]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/network/networkd-manager.c
Merge pull request #15195 from ssahani/dhcp-option-pop-server
[thirdparty/systemd.git] / src / network / networkd-manager.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2
3 #include <netinet/in.h>
4 #include <sys/socket.h>
5 #include <unistd.h>
6 #include <linux/if.h>
7 #include <linux/fib_rules.h>
8 #include <linux/nexthop.h>
9
10 #include "sd-daemon.h"
11 #include "sd-netlink.h"
12
13 #include "alloc-util.h"
14 #include "bus-polkit.h"
15 #include "bus-util.h"
16 #include "conf-parser.h"
17 #include "def.h"
18 #include "device-private.h"
19 #include "device-util.h"
20 #include "dns-domain.h"
21 #include "fd-util.h"
22 #include "fileio.h"
23 #include "local-addresses.h"
24 #include "netlink-util.h"
25 #include "network-internal.h"
26 #include "networkd-dhcp6.h"
27 #include "networkd-link-bus.h"
28 #include "networkd-manager-bus.h"
29 #include "networkd-manager.h"
30 #include "networkd-network-bus.h"
31 #include "networkd-speed-meter.h"
32 #include "ordered-set.h"
33 #include "path-util.h"
34 #include "set.h"
35 #include "signal-util.h"
36 #include "strv.h"
37 #include "sysctl-util.h"
38 #include "tmpfile-util.h"
39 #include "udev-util.h"
40 #include "virt.h"
41
42 /* use 128 MB for receive socket kernel queue. */
43 #define RCVBUF_SIZE (128*1024*1024)
44
45 static int log_message_warning_errno(sd_netlink_message *m, int err, const char *msg) {
46 const char *err_msg = NULL;
47
48 (void) sd_netlink_message_read_string(m, NLMSGERR_ATTR_MSG, &err_msg);
49 return log_warning_errno(err, "%s: %s%s%m", msg, strempty(err_msg), err_msg ? " " : "");
50 }
51
52 static int setup_default_address_pool(Manager *m) {
53 AddressPool *p;
54 int r;
55
56 assert(m);
57
58 /* Add in the well-known private address ranges. */
59
60 r = address_pool_new_from_string(m, &p, AF_INET6, "fd00::", 8);
61 if (r < 0)
62 return r;
63
64 r = address_pool_new_from_string(m, &p, AF_INET, "10.0.0.0", 8);
65 if (r < 0)
66 return r;
67
68 r = address_pool_new_from_string(m, &p, AF_INET, "172.16.0.0", 12);
69 if (r < 0)
70 return r;
71
72 r = address_pool_new_from_string(m, &p, AF_INET, "192.168.0.0", 16);
73 if (r < 0)
74 return r;
75
76 return 0;
77 }
78
79 static int manager_reset_all(Manager *m) {
80 Link *link;
81 Iterator i;
82 int r;
83
84 assert(m);
85
86 HASHMAP_FOREACH(link, m->links, i) {
87 r = link_carrier_reset(link);
88 if (r < 0)
89 log_link_warning_errno(link, r, "Could not reset carrier: %m");
90 }
91
92 return 0;
93 }
94
95 static int match_prepare_for_sleep(sd_bus_message *message, void *userdata, sd_bus_error *ret_error) {
96 Manager *m = userdata;
97 int b, r;
98
99 assert(message);
100 assert(m);
101
102 r = sd_bus_message_read(message, "b", &b);
103 if (r < 0) {
104 log_debug_errno(r, "Failed to parse PrepareForSleep signal: %m");
105 return 0;
106 }
107
108 if (b)
109 return 0;
110
111 log_debug("Coming back from suspend, resetting all connections...");
112
113 (void) manager_reset_all(m);
114
115 return 0;
116 }
117
118 static int on_connected(sd_bus_message *message, void *userdata, sd_bus_error *ret_error) {
119 Manager *m = userdata;
120
121 assert(message);
122 assert(m);
123
124 /* Did we get a timezone or transient hostname from DHCP while D-Bus wasn't up yet? */
125 if (m->dynamic_hostname)
126 (void) manager_set_hostname(m, m->dynamic_hostname);
127 if (m->dynamic_timezone)
128 (void) manager_set_timezone(m, m->dynamic_timezone);
129 if (m->links_requesting_uuid)
130 (void) manager_request_product_uuid(m, NULL);
131
132 return 0;
133 }
134
135 int manager_connect_bus(Manager *m) {
136 int r;
137
138 assert(m);
139
140 if (m->bus)
141 return 0;
142
143 r = bus_open_system_watch_bind_with_description(&m->bus, "bus-api-network");
144 if (r < 0)
145 return log_error_errno(r, "Failed to connect to bus: %m");
146
147 r = sd_bus_add_object_vtable(m->bus, NULL, "/org/freedesktop/network1", "org.freedesktop.network1.Manager", manager_vtable, m);
148 if (r < 0)
149 return log_error_errno(r, "Failed to add manager object vtable: %m");
150
151 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/network1/link", "org.freedesktop.network1.Link", link_vtable, link_object_find, m);
152 if (r < 0)
153 return log_error_errno(r, "Failed to add link object vtable: %m");
154
155 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/network1/link", link_node_enumerator, m);
156 if (r < 0)
157 return log_error_errno(r, "Failed to add link enumerator: %m");
158
159 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/network1/network", "org.freedesktop.network1.Network", network_vtable, network_object_find, m);
160 if (r < 0)
161 return log_error_errno(r, "Failed to add network object vtable: %m");
162
163 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/network1/network", network_node_enumerator, m);
164 if (r < 0)
165 return log_error_errno(r, "Failed to add network enumerator: %m");
166
167 r = sd_bus_request_name_async(m->bus, NULL, "org.freedesktop.network1", 0, NULL, NULL);
168 if (r < 0)
169 return log_error_errno(r, "Failed to request name: %m");
170
171 r = sd_bus_attach_event(m->bus, m->event, 0);
172 if (r < 0)
173 return log_error_errno(r, "Failed to attach bus to event loop: %m");
174
175 r = sd_bus_match_signal_async(
176 m->bus,
177 NULL,
178 "org.freedesktop.DBus.Local",
179 NULL,
180 "org.freedesktop.DBus.Local",
181 "Connected",
182 on_connected, NULL, m);
183 if (r < 0)
184 return log_error_errno(r, "Failed to request match on Connected signal: %m");
185
186 r = sd_bus_match_signal_async(
187 m->bus,
188 NULL,
189 "org.freedesktop.login1",
190 "/org/freedesktop/login1",
191 "org.freedesktop.login1.Manager",
192 "PrepareForSleep",
193 match_prepare_for_sleep, NULL, m);
194 if (r < 0)
195 log_warning_errno(r, "Failed to request match for PrepareForSleep, ignoring: %m");
196
197 return 0;
198 }
199
200 static int manager_udev_process_link(sd_device_monitor *monitor, sd_device *device, void *userdata) {
201 Manager *m = userdata;
202 DeviceAction action;
203 Link *link = NULL;
204 int r, ifindex;
205
206 assert(m);
207 assert(device);
208
209 r = device_get_action(device, &action);
210 if (r < 0) {
211 log_device_debug_errno(device, r, "Failed to get udev action, ignoring device: %m");
212 return 0;
213 }
214
215 if (!IN_SET(action, DEVICE_ACTION_ADD, DEVICE_ACTION_CHANGE, DEVICE_ACTION_MOVE)) {
216 log_device_debug(device, "Ignoring udev %s event for device.", device_action_to_string(action));
217 return 0;
218 }
219
220 r = sd_device_get_ifindex(device, &ifindex);
221 if (r < 0) {
222 log_device_debug_errno(device, r, "Ignoring udev ADD event for device without ifindex or with invalid ifindex: %m");
223 return 0;
224 }
225
226 r = device_is_renaming(device);
227 if (r < 0) {
228 log_device_error_errno(device, r, "Failed to determine the device is renamed or not, ignoring '%s' uevent: %m",
229 device_action_to_string(action));
230 return 0;
231 }
232 if (r > 0) {
233 log_device_debug(device, "Interface is under renaming, wait for the interface to be renamed: %m");
234 return 0;
235 }
236
237 r = link_get(m, ifindex, &link);
238 if (r < 0) {
239 if (r != -ENODEV)
240 log_debug_errno(r, "Failed to get link from ifindex %i, ignoring: %m", ifindex);
241 return 0;
242 }
243
244 (void) link_initialized(link, device);
245
246 return 0;
247 }
248
249 static int manager_connect_udev(Manager *m) {
250 int r;
251
252 /* udev does not initialize devices inside containers,
253 * so we rely on them being already initialized before
254 * entering the container */
255 if (detect_container() > 0)
256 return 0;
257
258 r = sd_device_monitor_new(&m->device_monitor);
259 if (r < 0)
260 return log_error_errno(r, "Failed to initialize device monitor: %m");
261
262 r = sd_device_monitor_filter_add_match_subsystem_devtype(m->device_monitor, "net", NULL);
263 if (r < 0)
264 return log_error_errno(r, "Could not add device monitor filter: %m");
265
266 r = sd_device_monitor_attach_event(m->device_monitor, m->event);
267 if (r < 0)
268 return log_error_errno(r, "Failed to attach event to device monitor: %m");
269
270 r = sd_device_monitor_start(m->device_monitor, manager_udev_process_link, m);
271 if (r < 0)
272 return log_error_errno(r, "Failed to start device monitor: %m");
273
274 return 0;
275 }
276
277 int manager_rtnl_process_route(sd_netlink *rtnl, sd_netlink_message *message, void *userdata) {
278 _cleanup_(route_freep) Route *tmp = NULL;
279 Route *route = NULL;
280 Manager *m = userdata;
281 Link *link = NULL;
282 uint32_t ifindex;
283 uint16_t type;
284 unsigned char table;
285 int r;
286
287 assert(rtnl);
288 assert(message);
289 assert(m);
290
291 if (sd_netlink_message_is_error(message)) {
292 r = sd_netlink_message_get_errno(message);
293 if (r < 0)
294 log_message_warning_errno(message, r, "rtnl: failed to receive route message, ignoring");
295
296 return 0;
297 }
298
299 r = sd_netlink_message_get_type(message, &type);
300 if (r < 0) {
301 log_warning_errno(r, "rtnl: could not get message type, ignoring: %m");
302 return 0;
303 } else if (!IN_SET(type, RTM_NEWROUTE, RTM_DELROUTE)) {
304 log_warning("rtnl: received unexpected message type %u when processing route, ignoring.", type);
305 return 0;
306 }
307
308 r = sd_netlink_message_read_u32(message, RTA_OIF, &ifindex);
309 if (r == -ENODATA) {
310 log_debug("rtnl: received route message without ifindex, ignoring");
311 return 0;
312 } else if (r < 0) {
313 log_warning_errno(r, "rtnl: could not get ifindex from route message, ignoring: %m");
314 return 0;
315 } else if (ifindex <= 0) {
316 log_warning("rtnl: received route message with invalid ifindex %d, ignoring.", ifindex);
317 return 0;
318 }
319
320 r = link_get(m, ifindex, &link);
321 if (r < 0 || !link) {
322 /* when enumerating we might be out of sync, but we will
323 * get the route again, so just ignore it */
324 if (!m->enumerating)
325 log_warning("rtnl: received route message for link (%d) we do not know about, ignoring", ifindex);
326 return 0;
327 }
328
329 r = route_new(&tmp);
330 if (r < 0)
331 return log_oom();
332
333 r = sd_rtnl_message_route_get_family(message, &tmp->family);
334 if (r < 0) {
335 log_link_warning(link, "rtnl: received route message without family, ignoring");
336 return 0;
337 } else if (!IN_SET(tmp->family, AF_INET, AF_INET6)) {
338 log_link_debug(link, "rtnl: received route message with invalid family '%i', ignoring", tmp->family);
339 return 0;
340 }
341
342 r = sd_rtnl_message_route_get_protocol(message, &tmp->protocol);
343 if (r < 0) {
344 log_warning_errno(r, "rtnl: received route message without route protocol: %m");
345 return 0;
346 }
347
348 switch (tmp->family) {
349 case AF_INET:
350 r = sd_netlink_message_read_in_addr(message, RTA_DST, &tmp->dst.in);
351 if (r < 0 && r != -ENODATA) {
352 log_link_warning_errno(link, r, "rtnl: received route message without valid destination, ignoring: %m");
353 return 0;
354 }
355
356 r = sd_netlink_message_read_in_addr(message, RTA_GATEWAY, &tmp->gw.in);
357 if (r < 0 && r != -ENODATA) {
358 log_link_warning_errno(link, r, "rtnl: received route message without valid gateway, ignoring: %m");
359 return 0;
360 }
361
362 r = sd_netlink_message_read_in_addr(message, RTA_SRC, &tmp->src.in);
363 if (r < 0 && r != -ENODATA) {
364 log_link_warning_errno(link, r, "rtnl: received route message without valid source, ignoring: %m");
365 return 0;
366 }
367
368 r = sd_netlink_message_read_in_addr(message, RTA_PREFSRC, &tmp->prefsrc.in);
369 if (r < 0 && r != -ENODATA) {
370 log_link_warning_errno(link, r, "rtnl: received route message without valid preferred source, ignoring: %m");
371 return 0;
372 }
373
374 break;
375
376 case AF_INET6:
377 r = sd_netlink_message_read_in6_addr(message, RTA_DST, &tmp->dst.in6);
378 if (r < 0 && r != -ENODATA) {
379 log_link_warning_errno(link, r, "rtnl: received route message without valid destination, ignoring: %m");
380 return 0;
381 }
382
383 r = sd_netlink_message_read_in6_addr(message, RTA_GATEWAY, &tmp->gw.in6);
384 if (r < 0 && r != -ENODATA) {
385 log_link_warning_errno(link, r, "rtnl: received route message without valid gateway, ignoring: %m");
386 return 0;
387 }
388
389 r = sd_netlink_message_read_in6_addr(message, RTA_SRC, &tmp->src.in6);
390 if (r < 0 && r != -ENODATA) {
391 log_link_warning_errno(link, r, "rtnl: received route message without valid source, ignoring: %m");
392 return 0;
393 }
394
395 r = sd_netlink_message_read_in6_addr(message, RTA_PREFSRC, &tmp->prefsrc.in6);
396 if (r < 0 && r != -ENODATA) {
397 log_link_warning_errno(link, r, "rtnl: received route message without valid preferred source, ignoring: %m");
398 return 0;
399 }
400
401 break;
402
403 default:
404 assert_not_reached("Received route message with unsupported address family");
405 return 0;
406 }
407
408 r = sd_rtnl_message_route_get_dst_prefixlen(message, &tmp->dst_prefixlen);
409 if (r < 0) {
410 log_link_warning_errno(link, r, "rtnl: received route message with invalid destination prefixlen, ignoring: %m");
411 return 0;
412 }
413
414 r = sd_rtnl_message_route_get_src_prefixlen(message, &tmp->src_prefixlen);
415 if (r < 0) {
416 log_link_warning_errno(link, r, "rtnl: received route message with invalid source prefixlen, ignoring: %m");
417 return 0;
418 }
419
420 r = sd_rtnl_message_route_get_scope(message, &tmp->scope);
421 if (r < 0) {
422 log_link_warning_errno(link, r, "rtnl: received route message with invalid scope, ignoring: %m");
423 return 0;
424 }
425
426 r = sd_rtnl_message_route_get_tos(message, &tmp->tos);
427 if (r < 0) {
428 log_link_warning_errno(link, r, "rtnl: received route message with invalid tos, ignoring: %m");
429 return 0;
430 }
431
432 r = sd_rtnl_message_route_get_type(message, &tmp->type);
433 if (r < 0) {
434 log_link_warning_errno(link, r, "rtnl: received route message with invalid type, ignoring: %m");
435 return 0;
436 }
437
438 r = sd_rtnl_message_route_get_table(message, &table);
439 if (r < 0) {
440 log_link_warning_errno(link, r, "rtnl: received route message with invalid table, ignoring: %m");
441 return 0;
442 }
443 tmp->table = table;
444
445 r = sd_netlink_message_read_u32(message, RTA_PRIORITY, &tmp->priority);
446 if (r < 0 && r != -ENODATA) {
447 log_link_warning_errno(link, r, "rtnl: received route message with invalid priority, ignoring: %m");
448 return 0;
449 }
450
451 r = sd_netlink_message_enter_container(message, RTA_METRICS);
452 if (r < 0 && r != -ENODATA) {
453 log_link_error_errno(link, r, "rtnl: Could not enter RTA_METRICS container: %m");
454 return 0;
455 }
456 if (r >= 0) {
457 r = sd_netlink_message_read_u32(message, RTAX_INITCWND, &tmp->initcwnd);
458 if (r < 0 && r != -ENODATA) {
459 log_link_warning_errno(link, r, "rtnl: received route message with invalid initcwnd, ignoring: %m");
460 return 0;
461 }
462
463 r = sd_netlink_message_read_u32(message, RTAX_INITRWND, &tmp->initrwnd);
464 if (r < 0 && r != -ENODATA) {
465 log_link_warning_errno(link, r, "rtnl: received route message with invalid initrwnd, ignoring: %m");
466 return 0;
467 }
468
469 r = sd_netlink_message_exit_container(message);
470 if (r < 0) {
471 log_link_error_errno(link, r, "rtnl: Could not exit from RTA_METRICS container: %m");
472 return 0;
473 }
474 }
475
476 (void) route_get(link, tmp, &route);
477
478 if (DEBUG_LOGGING) {
479 _cleanup_free_ char *buf_dst = NULL, *buf_dst_prefixlen = NULL,
480 *buf_src = NULL, *buf_gw = NULL, *buf_prefsrc = NULL;
481 char buf_scope[ROUTE_SCOPE_STR_MAX], buf_table[ROUTE_TABLE_STR_MAX],
482 buf_protocol[ROUTE_PROTOCOL_STR_MAX];
483
484 if (!in_addr_is_null(tmp->family, &tmp->dst)) {
485 (void) in_addr_to_string(tmp->family, &tmp->dst, &buf_dst);
486 (void) asprintf(&buf_dst_prefixlen, "/%u", tmp->dst_prefixlen);
487 }
488 if (!in_addr_is_null(tmp->family, &tmp->src))
489 (void) in_addr_to_string(tmp->family, &tmp->src, &buf_src);
490 if (!in_addr_is_null(tmp->family, &tmp->gw))
491 (void) in_addr_to_string(tmp->family, &tmp->gw, &buf_gw);
492 if (!in_addr_is_null(tmp->family, &tmp->prefsrc))
493 (void) in_addr_to_string(tmp->family, &tmp->prefsrc, &buf_prefsrc);
494
495 log_link_debug(link,
496 "%s route: dst: %s%s, src: %s, gw: %s, prefsrc: %s, scope: %s, table: %s, proto: %s, type: %s",
497 (!route && !link->manager->manage_foreign_routes) || type == RTM_DELROUTE ? "Forgetting" :
498 route ? "Received remembered" : "Remembering",
499 strna(buf_dst), strempty(buf_dst_prefixlen),
500 strna(buf_src), strna(buf_gw), strna(buf_prefsrc),
501 format_route_scope(tmp->scope, buf_scope, sizeof buf_scope),
502 format_route_table(tmp->table, buf_table, sizeof buf_table),
503 format_route_protocol(tmp->protocol, buf_protocol, sizeof buf_protocol),
504 strna(route_type_to_string(tmp->type)));
505 }
506
507 switch (type) {
508 case RTM_NEWROUTE:
509 if (!route && link->manager->manage_foreign_routes) {
510 /* A route appeared that we did not request */
511 r = route_add_foreign(link, tmp, &route);
512 if (r < 0) {
513 log_link_warning_errno(link, r, "Failed to remember foreign route, ignoring: %m");
514 return 0;
515 }
516 }
517
518 break;
519
520 case RTM_DELROUTE:
521 route_free(route);
522 break;
523
524 default:
525 assert_not_reached("Received route message with invalid RTNL message type");
526 }
527
528 return 1;
529 }
530
531 static int manager_rtnl_process_neighbor_lladdr(sd_netlink_message *message, union lladdr_union *lladdr, size_t *size, char **str) {
532 int r;
533
534 assert(message);
535 assert(lladdr);
536 assert(size);
537 assert(str);
538
539 *str = NULL;
540
541 r = sd_netlink_message_read(message, NDA_LLADDR, sizeof(lladdr->ip.in6), &lladdr->ip.in6);
542 if (r >= 0) {
543 *size = sizeof(lladdr->ip.in6);
544 if (in_addr_to_string(AF_INET6, &lladdr->ip, str) < 0)
545 log_warning_errno(r, "Could not print lower address: %m");
546 return r;
547 }
548
549 r = sd_netlink_message_read(message, NDA_LLADDR, sizeof(lladdr->mac), &lladdr->mac);
550 if (r >= 0) {
551 *size = sizeof(lladdr->mac);
552 *str = new(char, ETHER_ADDR_TO_STRING_MAX);
553 if (!*str) {
554 log_oom();
555 return r;
556 }
557 ether_addr_to_string(&lladdr->mac, *str);
558 return r;
559 }
560
561 r = sd_netlink_message_read(message, NDA_LLADDR, sizeof(lladdr->ip.in), &lladdr->ip.in);
562 if (r >= 0) {
563 *size = sizeof(lladdr->ip.in);
564 if (in_addr_to_string(AF_INET, &lladdr->ip, str) < 0)
565 log_warning_errno(r, "Could not print lower address: %m");
566 return r;
567 }
568
569 return r;
570 }
571
572 int manager_rtnl_process_neighbor(sd_netlink *rtnl, sd_netlink_message *message, void *userdata) {
573 Manager *m = userdata;
574 Link *link = NULL;
575 Neighbor *neighbor = NULL;
576 int ifindex, family, r;
577 uint16_t type, state;
578 union in_addr_union in_addr = IN_ADDR_NULL;
579 _cleanup_free_ char *addr_str = NULL;
580 union lladdr_union lladdr;
581 size_t lladdr_size = 0;
582 _cleanup_free_ char *lladdr_str = NULL;
583
584 assert(rtnl);
585 assert(message);
586 assert(m);
587
588 if (sd_netlink_message_is_error(message)) {
589 r = sd_netlink_message_get_errno(message);
590 if (r < 0)
591 log_message_warning_errno(message, r, "rtnl: failed to receive neighbor message, ignoring");
592
593 return 0;
594 }
595
596 r = sd_netlink_message_get_type(message, &type);
597 if (r < 0) {
598 log_warning_errno(r, "rtnl: could not get message type, ignoring: %m");
599 return 0;
600 } else if (!IN_SET(type, RTM_NEWNEIGH, RTM_DELNEIGH)) {
601 log_warning("rtnl: received unexpected message type %u when processing neighbor, ignoring.", type);
602 return 0;
603 }
604
605 r = sd_rtnl_message_neigh_get_state(message, &state);
606 if (r < 0) {
607 log_link_warning_errno(link, r, "rtnl: received neighbor message with invalid state, ignoring: %m");
608 return 0;
609 } else if (!FLAGS_SET(state, NUD_PERMANENT)) {
610 log_debug("rtnl: received non-static neighbor, ignoring.");
611 return 0;
612 }
613
614 r = sd_rtnl_message_neigh_get_ifindex(message, &ifindex);
615 if (r < 0) {
616 log_warning_errno(r, "rtnl: could not get ifindex from message, ignoring: %m");
617 return 0;
618 } else if (ifindex <= 0) {
619 log_warning("rtnl: received neighbor message with invalid ifindex %d, ignoring.", ifindex);
620 return 0;
621 }
622
623 r = link_get(m, ifindex, &link);
624 if (r < 0 || !link) {
625 /* when enumerating we might be out of sync, but we will get the neighbor again, so just
626 * ignore it */
627 if (!m->enumerating)
628 log_warning("rtnl: received neighbor for link '%d' we don't know about, ignoring.", ifindex);
629 return 0;
630 }
631
632 r = sd_rtnl_message_neigh_get_family(message, &family);
633 if (r < 0) {
634 log_link_warning(link, "rtnl: received neighbor message without family, ignoring.");
635 return 0;
636 } else if (!IN_SET(family, AF_INET, AF_INET6)) {
637 log_link_debug(link, "rtnl: received neighbor message with invalid family '%i', ignoring.", family);
638 return 0;
639 }
640
641 switch (family) {
642 case AF_INET:
643 r = sd_netlink_message_read_in_addr(message, NDA_DST, &in_addr.in);
644 if (r < 0) {
645 log_link_warning_errno(link, r, "rtnl: received neighbor message without valid address, ignoring: %m");
646 return 0;
647 }
648
649 break;
650
651 case AF_INET6:
652 r = sd_netlink_message_read_in6_addr(message, NDA_DST, &in_addr.in6);
653 if (r < 0) {
654 log_link_warning_errno(link, r, "rtnl: received neighbor message without valid address, ignoring: %m");
655 return 0;
656 }
657
658 break;
659
660 default:
661 assert_not_reached("Received unsupported address family");
662 }
663
664 if (in_addr_to_string(family, &in_addr, &addr_str) < 0)
665 log_link_warning_errno(link, r, "Could not print address: %m");
666
667 r = manager_rtnl_process_neighbor_lladdr(message, &lladdr, &lladdr_size, &lladdr_str);
668 if (r < 0) {
669 log_link_warning_errno(link, r, "rtnl: received neighbor message with invalid lladdr, ignoring: %m");
670 return 0;
671 }
672
673 (void) neighbor_get(link, family, &in_addr, &lladdr, lladdr_size, &neighbor);
674
675 switch (type) {
676 case RTM_NEWNEIGH:
677 if (neighbor)
678 log_link_debug(link, "Remembering neighbor: %s->%s",
679 strnull(addr_str), strnull(lladdr_str));
680 else {
681 /* A neighbor appeared that we did not request */
682 r = neighbor_add_foreign(link, family, &in_addr, &lladdr, lladdr_size, &neighbor);
683 if (r < 0) {
684 log_link_warning_errno(link, r, "Failed to remember foreign neighbor %s->%s, ignoring: %m",
685 strnull(addr_str), strnull(lladdr_str));
686 return 0;
687 } else
688 log_link_debug(link, "Remembering foreign neighbor: %s->%s",
689 strnull(addr_str), strnull(lladdr_str));
690 }
691
692 break;
693
694 case RTM_DELNEIGH:
695 if (neighbor) {
696 log_link_debug(link, "Forgetting neighbor: %s->%s",
697 strnull(addr_str), strnull(lladdr_str));
698 (void) neighbor_free(neighbor);
699 } else
700 log_link_debug(link, "Kernel removed a neighbor we don't remember: %s->%s, ignoring.",
701 strnull(addr_str), strnull(lladdr_str));
702
703 break;
704
705 default:
706 assert_not_reached("Received invalid RTNL message type");
707 }
708
709 return 1;
710 }
711
712 int manager_rtnl_process_address(sd_netlink *rtnl, sd_netlink_message *message, void *userdata) {
713 _cleanup_free_ char *buf = NULL;
714 Manager *m = userdata;
715 Link *link = NULL;
716 uint16_t type;
717 unsigned char flags, prefixlen, scope;
718 union in_addr_union in_addr = IN_ADDR_NULL;
719 struct ifa_cacheinfo cinfo;
720 Address *address = NULL;
721 char valid_buf[FORMAT_TIMESPAN_MAX];
722 const char *valid_str = NULL;
723 int ifindex, family, r;
724
725 assert(rtnl);
726 assert(message);
727 assert(m);
728
729 if (sd_netlink_message_is_error(message)) {
730 r = sd_netlink_message_get_errno(message);
731 if (r < 0)
732 log_message_warning_errno(message, r, "rtnl: failed to receive address message, ignoring");
733
734 return 0;
735 }
736
737 r = sd_netlink_message_get_type(message, &type);
738 if (r < 0) {
739 log_warning_errno(r, "rtnl: could not get message type, ignoring: %m");
740 return 0;
741 } else if (!IN_SET(type, RTM_NEWADDR, RTM_DELADDR)) {
742 log_warning("rtnl: received unexpected message type %u when processing address, ignoring.", type);
743 return 0;
744 }
745
746 r = sd_rtnl_message_addr_get_ifindex(message, &ifindex);
747 if (r < 0) {
748 log_warning_errno(r, "rtnl: could not get ifindex from message, ignoring: %m");
749 return 0;
750 } else if (ifindex <= 0) {
751 log_warning("rtnl: received address message with invalid ifindex %d, ignoring.", ifindex);
752 return 0;
753 }
754
755 r = link_get(m, ifindex, &link);
756 if (r < 0 || !link) {
757 /* when enumerating we might be out of sync, but we will get the address again, so just
758 * ignore it */
759 if (!m->enumerating)
760 log_warning("rtnl: received address for link '%d' we don't know about, ignoring.", ifindex);
761 return 0;
762 }
763
764 r = sd_rtnl_message_addr_get_family(message, &family);
765 if (r < 0) {
766 log_link_warning(link, "rtnl: received address message without family, ignoring.");
767 return 0;
768 } else if (!IN_SET(family, AF_INET, AF_INET6)) {
769 log_link_debug(link, "rtnl: received address message with invalid family '%i', ignoring.", family);
770 return 0;
771 }
772
773 r = sd_rtnl_message_addr_get_prefixlen(message, &prefixlen);
774 if (r < 0) {
775 log_link_warning_errno(link, r, "rtnl: received address message with invalid prefixlen, ignoring: %m");
776 return 0;
777 }
778
779 r = sd_rtnl_message_addr_get_scope(message, &scope);
780 if (r < 0) {
781 log_link_warning_errno(link, r, "rtnl: received address message with invalid scope, ignoring: %m");
782 return 0;
783 }
784
785 r = sd_rtnl_message_addr_get_flags(message, &flags);
786 if (r < 0) {
787 log_link_warning_errno(link, r, "rtnl: received address message with invalid flags, ignoring: %m");
788 return 0;
789 }
790
791 switch (family) {
792 case AF_INET:
793 r = sd_netlink_message_read_in_addr(message, IFA_LOCAL, &in_addr.in);
794 if (r < 0) {
795 log_link_warning_errno(link, r, "rtnl: received address message without valid address, ignoring: %m");
796 return 0;
797 }
798
799 break;
800
801 case AF_INET6:
802 r = sd_netlink_message_read_in6_addr(message, IFA_ADDRESS, &in_addr.in6);
803 if (r < 0) {
804 log_link_warning_errno(link, r, "rtnl: received address message without valid address, ignoring: %m");
805 return 0;
806 }
807
808 break;
809
810 default:
811 assert_not_reached("Received unsupported address family");
812 }
813
814 r = in_addr_to_string(family, &in_addr, &buf);
815 if (r < 0)
816 log_link_warning_errno(link, r, "Could not print address: %m");
817
818 r = sd_netlink_message_read_cache_info(message, IFA_CACHEINFO, &cinfo);
819 if (r < 0 && r != -ENODATA) {
820 log_link_warning_errno(link, r, "rtnl: cannot get IFA_CACHEINFO attribute, ignoring: %m");
821 return 0;
822 } else if (r >= 0 && cinfo.ifa_valid != CACHE_INFO_INFINITY_LIFE_TIME)
823 valid_str = format_timespan(valid_buf, FORMAT_TIMESPAN_MAX,
824 cinfo.ifa_valid * USEC_PER_SEC,
825 USEC_PER_SEC);
826
827 (void) address_get(link, family, &in_addr, prefixlen, &address);
828
829 switch (type) {
830 case RTM_NEWADDR:
831 if (address)
832 log_link_debug(link, "Remembering updated address: %s/%u (valid %s%s)",
833 strnull(buf), prefixlen,
834 valid_str ? "for " : "forever", strempty(valid_str));
835 else {
836 /* An address appeared that we did not request */
837 r = address_add_foreign(link, family, &in_addr, prefixlen, &address);
838 if (r < 0) {
839 log_link_warning_errno(link, r, "Failed to remember foreign address %s/%u, ignoring: %m",
840 strnull(buf), prefixlen);
841 return 0;
842 } else
843 log_link_debug(link, "Remembering foreign address: %s/%u (valid %s%s)",
844 strnull(buf), prefixlen,
845 valid_str ? "for " : "forever", strempty(valid_str));
846 }
847
848 /* address_update() logs internally, so we don't need to. */
849 (void) address_update(address, flags, scope, &cinfo);
850
851 break;
852
853 case RTM_DELADDR:
854 if (address) {
855 log_link_debug(link, "Forgetting address: %s/%u (valid %s%s)",
856 strnull(buf), prefixlen,
857 valid_str ? "for " : "forever", strempty(valid_str));
858 (void) address_drop(address);
859 } else
860 log_link_debug(link, "Kernel removed an address we don't remember: %s/%u (valid %s%s), ignoring.",
861 strnull(buf), prefixlen,
862 valid_str ? "for " : "forever", strempty(valid_str));
863
864 break;
865
866 default:
867 assert_not_reached("Received invalid RTNL message type");
868 }
869
870 return 1;
871 }
872
873 static int manager_rtnl_process_link(sd_netlink *rtnl, sd_netlink_message *message, void *userdata) {
874 Manager *m = userdata;
875 Link *link = NULL;
876 NetDev *netdev = NULL;
877 uint16_t type;
878 const char *name;
879 int r, ifindex;
880
881 assert(rtnl);
882 assert(message);
883 assert(m);
884
885 if (sd_netlink_message_is_error(message)) {
886 r = sd_netlink_message_get_errno(message);
887 if (r < 0)
888 log_message_warning_errno(message, r, "rtnl: Could not receive link message, ignoring");
889
890 return 0;
891 }
892
893 r = sd_netlink_message_get_type(message, &type);
894 if (r < 0) {
895 log_warning_errno(r, "rtnl: Could not get message type, ignoring: %m");
896 return 0;
897 } else if (!IN_SET(type, RTM_NEWLINK, RTM_DELLINK)) {
898 log_warning("rtnl: Received unexpected message type %u when processing link, ignoring.", type);
899 return 0;
900 }
901
902 r = sd_rtnl_message_link_get_ifindex(message, &ifindex);
903 if (r < 0) {
904 log_warning_errno(r, "rtnl: Could not get ifindex from link message, ignoring: %m");
905 return 0;
906 } else if (ifindex <= 0) {
907 log_warning("rtnl: received link message with invalid ifindex %d, ignoring.", ifindex);
908 return 0;
909 }
910
911 r = sd_netlink_message_read_string(message, IFLA_IFNAME, &name);
912 if (r < 0) {
913 log_warning_errno(r, "rtnl: Received link message without ifname, ignoring: %m");
914 return 0;
915 }
916
917 (void) link_get(m, ifindex, &link);
918 (void) netdev_get(m, name, &netdev);
919
920 switch (type) {
921 case RTM_NEWLINK:
922 if (!link) {
923 /* link is new, so add it */
924 r = link_add(m, message, &link);
925 if (r < 0) {
926 log_warning_errno(r, "Could not process new link message, ignoring: %m");
927 return 0;
928 }
929 }
930
931 if (netdev) {
932 /* netdev exists, so make sure the ifindex matches */
933 r = netdev_set_ifindex(netdev, message);
934 if (r < 0) {
935 log_warning_errno(r, "Could not process new link message for netdev, ignoring: %m");
936 return 0;
937 }
938 }
939
940 r = link_update(link, message);
941 if (r < 0) {
942 log_warning_errno(r, "Could not process link message, ignoring: %m");
943 return 0;
944 }
945
946 break;
947
948 case RTM_DELLINK:
949 link_drop(link);
950 netdev_drop(netdev);
951
952 break;
953
954 default:
955 assert_not_reached("Received link message with invalid RTNL message type.");
956 }
957
958 return 1;
959 }
960
961 int manager_rtnl_process_rule(sd_netlink *rtnl, sd_netlink_message *message, void *userdata) {
962 _cleanup_(routing_policy_rule_freep) RoutingPolicyRule *tmp = NULL;
963 _cleanup_free_ char *from = NULL, *to = NULL;
964 RoutingPolicyRule *rule = NULL;
965 const char *iif = NULL, *oif = NULL;
966 uint32_t suppress_prefixlen;
967 Manager *m = userdata;
968 unsigned flags;
969 uint16_t type;
970 int r;
971
972 assert(rtnl);
973 assert(message);
974 assert(m);
975
976 if (sd_netlink_message_is_error(message)) {
977 r = sd_netlink_message_get_errno(message);
978 if (r < 0)
979 log_message_warning_errno(message, r, "rtnl: failed to receive rule message, ignoring");
980
981 return 0;
982 }
983
984 r = sd_netlink_message_get_type(message, &type);
985 if (r < 0) {
986 log_warning_errno(r, "rtnl: could not get message type, ignoring: %m");
987 return 0;
988 } else if (!IN_SET(type, RTM_NEWRULE, RTM_DELRULE)) {
989 log_warning("rtnl: received unexpected message type %u when processing rule, ignoring.", type);
990 return 0;
991 }
992
993 r = routing_policy_rule_new(&tmp);
994 if (r < 0) {
995 log_oom();
996 return 0;
997 }
998
999 r = sd_rtnl_message_get_family(message, &tmp->family);
1000 if (r < 0) {
1001 log_warning_errno(r, "rtnl: could not get rule family, ignoring: %m");
1002 return 0;
1003 } else if (!IN_SET(tmp->family, AF_INET, AF_INET6)) {
1004 log_debug("rtnl: received rule message with invalid family %d, ignoring.", tmp->family);
1005 return 0;
1006 }
1007
1008 switch (tmp->family) {
1009 case AF_INET:
1010 r = sd_netlink_message_read_in_addr(message, FRA_SRC, &tmp->from.in);
1011 if (r < 0 && r != -ENODATA) {
1012 log_warning_errno(r, "rtnl: could not get FRA_SRC attribute, ignoring: %m");
1013 return 0;
1014 } else if (r >= 0) {
1015 r = sd_rtnl_message_routing_policy_rule_get_rtm_src_prefixlen(message, &tmp->from_prefixlen);
1016 if (r < 0) {
1017 log_warning_errno(r, "rtnl: received rule message without valid source prefix length, ignoring: %m");
1018 return 0;
1019 }
1020 }
1021
1022 r = sd_netlink_message_read_in_addr(message, FRA_DST, &tmp->to.in);
1023 if (r < 0 && r != -ENODATA) {
1024 log_warning_errno(r, "rtnl: could not get FRA_DST attribute, ignoring: %m");
1025 return 0;
1026 } else if (r >= 0) {
1027 r = sd_rtnl_message_routing_policy_rule_get_rtm_dst_prefixlen(message, &tmp->to_prefixlen);
1028 if (r < 0) {
1029 log_warning_errno(r, "rtnl: received rule message without valid destination prefix length, ignoring: %m");
1030 return 0;
1031 }
1032 }
1033
1034 break;
1035
1036 case AF_INET6:
1037 r = sd_netlink_message_read_in6_addr(message, FRA_SRC, &tmp->from.in6);
1038 if (r < 0 && r != -ENODATA) {
1039 log_warning_errno(r, "rtnl: could not get FRA_SRC attribute, ignoring: %m");
1040 return 0;
1041 } else if (r >= 0) {
1042 r = sd_rtnl_message_routing_policy_rule_get_rtm_src_prefixlen(message, &tmp->from_prefixlen);
1043 if (r < 0) {
1044 log_warning_errno(r, "rtnl: received rule message without valid source prefix length, ignoring: %m");
1045 return 0;
1046 }
1047 }
1048
1049 r = sd_netlink_message_read_in6_addr(message, FRA_DST, &tmp->to.in6);
1050 if (r < 0 && r != -ENODATA) {
1051 log_warning_errno(r, "rtnl: could not get FRA_DST attribute, ignoring: %m");
1052 return 0;
1053 } else if (r >= 0) {
1054 r = sd_rtnl_message_routing_policy_rule_get_rtm_dst_prefixlen(message, &tmp->to_prefixlen);
1055 if (r < 0) {
1056 log_warning_errno(r, "rtnl: received rule message without valid destination prefix length, ignoring: %m");
1057 return 0;
1058 }
1059 }
1060
1061 break;
1062
1063 default:
1064 assert_not_reached("Received rule message with unsupported address family");
1065 }
1066
1067 if (tmp->from_prefixlen == 0 && tmp->to_prefixlen == 0)
1068 return 0;
1069
1070 r = sd_rtnl_message_routing_policy_rule_get_flags(message, &flags);
1071 if (r < 0) {
1072 log_warning_errno(r, "rtnl: received rule message without valid flag, ignoring: %m");
1073 return 0;
1074 }
1075 tmp->invert_rule = flags & FIB_RULE_INVERT;
1076
1077 r = sd_netlink_message_read_u32(message, FRA_FWMARK, &tmp->fwmark);
1078 if (r < 0 && r != -ENODATA) {
1079 log_warning_errno(r, "rtnl: could not get FRA_FWMARK attribute, ignoring: %m");
1080 return 0;
1081 }
1082
1083 r = sd_netlink_message_read_u32(message, FRA_FWMASK, &tmp->fwmask);
1084 if (r < 0 && r != -ENODATA) {
1085 log_warning_errno(r, "rtnl: could not get FRA_FWMASK attribute, ignoring: %m");
1086 return 0;
1087 }
1088
1089 r = sd_netlink_message_read_u32(message, FRA_PRIORITY, &tmp->priority);
1090 if (r < 0 && r != -ENODATA) {
1091 log_warning_errno(r, "rtnl: could not get FRA_PRIORITY attribute, ignoring: %m");
1092 return 0;
1093 }
1094
1095 r = sd_netlink_message_read_u32(message, FRA_TABLE, &tmp->table);
1096 if (r < 0 && r != -ENODATA) {
1097 log_warning_errno(r, "rtnl: could not get FRA_TABLE attribute, ignoring: %m");
1098 return 0;
1099 }
1100
1101 r = sd_rtnl_message_routing_policy_rule_get_tos(message, &tmp->tos);
1102 if (r < 0 && r != -ENODATA) {
1103 log_warning_errno(r, "rtnl: could not get ip rule TOS, ignoring: %m");
1104 return 0;
1105 }
1106
1107 r = sd_netlink_message_read_string(message, FRA_IIFNAME, &iif);
1108 if (r < 0 && r != -ENODATA) {
1109 log_warning_errno(r, "rtnl: could not get FRA_IIFNAME attribute, ignoring: %m");
1110 return 0;
1111 }
1112 r = free_and_strdup(&tmp->iif, iif);
1113 if (r < 0)
1114 return log_oom();
1115
1116 r = sd_netlink_message_read_string(message, FRA_OIFNAME, &oif);
1117 if (r < 0 && r != -ENODATA) {
1118 log_warning_errno(r, "rtnl: could not get FRA_OIFNAME attribute, ignoring: %m");
1119 return 0;
1120 }
1121 r = free_and_strdup(&tmp->oif, oif);
1122 if (r < 0)
1123 return log_oom();
1124
1125 r = sd_netlink_message_read_u8(message, FRA_IP_PROTO, &tmp->protocol);
1126 if (r < 0 && r != -ENODATA) {
1127 log_warning_errno(r, "rtnl: could not get FRA_IP_PROTO attribute, ignoring: %m");
1128 return 0;
1129 }
1130
1131 r = sd_netlink_message_read(message, FRA_SPORT_RANGE, sizeof(tmp->sport), &tmp->sport);
1132 if (r < 0 && r != -ENODATA) {
1133 log_warning_errno(r, "rtnl: could not get FRA_SPORT_RANGE attribute, ignoring: %m");
1134 return 0;
1135 }
1136
1137 r = sd_netlink_message_read(message, FRA_DPORT_RANGE, sizeof(tmp->dport), &tmp->dport);
1138 if (r < 0 && r != -ENODATA) {
1139 log_warning_errno(r, "rtnl: could not get FRA_DPORT_RANGE attribute, ignoring: %m");
1140 return 0;
1141 }
1142
1143 r = sd_netlink_message_read(message, FRA_UID_RANGE, sizeof(tmp->uid_range), &tmp->uid_range);
1144 if (r < 0 && r != -ENODATA) {
1145 log_warning_errno(r, "rtnl: could not get FRA_UID_RANGE attribute, ignoring: %m");
1146 return 0;
1147 }
1148
1149 r = sd_netlink_message_read_u32(message, FRA_SUPPRESS_PREFIXLEN, &suppress_prefixlen);
1150 if (r < 0 && r != -ENODATA) {
1151 log_warning_errno(r, "rtnl: could not get FRA_SUPPRESS_PREFIXLEN attribute, ignoring: %m");
1152 return 0;
1153 }
1154 if (r >= 0)
1155 tmp->suppress_prefixlen = (int) suppress_prefixlen;
1156
1157 (void) routing_policy_rule_get(m, tmp, &rule);
1158
1159 if (DEBUG_LOGGING) {
1160 (void) in_addr_to_string(tmp->family, &tmp->from, &from);
1161 (void) in_addr_to_string(tmp->family, &tmp->to, &to);
1162 }
1163
1164 switch (type) {
1165 case RTM_NEWRULE:
1166 if (!rule) {
1167 log_debug("Remembering foreign routing policy rule: %s/%u -> %s/%u, iif: %s, oif: %s, table: %u",
1168 from, tmp->from_prefixlen, to, tmp->to_prefixlen, strna(tmp->iif), strna(tmp->oif), tmp->table);
1169 r = routing_policy_rule_add_foreign(m, tmp, &rule);
1170 if (r < 0) {
1171 log_warning_errno(r, "Could not remember foreign rule, ignoring: %m");
1172 return 0;
1173 }
1174 }
1175 break;
1176 case RTM_DELRULE:
1177 log_debug("Forgetting routing policy rule: %s/%u -> %s/%u, iif: %s, oif: %s, table: %u",
1178 from, tmp->from_prefixlen, to, tmp->to_prefixlen, strna(tmp->iif), strna(tmp->oif), tmp->table);
1179 routing_policy_rule_free(rule);
1180
1181 break;
1182
1183 default:
1184 assert_not_reached("Received invalid RTNL message type");
1185 }
1186
1187 return 1;
1188 }
1189
1190 int manager_rtnl_process_nexthop(sd_netlink *rtnl, sd_netlink_message *message, void *userdata) {
1191 _cleanup_(nexthop_freep) NextHop *tmp = NULL;
1192 _cleanup_free_ char *gateway = NULL;
1193 NextHop *nexthop = NULL;
1194 Manager *m = userdata;
1195 Link *link = NULL;
1196 uint16_t type;
1197 int r;
1198
1199 assert(rtnl);
1200 assert(message);
1201 assert(m);
1202
1203 if (sd_netlink_message_is_error(message)) {
1204 r = sd_netlink_message_get_errno(message);
1205 if (r < 0)
1206 log_message_warning_errno(message, r, "rtnl: failed to receive rule message, ignoring");
1207
1208 return 0;
1209 }
1210
1211 r = sd_netlink_message_get_type(message, &type);
1212 if (r < 0) {
1213 log_warning_errno(r, "rtnl: could not get message type, ignoring: %m");
1214 return 0;
1215 } else if (!IN_SET(type, RTM_NEWNEXTHOP, RTM_DELNEXTHOP)) {
1216 log_warning("rtnl: received unexpected message type %u when processing nexthop, ignoring.", type);
1217 return 0;
1218 }
1219
1220 r = nexthop_new(&tmp);
1221 if (r < 0)
1222 return log_oom();
1223
1224 r = sd_rtnl_message_get_family(message, &tmp->family);
1225 if (r < 0) {
1226 log_warning_errno(r, "rtnl: could not get nexthop family, ignoring: %m");
1227 return 0;
1228 } else if (!IN_SET(tmp->family, AF_INET, AF_INET6)) {
1229 log_debug("rtnl: received nexthop message with invalid family %d, ignoring.", tmp->family);
1230 return 0;
1231 }
1232
1233 switch (tmp->family) {
1234 case AF_INET:
1235 r = sd_netlink_message_read_in_addr(message, NHA_GATEWAY, &tmp->gw.in);
1236 if (r < 0 && r != -ENODATA) {
1237 log_warning_errno(r, "rtnl: could not get NHA_GATEWAY attribute, ignoring: %m");
1238 return 0;
1239 }
1240 break;
1241
1242 case AF_INET6:
1243 r = sd_netlink_message_read_in6_addr(message, NHA_GATEWAY, &tmp->gw.in6);
1244 if (r < 0 && r != -ENODATA) {
1245 log_warning_errno(r, "rtnl: could not get NHA_GATEWAY attribute, ignoring: %m");
1246 return 0;
1247 }
1248 break;
1249
1250 default:
1251 assert_not_reached("Received rule message with unsupported address family");
1252 }
1253
1254 r = sd_netlink_message_read_u32(message, NHA_ID, &tmp->id);
1255 if (r < 0 && r != -ENODATA) {
1256 log_warning_errno(r, "rtnl: could not get NHA_ID attribute, ignoring: %m");
1257 return 0;
1258 }
1259
1260 r = sd_netlink_message_read_u32(message, NHA_OIF, &tmp->oif);
1261 if (r < 0 && r != -ENODATA) {
1262 log_warning_errno(r, "rtnl: could not get NHA_OIF attribute, ignoring: %m");
1263 return 0;
1264 }
1265
1266 r = link_get(m, tmp->oif, &link);
1267 if (r < 0 || !link) {
1268 if (!m->enumerating)
1269 log_warning("rtnl: received nexthop message for link (%d) we do not know about, ignoring", tmp->oif);
1270 return 0;
1271 }
1272
1273 (void) nexthop_get(link, tmp, &nexthop);
1274
1275 if (DEBUG_LOGGING)
1276 (void) in_addr_to_string(tmp->family, &tmp->gw, &gateway);
1277
1278 switch (type) {
1279 case RTM_NEWNEXTHOP:
1280 if (!nexthop) {
1281 log_debug("Remembering foreign nexthop: %s, oif: %d, id: %d", gateway, tmp->oif, tmp->id);
1282 r = nexthop_add_foreign(link, tmp, &nexthop);
1283 if (r < 0) {
1284 log_warning_errno(r, "Could not remember foreign nexthop, ignoring: %m");
1285 return 0;
1286 }
1287 }
1288 break;
1289 case RTM_DELNEXTHOP:
1290 log_debug("Forgetting foreign nexthop: %s, oif: %d, id: %d", gateway, tmp->oif, tmp->id);
1291 nexthop_free(nexthop);
1292
1293 break;
1294
1295 default:
1296 assert_not_reached("Received invalid RTNL message type");
1297 }
1298
1299 return 1;
1300 }
1301
1302 static int systemd_netlink_fd(void) {
1303 int n, fd, rtnl_fd = -EINVAL;
1304
1305 n = sd_listen_fds(true);
1306 if (n <= 0)
1307 return -EINVAL;
1308
1309 for (fd = SD_LISTEN_FDS_START; fd < SD_LISTEN_FDS_START + n; fd ++) {
1310 if (sd_is_socket(fd, AF_NETLINK, SOCK_RAW, -1) > 0) {
1311 if (rtnl_fd >= 0)
1312 return -EINVAL;
1313
1314 rtnl_fd = fd;
1315 }
1316 }
1317
1318 return rtnl_fd;
1319 }
1320
1321 static int manager_connect_genl(Manager *m) {
1322 int r;
1323
1324 assert(m);
1325
1326 r = sd_genl_socket_open(&m->genl);
1327 if (r < 0)
1328 return r;
1329
1330 r = sd_netlink_inc_rcvbuf(m->genl, RCVBUF_SIZE);
1331 if (r < 0)
1332 return r;
1333
1334 r = sd_netlink_attach_event(m->genl, m->event, 0);
1335 if (r < 0)
1336 return r;
1337
1338 return 0;
1339 }
1340
1341 static int manager_connect_rtnl(Manager *m) {
1342 int fd, r;
1343
1344 assert(m);
1345
1346 fd = systemd_netlink_fd();
1347 if (fd < 0)
1348 r = sd_netlink_open(&m->rtnl);
1349 else
1350 r = sd_netlink_open_fd(&m->rtnl, fd);
1351 if (r < 0)
1352 return r;
1353
1354 r = sd_netlink_inc_rcvbuf(m->rtnl, RCVBUF_SIZE);
1355 if (r < 0)
1356 return r;
1357
1358 r = sd_netlink_attach_event(m->rtnl, m->event, 0);
1359 if (r < 0)
1360 return r;
1361
1362 r = sd_netlink_add_match(m->rtnl, NULL, RTM_NEWLINK, &manager_rtnl_process_link, NULL, m, "network-rtnl_process_link");
1363 if (r < 0)
1364 return r;
1365
1366 r = sd_netlink_add_match(m->rtnl, NULL, RTM_DELLINK, &manager_rtnl_process_link, NULL, m, "network-rtnl_process_link");
1367 if (r < 0)
1368 return r;
1369
1370 r = sd_netlink_add_match(m->rtnl, NULL, RTM_NEWADDR, &manager_rtnl_process_address, NULL, m, "network-rtnl_process_address");
1371 if (r < 0)
1372 return r;
1373
1374 r = sd_netlink_add_match(m->rtnl, NULL, RTM_DELADDR, &manager_rtnl_process_address, NULL, m, "network-rtnl_process_address");
1375 if (r < 0)
1376 return r;
1377
1378 r = sd_netlink_add_match(m->rtnl, NULL, RTM_NEWNEIGH, &manager_rtnl_process_neighbor, NULL, m, "network-rtnl_process_neighbor");
1379 if (r < 0)
1380 return r;
1381
1382 r = sd_netlink_add_match(m->rtnl, NULL, RTM_DELNEIGH, &manager_rtnl_process_neighbor, NULL, m, "network-rtnl_process_neighbor");
1383 if (r < 0)
1384 return r;
1385
1386 r = sd_netlink_add_match(m->rtnl, NULL, RTM_NEWROUTE, &manager_rtnl_process_route, NULL, m, "network-rtnl_process_route");
1387 if (r < 0)
1388 return r;
1389
1390 r = sd_netlink_add_match(m->rtnl, NULL, RTM_DELROUTE, &manager_rtnl_process_route, NULL, m, "network-rtnl_process_route");
1391 if (r < 0)
1392 return r;
1393
1394 r = sd_netlink_add_match(m->rtnl, NULL, RTM_NEWRULE, &manager_rtnl_process_rule, NULL, m, "network-rtnl_process_rule");
1395 if (r < 0)
1396 return r;
1397
1398 r = sd_netlink_add_match(m->rtnl, NULL, RTM_DELRULE, &manager_rtnl_process_rule, NULL, m, "network-rtnl_process_rule");
1399 if (r < 0)
1400 return r;
1401
1402 r = sd_netlink_add_match(m->rtnl, NULL, RTM_NEWNEXTHOP, &manager_rtnl_process_nexthop, NULL, m, "network-rtnl_process_nexthop");
1403 if (r < 0)
1404 return r;
1405
1406 r = sd_netlink_add_match(m->rtnl, NULL, RTM_DELNEXTHOP, &manager_rtnl_process_nexthop, NULL, m, "network-rtnl_process_nexthop");
1407 if (r < 0)
1408 return r;
1409
1410 return 0;
1411 }
1412
1413 static int ordered_set_put_in_addr_data(OrderedSet *s, const struct in_addr_data *address) {
1414 char *p;
1415 int r;
1416
1417 assert(s);
1418 assert(address);
1419
1420 r = in_addr_to_string(address->family, &address->address, &p);
1421 if (r < 0)
1422 return r;
1423
1424 r = ordered_set_consume(s, p);
1425 if (r == -EEXIST)
1426 return 0;
1427
1428 return r;
1429 }
1430
1431 static int ordered_set_put_in_addr_datav(OrderedSet *s, const struct in_addr_data *addresses, unsigned n) {
1432 int r, c = 0;
1433 unsigned i;
1434
1435 assert(s);
1436 assert(addresses || n == 0);
1437
1438 for (i = 0; i < n; i++) {
1439 r = ordered_set_put_in_addr_data(s, addresses+i);
1440 if (r < 0)
1441 return r;
1442
1443 c += r;
1444 }
1445
1446 return c;
1447 }
1448
1449 static int ordered_set_put_in4_addr(OrderedSet *s, const struct in_addr *address) {
1450 char *p;
1451 int r;
1452
1453 assert(s);
1454 assert(address);
1455
1456 r = in_addr_to_string(AF_INET, (const union in_addr_union*) address, &p);
1457 if (r < 0)
1458 return r;
1459
1460 r = ordered_set_consume(s, p);
1461 if (r == -EEXIST)
1462 return 0;
1463
1464 return r;
1465 }
1466
1467 static int ordered_set_put_in4_addrv(OrderedSet *s,
1468 const struct in_addr *addresses,
1469 size_t n,
1470 bool (*predicate)(const struct in_addr *addr)) {
1471 int r, c = 0;
1472 size_t i;
1473
1474 assert(s);
1475 assert(n == 0 || addresses);
1476
1477 for (i = 0; i < n; i++) {
1478 if (predicate && !predicate(&addresses[i]))
1479 continue;
1480 r = ordered_set_put_in4_addr(s, addresses+i);
1481 if (r < 0)
1482 return r;
1483
1484 c += r;
1485 }
1486
1487 return c;
1488 }
1489
1490 static int manager_save(Manager *m) {
1491 _cleanup_ordered_set_free_free_ OrderedSet *dns = NULL, *ntp = NULL, *sip = NULL, *pop3 = NULL,
1492 *search_domains = NULL, *route_domains = NULL;
1493 const char *operstate_str, *carrier_state_str, *address_state_str;
1494 LinkOperationalState operstate = LINK_OPERSTATE_OFF;
1495 LinkCarrierState carrier_state = LINK_CARRIER_STATE_OFF;
1496 LinkAddressState address_state = LINK_ADDRESS_STATE_OFF;
1497 _cleanup_free_ char *temp_path = NULL;
1498 _cleanup_strv_free_ char **p = NULL;
1499 _cleanup_fclose_ FILE *f = NULL;
1500 const struct in_addr *addresses;
1501 Link *link;
1502 Iterator i;
1503 int r;
1504
1505 assert(m);
1506 assert(m->state_file);
1507
1508 /* We add all NTP and DNS server to a set, to filter out duplicates */
1509 dns = ordered_set_new(&string_hash_ops);
1510 if (!dns)
1511 return -ENOMEM;
1512
1513 ntp = ordered_set_new(&string_hash_ops);
1514 if (!ntp)
1515 return -ENOMEM;
1516
1517 sip = ordered_set_new(&string_hash_ops);
1518 if (!sip)
1519 return -ENOMEM;
1520
1521 pop3 = ordered_set_new(&string_hash_ops);
1522 if (!pop3)
1523 return -ENOMEM;
1524
1525 search_domains = ordered_set_new(&dns_name_hash_ops);
1526 if (!search_domains)
1527 return -ENOMEM;
1528
1529 route_domains = ordered_set_new(&dns_name_hash_ops);
1530 if (!route_domains)
1531 return -ENOMEM;
1532
1533 HASHMAP_FOREACH(link, m->links, i) {
1534 if (link->flags & IFF_LOOPBACK)
1535 continue;
1536
1537 if (link->operstate > operstate)
1538 operstate = link->operstate;
1539
1540 if (link->carrier_state > carrier_state)
1541 carrier_state = link->carrier_state;
1542
1543 if (link->address_state > address_state)
1544 address_state = link->address_state;
1545
1546 if (!link->network)
1547 continue;
1548
1549 /* First add the static configured entries */
1550 r = ordered_set_put_in_addr_datav(dns, link->network->dns, link->network->n_dns);
1551 if (r < 0)
1552 return r;
1553
1554 r = ordered_set_put_strdupv(ntp, link->ntp ?: link->network->ntp);
1555 if (r < 0)
1556 return r;
1557
1558 r = ordered_set_put_string_set(search_domains, link->search_domains ?: link->network->search_domains);
1559 if (r < 0)
1560 return r;
1561
1562 r = ordered_set_put_string_set(route_domains, link->route_domains ?: link->network->route_domains);
1563 if (r < 0)
1564 return r;
1565
1566 if (!link->dhcp_lease)
1567 continue;
1568
1569 /* Secondly, add the entries acquired via DHCP */
1570 if (link->network->dhcp_use_dns) {
1571 r = sd_dhcp_lease_get_dns(link->dhcp_lease, &addresses);
1572 if (r > 0) {
1573 r = ordered_set_put_in4_addrv(dns, addresses, r, in4_addr_is_non_local);
1574 if (r < 0)
1575 return r;
1576 } else if (r < 0 && r != -ENODATA)
1577 return r;
1578 }
1579
1580 if (link->network->dhcp_use_ntp) {
1581 r = sd_dhcp_lease_get_ntp(link->dhcp_lease, &addresses);
1582 if (r > 0) {
1583 r = ordered_set_put_in4_addrv(ntp, addresses, r, in4_addr_is_non_local);
1584 if (r < 0)
1585 return r;
1586 } else if (r < 0 && r != -ENODATA)
1587 return r;
1588 }
1589
1590 if (link->network->dhcp_use_sip) {
1591 r = sd_dhcp_lease_get_sip(link->dhcp_lease, &addresses);
1592 if (r > 0) {
1593 r = ordered_set_put_in4_addrv(sip, addresses, r, in4_addr_is_non_local);
1594 if (r < 0)
1595 return r;
1596 } else if (r < 0 && r != -ENODATA)
1597 return r;
1598 }
1599
1600
1601 r = sd_dhcp_lease_get_pop3_server(link->dhcp_lease, &addresses);
1602 if (r > 0) {
1603 r = ordered_set_put_in4_addrv(pop3, addresses, r, in4_addr_is_non_local);
1604 if (r < 0)
1605 return r;
1606 } else if (r < 0 && r != -ENODATA)
1607 return r;
1608
1609 if (link->network->dhcp_use_domains != DHCP_USE_DOMAINS_NO) {
1610 const char *domainname;
1611 char **domains = NULL;
1612
1613 OrderedSet *target_domains = (link->network->dhcp_use_domains == DHCP_USE_DOMAINS_YES) ? search_domains : route_domains;
1614 r = sd_dhcp_lease_get_domainname(link->dhcp_lease, &domainname);
1615 if (r >= 0) {
1616 r = ordered_set_put_strdup(target_domains, domainname);
1617 if (r < 0)
1618 return r;
1619 } else if (r != -ENODATA)
1620 return r;
1621
1622 r = sd_dhcp_lease_get_search_domains(link->dhcp_lease, &domains);
1623 if (r >= 0) {
1624 r = ordered_set_put_strdupv(target_domains, domains);
1625 if (r < 0)
1626 return r;
1627 } else if (r != -ENODATA)
1628 return r;
1629 }
1630 }
1631
1632 if (carrier_state >= LINK_CARRIER_STATE_ENSLAVED)
1633 carrier_state = LINK_CARRIER_STATE_CARRIER;
1634
1635 operstate_str = link_operstate_to_string(operstate);
1636 assert(operstate_str);
1637
1638 carrier_state_str = link_carrier_state_to_string(carrier_state);
1639 assert(carrier_state_str);
1640
1641 address_state_str = link_address_state_to_string(address_state);
1642 assert(address_state_str);
1643
1644 r = fopen_temporary(m->state_file, &f, &temp_path);
1645 if (r < 0)
1646 return r;
1647
1648 (void) fchmod(fileno(f), 0644);
1649
1650 fprintf(f,
1651 "# This is private data. Do not parse.\n"
1652 "OPER_STATE=%s\n"
1653 "CARRIER_STATE=%s\n"
1654 "ADDRESS_STATE=%s\n",
1655 operstate_str, carrier_state_str, address_state_str);
1656
1657 ordered_set_print(f, "DNS=", dns);
1658 ordered_set_print(f, "NTP=", ntp);
1659 ordered_set_print(f, "SIP=", sip);
1660 ordered_set_print(f, "POP3_SERVERS=", pop3);
1661 ordered_set_print(f, "DOMAINS=", search_domains);
1662 ordered_set_print(f, "ROUTE_DOMAINS=", route_domains);
1663
1664 r = routing_policy_serialize_rules(m->rules, f);
1665 if (r < 0)
1666 goto fail;
1667
1668 r = fflush_and_check(f);
1669 if (r < 0)
1670 goto fail;
1671
1672 if (rename(temp_path, m->state_file) < 0) {
1673 r = -errno;
1674 goto fail;
1675 }
1676
1677 if (m->operational_state != operstate) {
1678 m->operational_state = operstate;
1679 if (strv_extend(&p, "OperationalState") < 0)
1680 log_oom();
1681 }
1682
1683 if (m->carrier_state != carrier_state) {
1684 m->carrier_state = carrier_state;
1685 if (strv_extend(&p, "CarrierState") < 0)
1686 log_oom();
1687 }
1688
1689 if (m->address_state != address_state) {
1690 m->address_state = address_state;
1691 if (strv_extend(&p, "AddressState") < 0)
1692 log_oom();
1693 }
1694
1695 if (p) {
1696 r = manager_send_changed_strv(m, p);
1697 if (r < 0)
1698 log_error_errno(r, "Could not emit changed properties: %m");
1699 }
1700
1701 m->dirty = false;
1702
1703 return 0;
1704
1705 fail:
1706 (void) unlink(m->state_file);
1707 (void) unlink(temp_path);
1708
1709 return log_error_errno(r, "Failed to save network state to %s: %m", m->state_file);
1710 }
1711
1712 static int manager_dirty_handler(sd_event_source *s, void *userdata) {
1713 Manager *m = userdata;
1714 Link *link;
1715 Iterator i;
1716
1717 assert(m);
1718
1719 if (m->dirty)
1720 manager_save(m);
1721
1722 SET_FOREACH(link, m->dirty_links, i)
1723 if (link_save(link) >= 0)
1724 link_clean(link);
1725
1726 return 1;
1727 }
1728
1729 static int signal_terminate_callback(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
1730 Manager *m = userdata;
1731
1732 assert(m);
1733 m->restarting = false;
1734
1735 log_debug("Terminate operation initiated.");
1736
1737 return sd_event_exit(sd_event_source_get_event(s), 0);
1738 }
1739
1740 static int signal_restart_callback(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
1741 Manager *m = userdata;
1742
1743 assert(m);
1744 m->restarting = true;
1745
1746 log_debug("Restart operation initiated.");
1747
1748 return sd_event_exit(sd_event_source_get_event(s), 0);
1749 }
1750
1751 int manager_new(Manager **ret) {
1752 _cleanup_(manager_freep) Manager *m = NULL;
1753 int r;
1754
1755 m = new(Manager, 1);
1756 if (!m)
1757 return -ENOMEM;
1758
1759 *m = (Manager) {
1760 .speed_meter_interval_usec = SPEED_METER_DEFAULT_TIME_INTERVAL,
1761 .manage_foreign_routes = true,
1762 };
1763
1764 m->state_file = strdup("/run/systemd/netif/state");
1765 if (!m->state_file)
1766 return -ENOMEM;
1767
1768 r = sd_event_default(&m->event);
1769 if (r < 0)
1770 return r;
1771
1772 assert_se(sigprocmask_many(SIG_SETMASK, NULL, SIGINT, SIGTERM, SIGUSR2, -1) >= 0);
1773
1774 (void) sd_event_set_watchdog(m->event, true);
1775 (void) sd_event_add_signal(m->event, NULL, SIGTERM, signal_terminate_callback, m);
1776 (void) sd_event_add_signal(m->event, NULL, SIGINT, signal_terminate_callback, m);
1777 (void) sd_event_add_signal(m->event, NULL, SIGUSR2, signal_restart_callback, m);
1778
1779 r = sd_event_add_post(m->event, NULL, manager_dirty_handler, m);
1780 if (r < 0)
1781 return r;
1782
1783 r = manager_connect_rtnl(m);
1784 if (r < 0)
1785 return r;
1786
1787 r = manager_connect_genl(m);
1788 if (r < 0)
1789 return r;
1790
1791 r = manager_connect_udev(m);
1792 if (r < 0)
1793 return r;
1794
1795 r = sd_resolve_default(&m->resolve);
1796 if (r < 0)
1797 return r;
1798
1799 r = sd_resolve_attach_event(m->resolve, m->event, 0);
1800 if (r < 0)
1801 return r;
1802
1803 r = setup_default_address_pool(m);
1804 if (r < 0)
1805 return r;
1806
1807 m->duid.type = DUID_TYPE_EN;
1808
1809 (void) routing_policy_load_rules(m->state_file, &m->rules_saved);
1810
1811 *ret = TAKE_PTR(m);
1812
1813 return 0;
1814 }
1815
1816 void manager_free(Manager *m) {
1817 struct in6_addr *a;
1818 AddressPool *pool;
1819 Link *link;
1820
1821 if (!m)
1822 return;
1823
1824 free(m->state_file);
1825
1826 while ((a = hashmap_first_key(m->dhcp6_prefixes)))
1827 (void) dhcp6_prefix_remove(m, a);
1828 m->dhcp6_prefixes = hashmap_free(m->dhcp6_prefixes);
1829
1830 while ((link = hashmap_steal_first(m->links))) {
1831 if (link->dhcp6_client)
1832 (void) dhcp6_lease_pd_prefix_lost(link->dhcp6_client, link);
1833
1834 (void) link_stop_clients(link, true);
1835
1836 link_unref(link);
1837 }
1838
1839 m->dirty_links = set_free_with_destructor(m->dirty_links, link_unref);
1840 m->links_requesting_uuid = set_free_with_destructor(m->links_requesting_uuid, link_unref);
1841 m->links = hashmap_free_with_destructor(m->links, link_unref);
1842
1843 m->duids_requesting_uuid = set_free(m->duids_requesting_uuid);
1844 m->networks = ordered_hashmap_free_with_destructor(m->networks, network_unref);
1845
1846 m->netdevs = hashmap_free_with_destructor(m->netdevs, netdev_unref);
1847
1848 while ((pool = m->address_pools))
1849 address_pool_free(pool);
1850
1851 /* routing_policy_rule_free() access m->rules and m->rules_foreign.
1852 * So, it is necessary to set NULL after the sets are freed. */
1853 m->rules = set_free_with_destructor(m->rules, routing_policy_rule_free);
1854 m->rules_foreign = set_free_with_destructor(m->rules_foreign, routing_policy_rule_free);
1855 set_free_with_destructor(m->rules_saved, routing_policy_rule_free);
1856
1857 sd_netlink_unref(m->rtnl);
1858 sd_netlink_unref(m->genl);
1859 sd_resolve_unref(m->resolve);
1860
1861 sd_event_source_unref(m->speed_meter_event_source);
1862 sd_event_unref(m->event);
1863
1864 sd_device_monitor_unref(m->device_monitor);
1865
1866 bus_verify_polkit_async_registry_free(m->polkit_registry);
1867 sd_bus_flush_close_unref(m->bus);
1868
1869 free(m->dynamic_timezone);
1870 free(m->dynamic_hostname);
1871
1872 free(m);
1873 }
1874
1875 int manager_start(Manager *m) {
1876 Link *link;
1877 Iterator i;
1878 int r;
1879
1880 assert(m);
1881
1882 r = manager_start_speed_meter(m);
1883 if (r < 0)
1884 return log_error_errno(r, "Failed to initialize speed meter: %m");
1885
1886 /* The dirty handler will deal with future serialization, but the first one
1887 must be done explicitly. */
1888
1889 manager_save(m);
1890
1891 HASHMAP_FOREACH(link, m->links, i)
1892 link_save(link);
1893
1894 return 0;
1895 }
1896
1897 int manager_load_config(Manager *m) {
1898 int r;
1899
1900 /* update timestamp */
1901 paths_check_timestamp(NETWORK_DIRS, &m->network_dirs_ts_usec, true);
1902
1903 r = netdev_load(m, false);
1904 if (r < 0)
1905 return r;
1906
1907 r = network_load(m, &m->networks);
1908 if (r < 0)
1909 return r;
1910
1911 return 0;
1912 }
1913
1914 bool manager_should_reload(Manager *m) {
1915 return paths_check_timestamp(NETWORK_DIRS, &m->network_dirs_ts_usec, false);
1916 }
1917
1918 int manager_rtnl_enumerate_links(Manager *m) {
1919 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
1920 sd_netlink_message *link;
1921 int r;
1922
1923 assert(m);
1924 assert(m->rtnl);
1925
1926 r = sd_rtnl_message_new_link(m->rtnl, &req, RTM_GETLINK, 0);
1927 if (r < 0)
1928 return r;
1929
1930 r = sd_netlink_message_request_dump(req, true);
1931 if (r < 0)
1932 return r;
1933
1934 r = sd_netlink_call(m->rtnl, req, 0, &reply);
1935 if (r < 0)
1936 return r;
1937
1938 for (link = reply; link; link = sd_netlink_message_next(link)) {
1939 int k;
1940
1941 m->enumerating = true;
1942
1943 k = manager_rtnl_process_link(m->rtnl, link, m);
1944 if (k < 0)
1945 r = k;
1946
1947 m->enumerating = false;
1948 }
1949
1950 return r;
1951 }
1952
1953 int manager_rtnl_enumerate_addresses(Manager *m) {
1954 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
1955 sd_netlink_message *addr;
1956 int r;
1957
1958 assert(m);
1959 assert(m->rtnl);
1960
1961 r = sd_rtnl_message_new_addr(m->rtnl, &req, RTM_GETADDR, 0, 0);
1962 if (r < 0)
1963 return r;
1964
1965 r = sd_netlink_message_request_dump(req, true);
1966 if (r < 0)
1967 return r;
1968
1969 r = sd_netlink_call(m->rtnl, req, 0, &reply);
1970 if (r < 0)
1971 return r;
1972
1973 for (addr = reply; addr; addr = sd_netlink_message_next(addr)) {
1974 int k;
1975
1976 m->enumerating = true;
1977
1978 k = manager_rtnl_process_address(m->rtnl, addr, m);
1979 if (k < 0)
1980 r = k;
1981
1982 m->enumerating = false;
1983 }
1984
1985 return r;
1986 }
1987
1988 int manager_rtnl_enumerate_neighbors(Manager *m) {
1989 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
1990 sd_netlink_message *neigh;
1991 int r;
1992
1993 assert(m);
1994 assert(m->rtnl);
1995
1996 r = sd_rtnl_message_new_neigh(m->rtnl, &req, RTM_GETNEIGH, 0, AF_UNSPEC);
1997 if (r < 0)
1998 return r;
1999
2000 r = sd_netlink_message_request_dump(req, true);
2001 if (r < 0)
2002 return r;
2003
2004 r = sd_netlink_call(m->rtnl, req, 0, &reply);
2005 if (r < 0)
2006 return r;
2007
2008 for (neigh = reply; neigh; neigh = sd_netlink_message_next(neigh)) {
2009 int k;
2010
2011 m->enumerating = true;
2012
2013 k = manager_rtnl_process_neighbor(m->rtnl, neigh, m);
2014 if (k < 0)
2015 r = k;
2016
2017 m->enumerating = false;
2018 }
2019
2020 return r;
2021 }
2022
2023 int manager_rtnl_enumerate_routes(Manager *m) {
2024 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
2025 sd_netlink_message *route;
2026 int r;
2027
2028 assert(m);
2029 assert(m->rtnl);
2030
2031 r = sd_rtnl_message_new_route(m->rtnl, &req, RTM_GETROUTE, 0, 0);
2032 if (r < 0)
2033 return r;
2034
2035 r = sd_netlink_message_request_dump(req, true);
2036 if (r < 0)
2037 return r;
2038
2039 r = sd_netlink_call(m->rtnl, req, 0, &reply);
2040 if (r < 0)
2041 return r;
2042
2043 for (route = reply; route; route = sd_netlink_message_next(route)) {
2044 int k;
2045
2046 m->enumerating = true;
2047
2048 k = manager_rtnl_process_route(m->rtnl, route, m);
2049 if (k < 0)
2050 r = k;
2051
2052 m->enumerating = false;
2053 }
2054
2055 return r;
2056 }
2057
2058 int manager_rtnl_enumerate_rules(Manager *m) {
2059 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
2060 sd_netlink_message *rule;
2061 int r;
2062
2063 assert(m);
2064 assert(m->rtnl);
2065
2066 r = sd_rtnl_message_new_routing_policy_rule(m->rtnl, &req, RTM_GETRULE, 0);
2067 if (r < 0)
2068 return r;
2069
2070 r = sd_netlink_message_request_dump(req, true);
2071 if (r < 0)
2072 return r;
2073
2074 r = sd_netlink_call(m->rtnl, req, 0, &reply);
2075 if (r < 0) {
2076 if (r == -EOPNOTSUPP) {
2077 log_debug("FIB Rules are not supported by the kernel. Ignoring.");
2078 return 0;
2079 }
2080
2081 return r;
2082 }
2083
2084 for (rule = reply; rule; rule = sd_netlink_message_next(rule)) {
2085 int k;
2086
2087 m->enumerating = true;
2088
2089 k = manager_rtnl_process_rule(m->rtnl, rule, m);
2090 if (k < 0)
2091 r = k;
2092
2093 m->enumerating = false;
2094 }
2095
2096 return r;
2097 }
2098
2099 int manager_rtnl_enumerate_nexthop(Manager *m) {
2100 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
2101 sd_netlink_message *nexthop;
2102 int r;
2103
2104 assert(m);
2105 assert(m->rtnl);
2106
2107 r = sd_rtnl_message_new_nexthop(m->rtnl, &req, RTM_GETNEXTHOP, 0, 0);
2108 if (r < 0)
2109 return r;
2110
2111 r = sd_netlink_message_request_dump(req, true);
2112 if (r < 0)
2113 return r;
2114
2115 r = sd_netlink_call(m->rtnl, req, 0, &reply);
2116 if (r < 0) {
2117 if (r == -EOPNOTSUPP) {
2118 log_debug("Nexthop are not supported by the kernel. Ignoring.");
2119 return 0;
2120 }
2121
2122 return r;
2123 }
2124
2125 for (nexthop = reply; nexthop; nexthop = sd_netlink_message_next(nexthop)) {
2126 int k;
2127
2128 m->enumerating = true;
2129
2130 k = manager_rtnl_process_nexthop(m->rtnl, nexthop, m);
2131 if (k < 0)
2132 r = k;
2133
2134 m->enumerating = false;
2135 }
2136
2137 return r;
2138 }
2139
2140 int manager_address_pool_acquire(Manager *m, int family, unsigned prefixlen, union in_addr_union *found) {
2141 AddressPool *p;
2142 int r;
2143
2144 assert(m);
2145 assert(prefixlen > 0);
2146 assert(found);
2147
2148 LIST_FOREACH(address_pools, p, m->address_pools) {
2149 if (p->family != family)
2150 continue;
2151
2152 r = address_pool_acquire(p, prefixlen, found);
2153 if (r != 0)
2154 return r;
2155 }
2156
2157 return 0;
2158 }
2159
2160 Link* manager_find_uplink(Manager *m, Link *exclude) {
2161 _cleanup_free_ struct local_address *gateways = NULL;
2162 int n, i;
2163
2164 assert(m);
2165
2166 /* Looks for a suitable "uplink", via black magic: an
2167 * interface that is up and where the default route with the
2168 * highest priority points to. */
2169
2170 n = local_gateways(m->rtnl, 0, AF_UNSPEC, &gateways);
2171 if (n < 0) {
2172 log_warning_errno(n, "Failed to determine list of default gateways: %m");
2173 return NULL;
2174 }
2175
2176 for (i = 0; i < n; i++) {
2177 Link *link;
2178
2179 link = hashmap_get(m->links, INT_TO_PTR(gateways[i].ifindex));
2180 if (!link) {
2181 log_debug("Weird, found a gateway for a link we don't know. Ignoring.");
2182 continue;
2183 }
2184
2185 if (link == exclude)
2186 continue;
2187
2188 if (link->operstate < LINK_OPERSTATE_ROUTABLE)
2189 continue;
2190
2191 return link;
2192 }
2193
2194 return NULL;
2195 }
2196
2197 void manager_dirty(Manager *manager) {
2198 assert(manager);
2199
2200 /* the serialized state in /run is no longer up-to-date */
2201 manager->dirty = true;
2202 }
2203
2204 static int set_hostname_handler(sd_bus_message *m, void *userdata, sd_bus_error *ret_error) {
2205 Manager *manager = userdata;
2206 const sd_bus_error *e;
2207
2208 assert(m);
2209 assert(manager);
2210
2211 e = sd_bus_message_get_error(m);
2212 if (e)
2213 log_warning_errno(sd_bus_error_get_errno(e), "Could not set hostname: %s", e->message);
2214
2215 return 1;
2216 }
2217
2218 int manager_set_hostname(Manager *m, const char *hostname) {
2219 int r;
2220
2221 log_debug("Setting transient hostname: '%s'", strna(hostname));
2222
2223 if (free_and_strdup(&m->dynamic_hostname, hostname) < 0)
2224 return log_oom();
2225
2226 if (!m->bus || sd_bus_is_ready(m->bus) <= 0) {
2227 log_debug("Not connected to system bus, setting hostname later.");
2228 return 0;
2229 }
2230
2231 r = sd_bus_call_method_async(
2232 m->bus,
2233 NULL,
2234 "org.freedesktop.hostname1",
2235 "/org/freedesktop/hostname1",
2236 "org.freedesktop.hostname1",
2237 "SetHostname",
2238 set_hostname_handler,
2239 m,
2240 "sb",
2241 hostname,
2242 false);
2243
2244 if (r < 0)
2245 return log_error_errno(r, "Could not set transient hostname: %m");
2246
2247 return 0;
2248 }
2249
2250 static int set_timezone_handler(sd_bus_message *m, void *userdata, sd_bus_error *ret_error) {
2251 Manager *manager = userdata;
2252 const sd_bus_error *e;
2253
2254 assert(m);
2255 assert(manager);
2256
2257 e = sd_bus_message_get_error(m);
2258 if (e)
2259 log_warning_errno(sd_bus_error_get_errno(e), "Could not set timezone: %s", e->message);
2260
2261 return 1;
2262 }
2263
2264 int manager_set_timezone(Manager *m, const char *tz) {
2265 int r;
2266
2267 assert(m);
2268 assert(tz);
2269
2270 log_debug("Setting system timezone: '%s'", tz);
2271 if (free_and_strdup(&m->dynamic_timezone, tz) < 0)
2272 return log_oom();
2273
2274 if (!m->bus || sd_bus_is_ready(m->bus) <= 0) {
2275 log_debug("Not connected to system bus, setting timezone later.");
2276 return 0;
2277 }
2278
2279 r = sd_bus_call_method_async(
2280 m->bus,
2281 NULL,
2282 "org.freedesktop.timedate1",
2283 "/org/freedesktop/timedate1",
2284 "org.freedesktop.timedate1",
2285 "SetTimezone",
2286 set_timezone_handler,
2287 m,
2288 "sb",
2289 tz,
2290 false);
2291 if (r < 0)
2292 return log_error_errno(r, "Could not set timezone: %m");
2293
2294 return 0;
2295 }
2296
2297 int manager_request_product_uuid(Manager *m, Link *link) {
2298 int r;
2299
2300 assert(m);
2301
2302 if (m->has_product_uuid)
2303 return 0;
2304
2305 log_debug("Requesting product UUID");
2306
2307 if (link) {
2308 DUID *duid;
2309
2310 assert_se(duid = link_get_duid(link));
2311
2312 r = set_ensure_allocated(&m->links_requesting_uuid, NULL);
2313 if (r < 0)
2314 return log_oom();
2315
2316 r = set_ensure_allocated(&m->duids_requesting_uuid, NULL);
2317 if (r < 0)
2318 return log_oom();
2319
2320 r = set_put(m->links_requesting_uuid, link);
2321 if (r < 0)
2322 return log_oom();
2323
2324 r = set_put(m->duids_requesting_uuid, duid);
2325 if (r < 0)
2326 return log_oom();
2327
2328 link_ref(link);
2329 }
2330
2331 if (!m->bus || sd_bus_is_ready(m->bus) <= 0) {
2332 log_debug("Not connected to system bus, requesting product UUID later.");
2333 return 0;
2334 }
2335
2336 r = sd_bus_call_method_async(
2337 m->bus,
2338 NULL,
2339 "org.freedesktop.hostname1",
2340 "/org/freedesktop/hostname1",
2341 "org.freedesktop.hostname1",
2342 "GetProductUUID",
2343 get_product_uuid_handler,
2344 m,
2345 "b",
2346 false);
2347 if (r < 0)
2348 return log_warning_errno(r, "Failed to get product UUID: %m");
2349
2350 return 0;
2351 }