3
0
mirror of https://git.kernel.org/pub/scm/network/wireless/iwd.git synced 2024-11-09 05:29:23 +01:00
iwd/src/main.c

564 lines
13 KiB
C
Raw Normal View History

2014-05-11 19:39:22 +02:00
/*
*
* Wireless daemon for Linux
*
* Copyright (C) 2013-2019 Intel Corporation. All rights reserved.
2014-05-11 19:39:22 +02:00
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
*
*/
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#include <stdio.h>
2014-05-11 19:39:22 +02:00
#include <stdlib.h>
#include <errno.h>
#include <getopt.h>
#include <signal.h>
2014-05-11 19:39:22 +02:00
#include <ell/ell.h>
2015-09-29 02:51:40 +02:00
#include "linux/nl80211.h"
2016-05-12 04:59:03 +02:00
#include "src/iwd.h"
#include "src/module.h"
2014-07-29 21:25:01 +02:00
#include "src/wiphy.h"
2014-10-07 04:50:27 +02:00
#include "src/dbus.h"
2016-11-15 23:44:07 +01:00
#include "src/eap.h"
2015-09-29 02:51:40 +02:00
#include "src/eapol.h"
#include "src/rfkill.h"
#include "src/storage.h"
2019-06-27 00:15:55 +02:00
#include "src/anqp.h"
#include "src/backtrace.h"
static struct l_genl *genl;
2020-04-08 19:27:49 +02:00
static struct l_netlink *rtnl;
2016-11-02 22:04:37 +01:00
static struct l_settings *iwd_config;
static struct l_timeout *timeout;
static const char *interfaces;
static const char *nointerfaces;
2017-03-16 22:45:10 +01:00
static const char *phys;
static const char *nophys;
static const char *debugopt;
static bool developeropt;
main: Don't init nl80211 if we're terminating Don't enter nl80211_appeared if we're already terminating and inside the 1 second timeout. This fixes a potential crash in device_free() caused by a netdev_init() and a netdev_exit() happening without netdev_shutdown in between. netdev_shutdown has already run if terminating is true. src/main.c:main() Opening nl80211 interface src/eap.c:__eap_method_enable() src/eap-wsc.c:eap_wsc_init() src/eap-md5.c:eap_md5_init() src/eap-tls.c:eap_tls_init() src/eap-ttls.c:eap_ttls_init() src/eap-mschapv2.c:eap_mschapv2_init() Terminate src/main.c:nl80211_appeared() Found nl80211 interface src/netdev.c:netdev_init() Opening route netlink socket src/wiphy.c:protocol_features_callback() Found split wiphy dump support src/wiphy.c:regulatory_info_callback() Regulatory alpha2 is 00 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:parse_supported_bands() src/wiphy.c:parse_supported_frequencies() src/wiphy.c:parse_supported_frequencies() src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad1 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad1 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad1 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad1 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad1 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad1 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad0 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad0 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad0 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad0 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad0 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad0 Wiphy: 2, Name: rad2 Bands: 2.4 GHz 5 GHz Ciphers: CCMP TKIP BIP src/netdev.c:netdev_create_from_genl() Created interface wln2[6] src/netdev.c:netdev_initial_up_cb() Interface 6 initialized src/device.c:device_enter_state() Old State: off, new state: autoconnect src/scan.c:scan_periodic_start() Starting periodic scan for ifindex: 6 src/scan.c:scan_notify() Scan notification 33 src/netdev.c:netdev_operstate_dormant_cb() netdev: 6, success: 1 src/scan.c:scan_periodic_done() src/scan.c:scan_periodic_done() Periodic scan triggered for ifindex: 6 src/eap.c:__eap_method_disable() src/eap-wsc.c:eap_wsc_exit() src/eap-md5.c:eap_md5_exit() src/eap-tls.c:eap_tls_exit() src/eap-ttls.c:eap_ttls_exit() src/eap-mschapv2.c:eap_mschapv2_exit() src/main.c:nl80211_vanished() Lost nl80211 interface src/wsc.c:wsc_exit() src/scan.c:scan_exit() src/scan.c:scan_context_free() sc: 0x5434ab0 src/netdev.c:netdev_exit() Closing route netlink socket src/wiphy.c:wiphy_free() Freeing wiphy rad2[2] device_list isn't empty! src/device.c:device_free() (crash here)
2017-05-03 19:53:52 +02:00
static bool terminating;
static bool nl80211_complete;
static void main_loop_quit(struct l_timeout *timeout, void *user_data)
{
l_main_quit();
}
static void iwd_shutdown(void)
{
main: Don't init nl80211 if we're terminating Don't enter nl80211_appeared if we're already terminating and inside the 1 second timeout. This fixes a potential crash in device_free() caused by a netdev_init() and a netdev_exit() happening without netdev_shutdown in between. netdev_shutdown has already run if terminating is true. src/main.c:main() Opening nl80211 interface src/eap.c:__eap_method_enable() src/eap-wsc.c:eap_wsc_init() src/eap-md5.c:eap_md5_init() src/eap-tls.c:eap_tls_init() src/eap-ttls.c:eap_ttls_init() src/eap-mschapv2.c:eap_mschapv2_init() Terminate src/main.c:nl80211_appeared() Found nl80211 interface src/netdev.c:netdev_init() Opening route netlink socket src/wiphy.c:protocol_features_callback() Found split wiphy dump support src/wiphy.c:regulatory_info_callback() Regulatory alpha2 is 00 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:parse_supported_bands() src/wiphy.c:parse_supported_frequencies() src/wiphy.c:parse_supported_frequencies() src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad1 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad1 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad1 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad1 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad1 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad1 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad0 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad0 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad0 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad0 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad0 src/wiphy.c:wiphy_dump_callback() src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad0 Wiphy: 2, Name: rad2 Bands: 2.4 GHz 5 GHz Ciphers: CCMP TKIP BIP src/netdev.c:netdev_create_from_genl() Created interface wln2[6] src/netdev.c:netdev_initial_up_cb() Interface 6 initialized src/device.c:device_enter_state() Old State: off, new state: autoconnect src/scan.c:scan_periodic_start() Starting periodic scan for ifindex: 6 src/scan.c:scan_notify() Scan notification 33 src/netdev.c:netdev_operstate_dormant_cb() netdev: 6, success: 1 src/scan.c:scan_periodic_done() src/scan.c:scan_periodic_done() Periodic scan triggered for ifindex: 6 src/eap.c:__eap_method_disable() src/eap-wsc.c:eap_wsc_exit() src/eap-md5.c:eap_md5_exit() src/eap-tls.c:eap_tls_exit() src/eap-ttls.c:eap_ttls_exit() src/eap-mschapv2.c:eap_mschapv2_exit() src/main.c:nl80211_vanished() Lost nl80211 interface src/wsc.c:wsc_exit() src/scan.c:scan_exit() src/scan.c:scan_context_free() sc: 0x5434ab0 src/netdev.c:netdev_exit() Closing route netlink socket src/wiphy.c:wiphy_free() Freeing wiphy rad2[2] device_list isn't empty! src/device.c:device_free() (crash here)
2017-05-03 19:53:52 +02:00
if (terminating)
return;
terminating = true;
if (!nl80211_complete) {
l_main_quit();
return;
}
dbus_shutdown();
netdev_shutdown();
timeout = l_timeout_create(1, main_loop_quit, NULL, NULL);
}
static void signal_handler(uint32_t signo, void *user_data)
2014-05-11 19:39:22 +02:00
{
switch (signo) {
case SIGINT:
case SIGTERM:
l_info("Terminate");
iwd_shutdown();
2014-05-11 19:39:22 +02:00
break;
}
}
2016-11-02 22:04:37 +01:00
const struct l_settings *iwd_get_config(void)
{
return iwd_config;
}
2019-05-18 00:05:52 +02:00
struct l_genl *iwd_get_genl(void)
{
return genl;
}
2020-04-08 19:27:49 +02:00
struct l_netlink *iwd_get_rtnl(void)
{
return rtnl;
}
const char *iwd_get_iface_whitelist(void)
{
return interfaces;
}
const char *iwd_get_iface_blacklist(void)
{
return nointerfaces;
}
const char *iwd_get_phy_whitelist(void)
{
return phys;
}
const char *iwd_get_phy_blacklist(void)
{
return nophys;
}
bool iwd_is_developer_mode(void)
{
return developeropt;
}
static void usage(void)
{
printf("iwd - Wireless daemon\n"
"Usage:\n");
printf("\tiwd [options]\n");
printf("Options:\n"
"\t-E, --developer Enable developer mode\n"
"\t-i, --interfaces Interfaces to manage\n"
"\t-I, --nointerfaces Interfaces to ignore\n"
2017-03-16 22:45:10 +01:00
"\t-p, --phys Phys to manage\n"
"\t-P, --nophys Phys to ignore\n"
"\t-d, --debug Enable debug output\n"
2019-07-12 10:01:33 +02:00
"\t-v, --version Show version\n"
"\t-h, --help Show help options\n");
}
static const struct option main_options[] = {
{ "developer", no_argument, NULL, 'E' },
{ "version", no_argument, NULL, 'v' },
{ "interfaces", required_argument, NULL, 'i' },
{ "nointerfaces", required_argument, NULL, 'I' },
2017-03-16 22:45:10 +01:00
{ "phys", required_argument, NULL, 'p' },
{ "nophys", required_argument, NULL, 'P' },
{ "debug", optional_argument, NULL, 'd' },
{ "help", no_argument, NULL, 'h' },
{ }
};
2015-09-29 02:51:40 +02:00
static void do_debug(const char *str, void *user_data)
{
const char *prefix = user_data;
l_info("%s%s", prefix, str);
}
2019-05-18 00:05:52 +02:00
static void nl80211_appeared(const struct l_genl_family_info *info,
void *user_data)
2015-09-29 02:51:40 +02:00
{
l_debug("Found nl80211 interface");
nl80211_complete = true;
2015-09-29 02:51:40 +02:00
if (iwd_modules_init() < 0) {
l_main_quit();
return;
}
2015-09-29 02:51:40 +02:00
}
static void request_name_callback(struct l_dbus *dbus, bool success,
bool queued, void *user_data)
{
if (!success) {
l_error("Name request failed");
goto fail_exit;
}
2019-10-28 21:07:40 +01:00
if (!l_dbus_object_manager_enable(dbus, "/"))
l_warn("Unable to register the ObjectManager");
if (!l_dbus_object_add_interface(dbus, IWD_BASE_PATH,
IWD_DAEMON_INTERFACE,
NULL) ||
!l_dbus_object_add_interface(dbus, IWD_BASE_PATH,
L_DBUS_INTERFACE_PROPERTIES,
NULL))
l_info("Unable to add %s and/or %s at %s",
IWD_DAEMON_INTERFACE, L_DBUS_INTERFACE_PROPERTIES,
IWD_BASE_PATH);
2019-05-18 00:05:52 +02:00
/* TODO: Always request nl80211 for now, ignoring auto-loading */
l_genl_request_family(genl, NL80211_GENL_NAME, nl80211_appeared,
NULL, NULL);
return;
fail_exit:
l_main_quit();
}
static struct l_dbus_message *iwd_dbus_get_info(struct l_dbus *dbus,
struct l_dbus_message *message,
void *user_data)
{
struct l_dbus_message *reply;
struct l_dbus_message_builder *builder;
L_AUTO_FREE_VAR(char *, storage_dir) = storage_get_path(NULL);
bool netconfig_enabled;
if (!l_settings_get_bool(iwd_config, "General",
"EnableNetworkConfiguration",
&netconfig_enabled))
netconfig_enabled = false;
reply = l_dbus_message_new_method_return(message);
builder = l_dbus_message_builder_new(reply);
l_dbus_message_builder_enter_array(builder, "{sv}");
dbus_append_dict_basic(builder, "NetworkConfigurationEnabled", 'b',
&netconfig_enabled);
dbus_append_dict_basic(builder, "StateDirectory", 's', storage_dir);
dbus_append_dict_basic(builder, "Version", 's', VERSION);
l_dbus_message_builder_leave_array(builder);
l_dbus_message_builder_finalize(builder);
l_dbus_message_builder_destroy(builder);
return reply;
}
static void iwd_setup_deamon_interface(struct l_dbus_interface *interface)
{
l_dbus_interface_method(interface, "GetInfo", 0, iwd_dbus_get_info,
"a{sv}", "", "info");
}
static void dbus_ready(void *user_data)
{
struct l_dbus *dbus = user_data;
l_dbus_name_acquire(dbus, "net.connman.iwd", false, false, false,
request_name_callback, NULL);
l_dbus_register_interface(dbus, IWD_DAEMON_INTERFACE,
iwd_setup_deamon_interface,
NULL, false);
}
static void dbus_disconnected(void *user_data)
{
l_info("D-Bus disconnected, quitting...");
iwd_shutdown();
}
static void print_koption(const void *key, void *value, void *user_data)
{
l_info("\t%s", (const char *) key);
}
#define ADD_MISSING(opt) \
l_hashmap_replace(options, opt, &r, NULL)
#define ADD_OPTIONAL(opt) \
l_hashmap_replace(optional, opt, &r, NULL)
static int check_crypto()
{
int r = 0;
struct l_hashmap *options = l_hashmap_string_new();
struct l_hashmap *optional = l_hashmap_string_new();
if (!l_checksum_is_supported(L_CHECKSUM_SHA1, true)) {
r = -ENOTSUP;
l_error("No HMAC(SHA1) support found");
ADD_MISSING("CONFIG_CRYPTO_USER_API_HASH");
ADD_MISSING("CONFIG_CRYPTO_SHA1");
ADD_MISSING("CONFIG_CRYPTO_HMAC");
ADD_OPTIONAL("CONFIG_CRYPTO_SHA1_SSSE3");
}
if (!l_checksum_is_supported(L_CHECKSUM_MD5, true)) {
r = -ENOTSUP;
l_error("No HMAC(MD5) support found");
ADD_MISSING("CONFIG_CRYPTO_USER_API_HASH");
ADD_MISSING("CONFIG_CRYPTO_MD5");
ADD_MISSING("CONFIG_CRYPTO_HMAC");
}
if (!l_checksum_cmac_aes_supported()) {
r = -ENOTSUP;
l_error("No CMAC(AES) support found");
ADD_MISSING("CONFIG_CRYPTO_USER_API_HASH");
ADD_MISSING("CONFIG_CRYPTO_AES");
ADD_MISSING("CONFIG_CRYPTO_CMAC");
ADD_OPTIONAL("CONFIG_CRYPTO_AES_X86_64");
ADD_OPTIONAL("CONFIG_CRYPTO_AES_NI_INTEL");
}
if (!l_checksum_is_supported(L_CHECKSUM_SHA256, true)) {
r = -ENOTSUP;
l_error("No HMAC(SHA256) support not found");
ADD_MISSING("CONFIG_CRYPTO_USER_API_HASH");
ADD_MISSING("CONFIG_CRYPTO_HMAC");
ADD_MISSING("CONFIG_CRYPTO_SHA256");
ADD_OPTIONAL("CONFIG_CRYPTO_SHA256_SSSE3");
}
if (!l_checksum_is_supported(L_CHECKSUM_SHA512, true)) {
l_warn("No HMAC(SHA512) support found, "
"certain TLS connections might fail");
ADD_MISSING("CONFIG_CRYPTO_SHA512");
ADD_OPTIONAL("CONFIG_CRYPTO_SHA512_SSSE3");
}
if (!l_cipher_is_supported(L_CIPHER_DES) ||
!l_cipher_is_supported(L_CIPHER_DES3_EDE_CBC)) {
r = -ENOTSUP;
l_error("DES support not found");
ADD_MISSING("CONFIG_CRYPTO_USER_API_SKCIPHER");
ADD_MISSING("CONFIG_CRYPTO_DES");
ADD_MISSING("CONFIG_CRYPTO_ECB");
ADD_OPTIONAL("CONFIG_CRYPTO_DES3_EDE_X86_64");
}
if (!l_cipher_is_supported(L_CIPHER_AES)) {
r = -ENOTSUP;
l_error("AES support not found");
ADD_MISSING("CONFIG_CRYPTO_USER_API_SKCIPHER");
ADD_MISSING("CONFIG_CRYPTO_AES");
ADD_MISSING("CONFIG_CRYPTO_ECB");
ADD_OPTIONAL("CONFIG_CRYPTO_AES_X86_64");
ADD_OPTIONAL("CONFIG_CRYPTO_AES_NI_INTEL");
}
if (!l_cipher_is_supported(L_CIPHER_DES3_EDE_CBC)) {
l_warn("No CBC(DES3_EDE) support found, "
"certain TLS connections might fail");
ADD_MISSING("CONFIG_CRYPTO_DES");
ADD_MISSING("CONFIG_CRYPTO_CBC");
ADD_OPTIONAL("CONFIG_CRYPTO_DES3_EDE_X86_64");
}
if (!l_cipher_is_supported(L_CIPHER_AES_CBC)) {
l_warn("No CBC(AES) support found, "
"WPS will not be available");
ADD_MISSING("CONFIG_CRYPTO_CBC");
}
if (!l_key_is_supported(L_KEY_FEATURE_DH)) {
l_warn("No Diffie-Hellman support found, "
"WPS will not be available");
ADD_MISSING("CONFIG_KEY_DH_OPERATIONS");
}
if (!l_key_is_supported(L_KEY_FEATURE_RESTRICT)) {
l_warn("No keyring restrictions support found.");
ADD_MISSING("CONFIG_KEYS");
}
if (!l_key_is_supported(L_KEY_FEATURE_CRYPTO)) {
l_warn("No asymmetric key support found.");
l_warn("TLS based WPA-Enterprise authentication methods will"
" not function.");
l_warn("Kernel 4.20+ is required for this feature.");
ADD_MISSING("CONFIG_ASYMMETRIC_KEY_TYPE");
ADD_MISSING("CONFIG_ASYMMETRIC_PUBLIC_KEY_SUBTYPE");
ADD_MISSING("CONFIG_X509_CERTIFICATE_PARSER");
ADD_MISSING("CONFIG_PKCS7_MESSAGE_PARSER");
ADD_MISSING("CONFIG_PKCS8_PRIVATE_KEY_PARSER");
}
if (l_hashmap_isempty(options))
goto done;
l_info("The following options are missing in the kernel:");
if (l_hashmap_remove(options, "CONFIG_CRYPTO_USER_API_HASH"))
l_info("\tCONFIG_CRYPTO_USER_API_HASH");
if (l_hashmap_remove(options, "CONFIG_CRYPTO_USER_API_SKCIPHER"))
l_info("\tCONFIG_CRYPTO_USER_API_SKCIPHER");
l_hashmap_foreach(options, print_koption, NULL);
if (!l_hashmap_isempty(optional)) {
l_info("The following optimized implementations might be "
"available:");
l_hashmap_foreach(optional, print_koption, NULL);
}
done:
l_hashmap_destroy(options, NULL);
l_hashmap_destroy(optional, NULL);
return r;
}
2014-05-11 19:39:22 +02:00
int main(int argc, char *argv[])
{
int exit_status;
struct l_dbus *dbus;
const char *config_dir;
char **config_dirs;
2020-04-10 20:09:42 +02:00
int i;
2014-05-11 19:39:22 +02:00
for (;;) {
int opt;
opt = getopt_long(argc, argv, "Ei:I:p:P:d::vh",
2017-03-16 22:45:10 +01:00
main_options, NULL);
if (opt < 0)
break;
switch (opt) {
case 'E':
developeropt = true;
break;
case 'i':
interfaces = optarg;
break;
case 'I':
nointerfaces = optarg;
break;
2017-03-16 22:45:10 +01:00
case 'p':
phys = optarg;
break;
case 'P':
nophys = optarg;
break;
case 'd':
if (optarg)
debugopt = optarg;
else if (argv[optind] && argv[optind][0] != '-')
debugopt = argv[optind++];
else
debugopt = "*";
break;
case 'v':
printf("%s\n", VERSION);
return EXIT_SUCCESS;
case 'h':
usage();
return EXIT_SUCCESS;
default:
return EXIT_FAILURE;
}
}
if (argc - optind > 0) {
fprintf(stderr, "Invalid command line parameters\n");
return EXIT_FAILURE;
}
l_log_set_stderr();
if (check_crypto() < 0)
return EXIT_FAILURE;
2016-06-09 16:38:13 +02:00
if (!l_main_init())
return EXIT_FAILURE;
if (debugopt)
l_debug_enable(debugopt);
2014-05-11 19:39:22 +02:00
#ifdef HAVE_BACKTRACE
__iwd_backtrace_init();
#endif
2014-05-11 19:39:22 +02:00
l_info("Wireless daemon version %s", VERSION);
config_dir = getenv("CONFIGURATION_DIRECTORY");
if (!config_dir)
config_dir = DAEMON_CONFIGDIR;
l_debug("Using configuration directory %s", config_dir);
2016-11-02 22:04:37 +01:00
iwd_config = l_settings_new();
config_dirs = l_strsplit(config_dir, ':');
2020-04-10 20:09:42 +02:00
for (i = 0; config_dirs[i]; i++) {
L_AUTO_FREE_VAR(char *, path) =
2020-04-10 20:09:42 +02:00
l_strdup_printf("%s/%s", config_dirs[i], "main.conf");
if (!l_settings_load_from_file(iwd_config, path))
continue;
l_info("Loaded configuration from %s", path);
break;
}
l_strv_free(config_dirs);
2016-11-02 22:04:37 +01:00
__eapol_set_config(iwd_config);
__eap_set_config(iwd_config);
exit_status = EXIT_FAILURE;
if (!storage_create_dirs())
2020-04-09 03:44:16 +02:00
goto failed_dirs;
2019-05-18 00:05:52 +02:00
genl = l_genl_new();
if (!genl) {
l_error("Failed to open generic netlink socket");
2020-04-09 03:44:16 +02:00
goto failed_genl;
2019-05-18 00:05:52 +02:00
}
if (getenv("IWD_GENL_DEBUG"))
l_genl_set_debug(genl, do_debug, "[GENL] ", NULL);
2020-04-08 19:27:49 +02:00
rtnl = l_netlink_new(NETLINK_ROUTE);
if (!rtnl) {
l_error("Failed to open route netlink socket");
2020-04-09 03:44:16 +02:00
goto failed_rtnl;
2020-04-08 19:27:49 +02:00
}
if (getenv("IWD_RTNL_DEBUG"))
l_netlink_set_debug(rtnl, do_debug, "[RTNL] ", NULL);
dbus = l_dbus_new_default(L_DBUS_SYSTEM_BUS);
if (!dbus) {
l_error("Failed to initialize D-Bus");
2020-04-09 03:44:16 +02:00
goto failed_dbus;
2014-10-07 04:50:27 +02:00
}
l_dbus_set_ready_handler(dbus, dbus_ready, dbus, NULL);
l_dbus_set_disconnect_handler(dbus, dbus_disconnected, NULL, NULL);
dbus_init(dbus);
2015-09-29 02:51:40 +02:00
exit_status = l_main_run_with_signal(signal_handler, NULL);
2020-04-09 03:44:16 +02:00
2019-05-19 19:57:45 +02:00
iwd_modules_exit();
2015-09-29 02:51:40 +02:00
dbus_exit();
l_dbus_destroy(dbus);
2020-04-09 03:44:16 +02:00
2020-04-08 23:19:37 +02:00
failed_dbus:
2020-04-08 19:27:49 +02:00
l_netlink_destroy(rtnl);
2020-04-09 03:44:16 +02:00
2020-04-08 23:19:37 +02:00
failed_rtnl:
2020-04-09 03:44:16 +02:00
l_genl_unref(genl);
2020-04-08 23:19:37 +02:00
failed_genl:
2020-04-09 03:44:16 +02:00
storage_cleanup_dirs();
2020-04-08 23:19:37 +02:00
failed_dirs:
2016-11-02 22:04:37 +01:00
l_settings_free(iwd_config);
l_timeout_remove(timeout);
2016-06-09 16:38:13 +02:00
l_main_exit();
return exit_status;
2014-05-11 19:39:22 +02:00
}