]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/network/networkd-manager.c
bus-polkit: add support for authenticating varlink peers via polkit
[thirdparty/systemd.git] / src / network / networkd-manager.c
CommitLineData
db9ecf05 1/* SPDX-License-Identifier: LGPL-2.1-or-later */
f579559b 2
9aa5d8ba 3#include <netinet/in.h>
091a364c 4#include <sys/socket.h>
9aa5d8ba 5#include <unistd.h>
7b9da386 6#include <linux/if.h>
bce67bbe 7#include <linux/fib_rules.h>
c16c7808 8#include <linux/nexthop.h>
96f5f9ef 9#include <linux/nl80211.h>
3bef724f 10
07630cea 11#include "sd-netlink.h"
fc2f9534 12
b5efdb8a 13#include "alloc-util.h"
f63e09ef 14#include "bus-error.h"
b607fd3f 15#include "bus-locator.h"
ac9f55ed 16#include "bus-log-control-api.h"
269e4d2d 17#include "bus-polkit.h"
a97dcc12 18#include "bus-util.h"
6daaeafe 19#include "common-signal.h"
07630cea 20#include "conf-parser.h"
28db6fbf 21#include "constants.h"
af7a86b8 22#include "daemon-util.h"
1fd3ac1e
YW
23#include "device-private.h"
24#include "device-util.h"
482d1aeb 25#include "dns-domain.h"
3ffd4af2 26#include "fd-util.h"
0d39fa9c 27#include "fileio.h"
761cf19d 28#include "firewall-util.h"
af664001 29#include "fs-util.h"
baa6a42d 30#include "initrd-util.h"
4f5f911e 31#include "local-addresses.h"
07630cea 32#include "netlink-util.h"
dc0d4078 33#include "network-internal.h"
bfbf150e 34#include "networkd-address-pool.h"
3b6a3bde 35#include "networkd-address.h"
cf72a786 36#include "networkd-dhcp-server-bus.h"
ca5ad760 37#include "networkd-dhcp6.h"
6a1af3d4 38#include "networkd-link-bus.h"
23f53b99 39#include "networkd-manager.h"
c5c74d85
LP
40#include "networkd-manager-bus.h"
41#include "networkd-manager-varlink.h"
1939ebeb 42#include "networkd-neighbor.h"
ceac2c2b 43#include "networkd-network-bus.h"
75156ccb 44#include "networkd-nexthop.h"
19d9a5ad 45#include "networkd-queue.h"
3b6a3bde 46#include "networkd-route.h"
ca183bf8 47#include "networkd-routing-policy-rule.h"
a879e1a4 48#include "networkd-speed-meter.h"
3b5a4fc6 49#include "networkd-state-file.h"
96f5f9ef 50#include "networkd-wifi.h"
edb69db2 51#include "networkd-wiphy.h"
00616955 52#include "ordered-set.h"
b0c82192 53#include "path-lookup.h"
07630cea 54#include "path-util.h"
828a81a9 55#include "qdisc.h"
92b555aa 56#include "selinux-util.h"
07630cea 57#include "set.h"
ab76be55 58#include "signal-util.h"
d31f33e3 59#include "stat-util.h"
21486d9e 60#include "strv.h"
4b600505 61#include "sysctl-util.h"
828a81a9 62#include "tclass.h"
e4de7287 63#include "tmpfile-util.h"
af7a86b8 64#include "tuntap.h"
82f52245 65#include "udev-util.h"
505f8da7 66
48d0248e
YW
67/* use 128 MB for receive socket kernel queue. */
68#define RCVBUF_SIZE (128*1024*1024)
be660c37 69
19070062 70static int match_prepare_for_sleep(sd_bus_message *message, void *userdata, sd_bus_error *ret_error) {
99534007 71 Manager *m = ASSERT_PTR(userdata);
a39a9ac8 72 Link *link;
9c0a72f9
TG
73 int b, r;
74
19070062 75 assert(message);
9c0a72f9
TG
76
77 r = sd_bus_message_read(message, "b", &b);
78 if (r < 0) {
d67b1d18 79 bus_log_parse_error(r);
9c0a72f9
TG
80 return 0;
81 }
82
83 if (b)
84 return 0;
85
a39a9ac8 86 log_debug("Coming back from suspend, reconfiguring all connections...");
9c0a72f9 87
a39a9ac8
YW
88 HASHMAP_FOREACH(link, m->links_by_index) {
89 r = link_reconfigure(link, /* force = */ true);
90 if (r < 0) {
91 log_link_warning_errno(link, r, "Failed to reconfigure interface: %m");
92 link_enter_failed(link);
93 }
94 }
9c0a72f9
TG
95
96 return 0;
97}
98
d7afd945 99static int on_connected(sd_bus_message *message, void *userdata, sd_bus_error *ret_error) {
99534007 100 Manager *m = ASSERT_PTR(userdata);
9c0a72f9 101
d7afd945 102 assert(message);
9c0a72f9 103
d7afd945
LP
104 /* Did we get a timezone or transient hostname from DHCP while D-Bus wasn't up yet? */
105 if (m->dynamic_hostname)
106 (void) manager_set_hostname(m, m->dynamic_hostname);
107 if (m->dynamic_timezone)
108 (void) manager_set_timezone(m, m->dynamic_timezone);
ccffa166 109 if (m->product_uuid_requested)
4e26a5ba 110 (void) manager_request_product_uuid(m);
9c0a72f9 111
d7afd945
LP
112 return 0;
113}
9c0a72f9 114
96243149 115static int manager_connect_bus(Manager *m) {
d7afd945
LP
116 int r;
117
118 assert(m);
96243149 119 assert(!m->bus);
7d6884b6 120
621e4509 121 r = bus_open_system_watch_bind_with_description(&m->bus, "bus-api-network");
9c0a72f9 122 if (r < 0)
d7afd945 123 return log_error_errno(r, "Failed to connect to bus: %m");
9c0a72f9 124
6e194652 125 r = bus_add_implementation(m->bus, &manager_object, m);
e331e246 126 if (r < 0)
6e194652 127 return r;
e331e246 128
ac9f55ed
LP
129 r = bus_log_control_api_register(m->bus);
130 if (r < 0)
131 return r;
132
696fc836 133 r = sd_bus_request_name_async(m->bus, NULL, "org.freedesktop.network1", 0, NULL, NULL);
e331e246 134 if (r < 0)
0c0b9306 135 return log_error_errno(r, "Failed to request name: %m");
e331e246
TG
136
137 r = sd_bus_attach_event(m->bus, m->event, 0);
138 if (r < 0)
139 return log_error_errno(r, "Failed to attach bus to event loop: %m");
140
d7afd945
LP
141 r = sd_bus_match_signal_async(
142 m->bus,
cad43595 143 NULL,
d7afd945
LP
144 "org.freedesktop.DBus.Local",
145 NULL,
146 "org.freedesktop.DBus.Local",
147 "Connected",
148 on_connected, NULL, m);
149 if (r < 0)
150 return log_error_errno(r, "Failed to request match on Connected signal: %m");
151
d962e737 152 r = bus_match_signal_async(
d7afd945 153 m->bus,
cad43595 154 NULL,
d962e737 155 bus_login_mgr,
d7afd945
LP
156 "PrepareForSleep",
157 match_prepare_for_sleep, NULL, m);
158 if (r < 0)
159 log_warning_errno(r, "Failed to request match for PrepareForSleep, ignoring: %m");
7901cea1 160
9c0a72f9
TG
161 return 0;
162}
163
1fd3ac1e
YW
164static int manager_process_uevent(sd_device_monitor *monitor, sd_device *device, void *userdata) {
165 Manager *m = ASSERT_PTR(userdata);
166 sd_device_action_t action;
1fd3ac1e
YW
167 int r;
168
169 assert(device);
170
171 r = sd_device_get_action(device, &action);
172 if (r < 0)
173 return log_device_warning_errno(device, r, "Failed to get udev action, ignoring: %m");
174
fb53ee0a 175 if (device_in_subsystem(device, "net"))
1fd3ac1e 176 r = manager_udev_process_link(m, device, action);
fb53ee0a 177 else if (device_in_subsystem(device, "ieee80211"))
c49d5362 178 r = manager_udev_process_wiphy(m, device, action);
fb53ee0a 179 else if (device_in_subsystem(device, "rfkill"))
8642e04b 180 r = manager_udev_process_rfkill(m, device, action);
1fd3ac1e
YW
181 if (r < 0)
182 log_device_warning_errno(device, r, "Failed to process \"%s\" uevent, ignoring: %m",
183 device_action_to_string(action));
184
185 return 0;
186}
187
5fae368b
TG
188static int manager_connect_udev(Manager *m) {
189 int r;
f579559b 190
d31f33e3
YW
191 /* udev does not initialize devices inside containers, so we rely on them being already
192 * initialized before entering the container. */
82f52245 193 if (!udev_available())
5fae368b 194 return 0;
f579559b 195
d2ebf952 196 r = sd_device_monitor_new(&m->device_monitor);
02b59d57 197 if (r < 0)
d2ebf952 198 return log_error_errno(r, "Failed to initialize device monitor: %m");
02b59d57 199
d2ebf952
YW
200 r = sd_device_monitor_filter_add_match_subsystem_devtype(m->device_monitor, "net", NULL);
201 if (r < 0)
1fd3ac1e 202 return log_error_errno(r, "Could not add device monitor filter for net subsystem: %m");
505f8da7 203
c49d5362
YW
204 r = sd_device_monitor_filter_add_match_subsystem_devtype(m->device_monitor, "ieee80211", NULL);
205 if (r < 0)
206 return log_error_errno(r, "Could not add device monitor filter for ieee80211 subsystem: %m");
207
8642e04b
YW
208 r = sd_device_monitor_filter_add_match_subsystem_devtype(m->device_monitor, "rfkill", NULL);
209 if (r < 0)
210 return log_error_errno(r, "Could not add device monitor filter for rfkill subsystem: %m");
211
deb2b734 212 r = sd_device_monitor_attach_event(m->device_monitor, m->event);
5fae368b 213 if (r < 0)
d2ebf952 214 return log_error_errno(r, "Failed to attach event to device monitor: %m");
505f8da7 215
1fd3ac1e 216 r = sd_device_monitor_start(m->device_monitor, manager_process_uevent, m);
505f8da7 217 if (r < 0)
d2ebf952 218 return log_error_errno(r, "Failed to start device monitor: %m");
11a7f229 219
505f8da7
TG
220 return 0;
221}
f579559b 222
af7a86b8
YW
223static int manager_listen_fds(Manager *m, int *ret_rtnl_fd) {
224 _cleanup_strv_free_ char **names = NULL;
254d1313 225 int n, rtnl_fd = -EBADF;
5fae368b 226
af7a86b8
YW
227 assert(m);
228 assert(ret_rtnl_fd);
229
230 n = sd_listen_fds_with_names(/* unset_environment = */ true, &names);
231 if (n < 0)
232 return n;
233
234 if (strv_length(names) != (size_t) n)
5fae368b
TG
235 return -EINVAL;
236
af7a86b8
YW
237 for (int i = 0; i < n; i++) {
238 int fd = i + SD_LISTEN_FDS_START;
239
5fae368b 240 if (sd_is_socket(fd, AF_NETLINK, SOCK_RAW, -1) > 0) {
af7a86b8
YW
241 if (rtnl_fd >= 0) {
242 log_debug("Received multiple netlink socket, ignoring.");
243 safe_close(fd);
244 continue;
245 }
5fae368b
TG
246
247 rtnl_fd = fd;
af7a86b8 248 continue;
5fae368b 249 }
5fae368b 250
af7a86b8
YW
251 if (manager_add_tuntap_fd(m, fd, names[i]) >= 0)
252 continue;
253
254 if (m->test_mode)
255 safe_close(fd);
256 else
257 close_and_notify_warn(fd, names[i]);
258 }
259
260 *ret_rtnl_fd = rtnl_fd;
261 return 0;
5fae368b
TG
262}
263
05d0c2e3
JT
264static int manager_connect_genl(Manager *m) {
265 int r;
266
267 assert(m);
268
269 r = sd_genl_socket_open(&m->genl);
270 if (r < 0)
271 return r;
272
78cca583 273 r = sd_netlink_increase_rxbuf(m->genl, RCVBUF_SIZE);
05d0c2e3 274 if (r < 0)
8c63924c 275 log_warning_errno(r, "Failed to increase receive buffer size for general netlink socket, ignoring: %m");
05d0c2e3
JT
276
277 r = sd_netlink_attach_event(m->genl, m->event, 0);
278 if (r < 0)
279 return r;
280
96f5f9ef
YW
281 r = genl_add_match(m->genl, NULL, NL80211_GENL_NAME, NL80211_MULTICAST_GROUP_CONFIG, 0,
282 &manager_genl_process_nl80211_config, NULL, m, "network-genl_process_nl80211_config");
283 if (r < 0 && r != -EOPNOTSUPP)
284 return r;
285
286 r = genl_add_match(m->genl, NULL, NL80211_GENL_NAME, NL80211_MULTICAST_GROUP_MLME, 0,
287 &manager_genl_process_nl80211_mlme, NULL, m, "network-genl_process_nl80211_mlme");
288 if (r < 0 && r != -EOPNOTSUPP)
289 return r;
290
05d0c2e3
JT
291 return 0;
292}
293
26a8be48
YW
294static int manager_setup_rtnl_filter(Manager *manager) {
295 struct sock_filter filter[] = {
296 /* Check the packet length. */
297 BPF_STMT(BPF_LD + BPF_W + BPF_LEN, 0), /* A <- packet length */
298 BPF_JUMP(BPF_JMP + BPF_JGE + BPF_K, sizeof(struct nlmsghdr), 1, 0), /* A (packet length) >= sizeof(struct nlmsghdr) ? */
299 BPF_STMT(BPF_RET + BPF_K, 0), /* reject */
300 /* Always accept multipart message. */
301 BPF_STMT(BPF_LD + BPF_H + BPF_ABS, offsetof(struct nlmsghdr, nlmsg_flags)), /* A <- message flags */
302 BPF_JUMP(BPF_JMP + BPF_JSET + BPF_K, htobe16(NLM_F_MULTI), 0, 1), /* message flags has NLM_F_MULTI ? */
303 BPF_STMT(BPF_RET + BPF_K, UINT32_MAX), /* accept */
304 /* Accept all message types except for RTM_NEWNEIGH or RTM_DELNEIGH. */
305 BPF_STMT(BPF_LD + BPF_H + BPF_ABS, offsetof(struct nlmsghdr, nlmsg_type)), /* A <- message type */
306 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, htobe16(RTM_NEWNEIGH), 2, 0), /* message type == RTM_NEWNEIGH ? */
307 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, htobe16(RTM_DELNEIGH), 1, 0), /* message type == RTM_DELNEIGH ? */
308 BPF_STMT(BPF_RET + BPF_K, UINT32_MAX), /* accept */
309 /* Check the packet length. */
310 BPF_STMT(BPF_LD + BPF_W + BPF_LEN, 0), /* A <- packet length */
311 BPF_JUMP(BPF_JMP + BPF_JGE + BPF_K, sizeof(struct nlmsghdr) + sizeof(struct ndmsg), 1, 0),
312 /* packet length >= sizeof(struct nlmsghdr) + sizeof(struct ndmsg) ? */
313 BPF_STMT(BPF_RET + BPF_K, 0), /* reject */
314 /* Reject the message when the neighbor state does not have NUD_PERMANENT flag. */
315 BPF_STMT(BPF_LD + BPF_H + BPF_ABS, sizeof(struct nlmsghdr) + offsetof(struct ndmsg, ndm_state)),
316 /* A <- neighbor state */
317 BPF_JUMP(BPF_JMP + BPF_JSET + BPF_K, htobe16(NUD_PERMANENT), 1, 0), /* neighbor state has NUD_PERMANENT ? */
318 BPF_STMT(BPF_RET + BPF_K, 0), /* reject */
319 BPF_STMT(BPF_RET + BPF_K, UINT32_MAX), /* accept */
320 };
321
322 assert(manager);
323 assert(manager->rtnl);
324
325 return sd_netlink_attach_filter(manager->rtnl, ELEMENTSOF(filter), filter);
326}
327
af7a86b8
YW
328static int manager_connect_rtnl(Manager *m, int fd) {
329 _unused_ _cleanup_close_ int fd_close = fd;
330 int r;
505f8da7
TG
331
332 assert(m);
505f8da7 333
af7a86b8
YW
334 /* This takes input fd. */
335
5fae368b 336 if (fd < 0)
1c4baffc 337 r = sd_netlink_open(&m->rtnl);
5fae368b 338 else
1c4baffc 339 r = sd_netlink_open_fd(&m->rtnl, fd);
505f8da7
TG
340 if (r < 0)
341 return r;
af7a86b8 342 TAKE_FD(fd_close);
505f8da7 343
e13af7bd
YW
344 /* Bump receiver buffer, but only if we are not called via socket activation, as in that
345 * case systemd sets the receive buffer size for us, and the value in the .socket unit
346 * should take full effect. */
347 if (fd < 0) {
78cca583 348 r = sd_netlink_increase_rxbuf(m->rtnl, RCVBUF_SIZE);
e13af7bd
YW
349 if (r < 0)
350 log_warning_errno(r, "Failed to increase receive buffer size for rtnl socket, ignoring: %m");
351 }
f579559b 352
1c4baffc 353 r = sd_netlink_attach_event(m->rtnl, m->event, 0);
505f8da7
TG
354 if (r < 0)
355 return r;
f579559b 356
8dfed23d 357 r = netlink_add_match(m->rtnl, NULL, RTM_NEWLINK, &manager_rtnl_process_link, NULL, m, "network-rtnl_process_link");
5fae368b
TG
358 if (r < 0)
359 return r;
505f8da7 360
8dfed23d 361 r = netlink_add_match(m->rtnl, NULL, RTM_DELLINK, &manager_rtnl_process_link, NULL, m, "network-rtnl_process_link");
5fae368b
TG
362 if (r < 0)
363 return r;
45af44d4 364
828a81a9
YW
365 r = netlink_add_match(m->rtnl, NULL, RTM_NEWQDISC, &manager_rtnl_process_qdisc, NULL, m, "network-rtnl_process_qdisc");
366 if (r < 0)
367 return r;
368
369 r = netlink_add_match(m->rtnl, NULL, RTM_DELQDISC, &manager_rtnl_process_qdisc, NULL, m, "network-rtnl_process_qdisc");
370 if (r < 0)
371 return r;
372
373 r = netlink_add_match(m->rtnl, NULL, RTM_NEWTCLASS, &manager_rtnl_process_tclass, NULL, m, "network-rtnl_process_tclass");
374 if (r < 0)
375 return r;
376
377 r = netlink_add_match(m->rtnl, NULL, RTM_DELTCLASS, &manager_rtnl_process_tclass, NULL, m, "network-rtnl_process_tclass");
378 if (r < 0)
379 return r;
380
8dfed23d 381 r = netlink_add_match(m->rtnl, NULL, RTM_NEWADDR, &manager_rtnl_process_address, NULL, m, "network-rtnl_process_address");
5fae368b
TG
382 if (r < 0)
383 return r;
384
8dfed23d 385 r = netlink_add_match(m->rtnl, NULL, RTM_DELADDR, &manager_rtnl_process_address, NULL, m, "network-rtnl_process_address");
5fae368b
TG
386 if (r < 0)
387 return r;
388
8dfed23d 389 r = netlink_add_match(m->rtnl, NULL, RTM_NEWNEIGH, &manager_rtnl_process_neighbor, NULL, m, "network-rtnl_process_neighbor");
d1bdafd2
WKI
390 if (r < 0)
391 return r;
392
8dfed23d 393 r = netlink_add_match(m->rtnl, NULL, RTM_DELNEIGH, &manager_rtnl_process_neighbor, NULL, m, "network-rtnl_process_neighbor");
d1bdafd2
WKI
394 if (r < 0)
395 return r;
396
8dfed23d 397 r = netlink_add_match(m->rtnl, NULL, RTM_NEWROUTE, &manager_rtnl_process_route, NULL, m, "network-rtnl_process_route");
1c8e710c
TG
398 if (r < 0)
399 return r;
400
8dfed23d 401 r = netlink_add_match(m->rtnl, NULL, RTM_DELROUTE, &manager_rtnl_process_route, NULL, m, "network-rtnl_process_route");
1c8e710c
TG
402 if (r < 0)
403 return r;
404
8dfed23d 405 r = netlink_add_match(m->rtnl, NULL, RTM_NEWRULE, &manager_rtnl_process_rule, NULL, m, "network-rtnl_process_rule");
bce67bbe
SS
406 if (r < 0)
407 return r;
408
8dfed23d 409 r = netlink_add_match(m->rtnl, NULL, RTM_DELRULE, &manager_rtnl_process_rule, NULL, m, "network-rtnl_process_rule");
bce67bbe
SS
410 if (r < 0)
411 return r;
412
8dfed23d 413 r = netlink_add_match(m->rtnl, NULL, RTM_NEWNEXTHOP, &manager_rtnl_process_nexthop, NULL, m, "network-rtnl_process_nexthop");
c16c7808
SS
414 if (r < 0)
415 return r;
416
8dfed23d 417 r = netlink_add_match(m->rtnl, NULL, RTM_DELNEXTHOP, &manager_rtnl_process_nexthop, NULL, m, "network-rtnl_process_nexthop");
c16c7808
SS
418 if (r < 0)
419 return r;
420
26a8be48 421 return manager_setup_rtnl_filter(m);
45af44d4 422}
505f8da7 423
2e1113b7
YW
424static int manager_post_handler(sd_event_source *s, void *userdata) {
425 Manager *manager = ASSERT_PTR(userdata);
84de38c5 426
e36d8e48 427 (void) manager_process_requests(manager);
2e1113b7
YW
428 (void) manager_clean_all(manager);
429 return 0;
84de38c5
TG
430}
431
ab76be55 432static int signal_terminate_callback(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
99534007 433 Manager *m = ASSERT_PTR(userdata);
ab76be55 434
ab76be55
ZJS
435 m->restarting = false;
436
437 log_debug("Terminate operation initiated.");
438
439 return sd_event_exit(sd_event_source_get_event(s), 0);
440}
441
442static int signal_restart_callback(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
99534007 443 Manager *m = ASSERT_PTR(userdata);
ab76be55 444
ab76be55
ZJS
445 m->restarting = true;
446
447 log_debug("Restart operation initiated.");
448
449 return sd_event_exit(sd_event_source_get_event(s), 0);
450}
451
0e07cdb0
LP
452static int signal_reload_callback(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
453 Manager *m = ASSERT_PTR(userdata);
454
455 manager_reload(m);
456
457 return 0;
458}
459
ea853de5
YW
460static int manager_set_keep_configuration(Manager *m) {
461 int r;
462
463 assert(m);
464
465 if (in_initrd()) {
466 log_debug("Running in initrd, keep DHCPv4 addresses on stopping networkd by default.");
467 m->keep_configuration = KEEP_CONFIGURATION_DHCP_ON_STOP;
468 return 0;
469 }
470
471 r = path_is_network_fs("/");
472 if (r < 0)
473 return log_error_errno(r, "Failed to detect if root is network filesystem: %m");
474 if (r == 0) {
475 m->keep_configuration = _KEEP_CONFIGURATION_INVALID;
476 return 0;
477 }
478
479 log_debug("Running on network filesystem, enabling KeepConfiguration= by default.");
480 m->keep_configuration = KEEP_CONFIGURATION_YES;
481 return 0;
482}
483
4c78dc17 484int manager_setup(Manager *m) {
254d1313 485 _cleanup_close_ int rtnl_fd = -EBADF;
45af44d4 486 int r;
f579559b 487
96243149 488 assert(m);
5fae368b 489
3534a043
YW
490 r = sd_event_default(&m->event);
491 if (r < 0)
492 return r;
493
05e21627 494 (void) sd_event_set_watchdog(m->event, true);
0e07cdb0
LP
495 (void) sd_event_add_signal(m->event, NULL, SIGTERM | SD_EVENT_SIGNAL_PROCMASK, signal_terminate_callback, m);
496 (void) sd_event_add_signal(m->event, NULL, SIGINT | SD_EVENT_SIGNAL_PROCMASK, signal_terminate_callback, m);
497 (void) sd_event_add_signal(m->event, NULL, SIGUSR2 | SD_EVENT_SIGNAL_PROCMASK, signal_restart_callback, m);
498 (void) sd_event_add_signal(m->event, NULL, SIGHUP | SD_EVENT_SIGNAL_PROCMASK, signal_reload_callback, m);
6daaeafe
LP
499 (void) sd_event_add_signal(m->event, NULL, (SIGRTMIN+18) | SD_EVENT_SIGNAL_PROCMASK, sigrtmin18_handler, NULL);
500
501 r = sd_event_add_memory_pressure(m->event, NULL, NULL, NULL);
502 if (r < 0)
503 log_debug_errno(r, "Failed allocate memory pressure event source, ignoring: %m");
5fae368b 504
2e1113b7 505 r = sd_event_add_post(m->event, NULL, manager_post_handler, m);
84de38c5
TG
506 if (r < 0)
507 return r;
508
af7a86b8
YW
509 r = manager_listen_fds(m, &rtnl_fd);
510 if (r < 0)
511 return r;
512
513 r = manager_connect_rtnl(m, TAKE_FD(rtnl_fd));
45af44d4
TG
514 if (r < 0)
515 return r;
516
05d0c2e3
JT
517 r = manager_connect_genl(m);
518 if (r < 0)
519 return r;
520
4c78dc17 521 if (m->test_mode)
96243149
YW
522 return 0;
523
c5c74d85
LP
524 r = manager_connect_varlink(m);
525 if (r < 0)
526 return r;
527
96243149
YW
528 r = manager_connect_bus(m);
529 if (r < 0)
530 return r;
531
5fae368b
TG
532 r = manager_connect_udev(m);
533 if (r < 0)
534 return r;
45af44d4 535
05d0c2e3
JT
536 r = sd_resolve_default(&m->resolve);
537 if (r < 0)
538 return r;
539
540 r = sd_resolve_attach_event(m->resolve, m->event, 0);
541 if (r < 0)
542 return r;
543
ed76f585 544 r = address_pool_setup_default(m);
5fae368b
TG
545 if (r < 0)
546 return r;
f579559b 547
ea853de5
YW
548 r = manager_set_keep_configuration(m);
549 if (r < 0)
550 return r;
551
96243149
YW
552 m->state_file = strdup("/run/systemd/netif/state");
553 if (!m->state_file)
554 return -ENOMEM;
555
556 return 0;
557}
558
4c78dc17 559int manager_new(Manager **ret, bool test_mode) {
96243149 560 _cleanup_(manager_freep) Manager *m = NULL;
f579559b 561
96243149
YW
562 m = new(Manager, 1);
563 if (!m)
564 return -ENOMEM;
565
566 *m = (Manager) {
ea853de5 567 .keep_configuration = _KEEP_CONFIGURATION_INVALID,
932ef6ec 568 .ipv6_privacy_extensions = IPV6_PRIVACY_EXTENSIONS_NO,
4c78dc17 569 .test_mode = test_mode,
96243149
YW
570 .speed_meter_interval_usec = SPEED_METER_DEFAULT_TIME_INTERVAL,
571 .online_state = _LINK_ONLINE_STATE_INVALID,
572 .manage_foreign_routes = true,
573 .manage_foreign_rules = true,
bbc05bec 574 .manage_foreign_nexthops = true,
254d1313 575 .ethtool_fd = -EBADF,
96243149
YW
576 .dhcp_duid.type = DUID_TYPE_EN,
577 .dhcp6_duid.type = DUID_TYPE_EN,
578 .duid_product_uuid.type = DUID_TYPE_UUID,
579 };
580
581 *ret = TAKE_PTR(m);
f579559b
TG
582 return 0;
583}
584
75db809a 585Manager* manager_free(Manager *m) {
5fae368b 586 Link *link;
f579559b 587
5fae368b 588 if (!m)
75db809a 589 return NULL;
505f8da7 590
5fae368b 591 free(m->state_file);
505f8da7 592
6eab614d 593 HASHMAP_FOREACH(link, m->links_by_index)
2a99eed0 594 (void) link_stop_engines(link, true);
946f8e14 595
40b12fa2 596 m->request_queue = ordered_set_free(m->request_queue);
19d9a5ad 597
c4397d94 598 m->dirty_links = set_free_with_destructor(m->dirty_links, link_unref);
9c5b8d46 599 m->new_wlan_ifindices = set_free(m->new_wlan_ifindices);
0b54c870 600 m->links_by_name = hashmap_free(m->links_by_name);
fe321d45 601 m->links_by_hw_addr = hashmap_free(m->links_by_hw_addr);
a27588d4 602 m->links_by_dhcp_pd_subnet_prefix = hashmap_free(m->links_by_dhcp_pd_subnet_prefix);
6eab614d 603 m->links_by_index = hashmap_free_with_destructor(m->links_by_index, link_unref);
27dfc982 604
a27588d4 605 m->dhcp_pd_subnet_ids = set_free(m->dhcp_pd_subnet_ids);
715d398e 606 m->networks = ordered_hashmap_free_with_destructor(m->networks, network_unref);
dbffab87 607
c4397d94 608 m->netdevs = hashmap_free_with_destructor(m->netdevs, netdev_unref);
5fae368b 609
af7a86b8
YW
610 m->tuntap_fds_by_name = hashmap_free(m->tuntap_fds_by_name);
611
edb69db2
YW
612 m->wiphy_by_name = hashmap_free(m->wiphy_by_name);
613 m->wiphy_by_index = hashmap_free_with_destructor(m->wiphy_by_index, wiphy_free);
614
bfbf150e 615 ordered_set_free_free(m->address_pools);
5fae368b 616
552b90a2
YW
617 hashmap_free(m->route_table_names_by_number);
618 hashmap_free(m->route_table_numbers_by_name);
c038ce46 619
eb72fa3a 620 set_free(m->rules);
bce67bbe 621
d4df6326
SS
622 sd_netlink_unref(m->rtnl);
623 sd_netlink_unref(m->genl);
624 sd_resolve_unref(m->resolve);
625
450fa34b
YW
626 /* reject (e.g. unreachable) type routes are managed by Manager, but may be referenced by a
627 * link. E.g., DHCP6 with prefix delegation creates unreachable routes, and they are referenced
628 * by the upstream link. And the links may be referenced by netlink slots. Hence, two
629 * set_free() must be called after the above sd_netlink_unref(). */
630 m->routes = set_free(m->routes);
450fa34b 631
69e244e3 632 m->nexthops_by_id = hashmap_free(m->nexthops_by_id);
fb126bb1 633 m->nexthop_ids = set_free(m->nexthop_ids);
69e244e3 634
a879e1a4 635 sd_event_source_unref(m->speed_meter_event_source);
2f5b4a77 636 sd_event_unref(m->event);
5fae368b 637
d2ebf952 638 sd_device_monitor_unref(m->device_monitor);
7d20d375 639
c5c74d85
LP
640 manager_varlink_done(m);
641
15761549 642 bus_verify_polkit_async_registry_free(m->polkit_registry);
92e31da1 643 sd_bus_flush_close_unref(m->bus);
7d20d375 644
7901cea1
MP
645 free(m->dynamic_timezone);
646 free(m->dynamic_hostname);
647
c643bda5
YW
648 safe_close(m->ethtool_fd);
649
761cf19d
FW
650 m->fw_ctx = fw_ctx_free(m->fw_ctx);
651
75db809a 652 return mfree(m);
5fae368b
TG
653}
654
b76d99d9 655int manager_start(Manager *m) {
84de38c5 656 Link *link;
a879e1a4 657 int r;
84de38c5 658
a97dcc12
TG
659 assert(m);
660
a879e1a4
YW
661 r = manager_start_speed_meter(m);
662 if (r < 0)
663 return log_error_errno(r, "Failed to initialize speed meter: %m");
664
84de38c5
TG
665 /* The dirty handler will deal with future serialization, but the first one
666 must be done explicitly. */
667
d23a66f2
YW
668 r = manager_save(m);
669 if (r < 0)
670 log_warning_errno(r, "Failed to update state file %s, ignoring: %m", m->state_file);
84de38c5 671
6eab614d 672 HASHMAP_FOREACH(link, m->links_by_index) {
ac4a6950 673 r = link_save_and_clean(link);
d23a66f2
YW
674 if (r < 0)
675 log_link_warning_errno(link, r, "Failed to update link state file %s, ignoring: %m", link->state_file);
676 }
84de38c5 677
b76d99d9 678 return 0;
a97dcc12
TG
679}
680
5fae368b
TG
681int manager_load_config(Manager *m) {
682 int r;
683
e272b621 684 r = netdev_load(m, false);
f579559b
TG
685 if (r < 0)
686 return r;
687
af7a86b8
YW
688 manager_clear_unmanaged_tuntap_fds(m);
689
7f06b3e1 690 r = network_load(m, &m->networks);
9021bb9f
TG
691 if (r < 0)
692 return r;
693
fb126bb1
YW
694 r = manager_build_dhcp_pd_subnet_ids(m);
695 if (r < 0)
696 return r;
697
698 r = manager_build_nexthop_ids(m);
699 if (r < 0)
700 return r;
701
702 return 0;
f579559b 703}
f882c247 704
41476186 705int manager_enumerate_internal(
446aaaf3 706 Manager *m,
bdcd4ab2 707 sd_netlink *nl,
446aaaf3 708 sd_netlink_message *req,
f12629ae 709 int (*process)(sd_netlink *, sd_netlink_message *, Manager *)) {
446aaaf3
YW
710
711 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *reply = NULL;
1339b950 712 int r;
f882c247 713
5da8149f 714 assert(m);
bdcd4ab2 715 assert(nl);
446aaaf3
YW
716 assert(req);
717 assert(process);
f882c247 718
24c0f385 719 r = sd_netlink_message_set_request_dump(req, true);
dd3efc09
TG
720 if (r < 0)
721 return r;
722
bdcd4ab2 723 r = sd_netlink_call(nl, req, 0, &reply);
f12629ae 724 if (r < 0)
f2236469
TG
725 return r;
726
a6b08423 727 m->enumerating = true;
1339b950
ZJS
728 for (sd_netlink_message *reply_one = reply; reply_one; reply_one = sd_netlink_message_next(reply_one))
729 RET_GATHER(r, process(nl, reply_one, m));
a6b08423 730 m->enumerating = false;
2e9f08ea 731
5fae368b 732 return r;
f882c247 733}
3bef724f 734
446aaaf3
YW
735static int manager_enumerate_links(Manager *m) {
736 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
1346b1f0
TG
737 int r;
738
5fae368b
TG
739 assert(m);
740 assert(m->rtnl);
bcbca829 741
446aaaf3 742 r = sd_rtnl_message_new_link(m->rtnl, &req, RTM_GETLINK, 0);
5fae368b
TG
743 if (r < 0)
744 return r;
745
11cee6ef
YW
746 r = manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_link);
747 if (r < 0)
748 return r;
749
750 req = sd_netlink_message_unref(req);
751
752 r = sd_rtnl_message_new_link(m->rtnl, &req, RTM_GETLINK, 0);
753 if (r < 0)
754 return r;
755
756 r = sd_rtnl_message_link_set_family(req, AF_BRIDGE);
757 if (r < 0)
758 return r;
759
f12629ae 760 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_link);
446aaaf3 761}
5fae368b 762
828a81a9
YW
763static int manager_enumerate_qdisc(Manager *m) {
764 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
765 int r;
766
767 assert(m);
768 assert(m->rtnl);
769
770 r = sd_rtnl_message_new_traffic_control(m->rtnl, &req, RTM_GETQDISC, 0, 0, 0);
771 if (r < 0)
772 return r;
773
774 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_qdisc);
775}
776
777static int manager_enumerate_tclass(Manager *m) {
41476186
YW
778 Link *link;
779 int r = 0;
828a81a9
YW
780
781 assert(m);
782 assert(m->rtnl);
783
41476186
YW
784 /* TC class can be enumerated only per link. See tc_dump_tclass() in net/sched/sched_api.c. */
785
786 HASHMAP_FOREACH(link, m->links_by_index)
787 RET_GATHER(r, link_enumerate_tclass(link, 0));
828a81a9 788
41476186 789 return r;
828a81a9
YW
790}
791
446aaaf3
YW
792static int manager_enumerate_addresses(Manager *m) {
793 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
794 int r;
6a24f148 795
446aaaf3
YW
796 assert(m);
797 assert(m->rtnl);
6a24f148 798
446aaaf3
YW
799 r = sd_rtnl_message_new_addr(m->rtnl, &req, RTM_GETADDR, 0, 0);
800 if (r < 0)
801 return r;
5fae368b 802
f12629ae 803 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_address);
1346b1f0 804}
d1bdafd2 805
446aaaf3
YW
806static int manager_enumerate_neighbors(Manager *m) {
807 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
d1bdafd2
WKI
808 int r;
809
810 assert(m);
811 assert(m->rtnl);
812
813 r = sd_rtnl_message_new_neigh(m->rtnl, &req, RTM_GETNEIGH, 0, AF_UNSPEC);
814 if (r < 0)
815 return r;
816
f12629ae 817 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_neighbor);
d1bdafd2 818}
1346b1f0 819
446aaaf3
YW
820static int manager_enumerate_routes(Manager *m) {
821 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
1c8e710c
TG
822 int r;
823
824 assert(m);
825 assert(m->rtnl);
826
5ff1ef31
YW
827 if (!m->manage_foreign_routes)
828 return 0;
829
1c8e710c
TG
830 r = sd_rtnl_message_new_route(m->rtnl, &req, RTM_GETROUTE, 0, 0);
831 if (r < 0)
832 return r;
833
f12629ae 834 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_route);
1c8e710c
TG
835}
836
446aaaf3
YW
837static int manager_enumerate_rules(Manager *m) {
838 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
bce67bbe
SS
839 int r;
840
841 assert(m);
842 assert(m->rtnl);
843
d94dfe70
YW
844 if (!m->manage_foreign_rules)
845 return 0;
846
bce67bbe
SS
847 r = sd_rtnl_message_new_routing_policy_rule(m->rtnl, &req, RTM_GETRULE, 0);
848 if (r < 0)
849 return r;
850
f12629ae 851 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_rule);
bce67bbe
SS
852}
853
446aaaf3
YW
854static int manager_enumerate_nexthop(Manager *m) {
855 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
c16c7808
SS
856 int r;
857
858 assert(m);
859 assert(m->rtnl);
860
bbc05bec
YW
861 if (!m->manage_foreign_nexthops)
862 return 0;
863
c16c7808
SS
864 r = sd_rtnl_message_new_nexthop(m->rtnl, &req, RTM_GETNEXTHOP, 0, 0);
865 if (r < 0)
866 return r;
867
f12629ae 868 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_nexthop);
446aaaf3 869}
c16c7808 870
edb69db2
YW
871static int manager_enumerate_nl80211_wiphy(Manager *m) {
872 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
873 int r;
874
875 assert(m);
876 assert(m->genl);
877
878 r = sd_genl_message_new(m->genl, NL80211_GENL_NAME, NL80211_CMD_GET_WIPHY, &req);
879 if (r < 0)
880 return r;
881
882 return manager_enumerate_internal(m, m->genl, req, manager_genl_process_nl80211_wiphy);
883}
884
96f5f9ef
YW
885static int manager_enumerate_nl80211_config(Manager *m) {
886 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
887 int r;
888
889 assert(m);
890 assert(m->genl);
891
892 r = sd_genl_message_new(m->genl, NL80211_GENL_NAME, NL80211_CMD_GET_INTERFACE, &req);
893 if (r < 0)
894 return r;
895
896 return manager_enumerate_internal(m, m->genl, req, manager_genl_process_nl80211_config);
897}
898
899static int manager_enumerate_nl80211_mlme(Manager *m) {
900 Link *link;
901 int r;
902
903 assert(m);
904 assert(m->genl);
905
906 HASHMAP_FOREACH(link, m->links_by_index) {
907 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
908
909 if (link->wlan_iftype != NL80211_IFTYPE_STATION)
910 continue;
911
912 r = sd_genl_message_new(m->genl, NL80211_GENL_NAME, NL80211_CMD_GET_STATION, &req);
913 if (r < 0)
914 return r;
915
916 r = sd_netlink_message_append_u32(req, NL80211_ATTR_IFINDEX, link->ifindex);
917 if (r < 0)
918 return r;
919
920 r = manager_enumerate_internal(m, m->genl, req, manager_genl_process_nl80211_mlme);
921 if (r < 0)
922 return r;
923 }
924
925 return 0;
926}
927
446aaaf3
YW
928int manager_enumerate(Manager *m) {
929 int r;
c16c7808 930
446aaaf3
YW
931 r = manager_enumerate_links(m);
932 if (r < 0)
933 return log_error_errno(r, "Could not enumerate links: %m");
c16c7808 934
828a81a9 935 r = manager_enumerate_qdisc(m);
15ac2a62
YW
936 if (r == -EOPNOTSUPP)
937 log_debug_errno(r, "Could not enumerate QDiscs, ignoring: %m");
938 else if (r < 0)
828a81a9
YW
939 return log_error_errno(r, "Could not enumerate QDisc: %m");
940
941 r = manager_enumerate_tclass(m);
15ac2a62
YW
942 if (r == -EOPNOTSUPP)
943 log_debug_errno(r, "Could not enumerate TClasses, ignoring: %m");
944 else if (r < 0)
828a81a9
YW
945 return log_error_errno(r, "Could not enumerate TClass: %m");
946
446aaaf3
YW
947 r = manager_enumerate_addresses(m);
948 if (r < 0)
949 return log_error_errno(r, "Could not enumerate addresses: %m");
c16c7808 950
446aaaf3
YW
951 r = manager_enumerate_neighbors(m);
952 if (r < 0)
953 return log_error_errno(r, "Could not enumerate neighbors: %m");
c16c7808 954
f12629ae
YW
955 /* NextHop support is added in kernel v5.3 (65ee00a9409f751188a8cdc0988167858eb4a536),
956 * and older kernels return -EOPNOTSUPP, or -EINVAL if SELinux is enabled. */
0c0585ca 957 r = manager_enumerate_nexthop(m);
f12629ae
YW
958 if (r == -EOPNOTSUPP || (r == -EINVAL && mac_selinux_enforcing()))
959 log_debug_errno(r, "Could not enumerate nexthops, ignoring: %m");
960 else if (r < 0)
961 return log_error_errno(r, "Could not enumerate nexthops: %m");
0c0585ca 962
446aaaf3
YW
963 r = manager_enumerate_routes(m);
964 if (r < 0)
965 return log_error_errno(r, "Could not enumerate routes: %m");
c16c7808 966
f12629ae 967 /* If kernel is built with CONFIG_FIB_RULES=n, it returns -EOPNOTSUPP. */
446aaaf3 968 r = manager_enumerate_rules(m);
f12629ae
YW
969 if (r == -EOPNOTSUPP)
970 log_debug_errno(r, "Could not enumerate routing policy rules, ignoring: %m");
971 else if (r < 0)
446aaaf3 972 return log_error_errno(r, "Could not enumerate routing policy rules: %m");
c16c7808 973
edb69db2
YW
974 r = manager_enumerate_nl80211_wiphy(m);
975 if (r == -EOPNOTSUPP)
976 log_debug_errno(r, "Could not enumerate wireless LAN phy, ignoring: %m");
977 else if (r < 0)
978 return log_error_errno(r, "Could not enumerate wireless LAN phy: %m");
979
96f5f9ef
YW
980 r = manager_enumerate_nl80211_config(m);
981 if (r == -EOPNOTSUPP)
982 log_debug_errno(r, "Could not enumerate wireless LAN interfaces, ignoring: %m");
983 else if (r < 0)
984 return log_error_errno(r, "Could not enumerate wireless LAN interfaces: %m");
985
986 r = manager_enumerate_nl80211_mlme(m);
987 if (r == -EOPNOTSUPP)
988 log_debug_errno(r, "Could not enumerate wireless LAN stations, ignoring: %m");
989 else if (r < 0)
990 return log_error_errno(r, "Could not enumerate wireless LAN stations: %m");
991
446aaaf3 992 return 0;
c16c7808
SS
993}
994
59eb33e0 995static int set_hostname_handler(sd_bus_message *m, void *userdata, sd_bus_error *ret_error) {
59eb33e0 996 const sd_bus_error *e;
f63e09ef 997 int r;
59eb33e0
MP
998
999 assert(m);
59eb33e0
MP
1000
1001 e = sd_bus_message_get_error(m);
f63e09ef
YW
1002 if (e) {
1003 r = sd_bus_error_get_errno(e);
1004 log_warning_errno(r, "Could not set hostname: %s", bus_error_message(e, r));
1005 }
59eb33e0
MP
1006
1007 return 1;
1008}
1009
1010int manager_set_hostname(Manager *m, const char *hostname) {
1011 int r;
1012
1013 log_debug("Setting transient hostname: '%s'", strna(hostname));
d7afd945 1014
b3f9c17a
YW
1015 r = free_and_strdup_warn(&m->dynamic_hostname, hostname);
1016 if (r < 0)
1017 return r;
59eb33e0 1018
5dbec9bd
ZJS
1019 if (sd_bus_is_ready(m->bus) <= 0) {
1020 log_debug("Not connected to system bus, setting system hostname later.");
59eb33e0
MP
1021 return 0;
1022 }
1023
d2775306 1024 r = bus_call_method_async(
59eb33e0
MP
1025 m->bus,
1026 NULL,
d2775306 1027 bus_hostname,
59eb33e0
MP
1028 "SetHostname",
1029 set_hostname_handler,
1030 m,
1031 "sb",
1032 hostname,
1033 false);
59eb33e0
MP
1034 if (r < 0)
1035 return log_error_errno(r, "Could not set transient hostname: %m");
1036
1037 return 0;
1038}
1039
1040static int set_timezone_handler(sd_bus_message *m, void *userdata, sd_bus_error *ret_error) {
59eb33e0 1041 const sd_bus_error *e;
f63e09ef 1042 int r;
59eb33e0
MP
1043
1044 assert(m);
59eb33e0
MP
1045
1046 e = sd_bus_message_get_error(m);
f63e09ef
YW
1047 if (e) {
1048 r = sd_bus_error_get_errno(e);
1049 log_warning_errno(r, "Could not set timezone: %s", bus_error_message(e, r));
1050 }
59eb33e0
MP
1051
1052 return 1;
1053}
1054
1055int manager_set_timezone(Manager *m, const char *tz) {
1056 int r;
1057
1058 assert(m);
1059 assert(tz);
1060
1061 log_debug("Setting system timezone: '%s'", tz);
b3f9c17a
YW
1062 r = free_and_strdup_warn(&m->dynamic_timezone, tz);
1063 if (r < 0)
1064 return r;
59eb33e0 1065
5dbec9bd
ZJS
1066 if (sd_bus_is_ready(m->bus) <= 0) {
1067 log_debug("Not connected to system bus, setting system timezone later.");
59eb33e0
MP
1068 return 0;
1069 }
1070
b607fd3f 1071 r = bus_call_method_async(
59eb33e0
MP
1072 m->bus,
1073 NULL,
b607fd3f 1074 bus_timedate,
59eb33e0
MP
1075 "SetTimezone",
1076 set_timezone_handler,
1077 m,
1078 "sb",
1079 tz,
1080 false);
1081 if (r < 0)
1082 return log_error_errno(r, "Could not set timezone: %m");
1083
1084 return 0;
1085}
0e07cdb0
LP
1086
1087int manager_reload(Manager *m) {
1088 Link *link;
1089 int r;
1090
1091 assert(m);
1092
1093 (void) sd_notifyf(/* unset= */ false,
1094 "RELOADING=1\n"
1095 "STATUS=Reloading configuration...\n"
1096 "MONOTONIC_USEC=" USEC_FMT, now(CLOCK_MONOTONIC));
1097
1098 r = netdev_load(m, /* reload= */ true);
1099 if (r < 0)
1100 goto finish;
1101
1102 r = network_reload(m);
1103 if (r < 0)
1104 goto finish;
1105
1106 HASHMAP_FOREACH(link, m->links_by_index) {
1107 r = link_reconfigure(link, /* force = */ false);
1108 if (r < 0)
1109 goto finish;
1110 }
1111
1112 r = 0;
1113finish:
1114 (void) sd_notify(/* unset= */ false, NOTIFY_READY);
1115 return r;
1116}