]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/network/networkd-manager.c
Merge pull request #13953 from SpencerMichaels/systemd-boot-efistub-id-fix
[thirdparty/systemd.git] / src / network / networkd-manager.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2
3 #include <netinet/in.h>
4 #include <sys/socket.h>
5 #include <unistd.h>
6 #include <linux/if.h>
7 #include <linux/fib_rules.h>
8 #include <linux/nexthop.h>
9
10 #include "sd-daemon.h"
11 #include "sd-netlink.h"
12
13 #include "alloc-util.h"
14 #include "bus-util.h"
15 #include "conf-parser.h"
16 #include "def.h"
17 #include "device-private.h"
18 #include "device-util.h"
19 #include "dns-domain.h"
20 #include "fd-util.h"
21 #include "fileio.h"
22 #include "local-addresses.h"
23 #include "netlink-util.h"
24 #include "network-internal.h"
25 #include "networkd-dhcp6.h"
26 #include "networkd-link-bus.h"
27 #include "networkd-manager-bus.h"
28 #include "networkd-manager.h"
29 #include "networkd-network-bus.h"
30 #include "networkd-speed-meter.h"
31 #include "ordered-set.h"
32 #include "path-util.h"
33 #include "set.h"
34 #include "signal-util.h"
35 #include "strv.h"
36 #include "sysctl-util.h"
37 #include "tmpfile-util.h"
38 #include "udev-util.h"
39 #include "virt.h"
40
41 /* use 8 MB for receive socket kernel queue. */
42 #define RCVBUF_SIZE (8*1024*1024)
43
44 static int log_message_warning_errno(sd_netlink_message *m, int err, const char *msg) {
45 const char *err_msg = NULL;
46
47 (void) sd_netlink_message_read_string(m, NLMSGERR_ATTR_MSG, &err_msg);
48 return log_warning_errno(err, "%s: %s%s%m", msg, strempty(err_msg), err_msg ? " " : "");
49 }
50
51 static int setup_default_address_pool(Manager *m) {
52 AddressPool *p;
53 int r;
54
55 assert(m);
56
57 /* Add in the well-known private address ranges. */
58
59 r = address_pool_new_from_string(m, &p, AF_INET6, "fd00::", 8);
60 if (r < 0)
61 return r;
62
63 r = address_pool_new_from_string(m, &p, AF_INET, "10.0.0.0", 8);
64 if (r < 0)
65 return r;
66
67 r = address_pool_new_from_string(m, &p, AF_INET, "172.16.0.0", 12);
68 if (r < 0)
69 return r;
70
71 r = address_pool_new_from_string(m, &p, AF_INET, "192.168.0.0", 16);
72 if (r < 0)
73 return r;
74
75 return 0;
76 }
77
78 static int manager_reset_all(Manager *m) {
79 Link *link;
80 Iterator i;
81 int r;
82
83 assert(m);
84
85 HASHMAP_FOREACH(link, m->links, i) {
86 r = link_carrier_reset(link);
87 if (r < 0)
88 log_link_warning_errno(link, r, "Could not reset carrier: %m");
89 }
90
91 return 0;
92 }
93
94 static int match_prepare_for_sleep(sd_bus_message *message, void *userdata, sd_bus_error *ret_error) {
95 Manager *m = userdata;
96 int b, r;
97
98 assert(message);
99 assert(m);
100
101 r = sd_bus_message_read(message, "b", &b);
102 if (r < 0) {
103 log_debug_errno(r, "Failed to parse PrepareForSleep signal: %m");
104 return 0;
105 }
106
107 if (b)
108 return 0;
109
110 log_debug("Coming back from suspend, resetting all connections...");
111
112 (void) manager_reset_all(m);
113
114 return 0;
115 }
116
117 static int on_connected(sd_bus_message *message, void *userdata, sd_bus_error *ret_error) {
118 Manager *m = userdata;
119
120 assert(message);
121 assert(m);
122
123 /* Did we get a timezone or transient hostname from DHCP while D-Bus wasn't up yet? */
124 if (m->dynamic_hostname)
125 (void) manager_set_hostname(m, m->dynamic_hostname);
126 if (m->dynamic_timezone)
127 (void) manager_set_timezone(m, m->dynamic_timezone);
128 if (m->links_requesting_uuid)
129 (void) manager_request_product_uuid(m, NULL);
130
131 return 0;
132 }
133
134 int manager_connect_bus(Manager *m) {
135 int r;
136
137 assert(m);
138
139 if (m->bus)
140 return 0;
141
142 r = bus_open_system_watch_bind_with_description(&m->bus, "bus-api-network");
143 if (r < 0)
144 return log_error_errno(r, "Failed to connect to bus: %m");
145
146 r = sd_bus_add_object_vtable(m->bus, NULL, "/org/freedesktop/network1", "org.freedesktop.network1.Manager", manager_vtable, m);
147 if (r < 0)
148 return log_error_errno(r, "Failed to add manager object vtable: %m");
149
150 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/network1/link", "org.freedesktop.network1.Link", link_vtable, link_object_find, m);
151 if (r < 0)
152 return log_error_errno(r, "Failed to add link object vtable: %m");
153
154 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/network1/link", link_node_enumerator, m);
155 if (r < 0)
156 return log_error_errno(r, "Failed to add link enumerator: %m");
157
158 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/network1/network", "org.freedesktop.network1.Network", network_vtable, network_object_find, m);
159 if (r < 0)
160 return log_error_errno(r, "Failed to add network object vtable: %m");
161
162 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/network1/network", network_node_enumerator, m);
163 if (r < 0)
164 return log_error_errno(r, "Failed to add network enumerator: %m");
165
166 r = sd_bus_request_name_async(m->bus, NULL, "org.freedesktop.network1", 0, NULL, NULL);
167 if (r < 0)
168 return log_error_errno(r, "Failed to request name: %m");
169
170 r = sd_bus_attach_event(m->bus, m->event, 0);
171 if (r < 0)
172 return log_error_errno(r, "Failed to attach bus to event loop: %m");
173
174 r = sd_bus_match_signal_async(
175 m->bus,
176 NULL,
177 "org.freedesktop.DBus.Local",
178 NULL,
179 "org.freedesktop.DBus.Local",
180 "Connected",
181 on_connected, NULL, m);
182 if (r < 0)
183 return log_error_errno(r, "Failed to request match on Connected signal: %m");
184
185 r = sd_bus_match_signal_async(
186 m->bus,
187 NULL,
188 "org.freedesktop.login1",
189 "/org/freedesktop/login1",
190 "org.freedesktop.login1.Manager",
191 "PrepareForSleep",
192 match_prepare_for_sleep, NULL, m);
193 if (r < 0)
194 log_warning_errno(r, "Failed to request match for PrepareForSleep, ignoring: %m");
195
196 return 0;
197 }
198
199 static int manager_udev_process_link(sd_device_monitor *monitor, sd_device *device, void *userdata) {
200 Manager *m = userdata;
201 DeviceAction action;
202 Link *link = NULL;
203 int r, ifindex;
204
205 assert(m);
206 assert(device);
207
208 r = device_get_action(device, &action);
209 if (r < 0) {
210 log_device_debug_errno(device, r, "Failed to get udev action, ignoring device: %m");
211 return 0;
212 }
213
214 if (!IN_SET(action, DEVICE_ACTION_ADD, DEVICE_ACTION_CHANGE, DEVICE_ACTION_MOVE)) {
215 log_device_debug(device, "Ignoring udev %s event for device.", device_action_to_string(action));
216 return 0;
217 }
218
219 r = sd_device_get_ifindex(device, &ifindex);
220 if (r < 0) {
221 log_device_debug_errno(device, r, "Ignoring udev ADD event for device without ifindex or with invalid ifindex: %m");
222 return 0;
223 }
224
225 r = device_is_renaming(device);
226 if (r < 0) {
227 log_device_error_errno(device, r, "Failed to determine the device is renamed or not, ignoring '%s' uevent: %m",
228 device_action_to_string(action));
229 return 0;
230 }
231 if (r > 0) {
232 log_device_debug(device, "Interface is under renaming, wait for the interface to be renamed: %m");
233 return 0;
234 }
235
236 r = link_get(m, ifindex, &link);
237 if (r < 0) {
238 if (r != -ENODEV)
239 log_debug_errno(r, "Failed to get link from ifindex %i, ignoring: %m", ifindex);
240 return 0;
241 }
242
243 (void) link_initialized(link, device);
244
245 return 0;
246 }
247
248 static int manager_connect_udev(Manager *m) {
249 int r;
250
251 /* udev does not initialize devices inside containers,
252 * so we rely on them being already initialized before
253 * entering the container */
254 if (detect_container() > 0)
255 return 0;
256
257 r = sd_device_monitor_new(&m->device_monitor);
258 if (r < 0)
259 return log_error_errno(r, "Failed to initialize device monitor: %m");
260
261 r = sd_device_monitor_filter_add_match_subsystem_devtype(m->device_monitor, "net", NULL);
262 if (r < 0)
263 return log_error_errno(r, "Could not add device monitor filter: %m");
264
265 r = sd_device_monitor_attach_event(m->device_monitor, m->event);
266 if (r < 0)
267 return log_error_errno(r, "Failed to attach event to device monitor: %m");
268
269 r = sd_device_monitor_start(m->device_monitor, manager_udev_process_link, m);
270 if (r < 0)
271 return log_error_errno(r, "Failed to start device monitor: %m");
272
273 return 0;
274 }
275
276 int manager_rtnl_process_route(sd_netlink *rtnl, sd_netlink_message *message, void *userdata) {
277 _cleanup_(route_freep) Route *tmp = NULL;
278 Route *route = NULL;
279 Manager *m = userdata;
280 Link *link = NULL;
281 uint32_t ifindex;
282 uint16_t type;
283 unsigned char table;
284 int r;
285
286 assert(rtnl);
287 assert(message);
288 assert(m);
289
290 if (sd_netlink_message_is_error(message)) {
291 r = sd_netlink_message_get_errno(message);
292 if (r < 0)
293 log_message_warning_errno(message, r, "rtnl: failed to receive route message, ignoring");
294
295 return 0;
296 }
297
298 r = sd_netlink_message_get_type(message, &type);
299 if (r < 0) {
300 log_warning_errno(r, "rtnl: could not get message type, ignoring: %m");
301 return 0;
302 } else if (!IN_SET(type, RTM_NEWROUTE, RTM_DELROUTE)) {
303 log_warning("rtnl: received unexpected message type %u when processing route, ignoring.", type);
304 return 0;
305 }
306
307 r = sd_netlink_message_read_u32(message, RTA_OIF, &ifindex);
308 if (r == -ENODATA) {
309 log_debug("rtnl: received route message without ifindex, ignoring");
310 return 0;
311 } else if (r < 0) {
312 log_warning_errno(r, "rtnl: could not get ifindex from route message, ignoring: %m");
313 return 0;
314 } else if (ifindex <= 0) {
315 log_warning("rtnl: received route message with invalid ifindex %d, ignoring.", ifindex);
316 return 0;
317 }
318
319 r = link_get(m, ifindex, &link);
320 if (r < 0 || !link) {
321 /* when enumerating we might be out of sync, but we will
322 * get the route again, so just ignore it */
323 if (!m->enumerating)
324 log_warning("rtnl: received route message for link (%d) we do not know about, ignoring", ifindex);
325 return 0;
326 }
327
328 r = route_new(&tmp);
329 if (r < 0)
330 return log_oom();
331
332 r = sd_rtnl_message_route_get_family(message, &tmp->family);
333 if (r < 0 || !IN_SET(tmp->family, AF_INET, AF_INET6)) {
334 log_link_warning(link, "rtnl: received route message with invalid family, ignoring");
335 return 0;
336 }
337
338 r = sd_rtnl_message_route_get_protocol(message, &tmp->protocol);
339 if (r < 0) {
340 log_warning_errno(r, "rtnl: received route message with invalid route protocol: %m");
341 return 0;
342 }
343
344 switch (tmp->family) {
345 case AF_INET:
346 r = sd_netlink_message_read_in_addr(message, RTA_DST, &tmp->dst.in);
347 if (r < 0 && r != -ENODATA) {
348 log_link_warning_errno(link, r, "rtnl: received route message without valid destination, ignoring: %m");
349 return 0;
350 }
351
352 r = sd_netlink_message_read_in_addr(message, RTA_GATEWAY, &tmp->gw.in);
353 if (r < 0 && r != -ENODATA) {
354 log_link_warning_errno(link, r, "rtnl: received route message without valid gateway, ignoring: %m");
355 return 0;
356 }
357
358 r = sd_netlink_message_read_in_addr(message, RTA_SRC, &tmp->src.in);
359 if (r < 0 && r != -ENODATA) {
360 log_link_warning_errno(link, r, "rtnl: received route message without valid source, ignoring: %m");
361 return 0;
362 }
363
364 r = sd_netlink_message_read_in_addr(message, RTA_PREFSRC, &tmp->prefsrc.in);
365 if (r < 0 && r != -ENODATA) {
366 log_link_warning_errno(link, r, "rtnl: received route message without valid preferred source, ignoring: %m");
367 return 0;
368 }
369
370 break;
371
372 case AF_INET6:
373 r = sd_netlink_message_read_in6_addr(message, RTA_DST, &tmp->dst.in6);
374 if (r < 0 && r != -ENODATA) {
375 log_link_warning_errno(link, r, "rtnl: received route message without valid destination, ignoring: %m");
376 return 0;
377 }
378
379 r = sd_netlink_message_read_in6_addr(message, RTA_GATEWAY, &tmp->gw.in6);
380 if (r < 0 && r != -ENODATA) {
381 log_link_warning_errno(link, r, "rtnl: received route message without valid gateway, ignoring: %m");
382 return 0;
383 }
384
385 r = sd_netlink_message_read_in6_addr(message, RTA_SRC, &tmp->src.in6);
386 if (r < 0 && r != -ENODATA) {
387 log_link_warning_errno(link, r, "rtnl: received route message without valid source, ignoring: %m");
388 return 0;
389 }
390
391 r = sd_netlink_message_read_in6_addr(message, RTA_PREFSRC, &tmp->prefsrc.in6);
392 if (r < 0 && r != -ENODATA) {
393 log_link_warning_errno(link, r, "rtnl: received route message without valid preferred source, ignoring: %m");
394 return 0;
395 }
396
397 break;
398
399 default:
400 assert_not_reached("Received route message with unsupported address family");
401 return 0;
402 }
403
404 r = sd_rtnl_message_route_get_dst_prefixlen(message, &tmp->dst_prefixlen);
405 if (r < 0) {
406 log_link_warning_errno(link, r, "rtnl: received route message with invalid destination prefixlen, ignoring: %m");
407 return 0;
408 }
409
410 r = sd_rtnl_message_route_get_src_prefixlen(message, &tmp->src_prefixlen);
411 if (r < 0) {
412 log_link_warning_errno(link, r, "rtnl: received route message with invalid source prefixlen, ignoring: %m");
413 return 0;
414 }
415
416 r = sd_rtnl_message_route_get_scope(message, &tmp->scope);
417 if (r < 0) {
418 log_link_warning_errno(link, r, "rtnl: received route message with invalid scope, ignoring: %m");
419 return 0;
420 }
421
422 r = sd_rtnl_message_route_get_tos(message, &tmp->tos);
423 if (r < 0) {
424 log_link_warning_errno(link, r, "rtnl: received route message with invalid tos, ignoring: %m");
425 return 0;
426 }
427
428 r = sd_rtnl_message_route_get_type(message, &tmp->type);
429 if (r < 0) {
430 log_link_warning_errno(link, r, "rtnl: received route message with invalid type, ignoring: %m");
431 return 0;
432 }
433
434 r = sd_rtnl_message_route_get_table(message, &table);
435 if (r < 0) {
436 log_link_warning_errno(link, r, "rtnl: received route message with invalid table, ignoring: %m");
437 return 0;
438 }
439 tmp->table = table;
440
441 r = sd_netlink_message_read_u32(message, RTA_PRIORITY, &tmp->priority);
442 if (r < 0 && r != -ENODATA) {
443 log_link_warning_errno(link, r, "rtnl: received route message with invalid priority, ignoring: %m");
444 return 0;
445 }
446
447 r = sd_netlink_message_enter_container(message, RTA_METRICS);
448 if (r < 0 && r != -ENODATA) {
449 log_link_error_errno(link, r, "rtnl: Could not enter RTA_METRICS container: %m");
450 return 0;
451 }
452 if (r >= 0) {
453 r = sd_netlink_message_read_u32(message, RTAX_INITCWND, &tmp->initcwnd);
454 if (r < 0 && r != -ENODATA) {
455 log_link_warning_errno(link, r, "rtnl: received route message with invalid initcwnd, ignoring: %m");
456 return 0;
457 }
458
459 r = sd_netlink_message_read_u32(message, RTAX_INITRWND, &tmp->initrwnd);
460 if (r < 0 && r != -ENODATA) {
461 log_link_warning_errno(link, r, "rtnl: received route message with invalid initrwnd, ignoring: %m");
462 return 0;
463 }
464
465 r = sd_netlink_message_exit_container(message);
466 if (r < 0) {
467 log_link_error_errno(link, r, "rtnl: Could not exit from RTA_METRICS container: %m");
468 return 0;
469 }
470 }
471
472 (void) route_get(link, tmp, &route);
473
474 if (DEBUG_LOGGING) {
475 _cleanup_free_ char *buf_dst = NULL, *buf_dst_prefixlen = NULL,
476 *buf_src = NULL, *buf_gw = NULL, *buf_prefsrc = NULL;
477 char buf_scope[ROUTE_SCOPE_STR_MAX], buf_table[ROUTE_TABLE_STR_MAX],
478 buf_protocol[ROUTE_PROTOCOL_STR_MAX];
479
480 if (!in_addr_is_null(tmp->family, &tmp->dst)) {
481 (void) in_addr_to_string(tmp->family, &tmp->dst, &buf_dst);
482 (void) asprintf(&buf_dst_prefixlen, "/%u", tmp->dst_prefixlen);
483 }
484 if (!in_addr_is_null(tmp->family, &tmp->src))
485 (void) in_addr_to_string(tmp->family, &tmp->src, &buf_src);
486 if (!in_addr_is_null(tmp->family, &tmp->gw))
487 (void) in_addr_to_string(tmp->family, &tmp->gw, &buf_gw);
488 if (!in_addr_is_null(tmp->family, &tmp->prefsrc))
489 (void) in_addr_to_string(tmp->family, &tmp->prefsrc, &buf_prefsrc);
490
491 log_link_debug(link,
492 "%s route: dst: %s%s, src: %s, gw: %s, prefsrc: %s, scope: %s, table: %s, proto: %s, type: %s",
493 type == RTM_DELROUTE ? "Forgetting" : route ? "Received remembered" : "Remembering",
494 strna(buf_dst), strempty(buf_dst_prefixlen),
495 strna(buf_src), strna(buf_gw), strna(buf_prefsrc),
496 format_route_scope(tmp->scope, buf_scope, sizeof buf_scope),
497 format_route_table(tmp->table, buf_table, sizeof buf_table),
498 format_route_protocol(tmp->protocol, buf_protocol, sizeof buf_protocol),
499 strna(route_type_to_string(tmp->type)));
500 }
501
502 switch (type) {
503 case RTM_NEWROUTE:
504 if (!route) {
505 /* A route appeared that we did not request */
506 r = route_add_foreign(link, tmp, &route);
507 if (r < 0) {
508 log_link_warning_errno(link, r, "Failed to remember foreign route, ignoring: %m");
509 return 0;
510 }
511 }
512
513 break;
514
515 case RTM_DELROUTE:
516 route_free(route);
517 break;
518
519 default:
520 assert_not_reached("Received route message with invalid RTNL message type");
521 }
522
523 return 1;
524 }
525
526 static int manager_rtnl_process_neighbor_lladdr(sd_netlink_message *message, union lladdr_union *lladdr, size_t *size, char **str) {
527 int r;
528
529 assert(message);
530 assert(lladdr);
531 assert(size);
532 assert(str);
533
534 *str = NULL;
535
536 r = sd_netlink_message_read(message, NDA_LLADDR, sizeof(lladdr->ip.in6), &lladdr->ip.in6);
537 if (r >= 0) {
538 *size = sizeof(lladdr->ip.in6);
539 if (in_addr_to_string(AF_INET6, &lladdr->ip, str) < 0)
540 log_warning_errno(r, "Could not print lower address: %m");
541 return r;
542 }
543
544 r = sd_netlink_message_read(message, NDA_LLADDR, sizeof(lladdr->mac), &lladdr->mac);
545 if (r >= 0) {
546 *size = sizeof(lladdr->mac);
547 *str = new(char, ETHER_ADDR_TO_STRING_MAX);
548 if (!*str) {
549 log_oom();
550 return r;
551 }
552 ether_addr_to_string(&lladdr->mac, *str);
553 return r;
554 }
555
556 r = sd_netlink_message_read(message, NDA_LLADDR, sizeof(lladdr->ip.in), &lladdr->ip.in);
557 if (r >= 0) {
558 *size = sizeof(lladdr->ip.in);
559 if (in_addr_to_string(AF_INET, &lladdr->ip, str) < 0)
560 log_warning_errno(r, "Could not print lower address: %m");
561 return r;
562 }
563
564 return r;
565 }
566
567 int manager_rtnl_process_neighbor(sd_netlink *rtnl, sd_netlink_message *message, void *userdata) {
568 Manager *m = userdata;
569 Link *link = NULL;
570 Neighbor *neighbor = NULL;
571 int ifindex, family, r;
572 uint16_t type, state;
573 union in_addr_union in_addr = IN_ADDR_NULL;
574 _cleanup_free_ char *addr_str = NULL;
575 union lladdr_union lladdr;
576 size_t lladdr_size = 0;
577 _cleanup_free_ char *lladdr_str = NULL;
578
579 assert(rtnl);
580 assert(message);
581 assert(m);
582
583 if (sd_netlink_message_is_error(message)) {
584 r = sd_netlink_message_get_errno(message);
585 if (r < 0)
586 log_message_warning_errno(message, r, "rtnl: failed to receive neighbor message, ignoring");
587
588 return 0;
589 }
590
591 r = sd_netlink_message_get_type(message, &type);
592 if (r < 0) {
593 log_warning_errno(r, "rtnl: could not get message type, ignoring: %m");
594 return 0;
595 } else if (!IN_SET(type, RTM_NEWNEIGH, RTM_DELNEIGH)) {
596 log_warning("rtnl: received unexpected message type %u when processing neighbor, ignoring.", type);
597 return 0;
598 }
599
600 r = sd_rtnl_message_neigh_get_state(message, &state);
601 if (r < 0) {
602 log_link_warning_errno(link, r, "rtnl: received neighbor message with invalid state, ignoring: %m");
603 return 0;
604 } else if (!FLAGS_SET(state, NUD_PERMANENT)) {
605 log_debug("rtnl: received non-static neighbor, ignoring.");
606 return 0;
607 }
608
609 r = sd_rtnl_message_neigh_get_ifindex(message, &ifindex);
610 if (r < 0) {
611 log_warning_errno(r, "rtnl: could not get ifindex from message, ignoring: %m");
612 return 0;
613 } else if (ifindex <= 0) {
614 log_warning("rtnl: received neighbor message with invalid ifindex %d, ignoring.", ifindex);
615 return 0;
616 }
617
618 r = link_get(m, ifindex, &link);
619 if (r < 0 || !link) {
620 /* when enumerating we might be out of sync, but we will get the neighbor again, so just
621 * ignore it */
622 if (!m->enumerating)
623 log_warning("rtnl: received neighbor for link '%d' we don't know about, ignoring.", ifindex);
624 return 0;
625 }
626
627 r = sd_rtnl_message_neigh_get_family(message, &family);
628 if (r < 0 || !IN_SET(family, AF_INET, AF_INET6)) {
629 log_link_warning(link, "rtnl: received neighbor message with invalid family, ignoring.");
630 return 0;
631 }
632
633 switch (family) {
634 case AF_INET:
635 r = sd_netlink_message_read_in_addr(message, NDA_DST, &in_addr.in);
636 if (r < 0) {
637 log_link_warning_errno(link, r, "rtnl: received neighbor message without valid address, ignoring: %m");
638 return 0;
639 }
640
641 break;
642
643 case AF_INET6:
644 r = sd_netlink_message_read_in6_addr(message, NDA_DST, &in_addr.in6);
645 if (r < 0) {
646 log_link_warning_errno(link, r, "rtnl: received neighbor message without valid address, ignoring: %m");
647 return 0;
648 }
649
650 break;
651
652 default:
653 assert_not_reached("Received unsupported address family");
654 }
655
656 if (in_addr_to_string(family, &in_addr, &addr_str) < 0)
657 log_link_warning_errno(link, r, "Could not print address: %m");
658
659 r = manager_rtnl_process_neighbor_lladdr(message, &lladdr, &lladdr_size, &lladdr_str);
660 if (r < 0) {
661 log_link_warning_errno(link, r, "rtnl: received neighbor message with invalid lladdr, ignoring: %m");
662 return 0;
663 }
664
665 (void) neighbor_get(link, family, &in_addr, &lladdr, lladdr_size, &neighbor);
666
667 switch (type) {
668 case RTM_NEWNEIGH:
669 if (neighbor)
670 log_link_debug(link, "Remembering neighbor: %s->%s",
671 strnull(addr_str), strnull(lladdr_str));
672 else {
673 /* A neighbor appeared that we did not request */
674 r = neighbor_add_foreign(link, family, &in_addr, &lladdr, lladdr_size, &neighbor);
675 if (r < 0) {
676 log_link_warning_errno(link, r, "Failed to remember foreign neighbor %s->%s, ignoring: %m",
677 strnull(addr_str), strnull(lladdr_str));
678 return 0;
679 } else
680 log_link_debug(link, "Remembering foreign neighbor: %s->%s",
681 strnull(addr_str), strnull(lladdr_str));
682 }
683
684 break;
685
686 case RTM_DELNEIGH:
687 if (neighbor) {
688 log_link_debug(link, "Forgetting neighbor: %s->%s",
689 strnull(addr_str), strnull(lladdr_str));
690 (void) neighbor_free(neighbor);
691 } else
692 log_link_info(link, "Kernel removed a neighbor we don't remember: %s->%s, ignoring.",
693 strnull(addr_str), strnull(lladdr_str));
694
695 break;
696
697 default:
698 assert_not_reached("Received invalid RTNL message type");
699 }
700
701 return 1;
702 }
703
704 int manager_rtnl_process_address(sd_netlink *rtnl, sd_netlink_message *message, void *userdata) {
705 _cleanup_free_ char *buf = NULL;
706 Manager *m = userdata;
707 Link *link = NULL;
708 uint16_t type;
709 unsigned char flags, prefixlen, scope;
710 union in_addr_union in_addr = IN_ADDR_NULL;
711 struct ifa_cacheinfo cinfo;
712 Address *address = NULL;
713 char valid_buf[FORMAT_TIMESPAN_MAX];
714 const char *valid_str = NULL;
715 int ifindex, family, r;
716
717 assert(rtnl);
718 assert(message);
719 assert(m);
720
721 if (sd_netlink_message_is_error(message)) {
722 r = sd_netlink_message_get_errno(message);
723 if (r < 0)
724 log_message_warning_errno(message, r, "rtnl: failed to receive address message, ignoring");
725
726 return 0;
727 }
728
729 r = sd_netlink_message_get_type(message, &type);
730 if (r < 0) {
731 log_warning_errno(r, "rtnl: could not get message type, ignoring: %m");
732 return 0;
733 } else if (!IN_SET(type, RTM_NEWADDR, RTM_DELADDR)) {
734 log_warning("rtnl: received unexpected message type %u when processing address, ignoring.", type);
735 return 0;
736 }
737
738 r = sd_rtnl_message_addr_get_ifindex(message, &ifindex);
739 if (r < 0) {
740 log_warning_errno(r, "rtnl: could not get ifindex from message, ignoring: %m");
741 return 0;
742 } else if (ifindex <= 0) {
743 log_warning("rtnl: received address message with invalid ifindex %d, ignoring.", ifindex);
744 return 0;
745 }
746
747 r = link_get(m, ifindex, &link);
748 if (r < 0 || !link) {
749 /* when enumerating we might be out of sync, but we will get the address again, so just
750 * ignore it */
751 if (!m->enumerating)
752 log_warning("rtnl: received address for link '%d' we don't know about, ignoring.", ifindex);
753 return 0;
754 }
755
756 r = sd_rtnl_message_addr_get_family(message, &family);
757 if (r < 0 || !IN_SET(family, AF_INET, AF_INET6)) {
758 log_link_warning(link, "rtnl: received address message with invalid family, ignoring.");
759 return 0;
760 }
761
762 r = sd_rtnl_message_addr_get_prefixlen(message, &prefixlen);
763 if (r < 0) {
764 log_link_warning_errno(link, r, "rtnl: received address message with invalid prefixlen, ignoring: %m");
765 return 0;
766 }
767
768 r = sd_rtnl_message_addr_get_scope(message, &scope);
769 if (r < 0) {
770 log_link_warning_errno(link, r, "rtnl: received address message with invalid scope, ignoring: %m");
771 return 0;
772 }
773
774 r = sd_rtnl_message_addr_get_flags(message, &flags);
775 if (r < 0) {
776 log_link_warning_errno(link, r, "rtnl: received address message with invalid flags, ignoring: %m");
777 return 0;
778 }
779
780 switch (family) {
781 case AF_INET:
782 r = sd_netlink_message_read_in_addr(message, IFA_LOCAL, &in_addr.in);
783 if (r < 0) {
784 log_link_warning_errno(link, r, "rtnl: received address message without valid address, ignoring: %m");
785 return 0;
786 }
787
788 break;
789
790 case AF_INET6:
791 r = sd_netlink_message_read_in6_addr(message, IFA_ADDRESS, &in_addr.in6);
792 if (r < 0) {
793 log_link_warning_errno(link, r, "rtnl: received address message without valid address, ignoring: %m");
794 return 0;
795 }
796
797 break;
798
799 default:
800 assert_not_reached("Received unsupported address family");
801 }
802
803 r = in_addr_to_string(family, &in_addr, &buf);
804 if (r < 0)
805 log_link_warning_errno(link, r, "Could not print address: %m");
806
807 r = sd_netlink_message_read_cache_info(message, IFA_CACHEINFO, &cinfo);
808 if (r < 0 && r != -ENODATA) {
809 log_link_warning_errno(link, r, "rtnl: cannot get IFA_CACHEINFO attribute, ignoring: %m");
810 return 0;
811 } else if (r >= 0 && cinfo.ifa_valid != CACHE_INFO_INFINITY_LIFE_TIME)
812 valid_str = format_timespan(valid_buf, FORMAT_TIMESPAN_MAX,
813 cinfo.ifa_valid * USEC_PER_SEC,
814 USEC_PER_SEC);
815
816 (void) address_get(link, family, &in_addr, prefixlen, &address);
817
818 switch (type) {
819 case RTM_NEWADDR:
820 if (address)
821 log_link_debug(link, "Remembering updated address: %s/%u (valid %s%s)",
822 strnull(buf), prefixlen,
823 valid_str ? "for " : "forever", strempty(valid_str));
824 else {
825 /* An address appeared that we did not request */
826 r = address_add_foreign(link, family, &in_addr, prefixlen, &address);
827 if (r < 0) {
828 log_link_warning_errno(link, r, "Failed to remember foreign address %s/%u, ignoring: %m",
829 strnull(buf), prefixlen);
830 return 0;
831 } else
832 log_link_debug(link, "Remembering foreign address: %s/%u (valid %s%s)",
833 strnull(buf), prefixlen,
834 valid_str ? "for " : "forever", strempty(valid_str));
835 }
836
837 /* address_update() logs internally, so we don't need to. */
838 (void) address_update(address, flags, scope, &cinfo);
839
840 break;
841
842 case RTM_DELADDR:
843 if (address) {
844 log_link_debug(link, "Forgetting address: %s/%u (valid %s%s)",
845 strnull(buf), prefixlen,
846 valid_str ? "for " : "forever", strempty(valid_str));
847 (void) address_drop(address);
848 } else
849 log_link_info(link, "Kernel removed an address we don't remember: %s/%u (valid %s%s), ignoring.",
850 strnull(buf), prefixlen,
851 valid_str ? "for " : "forever", strempty(valid_str));
852
853 break;
854
855 default:
856 assert_not_reached("Received invalid RTNL message type");
857 }
858
859 return 1;
860 }
861
862 static int manager_rtnl_process_link(sd_netlink *rtnl, sd_netlink_message *message, void *userdata) {
863 Manager *m = userdata;
864 Link *link = NULL;
865 NetDev *netdev = NULL;
866 uint16_t type;
867 const char *name;
868 int r, ifindex;
869
870 assert(rtnl);
871 assert(message);
872 assert(m);
873
874 if (sd_netlink_message_is_error(message)) {
875 r = sd_netlink_message_get_errno(message);
876 if (r < 0)
877 log_message_warning_errno(message, r, "rtnl: Could not receive link message, ignoring");
878
879 return 0;
880 }
881
882 r = sd_netlink_message_get_type(message, &type);
883 if (r < 0) {
884 log_warning_errno(r, "rtnl: Could not get message type, ignoring: %m");
885 return 0;
886 } else if (!IN_SET(type, RTM_NEWLINK, RTM_DELLINK)) {
887 log_warning("rtnl: Received unexpected message type %u when processing link, ignoring.", type);
888 return 0;
889 }
890
891 r = sd_rtnl_message_link_get_ifindex(message, &ifindex);
892 if (r < 0) {
893 log_warning_errno(r, "rtnl: Could not get ifindex from link message, ignoring: %m");
894 return 0;
895 } else if (ifindex <= 0) {
896 log_warning("rtnl: received link message with invalid ifindex %d, ignoring.", ifindex);
897 return 0;
898 }
899
900 r = sd_netlink_message_read_string(message, IFLA_IFNAME, &name);
901 if (r < 0) {
902 log_warning_errno(r, "rtnl: Received link message without ifname, ignoring: %m");
903 return 0;
904 }
905
906 (void) link_get(m, ifindex, &link);
907 (void) netdev_get(m, name, &netdev);
908
909 switch (type) {
910 case RTM_NEWLINK:
911 if (!link) {
912 /* link is new, so add it */
913 r = link_add(m, message, &link);
914 if (r < 0) {
915 log_warning_errno(r, "Could not process new link message, ignoring: %m");
916 return 0;
917 }
918 }
919
920 if (netdev) {
921 /* netdev exists, so make sure the ifindex matches */
922 r = netdev_set_ifindex(netdev, message);
923 if (r < 0) {
924 log_warning_errno(r, "Could not process new link message for netdev, ignoring: %m");
925 return 0;
926 }
927 }
928
929 r = link_update(link, message);
930 if (r < 0) {
931 log_warning_errno(r, "Could not process link message, ignoring: %m");
932 return 0;
933 }
934
935 break;
936
937 case RTM_DELLINK:
938 link_drop(link);
939 netdev_drop(netdev);
940
941 break;
942
943 default:
944 assert_not_reached("Received link message with invalid RTNL message type.");
945 }
946
947 return 1;
948 }
949
950 int manager_rtnl_process_rule(sd_netlink *rtnl, sd_netlink_message *message, void *userdata) {
951 _cleanup_(routing_policy_rule_freep) RoutingPolicyRule *tmp = NULL;
952 _cleanup_free_ char *from = NULL, *to = NULL;
953 RoutingPolicyRule *rule = NULL;
954 const char *iif = NULL, *oif = NULL;
955 Manager *m = userdata;
956 unsigned flags;
957 uint16_t type;
958 int r;
959
960 assert(rtnl);
961 assert(message);
962 assert(m);
963
964 if (sd_netlink_message_is_error(message)) {
965 r = sd_netlink_message_get_errno(message);
966 if (r < 0)
967 log_message_warning_errno(message, r, "rtnl: failed to receive rule message, ignoring");
968
969 return 0;
970 }
971
972 r = sd_netlink_message_get_type(message, &type);
973 if (r < 0) {
974 log_warning_errno(r, "rtnl: could not get message type, ignoring: %m");
975 return 0;
976 } else if (!IN_SET(type, RTM_NEWRULE, RTM_DELRULE)) {
977 log_warning("rtnl: received unexpected message type %u when processing rule, ignoring.", type);
978 return 0;
979 }
980
981 r = routing_policy_rule_new(&tmp);
982 if (r < 0) {
983 log_oom();
984 return 0;
985 }
986
987 r = sd_rtnl_message_get_family(message, &tmp->family);
988 if (r < 0) {
989 log_warning_errno(r, "rtnl: could not get rule family, ignoring: %m");
990 return 0;
991 } else if (!IN_SET(tmp->family, AF_INET, AF_INET6)) {
992 log_debug("rtnl: received rule message with invalid family %d, ignoring.", tmp->family);
993 return 0;
994 }
995
996 switch (tmp->family) {
997 case AF_INET:
998 r = sd_netlink_message_read_in_addr(message, FRA_SRC, &tmp->from.in);
999 if (r < 0 && r != -ENODATA) {
1000 log_warning_errno(r, "rtnl: could not get FRA_SRC attribute, ignoring: %m");
1001 return 0;
1002 } else if (r >= 0) {
1003 r = sd_rtnl_message_routing_policy_rule_get_rtm_src_prefixlen(message, &tmp->from_prefixlen);
1004 if (r < 0) {
1005 log_warning_errno(r, "rtnl: received rule message without valid source prefix length, ignoring: %m");
1006 return 0;
1007 }
1008 }
1009
1010 r = sd_netlink_message_read_in_addr(message, FRA_DST, &tmp->to.in);
1011 if (r < 0 && r != -ENODATA) {
1012 log_warning_errno(r, "rtnl: could not get FRA_DST attribute, ignoring: %m");
1013 return 0;
1014 } else if (r >= 0) {
1015 r = sd_rtnl_message_routing_policy_rule_get_rtm_dst_prefixlen(message, &tmp->to_prefixlen);
1016 if (r < 0) {
1017 log_warning_errno(r, "rtnl: received rule message without valid destination prefix length, ignoring: %m");
1018 return 0;
1019 }
1020 }
1021
1022 break;
1023
1024 case AF_INET6:
1025 r = sd_netlink_message_read_in6_addr(message, FRA_SRC, &tmp->from.in6);
1026 if (r < 0 && r != -ENODATA) {
1027 log_warning_errno(r, "rtnl: could not get FRA_SRC attribute, ignoring: %m");
1028 return 0;
1029 } else if (r >= 0) {
1030 r = sd_rtnl_message_routing_policy_rule_get_rtm_src_prefixlen(message, &tmp->from_prefixlen);
1031 if (r < 0) {
1032 log_warning_errno(r, "rtnl: received rule message without valid source prefix length, ignoring: %m");
1033 return 0;
1034 }
1035 }
1036
1037 r = sd_netlink_message_read_in6_addr(message, FRA_DST, &tmp->to.in6);
1038 if (r < 0 && r != -ENODATA) {
1039 log_warning_errno(r, "rtnl: could not get FRA_DST attribute, ignoring: %m");
1040 return 0;
1041 } else if (r >= 0) {
1042 r = sd_rtnl_message_routing_policy_rule_get_rtm_dst_prefixlen(message, &tmp->to_prefixlen);
1043 if (r < 0) {
1044 log_warning_errno(r, "rtnl: received rule message without valid destination prefix length, ignoring: %m");
1045 return 0;
1046 }
1047 }
1048
1049 break;
1050
1051 default:
1052 assert_not_reached("Received rule message with unsupported address family");
1053 }
1054
1055 if (tmp->from_prefixlen == 0 && tmp->to_prefixlen == 0)
1056 return 0;
1057
1058 r = sd_rtnl_message_routing_policy_rule_get_flags(message, &flags);
1059 if (r < 0) {
1060 log_warning_errno(r, "rtnl: received rule message without valid flag, ignoring: %m");
1061 return 0;
1062 }
1063 tmp->invert_rule = flags & FIB_RULE_INVERT;
1064
1065 r = sd_netlink_message_read_u32(message, FRA_FWMARK, &tmp->fwmark);
1066 if (r < 0 && r != -ENODATA) {
1067 log_warning_errno(r, "rtnl: could not get FRA_FWMARK attribute, ignoring: %m");
1068 return 0;
1069 }
1070
1071 r = sd_netlink_message_read_u32(message, FRA_FWMASK, &tmp->fwmask);
1072 if (r < 0 && r != -ENODATA) {
1073 log_warning_errno(r, "rtnl: could not get FRA_FWMASK attribute, ignoring: %m");
1074 return 0;
1075 }
1076
1077 r = sd_netlink_message_read_u32(message, FRA_PRIORITY, &tmp->priority);
1078 if (r < 0 && r != -ENODATA) {
1079 log_warning_errno(r, "rtnl: could not get FRA_PRIORITY attribute, ignoring: %m");
1080 return 0;
1081 }
1082
1083 r = sd_netlink_message_read_u32(message, FRA_TABLE, &tmp->table);
1084 if (r < 0 && r != -ENODATA) {
1085 log_warning_errno(r, "rtnl: could not get FRA_TABLE attribute, ignoring: %m");
1086 return 0;
1087 }
1088
1089 r = sd_rtnl_message_routing_policy_rule_get_tos(message, &tmp->tos);
1090 if (r < 0 && r != -ENODATA) {
1091 log_warning_errno(r, "rtnl: could not get ip rule TOS, ignoring: %m");
1092 return 0;
1093 }
1094
1095 r = sd_netlink_message_read_string(message, FRA_IIFNAME, &iif);
1096 if (r < 0 && r != -ENODATA) {
1097 log_warning_errno(r, "rtnl: could not get FRA_IIFNAME attribute, ignoring: %m");
1098 return 0;
1099 }
1100 r = free_and_strdup(&tmp->iif, iif);
1101 if (r < 0)
1102 return log_oom();
1103
1104 r = sd_netlink_message_read_string(message, FRA_OIFNAME, &oif);
1105 if (r < 0 && r != -ENODATA) {
1106 log_warning_errno(r, "rtnl: could not get FRA_OIFNAME attribute, ignoring: %m");
1107 return 0;
1108 }
1109 r = free_and_strdup(&tmp->oif, oif);
1110 if (r < 0)
1111 return log_oom();
1112
1113 r = sd_netlink_message_read_u8(message, FRA_IP_PROTO, &tmp->protocol);
1114 if (r < 0 && r != -ENODATA) {
1115 log_warning_errno(r, "rtnl: could not get FRA_IP_PROTO attribute, ignoring: %m");
1116 return 0;
1117 }
1118
1119 r = sd_netlink_message_read(message, FRA_SPORT_RANGE, sizeof(tmp->sport), &tmp->sport);
1120 if (r < 0 && r != -ENODATA) {
1121 log_warning_errno(r, "rtnl: could not get FRA_SPORT_RANGE attribute, ignoring: %m");
1122 return 0;
1123 }
1124
1125 r = sd_netlink_message_read(message, FRA_DPORT_RANGE, sizeof(tmp->dport), &tmp->dport);
1126 if (r < 0 && r != -ENODATA) {
1127 log_warning_errno(r, "rtnl: could not get FRA_DPORT_RANGE attribute, ignoring: %m");
1128 return 0;
1129 }
1130
1131 (void) routing_policy_rule_get(m, tmp, &rule);
1132
1133 if (DEBUG_LOGGING) {
1134 (void) in_addr_to_string(tmp->family, &tmp->from, &from);
1135 (void) in_addr_to_string(tmp->family, &tmp->to, &to);
1136 }
1137
1138 switch (type) {
1139 case RTM_NEWRULE:
1140 if (!rule) {
1141 log_debug("Remembering foreign routing policy rule: %s/%u -> %s/%u, iif: %s, oif: %s, table: %u",
1142 from, tmp->from_prefixlen, to, tmp->to_prefixlen, strna(tmp->iif), strna(tmp->oif), tmp->table);
1143 r = routing_policy_rule_add_foreign(m, tmp, &rule);
1144 if (r < 0) {
1145 log_warning_errno(r, "Could not remember foreign rule, ignoring: %m");
1146 return 0;
1147 }
1148 }
1149 break;
1150 case RTM_DELRULE:
1151 log_debug("Forgetting routing policy rule: %s/%u -> %s/%u, iif: %s, oif: %s, table: %u",
1152 from, tmp->from_prefixlen, to, tmp->to_prefixlen, strna(tmp->iif), strna(tmp->oif), tmp->table);
1153 routing_policy_rule_free(rule);
1154
1155 break;
1156
1157 default:
1158 assert_not_reached("Received invalid RTNL message type");
1159 }
1160
1161 return 1;
1162 }
1163
1164 int manager_rtnl_process_nexthop(sd_netlink *rtnl, sd_netlink_message *message, void *userdata) {
1165 _cleanup_(nexthop_freep) NextHop *tmp = NULL;
1166 _cleanup_free_ char *gateway = NULL;
1167 NextHop *nexthop = NULL;
1168 Manager *m = userdata;
1169 Link *link = NULL;
1170 uint16_t type;
1171 int r;
1172
1173 assert(rtnl);
1174 assert(message);
1175 assert(m);
1176
1177 if (sd_netlink_message_is_error(message)) {
1178 r = sd_netlink_message_get_errno(message);
1179 if (r < 0)
1180 log_message_warning_errno(message, r, "rtnl: failed to receive rule message, ignoring");
1181
1182 return 0;
1183 }
1184
1185 r = sd_netlink_message_get_type(message, &type);
1186 if (r < 0) {
1187 log_warning_errno(r, "rtnl: could not get message type, ignoring: %m");
1188 return 0;
1189 } else if (!IN_SET(type, RTM_NEWNEXTHOP, RTM_DELNEXTHOP)) {
1190 log_warning("rtnl: received unexpected message type %u when processing nexthop, ignoring.", type);
1191 return 0;
1192 }
1193
1194 r = nexthop_new(&tmp);
1195 if (r < 0)
1196 return log_oom();
1197
1198 r = sd_rtnl_message_get_family(message, &tmp->family);
1199 if (r < 0) {
1200 log_warning_errno(r, "rtnl: could not get nexthop family, ignoring: %m");
1201 return 0;
1202 } else if (!IN_SET(tmp->family, AF_INET, AF_INET6)) {
1203 log_debug("rtnl: received nexthop message with invalid family %d, ignoring.", tmp->family);
1204 return 0;
1205 }
1206
1207 switch (tmp->family) {
1208 case AF_INET:
1209 r = sd_netlink_message_read_in_addr(message, NHA_GATEWAY, &tmp->gw.in);
1210 if (r < 0 && r != -ENODATA) {
1211 log_warning_errno(r, "rtnl: could not get NHA_GATEWAY attribute, ignoring: %m");
1212 return 0;
1213 }
1214 break;
1215
1216 case AF_INET6:
1217 r = sd_netlink_message_read_in6_addr(message, NHA_GATEWAY, &tmp->gw.in6);
1218 if (r < 0 && r != -ENODATA) {
1219 log_warning_errno(r, "rtnl: could not get NHA_GATEWAY attribute, ignoring: %m");
1220 return 0;
1221 }
1222 break;
1223
1224 default:
1225 assert_not_reached("Received rule message with unsupported address family");
1226 }
1227
1228 r = sd_netlink_message_read_u32(message, NHA_ID, &tmp->id);
1229 if (r < 0 && r != -ENODATA) {
1230 log_warning_errno(r, "rtnl: could not get NHA_ID attribute, ignoring: %m");
1231 return 0;
1232 }
1233
1234 r = sd_netlink_message_read_u32(message, NHA_OIF, &tmp->oif);
1235 if (r < 0 && r != -ENODATA) {
1236 log_warning_errno(r, "rtnl: could not get NHA_OIF attribute, ignoring: %m");
1237 return 0;
1238 }
1239
1240 r = link_get(m, tmp->oif, &link);
1241 if (r < 0 || !link) {
1242 if (!m->enumerating)
1243 log_warning("rtnl: received nexthop message for link (%d) we do not know about, ignoring", tmp->oif);
1244 return 0;
1245 }
1246
1247 (void) nexthop_get(link, tmp, &nexthop);
1248
1249 if (DEBUG_LOGGING)
1250 (void) in_addr_to_string(tmp->family, &tmp->gw, &gateway);
1251
1252 switch (type) {
1253 case RTM_NEWNEXTHOP:
1254 if (!nexthop) {
1255 log_debug("Remembering foreign nexthop: %s, oif: %d, id: %d", gateway, tmp->oif, tmp->id);
1256 r = nexthop_add_foreign(link, tmp, &nexthop);
1257 if (r < 0) {
1258 log_warning_errno(r, "Could not remember foreign nexthop, ignoring: %m");
1259 return 0;
1260 }
1261 }
1262 break;
1263 case RTM_DELNEXTHOP:
1264 log_debug("Forgetting foreign nexthop: %s, oif: %d, id: %d", gateway, tmp->oif, tmp->id);
1265 nexthop_free(nexthop);
1266
1267 break;
1268
1269 default:
1270 assert_not_reached("Received invalid RTNL message type");
1271 }
1272
1273 return 1;
1274 }
1275
1276 static int systemd_netlink_fd(void) {
1277 int n, fd, rtnl_fd = -EINVAL;
1278
1279 n = sd_listen_fds(true);
1280 if (n <= 0)
1281 return -EINVAL;
1282
1283 for (fd = SD_LISTEN_FDS_START; fd < SD_LISTEN_FDS_START + n; fd ++) {
1284 if (sd_is_socket(fd, AF_NETLINK, SOCK_RAW, -1) > 0) {
1285 if (rtnl_fd >= 0)
1286 return -EINVAL;
1287
1288 rtnl_fd = fd;
1289 }
1290 }
1291
1292 return rtnl_fd;
1293 }
1294
1295 static int manager_connect_genl(Manager *m) {
1296 int r;
1297
1298 assert(m);
1299
1300 r = sd_genl_socket_open(&m->genl);
1301 if (r < 0)
1302 return r;
1303
1304 r = sd_netlink_inc_rcvbuf(m->genl, RCVBUF_SIZE);
1305 if (r < 0)
1306 return r;
1307
1308 r = sd_netlink_attach_event(m->genl, m->event, 0);
1309 if (r < 0)
1310 return r;
1311
1312 return 0;
1313 }
1314
1315 static int manager_connect_rtnl(Manager *m) {
1316 int fd, r;
1317
1318 assert(m);
1319
1320 fd = systemd_netlink_fd();
1321 if (fd < 0)
1322 r = sd_netlink_open(&m->rtnl);
1323 else
1324 r = sd_netlink_open_fd(&m->rtnl, fd);
1325 if (r < 0)
1326 return r;
1327
1328 r = sd_netlink_inc_rcvbuf(m->rtnl, RCVBUF_SIZE);
1329 if (r < 0)
1330 return r;
1331
1332 r = sd_netlink_attach_event(m->rtnl, m->event, 0);
1333 if (r < 0)
1334 return r;
1335
1336 r = sd_netlink_add_match(m->rtnl, NULL, RTM_NEWLINK, &manager_rtnl_process_link, NULL, m, "network-rtnl_process_link");
1337 if (r < 0)
1338 return r;
1339
1340 r = sd_netlink_add_match(m->rtnl, NULL, RTM_DELLINK, &manager_rtnl_process_link, NULL, m, "network-rtnl_process_link");
1341 if (r < 0)
1342 return r;
1343
1344 r = sd_netlink_add_match(m->rtnl, NULL, RTM_NEWADDR, &manager_rtnl_process_address, NULL, m, "network-rtnl_process_address");
1345 if (r < 0)
1346 return r;
1347
1348 r = sd_netlink_add_match(m->rtnl, NULL, RTM_DELADDR, &manager_rtnl_process_address, NULL, m, "network-rtnl_process_address");
1349 if (r < 0)
1350 return r;
1351
1352 r = sd_netlink_add_match(m->rtnl, NULL, RTM_NEWNEIGH, &manager_rtnl_process_neighbor, NULL, m, "network-rtnl_process_neighbor");
1353 if (r < 0)
1354 return r;
1355
1356 r = sd_netlink_add_match(m->rtnl, NULL, RTM_DELNEIGH, &manager_rtnl_process_neighbor, NULL, m, "network-rtnl_process_neighbor");
1357 if (r < 0)
1358 return r;
1359
1360 r = sd_netlink_add_match(m->rtnl, NULL, RTM_NEWROUTE, &manager_rtnl_process_route, NULL, m, "network-rtnl_process_route");
1361 if (r < 0)
1362 return r;
1363
1364 r = sd_netlink_add_match(m->rtnl, NULL, RTM_DELROUTE, &manager_rtnl_process_route, NULL, m, "network-rtnl_process_route");
1365 if (r < 0)
1366 return r;
1367
1368 r = sd_netlink_add_match(m->rtnl, NULL, RTM_NEWRULE, &manager_rtnl_process_rule, NULL, m, "network-rtnl_process_rule");
1369 if (r < 0)
1370 return r;
1371
1372 r = sd_netlink_add_match(m->rtnl, NULL, RTM_DELRULE, &manager_rtnl_process_rule, NULL, m, "network-rtnl_process_rule");
1373 if (r < 0)
1374 return r;
1375
1376 r = sd_netlink_add_match(m->rtnl, NULL, RTM_NEWNEXTHOP, &manager_rtnl_process_nexthop, NULL, m, "network-rtnl_process_nexthop");
1377 if (r < 0)
1378 return r;
1379
1380 r = sd_netlink_add_match(m->rtnl, NULL, RTM_DELNEXTHOP, &manager_rtnl_process_nexthop, NULL, m, "network-rtnl_process_nexthop");
1381 if (r < 0)
1382 return r;
1383
1384 return 0;
1385 }
1386
1387 static int ordered_set_put_in_addr_data(OrderedSet *s, const struct in_addr_data *address) {
1388 char *p;
1389 int r;
1390
1391 assert(s);
1392 assert(address);
1393
1394 r = in_addr_to_string(address->family, &address->address, &p);
1395 if (r < 0)
1396 return r;
1397
1398 r = ordered_set_consume(s, p);
1399 if (r == -EEXIST)
1400 return 0;
1401
1402 return r;
1403 }
1404
1405 static int ordered_set_put_in_addr_datav(OrderedSet *s, const struct in_addr_data *addresses, unsigned n) {
1406 int r, c = 0;
1407 unsigned i;
1408
1409 assert(s);
1410 assert(addresses || n == 0);
1411
1412 for (i = 0; i < n; i++) {
1413 r = ordered_set_put_in_addr_data(s, addresses+i);
1414 if (r < 0)
1415 return r;
1416
1417 c += r;
1418 }
1419
1420 return c;
1421 }
1422
1423 static int ordered_set_put_in4_addr(OrderedSet *s, const struct in_addr *address) {
1424 char *p;
1425 int r;
1426
1427 assert(s);
1428 assert(address);
1429
1430 r = in_addr_to_string(AF_INET, (const union in_addr_union*) address, &p);
1431 if (r < 0)
1432 return r;
1433
1434 r = ordered_set_consume(s, p);
1435 if (r == -EEXIST)
1436 return 0;
1437
1438 return r;
1439 }
1440
1441 static int ordered_set_put_in4_addrv(OrderedSet *s,
1442 const struct in_addr *addresses,
1443 size_t n,
1444 bool (*predicate)(const struct in_addr *addr)) {
1445 int r, c = 0;
1446 size_t i;
1447
1448 assert(s);
1449 assert(n == 0 || addresses);
1450
1451 for (i = 0; i < n; i++) {
1452 if (predicate && !predicate(&addresses[i]))
1453 continue;
1454 r = ordered_set_put_in4_addr(s, addresses+i);
1455 if (r < 0)
1456 return r;
1457
1458 c += r;
1459 }
1460
1461 return c;
1462 }
1463
1464 static int manager_save(Manager *m) {
1465 _cleanup_ordered_set_free_free_ OrderedSet *dns = NULL, *ntp = NULL, *sip = NULL, *search_domains = NULL, *route_domains = NULL;
1466 const char *operstate_str, *carrier_state_str, *address_state_str;
1467 LinkOperationalState operstate = LINK_OPERSTATE_OFF;
1468 LinkCarrierState carrier_state = LINK_CARRIER_STATE_OFF;
1469 LinkAddressState address_state = LINK_ADDRESS_STATE_OFF;
1470 _cleanup_free_ char *temp_path = NULL;
1471 _cleanup_strv_free_ char **p = NULL;
1472 _cleanup_fclose_ FILE *f = NULL;
1473 Link *link;
1474 Iterator i;
1475 int r;
1476
1477 assert(m);
1478 assert(m->state_file);
1479
1480 /* We add all NTP and DNS server to a set, to filter out duplicates */
1481 dns = ordered_set_new(&string_hash_ops);
1482 if (!dns)
1483 return -ENOMEM;
1484
1485 ntp = ordered_set_new(&string_hash_ops);
1486 if (!ntp)
1487 return -ENOMEM;
1488
1489 sip = ordered_set_new(&string_hash_ops);
1490 if (!sip)
1491 return -ENOMEM;
1492
1493 search_domains = ordered_set_new(&dns_name_hash_ops);
1494 if (!search_domains)
1495 return -ENOMEM;
1496
1497 route_domains = ordered_set_new(&dns_name_hash_ops);
1498 if (!route_domains)
1499 return -ENOMEM;
1500
1501 HASHMAP_FOREACH(link, m->links, i) {
1502 if (link->flags & IFF_LOOPBACK)
1503 continue;
1504
1505 if (link->operstate > operstate)
1506 operstate = link->operstate;
1507
1508 if (link->carrier_state > carrier_state)
1509 carrier_state = link->carrier_state;
1510
1511 if (link->address_state > address_state)
1512 address_state = link->address_state;
1513
1514 if (!link->network)
1515 continue;
1516
1517 /* First add the static configured entries */
1518 r = ordered_set_put_in_addr_datav(dns, link->network->dns, link->network->n_dns);
1519 if (r < 0)
1520 return r;
1521
1522 r = ordered_set_put_strdupv(ntp, link->ntp ?: link->network->ntp);
1523 if (r < 0)
1524 return r;
1525
1526 r = ordered_set_put_string_set(search_domains, link->search_domains ?: link->network->search_domains);
1527 if (r < 0)
1528 return r;
1529
1530 r = ordered_set_put_string_set(route_domains, link->route_domains ?: link->network->route_domains);
1531 if (r < 0)
1532 return r;
1533
1534 if (!link->dhcp_lease)
1535 continue;
1536
1537 /* Secondly, add the entries acquired via DHCP */
1538 if (link->network->dhcp_use_dns) {
1539 const struct in_addr *addresses;
1540
1541 r = sd_dhcp_lease_get_dns(link->dhcp_lease, &addresses);
1542 if (r > 0) {
1543 r = ordered_set_put_in4_addrv(dns, addresses, r, in4_addr_is_non_local);
1544 if (r < 0)
1545 return r;
1546 } else if (r < 0 && r != -ENODATA)
1547 return r;
1548 }
1549
1550 if (link->network->dhcp_use_ntp) {
1551 const struct in_addr *addresses;
1552
1553 r = sd_dhcp_lease_get_ntp(link->dhcp_lease, &addresses);
1554 if (r > 0) {
1555 r = ordered_set_put_in4_addrv(ntp, addresses, r, in4_addr_is_non_local);
1556 if (r < 0)
1557 return r;
1558 } else if (r < 0 && r != -ENODATA)
1559 return r;
1560 }
1561
1562 if (link->network->dhcp_use_sip) {
1563 const struct in_addr *addresses;
1564
1565 r = sd_dhcp_lease_get_sip(link->dhcp_lease, &addresses);
1566 if (r > 0) {
1567 r = ordered_set_put_in4_addrv(sip, addresses, r, in4_addr_is_non_local);
1568 if (r < 0)
1569 return r;
1570 } else if (r < 0 && r != -ENODATA)
1571 return r;
1572 }
1573
1574 if (link->network->dhcp_use_domains != DHCP_USE_DOMAINS_NO) {
1575 const char *domainname;
1576 char **domains = NULL;
1577
1578 OrderedSet *target_domains = (link->network->dhcp_use_domains == DHCP_USE_DOMAINS_YES) ? search_domains : route_domains;
1579 r = sd_dhcp_lease_get_domainname(link->dhcp_lease, &domainname);
1580 if (r >= 0) {
1581 r = ordered_set_put_strdup(target_domains, domainname);
1582 if (r < 0)
1583 return r;
1584 } else if (r != -ENODATA)
1585 return r;
1586
1587 r = sd_dhcp_lease_get_search_domains(link->dhcp_lease, &domains);
1588 if (r >= 0) {
1589 r = ordered_set_put_strdupv(target_domains, domains);
1590 if (r < 0)
1591 return r;
1592 } else if (r != -ENODATA)
1593 return r;
1594 }
1595 }
1596
1597 if (carrier_state >= LINK_CARRIER_STATE_ENSLAVED)
1598 carrier_state = LINK_CARRIER_STATE_CARRIER;
1599
1600 operstate_str = link_operstate_to_string(operstate);
1601 assert(operstate_str);
1602
1603 carrier_state_str = link_carrier_state_to_string(carrier_state);
1604 assert(carrier_state_str);
1605
1606 address_state_str = link_address_state_to_string(address_state);
1607 assert(address_state_str);
1608
1609 r = fopen_temporary(m->state_file, &f, &temp_path);
1610 if (r < 0)
1611 return r;
1612
1613 (void) fchmod(fileno(f), 0644);
1614
1615 fprintf(f,
1616 "# This is private data. Do not parse.\n"
1617 "OPER_STATE=%s\n"
1618 "CARRIER_STATE=%s\n"
1619 "ADDRESS_STATE=%s\n",
1620 operstate_str, carrier_state_str, address_state_str);
1621
1622 ordered_set_print(f, "DNS=", dns);
1623 ordered_set_print(f, "NTP=", ntp);
1624 ordered_set_print(f, "SIP=", sip);
1625 ordered_set_print(f, "DOMAINS=", search_domains);
1626 ordered_set_print(f, "ROUTE_DOMAINS=", route_domains);
1627
1628 r = routing_policy_serialize_rules(m->rules, f);
1629 if (r < 0)
1630 goto fail;
1631
1632 r = fflush_and_check(f);
1633 if (r < 0)
1634 goto fail;
1635
1636 if (rename(temp_path, m->state_file) < 0) {
1637 r = -errno;
1638 goto fail;
1639 }
1640
1641 if (m->operational_state != operstate) {
1642 m->operational_state = operstate;
1643 if (strv_extend(&p, "OperationalState") < 0)
1644 log_oom();
1645 }
1646
1647 if (m->carrier_state != carrier_state) {
1648 m->carrier_state = carrier_state;
1649 if (strv_extend(&p, "CarrierState") < 0)
1650 log_oom();
1651 }
1652
1653 if (m->address_state != address_state) {
1654 m->address_state = address_state;
1655 if (strv_extend(&p, "AddressState") < 0)
1656 log_oom();
1657 }
1658
1659 if (p) {
1660 r = manager_send_changed_strv(m, p);
1661 if (r < 0)
1662 log_error_errno(r, "Could not emit changed properties: %m");
1663 }
1664
1665 m->dirty = false;
1666
1667 return 0;
1668
1669 fail:
1670 (void) unlink(m->state_file);
1671 (void) unlink(temp_path);
1672
1673 return log_error_errno(r, "Failed to save network state to %s: %m", m->state_file);
1674 }
1675
1676 static int manager_dirty_handler(sd_event_source *s, void *userdata) {
1677 Manager *m = userdata;
1678 Link *link;
1679 Iterator i;
1680
1681 assert(m);
1682
1683 if (m->dirty)
1684 manager_save(m);
1685
1686 SET_FOREACH(link, m->dirty_links, i)
1687 if (link_save(link) >= 0)
1688 link_clean(link);
1689
1690 return 1;
1691 }
1692
1693 static int signal_terminate_callback(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
1694 Manager *m = userdata;
1695
1696 assert(m);
1697 m->restarting = false;
1698
1699 log_debug("Terminate operation initiated.");
1700
1701 return sd_event_exit(sd_event_source_get_event(s), 0);
1702 }
1703
1704 static int signal_restart_callback(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
1705 Manager *m = userdata;
1706
1707 assert(m);
1708 m->restarting = true;
1709
1710 log_debug("Restart operation initiated.");
1711
1712 return sd_event_exit(sd_event_source_get_event(s), 0);
1713 }
1714
1715 int manager_new(Manager **ret) {
1716 _cleanup_(manager_freep) Manager *m = NULL;
1717 int r;
1718
1719 m = new(Manager, 1);
1720 if (!m)
1721 return -ENOMEM;
1722
1723 *m = (Manager) {
1724 .speed_meter_interval_usec = SPEED_METER_DEFAULT_TIME_INTERVAL,
1725 };
1726
1727 m->state_file = strdup("/run/systemd/netif/state");
1728 if (!m->state_file)
1729 return -ENOMEM;
1730
1731 r = sd_event_default(&m->event);
1732 if (r < 0)
1733 return r;
1734
1735 assert_se(sigprocmask_many(SIG_SETMASK, NULL, SIGINT, SIGTERM, SIGUSR2, -1) >= 0);
1736
1737 (void) sd_event_set_watchdog(m->event, true);
1738 (void) sd_event_add_signal(m->event, NULL, SIGTERM, signal_terminate_callback, m);
1739 (void) sd_event_add_signal(m->event, NULL, SIGINT, signal_terminate_callback, m);
1740 (void) sd_event_add_signal(m->event, NULL, SIGUSR2, signal_restart_callback, m);
1741
1742 r = sd_event_add_post(m->event, NULL, manager_dirty_handler, m);
1743 if (r < 0)
1744 return r;
1745
1746 r = manager_connect_rtnl(m);
1747 if (r < 0)
1748 return r;
1749
1750 r = manager_connect_genl(m);
1751 if (r < 0)
1752 return r;
1753
1754 r = manager_connect_udev(m);
1755 if (r < 0)
1756 return r;
1757
1758 r = sd_resolve_default(&m->resolve);
1759 if (r < 0)
1760 return r;
1761
1762 r = sd_resolve_attach_event(m->resolve, m->event, 0);
1763 if (r < 0)
1764 return r;
1765
1766 r = setup_default_address_pool(m);
1767 if (r < 0)
1768 return r;
1769
1770 m->duid.type = DUID_TYPE_EN;
1771
1772 (void) routing_policy_load_rules(m->state_file, &m->rules_saved);
1773
1774 *ret = TAKE_PTR(m);
1775
1776 return 0;
1777 }
1778
1779 void manager_free(Manager *m) {
1780 struct in6_addr *a;
1781 AddressPool *pool;
1782 Link *link;
1783
1784 if (!m)
1785 return;
1786
1787 free(m->state_file);
1788
1789 while ((a = hashmap_first_key(m->dhcp6_prefixes)))
1790 (void) dhcp6_prefix_remove(m, a);
1791 m->dhcp6_prefixes = hashmap_free(m->dhcp6_prefixes);
1792
1793 while ((link = hashmap_steal_first(m->links))) {
1794 if (link->dhcp6_client)
1795 (void) dhcp6_lease_pd_prefix_lost(link->dhcp6_client, link);
1796
1797 (void) link_stop_clients(link, true);
1798
1799 link_unref(link);
1800 }
1801
1802 m->dirty_links = set_free_with_destructor(m->dirty_links, link_unref);
1803 m->links_requesting_uuid = set_free_with_destructor(m->links_requesting_uuid, link_unref);
1804 m->links = hashmap_free_with_destructor(m->links, link_unref);
1805
1806 m->duids_requesting_uuid = set_free(m->duids_requesting_uuid);
1807 m->networks = ordered_hashmap_free_with_destructor(m->networks, network_unref);
1808
1809 m->netdevs = hashmap_free_with_destructor(m->netdevs, netdev_unref);
1810
1811 while ((pool = m->address_pools))
1812 address_pool_free(pool);
1813
1814 /* routing_policy_rule_free() access m->rules and m->rules_foreign.
1815 * So, it is necessary to set NULL after the sets are freed. */
1816 m->rules = set_free_with_destructor(m->rules, routing_policy_rule_free);
1817 m->rules_foreign = set_free_with_destructor(m->rules_foreign, routing_policy_rule_free);
1818 set_free_with_destructor(m->rules_saved, routing_policy_rule_free);
1819
1820 sd_netlink_unref(m->rtnl);
1821 sd_netlink_unref(m->genl);
1822 sd_resolve_unref(m->resolve);
1823
1824 sd_event_source_unref(m->speed_meter_event_source);
1825 sd_event_unref(m->event);
1826
1827 sd_device_monitor_unref(m->device_monitor);
1828
1829 bus_verify_polkit_async_registry_free(m->polkit_registry);
1830 sd_bus_flush_close_unref(m->bus);
1831
1832 free(m->dynamic_timezone);
1833 free(m->dynamic_hostname);
1834
1835 free(m);
1836 }
1837
1838 int manager_start(Manager *m) {
1839 Link *link;
1840 Iterator i;
1841 int r;
1842
1843 assert(m);
1844
1845 r = manager_start_speed_meter(m);
1846 if (r < 0)
1847 return log_error_errno(r, "Failed to initialize speed meter: %m");
1848
1849 /* The dirty handler will deal with future serialization, but the first one
1850 must be done explicitly. */
1851
1852 manager_save(m);
1853
1854 HASHMAP_FOREACH(link, m->links, i)
1855 link_save(link);
1856
1857 return 0;
1858 }
1859
1860 int manager_load_config(Manager *m) {
1861 int r;
1862
1863 /* update timestamp */
1864 paths_check_timestamp(NETWORK_DIRS, &m->network_dirs_ts_usec, true);
1865
1866 r = netdev_load(m, false);
1867 if (r < 0)
1868 return r;
1869
1870 r = network_load(m, &m->networks);
1871 if (r < 0)
1872 return r;
1873
1874 return 0;
1875 }
1876
1877 bool manager_should_reload(Manager *m) {
1878 return paths_check_timestamp(NETWORK_DIRS, &m->network_dirs_ts_usec, false);
1879 }
1880
1881 int manager_rtnl_enumerate_links(Manager *m) {
1882 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
1883 sd_netlink_message *link;
1884 int r;
1885
1886 assert(m);
1887 assert(m->rtnl);
1888
1889 r = sd_rtnl_message_new_link(m->rtnl, &req, RTM_GETLINK, 0);
1890 if (r < 0)
1891 return r;
1892
1893 r = sd_netlink_message_request_dump(req, true);
1894 if (r < 0)
1895 return r;
1896
1897 r = sd_netlink_call(m->rtnl, req, 0, &reply);
1898 if (r < 0)
1899 return r;
1900
1901 for (link = reply; link; link = sd_netlink_message_next(link)) {
1902 int k;
1903
1904 m->enumerating = true;
1905
1906 k = manager_rtnl_process_link(m->rtnl, link, m);
1907 if (k < 0)
1908 r = k;
1909
1910 m->enumerating = false;
1911 }
1912
1913 return r;
1914 }
1915
1916 int manager_rtnl_enumerate_addresses(Manager *m) {
1917 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
1918 sd_netlink_message *addr;
1919 int r;
1920
1921 assert(m);
1922 assert(m->rtnl);
1923
1924 r = sd_rtnl_message_new_addr(m->rtnl, &req, RTM_GETADDR, 0, 0);
1925 if (r < 0)
1926 return r;
1927
1928 r = sd_netlink_message_request_dump(req, true);
1929 if (r < 0)
1930 return r;
1931
1932 r = sd_netlink_call(m->rtnl, req, 0, &reply);
1933 if (r < 0)
1934 return r;
1935
1936 for (addr = reply; addr; addr = sd_netlink_message_next(addr)) {
1937 int k;
1938
1939 m->enumerating = true;
1940
1941 k = manager_rtnl_process_address(m->rtnl, addr, m);
1942 if (k < 0)
1943 r = k;
1944
1945 m->enumerating = false;
1946 }
1947
1948 return r;
1949 }
1950
1951 int manager_rtnl_enumerate_neighbors(Manager *m) {
1952 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
1953 sd_netlink_message *neigh;
1954 int r;
1955
1956 assert(m);
1957 assert(m->rtnl);
1958
1959 r = sd_rtnl_message_new_neigh(m->rtnl, &req, RTM_GETNEIGH, 0, AF_UNSPEC);
1960 if (r < 0)
1961 return r;
1962
1963 r = sd_netlink_message_request_dump(req, true);
1964 if (r < 0)
1965 return r;
1966
1967 r = sd_netlink_call(m->rtnl, req, 0, &reply);
1968 if (r < 0)
1969 return r;
1970
1971 for (neigh = reply; neigh; neigh = sd_netlink_message_next(neigh)) {
1972 int k;
1973
1974 m->enumerating = true;
1975
1976 k = manager_rtnl_process_neighbor(m->rtnl, neigh, m);
1977 if (k < 0)
1978 r = k;
1979
1980 m->enumerating = false;
1981 }
1982
1983 return r;
1984 }
1985
1986 int manager_rtnl_enumerate_routes(Manager *m) {
1987 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
1988 sd_netlink_message *route;
1989 int r;
1990
1991 assert(m);
1992 assert(m->rtnl);
1993
1994 r = sd_rtnl_message_new_route(m->rtnl, &req, RTM_GETROUTE, 0, 0);
1995 if (r < 0)
1996 return r;
1997
1998 r = sd_netlink_message_request_dump(req, true);
1999 if (r < 0)
2000 return r;
2001
2002 r = sd_netlink_call(m->rtnl, req, 0, &reply);
2003 if (r < 0)
2004 return r;
2005
2006 for (route = reply; route; route = sd_netlink_message_next(route)) {
2007 int k;
2008
2009 m->enumerating = true;
2010
2011 k = manager_rtnl_process_route(m->rtnl, route, m);
2012 if (k < 0)
2013 r = k;
2014
2015 m->enumerating = false;
2016 }
2017
2018 return r;
2019 }
2020
2021 int manager_rtnl_enumerate_rules(Manager *m) {
2022 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
2023 sd_netlink_message *rule;
2024 int r;
2025
2026 assert(m);
2027 assert(m->rtnl);
2028
2029 r = sd_rtnl_message_new_routing_policy_rule(m->rtnl, &req, RTM_GETRULE, 0);
2030 if (r < 0)
2031 return r;
2032
2033 r = sd_netlink_message_request_dump(req, true);
2034 if (r < 0)
2035 return r;
2036
2037 r = sd_netlink_call(m->rtnl, req, 0, &reply);
2038 if (r < 0) {
2039 if (r == -EOPNOTSUPP) {
2040 log_debug("FIB Rules are not supported by the kernel. Ignoring.");
2041 return 0;
2042 }
2043
2044 return r;
2045 }
2046
2047 for (rule = reply; rule; rule = sd_netlink_message_next(rule)) {
2048 int k;
2049
2050 m->enumerating = true;
2051
2052 k = manager_rtnl_process_rule(m->rtnl, rule, m);
2053 if (k < 0)
2054 r = k;
2055
2056 m->enumerating = false;
2057 }
2058
2059 return r;
2060 }
2061
2062 int manager_rtnl_enumerate_nexthop(Manager *m) {
2063 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
2064 sd_netlink_message *nexthop;
2065 int r;
2066
2067 assert(m);
2068 assert(m->rtnl);
2069
2070 r = sd_rtnl_message_new_nexthop(m->rtnl, &req, RTM_GETNEXTHOP, 0, 0);
2071 if (r < 0)
2072 return r;
2073
2074 r = sd_netlink_message_request_dump(req, true);
2075 if (r < 0)
2076 return r;
2077
2078 r = sd_netlink_call(m->rtnl, req, 0, &reply);
2079 if (r < 0) {
2080 if (r == -EOPNOTSUPP) {
2081 log_debug("Nexthop are not supported by the kernel. Ignoring.");
2082 return 0;
2083 }
2084
2085 return r;
2086 }
2087
2088 for (nexthop = reply; nexthop; nexthop = sd_netlink_message_next(nexthop)) {
2089 int k;
2090
2091 m->enumerating = true;
2092
2093 k = manager_rtnl_process_nexthop(m->rtnl, nexthop, m);
2094 if (k < 0)
2095 r = k;
2096
2097 m->enumerating = false;
2098 }
2099
2100 return r;
2101 }
2102
2103 int manager_address_pool_acquire(Manager *m, int family, unsigned prefixlen, union in_addr_union *found) {
2104 AddressPool *p;
2105 int r;
2106
2107 assert(m);
2108 assert(prefixlen > 0);
2109 assert(found);
2110
2111 LIST_FOREACH(address_pools, p, m->address_pools) {
2112 if (p->family != family)
2113 continue;
2114
2115 r = address_pool_acquire(p, prefixlen, found);
2116 if (r != 0)
2117 return r;
2118 }
2119
2120 return 0;
2121 }
2122
2123 Link* manager_find_uplink(Manager *m, Link *exclude) {
2124 _cleanup_free_ struct local_address *gateways = NULL;
2125 int n, i;
2126
2127 assert(m);
2128
2129 /* Looks for a suitable "uplink", via black magic: an
2130 * interface that is up and where the default route with the
2131 * highest priority points to. */
2132
2133 n = local_gateways(m->rtnl, 0, AF_UNSPEC, &gateways);
2134 if (n < 0) {
2135 log_warning_errno(n, "Failed to determine list of default gateways: %m");
2136 return NULL;
2137 }
2138
2139 for (i = 0; i < n; i++) {
2140 Link *link;
2141
2142 link = hashmap_get(m->links, INT_TO_PTR(gateways[i].ifindex));
2143 if (!link) {
2144 log_debug("Weird, found a gateway for a link we don't know. Ignoring.");
2145 continue;
2146 }
2147
2148 if (link == exclude)
2149 continue;
2150
2151 if (link->operstate < LINK_OPERSTATE_ROUTABLE)
2152 continue;
2153
2154 return link;
2155 }
2156
2157 return NULL;
2158 }
2159
2160 void manager_dirty(Manager *manager) {
2161 assert(manager);
2162
2163 /* the serialized state in /run is no longer up-to-date */
2164 manager->dirty = true;
2165 }
2166
2167 static int set_hostname_handler(sd_bus_message *m, void *userdata, sd_bus_error *ret_error) {
2168 Manager *manager = userdata;
2169 const sd_bus_error *e;
2170
2171 assert(m);
2172 assert(manager);
2173
2174 e = sd_bus_message_get_error(m);
2175 if (e)
2176 log_warning_errno(sd_bus_error_get_errno(e), "Could not set hostname: %s", e->message);
2177
2178 return 1;
2179 }
2180
2181 int manager_set_hostname(Manager *m, const char *hostname) {
2182 int r;
2183
2184 log_debug("Setting transient hostname: '%s'", strna(hostname));
2185
2186 if (free_and_strdup(&m->dynamic_hostname, hostname) < 0)
2187 return log_oom();
2188
2189 if (!m->bus || sd_bus_is_ready(m->bus) <= 0) {
2190 log_debug("Not connected to system bus, setting hostname later.");
2191 return 0;
2192 }
2193
2194 r = sd_bus_call_method_async(
2195 m->bus,
2196 NULL,
2197 "org.freedesktop.hostname1",
2198 "/org/freedesktop/hostname1",
2199 "org.freedesktop.hostname1",
2200 "SetHostname",
2201 set_hostname_handler,
2202 m,
2203 "sb",
2204 hostname,
2205 false);
2206
2207 if (r < 0)
2208 return log_error_errno(r, "Could not set transient hostname: %m");
2209
2210 return 0;
2211 }
2212
2213 static int set_timezone_handler(sd_bus_message *m, void *userdata, sd_bus_error *ret_error) {
2214 Manager *manager = userdata;
2215 const sd_bus_error *e;
2216
2217 assert(m);
2218 assert(manager);
2219
2220 e = sd_bus_message_get_error(m);
2221 if (e)
2222 log_warning_errno(sd_bus_error_get_errno(e), "Could not set timezone: %s", e->message);
2223
2224 return 1;
2225 }
2226
2227 int manager_set_timezone(Manager *m, const char *tz) {
2228 int r;
2229
2230 assert(m);
2231 assert(tz);
2232
2233 log_debug("Setting system timezone: '%s'", tz);
2234 if (free_and_strdup(&m->dynamic_timezone, tz) < 0)
2235 return log_oom();
2236
2237 if (!m->bus || sd_bus_is_ready(m->bus) <= 0) {
2238 log_debug("Not connected to system bus, setting timezone later.");
2239 return 0;
2240 }
2241
2242 r = sd_bus_call_method_async(
2243 m->bus,
2244 NULL,
2245 "org.freedesktop.timedate1",
2246 "/org/freedesktop/timedate1",
2247 "org.freedesktop.timedate1",
2248 "SetTimezone",
2249 set_timezone_handler,
2250 m,
2251 "sb",
2252 tz,
2253 false);
2254 if (r < 0)
2255 return log_error_errno(r, "Could not set timezone: %m");
2256
2257 return 0;
2258 }
2259
2260 int manager_request_product_uuid(Manager *m, Link *link) {
2261 int r;
2262
2263 assert(m);
2264
2265 if (m->has_product_uuid)
2266 return 0;
2267
2268 log_debug("Requesting product UUID");
2269
2270 if (link) {
2271 DUID *duid;
2272
2273 assert_se(duid = link_get_duid(link));
2274
2275 r = set_ensure_allocated(&m->links_requesting_uuid, NULL);
2276 if (r < 0)
2277 return log_oom();
2278
2279 r = set_ensure_allocated(&m->duids_requesting_uuid, NULL);
2280 if (r < 0)
2281 return log_oom();
2282
2283 r = set_put(m->links_requesting_uuid, link);
2284 if (r < 0)
2285 return log_oom();
2286
2287 r = set_put(m->duids_requesting_uuid, duid);
2288 if (r < 0)
2289 return log_oom();
2290
2291 link_ref(link);
2292 }
2293
2294 if (!m->bus || sd_bus_is_ready(m->bus) <= 0) {
2295 log_debug("Not connected to system bus, requesting product UUID later.");
2296 return 0;
2297 }
2298
2299 r = sd_bus_call_method_async(
2300 m->bus,
2301 NULL,
2302 "org.freedesktop.hostname1",
2303 "/org/freedesktop/hostname1",
2304 "org.freedesktop.hostname1",
2305 "GetProductUUID",
2306 get_product_uuid_handler,
2307 m,
2308 "b",
2309 false);
2310 if (r < 0)
2311 return log_warning_errno(r, "Failed to get product UUID: %m");
2312
2313 return 0;
2314 }