1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2013 Tom Gundersen <teg@jklm.no>
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
24 #include "path-util.h"
26 #include "libudev-private.h"
27 #include "udev-util.h"
28 #include "rtnl-util.h"
32 const char* const network_dirs[] = {
33 "/etc/systemd/network",
34 "/run/systemd/network",
35 "/usr/lib/systemd/network",
36 #ifdef HAVE_SPLIT_USER
37 "/lib/systemd/network",
41 int manager_new(Manager **ret) {
42 _cleanup_manager_free_ Manager *m = NULL;
49 r = sd_event_default(&m->event);
53 sd_event_set_watchdog(m->event, true);
55 r = sd_rtnl_open(RTMGRP_LINK | RTMGRP_IPV4_IFADDR, &m->rtnl);
59 r = sd_bus_default_system(&m->bus);
60 if (r < 0 && r != -ENOENT) /* TODO: drop when we can rely on kdbus */
67 /* udev does not initialize devices inside containers,
68 * so we rely on them being already initialized before
69 * entering the container */
70 if (detect_container(NULL) > 0) {
71 m->udev_monitor = udev_monitor_new_from_netlink(m->udev, "kernel");
75 m->udev_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
80 m->links = hashmap_new(uint64_hash_func, uint64_compare_func);
84 m->netdevs = hashmap_new(string_hash_func, string_compare_func);
88 LIST_HEAD_INIT(m->networks);
96 void manager_free(Manager *m) {
104 udev_monitor_unref(m->udev_monitor);
106 sd_bus_unref(m->bus);
107 sd_event_source_unref(m->udev_event_source);
108 sd_event_unref(m->event);
110 while ((network = m->networks))
111 network_free(network);
113 while ((link = hashmap_first(m->links)))
115 hashmap_free(m->links);
117 while ((netdev = hashmap_first(m->netdevs)))
119 hashmap_free(m->netdevs);
121 sd_rtnl_unref(m->rtnl);
126 int manager_load_config(Manager *m) {
129 /* update timestamp */
130 paths_check_timestamp(network_dirs, &m->network_dirs_ts_usec, true);
143 bool manager_should_reload(Manager *m) {
144 return paths_check_timestamp(network_dirs, &m->network_dirs_ts_usec, false);
147 static int manager_process_link(Manager *m, struct udev_device *device) {
154 link_get(m, udev_device_get_ifindex(device), &link);
156 if (streq_ptr(udev_device_get_action(device), "remove")) {
157 log_debug("%s: link removed", udev_device_get_sysname(device));
163 log_debug("%s: link already exists, ignoring",
168 r = link_add(m, device, &link);
170 log_error("%s: could not handle link: %s",
171 udev_device_get_sysname(device),
174 log_debug("%s: link (with ifindex %" PRIu64") added",
175 link->ifname, link->ifindex);
181 int manager_udev_enumerate_links(Manager *m) {
182 _cleanup_udev_enumerate_unref_ struct udev_enumerate *e = NULL;
183 struct udev_list_entry *item = NULL, *first = NULL;
188 e = udev_enumerate_new(m->udev);
192 r = udev_enumerate_add_match_subsystem(e, "net");
196 /* udev does not initialize devices inside containers,
197 * so we rely on them being already initialized before
198 * entering the container */
199 if (detect_container(NULL) <= 0) {
200 r = udev_enumerate_add_match_is_initialized(e);
205 r = udev_enumerate_scan_devices(e);
209 first = udev_enumerate_get_list_entry(e);
210 udev_list_entry_foreach(item, first) {
211 _cleanup_udev_device_unref_ struct udev_device *d = NULL;
214 d = udev_device_new_from_syspath(m->udev, udev_list_entry_get_name(item));
218 k = manager_process_link(m, d);
226 static int manager_dispatch_link_udev(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
227 Manager *m = userdata;
228 struct udev_monitor *monitor = m->udev_monitor;
229 _cleanup_udev_device_unref_ struct udev_device *device = NULL;
231 device = udev_monitor_receive_device(monitor);
235 manager_process_link(m, device);
239 int manager_udev_listen(Manager *m) {
242 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_monitor, "net", NULL);
244 log_error("Could not add udev monitor filter: %s", strerror(-r));
248 r = udev_monitor_enable_receiving(m->udev_monitor);
250 log_error("Could not enable udev monitor");
254 r = sd_event_add_io(m->event,
255 udev_monitor_get_fd(m->udev_monitor),
256 EPOLLIN, manager_dispatch_link_udev,
257 m, &m->udev_event_source);
264 static int manager_rtnl_process_link(sd_rtnl *rtnl, sd_rtnl_message *message, void *userdata) {
265 Manager *m = userdata;
274 r = sd_rtnl_message_link_get_ifindex(message, &ifindex);
275 if (r < 0 || ifindex <= 0) {
276 log_debug("received RTM_NEWLINK message without valid ifindex");
280 r = rtnl_message_link_get_ifname(message, &name);
282 log_debug("received RTM_NEWLINK message without valid IFLA_IFNAME");
286 r = netdev_get(m, name, &netdev);
288 r = netdev_set_ifindex(netdev, ifindex);
290 log_debug("could not set ifindex of netdev '%s' to %d: %s",
291 name, ifindex, strerror(-r));
295 r = link_get(m, ifindex, &link);
297 log_debug("received RTM_NEWLINK message for untracked ifindex %d", ifindex);
301 /* only track the status of links we want to manage */
303 r = link_update(link, message);
307 log_debug("%s: received RTM_NEWLINK message for unmanaged link", link->ifname);
312 int manager_rtnl_listen(Manager *m) {
315 r = sd_rtnl_attach_event(m->rtnl, m->event, 0);
319 r = sd_rtnl_add_match(m->rtnl, RTM_NEWLINK, &manager_rtnl_process_link, m);
326 int manager_bus_listen(Manager *m) {
331 if (!m->bus) /* TODO: drop when we can rely on kdbus */
334 r = sd_bus_attach_event(m->bus, m->event, 0);
341 static void append_dns(FILE *f, struct in_addr *dns, unsigned char family, unsigned *count) {
342 char buf[INET6_ADDRSTRLEN];
345 address = inet_ntop(family, dns, buf, INET6_ADDRSTRLEN);
347 log_warning("Invalid DNS address. Ignoring.");
352 fputs("# Too many DNS servers configured, the following entries "
353 "will be ignored\n", f);
355 fprintf(f, "nameserver %s\n", address);
360 int manager_update_resolv_conf(Manager *m) {
361 _cleanup_free_ char *temp_path = NULL;
362 _cleanup_fclose_ FILE *f = NULL;
366 const char *domainname = NULL;
371 r = mkdir_safe_label("/run/systemd/network", 0755, 0, 0);
375 r = fopen_temporary("/run/systemd/network/resolv.conf", &f, &temp_path);
379 fchmod(fileno(f), 0644);
381 fputs("# This file is managed by systemd-networkd(8). Do not edit.\n#\n"
382 "# Third party programs must not access this file directly, but\n"
383 "# only through the symlink at /etc/resolv.conf. To manage\n"
384 "# resolv.conf(5) in a different way, replace the symlink by a\n"
385 "# static file or a different symlink.\n\n", f);
387 HASHMAP_FOREACH(link, m->links, i) {
388 if (link->dhcp_lease) {
389 struct in_addr *nameservers;
390 size_t nameservers_size;
392 if (link->network->dhcp_dns) {
393 r = sd_dhcp_lease_get_dns(link->dhcp_lease, &nameservers, &nameservers_size);
397 for (j = 0; j < nameservers_size; j++)
398 append_dns(f, &nameservers[j], AF_INET, &count);
402 if (link->network->dhcp_domainname && !domainname) {
403 r = sd_dhcp_lease_get_domainname(link->dhcp_lease, &domainname);
405 fprintf(f, "domain %s\n", domainname);
410 HASHMAP_FOREACH(link, m->links, i)
411 if (link->network && link->network->dns)
412 append_dns(f, &link->network->dns->in_addr.in,
413 link->network->dns->family, &count);
417 if (ferror(f) || rename(temp_path, "/run/systemd/network/resolv.conf") < 0) {
419 unlink("/run/systemd/network/resolv.conf");