]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/network/networkd-manager.c
network/tuntap: introduce KeepCarrier= setting
[thirdparty/systemd.git] / src / network / networkd-manager.c
CommitLineData
db9ecf05 1/* SPDX-License-Identifier: LGPL-2.1-or-later */
f579559b 2
9aa5d8ba 3#include <netinet/in.h>
091a364c 4#include <sys/socket.h>
9aa5d8ba 5#include <unistd.h>
bbf7c048 6#include <linux/if.h>
bce67bbe 7#include <linux/fib_rules.h>
c16c7808 8#include <linux/nexthop.h>
96f5f9ef 9#include <linux/nl80211.h>
3bef724f 10
fc2f9534 11#include "sd-daemon.h"
07630cea 12#include "sd-netlink.h"
fc2f9534 13
b5efdb8a 14#include "alloc-util.h"
f63e09ef 15#include "bus-error.h"
b607fd3f 16#include "bus-locator.h"
ac9f55ed 17#include "bus-log-control-api.h"
269e4d2d 18#include "bus-polkit.h"
a97dcc12 19#include "bus-util.h"
07630cea 20#include "conf-parser.h"
a97dcc12 21#include "def.h"
1fd3ac1e
YW
22#include "device-private.h"
23#include "device-util.h"
482d1aeb 24#include "dns-domain.h"
3ffd4af2 25#include "fd-util.h"
0d39fa9c 26#include "fileio.h"
761cf19d 27#include "firewall-util.h"
af664001 28#include "fs-util.h"
4f5f911e 29#include "local-addresses.h"
07630cea 30#include "netlink-util.h"
dc0d4078 31#include "network-internal.h"
bfbf150e 32#include "networkd-address-pool.h"
3b6a3bde 33#include "networkd-address.h"
cf72a786 34#include "networkd-dhcp-server-bus.h"
ca5ad760 35#include "networkd-dhcp6.h"
6a1af3d4 36#include "networkd-link-bus.h"
79a59fa5 37#include "networkd-manager-bus.h"
23f53b99 38#include "networkd-manager.h"
1939ebeb 39#include "networkd-neighbor.h"
ceac2c2b 40#include "networkd-network-bus.h"
75156ccb 41#include "networkd-nexthop.h"
19d9a5ad 42#include "networkd-queue.h"
3b6a3bde 43#include "networkd-route.h"
ca183bf8 44#include "networkd-routing-policy-rule.h"
a879e1a4 45#include "networkd-speed-meter.h"
3b5a4fc6 46#include "networkd-state-file.h"
96f5f9ef 47#include "networkd-wifi.h"
edb69db2 48#include "networkd-wiphy.h"
00616955 49#include "ordered-set.h"
b0c82192 50#include "path-lookup.h"
07630cea 51#include "path-util.h"
828a81a9 52#include "qdisc.h"
92b555aa 53#include "selinux-util.h"
07630cea 54#include "set.h"
ab76be55 55#include "signal-util.h"
d31f33e3 56#include "stat-util.h"
21486d9e 57#include "strv.h"
4b600505 58#include "sysctl-util.h"
828a81a9 59#include "tclass.h"
e4de7287 60#include "tmpfile-util.h"
82f52245 61#include "udev-util.h"
505f8da7 62
48d0248e
YW
63/* use 128 MB for receive socket kernel queue. */
64#define RCVBUF_SIZE (128*1024*1024)
be660c37 65
9c0a72f9
TG
66static int manager_reset_all(Manager *m) {
67 Link *link;
9c0a72f9
TG
68 int r;
69
70 assert(m);
71
6eab614d 72 HASHMAP_FOREACH(link, m->links_by_index) {
d09a179e 73 r = link_reconfigure_after_sleep(link);
f0269653 74 if (r < 0) {
d09a179e 75 log_link_warning_errno(link, r, "Failed to reconfigure interface: %m");
f0269653
YW
76 link_enter_failed(link);
77 }
9c0a72f9
TG
78 }
79
80 return 0;
81}
82
19070062 83static int match_prepare_for_sleep(sd_bus_message *message, void *userdata, sd_bus_error *ret_error) {
9c0a72f9
TG
84 Manager *m = userdata;
85 int b, r;
86
19070062 87 assert(message);
d7afd945 88 assert(m);
9c0a72f9
TG
89
90 r = sd_bus_message_read(message, "b", &b);
91 if (r < 0) {
d67b1d18 92 bus_log_parse_error(r);
9c0a72f9
TG
93 return 0;
94 }
95
96 if (b)
97 return 0;
98
99 log_debug("Coming back from suspend, resetting all connections...");
100
e1694a75 101 (void) manager_reset_all(m);
9c0a72f9
TG
102
103 return 0;
104}
105
d7afd945
LP
106static int on_connected(sd_bus_message *message, void *userdata, sd_bus_error *ret_error) {
107 Manager *m = userdata;
9c0a72f9 108
d7afd945 109 assert(message);
9c0a72f9
TG
110 assert(m);
111
d7afd945
LP
112 /* Did we get a timezone or transient hostname from DHCP while D-Bus wasn't up yet? */
113 if (m->dynamic_hostname)
114 (void) manager_set_hostname(m, m->dynamic_hostname);
115 if (m->dynamic_timezone)
116 (void) manager_set_timezone(m, m->dynamic_timezone);
ccffa166 117 if (m->product_uuid_requested)
4e26a5ba 118 (void) manager_request_product_uuid(m);
9c0a72f9 119
d7afd945
LP
120 return 0;
121}
9c0a72f9 122
96243149 123static int manager_connect_bus(Manager *m) {
d7afd945
LP
124 int r;
125
126 assert(m);
96243149 127 assert(!m->bus);
7d6884b6 128
621e4509 129 r = bus_open_system_watch_bind_with_description(&m->bus, "bus-api-network");
9c0a72f9 130 if (r < 0)
d7afd945 131 return log_error_errno(r, "Failed to connect to bus: %m");
9c0a72f9 132
6e194652 133 r = bus_add_implementation(m->bus, &manager_object, m);
e331e246 134 if (r < 0)
6e194652 135 return r;
e331e246 136
ac9f55ed
LP
137 r = bus_log_control_api_register(m->bus);
138 if (r < 0)
139 return r;
140
696fc836 141 r = sd_bus_request_name_async(m->bus, NULL, "org.freedesktop.network1", 0, NULL, NULL);
e331e246 142 if (r < 0)
0c0b9306 143 return log_error_errno(r, "Failed to request name: %m");
e331e246
TG
144
145 r = sd_bus_attach_event(m->bus, m->event, 0);
146 if (r < 0)
147 return log_error_errno(r, "Failed to attach bus to event loop: %m");
148
d7afd945
LP
149 r = sd_bus_match_signal_async(
150 m->bus,
cad43595 151 NULL,
d7afd945
LP
152 "org.freedesktop.DBus.Local",
153 NULL,
154 "org.freedesktop.DBus.Local",
155 "Connected",
156 on_connected, NULL, m);
157 if (r < 0)
158 return log_error_errno(r, "Failed to request match on Connected signal: %m");
159
160 r = sd_bus_match_signal_async(
161 m->bus,
cad43595 162 NULL,
d7afd945
LP
163 "org.freedesktop.login1",
164 "/org/freedesktop/login1",
165 "org.freedesktop.login1.Manager",
166 "PrepareForSleep",
167 match_prepare_for_sleep, NULL, m);
168 if (r < 0)
169 log_warning_errno(r, "Failed to request match for PrepareForSleep, ignoring: %m");
7901cea1 170
9c0a72f9
TG
171 return 0;
172}
173
1fd3ac1e
YW
174static int manager_process_uevent(sd_device_monitor *monitor, sd_device *device, void *userdata) {
175 Manager *m = ASSERT_PTR(userdata);
176 sd_device_action_t action;
177 const char *s;
178 int r;
179
180 assert(device);
181
182 r = sd_device_get_action(device, &action);
183 if (r < 0)
184 return log_device_warning_errno(device, r, "Failed to get udev action, ignoring: %m");
185
186 r = sd_device_get_subsystem(device, &s);
187 if (r < 0)
188 return log_device_warning_errno(device, r, "Failed to get subsystem, ignoring: %m");
189
190 if (streq(s, "net"))
191 r = manager_udev_process_link(m, device, action);
c49d5362
YW
192 else if (streq(s, "ieee80211"))
193 r = manager_udev_process_wiphy(m, device, action);
8642e04b
YW
194 else if (streq(s, "rfkill"))
195 r = manager_udev_process_rfkill(m, device, action);
1fd3ac1e
YW
196 else {
197 log_device_debug(device, "Received device with unexpected subsystem \"%s\", ignoring.", s);
198 return 0;
199 }
200 if (r < 0)
201 log_device_warning_errno(device, r, "Failed to process \"%s\" uevent, ignoring: %m",
202 device_action_to_string(action));
203
204 return 0;
205}
206
5fae368b
TG
207static int manager_connect_udev(Manager *m) {
208 int r;
f579559b 209
d31f33e3
YW
210 /* udev does not initialize devices inside containers, so we rely on them being already
211 * initialized before entering the container. */
82f52245 212 if (!udev_available())
5fae368b 213 return 0;
f579559b 214
d2ebf952 215 r = sd_device_monitor_new(&m->device_monitor);
02b59d57 216 if (r < 0)
d2ebf952 217 return log_error_errno(r, "Failed to initialize device monitor: %m");
02b59d57 218
a725efb0
YW
219 r = sd_device_monitor_set_receive_buffer_size(m->device_monitor, RCVBUF_SIZE);
220 if (r < 0)
221 log_warning_errno(r, "Failed to increase buffer size for device monitor, ignoring: %m");
222
d2ebf952
YW
223 r = sd_device_monitor_filter_add_match_subsystem_devtype(m->device_monitor, "net", NULL);
224 if (r < 0)
1fd3ac1e 225 return log_error_errno(r, "Could not add device monitor filter for net subsystem: %m");
505f8da7 226
c49d5362
YW
227 r = sd_device_monitor_filter_add_match_subsystem_devtype(m->device_monitor, "ieee80211", NULL);
228 if (r < 0)
229 return log_error_errno(r, "Could not add device monitor filter for ieee80211 subsystem: %m");
230
8642e04b
YW
231 r = sd_device_monitor_filter_add_match_subsystem_devtype(m->device_monitor, "rfkill", NULL);
232 if (r < 0)
233 return log_error_errno(r, "Could not add device monitor filter for rfkill subsystem: %m");
234
deb2b734 235 r = sd_device_monitor_attach_event(m->device_monitor, m->event);
5fae368b 236 if (r < 0)
d2ebf952 237 return log_error_errno(r, "Failed to attach event to device monitor: %m");
505f8da7 238
1fd3ac1e 239 r = sd_device_monitor_start(m->device_monitor, manager_process_uevent, m);
505f8da7 240 if (r < 0)
d2ebf952 241 return log_error_errno(r, "Failed to start device monitor: %m");
11a7f229 242
505f8da7
TG
243 return 0;
244}
f579559b 245
5fae368b
TG
246static int systemd_netlink_fd(void) {
247 int n, fd, rtnl_fd = -EINVAL;
248
249 n = sd_listen_fds(true);
250 if (n <= 0)
251 return -EINVAL;
252
24e3ed84 253 for (fd = SD_LISTEN_FDS_START; fd < SD_LISTEN_FDS_START + n; fd ++)
5fae368b
TG
254 if (sd_is_socket(fd, AF_NETLINK, SOCK_RAW, -1) > 0) {
255 if (rtnl_fd >= 0)
256 return -EINVAL;
257
258 rtnl_fd = fd;
259 }
5fae368b
TG
260
261 return rtnl_fd;
262}
263
05d0c2e3
JT
264static int manager_connect_genl(Manager *m) {
265 int r;
266
267 assert(m);
268
269 r = sd_genl_socket_open(&m->genl);
270 if (r < 0)
271 return r;
272
78cca583 273 r = sd_netlink_increase_rxbuf(m->genl, RCVBUF_SIZE);
05d0c2e3 274 if (r < 0)
8c63924c 275 log_warning_errno(r, "Failed to increase receive buffer size for general netlink socket, ignoring: %m");
05d0c2e3
JT
276
277 r = sd_netlink_attach_event(m->genl, m->event, 0);
278 if (r < 0)
279 return r;
280
96f5f9ef
YW
281 r = genl_add_match(m->genl, NULL, NL80211_GENL_NAME, NL80211_MULTICAST_GROUP_CONFIG, 0,
282 &manager_genl_process_nl80211_config, NULL, m, "network-genl_process_nl80211_config");
283 if (r < 0 && r != -EOPNOTSUPP)
284 return r;
285
286 r = genl_add_match(m->genl, NULL, NL80211_GENL_NAME, NL80211_MULTICAST_GROUP_MLME, 0,
287 &manager_genl_process_nl80211_mlme, NULL, m, "network-genl_process_nl80211_mlme");
288 if (r < 0 && r != -EOPNOTSUPP)
289 return r;
290
05d0c2e3
JT
291 return 0;
292}
293
26a8be48
YW
294static int manager_setup_rtnl_filter(Manager *manager) {
295 struct sock_filter filter[] = {
296 /* Check the packet length. */
297 BPF_STMT(BPF_LD + BPF_W + BPF_LEN, 0), /* A <- packet length */
298 BPF_JUMP(BPF_JMP + BPF_JGE + BPF_K, sizeof(struct nlmsghdr), 1, 0), /* A (packet length) >= sizeof(struct nlmsghdr) ? */
299 BPF_STMT(BPF_RET + BPF_K, 0), /* reject */
300 /* Always accept multipart message. */
301 BPF_STMT(BPF_LD + BPF_H + BPF_ABS, offsetof(struct nlmsghdr, nlmsg_flags)), /* A <- message flags */
302 BPF_JUMP(BPF_JMP + BPF_JSET + BPF_K, htobe16(NLM_F_MULTI), 0, 1), /* message flags has NLM_F_MULTI ? */
303 BPF_STMT(BPF_RET + BPF_K, UINT32_MAX), /* accept */
304 /* Accept all message types except for RTM_NEWNEIGH or RTM_DELNEIGH. */
305 BPF_STMT(BPF_LD + BPF_H + BPF_ABS, offsetof(struct nlmsghdr, nlmsg_type)), /* A <- message type */
306 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, htobe16(RTM_NEWNEIGH), 2, 0), /* message type == RTM_NEWNEIGH ? */
307 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, htobe16(RTM_DELNEIGH), 1, 0), /* message type == RTM_DELNEIGH ? */
308 BPF_STMT(BPF_RET + BPF_K, UINT32_MAX), /* accept */
309 /* Check the packet length. */
310 BPF_STMT(BPF_LD + BPF_W + BPF_LEN, 0), /* A <- packet length */
311 BPF_JUMP(BPF_JMP + BPF_JGE + BPF_K, sizeof(struct nlmsghdr) + sizeof(struct ndmsg), 1, 0),
312 /* packet length >= sizeof(struct nlmsghdr) + sizeof(struct ndmsg) ? */
313 BPF_STMT(BPF_RET + BPF_K, 0), /* reject */
314 /* Reject the message when the neighbor state does not have NUD_PERMANENT flag. */
315 BPF_STMT(BPF_LD + BPF_H + BPF_ABS, sizeof(struct nlmsghdr) + offsetof(struct ndmsg, ndm_state)),
316 /* A <- neighbor state */
317 BPF_JUMP(BPF_JMP + BPF_JSET + BPF_K, htobe16(NUD_PERMANENT), 1, 0), /* neighbor state has NUD_PERMANENT ? */
318 BPF_STMT(BPF_RET + BPF_K, 0), /* reject */
319 BPF_STMT(BPF_RET + BPF_K, UINT32_MAX), /* accept */
320 };
321
322 assert(manager);
323 assert(manager->rtnl);
324
325 return sd_netlink_attach_filter(manager->rtnl, ELEMENTSOF(filter), filter);
326}
327
5fae368b
TG
328static int manager_connect_rtnl(Manager *m) {
329 int fd, r;
505f8da7
TG
330
331 assert(m);
505f8da7 332
5fae368b
TG
333 fd = systemd_netlink_fd();
334 if (fd < 0)
1c4baffc 335 r = sd_netlink_open(&m->rtnl);
5fae368b 336 else
1c4baffc 337 r = sd_netlink_open_fd(&m->rtnl, fd);
505f8da7
TG
338 if (r < 0)
339 return r;
340
e13af7bd
YW
341 /* Bump receiver buffer, but only if we are not called via socket activation, as in that
342 * case systemd sets the receive buffer size for us, and the value in the .socket unit
343 * should take full effect. */
344 if (fd < 0) {
78cca583 345 r = sd_netlink_increase_rxbuf(m->rtnl, RCVBUF_SIZE);
e13af7bd
YW
346 if (r < 0)
347 log_warning_errno(r, "Failed to increase receive buffer size for rtnl socket, ignoring: %m");
348 }
f579559b 349
1c4baffc 350 r = sd_netlink_attach_event(m->rtnl, m->event, 0);
505f8da7
TG
351 if (r < 0)
352 return r;
f579559b 353
8dfed23d 354 r = netlink_add_match(m->rtnl, NULL, RTM_NEWLINK, &manager_rtnl_process_link, NULL, m, "network-rtnl_process_link");
5fae368b
TG
355 if (r < 0)
356 return r;
505f8da7 357
8dfed23d 358 r = netlink_add_match(m->rtnl, NULL, RTM_DELLINK, &manager_rtnl_process_link, NULL, m, "network-rtnl_process_link");
5fae368b
TG
359 if (r < 0)
360 return r;
45af44d4 361
828a81a9
YW
362 r = netlink_add_match(m->rtnl, NULL, RTM_NEWQDISC, &manager_rtnl_process_qdisc, NULL, m, "network-rtnl_process_qdisc");
363 if (r < 0)
364 return r;
365
366 r = netlink_add_match(m->rtnl, NULL, RTM_DELQDISC, &manager_rtnl_process_qdisc, NULL, m, "network-rtnl_process_qdisc");
367 if (r < 0)
368 return r;
369
370 r = netlink_add_match(m->rtnl, NULL, RTM_NEWTCLASS, &manager_rtnl_process_tclass, NULL, m, "network-rtnl_process_tclass");
371 if (r < 0)
372 return r;
373
374 r = netlink_add_match(m->rtnl, NULL, RTM_DELTCLASS, &manager_rtnl_process_tclass, NULL, m, "network-rtnl_process_tclass");
375 if (r < 0)
376 return r;
377
8dfed23d 378 r = netlink_add_match(m->rtnl, NULL, RTM_NEWADDR, &manager_rtnl_process_address, NULL, m, "network-rtnl_process_address");
5fae368b
TG
379 if (r < 0)
380 return r;
381
8dfed23d 382 r = netlink_add_match(m->rtnl, NULL, RTM_DELADDR, &manager_rtnl_process_address, NULL, m, "network-rtnl_process_address");
5fae368b
TG
383 if (r < 0)
384 return r;
385
8dfed23d 386 r = netlink_add_match(m->rtnl, NULL, RTM_NEWNEIGH, &manager_rtnl_process_neighbor, NULL, m, "network-rtnl_process_neighbor");
d1bdafd2
WKI
387 if (r < 0)
388 return r;
389
8dfed23d 390 r = netlink_add_match(m->rtnl, NULL, RTM_DELNEIGH, &manager_rtnl_process_neighbor, NULL, m, "network-rtnl_process_neighbor");
d1bdafd2
WKI
391 if (r < 0)
392 return r;
393
8dfed23d 394 r = netlink_add_match(m->rtnl, NULL, RTM_NEWROUTE, &manager_rtnl_process_route, NULL, m, "network-rtnl_process_route");
1c8e710c
TG
395 if (r < 0)
396 return r;
397
8dfed23d 398 r = netlink_add_match(m->rtnl, NULL, RTM_DELROUTE, &manager_rtnl_process_route, NULL, m, "network-rtnl_process_route");
1c8e710c
TG
399 if (r < 0)
400 return r;
401
8dfed23d 402 r = netlink_add_match(m->rtnl, NULL, RTM_NEWRULE, &manager_rtnl_process_rule, NULL, m, "network-rtnl_process_rule");
bce67bbe
SS
403 if (r < 0)
404 return r;
405
8dfed23d 406 r = netlink_add_match(m->rtnl, NULL, RTM_DELRULE, &manager_rtnl_process_rule, NULL, m, "network-rtnl_process_rule");
bce67bbe
SS
407 if (r < 0)
408 return r;
409
8dfed23d 410 r = netlink_add_match(m->rtnl, NULL, RTM_NEWNEXTHOP, &manager_rtnl_process_nexthop, NULL, m, "network-rtnl_process_nexthop");
c16c7808
SS
411 if (r < 0)
412 return r;
413
8dfed23d 414 r = netlink_add_match(m->rtnl, NULL, RTM_DELNEXTHOP, &manager_rtnl_process_nexthop, NULL, m, "network-rtnl_process_nexthop");
c16c7808
SS
415 if (r < 0)
416 return r;
417
26a8be48 418 return manager_setup_rtnl_filter(m);
45af44d4 419}
505f8da7 420
84de38c5
TG
421static int manager_dirty_handler(sd_event_source *s, void *userdata) {
422 Manager *m = userdata;
423 Link *link;
d23a66f2 424 int r;
84de38c5
TG
425
426 assert(m);
427
d23a66f2
YW
428 if (m->dirty) {
429 r = manager_save(m);
430 if (r < 0)
431 log_warning_errno(r, "Failed to update state file %s, ignoring: %m", m->state_file);
432 }
84de38c5 433
d23a66f2
YW
434 SET_FOREACH(link, m->dirty_links) {
435 r = link_save_and_clean(link);
436 if (r < 0)
437 log_link_warning_errno(link, r, "Failed to update link state file %s, ignoring: %m", link->state_file);
438 }
84de38c5
TG
439
440 return 1;
441}
442
ab76be55
ZJS
443static int signal_terminate_callback(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
444 Manager *m = userdata;
445
446 assert(m);
447 m->restarting = false;
448
449 log_debug("Terminate operation initiated.");
450
451 return sd_event_exit(sd_event_source_get_event(s), 0);
452}
453
454static int signal_restart_callback(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
455 Manager *m = userdata;
456
457 assert(m);
458 m->restarting = true;
459
460 log_debug("Restart operation initiated.");
461
462 return sd_event_exit(sd_event_source_get_event(s), 0);
463}
464
ea853de5
YW
465static int manager_set_keep_configuration(Manager *m) {
466 int r;
467
468 assert(m);
469
470 if (in_initrd()) {
471 log_debug("Running in initrd, keep DHCPv4 addresses on stopping networkd by default.");
472 m->keep_configuration = KEEP_CONFIGURATION_DHCP_ON_STOP;
473 return 0;
474 }
475
476 r = path_is_network_fs("/");
477 if (r < 0)
478 return log_error_errno(r, "Failed to detect if root is network filesystem: %m");
479 if (r == 0) {
480 m->keep_configuration = _KEEP_CONFIGURATION_INVALID;
481 return 0;
482 }
483
484 log_debug("Running on network filesystem, enabling KeepConfiguration= by default.");
485 m->keep_configuration = KEEP_CONFIGURATION_YES;
486 return 0;
487}
488
4c78dc17 489int manager_setup(Manager *m) {
45af44d4 490 int r;
f579559b 491
96243149 492 assert(m);
5fae368b 493
3534a043
YW
494 r = sd_event_default(&m->event);
495 if (r < 0)
496 return r;
497
ab76be55
ZJS
498 assert_se(sigprocmask_many(SIG_SETMASK, NULL, SIGINT, SIGTERM, SIGUSR2, -1) >= 0);
499
05e21627 500 (void) sd_event_set_watchdog(m->event, true);
ab76be55
ZJS
501 (void) sd_event_add_signal(m->event, NULL, SIGTERM, signal_terminate_callback, m);
502 (void) sd_event_add_signal(m->event, NULL, SIGINT, signal_terminate_callback, m);
503 (void) sd_event_add_signal(m->event, NULL, SIGUSR2, signal_restart_callback, m);
5fae368b 504
84de38c5
TG
505 r = sd_event_add_post(m->event, NULL, manager_dirty_handler, m);
506 if (r < 0)
507 return r;
508
19d9a5ad
YW
509 r = sd_event_add_post(m->event, NULL, manager_process_requests, m);
510 if (r < 0)
511 return r;
512
5fae368b 513 r = manager_connect_rtnl(m);
45af44d4
TG
514 if (r < 0)
515 return r;
516
05d0c2e3
JT
517 r = manager_connect_genl(m);
518 if (r < 0)
519 return r;
520
4c78dc17 521 if (m->test_mode)
96243149
YW
522 return 0;
523
524 r = manager_connect_bus(m);
525 if (r < 0)
526 return r;
527
5fae368b
TG
528 r = manager_connect_udev(m);
529 if (r < 0)
530 return r;
45af44d4 531
05d0c2e3
JT
532 r = sd_resolve_default(&m->resolve);
533 if (r < 0)
534 return r;
535
536 r = sd_resolve_attach_event(m->resolve, m->event, 0);
537 if (r < 0)
538 return r;
539
ed76f585 540 r = address_pool_setup_default(m);
5fae368b
TG
541 if (r < 0)
542 return r;
f579559b 543
ea853de5
YW
544 r = manager_set_keep_configuration(m);
545 if (r < 0)
546 return r;
547
96243149
YW
548 m->state_file = strdup("/run/systemd/netif/state");
549 if (!m->state_file)
550 return -ENOMEM;
551
552 return 0;
553}
554
4c78dc17 555int manager_new(Manager **ret, bool test_mode) {
96243149 556 _cleanup_(manager_freep) Manager *m = NULL;
f579559b 557
96243149
YW
558 m = new(Manager, 1);
559 if (!m)
560 return -ENOMEM;
561
562 *m = (Manager) {
ea853de5 563 .keep_configuration = _KEEP_CONFIGURATION_INVALID,
4c78dc17 564 .test_mode = test_mode,
96243149
YW
565 .speed_meter_interval_usec = SPEED_METER_DEFAULT_TIME_INTERVAL,
566 .online_state = _LINK_ONLINE_STATE_INVALID,
567 .manage_foreign_routes = true,
568 .manage_foreign_rules = true,
569 .ethtool_fd = -1,
570 .dhcp_duid.type = DUID_TYPE_EN,
571 .dhcp6_duid.type = DUID_TYPE_EN,
572 .duid_product_uuid.type = DUID_TYPE_UUID,
573 };
574
575 *ret = TAKE_PTR(m);
f579559b
TG
576 return 0;
577}
578
75db809a 579Manager* manager_free(Manager *m) {
5fae368b 580 Link *link;
f579559b 581
5fae368b 582 if (!m)
75db809a 583 return NULL;
505f8da7 584
5fae368b 585 free(m->state_file);
505f8da7 586
6eab614d 587 HASHMAP_FOREACH(link, m->links_by_index)
2a99eed0 588 (void) link_stop_engines(link, true);
946f8e14 589
40b12fa2 590 m->request_queue = ordered_set_free(m->request_queue);
19d9a5ad 591
c4397d94 592 m->dirty_links = set_free_with_destructor(m->dirty_links, link_unref);
0b54c870 593 m->links_by_name = hashmap_free(m->links_by_name);
fe321d45 594 m->links_by_hw_addr = hashmap_free(m->links_by_hw_addr);
a27588d4 595 m->links_by_dhcp_pd_subnet_prefix = hashmap_free(m->links_by_dhcp_pd_subnet_prefix);
6eab614d 596 m->links_by_index = hashmap_free_with_destructor(m->links_by_index, link_unref);
27dfc982 597
a27588d4 598 m->dhcp_pd_subnet_ids = set_free(m->dhcp_pd_subnet_ids);
715d398e 599 m->networks = ordered_hashmap_free_with_destructor(m->networks, network_unref);
dbffab87 600
c4397d94 601 m->netdevs = hashmap_free_with_destructor(m->netdevs, netdev_unref);
5fae368b 602
edb69db2
YW
603 m->wiphy_by_name = hashmap_free(m->wiphy_by_name);
604 m->wiphy_by_index = hashmap_free_with_destructor(m->wiphy_by_index, wiphy_free);
605
bfbf150e 606 ordered_set_free_free(m->address_pools);
5fae368b 607
552b90a2
YW
608 hashmap_free(m->route_table_names_by_number);
609 hashmap_free(m->route_table_numbers_by_name);
c038ce46 610
eb72fa3a 611 set_free(m->rules);
bce67bbe 612
d4df6326
SS
613 sd_netlink_unref(m->rtnl);
614 sd_netlink_unref(m->genl);
615 sd_resolve_unref(m->resolve);
616
450fa34b
YW
617 /* reject (e.g. unreachable) type routes are managed by Manager, but may be referenced by a
618 * link. E.g., DHCP6 with prefix delegation creates unreachable routes, and they are referenced
619 * by the upstream link. And the links may be referenced by netlink slots. Hence, two
620 * set_free() must be called after the above sd_netlink_unref(). */
621 m->routes = set_free(m->routes);
622 m->routes_foreign = set_free(m->routes_foreign);
623
30f10837 624 m->nexthops = set_free(m->nexthops);
69e244e3
YW
625 m->nexthops_by_id = hashmap_free(m->nexthops_by_id);
626
a879e1a4 627 sd_event_source_unref(m->speed_meter_event_source);
2f5b4a77 628 sd_event_unref(m->event);
5fae368b 629
d2ebf952 630 sd_device_monitor_unref(m->device_monitor);
7d20d375 631
15761549 632 bus_verify_polkit_async_registry_free(m->polkit_registry);
92e31da1 633 sd_bus_flush_close_unref(m->bus);
7d20d375 634
7901cea1
MP
635 free(m->dynamic_timezone);
636 free(m->dynamic_hostname);
637
c643bda5
YW
638 safe_close(m->ethtool_fd);
639
761cf19d
FW
640 m->fw_ctx = fw_ctx_free(m->fw_ctx);
641
75db809a 642 return mfree(m);
5fae368b
TG
643}
644
b76d99d9 645int manager_start(Manager *m) {
84de38c5 646 Link *link;
a879e1a4 647 int r;
84de38c5 648
a97dcc12
TG
649 assert(m);
650
a879e1a4
YW
651 r = manager_start_speed_meter(m);
652 if (r < 0)
653 return log_error_errno(r, "Failed to initialize speed meter: %m");
654
84de38c5
TG
655 /* The dirty handler will deal with future serialization, but the first one
656 must be done explicitly. */
657
d23a66f2
YW
658 r = manager_save(m);
659 if (r < 0)
660 log_warning_errno(r, "Failed to update state file %s, ignoring: %m", m->state_file);
84de38c5 661
6eab614d 662 HASHMAP_FOREACH(link, m->links_by_index) {
d23a66f2
YW
663 r = link_save(link);
664 if (r < 0)
665 log_link_warning_errno(link, r, "Failed to update link state file %s, ignoring: %m", link->state_file);
666 }
84de38c5 667
b76d99d9 668 return 0;
a97dcc12
TG
669}
670
5fae368b
TG
671int manager_load_config(Manager *m) {
672 int r;
673
674 /* update timestamp */
dc0d4078 675 paths_check_timestamp(NETWORK_DIRS, &m->network_dirs_ts_usec, true);
5fae368b 676
e272b621 677 r = netdev_load(m, false);
f579559b
TG
678 if (r < 0)
679 return r;
680
7f06b3e1 681 r = network_load(m, &m->networks);
9021bb9f
TG
682 if (r < 0)
683 return r;
684
a27588d4 685 return manager_build_dhcp_pd_subnet_ids(m);
f579559b 686}
f882c247 687
5fae368b 688bool manager_should_reload(Manager *m) {
dc0d4078 689 return paths_check_timestamp(NETWORK_DIRS, &m->network_dirs_ts_usec, false);
5fae368b
TG
690}
691
446aaaf3
YW
692static int manager_enumerate_internal(
693 Manager *m,
bdcd4ab2 694 sd_netlink *nl,
446aaaf3 695 sd_netlink_message *req,
f12629ae 696 int (*process)(sd_netlink *, sd_netlink_message *, Manager *)) {
446aaaf3
YW
697
698 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *reply = NULL;
bdcd4ab2 699 int k, r;
f882c247 700
5da8149f 701 assert(m);
bdcd4ab2 702 assert(nl);
446aaaf3
YW
703 assert(req);
704 assert(process);
f882c247 705
1c4baffc 706 r = sd_netlink_message_request_dump(req, true);
dd3efc09
TG
707 if (r < 0)
708 return r;
709
bdcd4ab2 710 r = sd_netlink_call(nl, req, 0, &reply);
f12629ae 711 if (r < 0)
f2236469
TG
712 return r;
713
a6b08423 714 m->enumerating = true;
446aaaf3 715 for (sd_netlink_message *reply_one = reply; reply_one; reply_one = sd_netlink_message_next(reply_one)) {
bdcd4ab2 716 k = process(nl, reply_one, m);
446aaaf3 717 if (k < 0 && r >= 0)
5fae368b
TG
718 r = k;
719 }
a6b08423 720 m->enumerating = false;
2e9f08ea 721
5fae368b 722 return r;
f882c247 723}
3bef724f 724
446aaaf3
YW
725static int manager_enumerate_links(Manager *m) {
726 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
1346b1f0
TG
727 int r;
728
5fae368b
TG
729 assert(m);
730 assert(m->rtnl);
bcbca829 731
446aaaf3 732 r = sd_rtnl_message_new_link(m->rtnl, &req, RTM_GETLINK, 0);
5fae368b
TG
733 if (r < 0)
734 return r;
735
f12629ae 736 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_link);
446aaaf3 737}
5fae368b 738
828a81a9
YW
739static int manager_enumerate_qdisc(Manager *m) {
740 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
741 int r;
742
743 assert(m);
744 assert(m->rtnl);
745
746 r = sd_rtnl_message_new_traffic_control(m->rtnl, &req, RTM_GETQDISC, 0, 0, 0);
747 if (r < 0)
748 return r;
749
750 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_qdisc);
751}
752
753static int manager_enumerate_tclass(Manager *m) {
754 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
755 int r;
756
757 assert(m);
758 assert(m->rtnl);
759
760 r = sd_rtnl_message_new_traffic_control(m->rtnl, &req, RTM_GETTCLASS, 0, 0, 0);
761 if (r < 0)
762 return r;
763
764 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_tclass);
765}
766
446aaaf3
YW
767static int manager_enumerate_addresses(Manager *m) {
768 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
769 int r;
6a24f148 770
446aaaf3
YW
771 assert(m);
772 assert(m->rtnl);
6a24f148 773
446aaaf3
YW
774 r = sd_rtnl_message_new_addr(m->rtnl, &req, RTM_GETADDR, 0, 0);
775 if (r < 0)
776 return r;
5fae368b 777
f12629ae 778 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_address);
1346b1f0 779}
d1bdafd2 780
446aaaf3
YW
781static int manager_enumerate_neighbors(Manager *m) {
782 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
d1bdafd2
WKI
783 int r;
784
785 assert(m);
786 assert(m->rtnl);
787
788 r = sd_rtnl_message_new_neigh(m->rtnl, &req, RTM_GETNEIGH, 0, AF_UNSPEC);
789 if (r < 0)
790 return r;
791
f12629ae 792 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_neighbor);
d1bdafd2 793}
1346b1f0 794
446aaaf3
YW
795static int manager_enumerate_routes(Manager *m) {
796 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
1c8e710c
TG
797 int r;
798
799 assert(m);
800 assert(m->rtnl);
801
5ff1ef31
YW
802 if (!m->manage_foreign_routes)
803 return 0;
804
1c8e710c
TG
805 r = sd_rtnl_message_new_route(m->rtnl, &req, RTM_GETROUTE, 0, 0);
806 if (r < 0)
807 return r;
808
f12629ae 809 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_route);
1c8e710c
TG
810}
811
446aaaf3
YW
812static int manager_enumerate_rules(Manager *m) {
813 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
bce67bbe
SS
814 int r;
815
816 assert(m);
817 assert(m->rtnl);
818
d94dfe70
YW
819 if (!m->manage_foreign_rules)
820 return 0;
821
bce67bbe
SS
822 r = sd_rtnl_message_new_routing_policy_rule(m->rtnl, &req, RTM_GETRULE, 0);
823 if (r < 0)
824 return r;
825
f12629ae 826 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_rule);
bce67bbe
SS
827}
828
446aaaf3
YW
829static int manager_enumerate_nexthop(Manager *m) {
830 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
c16c7808
SS
831 int r;
832
833 assert(m);
834 assert(m->rtnl);
835
836 r = sd_rtnl_message_new_nexthop(m->rtnl, &req, RTM_GETNEXTHOP, 0, 0);
837 if (r < 0)
838 return r;
839
f12629ae 840 return manager_enumerate_internal(m, m->rtnl, req, manager_rtnl_process_nexthop);
446aaaf3 841}
c16c7808 842
edb69db2
YW
843static int manager_enumerate_nl80211_wiphy(Manager *m) {
844 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
845 int r;
846
847 assert(m);
848 assert(m->genl);
849
850 r = sd_genl_message_new(m->genl, NL80211_GENL_NAME, NL80211_CMD_GET_WIPHY, &req);
851 if (r < 0)
852 return r;
853
854 return manager_enumerate_internal(m, m->genl, req, manager_genl_process_nl80211_wiphy);
855}
856
96f5f9ef
YW
857static int manager_enumerate_nl80211_config(Manager *m) {
858 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
859 int r;
860
861 assert(m);
862 assert(m->genl);
863
864 r = sd_genl_message_new(m->genl, NL80211_GENL_NAME, NL80211_CMD_GET_INTERFACE, &req);
865 if (r < 0)
866 return r;
867
868 return manager_enumerate_internal(m, m->genl, req, manager_genl_process_nl80211_config);
869}
870
871static int manager_enumerate_nl80211_mlme(Manager *m) {
872 Link *link;
873 int r;
874
875 assert(m);
876 assert(m->genl);
877
878 HASHMAP_FOREACH(link, m->links_by_index) {
879 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL;
880
881 if (link->wlan_iftype != NL80211_IFTYPE_STATION)
882 continue;
883
884 r = sd_genl_message_new(m->genl, NL80211_GENL_NAME, NL80211_CMD_GET_STATION, &req);
885 if (r < 0)
886 return r;
887
888 r = sd_netlink_message_append_u32(req, NL80211_ATTR_IFINDEX, link->ifindex);
889 if (r < 0)
890 return r;
891
892 r = manager_enumerate_internal(m, m->genl, req, manager_genl_process_nl80211_mlme);
893 if (r < 0)
894 return r;
895 }
896
897 return 0;
898}
899
446aaaf3
YW
900int manager_enumerate(Manager *m) {
901 int r;
c16c7808 902
446aaaf3
YW
903 r = manager_enumerate_links(m);
904 if (r < 0)
905 return log_error_errno(r, "Could not enumerate links: %m");
c16c7808 906
828a81a9 907 r = manager_enumerate_qdisc(m);
15ac2a62
YW
908 if (r == -EOPNOTSUPP)
909 log_debug_errno(r, "Could not enumerate QDiscs, ignoring: %m");
910 else if (r < 0)
828a81a9
YW
911 return log_error_errno(r, "Could not enumerate QDisc: %m");
912
913 r = manager_enumerate_tclass(m);
15ac2a62
YW
914 if (r == -EOPNOTSUPP)
915 log_debug_errno(r, "Could not enumerate TClasses, ignoring: %m");
916 else if (r < 0)
828a81a9
YW
917 return log_error_errno(r, "Could not enumerate TClass: %m");
918
446aaaf3
YW
919 r = manager_enumerate_addresses(m);
920 if (r < 0)
921 return log_error_errno(r, "Could not enumerate addresses: %m");
c16c7808 922
446aaaf3
YW
923 r = manager_enumerate_neighbors(m);
924 if (r < 0)
925 return log_error_errno(r, "Could not enumerate neighbors: %m");
c16c7808 926
f12629ae
YW
927 /* NextHop support is added in kernel v5.3 (65ee00a9409f751188a8cdc0988167858eb4a536),
928 * and older kernels return -EOPNOTSUPP, or -EINVAL if SELinux is enabled. */
0c0585ca 929 r = manager_enumerate_nexthop(m);
f12629ae
YW
930 if (r == -EOPNOTSUPP || (r == -EINVAL && mac_selinux_enforcing()))
931 log_debug_errno(r, "Could not enumerate nexthops, ignoring: %m");
932 else if (r < 0)
933 return log_error_errno(r, "Could not enumerate nexthops: %m");
0c0585ca 934
446aaaf3
YW
935 r = manager_enumerate_routes(m);
936 if (r < 0)
937 return log_error_errno(r, "Could not enumerate routes: %m");
c16c7808 938
f12629ae 939 /* If kernel is built with CONFIG_FIB_RULES=n, it returns -EOPNOTSUPP. */
446aaaf3 940 r = manager_enumerate_rules(m);
f12629ae
YW
941 if (r == -EOPNOTSUPP)
942 log_debug_errno(r, "Could not enumerate routing policy rules, ignoring: %m");
943 else if (r < 0)
446aaaf3 944 return log_error_errno(r, "Could not enumerate routing policy rules: %m");
c16c7808 945
edb69db2
YW
946 r = manager_enumerate_nl80211_wiphy(m);
947 if (r == -EOPNOTSUPP)
948 log_debug_errno(r, "Could not enumerate wireless LAN phy, ignoring: %m");
949 else if (r < 0)
950 return log_error_errno(r, "Could not enumerate wireless LAN phy: %m");
951
96f5f9ef
YW
952 r = manager_enumerate_nl80211_config(m);
953 if (r == -EOPNOTSUPP)
954 log_debug_errno(r, "Could not enumerate wireless LAN interfaces, ignoring: %m");
955 else if (r < 0)
956 return log_error_errno(r, "Could not enumerate wireless LAN interfaces: %m");
957
958 r = manager_enumerate_nl80211_mlme(m);
959 if (r == -EOPNOTSUPP)
960 log_debug_errno(r, "Could not enumerate wireless LAN stations, ignoring: %m");
961 else if (r < 0)
962 return log_error_errno(r, "Could not enumerate wireless LAN stations: %m");
963
446aaaf3 964 return 0;
c16c7808
SS
965}
966
59eb33e0 967static int set_hostname_handler(sd_bus_message *m, void *userdata, sd_bus_error *ret_error) {
59eb33e0 968 const sd_bus_error *e;
f63e09ef 969 int r;
59eb33e0
MP
970
971 assert(m);
59eb33e0
MP
972
973 e = sd_bus_message_get_error(m);
f63e09ef
YW
974 if (e) {
975 r = sd_bus_error_get_errno(e);
976 log_warning_errno(r, "Could not set hostname: %s", bus_error_message(e, r));
977 }
59eb33e0
MP
978
979 return 1;
980}
981
982int manager_set_hostname(Manager *m, const char *hostname) {
983 int r;
984
985 log_debug("Setting transient hostname: '%s'", strna(hostname));
d7afd945 986
b3f9c17a
YW
987 r = free_and_strdup_warn(&m->dynamic_hostname, hostname);
988 if (r < 0)
989 return r;
59eb33e0 990
5dbec9bd
ZJS
991 if (sd_bus_is_ready(m->bus) <= 0) {
992 log_debug("Not connected to system bus, setting system hostname later.");
59eb33e0
MP
993 return 0;
994 }
995
d2775306 996 r = bus_call_method_async(
59eb33e0
MP
997 m->bus,
998 NULL,
d2775306 999 bus_hostname,
59eb33e0
MP
1000 "SetHostname",
1001 set_hostname_handler,
1002 m,
1003 "sb",
1004 hostname,
1005 false);
59eb33e0
MP
1006 if (r < 0)
1007 return log_error_errno(r, "Could not set transient hostname: %m");
1008
1009 return 0;
1010}
1011
1012static int set_timezone_handler(sd_bus_message *m, void *userdata, sd_bus_error *ret_error) {
59eb33e0 1013 const sd_bus_error *e;
f63e09ef 1014 int r;
59eb33e0
MP
1015
1016 assert(m);
59eb33e0
MP
1017
1018 e = sd_bus_message_get_error(m);
f63e09ef
YW
1019 if (e) {
1020 r = sd_bus_error_get_errno(e);
1021 log_warning_errno(r, "Could not set timezone: %s", bus_error_message(e, r));
1022 }
59eb33e0
MP
1023
1024 return 1;
1025}
1026
1027int manager_set_timezone(Manager *m, const char *tz) {
1028 int r;
1029
1030 assert(m);
1031 assert(tz);
1032
1033 log_debug("Setting system timezone: '%s'", tz);
b3f9c17a
YW
1034 r = free_and_strdup_warn(&m->dynamic_timezone, tz);
1035 if (r < 0)
1036 return r;
59eb33e0 1037
5dbec9bd
ZJS
1038 if (sd_bus_is_ready(m->bus) <= 0) {
1039 log_debug("Not connected to system bus, setting system timezone later.");
59eb33e0
MP
1040 return 0;
1041 }
1042
b607fd3f 1043 r = bus_call_method_async(
59eb33e0
MP
1044 m->bus,
1045 NULL,
b607fd3f 1046 bus_timedate,
59eb33e0
MP
1047 "SetTimezone",
1048 set_timezone_handler,
1049 m,
1050 "sb",
1051 tz,
1052 false);
1053 if (r < 0)
1054 return log_error_errno(r, "Could not set timezone: %m");
1055
1056 return 0;
1057}