]>
git.ipfire.org Git - thirdparty/systemd.git/blob - src/network/networkd.c
2ce32fe4f3e708f12aa18d93e90ca67e6832c6eb
1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
8 #include "bus-log-control-api.h"
9 #include "bus-object.h"
10 #include "capability-util.h"
11 #include "daemon-util.h"
12 #include "main-func.h"
13 #include "mkdir-label.h"
14 #include "networkd-conf.h"
15 #include "networkd-manager.h"
16 #include "networkd-manager-bus.h"
17 #include "networkd-serialize.h"
18 #include "service-util.h"
20 #include "user-util.h"
22 static int run(int argc
, char *argv
[]) {
23 _cleanup_(manager_freep
) Manager
*m
= NULL
;
24 _unused_
_cleanup_(notify_on_cleanup
) const char *notify_message
= NULL
;
29 r
= service_parse_argv("systemd-networkd.service",
30 "Manage and configure network devices, create virtual network devices",
31 BUS_IMPLEMENTATIONS(&manager_object
, &log_control_object
),
39 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
), "This program takes no arguments.");
41 /* Drop privileges, but only if we have been started as root. If we are not running as root we assume all
42 * privileges are already dropped and we can't create our runtime directory. */
44 const char *user
= "systemd-network";
48 r
= get_user_creds(&user
, &uid
, &gid
, NULL
, NULL
, 0);
50 return log_error_errno(r
, "Cannot resolve user name %s: %m", user
);
52 /* Create runtime directory. This is not necessary when networkd is
53 * started with "RuntimeDirectory=systemd/netif", or after
54 * systemd-tmpfiles-setup.service. */
55 r
= mkdir_safe_label("/run/systemd/netif", 0755, uid
, gid
, MKDIR_WARN_MODE
);
57 log_warning_errno(r
, "Could not create runtime directory: %m");
59 r
= drop_privileges(uid
, gid
,
60 (1ULL << CAP_NET_ADMIN
) |
61 (1ULL << CAP_NET_BIND_SERVICE
) |
62 (1ULL << CAP_NET_BROADCAST
) |
63 (1ULL << CAP_NET_RAW
) |
64 (1ULL << CAP_SYS_ADMIN
) |
67 return log_error_errno(r
, "Failed to drop privileges: %m");
70 /* Always create the directories people can create inotify watches in. It is necessary to create the
71 * following subdirectories after drop_privileges() to make them owned by systemd-network. */
73 "/run/systemd/netif/dhcp-server-lease/",
74 "/run/systemd/netif/leases/",
75 "/run/systemd/netif/links/") {
76 r
= mkdir_safe_label(p
, 0755, UID_INVALID
, GID_INVALID
, MKDIR_WARN_MODE
);
78 log_warning_errno(r
, "Could not create directory '%s': %m", p
);
81 r
= manager_new(&m
, /* test_mode = */ false);
83 return log_error_errno(r
, "Could not create manager: %m");
87 return log_error_errno(r
, "Could not set up manager: %m");
89 r
= manager_parse_config_file(m
);
91 log_warning_errno(r
, "Failed to parse configuration file: %m");
93 r
= manager_load_config(m
);
95 return log_error_errno(r
, "Could not load configuration files: %m");
97 r
= manager_enumerate(m
);
101 r
= manager_deserialize(m
);
103 log_warning_errno(r
, "Failed to deserialize the previous invocation, ignoring: %m");
105 r
= manager_start(m
);
107 return log_error_errno(r
, "Could not start manager: %m");
109 notify_message
= notify_start(NOTIFY_READY_MESSAGE
, NOTIFY_STOPPING_MESSAGE
);
111 r
= sd_event_loop(m
->event
);
113 return log_error_errno(r
, "Event loop failed: %m");
118 DEFINE_MAIN_FUNCTION(run
);