1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright (C) 2013 Tom Gundersen <teg@jklm.no>
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
22 #include <netinet/ether.h>
27 #include "link-config.h"
28 #include "ethtool-util.h"
30 #include "libudev-private.h"
35 #include "path-util.h"
36 #include "conf-parser.h"
37 #include "conf-files.h"
40 #include "rtnl-util.h"
43 struct link_config_ctx {
44 LIST_HEAD(link_config, links);
48 bool enable_name_policy;
53 usec_t link_dirs_ts_usec;
56 DEFINE_TRIVIAL_CLEANUP_FUNC(link_config_ctx*, link_config_ctx_free);
57 #define _cleanup_link_config_ctx_free_ _cleanup_(link_config_ctx_freep)
59 int link_config_ctx_new(link_config_ctx **ret) {
60 _cleanup_link_config_ctx_free_ link_config_ctx *ctx = NULL;
65 ctx = new0(link_config_ctx, 1);
69 LIST_HEAD_INIT(ctx->links);
73 ctx->enable_name_policy = true;
75 ctx->link_dirs = strv_new("/etc/systemd/network",
76 "/run/systemd/network",
77 "/usr/lib/systemd/network",
79 "/lib/systemd/network",
82 if (!ctx->link_dirs) {
83 log_error("failed to build link config directory array");
87 if (!path_strv_canonicalize_uniq(ctx->link_dirs)) {
88 log_error("failed to canonicalize link config directories\n");
98 static int link_config_ctx_connect(link_config_ctx *ctx) {
101 if (ctx->ethtool_fd >= 0 && ctx->rtnl)
104 r = ethtool_connect(&ctx->ethtool_fd);
108 r = sd_rtnl_open(0, &ctx->rtnl);
115 static void link_configs_free(link_config_ctx *ctx) {
116 link_config *link, *link_next;
121 LIST_FOREACH_SAFE(links, link, link_next, ctx->links) {
122 free(link->filename);
123 free(link->match_path);
124 free(link->match_driver);
125 free(link->match_type);
126 free(link->description);
133 void link_config_ctx_free(link_config_ctx *ctx) {
137 if (ctx->ethtool_fd >= 0)
138 close_nointr_nofail(ctx->ethtool_fd);
140 sd_rtnl_unref(ctx->rtnl);
142 strv_free(ctx->link_dirs);
143 link_configs_free(ctx);
150 static int load_link(link_config_ctx *ctx, const char *filename) {
155 file = fopen(filename, "re");
163 link = new0(link_config, 1);
169 link->mac_policy = _MACPOLICY_INVALID;
170 link->wol = _WOL_INVALID;
171 link->duplex = _DUP_INVALID;
173 r = config_parse(NULL, filename, file, "Match\0Link\0Ethernet\0", config_item_perf_lookup,
174 (void*) link_config_gperf_lookup, false, false, link);
176 log_warning("Could not parse config file %s: %s", filename, strerror(-r));
179 log_debug("Parsed configuration file %s", filename);
181 link->filename = strdup(filename);
183 LIST_PREPEND(links, ctx->links, link);
192 static bool enable_name_policy(void) {
193 _cleanup_free_ char *line;
198 r = proc_cmdline(&line);
200 log_warning("Failed to read /proc/cmdline, ignoring: %s", strerror(-r));
204 FOREACH_WORD_QUOTED(w, l, line, state)
205 if (strneq(w, "net.ifnames=0", l))
211 int link_config_load(link_config_ctx *ctx) {
215 link_configs_free(ctx);
217 if (!enable_name_policy()) {
218 ctx->enable_name_policy = false;
219 log_info("Network interface NamePolicy= disabled on kernel commandline, ignoring.");
222 /* update timestamp */
223 paths_check_timestamp(ctx->link_dirs, &ctx->link_dirs_ts_usec, true);
225 r = conf_files_list_strv(&files, ".link", NULL, (const char **)ctx->link_dirs);
227 log_error("failed to enumerate link files: %s", strerror(-r));
231 STRV_FOREACH_BACKWARDS(f, files) {
232 r = load_link(ctx, *f);
240 bool link_config_should_reload(link_config_ctx *ctx) {
241 return paths_check_timestamp(ctx->link_dirs, &ctx->link_dirs_ts_usec, false);
244 int link_config_get(link_config_ctx *ctx, struct udev_device *device, link_config **ret) {
247 LIST_FOREACH(links, link, ctx->links) {
249 if (net_match_config(link->match_mac, link->match_path,
250 link->match_driver, link->match_type, NULL,
251 udev_device_get_sysattr_value(device, "address"),
252 udev_device_get_property_value(device, "ID_PATH"),
253 udev_device_get_driver(device),
254 udev_device_get_devtype(device),
256 log_debug("Config file %s applies to device %s",
258 udev_device_get_sysname(device));
269 static bool mac_is_random(struct udev_device *device) {
274 s = udev_device_get_sysattr_value(device, "addr_assign_type");
276 return false; /* if we don't know, assume it is not random */
277 r = safe_atou(s, &type);
281 /* check for NET_ADDR_RANDOM */
285 static bool mac_is_permanent(struct udev_device *device) {
290 s = udev_device_get_sysattr_value(device, "addr_assign_type");
292 return true; /* if we don't know, assume it is permanent */
293 r = safe_atou(s, &type);
297 /* check for NET_ADDR_PERM */
301 static int get_mac(struct udev_device *device, bool want_random, struct ether_addr *mac) {
310 char machineid_buf[33];
311 const char *seed_str;
313 /* fetch some persistent data unique (on this machine) to this device */
314 name = udev_device_get_property_value(device, "ID_NET_NAME_ONBOARD");
316 name = udev_device_get_property_value(device, "ID_NET_NAME_SLOT");
318 name = udev_device_get_property_value(device, "ID_NET_NAME_PATH");
323 /* fetch some persistent data unique to this machine */
324 r = sd_id128_get_machine(&machine);
328 /* combine the data */
329 seed_str = strappenda(name, sd_id128_to_string(machine, machineid_buf));
331 /* hash to get seed */
332 seed = string_hash_func(seed_str);
337 for(i = 0; i < ETH_ALEN; i++) {
338 mac->ether_addr_octet[i] = random();
341 /* see eth_random_addr in the kernel */
342 mac->ether_addr_octet[0] &= 0xfe; /* clear multicast bit */
343 mac->ether_addr_octet[0] |= 0x02; /* set local assignment bit (IEEE802) */
348 int link_config_apply(link_config_ctx *ctx, link_config *config, struct udev_device *device, const char **name) {
349 const char *old_name;
350 const char *new_name = NULL;
351 struct ether_addr generated_mac;
352 struct ether_addr *mac = NULL;
360 r = link_config_ctx_connect(ctx);
364 old_name = udev_device_get_sysname(device);
368 r = ethtool_set_speed(ctx->ethtool_fd, old_name, config->speed, config->duplex);
370 log_warning("Could not set speed or duplex of %s to %u Mbytes (%s): %s",
371 old_name, config->speed, duplex_to_string(config->duplex), strerror(-r));
373 r = ethtool_set_wol(ctx->ethtool_fd, old_name, config->wol);
375 log_warning("Could not set WakeOnLan of %s to %s: %s",
376 old_name, wol_to_string(config->wol), strerror(-r));
378 ifindex = udev_device_get_ifindex(device);
380 log_warning("Could not find ifindex");
384 if (ctx->enable_name_policy && config->name_policy) {
387 for (policy = config->name_policy; !new_name && *policy != _NAMEPOLICY_INVALID; policy++) {
389 case NAMEPOLICY_ONBOARD:
390 new_name = udev_device_get_property_value(device, "ID_NET_NAME_ONBOARD");
392 case NAMEPOLICY_SLOT:
393 new_name = udev_device_get_property_value(device, "ID_NET_NAME_SLOT");
395 case NAMEPOLICY_PATH:
396 new_name = udev_device_get_property_value(device, "ID_NET_NAME_PATH");
399 new_name = udev_device_get_property_value(device, "ID_NET_NAME_MAC");
408 *name = new_name; /* a name was set by a policy */
409 else if (config->name)
410 *name = config->name; /* a name was set manually in the config */
414 switch (config->mac_policy) {
415 case MACPOLICY_PERSISTENT:
416 if (!mac_is_permanent(device)) {
417 r = get_mac(device, false, &generated_mac);
420 mac = &generated_mac;
423 case MACPOLICY_RANDOM:
424 if (!mac_is_random(device)) {
425 r = get_mac(device, true, &generated_mac);
428 mac = &generated_mac;
435 r = rtnl_set_link_properties(ctx->rtnl, ifindex, config->alias, mac, config->mtu);
437 log_warning("Could not set Alias, MACAddress or MTU on %s: %s", old_name, strerror(-r));
444 static const char* const mac_policy_table[] = {
445 [MACPOLICY_PERSISTENT] = "persistent",
446 [MACPOLICY_RANDOM] = "random"
449 DEFINE_STRING_TABLE_LOOKUP(mac_policy, MACPolicy);
450 DEFINE_CONFIG_PARSE_ENUM(config_parse_mac_policy, mac_policy, MACPolicy, "Failed to parse MAC address policy");
452 static const char* const name_policy_table[] = {
453 [NAMEPOLICY_ONBOARD] = "onboard",
454 [NAMEPOLICY_SLOT] = "slot",
455 [NAMEPOLICY_PATH] = "path",
456 [NAMEPOLICY_MAC] = "mac"
459 DEFINE_STRING_TABLE_LOOKUP(name_policy, NamePolicy);
460 DEFINE_CONFIG_PARSE_ENUMV(config_parse_name_policy, name_policy, NamePolicy, _NAMEPOLICY_INVALID, "Failed to parse interface name policy");