1 /* SPDX-License-Identifier: LGPL-2.1+ */
3 #include <sys/socket.h>
5 #include <linux/fib_rules.h>
9 #include "sd-netlink.h"
11 #include "alloc-util.h"
13 #include "conf-parser.h"
15 #include "device-util.h"
16 #include "dns-domain.h"
19 #include "local-addresses.h"
20 #include "netlink-util.h"
21 #include "network-internal.h"
22 #include "networkd-manager.h"
23 #include "ordered-set.h"
24 #include "path-util.h"
27 #include "sysctl-util.h"
28 #include "tmpfile-util.h"
29 #include "udev-util.h"
32 /* use 8 MB for receive socket kernel queue. */
33 #define RCVBUF_SIZE (8*1024*1024)
35 static int setup_default_address_pool(Manager
*m
) {
41 /* Add in the well-known private address ranges. */
43 r
= address_pool_new_from_string(m
, &p
, AF_INET6
, "fd00::", 8);
47 r
= address_pool_new_from_string(m
, &p
, AF_INET
, "10.0.0.0", 8);
51 r
= address_pool_new_from_string(m
, &p
, AF_INET
, "172.16.0.0", 12);
55 r
= address_pool_new_from_string(m
, &p
, AF_INET
, "192.168.0.0", 16);
62 static int manager_reset_all(Manager
*m
) {
69 HASHMAP_FOREACH(link
, m
->links
, i
) {
70 r
= link_carrier_reset(link
);
72 log_link_warning_errno(link
, r
, "Could not reset carrier: %m");
78 static int match_prepare_for_sleep(sd_bus_message
*message
, void *userdata
, sd_bus_error
*ret_error
) {
79 Manager
*m
= userdata
;
85 r
= sd_bus_message_read(message
, "b", &b
);
87 log_debug_errno(r
, "Failed to parse PrepareForSleep signal: %m");
94 log_debug("Coming back from suspend, resetting all connections...");
96 (void) manager_reset_all(m
);
101 static int on_connected(sd_bus_message
*message
, void *userdata
, sd_bus_error
*ret_error
) {
102 Manager
*m
= userdata
;
107 /* Did we get a timezone or transient hostname from DHCP while D-Bus wasn't up yet? */
108 if (m
->dynamic_hostname
)
109 (void) manager_set_hostname(m
, m
->dynamic_hostname
);
110 if (m
->dynamic_timezone
)
111 (void) manager_set_timezone(m
, m
->dynamic_timezone
);
112 if (m
->links_requesting_uuid
)
113 (void) manager_request_product_uuid(m
, NULL
);
118 int manager_connect_bus(Manager
*m
) {
126 r
= bus_open_system_watch_bind_with_description(&m
->bus
, "bus-api-network");
128 return log_error_errno(r
, "Failed to connect to bus: %m");
130 r
= sd_bus_add_object_vtable(m
->bus
, NULL
, "/org/freedesktop/network1", "org.freedesktop.network1.Manager", manager_vtable
, m
);
132 return log_error_errno(r
, "Failed to add manager object vtable: %m");
134 r
= sd_bus_add_fallback_vtable(m
->bus
, NULL
, "/org/freedesktop/network1/link", "org.freedesktop.network1.Link", link_vtable
, link_object_find
, m
);
136 return log_error_errno(r
, "Failed to add link object vtable: %m");
138 r
= sd_bus_add_node_enumerator(m
->bus
, NULL
, "/org/freedesktop/network1/link", link_node_enumerator
, m
);
140 return log_error_errno(r
, "Failed to add link enumerator: %m");
142 r
= sd_bus_add_fallback_vtable(m
->bus
, NULL
, "/org/freedesktop/network1/network", "org.freedesktop.network1.Network", network_vtable
, network_object_find
, m
);
144 return log_error_errno(r
, "Failed to add network object vtable: %m");
146 r
= sd_bus_add_node_enumerator(m
->bus
, NULL
, "/org/freedesktop/network1/network", network_node_enumerator
, m
);
148 return log_error_errno(r
, "Failed to add network enumerator: %m");
150 r
= sd_bus_request_name_async(m
->bus
, NULL
, "org.freedesktop.network1", 0, NULL
, NULL
);
152 return log_error_errno(r
, "Failed to request name: %m");
154 r
= sd_bus_attach_event(m
->bus
, m
->event
, 0);
156 return log_error_errno(r
, "Failed to attach bus to event loop: %m");
158 r
= sd_bus_match_signal_async(
161 "org.freedesktop.DBus.Local",
163 "org.freedesktop.DBus.Local",
165 on_connected
, NULL
, m
);
167 return log_error_errno(r
, "Failed to request match on Connected signal: %m");
169 r
= sd_bus_match_signal_async(
172 "org.freedesktop.login1",
173 "/org/freedesktop/login1",
174 "org.freedesktop.login1.Manager",
176 match_prepare_for_sleep
, NULL
, m
);
178 log_warning_errno(r
, "Failed to request match for PrepareForSleep, ignoring: %m");
183 static int manager_udev_process_link(sd_device_monitor
*monitor
, sd_device
*device
, void *userdata
) {
184 Manager
*m
= userdata
;
192 r
= sd_device_get_property_value(device
, "ACTION", &action
);
194 log_device_debug_errno(device
, r
, "Failed to get 'ACTION' property, ignoring device: %m");
198 if (!STR_IN_SET(action
, "add", "change", "move")) {
199 log_device_debug(device
, "Ignoring udev %s event for device.", action
);
203 r
= sd_device_get_ifindex(device
, &ifindex
);
205 log_device_debug_errno(device
, r
, "Ignoring udev ADD event for device without ifindex or with invalid ifindex: %m");
209 r
= device_is_renaming(device
);
211 log_device_error_errno(device
, r
, "Failed to determine the device is renamed or not, ignoring '%s' uevent: %m", action
);
215 log_device_debug(device
, "Interface is under renaming, wait for the interface to be renamed: %m");
219 r
= link_get(m
, ifindex
, &link
);
222 log_debug_errno(r
, "Failed to get link from ifindex %i, ignoring: %m", ifindex
);
226 (void) link_initialized(link
, device
);
231 static int manager_connect_udev(Manager
*m
) {
234 /* udev does not initialize devices inside containers,
235 * so we rely on them being already initialized before
236 * entering the container */
237 if (detect_container() > 0)
240 r
= sd_device_monitor_new(&m
->device_monitor
);
242 return log_error_errno(r
, "Failed to initialize device monitor: %m");
244 r
= sd_device_monitor_filter_add_match_subsystem_devtype(m
->device_monitor
, "net", NULL
);
246 return log_error_errno(r
, "Could not add device monitor filter: %m");
248 r
= sd_device_monitor_attach_event(m
->device_monitor
, m
->event
);
250 return log_error_errno(r
, "Failed to attach event to device monitor: %m");
252 r
= sd_device_monitor_start(m
->device_monitor
, manager_udev_process_link
, m
);
254 return log_error_errno(r
, "Failed to start device monitor: %m");
259 int manager_rtnl_process_route(sd_netlink
*rtnl
, sd_netlink_message
*message
, void *userdata
) {
260 Manager
*m
= userdata
;
263 uint32_t ifindex
, priority
= 0;
264 unsigned char protocol
, scope
, tos
, table
, rt_type
;
266 unsigned char dst_prefixlen
, src_prefixlen
;
267 union in_addr_union dst
= {}, gw
= {}, src
= {}, prefsrc
= {};
275 if (sd_netlink_message_is_error(message
)) {
276 r
= sd_netlink_message_get_errno(message
);
278 log_warning_errno(r
, "rtnl: failed to receive route, ignoring: %m");
283 r
= sd_netlink_message_get_type(message
, &type
);
285 log_warning_errno(r
, "rtnl: could not get message type, ignoring: %m");
287 } else if (!IN_SET(type
, RTM_NEWROUTE
, RTM_DELROUTE
)) {
288 log_warning("rtnl: received unexpected message type when processing route, ignoring");
292 r
= sd_netlink_message_read_u32(message
, RTA_OIF
, &ifindex
);
294 log_debug("rtnl: received route without ifindex, ignoring");
297 log_warning_errno(r
, "rtnl: could not get ifindex from route, ignoring: %m");
299 } else if (ifindex
<= 0) {
300 log_warning("rtnl: received route message with invalid ifindex, ignoring: %d", ifindex
);
303 r
= link_get(m
, ifindex
, &link
);
304 if (r
< 0 || !link
) {
305 /* when enumerating we might be out of sync, but we will
306 * get the route again, so just ignore it */
308 log_warning("rtnl: received route for nonexistent link (%d), ignoring", ifindex
);
313 r
= sd_rtnl_message_route_get_family(message
, &family
);
314 if (r
< 0 || !IN_SET(family
, AF_INET
, AF_INET6
)) {
315 log_link_warning(link
, "rtnl: received address with invalid family, ignoring");
319 r
= sd_rtnl_message_route_get_protocol(message
, &protocol
);
321 log_warning_errno(r
, "rtnl: could not get route protocol: %m");
327 r
= sd_netlink_message_read_in_addr(message
, RTA_DST
, &dst
.in
);
328 if (r
< 0 && r
!= -ENODATA
) {
329 log_link_warning_errno(link
, r
, "rtnl: received route without valid destination, ignoring: %m");
333 r
= sd_netlink_message_read_in_addr(message
, RTA_GATEWAY
, &gw
.in
);
334 if (r
< 0 && r
!= -ENODATA
) {
335 log_link_warning_errno(link
, r
, "rtnl: received route with invalid gateway, ignoring: %m");
339 r
= sd_netlink_message_read_in_addr(message
, RTA_SRC
, &src
.in
);
340 if (r
< 0 && r
!= -ENODATA
) {
341 log_link_warning_errno(link
, r
, "rtnl: received route with invalid source, ignoring: %m");
345 r
= sd_netlink_message_read_in_addr(message
, RTA_PREFSRC
, &prefsrc
.in
);
346 if (r
< 0 && r
!= -ENODATA
) {
347 log_link_warning_errno(link
, r
, "rtnl: received route with invalid preferred source, ignoring: %m");
354 r
= sd_netlink_message_read_in6_addr(message
, RTA_DST
, &dst
.in6
);
355 if (r
< 0 && r
!= -ENODATA
) {
356 log_link_warning_errno(link
, r
, "rtnl: received route without valid destination, ignoring: %m");
360 r
= sd_netlink_message_read_in6_addr(message
, RTA_GATEWAY
, &gw
.in6
);
361 if (r
< 0 && r
!= -ENODATA
) {
362 log_link_warning_errno(link
, r
, "rtnl: received route with invalid gateway, ignoring: %m");
366 r
= sd_netlink_message_read_in6_addr(message
, RTA_SRC
, &src
.in6
);
367 if (r
< 0 && r
!= -ENODATA
) {
368 log_link_warning_errno(link
, r
, "rtnl: received route with invalid source, ignoring: %m");
372 r
= sd_netlink_message_read_in6_addr(message
, RTA_PREFSRC
, &prefsrc
.in6
);
373 if (r
< 0 && r
!= -ENODATA
) {
374 log_link_warning_errno(link
, r
, "rtnl: received route with invalid preferred source, ignoring: %m");
381 assert_not_reached("Received unsupported address family");
385 r
= sd_rtnl_message_route_get_dst_prefixlen(message
, &dst_prefixlen
);
387 log_link_warning_errno(link
, r
, "rtnl: received route with invalid destination prefixlen, ignoring: %m");
391 r
= sd_rtnl_message_route_get_src_prefixlen(message
, &src_prefixlen
);
393 log_link_warning_errno(link
, r
, "rtnl: received route with invalid source prefixlen, ignoring: %m");
397 r
= sd_rtnl_message_route_get_scope(message
, &scope
);
399 log_link_warning_errno(link
, r
, "rtnl: received route with invalid scope, ignoring: %m");
403 r
= sd_rtnl_message_route_get_tos(message
, &tos
);
405 log_link_warning_errno(link
, r
, "rtnl: received route with invalid tos, ignoring: %m");
409 r
= sd_rtnl_message_route_get_type(message
, &rt_type
);
411 log_link_warning_errno(link
, r
, "rtnl: received route with invalid type, ignoring: %m");
415 r
= sd_rtnl_message_route_get_table(message
, &table
);
417 log_link_warning_errno(link
, r
, "rtnl: received route with invalid table, ignoring: %m");
421 r
= sd_netlink_message_read_u32(message
, RTA_PRIORITY
, &priority
);
422 if (r
< 0 && r
!= -ENODATA
) {
423 log_link_warning_errno(link
, r
, "rtnl: received route with invalid priority, ignoring: %m");
427 (void) route_get(link
, family
, &dst
, dst_prefixlen
, tos
, priority
, table
, &route
);
430 _cleanup_free_
char *buf_dst
= NULL
, *buf_dst_prefixlen
= NULL
,
431 *buf_src
= NULL
, *buf_gw
= NULL
, *buf_prefsrc
= NULL
;
433 if (!in_addr_is_null(family
, &dst
)) {
434 (void) in_addr_to_string(family
, &dst
, &buf_dst
);
435 (void) asprintf(&buf_dst_prefixlen
, "/%u", dst_prefixlen
);
437 if (!in_addr_is_null(family
, &src
))
438 (void) in_addr_to_string(family
, &src
, &buf_src
);
439 if (!in_addr_is_null(family
, &gw
))
440 (void) in_addr_to_string(family
, &gw
, &buf_gw
);
441 if (!in_addr_is_null(family
, &prefsrc
))
442 (void) in_addr_to_string(family
, &prefsrc
, &buf_prefsrc
);
445 "%s route: dst: %s%s, src: %s, gw: %s, prefsrc: %s",
446 type
== RTM_DELROUTE
? "Removing" : route
? "Updating" : "Adding",
447 strna(buf_dst
), strempty(buf_dst_prefixlen
),
448 strna(buf_src
), strna(buf_gw
), strna(buf_prefsrc
));
454 /* A route appeared that we did not request */
455 r
= route_add_foreign(link
, family
, &dst
, dst_prefixlen
, tos
, priority
, table
, &route
);
457 log_link_warning_errno(link
, r
, "Failed to add route, ignoring: %m");
462 route_update(route
, &src
, src_prefixlen
, &gw
, &prefsrc
, scope
, protocol
, rt_type
);
471 assert_not_reached("Received invalid RTNL message type");
477 int manager_rtnl_process_address(sd_netlink
*rtnl
, sd_netlink_message
*message
, void *userdata
) {
478 Manager
*m
= userdata
;
483 unsigned char prefixlen
;
485 union in_addr_union in_addr
;
486 struct ifa_cacheinfo cinfo
;
487 Address
*address
= NULL
;
488 char buf
[INET6_ADDRSTRLEN
], valid_buf
[FORMAT_TIMESPAN_MAX
];
489 const char *valid_str
= NULL
;
496 if (sd_netlink_message_is_error(message
)) {
497 r
= sd_netlink_message_get_errno(message
);
499 log_warning_errno(r
, "rtnl: failed to receive address, ignoring: %m");
504 r
= sd_netlink_message_get_type(message
, &type
);
506 log_warning_errno(r
, "rtnl: could not get message type, ignoring: %m");
508 } else if (!IN_SET(type
, RTM_NEWADDR
, RTM_DELADDR
)) {
509 log_warning("rtnl: received unexpected message type when processing address, ignoring");
513 r
= sd_rtnl_message_addr_get_ifindex(message
, &ifindex
);
515 log_warning_errno(r
, "rtnl: could not get ifindex from address, ignoring: %m");
517 } else if (ifindex
<= 0) {
518 log_warning("rtnl: received address message with invalid ifindex, ignoring: %d", ifindex
);
521 r
= link_get(m
, ifindex
, &link
);
522 if (r
< 0 || !link
) {
523 /* when enumerating we might be out of sync, but we will
524 * get the address again, so just ignore it */
526 log_warning("rtnl: received address for nonexistent link (%d), ignoring", ifindex
);
531 r
= sd_rtnl_message_addr_get_family(message
, &family
);
532 if (r
< 0 || !IN_SET(family
, AF_INET
, AF_INET6
)) {
533 log_link_warning(link
, "rtnl: received address with invalid family, ignoring");
537 r
= sd_rtnl_message_addr_get_prefixlen(message
, &prefixlen
);
539 log_link_warning_errno(link
, r
, "rtnl: received address with invalid prefixlen, ignoring: %m");
543 r
= sd_rtnl_message_addr_get_scope(message
, &scope
);
545 log_link_warning_errno(link
, r
, "rtnl: received address with invalid scope, ignoring: %m");
549 r
= sd_rtnl_message_addr_get_flags(message
, &flags
);
551 log_link_warning_errno(link
, r
, "rtnl: received address with invalid flags, ignoring: %m");
557 r
= sd_netlink_message_read_in_addr(message
, IFA_LOCAL
, &in_addr
.in
);
559 log_link_warning_errno(link
, r
, "rtnl: received address without valid address, ignoring: %m");
566 r
= sd_netlink_message_read_in6_addr(message
, IFA_ADDRESS
, &in_addr
.in6
);
568 log_link_warning_errno(link
, r
, "rtnl: received address without valid address, ignoring: %m");
575 assert_not_reached("Received unsupported address family");
578 if (!inet_ntop(family
, &in_addr
, buf
, INET6_ADDRSTRLEN
)) {
579 log_link_warning(link
, "Could not print address, ignoring");
583 r
= sd_netlink_message_read_cache_info(message
, IFA_CACHEINFO
, &cinfo
);
584 if (r
< 0 && r
!= -ENODATA
) {
585 log_link_warning_errno(link
, r
, "rtnl: cannot get IFA_CACHEINFO attribute, ignoring: %m");
588 if (cinfo
.ifa_valid
!= CACHE_INFO_INFINITY_LIFE_TIME
)
589 valid_str
= format_timespan(valid_buf
, FORMAT_TIMESPAN_MAX
,
590 cinfo
.ifa_valid
* USEC_PER_SEC
,
594 (void) address_get(link
, family
, &in_addr
, prefixlen
, &address
);
599 log_link_debug(link
, "Updating address: %s/%u (valid %s%s)", buf
, prefixlen
,
600 valid_str
? "for " : "forever", strempty(valid_str
));
602 /* An address appeared that we did not request */
603 r
= address_add_foreign(link
, family
, &in_addr
, prefixlen
, &address
);
605 log_link_warning_errno(link
, r
, "Failed to add address %s/%u, ignoring: %m", buf
, prefixlen
);
608 log_link_debug(link
, "Adding address: %s/%u (valid %s%s)", buf
, prefixlen
,
609 valid_str
? "for " : "forever", strempty(valid_str
));
612 r
= address_update(address
, flags
, scope
, &cinfo
);
614 log_link_warning_errno(link
, r
, "Failed to update address %s/%u, ignoring: %m", buf
, prefixlen
);
623 log_link_debug(link
, "Removing address: %s/%u (valid %s%s)", buf
, prefixlen
,
624 valid_str
? "for " : "forever", strempty(valid_str
));
625 (void) address_drop(address
);
627 log_link_warning(link
, "Removing non-existent address: %s/%u (valid %s%s), ignoring", buf
, prefixlen
,
628 valid_str
? "for " : "forever", strempty(valid_str
));
632 assert_not_reached("Received invalid RTNL message type");
638 static int manager_rtnl_process_link(sd_netlink
*rtnl
, sd_netlink_message
*message
, void *userdata
) {
639 Manager
*m
= userdata
;
641 NetDev
*netdev
= NULL
;
650 if (sd_netlink_message_is_error(message
)) {
651 r
= sd_netlink_message_get_errno(message
);
653 log_warning_errno(r
, "rtnl: Could not receive link, ignoring: %m");
658 r
= sd_netlink_message_get_type(message
, &type
);
660 log_warning_errno(r
, "rtnl: Could not get message type, ignoring: %m");
662 } else if (!IN_SET(type
, RTM_NEWLINK
, RTM_DELLINK
)) {
663 log_warning("rtnl: Received unexpected message type when processing link, ignoring");
667 r
= sd_rtnl_message_link_get_ifindex(message
, &ifindex
);
669 log_warning_errno(r
, "rtnl: Could not get ifindex from link, ignoring: %m");
671 } else if (ifindex
<= 0) {
672 log_warning("rtnl: received link message with invalid ifindex %d, ignoring", ifindex
);
676 r
= sd_netlink_message_read_string(message
, IFLA_IFNAME
, &name
);
678 log_warning_errno(r
, "rtnl: Received link message without ifname, ignoring: %m");
682 (void) link_get(m
, ifindex
, &link
);
683 (void) netdev_get(m
, name
, &netdev
);
688 /* link is new, so add it */
689 r
= link_add(m
, message
, &link
);
691 log_warning_errno(r
, "Could not add new link, ignoring: %m");
697 /* netdev exists, so make sure the ifindex matches */
698 r
= netdev_set_ifindex(netdev
, message
);
700 log_warning_errno(r
, "Could not set ifindex on netdev, ignoring: %m");
705 r
= link_update(link
, message
);
707 log_warning_errno(r
, "Could not update link, ignoring: %m");
720 assert_not_reached("Received invalid RTNL message type.");
726 int manager_rtnl_process_rule(sd_netlink
*rtnl
, sd_netlink_message
*message
, void *userdata
) {
727 uint8_t tos
= 0, to_prefixlen
= 0, from_prefixlen
= 0, protocol
= 0;
728 struct fib_rule_port_range sport
= {}, dport
= {};
729 union in_addr_union to
= {}, from
= {};
730 RoutingPolicyRule
*rule
= NULL
;
731 uint32_t fwmark
= 0, table
= 0;
732 const char *iif
= NULL
, *oif
= NULL
;
733 Manager
*m
= userdata
;
742 if (sd_netlink_message_is_error(message
)) {
743 r
= sd_netlink_message_get_errno(message
);
745 log_warning_errno(r
, "rtnl: failed to receive rule, ignoring: %m");
750 r
= sd_netlink_message_get_type(message
, &type
);
752 log_warning_errno(r
, "rtnl: could not get message type, ignoring: %m");
754 } else if (!IN_SET(type
, RTM_NEWRULE
, RTM_DELRULE
)) {
755 log_warning("rtnl: received unexpected message type '%u' when processing rule, ignoring", type
);
759 r
= sd_rtnl_message_get_family(message
, &family
);
761 log_warning_errno(r
, "rtnl: could not get rule family, ignoring: %m");
763 } else if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
764 log_debug("rtnl: received address with invalid family %u, ignoring", family
);
770 r
= sd_netlink_message_read_in_addr(message
, FRA_SRC
, &from
.in
);
771 if (r
< 0 && r
!= -ENODATA
) {
772 log_warning_errno(r
, "rtnl: could not get FRA_SRC attribute, ignoring: %m");
775 r
= sd_rtnl_message_routing_policy_rule_get_rtm_src_prefixlen(message
, &from_prefixlen
);
777 log_warning_errno(r
, "rtnl: failed to retrieve rule from prefix length, ignoring: %m");
782 r
= sd_netlink_message_read_in_addr(message
, FRA_DST
, &to
.in
);
783 if (r
< 0 && r
!= -ENODATA
) {
784 log_warning_errno(r
, "rtnl: could not get FRA_DST attribute, ignoring: %m");
787 r
= sd_rtnl_message_routing_policy_rule_get_rtm_dst_prefixlen(message
, &to_prefixlen
);
789 log_warning_errno(r
, "rtnl: failed to retrieve rule to prefix length, ignoring: %m");
797 r
= sd_netlink_message_read_in6_addr(message
, FRA_SRC
, &from
.in6
);
798 if (r
< 0 && r
!= -ENODATA
) {
799 log_warning_errno(r
, "rtnl: could not get FRA_SRC attribute, ignoring: %m");
802 r
= sd_rtnl_message_routing_policy_rule_get_rtm_src_prefixlen(message
, &from_prefixlen
);
804 log_warning_errno(r
, "rtnl: failed to retrieve rule from prefix length, ignoring: %m");
809 r
= sd_netlink_message_read_in6_addr(message
, FRA_DST
, &to
.in6
);
810 if (r
< 0 && r
!= -ENODATA
) {
811 log_warning_errno(r
, "rtnl: could not get FRA_DST attribute, ignoring: %m");
814 r
= sd_rtnl_message_routing_policy_rule_get_rtm_dst_prefixlen(message
, &to_prefixlen
);
816 log_warning_errno(r
, "rtnl: failed to retrieve rule to prefix length, ignoring: %m");
824 assert_not_reached("Received unsupported address family");
827 if (from_prefixlen
== 0 && to_prefixlen
== 0)
830 r
= sd_netlink_message_read_u32(message
, FRA_FWMARK
, &fwmark
);
831 if (r
< 0 && r
!= -ENODATA
) {
832 log_warning_errno(r
, "rtnl: could not get FRA_FWMARK attribute, ignoring: %m");
836 r
= sd_netlink_message_read_u32(message
, FRA_TABLE
, &table
);
837 if (r
< 0 && r
!= -ENODATA
) {
838 log_warning_errno(r
, "rtnl: could not get FRA_TABLE attribute, ignoring: %m");
842 r
= sd_rtnl_message_routing_policy_rule_get_tos(message
, &tos
);
843 if (r
< 0 && r
!= -ENODATA
) {
844 log_warning_errno(r
, "rtnl: could not get ip rule TOS, ignoring: %m");
848 r
= sd_netlink_message_read_string(message
, FRA_IIFNAME
, &iif
);
849 if (r
< 0 && r
!= -ENODATA
) {
850 log_warning_errno(r
, "rtnl: could not get FRA_IIFNAME attribute, ignoring: %m");
854 r
= sd_netlink_message_read_string(message
, FRA_OIFNAME
, &oif
);
855 if (r
< 0 && r
!= -ENODATA
) {
856 log_warning_errno(r
, "rtnl: could not get FRA_OIFNAME attribute, ignoring: %m");
860 r
= sd_netlink_message_read_u8(message
, FRA_IP_PROTO
, &protocol
);
861 if (r
< 0 && r
!= -ENODATA
) {
862 log_warning_errno(r
, "rtnl: could not get FRA_IP_PROTO attribute, ignoring: %m");
866 r
= sd_netlink_message_read(message
, FRA_SPORT_RANGE
, sizeof(sport
), (void *) &sport
);
867 if (r
< 0 && r
!= -ENODATA
) {
868 log_warning_errno(r
, "rtnl: could not get FRA_SPORT_RANGE attribute, ignoring: %m");
872 r
= sd_netlink_message_read(message
, FRA_DPORT_RANGE
, sizeof(dport
), (void *) &dport
);
873 if (r
< 0 && r
!= -ENODATA
) {
874 log_warning_errno(r
, "rtnl: could not get FRA_DPORT_RANGE attribute, ignoring: %m");
878 (void) routing_policy_rule_get(m
, family
, &from
, from_prefixlen
, &to
, to_prefixlen
, tos
, fwmark
, table
, iif
, oif
, protocol
, &sport
, &dport
, &rule
);
883 r
= routing_policy_rule_add_foreign(m
, family
, &from
, from_prefixlen
, &to
, to_prefixlen
, tos
, fwmark
, table
, iif
, oif
, protocol
, &sport
, &dport
, &rule
);
885 log_warning_errno(r
, "Could not add rule, ignoring: %m");
891 routing_policy_rule_free(rule
);
896 assert_not_reached("Received invalid RTNL message type");
902 static int systemd_netlink_fd(void) {
903 int n
, fd
, rtnl_fd
= -EINVAL
;
905 n
= sd_listen_fds(true);
909 for (fd
= SD_LISTEN_FDS_START
; fd
< SD_LISTEN_FDS_START
+ n
; fd
++) {
910 if (sd_is_socket(fd
, AF_NETLINK
, SOCK_RAW
, -1) > 0) {
921 static int manager_connect_genl(Manager
*m
) {
926 r
= sd_genl_socket_open(&m
->genl
);
930 r
= sd_netlink_inc_rcvbuf(m
->genl
, RCVBUF_SIZE
);
934 r
= sd_netlink_attach_event(m
->genl
, m
->event
, 0);
941 static int manager_connect_rtnl(Manager
*m
) {
946 fd
= systemd_netlink_fd();
948 r
= sd_netlink_open(&m
->rtnl
);
950 r
= sd_netlink_open_fd(&m
->rtnl
, fd
);
954 r
= sd_netlink_inc_rcvbuf(m
->rtnl
, RCVBUF_SIZE
);
958 r
= sd_netlink_attach_event(m
->rtnl
, m
->event
, 0);
962 r
= sd_netlink_add_match(m
->rtnl
, NULL
, RTM_NEWLINK
, &manager_rtnl_process_link
, NULL
, m
, "network-rtnl_process_link");
966 r
= sd_netlink_add_match(m
->rtnl
, NULL
, RTM_DELLINK
, &manager_rtnl_process_link
, NULL
, m
, "network-rtnl_process_link");
970 r
= sd_netlink_add_match(m
->rtnl
, NULL
, RTM_NEWADDR
, &manager_rtnl_process_address
, NULL
, m
, "network-rtnl_process_address");
974 r
= sd_netlink_add_match(m
->rtnl
, NULL
, RTM_DELADDR
, &manager_rtnl_process_address
, NULL
, m
, "network-rtnl_process_address");
978 r
= sd_netlink_add_match(m
->rtnl
, NULL
, RTM_NEWROUTE
, &manager_rtnl_process_route
, NULL
, m
, "network-rtnl_process_route");
982 r
= sd_netlink_add_match(m
->rtnl
, NULL
, RTM_DELROUTE
, &manager_rtnl_process_route
, NULL
, m
, "network-rtnl_process_route");
986 r
= sd_netlink_add_match(m
->rtnl
, NULL
, RTM_NEWRULE
, &manager_rtnl_process_rule
, NULL
, m
, "network-rtnl_process_rule");
990 r
= sd_netlink_add_match(m
->rtnl
, NULL
, RTM_DELRULE
, &manager_rtnl_process_rule
, NULL
, m
, "network-rtnl_process_rule");
997 static int ordered_set_put_in_addr_data(OrderedSet
*s
, const struct in_addr_data
*address
) {
1004 r
= in_addr_to_string(address
->family
, &address
->address
, &p
);
1008 r
= ordered_set_consume(s
, p
);
1015 static int ordered_set_put_in_addr_datav(OrderedSet
*s
, const struct in_addr_data
*addresses
, unsigned n
) {
1020 assert(addresses
|| n
== 0);
1022 for (i
= 0; i
< n
; i
++) {
1023 r
= ordered_set_put_in_addr_data(s
, addresses
+i
);
1033 static int ordered_set_put_in4_addr(OrderedSet
*s
, const struct in_addr
*address
) {
1040 r
= in_addr_to_string(AF_INET
, (const union in_addr_union
*) address
, &p
);
1044 r
= ordered_set_consume(s
, p
);
1051 static int ordered_set_put_in4_addrv(OrderedSet
*s
,
1052 const struct in_addr
*addresses
,
1054 bool (*predicate
)(const struct in_addr
*addr
)) {
1059 assert(n
== 0 || addresses
);
1061 for (i
= 0; i
< n
; i
++) {
1062 if (predicate
&& !predicate(&addresses
[i
]))
1064 r
= ordered_set_put_in4_addr(s
, addresses
+i
);
1074 static int manager_save(Manager
*m
) {
1075 _cleanup_ordered_set_free_free_ OrderedSet
*dns
= NULL
, *ntp
= NULL
, *search_domains
= NULL
, *route_domains
= NULL
;
1078 _cleanup_free_
char *temp_path
= NULL
;
1079 _cleanup_fclose_
FILE *f
= NULL
;
1080 LinkOperationalState operstate
= LINK_OPERSTATE_OFF
;
1081 const char *operstate_str
;
1085 assert(m
->state_file
);
1087 /* We add all NTP and DNS server to a set, to filter out duplicates */
1088 dns
= ordered_set_new(&string_hash_ops
);
1092 ntp
= ordered_set_new(&string_hash_ops
);
1096 search_domains
= ordered_set_new(&dns_name_hash_ops
);
1097 if (!search_domains
)
1100 route_domains
= ordered_set_new(&dns_name_hash_ops
);
1104 HASHMAP_FOREACH(link
, m
->links
, i
) {
1105 if (link
->flags
& IFF_LOOPBACK
)
1108 if (link
->operstate
> operstate
)
1109 operstate
= link
->operstate
;
1114 /* First add the static configured entries */
1115 r
= ordered_set_put_in_addr_datav(dns
, link
->network
->dns
, link
->network
->n_dns
);
1119 r
= ordered_set_put_strdupv(ntp
, link
->network
->ntp
);
1123 r
= ordered_set_put_string_set(search_domains
, link
->network
->search_domains
);
1127 r
= ordered_set_put_string_set(route_domains
, link
->network
->route_domains
);
1131 if (!link
->dhcp_lease
)
1134 /* Secondly, add the entries acquired via DHCP */
1135 if (link
->network
->dhcp_use_dns
) {
1136 const struct in_addr
*addresses
;
1138 r
= sd_dhcp_lease_get_dns(link
->dhcp_lease
, &addresses
);
1140 r
= ordered_set_put_in4_addrv(dns
, addresses
, r
, in4_addr_is_non_local
);
1143 } else if (r
< 0 && r
!= -ENODATA
)
1147 if (link
->network
->dhcp_use_ntp
) {
1148 const struct in_addr
*addresses
;
1150 r
= sd_dhcp_lease_get_ntp(link
->dhcp_lease
, &addresses
);
1152 r
= ordered_set_put_in4_addrv(ntp
, addresses
, r
, in4_addr_is_non_local
);
1155 } else if (r
< 0 && r
!= -ENODATA
)
1159 if (link
->network
->dhcp_use_domains
!= DHCP_USE_DOMAINS_NO
) {
1160 const char *domainname
;
1161 char **domains
= NULL
;
1163 OrderedSet
*target_domains
= (link
->network
->dhcp_use_domains
== DHCP_USE_DOMAINS_YES
) ? search_domains
: route_domains
;
1164 r
= sd_dhcp_lease_get_domainname(link
->dhcp_lease
, &domainname
);
1166 r
= ordered_set_put_strdup(target_domains
, domainname
);
1169 } else if (r
!= -ENODATA
)
1172 r
= sd_dhcp_lease_get_search_domains(link
->dhcp_lease
, &domains
);
1174 r
= ordered_set_put_strdupv(target_domains
, domains
);
1177 } else if (r
!= -ENODATA
)
1182 operstate_str
= link_operstate_to_string(operstate
);
1183 assert(operstate_str
);
1185 r
= fopen_temporary(m
->state_file
, &f
, &temp_path
);
1189 (void) __fsetlocking(f
, FSETLOCKING_BYCALLER
);
1190 (void) fchmod(fileno(f
), 0644);
1193 "# This is private data. Do not parse.\n"
1194 "OPER_STATE=%s\n", operstate_str
);
1196 ordered_set_print(f
, "DNS=", dns
);
1197 ordered_set_print(f
, "NTP=", ntp
);
1198 ordered_set_print(f
, "DOMAINS=", search_domains
);
1199 ordered_set_print(f
, "ROUTE_DOMAINS=", route_domains
);
1201 r
= routing_policy_serialize_rules(m
->rules
, f
);
1205 r
= fflush_and_check(f
);
1209 if (rename(temp_path
, m
->state_file
) < 0) {
1214 if (m
->operational_state
!= operstate
) {
1215 m
->operational_state
= operstate
;
1216 r
= manager_send_changed(m
, "OperationalState", NULL
);
1218 log_error_errno(r
, "Could not emit changed OperationalState: %m");
1226 (void) unlink(m
->state_file
);
1227 (void) unlink(temp_path
);
1229 return log_error_errno(r
, "Failed to save network state to %s: %m", m
->state_file
);
1232 static int manager_dirty_handler(sd_event_source
*s
, void *userdata
) {
1233 Manager
*m
= userdata
;
1242 SET_FOREACH(link
, m
->dirty_links
, i
)
1243 if (link_save(link
) >= 0)
1249 Link
*manager_dhcp6_prefix_get(Manager
*m
, struct in6_addr
*addr
) {
1250 assert_return(m
, NULL
);
1251 assert_return(addr
, NULL
);
1253 return hashmap_get(m
->dhcp6_prefixes
, addr
);
1256 static int dhcp6_route_add_handler(sd_netlink
*nl
, sd_netlink_message
*m
, Link
*link
) {
1261 r
= sd_netlink_message_get_errno(m
);
1262 if (r
< 0 && r
!= -EEXIST
)
1263 log_link_debug_errno(link
, r
, "Received error adding DHCPv6 Prefix Delegation route: %m");
1268 static void dhcp6_prefixes_hash_func(const struct in6_addr
*addr
, struct siphash
*state
) {
1271 siphash24_compress(addr
, sizeof(*addr
), state
);
1274 static int dhcp6_prefixes_compare_func(const struct in6_addr
*a
, const struct in6_addr
*b
) {
1275 return memcmp(a
, b
, sizeof(*a
));
1278 DEFINE_PRIVATE_HASH_OPS(dhcp6_prefixes_hash_ops
, struct in6_addr
, dhcp6_prefixes_hash_func
, dhcp6_prefixes_compare_func
);
1280 int manager_dhcp6_prefix_add(Manager
*m
, struct in6_addr
*addr
, Link
*link
) {
1281 _cleanup_free_
char *buf
= NULL
;
1285 assert_return(m
, -EINVAL
);
1286 assert_return(addr
, -EINVAL
);
1288 r
= route_add(link
, AF_INET6
, (union in_addr_union
*) addr
, 64,
1293 r
= route_configure(route
, link
, dhcp6_route_add_handler
);
1297 (void) in_addr_to_string(AF_INET6
, (union in_addr_union
*) addr
, &buf
);
1298 log_link_debug(link
, "Adding prefix route %s/64", strnull(buf
));
1300 r
= hashmap_ensure_allocated(&m
->dhcp6_prefixes
, &dhcp6_prefixes_hash_ops
);
1304 return hashmap_put(m
->dhcp6_prefixes
, addr
, link
);
1307 static int dhcp6_route_remove_handler(sd_netlink
*nl
, sd_netlink_message
*m
, Link
*link
) {
1312 r
= sd_netlink_message_get_errno(m
);
1314 log_link_debug_errno(link
, r
, "Received error on DHCPv6 Prefix Delegation route removal: %m");
1319 static int manager_dhcp6_prefix_remove(Manager
*m
, struct in6_addr
*addr
) {
1320 _cleanup_free_
char *buf
= NULL
;
1325 assert_return(m
, -EINVAL
);
1326 assert_return(addr
, -EINVAL
);
1328 l
= hashmap_remove(m
->dhcp6_prefixes
, addr
);
1332 (void) sd_radv_remove_prefix(l
->radv
, addr
, 64);
1333 r
= route_get(l
, AF_INET6
, (union in_addr_union
*) addr
, 64,
1338 r
= route_remove(route
, l
, dhcp6_route_remove_handler
);
1342 (void) in_addr_to_string(AF_INET6
, (union in_addr_union
*) addr
, &buf
);
1343 log_link_debug(l
, "Removing prefix route %s/64", strnull(buf
));
1348 int manager_dhcp6_prefix_remove_all(Manager
*m
, Link
*link
) {
1349 struct in6_addr
*addr
;
1353 assert_return(m
, -EINVAL
);
1354 assert_return(link
, -EINVAL
);
1356 HASHMAP_FOREACH_KEY(l
, addr
, m
->dhcp6_prefixes
, i
) {
1360 (void) manager_dhcp6_prefix_remove(m
, addr
);
1366 int manager_new(Manager
**ret
) {
1367 _cleanup_(manager_freep
) Manager
*m
= NULL
;
1370 m
= new0(Manager
, 1);
1374 m
->state_file
= strdup("/run/systemd/netif/state");
1378 m
->sysctl_ipv6_enabled
= -1;
1380 r
= sd_event_default(&m
->event
);
1384 (void) sd_event_set_watchdog(m
->event
, true);
1385 (void) sd_event_add_signal(m
->event
, NULL
, SIGTERM
, NULL
, NULL
);
1386 (void) sd_event_add_signal(m
->event
, NULL
, SIGINT
, NULL
, NULL
);
1388 r
= sd_event_add_post(m
->event
, NULL
, manager_dirty_handler
, m
);
1392 r
= manager_connect_rtnl(m
);
1396 r
= manager_connect_genl(m
);
1400 r
= manager_connect_udev(m
);
1404 LIST_HEAD_INIT(m
->networks
);
1406 r
= sd_resolve_default(&m
->resolve
);
1410 r
= sd_resolve_attach_event(m
->resolve
, m
->event
, 0);
1414 r
= setup_default_address_pool(m
);
1418 m
->duid
.type
= DUID_TYPE_EN
;
1420 (void) routing_policy_load_rules(m
->state_file
, &m
->rules_saved
);
1427 void manager_free(Manager
*m
) {
1435 free(m
->state_file
);
1437 sd_netlink_unref(m
->rtnl
);
1438 sd_netlink_unref(m
->genl
);
1439 sd_resolve_unref(m
->resolve
);
1441 while ((link
= hashmap_first(m
->dhcp6_prefixes
)))
1442 manager_dhcp6_prefix_remove_all(m
, link
);
1443 hashmap_free(m
->dhcp6_prefixes
);
1445 while ((link
= hashmap_steal_first(m
->links
))) {
1446 if (link
->dhcp6_client
)
1447 (void) dhcp6_lease_pd_prefix_lost(link
->dhcp6_client
, link
);
1451 m
->dirty_links
= set_free_with_destructor(m
->dirty_links
, link_unref
);
1452 m
->links
= hashmap_free(m
->links
);
1453 m
->links_requesting_uuid
= set_free(m
->links_requesting_uuid
);
1454 set_free(m
->duids_requesting_uuid
);
1456 while ((network
= m
->networks
))
1457 network_free(network
);
1459 hashmap_free(m
->networks_by_name
);
1461 m
->netdevs
= hashmap_free_with_destructor(m
->netdevs
, netdev_unref
);
1463 while ((pool
= m
->address_pools
))
1464 address_pool_free(pool
);
1466 /* routing_policy_rule_free() access m->rules and m->rules_foreign.
1467 * So, it is necessary to set NULL after the sets are freed. */
1468 m
->rules
= set_free_with_destructor(m
->rules
, routing_policy_rule_free
);
1469 m
->rules_foreign
= set_free_with_destructor(m
->rules_foreign
, routing_policy_rule_free
);
1470 set_free_with_destructor(m
->rules_saved
, routing_policy_rule_free
);
1472 sd_event_unref(m
->event
);
1474 sd_device_monitor_unref(m
->device_monitor
);
1476 sd_bus_flush_close_unref(m
->bus
);
1478 free(m
->dynamic_timezone
);
1479 free(m
->dynamic_hostname
);
1484 int manager_start(Manager
*m
) {
1490 /* The dirty handler will deal with future serialization, but the first one
1491 must be done explicitly. */
1495 HASHMAP_FOREACH(link
, m
->links
, i
)
1501 int manager_load_config(Manager
*m
) {
1504 /* update timestamp */
1505 paths_check_timestamp(NETWORK_DIRS
, &m
->network_dirs_ts_usec
, true);
1511 r
= network_load(m
);
1518 bool manager_should_reload(Manager
*m
) {
1519 return paths_check_timestamp(NETWORK_DIRS
, &m
->network_dirs_ts_usec
, false);
1522 int manager_rtnl_enumerate_links(Manager
*m
) {
1523 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*req
= NULL
, *reply
= NULL
;
1524 sd_netlink_message
*link
;
1530 r
= sd_rtnl_message_new_link(m
->rtnl
, &req
, RTM_GETLINK
, 0);
1534 r
= sd_netlink_message_request_dump(req
, true);
1538 r
= sd_netlink_call(m
->rtnl
, req
, 0, &reply
);
1542 for (link
= reply
; link
; link
= sd_netlink_message_next(link
)) {
1545 m
->enumerating
= true;
1547 k
= manager_rtnl_process_link(m
->rtnl
, link
, m
);
1551 m
->enumerating
= false;
1557 int manager_rtnl_enumerate_addresses(Manager
*m
) {
1558 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*req
= NULL
, *reply
= NULL
;
1559 sd_netlink_message
*addr
;
1565 r
= sd_rtnl_message_new_addr(m
->rtnl
, &req
, RTM_GETADDR
, 0, 0);
1569 r
= sd_netlink_message_request_dump(req
, true);
1573 r
= sd_netlink_call(m
->rtnl
, req
, 0, &reply
);
1577 for (addr
= reply
; addr
; addr
= sd_netlink_message_next(addr
)) {
1580 m
->enumerating
= true;
1582 k
= manager_rtnl_process_address(m
->rtnl
, addr
, m
);
1586 m
->enumerating
= false;
1592 int manager_rtnl_enumerate_routes(Manager
*m
) {
1593 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*req
= NULL
, *reply
= NULL
;
1594 sd_netlink_message
*route
;
1600 r
= sd_rtnl_message_new_route(m
->rtnl
, &req
, RTM_GETROUTE
, 0, 0);
1604 r
= sd_netlink_message_request_dump(req
, true);
1608 r
= sd_netlink_call(m
->rtnl
, req
, 0, &reply
);
1612 for (route
= reply
; route
; route
= sd_netlink_message_next(route
)) {
1615 m
->enumerating
= true;
1617 k
= manager_rtnl_process_route(m
->rtnl
, route
, m
);
1621 m
->enumerating
= false;
1627 int manager_rtnl_enumerate_rules(Manager
*m
) {
1628 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*req
= NULL
, *reply
= NULL
;
1629 sd_netlink_message
*rule
;
1635 r
= sd_rtnl_message_new_routing_policy_rule(m
->rtnl
, &req
, RTM_GETRULE
, 0);
1639 r
= sd_netlink_message_request_dump(req
, true);
1643 r
= sd_netlink_call(m
->rtnl
, req
, 0, &reply
);
1645 if (r
== -EOPNOTSUPP
) {
1646 log_debug("FIB Rules are not supported by the kernel. Ignoring.");
1653 for (rule
= reply
; rule
; rule
= sd_netlink_message_next(rule
)) {
1656 m
->enumerating
= true;
1658 k
= manager_rtnl_process_rule(m
->rtnl
, rule
, m
);
1662 m
->enumerating
= false;
1668 int manager_address_pool_acquire(Manager
*m
, int family
, unsigned prefixlen
, union in_addr_union
*found
) {
1673 assert(prefixlen
> 0);
1676 LIST_FOREACH(address_pools
, p
, m
->address_pools
) {
1677 if (p
->family
!= family
)
1680 r
= address_pool_acquire(p
, prefixlen
, found
);
1688 Link
* manager_find_uplink(Manager
*m
, Link
*exclude
) {
1689 _cleanup_free_
struct local_address
*gateways
= NULL
;
1694 /* Looks for a suitable "uplink", via black magic: an
1695 * interface that is up and where the default route with the
1696 * highest priority points to. */
1698 n
= local_gateways(m
->rtnl
, 0, AF_UNSPEC
, &gateways
);
1700 log_warning_errno(n
, "Failed to determine list of default gateways: %m");
1704 for (i
= 0; i
< n
; i
++) {
1707 link
= hashmap_get(m
->links
, INT_TO_PTR(gateways
[i
].ifindex
));
1709 log_debug("Weird, found a gateway for a link we don't know. Ignoring.");
1713 if (link
== exclude
)
1716 if (link
->operstate
< LINK_OPERSTATE_ROUTABLE
)
1725 void manager_dirty(Manager
*manager
) {
1728 /* the serialized state in /run is no longer up-to-date */
1729 manager
->dirty
= true;
1732 static int set_hostname_handler(sd_bus_message
*m
, void *userdata
, sd_bus_error
*ret_error
) {
1733 Manager
*manager
= userdata
;
1734 const sd_bus_error
*e
;
1739 e
= sd_bus_message_get_error(m
);
1741 log_warning_errno(sd_bus_error_get_errno(e
), "Could not set hostname: %s", e
->message
);
1746 int manager_set_hostname(Manager
*m
, const char *hostname
) {
1749 log_debug("Setting transient hostname: '%s'", strna(hostname
));
1751 if (free_and_strdup(&m
->dynamic_hostname
, hostname
) < 0)
1754 if (!m
->bus
|| sd_bus_is_ready(m
->bus
) <= 0) {
1755 log_debug("Not connected to system bus, setting hostname later.");
1759 r
= sd_bus_call_method_async(
1762 "org.freedesktop.hostname1",
1763 "/org/freedesktop/hostname1",
1764 "org.freedesktop.hostname1",
1766 set_hostname_handler
,
1773 return log_error_errno(r
, "Could not set transient hostname: %m");
1778 static int set_timezone_handler(sd_bus_message
*m
, void *userdata
, sd_bus_error
*ret_error
) {
1779 Manager
*manager
= userdata
;
1780 const sd_bus_error
*e
;
1785 e
= sd_bus_message_get_error(m
);
1787 log_warning_errno(sd_bus_error_get_errno(e
), "Could not set timezone: %s", e
->message
);
1792 int manager_set_timezone(Manager
*m
, const char *tz
) {
1798 log_debug("Setting system timezone: '%s'", tz
);
1799 if (free_and_strdup(&m
->dynamic_timezone
, tz
) < 0)
1802 if (!m
->bus
|| sd_bus_is_ready(m
->bus
) <= 0) {
1803 log_debug("Not connected to system bus, setting timezone later.");
1807 r
= sd_bus_call_method_async(
1810 "org.freedesktop.timedate1",
1811 "/org/freedesktop/timedate1",
1812 "org.freedesktop.timedate1",
1814 set_timezone_handler
,
1820 return log_error_errno(r
, "Could not set timezone: %m");
1825 int manager_request_product_uuid(Manager
*m
, Link
*link
) {
1830 if (m
->has_product_uuid
)
1833 log_debug("Requesting product UUID");
1838 assert_se(duid
= link_get_duid(link
));
1840 r
= set_ensure_allocated(&m
->links_requesting_uuid
, NULL
);
1844 r
= set_ensure_allocated(&m
->duids_requesting_uuid
, NULL
);
1848 r
= set_put(m
->links_requesting_uuid
, link
);
1852 r
= set_put(m
->duids_requesting_uuid
, duid
);
1857 if (!m
->bus
|| sd_bus_is_ready(m
->bus
) <= 0) {
1858 log_debug("Not connected to system bus, requesting product UUID later.");
1862 r
= sd_bus_call_method_async(
1865 "org.freedesktop.hostname1",
1866 "/org/freedesktop/hostname1",
1867 "org.freedesktop.hostname1",
1869 get_product_uuid_handler
,
1874 return log_warning_errno(r
, "Failed to get product UUID: %m");
1879 int manager_sysctl_ipv6_enabled(Manager
*manager
) {
1880 _cleanup_free_
char *value
= NULL
;
1883 if (manager
->sysctl_ipv6_enabled
>= 0)
1884 return manager
->sysctl_ipv6_enabled
;
1886 r
= sysctl_read_ip_property(AF_INET6
, "all", "disable_ipv6", &value
);
1888 return log_warning_errno(r
, "Failed to read net.ipv6.conf.all.disable_ipv6 sysctl property: %m");
1890 manager
->sysctl_ipv6_enabled
= value
[0] == '0';
1891 return manager
->sysctl_ipv6_enabled
;