1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright (C) 2013 Tom Gundersen <teg@jklm.no>
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
22 #include <netinet/ether.h>
27 #include "link-config.h"
28 #include "ethtool-util.h"
30 #include "libudev-private.h"
35 #include "path-util.h"
36 #include "conf-parser.h"
37 #include "conf-files.h"
40 #include "rtnl-util.h"
43 struct link_config_ctx {
44 LIST_HEAD(link_config, links);
48 bool enable_name_policy;
53 usec_t link_dirs_ts_usec;
56 DEFINE_TRIVIAL_CLEANUP_FUNC(link_config_ctx*, link_config_ctx_free);
57 #define _cleanup_link_config_ctx_free_ _cleanup_(link_config_ctx_freep)
59 int link_config_ctx_new(link_config_ctx **ret) {
60 _cleanup_link_config_ctx_free_ link_config_ctx *ctx = NULL;
65 ctx = new0(link_config_ctx, 1);
69 LIST_HEAD_INIT(ctx->links);
73 ctx->enable_name_policy = true;
75 ctx->link_dirs = strv_new("/etc/systemd/network",
76 "/run/systemd/network",
77 "/usr/lib/systemd/network",
79 "/lib/systemd/network",
82 if (!ctx->link_dirs) {
83 log_error("failed to build link config directory array");
87 if (!path_strv_canonicalize_uniq(ctx->link_dirs)) {
88 log_error("failed to canonicalize link config directories\n");
98 static int link_config_ctx_connect(link_config_ctx *ctx) {
101 if (ctx->ethtool_fd >= 0 && ctx->rtnl)
104 r = ethtool_connect(&ctx->ethtool_fd);
108 r = sd_rtnl_open(0, &ctx->rtnl);
115 static void link_configs_free(link_config_ctx *ctx) {
116 link_config *link, *link_next;
121 LIST_FOREACH_SAFE(links, link, link_next, ctx->links) {
122 free(link->filename);
123 free(link->match_path);
124 free(link->match_driver);
125 free(link->match_type);
126 free(link->description);
132 void link_config_ctx_free(link_config_ctx *ctx) {
136 if (ctx->ethtool_fd >= 0)
137 close_nointr_nofail(ctx->ethtool_fd);
139 sd_rtnl_unref(ctx->rtnl);
141 strv_free(ctx->link_dirs);
142 link_configs_free(ctx);
149 static int load_link(link_config_ctx *ctx, const char *filename) {
154 file = fopen(filename, "re");
162 link = new0(link_config, 1);
168 link->mac_policy = _MACPOLICY_INVALID;
169 link->wol = _WOL_INVALID;
170 link->duplex = _DUP_INVALID;
173 r = config_parse(NULL, filename, file, "Match\0Link\0Ethernet\0", config_item_perf_lookup,
174 (void*) link_config_gperf_lookup, false, false, link);
176 log_warning("Colud not parse config file %s: %s", filename, strerror(-r));
179 log_debug("Parsed configuration file %s", filename);
181 link->filename = strdup(filename);
183 LIST_PREPEND(links, ctx->links, link);
192 static bool enable_name_policy(void) {
193 _cleanup_free_ char *line;
198 r = read_one_line_file("/proc/cmdline", &line);
200 log_warning("Failed to read /proc/cmdline, ignoring: %s", strerror(-r));
201 return true; /* something is very wrong, let's not make it worse */
204 FOREACH_WORD_QUOTED(w, l, line, state)
205 if (strneq(w, "net.ifnames=0", l))
211 int link_config_load(link_config_ctx *ctx) {
215 link_configs_free(ctx);
217 if (!enable_name_policy()) {
218 ctx->enable_name_policy = false;
219 log_info("Network interface NamePolicy= disabled on kernel commandline, ignoring.");
222 /* update timestamp */
223 paths_check_timestamp(ctx->link_dirs, &ctx->link_dirs_ts_usec, true);
225 r = conf_files_list_strv(&files, ".link", NULL, (const char **)ctx->link_dirs);
227 log_error("failed to enumerate link files: %s", strerror(-r));
231 STRV_FOREACH_BACKWARDS(f, files) {
232 r = load_link(ctx, *f);
240 bool link_config_should_reload(link_config_ctx *ctx) {
241 return paths_check_timestamp(ctx->link_dirs, &ctx->link_dirs_ts_usec, false);
244 int link_config_get(link_config_ctx *ctx, struct udev_device *device, link_config **ret) {
247 LIST_FOREACH(links, link, ctx->links) {
248 if (net_match_config(link->match_mac, link->match_path,
249 link->match_driver, link->match_type,
251 log_debug("Config file %s applies to device %s",
253 udev_device_get_sysname(device));
264 static bool mac_is_random(struct udev_device *device) {
269 s = udev_device_get_sysattr_value(device, "addr_assign_type");
271 return false; /* if we don't know, assume it is not random */
272 r = safe_atou(s, &type);
276 /* check for NET_ADDR_RANDOM */
280 static bool mac_is_permanent(struct udev_device *device) {
285 s = udev_device_get_sysattr_value(device, "addr_assign_type");
287 return true; /* if we don't know, assume it is permanent */
288 r = safe_atou(s, &type);
292 /* check for NET_ADDR_PERM */
296 static int get_mac(struct udev_device *device, bool want_random, struct ether_addr *mac) {
305 char machineid_buf[33];
306 const char *seed_str;
308 /* fetch some persistent data unique (on this machine) to this device */
309 name = udev_device_get_property_value(device, "ID_NET_NAME_ONBOARD");
311 name = udev_device_get_property_value(device, "ID_NET_NAME_SLOT");
313 name = udev_device_get_property_value(device, "ID_NET_NAME_PATH");
318 /* fetch some persistent data unique to this machine */
319 r = sd_id128_get_machine(&machine);
323 /* combine the data */
324 seed_str = strappenda(name, sd_id128_to_string(machine, machineid_buf));
326 /* hash to get seed */
327 seed = string_hash_func(seed_str);
332 for(i = 0; i < ETH_ALEN; i++) {
333 mac->ether_addr_octet[i] = random();
336 /* see eth_random_addr in the kernel */
337 mac->ether_addr_octet[0] &= 0xfe; /* clear multicast bit */
338 mac->ether_addr_octet[0] |= 0x02; /* set local assignment bit (IEEE802) */
343 int link_config_apply(link_config_ctx *ctx, link_config *config, struct udev_device *device, const char **name) {
344 const char *old_name;
345 const char *new_name = NULL;
346 struct ether_addr generated_mac;
347 struct ether_addr *mac = NULL;
355 r = link_config_ctx_connect(ctx);
359 old_name = udev_device_get_sysname(device);
363 if (config->description) {
364 r = udev_device_set_sysattr_value(device, "ifalias",
365 config->description);
367 log_warning("Could not set description of %s to '%s': %s",
368 old_name, config->description, strerror(-r));
371 r = ethtool_set_speed(ctx->ethtool_fd, old_name, config->speed, config->duplex);
373 log_warning("Could not set speed or duplex of %s to %u Mbytes (%s): %s",
374 old_name, config->speed, duplex_to_string(config->duplex), strerror(-r));
376 r = ethtool_set_wol(ctx->ethtool_fd, old_name, config->wol);
378 log_warning("Could not set WakeOnLan of %s to %s: %s",
379 old_name, wol_to_string(config->wol), strerror(-r));
381 ifindex = udev_device_get_ifindex(device);
383 log_warning("Could not find ifindex");
387 if (ctx->enable_name_policy && config->name_policy) {
390 for (policy = config->name_policy; !new_name && *policy != _NAMEPOLICY_INVALID; policy++) {
392 case NAMEPOLICY_ONBOARD:
393 new_name = udev_device_get_property_value(device, "ID_NET_NAME_ONBOARD");
395 case NAMEPOLICY_SLOT:
396 new_name = udev_device_get_property_value(device, "ID_NET_NAME_SLOT");
398 case NAMEPOLICY_PATH:
399 new_name = udev_device_get_property_value(device, "ID_NET_NAME_PATH");
402 new_name = udev_device_get_property_value(device, "ID_NET_NAME_MAC");
411 *name = new_name; /* a name was set by a policy */
412 else if (config->name)
413 *name = config->name; /* a name was set manually in the config */
417 switch (config->mac_policy) {
418 case MACPOLICY_PERSISTENT:
419 if (!mac_is_permanent(device)) {
420 r = get_mac(device, false, &generated_mac);
423 mac = &generated_mac;
426 case MACPOLICY_RANDOM:
427 if (!mac_is_random(device)) {
428 r = get_mac(device, true, &generated_mac);
431 mac = &generated_mac;
438 r = rtnl_set_link_properties(ctx->rtnl, ifindex, mac, config->mtu);
440 log_warning("Could not set MACAddress or MTU on %s: %s", old_name, strerror(-r));
447 static const char* const mac_policy_table[] = {
448 [MACPOLICY_PERSISTENT] = "persistent",
449 [MACPOLICY_RANDOM] = "random"
452 DEFINE_STRING_TABLE_LOOKUP(mac_policy, MACPolicy);
453 DEFINE_CONFIG_PARSE_ENUM(config_parse_mac_policy, mac_policy, MACPolicy, "Failed to parse MAC address policy");
455 static const char* const name_policy_table[] = {
456 [NAMEPOLICY_ONBOARD] = "onboard",
457 [NAMEPOLICY_SLOT] = "slot",
458 [NAMEPOLICY_PATH] = "path",
459 [NAMEPOLICY_MAC] = "mac"
462 DEFINE_STRING_TABLE_LOOKUP(name_policy, NamePolicy);
463 DEFINE_CONFIG_PARSE_ENUMV(config_parse_name_policy, name_policy, NamePolicy, _NAMEPOLICY_INVALID, "Failed to parse interface name policy");