1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2013 Tom Gundersen <teg@jklm.no>
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
25 #include "path-util.h"
27 #include "libudev-private.h"
28 #include "udev-util.h"
29 #include "rtnl-util.h"
35 const char* const network_dirs[] = {
36 "/etc/systemd/network",
37 "/run/systemd/network",
38 "/usr/lib/systemd/network",
40 "/lib/systemd/network",
44 static int dispatch_sigterm(sd_event_source *es, const struct signalfd_siginfo *si, void *userdata) {
45 Manager *m = userdata;
49 log_received_signal(LOG_INFO, si);
51 sd_event_exit(m->event, 0);
55 static int setup_signals(Manager *m) {
61 assert_se(sigemptyset(&mask) == 0);
62 sigset_add_many(&mask, SIGINT, SIGTERM, -1);
63 assert_se(sigprocmask(SIG_SETMASK, &mask, NULL) == 0);
65 r = sd_event_add_signal(m->event, &m->sigterm_event_source, SIGTERM, dispatch_sigterm, m);
69 r = sd_event_add_signal(m->event, &m->sigint_event_source, SIGINT, dispatch_sigterm, m);
76 int manager_new(Manager **ret) {
77 _cleanup_manager_free_ Manager *m = NULL;
84 m->state_file = strdup("/run/systemd/network/state");
88 r = sd_event_default(&m->event);
92 sd_event_set_watchdog(m->event, true);
94 r = sd_rtnl_open(&m->rtnl, 3, RTNLGRP_LINK, RTNLGRP_IPV4_IFADDR,
99 r = sd_bus_default_system(&m->bus);
100 if (r < 0 && r != -ENOENT) /* TODO: drop when we can rely on kdbus */
103 r = setup_signals(m);
107 /* udev does not initialize devices inside containers,
108 * so we rely on them being already initialized before
109 * entering the container */
110 if (detect_container(NULL) <= 0) {
111 m->udev = udev_new();
115 m->udev_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
116 if (!m->udev_monitor)
120 m->links = hashmap_new(uint64_hash_func, uint64_compare_func);
124 m->netdevs = hashmap_new(string_hash_func, string_compare_func);
128 LIST_HEAD_INIT(m->networks);
136 void manager_free(Manager *m) {
146 udev_monitor_unref(m->udev_monitor);
148 sd_bus_unref(m->bus);
149 sd_event_source_unref(m->udev_event_source);
150 sd_event_source_unref(m->sigterm_event_source);
151 sd_event_source_unref(m->sigint_event_source);
152 sd_event_unref(m->event);
154 while ((link = hashmap_first(m->links)))
156 hashmap_free(m->links);
158 while ((network = m->networks))
159 network_free(network);
161 while ((netdev = hashmap_first(m->netdevs)))
162 netdev_unref(netdev);
163 hashmap_free(m->netdevs);
165 sd_rtnl_unref(m->rtnl);
170 int manager_load_config(Manager *m) {
173 /* update timestamp */
174 paths_check_timestamp(network_dirs, &m->network_dirs_ts_usec, true);
187 bool manager_should_reload(Manager *m) {
188 return paths_check_timestamp(network_dirs, &m->network_dirs_ts_usec, false);
191 static int manager_udev_process_link(Manager *m, struct udev_device *device) {
198 if (!streq_ptr(udev_device_get_action(device), "add"))
201 ifindex = udev_device_get_ifindex(device);
203 log_debug("ignoring udev ADD event for device with invalid ifindex");
207 r = link_get(m, ifindex, &link);
213 r = link_initialized(link, device);
220 static int manager_rtnl_process_link(sd_rtnl *rtnl, sd_rtnl_message *message, void *userdata) {
221 Manager *m = userdata;
223 NetDev *netdev = NULL;
232 r = sd_rtnl_message_get_type(message, &type);
234 log_warning("rtnl: could not get message type");
238 r = sd_rtnl_message_link_get_ifindex(message, &ifindex);
239 if (r < 0 || ifindex <= 0) {
240 log_warning("rtnl: received link message without valid ifindex");
243 link_get(m, ifindex, &link);
245 r = sd_rtnl_message_read_string(message, IFLA_IFNAME, &name);
246 if (r < 0 || !name) {
247 log_warning("rtnl: received link message without valid ifname");
250 netdev_get(m, name, &netdev);
255 /* link is new, so add it */
256 r = link_add(m, message, &link);
258 log_debug("could not add new link");
264 /* netdev exists, so make sure the ifindex matches */
265 r = netdev_set_ifindex(netdev, message);
267 log_debug("could not set ifindex on netdev");
272 r = link_update(link, message);
285 assert_not_reached("Received invalid RTNL message type.");
291 int manager_rtnl_enumerate_links(Manager *m) {
292 _cleanup_rtnl_message_unref_ sd_rtnl_message *req = NULL, *reply = NULL;
293 sd_rtnl_message *link;
299 r = sd_rtnl_message_new_link(m->rtnl, &req, RTM_GETLINK, 0);
303 r = sd_rtnl_message_request_dump(req, true);
307 r = sd_rtnl_call(m->rtnl, req, 0, &reply);
311 for (link = reply; link; link = sd_rtnl_message_next(link)) {
314 k = sd_rtnl_message_get_type(link, &type);
318 if (type != RTM_NEWLINK)
321 k = manager_rtnl_process_link(m->rtnl, link, m);
329 static int manager_dispatch_link_udev(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
330 Manager *m = userdata;
331 struct udev_monitor *monitor = m->udev_monitor;
332 _cleanup_udev_device_unref_ struct udev_device *device = NULL;
334 device = udev_monitor_receive_device(monitor);
338 manager_udev_process_link(m, device);
342 int manager_udev_listen(Manager *m) {
345 if (detect_container(NULL) > 0)
348 assert(m->udev_monitor);
350 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_monitor, "net", NULL);
352 log_error("Could not add udev monitor filter: %s", strerror(-r));
356 r = udev_monitor_enable_receiving(m->udev_monitor);
358 log_error("Could not enable udev monitor");
362 r = sd_event_add_io(m->event,
363 &m->udev_event_source,
364 udev_monitor_get_fd(m->udev_monitor),
365 EPOLLIN, manager_dispatch_link_udev,
373 int manager_rtnl_listen(Manager *m) {
376 r = sd_rtnl_attach_event(m->rtnl, m->event, 0);
380 r = sd_rtnl_add_match(m->rtnl, RTM_NEWLINK, &manager_rtnl_process_link, m);
384 r = sd_rtnl_add_match(m->rtnl, RTM_DELLINK, &manager_rtnl_process_link, m);
388 r = sd_rtnl_add_match(m->rtnl, RTM_NEWADDR, &link_rtnl_process_address, m);
392 r = sd_rtnl_add_match(m->rtnl, RTM_DELADDR, &link_rtnl_process_address, m);
399 int manager_bus_listen(Manager *m) {
404 if (!m->bus) /* TODO: drop when we can rely on kdbus */
407 r = sd_bus_attach_event(m->bus, m->event, 0);
414 static void append_dns(FILE *f, struct in_addr *dns, unsigned char family, unsigned *count) {
415 char buf[INET6_ADDRSTRLEN];
418 address = inet_ntop(family, dns, buf, INET6_ADDRSTRLEN);
420 log_warning("Invalid DNS address. Ignoring.");
425 fputs("# Too many DNS servers configured, the following entries "
426 "will be ignored\n", f);
428 fprintf(f, "nameserver %s\n", address);
433 int manager_update_resolv_conf(Manager *m) {
434 _cleanup_free_ char *temp_path = NULL;
435 _cleanup_fclose_ FILE *f = NULL;
439 const char *domainname = NULL;
444 r = fopen_temporary("/run/systemd/network/resolv.conf", &f, &temp_path);
448 fchmod(fileno(f), 0644);
450 fputs("# This file is managed by systemd-networkd(8). Do not edit.\n#\n"
451 "# Third party programs must not access this file directly, but\n"
452 "# only through the symlink at /etc/resolv.conf. To manage\n"
453 "# resolv.conf(5) in a different way, replace the symlink by a\n"
454 "# static file or a different symlink.\n\n", f);
456 HASHMAP_FOREACH(link, m->links, i) {
457 if (link->dhcp_lease) {
458 struct in_addr *nameservers;
459 size_t nameservers_size;
461 if (link->network->dhcp_dns) {
462 r = sd_dhcp_lease_get_dns(link->dhcp_lease, &nameservers, &nameservers_size);
466 for (j = 0; j < nameservers_size; j++)
467 append_dns(f, &nameservers[j], AF_INET, &count);
471 if (link->network->dhcp_domainname && !domainname) {
472 r = sd_dhcp_lease_get_domainname(link->dhcp_lease, &domainname);
474 fprintf(f, "domain %s\n", domainname);
479 HASHMAP_FOREACH(link, m->links, i) {
480 if (link->network && link->network->dns) {
484 SET_FOREACH(address, link->network->dns, j) {
485 append_dns(f, &address->in_addr.in,
486 address->family, &count);
493 if (ferror(f) || rename(temp_path, "/run/systemd/network/resolv.conf") < 0) {
495 unlink("/run/systemd/network/resolv.conf");
503 int manager_save(Manager *m) {
506 _cleanup_free_ char *temp_path = NULL;
507 _cleanup_fclose_ FILE *f = NULL;
508 const char *oper_state = "unknown";
509 bool dormant = false, carrier = false;
513 assert(m->state_file);
515 HASHMAP_FOREACH(link, m->links, i) {
516 if (link->flags & IFF_LOOPBACK)
519 if (link_has_carrier(link->flags, link->operstate))
521 else if (link->operstate == IF_OPER_DORMANT)
526 oper_state = "carrier";
528 oper_state = "dormant";
530 r = fopen_temporary(m->state_file, &f, &temp_path);
534 fchmod(fileno(f), 0644);
537 "# This is private data. Do not parse.\n"
538 "OPER_STATE=%s\n", oper_state);
542 if (ferror(f) || rename(temp_path, m->state_file) < 0) {
544 unlink(m->state_file);
550 log_error("Failed to save network state to %s: %s", m->state_file, strerror(-r));