]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/network/networkd-manager.c
Merge pull request #653 from dvdhrm/bus-gold
[thirdparty/systemd.git] / src / network / networkd-manager.c
1 /***
2 This file is part of systemd.
3
4 Copyright 2013 Tom Gundersen <teg@jklm.no>
5
6 systemd is free software; you can redistribute it and/or modify it
7 under the terms of the GNU Lesser General Public License as published by
8 the Free Software Foundation; either version 2.1 of the License, or
9 (at your option) any later version.
10
11 systemd is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 Lesser General Public License for more details.
15
16 You should have received a copy of the GNU Lesser General Public License
17 along with systemd; If not, see <http://www.gnu.org/licenses/>.
18 ***/
19
20 #include <sys/socket.h>
21 #include <linux/if.h>
22
23 #include "sd-daemon.h"
24 #include "sd-netlink.h"
25
26 #include "alloc-util.h"
27 #include "bus-util.h"
28 #include "conf-parser.h"
29 #include "def.h"
30 #include "dns-domain.h"
31 #include "fd-util.h"
32 #include "fileio.h"
33 #include "libudev-private.h"
34 #include "local-addresses.h"
35 #include "netlink-util.h"
36 #include "networkd.h"
37 #include "ordered-set.h"
38 #include "path-util.h"
39 #include "set.h"
40 #include "udev-util.h"
41 #include "virt.h"
42
43 /* use 8 MB for receive socket kernel queue. */
44 #define RCVBUF_SIZE (8*1024*1024)
45
46 const char* const network_dirs[] = {
47 "/etc/systemd/network",
48 "/run/systemd/network",
49 "/usr/lib/systemd/network",
50 #ifdef HAVE_SPLIT_USR
51 "/lib/systemd/network",
52 #endif
53 NULL};
54
55 static int setup_default_address_pool(Manager *m) {
56 AddressPool *p;
57 int r;
58
59 assert(m);
60
61 /* Add in the well-known private address ranges. */
62
63 r = address_pool_new_from_string(m, &p, AF_INET6, "fc00::", 7);
64 if (r < 0)
65 return r;
66
67 r = address_pool_new_from_string(m, &p, AF_INET, "192.168.0.0", 16);
68 if (r < 0)
69 return r;
70
71 r = address_pool_new_from_string(m, &p, AF_INET, "172.16.0.0", 12);
72 if (r < 0)
73 return r;
74
75 r = address_pool_new_from_string(m, &p, AF_INET, "10.0.0.0", 8);
76 if (r < 0)
77 return r;
78
79 return 0;
80 }
81
82 static int on_bus_retry(sd_event_source *s, usec_t usec, void *userdata) {
83 Manager *m = userdata;
84
85 assert(s);
86 assert(m);
87
88 m->bus_retry_event_source = sd_event_source_unref(m->bus_retry_event_source);
89
90 manager_connect_bus(m);
91
92 return 0;
93 }
94
95 static int manager_reset_all(Manager *m) {
96 Link *link;
97 Iterator i;
98 int r;
99
100 assert(m);
101
102 HASHMAP_FOREACH(link, m->links, i) {
103 r = link_carrier_reset(link);
104 if (r < 0)
105 log_link_warning_errno(link, r, "Could not reset carrier: %m");
106 }
107
108 return 0;
109 }
110
111 static int match_prepare_for_sleep(sd_bus_message *message, void *userdata, sd_bus_error *ret_error) {
112 Manager *m = userdata;
113 int b, r;
114
115 assert(message);
116
117 r = sd_bus_message_read(message, "b", &b);
118 if (r < 0) {
119 log_debug_errno(r, "Failed to parse PrepareForSleep signal: %m");
120 return 0;
121 }
122
123 if (b)
124 return 0;
125
126 log_debug("Coming back from suspend, resetting all connections...");
127
128 manager_reset_all(m);
129
130 return 0;
131 }
132
133 int manager_connect_bus(Manager *m) {
134 int r;
135
136 assert(m);
137
138 r = sd_bus_default_system(&m->bus);
139 if (r == -ENOENT) {
140 /* We failed to connect? Yuck, we must be in early
141 * boot. Let's try in 5s again. As soon as we have
142 * kdbus we can stop doing this... */
143
144 log_debug_errno(r, "Failed to connect to bus, trying again in 5s: %m");
145
146 r = sd_event_add_time(m->event, &m->bus_retry_event_source, CLOCK_MONOTONIC, now(CLOCK_MONOTONIC) + 5*USEC_PER_SEC, 0, on_bus_retry, m);
147 if (r < 0)
148 return log_error_errno(r, "Failed to install bus reconnect time event: %m");
149
150 return 0;
151 }
152
153 if (r < 0)
154 return r;
155
156 r = sd_bus_add_match(m->bus, &m->prepare_for_sleep_slot,
157 "type='signal',"
158 "sender='org.freedesktop.login1',"
159 "interface='org.freedesktop.login1.Manager',"
160 "member='PrepareForSleep',"
161 "path='/org/freedesktop/login1'",
162 match_prepare_for_sleep,
163 m);
164 if (r < 0)
165 return log_error_errno(r, "Failed to add match for PrepareForSleep: %m");
166
167 r = sd_bus_add_object_vtable(m->bus, NULL, "/org/freedesktop/network1", "org.freedesktop.network1.Manager", manager_vtable, m);
168 if (r < 0)
169 return log_error_errno(r, "Failed to add manager object vtable: %m");
170
171 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/network1/link", "org.freedesktop.network1.Link", link_vtable, link_object_find, m);
172 if (r < 0)
173 return log_error_errno(r, "Failed to add link object vtable: %m");
174
175 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/network1/link", link_node_enumerator, m);
176 if (r < 0)
177 return log_error_errno(r, "Failed to add link enumerator: %m");
178
179 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/network1/link", "org.freedesktop.network1.Link.Lease", lease_vtable, lease_object_find, m);
180 if (r < 0)
181 return log_error_errno(r, "Failed to add lease object vtable: %m");
182
183 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/network1/link", lease_node_enumerator, m);
184 if (r < 0)
185 return log_error_errno(r, "Failed to add lease enumerator: %m");
186
187 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/network1/network", "org.freedesktop.network1.Network", network_vtable, network_object_find, m);
188 if (r < 0)
189 return log_error_errno(r, "Failed to add network object vtable: %m");
190
191 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/network1/network", network_node_enumerator, m);
192 if (r < 0)
193 return log_error_errno(r, "Failed to add network enumerator: %m");
194
195 r = sd_bus_request_name(m->bus, "org.freedesktop.network1", 0);
196 if (r < 0)
197 return log_error_errno(r, "Failed to register name: %m");
198
199 r = sd_bus_attach_event(m->bus, m->event, 0);
200 if (r < 0)
201 return log_error_errno(r, "Failed to attach bus to event loop: %m");
202
203 return 0;
204 }
205
206 static int manager_udev_process_link(Manager *m, struct udev_device *device) {
207 Link *link = NULL;
208 int r, ifindex;
209
210 assert(m);
211 assert(device);
212
213 if (!streq_ptr(udev_device_get_action(device), "add"))
214 return 0;
215
216 ifindex = udev_device_get_ifindex(device);
217 if (ifindex <= 0) {
218 log_debug("Ignoring udev ADD event for device with invalid ifindex");
219 return 0;
220 }
221
222 r = link_get(m, ifindex, &link);
223 if (r == -ENODEV)
224 return 0;
225 else if (r < 0)
226 return r;
227
228 r = link_initialized(link, device);
229 if (r < 0)
230 return r;
231
232 return 0;
233 }
234
235 static int manager_dispatch_link_udev(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
236 Manager *m = userdata;
237 struct udev_monitor *monitor = m->udev_monitor;
238 _cleanup_udev_device_unref_ struct udev_device *device = NULL;
239
240 device = udev_monitor_receive_device(monitor);
241 if (!device)
242 return -ENOMEM;
243
244 manager_udev_process_link(m, device);
245 return 0;
246 }
247
248 static int manager_connect_udev(Manager *m) {
249 int r;
250
251 /* udev does not initialize devices inside containers,
252 * so we rely on them being already initialized before
253 * entering the container */
254 if (detect_container() > 0)
255 return 0;
256
257 m->udev = udev_new();
258 if (!m->udev)
259 return -ENOMEM;
260
261 m->udev_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
262 if (!m->udev_monitor)
263 return -ENOMEM;
264
265 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_monitor, "net", NULL);
266 if (r < 0)
267 return log_error_errno(r, "Could not add udev monitor filter: %m");
268
269 r = udev_monitor_enable_receiving(m->udev_monitor);
270 if (r < 0) {
271 log_error("Could not enable udev monitor");
272 return r;
273 }
274
275 r = sd_event_add_io(m->event,
276 &m->udev_event_source,
277 udev_monitor_get_fd(m->udev_monitor),
278 EPOLLIN, manager_dispatch_link_udev,
279 m);
280 if (r < 0)
281 return r;
282
283 r = sd_event_source_set_description(m->udev_event_source, "networkd-udev");
284 if (r < 0)
285 return r;
286
287 return 0;
288 }
289
290 int manager_rtnl_process_route(sd_netlink *rtnl, sd_netlink_message *message, void *userdata) {
291 Manager *m = userdata;
292 Link *link = NULL;
293 uint16_t type;
294 uint32_t ifindex, priority = 0;
295 unsigned char protocol, scope, tos, table;
296 int family;
297 unsigned char dst_prefixlen, src_prefixlen;
298 union in_addr_union dst = {}, gw = {}, src = {}, prefsrc = {};
299 Route *route = NULL;
300 int r;
301
302 assert(rtnl);
303 assert(message);
304 assert(m);
305
306 if (sd_netlink_message_is_error(message)) {
307 r = sd_netlink_message_get_errno(message);
308 if (r < 0)
309 log_warning_errno(r, "rtnl: failed to receive route: %m");
310
311 return 0;
312 }
313
314 r = sd_netlink_message_get_type(message, &type);
315 if (r < 0) {
316 log_warning_errno(r, "rtnl: could not get message type: %m");
317 return 0;
318 } else if (type != RTM_NEWROUTE && type != RTM_DELROUTE) {
319 log_warning("rtnl: received unexpected message type when processing route");
320 return 0;
321 }
322
323 r = sd_netlink_message_read_u32(message, RTA_OIF, &ifindex);
324 if (r == -ENODATA) {
325 log_debug("rtnl: received route without ifindex, ignoring");
326 return 0;
327 } else if (r < 0) {
328 log_warning_errno(r, "rtnl: could not get ifindex from route, ignoring: %m");
329 return 0;
330 } else if (ifindex <= 0) {
331 log_warning("rtnl: received route message with invalid ifindex, ignoring: %d", ifindex);
332 return 0;
333 } else {
334 r = link_get(m, ifindex, &link);
335 if (r < 0 || !link) {
336 /* when enumerating we might be out of sync, but we will
337 * get the route again, so just ignore it */
338 if (!m->enumerating)
339 log_warning("rtnl: received route for nonexistent link (%d), ignoring", ifindex);
340 return 0;
341 }
342 }
343
344 r = sd_rtnl_message_route_get_family(message, &family);
345 if (r < 0 || !IN_SET(family, AF_INET, AF_INET6)) {
346 log_link_warning(link, "rtnl: received address with invalid family, ignoring.");
347 return 0;
348 }
349
350 r = sd_rtnl_message_route_get_protocol(message, &protocol);
351 if (r < 0) {
352 log_warning_errno(r, "rtnl: could not get route protocol: %m");
353 return 0;
354 }
355
356 switch (family) {
357 case AF_INET:
358 r = sd_netlink_message_read_in_addr(message, RTA_DST, &dst.in);
359 if (r < 0 && r != -ENODATA) {
360 log_link_warning_errno(link, r, "rtnl: received route without valid destination, ignoring: %m");
361 return 0;
362 }
363
364 r = sd_netlink_message_read_in_addr(message, RTA_GATEWAY, &gw.in);
365 if (r < 0 && r != -ENODATA) {
366 log_link_warning_errno(link, r, "rtnl: received route with invalid gateway, ignoring: %m");
367 return 0;
368 }
369
370 r = sd_netlink_message_read_in_addr(message, RTA_SRC, &src.in);
371 if (r < 0 && r != -ENODATA) {
372 log_link_warning_errno(link, r, "rtnl: received route with invalid source, ignoring: %m");
373 return 0;
374 }
375
376 r = sd_netlink_message_read_in_addr(message, RTA_PREFSRC, &prefsrc.in);
377 if (r < 0 && r != -ENODATA) {
378 log_link_warning_errno(link, r, "rtnl: received route with invalid preferred source, ignoring: %m");
379 return 0;
380 }
381
382 break;
383
384 case AF_INET6:
385 r = sd_netlink_message_read_in6_addr(message, RTA_DST, &dst.in6);
386 if (r < 0 && r != -ENODATA) {
387 log_link_warning_errno(link, r, "rtnl: received route without valid destination, ignoring: %m");
388 return 0;
389 }
390
391 r = sd_netlink_message_read_in6_addr(message, RTA_GATEWAY, &gw.in6);
392 if (r < 0 && r != -ENODATA) {
393 log_link_warning_errno(link, r, "rtnl: received route with invalid gateway, ignoring: %m");
394 return 0;
395 }
396
397 r = sd_netlink_message_read_in6_addr(message, RTA_SRC, &src.in6);
398 if (r < 0 && r != -ENODATA) {
399 log_link_warning_errno(link, r, "rtnl: received route with invalid source, ignoring: %m");
400 return 0;
401 }
402
403 r = sd_netlink_message_read_in6_addr(message, RTA_PREFSRC, &prefsrc.in6);
404 if (r < 0 && r != -ENODATA) {
405 log_link_warning_errno(link, r, "rtnl: received route with invalid preferred source, ignoring: %m");
406 return 0;
407 }
408
409 break;
410
411 default:
412 log_link_debug(link, "rtnl: ignoring unsupported address family: %d", family);
413 return 0;
414 }
415
416 r = sd_rtnl_message_route_get_dst_prefixlen(message, &dst_prefixlen);
417 if (r < 0) {
418 log_link_warning_errno(link, r, "rtnl: received route with invalid destination prefixlen, ignoring: %m");
419 return 0;
420 }
421
422 r = sd_rtnl_message_route_get_src_prefixlen(message, &src_prefixlen);
423 if (r < 0) {
424 log_link_warning_errno(link, r, "rtnl: received route with invalid source prefixlen, ignoring: %m");
425 return 0;
426 }
427
428 r = sd_rtnl_message_route_get_scope(message, &scope);
429 if (r < 0) {
430 log_link_warning_errno(link, r, "rtnl: received route with invalid scope, ignoring: %m");
431 return 0;
432 }
433
434 r = sd_rtnl_message_route_get_tos(message, &tos);
435 if (r < 0) {
436 log_link_warning_errno(link, r, "rtnl: received route with invalid tos, ignoring: %m");
437 return 0;
438 }
439
440 r = sd_rtnl_message_route_get_table(message, &table);
441 if (r < 0) {
442 log_link_warning_errno(link, r, "rtnl: received route with invalid table, ignoring: %m");
443 return 0;
444 }
445
446 r = sd_netlink_message_read_u32(message, RTA_PRIORITY, &priority);
447 if (r < 0 && r != -ENODATA) {
448 log_link_warning_errno(link, r, "rtnl: received route with invalid priority, ignoring: %m");
449 return 0;
450 }
451
452 route_get(link, family, &dst, dst_prefixlen, tos, priority, table, &route);
453
454 switch (type) {
455 case RTM_NEWROUTE:
456 if (!route) {
457 /* A route appeared that we did not request */
458 r = route_add_foreign(link, family, &dst, dst_prefixlen, tos, priority, table, &route);
459 if (r < 0)
460 return 0;
461 }
462
463 route_update(route, &src, src_prefixlen, &gw, &prefsrc, scope, protocol);
464
465 break;
466
467 case RTM_DELROUTE:
468 route_free(route);
469 break;
470
471 default:
472 assert_not_reached("Received invalid RTNL message type");
473 }
474
475 return 1;
476 }
477
478 int manager_rtnl_process_address(sd_netlink *rtnl, sd_netlink_message *message, void *userdata) {
479 Manager *m = userdata;
480 Link *link = NULL;
481 uint16_t type;
482 unsigned char flags;
483 int family;
484 unsigned char prefixlen;
485 unsigned char scope;
486 union in_addr_union in_addr;
487 struct ifa_cacheinfo cinfo;
488 Address *address = NULL;
489 char buf[INET6_ADDRSTRLEN], valid_buf[FORMAT_TIMESPAN_MAX];
490 const char *valid_str = NULL;
491 int r, ifindex;
492
493 assert(rtnl);
494 assert(message);
495 assert(m);
496
497 if (sd_netlink_message_is_error(message)) {
498 r = sd_netlink_message_get_errno(message);
499 if (r < 0)
500 log_warning_errno(r, "rtnl: failed to receive address: %m");
501
502 return 0;
503 }
504
505 r = sd_netlink_message_get_type(message, &type);
506 if (r < 0) {
507 log_warning_errno(r, "rtnl: could not get message type: %m");
508 return 0;
509 } else if (type != RTM_NEWADDR && type != RTM_DELADDR) {
510 log_warning("rtnl: received unexpected message type when processing address");
511 return 0;
512 }
513
514 r = sd_rtnl_message_addr_get_ifindex(message, &ifindex);
515 if (r < 0) {
516 log_warning_errno(r, "rtnl: could not get ifindex from address: %m");
517 return 0;
518 } else if (ifindex <= 0) {
519 log_warning("rtnl: received address message with invalid ifindex: %d", ifindex);
520 return 0;
521 } else {
522 r = link_get(m, ifindex, &link);
523 if (r < 0 || !link) {
524 /* when enumerating we might be out of sync, but we will
525 * get the address again, so just ignore it */
526 if (!m->enumerating)
527 log_warning("rtnl: received address for nonexistent link (%d), ignoring", ifindex);
528 return 0;
529 }
530 }
531
532 r = sd_rtnl_message_addr_get_family(message, &family);
533 if (r < 0 || !IN_SET(family, AF_INET, AF_INET6)) {
534 log_link_warning(link, "rtnl: received address with invalid family, ignoring.");
535 return 0;
536 }
537
538 r = sd_rtnl_message_addr_get_prefixlen(message, &prefixlen);
539 if (r < 0) {
540 log_link_warning_errno(link, r, "rtnl: received address with invalid prefixlen, ignoring: %m");
541 return 0;
542 }
543
544 r = sd_rtnl_message_addr_get_scope(message, &scope);
545 if (r < 0) {
546 log_link_warning_errno(link, r, "rtnl: received address with invalid scope, ignoring: %m");
547 return 0;
548 }
549
550 r = sd_rtnl_message_addr_get_flags(message, &flags);
551 if (r < 0) {
552 log_link_warning_errno(link, r, "rtnl: received address with invalid flags, ignoring: %m");
553 return 0;
554 }
555
556 switch (family) {
557 case AF_INET:
558 r = sd_netlink_message_read_in_addr(message, IFA_LOCAL, &in_addr.in);
559 if (r < 0) {
560 log_link_warning_errno(link, r, "rtnl: received address without valid address, ignoring: %m");
561 return 0;
562 }
563
564 break;
565
566 case AF_INET6:
567 r = sd_netlink_message_read_in6_addr(message, IFA_ADDRESS, &in_addr.in6);
568 if (r < 0) {
569 log_link_warning_errno(link, r, "rtnl: received address without valid address, ignoring: %m");
570 return 0;
571 }
572
573 break;
574
575 default:
576 log_link_debug(link, "rtnl: ignoring unsupported address family: %d", family);
577 }
578
579 if (!inet_ntop(family, &in_addr, buf, INET6_ADDRSTRLEN)) {
580 log_link_warning(link, "Could not print address");
581 return 0;
582 }
583
584 r = sd_netlink_message_read_cache_info(message, IFA_CACHEINFO, &cinfo);
585 if (r >= 0) {
586 if (cinfo.ifa_valid != CACHE_INFO_INFINITY_LIFE_TIME)
587 valid_str = format_timespan(valid_buf, FORMAT_TIMESPAN_MAX,
588 cinfo.ifa_valid * USEC_PER_SEC,
589 USEC_PER_SEC);
590 }
591
592 address_get(link, family, &in_addr, prefixlen, &address);
593
594 switch (type) {
595 case RTM_NEWADDR:
596 if (address)
597 log_link_debug(link, "Updating address: %s/%u (valid %s%s)", buf, prefixlen,
598 valid_str ? "for " : "forever", valid_str ?: "");
599 else {
600 /* An address appeared that we did not request */
601 r = address_add_foreign(link, family, &in_addr, prefixlen, &address);
602 if (r < 0) {
603 log_link_warning_errno(link, r, "Failed to add address %s/%u: %m", buf, prefixlen);
604 return 0;
605 } else
606 log_link_debug(link, "Adding address: %s/%u (valid %s%s)", buf, prefixlen,
607 valid_str ? "for " : "forever", valid_str ?: "");
608 }
609
610 address_update(address, flags, scope, &cinfo);
611
612 break;
613
614 case RTM_DELADDR:
615
616 if (address) {
617 log_link_debug(link, "Removing address: %s/%u (valid %s%s)", buf, prefixlen,
618 valid_str ? "for " : "forever", valid_str ?: "");
619 address_drop(address);
620 } else
621 log_link_warning(link, "Removing non-existent address: %s/%u (valid %s%s)", buf, prefixlen,
622 valid_str ? "for " : "forever", valid_str ?: "");
623
624 break;
625 default:
626 assert_not_reached("Received invalid RTNL message type");
627 }
628
629 return 1;
630 }
631
632 static int manager_rtnl_process_link(sd_netlink *rtnl, sd_netlink_message *message, void *userdata) {
633 Manager *m = userdata;
634 Link *link = NULL;
635 NetDev *netdev = NULL;
636 uint16_t type;
637 const char *name;
638 int r, ifindex;
639
640 assert(rtnl);
641 assert(message);
642 assert(m);
643
644 if (sd_netlink_message_is_error(message)) {
645 r = sd_netlink_message_get_errno(message);
646 if (r < 0)
647 log_warning_errno(r, "rtnl: Could not receive link: %m");
648
649 return 0;
650 }
651
652 r = sd_netlink_message_get_type(message, &type);
653 if (r < 0) {
654 log_warning_errno(r, "rtnl: Could not get message type: %m");
655 return 0;
656 } else if (type != RTM_NEWLINK && type != RTM_DELLINK) {
657 log_warning("rtnl: Received unexpected message type when processing link");
658 return 0;
659 }
660
661 r = sd_rtnl_message_link_get_ifindex(message, &ifindex);
662 if (r < 0) {
663 log_warning_errno(r, "rtnl: Could not get ifindex from link: %m");
664 return 0;
665 } else if (ifindex <= 0) {
666 log_warning("rtnl: received link message with invalid ifindex: %d", ifindex);
667 return 0;
668 }
669
670 r = sd_netlink_message_read_string(message, IFLA_IFNAME, &name);
671 if (r < 0) {
672 log_warning_errno(r, "rtnl: Received link message without ifname: %m");
673 return 0;
674 }
675
676 (void) link_get(m, ifindex, &link);
677 (void) netdev_get(m, name, &netdev);
678
679 switch (type) {
680 case RTM_NEWLINK:
681 if (!link) {
682 /* link is new, so add it */
683 r = link_add(m, message, &link);
684 if (r < 0) {
685 log_warning_errno(r, "Could not add new link: %m");
686 return 0;
687 }
688 }
689
690 if (netdev) {
691 /* netdev exists, so make sure the ifindex matches */
692 r = netdev_set_ifindex(netdev, message);
693 if (r < 0) {
694 log_warning_errno(r, "Could not set ifindex on netdev: %m");
695 return 0;
696 }
697 }
698
699 r = link_update(link, message);
700 if (r < 0)
701 return 0;
702
703 break;
704
705 case RTM_DELLINK:
706 link_drop(link);
707 netdev_drop(netdev);
708
709 break;
710
711 default:
712 assert_not_reached("Received invalid RTNL message type.");
713 }
714
715 return 1;
716 }
717
718 static int systemd_netlink_fd(void) {
719 int n, fd, rtnl_fd = -EINVAL;
720
721 n = sd_listen_fds(true);
722 if (n <= 0)
723 return -EINVAL;
724
725 for (fd = SD_LISTEN_FDS_START; fd < SD_LISTEN_FDS_START + n; fd ++) {
726 if (sd_is_socket(fd, AF_NETLINK, SOCK_RAW, -1) > 0) {
727 if (rtnl_fd >= 0)
728 return -EINVAL;
729
730 rtnl_fd = fd;
731 }
732 }
733
734 return rtnl_fd;
735 }
736
737 static int manager_connect_rtnl(Manager *m) {
738 int fd, r;
739
740 assert(m);
741
742 fd = systemd_netlink_fd();
743 if (fd < 0)
744 r = sd_netlink_open(&m->rtnl);
745 else
746 r = sd_netlink_open_fd(&m->rtnl, fd);
747 if (r < 0)
748 return r;
749
750 r = sd_netlink_inc_rcvbuf(m->rtnl, RCVBUF_SIZE);
751 if (r < 0)
752 return r;
753
754 r = sd_netlink_attach_event(m->rtnl, m->event, 0);
755 if (r < 0)
756 return r;
757
758 r = sd_netlink_add_match(m->rtnl, RTM_NEWLINK, &manager_rtnl_process_link, m);
759 if (r < 0)
760 return r;
761
762 r = sd_netlink_add_match(m->rtnl, RTM_DELLINK, &manager_rtnl_process_link, m);
763 if (r < 0)
764 return r;
765
766 r = sd_netlink_add_match(m->rtnl, RTM_NEWADDR, &manager_rtnl_process_address, m);
767 if (r < 0)
768 return r;
769
770 r = sd_netlink_add_match(m->rtnl, RTM_DELADDR, &manager_rtnl_process_address, m);
771 if (r < 0)
772 return r;
773
774 r = sd_netlink_add_match(m->rtnl, RTM_NEWROUTE, &manager_rtnl_process_route, m);
775 if (r < 0)
776 return r;
777
778 r = sd_netlink_add_match(m->rtnl, RTM_DELROUTE, &manager_rtnl_process_route, m);
779 if (r < 0)
780 return r;
781
782 return 0;
783 }
784
785 static int ordered_set_put_in_addr(OrderedSet *s, const struct in_addr *address) {
786 char *p;
787 int r;
788
789 assert(s);
790
791 r = in_addr_to_string(AF_INET, (const union in_addr_union*) address, &p);
792 if (r < 0)
793 return r;
794
795 r = ordered_set_consume(s, p);
796 if (r == -EEXIST)
797 return 0;
798
799 return r;
800 }
801
802 static int ordered_set_put_in_addrv(OrderedSet *s, const struct in_addr *addresses, int n) {
803 int r, i, c = 0;
804
805 assert(s);
806 assert(n <= 0 || addresses);
807
808 for (i = 0; i < n; i++) {
809 r = ordered_set_put_in_addr(s, addresses+i);
810 if (r < 0)
811 return r;
812
813 c += r;
814 }
815
816 return c;
817 }
818
819 static void print_string_set(FILE *f, const char *field, OrderedSet *s) {
820 bool space = false;
821 Iterator i;
822 char *p;
823
824 if (ordered_set_isempty(s))
825 return;
826
827 fputs(field, f);
828
829 ORDERED_SET_FOREACH(p, s, i)
830 fputs_with_space(f, p, NULL, &space);
831
832 fputc('\n', f);
833 }
834
835 static int manager_save(Manager *m) {
836 _cleanup_ordered_set_free_free_ OrderedSet *dns = NULL, *ntp = NULL, *search_domains = NULL, *route_domains = NULL;
837 Link *link;
838 Iterator i;
839 _cleanup_free_ char *temp_path = NULL;
840 _cleanup_fclose_ FILE *f = NULL;
841 LinkOperationalState operstate = LINK_OPERSTATE_OFF;
842 const char *operstate_str;
843 int r;
844
845 assert(m);
846 assert(m->state_file);
847
848 /* We add all NTP and DNS server to a set, to filter out duplicates */
849 dns = ordered_set_new(&string_hash_ops);
850 if (!dns)
851 return -ENOMEM;
852
853 ntp = ordered_set_new(&string_hash_ops);
854 if (!ntp)
855 return -ENOMEM;
856
857 search_domains = ordered_set_new(&dns_name_hash_ops);
858 if (!search_domains)
859 return -ENOMEM;
860
861 route_domains = ordered_set_new(&dns_name_hash_ops);
862 if (!route_domains)
863 return -ENOMEM;
864
865 HASHMAP_FOREACH(link, m->links, i) {
866 if (link->flags & IFF_LOOPBACK)
867 continue;
868
869 if (link->operstate > operstate)
870 operstate = link->operstate;
871
872 if (!link->network)
873 continue;
874
875 /* First add the static configured entries */
876 r = ordered_set_put_strdupv(dns, link->network->dns);
877 if (r < 0)
878 return r;
879
880 r = ordered_set_put_strdupv(ntp, link->network->ntp);
881 if (r < 0)
882 return r;
883
884 r = ordered_set_put_strdupv(search_domains, link->network->search_domains);
885 if (r < 0)
886 return r;
887
888 r = ordered_set_put_strdupv(route_domains, link->network->route_domains);
889 if (r < 0)
890 return r;
891
892 if (!link->dhcp_lease)
893 continue;
894
895 /* Secondly, add the entries acquired via DHCP */
896 if (link->network->dhcp_use_dns) {
897 const struct in_addr *addresses;
898
899 r = sd_dhcp_lease_get_dns(link->dhcp_lease, &addresses);
900 if (r > 0) {
901 r = ordered_set_put_in_addrv(dns, addresses, r);
902 if (r < 0)
903 return r;
904 } else if (r < 0 && r != -ENODATA)
905 return r;
906 }
907
908 if (link->network->dhcp_use_ntp) {
909 const struct in_addr *addresses;
910
911 r = sd_dhcp_lease_get_ntp(link->dhcp_lease, &addresses);
912 if (r > 0) {
913 r = ordered_set_put_in_addrv(ntp, addresses, r);
914 if (r < 0)
915 return r;
916 } else if (r < 0 && r != -ENODATA)
917 return r;
918 }
919
920 if (link->network->dhcp_use_domains != DHCP_USE_DOMAINS_NO) {
921 const char *domainname;
922
923 r = sd_dhcp_lease_get_domainname(link->dhcp_lease, &domainname);
924 if (r >= 0) {
925
926 if (link->network->dhcp_use_domains == DHCP_USE_DOMAINS_YES)
927 r = ordered_set_put_strdup(search_domains, domainname);
928 else
929 r = ordered_set_put_strdup(route_domains, domainname);
930
931 if (r < 0)
932 return r;
933 } else if (r != -ENODATA)
934 return r;
935 }
936 }
937
938 operstate_str = link_operstate_to_string(operstate);
939 assert(operstate_str);
940
941 r = fopen_temporary(m->state_file, &f, &temp_path);
942 if (r < 0)
943 return r;
944
945 fchmod(fileno(f), 0644);
946
947 fprintf(f,
948 "# This is private data. Do not parse.\n"
949 "OPER_STATE=%s\n", operstate_str);
950
951 print_string_set(f, "DNS=", dns);
952 print_string_set(f, "NTP=", ntp);
953 print_string_set(f, "DOMAINS=", search_domains);
954 print_string_set(f, "ROUTE_DOMAINS=", route_domains);
955
956 r = fflush_and_check(f);
957 if (r < 0)
958 goto fail;
959
960 if (rename(temp_path, m->state_file) < 0) {
961 r = -errno;
962 goto fail;
963 }
964
965 if (m->operational_state != operstate) {
966 m->operational_state = operstate;
967 r = manager_send_changed(m, "OperationalState", NULL);
968 if (r < 0)
969 log_error_errno(r, "Could not emit changed OperationalState: %m");
970 }
971
972 m->dirty = false;
973
974 return 0;
975
976 fail:
977 (void) unlink(m->state_file);
978 (void) unlink(temp_path);
979
980 return log_error_errno(r, "Failed to save network state to %s: %m", m->state_file);
981 }
982
983 static int manager_dirty_handler(sd_event_source *s, void *userdata) {
984 Manager *m = userdata;
985 Link *link;
986 Iterator i;
987 int r;
988
989 assert(m);
990
991 if (m->dirty)
992 manager_save(m);
993
994 SET_FOREACH(link, m->dirty_links, i) {
995 r = link_save(link);
996 if (r >= 0)
997 link_clean(link);
998 }
999
1000 return 1;
1001 }
1002
1003 int manager_new(Manager **ret) {
1004 _cleanup_manager_free_ Manager *m = NULL;
1005 int r;
1006
1007 m = new0(Manager, 1);
1008 if (!m)
1009 return -ENOMEM;
1010
1011 m->state_file = strdup("/run/systemd/netif/state");
1012 if (!m->state_file)
1013 return -ENOMEM;
1014
1015 r = sd_event_default(&m->event);
1016 if (r < 0)
1017 return r;
1018
1019 sd_event_set_watchdog(m->event, true);
1020
1021 sd_event_add_signal(m->event, NULL, SIGTERM, NULL, NULL);
1022 sd_event_add_signal(m->event, NULL, SIGINT, NULL, NULL);
1023
1024 r = sd_event_add_post(m->event, NULL, manager_dirty_handler, m);
1025 if (r < 0)
1026 return r;
1027
1028 r = manager_connect_rtnl(m);
1029 if (r < 0)
1030 return r;
1031
1032 r = manager_connect_udev(m);
1033 if (r < 0)
1034 return r;
1035
1036 m->netdevs = hashmap_new(&string_hash_ops);
1037 if (!m->netdevs)
1038 return -ENOMEM;
1039
1040 LIST_HEAD_INIT(m->networks);
1041
1042 r = setup_default_address_pool(m);
1043 if (r < 0)
1044 return r;
1045
1046 m->duid.type = DUID_TYPE_EN;
1047
1048 *ret = m;
1049 m = NULL;
1050
1051 return 0;
1052 }
1053
1054 void manager_free(Manager *m) {
1055 Network *network;
1056 NetDev *netdev;
1057 Link *link;
1058 AddressPool *pool;
1059
1060 if (!m)
1061 return;
1062
1063 free(m->state_file);
1064
1065 while ((link = hashmap_first(m->links)))
1066 link_unref(link);
1067 hashmap_free(m->links);
1068
1069 while ((network = m->networks))
1070 network_free(network);
1071
1072 hashmap_free(m->networks_by_name);
1073
1074 while ((netdev = hashmap_first(m->netdevs)))
1075 netdev_unref(netdev);
1076 hashmap_free(m->netdevs);
1077
1078 while ((pool = m->address_pools))
1079 address_pool_free(pool);
1080
1081 sd_netlink_unref(m->rtnl);
1082 sd_event_unref(m->event);
1083
1084 sd_event_source_unref(m->udev_event_source);
1085 udev_monitor_unref(m->udev_monitor);
1086 udev_unref(m->udev);
1087
1088 sd_bus_unref(m->bus);
1089 sd_bus_slot_unref(m->prepare_for_sleep_slot);
1090 sd_event_source_unref(m->bus_retry_event_source);
1091
1092 free(m);
1093 }
1094
1095 static bool manager_check_idle(void *userdata) {
1096 Manager *m = userdata;
1097 Link *link;
1098 Iterator i;
1099
1100 assert(m);
1101
1102 /* Check whether we are idle now. The only case when we decide to be idle is when there's only a loopback
1103 * device around, for which we have no configuration, and which already left the PENDING state. In all other
1104 * cases we are not idle. */
1105
1106 HASHMAP_FOREACH(link, m->links, i) {
1107 /* We are not woken on udev activity, so let's just wait for the pending udev event */
1108 if (link->state == LINK_STATE_PENDING)
1109 return false;
1110
1111 if ((link->flags & IFF_LOOPBACK) == 0)
1112 return false;
1113
1114 if (link->network)
1115 return false;
1116 }
1117
1118 return true;
1119 }
1120
1121 int manager_run(Manager *m) {
1122 Link *link;
1123 Iterator i;
1124
1125 assert(m);
1126
1127 /* The dirty handler will deal with future serialization, but the first one
1128 must be done explicitly. */
1129
1130 manager_save(m);
1131
1132 HASHMAP_FOREACH(link, m->links, i)
1133 link_save(link);
1134
1135 if (m->bus)
1136 return bus_event_loop_with_idle(
1137 m->event,
1138 m->bus,
1139 "org.freedesktop.network1",
1140 DEFAULT_EXIT_USEC,
1141 manager_check_idle,
1142 m);
1143 else
1144 /* failed to connect to the bus, so we lose exit-on-idle logic,
1145 this should not happen except if dbus is not around at all */
1146 return sd_event_loop(m->event);
1147 }
1148
1149 int manager_load_config(Manager *m) {
1150 int r;
1151
1152 /* update timestamp */
1153 paths_check_timestamp(network_dirs, &m->network_dirs_ts_usec, true);
1154
1155 r = netdev_load(m);
1156 if (r < 0)
1157 return r;
1158
1159 r = network_load(m);
1160 if (r < 0)
1161 return r;
1162
1163 return 0;
1164 }
1165
1166 bool manager_should_reload(Manager *m) {
1167 return paths_check_timestamp(network_dirs, &m->network_dirs_ts_usec, false);
1168 }
1169
1170 int manager_rtnl_enumerate_links(Manager *m) {
1171 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
1172 sd_netlink_message *link;
1173 int r;
1174
1175 assert(m);
1176 assert(m->rtnl);
1177
1178 r = sd_rtnl_message_new_link(m->rtnl, &req, RTM_GETLINK, 0);
1179 if (r < 0)
1180 return r;
1181
1182 r = sd_netlink_message_request_dump(req, true);
1183 if (r < 0)
1184 return r;
1185
1186 r = sd_netlink_call(m->rtnl, req, 0, &reply);
1187 if (r < 0)
1188 return r;
1189
1190 for (link = reply; link; link = sd_netlink_message_next(link)) {
1191 int k;
1192
1193 m->enumerating = true;
1194
1195 k = manager_rtnl_process_link(m->rtnl, link, m);
1196 if (k < 0)
1197 r = k;
1198
1199 m->enumerating = false;
1200 }
1201
1202 return r;
1203 }
1204
1205 int manager_rtnl_enumerate_addresses(Manager *m) {
1206 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
1207 sd_netlink_message *addr;
1208 int r;
1209
1210 assert(m);
1211 assert(m->rtnl);
1212
1213 r = sd_rtnl_message_new_addr(m->rtnl, &req, RTM_GETADDR, 0, 0);
1214 if (r < 0)
1215 return r;
1216
1217 r = sd_netlink_message_request_dump(req, true);
1218 if (r < 0)
1219 return r;
1220
1221 r = sd_netlink_call(m->rtnl, req, 0, &reply);
1222 if (r < 0)
1223 return r;
1224
1225 for (addr = reply; addr; addr = sd_netlink_message_next(addr)) {
1226 int k;
1227
1228 m->enumerating = true;
1229
1230 k = manager_rtnl_process_address(m->rtnl, addr, m);
1231 if (k < 0)
1232 r = k;
1233
1234 m->enumerating = false;
1235 }
1236
1237 return r;
1238 }
1239
1240 int manager_rtnl_enumerate_routes(Manager *m) {
1241 _cleanup_(sd_netlink_message_unrefp) sd_netlink_message *req = NULL, *reply = NULL;
1242 sd_netlink_message *route;
1243 int r;
1244
1245 assert(m);
1246 assert(m->rtnl);
1247
1248 r = sd_rtnl_message_new_route(m->rtnl, &req, RTM_GETROUTE, 0, 0);
1249 if (r < 0)
1250 return r;
1251
1252 r = sd_netlink_message_request_dump(req, true);
1253 if (r < 0)
1254 return r;
1255
1256 r = sd_netlink_call(m->rtnl, req, 0, &reply);
1257 if (r < 0)
1258 return r;
1259
1260 for (route = reply; route; route = sd_netlink_message_next(route)) {
1261 int k;
1262
1263 m->enumerating = true;
1264
1265 k = manager_rtnl_process_route(m->rtnl, route, m);
1266 if (k < 0)
1267 r = k;
1268
1269 m->enumerating = false;
1270 }
1271
1272 return r;
1273 }
1274
1275 int manager_address_pool_acquire(Manager *m, int family, unsigned prefixlen, union in_addr_union *found) {
1276 AddressPool *p;
1277 int r;
1278
1279 assert(m);
1280 assert(prefixlen > 0);
1281 assert(found);
1282
1283 LIST_FOREACH(address_pools, p, m->address_pools) {
1284 if (p->family != family)
1285 continue;
1286
1287 r = address_pool_acquire(p, prefixlen, found);
1288 if (r != 0)
1289 return r;
1290 }
1291
1292 return 0;
1293 }
1294
1295 Link* manager_find_uplink(Manager *m, Link *exclude) {
1296 _cleanup_free_ struct local_address *gateways = NULL;
1297 int n, i;
1298
1299 assert(m);
1300
1301 /* Looks for a suitable "uplink", via black magic: an
1302 * interface that is up and where the default route with the
1303 * highest priority points to. */
1304
1305 n = local_gateways(m->rtnl, 0, AF_UNSPEC, &gateways);
1306 if (n < 0) {
1307 log_warning_errno(n, "Failed to determine list of default gateways: %m");
1308 return NULL;
1309 }
1310
1311 for (i = 0; i < n; i++) {
1312 Link *link;
1313
1314 link = hashmap_get(m->links, INT_TO_PTR(gateways[i].ifindex));
1315 if (!link) {
1316 log_debug("Weird, found a gateway for a link we don't know. Ignoring.");
1317 continue;
1318 }
1319
1320 if (link == exclude)
1321 continue;
1322
1323 if (link->operstate < LINK_OPERSTATE_ROUTABLE)
1324 continue;
1325
1326 return link;
1327 }
1328
1329 return NULL;
1330 }
1331
1332 void manager_dirty(Manager *manager) {
1333 assert(manager);
1334
1335 /* the serialized state in /run is no longer up-to-date */
1336 manager->dirty = true;
1337 }