/* SPDX-License-Identifier: LGPL-2.1-or-later */ #include #include #include #include "sd-daemon.h" #include "sd-event.h" #include "capability-util.h" #include "daemon-util.h" #include "firewall-util.h" #include "main-func.h" #include "mkdir.h" #include "networkd-conf.h" #include "networkd-manager.h" #include "signal-util.h" #include "user-util.h" static int run(int argc, char *argv[]) { _cleanup_(manager_freep) Manager *m = NULL; _cleanup_(notify_on_cleanup) const char *notify_message = NULL; int r; log_setup_service(); umask(0022); if (argc != 1) return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "This program takes no arguments."); /* Drop privileges, but only if we have been started as root. If we are not running as root we assume all * privileges are already dropped and we can't create our runtime directory. */ if (geteuid() == 0) { const char *user = "systemd-network"; uid_t uid; gid_t gid; r = get_user_creds(&user, &uid, &gid, NULL, NULL, 0); if (r < 0) return log_error_errno(r, "Cannot resolve user name %s: %m", user); /* Create runtime directory. This is not necessary when networkd is * started with "RuntimeDirectory=systemd/netif", or after * systemd-tmpfiles-setup.service. */ r = mkdir_safe_label("/run/systemd/netif", 0755, uid, gid, MKDIR_WARN_MODE); if (r < 0) log_warning_errno(r, "Could not create runtime directory: %m"); r = drop_privileges(uid, gid, (1ULL << CAP_NET_ADMIN) | (1ULL << CAP_NET_BIND_SERVICE) | (1ULL << CAP_NET_BROADCAST) | (1ULL << CAP_NET_RAW)); if (r < 0) return log_error_errno(r, "Failed to drop privileges: %m"); } /* Always create the directories people can create inotify watches in. * It is necessary to create the following subdirectories after drop_privileges() * to support old kernels not supporting AmbientCapabilities=. */ r = mkdir_safe_label("/run/systemd/netif/links", 0755, UID_INVALID, GID_INVALID, MKDIR_WARN_MODE); if (r < 0) log_warning_errno(r, "Could not create runtime directory 'links': %m"); r = mkdir_safe_label("/run/systemd/netif/leases", 0755, UID_INVALID, GID_INVALID, MKDIR_WARN_MODE); if (r < 0) log_warning_errno(r, "Could not create runtime directory 'leases': %m"); r = mkdir_safe_label("/run/systemd/netif/lldp", 0755, UID_INVALID, GID_INVALID, MKDIR_WARN_MODE); if (r < 0) log_warning_errno(r, "Could not create runtime directory 'lldp': %m"); assert_se(sigprocmask_many(SIG_BLOCK, NULL, SIGTERM, SIGINT, -1) >= 0); r = manager_new(&m); if (r < 0) return log_error_errno(r, "Could not create manager: %m"); r = manager_connect_bus(m); if (r < 0) return log_error_errno(r, "Could not connect to bus: %m"); r = manager_parse_config_file(m); if (r < 0) log_warning_errno(r, "Failed to parse configuration file: %m"); r = manager_load_config(m); if (r < 0) return log_error_errno(r, "Could not load configuration files: %m"); r = manager_enumerate(m); if (r < 0) return r; r = fw_ctx_new(&m->fw_ctx); if (r < 0) log_warning_errno(r, "Could not initialize firewall, IPMasquerade= option not available: %m"); r = manager_start(m); if (r < 0) return log_error_errno(r, "Could not start manager: %m"); log_info("Enumeration completed"); notify_message = notify_start(NOTIFY_READY, NOTIFY_STOPPING); r = sd_event_loop(m->event); if (r < 0) return log_error_errno(r, "Event loop failed: %m"); return 0; } DEFINE_MAIN_FUNCTION(run);