message_new_neigh(m->rtnl, &req, RTM_GETNEIGH, 0, AF_UNSPEC);
832 if (r < 0)
833 return r;
834
835 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_neighbor);
836 }
837
838 static int manager_enumerate_routes(Manager *m) {
839 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
840 int r;
841
842 assert(m);
843 assert(m->rtnl);
844
845 if (!m->manage_foreign_routes)
846 return 0;
847
848 r = sd_rtnl_message_new_route(m->rtnl, &req, RTM_GETROUTE, 0, 0);
849 if (r < 0)
850 return r;
851
852 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_route);
853 }
854
855 static int manager_enumerate_rules(Manager *m) {
856 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
857 int r;
858
859 assert(m);
860 assert(m->rtnl);
861
862 if (!m->manage_foreign_rules)
863 return 0;
864
865 r = sd_rtnl_message_new_routing_policy_rule(m->rtnl, &req, RTM_GETRULE, 0);
866 if (r < 0)
867 return r;
868
869 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_rule);
870 }
871
872 static int manager_enumerate_nexthop(Manager *m) {
873 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
874 int r;
875
876 assert(m);
877 assert(m->rtnl);
878
879 if (!m->manage_foreign_nexthops)
880 return 0;
881
882 r = sd_rtnl_message_new_nexthop(m->rtnl, &req, RTM_GETNEXTHOP, 0, 0);
883 if (r < 0)
884 return r;
885
886 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_nexthop);
887 }
888
889 static int manager_enumerate_nl80211_wiphy(Manager *m) {
890 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
891 int r;
892
893 assert(m);
894 assert(m->genl);
895
896 r = sd_genl_message_new(m->genl, NL80211_GENL_NAME, NL80211_CMD_GET_WIPHY, &req);
897 if (r < 0)
898 return r;
899
900 return manager_enumerate_internal(m, m->genl, req, manager_genl_process_nl80211_wiphy);
901 }
902
903 static int manager_enumerate_nl80211_config(Manager *m) {
904 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
905 int r;
906
907 assert(m);
908 assert(m->genl);
909
910 r = sd_genl_message_new(m->genl, NL80211_GENL_NAME, NL80211_CMD_GET_INTERFACE, &req);
911 if (r < 0)
912 return r;
913
914 return manager_enumerate_internal(m, m->genl, req, manager_genl_process_nl80211_config);
915 }
916
917 static int manager_enumerate_nl80211_mlme(Manager *m) {
918 Link *link;
919 int r;
920
921 assert(m);
922 assert(m->genl);
923
924 HASHMAP_FOREACH(link, m->links_by_index) {
925 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
926
927 if (link->wlan_iftype != NL80211_IFTYPE_STATION)
928 continue;
929
930 r = sd_genl_message_new(m->genl, NL80211_GENL_NAME, NL80211_CMD_GET_STATION, &req);
931 if (r < 0)
932 return r;
933
934 r = sd_netlink_message_append_u32(req, NL80211_ATTR_IFINDEX, link->ifindex);
935 if (r < 0)
936 return r;
937
938 r = manager_enumerate_internal(m, m->genl, req, manager_genl_process_nl80211_mlme);
939 if (r < 0)
940 return r;
941 }
942
943 return 0;
944 }
945
946 int manager_enumerate(Manager *m) {
947 int r;
948
949 r = manager_enumerate_links(m);
950 if (r < 0)
951 return log_error_errno(r, "Could not enumerate links: %m");
952
953 r = manager_enumerate_qdisc(m);
954 if (r == -EOPNOTSUPP)
955 log_debug_errno(r, "Could not enumerate QDiscs, ignoring: %m");
956 else if (r < 0)
957 return log_error_errno(r, "Could not enumerate QDisc: %m");
958
959 r = manager_enumerate_tclass(m);
960 if (r == -EOPNOTSUPP)
961 log_debug_errno(r, "Could not enumerate TClasses, ignoring: %m");
962 else if (r < 0)
963 return log_error_errno(r, "Could not enumerate TClass: %m");
964
965 r = manager_enumerate_addresses(m);
966 if (r < 0)
967 return log_error_errno(r, "Could not enumerate addresses: %m");
968
969 r = manager_enumerate_neighbors(m);
970 if (r < 0)
971 return log_error_errno(r, "Could not enumerate neighbors: %m");
972
973 /* NextHop support is added in kernel v5.3 (65ee00a9409f751188a8cdc0988167858eb4a536),
974 * and older kernels return -EOPNOTSUPP, or -EINVAL if SELinux is enabled. */
975 r = manager_enumerate_nexthop(m);
976 if (r == -EOPNOTSUPP || (r == -EINVAL && mac_selinux_enforcing()))
977 log_debug_errno(r, "Could not enumerate nexthops, ignoring: %m");
978 else if (r < 0)
979 return log_error_errno(r, "Could not enumerate nexthops: %m");
980
981 r = manager_enumerate_routes(m);
982 if (r < 0)
983 return log_error_errno(r, "Could not enumerate routes: %m");
984
985 /* If kernel is built with CONFIG_FIB_RULES=n, it returns -EOPNOTSUPP. */
986 r = manager_enumerate_rules(m);
987 if (r == -EOPNOTSUPP)
988 log_debug_errno(r, "Could not enumerate routing policy rules, ignoring: %m");
989 else if (r < 0)
990 return log_error_errno(r, "Could not enumerate routing policy rules: %m");
991
992 r = manager_enumerate_nl80211_wiphy(m);
993 if (r == -EOPNOTSUPP)
994 log_debug_errno(r, "Could not enumerate wireless LAN phy, ignoring: %m");
995 else if (r < 0)
996 return log_error_errno(r, "Could not enumerate wireless LAN phy: %m");
997
998 r = manager_enumerate_nl80211_config(m);
999 if (r == -EOPNOTSUPP)
1000 log_debug_errno(r, "Could not enumerate wireless LAN interfaces, ignoring: %m");
1001 else if (r < 0)
1002 return log_error_errno(r, "Could not enumerate wireless LAN interfaces: %m");
1003
1004 r = manager_enumerate_nl80211_mlme(m);
1005 if (r == -EOPNOTSUPP)
1006 log_debug_errno(r, "Could not enumerate wireless LAN stations, ignoring: %m");
1007 else if (r < 0)
1008 return log_error_errno(r, "Could not enumerate wireless LAN stations: %m");
1009
1010 return 0;
1011 }
1012
1013 static int set_hostname_handler(sd_bus_message *m, void *userdata, sd_bus_error *ret_error) {
1014 const sd_bus_error *e;
1015 int r;
1016
1017 assert(m);
1018
1019 e = sd_bus_message_get_error(m);
1020 if (e) {
1021 r = sd_bus_error_get_errno(e);
1022 log_warning_errno(r, "Could not set hostname: %s", bus_error_message(e, r));
1023 }
1024
1025 return 1;
1026 }
1027
1028 int manager_set_hostname(Manager *m, const char *hostname) {
1029 int r;
1030
1031 log_debug("Setting transient hostname: '%s'", strna(hostname));
1032
1033 r = free_and_strdup_warn(&m->dynamic_hostname, hostname);
1034 if (r < 0)
1035 return r;
1036
1037 if (sd_bus_is_ready(m->bus) <= 0) {
1038 log_debug("Not connected to system bus, setting system hostname later.");
1039 return 0;
1040 }
1041
1042 r = bus_call_method_async(
1043 m->bus,
1044 NULL,
1045 bus_hostname,
1046 "SetHostname",
1047 set_hostname_handler,
1048 m,
1049 "sb",
1050 hostname,
1051 false);
1052 if (r < 0)
1053 return log_error_errno(r, "Could not set transient hostname: %m");
1054
1055 return 0;
1056 }
1057
1058 static int set_timezone_handler(sd_bus_message *m, void *userdata, sd_bus_error *ret_error) {
1059 const sd_bus_error *e;
1060 int r;
1061
1062 assert(m);
1063
1064 e = sd_bus_message_get_error(m);
1065 if (e) {
1066 r = sd_bus_error_get_errno(e);
1067 log_warning_errno(r, "Could not set timezone: %s", bus_error_message(e, r));
1068 }
1069
1070 return 1;
1071 }
1072
1073 int manager_set_timezone(Manager *m, const char *tz) {
1074 int r;
1075
1076 assert(m);
1077 assert(tz);
1078
1079 log_debug("Setting system timezone: '%s'", tz);
1080 r = free_and_strdup_warn(&m->dynamic_timezone, tz);
1081 if (r < 0)
1082 return r;
1083
1084 if (sd_bus_is_ready(m->bus) <= 0) {
1085 log_debug("Not connected to system bus, setting system timezone later.");
1086 return 0;
1087 }
1088
1089 r = bus_call_method_async(
1090 m->bus,
1091 NULL,
1092 bus_timedate,
1093 "SetTimezone",
1094 set_timezone_handler,
1095 m,
1096 "sb",
1097 tz,
1098 false);
1099 if (r < 0)
1100 return log_error_errno(r, "Could not set timezone: %m");
1101
1102 return 0;
1103 }
1104
1105 int manager_reload(Manager *m) {
1106 Link *link;
1107 int r;
1108
1109 assert(m);
1110
1111 (void) sd_notifyf(/* unset= */ false,
1112 "RELOADING=1\n"
1113 "STATUS=Reloading configuration...\n"
1114 "MONOTONIC_USEC=" USEC_FMT, now(CLOCK_MONOTONIC));
1115
1116 r = netdev_load(m, /* reload= */ true);
1117 if (r < 0)
1118 goto finish;
1119
1120 r = network_reload(m);
1121 if (r < 0)
1122 goto finish;
1123
1124 HASHMAP_FOREACH(link, m->links_by_index) {
1125 r = link_reconfigure(link, /* force = */ false);
1126 if (r < 0)
1127 goto finish;
1128 }
1129
1130 r = 0;
1131 finish:
1132 (void) sd_notify(/* unset= */ false, NOTIFY_READY);
1133 return r;
1134 }