1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright (C) 2013 Tom Gundersen <teg@jklm.no>
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
22 #include <netinet/ether.h>
27 #include "link-config.h"
28 #include "ethtool-util.h"
30 #include "libudev-private.h"
35 #include "path-util.h"
36 #include "conf-parser.h"
37 #include "conf-files.h"
40 #include "rtnl-util.h"
43 struct link_config_ctx {
44 LIST_HEAD(link_config, links);
48 bool enable_name_policy;
53 usec_t link_dirs_ts_usec;
56 DEFINE_TRIVIAL_CLEANUP_FUNC(link_config_ctx*, link_config_ctx_free);
57 #define _cleanup_link_config_ctx_free_ _cleanup_(link_config_ctx_freep)
59 int link_config_ctx_new(link_config_ctx **ret) {
60 _cleanup_link_config_ctx_free_ link_config_ctx *ctx = NULL;
65 ctx = new0(link_config_ctx, 1);
69 LIST_HEAD_INIT(ctx->links);
73 ctx->enable_name_policy = true;
75 ctx->link_dirs = strv_new("/etc/systemd/network",
76 "/run/systemd/network",
77 "/usr/lib/systemd/network",
79 "/lib/systemd/network",
82 if (!ctx->link_dirs) {
83 log_error("failed to build link config directory array");
87 if (!path_strv_canonicalize_uniq(ctx->link_dirs)) {
88 log_error("failed to canonicalize link config directories\n");
98 static int link_config_ctx_connect(link_config_ctx *ctx) {
101 if (ctx->ethtool_fd >= 0 && ctx->rtnl)
104 r = ethtool_connect(&ctx->ethtool_fd);
108 r = sd_rtnl_open(0, &ctx->rtnl);
115 static void link_configs_free(link_config_ctx *ctx) {
116 link_config *link, *link_next;
121 LIST_FOREACH_SAFE(links, link, link_next, ctx->links) {
122 free(link->filename);
123 free(link->match_path);
124 free(link->match_driver);
125 free(link->match_type);
126 free(link->description);
133 void link_config_ctx_free(link_config_ctx *ctx) {
137 if (ctx->ethtool_fd >= 0)
138 close_nointr_nofail(ctx->ethtool_fd);
140 sd_rtnl_unref(ctx->rtnl);
142 strv_free(ctx->link_dirs);
143 link_configs_free(ctx);
150 static int load_link(link_config_ctx *ctx, const char *filename) {
152 _cleanup_fclose_ FILE *file;
158 file = fopen(filename, "re");
166 link = new0(link_config, 1);
172 link->mac_policy = _MACPOLICY_INVALID;
173 link->wol = _WOL_INVALID;
174 link->duplex = _DUP_INVALID;
176 r = config_parse(NULL, filename, file, "Match\0Link\0Ethernet\0", config_item_perf_lookup,
177 (void*) link_config_gperf_lookup, false, false, link);
179 log_warning("Could not parse config file %s: %s", filename, strerror(-r));
182 log_debug("Parsed configuration file %s", filename);
184 link->filename = strdup(filename);
186 LIST_PREPEND(links, ctx->links, link);
195 static bool enable_name_policy(void) {
196 _cleanup_free_ char *line;
201 r = proc_cmdline(&line);
203 log_warning("Failed to read /proc/cmdline, ignoring: %s", strerror(-r));
207 FOREACH_WORD_QUOTED(w, l, line, state)
208 if (strneq(w, "net.ifnames=0", l))
214 int link_config_load(link_config_ctx *ctx) {
218 link_configs_free(ctx);
220 if (!enable_name_policy()) {
221 ctx->enable_name_policy = false;
222 log_info("Network interface NamePolicy= disabled on kernel commandline, ignoring.");
225 /* update timestamp */
226 paths_check_timestamp(ctx->link_dirs, &ctx->link_dirs_ts_usec, true);
228 r = conf_files_list_strv(&files, ".link", NULL, (const char **)ctx->link_dirs);
230 log_error("failed to enumerate link files: %s", strerror(-r));
234 STRV_FOREACH_BACKWARDS(f, files) {
235 r = load_link(ctx, *f);
243 bool link_config_should_reload(link_config_ctx *ctx) {
244 return paths_check_timestamp(ctx->link_dirs, &ctx->link_dirs_ts_usec, false);
247 int link_config_get(link_config_ctx *ctx, struct udev_device *device, link_config **ret) {
250 LIST_FOREACH(links, link, ctx->links) {
252 if (net_match_config(link->match_mac, link->match_path,
253 link->match_driver, link->match_type, NULL,
254 udev_device_get_sysattr_value(device, "address"),
255 udev_device_get_property_value(device, "ID_PATH"),
256 udev_device_get_driver(device),
257 udev_device_get_devtype(device),
259 log_debug("Config file %s applies to device %s",
261 udev_device_get_sysname(device));
272 static bool mac_is_random(struct udev_device *device) {
277 s = udev_device_get_sysattr_value(device, "addr_assign_type");
279 return false; /* if we don't know, assume it is not random */
280 r = safe_atou(s, &type);
284 /* check for NET_ADDR_RANDOM */
288 static bool mac_is_permanent(struct udev_device *device) {
293 s = udev_device_get_sysattr_value(device, "addr_assign_type");
295 return true; /* if we don't know, assume it is permanent */
296 r = safe_atou(s, &type);
300 /* check for NET_ADDR_PERM */
304 static int get_mac(struct udev_device *device, bool want_random, struct ether_addr *mac) {
313 char machineid_buf[33];
314 const char *seed_str;
316 /* fetch some persistent data unique (on this machine) to this device */
317 name = udev_device_get_property_value(device, "ID_NET_NAME_ONBOARD");
319 name = udev_device_get_property_value(device, "ID_NET_NAME_SLOT");
321 name = udev_device_get_property_value(device, "ID_NET_NAME_PATH");
326 /* fetch some persistent data unique to this machine */
327 r = sd_id128_get_machine(&machine);
331 /* combine the data */
332 seed_str = strappenda(name, sd_id128_to_string(machine, machineid_buf));
334 /* hash to get seed */
335 seed = string_hash_func(seed_str);
340 for (i = 0; i < ETH_ALEN; i++) {
341 mac->ether_addr_octet[i] = random();
344 /* see eth_random_addr in the kernel */
345 mac->ether_addr_octet[0] &= 0xfe; /* clear multicast bit */
346 mac->ether_addr_octet[0] |= 0x02; /* set local assignment bit (IEEE802) */
351 int link_config_apply(link_config_ctx *ctx, link_config *config, struct udev_device *device, const char **name) {
352 const char *old_name;
353 const char *new_name = NULL;
354 struct ether_addr generated_mac;
355 struct ether_addr *mac = NULL;
363 r = link_config_ctx_connect(ctx);
367 old_name = udev_device_get_sysname(device);
371 r = ethtool_set_speed(ctx->ethtool_fd, old_name, config->speed, config->duplex);
373 log_warning("Could not set speed or duplex of %s to %u Mbytes (%s): %s",
374 old_name, config->speed, duplex_to_string(config->duplex), strerror(-r));
376 r = ethtool_set_wol(ctx->ethtool_fd, old_name, config->wol);
378 log_warning("Could not set WakeOnLan of %s to %s: %s",
379 old_name, wol_to_string(config->wol), strerror(-r));
381 ifindex = udev_device_get_ifindex(device);
383 log_warning("Could not find ifindex");
387 if (ctx->enable_name_policy && config->name_policy) {
390 for (policy = config->name_policy; !new_name && *policy != _NAMEPOLICY_INVALID; policy++) {
392 case NAMEPOLICY_ONBOARD:
393 new_name = udev_device_get_property_value(device, "ID_NET_NAME_ONBOARD");
395 case NAMEPOLICY_SLOT:
396 new_name = udev_device_get_property_value(device, "ID_NET_NAME_SLOT");
398 case NAMEPOLICY_PATH:
399 new_name = udev_device_get_property_value(device, "ID_NET_NAME_PATH");
402 new_name = udev_device_get_property_value(device, "ID_NET_NAME_MAC");
411 *name = new_name; /* a name was set by a policy */
412 else if (config->name)
413 *name = config->name; /* a name was set manually in the config */
417 switch (config->mac_policy) {
418 case MACPOLICY_PERSISTENT:
419 if (!mac_is_permanent(device)) {
420 r = get_mac(device, false, &generated_mac);
423 mac = &generated_mac;
426 case MACPOLICY_RANDOM:
427 if (!mac_is_random(device)) {
428 r = get_mac(device, true, &generated_mac);
431 mac = &generated_mac;
438 r = rtnl_set_link_properties(ctx->rtnl, ifindex, config->alias, mac, config->mtu);
440 log_warning("Could not set Alias, MACAddress or MTU on %s: %s", old_name, strerror(-r));
447 static const char* const mac_policy_table[] = {
448 [MACPOLICY_PERSISTENT] = "persistent",
449 [MACPOLICY_RANDOM] = "random"
452 DEFINE_STRING_TABLE_LOOKUP(mac_policy, MACPolicy);
453 DEFINE_CONFIG_PARSE_ENUM(config_parse_mac_policy, mac_policy, MACPolicy, "Failed to parse MAC address policy");
455 static const char* const name_policy_table[] = {
456 [NAMEPOLICY_ONBOARD] = "onboard",
457 [NAMEPOLICY_SLOT] = "slot",
458 [NAMEPOLICY_PATH] = "path",
459 [NAMEPOLICY_MAC] = "mac"
462 DEFINE_STRING_TABLE_LOOKUP(name_policy, NamePolicy);
463 DEFINE_CONFIG_PARSE_ENUMV(config_parse_name_policy, name_policy, NamePolicy, _NAMEPOLICY_INVALID, "Failed to parse interface name policy");