]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/network/networkd-manager.c
network: update log message in message_rtnl_process_xyz()
[thirdparty/systemd.git] / src / network / networkd-manager.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2
3 #include <netinet/in.h>
4 #include <sys/socket.h>
5 #include <unistd.h>
6 #include <linux/if.h>
7 #include <linux/fib_rules.h>
8 #include <linux/nexthop.h>
9
10 #include "sd-daemon.h"
11 #include "sd-netlink.h"
12
13 #include "alloc-util.h"
14 #include "bus-util.h"
15 #include "conf-parser.h"
16 #include "def.h"
17 #include "device-private.h"
18 #include "device-util.h"
19 #include "dns-domain.h"
20 #include "fd-util.h"
21 #include "fileio.h"
22 #include "local-addresses.h"
23 #include "netlink-util.h"
24 #include "network-internal.h"
25 #include "networkd-dhcp6.h"
26 #include "networkd-link-bus.h"
27 #include "networkd-manager-bus.h"
28 #include "networkd-manager.h"
29 #include "networkd-network-bus.h"
30 #include "networkd-speed-meter.h"
31 #include "ordered-set.h"
32 #include "path-util.h"
33 #include "set.h"
34 #include "signal-util.h"
35 #include "strv.h"
36 #include "sysctl-util.h"
37 #include "tmpfile-util.h"
38 #include "udev-util.h"
39 #include "virt.h"
40
41 /* use 8 MB for receive socket kernel queue. */
42 #define RCVBUF_SIZE (8*1024*1024)
43
44 static int log_message_warning_errno(sd_netlink_message *m, int err, const char *msg) {
45 const char *err_msg = NULL;
46
47 (void) sd_netlink_message_read_string(m, NLMSGERR_ATTR_MSG, &err_msg);
48 return log_warning_errno(err, "%s: %s%s%m", msg, strempty(err_msg), err_msg ? " " : "");
49 }
50
51 static int setup_default_address_pool(Manager *m) {
52 AddressPool *p;
53 int r;
54
55 assert(m);
56
57 /* Add in the well-known private address ranges. */
58
59 r = address_pool_new_from_string(m, &p, AF_INET6, "fd00::", 8);
60 if (r < 0)
61 return r;
62
63 r = address_pool_new_from_string(m, &p, AF_INET, "10.0.0.0", 8);
64 if (r < 0)
65 return r;
66
67 r = address_pool_new_from_string(m, &p, AF_INET, "172.16.0.0", 12);
68 if (r < 0)
69 return r;
70
71 r = address_pool_new_from_string(m, &p, AF_INET, "192.168.0.0", 16);
72 if (r < 0)
73 return r;
74
75 return 0;
76 }
77
78 static int manager_reset_all(Manager *m) {
79 Link *link;
80 Iterator i;
81 int r;
82
83 assert(m);
84
85 HASHMAP_FOREACH(link, m->links, i) {
86 r = link_carrier_reset(link);
87 if (r < 0)
88 log_link_warning_errno(link, r, "Could not reset carrier: %m");
89 }
90
91 return 0;
92 }
93
94 static int match_prepare_for_sleep(sd_bus_message *message, void *userdata, sd_bus_error *ret_error) {
95 Manager *m = userdata;
96 int b, r;
97
98 assert(message);
99 assert(m);
100
101 r = sd_bus_message_read(message, "b", &b);
102 if (r < 0) {
103 log_debug_errno(r, "Failed to parse PrepareForSleep signal: %m");
104 return 0;
105 }
106
107 if (b)
108 return 0;
109
110 log_debug("Coming back from suspend, resetting all connections...");
111
112 (void) manager_reset_all(m);
113
114 return 0;
115 }
116
117 static int on_connected(sd_bus_message *message, void *userdata, sd_bus_error *ret_error) {
118 Manager *m = userdata;
119
120 assert(message);
121 assert(m);
122
123 /* Did we get a timezone or transient hostname from DHCP while D-Bus wasn't up yet? */
124 if (m->dynamic_hostname)
125 (void) manager_set_hostname(m, m->dynamic_hostname);
126 if (m->dynamic_timezone)
127 (void) manager_set_timezone(m, m->dynamic_timezone);
128 if (m->links_requesting_uuid)
129 (void) manager_request_product_uuid(m, NULL);
130
131 return 0;
132 }
133
134 int manager_connect_bus(Manager *m) {
135 int r;
136
137 assert(m);
138
139 if (m->bus)
140 return 0;
141
142 r = bus_open_system_watch_bind_with_description(&m->bus, "bus-api-network");
143 if (r < 0)
144 return log_error_errno(r, "Failed to connect to bus: %m");
145
146 r = sd_bus_add_object_vtable(m->bus, NULL, "/org/freedesktop/network1", "org.freedesktop.network1.Manager", manager_vtable, m);
147 if (r < 0)
148 return log_error_errno(r, "Failed to add manager object vtable: %m");
149
150 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/network1/link", "org.freedesktop.network1.Link", link_vtable, link_object_find, m);
151 if (r < 0)
152 return log_error_errno(r, "Failed to add link object vtable: %m");
153
154 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/network1/link", link_node_enumerator, m);
155 if (r < 0)
156 return log_error_errno(r, "Failed to add link enumerator: %m");
157
158 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/network1/network", "org.freedesktop.network1.Network", network_vtable, network_object_find, m);
159 if (r < 0)
160 return log_error_errno(r, "Failed to add network object vtable: %m");
161
162 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/network1/network", network_node_enumerator, m);
163 if (r < 0)
164 return log_error_errno(r, "Failed to add network enumerator: %m");
165
166 r = sd_bus_request_name_async(m->bus, NULL, "org.freedesktop.network1", 0, NULL, NULL);
167 if (r < 0)
168 return log_error_errno(r, "Failed to request name: %m");
169
170 r = sd_bus_attach_event(m->bus, m->event, 0);
171 if (r < 0)
172 return log_error_errno(r, "Failed to attach bus to event loop: %m");
173
174 r = sd_bus_match_signal_async(
175 m->bus,
176 NULL,
177 "org.freedesktop.DBus.Local",
178 NULL,
179 "org.freedesktop.DBus.Local",
180 "Connected",
181 on_connected, NULL, m);
182 if (r < 0)
183 return log_error_errno(r, "Failed to request match on Connected signal: %m");
184
185 r = sd_bus_match_signal_async(
186 m->bus,
187 NULL,
188 "org.freedesktop.login1",
189 "/org/freedesktop/login1",
190 "org.freedesktop.login1.Manager",
191 "PrepareForSleep",
192 match_prepare_for_sleep, NULL, m);
193 if (r < 0)
194 log_warning_errno(r, "Failed to request match for PrepareForSleep, ignoring: %m");
195
196 return 0;
197 }
198
199 static int manager_udev_process_link(sd_device_monitor *monitor, sd_device *device, void *userdata) {
200 Manager *m = userdata;
201 DeviceAction action;
202 Link *link = NULL;
203 int r, ifindex;
204
205 assert(m);
206 assert(device);
207
208 r = device_get_action(device, &action);
209 if (r < 0) {
210 log_device_debug_errno(device, r, "Failed to get udev action, ignoring device: %m");
211 return 0;
212 }
213
214 if (!IN_SET(action, DEVICE_ACTION_ADD, DEVICE_ACTION_CHANGE, DEVICE_ACTION_MOVE)) {
215 log_device_debug(device, "Ignoring udev %s event for device.", device_action_to_string(action));
216 return 0;
217 }
218
219 r = sd_device_get_ifindex(device, &ifindex);
220 if (r < 0) {
221 log_device_debug_errno(device, r, "Ignoring udev ADD event for device without ifindex or with invalid ifindex: %m");
222 return 0;
223 }
224
225 r = device_is_renaming(device);
226 if (r < 0) {
227 log_device_error_errno(device, r, "Failed to determine the device is renamed or not, ignoring '%s' uevent: %m",
228 device_action_to_string(action));
229 return 0;
230 }
231 if (r > 0) {
232 log_device_debug(device, "Interface is under renaming, wait for the interface to be renamed: %m");
233 return 0;
234 }
235
236 r = link_get(m, ifindex, &link);
237 if (r < 0) {
238 if (r != -ENODEV)
239 log_debug_errno(r, "Failed to get link from ifindex %i, ignoring: %m", ifindex);
240 return 0;
241 }
242
243 (void) link_initialized(link, device);
244
245 return 0;
246 }
247
248 static int manager_connect_udev(Manager *m) {
249 int r;
250
251 /* udev does not initialize devices inside containers,
252 * so we rely on them being already initialized before
253 * entering the container */
254 if (detect_container() > 0)
255 return 0;
256
257 r = sd_device_monitor_new(&m->device_monitor);
258 if (r < 0)
259 return log_error_errno(r, "Failed to initialize device monitor: %m");
260
261 r = sd_device_monitor_filter_add_match_subsystem_devtype(m->device_monitor, "net", NULL);
262 if (r < 0)
263 return log_error_errno(r, "Could not add device monitor filter: %m");
264
265 r = sd_device_monitor_attach_event(m->device_monitor, m->event);
266 if (r < 0)
267 return log_error_errno(r, "Failed to attach event to device monitor: %m");
268
269 r = sd_device_monitor_start(m->device_monitor, manager_udev_process_link, m);
270 if (r < 0)
271 return log_error_errno(r, "Failed to start device monitor: %m");
272
273 return 0;
274 }
275
276 int manager_rtnl_process_route(sd_netlink *rtnl, sd_netlink_message *message, void *userdata) {
277 _cleanup_(route_freep) Route *tmp = NULL;
278 Route *route = NULL;
279 Manager *m = userdata;
280 Link *link = NULL;
281 uint32_t ifindex;
282 uint16_t type;
283 unsigned char table;
284 int r;
285
286 assert(rtnl);
287 assert(message);
288 assert(m);
289
290 if (sd_netlink_message_is_error(message)) {
291 r = sd_netlink_message_get_errno(message);
292 if (r < 0)
293 log_message_warning_errno(message, r, "rtnl: failed to receive route message, ignoring");
294
295 return 0;
296 }
297
298 r = sd_netlink_message_get_type(message, &type);
299 if (r < 0) {
300 log_warning_errno(r, "rtnl: could not get message type, ignoring: %m");
301 return 0;
302 } else if (!IN_SET(type, RTM_NEWROUTE, RTM_DELROUTE)) {
303 log_warning("rtnl: received unexpected message type %u when processing route, ignoring.", type);
304 return 0;
305 }
306
307 r = sd_netlink_message_read_u32(message, RTA_OIF, &ifindex);
308 if (r == -ENODATA) {
309 log_debug("rtnl: received route message without ifindex, ignoring");
310 return 0;
311 } else if (r < 0) {
312 log_warning_errno(r, "rtnl: could not get ifindex from route message, ignoring: %m");
313 return 0;
314 } else if (ifindex <= 0) {
315 log_warning("rtnl: received route message with invalid ifindex %d, ignoring.", ifindex);
316 return 0;
317 }
318
319 r = link_get(m, ifindex, &link);
320 if (r < 0 || !link) {
321 /* when enumerating we might be out of sync, but we will
322 * get the route again, so just ignore it */
323 if (!m->enumerating)
324 log_warning("rtnl: received route message for link (%d) we do not know about, ignoring", ifindex);
325 return 0;
326 }
327
328 r = route_new(&tmp);
329 if (r < 0)
330 return log_oom();
331
332 r = sd_rtnl_message_route_get_family(message, &tmp->family);
333 if (r < 0) {
334 log_link_warning(link, "rtnl: received route message without family, ignoring");
335 return 0;
336 } else if (!IN_SET(tmp->family, AF_INET, AF_INET6)) {
337 log_link_debug(link, "rtnl: received route message with invalid family '%i', ignoring", tmp->family);
338 return 0;
339 }
340
341 r = sd_rtnl_message_route_get_protocol(message, &tmp->protocol);
342 if (r < 0) {
343 log_warning_errno(r, "rtnl: received route message without route protocol: %m");
344 return 0;
345 }
346
347 switch (tmp->family) {
348 case AF_INET:
349 r = sd_netlink_message_read_in_addr(message, RTA_DST, &tmp->dst.in);
350 if (r < 0 && r != -ENODATA) {
351 log_link_warning_errno(link, r, "rtnl: received route message without valid destination, ignoring: %m");
352 return 0;
353 }
354
355 r = sd_netlink_message_read_in_addr(message, RTA_GATEWAY, &tmp->gw.in);
356 if (r < 0 && r != -ENODATA) {
357 log_link_warning_errno(link, r, "rtnl: received route message without valid gateway, ignoring: %m");
358 return 0;
359 }
360
361 r = sd_netlink_message_read_in_addr(message, RTA_SRC, &tmp->src.in);
362 if (r < 0 && r != -ENODATA) {
363 log_link_warning_errno(link, r, "rtnl: received route message without valid source, ignoring: %m");
364 return 0;
365 }
366
367 r = sd_netlink_message_read_in_addr(message, RTA_PREFSRC, &tmp->prefsrc.in);
368 if (r < 0 && r != -ENODATA) {
369 log_link_warning_errno(link, r, "rtnl: received route message without valid preferred source, ignoring: %m");
370 return 0;
371 }
372
373 break;
374
375 case AF_INET6:
376 r = sd_netlink_message_read_in6_addr(message, RTA_DST, &tmp->dst.in6);
377 if (r < 0 && r != -ENODATA) {
378 log_link_warning_errno(link, r, "rtnl: received route message without valid destination, ignoring: %m");
379 return 0;
380 }
381
382 r = sd_netlink_message_read_in6_addr(message, RTA_GATEWAY, &tmp->gw.in6);
383 if (r < 0 && r != -ENODATA) {
384 log_link_warning_errno(link, r, "rtnl: received route message without valid gateway, ignoring: %m");
385 return 0;
386 }
387
388 r = sd_netlink_message_read_in6_addr(message, RTA_SRC, &tmp->src.in6);
389 if (r < 0 && r != -ENODATA) {
390 log_link_warning_errno(link, r, "rtnl: received route message without valid source, ignoring: %m");
391 return 0;
392 }
393
394 r = sd_netlink_message_read_in6_addr(message, RTA_PREFSRC, &tmp->prefsrc.in6);
395 if (r < 0 && r != -ENODATA) {
396 log_link_warning_errno(link, r, "rtnl: received route message without valid preferred source, ignoring: %m");
397 return 0;
398 }
399
400 break;
401
402 default:
403 assert_not_reached("Received route message with unsupported address family");
404 return 0;
405 }
406
407 r = sd_rtnl_message_route_get_dst_prefixlen(message, &tmp->dst_prefixlen);
408 if (r < 0) {
409 log_link_warning_errno(link, r, "rtnl: received route message with invalid destination prefixlen, ignoring: %m");
410 return 0;
411 }
412
413 r = sd_rtnl_message_route_get_src_prefixlen(message, &tmp->src_prefixlen);
414 if (r < 0) {
415 log_link_warning_errno(link, r, "rtnl: received route message with invalid source prefixlen, ignoring: %m");
416 return 0;
417 }
418
419 r = sd_rtnl_message_route_get_scope(message, &tmp->scope);
420 if (r < 0) {
421 log_link_warning_errno(link, r, "rtnl: received route message with invalid scope, ignoring: %m");
422 return 0;
423 }
424
425 r = sd_rtnl_message_route_get_tos(message, &tmp->tos);
426 if (r < 0) {
427 log_link_warning_errno(link, r, "rtnl: received route message with invalid tos, ignoring: %m");
428 return 0;
429 }
430
431 r = sd_rtnl_message_route_get_type(message, &tmp->type);
432 if (r < 0) {
433 log_link_warning_errno(link, r, "rtnl: received route message with invalid type, ignoring: %m");
434 return 0;
435 }
436
437 r = sd_rtnl_message_route_get_table(message, &table);
438 if (r < 0) {
439 log_link_warning_errno(link, r, "rtnl: received route message with invalid table, ignoring: %m");
440 return 0;
441 }
442 tmp->table = table;
443
444 r = sd_netlink_message_read_u32(message, RTA_PRIORITY, &tmp->priority);
445 if (r < 0 && r != -ENODATA) {
446 log_link_warning_errno(link, r, "rtnl: received route message with invalid priority, ignoring: %m");
447 return 0;
448 }
449
450 r = sd_netlink_message_enter_container(message, RTA_METRICS);
451 if (r < 0 && r != -ENODATA) {
452 log_link_error_errno(link, r, "rtnl: Could not enter RTA_METRICS container: %m");
453 return 0;
454 }
455 if (r >= 0) {
456 r = sd_netlink_message_read_u32(message, RTAX_INITCWND, &tmp->initcwnd);
457 if (r < 0 && r != -ENODATA) {
458 log_link_warning_errno(link, r, "rtnl: received route message with invalid initcwnd, ignoring: %m");
459 return 0;
460 }
461
462 r = sd_netlink_message_read_u32(message, RTAX_INITRWND, &tmp->initrwnd);
463 if (r < 0 && r != -ENODATA) {
464 log_link_warning_errno(link, r, "rtnl: received route message with invalid initrwnd, ignoring: %m");
465 return 0;
466 }
467
468 r = sd_netlink_message_exit_container(message);
469 if (r < 0) {
470 log_link_error_errno(link, r, "rtnl: Could not exit from RTA_METRICS container: %m");
471 return 0;
472 }
473 }
474
475 (void) route_get(link, tmp, &route);
476
477 if (DEBUG_LOGGING) {
478 _cleanup_free_ char *buf_dst = NULL, *buf_dst_prefixlen = NULL,
479 *buf_src = NULL, *buf_gw = NULL, *buf_prefsrc = NULL;
480 char buf_scope[ROUTE_SCOPE_STR_MAX], buf_table[ROUTE_TABLE_STR_MAX],
481 buf_protocol[ROUTE_PROTOCOL_STR_MAX];
482
483 if (!in_addr_is_null(tmp->family, &tmp->dst)) {
484 (void) in_addr_to_string(tmp->family, &tmp->dst, &buf_dst);
485 (void) asprintf(&buf_dst_prefixlen, "/%u", tmp->dst_prefixlen);
486 }
487 if (!in_addr_is_null(tmp->family, &tmp->src))
488 (void) in_addr_to_string(tmp->family, &tmp->src, &buf_src);
489 if (!in_addr_is_null(tmp->family, &tmp->gw))
490 (void) in_addr_to_string(tmp->family, &tmp->gw, &buf_gw);
491 if (!in_addr_is_null(tmp->family, &tmp->prefsrc))
492 (void) in_addr_to_string(tmp->family, &tmp->prefsrc, &buf_prefsrc);
493
494 log_link_debug(link,
495 "%s route: dst: %s%s, src: %s, gw: %s, prefsrc: %s, scope: %s, table: %s, proto: %s, type: %s",
496 type == RTM_DELROUTE ? "Forgetting" : route ? "Received remembered" : "Remembering",
497 strna(buf_dst), strempty(buf_dst_prefixlen),
498 strna(buf_src), strna(buf_gw), strna(buf_prefsrc),
499 format_route_scope(tmp->scope, buf_scope, sizeof buf_scope),
500 format_route_table(tmp->table, buf_table, sizeof buf_table),
501 format_route_protocol(tmp->protocol, buf_protocol, sizeof buf_protocol),
502 strna(route_type_to_string(tmp->type)));
503 }
504
505 switch (type) {
506 case RTM_NEWROUTE:
507 if (!route) {
508 /* A route appeared that we did not request */
509 r = route_add_foreign(link, tmp, &route);
510 if (r < 0) {
511 log_link_warning_errno(link, r, "Failed to remember foreign route, ignoring: %m");
512 return 0;
513 }
514 }
515
516 break;
517
518 case RTM_DELROUTE:
519 route_free(route);
520 break;
521
522 default:
523 assert_not_reached("Received route message with invalid RTNL message type");
524 }
525
526 return 1;
527 }
528
529 static int manager_rtnl_process_neighbor_lladdr(sd_netlink_message *message, union lladdr_union *lladdr, size_t *size, char **str) {
530 int r;
531
532 assert(message);
533 assert(lladdr);
534 assert(size);
535 assert(str);
536
537 *str = NULL;
538
539 r = sd_netlink_message_read(message, NDA_LLADDR, sizeof(lladdr->ip.in6), &lladdr->ip.in6);
540 if (r >= 0) {
541 *size = sizeof(lladdr->ip.in6);
542 if (in_addr_to_string(AF_INET6, &lladdr->ip, str) < 0)
543 log_warning_errno(r, "Could not print lower address: %m");
544 return r;
545 }
546
547 r = sd_netlink_message_read(message, NDA_LLADDR, sizeof(lladdr->mac), &lladdr->mac);
548 if (r >= 0) {
549 *size = sizeof(lladdr->mac);
550 *str = new(char, ETHER_ADDR_TO_STRING_MAX);
551 if (!*str) {
552 log_oom();
553 return r;
554 }
555 ether_addr_to_string(&lladdr->mac, *str);
556 return r;
557 }
558
559 r = sd_netlink_message_read(message, NDA_LLADDR, sizeof(lladdr->ip.in), &lladdr->ip.in);
560 if (r >= 0) {
561 *size = sizeof(lladdr->ip.in);
562 if (in_addr_to_string(AF_INET, &lladdr->ip, str) < 0)
563 log_warning_errno(r, "Could not print lower address: %m");
564 return r;
565 }
566
567 return r;
568 }
569
570 int manager_rtnl_process_neighbor(sd_netlink *rtnl, sd_netlink_message *message, void *userdata) {
571 Manager *m = userdata;
572 Link *link = NULL;
573 Neighbor *neighbor = NULL;
574 int ifindex, family, r;
575 uint16_t type, state;
576 union in_addr_union in_addr = IN_ADDR_NULL;
577 _cleanup_free_ char *addr_str = NULL;
578 union lladdr_union lladdr;
579 size_t lladdr_size = 0;
580 _cleanup_free_ char *lladdr_str = NULL;
581
582 assert(rtnl);
583 assert(message);
584 assert(m);
585
586 if (sd_netlink_message_is_error(message)) {
587 r = sd_netlink_message_get_errno(message);
588 if (r < 0)
589 log_message_warning_errno(message, r, "rtnl: failed to receive neighbor message, ignoring");
590
591 return 0;
592 }
593
594 r = sd_netlink_message_get_type(message, &type);
595 if (r < 0) {
596 log_warning_errno(r, "rtnl: could not get message type, ignoring: %m");
597 return 0;
598 } else if (!IN_SET(type, RTM_NEWNEIGH, RTM_DELNEIGH)) {
599 log_warning("rtnl: received unexpected message type %u when processing neighbor, ignoring.", type);
600 return 0;
601 }
602
603 r = sd_rtnl_message_neigh_get_state(message, &state);
604 if (r < 0) {
605 log_link_warning_errno(link, r, "rtnl: received neighbor message with invalid state, ignoring: %m");
606 return 0;
607 } else if (!FLAGS_SET(state, NUD_PERMANENT)) {
608 log_debug("rtnl: received non-static neighbor, ignoring.");
609 return 0;
610 }
611
612 r = sd_rtnl_message_neigh_get_ifindex(message, &ifindex);
613 if (r < 0) {
614 log_warning_errno(r, "rtnl: could not get ifindex from message, ignoring: %m");
615 return 0;
616 } else if (ifindex <= 0) {
617 log_warning("rtnl: received neighbor message with invalid ifindex %d, ignoring.", ifindex);
618 return 0;
619 }
620
621 r = link_get(m, ifindex, &link);
622 if (r < 0 || !link) {
623 /* when enumerating we might be out of sync, but we will get the neighbor again, so just
624 * ignore it */
625 if (!m->enumerating)
626 log_warning("rtnl: received neighbor for link '%d' we don't know about, ignoring.", ifindex);
627 return 0;
628 }
629
630 r = sd_rtnl_message_neigh_get_family(message, &family);
631 if (r < 0) {
632 log_link_warning(link, "rtnl: received neighbor message withot family, ignoring.");
633 return 0;
634 } else if (!IN_SET(family, AF_INET, AF_INET6)) {
635 log_link_debug(link, "rtnl: received neighbor message with invalid family '%i', ignoring.", family);
636 return 0;
637 }
638
639 switch (family) {
640 case AF_INET:
641 r = sd_netlink_message_read_in_addr(message, NDA_DST, &in_addr.in);
642 if (r < 0) {
643 log_link_warning_errno(link, r, "rtnl: received neighbor message without valid address, ignoring: %m");
644 return 0;
645 }
646
647 break;
648
649 case AF_INET6:
650 r = sd_netlink_message_read_in6_addr(message, NDA_DST, &in_addr.in6);
651 if (r < 0) {
652 log_link_warning_errno(link, r, "rtnl: received neighbor message without valid address, ignoring: %m");
653 return 0;
654 }
655
656 break;
657
658 default:
659 assert_not_reached("Received unsupported address family");
660 }
661
662 if (in_addr_to_string(family, &in_addr, &addr_str) < 0)
663 log_link_warning_errno(link, r, "Could not print address: %m");
664
665 r = manager_rtnl_process_neighbor_lladdr(message, &lladdr, &lladdr_size, &lladdr_str);
666 if (r < 0) {
667 log_link_warning_errno(link, r, "rtnl: received neighbor message with invalid lladdr, ignoring: %m");
668 return 0;
669 }
670
671 (void) neighbor_get(link, family, &in_addr, &lladdr, lladdr_size, &neighbor);
672
673 switch (type) {
674 case RTM_NEWNEIGH:
675 if (neighbor)
676 log_link_debug(link, "Remembering neighbor: %s->%s",
677 strnull(addr_str), strnull(lladdr_str));
678 else {
679 /* A neighbor appeared that we did not request */
680 r = neighbor_add_foreign(link, family, &in_addr, &lladdr, lladdr_size, &neighbor);
681 if (r < 0) {
682 log_link_warning_errno(link, r, "Failed to remember foreign neighbor %s->%s, ignoring: %m",
683 strnull(addr_str), strnull(lladdr_str));
684 return 0;
685 } else
686 log_link_debug(link, "Remembering foreign neighbor: %s->%s",
687 strnull(addr_str), strnull(lladdr_str));
688 }
689
690 break;
691
692 case RTM_DELNEIGH:
693 if (neighbor) {
694 log_link_debug(link, "Forgetting neighbor: %s->%s",
695 strnull(addr_str), strnull(lladdr_str));
696 (void) neighbor_free(neighbor);
697 } else
698 log_link_info(link, "Kernel removed a neighbor we don't remember: %s->%s, ignoring.",
699 strnull(addr_str), strnull(lladdr_str));
700
701 break;
702
703 default:
704 assert_not_reached("Received invalid RTNL message type");
705 }
706
707 return 1;
708 }
709
710 int manager_rtnl_process_address(sd_netlink *rtnl, sd_netlink_message *message, void *userdata) {
711 _cleanup_free_ char *buf = NULL;
712 Manager *m = userdata;
713 Link *link = NULL;
714 uint16_t type;
715 unsigned char flags, prefixlen, scope;
716 union in_addr_union in_addr = IN_ADDR_NULL;
717 struct ifa_cacheinfo cinfo;
718 Address *address = NULL;
719 char valid_buf[FORMAT_TIMESPAN_MAX];
720 const char *valid_str = NULL;
721 int ifindex, family, r;
722
723 assert(rtnl);
724 assert(message);
725 assert(m);
726
727 if (sd_netlink_message_is_error(message)) {
728 r = sd_netlink_message_get_errno(message);
729 if (r < 0)
730 log_message_warning_errno(message, r, "rtnl: failed to receive address message, ignoring");
731
732 return 0;
733 }
734
735 r = sd_netlink_message_get_type(message, &type);
736 if (r < 0) {
737 log_warning_errno(r, "rtnl: could not get message type, ignoring: %m");
738 return 0;
739 } else if (!IN_SET(type, RTM_NEWADDR, RTM_DELADDR)) {
740 log_warning("rtnl: received unexpected message type %u when processing address, ignoring.", type);
741 return 0;
742 }
743
744 r = sd_rtnl_message_addr_get_ifindex(message, &ifindex);
745 if (r < 0) {
746 log_warning_errno(r, "rtnl: could not get ifindex from message, ignoring: %m");
747 return 0;
748 } else if (ifindex <= 0) {
749 log_warning("rtnl: received address message with invalid ifindex %d, ignoring.", ifindex);
750 return 0;
751 }
752
753 r = link_get(m, ifindex, &link);
754 if (r < 0 || !link) {
755 /* when enumerating we might be out of sync, but we will get the address again, so just
756 * ignore it */
757 if (!m->enumerating)
758 log_warning("rtnl: received address for link '%d' we don't know about, ignoring.", ifindex);
759 return 0;
760 }
761
762 r = sd_rtnl_message_addr_get_family(message, &family);
763 if (r < 0) {
764 log_link_warning(link, "rtnl: received address message without family, ignoring.");
765 return 0;
766 } else if (!IN_SET(family, AF_INET, AF_INET6)) {
767 log_link_debug(link, "rtnl: received address message with invalid family '%i', ignoring.", family);
768 return 0;
769 }
770
771 r = sd_rtnl_message_addr_get_prefixlen(message, &prefixlen);
772 if (r < 0) {
773 log_link_warning_errno(link, r, "rtnl: received address message with invalid prefixlen, ignoring: %m");
774 return 0;
775 }
776
777 r = sd_rtnl_message_addr_get_scope(message, &scope);
778 if (r < 0) {
779 log_link_warning_errno(link, r, "rtnl: received address message with invalid scope, ignoring: %m");
780 return 0;
781 }
782
783 r = sd_rtnl_message_addr_get_flags(message, &flags);
784 if (r < 0) {
785 log_link_warning_errno(link, r, "rtnl: received address message with invalid flags, ignoring: %m");
786 return 0;
787 }
788
789 switch (family) {
790 case AF_INET:
791 r = sd_netlink_message_read_in_addr(message, IFA_LOCAL, &in_addr.in);
792 if (r < 0) {
793 log_link_warning_errno(link, r, "rtnl: received address message without valid address, ignoring: %m");
794 return 0;
795 }
796
797 break;
798
799 case AF_INET6:
800 r = sd_netlink_message_read_in6_addr(message, IFA_ADDRESS, &in_addr.in6);
801 if (r < 0) {
802 log_link_warning_errno(link, r, "rtnl: received address message without valid address, ignoring: %m");
803 return 0;
804 }
805
806 break;
807
808 default:
809 assert_not_reached("Received unsupported address family");
810 }
811
812 r = in_addr_to_string(family, &in_addr, &buf);
813 if (r < 0)
814 log_link_warning_errno(link, r, "Could not print address: %m");
815
816 r = sd_netlink_message_read_cache_info(message, IFA_CACHEINFO, &cinfo);
817 if (r < 0 && r != -ENODATA) {
818 log_link_warning_errno(link, r, "rtnl: cannot get IFA_CACHEINFO attribute, ignoring: %m");
819 return 0;
820 } else if (r >= 0 && cinfo.ifa_valid != CACHE_INFO_INFINITY_LIFE_TIME)
821 valid_str = format_timespan(valid_buf, FORMAT_TIMESPAN_MAX,
822 cinfo.ifa_valid * USEC_PER_SEC,
823 USEC_PER_SEC);
824
825 (void) address_get(link, family, &in_addr, prefixlen, &address);
826
827 switch (type) {
828 case RTM_NEWADDR:
829 if (address)
830 log_link_debug(link, "Remembering updated address: %s/%u (valid %s%s)",
831 strnull(buf), prefixlen,
832 valid_str ? "for " : "forever", strempty(valid_str));
833 else {
834 /* An address appeared that we did not request */
835 r = address_add_foreign(link, family, &in_addr, prefixlen, &address);
836 if (r < 0) {
837 log_link_warning_errno(link, r, "Failed to remember foreign address %s/%u, ignoring: %m",
838 strnull(buf), prefixlen);
839 return 0;
840 } else
841 log_link_debug(link, "Remembering foreign address: %s/%u (valid %s%s)",
842 strnull(buf), prefixlen,
843 valid_str ? "for " : "forever", strempty(valid_str));
844 }
845
846 /* address_update() logs internally, so we don't need to. */
847 (void) address_update(address, flags, scope, &cinfo);
848
849 break;
850
851 case RTM_DELADDR:
852 if (address) {
853 log_link_debug(link, "Forgetting address: %s/%u (valid %s%s)",
854 strnull(buf), prefixlen,
855 valid_str ? "for " : "forever", strempty(valid_str));
856 (void) address_drop(address);
857 } else
858 log_link_info(link, "Kernel removed an address we don't remember: %s/%u (valid %s%s), ignoring.",
859 strnull(buf), prefixlen,
860 valid_str ? "for " : "forever", strempty(valid_str));
861
862 break;
863
864 default:
865 assert_not_reached("Received invalid RTNL message type");
866 }
867
868 return 1;
869 }
870
871 static int manager_rtnl_process_link(sd_netlink *rtnl, sd_netlink_message *message, void *userdata) {
872 Manager *m = userdata;
873 Link *link = NULL;
874 NetDev *netdev = NULL;
875 uint16_t type;
876 const char *name;
877 int r, ifindex;
878
879 assert(rtnl);
880 assert(message);
881 assert(m);
882
883 if (sd_netlink_message_is_error(message)) {
884 r = sd_netlink_message_get_errno(message);
885 if (r < 0)
886 log_message_warning_errno(message, r, "rtnl: Could not receive link message, ignoring");
887
888 return 0;
889 }
890
891 r = sd_netlink_message_get_type(message, &type);
892 if (r < 0) {
893 log_warning_errno(r, "rtnl: Could not get message type, ignoring: %m");
894 return 0;
895 } else if (!IN_SET(type, RTM_NEWLINK, RTM_DELLINK)) {
896 log_warning("rtnl: Received unexpected message type %u when processing link, ignoring.", type);
897 return 0;
898 }
899
900 r = sd_rtnl_message_link_get_ifindex(message, &ifindex);
901 if (r < 0) {
902 log_warning_errno(r, "rtnl: Could not get ifindex from link message, ignoring: %m");
903 return 0;
904 } else if (ifindex <= 0) {
905 log_warning("rtnl: received link message with invalid ifindex %d, ignoring.", ifindex);
906 return 0;
907 }
908
909 r = sd_netlink_message_read_string(message, IFLA_IFNAME, &name);
910 if (r < 0) {
911 log_warning_errno(r, "rtnl: Received link message without ifname, ignoring: %m");
912 return 0;
913 }
914
915 (void) link_get(m, ifindex, &link);
916 (void) netdev_get(m, name, &netdev);
917
918 switch (type) {
919 case RTM_NEWLINK:
920 if (!link) {
921 /* link is new, so add it */
922 r = link_add(m, message, &link);
923 if (r < 0) {
924 log_warning_errno(r, "Could not process new link message, ignoring: %m");
925 return 0;
926 }
927 }
928
929 if (netdev) {
930 /* netdev exists, so make sure the ifindex matches */
931 r = netdev_set_ifindex(netdev, message);
932 if (r < 0) {
933 log_warning_errno(r, "Could not process new link message for netdev, ignoring: %m");
934 return 0;
935 }
936 }
937
938 r = link_update(link, message);
939 if (r < 0) {
940 log_warning_errno(r, "Could not process link message, ignoring: %m");
941 return 0;
942 }
943
944 break;
945
946 case RTM_DELLINK:
947 link_drop(link);
948 netdev_drop(netdev);
949
950 break;
951
952 default:
953 assert_not_reached("Received link message with invalid RTNL message type.");
954 }
955
956 return 1;
957 }
958
959 int manager_rtnl_process_rule(sd_netlink *rtnl, sd_netlink_message *message, void *userdata) {
960 _cleanup_(routing_policy_rule_freep) RoutingPolicyRule *tmp = NULL;
961 _cleanup_free_ char *from = NULL, *to = NULL;
962 RoutingPolicyRule *rule = NULL;
963 const char *iif = NULL, *oif = NULL;
964 Manager *m = userdata;
965 unsigned flags;
966 uint16_t type;
967 int r;
968
969 assert(rtnl);
970 assert(message);
971 assert(m);
972
973 if (sd_netlink_message_is_error(message)) {
974 r = sd_netlink_message_get_errno(message);
975 if (r < 0)
976 log_message_warning_errno(message, r, "rtnl: failed to receive rule message, ignoring");
977
978 return 0;
979 }
980
981 r = sd_netlink_message_get_type(message, &type);
982 if (r < 0) {
983 log_warning_errno(r, "rtnl: could not get message type, ignoring: %m");
984 return 0;
985 } else if (!IN_SET(type, RTM_NEWRULE, RTM_DELRULE)) {
986 log_warning("rtnl: received unexpected message type %u when processing rule, ignoring.", type);
987 return 0;
988 }
989
990 r = routing_policy_rule_new(&tmp);
991 if (r < 0) {
992 log_oom();
993 return 0;
994 }
995
996 r = sd_rtnl_message_get_family(message, &tmp->family);
997 if (r < 0) {
998 log_warning_errno(r, "rtnl: could not get rule family, ignoring: %m");
999 return 0;
1000 } else if (!IN_SET(tmp->family, AF_INET, AF_INET6)) {
1001 log_debug("rtnl: received rule message with invalid family %d, ignoring.", tmp->family);
1002 return 0;
1003 }
1004
1005 switch (tmp->family) {
1006 case AF_INET:
1007 r = sd_netlink_message_read_in_addr(message, FRA_SRC, &tmp->from.in);
1008 if (r < 0 && r != -ENODATA) {
1009 log_warning_errno(r, "rtnl: could not get FRA_SRC attribute, ignoring: %m");
1010 return 0;
1011 } else if (r >= 0) {
1012 r = sd_rtnl_message_routing_policy_rule_get_rtm_src_prefixlen(message, &tmp->from_prefixlen);
1013 if (r < 0) {
1014 log_warning_errno(r, "rtnl: received rule message without valid source prefix length, ignoring: %m");
1015 return 0;
1016 }
1017 }
1018
1019 r = sd_netlink_message_read_in_addr(message, FRA_DST, &tmp->to.in);
1020 if (r < 0 && r != -ENODATA) {
1021 log_warning_errno(r, "rtnl: could not get FRA_DST attribute, ignoring: %m");
1022 return 0;
1023 } else if (r >= 0) {
1024 r = sd_rtnl_message_routing_policy_rule_get_rtm_dst_prefixlen(message, &tmp->to_prefixlen);
1025 if (r < 0) {
1026 log_warning_errno(r, "rtnl: received rule message without valid destination prefix length, ignoring: %m");
1027 return 0;
1028 }
1029 }
1030
1031 break;
1032
1033 case AF_INET6:
1034 r = sd_netlink_message_read_in6_addr(message, FRA_SRC, &tmp->from.in6);
1035 if (r < 0 && r != -ENODATA) {
1036 log_warning_errno(r, "rtnl: could not get FRA_SRC attribute, ignoring: %m");
1037 return 0;
1038 } else if (r >= 0) {
1039 r = sd_rtnl_message_routing_policy_rule_get_rtm_src_prefixlen(message, &tmp->from_prefixlen);
1040 if (r < 0) {
1041 log_warning_errno(r, "rtnl: received rule message without valid source prefix length, ignoring: %m");
1042 return 0;
1043 }
1044 }
1045
1046 r = sd_netlink_message_read_in6_addr(message, FRA_DST, &tmp->to.in6);
1047 if (r < 0 && r != -ENODATA) {
1048 log_warning_errno(r, "rtnl: could not get FRA_DST attribute, ignoring: %m");
1049 return 0;
1050 } else if (r >= 0) {
1051 r = sd_rtnl_message_routing_policy_rule_get_rtm_dst_prefixlen(message, &tmp->to_prefixlen);
1052 if (r < 0) {
1053 log_warning_errno(r, "rtnl: received rule message without valid destination prefix length, ignoring: %m");
1054 return 0;
1055 }
1056 }
1057
1058 break;
1059
1060 default:
1061 assert_not_reached("Received rule message with unsupported address family");
1062 }
1063
1064 if (tmp->from_prefixlen == 0 && tmp->to_prefixlen == 0)
1065 return 0;
1066
1067 r = sd_rtnl_message_routing_policy_rule_get_flags(message, &flags);
1068 if (r < 0) {
1069 log_warning_errno(r, "rtnl: received rule message without valid flag, ignoring: %m");
1070 return 0;
1071 }
1072 tmp->invert_rule = flags & FIB_RULE_INVERT;
1073
1074 r = sd_netlink_message_read_u32(message, FRA_FWMARK, &tmp->fwmark);
1075 if (r < 0 && r != -ENODATA) {
1076 log_warning_errno(r, "rtnl: could not get FRA_FWMARK attribute, ignoring: %m");
1077 return 0;
1078 }
1079
1080 r = sd_netlink_message_read_u32(message, FRA_FWMASK, &tmp->fwmask);
1081 if (r < 0 && r != -ENODATA) {
1082 log_warning_errno(r, "rtnl: could not get FRA_FWMASK attribute, ignoring: %m");
1083 return 0;
1084 }
1085
1086 r = sd_netlink_message_read_u32(message, FRA_PRIORITY, &tmp->priority);
1087 if (r < 0 && r != -ENODATA) {
1088 log_warning_errno(r, "rtnl: could not get FRA_PRIORITY attribute, ignoring: %m");
1089 return 0;
1090 }
1091
1092 r = sd_netlink_message_read_u32(message, FRA_TABLE, &tmp->table);
1093 if (r < 0 && r != -ENODATA) {
1094 log_warning_errno(r, "rtnl: could not get FRA_TABLE attribute, ignoring: %m");
1095 return 0;
1096 }
1097
1098 r = sd_rtnl_message_routing_policy_rule_get_tos(message, &tmp->tos);
1099 if (r < 0 && r != -ENODATA) {
1100 log_warning_errno(r, "rtnl: could not get ip rule TOS, ignoring: %m");
1101 return 0;
1102 }
1103
1104 r = sd_netlink_message_read_string(message, FRA_IIFNAME, &iif);
1105 if (r < 0 && r != -ENODATA) {
1106 log_warning_errno(r, "rtnl: could not get FRA_IIFNAME attribute, ignoring: %m");
1107 return 0;
1108 }
1109 r = free_and_strdup(&tmp->iif, iif);
1110 if (r < 0)
1111 return log_oom();
1112
1113 r = sd_netlink_message_read_string(message, FRA_OIFNAME, &oif);
1114 if (r < 0 && r != -ENODATA) {
1115 log_warning_errno(r, "rtnl: could not get FRA_OIFNAME attribute, ignoring: %m");
1116 return 0;
1117 }
1118 r = free_and_strdup(&tmp->oif, oif);
1119 if (r < 0)
1120 return log_oom();
1121
1122 r = sd_netlink_message_read_u8(message, FRA_IP_PROTO, &tmp->protocol);
1123 if (r < 0 && r != -ENODATA) {
1124 log_warning_errno(r, "rtnl: could not get FRA_IP_PROTO attribute, ignoring: %m");
1125 return 0;
1126 }
1127
1128 r = sd_netlink_message_read(message, FRA_SPORT_RANGE, sizeof(tmp->sport), &tmp->sport);
1129 if (r < 0 && r != -ENODATA) {
1130 log_warning_errno(r, "rtnl: could not get FRA_SPORT_RANGE attribute, ignoring: %m");
1131 return 0;
1132 }
1133
1134 r = sd_netlink_message_read(message, FRA_DPORT_RANGE, sizeof(tmp->dport), &tmp->dport);
1135 if (r < 0 && r != -ENODATA) {
1136 log_warning_errno(r, "rtnl: could not get FRA_DPORT_RANGE attribute, ignoring: %m");
1137 return 0;
1138 }
1139
1140 (void) routing_policy_rule_get(m, tmp, &rule);
1141
1142 if (DEBUG_LOGGING) {
1143 (void) in_addr_to_string(tmp->family, &tmp->from, &from);
1144 (void) in_addr_to_string(tmp->family, &tmp->to, &to);
1145 }
1146
1147 switch (type) {
1148 case RTM_NEWRULE:
1149 if (!rule) {
1150 log_debug("Remembering foreign routing policy rule: %s/%u -> %s/%u, iif: %s, oif: %s, table: %u",
1151 from, tmp->from_prefixlen, to, tmp->to_prefixlen, strna(tmp->iif), strna(tmp->oif), tmp->table);
1152 r = routing_policy_rule_add_foreign(m, tmp, &rule);
1153 if (r < 0) {
1154 log_warning_errno(r, "Could not remember foreign rule, ignoring: %m");
1155 return 0;
1156 }
1157 }
1158 break;
1159 case RTM_DELRULE:
1160 log_debug("Forgetting routing policy rule: %s/%u -> %s/%u, iif: %s, oif: %s, table: %u",
1161 from, tmp->from_prefixlen, to, tmp->to_prefixlen, strna(tmp->iif), strna(tmp->oif), tmp->table);
1162 routing_policy_rule_free(rule);
1163
1164 break;
1165
1166 default:
1167 assert_not_reached("Received invalid RTNL message type");
1168 }
1169
1170 return 1;
1171 }
1172
1173 int manager_rtnl_process_nexthop(sd_netlink *rtnl, sd_netlink_message *message, void *userdata) {
1174 _cleanup_(nexthop_freep) NextHop *tmp = NULL;
1175 _cleanup_free_ char *gateway = NULL;
1176 NextHop *nexthop = NULL;
1177 Manager *m = userdata;
1178 Link *link = NULL;
1179 uint16_t type;
1180 int r;
1181
1182 assert(rtnl);
1183 assert(message);
1184 assert(m);
1185
1186 if (sd_netlink_message_is_error(message)) {
1187 r = sd_netlink_message_get_errno(message);
1188 if (r < 0)
1189 log_message_warning_errno(message, r, "rtnl: failed to receive rule message, ignoring");
1190
1191 return 0;
1192 }
1193
1194 r = sd_netlink_message_get_type(message, &type);
1195 if (r < 0) {
1196 log_warning_errno(r, "rtnl: could not get message type, ignoring: %m");
1197 return 0;
1198 } else if (!IN_SET(type, RTM_NEWNEXTHOP, RTM_DELNEXTHOP)) {
1199 log_warning("rtnl: received unexpected message type %u when processing nexthop, ignoring.", type);
1200 return 0;
1201 }
1202
1203 r = nexthop_new(&tmp);
1204 if (r < 0)
1205 return log_oom();
1206
1207 r = sd_rtnl_message_get_family(message, &tmp->family);
1208 if (r < 0) {
1209 log_warning_errno(r, "rtnl: could not get nexthop family, ignoring: %m");
1210 return 0;
1211 } else if (!IN_SET(tmp->family, AF_INET, AF_INET6)) {
1212 log_debug("rtnl: received nexthop message with invalid family %d, ignoring.", tmp->family);
1213 return 0;
1214 }
1215
1216 switch (tmp->family) {
1217 case AF_INET:
1218 r = sd_netlink_message_read_in_addr(message, NHA_GATEWAY, &tmp->gw.in);
1219 if (r < 0 && r != -ENODATA) {
1220 log_warning_errno(r, "rtnl: could not get NHA_GATEWAY attribute, ignoring: %m");
1221 return 0;
1222 }
1223 break;
1224
1225 case AF_INET6:
1226 r = sd_netlink_message_read_in6_addr(message, NHA_GATEWAY, &tmp->gw.in6);
1227 if (r < 0 && r != -ENODATA) {
1228 log_warning_errno(r, "rtnl: could not get NHA_GATEWAY attribute, ignoring: %m");
1229 return 0;
1230 }
1231 break;
1232
1233 default:
1234 assert_not_reached("Received rule message with unsupported address family");
1235 }
1236
1237 r = sd_netlink_message_read_u32(message, NHA_ID, &tmp->id);
1238 if (r < 0 && r != -ENODATA) {
1239 log_warning_errno(r, "rtnl: could not get NHA_ID attribute, ignoring: %m");
1240 return 0;
1241 }
1242
1243 r = sd_netlink_message_read_u32(message, NHA_OIF, &tmp->oif);
1244 if (r < 0 && r != -ENODATA) {
1245 log_warning_errno(r, "rtnl: could not get NHA_OIF attribute, ignoring: %m");
1246 return 0;
1247 }
1248
1249 r = link_get(m, tmp->oif, &link);
1250 if (r < 0 || !link) {
1251 if (!m->enumerating)
1252 log_warning("rtnl: received nexthop message for link (%d) we do not know about, ignoring", tmp->oif);
1253 return 0;
1254 }
1255
1256 (void) nexthop_get(link, tmp, &nexthop);
1257
1258 if (DEBUG_LOGGING)
1259 (void) in_addr_to_string(tmp->family, &tmp->gw, &gateway);
1260
1261 switch (type) {
1262 case RTM_NEWNEXTHOP:
1263 if (!nexthop) {
1264 log_debug("Remembering foreign nexthop: %s, oif: %d, id: %d", gateway, tmp->oif, tmp->id);
1265 r = nexthop_add_foreign(link, tmp, &nexthop);
1266 if (r < 0) {
1267 log_warning_errno(r, "Could not remember foreign nexthop, ignoring: %m");
1268 return 0;
1269 }
1270 }
1271 break;
1272 case RTM_DELNEXTHOP:
1273 log_debug("Forgetting foreign nexthop: %s, oif: %d, id: %d", gateway, tmp->oif, tmp->id);
1274 nexthop_free(nexthop);
1275
1276 break;
1277
1278 default:
1279 assert_not_reached("Received invalid RTNL message type");
1280 }
1281
1282 return 1;
1283 }
1284
1285 static int systemd_netlink_fd(void) {
1286 int n, fd, rtnl_fd = -EINVAL;
1287
1288 n = sd_listen_fds(true);
1289 if (n <= 0)
1290 return -EINVAL;
1291
1292 for (fd = SD_LISTEN_FDS_START; fd < SD_LISTEN_FDS_START + n; fd ++) {
1293 if (sd_is_socket(fd, AF_NETLINK, SOCK_RAW, -1) > 0) {
1294 if (rtnl_fd >= 0)
1295 return -EINVAL;
1296
1297 rtnl_fd = fd;
1298 }
1299 }
1300
1301 return rtnl_fd;
1302 }
1303
1304 static int manager_connect_genl(Manager *m) {
1305 int r;
1306
1307 assert(m);
1308
1309 r = sd_genl_socket_open(&m->genl);
1310 if (r < 0)
1311 return r;
1312
1313 r = sd_netlink_inc_rcvbuf(m->genl, RCVBUF_SIZE);
1314 if (r < 0)
1315 return r;
1316
1317 r = sd_netlink_attach_event(m->genl, m->event, 0);
1318 if (r < 0)
1319 return r;
1320
1321 return 0;
1322 }
1323
1324 static int manager_connect_rtnl(Manager *m) {
1325 int fd, r;
1326
1327 assert(m);
1328
1329 fd = systemd_netlink_fd();
1330 if (fd < 0)
1331 r = sd_netlink_open(&m->rtnl);
1332 else
1333 r = sd_netlink_open_fd(&m->rtnl, fd);
1334 if (r < 0)
1335 return r;
1336
1337 r = sd_netlink_inc_rcvbuf(m->rtnl, RCVBUF_SIZE);
1338 if (r < 0)
1339 return r;
1340
1341 r = sd_netlink_attach_event(m->rtnl, m->event, 0);
1342 if (r < 0)
1343 return r;
1344
1345 r = sd_netlink_add_match(m->rtnl, NULL, RTM_NEWLINK, &manager_rtnl_process_link, NULL, m, "network-rtnl_process_link");
1346 if (r < 0)
1347 return r;
1348
1349 r = sd_netlink_add_match(m->rtnl, NULL, RTM_DELLINK, &manager_rtnl_process_link, NULL, m, "network-rtnl_process_link");
1350 if (r < 0)
1351 return r;
1352
1353 r = sd_netlink_add_match(m->rtnl, NULL, RTM_NEWADDR, &manager_rtnl_process_address, NULL, m, "network-rtnl_process_address");
1354 if (r < 0)
1355 return r;
1356
1357 r = sd_netlink_add_match(m->rtnl, NULL, RTM_DELADDR, &manager_rtnl_process_address, NULL, m, "network-rtnl_process_address");
1358 if (r < 0)
1359 return r;
1360
1361 r = sd_netlink_add_match(m->rtnl, NULL, RTM_NEWNEIGH, &manager_rtnl_process_neighbor, NULL, m, "network-rtnl_process_neighbor");
1362 if (r < 0)
1363 return r;
1364
1365 r = sd_netlink_add_match(m->rtnl, NULL, RTM_DELNEIGH, &manager_rtnl_process_neighbor, NULL, m, "network-rtnl_process_neighbor");
1366 if (r < 0)
1367 return r;
1368
1369 r = sd_netlink_add_match(m->rtnl, NULL, RTM_NEWROUTE, &manager_rtnl_process_route, NULL, m, "network-rtnl_process_route");
1370 if (r < 0)
1371 return r;
1372
1373 r = sd_netlink_add_match(m->rtnl, NULL, RTM_DELROUTE, &manager_rtnl_process_route, NULL, m, "network-rtnl_process_route");
1374 if (r < 0)
1375 return r;
1376
1377 r = sd_netlink_add_match(m->rtnl, NULL, RTM_NEWRULE, &manager_rtnl_process_rule, NULL, m, "network-rtnl_process_rule");
1378 if (r < 0)
1379 return r;
1380
1381 r = sd_netlink_add_match(m->rtnl, NULL, RTM_DELRULE, &manager_rtnl_process_rule, NULL, m, "network-rtnl_process_rule");
1382 if (r < 0)
1383 return r;
1384
1385 r = sd_netlink_add_match(m->rtnl, NULL, RTM_NEWNEXTHOP, &manager_rtnl_process_nexthop, NULL, m, "network-rtnl_process_nexthop");
1386 if (r < 0)
1387 return r;
1388
1389 r = sd_netlink_add_match(m->rtnl, NULL, RTM_DELNEXTHOP, &manager_rtnl_process_nexthop, NULL, m, "network-rtnl_process_nexthop");
1390 if (r < 0)
1391 return r;
1392
1393 return 0;
1394 }
1395
1396 static int ordered_set_put_in_addr_data(OrderedSet *s, const struct in_addr_data *address) {
1397 char *p;
1398 int r;
1399
1400 assert(s);
1401 assert(address);
1402
1403 r = in_addr_to_string(address->family, &address->address, &p);
1404 if (r < 0)
1405 return r;
1406
1407 r = ordered_set_consume(s, p);
1408 if (r == -EEXIST)
1409 return 0;
1410
1411 return r;
1412 }
1413
1414 static int ordered_set_put_in_addr_datav(OrderedSet *s, const struct in_addr_data *addresses, unsigned n) {
1415 int r, c = 0;
1416 unsigned i;
1417
1418 assert(s);
1419 assert(addresses || n == 0);
1420
1421 for (i = 0; i < n; i++) {
1422 r = ordered_set_put_in_addr_data(s, addresses+i);
1423 if (r < 0)
1424 return r;
1425
1426 c += r;
1427 }
1428
1429 return c;
1430 }
1431
1432 static int ordered_set_put_in4_addr(OrderedSet *s, const struct in_addr *address) {
1433 char *p;
1434 int r;
1435
1436 assert(s);
1437 assert(address);
1438
1439 r = in_addr_to_string(AF_INET, (const union in_addr_union*) address, &p);
1440 if (r < 0)
1441 return r;
1442
1443 r = ordered_set_consume(s, p);
1444 if (r == -EEXIST)
1445 return 0;
1446
1447 return r;
1448 }
1449
1450 static int ordered_set_put_in4_addrv(OrderedSet *s,
1451 const struct in_addr *addresses,
1452 size_t n,
1453 bool (*predicate)(const struct in_addr *addr)) {
1454 int r, c = 0;
1455 size_t i;
1456
1457 assert(s);
1458 assert(n == 0 || addresses);
1459
1460 for (i = 0; i < n; i++) {
1461 if (predicate && !predicate(&addresses[i]))
1462 continue;
1463 r = ordered_set_put_in4_addr(s, addresses+i);
1464 if (r < 0)
1465 return r;
1466
1467 c += r;
1468 }
1469
1470 return c;
1471 }
1472
1473 static int manager_save(Manager *m) {
1474 _cleanup_ordered_set_free_free_ OrderedSet *dns = NULL, *ntp = NULL, *sip = NULL, *search_domains = NULL, *route_domains = NULL;
1475 const char *operstate_str, *carrier_state_str, *address_state_str;
1476 LinkOperationalState operstate = LINK_OPERSTATE_OFF;
1477 LinkCarrierState carrier_state = LINK_CARRIER_STATE_OFF;
1478 LinkAddressState address_state = LINK_ADDRESS_STATE_OFF;
1479 _cleanup_free_ char *temp_path = NULL;
1480 _cleanup_strv_free_ char **p = NULL;
1481 _cleanup_fclose_ FILE *f = NULL;
1482 Link *link;
1483 Iterator i;
1484 int r;
1485
1486 assert(m);
1487 assert(m->state_file);
1488
1489 /* We add all NTP and DNS server to a set, to filter out duplicates */
1490 dns = ordered_set_new(&string_hash_ops);
1491 if (!dns)
1492 return -ENOMEM;
1493
1494 ntp = ordered_set_new(&string_hash_ops);
1495 if (!ntp)
1496 return -ENOMEM;
1497
1498 sip = ordered_set_new(&string_hash_ops);
1499 if (!sip)
1500 return -ENOMEM;
1501
1502 search_domains = ordered_set_new(&dns_name_hash_ops);
1503 if (!search_domains)
1504 return -ENOMEM;
1505
1506 route_domains = ordered_set_new(&dns_name_hash_ops);
1507 if (!route_domains)
1508 return -ENOMEM;
1509
1510 HASHMAP_FOREACH(link, m->links, i) {
1511 if (link->flags & IFF_LOOPBACK)
1512 continue;
1513
1514 if (link->operstate > operstate)
1515 operstate = link->operstate;
1516
1517 if (link->carrier_state > carrier_state)
1518 carrier_state = link->carrier_state;
1519
1520 if (link->address_state > address_state)
1521 address_state = link->address_state;
1522
1523 if (!link->network)
1524 continue;
1525
1526 /* First add the static configured entries */
1527 r = ordered_set_put_in_addr_datav(dns, link->network->dns, link->network->n_dns);
1528 if (r < 0)
1529 return r;
1530
1531 r = ordered_set_put_strdupv(ntp, link->ntp ?: link->network->ntp);
1532 if (r < 0)
1533 return r;
1534
1535 r = ordered_set_put_string_set(search_domains, link->search_domains ?: link->network->search_domains);
1536 if (r < 0)
1537 return r;
1538
1539 r = ordered_set_put_string_set(route_domains, link->route_domains ?: link->network->route_domains);
1540 if (r < 0)
1541 return r;
1542
1543 if (!link->dhcp_lease)
1544 continue;
1545
1546 /* Secondly, add the entries acquired via DHCP */
1547 if (link->network->dhcp_use_dns) {
1548 const struct in_addr *addresses;
1549
1550 r = sd_dhcp_lease_get_dns(link->dhcp_lease, &addresses);
1551 if (r > 0) {
1552 r = ordered_set_put_in4_addrv(dns, addresses, r, in4_addr_is_non_local);
1553 if (r < 0)
1554 return r;
1555 } else if (r < 0 && r != -ENODATA)
1556 return r;
1557 }
1558
1559 if (link->network->dhcp_use_ntp) {
1560 const struct in_addr *addresses;
1561
1562 r = sd_dhcp_lease_get_ntp(link->dhcp_lease, &addresses);
1563 if (r > 0) {
1564 r = ordered_set_put_in4_addrv(ntp, addresses, r, in4_addr_is_non_local);
1565 if (r < 0)
1566 return r;
1567 } else if (r < 0 && r != -ENODATA)
1568 return r;
1569 }
1570
1571 if (link->network->dhcp_use_sip) {
1572 const struct in_addr *addresses;
1573
1574 r = sd_dhcp_lease_get_sip(link->dhcp_lease, &addresses);
1575 if (r > 0) {
1576 r = ordered_set_put_in4_addrv(sip, addresses, r, in4_addr_is_non_local);
1577 if (r < 0)
1578 return r;
1579 } else if (r < 0 && r != -ENODATA)
1580 return r;
1581 }
1582
1583 if (link->network->dhcp_use_domains != DHCP_USE_DOMAINS_NO) {
1584 const char *domainname;
1585 char **domains = NULL;
1586
1587 OrderedSet *target_domains = (link->network->dhcp_use_domains == DHCP_USE_DOMAINS_YES) ? search_domains : route_domains;
1588 r = sd_dhcp_lease_get_domainname(link->dhcp_lease, &domainname);
1589 if (r >= 0) {
1590 r = ordered_set_put_strdup(target_domains, domainname);
1591 if (r < 0)
1592 return r;
1593 } else if (r != -ENODATA)
1594 return r;
1595
1596 r = sd_dhcp_lease_get_search_domains(link->dhcp_lease, &domains);
1597 if (r >= 0) {
1598 r = ordered_set_put_strdupv(target_domains, domains);
1599 if (r < 0)
1600 return r;
1601 } else if (r != -ENODATA)
1602 return r;
1603 }
1604 }
1605
1606 if (carrier_state >= LINK_CARRIER_STATE_ENSLAVED)
1607 carrier_state = LINK_CARRIER_STATE_CARRIER;
1608
1609 operstate_str = link_operstate_to_string(operstate);
1610 assert(operstate_str);
1611
1612 carrier_state_str = link_carrier_state_to_string(carrier_state);
1613 assert(carrier_state_str);
1614
1615 address_state_str = link_address_state_to_string(address_state);
1616 assert(address_state_str);
1617
1618 r = fopen_temporary(m->state_file, &f, &temp_path);
1619 if (r < 0)
1620 return r;
1621
1622 (void) fchmod(fileno(f), 0644);
1623
1624 fprintf(f,
1625 "# This is private data. Do not parse.\n"
1626 "OPER_STATE=%s\n"
1627 "CARRIER_STATE=%s\n"
1628 "ADDRESS_STATE=%s\n",
1629 operstate_str, carrier_state_str, address_state_str);
1630
1631 ordered_set_print(f, "DNS=", dns);
1632 ordered_set_print(f, "NTP=", ntp);
1633 ordered_set_print(f, "SIP=", sip);
1634 ordered_set_print(f, "DOMAINS=", search_domains);
1635 ordered_set_print(f, "ROUTE_DOMAINS=", route_domains);
1636
1637 r = routing_policy_serialize_rules(m->rules, f);
1638 if (r < 0)
1639 goto fail;
1640
1641 r = fflush_and_check(f);
1642 if (r < 0)
1643 goto fail;
1644
1645 if (rename(temp_path, m->state_file) < 0) {
1646 r = -errno;
1647 goto fail;
1648 }
1649
1650 if (m->operational_state != operstate) {
1651 m->operational_state = operstate;
1652 if (strv_extend(&p, "OperationalState") < 0)
1653 log_oom();
1654 }
1655
1656 if (m->carrier_state != carrier_state) {
1657 m->carrier_state = carrier_state;
1658 if (strv_extend(&p, "CarrierState") < 0)
1659 log_oom();
1660 }
1661
1662 if (m->address_state != address_state) {
1663 m->address_state = address_state;
1664 if (strv_extend(&p, "AddressState") < 0)
1665 log_oom();
1666 }
1667
1668 if (p) {
1669 r = manager_send_changed_strv(m, p);
1670 if (r < 0)
1671 log_error_errno(r, "Could not emit changed properties: %m");
1672 }
1673
1674 m->dirty = false;
1675
1676 return 0;
1677
1678 fail:
1679 (void) unlink(m->state_file);
1680 (void) unlink(temp_path);
1681
1682 return log_error_errno(r, "Failed to save network state to %s: %m", m->state_file);
1683 }
1684
1685 static int manager_dirty_handler(sd_event_source *s, void *userdata) {
1686 Manager *m = userdata;
1687 Link *link;
1688 Iterator i;
1689
1690 assert(m);
1691
1692 if (m->dirty)
1693 manager_save(m);
1694
1695 SET_FOREACH(link, m->dirty_links, i)
1696 if (link_save(link) >= 0)
1697 link_clean(link);
1698
1699 return 1;
1700 }
1701
1702 static int signal_terminate_callback(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
1703 Manager *m = userdata;
1704
1705 assert(m);
1706 m->restarting = false;
1707
1708 log_debug("Terminate operation initiated.");
1709
1710 return sd_event_exit(sd_event_source_get_event(s), 0);
1711 }
1712
1713 static int signal_restart_callback(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
1714 Manager *m = userdata;
1715
1716 assert(m);
1717 m->restarting = true;
1718
1719 log_debug("Restart operation initiated.");
1720
1721 return sd_event_exit(sd_event_source_get_event(s), 0);
1722 }
1723
1724 int manager_new(Manager **ret) {
1725 _cleanup_(manager_freep) Manager *m = NULL;
1726 int r;
1727
1728 m = new(Manager, 1);
1729 if (!m)
1730 return -ENOMEM;
1731
1732 *m = (Manager) {
1733 .speed_meter_interval_usec = SPEED_METER_DEFAULT_TIME_INTERVAL,
1734 };
1735
1736 m->state_file = strdup("/run/systemd/netif/state");
1737 if (!m->state_file)
1738 return -ENOMEM;
1739
1740 r = sd_event_default(&m->event);
1741 if (r < 0)
1742 return r;
1743
1744 assert_se(sigprocmask_many(SIG_SETMASK, NULL, SIGINT, SIGTERM, SIGUSR2, -1) >= 0);
1745
1746 (void) sd_event_set_watchdog(m->event, true);
1747 (void) sd_event_add_signal(m->event, NULL, SIGTERM, signal_terminate_callback, m);
1748 (void) sd_event_add_signal(m->event, NULL, SIGINT, signal_terminate_callback, m);
1749 (void) sd_event_add_signal(m->event, NULL, SIGUSR2, signal_restart_callback, m);
1750
1751 r = sd_event_add_post(m->event, NULL, manager_dirty_handler, m);
1752 if (r < 0)
1753 return r;
1754
1755 r = manager_connect_rtnl(m);
1756 if (r < 0)
1757 return r;
1758
1759 r = manager_connect_genl(m);
1760 if (r < 0)
1761 return r;
1762
1763 r = manager_connect_udev(m);
1764 if (r < 0)
1765 return r;
1766
1767 r = sd_resolve_default(&m->resolve);
1768 if (r < 0)
1769 return r;
1770
1771 r = sd_resolve_attach_event(m->resolve, m->event, 0);
1772 if (r < 0)
1773 return r;
1774
1775 r = setup_default_address_pool(m);
1776 if (r < 0)
1777 return r;
1778
1779 m->duid.type = DUID_TYPE_EN;
1780
1781 (void) routing_policy_load_rules(m->state_file, &m->rules_saved);
1782
1783 *ret = TAKE_PTR(m);
1784
1785 return 0;
1786 }
1787
1788 void manager_free(Manager *m) {
1789 struct in6_addr *a;
1790 AddressPool *pool;
1791 Link *link;
1792
1793 if (!m)
1794 return;
1795
1796 free(m->state_file);
1797
1798 while ((a = hashmap_first_key(m->dhcp6_prefixes)))
1799 (void) dhcp6_prefix_remove(m, a);
1800 m->dhcp6_prefixes = hashmap_free(m->dhcp6_prefixes);
1801
1802 while ((link = hashmap_steal_first(m->links))) {
1803 if (link->dhcp6_client)
1804 (void) dhcp6_lease_pd_prefix_lost(link->dhcp6_client, link);
1805
1806 (void) link_stop_clients(link, true);
1807
1808 link_unref(link);
1809 }
1810
1811 m->dirty_links = set_free_with_destructor(m->dirty_links, link_unref);
1812 m->links_requesting_uuid = set_free_with_destructor(m->links_requesting_uuid, link_unref);
1813 m->links = hashmap_free_with_destructor(m->links, link_unref);
1814
1815 m->duids_requesting_uuid = set_free(m->duids_requesting_uuid);
1816 m->networks = ordered_hashmap_free_with_destructor(m->networks, network_unref);
1817
1818 m->netdevs = hashmap_free_with_destructor(m->netdevs, netdev_unref);
1819
1820 while ((pool = m->address_pools))
1821 address_pool_free(pool);
1822
1823 /* routing_policy_rule_free() access m->rules and m->rules_foreign.
1824 * So, it is necessary to set NULL after the sets are freed. */
1825 m->rules = set_free_with_destructor(m->rules, routing_policy_rule_free);
1826 m->rules_foreign = set_free_with_destructor(m->rules_foreign, routing_policy_rule_free);
1827 set_free_with_destructor(m->rules_saved, routing_policy_rule_free);
1828
1829 sd_netlink_unref(m->rtnl);
1830 sd_netlink_unref(m->genl);
1831 sd_resolve_unref(m->resolve);
1832
1833 sd_event_source_unref(m->speed_meter_event_source);
1834 sd_event_unref(m->event);
1835
1836 sd_device_monitor_unref(m->device_monitor);
1837
1838 bus_verify_polkit_async_registry_free(m->polkit_registry);
1839 sd_bus_flush_close_unref(m->bus);
1840
1841 free(m->dynamic_timezone);
1842 free(m->dynamic_hostname);
1843
1844 free(m);
1845 }
1846
1847 int manager_start(Manager *m) {
1848 Link *link;
1849 Iterator i;
1850 int r;
1851
1852 assert(m);
1853
1854 r = manager_start_speed_meter(m);
1855 if (r < 0)
1856 return log_error_errno(r, "Failed to initialize speed meter: %m");
1857
1858 /* The dirty handler will deal with future serialization, but the first one
1859 must be done explicitly. */
1860
1861 manager_save(m);
1862
1863 HASHMAP_FOREACH(link, m->links, i)
1864 link_save(link);
1865
1866 return 0;
1867 }
1868
1869 int manager_load_config(Manager *m) {
1870 int r;
1871
1872 /* update timestamp */
1873 paths_check_timestamp(NETWORK_DIRS, &m->network_dirs_ts_usec, true);
1874
1875 r = netdev_load(m, false);
1876 if (r < 0)
1877 return r;
1878
1879 r = network_load(m, &m->networks);
1880 if (r < 0)
1881 return r;
1882
1883 return 0;
1884 }
1885
1886 bool manager_should_reload(Manager *m) {
1887 return paths_check_timestamp(NETWORK_DIRS, &m->network_dirs_ts_usec, false);
1888 }
1889
1890 int manager_rtnl_enumerate_links(Manager *m) {
1891 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
1892 sd_netlink_message *link;
1893 int r;
1894
1895 assert(m);
1896 assert(m->rtnl);
1897
1898 r = sd_rtnl_message_new_link(m->rtnl, &req, RTM_GETLINK, 0);
1899 if (r < 0)
1900 return r;
1901
1902 r = sd_netlink_message_request_dump(req, true);
1903 if (r < 0)
1904 return r;
1905
1906 r = sd_netlink_call(m->rtnl, req, 0, &reply);
1907 if (r < 0)
1908 return r;
1909
1910 for (link = reply; link; link = sd_netlink_message_next(link)) {
1911 int k;
1912
1913 m->enumerating = true;
1914
1915 k = manager_rtnl_process_link(m->rtnl, link, m);
1916 if (k < 0)
1917 r = k;
1918
1919 m->enumerating = false;
1920 }
1921
1922 return r;
1923 }
1924
1925 int manager_rtnl_enumerate_addresses(Manager *m) {
1926 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
1927 sd_netlink_message *addr;
1928 int r;
1929
1930 assert(m);
1931 assert(m->rtnl);
1932
1933 r = sd_rtnl_message_new_addr(m->rtnl, &req, RTM_GETADDR, 0, 0);
1934 if (r < 0)
1935 return r;
1936
1937 r = sd_netlink_message_request_dump(req, true);
1938 if (r < 0)
1939 return r;
1940
1941 r = sd_netlink_call(m->rtnl, req, 0, &reply);
1942 if (r < 0)
1943 return r;
1944
1945 for (addr = reply; addr; addr = sd_netlink_message_next(addr)) {
1946 int k;
1947
1948 m->enumerating = true;
1949
1950 k = manager_rtnl_process_address(m->rtnl, addr, m);
1951 if (k < 0)
1952 r = k;
1953
1954 m->enumerating = false;
1955 }
1956
1957 return r;
1958 }
1959
1960 int manager_rtnl_enumerate_neighbors(Manager *m) {
1961 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
1962 sd_netlink_message *neigh;
1963 int r;
1964
1965 assert(m);
1966 assert(m->rtnl);
1967
1968 r = sd_rtnl_message_new_neigh(m->rtnl, &req, RTM_GETNEIGH, 0, AF_UNSPEC);
1969 if (r < 0)
1970 return r;
1971
1972 r = sd_netlink_message_request_dump(req, true);
1973 if (r < 0)
1974 return r;
1975
1976 r = sd_netlink_call(m->rtnl, req, 0, &reply);
1977 if (r < 0)
1978 return r;
1979
1980 for (neigh = reply; neigh; neigh = sd_netlink_message_next(neigh)) {
1981 int k;
1982
1983 m->enumerating = true;
1984
1985 k = manager_rtnl_process_neighbor(m->rtnl, neigh, m);
1986 if (k < 0)
1987 r = k;
1988
1989 m->enumerating = false;
1990 }
1991
1992 return r;
1993 }
1994
1995 int manager_rtnl_enumerate_routes(Manager *m) {
1996 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
1997 sd_netlink_message *route;
1998 int r;
1999
2000 assert(m);
2001 assert(m->rtnl);
2002
2003 r = sd_rtnl_message_new_route(m->rtnl, &req, RTM_GETROUTE, 0, 0);
2004 if (r < 0)
2005 return r;
2006
2007 r = sd_netlink_message_request_dump(req, true);
2008 if (r < 0)
2009 return r;
2010
2011 r = sd_netlink_call(m->rtnl, req, 0, &reply);
2012 if (r < 0)
2013 return r;
2014
2015 for (route = reply; route; route = sd_netlink_message_next(route)) {
2016 int k;
2017
2018 m->enumerating = true;
2019
2020 k = manager_rtnl_process_route(m->rtnl, route, m);
2021 if (k < 0)
2022 r = k;
2023
2024 m->enumerating = false;
2025 }
2026
2027 return r;
2028 }
2029
2030 int manager_rtnl_enumerate_rules(Manager *m) {
2031 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
2032 sd_netlink_message *rule;
2033 int r;
2034
2035 assert(m);
2036 assert(m->rtnl);
2037
2038 r = sd_rtnl_message_new_routing_policy_rule(m->rtnl, &req, RTM_GETRULE, 0);
2039 if (r < 0)
2040 return r;
2041
2042 r = sd_netlink_message_request_dump(req, true);
2043 if (r < 0)
2044 return r;
2045
2046 r = sd_netlink_call(m->rtnl, req, 0, &reply);
2047 if (r < 0) {
2048 if (r == -EOPNOTSUPP) {
2049 log_debug("FIB Rules are not supported by the kernel. Ignoring.");
2050 return 0;
2051 }
2052
2053 return r;
2054 }
2055
2056 for (rule = reply; rule; rule = sd_netlink_message_next(rule)) {
2057 int k;
2058
2059 m->enumerating = true;
2060
2061 k = manager_rtnl_process_rule(m->rtnl, rule, m);
2062 if (k < 0)
2063 r = k;
2064
2065 m->enumerating = false;
2066 }
2067
2068 return r;
2069 }
2070
2071 int manager_rtnl_enumerate_nexthop(Manager *m) {
2072 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
2073 sd_netlink_message *nexthop;
2074 int r;
2075
2076 assert(m);
2077 assert(m->rtnl);
2078
2079 r = sd_rtnl_message_new_nexthop(m->rtnl, &req, RTM_GETNEXTHOP, 0, 0);
2080 if (r < 0)
2081 return r;
2082
2083 r = sd_netlink_message_request_dump(req, true);
2084 if (r < 0)
2085 return r;
2086
2087 r = sd_netlink_call(m->rtnl, req, 0, &reply);
2088 if (r < 0) {
2089 if (r == -EOPNOTSUPP) {
2090 log_debug("Nexthop are not supported by the kernel. Ignoring.");
2091 return 0;
2092 }
2093
2094 return r;
2095 }
2096
2097 for (nexthop = reply; nexthop; nexthop = sd_netlink_message_next(nexthop)) {
2098 int k;
2099
2100 m->enumerating = true;
2101
2102 k = manager_rtnl_process_nexthop(m->rtnl, nexthop, m);
2103 if (k < 0)
2104 r = k;
2105
2106 m->enumerating = false;
2107 }
2108
2109 return r;
2110 }
2111
2112 int manager_address_pool_acquire(Manager *m, int family, unsigned prefixlen, union in_addr_union *found) {
2113 AddressPool *p;
2114 int r;
2115
2116 assert(m);
2117 assert(prefixlen > 0);
2118 assert(found);
2119
2120 LIST_FOREACH(address_pools, p, m->address_pools) {
2121 if (p->family != family)
2122 continue;
2123
2124 r = address_pool_acquire(p, prefixlen, found);
2125 if (r != 0)
2126 return r;
2127 }
2128
2129 return 0;
2130 }
2131
2132 Link* manager_find_uplink(Manager *m, Link *exclude) {
2133 _cleanup_free_ struct local_address *gateways = NULL;
2134 int n, i;
2135
2136 assert(m);
2137
2138 /* Looks for a suitable "uplink", via black magic: an
2139 * interface that is up and where the default route with the
2140 * highest priority points to. */
2141
2142 n = local_gateways(m->rtnl, 0, AF_UNSPEC, &gateways);
2143 if (n < 0) {
2144 log_warning_errno(n, "Failed to determine list of default gateways: %m");
2145 return NULL;
2146 }
2147
2148 for (i = 0; i < n; i++) {
2149 Link *link;
2150
2151 link = hashmap_get(m->links, INT_TO_PTR(gateways[i].ifindex));
2152 if (!link) {
2153 log_debug("Weird, found a gateway for a link we don't know. Ignoring.");
2154 continue;
2155 }
2156
2157 if (link == exclude)
2158 continue;
2159
2160 if (link->operstate < LINK_OPERSTATE_ROUTABLE)
2161 continue;
2162
2163 return link;
2164 }
2165
2166 return NULL;
2167 }
2168
2169 void manager_dirty(Manager *manager) {
2170 assert(manager);
2171
2172 /* the serialized state in /run is no longer up-to-date */
2173 manager->dirty = true;
2174 }
2175
2176 static int set_hostname_handler(sd_bus_message *m, void *userdata, sd_bus_error *ret_error) {
2177 Manager *manager = userdata;
2178 const sd_bus_error *e;
2179
2180 assert(m);
2181 assert(manager);
2182
2183 e = sd_bus_message_get_error(m);
2184 if (e)
2185 log_warning_errno(sd_bus_error_get_errno(e), "Could not set hostname: %s", e->message);
2186
2187 return 1;
2188 }
2189
2190 int manager_set_hostname(Manager *m, const char *hostname) {
2191 int r;
2192
2193 log_debug("Setting transient hostname: '%s'", strna(hostname));
2194
2195 if (free_and_strdup(&m->dynamic_hostname, hostname) < 0)
2196 return log_oom();
2197
2198 if (!m->bus || sd_bus_is_ready(m->bus) <= 0) {
2199 log_debug("Not connected to system bus, setting hostname later.");
2200 return 0;
2201 }
2202
2203 r = sd_bus_call_method_async(
2204 m->bus,
2205 NULL,
2206 "org.freedesktop.hostname1",
2207 "/org/freedesktop/hostname1",
2208 "org.freedesktop.hostname1",
2209 "SetHostname",
2210 set_hostname_handler,
2211 m,
2212 "sb",
2213 hostname,
2214 false);
2215
2216 if (r < 0)
2217 return log_error_errno(r, "Could not set transient hostname: %m");
2218
2219 return 0;
2220 }
2221
2222 static int set_timezone_handler(sd_bus_message *m, void *userdata, sd_bus_error *ret_error) {
2223 Manager *manager = userdata;
2224 const sd_bus_error *e;
2225
2226 assert(m);
2227 assert(manager);
2228
2229 e = sd_bus_message_get_error(m);
2230 if (e)
2231 log_warning_errno(sd_bus_error_get_errno(e), "Could not set timezone: %s", e->message);
2232
2233 return 1;
2234 }
2235
2236 int manager_set_timezone(Manager *m, const char *tz) {
2237 int r;
2238
2239 assert(m);
2240 assert(tz);
2241
2242 log_debug("Setting system timezone: '%s'", tz);
2243 if (free_and_strdup(&m->dynamic_timezone, tz) < 0)
2244 return log_oom();
2245
2246 if (!m->bus || sd_bus_is_ready(m->bus) <= 0) {
2247 log_debug("Not connected to system bus, setting timezone later.");
2248 return 0;
2249 }
2250
2251 r = sd_bus_call_method_async(
2252 m->bus,
2253 NULL,
2254 "org.freedesktop.timedate1",
2255 "/org/freedesktop/timedate1",
2256 "org.freedesktop.timedate1",
2257 "SetTimezone",
2258 set_timezone_handler,
2259 m,
2260 "sb",
2261 tz,
2262 false);
2263 if (r < 0)
2264 return log_error_errno(r, "Could not set timezone: %m");
2265
2266 return 0;
2267 }
2268
2269 int manager_request_product_uuid(Manager *m, Link *link) {
2270 int r;
2271
2272 assert(m);
2273
2274 if (m->has_product_uuid)
2275 return 0;
2276
2277 log_debug("Requesting product UUID");
2278
2279 if (link) {
2280 DUID *duid;
2281
2282 assert_se(duid = link_get_duid(link));
2283
2284 r = set_ensure_allocated(&m->links_requesting_uuid, NULL);
2285 if (r < 0)
2286 return log_oom();
2287
2288 r = set_ensure_allocated(&m->duids_requesting_uuid, NULL);
2289 if (r < 0)
2290 return log_oom();
2291
2292 r = set_put(m->links_requesting_uuid, link);
2293 if (r < 0)
2294 return log_oom();
2295
2296 r = set_put(m->duids_requesting_uuid, duid);
2297 if (r < 0)
2298 return log_oom();
2299
2300 link_ref(link);
2301 }
2302
2303 if (!m->bus || sd_bus_is_ready(m->bus) <= 0) {
2304 log_debug("Not connected to system bus, requesting product UUID later.");
2305 return 0;
2306 }
2307
2308 r = sd_bus_call_method_async(
2309 m->bus,
2310 NULL,
2311 "org.freedesktop.hostname1",
2312 "/org/freedesktop/hostname1",
2313 "org.freedesktop.hostname1",
2314 "GetProductUUID",
2315 get_product_uuid_handler,
2316 m,
2317 "b",
2318 false);
2319 if (r < 0)
2320 return log_warning_errno(r, "Failed to get product UUID: %m");
2321
2322 return 0;
2323 }