1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright (C) 2013 Tom Gundersen <teg@jklm.no>
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
22 #include <netinet/ether.h>
27 #include "link-config.h"
28 #include "ethtool-util.h"
30 #include "libudev-private.h"
35 #include "path-util.h"
36 #include "conf-parser.h"
37 #include "conf-files.h"
40 #include "rtnl-util.h"
43 struct link_config_ctx {
44 LIST_HEAD(link_config, links);
48 bool enable_name_policy;
53 usec_t link_dirs_ts_usec;
56 DEFINE_TRIVIAL_CLEANUP_FUNC(link_config_ctx*, link_config_ctx_free);
57 #define _cleanup_link_config_ctx_free_ _cleanup_(link_config_ctx_freep)
59 int link_config_ctx_new(link_config_ctx **ret) {
60 _cleanup_link_config_ctx_free_ link_config_ctx *ctx = NULL;
65 ctx = new0(link_config_ctx, 1);
69 LIST_HEAD_INIT(ctx->links);
73 ctx->enable_name_policy = true;
75 ctx->link_dirs = strv_new("/etc/systemd/network",
76 "/run/systemd/network",
77 "/usr/lib/systemd/network",
79 "/lib/systemd/network",
82 if (!ctx->link_dirs) {
83 log_error("failed to build link config directory array");
87 if (!path_strv_canonicalize_uniq(ctx->link_dirs)) {
88 log_error("failed to canonicalize link config directories\n");
98 static int link_config_ctx_connect(link_config_ctx *ctx) {
101 if (ctx->ethtool_fd >= 0 && ctx->rtnl)
104 r = ethtool_connect(&ctx->ethtool_fd);
108 r = sd_rtnl_open(0, &ctx->rtnl);
115 static void link_configs_free(link_config_ctx *ctx) {
116 link_config *link, *link_next;
121 LIST_FOREACH_SAFE(links, link, link_next, ctx->links) {
122 free(link->filename);
123 free(link->match_path);
124 free(link->match_driver);
125 free(link->match_type);
126 free(link->description);
132 void link_config_ctx_free(link_config_ctx *ctx) {
136 if (ctx->ethtool_fd >= 0)
137 close_nointr_nofail(ctx->ethtool_fd);
139 sd_rtnl_unref(ctx->rtnl);
141 strv_free(ctx->link_dirs);
142 link_configs_free(ctx);
149 static int load_link(link_config_ctx *ctx, const char *filename) {
154 file = fopen(filename, "re");
162 link = new0(link_config, 1);
168 link->mac_policy = _MACPOLICY_INVALID;
169 link->wol = _WOL_INVALID;
170 link->duplex = _DUP_INVALID;
172 r = config_parse(NULL, filename, file, "Match\0Link\0Ethernet\0", config_item_perf_lookup,
173 (void*) link_config_gperf_lookup, false, false, link);
175 log_warning("Could not parse config file %s: %s", filename, strerror(-r));
178 log_debug("Parsed configuration file %s", filename);
180 link->filename = strdup(filename);
182 LIST_PREPEND(links, ctx->links, link);
191 static bool enable_name_policy(void) {
192 _cleanup_free_ char *line;
197 r = proc_cmdline(&line);
199 log_warning("Failed to read /proc/cmdline, ignoring: %s", strerror(-r));
203 FOREACH_WORD_QUOTED(w, l, line, state)
204 if (l == sizeof("net.ifnames=0") - 1 && strneq(w, "net.ifnames=0", l))
210 int link_config_load(link_config_ctx *ctx) {
214 link_configs_free(ctx);
216 if (!enable_name_policy()) {
217 ctx->enable_name_policy = false;
218 log_info("Network interface NamePolicy= disabled on kernel commandline, ignoring.");
221 /* update timestamp */
222 paths_check_timestamp(ctx->link_dirs, &ctx->link_dirs_ts_usec, true);
224 r = conf_files_list_strv(&files, ".link", NULL, (const char **)ctx->link_dirs);
226 log_error("failed to enumerate link files: %s", strerror(-r));
230 STRV_FOREACH_BACKWARDS(f, files) {
231 r = load_link(ctx, *f);
239 bool link_config_should_reload(link_config_ctx *ctx) {
240 return paths_check_timestamp(ctx->link_dirs, &ctx->link_dirs_ts_usec, false);
243 int link_config_get(link_config_ctx *ctx, struct udev_device *device, link_config **ret) {
246 LIST_FOREACH(links, link, ctx->links) {
248 if (net_match_config(link->match_mac, link->match_path,
249 link->match_driver, link->match_type, NULL,
250 udev_device_get_sysattr_value(device, "address"),
251 udev_device_get_property_value(device, "ID_PATH"),
252 udev_device_get_driver(device),
253 udev_device_get_devtype(device),
255 log_debug("Config file %s applies to device %s",
257 udev_device_get_sysname(device));
268 static bool mac_is_random(struct udev_device *device) {
273 s = udev_device_get_sysattr_value(device, "addr_assign_type");
275 return false; /* if we don't know, assume it is not random */
276 r = safe_atou(s, &type);
280 /* check for NET_ADDR_RANDOM */
284 static bool mac_is_permanent(struct udev_device *device) {
289 s = udev_device_get_sysattr_value(device, "addr_assign_type");
291 return true; /* if we don't know, assume it is permanent */
292 r = safe_atou(s, &type);
296 /* check for NET_ADDR_PERM */
300 static int get_mac(struct udev_device *device, bool want_random, struct ether_addr *mac) {
309 char machineid_buf[33];
310 const char *seed_str;
312 /* fetch some persistent data unique (on this machine) to this device */
313 name = udev_device_get_property_value(device, "ID_NET_NAME_ONBOARD");
315 name = udev_device_get_property_value(device, "ID_NET_NAME_SLOT");
317 name = udev_device_get_property_value(device, "ID_NET_NAME_PATH");
322 /* fetch some persistent data unique to this machine */
323 r = sd_id128_get_machine(&machine);
327 /* combine the data */
328 seed_str = strappenda(name, sd_id128_to_string(machine, machineid_buf));
330 /* hash to get seed */
331 seed = string_hash_func(seed_str);
336 for(i = 0; i < ETH_ALEN; i++) {
337 mac->ether_addr_octet[i] = random();
340 /* see eth_random_addr in the kernel */
341 mac->ether_addr_octet[0] &= 0xfe; /* clear multicast bit */
342 mac->ether_addr_octet[0] |= 0x02; /* set local assignment bit (IEEE802) */
347 int link_config_apply(link_config_ctx *ctx, link_config *config, struct udev_device *device, const char **name) {
348 const char *old_name;
349 const char *new_name = NULL;
350 struct ether_addr generated_mac;
351 struct ether_addr *mac = NULL;
359 r = link_config_ctx_connect(ctx);
363 old_name = udev_device_get_sysname(device);
367 if (config->description) {
368 r = udev_device_set_sysattr_value(device, "ifalias",
369 config->description);
371 log_warning("Could not set description of %s to '%s': %s",
372 old_name, config->description, strerror(-r));
375 r = ethtool_set_speed(ctx->ethtool_fd, old_name, config->speed, config->duplex);
377 log_warning("Could not set speed or duplex of %s to %u Mbytes (%s): %s",
378 old_name, config->speed, duplex_to_string(config->duplex), strerror(-r));
380 r = ethtool_set_wol(ctx->ethtool_fd, old_name, config->wol);
382 log_warning("Could not set WakeOnLan of %s to %s: %s",
383 old_name, wol_to_string(config->wol), strerror(-r));
385 ifindex = udev_device_get_ifindex(device);
387 log_warning("Could not find ifindex");
391 if (ctx->enable_name_policy && config->name_policy) {
394 for (policy = config->name_policy; !new_name && *policy != _NAMEPOLICY_INVALID; policy++) {
396 case NAMEPOLICY_ONBOARD:
397 new_name = udev_device_get_property_value(device, "ID_NET_NAME_ONBOARD");
399 case NAMEPOLICY_SLOT:
400 new_name = udev_device_get_property_value(device, "ID_NET_NAME_SLOT");
402 case NAMEPOLICY_PATH:
403 new_name = udev_device_get_property_value(device, "ID_NET_NAME_PATH");
406 new_name = udev_device_get_property_value(device, "ID_NET_NAME_MAC");
415 *name = new_name; /* a name was set by a policy */
416 else if (config->name)
417 *name = config->name; /* a name was set manually in the config */
421 switch (config->mac_policy) {
422 case MACPOLICY_PERSISTENT:
423 if (!mac_is_permanent(device)) {
424 r = get_mac(device, false, &generated_mac);
427 mac = &generated_mac;
430 case MACPOLICY_RANDOM:
431 if (!mac_is_random(device)) {
432 r = get_mac(device, true, &generated_mac);
435 mac = &generated_mac;
442 r = rtnl_set_link_properties(ctx->rtnl, ifindex, mac, config->mtu);
444 log_warning("Could not set MACAddress or MTU on %s: %s", old_name, strerror(-r));
451 static const char* const mac_policy_table[] = {
452 [MACPOLICY_PERSISTENT] = "persistent",
453 [MACPOLICY_RANDOM] = "random"
456 DEFINE_STRING_TABLE_LOOKUP(mac_policy, MACPolicy);
457 DEFINE_CONFIG_PARSE_ENUM(config_parse_mac_policy, mac_policy, MACPolicy, "Failed to parse MAC address policy");
459 static const char* const name_policy_table[] = {
460 [NAMEPOLICY_ONBOARD] = "onboard",
461 [NAMEPOLICY_SLOT] = "slot",
462 [NAMEPOLICY_PATH] = "path",
463 [NAMEPOLICY_MAC] = "mac"
466 DEFINE_STRING_TABLE_LOOKUP(name_policy, NamePolicy);
467 DEFINE_CONFIG_PARSE_ENUMV(config_parse_name_policy, name_policy, NamePolicy, _NAMEPOLICY_INVALID, "Failed to parse interface name policy");