mirror of
https://gitlab.freedesktop.org/NetworkManager/NetworkManager.git
synced 2025-12-25 13:00:16 +01:00
update_ip6_config() also removes addresses and routes no longer present externally from the configuration, so it can't be called before the changes are committed. This reverts commit8f4caab601. (cherry picked from commitd626298b48)
14475 lines
464 KiB
C
14475 lines
464 KiB
C
/* -*- Mode: C; tab-width: 4; indent-tabs-mode: t; c-basic-offset: 4 -*- */
|
|
/* NetworkManager -- Network link manager
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License along
|
|
* with this program; if not, write to the Free Software Foundation, Inc.,
|
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*
|
|
* Copyright (C) 2005 - 2017 Red Hat, Inc.
|
|
* Copyright (C) 2006 - 2008 Novell, Inc.
|
|
*/
|
|
|
|
#include "nm-default.h"
|
|
|
|
#include "nm-device.h"
|
|
|
|
#include <netinet/in.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include <errno.h>
|
|
#include <sys/ioctl.h>
|
|
#include <signal.h>
|
|
#include <sys/types.h>
|
|
#include <sys/wait.h>
|
|
#include <arpa/inet.h>
|
|
#include <fcntl.h>
|
|
#include <linux/if_addr.h>
|
|
|
|
#include "nm-common-macros.h"
|
|
#include "nm-device-private.h"
|
|
#include "NetworkManagerUtils.h"
|
|
#include "nm-manager.h"
|
|
#include "platform/nm-platform.h"
|
|
#include "ndisc/nm-ndisc.h"
|
|
#include "ndisc/nm-lndp-ndisc.h"
|
|
#include "dhcp/nm-dhcp-manager.h"
|
|
#include "nm-act-request.h"
|
|
#include "nm-proxy-config.h"
|
|
#include "nm-ip4-config.h"
|
|
#include "nm-ip6-config.h"
|
|
#include "nm-pacrunner-manager.h"
|
|
#include "dnsmasq/nm-dnsmasq-manager.h"
|
|
#include "nm-dhcp4-config.h"
|
|
#include "nm-dhcp6-config.h"
|
|
#include "nm-rfkill-manager.h"
|
|
#include "nm-firewall-manager.h"
|
|
#include "settings/nm-settings-connection.h"
|
|
#include "settings/nm-settings.h"
|
|
#include "nm-auth-utils.h"
|
|
#include "nm-netns.h"
|
|
#include "nm-dispatcher.h"
|
|
#include "nm-config.h"
|
|
#include "dns/nm-dns-manager.h"
|
|
#include "nm-core-internal.h"
|
|
#include "nm-default-route-manager.h"
|
|
#include "nm-route-manager.h"
|
|
#include "systemd/nm-sd.h"
|
|
#include "nm-lldp-listener.h"
|
|
#include "nm-audit-manager.h"
|
|
#include "nm-arping-manager.h"
|
|
#include "nm-connectivity.h"
|
|
#include "nm-dbus-interface.h"
|
|
|
|
#include "nm-device-logging.h"
|
|
_LOG_DECLARE_SELF (NMDevice);
|
|
|
|
#include "introspection/org.freedesktop.NetworkManager.Device.h"
|
|
#include "introspection/org.freedesktop.NetworkManager.Device.Statistics.h"
|
|
|
|
/*****************************************************************************/
|
|
|
|
#define DHCP_RESTART_TIMEOUT 120
|
|
#define DHCP_NUM_TRIES_MAX 3
|
|
#define DEFAULT_AUTOCONNECT TRUE
|
|
|
|
/*****************************************************************************/
|
|
|
|
typedef void (*ActivationHandleFunc) (NMDevice *self);
|
|
|
|
typedef struct {
|
|
ActivationHandleFunc func;
|
|
guint id;
|
|
} ActivationHandleData;
|
|
|
|
typedef enum {
|
|
CLEANUP_TYPE_KEEP,
|
|
CLEANUP_TYPE_REMOVED,
|
|
CLEANUP_TYPE_DECONFIGURE,
|
|
} CleanupType;
|
|
|
|
typedef enum {
|
|
IP_NONE = 0,
|
|
IP_WAIT,
|
|
IP_CONF,
|
|
IP_DONE,
|
|
IP_FAIL
|
|
} IpState;
|
|
|
|
typedef struct {
|
|
NMDevice *slave;
|
|
gulong watch_id;
|
|
bool slave_is_enslaved;
|
|
bool configure;
|
|
} SlaveInfo;
|
|
|
|
typedef struct {
|
|
NMDevice *device;
|
|
guint idle_add_id;
|
|
int ifindex;
|
|
} DeleteOnDeactivateData;
|
|
|
|
typedef void (*ArpingCallback) (NMDevice *, NMIP4Config **, gboolean);
|
|
|
|
typedef struct {
|
|
ArpingCallback callback;
|
|
NMDevice *device;
|
|
NMIP4Config **configs;
|
|
} ArpingData;
|
|
|
|
typedef enum {
|
|
HW_ADDR_TYPE_UNSET = 0,
|
|
HW_ADDR_TYPE_PERMANENT,
|
|
HW_ADDR_TYPE_EXPLICIT,
|
|
HW_ADDR_TYPE_GENERATED,
|
|
} HwAddrType;
|
|
|
|
typedef enum {
|
|
FIREWALL_STATE_UNMANAGED = 0,
|
|
FIREWALL_STATE_INITIALIZED,
|
|
FIREWALL_STATE_WAIT_STAGE_3,
|
|
FIREWALL_STATE_WAIT_IP_CONFIG,
|
|
} FirewallState;
|
|
|
|
/*****************************************************************************/
|
|
|
|
enum {
|
|
STATE_CHANGED,
|
|
AUTOCONNECT_ALLOWED,
|
|
AUTH_REQUEST,
|
|
IP4_CONFIG_CHANGED,
|
|
IP6_CONFIG_CHANGED,
|
|
IP6_PREFIX_DELEGATED,
|
|
IP6_SUBNET_NEEDED,
|
|
REMOVED,
|
|
RECHECK_AUTO_ACTIVATE,
|
|
RECHECK_ASSUME,
|
|
LAST_SIGNAL,
|
|
};
|
|
static guint signals[LAST_SIGNAL] = { 0 };
|
|
|
|
NM_GOBJECT_PROPERTIES_DEFINE (NMDevice,
|
|
PROP_UDI,
|
|
PROP_IFACE,
|
|
PROP_IP_IFACE,
|
|
PROP_DRIVER,
|
|
PROP_DRIVER_VERSION,
|
|
PROP_FIRMWARE_VERSION,
|
|
PROP_CAPABILITIES,
|
|
PROP_CARRIER,
|
|
PROP_MTU,
|
|
PROP_IP4_ADDRESS,
|
|
PROP_IP4_CONFIG,
|
|
PROP_DHCP4_CONFIG,
|
|
PROP_IP6_CONFIG,
|
|
PROP_DHCP6_CONFIG,
|
|
PROP_STATE,
|
|
PROP_STATE_REASON,
|
|
PROP_ACTIVE_CONNECTION,
|
|
PROP_DEVICE_TYPE,
|
|
PROP_LINK_TYPE,
|
|
PROP_MANAGED,
|
|
PROP_AUTOCONNECT,
|
|
PROP_FIRMWARE_MISSING,
|
|
PROP_NM_PLUGIN_MISSING,
|
|
PROP_TYPE_DESC,
|
|
PROP_RFKILL_TYPE,
|
|
PROP_IFINDEX,
|
|
PROP_AVAILABLE_CONNECTIONS,
|
|
PROP_PHYSICAL_PORT_ID,
|
|
PROP_IS_MASTER,
|
|
PROP_MASTER,
|
|
PROP_PARENT,
|
|
PROP_HW_ADDRESS,
|
|
PROP_PERM_HW_ADDRESS,
|
|
PROP_HAS_PENDING_ACTION,
|
|
PROP_METERED,
|
|
PROP_LLDP_NEIGHBORS,
|
|
PROP_REAL,
|
|
PROP_SLAVES,
|
|
PROP_REFRESH_RATE_MS,
|
|
PROP_TX_BYTES,
|
|
PROP_RX_BYTES,
|
|
PROP_CONNECTIVITY,
|
|
);
|
|
|
|
typedef struct _NMDevicePrivate {
|
|
bool in_state_changed;
|
|
|
|
guint device_link_changed_id;
|
|
guint device_ip_link_changed_id;
|
|
|
|
NMDeviceState state;
|
|
NMDeviceStateReason state_reason;
|
|
struct {
|
|
guint id;
|
|
|
|
/* The @state/@reason is only valid, when @id is set. */
|
|
NMDeviceState state;
|
|
NMDeviceStateReason reason;
|
|
} queued_state;
|
|
|
|
guint queued_ip4_config_id;
|
|
guint queued_ip6_config_id;
|
|
GSList *pending_actions;
|
|
GSList *dad6_failed_addrs;
|
|
|
|
NMDevice *parent_device;
|
|
|
|
char * udi;
|
|
char * iface; /* may change, could be renamed by user */
|
|
int ifindex;
|
|
|
|
int parent_ifindex;
|
|
|
|
union {
|
|
const guint8 hw_addr_len; /* read-only */
|
|
guint8 hw_addr_len_;
|
|
};
|
|
|
|
HwAddrType hw_addr_type:5;
|
|
|
|
bool real:1;
|
|
|
|
/* there was a IP config change, but no idle action was scheduled because device
|
|
* is still not platform-init */
|
|
bool queued_ip4_config_pending:1;
|
|
bool queued_ip6_config_pending:1;
|
|
|
|
char * ip_iface;
|
|
int ip_ifindex;
|
|
NMDeviceType type;
|
|
char * type_desc;
|
|
char * type_description;
|
|
NMLinkType link_type;
|
|
NMDeviceCapabilities capabilities;
|
|
char * driver;
|
|
char * driver_version;
|
|
char * firmware_version;
|
|
RfKillType rfkill_type;
|
|
bool firmware_missing:1;
|
|
bool nm_plugin_missing:1;
|
|
bool hw_addr_perm_fake:1; /* whether the permanent HW address could not be read and is a fake */
|
|
|
|
NMUtilsStableType current_stable_id_type:3;
|
|
|
|
bool is_nm_owned:1; /* whether the device is a device owned and created by NM */
|
|
|
|
GHashTable * available_connections;
|
|
char * hw_addr;
|
|
char * hw_addr_perm;
|
|
char * hw_addr_initial;
|
|
char * physical_port_id;
|
|
guint dev_id;
|
|
|
|
NMUnmanagedFlags unmanaged_mask;
|
|
NMUnmanagedFlags unmanaged_flags;
|
|
DeleteOnDeactivateData *delete_on_deactivate_data; /* data for scheduled cleanup when deleting link (g_idle_add) */
|
|
|
|
GCancellable *deactivating_cancellable;
|
|
|
|
guint32 ip4_address;
|
|
|
|
NMActRequest * queued_act_request;
|
|
bool queued_act_request_is_waiting_for_carrier:1;
|
|
bool act_request_public:1;
|
|
NMActRequest *act_request;
|
|
gulong act_request_id;
|
|
ActivationHandleData act_handle4; /* for layer2 and IPv4. */
|
|
ActivationHandleData act_handle6;
|
|
guint recheck_assume_id;
|
|
struct {
|
|
guint call_id;
|
|
NMDeviceStateReason available_reason;
|
|
NMDeviceStateReason unavailable_reason;
|
|
} recheck_available;
|
|
struct {
|
|
guint call_id;
|
|
NMDeviceState post_state;
|
|
NMDeviceStateReason post_state_reason;
|
|
} dispatcher;
|
|
|
|
/* Link stuff */
|
|
guint link_connected_id;
|
|
guint link_disconnected_id;
|
|
guint carrier_defer_id;
|
|
guint carrier_wait_id;
|
|
gulong config_changed_id;
|
|
guint32 mtu;
|
|
guint32 ip6_mtu;
|
|
guint32 mtu_initial;
|
|
guint32 ip6_mtu_initial;
|
|
|
|
bool carrier:1;
|
|
bool ignore_carrier:1;
|
|
|
|
bool mtu_initialized:1;
|
|
|
|
bool up:1; /* IFF_UP */
|
|
|
|
bool v4_commit_first_time:1;
|
|
bool v6_commit_first_time:1;
|
|
|
|
NMDeviceSysIfaceState sys_iface_state:2;
|
|
|
|
/* Generic DHCP stuff */
|
|
guint32 dhcp_timeout;
|
|
char * dhcp_anycast_address;
|
|
|
|
char * current_stable_id;
|
|
|
|
/* Proxy Configuration */
|
|
NMProxyConfig *proxy_config;
|
|
NMPacrunnerManager *pacrunner_manager;
|
|
NMPacrunnerCallId *pacrunner_call_id;
|
|
|
|
/* IP4 configuration info */
|
|
NMIP4Config * ip4_config; /* Combined config from VPN, settings, and device */
|
|
union {
|
|
const IpState ip4_state;
|
|
IpState ip4_state_;
|
|
};
|
|
NMIP4Config * con_ip4_config; /* config from the setting */
|
|
NMIP4Config * dev_ip4_config; /* Config from DHCP, PPP, LLv4, etc */
|
|
NMIP4Config * ext_ip4_config; /* Stuff added outside NM */
|
|
NMIP4Config * wwan_ip4_config; /* WWAN configuration */
|
|
GSList * vpn4_configs; /* VPNs which use this device */
|
|
struct {
|
|
bool v4_has;
|
|
bool v4_is_assumed;
|
|
bool v6_has;
|
|
bool v6_is_assumed;
|
|
NMPlatformIP4Route v4;
|
|
NMPlatformIP6Route v6;
|
|
} default_route;
|
|
bool v4_has_shadowed_routes;
|
|
const char *ip4_rp_filter;
|
|
|
|
/* DHCPv4 tracking */
|
|
struct {
|
|
NMDhcpClient * client;
|
|
gulong state_sigid;
|
|
NMDhcp4Config * config;
|
|
guint restart_id;
|
|
guint num_tries_left;
|
|
char * pac_url;
|
|
bool was_active;
|
|
} dhcp4;
|
|
|
|
struct {
|
|
NMLogDomain log_domain;
|
|
guint timeout;
|
|
guint watch;
|
|
GPid pid;
|
|
const char *binary;
|
|
const char *address;
|
|
guint deadline;
|
|
} gw_ping;
|
|
|
|
/* dnsmasq stuff for shared connections */
|
|
NMDnsMasqManager *dnsmasq_manager;
|
|
gulong dnsmasq_state_id;
|
|
|
|
/* Firewall */
|
|
FirewallState fw_state:4;
|
|
NMFirewallManager *fw_mgr;
|
|
NMFirewallManagerCallId fw_call;
|
|
|
|
/* IPv4LL stuff */
|
|
sd_ipv4ll * ipv4ll;
|
|
guint ipv4ll_timeout;
|
|
|
|
/* IPv4 DAD stuff */
|
|
struct {
|
|
GSList * dad_list;
|
|
NMArpingManager * announcing;
|
|
} arping;
|
|
|
|
/* IP6 configuration info */
|
|
NMIP6Config * ip6_config;
|
|
union {
|
|
const IpState ip6_state;
|
|
IpState ip6_state_;
|
|
};
|
|
NMIP6Config * con_ip6_config; /* config from the setting */
|
|
NMIP6Config * wwan_ip6_config;
|
|
NMIP6Config * ext_ip6_config; /* Stuff added outside NM */
|
|
NMIP6Config * ext_ip6_config_captured; /* Configuration captured from platform. */
|
|
GSList * vpn6_configs; /* VPNs which use this device */
|
|
bool nm_ipv6ll; /* TRUE if NM handles the device's IPv6LL address */
|
|
NMIP6Config * dad6_ip6_config;
|
|
|
|
NMNDisc * ndisc;
|
|
gulong ndisc_changed_id;
|
|
gulong ndisc_timeout_id;
|
|
NMSettingIP6ConfigPrivacy ndisc_use_tempaddr;
|
|
/* IP6 config from autoconf */
|
|
NMIP6Config * ac_ip6_config;
|
|
|
|
guint linklocal6_timeout_id;
|
|
guint8 linklocal6_dad_counter;
|
|
|
|
GHashTable * ip6_saved_properties;
|
|
|
|
struct {
|
|
NMDhcpClient * client;
|
|
NMNDiscDHCPLevel mode;
|
|
gulong state_sigid;
|
|
gulong prefix_sigid;
|
|
NMDhcp6Config * config;
|
|
/* IP6 config from DHCP */
|
|
NMIP6Config * ip6_config;
|
|
/* Event ID of the current IP6 config from DHCP */
|
|
char * event_id;
|
|
guint restart_id;
|
|
guint num_tries_left;
|
|
guint needed_prefixes;
|
|
bool was_active;
|
|
} dhcp6;
|
|
|
|
gboolean needs_ip6_subnet;
|
|
|
|
/* allow autoconnect feature */
|
|
bool autoconnect_intern:1;
|
|
bool autoconnect_user:1;
|
|
|
|
/* master interface for bridge/bond/team slave */
|
|
NMDevice * master;
|
|
bool is_enslaved;
|
|
bool master_ready_handled;
|
|
gulong master_ready_id;
|
|
|
|
/* slave management */
|
|
bool is_master;
|
|
GSList * slaves; /* list of SlaveInfo */
|
|
|
|
NMMetered metered;
|
|
|
|
NMSettings *settings;
|
|
|
|
NMNetns *netns;
|
|
|
|
NMLldpListener *lldp_listener;
|
|
NMConnectivityState connectivity_state;
|
|
guint concheck_periodic_id;
|
|
guint64 concheck_seq;
|
|
|
|
guint check_delete_unrealized_id;
|
|
|
|
struct {
|
|
guint timeout_id;
|
|
guint refresh_rate_ms;
|
|
guint64 tx_bytes;
|
|
guint64 rx_bytes;
|
|
} stats;
|
|
|
|
} NMDevicePrivate;
|
|
|
|
G_DEFINE_ABSTRACT_TYPE (NMDevice, nm_device, NM_TYPE_EXPORTED_OBJECT)
|
|
|
|
#define NM_DEVICE_GET_PRIVATE(self) _NM_GET_PRIVATE_PTR(self, NMDevice, NM_IS_DEVICE)
|
|
|
|
/*****************************************************************************/
|
|
|
|
static void nm_device_set_proxy_config (NMDevice *self, const char *pac_url);
|
|
|
|
static gboolean nm_device_set_ip4_config (NMDevice *self,
|
|
NMIP4Config *config,
|
|
guint32 default_route_metric,
|
|
gboolean commit,
|
|
gboolean routes_full_sync);
|
|
static gboolean ip4_config_merge_and_apply (NMDevice *self,
|
|
NMIP4Config *config,
|
|
gboolean commit);
|
|
|
|
static gboolean nm_device_set_ip6_config (NMDevice *self,
|
|
NMIP6Config *config,
|
|
gboolean commit,
|
|
gboolean routes_full_sync);
|
|
static gboolean ip6_config_merge_and_apply (NMDevice *self,
|
|
gboolean commit);
|
|
|
|
static gboolean nm_device_master_add_slave (NMDevice *self, NMDevice *slave, gboolean configure);
|
|
static void nm_device_slave_notify_enslave (NMDevice *self, gboolean success);
|
|
static void nm_device_slave_notify_release (NMDevice *self, NMDeviceStateReason reason);
|
|
|
|
static gboolean addrconf6_start_with_link_ready (NMDevice *self);
|
|
static NMActStageReturn linklocal6_start (NMDevice *self);
|
|
|
|
static void _carrier_wait_check_queued_act_request (NMDevice *self);
|
|
|
|
static void nm_device_set_autoconnect_both (NMDevice *self, gboolean autoconnect);
|
|
static void nm_device_set_autoconnect_full (NMDevice *self, int autoconnect_intern, int autoconnect_user);
|
|
|
|
static const char *_activation_func_to_string (ActivationHandleFunc func);
|
|
static void activation_source_handle_cb (NMDevice *self, int family);
|
|
|
|
static void _set_state_full (NMDevice *self,
|
|
NMDeviceState state,
|
|
NMDeviceStateReason reason,
|
|
gboolean quitting);
|
|
static void queued_state_clear (NMDevice *device);
|
|
static gboolean queued_ip4_config_change (gpointer user_data);
|
|
static gboolean queued_ip6_config_change (gpointer user_data);
|
|
static void ip_check_ping_watch_cb (GPid pid, gint status, gpointer user_data);
|
|
static gboolean ip_config_valid (NMDeviceState state);
|
|
static NMActStageReturn dhcp4_start (NMDevice *self, NMConnection *connection);
|
|
static gboolean dhcp6_start (NMDevice *self, gboolean wait_for_ll);
|
|
static void nm_device_start_ip_check (NMDevice *self);
|
|
static void realize_start_setup (NMDevice *self,
|
|
const NMPlatformLink *plink,
|
|
NMUnmanFlagOp unmanaged_user_explicit);
|
|
static void _commit_mtu (NMDevice *self, const NMIP4Config *config);
|
|
static void dhcp_schedule_restart (NMDevice *self, int family, const char *reason);
|
|
static void _cancel_activation (NMDevice *self);
|
|
|
|
/*****************************************************************************/
|
|
|
|
NM_UTILS_LOOKUP_STR_DEFINE_STATIC (queued_state_to_string, NMDeviceState,
|
|
NM_UTILS_LOOKUP_DEFAULT ( NM_PENDING_ACTIONPREFIX_QUEUED_STATE_CHANGE "???"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_UNKNOWN, NM_PENDING_ACTIONPREFIX_QUEUED_STATE_CHANGE "unknown"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_UNMANAGED, NM_PENDING_ACTIONPREFIX_QUEUED_STATE_CHANGE "unmanaged"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_UNAVAILABLE, NM_PENDING_ACTIONPREFIX_QUEUED_STATE_CHANGE "unavailable"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_DISCONNECTED, NM_PENDING_ACTIONPREFIX_QUEUED_STATE_CHANGE "disconnected"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_PREPARE, NM_PENDING_ACTIONPREFIX_QUEUED_STATE_CHANGE "prepare"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_CONFIG, NM_PENDING_ACTIONPREFIX_QUEUED_STATE_CHANGE "config"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_NEED_AUTH, NM_PENDING_ACTIONPREFIX_QUEUED_STATE_CHANGE "need-auth"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_IP_CONFIG, NM_PENDING_ACTIONPREFIX_QUEUED_STATE_CHANGE "ip-config"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_IP_CHECK, NM_PENDING_ACTIONPREFIX_QUEUED_STATE_CHANGE "ip-check"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_SECONDARIES, NM_PENDING_ACTIONPREFIX_QUEUED_STATE_CHANGE "secondaries"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_ACTIVATED, NM_PENDING_ACTIONPREFIX_QUEUED_STATE_CHANGE "activated"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_DEACTIVATING, NM_PENDING_ACTIONPREFIX_QUEUED_STATE_CHANGE "deactivating"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_FAILED, NM_PENDING_ACTIONPREFIX_QUEUED_STATE_CHANGE "failed"),
|
|
);
|
|
|
|
static const char *
|
|
state_to_string (NMDeviceState state)
|
|
{
|
|
return queued_state_to_string (state) + NM_STRLEN (NM_PENDING_ACTIONPREFIX_QUEUED_STATE_CHANGE);
|
|
}
|
|
|
|
NM_UTILS_LOOKUP_STR_DEFINE_STATIC (_reason_to_string, NMDeviceStateReason,
|
|
NM_UTILS_LOOKUP_DEFAULT (NULL),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_UNKNOWN, "unknown"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_NONE, "none"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_NOW_MANAGED, "managed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_NOW_UNMANAGED, "unmanaged"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_CONFIG_FAILED, "config-failed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_IP_CONFIG_UNAVAILABLE, "ip-config-unavailable"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_IP_CONFIG_EXPIRED, "ip-config-expired"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_NO_SECRETS, "no-secrets"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_SUPPLICANT_DISCONNECT, "supplicant-disconnect"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_SUPPLICANT_CONFIG_FAILED, "supplicant-config-failed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_SUPPLICANT_FAILED, "supplicant-failed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_SUPPLICANT_TIMEOUT, "supplicant-timeout"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_PPP_START_FAILED, "ppp-start-failed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_PPP_DISCONNECT, "ppp-disconnect"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_PPP_FAILED, "ppp-failed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_DHCP_START_FAILED, "dhcp-start-failed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_DHCP_ERROR, "dhcp-error"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_DHCP_FAILED, "dhcp-failed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_SHARED_START_FAILED, "sharing-start-failed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_SHARED_FAILED, "sharing-failed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_AUTOIP_START_FAILED, "autoip-start-failed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_AUTOIP_ERROR, "autoip-error"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_AUTOIP_FAILED, "autoip-failed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_MODEM_BUSY, "modem-busy"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_MODEM_NO_DIAL_TONE, "modem-no-dialtone"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_MODEM_NO_CARRIER, "modem-no-carrier"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_MODEM_DIAL_TIMEOUT, "modem-dial-timeout"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_MODEM_DIAL_FAILED, "modem-dial-failed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_MODEM_INIT_FAILED, "modem-init-failed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_GSM_APN_FAILED, "gsm-apn-failed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_GSM_REGISTRATION_NOT_SEARCHING, "gsm-registration-idle"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_GSM_REGISTRATION_DENIED, "gsm-registration-denied"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_GSM_REGISTRATION_TIMEOUT, "gsm-registration-timeout"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_GSM_REGISTRATION_FAILED, "gsm-registration-failed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_GSM_PIN_CHECK_FAILED, "gsm-pin-check-failed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_FIRMWARE_MISSING, "firmware-missing"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_REMOVED, "removed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_SLEEPING, "sleeping"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_CONNECTION_REMOVED, "connection-removed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_USER_REQUESTED, "user-requested"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_CARRIER, "carrier-changed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_CONNECTION_ASSUMED, "connection-assumed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_SUPPLICANT_AVAILABLE, "supplicant-available"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_MODEM_NOT_FOUND, "modem-not-found"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_BT_FAILED, "bluetooth-failed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_GSM_SIM_NOT_INSERTED, "gsm-sim-not-inserted"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_GSM_SIM_PIN_REQUIRED, "gsm-sim-pin-required"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_GSM_SIM_PUK_REQUIRED, "gsm-sim-puk-required"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_GSM_SIM_WRONG, "gsm-sim-wrong"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_INFINIBAND_MODE, "infiniband-mode"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_DEPENDENCY_FAILED, "dependency-failed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_BR2684_FAILED, "br2684-bridge-failed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_MODEM_MANAGER_UNAVAILABLE, "modem-manager-unavailable"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_SSID_NOT_FOUND, "ssid-not-found"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_SECONDARY_CONNECTION_FAILED, "secondary-connection-failed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_DCB_FCOE_FAILED, "dcb-fcoe-failed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_TEAMD_CONTROL_FAILED, "teamd-control-failed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_MODEM_FAILED, "modem-failed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_MODEM_AVAILABLE, "modem-available"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_SIM_PIN_INCORRECT, "sim-pin-incorrect"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_NEW_ACTIVATION, "new-activation"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_PARENT_CHANGED, "parent-changed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_STATE_REASON_PARENT_MANAGED_CHANGED, "parent-managed-changed"),
|
|
);
|
|
|
|
#define reason_to_string(reason) \
|
|
NM_UTILS_LOOKUP_STR (_reason_to_string, reason)
|
|
|
|
/*****************************************************************************/
|
|
|
|
NMSettings *
|
|
nm_device_get_settings (NMDevice *self)
|
|
{
|
|
return NM_DEVICE_GET_PRIVATE (self)->settings;
|
|
}
|
|
|
|
NMNetns *
|
|
nm_device_get_netns (NMDevice *self)
|
|
{
|
|
return NM_DEVICE_GET_PRIVATE (self)->netns;
|
|
}
|
|
|
|
NMPlatform *
|
|
nm_device_get_platform (NMDevice *self)
|
|
{
|
|
return nm_netns_get_platform (nm_device_get_netns (self));
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
NM_UTILS_LOOKUP_STR_DEFINE_STATIC (_sys_iface_state_to_str, NMDeviceSysIfaceState,
|
|
NM_UTILS_LOOKUP_DEFAULT_NM_ASSERT ("unknown"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_SYS_IFACE_STATE_EXTERNAL, "external"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_SYS_IFACE_STATE_ASSUME, "assume"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_SYS_IFACE_STATE_MANAGED, "managed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (NM_DEVICE_SYS_IFACE_STATE_REMOVED, "removed"),
|
|
);
|
|
|
|
NMDeviceSysIfaceState
|
|
nm_device_sys_iface_state_get (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), NM_DEVICE_SYS_IFACE_STATE_EXTERNAL);
|
|
|
|
return NM_DEVICE_GET_PRIVATE (self)->sys_iface_state;
|
|
}
|
|
|
|
gboolean
|
|
nm_device_sys_iface_state_is_external (NMDevice *self)
|
|
{
|
|
return NM_IN_SET (nm_device_sys_iface_state_get (self),
|
|
NM_DEVICE_SYS_IFACE_STATE_EXTERNAL);
|
|
}
|
|
|
|
gboolean
|
|
nm_device_sys_iface_state_is_external_or_assume (NMDevice *self)
|
|
{
|
|
return NM_IN_SET (nm_device_sys_iface_state_get (self),
|
|
NM_DEVICE_SYS_IFACE_STATE_EXTERNAL,
|
|
NM_DEVICE_SYS_IFACE_STATE_ASSUME);
|
|
}
|
|
|
|
void
|
|
nm_device_sys_iface_state_set (NMDevice *self,
|
|
NMDeviceSysIfaceState sys_iface_state)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
g_return_if_fail (NM_IN_SET (sys_iface_state,
|
|
NM_DEVICE_SYS_IFACE_STATE_EXTERNAL,
|
|
NM_DEVICE_SYS_IFACE_STATE_ASSUME,
|
|
NM_DEVICE_SYS_IFACE_STATE_MANAGED,
|
|
NM_DEVICE_SYS_IFACE_STATE_REMOVED));
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
if (priv->sys_iface_state != sys_iface_state) {
|
|
_LOGT (LOGD_DEVICE, "sys-iface-state: %s -> %s",
|
|
_sys_iface_state_to_str (priv->sys_iface_state),
|
|
_sys_iface_state_to_str (sys_iface_state));
|
|
priv->sys_iface_state = sys_iface_state;
|
|
}
|
|
|
|
/* this function only sets a flag, no immediate actions are initiated.
|
|
*
|
|
* If you change this, make sure that all callers are fine with such actions. */
|
|
|
|
nm_assert (priv->sys_iface_state == sys_iface_state);
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static void
|
|
init_ip4_config_dns_priority (NMDevice *self, NMIP4Config *config)
|
|
{
|
|
gs_free char *value = NULL;
|
|
gint priority;
|
|
|
|
value = nm_config_data_get_connection_default (NM_CONFIG_GET_DATA,
|
|
"ipv4.dns-priority",
|
|
self);
|
|
priority = _nm_utils_ascii_str_to_int64 (value, 10, G_MININT, G_MAXINT, 0);
|
|
nm_ip4_config_set_dns_priority (config, priority ?: NM_DNS_PRIORITY_DEFAULT_NORMAL);
|
|
}
|
|
|
|
static void
|
|
init_ip6_config_dns_priority (NMDevice *self, NMIP6Config *config)
|
|
{
|
|
gs_free char *value = NULL;
|
|
gint priority;
|
|
|
|
value = nm_config_data_get_connection_default (NM_CONFIG_GET_DATA,
|
|
"ipv6.dns-priority",
|
|
self);
|
|
priority = _nm_utils_ascii_str_to_int64 (value, 10, G_MININT, G_MAXINT, 0);
|
|
nm_ip6_config_set_dns_priority (config, priority ?: NM_DNS_PRIORITY_DEFAULT_NORMAL);
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static gboolean
|
|
nm_device_ipv4_sysctl_set (NMDevice *self, const char *property, const char *value)
|
|
{
|
|
NMPlatform *platform = nm_device_get_platform (self);
|
|
gs_free char *value_to_free = NULL;
|
|
const char *value_to_set;
|
|
|
|
if (value) {
|
|
value_to_set = value;
|
|
} else {
|
|
/* Set to a default value when we've got a NULL @value. */
|
|
value_to_free = nm_platform_sysctl_get (platform,
|
|
NMP_SYSCTL_PATHID_ABSOLUTE (nm_utils_ip4_property_path ("default", property)));
|
|
value_to_set = value_to_free;
|
|
}
|
|
|
|
return nm_platform_sysctl_set (platform,
|
|
NMP_SYSCTL_PATHID_ABSOLUTE (nm_utils_ip4_property_path (nm_device_get_ip_iface (self), property)),
|
|
value_to_set);
|
|
}
|
|
|
|
static guint32
|
|
nm_device_ipv4_sysctl_get_uint32 (NMDevice *self, const char *property, guint32 fallback)
|
|
{
|
|
return nm_platform_sysctl_get_int_checked (nm_device_get_platform (self),
|
|
NMP_SYSCTL_PATHID_ABSOLUTE (nm_utils_ip4_property_path (nm_device_get_ip_iface (self), property)),
|
|
10,
|
|
0,
|
|
G_MAXUINT32,
|
|
fallback);
|
|
}
|
|
|
|
gboolean
|
|
nm_device_ipv6_sysctl_set (NMDevice *self, const char *property, const char *value)
|
|
{
|
|
return nm_platform_sysctl_set (nm_device_get_platform (self), NMP_SYSCTL_PATHID_ABSOLUTE (nm_utils_ip6_property_path (nm_device_get_ip_iface (self), property)), value);
|
|
}
|
|
|
|
static guint32
|
|
nm_device_ipv6_sysctl_get_uint32 (NMDevice *self, const char *property, guint32 fallback)
|
|
{
|
|
return nm_platform_sysctl_get_int_checked (nm_device_get_platform (self),
|
|
NMP_SYSCTL_PATHID_ABSOLUTE (nm_utils_ip6_property_path (nm_device_get_ip_iface (self), property)),
|
|
10,
|
|
0,
|
|
G_MAXUINT32,
|
|
fallback);
|
|
}
|
|
|
|
gboolean
|
|
nm_device_has_capability (NMDevice *self, NMDeviceCapabilities caps)
|
|
{
|
|
return NM_FLAGS_ANY (NM_DEVICE_GET_PRIVATE (self)->capabilities, caps);
|
|
}
|
|
|
|
static void
|
|
_add_capabilities (NMDevice *self, NMDeviceCapabilities capabilities)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (!NM_FLAGS_ALL (priv->capabilities, capabilities)) {
|
|
priv->capabilities |= capabilities;
|
|
_notify (self, PROP_CAPABILITIES);
|
|
}
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static const char *
|
|
_get_stable_id (NMDevice *self,
|
|
NMConnection *connection,
|
|
NMUtilsStableType *out_stable_type)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
nm_assert (NM_IS_DEVICE (self));
|
|
nm_assert (NM_IS_CONNECTION (connection));
|
|
nm_assert (out_stable_type);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
/* we cache the generated stable ID for the time of an activation.
|
|
*
|
|
* The reason is, that we don't want the stable-id to change as long
|
|
* as the device is active.
|
|
*
|
|
* Especially with ${RANDOM} stable-id we want to generate *one* configuration
|
|
* for each activation. */
|
|
if (G_UNLIKELY (!priv->current_stable_id)) {
|
|
gs_free char *default_id = NULL;
|
|
gs_free char *generated = NULL;
|
|
NMUtilsStableType stable_type;
|
|
NMSettingConnection *s_con;
|
|
const char *stable_id;
|
|
const char *uuid;
|
|
|
|
s_con = nm_connection_get_setting_connection (connection);
|
|
|
|
stable_id = nm_setting_connection_get_stable_id (s_con);
|
|
|
|
if (!stable_id) {
|
|
default_id = nm_config_data_get_connection_default (NM_CONFIG_GET_DATA,
|
|
"connection.stable-id",
|
|
self);
|
|
stable_id = default_id;
|
|
}
|
|
|
|
uuid = nm_connection_get_uuid (connection);
|
|
|
|
stable_type = nm_utils_stable_id_parse (stable_id,
|
|
uuid,
|
|
NULL,
|
|
&generated);
|
|
|
|
/* current_stable_id_type is a bitfield! */
|
|
priv->current_stable_id_type = stable_type;
|
|
nm_assert (stable_type <= (NMUtilsStableType) 0x3);
|
|
nm_assert (stable_type + (NMUtilsStableType) 1 > (NMUtilsStableType) 0);
|
|
nm_assert (priv->current_stable_id_type == stable_type);
|
|
|
|
if (stable_type == NM_UTILS_STABLE_TYPE_UUID)
|
|
priv->current_stable_id = g_strdup (uuid);
|
|
else if (stable_type == NM_UTILS_STABLE_TYPE_STABLE_ID)
|
|
priv->current_stable_id = g_strdup (stable_id);
|
|
else if (stable_type == NM_UTILS_STABLE_TYPE_GENERATED)
|
|
priv->current_stable_id = nm_str_realloc (nm_utils_stable_id_generated_complete (generated));
|
|
else {
|
|
nm_assert (stable_type == NM_UTILS_STABLE_TYPE_RANDOM);
|
|
priv->current_stable_id = nm_str_realloc (nm_utils_stable_id_random ());
|
|
}
|
|
_LOGT (LOGD_DEVICE,
|
|
"stable-id: type=%d, \"%s\""
|
|
"%s%s%s",
|
|
(int) priv->current_stable_id_type,
|
|
priv->current_stable_id,
|
|
NM_PRINT_FMT_QUOTED (stable_type == NM_UTILS_STABLE_TYPE_GENERATED, " from \"", generated, "\"", ""));
|
|
}
|
|
|
|
*out_stable_type = priv->current_stable_id_type;
|
|
return priv->current_stable_id;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
NM_UTILS_LOOKUP_STR_DEFINE_STATIC (_ip_state_to_string, IpState,
|
|
NM_UTILS_LOOKUP_DEFAULT_WARN ("unknown"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (IP_NONE, "none"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (IP_WAIT, "wait"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (IP_CONF, "conf"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (IP_DONE, "done"),
|
|
NM_UTILS_LOOKUP_STR_ITEM (IP_FAIL, "fail"),
|
|
);
|
|
|
|
static void
|
|
_set_ip_state (NMDevice *self, int addr_family, IpState new_state)
|
|
{
|
|
IpState *p;
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
nm_assert (NM_IN_SET (addr_family, AF_INET, AF_INET6));
|
|
|
|
p = addr_family == AF_INET ? &priv->ip4_state_ : &priv->ip6_state_;
|
|
|
|
if (*p != new_state) {
|
|
_LOGT (LOGD_DEVICE, "ip%c-state: set to %d (%s)", addr_family == AF_INET ? '4' : '6',
|
|
(int) new_state, _ip_state_to_string (new_state));
|
|
*p = new_state;
|
|
}
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
const char *
|
|
nm_device_get_udi (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (self != NULL, NULL);
|
|
|
|
return NM_DEVICE_GET_PRIVATE (self)->udi;
|
|
}
|
|
|
|
const char *
|
|
nm_device_get_iface (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), NULL);
|
|
|
|
return NM_DEVICE_GET_PRIVATE (self)->iface;
|
|
}
|
|
|
|
int
|
|
nm_device_get_ifindex (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), 0);
|
|
|
|
return NM_DEVICE_GET_PRIVATE (self)->ifindex;
|
|
}
|
|
|
|
/**
|
|
* nm_device_is_software:
|
|
* @self: the #NMDevice
|
|
*
|
|
* Indicates if the device is a software-based virtual device without
|
|
* backing hardware, which can be added and removed programmatically.
|
|
*
|
|
* Returns: %TRUE if the device is a software-based device
|
|
*/
|
|
gboolean
|
|
nm_device_is_software (NMDevice *self)
|
|
{
|
|
return NM_FLAGS_HAS (NM_DEVICE_GET_PRIVATE (self)->capabilities, NM_DEVICE_CAP_IS_SOFTWARE);
|
|
}
|
|
|
|
/**
|
|
* nm_device_is_real:
|
|
* @self: the #NMDevice
|
|
*
|
|
* Returns: %TRUE if the device exists, %FALSE if the device is a placeholder
|
|
*/
|
|
gboolean
|
|
nm_device_is_real (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
|
|
return NM_DEVICE_GET_PRIVATE (self)->real;
|
|
}
|
|
|
|
const char *
|
|
nm_device_get_ip_iface (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_val_if_fail (self != NULL, NULL);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
/* If it's not set, default to iface */
|
|
return priv->ip_iface ? priv->ip_iface : priv->iface;
|
|
}
|
|
|
|
int
|
|
nm_device_get_ip_ifindex (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_val_if_fail (self != NULL, 0);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
/* If it's not set, default to ifindex */
|
|
return priv->ip_iface ? priv->ip_ifindex : priv->ifindex;
|
|
}
|
|
|
|
/**
|
|
* nm_device_set_ip_iface:
|
|
* @self: the #NMDevice
|
|
* @iface: the new IP interface name
|
|
*
|
|
* Updates the IP interface name and possibly the ifindex.
|
|
*
|
|
* Returns: %TRUE if the anything (name or ifindex) changed, %FALSE if nothing
|
|
* changed.
|
|
*/
|
|
gboolean
|
|
nm_device_set_ip_iface (NMDevice *self, const char *iface)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
int ifindex;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
if (nm_streq0 (iface, priv->ip_iface)) {
|
|
if (!iface)
|
|
return FALSE;
|
|
ifindex = nm_platform_if_nametoindex (nm_device_get_platform (self), iface);
|
|
if ( ifindex <= 0
|
|
|| priv->ip_ifindex == ifindex)
|
|
return FALSE;
|
|
|
|
priv->ip_ifindex = ifindex;
|
|
_LOGD (LOGD_DEVICE, "ip-ifname: update ifindex for ifname '%s': %d", iface, priv->ip_ifindex);
|
|
} else {
|
|
g_free (priv->ip_iface);
|
|
priv->ip_iface = g_strdup (iface);
|
|
|
|
if (iface) {
|
|
/* The @iface name is not in sync with the platform cache.
|
|
* So, there is no point asking the platform cache to resolve
|
|
* the ifindex. Instead, we can only hope that the interface
|
|
* with this name still exists and we resolve the ifindex
|
|
* anew.
|
|
*/
|
|
priv->ip_ifindex = nm_platform_if_nametoindex (nm_device_get_platform (self), iface);
|
|
if (priv->ip_ifindex > 0)
|
|
_LOGD (LOGD_DEVICE, "ip-ifname: set ifname '%s', ifindex %d", iface, priv->ip_ifindex);
|
|
else
|
|
_LOGW (LOGD_DEVICE, "ip-ifname: set ifname '%s', unknown ifindex", iface);
|
|
} else {
|
|
priv->ip_ifindex = 0;
|
|
_LOGD (LOGD_DEVICE, "ip-ifname: clear ifname");
|
|
}
|
|
}
|
|
|
|
if (priv->ip_ifindex > 0) {
|
|
if (nm_platform_check_support_user_ipv6ll (nm_device_get_platform (self)))
|
|
nm_platform_link_set_user_ipv6ll_enabled (nm_device_get_platform (self), priv->ip_ifindex, TRUE);
|
|
|
|
if (!nm_platform_link_is_up (nm_device_get_platform (self), priv->ip_ifindex))
|
|
nm_platform_link_set_up (nm_device_get_platform (self), priv->ip_ifindex, NULL);
|
|
}
|
|
|
|
/* We don't care about any saved values from the old iface */
|
|
g_hash_table_remove_all (priv->ip6_saved_properties);
|
|
|
|
_notify (self, PROP_IP_IFACE);
|
|
return TRUE;
|
|
}
|
|
|
|
static gboolean
|
|
_ip_iface_update (NMDevice *self, const char *ip_iface)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
g_return_val_if_fail (priv->ip_iface, FALSE);
|
|
g_return_val_if_fail (priv->ip_ifindex > 0, FALSE);
|
|
g_return_val_if_fail (ip_iface, FALSE);
|
|
|
|
if (!ip_iface[0])
|
|
return FALSE;
|
|
|
|
if (nm_streq (priv->ip_iface, ip_iface))
|
|
return FALSE;
|
|
|
|
_LOGI (LOGD_DEVICE, "ip-ifname: interface index %d renamed ip_iface (%d) from '%s' to '%s'",
|
|
priv->ifindex, priv->ip_ifindex,
|
|
priv->ip_iface, ip_iface);
|
|
g_free (priv->ip_iface);
|
|
priv->ip_iface = g_strdup (ip_iface);
|
|
_notify (self, PROP_IP_IFACE);
|
|
return TRUE;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
int
|
|
nm_device_parent_get_ifindex (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), 0);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
return priv->parent_ifindex;
|
|
}
|
|
|
|
NMDevice *
|
|
nm_device_parent_get_device (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), NULL);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
return priv->parent_device;
|
|
}
|
|
|
|
static void
|
|
parent_changed_notify (NMDevice *self,
|
|
int old_ifindex,
|
|
NMDevice *old_parent,
|
|
int new_ifindex,
|
|
NMDevice *new_parent)
|
|
{
|
|
/* empty handler to allow subclasses to always chain up the virtual function. */
|
|
}
|
|
|
|
static gboolean
|
|
_parent_set_ifindex (NMDevice *self,
|
|
int parent_ifindex,
|
|
gboolean force_check)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
NMDevice *parent_device;
|
|
gboolean changed = FALSE;
|
|
int old_ifindex;
|
|
NMDevice *old_device;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (parent_ifindex <= 0)
|
|
parent_ifindex = 0;
|
|
|
|
old_ifindex = priv->parent_ifindex;
|
|
old_device = priv->parent_device;
|
|
|
|
if (priv->parent_ifindex == parent_ifindex) {
|
|
if (parent_ifindex > 0) {
|
|
if ( !force_check
|
|
&& priv->parent_device
|
|
&& nm_device_get_ifindex (priv->parent_device) == parent_ifindex)
|
|
return FALSE;
|
|
} else {
|
|
if (!priv->parent_device)
|
|
return FALSE;
|
|
}
|
|
} else {
|
|
priv->parent_ifindex = parent_ifindex;
|
|
changed = TRUE;
|
|
}
|
|
|
|
if (parent_ifindex > 0) {
|
|
parent_device = nm_manager_get_device_by_ifindex (nm_manager_get (), parent_ifindex);
|
|
if (parent_device == self)
|
|
parent_device = NULL;
|
|
} else
|
|
parent_device = NULL;
|
|
|
|
if (parent_device != priv->parent_device) {
|
|
priv->parent_device = parent_device;
|
|
changed = TRUE;
|
|
}
|
|
|
|
if (changed) {
|
|
if (priv->parent_ifindex <= 0)
|
|
_LOGD (LOGD_DEVICE, "parent: clear");
|
|
else if (!priv->parent_device)
|
|
_LOGD (LOGD_DEVICE, "parent: ifindex %d, no device", priv->parent_ifindex);
|
|
else {
|
|
_LOGD (LOGD_DEVICE, "parent: ifindex %d, device %p, %s", priv->parent_ifindex,
|
|
priv->parent_device, nm_device_get_iface (priv->parent_device));
|
|
}
|
|
|
|
NM_DEVICE_GET_CLASS (self)->parent_changed_notify (self, old_ifindex, old_device, priv->parent_ifindex, priv->parent_device);
|
|
|
|
_notify (self, PROP_PARENT);
|
|
}
|
|
return changed;
|
|
}
|
|
|
|
void
|
|
nm_device_parent_set_ifindex (NMDevice *self,
|
|
int parent_ifindex)
|
|
{
|
|
_parent_set_ifindex (self, parent_ifindex, FALSE);
|
|
}
|
|
|
|
gboolean
|
|
nm_device_parent_notify_changed (NMDevice *self,
|
|
NMDevice *change_candidate,
|
|
gboolean device_removed)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
nm_assert (NM_IS_DEVICE (self));
|
|
nm_assert (NM_IS_DEVICE (change_candidate));
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->parent_ifindex > 0) {
|
|
if ( priv->parent_device == change_candidate
|
|
|| priv->parent_ifindex == nm_device_get_ifindex (change_candidate))
|
|
return _parent_set_ifindex (self, priv->parent_ifindex, device_removed);
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static void
|
|
_stats_update_counters (NMDevice *self,
|
|
guint64 tx_bytes,
|
|
guint64 rx_bytes)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->stats.tx_bytes != tx_bytes) {
|
|
priv->stats.tx_bytes = tx_bytes;
|
|
_notify (self, PROP_TX_BYTES);
|
|
}
|
|
if (priv->stats.rx_bytes != rx_bytes) {
|
|
priv->stats.rx_bytes = rx_bytes;
|
|
_notify (self, PROP_RX_BYTES);
|
|
}
|
|
}
|
|
|
|
static void
|
|
_stats_update_counters_from_pllink (NMDevice *self, const NMPlatformLink *pllink)
|
|
{
|
|
_stats_update_counters (self, pllink->tx_bytes, pllink->rx_bytes);
|
|
}
|
|
|
|
static gboolean
|
|
_stats_timeout_cb (gpointer user_data)
|
|
{
|
|
NMDevice *self = user_data;
|
|
int ifindex;
|
|
|
|
ifindex = nm_device_get_ip_ifindex (self);
|
|
|
|
_LOGT (LOGD_DEVICE, "stats: refresh %d", ifindex);
|
|
|
|
if (ifindex > 0)
|
|
nm_platform_link_refresh (nm_device_get_platform (self), ifindex);
|
|
|
|
return G_SOURCE_CONTINUE;
|
|
}
|
|
|
|
static guint
|
|
_stats_refresh_rate_real (guint refresh_rate_ms)
|
|
{
|
|
const guint STATS_REFRESH_RATE_MS_MIN = 200;
|
|
|
|
if (refresh_rate_ms == 0)
|
|
return 0;
|
|
|
|
if (refresh_rate_ms < STATS_REFRESH_RATE_MS_MIN) {
|
|
/* you cannot set the refresh-rate arbitrarly small. E.g.
|
|
* setting to 1ms is just killing. Have a lowest number. */
|
|
return STATS_REFRESH_RATE_MS_MIN;
|
|
}
|
|
|
|
return refresh_rate_ms;
|
|
}
|
|
|
|
static void
|
|
_stats_set_refresh_rate (NMDevice *self, guint refresh_rate_ms)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
int ifindex;
|
|
guint old_rate;
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->stats.refresh_rate_ms == refresh_rate_ms)
|
|
return;
|
|
|
|
old_rate = priv->stats.refresh_rate_ms;
|
|
priv->stats.refresh_rate_ms = refresh_rate_ms;
|
|
_notify (self, PROP_REFRESH_RATE_MS);
|
|
|
|
_LOGD (LOGD_DEVICE, "stats: set refresh to %u ms", priv->stats.refresh_rate_ms);
|
|
|
|
if (!nm_device_is_real (self))
|
|
return;
|
|
|
|
refresh_rate_ms = _stats_refresh_rate_real (refresh_rate_ms);
|
|
if (_stats_refresh_rate_real (old_rate) == refresh_rate_ms)
|
|
return;
|
|
|
|
nm_clear_g_source (&priv->stats.timeout_id);
|
|
|
|
if (!refresh_rate_ms)
|
|
return;
|
|
|
|
/* trigger an inital refresh of the data whenever the refresh-rate changes.
|
|
* As we process the result in an idle handler with device_link_changed(),
|
|
* we don't get the result right away. */
|
|
ifindex = nm_device_get_ip_ifindex (self);
|
|
if (ifindex > 0)
|
|
nm_platform_link_refresh (nm_device_get_platform (self), ifindex);
|
|
|
|
priv->stats.timeout_id = g_timeout_add (refresh_rate_ms, _stats_timeout_cb, self);
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static gboolean
|
|
get_ip_iface_identifier (NMDevice *self, NMUtilsIPv6IfaceId *out_iid)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
const NMPlatformLink *pllink;
|
|
int ifindex;
|
|
gboolean success;
|
|
|
|
/* If we get here, we *must* have a kernel netdev, which implies an ifindex */
|
|
ifindex = nm_device_get_ip_ifindex (self);
|
|
g_return_val_if_fail (ifindex > 0, FALSE);
|
|
|
|
pllink = nm_platform_link_get (nm_device_get_platform (self), ifindex);
|
|
if ( !pllink
|
|
|| NM_IN_SET (pllink->type, NM_LINK_TYPE_NONE, NM_LINK_TYPE_UNKNOWN))
|
|
return FALSE;
|
|
|
|
if (pllink->addr.len <= 0)
|
|
return FALSE;
|
|
if (pllink->addr.len > NM_UTILS_HWADDR_LEN_MAX)
|
|
g_return_val_if_reached (FALSE);
|
|
|
|
success = nm_utils_get_ipv6_interface_identifier (pllink->type,
|
|
pllink->addr.data,
|
|
pllink->addr.len,
|
|
priv->dev_id,
|
|
out_iid);
|
|
if (!success) {
|
|
_LOGW (LOGD_PLATFORM, "failed to generate interface identifier "
|
|
"for link type %u hwaddr_len %u", pllink->type, (unsigned) pllink->addr.len);
|
|
}
|
|
return success;
|
|
}
|
|
|
|
/**
|
|
* nm_device_get_ip_iface_identifier:
|
|
* @self: an #NMDevice
|
|
* @iid: where to place the interface identifier
|
|
* @ignore_token: force creation of a non-tokenized address
|
|
*
|
|
* Return the interface's identifier for the EUI64 address generation mode.
|
|
* It's either a manually set token or and identifier generated in a
|
|
* hardware-specific way.
|
|
*
|
|
* Unless @ignore_token is set the token is preferred. That is the case
|
|
* for link-local addresses (to mimic kernel behavior).
|
|
*
|
|
* Returns: #TRUE if the @iid could be set
|
|
*/
|
|
static gboolean
|
|
nm_device_get_ip_iface_identifier (NMDevice *self, NMUtilsIPv6IfaceId *iid, gboolean ignore_token)
|
|
{
|
|
NMSettingIP6Config *s_ip6;
|
|
const char *token = NULL;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
|
|
if (!ignore_token) {
|
|
s_ip6 = (NMSettingIP6Config *)
|
|
nm_device_get_applied_setting (self, NM_TYPE_SETTING_IP6_CONFIG);
|
|
g_return_val_if_fail (s_ip6, FALSE);
|
|
token = nm_setting_ip6_config_get_token (s_ip6);
|
|
}
|
|
if (token)
|
|
return nm_utils_ipv6_interface_identifier_get_from_token (iid, token);
|
|
else
|
|
return NM_DEVICE_GET_CLASS (self)->get_ip_iface_identifier (self, iid);
|
|
}
|
|
|
|
const char *
|
|
nm_device_get_driver (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (self != NULL, NULL);
|
|
|
|
return NM_DEVICE_GET_PRIVATE (self)->driver;
|
|
}
|
|
|
|
const char *
|
|
nm_device_get_driver_version (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (self != NULL, NULL);
|
|
|
|
return NM_DEVICE_GET_PRIVATE (self)->driver_version;
|
|
}
|
|
|
|
NMDeviceType
|
|
nm_device_get_device_type (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), NM_DEVICE_TYPE_UNKNOWN);
|
|
|
|
return NM_DEVICE_GET_PRIVATE (self)->type;
|
|
}
|
|
|
|
NMLinkType
|
|
nm_device_get_link_type (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), NM_LINK_TYPE_UNKNOWN);
|
|
|
|
return NM_DEVICE_GET_PRIVATE (self)->link_type;
|
|
}
|
|
|
|
/**
|
|
* nm_device_get_metered:
|
|
* @setting: the #NMDevice
|
|
*
|
|
* Returns: the #NMDevice:metered property of the device.
|
|
*
|
|
* Since: 1.2
|
|
**/
|
|
NMMetered
|
|
nm_device_get_metered (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), NM_METERED_UNKNOWN);
|
|
|
|
return NM_DEVICE_GET_PRIVATE (self)->metered;
|
|
}
|
|
|
|
/**
|
|
* nm_device_get_priority():
|
|
* @self: the #NMDevice
|
|
*
|
|
* Returns: the device's routing priority. Lower numbers means a "better"
|
|
* device, eg higher priority.
|
|
*/
|
|
int
|
|
nm_device_get_priority (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), 1000);
|
|
|
|
/* Device 'priority' is used for the default route-metric and is based on
|
|
* the device type. The settings ipv4.route-metric and ipv6.route-metric
|
|
* can overwrite this default.
|
|
*
|
|
* Currently for both IPv4 and IPv6 we use the same default values.
|
|
*
|
|
* The route-metric is used for the metric of the routes of device.
|
|
* This also applies to the default route. Therefore it affects also
|
|
* which device is the "best".
|
|
*
|
|
* For comparison, note that iproute2 by default adds IPv4 routes with
|
|
* metric 0, and IPv6 routes with metric 1024. The latter is the IPv6
|
|
* "user default" in the kernel (NM_PLATFORM_ROUTE_METRIC_DEFAULT_IP6).
|
|
* In kernel, the full uint32_t range is available for route
|
|
* metrics (except for IPv6, where 0 means 1024).
|
|
*/
|
|
|
|
switch (nm_device_get_device_type (self)) {
|
|
/* 50 is reserved for VPN (NM_VPN_ROUTE_METRIC_DEFAULT) */
|
|
case NM_DEVICE_TYPE_ETHERNET:
|
|
case NM_DEVICE_TYPE_VETH:
|
|
return 100;
|
|
case NM_DEVICE_TYPE_MACSEC:
|
|
return 125;
|
|
case NM_DEVICE_TYPE_INFINIBAND:
|
|
return 150;
|
|
case NM_DEVICE_TYPE_ADSL:
|
|
return 200;
|
|
case NM_DEVICE_TYPE_WIMAX:
|
|
return 250;
|
|
case NM_DEVICE_TYPE_BOND:
|
|
return 300;
|
|
case NM_DEVICE_TYPE_TEAM:
|
|
return 350;
|
|
case NM_DEVICE_TYPE_VLAN:
|
|
return 400;
|
|
case NM_DEVICE_TYPE_MACVLAN:
|
|
return 410;
|
|
case NM_DEVICE_TYPE_BRIDGE:
|
|
return 425;
|
|
case NM_DEVICE_TYPE_TUN:
|
|
return 450;
|
|
case NM_DEVICE_TYPE_VXLAN:
|
|
return 500;
|
|
case NM_DEVICE_TYPE_DUMMY:
|
|
return 550;
|
|
case NM_DEVICE_TYPE_WIFI:
|
|
return 600;
|
|
case NM_DEVICE_TYPE_OLPC_MESH:
|
|
return 650;
|
|
case NM_DEVICE_TYPE_IP_TUNNEL:
|
|
return 675;
|
|
case NM_DEVICE_TYPE_MODEM:
|
|
return 700;
|
|
case NM_DEVICE_TYPE_BT:
|
|
return 750;
|
|
case NM_DEVICE_TYPE_GENERIC:
|
|
return 950;
|
|
case NM_DEVICE_TYPE_UNKNOWN:
|
|
return 10000;
|
|
case NM_DEVICE_TYPE_UNUSED1:
|
|
case NM_DEVICE_TYPE_UNUSED2:
|
|
/* omit default: to get compiler warning about missing switch cases */
|
|
break;
|
|
}
|
|
return 11000;
|
|
}
|
|
|
|
static guint32
|
|
route_metric_with_penalty (NMDevice *self, guint32 metric)
|
|
{
|
|
#if WITH_CONCHECK
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
const guint32 PENALTY = 20000;
|
|
|
|
/* Beware: for IPv6, a metric of 0 effectively means 1024.
|
|
* Only pass a normalized IPv6 metric (nm_utils_ip6_route_metric_normalize). */
|
|
|
|
if ( priv->connectivity_state != NM_CONNECTIVITY_FULL
|
|
&& nm_connectivity_check_enabled (nm_connectivity_get ())) {
|
|
if (metric >= G_MAXUINT32 - PENALTY)
|
|
return G_MAXUINT32;
|
|
return metric + PENALTY;
|
|
}
|
|
#endif
|
|
return metric;
|
|
}
|
|
|
|
static guint32
|
|
_get_ipx_route_metric (NMDevice *self,
|
|
gboolean is_v4)
|
|
{
|
|
char *value;
|
|
gint64 route_metric;
|
|
NMSettingIPConfig *s_ip;
|
|
NMConnection *connection;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), G_MAXUINT32);
|
|
|
|
connection = nm_device_get_applied_connection (self);
|
|
if (connection) {
|
|
s_ip = is_v4
|
|
? nm_connection_get_setting_ip4_config (connection)
|
|
: nm_connection_get_setting_ip6_config (connection);
|
|
|
|
/* Slave interfaces don't have IP settings, but we may get here when
|
|
* external changes are made or when noticing IP changes when starting
|
|
* the slave connection.
|
|
*/
|
|
if (s_ip) {
|
|
route_metric = nm_setting_ip_config_get_route_metric (s_ip);
|
|
if (route_metric >= 0)
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
/* use the current NMConfigData, which makes this configuration reloadable.
|
|
* Note that that means that the route-metric might change between SIGHUP.
|
|
* You must cache the returned value if that is a problem. */
|
|
value = nm_config_data_get_connection_default (NM_CONFIG_GET_DATA,
|
|
is_v4 ? "ipv4.route-metric" : "ipv6.route-metric", self);
|
|
if (value) {
|
|
route_metric = _nm_utils_ascii_str_to_int64 (value, 10, 0, G_MAXUINT32, -1);
|
|
g_free (value);
|
|
|
|
if (route_metric >= 0)
|
|
goto out;
|
|
}
|
|
route_metric = nm_device_get_priority (self);
|
|
out:
|
|
if (!is_v4)
|
|
route_metric = nm_utils_ip6_route_metric_normalize (route_metric);
|
|
return route_metric;
|
|
}
|
|
|
|
guint32
|
|
nm_device_get_ip4_route_metric (NMDevice *self)
|
|
{
|
|
return _get_ipx_route_metric (self, TRUE);
|
|
}
|
|
|
|
guint32
|
|
nm_device_get_ip6_route_metric (NMDevice *self)
|
|
{
|
|
return _get_ipx_route_metric (self, FALSE);
|
|
}
|
|
|
|
static void
|
|
_update_default_route (NMDevice *self, int addr_family, gboolean has, gboolean is_assumed)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
bool *p_has, *p_is_assumed;
|
|
|
|
nm_assert (NM_IN_SET (addr_family, 0, AF_INET, AF_INET6));
|
|
|
|
if (addr_family == AF_INET) {
|
|
p_has = &priv->default_route.v4_has;
|
|
p_is_assumed = &priv->default_route.v4_is_assumed;
|
|
} else {
|
|
p_has = &priv->default_route.v6_has;
|
|
p_is_assumed = &priv->default_route.v6_is_assumed;
|
|
}
|
|
|
|
if (*p_has == has && *p_is_assumed == is_assumed)
|
|
return;
|
|
|
|
*p_has = has;
|
|
*p_is_assumed = is_assumed;
|
|
|
|
if (addr_family == AF_INET)
|
|
nm_default_route_manager_ip4_update_default_route (nm_netns_get_default_route_manager (priv->netns), self);
|
|
else
|
|
nm_default_route_manager_ip6_update_default_route (nm_netns_get_default_route_manager (priv->netns), self);
|
|
}
|
|
|
|
const NMPlatformIP4Route *
|
|
nm_device_get_ip4_default_route (NMDevice *self, gboolean *out_is_assumed)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), NULL);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (out_is_assumed)
|
|
*out_is_assumed = priv->default_route.v4_is_assumed;
|
|
|
|
return priv->default_route.v4_has ? &priv->default_route.v4 : NULL;
|
|
}
|
|
|
|
const NMPlatformIP6Route *
|
|
nm_device_get_ip6_default_route (NMDevice *self, gboolean *out_is_assumed)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), NULL);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (out_is_assumed)
|
|
*out_is_assumed = priv->default_route.v6_is_assumed;
|
|
|
|
return priv->default_route.v6_has ? &priv->default_route.v6 : NULL;
|
|
}
|
|
|
|
const char *
|
|
nm_device_get_type_desc (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (self != NULL, NULL);
|
|
|
|
return NM_DEVICE_GET_PRIVATE (self)->type_desc;
|
|
}
|
|
|
|
const char *
|
|
nm_device_get_type_description (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (self != NULL, NULL);
|
|
|
|
/* Beware: this function should return the same
|
|
* value as nm_device_get_type_description() in libnm. */
|
|
|
|
return NM_DEVICE_GET_CLASS (self)->get_type_description (self);
|
|
}
|
|
|
|
static const char *
|
|
get_type_description (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (!priv->type_description) {
|
|
const char *typename;
|
|
|
|
typename = G_OBJECT_TYPE_NAME (self);
|
|
if (g_str_has_prefix (typename, "NMDevice"))
|
|
typename += 8;
|
|
priv->type_description = g_ascii_strdown (typename, -1);
|
|
}
|
|
|
|
return priv->type_description;
|
|
}
|
|
|
|
gboolean
|
|
nm_device_has_carrier (NMDevice *self)
|
|
{
|
|
return NM_DEVICE_GET_PRIVATE (self)->carrier;
|
|
}
|
|
|
|
NMActRequest *
|
|
nm_device_get_act_request (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), NULL);
|
|
|
|
return NM_DEVICE_GET_PRIVATE (self)->act_request;
|
|
}
|
|
|
|
NMSettingsConnection *
|
|
nm_device_get_settings_connection (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
return priv->act_request ? nm_act_request_get_settings_connection (priv->act_request) : NULL;
|
|
}
|
|
|
|
NMConnection *
|
|
nm_device_get_applied_connection (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), NULL);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
return priv->act_request ? nm_act_request_get_applied_connection (priv->act_request) : NULL;
|
|
}
|
|
|
|
gboolean
|
|
nm_device_has_unmodified_applied_connection (NMDevice *self, NMSettingCompareFlags compare_flags)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (!priv->act_request)
|
|
return FALSE;
|
|
|
|
return nm_active_connection_has_unmodified_applied_connection ((NMActiveConnection *) priv->act_request, compare_flags);
|
|
}
|
|
|
|
NMSetting *
|
|
nm_device_get_applied_setting (NMDevice *self, GType setting_type)
|
|
{
|
|
NMConnection *connection;
|
|
|
|
connection = nm_device_get_applied_connection (self);
|
|
return connection ? nm_connection_get_setting (connection, setting_type) : NULL;
|
|
}
|
|
|
|
RfKillType
|
|
nm_device_get_rfkill_type (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
|
|
return NM_DEVICE_GET_PRIVATE (self)->rfkill_type;
|
|
}
|
|
|
|
static const char *
|
|
nm_device_get_physical_port_id (NMDevice *self)
|
|
{
|
|
return NM_DEVICE_GET_PRIVATE (self)->physical_port_id;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static void
|
|
update_connectivity_state (NMDevice *self, NMConnectivityState state)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
/* If the connectivity check is disabled, make an optimistic guess. */
|
|
if (state == NM_CONNECTIVITY_UNKNOWN) {
|
|
if (priv->state == NM_DEVICE_STATE_ACTIVATED) {
|
|
if (priv->default_route.v4_has || priv->default_route.v6_has)
|
|
state = NM_CONNECTIVITY_FULL;
|
|
else
|
|
state = NM_CONNECTIVITY_LIMITED;
|
|
} else {
|
|
state = NM_CONNECTIVITY_NONE;
|
|
}
|
|
}
|
|
|
|
if (priv->connectivity_state != state) {
|
|
#if WITH_CONCHECK
|
|
_LOGD (LOGD_CONCHECK, "state changed from %s to %s",
|
|
nm_connectivity_state_to_string (priv->connectivity_state),
|
|
nm_connectivity_state_to_string (state));
|
|
#endif
|
|
priv->connectivity_state = state;
|
|
_notify (self, PROP_CONNECTIVITY);
|
|
|
|
if (nm_device_get_state (self) == NM_DEVICE_STATE_ACTIVATED) {
|
|
if (!ip4_config_merge_and_apply (self, NULL, TRUE))
|
|
_LOGW (LOGD_IP4, "Failed to update IPv4 default route metric");
|
|
if (!ip6_config_merge_and_apply (self, TRUE))
|
|
_LOGW (LOGD_IP6, "Failed to update IPv6 default route metric");
|
|
}
|
|
}
|
|
}
|
|
|
|
typedef struct {
|
|
NMDevice *self;
|
|
NMDeviceConnectivityCallback callback;
|
|
gpointer user_data;
|
|
guint64 seq;
|
|
} ConnectivityCheckData;
|
|
|
|
static void
|
|
concheck_done (ConnectivityCheckData *data)
|
|
{
|
|
NMDevice *self = data->self;
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
/* The unsolicited connectivity checks don't hook a callback. */
|
|
if (data->callback)
|
|
data->callback (data->self, priv->connectivity_state, data->user_data);
|
|
g_object_unref (data->self);
|
|
g_slice_free (ConnectivityCheckData, data);
|
|
}
|
|
|
|
#if WITH_CONCHECK
|
|
static void
|
|
concheck_cb (GObject *source_object, GAsyncResult *result, gpointer user_data)
|
|
{
|
|
ConnectivityCheckData *data = user_data;
|
|
NMDevice *self = data->self;
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMConnectivity *connectivity = NM_CONNECTIVITY (source_object);
|
|
NMConnectivityState state;
|
|
GError *error = NULL;
|
|
|
|
state = nm_connectivity_check_finish (connectivity, result, &error);
|
|
if (error) {
|
|
_LOGW (LOGD_DEVICE, "connectivity checking on '%s' failed: %s",
|
|
nm_device_get_iface (self), error->message);
|
|
g_error_free (error);
|
|
}
|
|
|
|
if (data->seq == priv->concheck_seq)
|
|
update_connectivity_state (data->self, state);
|
|
concheck_done (data);
|
|
}
|
|
#endif /* WITH_CONCHECK */
|
|
|
|
static gboolean
|
|
no_concheck (gpointer user_data)
|
|
{
|
|
ConnectivityCheckData *data = user_data;
|
|
|
|
concheck_done (data);
|
|
return G_SOURCE_REMOVE;
|
|
}
|
|
|
|
void
|
|
nm_device_check_connectivity (NMDevice *self,
|
|
NMDeviceConnectivityCallback callback,
|
|
gpointer user_data)
|
|
{
|
|
ConnectivityCheckData *data;
|
|
#if WITH_CONCHECK
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
#endif
|
|
|
|
data = g_slice_new0 (ConnectivityCheckData);
|
|
data->self = g_object_ref (self);
|
|
data->callback = callback;
|
|
data->user_data = user_data;
|
|
|
|
#if WITH_CONCHECK
|
|
if (priv->concheck_periodic_id) {
|
|
data->seq = ++priv->concheck_seq;
|
|
|
|
/* Kick off a real connectivity check. */
|
|
nm_connectivity_check_async (nm_connectivity_get (),
|
|
nm_device_get_iface (self),
|
|
concheck_cb,
|
|
data);
|
|
return;
|
|
}
|
|
#endif
|
|
|
|
/* Fake one. */
|
|
g_idle_add (no_concheck, data);
|
|
}
|
|
|
|
NMConnectivityState
|
|
nm_device_get_connectivity_state (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), NM_CONNECTIVITY_UNKNOWN);
|
|
|
|
return NM_DEVICE_GET_PRIVATE (self)->connectivity_state;
|
|
}
|
|
|
|
#if WITH_CONCHECK
|
|
static void
|
|
concheck_periodic (NMConnectivity *connectivity, NMDevice *self)
|
|
{
|
|
nm_device_check_connectivity (self, NULL, NULL);
|
|
}
|
|
#endif
|
|
|
|
static void
|
|
concheck_periodic_update (NMDevice *self)
|
|
{
|
|
#if WITH_CONCHECK
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
gboolean check_enable;
|
|
|
|
check_enable = (priv->state == NM_DEVICE_STATE_ACTIVATED)
|
|
&& (priv->default_route.v4_has || priv->default_route.v6_has);
|
|
|
|
if (check_enable && !priv->concheck_periodic_id) {
|
|
/* We just gained a default route. Enable periodic checking. */
|
|
priv->concheck_periodic_id = g_signal_connect (nm_connectivity_get (),
|
|
NM_CONNECTIVITY_PERIODIC_CHECK,
|
|
G_CALLBACK (concheck_periodic), self);
|
|
/* Also kick off a check right away. */
|
|
nm_device_check_connectivity (self, NULL, NULL);
|
|
} else if (!check_enable && priv->concheck_periodic_id) {
|
|
/* The default route has gone off, and so has connectivity. */
|
|
g_signal_handler_disconnect (nm_connectivity_get (), priv->concheck_periodic_id);
|
|
priv->concheck_periodic_id = 0;
|
|
update_connectivity_state (self, NM_CONNECTIVITY_NONE);
|
|
}
|
|
#else
|
|
/* update_connectivity_state() figures out how to lie about
|
|
* connectivity state if the actual state is not really known. */
|
|
update_connectivity_state (self, NM_CONNECTIVITY_UNKNOWN);
|
|
#endif
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static SlaveInfo *
|
|
find_slave_info (NMDevice *self, NMDevice *slave)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
SlaveInfo *info;
|
|
GSList *iter;
|
|
|
|
for (iter = priv->slaves; iter; iter = g_slist_next (iter)) {
|
|
info = iter->data;
|
|
if (info->slave == slave)
|
|
return info;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/**
|
|
* nm_device_master_enslave_slave:
|
|
* @self: the master device
|
|
* @slave: the slave device to enslave
|
|
* @connection: (allow-none): the slave device's connection
|
|
*
|
|
* If @self is capable of enslaving other devices (ie it's a bridge, bond, team,
|
|
* etc) then this function enslaves @slave.
|
|
*
|
|
* Returns: %TRUE on success, %FALSE on failure or if this device cannot enslave
|
|
* other devices.
|
|
*/
|
|
static gboolean
|
|
nm_device_master_enslave_slave (NMDevice *self, NMDevice *slave, NMConnection *connection)
|
|
{
|
|
SlaveInfo *info;
|
|
gboolean success = FALSE;
|
|
gboolean configure;
|
|
|
|
g_return_val_if_fail (self != NULL, FALSE);
|
|
g_return_val_if_fail (slave != NULL, FALSE);
|
|
g_return_val_if_fail (NM_DEVICE_GET_CLASS (self)->enslave_slave != NULL, FALSE);
|
|
|
|
info = find_slave_info (self, slave);
|
|
if (!info)
|
|
return FALSE;
|
|
|
|
if (info->slave_is_enslaved)
|
|
success = TRUE;
|
|
else {
|
|
configure = (info->configure && connection != NULL);
|
|
if (configure)
|
|
g_return_val_if_fail (nm_device_get_state (slave) >= NM_DEVICE_STATE_DISCONNECTED, FALSE);
|
|
|
|
success = NM_DEVICE_GET_CLASS (self)->enslave_slave (self, slave, connection, configure);
|
|
info->slave_is_enslaved = success;
|
|
}
|
|
|
|
nm_device_slave_notify_enslave (info->slave, success);
|
|
|
|
/* Ensure the device's hardware address is up-to-date; it often changes
|
|
* when slaves change.
|
|
*/
|
|
nm_device_update_hw_address (self);
|
|
|
|
/* Restart IP configuration if we're waiting for slaves. Do this
|
|
* after updating the hardware address as IP config may need the
|
|
* new address.
|
|
*/
|
|
if (success) {
|
|
if (NM_DEVICE_GET_PRIVATE (self)->ip4_state == IP_WAIT)
|
|
nm_device_activate_stage3_ip4_start (self);
|
|
|
|
if (NM_DEVICE_GET_PRIVATE (self)->ip6_state == IP_WAIT)
|
|
nm_device_activate_stage3_ip6_start (self);
|
|
}
|
|
|
|
/* Since slave devices don't have their own IP configuration,
|
|
* set the MTU here.
|
|
*/
|
|
_commit_mtu (slave, NM_DEVICE_GET_PRIVATE (slave)->ip4_config);
|
|
|
|
return success;
|
|
}
|
|
|
|
/**
|
|
* nm_device_master_release_one_slave:
|
|
* @self: the master device
|
|
* @slave: the slave device to release
|
|
* @configure: whether @self needs to actually release @slave
|
|
* @reason: the state change reason for the @slave
|
|
*
|
|
* If @self is capable of enslaving other devices (ie it's a bridge, bond, team,
|
|
* etc) then this function releases the previously enslaved @slave and/or
|
|
* updates the state of @self and @slave to reflect its release.
|
|
*/
|
|
static void
|
|
nm_device_master_release_one_slave (NMDevice *self, NMDevice *slave, gboolean configure, NMDeviceStateReason reason)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
NMDevicePrivate *slave_priv;
|
|
SlaveInfo *info;
|
|
gs_unref_object NMDevice *self_free = NULL;
|
|
|
|
g_return_if_fail (NM_DEVICE (self));
|
|
g_return_if_fail (NM_DEVICE (slave));
|
|
g_return_if_fail (NM_DEVICE_GET_CLASS (self)->release_slave != NULL);
|
|
|
|
info = find_slave_info (self, slave);
|
|
|
|
_LOGT (LOGD_CORE, "master: release one slave %p/%s%s", slave, nm_device_get_iface (slave),
|
|
!info ? " (not registered)" : "");
|
|
|
|
if (!info)
|
|
g_return_if_reached ();
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
slave_priv = NM_DEVICE_GET_PRIVATE (slave);
|
|
|
|
g_return_if_fail (self == slave_priv->master);
|
|
nm_assert (slave == info->slave);
|
|
|
|
/* first, let subclasses handle the release ... */
|
|
if (info->slave_is_enslaved)
|
|
NM_DEVICE_GET_CLASS (self)->release_slave (self, slave, configure);
|
|
|
|
/* raise notifications about the release, including clearing is_enslaved. */
|
|
nm_device_slave_notify_release (slave, reason);
|
|
|
|
/* keep both alive until the end of the function.
|
|
* Transfers ownership from slave_priv->master. */
|
|
self_free = self;
|
|
|
|
priv->slaves = g_slist_remove (priv->slaves, info);
|
|
slave_priv->master = NULL;
|
|
|
|
g_signal_handler_disconnect (slave, info->watch_id);
|
|
g_object_unref (slave);
|
|
g_slice_free (SlaveInfo, info);
|
|
|
|
/* Ensure the device's hardware address is up-to-date; it often changes
|
|
* when slaves change.
|
|
*/
|
|
nm_device_update_hw_address (self);
|
|
nm_device_set_unmanaged_by_flags (slave, NM_UNMANAGED_IS_SLAVE, NM_UNMAN_FLAG_OP_FORGET, NM_DEVICE_STATE_REASON_REMOVED);
|
|
}
|
|
|
|
/**
|
|
* can_unmanaged_external_down:
|
|
* @self: the device
|
|
*
|
|
* Check whether the device should stay NM_UNMANAGED_EXTERNAL_DOWN unless
|
|
* IFF_UP-ed externally.
|
|
*/
|
|
static gboolean
|
|
can_unmanaged_external_down (NMDevice *self)
|
|
{
|
|
return !NM_DEVICE_GET_PRIVATE (self)->is_nm_owned
|
|
&& nm_device_is_software (self);
|
|
}
|
|
|
|
static NMUnmanFlagOp
|
|
is_unmanaged_external_down (NMDevice *self, gboolean consider_can)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if ( consider_can
|
|
&& !NM_DEVICE_GET_CLASS (self)->can_unmanaged_external_down (self))
|
|
return NM_UNMAN_FLAG_OP_FORGET;
|
|
|
|
/* Manage externally-created software interfaces only when they are IFF_UP */
|
|
if ( priv->ifindex <= 0
|
|
|| !priv->up
|
|
|| !(priv->slaves || nm_platform_link_can_assume (nm_device_get_platform (self), priv->ifindex)))
|
|
return NM_UNMAN_FLAG_OP_SET_UNMANAGED;
|
|
|
|
return NM_UNMAN_FLAG_OP_SET_MANAGED;
|
|
}
|
|
|
|
static void
|
|
set_unmanaged_external_down (NMDevice *self, gboolean only_if_unmanaged)
|
|
{
|
|
NMUnmanFlagOp ext_flags;
|
|
|
|
if (!nm_device_get_unmanaged_mask (self, NM_UNMANAGED_EXTERNAL_DOWN))
|
|
return;
|
|
|
|
if (only_if_unmanaged) {
|
|
if (!nm_device_get_unmanaged_flags (self, NM_UNMANAGED_EXTERNAL_DOWN))
|
|
return;
|
|
}
|
|
|
|
ext_flags = is_unmanaged_external_down (self, FALSE);
|
|
if (ext_flags != NM_UNMAN_FLAG_OP_SET_UNMANAGED) {
|
|
/* Ensure the assume check is queued before any queued state changes
|
|
* from the transition to UNAVAILABLE.
|
|
*/
|
|
nm_device_queue_recheck_assume (self);
|
|
}
|
|
|
|
nm_device_set_unmanaged_by_flags (self,
|
|
NM_UNMANAGED_EXTERNAL_DOWN,
|
|
ext_flags,
|
|
NM_DEVICE_STATE_REASON_CONNECTION_ASSUMED);
|
|
}
|
|
|
|
void
|
|
nm_device_update_dynamic_ip_setup (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
GError *error = NULL;
|
|
gconstpointer addr;
|
|
size_t addr_length;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
g_hash_table_remove_all (priv->ip6_saved_properties);
|
|
|
|
if (priv->dhcp4.client) {
|
|
if (!nm_device_dhcp4_renew (self, FALSE)) {
|
|
nm_device_state_changed (self,
|
|
NM_DEVICE_STATE_FAILED,
|
|
NM_DEVICE_STATE_REASON_DHCP_FAILED);
|
|
return;
|
|
}
|
|
}
|
|
if (priv->dhcp6.client) {
|
|
if (!nm_device_dhcp6_renew (self, FALSE)) {
|
|
nm_device_state_changed (self,
|
|
NM_DEVICE_STATE_FAILED,
|
|
NM_DEVICE_STATE_REASON_DHCP_FAILED);
|
|
return;
|
|
}
|
|
}
|
|
if (priv->ndisc) {
|
|
/* FIXME: todo */
|
|
}
|
|
if (priv->dnsmasq_manager) {
|
|
/* FIXME: todo */
|
|
}
|
|
|
|
if (priv->lldp_listener && nm_lldp_listener_is_running (priv->lldp_listener)) {
|
|
nm_lldp_listener_stop (priv->lldp_listener);
|
|
addr = nm_platform_link_get_address (nm_device_get_platform (self), priv->ifindex, &addr_length);
|
|
|
|
if (!nm_lldp_listener_start (priv->lldp_listener, nm_device_get_ifindex (self), &error)) {
|
|
_LOGD (LOGD_DEVICE, "LLDP listener %p could not be restarted: %s",
|
|
priv->lldp_listener, error->message);
|
|
g_clear_error (&error);
|
|
}
|
|
}
|
|
}
|
|
|
|
static void
|
|
carrier_changed (NMDevice *self, gboolean carrier)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->state <= NM_DEVICE_STATE_UNMANAGED)
|
|
return;
|
|
|
|
nm_device_recheck_available_connections (self);
|
|
|
|
/* ignore-carrier devices ignore all carrier-down events */
|
|
if (priv->ignore_carrier && !carrier)
|
|
return;
|
|
|
|
if (priv->is_master) {
|
|
/* Bridge/bond/team carrier does not affect its own activation,
|
|
* but when carrier comes on, if there are slaves waiting,
|
|
* it will restart them.
|
|
*/
|
|
if (!carrier)
|
|
return;
|
|
|
|
if (nm_device_activate_ip4_state_in_wait (self))
|
|
nm_device_activate_stage3_ip4_start (self);
|
|
if (nm_device_activate_ip6_state_in_wait (self))
|
|
nm_device_activate_stage3_ip6_start (self);
|
|
|
|
return;
|
|
} else if (nm_device_get_enslaved (self) && !carrier) {
|
|
/* Slaves don't deactivate when they lose carrier; for
|
|
* bonds/teams in particular that would be actively
|
|
* counterproductive.
|
|
*/
|
|
return;
|
|
}
|
|
|
|
if (carrier) {
|
|
if (priv->state == NM_DEVICE_STATE_UNAVAILABLE) {
|
|
nm_device_queue_state (self, NM_DEVICE_STATE_DISCONNECTED,
|
|
NM_DEVICE_STATE_REASON_CARRIER);
|
|
} else if (priv->state == NM_DEVICE_STATE_DISCONNECTED) {
|
|
/* If the device is already in DISCONNECTED state without a carrier
|
|
* (probably because it is tagged for carrier ignore) ensure that
|
|
* when the carrier appears, auto connections are rechecked for
|
|
* the device.
|
|
*/
|
|
nm_device_emit_recheck_auto_activate (self);
|
|
} else if (priv->state == NM_DEVICE_STATE_ACTIVATED) {
|
|
/* If the device is active without a carrier (probably because it is
|
|
* tagged for carrier ignore) ensure that when the carrier appears we
|
|
* renew DHCP leases and such.
|
|
*/
|
|
nm_device_update_dynamic_ip_setup (self);
|
|
}
|
|
} else {
|
|
if (priv->state == NM_DEVICE_STATE_UNAVAILABLE) {
|
|
if ( priv->queued_state.id
|
|
&& priv->queued_state.state >= NM_DEVICE_STATE_DISCONNECTED)
|
|
queued_state_clear (self);
|
|
} else {
|
|
nm_device_queue_state (self, NM_DEVICE_STATE_UNAVAILABLE,
|
|
NM_DEVICE_STATE_REASON_CARRIER);
|
|
}
|
|
}
|
|
}
|
|
|
|
#define LINK_DISCONNECT_DELAY 4
|
|
|
|
static gboolean
|
|
link_disconnect_action_cb (gpointer user_data)
|
|
{
|
|
NMDevice *self = NM_DEVICE (user_data);
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
_LOGD (LOGD_DEVICE, "link disconnected (calling deferred action) (id=%u)", priv->carrier_defer_id);
|
|
|
|
priv->carrier_defer_id = 0;
|
|
|
|
NM_DEVICE_GET_CLASS (self)->carrier_changed (self, FALSE);
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
static void
|
|
link_disconnect_action_cancel (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->carrier_defer_id) {
|
|
g_source_remove (priv->carrier_defer_id);
|
|
_LOGD (LOGD_DEVICE, "link disconnected (canceling deferred action) (id=%u)", priv->carrier_defer_id);
|
|
priv->carrier_defer_id = 0;
|
|
}
|
|
}
|
|
|
|
void
|
|
nm_device_set_carrier (NMDevice *self, gboolean carrier)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMDeviceClass *klass = NM_DEVICE_GET_CLASS (self);
|
|
NMDeviceState state = nm_device_get_state (self);
|
|
|
|
if (priv->carrier == carrier)
|
|
return;
|
|
|
|
priv->carrier = carrier;
|
|
_notify (self, PROP_CARRIER);
|
|
|
|
if (priv->carrier) {
|
|
_LOGI (LOGD_DEVICE, "link connected");
|
|
link_disconnect_action_cancel (self);
|
|
klass->carrier_changed (self, TRUE);
|
|
|
|
if (nm_clear_g_source (&priv->carrier_wait_id)) {
|
|
nm_device_remove_pending_action (self, NM_PENDING_ACTION_CARRIER_WAIT, TRUE);
|
|
_carrier_wait_check_queued_act_request (self);
|
|
}
|
|
} else if ( state <= NM_DEVICE_STATE_DISCONNECTED
|
|
&& !priv->queued_act_request) {
|
|
_LOGD (LOGD_DEVICE, "link disconnected");
|
|
klass->carrier_changed (self, FALSE);
|
|
} else {
|
|
priv->carrier_defer_id = g_timeout_add_seconds (LINK_DISCONNECT_DELAY,
|
|
link_disconnect_action_cb, self);
|
|
_LOGD (LOGD_DEVICE, "link disconnected (deferring action for %d seconds) (id=%u)",
|
|
LINK_DISCONNECT_DELAY, priv->carrier_defer_id);
|
|
}
|
|
}
|
|
|
|
static void
|
|
device_recheck_slave_status (NMDevice *self, const NMPlatformLink *plink)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
g_return_if_fail (plink);
|
|
|
|
if (plink->master <= 0)
|
|
return;
|
|
|
|
if (priv->master) {
|
|
if ( plink->master > 0
|
|
&& plink->master == nm_device_get_ifindex (priv->master)) {
|
|
/* call add-slave again. We expect @self already to be added to
|
|
* the master, but this also triggers a recheck-assume. */
|
|
nm_device_master_add_slave (priv->master, self, FALSE);
|
|
return;
|
|
}
|
|
|
|
nm_device_master_release_one_slave (priv->master, self, FALSE, NM_DEVICE_STATE_REASON_CONNECTION_ASSUMED);
|
|
}
|
|
if (plink->master > 0) {
|
|
NMDevice *master;
|
|
|
|
master = nm_manager_get_device_by_ifindex (nm_manager_get (), plink->master);
|
|
if (master && NM_DEVICE_GET_CLASS (master)->enslave_slave)
|
|
nm_device_master_add_slave (master, self, FALSE);
|
|
else if (master) {
|
|
_LOGI (LOGD_DEVICE, "enslaved to non-master-type device %s; ignoring",
|
|
nm_device_get_iface (master));
|
|
} else {
|
|
_LOGW (LOGD_DEVICE, "enslaved to unknown device %d %s",
|
|
plink->master,
|
|
nm_platform_link_get_name (nm_device_get_platform (self), plink->master));
|
|
}
|
|
}
|
|
}
|
|
|
|
static void
|
|
ndisc_set_router_config (NMNDisc *ndisc, NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
gint32 now;
|
|
GArray *addresses, *dns_servers, *dns_domains;
|
|
guint len, i;
|
|
|
|
if (nm_ndisc_get_node_type (ndisc) != NM_NDISC_NODE_TYPE_ROUTER)
|
|
return;
|
|
|
|
now = nm_utils_get_monotonic_timestamp_s ();
|
|
|
|
len = nm_ip6_config_get_num_addresses (priv->ip6_config);
|
|
addresses = g_array_sized_new (FALSE, TRUE, sizeof (NMNDiscAddress), len);
|
|
for (i = 0; i < len; i++) {
|
|
const NMPlatformIP6Address *addr = nm_ip6_config_get_address (priv->ip6_config, i);
|
|
NMNDiscAddress *ndisc_addr;
|
|
|
|
if (IN6_IS_ADDR_LINKLOCAL (&addr->address))
|
|
continue;
|
|
|
|
if ( addr->n_ifa_flags & IFA_F_TENTATIVE
|
|
|| addr->n_ifa_flags & IFA_F_DADFAILED)
|
|
continue;
|
|
|
|
if (addr->plen != 64)
|
|
continue;
|
|
|
|
g_array_set_size (addresses, addresses->len+1);
|
|
ndisc_addr = &g_array_index (addresses, NMNDiscAddress, addresses->len-1);
|
|
ndisc_addr->address = addr->address;
|
|
ndisc_addr->timestamp = addr->timestamp;
|
|
ndisc_addr->lifetime = addr->lifetime;
|
|
ndisc_addr->preferred = addr->preferred;
|
|
}
|
|
|
|
len = nm_ip6_config_get_num_nameservers (priv->ip6_config);
|
|
dns_servers = g_array_sized_new (FALSE, TRUE, sizeof (NMNDiscDNSServer), len);
|
|
g_array_set_size (dns_servers, len);
|
|
for (i = 0; i < len; i++) {
|
|
const struct in6_addr *nameserver = nm_ip6_config_get_nameserver (priv->ip6_config, i);
|
|
NMNDiscDNSServer *ndisc_nameserver;
|
|
|
|
ndisc_nameserver = &g_array_index (dns_servers, NMNDiscDNSServer, i);
|
|
ndisc_nameserver->address = *nameserver;
|
|
ndisc_nameserver->timestamp = now;
|
|
ndisc_nameserver->lifetime = NM_NDISC_ROUTER_LIFETIME;
|
|
}
|
|
|
|
len = nm_ip6_config_get_num_searches (priv->ip6_config);
|
|
dns_domains = g_array_sized_new (FALSE, TRUE, sizeof (NMNDiscDNSDomain), len);
|
|
g_array_set_size (dns_domains, len);
|
|
for (i = 0; i < len; i++) {
|
|
const char *search = nm_ip6_config_get_search (priv->ip6_config, i);
|
|
NMNDiscDNSDomain *ndisc_search;
|
|
|
|
ndisc_search = &g_array_index (dns_domains, NMNDiscDNSDomain, i);
|
|
ndisc_search->domain = (char *) search;
|
|
ndisc_search->timestamp = now;
|
|
ndisc_search->lifetime = NM_NDISC_ROUTER_LIFETIME;
|
|
}
|
|
|
|
nm_ndisc_set_config (ndisc, addresses, dns_servers, dns_domains);
|
|
g_array_unref (addresses);
|
|
g_array_unref (dns_servers);
|
|
g_array_unref (dns_domains);
|
|
}
|
|
|
|
static gboolean
|
|
device_link_changed (NMDevice *self)
|
|
{
|
|
NMDeviceClass *klass = NM_DEVICE_GET_CLASS (self);
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
gboolean ip_ifname_changed = FALSE;
|
|
const char *udi;
|
|
NMPlatformLink info;
|
|
const NMPlatformLink *pllink;
|
|
int ifindex;
|
|
gboolean was_up;
|
|
gboolean update_unmanaged_specs = FALSE;
|
|
gboolean got_hw_addr = FALSE, had_hw_addr;
|
|
|
|
priv->device_link_changed_id = 0;
|
|
|
|
ifindex = nm_device_get_ifindex (self);
|
|
pllink = nm_platform_link_get (nm_device_get_platform (self), ifindex);
|
|
if (!pllink)
|
|
return G_SOURCE_REMOVE;
|
|
|
|
info = *pllink;
|
|
|
|
udi = nm_platform_link_get_udi (nm_device_get_platform (self), info.ifindex);
|
|
if (udi && g_strcmp0 (udi, priv->udi)) {
|
|
/* Update UDI to what udev gives us */
|
|
g_free (priv->udi);
|
|
priv->udi = g_strdup (udi);
|
|
_notify (self, PROP_UDI);
|
|
}
|
|
|
|
if (!nm_streq0 (info.driver, priv->driver)) {
|
|
g_free (priv->driver);
|
|
priv->driver = g_strdup (info.driver);
|
|
_notify (self, PROP_DRIVER);
|
|
}
|
|
|
|
if (priv->mtu != info.mtu) {
|
|
priv->mtu = info.mtu;
|
|
_notify (self, PROP_MTU);
|
|
}
|
|
|
|
if (ifindex == nm_device_get_ip_ifindex (self))
|
|
_stats_update_counters_from_pllink (self, &info);
|
|
|
|
had_hw_addr = (priv->hw_addr != NULL);
|
|
nm_device_update_hw_address (self);
|
|
got_hw_addr = (!had_hw_addr && priv->hw_addr);
|
|
nm_device_update_permanent_hw_address (self, FALSE);
|
|
|
|
if (info.name[0] && strcmp (priv->iface, info.name) != 0) {
|
|
_LOGI (LOGD_DEVICE, "interface index %d renamed iface from '%s' to '%s'",
|
|
priv->ifindex, priv->iface, info.name);
|
|
g_free (priv->iface);
|
|
priv->iface = g_strdup (info.name);
|
|
|
|
/* If the device has no explicit ip_iface, then changing iface changes ip_iface too. */
|
|
ip_ifname_changed = !priv->ip_iface;
|
|
|
|
if (nm_device_get_unmanaged_flags (self, NM_UNMANAGED_PLATFORM_INIT))
|
|
nm_device_set_unmanaged_by_user_settings (self);
|
|
else
|
|
update_unmanaged_specs = TRUE;
|
|
|
|
_notify (self, PROP_IFACE);
|
|
if (ip_ifname_changed)
|
|
_notify (self, PROP_IP_IFACE);
|
|
|
|
/* Re-match available connections against the new interface name */
|
|
nm_device_recheck_available_connections (self);
|
|
|
|
/* Let any connections that use the new interface name have a chance
|
|
* to auto-activate on the device.
|
|
*/
|
|
nm_device_emit_recheck_auto_activate (self);
|
|
}
|
|
|
|
if (priv->ndisc && info.inet6_token.id) {
|
|
if (nm_ndisc_set_iid (priv->ndisc, info.inet6_token))
|
|
_LOGD (LOGD_DEVICE, "IPv6 tokenized identifier present on device %s", priv->iface);
|
|
}
|
|
|
|
/* Update carrier from link event if applicable. */
|
|
if ( nm_device_has_capability (self, NM_DEVICE_CAP_CARRIER_DETECT)
|
|
&& !nm_device_has_capability (self, NM_DEVICE_CAP_NONSTANDARD_CARRIER))
|
|
nm_device_set_carrier (self, pllink->connected);
|
|
|
|
klass->link_changed (self, &info);
|
|
|
|
/* Update DHCP, etc, if needed */
|
|
if (ip_ifname_changed)
|
|
nm_device_update_dynamic_ip_setup (self);
|
|
|
|
was_up = priv->up;
|
|
priv->up = NM_FLAGS_HAS (info.n_ifi_flags, IFF_UP);
|
|
|
|
if ( info.initialized
|
|
&& nm_device_get_unmanaged_flags (self, NM_UNMANAGED_PLATFORM_INIT)) {
|
|
NMDeviceStateReason reason;
|
|
|
|
nm_device_set_unmanaged_by_user_udev (self);
|
|
|
|
reason = NM_DEVICE_STATE_REASON_NOW_MANAGED;
|
|
|
|
/* If the device is a external-down candidated but no longer has external
|
|
* down set, we must clear the platform-unmanaged flag with reason
|
|
* "assumed". */
|
|
if ( nm_device_get_unmanaged_mask (self, NM_UNMANAGED_EXTERNAL_DOWN)
|
|
&& !nm_device_get_unmanaged_flags (self, NM_UNMANAGED_EXTERNAL_DOWN)) {
|
|
/* actually, user-udev overwrites external-down. So we only assume the device,
|
|
* when it is a external-down candidate, which is not managed via udev. */
|
|
if (!nm_device_get_unmanaged_mask (self, NM_UNMANAGED_USER_UDEV)) {
|
|
/* Ensure the assume check is queued before any queued state changes
|
|
* from the transition to UNAVAILABLE.
|
|
*/
|
|
nm_device_queue_recheck_assume (self);
|
|
reason = NM_DEVICE_STATE_REASON_CONNECTION_ASSUMED;
|
|
}
|
|
}
|
|
|
|
nm_device_set_unmanaged_by_flags (self, NM_UNMANAGED_PLATFORM_INIT, FALSE, reason);
|
|
}
|
|
|
|
set_unmanaged_external_down (self, FALSE);
|
|
|
|
device_recheck_slave_status (self, &info);
|
|
|
|
if (priv->up && !was_up) {
|
|
/* the link was down and just came up. That happens for example, while changing MTU.
|
|
* We must restore IP configuration. */
|
|
if (priv->ip4_state == IP_DONE) {
|
|
if (!ip4_config_merge_and_apply (self, NULL, TRUE))
|
|
_LOGW (LOGD_IP4, "failed applying IP4 config after link comes up again");
|
|
}
|
|
if (priv->ip6_state == IP_DONE) {
|
|
if (!ip6_config_merge_and_apply (self, TRUE))
|
|
_LOGW (LOGD_IP6, "failed applying IP6 config after link comes up again");
|
|
}
|
|
}
|
|
|
|
if (update_unmanaged_specs)
|
|
nm_device_set_unmanaged_by_user_settings (self);
|
|
|
|
if ( got_hw_addr
|
|
&& !priv->up
|
|
&& nm_device_get_state (self) == NM_DEVICE_STATE_UNAVAILABLE) {
|
|
/*
|
|
* If the device is UNAVAILABLE, any previous try to
|
|
* bring it up probably has failed because of the
|
|
* invalid hardware address; try again.
|
|
*/
|
|
nm_device_bring_up (self, TRUE, NULL);
|
|
nm_device_queue_recheck_available (self,
|
|
NM_DEVICE_STATE_REASON_NONE,
|
|
NM_DEVICE_STATE_REASON_NONE);
|
|
}
|
|
|
|
return G_SOURCE_REMOVE;
|
|
}
|
|
|
|
static gboolean
|
|
device_ip_link_changed (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
const NMPlatformLink *pllink;
|
|
|
|
priv->device_ip_link_changed_id = 0;
|
|
|
|
if (!priv->ip_ifindex)
|
|
return G_SOURCE_REMOVE;
|
|
|
|
pllink = nm_platform_link_get (nm_device_get_platform (self), priv->ip_ifindex);
|
|
if (!pllink)
|
|
return G_SOURCE_REMOVE;
|
|
|
|
_stats_update_counters_from_pllink (self, pllink);
|
|
|
|
if (_ip_iface_update (self, pllink->name))
|
|
nm_device_update_dynamic_ip_setup (self);
|
|
|
|
return G_SOURCE_REMOVE;
|
|
}
|
|
|
|
static void
|
|
link_changed_cb (NMPlatform *platform,
|
|
int obj_type_i,
|
|
int ifindex,
|
|
NMPlatformLink *info,
|
|
int change_type_i,
|
|
NMDevice *self)
|
|
{
|
|
const NMPlatformSignalChangeType change_type = change_type_i;
|
|
NMDevicePrivate *priv;
|
|
|
|
if (change_type != NM_PLATFORM_SIGNAL_CHANGED)
|
|
return;
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (ifindex == nm_device_get_ifindex (self)) {
|
|
if (!priv->device_link_changed_id) {
|
|
priv->device_link_changed_id = g_idle_add ((GSourceFunc) device_link_changed, self);
|
|
_LOGD (LOGD_DEVICE, "queued link change for ifindex %d", ifindex);
|
|
}
|
|
} else if (ifindex == nm_device_get_ip_ifindex (self)) {
|
|
if (!priv->device_ip_link_changed_id) {
|
|
priv->device_ip_link_changed_id = g_idle_add ((GSourceFunc) device_ip_link_changed, self);
|
|
_LOGD (LOGD_DEVICE, "queued link change for ip-ifindex %d", ifindex);
|
|
}
|
|
}
|
|
}
|
|
|
|
static void
|
|
ip4_rp_filter_update (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
const char *ip4_rp_filter;
|
|
|
|
if ( priv->v4_has_shadowed_routes
|
|
|| priv->default_route.v4_has) {
|
|
if (nm_device_ipv4_sysctl_get_uint32 (self, "rp_filter", 0) != 1) {
|
|
/* Don't touch the rp_filter if it's not strict. */
|
|
return;
|
|
}
|
|
/* Loose rp_filter */
|
|
ip4_rp_filter = "2";
|
|
} else {
|
|
/* Default rp_filter */
|
|
ip4_rp_filter = NULL;
|
|
}
|
|
|
|
if (ip4_rp_filter != priv->ip4_rp_filter) {
|
|
nm_device_ipv4_sysctl_set (self, "rp_filter", ip4_rp_filter);
|
|
priv->ip4_rp_filter = ip4_rp_filter;
|
|
}
|
|
}
|
|
|
|
static void
|
|
ip4_routes_changed_changed_cb (NMRouteManager *route_manager, NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
int ifindex = nm_device_get_ip_ifindex (self);
|
|
|
|
if (nm_device_sys_iface_state_is_external_or_assume (self))
|
|
return;
|
|
|
|
priv->v4_has_shadowed_routes = nm_route_manager_ip4_routes_shadowed (route_manager,
|
|
ifindex);
|
|
ip4_rp_filter_update (self);
|
|
}
|
|
|
|
static void
|
|
link_changed (NMDevice *self, const NMPlatformLink *pllink)
|
|
{
|
|
/* stub implementation of virtual function to allow subclasses to chain up. */
|
|
}
|
|
|
|
static gboolean
|
|
link_type_compatible (NMDevice *self,
|
|
NMLinkType link_type,
|
|
gboolean *out_compatible,
|
|
GError **error)
|
|
{
|
|
NMDeviceClass *klass;
|
|
NMLinkType device_type;
|
|
guint i = 0;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
|
|
klass = NM_DEVICE_GET_CLASS (self);
|
|
|
|
if (!klass->link_types) {
|
|
NM_SET_OUT (out_compatible, FALSE);
|
|
g_set_error_literal (error, NM_DEVICE_ERROR, NM_DEVICE_ERROR_FAILED,
|
|
"Device does not support platform links");
|
|
return FALSE;
|
|
}
|
|
|
|
device_type = self->_priv->link_type;
|
|
if (device_type > NM_LINK_TYPE_UNKNOWN && device_type != link_type) {
|
|
g_set_error (error, NM_DEVICE_ERROR, NM_DEVICE_ERROR_FAILED,
|
|
"Needed link type 0x%x does not match the platform link type 0x%X",
|
|
device_type, link_type);
|
|
return FALSE;
|
|
}
|
|
|
|
for (i = 0; klass->link_types[i] > NM_LINK_TYPE_UNKNOWN; i++) {
|
|
if (klass->link_types[i] == link_type)
|
|
return TRUE;
|
|
if (klass->link_types[i] == NM_LINK_TYPE_ANY)
|
|
return TRUE;
|
|
}
|
|
|
|
NM_SET_OUT (out_compatible, FALSE);
|
|
g_set_error (error, NM_DEVICE_ERROR, NM_DEVICE_ERROR_FAILED,
|
|
"Device does not support platform link type 0x%X",
|
|
link_type);
|
|
return FALSE;
|
|
}
|
|
|
|
/**
|
|
* nm_device_realize_start():
|
|
* @self: the #NMDevice
|
|
* @plink: an existing platform link or %NULL
|
|
* @unmanaged_user_explicit: the user-explicit unmanaged flag to apply
|
|
* on the device initially.
|
|
* @out_compatible: %TRUE on return if @self is compatible with @plink
|
|
* @error: location to store error, or %NULL
|
|
*
|
|
* Initializes and sets up the device using existing backing resources. Before
|
|
* the device is ready for use nm_device_realize_finish() must be called.
|
|
* @out_compatible will only be set if @plink is not %NULL, and
|
|
*
|
|
* Important: if nm_device_realize_start() returns %TRUE, the caller MUST
|
|
* also call nm_device_realize_finish() to balance g_object_freeze_notify().
|
|
*
|
|
* Returns: %TRUE on success, %FALSE on error
|
|
*/
|
|
gboolean
|
|
nm_device_realize_start (NMDevice *self,
|
|
const NMPlatformLink *plink,
|
|
NMUnmanFlagOp unmanaged_user_explicit,
|
|
gboolean *out_compatible,
|
|
GError **error)
|
|
{
|
|
NMPlatformLink plink_copy;
|
|
|
|
NM_SET_OUT (out_compatible, TRUE);
|
|
|
|
if (plink) {
|
|
if (g_strcmp0 (nm_device_get_iface (self), plink->name) != 0) {
|
|
NM_SET_OUT (out_compatible, FALSE);
|
|
g_set_error_literal (error, NM_DEVICE_ERROR, NM_DEVICE_ERROR_FAILED,
|
|
"Device interface name does not match platform link");
|
|
return FALSE;
|
|
}
|
|
|
|
if (!link_type_compatible (self, plink->type, out_compatible, error))
|
|
return FALSE;
|
|
}
|
|
|
|
if (plink) {
|
|
plink_copy = *plink;
|
|
plink = &plink_copy;
|
|
}
|
|
realize_start_setup (self, plink, unmanaged_user_explicit);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
* nm_device_create_and_realize():
|
|
* @self: the #NMDevice
|
|
* @connection: the #NMConnection being activated
|
|
* @parent: the parent #NMDevice if any
|
|
* @error: location to store error, or %NULL
|
|
*
|
|
* Creates any backing resources needed to realize the device to proceed
|
|
* with activating @connection.
|
|
*
|
|
* Returns: %TRUE on success, %FALSE on error
|
|
*/
|
|
gboolean
|
|
nm_device_create_and_realize (NMDevice *self,
|
|
NMConnection *connection,
|
|
NMDevice *parent,
|
|
GError **error)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMPlatformLink plink_copy;
|
|
const NMPlatformLink *plink = NULL;
|
|
|
|
/* Must be set before device is realized */
|
|
priv->is_nm_owned = !nm_platform_link_get_by_ifname (nm_device_get_platform (self), priv->iface);
|
|
|
|
_LOGD (LOGD_DEVICE, "create (is %snm-owned)", priv->is_nm_owned ? "" : "not ");
|
|
|
|
/* Create any resources the device needs */
|
|
if (NM_DEVICE_GET_CLASS (self)->create_and_realize) {
|
|
if (!NM_DEVICE_GET_CLASS (self)->create_and_realize (self, connection, parent, &plink, error))
|
|
return FALSE;
|
|
plink_copy = *plink;
|
|
plink = &plink_copy;
|
|
}
|
|
|
|
realize_start_setup (self, plink, NM_UNMAN_FLAG_OP_FORGET);
|
|
nm_device_realize_finish (self, plink);
|
|
|
|
if (nm_device_get_managed (self, FALSE)) {
|
|
nm_device_state_changed (self,
|
|
NM_DEVICE_STATE_UNAVAILABLE,
|
|
NM_DEVICE_STATE_REASON_NOW_MANAGED);
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
static void
|
|
update_device_from_platform_link (NMDevice *self, const NMPlatformLink *plink)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
const char *udi;
|
|
|
|
g_return_if_fail (plink != NULL);
|
|
|
|
udi = nm_platform_link_get_udi (nm_device_get_platform (self), plink->ifindex);
|
|
if (udi && !g_strcmp0 (udi, priv->udi)) {
|
|
g_free (priv->udi);
|
|
priv->udi = g_strdup (udi);
|
|
_notify (self, PROP_UDI);
|
|
}
|
|
|
|
if (!g_strcmp0 (plink->name, priv->iface)) {
|
|
g_free (priv->iface);
|
|
priv->iface = g_strdup (plink->name);
|
|
_notify (self, PROP_IFACE);
|
|
}
|
|
|
|
if (priv->ifindex != plink->ifindex) {
|
|
priv->ifindex = plink->ifindex;
|
|
_notify (self, PROP_IFINDEX);
|
|
}
|
|
|
|
priv->up = NM_FLAGS_HAS (plink->n_ifi_flags, IFF_UP);
|
|
if (plink->driver && g_strcmp0 (plink->driver, priv->driver) != 0) {
|
|
g_free (priv->driver);
|
|
priv->driver = g_strdup (plink->driver);
|
|
_notify (self, PROP_DRIVER);
|
|
}
|
|
}
|
|
|
|
static void
|
|
device_init_sriov_num_vfs (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
gs_free char *value = NULL;
|
|
int num_vfs;
|
|
|
|
if ( priv->ifindex > 0
|
|
&& nm_device_has_capability (self, NM_DEVICE_CAP_SRIOV)) {
|
|
value = nm_config_data_get_device_config (NM_CONFIG_GET_DATA,
|
|
"sriov-num-vfs",
|
|
self,
|
|
NULL);
|
|
num_vfs = _nm_utils_ascii_str_to_int64 (value, 10, 0, G_MAXINT32, -1);
|
|
if (num_vfs >= 0) {
|
|
nm_platform_link_set_sriov_num_vfs (nm_device_get_platform (self),
|
|
priv->ifindex, num_vfs);
|
|
}
|
|
}
|
|
}
|
|
|
|
static void
|
|
config_changed (NMConfig *config,
|
|
NMConfigData *config_data,
|
|
NMConfigChangeFlags changes,
|
|
NMConfigData *old_data,
|
|
NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if ( priv->state <= NM_DEVICE_STATE_DISCONNECTED
|
|
|| priv->state > NM_DEVICE_STATE_ACTIVATED)
|
|
priv->ignore_carrier = nm_config_data_get_ignore_carrier (config_data, self);
|
|
|
|
if (NM_FLAGS_HAS (changes, NM_CONFIG_CHANGE_VALUES))
|
|
device_init_sriov_num_vfs (self);
|
|
}
|
|
|
|
static void
|
|
check_carrier (NMDevice *self)
|
|
{
|
|
int ifindex = nm_device_get_ip_ifindex (self);
|
|
|
|
if (!nm_device_has_capability (self, NM_DEVICE_CAP_NONSTANDARD_CARRIER))
|
|
nm_device_set_carrier (self, nm_platform_link_is_connected (nm_device_get_platform (self), ifindex));
|
|
}
|
|
|
|
static void
|
|
realize_start_notify (NMDevice *self,
|
|
const NMPlatformLink *pllink)
|
|
{
|
|
/* the default implementation of realize_start_notify() just calls
|
|
* link_changed() -- which by default does nothing. */
|
|
NM_DEVICE_GET_CLASS (self)->link_changed (self, pllink);
|
|
}
|
|
|
|
/**
|
|
* realize_start_setup():
|
|
* @self: the #NMDevice
|
|
* @plink: the #NMPlatformLink if backed by a kernel netdevice
|
|
* @unmanaged_user_explicit: the user-explict unmanaged flag to set.
|
|
*
|
|
* Update the device from backing resource properties (like hardware
|
|
* addresses, carrier states, driver/firmware info, etc). This function
|
|
* should only change properties for this device, and should not perform
|
|
* any tasks that affect other interfaces (like master/slave or parent/child
|
|
* stuff).
|
|
*/
|
|
static void
|
|
realize_start_setup (NMDevice *self,
|
|
const NMPlatformLink *plink,
|
|
NMUnmanFlagOp unmanaged_user_explicit)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
NMDeviceClass *klass;
|
|
static guint32 id = 0;
|
|
NMDeviceCapabilities capabilities = 0;
|
|
NMConfig *config;
|
|
guint real_rate;
|
|
guint32 mtu;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
/* The device should not be realized */
|
|
g_return_if_fail (!priv->real);
|
|
g_return_if_fail (nm_device_get_unmanaged_flags (self, NM_UNMANAGED_PLATFORM_INIT));
|
|
g_return_if_fail (priv->ip_ifindex <= 0);
|
|
g_return_if_fail (priv->ip_iface == NULL);
|
|
g_return_if_fail (!priv->queued_ip4_config_id);
|
|
g_return_if_fail (!priv->queued_ip6_config_id);
|
|
|
|
_LOGD (LOGD_DEVICE, "start setup of %s, kernel ifindex %d", G_OBJECT_TYPE_NAME (self), plink ? plink->ifindex : 0);
|
|
|
|
klass = NM_DEVICE_GET_CLASS (self);
|
|
|
|
/* Balanced by a thaw in nm_device_realize_finish() */
|
|
g_object_freeze_notify (G_OBJECT (self));
|
|
|
|
priv->mtu_initialized = FALSE;
|
|
priv->mtu_initial = 0;
|
|
priv->ip6_mtu_initial = 0;
|
|
priv->ip6_mtu = 0;
|
|
if (priv->mtu) {
|
|
priv->mtu = 0;
|
|
_notify (self, PROP_MTU);
|
|
}
|
|
|
|
nm_device_sys_iface_state_set (self, NM_DEVICE_SYS_IFACE_STATE_EXTERNAL);
|
|
|
|
if (plink) {
|
|
g_return_if_fail (link_type_compatible (self, plink->type, NULL, NULL));
|
|
update_device_from_platform_link (self, plink);
|
|
_stats_update_counters_from_pllink (self, plink);
|
|
}
|
|
|
|
if (priv->ifindex > 0) {
|
|
priv->physical_port_id = nm_platform_link_get_physical_port_id (nm_device_get_platform (self), priv->ifindex);
|
|
_notify (self, PROP_PHYSICAL_PORT_ID);
|
|
|
|
priv->dev_id = nm_platform_link_get_dev_id (nm_device_get_platform (self), priv->ifindex);
|
|
|
|
if (nm_platform_link_is_software (nm_device_get_platform (self), priv->ifindex))
|
|
capabilities |= NM_DEVICE_CAP_IS_SOFTWARE;
|
|
|
|
mtu = nm_platform_link_get_mtu (nm_device_get_platform (self), priv->ifindex);
|
|
if (priv->mtu != mtu) {
|
|
priv->mtu = mtu;
|
|
_notify (self, PROP_MTU);
|
|
}
|
|
|
|
nm_platform_link_get_driver_info (nm_device_get_platform (self),
|
|
priv->ifindex,
|
|
NULL,
|
|
&priv->driver_version,
|
|
&priv->firmware_version);
|
|
if (priv->driver_version)
|
|
_notify (self, PROP_DRIVER_VERSION);
|
|
if (priv->firmware_version)
|
|
_notify (self, PROP_FIRMWARE_VERSION);
|
|
|
|
if (nm_platform_check_support_user_ipv6ll (nm_device_get_platform (self)))
|
|
priv->nm_ipv6ll = nm_platform_link_get_user_ipv6ll_enabled (nm_device_get_platform (self), priv->ifindex);
|
|
|
|
if (nm_platform_link_supports_sriov (nm_device_get_platform (self), priv->ifindex))
|
|
capabilities |= NM_DEVICE_CAP_SRIOV;
|
|
}
|
|
|
|
if (klass->get_generic_capabilities)
|
|
capabilities |= klass->get_generic_capabilities (self);
|
|
|
|
_add_capabilities (self, capabilities);
|
|
|
|
if (!priv->udi) {
|
|
/* Use a placeholder UDI until we get a real one */
|
|
priv->udi = g_strdup_printf ("/virtual/device/placeholder/%d", id++);
|
|
_notify (self, PROP_UDI);
|
|
}
|
|
|
|
priv->queued_ip4_config_pending = TRUE;
|
|
priv->queued_ip6_config_pending = TRUE;
|
|
|
|
nm_device_update_hw_address (self);
|
|
nm_device_update_initial_hw_address (self);
|
|
nm_device_update_permanent_hw_address (self, FALSE);
|
|
|
|
/* Note: initial hardware address must be read before calling get_ignore_carrier() */
|
|
config = nm_config_get ();
|
|
priv->ignore_carrier = nm_config_data_get_ignore_carrier (nm_config_get_data (config), self);
|
|
if (!priv->config_changed_id) {
|
|
priv->config_changed_id = g_signal_connect (config,
|
|
NM_CONFIG_SIGNAL_CONFIG_CHANGED,
|
|
G_CALLBACK (config_changed),
|
|
self);
|
|
}
|
|
|
|
if (nm_device_has_capability (self, NM_DEVICE_CAP_CARRIER_DETECT)) {
|
|
check_carrier (self);
|
|
_LOGD (LOGD_PLATFORM,
|
|
"carrier is %s%s",
|
|
priv->carrier ? "ON" : "OFF",
|
|
priv->ignore_carrier ? " (but ignored)" : "");
|
|
} else {
|
|
/* Fake online link when carrier detection is not available. */
|
|
priv->carrier = TRUE;
|
|
}
|
|
|
|
device_init_sriov_num_vfs (self);
|
|
|
|
nm_assert (!priv->stats.timeout_id);
|
|
real_rate = _stats_refresh_rate_real (priv->stats.refresh_rate_ms);
|
|
if (real_rate)
|
|
priv->stats.timeout_id = g_timeout_add (real_rate, _stats_timeout_cb, self);
|
|
|
|
nm_device_set_autoconnect_full (self, !!DEFAULT_AUTOCONNECT, TRUE);
|
|
|
|
klass->realize_start_notify (self, plink);
|
|
|
|
nm_assert (!nm_device_get_unmanaged_mask (self, NM_UNMANAGED_USER_EXPLICIT));
|
|
nm_device_set_unmanaged_flags (self,
|
|
NM_UNMANAGED_USER_EXPLICIT,
|
|
unmanaged_user_explicit);
|
|
|
|
/* Do not manage externally created software devices until they are IFF_UP
|
|
* or have IP addressing */
|
|
nm_device_set_unmanaged_flags (self,
|
|
NM_UNMANAGED_EXTERNAL_DOWN,
|
|
is_unmanaged_external_down (self, TRUE));
|
|
|
|
/* Unmanaged the loopback device with an explicit NM_UNMANAGED_LOOPBACK flag.
|
|
* Later we might want to manage 'lo' too. Currently that doesn't work because
|
|
* NetworkManager might down the interface or remove the 127.0.0.1 address. */
|
|
nm_device_set_unmanaged_flags (self, NM_UNMANAGED_LOOPBACK, priv->ifindex == 1);
|
|
|
|
nm_device_set_unmanaged_by_user_udev (self);
|
|
|
|
nm_device_set_unmanaged_flags (self, NM_UNMANAGED_PLATFORM_INIT,
|
|
plink && !plink->initialized);
|
|
}
|
|
|
|
/**
|
|
* nm_device_realize_finish():
|
|
* @self: the #NMDevice
|
|
* @plink: the #NMPlatformLink if backed by a kernel netdevice
|
|
*
|
|
* Update the device's master/slave or parent/child relationships from
|
|
* backing resource properties. After this function finishes, the device
|
|
* is ready for network connectivity.
|
|
*/
|
|
void
|
|
nm_device_realize_finish (NMDevice *self, const NMPlatformLink *plink)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
g_return_if_fail (!plink || link_type_compatible (self, plink->type, NULL, NULL));
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
g_return_if_fail (!priv->real);
|
|
|
|
if (plink)
|
|
device_recheck_slave_status (self, plink);
|
|
|
|
priv->real = TRUE;
|
|
_notify (self, PROP_REAL);
|
|
|
|
nm_device_recheck_available_connections (self);
|
|
|
|
/* Balanced by a freeze in realize_start_setup(). */
|
|
g_object_thaw_notify (G_OBJECT (self));
|
|
}
|
|
|
|
static void
|
|
unrealize_notify (NMDevice *self)
|
|
{
|
|
/* Stub implementation for unrealize_notify(). It does nothing,
|
|
* but allows derived classes to uniformly invoke the parent
|
|
* implementation. */
|
|
}
|
|
|
|
static gboolean
|
|
available_connections_check_delete_unrealized_on_idle (gpointer user_data)
|
|
{
|
|
NMDevice *self = user_data;
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), G_SOURCE_REMOVE);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
priv->check_delete_unrealized_id = 0;
|
|
|
|
if ( g_hash_table_size (priv->available_connections) == 0
|
|
&& !nm_device_is_real (self))
|
|
g_signal_emit (self, signals[REMOVED], 0);
|
|
|
|
return G_SOURCE_REMOVE;
|
|
}
|
|
|
|
static void
|
|
available_connections_check_delete_unrealized (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
/* always rescheadule the remove signal. */
|
|
nm_clear_g_source (&priv->check_delete_unrealized_id);
|
|
|
|
if ( g_hash_table_size (priv->available_connections) == 0
|
|
&& !nm_device_is_real (self))
|
|
priv->check_delete_unrealized_id = g_idle_add (available_connections_check_delete_unrealized_on_idle, self);
|
|
}
|
|
|
|
/**
|
|
* nm_device_unrealize():
|
|
* @self: the #NMDevice
|
|
* @remove_resources: if %TRUE, remove backing resources
|
|
* @error: location to store error, or %NULL
|
|
*
|
|
* Clears any properties that depend on backing resources (kernel devices,
|
|
* etc) and removes those resources if @remove_resources is %TRUE.
|
|
*
|
|
* Returns: %TRUE on success, %FALSE on error
|
|
*/
|
|
gboolean
|
|
nm_device_unrealize (NMDevice *self, gboolean remove_resources, GError **error)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
int ifindex;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
|
|
if (!nm_device_is_software (self) || !nm_device_is_real (self)) {
|
|
g_set_error_literal (error,
|
|
NM_DEVICE_ERROR,
|
|
NM_DEVICE_ERROR_NOT_SOFTWARE,
|
|
"This device is not a software device or is not realized");
|
|
return FALSE;
|
|
}
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
g_return_val_if_fail (priv->iface != NULL, FALSE);
|
|
g_return_val_if_fail (priv->real, FALSE);
|
|
|
|
g_object_freeze_notify (G_OBJECT (self));
|
|
|
|
ifindex = nm_device_get_ifindex (self);
|
|
|
|
_LOGD (LOGD_DEVICE, "unrealize (ifindex %d)", ifindex > 0 ? ifindex : 0);
|
|
|
|
if (remove_resources) {
|
|
if (NM_DEVICE_GET_CLASS (self)->unrealize) {
|
|
if (!NM_DEVICE_GET_CLASS (self)->unrealize (self, error))
|
|
return FALSE;
|
|
} else if (ifindex > 0) {
|
|
nm_platform_link_delete (nm_device_get_platform (self), ifindex);
|
|
}
|
|
}
|
|
|
|
NM_DEVICE_GET_CLASS (self)->unrealize_notify (self);
|
|
|
|
_parent_set_ifindex (self, 0, FALSE);
|
|
|
|
if (priv->ifindex > 0) {
|
|
priv->ifindex = 0;
|
|
_notify (self, PROP_IFINDEX);
|
|
}
|
|
priv->ip_ifindex = 0;
|
|
if (nm_clear_g_free (&priv->ip_iface))
|
|
_notify (self, PROP_IP_IFACE);
|
|
|
|
if (priv->mtu != 0) {
|
|
priv->mtu = 0;
|
|
_notify (self, PROP_MTU);
|
|
}
|
|
|
|
if (priv->driver_version) {
|
|
g_clear_pointer (&priv->driver_version, g_free);
|
|
_notify (self, PROP_DRIVER_VERSION);
|
|
}
|
|
if (priv->firmware_version) {
|
|
g_clear_pointer (&priv->firmware_version, g_free);
|
|
_notify (self, PROP_FIRMWARE_VERSION);
|
|
}
|
|
if (priv->udi) {
|
|
g_clear_pointer (&priv->udi, g_free);
|
|
_notify (self, PROP_UDI);
|
|
}
|
|
if (priv->physical_port_id) {
|
|
g_clear_pointer (&priv->physical_port_id, g_free);
|
|
_notify (self, PROP_PHYSICAL_PORT_ID);
|
|
}
|
|
|
|
nm_clear_g_source (&priv->stats.timeout_id);
|
|
_stats_update_counters (self, 0, 0);
|
|
|
|
priv->hw_addr_len_ = 0;
|
|
if (nm_clear_g_free (&priv->hw_addr))
|
|
_notify (self, PROP_HW_ADDRESS);
|
|
priv->hw_addr_type = HW_ADDR_TYPE_UNSET;
|
|
if (nm_clear_g_free (&priv->hw_addr_perm))
|
|
_notify (self, PROP_PERM_HW_ADDRESS);
|
|
g_clear_pointer (&priv->hw_addr_initial, g_free);
|
|
|
|
priv->capabilities = NM_DEVICE_CAP_NM_SUPPORTED;
|
|
if (NM_DEVICE_GET_CLASS (self)->get_generic_capabilities)
|
|
priv->capabilities |= NM_DEVICE_GET_CLASS (self)->get_generic_capabilities (self);
|
|
_notify (self, PROP_CAPABILITIES);
|
|
|
|
nm_clear_g_signal_handler (nm_config_get (), &priv->config_changed_id);
|
|
|
|
priv->real = FALSE;
|
|
_notify (self, PROP_REAL);
|
|
|
|
nm_device_set_autoconnect_both (self, FALSE);
|
|
|
|
g_object_thaw_notify (G_OBJECT (self));
|
|
|
|
nm_device_set_unmanaged_flags (self,
|
|
NM_UNMANAGED_PLATFORM_INIT,
|
|
TRUE);
|
|
|
|
nm_device_set_unmanaged_flags (self,
|
|
NM_UNMANAGED_PARENT |
|
|
NM_UNMANAGED_LOOPBACK |
|
|
NM_UNMANAGED_USER_UDEV |
|
|
NM_UNMANAGED_USER_EXPLICIT |
|
|
NM_UNMANAGED_EXTERNAL_DOWN |
|
|
NM_UNMANAGED_IS_SLAVE,
|
|
NM_UNMAN_FLAG_OP_FORGET);
|
|
|
|
nm_device_state_changed (self,
|
|
NM_DEVICE_STATE_UNMANAGED,
|
|
remove_resources ?
|
|
NM_DEVICE_STATE_REASON_USER_REQUESTED : NM_DEVICE_STATE_REASON_NOW_UNMANAGED);
|
|
|
|
/* Garbage-collect unneeded unrealized devices. */
|
|
nm_device_recheck_available_connections (self);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
* nm_device_notify_component_added():
|
|
* @self: the #NMDevice
|
|
* @component: the component being added by a plugin
|
|
*
|
|
* Called by the manager to notify the device that a new component has
|
|
* been found. The device implementation should return %TRUE if it
|
|
* wishes to claim the component, or %FALSE if it cannot.
|
|
*
|
|
* Returns: %TRUE to claim the component, %FALSE if the component cannot be
|
|
* claimed.
|
|
*/
|
|
gboolean
|
|
nm_device_notify_component_added (NMDevice *self, GObject *component)
|
|
{
|
|
NMDeviceClass *klass;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
g_return_val_if_fail (G_IS_OBJECT (component), FALSE);
|
|
|
|
klass = NM_DEVICE_GET_CLASS (self);
|
|
if (klass->component_added)
|
|
return klass->component_added (self, component);
|
|
return FALSE;
|
|
}
|
|
|
|
/**
|
|
* nm_device_owns_iface():
|
|
* @self: the #NMDevice
|
|
* @iface: an interface name
|
|
*
|
|
* Called by the manager to ask if the device or any of its components owns
|
|
* @iface. For example, a WWAN implementation would return %TRUE for an
|
|
* ethernet interface name that was owned by the WWAN device's modem component,
|
|
* because that ethernet interface is controlled by the WWAN device and cannot
|
|
* be used independently of the WWAN device.
|
|
*
|
|
* Returns: %TRUE if @self or it's components owns the interface name,
|
|
* %FALSE if not
|
|
*/
|
|
gboolean
|
|
nm_device_owns_iface (NMDevice *self, const char *iface)
|
|
{
|
|
if (NM_DEVICE_GET_CLASS (self)->owns_iface)
|
|
return NM_DEVICE_GET_CLASS (self)->owns_iface (self, iface);
|
|
return FALSE;
|
|
}
|
|
|
|
NMConnection *
|
|
nm_device_new_default_connection (NMDevice *self)
|
|
{
|
|
if (NM_DEVICE_GET_CLASS (self)->new_default_connection)
|
|
return NM_DEVICE_GET_CLASS (self)->new_default_connection (self);
|
|
return NULL;
|
|
}
|
|
|
|
static void
|
|
slave_state_changed (NMDevice *slave,
|
|
NMDeviceState slave_new_state,
|
|
NMDeviceState slave_old_state,
|
|
NMDeviceStateReason reason,
|
|
NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
gboolean release = FALSE;
|
|
|
|
_LOGD (LOGD_DEVICE, "slave %s state change %d (%s) -> %d (%s)",
|
|
nm_device_get_iface (slave),
|
|
slave_old_state,
|
|
state_to_string (slave_old_state),
|
|
slave_new_state,
|
|
state_to_string (slave_new_state));
|
|
|
|
/* Don't try to enslave slaves until the master is ready */
|
|
if (priv->state < NM_DEVICE_STATE_CONFIG)
|
|
return;
|
|
|
|
if (slave_new_state == NM_DEVICE_STATE_IP_CONFIG)
|
|
nm_device_master_enslave_slave (self, slave, nm_device_get_applied_connection (slave));
|
|
else if (slave_new_state > NM_DEVICE_STATE_ACTIVATED)
|
|
release = TRUE;
|
|
else if ( slave_new_state <= NM_DEVICE_STATE_DISCONNECTED
|
|
&& slave_old_state > NM_DEVICE_STATE_DISCONNECTED) {
|
|
/* Catch failures due to unavailable or unmanaged */
|
|
release = TRUE;
|
|
}
|
|
|
|
if (release) {
|
|
nm_device_master_release_one_slave (self, slave,
|
|
priv->sys_iface_state == NM_DEVICE_SYS_IFACE_STATE_MANAGED,
|
|
reason);
|
|
/* Bridge/bond/team interfaces are left up until manually deactivated */
|
|
if (priv->slaves == NULL && priv->state == NM_DEVICE_STATE_ACTIVATED)
|
|
_LOGD (LOGD_DEVICE, "last slave removed; remaining activated");
|
|
}
|
|
}
|
|
|
|
/**
|
|
* nm_device_master_add_slave:
|
|
* @self: the master device
|
|
* @slave: the slave device to enslave
|
|
* @configure: pass %TRUE if the slave should be configured by the master, or
|
|
* %FALSE if it is already configured outside NetworkManager
|
|
*
|
|
* If @self is capable of enslaving other devices (ie it's a bridge, bond, team,
|
|
* etc) then this function adds @slave to the slave list for later enslavement.
|
|
*
|
|
* Returns: %TRUE if the slave was enslaved. %FALSE means, the slave was already
|
|
* enslaved and nothing was done.
|
|
*/
|
|
static gboolean
|
|
nm_device_master_add_slave (NMDevice *self, NMDevice *slave, gboolean configure)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
NMDevicePrivate *slave_priv;
|
|
SlaveInfo *info;
|
|
gboolean changed = FALSE;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
g_return_val_if_fail (NM_IS_DEVICE (slave), FALSE);
|
|
g_return_val_if_fail (NM_DEVICE_GET_CLASS (self)->enslave_slave != NULL, FALSE);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
slave_priv = NM_DEVICE_GET_PRIVATE (slave);
|
|
|
|
info = find_slave_info (self, slave);
|
|
|
|
_LOGT (LOGD_CORE, "master: add one slave %p/%s%s", slave, nm_device_get_iface (slave),
|
|
info ? " (already registered)" : "");
|
|
|
|
if (configure)
|
|
g_return_val_if_fail (nm_device_get_state (slave) >= NM_DEVICE_STATE_DISCONNECTED, FALSE);
|
|
|
|
if (!info) {
|
|
g_return_val_if_fail (!slave_priv->master, FALSE);
|
|
g_return_val_if_fail (!slave_priv->is_enslaved, FALSE);
|
|
|
|
info = g_slice_new0 (SlaveInfo);
|
|
info->slave = g_object_ref (slave);
|
|
info->configure = configure;
|
|
info->watch_id = g_signal_connect (slave,
|
|
NM_DEVICE_STATE_CHANGED,
|
|
G_CALLBACK (slave_state_changed), self);
|
|
priv->slaves = g_slist_append (priv->slaves, info);
|
|
slave_priv->master = g_object_ref (self);
|
|
|
|
/* no need to emit
|
|
*
|
|
* _notify (slave, PROP_MASTER);
|
|
*
|
|
* because slave_priv->is_enslaved is not true, thus the value
|
|
* didn't change yet. */
|
|
|
|
g_warn_if_fail (!NM_FLAGS_HAS (slave_priv->unmanaged_mask, NM_UNMANAGED_IS_SLAVE));
|
|
nm_device_set_unmanaged_by_flags (slave, NM_UNMANAGED_IS_SLAVE, FALSE, NM_DEVICE_STATE_REASON_CONNECTION_ASSUMED);
|
|
changed = TRUE;
|
|
} else
|
|
g_return_val_if_fail (slave_priv->master == self, FALSE);
|
|
|
|
nm_device_queue_recheck_assume (self);
|
|
nm_device_queue_recheck_assume (slave);
|
|
|
|
return changed;
|
|
}
|
|
|
|
/**
|
|
* nm_device_master_get_slaves:
|
|
* @self: the master device
|
|
*
|
|
* Returns: any slaves of which @self is the master. Caller owns returned list.
|
|
*/
|
|
static GSList *
|
|
nm_device_master_get_slaves (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
GSList *slaves = NULL, *iter;
|
|
|
|
for (iter = priv->slaves; iter; iter = g_slist_next (iter))
|
|
slaves = g_slist_prepend (slaves, ((SlaveInfo *) iter->data)->slave);
|
|
|
|
return slaves;
|
|
}
|
|
|
|
/**
|
|
* nm_device_master_get_slave_by_ifindex:
|
|
* @self: the master device
|
|
* @ifindex: the slave's interface index
|
|
*
|
|
* Returns: the slave with the given @ifindex of which @self is the master,
|
|
* or %NULL if no device with @ifindex is a slave of @self.
|
|
*/
|
|
NMDevice *
|
|
nm_device_master_get_slave_by_ifindex (NMDevice *self, int ifindex)
|
|
{
|
|
GSList *iter;
|
|
|
|
for (iter = NM_DEVICE_GET_PRIVATE (self)->slaves; iter; iter = g_slist_next (iter)) {
|
|
SlaveInfo *info = iter->data;
|
|
|
|
if (nm_device_get_ip_ifindex (info->slave) == ifindex)
|
|
return info->slave;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/**
|
|
* nm_device_master_check_slave_physical_port:
|
|
* @self: the master device
|
|
* @slave: a slave device
|
|
* @log_domain: domain to log a warning in
|
|
*
|
|
* Checks if @self already has a slave with the same #NMDevice:physical-port-id
|
|
* as @slave, and logs a warning if so.
|
|
*/
|
|
void
|
|
nm_device_master_check_slave_physical_port (NMDevice *self, NMDevice *slave,
|
|
NMLogDomain log_domain)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
const char *slave_physical_port_id, *existing_physical_port_id;
|
|
SlaveInfo *info;
|
|
GSList *iter;
|
|
|
|
slave_physical_port_id = nm_device_get_physical_port_id (slave);
|
|
if (!slave_physical_port_id)
|
|
return;
|
|
|
|
for (iter = priv->slaves; iter; iter = iter->next) {
|
|
info = iter->data;
|
|
if (info->slave == slave)
|
|
continue;
|
|
|
|
existing_physical_port_id = nm_device_get_physical_port_id (info->slave);
|
|
if (!g_strcmp0 (slave_physical_port_id, existing_physical_port_id)) {
|
|
_LOGW (log_domain, "slave %s shares a physical port with existing slave %s",
|
|
nm_device_get_ip_iface (slave),
|
|
nm_device_get_ip_iface (info->slave));
|
|
/* Since this function will get called for every slave, we only have
|
|
* to warn about the first match we find; if there are other matches
|
|
* later in the list, we will have already warned about them matching
|
|
* @existing earlier.
|
|
*/
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* release all slaves */
|
|
static void
|
|
nm_device_master_release_slaves (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMDeviceStateReason reason;
|
|
gboolean configure = TRUE;
|
|
|
|
/* Don't release the slaves if this connection doesn't belong to NM. */
|
|
if (nm_device_sys_iface_state_is_external (self))
|
|
return;
|
|
|
|
reason = priv->state_reason;
|
|
if (priv->state == NM_DEVICE_STATE_FAILED)
|
|
reason = NM_DEVICE_STATE_REASON_DEPENDENCY_FAILED;
|
|
|
|
if (!nm_platform_link_get (nm_device_get_platform (self), priv->ifindex))
|
|
configure = FALSE;
|
|
|
|
while (priv->slaves) {
|
|
SlaveInfo *info = priv->slaves->data;
|
|
|
|
nm_device_master_release_one_slave (self, info->slave, configure, reason);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* nm_device_is_master:
|
|
* @self: the device
|
|
*
|
|
* Returns: %TRUE if the device can have slaves
|
|
*/
|
|
gboolean
|
|
nm_device_is_master (NMDevice *self)
|
|
{
|
|
return NM_DEVICE_GET_PRIVATE (self)->is_master;
|
|
}
|
|
|
|
/**
|
|
* nm_device_get_master:
|
|
* @self: the device
|
|
*
|
|
* If @self has been enslaved by another device, this returns that
|
|
* device. Otherwise it returns %NULL. (In particular, note that if
|
|
* @self is in the process of activating as a slave, but has not yet
|
|
* been enslaved by its master, this will return %NULL.)
|
|
*
|
|
* Returns: (transfer none): @self's master, or %NULL
|
|
*/
|
|
NMDevice *
|
|
nm_device_get_master (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->is_enslaved) {
|
|
g_return_val_if_fail (priv->master, NULL);
|
|
return priv->master;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/**
|
|
* nm_device_slave_notify_enslave:
|
|
* @self: the slave device
|
|
* @success: whether the enslaving operation succeeded
|
|
*
|
|
* Notifies a slave that either it has been enslaved, or else its master tried
|
|
* to enslave it and failed.
|
|
*/
|
|
static void
|
|
nm_device_slave_notify_enslave (NMDevice *self, gboolean success)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMConnection *connection = nm_device_get_applied_connection (self);
|
|
gboolean activating = (priv->state == NM_DEVICE_STATE_IP_CONFIG);
|
|
|
|
g_return_if_fail (priv->master);
|
|
|
|
if (!priv->is_enslaved) {
|
|
if (success) {
|
|
if (activating) {
|
|
_LOGI (LOGD_DEVICE, "Activation: connection '%s' enslaved, continuing activation",
|
|
nm_connection_get_id (connection));
|
|
} else
|
|
_LOGI (LOGD_DEVICE, "enslaved to %s", nm_device_get_iface (priv->master));
|
|
|
|
priv->is_enslaved = TRUE;
|
|
|
|
if ( NM_IN_SET_TYPED (NMDeviceSysIfaceState,
|
|
priv->sys_iface_state,
|
|
NM_DEVICE_SYS_IFACE_STATE_EXTERNAL,
|
|
NM_DEVICE_SYS_IFACE_STATE_ASSUME)
|
|
&& nm_device_sys_iface_state_get (priv->master) == NM_DEVICE_SYS_IFACE_STATE_MANAGED)
|
|
nm_device_sys_iface_state_set (self, NM_DEVICE_SYS_IFACE_STATE_MANAGED);
|
|
|
|
_notify (self, PROP_MASTER);
|
|
_notify (priv->master, PROP_SLAVES);
|
|
} else if (activating) {
|
|
_LOGW (LOGD_DEVICE, "Activation: connection '%s' could not be enslaved",
|
|
nm_connection_get_id (connection));
|
|
}
|
|
}
|
|
|
|
if (activating) {
|
|
_set_ip_state (self, AF_INET, IP_DONE);
|
|
_set_ip_state (self, AF_INET6, IP_DONE);
|
|
if (success)
|
|
nm_device_queue_state (self, NM_DEVICE_STATE_SECONDARIES, NM_DEVICE_STATE_REASON_NONE);
|
|
else
|
|
nm_device_queue_state (self, NM_DEVICE_STATE_FAILED, NM_DEVICE_STATE_REASON_UNKNOWN);
|
|
} else
|
|
nm_device_queue_recheck_assume (self);
|
|
}
|
|
|
|
/**
|
|
* nm_device_slave_notify_release:
|
|
* @self: the slave device
|
|
* @reason: the reason associated with the state change
|
|
*
|
|
* Notifies a slave that it has been released, and why.
|
|
*/
|
|
static void
|
|
nm_device_slave_notify_release (NMDevice *self, NMDeviceStateReason reason)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMConnection *connection = nm_device_get_applied_connection (self);
|
|
NMDeviceState new_state;
|
|
const char *master_status;
|
|
|
|
g_return_if_fail (priv->master);
|
|
|
|
if ( priv->state > NM_DEVICE_STATE_DISCONNECTED
|
|
&& priv->state <= NM_DEVICE_STATE_ACTIVATED) {
|
|
switch (nm_device_state_reason_check (reason)) {
|
|
case NM_DEVICE_STATE_REASON_DEPENDENCY_FAILED:
|
|
new_state = NM_DEVICE_STATE_FAILED;
|
|
master_status = "failed";
|
|
break;
|
|
case NM_DEVICE_STATE_REASON_USER_REQUESTED:
|
|
new_state = NM_DEVICE_STATE_DEACTIVATING;
|
|
master_status = "deactivated by user request";
|
|
break;
|
|
default:
|
|
new_state = NM_DEVICE_STATE_DISCONNECTED;
|
|
master_status = "deactivated";
|
|
break;
|
|
}
|
|
|
|
_LOGD (LOGD_DEVICE, "Activation: connection '%s' master %s",
|
|
nm_connection_get_id (connection),
|
|
master_status);
|
|
|
|
/* Cancel any pending activation sources */
|
|
_cancel_activation (self);
|
|
nm_device_queue_state (self, new_state, reason);
|
|
} else
|
|
_LOGI (LOGD_DEVICE, "released from master device %s", nm_device_get_iface (priv->master));
|
|
|
|
if (priv->is_enslaved) {
|
|
priv->is_enslaved = FALSE;
|
|
_notify (self, PROP_MASTER);
|
|
_notify (priv->master, PROP_SLAVES);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* nm_device_get_enslaved:
|
|
* @self: the #NMDevice
|
|
*
|
|
* Returns: %TRUE if the device is enslaved to a master device (eg bridge or
|
|
* bond or team), %FALSE if not
|
|
*/
|
|
gboolean
|
|
nm_device_get_enslaved (NMDevice *self)
|
|
{
|
|
return NM_DEVICE_GET_PRIVATE (self)->is_enslaved;
|
|
}
|
|
|
|
/**
|
|
* nm_device_removed:
|
|
* @self: the #NMDevice
|
|
* @unconfigure_ip_config: whether to clear the IP config objects
|
|
* of the device (provided, it is still not cleared at this point).
|
|
*
|
|
* Called by the manager when the device was removed. Releases the device from
|
|
* the master in case it's enslaved.
|
|
*/
|
|
void
|
|
nm_device_removed (NMDevice *self, gboolean unconfigure_ip_config)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
if (priv->master) {
|
|
/* this is called when something externally messes with the slave or during shut-down.
|
|
* Release the slave from master, but don't touch the device. */
|
|
nm_device_master_release_one_slave (priv->master, self, FALSE, NM_DEVICE_STATE_REASON_CONNECTION_ASSUMED);
|
|
}
|
|
|
|
if (!unconfigure_ip_config)
|
|
return;
|
|
|
|
/* Clean up IP configs; this does not actually deconfigure the
|
|
* interface, it just clears the configuration to which policy
|
|
* is reacting via NM_DEVICE_IP4_CONFIG_CHANGED/NM_DEVICE_IP6_CONFIG_CHANGED
|
|
* signal. As NMPolicy registered the NMIPxConfig instances in NMDnsManager,
|
|
* these would be leaked otherwise. */
|
|
_update_default_route (self, AF_INET, priv->default_route.v4_has, TRUE);
|
|
_update_default_route (self, AF_INET6, priv->default_route.v6_has, TRUE);
|
|
_update_default_route (self, AF_INET, FALSE, TRUE);
|
|
_update_default_route (self, AF_INET6, FALSE, TRUE);
|
|
nm_device_set_ip4_config (self, NULL, 0, FALSE, FALSE);
|
|
nm_device_set_ip6_config (self, NULL, FALSE, FALSE);
|
|
}
|
|
|
|
static gboolean
|
|
is_available (NMDevice *self, NMDeviceCheckDevAvailableFlags flags)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->carrier || priv->ignore_carrier)
|
|
return TRUE;
|
|
|
|
if (NM_FLAGS_HAS (flags, _NM_DEVICE_CHECK_DEV_AVAILABLE_IGNORE_CARRIER))
|
|
return TRUE;
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
/**
|
|
* nm_device_is_available:
|
|
* @self: the #NMDevice
|
|
* @flags: additional flags to influence the check. Flags have the
|
|
* meaning to increase the availability of a device.
|
|
*
|
|
* Checks if @self would currently be capable of activating a
|
|
* connection. In particular, it checks that the device is ready (eg,
|
|
* is not missing firmware), that it has carrier (if necessary), and
|
|
* that any necessary external software (eg, ModemManager,
|
|
* wpa_supplicant) is available.
|
|
*
|
|
* @self can only be in a state higher than
|
|
* %NM_DEVICE_STATE_UNAVAILABLE when nm_device_is_available() returns
|
|
* %TRUE. (But note that it can still be %NM_DEVICE_STATE_UNMANAGED
|
|
* when it is available.)
|
|
*
|
|
* Returns: %TRUE or %FALSE
|
|
*/
|
|
gboolean
|
|
nm_device_is_available (NMDevice *self, NMDeviceCheckDevAvailableFlags flags)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->firmware_missing)
|
|
return FALSE;
|
|
|
|
return NM_DEVICE_GET_CLASS (self)->is_available (self, flags);
|
|
}
|
|
|
|
gboolean
|
|
nm_device_get_enabled (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
|
|
if (NM_DEVICE_GET_CLASS (self)->get_enabled)
|
|
return NM_DEVICE_GET_CLASS (self)->get_enabled (self);
|
|
return TRUE;
|
|
}
|
|
|
|
void
|
|
nm_device_set_enabled (NMDevice *self, gboolean enabled)
|
|
{
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
if (NM_DEVICE_GET_CLASS (self)->set_enabled)
|
|
NM_DEVICE_GET_CLASS (self)->set_enabled (self, enabled);
|
|
}
|
|
|
|
/**
|
|
* nm_device_get_autoconnect:
|
|
* @self: the #NMDevice
|
|
*
|
|
* Returns: %TRUE if the device allows autoconnect connections, or %FALSE if the
|
|
* device is explicitly blocking all autoconnect connections. Does not take
|
|
* into account transient conditions like companion devices that may wish to
|
|
* block the device.
|
|
*/
|
|
gboolean
|
|
nm_device_get_autoconnect (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
return priv->autoconnect_intern && priv->autoconnect_user;
|
|
}
|
|
|
|
static void
|
|
nm_device_set_autoconnect_full (NMDevice *self, int autoconnect_intern, int autoconnect_user)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
gboolean old_value;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
old_value = nm_device_get_autoconnect (self);
|
|
if (autoconnect_intern != -1)
|
|
priv->autoconnect_intern = autoconnect_intern;
|
|
if (autoconnect_user != -1)
|
|
priv->autoconnect_user = autoconnect_user;
|
|
if (old_value != nm_device_get_autoconnect (self))
|
|
_notify (self, PROP_AUTOCONNECT);
|
|
}
|
|
|
|
void
|
|
nm_device_set_autoconnect_intern (NMDevice *self, gboolean autoconnect)
|
|
{
|
|
nm_device_set_autoconnect_full (self, !!autoconnect, -1);
|
|
}
|
|
|
|
static void
|
|
nm_device_set_autoconnect_both (NMDevice *self, gboolean autoconnect)
|
|
{
|
|
autoconnect = !!autoconnect;
|
|
nm_device_set_autoconnect_full (self, autoconnect, autoconnect);
|
|
}
|
|
|
|
static gboolean
|
|
get_autoconnect_allowed (NMDevice *self)
|
|
{
|
|
return TRUE;
|
|
}
|
|
|
|
static gboolean
|
|
autoconnect_allowed_accumulator (GSignalInvocationHint *ihint,
|
|
GValue *return_accu,
|
|
const GValue *handler_return, gpointer data)
|
|
{
|
|
if (!g_value_get_boolean (handler_return))
|
|
g_value_set_boolean (return_accu, FALSE);
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
* nm_device_autoconnect_allowed:
|
|
* @self: the #NMDevice
|
|
*
|
|
* Returns: %TRUE if the device can be auto-connected immediately, taking
|
|
* transient conditions into account (like companion devices that may wish to
|
|
* block autoconnect for a time).
|
|
*/
|
|
gboolean
|
|
nm_device_autoconnect_allowed (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMDeviceClass *klass = NM_DEVICE_GET_CLASS (self);
|
|
GValue instance = G_VALUE_INIT;
|
|
GValue retval = G_VALUE_INIT;
|
|
|
|
if ( !nm_device_get_autoconnect (self)
|
|
|| !klass->get_autoconnect_allowed (self))
|
|
return FALSE;
|
|
|
|
/* Unrealized devices can always autoconnect. */
|
|
if (nm_device_is_real (self) && priv->state < NM_DEVICE_STATE_DISCONNECTED)
|
|
return FALSE;
|
|
|
|
/* The 'autoconnect-allowed' signal is emitted on a device to allow
|
|
* other listeners to block autoconnect on the device if they wish.
|
|
* This is mainly used by the OLPC Mesh devices to block autoconnect
|
|
* on their companion WiFi device as they share radio resources and
|
|
* cannot be connected at the same time.
|
|
*/
|
|
|
|
g_value_init (&instance, G_TYPE_OBJECT);
|
|
g_value_set_object (&instance, self);
|
|
|
|
g_value_init (&retval, G_TYPE_BOOLEAN);
|
|
g_value_set_boolean (&retval, TRUE);
|
|
|
|
/* Use g_signal_emitv() rather than g_signal_emit() to avoid the return
|
|
* value being changed if no handlers are connected */
|
|
g_signal_emitv (&instance, signals[AUTOCONNECT_ALLOWED], 0, &retval);
|
|
g_value_unset (&instance);
|
|
|
|
return g_value_get_boolean (&retval);
|
|
}
|
|
|
|
static gboolean
|
|
can_auto_connect (NMDevice *self,
|
|
NMConnection *connection,
|
|
char **specific_object)
|
|
{
|
|
NMSettingConnection *s_con;
|
|
|
|
nm_assert (!specific_object || !*specific_object);
|
|
|
|
s_con = nm_connection_get_setting_connection (connection);
|
|
if (!nm_setting_connection_get_autoconnect (s_con))
|
|
return FALSE;
|
|
|
|
return nm_device_check_connection_available (self, connection, NM_DEVICE_CHECK_CON_AVAILABLE_NONE, NULL);
|
|
}
|
|
|
|
/**
|
|
* nm_device_can_auto_connect:
|
|
* @self: an #NMDevice
|
|
* @connection: a #NMConnection
|
|
* @specific_object: (out) (transfer full): on output, the path of an
|
|
* object associated with the returned connection, to be passed to
|
|
* nm_manager_activate_connection(), or %NULL.
|
|
*
|
|
* Checks if @connection can be auto-activated on @self right now.
|
|
* This requires, at a minimum, that the connection be compatible with
|
|
* @self, and that it have the #NMSettingConnection:autoconnect property
|
|
* set, and that the device allow auto connections. Some devices impose
|
|
* additional requirements. (Eg, a Wi-Fi connection can only be activated
|
|
* if its SSID was seen in the last scan.)
|
|
*
|
|
* Returns: %TRUE, if the @connection can be auto-activated.
|
|
**/
|
|
gboolean
|
|
nm_device_can_auto_connect (NMDevice *self,
|
|
NMConnection *connection,
|
|
char **specific_object)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
g_return_val_if_fail (NM_IS_CONNECTION (connection), FALSE);
|
|
g_return_val_if_fail (specific_object && !*specific_object, FALSE);
|
|
|
|
if (nm_device_autoconnect_allowed (self))
|
|
return NM_DEVICE_GET_CLASS (self)->can_auto_connect (self, connection, specific_object);
|
|
return FALSE;
|
|
}
|
|
|
|
static gboolean
|
|
device_has_config (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
/* Check for IP configuration. */
|
|
if (priv->ip4_config && nm_ip4_config_get_num_addresses (priv->ip4_config))
|
|
return TRUE;
|
|
if (priv->ip6_config && nm_ip6_config_get_num_addresses (priv->ip6_config))
|
|
return TRUE;
|
|
|
|
/* The existence of a software device is good enough. */
|
|
if (nm_device_is_software (self) && nm_device_is_real (self))
|
|
return TRUE;
|
|
|
|
/* Master-slave relationship is also a configuration */
|
|
if (priv->slaves || nm_platform_link_get_master (nm_device_get_platform (self), priv->ifindex) > 0)
|
|
return TRUE;
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
/**
|
|
* nm_device_master_update_slave_connection:
|
|
* @self: the master #NMDevice
|
|
* @slave: the slave #NMDevice
|
|
* @connection: the #NMConnection to update with the slave settings
|
|
* @GError: (out): error description
|
|
*
|
|
* Reads the slave configuration for @slave and updates @connection with those
|
|
* properties. This invokes a virtual function on the master device @self.
|
|
*
|
|
* Returns: %TRUE if the configuration was read and @connection updated,
|
|
* %FALSE on failure.
|
|
*/
|
|
gboolean
|
|
nm_device_master_update_slave_connection (NMDevice *self,
|
|
NMDevice *slave,
|
|
NMConnection *connection,
|
|
GError **error)
|
|
{
|
|
NMDeviceClass *klass;
|
|
gboolean success;
|
|
|
|
g_return_val_if_fail (self, FALSE);
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
g_return_val_if_fail (slave, FALSE);
|
|
g_return_val_if_fail (connection, FALSE);
|
|
g_return_val_if_fail (!error || !*error, FALSE);
|
|
g_return_val_if_fail (nm_connection_get_setting_connection (connection), FALSE);
|
|
|
|
g_return_val_if_fail (nm_device_get_iface (self), FALSE);
|
|
|
|
klass = NM_DEVICE_GET_CLASS (self);
|
|
if (klass->master_update_slave_connection) {
|
|
success = klass->master_update_slave_connection (self, slave, connection, error);
|
|
|
|
g_return_val_if_fail (!error || (success && !*error) || *error, success);
|
|
return success;
|
|
}
|
|
|
|
g_set_error (error,
|
|
NM_DEVICE_ERROR,
|
|
NM_DEVICE_ERROR_FAILED,
|
|
"master device '%s' cannot update a slave connection for slave device '%s' (master type not supported?)",
|
|
nm_device_get_iface (self), nm_device_get_iface (slave));
|
|
return FALSE;
|
|
}
|
|
|
|
NMConnection *
|
|
nm_device_generate_connection (NMDevice *self, NMDevice *master)
|
|
{
|
|
NMDeviceClass *klass = NM_DEVICE_GET_CLASS (self);
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
const char *ifname = nm_device_get_iface (self);
|
|
NMConnection *connection;
|
|
NMSetting *s_con;
|
|
NMSetting *s_ip4;
|
|
NMSetting *s_ip6;
|
|
char uuid[37];
|
|
const char *ip4_method, *ip6_method;
|
|
GError *error = NULL;
|
|
const NMPlatformLink *pllink;
|
|
|
|
/* If update_connection() is not implemented, just fail. */
|
|
if (!klass->update_connection)
|
|
return NULL;
|
|
|
|
/* Return NULL if device is unconfigured. */
|
|
if (!device_has_config (self)) {
|
|
_LOGD (LOGD_DEVICE, "device has no existing configuration");
|
|
return NULL;
|
|
}
|
|
|
|
connection = nm_simple_connection_new ();
|
|
s_con = nm_setting_connection_new ();
|
|
|
|
g_object_set (s_con,
|
|
NM_SETTING_CONNECTION_UUID, nm_utils_uuid_generate_buf (uuid),
|
|
NM_SETTING_CONNECTION_ID, ifname,
|
|
NM_SETTING_CONNECTION_AUTOCONNECT, FALSE,
|
|
NM_SETTING_CONNECTION_INTERFACE_NAME, ifname,
|
|
NM_SETTING_CONNECTION_TIMESTAMP, (guint64) time (NULL),
|
|
NULL);
|
|
if (klass->connection_type)
|
|
g_object_set (s_con, NM_SETTING_CONNECTION_TYPE, klass->connection_type, NULL);
|
|
nm_connection_add_setting (connection, s_con);
|
|
|
|
/* If the device is a slave, update various slave settings */
|
|
if (master) {
|
|
if (!nm_device_master_update_slave_connection (master,
|
|
self,
|
|
connection,
|
|
&error))
|
|
{
|
|
_LOGE (LOGD_DEVICE, "master device '%s' failed to update slave connection: %s",
|
|
nm_device_get_iface (master), error->message);
|
|
g_error_free (error);
|
|
g_object_unref (connection);
|
|
return NULL;
|
|
}
|
|
} else {
|
|
/* Only regular and master devices get IP configuration; slaves do not */
|
|
s_ip4 = nm_ip4_config_create_setting (priv->ip4_config);
|
|
nm_connection_add_setting (connection, s_ip4);
|
|
|
|
s_ip6 = nm_ip6_config_create_setting (priv->ip6_config);
|
|
nm_connection_add_setting (connection, s_ip6);
|
|
|
|
pllink = nm_platform_link_get (nm_device_get_platform (self), priv->ifindex);
|
|
if (pllink && pllink->inet6_token.id) {
|
|
_LOGD (LOGD_IP6, "IPv6 tokenized identifier present");
|
|
g_object_set (s_ip6,
|
|
NM_SETTING_IP6_CONFIG_ADDR_GEN_MODE, NM_IN6_ADDR_GEN_MODE_EUI64,
|
|
NM_SETTING_IP6_CONFIG_TOKEN, nm_utils_inet6_interface_identifier_to_token (pllink->inet6_token, NULL),
|
|
NULL);
|
|
}
|
|
}
|
|
|
|
klass->update_connection (self, connection);
|
|
|
|
/* Check the connection in case of update_connection() bug. */
|
|
if (!nm_connection_verify (connection, &error)) {
|
|
_LOGE (LOGD_DEVICE, "Generated connection does not verify: %s", error->message);
|
|
g_clear_error (&error);
|
|
g_object_unref (connection);
|
|
return NULL;
|
|
}
|
|
|
|
/* Ignore the connection if it has no IP configuration,
|
|
* no slave configuration, and is not a master interface.
|
|
*/
|
|
ip4_method = nm_utils_get_ip_config_method (connection, NM_TYPE_SETTING_IP4_CONFIG);
|
|
ip6_method = nm_utils_get_ip_config_method (connection, NM_TYPE_SETTING_IP6_CONFIG);
|
|
if ( g_strcmp0 (ip4_method, NM_SETTING_IP4_CONFIG_METHOD_DISABLED) == 0
|
|
&& g_strcmp0 (ip6_method, NM_SETTING_IP6_CONFIG_METHOD_IGNORE) == 0
|
|
&& !nm_setting_connection_get_master (NM_SETTING_CONNECTION (s_con))
|
|
&& !priv->slaves) {
|
|
_LOGD (LOGD_DEVICE, "ignoring generated connection (no IP and not in master-slave relationship)");
|
|
g_object_unref (connection);
|
|
connection = NULL;
|
|
}
|
|
|
|
/* Ignore any IPv6LL-only, not master connections without slaves,
|
|
* unless they are in the assume-ipv6ll-only list.
|
|
*/
|
|
if ( connection
|
|
&& g_strcmp0 (ip4_method, NM_SETTING_IP4_CONFIG_METHOD_DISABLED) == 0
|
|
&& g_strcmp0 (ip6_method, NM_SETTING_IP6_CONFIG_METHOD_LINK_LOCAL) == 0
|
|
&& !nm_setting_connection_get_master (NM_SETTING_CONNECTION (s_con))
|
|
&& !priv->slaves
|
|
&& !nm_config_data_get_assume_ipv6ll_only (NM_CONFIG_GET_DATA, self)) {
|
|
_LOGD (LOGD_DEVICE, "ignoring generated connection (IPv6LL-only and not in master-slave relationship)");
|
|
g_object_unref (connection);
|
|
connection = NULL;
|
|
}
|
|
|
|
return connection;
|
|
}
|
|
|
|
gboolean
|
|
nm_device_complete_connection (NMDevice *self,
|
|
NMConnection *connection,
|
|
const char *specific_object,
|
|
const GSList *existing_connections,
|
|
GError **error)
|
|
{
|
|
gboolean success = FALSE;
|
|
|
|
g_return_val_if_fail (self != NULL, FALSE);
|
|
g_return_val_if_fail (connection != NULL, FALSE);
|
|
|
|
if (!NM_DEVICE_GET_CLASS (self)->complete_connection) {
|
|
g_set_error (error, NM_DEVICE_ERROR, NM_DEVICE_ERROR_INVALID_CONNECTION,
|
|
"Device class %s had no complete_connection method",
|
|
G_OBJECT_TYPE_NAME (self));
|
|
return FALSE;
|
|
}
|
|
|
|
success = NM_DEVICE_GET_CLASS (self)->complete_connection (self,
|
|
connection,
|
|
specific_object,
|
|
existing_connections,
|
|
error);
|
|
if (success)
|
|
success = nm_connection_verify (connection, error);
|
|
|
|
return success;
|
|
}
|
|
|
|
static gboolean
|
|
check_connection_compatible (NMDevice *self, NMConnection *connection)
|
|
{
|
|
const char *device_iface = nm_device_get_iface (self);
|
|
gs_free char *conn_iface = nm_manager_get_connection_iface (nm_manager_get (),
|
|
connection,
|
|
NULL, NULL);
|
|
|
|
/* We always need a interface name for virtual devices, but for
|
|
* physical ones a connection without interface name is fine for
|
|
* any device. */
|
|
if (!conn_iface)
|
|
return !nm_connection_is_virtual (connection);
|
|
|
|
if (strcmp (conn_iface, device_iface) != 0)
|
|
return FALSE;
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
* nm_device_check_connection_compatible:
|
|
* @self: an #NMDevice
|
|
* @connection: an #NMConnection
|
|
*
|
|
* Checks if @connection could potentially be activated on @self.
|
|
* This means only that @self has the proper capabilities, and that
|
|
* @connection is not locked to some other device. It does not
|
|
* necessarily mean that @connection could be activated on @self
|
|
* right now. (Eg, it might refer to a Wi-Fi network that is not
|
|
* currently available.)
|
|
*
|
|
* Returns: #TRUE if @connection could potentially be activated on
|
|
* @self.
|
|
*/
|
|
gboolean
|
|
nm_device_check_connection_compatible (NMDevice *self, NMConnection *connection)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
g_return_val_if_fail (NM_IS_CONNECTION (connection), FALSE);
|
|
|
|
return NM_DEVICE_GET_CLASS (self)->check_connection_compatible (self, connection);
|
|
}
|
|
|
|
gboolean
|
|
nm_device_check_slave_connection_compatible (NMDevice *self, NMConnection *slave)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
NMSettingConnection *s_con;
|
|
const char *connection_type, *slave_type;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
g_return_val_if_fail (NM_IS_CONNECTION (slave), FALSE);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (!priv->is_master)
|
|
return FALSE;
|
|
|
|
/* All masters should have connection type set */
|
|
connection_type = NM_DEVICE_GET_CLASS (self)->connection_type;
|
|
g_return_val_if_fail (connection_type, FALSE);
|
|
|
|
s_con = nm_connection_get_setting_connection (slave);
|
|
g_assert (s_con);
|
|
slave_type = nm_setting_connection_get_slave_type (s_con);
|
|
if (!slave_type)
|
|
return FALSE;
|
|
|
|
return strcmp (connection_type, slave_type) == 0;
|
|
}
|
|
|
|
/**
|
|
* nm_device_can_assume_connections:
|
|
* @self: #NMDevice instance
|
|
*
|
|
* This is a convenience function to determine whether connection assumption
|
|
* is available for this device.
|
|
*
|
|
* Returns: %TRUE if the device is capable of assuming connections, %FALSE if not
|
|
*/
|
|
static gboolean
|
|
nm_device_can_assume_connections (NMDevice *self)
|
|
{
|
|
return !!NM_DEVICE_GET_CLASS (self)->update_connection;
|
|
}
|
|
|
|
static gboolean
|
|
unmanaged_on_quit (NMDevice *self)
|
|
{
|
|
NMConnection *connection;
|
|
|
|
/* NMDeviceWifi overwrites this function to always unmanage wifi devices.
|
|
*
|
|
* For all other types, if the device type can assume connections, we leave
|
|
* it up on quit.
|
|
*
|
|
* Originally, we would only keep devices up that can be assumed afterwards.
|
|
* However, that meant we unmanged layer-2 only devices. So, this was step
|
|
* by step refined to unmanage less (commit 25aaaab3, rh#1311988, rh#1333983).
|
|
* But there are more scenarios where we also want to keep the device up
|
|
* (rh#1378418, rh#1371126). */
|
|
if (!nm_device_can_assume_connections (self))
|
|
return TRUE;
|
|
|
|
/* the only exception are IPv4 shared connections. We unmanage them on quit. */
|
|
connection = nm_device_get_applied_connection (self);
|
|
if (connection) {
|
|
if (NM_IN_STRSET (nm_utils_get_ip_config_method (connection, NM_TYPE_SETTING_IP4_CONFIG),
|
|
NM_SETTING_IP4_CONFIG_METHOD_SHARED)) {
|
|
/* shared connections are to be unmangaed. */
|
|
return TRUE;
|
|
}
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
gboolean
|
|
nm_device_unmanage_on_quit (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
|
|
return NM_DEVICE_GET_CLASS (self)->unmanaged_on_quit (self);
|
|
}
|
|
|
|
static gboolean
|
|
nm_device_emit_recheck_assume (gpointer user_data)
|
|
{
|
|
NMDevice *self = user_data;
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), G_SOURCE_REMOVE);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
priv->recheck_assume_id = 0;
|
|
if (!nm_device_get_act_request (self)) {
|
|
_LOGD (LOGD_DEVICE, "emit RECHECK_ASSUME signal");
|
|
g_signal_emit (self, signals[RECHECK_ASSUME], 0);
|
|
}
|
|
return G_SOURCE_REMOVE;
|
|
}
|
|
|
|
void
|
|
nm_device_queue_recheck_assume (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if ( !priv->recheck_assume_id
|
|
&& nm_device_can_assume_connections (self))
|
|
priv->recheck_assume_id = g_idle_add (nm_device_emit_recheck_assume, self);
|
|
}
|
|
|
|
static gboolean
|
|
recheck_available (gpointer user_data)
|
|
{
|
|
NMDevice *self = NM_DEVICE (user_data);
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
gboolean now_available;
|
|
NMDeviceState state = nm_device_get_state (self);
|
|
NMDeviceState new_state = NM_DEVICE_STATE_UNKNOWN;
|
|
|
|
priv->recheck_available.call_id = 0;
|
|
|
|
now_available = nm_device_is_available (self, NM_DEVICE_CHECK_DEV_AVAILABLE_NONE);
|
|
|
|
if (state == NM_DEVICE_STATE_UNAVAILABLE && now_available) {
|
|
new_state = NM_DEVICE_STATE_DISCONNECTED;
|
|
nm_device_queue_state (self, new_state, priv->recheck_available.available_reason);
|
|
} else if (state >= NM_DEVICE_STATE_DISCONNECTED && !now_available) {
|
|
new_state = NM_DEVICE_STATE_UNAVAILABLE;
|
|
nm_device_queue_state (self, new_state, priv->recheck_available.unavailable_reason);
|
|
}
|
|
|
|
if (new_state > NM_DEVICE_STATE_UNKNOWN) {
|
|
_LOGD (LOGD_DEVICE, "is %savailable, %s %s",
|
|
now_available ? "" : "not ",
|
|
new_state == NM_DEVICE_STATE_UNAVAILABLE ? "no change required for" : "will transition to",
|
|
state_to_string (new_state == NM_DEVICE_STATE_UNAVAILABLE ? state : new_state));
|
|
|
|
priv->recheck_available.available_reason = NM_DEVICE_STATE_REASON_NONE;
|
|
priv->recheck_available.unavailable_reason = NM_DEVICE_STATE_REASON_NONE;
|
|
}
|
|
|
|
if (priv->recheck_available.call_id == 0)
|
|
nm_device_remove_pending_action (self, NM_PENDING_ACTION_RECHECK_AVAILABLE, TRUE);
|
|
|
|
return G_SOURCE_REMOVE;
|
|
}
|
|
|
|
void
|
|
nm_device_queue_recheck_available (NMDevice *self,
|
|
NMDeviceStateReason available_reason,
|
|
NMDeviceStateReason unavailable_reason)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
priv->recheck_available.available_reason = available_reason;
|
|
priv->recheck_available.unavailable_reason = unavailable_reason;
|
|
if (!priv->recheck_available.call_id) {
|
|
priv->recheck_available.call_id = g_idle_add (recheck_available, self);
|
|
nm_device_add_pending_action (self, NM_PENDING_ACTION_RECHECK_AVAILABLE,
|
|
FALSE /* cannot assert, because of how recheck_available() first clears
|
|
the call-id and postpones removing the pending-action. */);
|
|
}
|
|
}
|
|
|
|
void
|
|
nm_device_emit_recheck_auto_activate (NMDevice *self)
|
|
{
|
|
g_signal_emit (self, signals[RECHECK_AUTO_ACTIVATE], 0);
|
|
}
|
|
|
|
static void
|
|
dnsmasq_state_changed_cb (NMDnsMasqManager *manager, guint32 status, gpointer user_data)
|
|
{
|
|
NMDevice *self = NM_DEVICE (user_data);
|
|
|
|
switch (status) {
|
|
case NM_DNSMASQ_STATUS_DEAD:
|
|
nm_device_ip_method_failed (self, AF_INET, NM_DEVICE_STATE_REASON_SHARED_START_FAILED);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static gboolean
|
|
activation_source_handle_cb4 (gpointer user_data)
|
|
{
|
|
activation_source_handle_cb (user_data, AF_INET);
|
|
return G_SOURCE_REMOVE;
|
|
}
|
|
|
|
static gboolean
|
|
activation_source_handle_cb6 (gpointer user_data)
|
|
{
|
|
activation_source_handle_cb (user_data, AF_INET6);
|
|
return G_SOURCE_REMOVE;
|
|
}
|
|
|
|
static ActivationHandleData *
|
|
activation_source_get_by_family (NMDevice *self,
|
|
int family,
|
|
GSourceFunc *out_idle_func)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (family == AF_INET6) {
|
|
NM_SET_OUT (out_idle_func, activation_source_handle_cb6);
|
|
return &priv->act_handle6;
|
|
} else {
|
|
NM_SET_OUT (out_idle_func, activation_source_handle_cb4);
|
|
g_return_val_if_fail (family == AF_INET, &priv->act_handle4);
|
|
return &priv->act_handle4;
|
|
}
|
|
}
|
|
|
|
static void
|
|
activation_source_clear (NMDevice *self, int family)
|
|
{
|
|
ActivationHandleData *act_data;
|
|
|
|
act_data = activation_source_get_by_family (self, family, NULL);
|
|
|
|
if (act_data->id) {
|
|
_LOGD (LOGD_DEVICE, "activation-stage: clear %s,%d (id %u)",
|
|
_activation_func_to_string (act_data->func), family, act_data->id);
|
|
nm_clear_g_source (&act_data->id);
|
|
act_data->func = NULL;
|
|
}
|
|
}
|
|
|
|
static void
|
|
activation_source_handle_cb (NMDevice *self, int family)
|
|
{
|
|
ActivationHandleData *act_data, a;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
act_data = activation_source_get_by_family (self, family, NULL);
|
|
|
|
g_return_if_fail (act_data->id);
|
|
g_return_if_fail (act_data->func);
|
|
|
|
a = *act_data;
|
|
|
|
act_data->func = NULL;
|
|
act_data->id = 0;
|
|
|
|
_LOGD (LOGD_DEVICE, "activation-stage: invoke %s,%d (id %u)",
|
|
_activation_func_to_string (a.func), family, a.id);
|
|
|
|
a.func (self);
|
|
|
|
_LOGD (LOGD_DEVICE, "activation-stage: complete %s,%d (id %u)",
|
|
_activation_func_to_string (a.func), family, a.id);
|
|
}
|
|
|
|
static void
|
|
activation_source_schedule (NMDevice *self, ActivationHandleFunc func, int family)
|
|
{
|
|
ActivationHandleData *act_data;
|
|
GSourceFunc source_func;
|
|
guint new_id = 0;
|
|
|
|
act_data = activation_source_get_by_family (self, family, &source_func);
|
|
|
|
if (act_data->id && act_data->func == func) {
|
|
/* Don't bother rescheduling the same function that's about to
|
|
* run anyway. Fixes issues with crappy wireless drivers sending
|
|
* streams of associate events before NM has had a chance to process
|
|
* the first one.
|
|
*/
|
|
_LOGD (LOGD_DEVICE, "activation-stage: already scheduled %s,%d (id %u)",
|
|
_activation_func_to_string (func), family, act_data->id);
|
|
return;
|
|
}
|
|
|
|
new_id = g_idle_add (source_func, self);
|
|
|
|
if (act_data->id) {
|
|
_LOGW (LOGD_DEVICE, "activation-stage: schedule %s,%d which replaces %s,%d (id %u -> %u)",
|
|
_activation_func_to_string (func), family,
|
|
_activation_func_to_string (act_data->func), family,
|
|
act_data->id, new_id);
|
|
nm_clear_g_source (&act_data->id);
|
|
} else {
|
|
_LOGD (LOGD_DEVICE, "activation-stage: schedule %s,%d (id %u)",
|
|
_activation_func_to_string (func), family, new_id);
|
|
}
|
|
|
|
act_data->func = func;
|
|
act_data->id = new_id;
|
|
}
|
|
|
|
static gboolean
|
|
activation_source_is_scheduled (NMDevice *self, ActivationHandleFunc func, int family)
|
|
{
|
|
ActivationHandleData *act_data;
|
|
|
|
act_data = activation_source_get_by_family (self, family, NULL);
|
|
return act_data->func == func;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static gboolean
|
|
get_ip_config_may_fail (NMDevice *self, int family)
|
|
{
|
|
NMConnection *connection;
|
|
NMSettingIPConfig *s_ip = NULL;
|
|
|
|
g_return_val_if_fail (self != NULL, TRUE);
|
|
|
|
connection = nm_device_get_applied_connection (self);
|
|
g_assert (connection);
|
|
|
|
/* Fail the connection if the failed IP method is required to complete */
|
|
switch (family) {
|
|
case AF_INET:
|
|
s_ip = nm_connection_get_setting_ip4_config (connection);
|
|
break;
|
|
case AF_INET6:
|
|
s_ip = nm_connection_get_setting_ip6_config (connection);
|
|
break;
|
|
default:
|
|
g_assert_not_reached ();
|
|
}
|
|
|
|
return !s_ip || nm_setting_ip_config_get_may_fail (s_ip);
|
|
}
|
|
|
|
static void
|
|
master_ready (NMDevice *self,
|
|
NMActiveConnection *active)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMActiveConnection *master_connection;
|
|
NMDevice *master;
|
|
|
|
g_return_if_fail (priv->state == NM_DEVICE_STATE_PREPARE);
|
|
g_return_if_fail (!priv->master_ready_handled);
|
|
|
|
/* Notify a master device that it has a new slave */
|
|
g_return_if_fail (nm_active_connection_get_master_ready (active));
|
|
master_connection = nm_active_connection_get_master (active);
|
|
|
|
priv->master_ready_handled = TRUE;
|
|
nm_clear_g_signal_handler (active, &priv->master_ready_id);
|
|
|
|
master = nm_active_connection_get_device (master_connection);
|
|
|
|
_LOGD (LOGD_DEVICE, "master connection ready; master device %s",
|
|
nm_device_get_iface (master));
|
|
|
|
if (priv->master && priv->master != master)
|
|
nm_device_master_release_one_slave (priv->master, self, FALSE, NM_DEVICE_STATE_REASON_CONNECTION_ASSUMED);
|
|
|
|
/* If the master didn't change, add-slave only rechecks whether to assume a connection. */
|
|
nm_device_master_add_slave (master,
|
|
self,
|
|
!nm_device_sys_iface_state_is_external_or_assume (self));
|
|
}
|
|
|
|
static void
|
|
master_ready_cb (NMActiveConnection *active,
|
|
GParamSpec *pspec,
|
|
NMDevice *self)
|
|
{
|
|
master_ready (self, active);
|
|
nm_device_activate_schedule_stage2_device_config (self);
|
|
}
|
|
|
|
static void
|
|
lldp_neighbors_changed (NMLldpListener *lldp_listener, GParamSpec *pspec,
|
|
gpointer user_data)
|
|
{
|
|
NMDevice *self = NM_DEVICE (user_data);
|
|
|
|
_notify (self, PROP_LLDP_NEIGHBORS);
|
|
}
|
|
|
|
static gboolean
|
|
lldp_rx_enabled (NMDevice *self)
|
|
{
|
|
NMConnection *connection;
|
|
NMSettingConnection *s_con;
|
|
NMSettingConnectionLldp lldp = NM_SETTING_CONNECTION_LLDP_DEFAULT;
|
|
|
|
connection = nm_device_get_applied_connection (self);
|
|
g_return_val_if_fail (connection, FALSE);
|
|
|
|
s_con = nm_connection_get_setting_connection (connection);
|
|
g_return_val_if_fail (s_con, FALSE);
|
|
|
|
lldp = nm_setting_connection_get_lldp (s_con);
|
|
if (lldp == NM_SETTING_CONNECTION_LLDP_DEFAULT) {
|
|
gs_free char *value = NULL;
|
|
|
|
value = nm_config_data_get_connection_default (NM_CONFIG_GET_DATA,
|
|
"connection.lldp",
|
|
self);
|
|
lldp = _nm_utils_ascii_str_to_int64 (value, 10,
|
|
NM_SETTING_CONNECTION_LLDP_DEFAULT,
|
|
NM_SETTING_CONNECTION_LLDP_ENABLE_RX,
|
|
NM_SETTING_CONNECTION_LLDP_DEFAULT);
|
|
if (lldp == NM_SETTING_CONNECTION_LLDP_DEFAULT)
|
|
lldp = NM_SETTING_CONNECTION_LLDP_DISABLE;
|
|
}
|
|
return lldp == NM_SETTING_CONNECTION_LLDP_ENABLE_RX;
|
|
}
|
|
|
|
static NMActStageReturn
|
|
act_stage1_prepare (NMDevice *self, NMDeviceStateReason *out_failure_reason)
|
|
{
|
|
return NM_ACT_STAGE_RETURN_SUCCESS;
|
|
}
|
|
|
|
/*
|
|
* activate_stage1_device_prepare
|
|
*
|
|
* Prepare for device activation
|
|
*
|
|
*/
|
|
static void
|
|
activate_stage1_device_prepare (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMActStageReturn ret = NM_ACT_STAGE_RETURN_SUCCESS;
|
|
|
|
_set_ip_state (self, AF_INET, IP_NONE);
|
|
_set_ip_state (self, AF_INET6, IP_NONE);
|
|
|
|
/* Notify the new ActiveConnection along with the state change */
|
|
priv->act_request_public = TRUE;
|
|
_notify (self, PROP_ACTIVE_CONNECTION);
|
|
|
|
nm_device_state_changed (self, NM_DEVICE_STATE_PREPARE, NM_DEVICE_STATE_REASON_NONE);
|
|
|
|
/* Assumed connections were already set up outside NetworkManager */
|
|
if (!nm_device_sys_iface_state_is_external_or_assume (self)) {
|
|
NMDeviceStateReason failure_reason = NM_DEVICE_STATE_REASON_NONE;
|
|
|
|
ret = NM_DEVICE_GET_CLASS (self)->act_stage1_prepare (self, &failure_reason);
|
|
if (ret == NM_ACT_STAGE_RETURN_POSTPONE) {
|
|
return;
|
|
} else if (ret == NM_ACT_STAGE_RETURN_FAILURE) {
|
|
nm_device_state_changed (self, NM_DEVICE_STATE_FAILED, failure_reason);
|
|
return;
|
|
}
|
|
g_return_if_fail (ret == NM_ACT_STAGE_RETURN_SUCCESS);
|
|
}
|
|
|
|
nm_device_activate_schedule_stage2_device_config (self);
|
|
}
|
|
|
|
|
|
/*
|
|
* nm_device_activate_schedule_stage1_device_prepare
|
|
*
|
|
* Prepare a device for activation
|
|
*
|
|
*/
|
|
void
|
|
nm_device_activate_schedule_stage1_device_prepare (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
g_return_if_fail (priv->act_request);
|
|
|
|
activation_source_schedule (self, activate_stage1_device_prepare, AF_INET);
|
|
}
|
|
|
|
static NMActStageReturn
|
|
act_stage2_config (NMDevice *self, NMDeviceStateReason *out_failure_reason)
|
|
{
|
|
return NM_ACT_STAGE_RETURN_SUCCESS;
|
|
}
|
|
|
|
static void
|
|
lldp_init (NMDevice *self, gboolean restart)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->ifindex > 0 && lldp_rx_enabled (self)) {
|
|
gs_free_error GError *error = NULL;
|
|
gconstpointer addr;
|
|
size_t addr_length;
|
|
|
|
if (priv->lldp_listener) {
|
|
if (restart && nm_lldp_listener_is_running (priv->lldp_listener))
|
|
nm_lldp_listener_stop (priv->lldp_listener);
|
|
} else {
|
|
priv->lldp_listener = nm_lldp_listener_new ();
|
|
g_signal_connect (priv->lldp_listener,
|
|
"notify::" NM_LLDP_LISTENER_NEIGHBORS,
|
|
G_CALLBACK (lldp_neighbors_changed),
|
|
self);
|
|
}
|
|
|
|
if (!nm_lldp_listener_is_running (priv->lldp_listener)) {
|
|
addr = nm_platform_link_get_address (nm_device_get_platform (self), priv->ifindex, &addr_length);
|
|
|
|
if (nm_lldp_listener_start (priv->lldp_listener, nm_device_get_ifindex (self), &error))
|
|
_LOGD (LOGD_DEVICE, "LLDP listener %p started", priv->lldp_listener);
|
|
else {
|
|
_LOGD (LOGD_DEVICE, "LLDP listener %p could not be started: %s",
|
|
priv->lldp_listener, error->message);
|
|
}
|
|
}
|
|
} else {
|
|
if (priv->lldp_listener)
|
|
nm_lldp_listener_stop (priv->lldp_listener);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* activate_stage2_device_config
|
|
*
|
|
* Determine device parameters and set those on the device, ie
|
|
* for wireless devices, set SSID, keys, etc.
|
|
*
|
|
*/
|
|
static void
|
|
activate_stage2_device_config (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMActStageReturn ret;
|
|
gboolean no_firmware = FALSE;
|
|
GSList *iter;
|
|
|
|
nm_device_state_changed (self, NM_DEVICE_STATE_CONFIG, NM_DEVICE_STATE_REASON_NONE);
|
|
|
|
/* Assumed connections were already set up outside NetworkManager */
|
|
if (!nm_device_sys_iface_state_is_external_or_assume (self)) {
|
|
NMDeviceStateReason failure_reason = NM_DEVICE_STATE_REASON_NONE;
|
|
|
|
if (!nm_device_bring_up (self, FALSE, &no_firmware)) {
|
|
if (no_firmware)
|
|
nm_device_state_changed (self, NM_DEVICE_STATE_FAILED, NM_DEVICE_STATE_REASON_FIRMWARE_MISSING);
|
|
else
|
|
nm_device_state_changed (self, NM_DEVICE_STATE_FAILED, NM_DEVICE_STATE_REASON_CONFIG_FAILED);
|
|
return;
|
|
}
|
|
|
|
ret = NM_DEVICE_GET_CLASS (self)->act_stage2_config (self, &failure_reason);
|
|
if (ret == NM_ACT_STAGE_RETURN_POSTPONE)
|
|
return;
|
|
else if (ret == NM_ACT_STAGE_RETURN_FAILURE) {
|
|
nm_device_state_changed (self, NM_DEVICE_STATE_FAILED, failure_reason);
|
|
return;
|
|
}
|
|
g_assert (ret == NM_ACT_STAGE_RETURN_SUCCESS);
|
|
}
|
|
|
|
/* If we have slaves that aren't yet enslaved, do that now */
|
|
for (iter = priv->slaves; iter; iter = g_slist_next (iter)) {
|
|
SlaveInfo *info = iter->data;
|
|
NMDeviceState slave_state = nm_device_get_state (info->slave);
|
|
|
|
if (slave_state == NM_DEVICE_STATE_IP_CONFIG)
|
|
nm_device_master_enslave_slave (self, info->slave, nm_device_get_applied_connection (info->slave));
|
|
else if ( priv->act_request
|
|
&& nm_device_sys_iface_state_is_external (self)
|
|
&& slave_state <= NM_DEVICE_STATE_DISCONNECTED)
|
|
nm_device_queue_recheck_assume (info->slave);
|
|
}
|
|
|
|
lldp_init (self, TRUE);
|
|
nm_device_activate_schedule_stage3_ip_config_start (self);
|
|
}
|
|
|
|
|
|
/*
|
|
* nm_device_activate_schedule_stage2_device_config
|
|
*
|
|
* Schedule setup of the hardware device
|
|
*
|
|
*/
|
|
void
|
|
nm_device_activate_schedule_stage2_device_config (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
g_return_if_fail (priv->act_request);
|
|
|
|
if (!priv->master_ready_handled) {
|
|
NMActiveConnection *active = NM_ACTIVE_CONNECTION (priv->act_request);
|
|
NMActiveConnection *master;
|
|
|
|
master = nm_active_connection_get_master (active);
|
|
|
|
if (!master) {
|
|
g_warn_if_fail (!priv->master_ready_id);
|
|
priv->master_ready_handled = TRUE;
|
|
} else {
|
|
/* If the master connection is ready for slaves, attach ourselves */
|
|
if (nm_active_connection_get_master_ready (active))
|
|
master_ready (self, active);
|
|
else if (nm_active_connection_get_state (master) >= NM_ACTIVE_CONNECTION_STATE_DEACTIVATING) {
|
|
_LOGD (LOGD_DEVICE, "master connection is deactivating");
|
|
nm_device_state_changed (self, NM_DEVICE_STATE_FAILED, NM_DEVICE_STATE_REASON_DEPENDENCY_FAILED);
|
|
} else {
|
|
_LOGD (LOGD_DEVICE, "waiting for master connection to become ready");
|
|
|
|
if (priv->master_ready_id == 0) {
|
|
priv->master_ready_id = g_signal_connect (active,
|
|
"notify::" NM_ACTIVE_CONNECTION_INT_MASTER_READY,
|
|
(GCallback) master_ready_cb,
|
|
self);
|
|
}
|
|
/* Postpone */
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
|
|
activation_source_schedule (self, activate_stage2_device_config, AF_INET);
|
|
}
|
|
|
|
/*
|
|
* check_ip_state
|
|
*
|
|
* Transition the device from IP_CONFIG to the next state according to the
|
|
* outcome of IPv4 and IPv6 configuration. @may_fail indicates that we are
|
|
* called just after the initial configuration and thus IPv4/IPv6 are allowed to
|
|
* fail if the ipvx.may-fail properties say so, because the IP methods couldn't
|
|
* even be started.
|
|
*/
|
|
static void
|
|
check_ip_state (NMDevice *self, gboolean may_fail)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
gboolean ip4_disabled = FALSE, ip6_ignore = FALSE;
|
|
NMSettingIPConfig *s_ip4, *s_ip6;
|
|
NMDeviceState state;
|
|
|
|
if (nm_device_get_state (self) != NM_DEVICE_STATE_IP_CONFIG)
|
|
return;
|
|
|
|
s_ip4 = (NMSettingIPConfig *) nm_device_get_applied_setting (self, NM_TYPE_SETTING_IP4_CONFIG);
|
|
if (s_ip4 && nm_streq0 (nm_setting_ip_config_get_method (s_ip4),
|
|
NM_SETTING_IP4_CONFIG_METHOD_DISABLED))
|
|
ip4_disabled = TRUE;
|
|
|
|
s_ip6 = (NMSettingIPConfig *) nm_device_get_applied_setting (self, NM_TYPE_SETTING_IP6_CONFIG);
|
|
if (s_ip6 && nm_streq0 (nm_setting_ip_config_get_method (s_ip6),
|
|
NM_SETTING_IP6_CONFIG_METHOD_IGNORE))
|
|
ip6_ignore = TRUE;
|
|
|
|
if ( priv->ip4_state == IP_DONE
|
|
&& priv->ip6_state == IP_DONE) {
|
|
/* Both method completed (or disabled), proceed with activation */
|
|
nm_device_state_changed (self, NM_DEVICE_STATE_IP_CHECK, NM_DEVICE_STATE_REASON_NONE);
|
|
return;
|
|
}
|
|
|
|
if ( (priv->ip4_state == IP_FAIL || (ip4_disabled && priv->ip4_state == IP_DONE))
|
|
&& (priv->ip6_state == IP_FAIL || (ip6_ignore && priv->ip6_state == IP_DONE))) {
|
|
/* Either both methods failed, or only one failed and the other is
|
|
* disabled */
|
|
if (nm_device_sys_iface_state_is_external_or_assume (self)) {
|
|
/* We have assumed configuration, but couldn't redo it. No problem,
|
|
* move to check state. */
|
|
_set_ip_state (self, AF_INET, IP_DONE);
|
|
_set_ip_state (self, AF_INET6, IP_DONE);
|
|
state = NM_DEVICE_STATE_IP_CHECK;
|
|
} else if ( may_fail
|
|
&& get_ip_config_may_fail (self, AF_INET)
|
|
&& get_ip_config_may_fail (self, AF_INET6)) {
|
|
/* Couldn't start either IPv6 and IPv4 autoconfiguration,
|
|
* but both are allowed to fail. */
|
|
state = NM_DEVICE_STATE_SECONDARIES;
|
|
} else {
|
|
/* Autoconfiguration attempted without success. */
|
|
state = NM_DEVICE_STATE_FAILED;
|
|
}
|
|
|
|
nm_device_state_changed (self,
|
|
state,
|
|
NM_DEVICE_STATE_REASON_IP_CONFIG_UNAVAILABLE);
|
|
return;
|
|
}
|
|
|
|
/* If a method is still pending but required, wait */
|
|
if (priv->ip4_state != IP_DONE && !get_ip_config_may_fail (self, AF_INET))
|
|
return;
|
|
if (priv->ip6_state != IP_DONE && !get_ip_config_may_fail (self, AF_INET6))
|
|
return;
|
|
|
|
/* If at least a method has completed, proceed with activation */
|
|
if ( (priv->ip4_state == IP_DONE && !ip4_disabled)
|
|
|| (priv->ip6_state == IP_DONE && !ip6_ignore)) {
|
|
nm_device_state_changed (self, NM_DEVICE_STATE_IP_CHECK, NM_DEVICE_STATE_REASON_NONE);
|
|
return;
|
|
}
|
|
}
|
|
|
|
void
|
|
nm_device_ip_method_failed (NMDevice *self, int family, NMDeviceStateReason reason)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
g_return_if_fail (family == AF_INET || family == AF_INET6);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
_set_ip_state (self, family, IP_FAIL);
|
|
|
|
if (get_ip_config_may_fail (self, family))
|
|
check_ip_state (self, FALSE);
|
|
else
|
|
nm_device_state_changed (self, NM_DEVICE_STATE_FAILED, reason);
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
/* IPv4 DAD stuff */
|
|
|
|
static guint
|
|
get_ipv4_dad_timeout (NMDevice *self)
|
|
{
|
|
NMConnection *connection;
|
|
NMSettingIPConfig *s_ip4 = NULL;
|
|
gs_free char *value = NULL;
|
|
gint ret = 0;
|
|
|
|
connection = nm_device_get_applied_connection (self);
|
|
if (connection)
|
|
s_ip4 = nm_connection_get_setting_ip4_config (connection);
|
|
|
|
if (s_ip4) {
|
|
ret = nm_setting_ip_config_get_dad_timeout (s_ip4);
|
|
|
|
if (ret < 0) {
|
|
value = nm_config_data_get_connection_default (NM_CONFIG_GET_DATA,
|
|
"ipv4.dad-timeout", self);
|
|
ret = _nm_utils_ascii_str_to_int64 (value, 10, -1,
|
|
NM_SETTING_IP_CONFIG_DAD_TIMEOUT_MAX,
|
|
-1);
|
|
ret = ret < 0 ? 0 : ret;
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static void
|
|
arping_data_destroy (gpointer ptr, GClosure *closure)
|
|
{
|
|
ArpingData *data = ptr;
|
|
int i;
|
|
|
|
if (data) {
|
|
for (i = 0; data->configs && data->configs[i]; i++)
|
|
g_object_unref (data->configs[i]);
|
|
g_free (data->configs);
|
|
g_slice_free (ArpingData, data);
|
|
}
|
|
}
|
|
|
|
static void
|
|
ipv4_manual_method_apply (NMDevice *self, NMIP4Config **configs, gboolean success)
|
|
{
|
|
NMIP4Config *empty;
|
|
|
|
if (success) {
|
|
empty = nm_ip4_config_new (nm_device_get_ip_ifindex (self));
|
|
nm_device_activate_schedule_ip4_config_result (self, empty);
|
|
g_object_unref (empty);
|
|
} else {
|
|
nm_device_queue_state (self, NM_DEVICE_STATE_FAILED,
|
|
NM_DEVICE_STATE_REASON_CONFIG_FAILED);
|
|
}
|
|
}
|
|
|
|
static void
|
|
arping_manager_probe_terminated (NMArpingManager *arping_manager, ArpingData *data)
|
|
{
|
|
NMDevice *self;
|
|
NMDevicePrivate *priv;
|
|
const NMPlatformIP4Address *address;
|
|
gboolean result, success = TRUE;
|
|
int i, j;
|
|
|
|
g_assert (data);
|
|
self = data->device;
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
for (i = 0; data->configs && data->configs[i]; i++) {
|
|
for (j = 0; j < nm_ip4_config_get_num_addresses (data->configs[i]); j++) {
|
|
address = nm_ip4_config_get_address (data->configs[i], j);
|
|
result = nm_arping_manager_check_address (arping_manager, address->address);
|
|
success &= result;
|
|
|
|
_NMLOG (result ? LOGL_DEBUG : LOGL_WARN,
|
|
LOGD_DEVICE,
|
|
"IPv4 DAD result: address %s is %s",
|
|
nm_utils_inet4_ntop (address->address, NULL),
|
|
result ? "unique" : "duplicate");
|
|
}
|
|
}
|
|
|
|
data->callback (self, data->configs, success);
|
|
|
|
priv->arping.dad_list = g_slist_remove (priv->arping.dad_list, arping_manager);
|
|
nm_arping_manager_destroy (arping_manager);
|
|
}
|
|
|
|
/**
|
|
* ipv4_dad_start:
|
|
* @self: device instance
|
|
* @configs: NULL-terminated array of IPv4 configurations
|
|
* @cb: callback function
|
|
*
|
|
* Start IPv4 DAD on device @self, check addresses in @configs and call @cb
|
|
* when the procedure ends. @cb will be called in any case, even if DAD can't
|
|
* be started. @configs will be unreferenced after @cb has been called.
|
|
*/
|
|
static void
|
|
ipv4_dad_start (NMDevice *self, NMIP4Config **configs, ArpingCallback cb)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMArpingManager *arping_manager;
|
|
const NMPlatformIP4Address *address;
|
|
ArpingData *data;
|
|
guint timeout;
|
|
gboolean ret, addr_found;
|
|
const guint8 *hw_addr;
|
|
size_t hw_addr_len = 0;
|
|
GError *error = NULL;
|
|
guint i, j;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
g_return_if_fail (configs);
|
|
g_return_if_fail (cb);
|
|
|
|
for (i = 0, addr_found = FALSE; configs[i]; i++) {
|
|
if (nm_ip4_config_get_num_addresses (configs[i]) > 0) {
|
|
addr_found = TRUE;
|
|
break;
|
|
}
|
|
}
|
|
|
|
timeout = get_ipv4_dad_timeout (self);
|
|
hw_addr = nm_platform_link_get_address (nm_device_get_platform (self),
|
|
nm_device_get_ip_ifindex (self),
|
|
&hw_addr_len);
|
|
|
|
if ( !timeout
|
|
|| !hw_addr
|
|
|| !hw_addr_len
|
|
|| !addr_found
|
|
|| nm_device_sys_iface_state_is_external_or_assume (self)) {
|
|
|
|
/* DAD not needed, signal success */
|
|
cb (self, configs, TRUE);
|
|
|
|
for (i = 0; configs[i]; i++)
|
|
g_object_unref (configs[i]);
|
|
g_free (configs);
|
|
|
|
return;
|
|
}
|
|
|
|
/* don't take additional references of @arping_manager that outlive @self.
|
|
* Otherwise, the callback can be invoked on a dangling pointer as we don't
|
|
* disconnect the handler. */
|
|
arping_manager = nm_arping_manager_new (nm_device_get_ip_ifindex (self));
|
|
priv->arping.dad_list = g_slist_append (priv->arping.dad_list, arping_manager);
|
|
|
|
data = g_slice_new0 (ArpingData);
|
|
data->configs = configs;
|
|
data->callback = cb;
|
|
data->device = self;
|
|
|
|
for (i = 0; configs[i]; i++) {
|
|
for (j = 0; j < nm_ip4_config_get_num_addresses (configs[i]); j++) {
|
|
address = nm_ip4_config_get_address (configs[i], j);
|
|
nm_arping_manager_add_address (arping_manager, address->address);
|
|
}
|
|
}
|
|
|
|
g_signal_connect_data (arping_manager, NM_ARPING_MANAGER_PROBE_TERMINATED,
|
|
G_CALLBACK (arping_manager_probe_terminated), data,
|
|
arping_data_destroy, 0);
|
|
|
|
ret = nm_arping_manager_start_probe (arping_manager, timeout, &error);
|
|
|
|
if (!ret) {
|
|
_LOGW (LOGD_DEVICE, "arping probe failed: %s", error->message);
|
|
|
|
/* DAD could not be started, signal success */
|
|
cb (self, configs, TRUE);
|
|
|
|
priv->arping.dad_list = g_slist_remove (priv->arping.dad_list, arping_manager);
|
|
nm_arping_manager_destroy (arping_manager);
|
|
}
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
/* IPv4LL stuff */
|
|
|
|
static void
|
|
ipv4ll_cleanup (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->ipv4ll) {
|
|
sd_ipv4ll_set_callback (priv->ipv4ll, NULL, NULL);
|
|
sd_ipv4ll_stop (priv->ipv4ll);
|
|
priv->ipv4ll = sd_ipv4ll_unref (priv->ipv4ll);
|
|
}
|
|
|
|
nm_clear_g_source (&priv->ipv4ll_timeout);
|
|
}
|
|
|
|
static NMIP4Config *
|
|
ipv4ll_get_ip4_config (NMDevice *self, guint32 lla)
|
|
{
|
|
NMIP4Config *config = NULL;
|
|
NMPlatformIP4Address address;
|
|
NMPlatformIP4Route route;
|
|
|
|
config = nm_ip4_config_new (nm_device_get_ip_ifindex (self));
|
|
g_assert (config);
|
|
|
|
memset (&address, 0, sizeof (address));
|
|
nm_platform_ip4_address_set_addr (&address, lla, 16);
|
|
address.addr_source = NM_IP_CONFIG_SOURCE_IP4LL;
|
|
nm_ip4_config_add_address (config, &address);
|
|
|
|
/* Add a multicast route for link-local connections: destination= 224.0.0.0, netmask=240.0.0.0 */
|
|
memset (&route, 0, sizeof (route));
|
|
route.network = htonl (0xE0000000L);
|
|
route.plen = 4;
|
|
route.rt_source = NM_IP_CONFIG_SOURCE_IP4LL;
|
|
route.metric = nm_device_get_ip4_route_metric (self);
|
|
nm_ip4_config_add_route (config, &route);
|
|
|
|
return config;
|
|
}
|
|
|
|
#define IPV4LL_NETWORK (htonl (0xA9FE0000L))
|
|
#define IPV4LL_NETMASK (htonl (0xFFFF0000L))
|
|
|
|
static void
|
|
nm_device_handle_ipv4ll_event (sd_ipv4ll *ll, int event, void *data)
|
|
{
|
|
NMDevice *self = data;
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMConnection *connection = NULL;
|
|
const char *method;
|
|
struct in_addr address;
|
|
NMIP4Config *config;
|
|
int r;
|
|
|
|
if (priv->act_request == NULL)
|
|
return;
|
|
|
|
connection = nm_act_request_get_applied_connection (priv->act_request);
|
|
g_assert (connection);
|
|
|
|
/* Ignore if the connection isn't an AutoIP connection */
|
|
method = nm_utils_get_ip_config_method (connection, NM_TYPE_SETTING_IP4_CONFIG);
|
|
if (g_strcmp0 (method, NM_SETTING_IP4_CONFIG_METHOD_LINK_LOCAL) != 0)
|
|
return;
|
|
|
|
switch (event) {
|
|
case SD_IPV4LL_EVENT_BIND:
|
|
r = sd_ipv4ll_get_address (ll, &address);
|
|
if (r < 0) {
|
|
_LOGE (LOGD_AUTOIP4, "invalid IPv4 link-local address received, error %d.", r);
|
|
nm_device_ip_method_failed (self, AF_INET, NM_DEVICE_STATE_REASON_AUTOIP_START_FAILED);
|
|
return;
|
|
}
|
|
|
|
if ((address.s_addr & IPV4LL_NETMASK) != IPV4LL_NETWORK) {
|
|
_LOGE (LOGD_AUTOIP4, "invalid address %08x received (not link-local).", address.s_addr);
|
|
nm_device_ip_method_failed (self, AF_INET, NM_DEVICE_STATE_REASON_AUTOIP_ERROR);
|
|
return;
|
|
}
|
|
|
|
config = ipv4ll_get_ip4_config (self, address.s_addr);
|
|
if (config == NULL) {
|
|
_LOGE (LOGD_AUTOIP4, "failed to get IPv4LL config");
|
|
nm_device_ip_method_failed (self, AF_INET, NM_DEVICE_STATE_REASON_AUTOIP_FAILED);
|
|
return;
|
|
}
|
|
|
|
if (priv->ip4_state == IP_CONF) {
|
|
nm_clear_g_source (&priv->ipv4ll_timeout);
|
|
nm_device_activate_schedule_ip4_config_result (self, config);
|
|
} else if (priv->ip4_state == IP_DONE) {
|
|
if (!ip4_config_merge_and_apply (self, config, TRUE)) {
|
|
_LOGE (LOGD_AUTOIP4, "failed to update IP4 config for autoip change.");
|
|
nm_device_ip_method_failed (self, AF_INET, NM_DEVICE_STATE_REASON_AUTOIP_FAILED);
|
|
}
|
|
} else
|
|
g_assert_not_reached ();
|
|
|
|
g_object_unref (config);
|
|
break;
|
|
default:
|
|
_LOGW (LOGD_AUTOIP4, "IPv4LL address no longer valid after event %d.", event);
|
|
nm_device_ip_method_failed (self, AF_INET, NM_DEVICE_STATE_REASON_AUTOIP_FAILED);
|
|
}
|
|
}
|
|
|
|
static gboolean
|
|
ipv4ll_timeout_cb (gpointer user_data)
|
|
{
|
|
NMDevice *self = NM_DEVICE (user_data);
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->ipv4ll_timeout) {
|
|
_LOGI (LOGD_AUTOIP4, "IPv4LL configuration timed out.");
|
|
priv->ipv4ll_timeout = 0;
|
|
ipv4ll_cleanup (self);
|
|
|
|
if (priv->ip4_state == IP_CONF)
|
|
nm_device_activate_schedule_ip4_config_timeout (self);
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
static NMActStageReturn
|
|
ipv4ll_start (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
const struct ether_addr *addr;
|
|
int ifindex, r;
|
|
size_t addr_len;
|
|
|
|
ipv4ll_cleanup (self);
|
|
|
|
r = sd_ipv4ll_new (&priv->ipv4ll);
|
|
if (r < 0) {
|
|
_LOGE (LOGD_AUTOIP4, "IPv4LL: new() failed with error %d", r);
|
|
return NM_ACT_STAGE_RETURN_FAILURE;
|
|
}
|
|
|
|
r = sd_ipv4ll_attach_event (priv->ipv4ll, NULL, 0);
|
|
if (r < 0) {
|
|
_LOGE (LOGD_AUTOIP4, "IPv4LL: attach_event() failed with error %d", r);
|
|
return NM_ACT_STAGE_RETURN_FAILURE;
|
|
}
|
|
|
|
ifindex = nm_device_get_ip_ifindex (self);
|
|
addr = nm_platform_link_get_address (nm_device_get_platform (self), ifindex, &addr_len);
|
|
if (!addr || addr_len != ETH_ALEN) {
|
|
_LOGE (LOGD_AUTOIP4, "IPv4LL: can't retrieve hardware address");
|
|
return NM_ACT_STAGE_RETURN_FAILURE;
|
|
}
|
|
|
|
r = sd_ipv4ll_set_mac (priv->ipv4ll, addr);
|
|
if (r < 0) {
|
|
_LOGE (LOGD_AUTOIP4, "IPv4LL: set_mac() failed with error %d", r);
|
|
return NM_ACT_STAGE_RETURN_FAILURE;
|
|
}
|
|
|
|
r = sd_ipv4ll_set_ifindex (priv->ipv4ll, ifindex);
|
|
if (r < 0) {
|
|
_LOGE (LOGD_AUTOIP4, "IPv4LL: set_ifindex() failed with error %d", r);
|
|
return NM_ACT_STAGE_RETURN_FAILURE;
|
|
}
|
|
|
|
r = sd_ipv4ll_set_callback (priv->ipv4ll, nm_device_handle_ipv4ll_event, self);
|
|
if (r < 0) {
|
|
_LOGE (LOGD_AUTOIP4, "IPv4LL: set_callback() failed with error %d", r);
|
|
return NM_ACT_STAGE_RETURN_FAILURE;
|
|
}
|
|
|
|
r = sd_ipv4ll_start (priv->ipv4ll);
|
|
if (r < 0) {
|
|
_LOGE (LOGD_AUTOIP4, "IPv4LL: start() failed with error %d", r);
|
|
return NM_ACT_STAGE_RETURN_FAILURE;
|
|
}
|
|
|
|
_LOGI (LOGD_DEVICE | LOGD_AUTOIP4, "IPv4LL: started");
|
|
|
|
/* Start a timeout to bound the address attempt */
|
|
priv->ipv4ll_timeout = g_timeout_add_seconds (20, ipv4ll_timeout_cb, self);
|
|
return NM_ACT_STAGE_RETURN_POSTPONE;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static gboolean
|
|
_device_get_default_route_from_platform (NMDevice *self, int addr_family, NMPlatformIPRoute *out_route)
|
|
{
|
|
gboolean success = FALSE;
|
|
int ifindex = nm_device_get_ip_ifindex (self);
|
|
GArray *routes;
|
|
|
|
if (addr_family == AF_INET)
|
|
routes = nm_platform_ip4_route_get_all (nm_device_get_platform (self), ifindex, NM_PLATFORM_GET_ROUTE_FLAGS_WITH_DEFAULT);
|
|
else
|
|
routes = nm_platform_ip6_route_get_all (nm_device_get_platform (self), ifindex, NM_PLATFORM_GET_ROUTE_FLAGS_WITH_DEFAULT);
|
|
|
|
if (routes) {
|
|
guint route_metric = G_MAXUINT32, m;
|
|
const NMPlatformIPRoute *route = NULL, *r;
|
|
guint i;
|
|
|
|
/* if there are several default routes, find the one with the best metric */
|
|
for (i = 0; i < routes->len; i++) {
|
|
if (addr_family == AF_INET) {
|
|
r = (const NMPlatformIPRoute *) &g_array_index (routes, NMPlatformIP4Route, i);
|
|
m = r->metric;
|
|
} else {
|
|
r = (const NMPlatformIPRoute *) &g_array_index (routes, NMPlatformIP6Route, i);
|
|
m = nm_utils_ip6_route_metric_normalize (r->metric);
|
|
}
|
|
if (!route || m < route_metric) {
|
|
route = r;
|
|
route_metric = m;
|
|
}
|
|
}
|
|
|
|
if (route) {
|
|
if (addr_family == AF_INET)
|
|
*((NMPlatformIP4Route *) out_route) = *((NMPlatformIP4Route *) route);
|
|
else
|
|
*((NMPlatformIP6Route *) out_route) = *((NMPlatformIP6Route *) route);
|
|
success = TRUE;
|
|
}
|
|
g_array_free (routes, TRUE);
|
|
}
|
|
return success;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static void
|
|
ensure_con_ip4_config (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
int ip_ifindex = nm_device_get_ip_ifindex (self);
|
|
NMConnection *connection;
|
|
|
|
if (priv->con_ip4_config)
|
|
return;
|
|
|
|
connection = nm_device_get_applied_connection (self);
|
|
if (!connection)
|
|
return;
|
|
|
|
priv->con_ip4_config = nm_ip4_config_new (ip_ifindex);
|
|
nm_ip4_config_merge_setting (priv->con_ip4_config,
|
|
nm_connection_get_setting_ip4_config (connection),
|
|
nm_device_get_ip4_route_metric (self));
|
|
|
|
if (nm_device_sys_iface_state_is_external_or_assume (self)) {
|
|
/* For assumed connections ignore all addresses and routes. */
|
|
nm_ip4_config_reset_addresses (priv->con_ip4_config);
|
|
nm_ip4_config_reset_routes (priv->con_ip4_config);
|
|
}
|
|
}
|
|
|
|
static void
|
|
ensure_con_ip6_config (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
int ip_ifindex = nm_device_get_ip_ifindex (self);
|
|
NMConnection *connection;
|
|
|
|
if (priv->con_ip6_config)
|
|
return;
|
|
|
|
connection = nm_device_get_applied_connection (self);
|
|
if (!connection)
|
|
return;
|
|
|
|
priv->con_ip6_config = nm_ip6_config_new (ip_ifindex);
|
|
nm_ip6_config_merge_setting (priv->con_ip6_config,
|
|
nm_connection_get_setting_ip6_config (connection),
|
|
nm_device_get_ip6_route_metric (self));
|
|
|
|
if (nm_device_sys_iface_state_is_external_or_assume (self)) {
|
|
/* For assumed connections ignore all addresses and routes. */
|
|
nm_ip6_config_reset_addresses (priv->con_ip6_config);
|
|
nm_ip6_config_reset_routes (priv->con_ip6_config);
|
|
}
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
/* DHCPv4 stuff */
|
|
|
|
static void
|
|
dhcp4_cleanup (NMDevice *self, CleanupType cleanup_type, gboolean release)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
nm_clear_g_source (&priv->dhcp4.restart_id);
|
|
g_clear_pointer (&priv->dhcp4.pac_url, g_free);
|
|
|
|
if (priv->dhcp4.client) {
|
|
/* Stop any ongoing DHCP transaction on this device */
|
|
nm_clear_g_signal_handler (priv->dhcp4.client, &priv->dhcp4.state_sigid);
|
|
|
|
nm_device_remove_pending_action (self, NM_PENDING_ACTION_DHCP4, FALSE);
|
|
|
|
if ( cleanup_type == CLEANUP_TYPE_DECONFIGURE
|
|
|| cleanup_type == CLEANUP_TYPE_REMOVED)
|
|
nm_dhcp_client_stop (priv->dhcp4.client, release);
|
|
|
|
g_clear_object (&priv->dhcp4.client);
|
|
}
|
|
|
|
if (priv->dhcp4.config) {
|
|
nm_exported_object_clear_and_unexport (&priv->dhcp4.config);
|
|
_notify (self, PROP_DHCP4_CONFIG);
|
|
}
|
|
}
|
|
|
|
static void
|
|
_ip4_config_merge_default (gpointer value, gpointer user_data)
|
|
{
|
|
NMIP4Config *src = (NMIP4Config *) value;
|
|
NMIP4Config *dst = (NMIP4Config *) user_data;
|
|
|
|
nm_ip4_config_merge (dst, src, NM_IP_CONFIG_MERGE_DEFAULT);
|
|
}
|
|
|
|
static gboolean
|
|
ip4_config_merge_and_apply (NMDevice *self,
|
|
NMIP4Config *config,
|
|
gboolean commit)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMConnection *connection;
|
|
gboolean success;
|
|
NMIP4Config *composite;
|
|
gboolean has_direct_route;
|
|
const guint32 default_route_metric = nm_device_get_ip4_route_metric (self);
|
|
guint32 gateway;
|
|
gboolean connection_has_default_route, connection_is_never_default;
|
|
gboolean routes_full_sync;
|
|
gboolean ignore_auto_routes = FALSE;
|
|
gboolean ignore_auto_dns = FALSE;
|
|
gboolean auto_method = FALSE;
|
|
|
|
/* Merge all the configs into the composite config */
|
|
if (config) {
|
|
g_clear_object (&priv->dev_ip4_config);
|
|
priv->dev_ip4_config = g_object_ref (config);
|
|
}
|
|
|
|
/* Apply ignore-auto-routes and ignore-auto-dns settings */
|
|
connection = nm_device_get_applied_connection (self);
|
|
if (connection) {
|
|
NMSettingIPConfig *s_ip4 = nm_connection_get_setting_ip4_config (connection);
|
|
|
|
if (s_ip4) {
|
|
ignore_auto_routes = nm_setting_ip_config_get_ignore_auto_routes (s_ip4);
|
|
ignore_auto_dns = nm_setting_ip_config_get_ignore_auto_dns (s_ip4);
|
|
|
|
if (nm_streq0 (nm_setting_ip_config_get_method (s_ip4),
|
|
NM_SETTING_IP4_CONFIG_METHOD_AUTO))
|
|
auto_method = TRUE;
|
|
}
|
|
}
|
|
|
|
composite = nm_ip4_config_new (nm_device_get_ip_ifindex (self));
|
|
init_ip4_config_dns_priority (self, composite);
|
|
|
|
if (commit)
|
|
ensure_con_ip4_config (self);
|
|
|
|
if (priv->dev_ip4_config) {
|
|
nm_ip4_config_merge (composite, priv->dev_ip4_config,
|
|
(ignore_auto_routes ? NM_IP_CONFIG_MERGE_NO_ROUTES : 0)
|
|
| (ignore_auto_dns ? NM_IP_CONFIG_MERGE_NO_DNS : 0));
|
|
}
|
|
|
|
g_slist_foreach (priv->vpn4_configs, _ip4_config_merge_default, composite);
|
|
|
|
if (priv->ext_ip4_config)
|
|
nm_ip4_config_merge (composite, priv->ext_ip4_config, NM_IP_CONFIG_MERGE_DEFAULT);
|
|
|
|
/* Merge WWAN config *last* to ensure modem-given settings overwrite
|
|
* any external stuff set by pppd or other scripts.
|
|
*/
|
|
if (priv->wwan_ip4_config) {
|
|
nm_ip4_config_merge (composite, priv->wwan_ip4_config,
|
|
(ignore_auto_routes ? NM_IP_CONFIG_MERGE_NO_ROUTES : 0)
|
|
| (ignore_auto_dns ? NM_IP_CONFIG_MERGE_NO_DNS : 0));
|
|
}
|
|
|
|
/* Merge user overrides into the composite config. For assumed connections,
|
|
* con_ip4_config is empty. */
|
|
if (priv->con_ip4_config)
|
|
nm_ip4_config_merge (composite, priv->con_ip4_config, NM_IP_CONFIG_MERGE_DEFAULT);
|
|
|
|
/* Add the default route.
|
|
*
|
|
* We keep track of the default route of a device in a private field.
|
|
* NMDevice needs to know the default route at this point, because the gateway
|
|
* might require a direct route (see below).
|
|
*
|
|
* But also, we don't want to add the default route to priv->ip4_config,
|
|
* because the default route from the setting might not be the same that
|
|
* NMDefaultRouteManager eventually configures (because the it might
|
|
* tweak the effective metric).
|
|
*/
|
|
|
|
/* unless we come to a different conclusion below, we have no default route and
|
|
* the route is assumed. */
|
|
priv->default_route.v4_has = FALSE;
|
|
priv->default_route.v4_is_assumed = TRUE;
|
|
|
|
if (!commit) {
|
|
/* during a non-commit event, we always pickup whatever is configured. */
|
|
goto END_ADD_DEFAULT_ROUTE;
|
|
}
|
|
|
|
/* a generated-assumed connection detects the default route from the platform,
|
|
* but if the IP method is automatic we need to update the default route to
|
|
* maintain connectivity.
|
|
*/
|
|
if (nm_device_sys_iface_state_is_external (self) && !auto_method)
|
|
goto END_ADD_DEFAULT_ROUTE;
|
|
|
|
/* At this point, we treat assumed and non-assumed connections alike.
|
|
* For assumed connections we do that because we still manage RA and DHCP
|
|
* leases for them, so we must extend/update the default route on commits.
|
|
*/
|
|
|
|
connection_has_default_route
|
|
= nm_default_route_manager_ip4_connection_has_default_route (nm_netns_get_default_route_manager (priv->netns),
|
|
connection, &connection_is_never_default);
|
|
|
|
if ( !priv->v4_commit_first_time
|
|
&& connection_is_never_default) {
|
|
/* If the connection is explicitly configured as never-default, we enforce the (absence of the)
|
|
* default-route only once. That allows the user to configure a connection as never-default,
|
|
* but he can add default routes externally (via a dispatcher script) and NM will not interfere. */
|
|
goto END_ADD_DEFAULT_ROUTE;
|
|
}
|
|
|
|
/* we are about to commit (for a non-assumed connection). Enforce whatever we have
|
|
* configured. */
|
|
priv->default_route.v4_is_assumed = FALSE;
|
|
|
|
if (!connection_has_default_route)
|
|
goto END_ADD_DEFAULT_ROUTE;
|
|
|
|
if (!nm_ip4_config_get_num_addresses (composite)) {
|
|
/* without addresses we can have no default route. */
|
|
goto END_ADD_DEFAULT_ROUTE;
|
|
}
|
|
|
|
gateway = nm_ip4_config_get_gateway (composite);
|
|
if ( !nm_ip4_config_has_gateway (composite)
|
|
&& nm_device_get_device_type (self) != NM_DEVICE_TYPE_MODEM)
|
|
goto END_ADD_DEFAULT_ROUTE;
|
|
|
|
has_direct_route = ( gateway == 0
|
|
|| nm_ip4_config_destination_is_direct (composite, gateway, 32)
|
|
|| nm_ip4_config_get_direct_route_for_host (composite, gateway));
|
|
|
|
priv->default_route.v4_has = TRUE;
|
|
memset (&priv->default_route.v4, 0, sizeof (priv->default_route.v4));
|
|
priv->default_route.v4.rt_source = NM_IP_CONFIG_SOURCE_USER;
|
|
priv->default_route.v4.gateway = gateway;
|
|
priv->default_route.v4.metric = route_metric_with_penalty (self, default_route_metric);
|
|
priv->default_route.v4.mss = nm_ip4_config_get_mss (composite);
|
|
|
|
if (!has_direct_route) {
|
|
NMPlatformIP4Route r = priv->default_route.v4;
|
|
|
|
/* add a direct route to the gateway */
|
|
r.network = gateway;
|
|
r.plen = 32;
|
|
r.gateway = 0;
|
|
nm_ip4_config_add_route (composite, &r);
|
|
}
|
|
|
|
END_ADD_DEFAULT_ROUTE:
|
|
|
|
if (priv->default_route.v4_is_assumed) {
|
|
/* If above does not explicitly assign a default route, we always pick up the
|
|
* default route based on what is currently configured.
|
|
* That means that even managed connections with never-default, can
|
|
* get a default route (if configured externally).
|
|
*/
|
|
priv->default_route.v4_has = _device_get_default_route_from_platform (self, AF_INET, (NMPlatformIPRoute *) &priv->default_route.v4);
|
|
}
|
|
|
|
if (commit) {
|
|
if (NM_DEVICE_GET_CLASS (self)->ip4_config_pre_commit)
|
|
NM_DEVICE_GET_CLASS (self)->ip4_config_pre_commit (self, composite);
|
|
}
|
|
|
|
routes_full_sync = commit
|
|
&& priv->v4_commit_first_time
|
|
&& !nm_device_sys_iface_state_is_external_or_assume (self);
|
|
|
|
success = nm_device_set_ip4_config (self, composite, default_route_metric, commit, routes_full_sync);
|
|
g_object_unref (composite);
|
|
|
|
if (commit)
|
|
priv->v4_commit_first_time = FALSE;
|
|
return success;
|
|
}
|
|
|
|
static gboolean
|
|
dhcp4_lease_change (NMDevice *self, NMIP4Config *config)
|
|
{
|
|
g_return_val_if_fail (config, FALSE);
|
|
|
|
if (!ip4_config_merge_and_apply (self, config, TRUE)) {
|
|
_LOGW (LOGD_DHCP4, "failed to update IPv4 config for DHCP change.");
|
|
return FALSE;
|
|
}
|
|
|
|
nm_dispatcher_call_device (NM_DISPATCHER_ACTION_DHCP4_CHANGE,
|
|
self,
|
|
NULL,
|
|
NULL, NULL, NULL);
|
|
|
|
nm_device_remove_pending_action (self, NM_PENDING_ACTION_DHCP4, FALSE);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
static gboolean
|
|
dhcp4_restart_cb (gpointer user_data)
|
|
{
|
|
NMDevice *self = user_data;
|
|
NMDevicePrivate *priv;
|
|
NMConnection *connection;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
priv->dhcp4.restart_id = 0;
|
|
connection = nm_device_get_applied_connection (self);
|
|
|
|
if (dhcp4_start (self, connection) == NM_ACT_STAGE_RETURN_FAILURE)
|
|
dhcp_schedule_restart (self, AF_INET, NULL);
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
static void
|
|
dhcp4_fail (NMDevice *self, gboolean timeout)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
_LOGD (LOGD_DHCP4, "DHCPv4 failed: timeout %d, num tries left %u",
|
|
timeout, priv->dhcp4.num_tries_left);
|
|
|
|
dhcp4_cleanup (self, CLEANUP_TYPE_DECONFIGURE, FALSE);
|
|
|
|
/* Don't fail if there are static addresses configured on
|
|
* the device, instead retry after some time.
|
|
*/
|
|
if ( priv->ip4_state == IP_DONE
|
|
&& priv->con_ip4_config
|
|
&& nm_ip4_config_get_num_addresses (priv->con_ip4_config) > 0) {
|
|
dhcp_schedule_restart (self, AF_INET, "device has IP addresses");
|
|
return;
|
|
}
|
|
|
|
if ( priv->dhcp4.num_tries_left == DHCP_NUM_TRIES_MAX
|
|
&& (timeout || (priv->ip4_state == IP_CONF))
|
|
&& !priv->dhcp4.was_active)
|
|
nm_device_activate_schedule_ip4_config_timeout (self);
|
|
else if (priv->ip4_state == IP_DONE || priv->dhcp4.was_active) {
|
|
/* Don't fail immediately when the lease expires but try to
|
|
* restart DHCP for a predefined number of times.
|
|
*/
|
|
if (priv->dhcp4.num_tries_left) {
|
|
priv->dhcp4.num_tries_left--;
|
|
dhcp_schedule_restart (self, AF_INET, "lease expired");
|
|
} else
|
|
nm_device_ip_method_failed (self, AF_INET, NM_DEVICE_STATE_REASON_IP_CONFIG_EXPIRED);
|
|
} else
|
|
g_warn_if_reached ();
|
|
}
|
|
|
|
static void
|
|
dhcp4_dad_cb (NMDevice *self, NMIP4Config **configs, gboolean success)
|
|
{
|
|
if (success)
|
|
nm_device_activate_schedule_ip4_config_result (self, configs[1]);
|
|
else {
|
|
nm_device_state_changed (self, NM_DEVICE_STATE_FAILED,
|
|
NM_DEVICE_STATE_REASON_CONFIG_FAILED);
|
|
}
|
|
}
|
|
|
|
static void
|
|
dhcp4_state_changed (NMDhcpClient *client,
|
|
NMDhcpState state,
|
|
NMIP4Config *ip4_config,
|
|
GHashTable *options,
|
|
const char *event_id,
|
|
gpointer user_data)
|
|
{
|
|
NMDevice *self = NM_DEVICE (user_data);
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMIP4Config *manual, **configs;
|
|
NMConnection *connection;
|
|
|
|
g_return_if_fail (nm_dhcp_client_get_ipv6 (client) == FALSE);
|
|
g_return_if_fail (!ip4_config || NM_IS_IP4_CONFIG (ip4_config));
|
|
|
|
_LOGD (LOGD_DHCP4, "new DHCPv4 client state %d", state);
|
|
|
|
switch (state) {
|
|
case NM_DHCP_STATE_BOUND:
|
|
if (!ip4_config) {
|
|
_LOGW (LOGD_DHCP4, "failed to get IPv4 config in response to DHCP event.");
|
|
dhcp4_fail (self, FALSE);
|
|
break;
|
|
}
|
|
|
|
g_free (priv->dhcp4.pac_url);
|
|
priv->dhcp4.pac_url = g_strdup (g_hash_table_lookup (options, "wpad"));
|
|
nm_device_set_proxy_config (self, priv->dhcp4.pac_url);
|
|
|
|
nm_dhcp4_config_set_options (priv->dhcp4.config, options);
|
|
_notify (self, PROP_DHCP4_CONFIG);
|
|
priv->dhcp4.num_tries_left = DHCP_NUM_TRIES_MAX;
|
|
|
|
if (priv->ip4_state == IP_CONF) {
|
|
connection = nm_device_get_applied_connection (self);
|
|
g_assert (connection);
|
|
|
|
manual = nm_ip4_config_new (nm_device_get_ip_ifindex (self));
|
|
nm_ip4_config_merge_setting (manual,
|
|
nm_connection_get_setting_ip4_config (connection),
|
|
nm_device_get_ip4_route_metric (self));
|
|
|
|
configs = g_new0 (NMIP4Config *, 3);
|
|
configs[0] = manual;
|
|
configs[1] = g_object_ref (ip4_config);
|
|
|
|
ipv4_dad_start (self, configs, dhcp4_dad_cb);
|
|
} else if (priv->ip4_state == IP_DONE) {
|
|
if (dhcp4_lease_change (self, ip4_config))
|
|
nm_device_update_metered (self);
|
|
else
|
|
dhcp4_fail (self, FALSE);
|
|
}
|
|
break;
|
|
case NM_DHCP_STATE_TIMEOUT:
|
|
dhcp4_fail (self, TRUE);
|
|
break;
|
|
case NM_DHCP_STATE_EXPIRE:
|
|
/* Ignore expiry before we even have a lease (NAK, old lease, etc) */
|
|
if (priv->ip4_state == IP_CONF)
|
|
break;
|
|
/* fall through */
|
|
case NM_DHCP_STATE_DONE:
|
|
case NM_DHCP_STATE_FAIL:
|
|
dhcp4_fail (self, FALSE);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
static int
|
|
dhcp4_get_timeout (NMDevice *self, NMSettingIP4Config *s_ip4)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
gs_free char *value = NULL;
|
|
int timeout;
|
|
|
|
timeout = nm_setting_ip_config_get_dhcp_timeout (NM_SETTING_IP_CONFIG (s_ip4));
|
|
if (timeout)
|
|
return timeout;
|
|
|
|
value = nm_config_data_get_connection_default (NM_CONFIG_GET_DATA,
|
|
"ipv4.dhcp-timeout",
|
|
self);
|
|
timeout = _nm_utils_ascii_str_to_int64 (value, 10,
|
|
0, G_MAXINT32, 0);
|
|
if (timeout)
|
|
return timeout;
|
|
|
|
return priv->dhcp_timeout;
|
|
}
|
|
|
|
static NMActStageReturn
|
|
dhcp4_start (NMDevice *self,
|
|
NMConnection *connection)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMSettingIPConfig *s_ip4;
|
|
const guint8 *hw_addr;
|
|
size_t hw_addr_len = 0;
|
|
GByteArray *tmp = NULL;
|
|
|
|
s_ip4 = nm_connection_get_setting_ip4_config (connection);
|
|
|
|
/* Clear old exported DHCP options */
|
|
nm_exported_object_clear_and_unexport (&priv->dhcp4.config);
|
|
priv->dhcp4.config = nm_dhcp4_config_new ();
|
|
|
|
hw_addr = nm_platform_link_get_address (nm_device_get_platform (self), nm_device_get_ip_ifindex (self), &hw_addr_len);
|
|
if (hw_addr_len) {
|
|
tmp = g_byte_array_sized_new (hw_addr_len);
|
|
g_byte_array_append (tmp, hw_addr, hw_addr_len);
|
|
}
|
|
|
|
/* Begin DHCP on the interface */
|
|
g_warn_if_fail (priv->dhcp4.client == NULL);
|
|
priv->dhcp4.client = nm_dhcp_manager_start_ip4 (nm_dhcp_manager_get (),
|
|
nm_device_get_ip_iface (self),
|
|
nm_device_get_ip_ifindex (self),
|
|
tmp,
|
|
nm_connection_get_uuid (connection),
|
|
nm_device_get_ip4_route_metric (self),
|
|
nm_setting_ip_config_get_dhcp_send_hostname (s_ip4),
|
|
nm_setting_ip_config_get_dhcp_hostname (s_ip4),
|
|
nm_setting_ip4_config_get_dhcp_fqdn (NM_SETTING_IP4_CONFIG (s_ip4)),
|
|
nm_setting_ip4_config_get_dhcp_client_id (NM_SETTING_IP4_CONFIG (s_ip4)),
|
|
dhcp4_get_timeout (self, NM_SETTING_IP4_CONFIG (s_ip4)),
|
|
priv->dhcp_anycast_address,
|
|
NULL);
|
|
|
|
if (tmp)
|
|
g_byte_array_free (tmp, TRUE);
|
|
|
|
if (!priv->dhcp4.client)
|
|
return NM_ACT_STAGE_RETURN_FAILURE;
|
|
|
|
priv->dhcp4.state_sigid = g_signal_connect (priv->dhcp4.client,
|
|
NM_DHCP_CLIENT_SIGNAL_STATE_CHANGED,
|
|
G_CALLBACK (dhcp4_state_changed),
|
|
self);
|
|
|
|
nm_device_add_pending_action (self, NM_PENDING_ACTION_DHCP4, TRUE);
|
|
|
|
if (nm_device_sys_iface_state_get (self) == NM_DEVICE_SYS_IFACE_STATE_ASSUME)
|
|
priv->dhcp4.was_active = TRUE;
|
|
|
|
/* DHCP devices will be notified by the DHCP manager when stuff happens */
|
|
return NM_ACT_STAGE_RETURN_POSTPONE;
|
|
}
|
|
|
|
gboolean
|
|
nm_device_dhcp4_renew (NMDevice *self, gboolean release)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMConnection *connection;
|
|
|
|
g_return_val_if_fail (priv->dhcp4.client != NULL, FALSE);
|
|
|
|
_LOGI (LOGD_DHCP4, "DHCPv4 lease renewal requested");
|
|
|
|
/* Terminate old DHCP instance and release the old lease */
|
|
dhcp4_cleanup (self, CLEANUP_TYPE_DECONFIGURE, release);
|
|
|
|
connection = nm_device_get_applied_connection (self);
|
|
g_return_val_if_fail (connection, FALSE);
|
|
|
|
/* Start DHCP again on the interface */
|
|
return dhcp4_start (self, connection) != NM_ACT_STAGE_RETURN_FAILURE;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static GHashTable *shared_ips = NULL;
|
|
|
|
static void
|
|
release_shared_ip (gpointer data)
|
|
{
|
|
g_hash_table_remove (shared_ips, data);
|
|
}
|
|
|
|
static gboolean
|
|
reserve_shared_ip (NMDevice *self, NMSettingIPConfig *s_ip4, NMPlatformIP4Address *address)
|
|
{
|
|
if (G_UNLIKELY (shared_ips == NULL))
|
|
shared_ips = g_hash_table_new (g_direct_hash, g_direct_equal);
|
|
|
|
memset (address, 0, sizeof (*address));
|
|
|
|
if (s_ip4 && nm_setting_ip_config_get_num_addresses (s_ip4)) {
|
|
/* Use the first user-supplied address */
|
|
NMIPAddress *user = nm_setting_ip_config_get_address (s_ip4, 0);
|
|
in_addr_t a;
|
|
|
|
g_assert (user);
|
|
nm_ip_address_get_address_binary (user, &a);
|
|
nm_platform_ip4_address_set_addr (address, a, nm_ip_address_get_prefix (user));
|
|
} else {
|
|
/* Find an unused address in the 10.42.x.x range */
|
|
guint32 start = (guint32) ntohl (0x0a2a0001); /* 10.42.0.1 */
|
|
guint32 count = 0;
|
|
|
|
while (g_hash_table_lookup (shared_ips, GUINT_TO_POINTER (start + count))) {
|
|
count += ntohl (0x100);
|
|
if (count > ntohl (0xFE00)) {
|
|
_LOGE (LOGD_SHARING, "ran out of shared IP addresses!");
|
|
return FALSE;
|
|
}
|
|
}
|
|
nm_platform_ip4_address_set_addr (address, start + count, 24);
|
|
g_hash_table_add (shared_ips, GUINT_TO_POINTER (address->address));
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
static NMIP4Config *
|
|
shared4_new_config (NMDevice *self, NMConnection *connection)
|
|
{
|
|
NMIP4Config *config = NULL;
|
|
NMPlatformIP4Address address;
|
|
|
|
g_return_val_if_fail (self != NULL, NULL);
|
|
|
|
if (!reserve_shared_ip (self, nm_connection_get_setting_ip4_config (connection), &address))
|
|
return NULL;
|
|
|
|
config = nm_ip4_config_new (nm_device_get_ip_ifindex (self));
|
|
address.addr_source = NM_IP_CONFIG_SOURCE_SHARED;
|
|
nm_ip4_config_add_address (config, &address);
|
|
|
|
/* Remove the address lock when the object gets disposed */
|
|
g_object_set_qdata_full (G_OBJECT (config), NM_CACHED_QUARK ("shared-ip"),
|
|
GUINT_TO_POINTER (address.address),
|
|
release_shared_ip);
|
|
|
|
return config;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static gboolean
|
|
connection_ip4_method_requires_carrier (NMConnection *connection,
|
|
gboolean *out_ip4_enabled)
|
|
{
|
|
const char *method = nm_utils_get_ip_config_method (connection, NM_TYPE_SETTING_IP4_CONFIG);
|
|
static const char *ip4_carrier_methods[] = {
|
|
NM_SETTING_IP4_CONFIG_METHOD_AUTO,
|
|
NM_SETTING_IP4_CONFIG_METHOD_LINK_LOCAL,
|
|
NULL
|
|
};
|
|
|
|
if (out_ip4_enabled)
|
|
*out_ip4_enabled = !!strcmp (method, NM_SETTING_IP4_CONFIG_METHOD_DISABLED);
|
|
return g_strv_contains (ip4_carrier_methods, method);
|
|
}
|
|
|
|
static gboolean
|
|
connection_ip6_method_requires_carrier (NMConnection *connection,
|
|
gboolean *out_ip6_enabled)
|
|
{
|
|
const char *method = nm_utils_get_ip_config_method (connection, NM_TYPE_SETTING_IP6_CONFIG);
|
|
static const char *ip6_carrier_methods[] = {
|
|
NM_SETTING_IP6_CONFIG_METHOD_AUTO,
|
|
NM_SETTING_IP6_CONFIG_METHOD_DHCP,
|
|
NM_SETTING_IP6_CONFIG_METHOD_SHARED,
|
|
NM_SETTING_IP6_CONFIG_METHOD_LINK_LOCAL,
|
|
NULL
|
|
};
|
|
|
|
if (out_ip6_enabled)
|
|
*out_ip6_enabled = !!strcmp (method, NM_SETTING_IP6_CONFIG_METHOD_IGNORE);
|
|
return g_strv_contains (ip6_carrier_methods, method);
|
|
}
|
|
|
|
static gboolean
|
|
connection_requires_carrier (NMConnection *connection)
|
|
{
|
|
NMSettingIPConfig *s_ip4, *s_ip6;
|
|
gboolean ip4_carrier_wanted, ip6_carrier_wanted;
|
|
gboolean ip4_used = FALSE, ip6_used = FALSE;
|
|
|
|
ip4_carrier_wanted = connection_ip4_method_requires_carrier (connection, &ip4_used);
|
|
if (ip4_carrier_wanted) {
|
|
/* If IPv4 wants a carrier and cannot fail, the whole connection
|
|
* requires a carrier regardless of the IPv6 method.
|
|
*/
|
|
s_ip4 = nm_connection_get_setting_ip4_config (connection);
|
|
if (s_ip4 && !nm_setting_ip_config_get_may_fail (s_ip4))
|
|
return TRUE;
|
|
}
|
|
|
|
ip6_carrier_wanted = connection_ip6_method_requires_carrier (connection, &ip6_used);
|
|
if (ip6_carrier_wanted) {
|
|
/* If IPv6 wants a carrier and cannot fail, the whole connection
|
|
* requires a carrier regardless of the IPv4 method.
|
|
*/
|
|
s_ip6 = nm_connection_get_setting_ip6_config (connection);
|
|
if (s_ip6 && !nm_setting_ip_config_get_may_fail (s_ip6))
|
|
return TRUE;
|
|
}
|
|
|
|
/* If an IP version wants a carrier and the other IP version isn't
|
|
* used, the connection requires carrier since it will just fail without one.
|
|
*/
|
|
if (ip4_carrier_wanted && !ip6_used)
|
|
return TRUE;
|
|
if (ip6_carrier_wanted && !ip4_used)
|
|
return TRUE;
|
|
|
|
/* If both want a carrier, the whole connection wants a carrier */
|
|
return ip4_carrier_wanted && ip6_carrier_wanted;
|
|
}
|
|
|
|
static gboolean
|
|
have_any_ready_slaves (NMDevice *self, const GSList *slaves)
|
|
{
|
|
const GSList *iter;
|
|
|
|
/* Any enslaved slave is "ready" in the generic case as it's
|
|
* at least >= NM_DEVCIE_STATE_IP_CONFIG and has had Layer 2
|
|
* properties set up.
|
|
*/
|
|
for (iter = slaves; iter; iter = g_slist_next (iter)) {
|
|
if (nm_device_get_enslaved (iter->data))
|
|
return TRUE;
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
static gboolean
|
|
ip4_requires_slaves (NMConnection *connection)
|
|
{
|
|
const char *method;
|
|
|
|
method = nm_utils_get_ip_config_method (connection, NM_TYPE_SETTING_IP4_CONFIG);
|
|
return strcmp (method, NM_SETTING_IP4_CONFIG_METHOD_AUTO) == 0;
|
|
}
|
|
|
|
static NMActStageReturn
|
|
act_stage3_ip4_config_start (NMDevice *self,
|
|
NMIP4Config **out_config,
|
|
NMDeviceStateReason *out_failure_reason)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMConnection *connection;
|
|
NMActStageReturn ret = NM_ACT_STAGE_RETURN_FAILURE;
|
|
const char *method;
|
|
GSList *slaves;
|
|
gboolean ready_slaves;
|
|
|
|
connection = nm_device_get_applied_connection (self);
|
|
g_return_val_if_fail (connection, NM_ACT_STAGE_RETURN_FAILURE);
|
|
|
|
if ( connection_ip4_method_requires_carrier (connection, NULL)
|
|
&& priv->is_master
|
|
&& !priv->carrier) {
|
|
_LOGI (LOGD_IP4 | LOGD_DEVICE,
|
|
"IPv4 config waiting until carrier is on");
|
|
return NM_ACT_STAGE_RETURN_IP_WAIT;
|
|
}
|
|
|
|
if (priv->is_master && ip4_requires_slaves (connection)) {
|
|
/* If the master has no ready slaves, and depends on slaves for
|
|
* a successful IPv4 attempt, then postpone IPv4 addressing.
|
|
*/
|
|
slaves = nm_device_master_get_slaves (self);
|
|
ready_slaves = NM_DEVICE_GET_CLASS (self)->have_any_ready_slaves (self, slaves);
|
|
g_slist_free (slaves);
|
|
|
|
if (ready_slaves == FALSE) {
|
|
_LOGI (LOGD_DEVICE | LOGD_IP4,
|
|
"IPv4 config waiting until slaves are ready");
|
|
return NM_ACT_STAGE_RETURN_IP_WAIT;
|
|
}
|
|
}
|
|
|
|
method = nm_utils_get_ip_config_method (connection, NM_TYPE_SETTING_IP4_CONFIG);
|
|
priv->dhcp4.num_tries_left = DHCP_NUM_TRIES_MAX;
|
|
|
|
/* Start IPv4 addressing based on the method requested */
|
|
if (strcmp (method, NM_SETTING_IP4_CONFIG_METHOD_AUTO) == 0) {
|
|
ret = dhcp4_start (self, connection);
|
|
if (ret == NM_ACT_STAGE_RETURN_FAILURE)
|
|
NM_SET_OUT (out_failure_reason, NM_DEVICE_STATE_REASON_DHCP_START_FAILED);
|
|
} else if (strcmp (method, NM_SETTING_IP4_CONFIG_METHOD_LINK_LOCAL) == 0) {
|
|
ret = ipv4ll_start (self);
|
|
if (ret == NM_ACT_STAGE_RETURN_FAILURE)
|
|
NM_SET_OUT (out_failure_reason, NM_DEVICE_STATE_REASON_AUTOIP_START_FAILED);
|
|
} else if (strcmp (method, NM_SETTING_IP4_CONFIG_METHOD_MANUAL) == 0) {
|
|
NMIP4Config **configs, *config;
|
|
|
|
config = nm_ip4_config_new (nm_device_get_ip_ifindex (self));
|
|
nm_ip4_config_merge_setting (config,
|
|
nm_connection_get_setting_ip4_config (connection),
|
|
nm_device_get_ip4_route_metric (self));
|
|
|
|
configs = g_new0 (NMIP4Config *, 2);
|
|
configs[0] = config;
|
|
ipv4_dad_start (self, configs, ipv4_manual_method_apply);
|
|
ret = NM_ACT_STAGE_RETURN_POSTPONE;
|
|
} else if (strcmp (method, NM_SETTING_IP4_CONFIG_METHOD_SHARED) == 0) {
|
|
if (out_config) {
|
|
*out_config = shared4_new_config (self, connection);
|
|
if (*out_config) {
|
|
priv->dnsmasq_manager = nm_dnsmasq_manager_new (nm_device_get_ip_iface (self));
|
|
ret = NM_ACT_STAGE_RETURN_SUCCESS;
|
|
} else {
|
|
NM_SET_OUT (out_failure_reason, NM_DEVICE_STATE_REASON_IP_CONFIG_UNAVAILABLE);
|
|
ret = NM_ACT_STAGE_RETURN_FAILURE;
|
|
}
|
|
} else
|
|
g_return_val_if_reached (NM_ACT_STAGE_RETURN_FAILURE);
|
|
} else if (strcmp (method, NM_SETTING_IP4_CONFIG_METHOD_DISABLED) == 0)
|
|
ret = NM_ACT_STAGE_RETURN_SUCCESS;
|
|
else
|
|
_LOGW (LOGD_IP4, "unhandled IPv4 config method '%s'; will fail", method);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
/* DHCPv6 stuff */
|
|
|
|
static void
|
|
dhcp6_cleanup (NMDevice *self, CleanupType cleanup_type, gboolean release)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
priv->dhcp6.mode = NM_NDISC_DHCP_LEVEL_NONE;
|
|
g_clear_object (&priv->dhcp6.ip6_config);
|
|
g_clear_pointer (&priv->dhcp6.event_id, g_free);
|
|
nm_clear_g_source (&priv->dhcp6.restart_id);
|
|
|
|
if (priv->dhcp6.client) {
|
|
nm_clear_g_signal_handler (priv->dhcp6.client, &priv->dhcp6.state_sigid);
|
|
nm_clear_g_signal_handler (priv->dhcp6.client, &priv->dhcp6.prefix_sigid);
|
|
|
|
if ( cleanup_type == CLEANUP_TYPE_DECONFIGURE
|
|
|| cleanup_type == CLEANUP_TYPE_REMOVED)
|
|
nm_dhcp_client_stop (priv->dhcp6.client, release);
|
|
|
|
g_clear_object (&priv->dhcp6.client);
|
|
}
|
|
|
|
nm_device_remove_pending_action (self, NM_PENDING_ACTION_DHCP6, FALSE);
|
|
|
|
if (priv->dhcp6.config) {
|
|
nm_exported_object_clear_and_unexport (&priv->dhcp6.config);
|
|
_notify (self, PROP_DHCP6_CONFIG);
|
|
}
|
|
}
|
|
|
|
static void
|
|
_ip6_config_merge_default (gpointer value, gpointer user_data)
|
|
{
|
|
NMIP6Config *src = (NMIP6Config *) value;
|
|
NMIP6Config *dst = (NMIP6Config *) user_data;
|
|
|
|
nm_ip6_config_merge (dst, src, NM_IP_CONFIG_MERGE_DEFAULT);
|
|
}
|
|
|
|
static gboolean
|
|
ip6_config_merge_and_apply (NMDevice *self,
|
|
gboolean commit)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMConnection *connection;
|
|
gboolean success;
|
|
NMIP6Config *composite;
|
|
gboolean has_direct_route;
|
|
const struct in6_addr *gateway;
|
|
gboolean connection_has_default_route, connection_is_never_default;
|
|
gboolean routes_full_sync;
|
|
gboolean ignore_auto_routes = FALSE;
|
|
gboolean ignore_auto_dns = FALSE;
|
|
gboolean auto_method = FALSE;
|
|
const char *token = NULL;
|
|
|
|
/* Apply ignore-auto-routes and ignore-auto-dns settings */
|
|
connection = nm_device_get_applied_connection (self);
|
|
if (connection) {
|
|
NMSettingIPConfig *s_ip6 = nm_connection_get_setting_ip6_config (connection);
|
|
|
|
if (s_ip6) {
|
|
NMSettingIP6Config *ip6 = NM_SETTING_IP6_CONFIG (s_ip6);
|
|
|
|
ignore_auto_routes = nm_setting_ip_config_get_ignore_auto_routes (s_ip6);
|
|
ignore_auto_dns = nm_setting_ip_config_get_ignore_auto_dns (s_ip6);
|
|
|
|
if (nm_setting_ip6_config_get_addr_gen_mode (ip6) == NM_SETTING_IP6_CONFIG_ADDR_GEN_MODE_EUI64)
|
|
token = nm_setting_ip6_config_get_token (ip6);
|
|
|
|
if (NM_IN_STRSET (nm_setting_ip_config_get_method (s_ip6),
|
|
NM_SETTING_IP6_CONFIG_METHOD_AUTO,
|
|
NM_SETTING_IP6_CONFIG_METHOD_DHCP))
|
|
auto_method = TRUE;
|
|
}
|
|
}
|
|
|
|
/* If no config was passed in, create a new one */
|
|
composite = nm_ip6_config_new (nm_device_get_ip_ifindex (self));
|
|
nm_ip6_config_set_privacy (composite,
|
|
priv->ndisc ?
|
|
priv->ndisc_use_tempaddr :
|
|
NM_SETTING_IP6_CONFIG_PRIVACY_UNKNOWN);
|
|
init_ip6_config_dns_priority (self, composite);
|
|
|
|
if (commit)
|
|
ensure_con_ip6_config (self);
|
|
|
|
/* Merge all the IP configs into the composite config */
|
|
if (priv->ac_ip6_config) {
|
|
nm_ip6_config_merge (composite, priv->ac_ip6_config,
|
|
(ignore_auto_routes ? NM_IP_CONFIG_MERGE_NO_ROUTES : 0)
|
|
| (ignore_auto_dns ? NM_IP_CONFIG_MERGE_NO_DNS : 0));
|
|
}
|
|
if (priv->dhcp6.ip6_config) {
|
|
nm_ip6_config_merge (composite, priv->dhcp6.ip6_config,
|
|
(ignore_auto_routes ? NM_IP_CONFIG_MERGE_NO_ROUTES : 0)
|
|
| (ignore_auto_dns ? NM_IP_CONFIG_MERGE_NO_DNS : 0));
|
|
}
|
|
|
|
g_slist_foreach (priv->vpn6_configs, _ip6_config_merge_default, composite);
|
|
|
|
if (priv->ext_ip6_config)
|
|
nm_ip6_config_merge (composite, priv->ext_ip6_config, NM_IP_CONFIG_MERGE_DEFAULT);
|
|
|
|
/* Merge WWAN config *last* to ensure modem-given settings overwrite
|
|
* any external stuff set by pppd or other scripts.
|
|
*/
|
|
if (priv->wwan_ip6_config) {
|
|
nm_ip6_config_merge (composite, priv->wwan_ip6_config,
|
|
(ignore_auto_routes ? NM_IP_CONFIG_MERGE_NO_ROUTES : 0)
|
|
| (ignore_auto_dns ? NM_IP_CONFIG_MERGE_NO_DNS : 0));
|
|
}
|
|
|
|
/* Merge user overrides into the composite config. For assumed connections,
|
|
* con_ip6_config is empty. */
|
|
if (priv->con_ip6_config)
|
|
nm_ip6_config_merge (composite, priv->con_ip6_config, NM_IP_CONFIG_MERGE_DEFAULT);
|
|
|
|
/* Add the default route.
|
|
*
|
|
* We keep track of the default route of a device in a private field.
|
|
* NMDevice needs to know the default route at this point, because the gateway
|
|
* might require a direct route (see below).
|
|
*
|
|
* But also, we don't want to add the default route to priv->ip6_config,
|
|
* because the default route from the setting might not be the same that
|
|
* NMDefaultRouteManager eventually configures (because the it might
|
|
* tweak the effective metric).
|
|
*/
|
|
|
|
/* unless we come to a different conclusion below, we have no default route and
|
|
* the route is assumed. */
|
|
priv->default_route.v6_has = FALSE;
|
|
priv->default_route.v6_is_assumed = TRUE;
|
|
|
|
if (!commit) {
|
|
/* during a non-commit event, we always pickup whatever is configured. */
|
|
goto END_ADD_DEFAULT_ROUTE;
|
|
}
|
|
|
|
/* a generated-assumed connection detects the default route from the platform,
|
|
* but if the IP method is automatic we need to update the default route to
|
|
* maintain connectivity.
|
|
*/
|
|
if (nm_device_sys_iface_state_is_external (self) && !auto_method)
|
|
goto END_ADD_DEFAULT_ROUTE;
|
|
|
|
/* At this point, we treat assumed and non-assumed connections alike.
|
|
* For assumed connections we do that because we still manage RA and DHCP
|
|
* leases for them, so we must extend/update the default route on commits.
|
|
*/
|
|
|
|
connection_has_default_route
|
|
= nm_default_route_manager_ip6_connection_has_default_route (nm_netns_get_default_route_manager (priv->netns),
|
|
connection, &connection_is_never_default);
|
|
|
|
if ( !priv->v6_commit_first_time
|
|
&& connection_is_never_default) {
|
|
/* If the connection is explicitly configured as never-default, we enforce the (absence of the)
|
|
* default-route only once. That allows the user to configure a connection as never-default,
|
|
* but he can add default routes externally (via a dispatcher script) and NM will not interfere. */
|
|
goto END_ADD_DEFAULT_ROUTE;
|
|
}
|
|
|
|
/* we are about to commit (for a non-assumed connection). Enforce whatever we have
|
|
* configured. */
|
|
priv->default_route.v6_is_assumed = FALSE;
|
|
|
|
if (!connection_has_default_route)
|
|
goto END_ADD_DEFAULT_ROUTE;
|
|
|
|
if (!nm_ip6_config_get_num_addresses (composite)) {
|
|
/* without addresses we can have no default route. */
|
|
goto END_ADD_DEFAULT_ROUTE;
|
|
}
|
|
|
|
gateway = nm_ip6_config_get_gateway (composite);
|
|
if (!gateway)
|
|
goto END_ADD_DEFAULT_ROUTE;
|
|
|
|
|
|
has_direct_route = nm_ip6_config_get_direct_route_for_host (composite, gateway) != NULL;
|
|
|
|
|
|
|
|
priv->default_route.v6_has = TRUE;
|
|
memset (&priv->default_route.v6, 0, sizeof (priv->default_route.v6));
|
|
priv->default_route.v6.rt_source = NM_IP_CONFIG_SOURCE_USER;
|
|
priv->default_route.v6.gateway = *gateway;
|
|
priv->default_route.v6.metric = route_metric_with_penalty (self,
|
|
nm_device_get_ip6_route_metric (self));
|
|
priv->default_route.v6.mss = nm_ip6_config_get_mss (composite);
|
|
|
|
if (!has_direct_route) {
|
|
NMPlatformIP6Route r = priv->default_route.v6;
|
|
|
|
/* add a direct route to the gateway */
|
|
r.network = *gateway;
|
|
r.plen = 128;
|
|
r.gateway = in6addr_any;
|
|
nm_ip6_config_add_route (composite, &r);
|
|
}
|
|
|
|
END_ADD_DEFAULT_ROUTE:
|
|
|
|
if (priv->default_route.v6_is_assumed) {
|
|
/* If above does not explicitly assign a default route, we always pick up the
|
|
* default route based on what is currently configured.
|
|
* That means that even managed connections with never-default, can
|
|
* get a default route (if configured externally).
|
|
*/
|
|
priv->default_route.v6_has = _device_get_default_route_from_platform (self, AF_INET6, (NMPlatformIPRoute *) &priv->default_route.v6);
|
|
}
|
|
|
|
/* Allow setting MTU etc */
|
|
if (commit) {
|
|
NMUtilsIPv6IfaceId iid;
|
|
|
|
if (token && nm_utils_ipv6_interface_identifier_get_from_token (&iid, token)) {
|
|
nm_platform_link_set_ipv6_token (nm_device_get_platform (self),
|
|
nm_device_get_ip_ifindex (self),
|
|
iid);
|
|
}
|
|
}
|
|
|
|
routes_full_sync = commit
|
|
&& priv->v6_commit_first_time
|
|
&& !nm_device_sys_iface_state_is_external_or_assume (self);
|
|
|
|
success = nm_device_set_ip6_config (self, composite, commit, routes_full_sync);
|
|
g_object_unref (composite);
|
|
if (commit)
|
|
priv->v6_commit_first_time = FALSE;
|
|
return success;
|
|
}
|
|
|
|
static gboolean
|
|
dhcp6_lease_change (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMSettingsConnection *settings_connection;
|
|
|
|
if (priv->dhcp6.ip6_config == NULL) {
|
|
_LOGW (LOGD_DHCP6, "failed to get DHCPv6 config for rebind");
|
|
return FALSE;
|
|
}
|
|
|
|
g_assert (priv->dhcp6.client); /* sanity check */
|
|
|
|
settings_connection = nm_device_get_settings_connection (self);
|
|
g_assert (settings_connection);
|
|
|
|
/* Apply the updated config */
|
|
if (!ip6_config_merge_and_apply (self, TRUE)) {
|
|
_LOGW (LOGD_DHCP6, "failed to update IPv6 config in response to DHCP event");
|
|
return FALSE;
|
|
}
|
|
|
|
nm_dispatcher_call_device (NM_DISPATCHER_ACTION_DHCP6_CHANGE,
|
|
self,
|
|
NULL,
|
|
NULL, NULL, NULL);
|
|
|
|
nm_device_remove_pending_action (self, NM_PENDING_ACTION_DHCP6, FALSE);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
static gboolean
|
|
dhcp6_restart_cb (gpointer user_data)
|
|
{
|
|
NMDevice *self = user_data;
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
priv->dhcp6.restart_id = 0;
|
|
|
|
if (!dhcp6_start (self, FALSE))
|
|
dhcp_schedule_restart (self, AF_INET6, NULL);
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
static void
|
|
dhcp_schedule_restart (NMDevice *self, int family, const char *reason)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
gboolean inet4;
|
|
guint tries_left;
|
|
gs_free char *tries_str = NULL;
|
|
|
|
g_return_if_fail (family == AF_INET || family == AF_INET6);
|
|
inet4 = family == AF_INET;
|
|
|
|
tries_left = inet4 ? priv->dhcp4.num_tries_left : priv->dhcp6.num_tries_left;
|
|
if (tries_left != DHCP_NUM_TRIES_MAX)
|
|
tries_str = g_strdup_printf (", %u tries left", tries_left + 1);
|
|
|
|
_LOGI (inet4 ? LOGD_DHCP4 : LOGD_DHCP6,
|
|
"scheduling DHCPv%c restart in %u seconds%s%s%s%s",
|
|
inet4 ? '4' : '6',
|
|
DHCP_RESTART_TIMEOUT,
|
|
tries_str ? tries_str : "",
|
|
NM_PRINT_FMT_QUOTED (reason, " (reason: ", reason, ")", ""));
|
|
|
|
if (inet4) {
|
|
priv->dhcp4.restart_id = g_timeout_add_seconds (DHCP_RESTART_TIMEOUT,
|
|
dhcp4_restart_cb, self);
|
|
} else {
|
|
priv->dhcp6.restart_id = g_timeout_add_seconds (DHCP_RESTART_TIMEOUT,
|
|
dhcp6_restart_cb, self);
|
|
}
|
|
}
|
|
|
|
static void
|
|
dhcp6_fail (NMDevice *self, gboolean timeout)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
_LOGD (LOGD_DHCP6, "DHCPv6 failed: timeout %d, num tries left %u",
|
|
timeout, priv->dhcp6.num_tries_left);
|
|
|
|
dhcp6_cleanup (self, CLEANUP_TYPE_DECONFIGURE, FALSE);
|
|
|
|
if (priv->dhcp6.mode == NM_NDISC_DHCP_LEVEL_MANAGED) {
|
|
/* Don't fail if there are static addresses configured on
|
|
* the device, instead retry after some time.
|
|
*/
|
|
if ( priv->ip6_state == IP_DONE
|
|
&& priv->con_ip6_config
|
|
&& nm_ip6_config_get_num_addresses (priv->con_ip6_config)) {
|
|
dhcp_schedule_restart (self, AF_INET6, "device has IP addresses");
|
|
return;
|
|
}
|
|
|
|
if ( priv->dhcp6.num_tries_left == DHCP_NUM_TRIES_MAX
|
|
&& (timeout || (priv->ip6_state == IP_CONF))
|
|
&& !priv->dhcp6.was_active)
|
|
nm_device_activate_schedule_ip6_config_timeout (self);
|
|
else if (priv->ip6_state == IP_DONE || priv->dhcp6.was_active) {
|
|
/* Don't fail immediately when the lease expires but try to
|
|
* restart DHCP for a predefined number of times.
|
|
*/
|
|
if (priv->dhcp6.num_tries_left) {
|
|
priv->dhcp6.num_tries_left--;
|
|
dhcp_schedule_restart (self, AF_INET6, "lease expired");
|
|
} else
|
|
nm_device_ip_method_failed (self, AF_INET6, NM_DEVICE_STATE_REASON_IP_CONFIG_EXPIRED);
|
|
} else
|
|
g_warn_if_reached ();
|
|
} else {
|
|
/* not a hard failure; just live with the RA info */
|
|
if (priv->ip6_state == IP_CONF)
|
|
nm_device_activate_schedule_ip6_config_result (self);
|
|
}
|
|
}
|
|
|
|
static void
|
|
dhcp6_timeout (NMDevice *self, NMDhcpClient *client)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->dhcp6.mode == NM_NDISC_DHCP_LEVEL_MANAGED)
|
|
dhcp6_fail (self, TRUE);
|
|
else {
|
|
/* not a hard failure; just live with the RA info */
|
|
dhcp6_cleanup (self, CLEANUP_TYPE_DECONFIGURE, FALSE);
|
|
if (priv->ip6_state == IP_CONF)
|
|
nm_device_activate_schedule_ip6_config_result (self);
|
|
}
|
|
}
|
|
|
|
static void
|
|
dhcp6_state_changed (NMDhcpClient *client,
|
|
NMDhcpState state,
|
|
NMIP6Config *ip6_config,
|
|
GHashTable *options,
|
|
const char *event_id,
|
|
gpointer user_data)
|
|
{
|
|
NMDevice *self = NM_DEVICE (user_data);
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
guint i;
|
|
|
|
g_return_if_fail (nm_dhcp_client_get_ipv6 (client) == TRUE);
|
|
g_return_if_fail (!ip6_config || NM_IS_IP6_CONFIG (ip6_config));
|
|
|
|
_LOGD (LOGD_DHCP6, "new DHCPv6 client state %d", state);
|
|
|
|
switch (state) {
|
|
case NM_DHCP_STATE_BOUND:
|
|
/* If the server sends multiple IPv6 addresses, we receive a state
|
|
* changed event for each of them. Use the event ID to merge IPv6
|
|
* addresses from the same transaction into a single configuration.
|
|
*/
|
|
if ( ip6_config
|
|
&& event_id
|
|
&& priv->dhcp6.event_id
|
|
&& !strcmp (event_id, priv->dhcp6.event_id)) {
|
|
for (i = 0; i < nm_ip6_config_get_num_addresses (ip6_config); i++) {
|
|
nm_ip6_config_add_address (priv->dhcp6.ip6_config,
|
|
nm_ip6_config_get_address (ip6_config, i));
|
|
}
|
|
} else {
|
|
g_clear_object (&priv->dhcp6.ip6_config);
|
|
g_clear_pointer (&priv->dhcp6.event_id, g_free);
|
|
if (ip6_config) {
|
|
priv->dhcp6.ip6_config = g_object_ref (ip6_config);
|
|
priv->dhcp6.event_id = g_strdup (event_id);
|
|
nm_dhcp6_config_set_options (priv->dhcp6.config, options);
|
|
_notify (self, PROP_DHCP6_CONFIG);
|
|
}
|
|
}
|
|
|
|
priv->dhcp6.num_tries_left = DHCP_NUM_TRIES_MAX;
|
|
|
|
if (priv->ip6_state == IP_CONF) {
|
|
if (priv->dhcp6.ip6_config == NULL) {
|
|
nm_device_ip_method_failed (self, AF_INET6, NM_DEVICE_STATE_REASON_DHCP_FAILED);
|
|
break;
|
|
}
|
|
nm_device_activate_schedule_ip6_config_result (self);
|
|
} else if (priv->ip6_state == IP_DONE)
|
|
if (!dhcp6_lease_change (self))
|
|
dhcp6_fail (self, FALSE);
|
|
break;
|
|
case NM_DHCP_STATE_TIMEOUT:
|
|
dhcp6_timeout (self, client);
|
|
break;
|
|
case NM_DHCP_STATE_EXPIRE:
|
|
/* Ignore expiry before we even have a lease (NAK, old lease, etc) */
|
|
if (priv->ip6_state != IP_CONF)
|
|
dhcp6_fail (self, FALSE);
|
|
break;
|
|
case NM_DHCP_STATE_DONE:
|
|
/* In IPv6 info-only mode, the client doesn't handle leases so it
|
|
* may exit right after getting a response from the server. That's
|
|
* normal. In that case we just ignore the exit.
|
|
*/
|
|
if (priv->dhcp6.mode == NM_NDISC_DHCP_LEVEL_OTHERCONF)
|
|
break;
|
|
/* fall through */
|
|
case NM_DHCP_STATE_FAIL:
|
|
dhcp6_fail (self, FALSE);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void
|
|
dhcp6_prefix_delegated (NMDhcpClient *client,
|
|
NMPlatformIP6Address *prefix,
|
|
gpointer user_data)
|
|
{
|
|
NMDevice *self = NM_DEVICE (user_data);
|
|
|
|
/* Just re-emit. The device just contributes the prefix to the
|
|
* pool in NMPolicy, which decides about subnet allocation
|
|
* on the shared devices. */
|
|
g_signal_emit (self, signals[IP6_PREFIX_DELEGATED], 0, prefix);
|
|
}
|
|
|
|
static gboolean
|
|
dhcp6_start_with_link_ready (NMDevice *self, NMConnection *connection)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMSettingIPConfig *s_ip6;
|
|
GByteArray *tmp = NULL;
|
|
const guint8 *hw_addr;
|
|
size_t hw_addr_len = 0;
|
|
const NMPlatformIP6Address *ll_addr = NULL;
|
|
|
|
g_assert (connection);
|
|
s_ip6 = nm_connection_get_setting_ip6_config (connection);
|
|
g_assert (s_ip6);
|
|
|
|
if (priv->ext_ip6_config_captured)
|
|
ll_addr = nm_ip6_config_get_address_first_nontentative (priv->ext_ip6_config_captured, TRUE);
|
|
|
|
if (!ll_addr) {
|
|
_LOGW (LOGD_DHCP6, "can't start DHCPv6: no link-local address");
|
|
return FALSE;
|
|
}
|
|
|
|
hw_addr = nm_platform_link_get_address (nm_device_get_platform (self), nm_device_get_ip_ifindex (self), &hw_addr_len);
|
|
if (hw_addr_len) {
|
|
tmp = g_byte_array_sized_new (hw_addr_len);
|
|
g_byte_array_append (tmp, hw_addr, hw_addr_len);
|
|
}
|
|
|
|
priv->dhcp6.client = nm_dhcp_manager_start_ip6 (nm_dhcp_manager_get (),
|
|
nm_device_get_ip_iface (self),
|
|
nm_device_get_ip_ifindex (self),
|
|
tmp,
|
|
&ll_addr->address,
|
|
nm_connection_get_uuid (connection),
|
|
nm_device_get_ip6_route_metric (self),
|
|
nm_setting_ip_config_get_dhcp_send_hostname (s_ip6),
|
|
nm_setting_ip_config_get_dhcp_hostname (s_ip6),
|
|
priv->dhcp_timeout,
|
|
priv->dhcp_anycast_address,
|
|
(priv->dhcp6.mode == NM_NDISC_DHCP_LEVEL_OTHERCONF) ? TRUE : FALSE,
|
|
nm_setting_ip6_config_get_ip6_privacy (NM_SETTING_IP6_CONFIG (s_ip6)),
|
|
priv->dhcp6.needed_prefixes);
|
|
if (tmp)
|
|
g_byte_array_free (tmp, TRUE);
|
|
|
|
if (priv->dhcp6.client) {
|
|
priv->dhcp6.state_sigid = g_signal_connect (priv->dhcp6.client,
|
|
NM_DHCP_CLIENT_SIGNAL_STATE_CHANGED,
|
|
G_CALLBACK (dhcp6_state_changed),
|
|
self);
|
|
priv->dhcp6.prefix_sigid = g_signal_connect (priv->dhcp6.client,
|
|
NM_DHCP_CLIENT_SIGNAL_PREFIX_DELEGATED,
|
|
G_CALLBACK (dhcp6_prefix_delegated),
|
|
self);
|
|
}
|
|
|
|
if (nm_device_sys_iface_state_get (self) == NM_DEVICE_SYS_IFACE_STATE_ASSUME)
|
|
priv->dhcp6.was_active = TRUE;
|
|
|
|
return !!priv->dhcp6.client;
|
|
}
|
|
|
|
static gboolean
|
|
dhcp6_start (NMDevice *self, gboolean wait_for_ll)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMConnection *connection;
|
|
NMSettingIPConfig *s_ip6;
|
|
|
|
nm_exported_object_clear_and_unexport (&priv->dhcp6.config);
|
|
priv->dhcp6.config = nm_dhcp6_config_new ();
|
|
|
|
g_warn_if_fail (priv->dhcp6.ip6_config == NULL);
|
|
g_clear_object (&priv->dhcp6.ip6_config);
|
|
g_clear_pointer (&priv->dhcp6.event_id, g_free);
|
|
|
|
connection = nm_device_get_applied_connection (self);
|
|
g_assert (connection);
|
|
s_ip6 = nm_connection_get_setting_ip6_config (connection);
|
|
if (!nm_setting_ip_config_get_may_fail (s_ip6) ||
|
|
!strcmp (nm_setting_ip_config_get_method (s_ip6), NM_SETTING_IP6_CONFIG_METHOD_DHCP))
|
|
nm_device_add_pending_action (self, NM_PENDING_ACTION_DHCP6, TRUE);
|
|
|
|
if (wait_for_ll) {
|
|
NMActStageReturn ret;
|
|
|
|
/* ensure link local is ready... */
|
|
ret = linklocal6_start (self);
|
|
if (ret == NM_ACT_STAGE_RETURN_POSTPONE) {
|
|
/* success; wait for the LL address to show up */
|
|
return TRUE;
|
|
}
|
|
|
|
/* success; already have the LL address; kick off DHCP */
|
|
g_assert (ret == NM_ACT_STAGE_RETURN_SUCCESS);
|
|
}
|
|
|
|
if (!dhcp6_start_with_link_ready (self, connection))
|
|
return FALSE;
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
gboolean
|
|
nm_device_dhcp6_renew (NMDevice *self, gboolean release)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
g_return_val_if_fail (priv->dhcp6.client != NULL, FALSE);
|
|
|
|
_LOGI (LOGD_DHCP6, "DHCPv6 lease renewal requested");
|
|
|
|
/* Terminate old DHCP instance and release the old lease */
|
|
dhcp6_cleanup (self, CLEANUP_TYPE_DECONFIGURE, release);
|
|
|
|
/* Start DHCP again on the interface */
|
|
return dhcp6_start (self, FALSE);
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
/*
|
|
* Called on the requesting interface when a subnet can't be obtained
|
|
* from known prefixes for a newly active shared connection.
|
|
*/
|
|
void
|
|
nm_device_request_ip6_prefixes (NMDevice *self, int needed_prefixes)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
priv->dhcp6.needed_prefixes = needed_prefixes;
|
|
|
|
if (priv->dhcp6.client) {
|
|
_LOGD (LOGD_IP6, "ipv6-pd: asking DHCPv6 for %d prefixes", needed_prefixes);
|
|
nm_device_dhcp6_renew (self, FALSE);
|
|
} else {
|
|
_LOGI (LOGD_IP6, "ipv6-pd: device doesn't use DHCPv6, can't request prefixes");
|
|
}
|
|
}
|
|
|
|
gboolean
|
|
nm_device_needs_ip6_subnet (NMDevice *self)
|
|
{
|
|
return NM_DEVICE_GET_PRIVATE (self)->needs_ip6_subnet;
|
|
}
|
|
|
|
/*
|
|
* Called on the ipv6.method=shared interface when a new subnet is allocated
|
|
* or the prefix from which it is allocated is renewed.
|
|
*/
|
|
void
|
|
nm_device_use_ip6_subnet (NMDevice *self, const NMPlatformIP6Address *subnet)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMPlatformIP6Address address = *subnet;
|
|
|
|
if (!priv->ac_ip6_config)
|
|
priv->ac_ip6_config = nm_ip6_config_new (nm_device_get_ip_ifindex (self));
|
|
|
|
/* Assign a ::1 address in the subnet for us. */
|
|
address.address.s6_addr32[3] |= htonl (1);
|
|
nm_ip6_config_add_address (priv->ac_ip6_config, &address);
|
|
|
|
_LOGD (LOGD_IP6, "ipv6-pd: using %s address (preferred for %u seconds)",
|
|
nm_utils_inet6_ntop (&address.address, NULL),
|
|
subnet->preferred);
|
|
|
|
/* This also updates the ndisc if there are actual changes. */
|
|
if (!ip6_config_merge_and_apply (self, TRUE))
|
|
_LOGW (LOGD_IP6, "ipv6-pd: failed applying IP6 config for connection sharing");
|
|
}
|
|
|
|
/*
|
|
* Called whenever the policy picks a default IPv6 device.
|
|
* The ipv6.method=shared devices just reuse its DNS configuration.
|
|
*/
|
|
void
|
|
nm_device_copy_ip6_dns_config (NMDevice *self, NMDevice *from_device)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMIP6Config *from_config = NULL;
|
|
int i;
|
|
|
|
if (priv->ac_ip6_config) {
|
|
nm_ip6_config_reset_nameservers (priv->ac_ip6_config);
|
|
nm_ip6_config_reset_searches (priv->ac_ip6_config);
|
|
} else
|
|
priv->ac_ip6_config = nm_ip6_config_new (nm_device_get_ip_ifindex (self));
|
|
|
|
if (from_device)
|
|
from_config = nm_device_get_ip6_config (from_device);
|
|
if (!from_config)
|
|
return;
|
|
|
|
for (i = 0; i < nm_ip6_config_get_num_nameservers (from_config); i++) {
|
|
nm_ip6_config_add_nameserver (priv->ac_ip6_config,
|
|
nm_ip6_config_get_nameserver (from_config, i));
|
|
}
|
|
|
|
for (i = 0; i < nm_ip6_config_get_num_searches (from_config); i++) {
|
|
nm_ip6_config_add_search (priv->ac_ip6_config,
|
|
nm_ip6_config_get_search (from_config, i));
|
|
}
|
|
|
|
if (!ip6_config_merge_and_apply (self, TRUE))
|
|
_LOGW (LOGD_IP6, "ipv6-pd: failed applying DNS config for connection sharing");
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static void
|
|
linklocal6_cleanup (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
nm_clear_g_source (&priv->linklocal6_timeout_id);
|
|
}
|
|
|
|
static void
|
|
linklocal6_failed (NMDevice *self)
|
|
{
|
|
linklocal6_cleanup (self);
|
|
nm_device_activate_schedule_ip6_config_timeout (self);
|
|
}
|
|
|
|
static gboolean
|
|
linklocal6_timeout_cb (gpointer user_data)
|
|
{
|
|
NMDevice *self = user_data;
|
|
|
|
_LOGD (LOGD_DEVICE, "linklocal6: waiting for link-local addresses failed due to timeout");
|
|
linklocal6_failed (self);
|
|
return G_SOURCE_REMOVE;
|
|
}
|
|
|
|
static void
|
|
linklocal6_complete (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMConnection *connection;
|
|
const char *method;
|
|
|
|
g_assert (priv->linklocal6_timeout_id);
|
|
g_assert (nm_ip6_config_get_address_first_nontentative (priv->ip6_config, TRUE));
|
|
|
|
linklocal6_cleanup (self);
|
|
|
|
connection = nm_device_get_applied_connection (self);
|
|
g_assert (connection);
|
|
|
|
method = nm_utils_get_ip_config_method (connection, NM_TYPE_SETTING_IP6_CONFIG);
|
|
|
|
_LOGD (LOGD_DEVICE, "linklocal6: waiting for link-local addresses successful, continue with method %s", method);
|
|
|
|
if ( strcmp (method, NM_SETTING_IP6_CONFIG_METHOD_AUTO) == 0
|
|
|| strcmp (method, NM_SETTING_IP6_CONFIG_METHOD_SHARED) == 0) {
|
|
if (!addrconf6_start_with_link_ready (self)) {
|
|
/* Time out IPv6 instead of failing the entire activation */
|
|
nm_device_activate_schedule_ip6_config_timeout (self);
|
|
}
|
|
} else if (strcmp (method, NM_SETTING_IP6_CONFIG_METHOD_DHCP) == 0) {
|
|
if (!dhcp6_start_with_link_ready (self, connection)) {
|
|
/* Time out IPv6 instead of failing the entire activation */
|
|
nm_device_activate_schedule_ip6_config_timeout (self);
|
|
}
|
|
} else if (strcmp (method, NM_SETTING_IP6_CONFIG_METHOD_LINK_LOCAL) == 0)
|
|
nm_device_activate_schedule_ip6_config_result (self);
|
|
else
|
|
g_return_if_fail (FALSE);
|
|
}
|
|
|
|
static void
|
|
check_and_add_ipv6ll_addr (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
int ip_ifindex = nm_device_get_ip_ifindex (self);
|
|
struct in6_addr lladdr;
|
|
guint i, n;
|
|
NMConnection *connection;
|
|
NMSettingIP6Config *s_ip6 = NULL;
|
|
GError *error = NULL;
|
|
|
|
if (priv->nm_ipv6ll == FALSE)
|
|
return;
|
|
|
|
if (priv->ip6_config) {
|
|
n = nm_ip6_config_get_num_addresses (priv->ip6_config);
|
|
for (i = 0; i < n; i++) {
|
|
const NMPlatformIP6Address *addr;
|
|
|
|
addr = nm_ip6_config_get_address (priv->ip6_config, i);
|
|
if ( IN6_IS_ADDR_LINKLOCAL (&addr->address)
|
|
&& !(addr->n_ifa_flags & IFA_F_DADFAILED)) {
|
|
/* Already have an LL address, nothing to do */
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
|
|
memset (&lladdr, 0, sizeof (lladdr));
|
|
lladdr.s6_addr16[0] = htons (0xfe80);
|
|
|
|
connection = nm_device_get_applied_connection (self);
|
|
if (connection)
|
|
s_ip6 = NM_SETTING_IP6_CONFIG (nm_connection_get_setting_ip6_config (connection));
|
|
|
|
if (s_ip6 && nm_setting_ip6_config_get_addr_gen_mode (s_ip6) == NM_SETTING_IP6_CONFIG_ADDR_GEN_MODE_STABLE_PRIVACY) {
|
|
NMUtilsStableType stable_type;
|
|
const char *stable_id;
|
|
|
|
stable_id = _get_stable_id (self, connection, &stable_type);
|
|
if ( !stable_id
|
|
|| !nm_utils_ipv6_addr_set_stable_privacy (stable_type,
|
|
&lladdr,
|
|
nm_device_get_iface (self),
|
|
stable_id,
|
|
priv->linklocal6_dad_counter++,
|
|
&error)) {
|
|
_LOGW (LOGD_IP6, "linklocal6: failed to generate an address: %s", error->message);
|
|
g_clear_error (&error);
|
|
linklocal6_failed (self);
|
|
return;
|
|
}
|
|
_LOGD (LOGD_IP6, "linklocal6: using IPv6 stable-privacy addressing");
|
|
} else {
|
|
NMUtilsIPv6IfaceId iid;
|
|
|
|
if (priv->linklocal6_timeout_id) {
|
|
/* We already started and attempt to add a LL address. For the EUI-64
|
|
* mode we can't pick a new one, we'll just fail. */
|
|
_LOGW (LOGD_IP6, "linklocal6: DAD failed for an EUI-64 address");
|
|
linklocal6_failed (self);
|
|
return;
|
|
}
|
|
|
|
if (!nm_device_get_ip_iface_identifier (self, &iid, TRUE)) {
|
|
_LOGW (LOGD_IP6, "linklocal6: failed to get interface identifier; IPv6 cannot continue");
|
|
return;
|
|
}
|
|
_LOGD (LOGD_IP6, "linklocal6: using EUI-64 identifier to generate IPv6LL address");
|
|
|
|
nm_utils_ipv6_addr_set_interface_identifier (&lladdr, iid);
|
|
}
|
|
|
|
_LOGD (LOGD_IP6, "linklocal6: adding IPv6LL address %s", nm_utils_inet6_ntop (&lladdr, NULL));
|
|
if (!nm_platform_ip6_address_add (nm_device_get_platform (self),
|
|
ip_ifindex,
|
|
lladdr,
|
|
64,
|
|
in6addr_any,
|
|
NM_PLATFORM_LIFETIME_PERMANENT,
|
|
NM_PLATFORM_LIFETIME_PERMANENT,
|
|
0)) {
|
|
_LOGW (LOGD_IP6, "failed to add IPv6 link-local address %s",
|
|
nm_utils_inet6_ntop (&lladdr, NULL));
|
|
}
|
|
}
|
|
|
|
static NMActStageReturn
|
|
linklocal6_start (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMConnection *connection;
|
|
const char *method;
|
|
|
|
linklocal6_cleanup (self);
|
|
|
|
if ( priv->ip6_config
|
|
&& nm_ip6_config_get_address_first_nontentative (priv->ip6_config, TRUE))
|
|
return NM_ACT_STAGE_RETURN_SUCCESS;
|
|
|
|
connection = nm_device_get_applied_connection (self);
|
|
g_assert (connection);
|
|
|
|
method = nm_utils_get_ip_config_method (connection, NM_TYPE_SETTING_IP6_CONFIG);
|
|
_LOGD (LOGD_DEVICE, "linklocal6: starting IPv6 with method '%s', but the device has no link-local addresses configured. Wait.", method);
|
|
|
|
check_and_add_ipv6ll_addr (self);
|
|
|
|
/* Depending on the network and what the 'dad_transmits' and 'retrans_time_ms'
|
|
* sysctl values are, DAD for the IPv6LL address may take quite a while.
|
|
* FIXME: use dad/retrans sysctl values if they are higher than a minimum time.
|
|
* (rh #1101809)
|
|
*/
|
|
priv->linklocal6_timeout_id = g_timeout_add_seconds (15, linklocal6_timeout_cb, self);
|
|
|
|
return NM_ACT_STAGE_RETURN_POSTPONE;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
gint64
|
|
nm_device_get_configured_mtu_from_connection_default (NMDevice *self,
|
|
const char *property_name)
|
|
{
|
|
gs_free char *str = NULL;
|
|
|
|
str = nm_config_data_get_connection_default (NM_CONFIG_GET_DATA, property_name, self);
|
|
return _nm_utils_ascii_str_to_int64 (str, 10, 0, G_MAXUINT32, -1);
|
|
}
|
|
|
|
guint32
|
|
nm_device_get_configured_mtu_for_wired (NMDevice *self, gboolean *out_is_user_config)
|
|
{
|
|
NMConnection *connection;
|
|
NMSettingWired *setting;
|
|
gint64 mtu_default;
|
|
guint32 mtu;
|
|
|
|
nm_assert (NM_IS_DEVICE (self));
|
|
nm_assert (out_is_user_config);
|
|
|
|
connection = nm_device_get_applied_connection (self);
|
|
if (!connection)
|
|
g_return_val_if_reached (0);
|
|
|
|
setting = nm_connection_get_setting_wired (connection);
|
|
|
|
if (setting) {
|
|
mtu = nm_setting_wired_get_mtu (setting);
|
|
if (mtu) {
|
|
*out_is_user_config = TRUE;
|
|
return mtu;
|
|
}
|
|
}
|
|
|
|
mtu_default = nm_device_get_configured_mtu_from_connection_default (self, "ethernet.mtu");
|
|
if (mtu_default >= 0) {
|
|
*out_is_user_config = TRUE;
|
|
return (guint32) mtu_default;
|
|
}
|
|
|
|
*out_is_user_config = FALSE;
|
|
return NM_DEVICE_DEFAULT_MTU_WIRED;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static void
|
|
_commit_mtu (NMDevice *self, const NMIP4Config *config)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
guint32 ip6_mtu, ip6_mtu_orig;
|
|
guint32 mtu_desired, mtu_desired_orig;
|
|
guint32 mtu_plat;
|
|
struct {
|
|
gboolean initialized;
|
|
guint32 value;
|
|
} ip6_mtu_sysctl = { 0, };
|
|
int ifindex;
|
|
char sbuf[64], sbuf1[64], sbuf2[64];
|
|
|
|
ifindex = nm_device_get_ip_ifindex (self);
|
|
if (ifindex <= 0)
|
|
return;
|
|
|
|
if (nm_device_sys_iface_state_is_external_or_assume (self)) {
|
|
/* for assumed connections we don't tamper with the MTU. This is
|
|
* a bug and supposed to be fixed by the unmanaged/assumed rework. */
|
|
return;
|
|
}
|
|
|
|
{
|
|
gboolean mtu_is_user_config = FALSE;
|
|
guint32 mtu = 0;
|
|
|
|
/* preferably, get the MTU from explict user-configuration.
|
|
* Only if that fails, look at the current @config (which contains
|
|
* MTUs from DHCP/PPP) or maybe fallback to a device-specific MTU. */
|
|
|
|
if (NM_DEVICE_GET_CLASS (self)->get_configured_mtu)
|
|
mtu = NM_DEVICE_GET_CLASS (self)->get_configured_mtu (self, &mtu_is_user_config);
|
|
|
|
if (mtu_is_user_config)
|
|
mtu_desired = mtu;
|
|
else {
|
|
if (config)
|
|
mtu_desired = nm_ip4_config_get_mtu (config);
|
|
else
|
|
mtu_desired = 0;
|
|
if (!mtu_desired && !priv->mtu_initialized) {
|
|
/* there is no MTU specified, and this is the first commit of the MTU.
|
|
* Reset a per-device MTU default, as returned from get_configured_mtu().
|
|
*
|
|
* The device might choose not to return a default MTU via get_configured_mtu()
|
|
* to suppress this behavior. */
|
|
mtu_desired = mtu;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (mtu_desired && mtu_desired < 1280) {
|
|
NMSettingIPConfig *s_ip6;
|
|
|
|
s_ip6 = (NMSettingIPConfig *) nm_device_get_applied_setting (self, NM_TYPE_SETTING_IP6_CONFIG);
|
|
if ( s_ip6
|
|
&& !NM_IN_STRSET (nm_setting_ip_config_get_method (s_ip6),
|
|
NM_SETTING_IP6_CONFIG_METHOD_IGNORE)) {
|
|
/* the interface has IPv6 enabled. The MTU with IPv6 cannot be smaller
|
|
* then 1280.
|
|
*
|
|
* For slave-devices (that don't have @s_ip6 we) don't do this fixup because
|
|
* it's anyway an unsolved problem when the slave configures a conflicting
|
|
* MTU. */
|
|
mtu_desired = 1280;
|
|
}
|
|
}
|
|
|
|
ip6_mtu = priv->ip6_mtu;
|
|
if (!ip6_mtu && !priv->mtu_initialized) {
|
|
/* initially, if the IPv6 MTU is not specified, grow it as large as the
|
|
* link MTU @mtu_desired. Only exception is, if @mtu_desired is so small
|
|
* to disable IPv6. */
|
|
if (mtu_desired >= 1280)
|
|
ip6_mtu = mtu_desired;
|
|
}
|
|
|
|
priv->mtu_initialized = TRUE;
|
|
|
|
if (!ip6_mtu && !mtu_desired)
|
|
return;
|
|
|
|
mtu_desired_orig = mtu_desired;
|
|
ip6_mtu_orig = ip6_mtu;
|
|
|
|
mtu_plat = nm_platform_link_get_mtu (nm_device_get_platform (self), ifindex);
|
|
|
|
if (ip6_mtu) {
|
|
ip6_mtu = NM_MAX (1280, ip6_mtu);
|
|
|
|
if (!mtu_desired)
|
|
mtu_desired = mtu_plat;
|
|
|
|
if (mtu_desired) {
|
|
mtu_desired = NM_MAX (1280, mtu_desired);
|
|
|
|
if (mtu_desired < ip6_mtu)
|
|
ip6_mtu = mtu_desired;
|
|
}
|
|
}
|
|
|
|
_LOGT (LOGD_DEVICE, "mtu: device-mtu: %u%s, ipv6-mtu: %u%s, ifindex: %d",
|
|
(guint) mtu_desired,
|
|
mtu_desired == mtu_desired_orig ? "" : nm_sprintf_buf (sbuf1, " (was %u)", (guint) mtu_desired_orig),
|
|
(guint) ip6_mtu,
|
|
ip6_mtu == ip6_mtu_orig ? "" : nm_sprintf_buf (sbuf2, " (was %u)", (guint) ip6_mtu_orig),
|
|
ifindex);
|
|
|
|
#define _IP6_MTU_SYS() \
|
|
({ \
|
|
if (!ip6_mtu_sysctl.initialized) { \
|
|
ip6_mtu_sysctl.value = nm_device_ipv6_sysctl_get_uint32 (self, "mtu", 0); \
|
|
ip6_mtu_sysctl.initialized = TRUE; \
|
|
} \
|
|
ip6_mtu_sysctl.value; \
|
|
})
|
|
if ( (mtu_desired && mtu_desired != mtu_plat)
|
|
|| (ip6_mtu && ip6_mtu != _IP6_MTU_SYS ())) {
|
|
|
|
if (!priv->mtu_initial && !priv->ip6_mtu_initial) {
|
|
/* before touching any of the MTU paramters, record the
|
|
* original setting to restore on deactivation. */
|
|
priv->mtu_initial = mtu_plat;
|
|
priv->ip6_mtu_initial = _IP6_MTU_SYS ();
|
|
}
|
|
|
|
if (mtu_desired && mtu_desired != mtu_plat)
|
|
nm_platform_link_set_mtu (nm_device_get_platform (self), ifindex, mtu_desired);
|
|
|
|
if (ip6_mtu && ip6_mtu != _IP6_MTU_SYS ()) {
|
|
nm_device_ipv6_sysctl_set (self, "mtu",
|
|
nm_sprintf_buf (sbuf, "%u", (unsigned) ip6_mtu));
|
|
}
|
|
}
|
|
#undef _IP6_MTU_SYS
|
|
}
|
|
|
|
static void
|
|
ndisc_config_changed (NMNDisc *ndisc, const NMNDiscData *rdata, guint changed_int, NMDevice *self)
|
|
{
|
|
NMNDiscConfigMap changed = changed_int;
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
int i;
|
|
int system_support;
|
|
guint32 ifa_flags = 0x00;
|
|
|
|
/*
|
|
* Check, whether kernel is recent enough to help user space handling RA.
|
|
* If it's not supported, we have no ipv6-privacy and must add autoconf
|
|
* addresses as /128. The reason for the /128 is to prevent the kernel
|
|
* from adding a prefix route for this address.
|
|
**/
|
|
system_support = nm_platform_check_support_kernel_extended_ifa_flags (nm_device_get_platform (self));
|
|
|
|
if (system_support)
|
|
ifa_flags = IFA_F_NOPREFIXROUTE;
|
|
if ( priv->ndisc_use_tempaddr == NM_SETTING_IP6_CONFIG_PRIVACY_PREFER_TEMP_ADDR
|
|
|| priv->ndisc_use_tempaddr == NM_SETTING_IP6_CONFIG_PRIVACY_PREFER_PUBLIC_ADDR)
|
|
{
|
|
/* without system_support, this flag will be ignored. Still set it, doesn't seem to do any harm. */
|
|
ifa_flags |= IFA_F_MANAGETEMPADDR;
|
|
}
|
|
|
|
g_return_if_fail (priv->act_request);
|
|
|
|
if (!priv->ac_ip6_config)
|
|
priv->ac_ip6_config = nm_ip6_config_new (nm_device_get_ip_ifindex (self));
|
|
|
|
if (changed & NM_NDISC_CONFIG_GATEWAYS) {
|
|
/* Use the first gateway as ordered in neighbor discovery cache. */
|
|
if (rdata->gateways_n)
|
|
nm_ip6_config_set_gateway (priv->ac_ip6_config, &rdata->gateways[0].address);
|
|
else
|
|
nm_ip6_config_set_gateway (priv->ac_ip6_config, NULL);
|
|
}
|
|
|
|
if (changed & NM_NDISC_CONFIG_ADDRESSES) {
|
|
/* Rebuild address list from neighbor discovery cache. */
|
|
nm_ip6_config_reset_addresses (priv->ac_ip6_config);
|
|
|
|
/* ndisc->addresses contains at most max_addresses entries.
|
|
* This is different from what the kernel does, which
|
|
* also counts static and temporary addresses when checking
|
|
* max_addresses.
|
|
**/
|
|
for (i = 0; i < rdata->addresses_n; i++) {
|
|
const NMNDiscAddress *discovered_address = &rdata->addresses[i];
|
|
NMPlatformIP6Address address;
|
|
|
|
memset (&address, 0, sizeof (address));
|
|
address.address = discovered_address->address;
|
|
address.plen = system_support ? 64 : 128;
|
|
address.timestamp = discovered_address->timestamp;
|
|
address.lifetime = discovered_address->lifetime;
|
|
address.preferred = discovered_address->preferred;
|
|
if (address.preferred > address.lifetime)
|
|
address.preferred = address.lifetime;
|
|
address.addr_source = NM_IP_CONFIG_SOURCE_NDISC;
|
|
address.n_ifa_flags = ifa_flags;
|
|
|
|
nm_ip6_config_add_address (priv->ac_ip6_config, &address);
|
|
}
|
|
}
|
|
|
|
if (changed & NM_NDISC_CONFIG_ROUTES) {
|
|
/* Rebuild route list from neighbor discovery cache. */
|
|
nm_ip6_config_reset_routes (priv->ac_ip6_config);
|
|
|
|
for (i = 0; i < rdata->routes_n; i++) {
|
|
const NMNDiscRoute *discovered_route = &rdata->routes[i];
|
|
const NMPlatformIP6Route route = {
|
|
.network = discovered_route->network,
|
|
.plen = discovered_route->plen,
|
|
.gateway = discovered_route->gateway,
|
|
.rt_source = NM_IP_CONFIG_SOURCE_NDISC,
|
|
.metric = nm_device_get_ip6_route_metric (self),
|
|
};
|
|
|
|
nm_ip6_config_add_route (priv->ac_ip6_config, &route);
|
|
}
|
|
}
|
|
|
|
if (changed & NM_NDISC_CONFIG_DNS_SERVERS) {
|
|
/* Rebuild DNS server list from neighbor discovery cache. */
|
|
nm_ip6_config_reset_nameservers (priv->ac_ip6_config);
|
|
|
|
for (i = 0; i < rdata->dns_servers_n; i++)
|
|
nm_ip6_config_add_nameserver (priv->ac_ip6_config, &rdata->dns_servers[i].address);
|
|
}
|
|
|
|
if (changed & NM_NDISC_CONFIG_DNS_DOMAINS) {
|
|
/* Rebuild domain list from neighbor discovery cache. */
|
|
nm_ip6_config_reset_searches (priv->ac_ip6_config);
|
|
|
|
for (i = 0; i < rdata->dns_domains_n; i++)
|
|
nm_ip6_config_add_search (priv->ac_ip6_config, rdata->dns_domains[i].domain);
|
|
}
|
|
|
|
if (changed & NM_NDISC_CONFIG_DHCP_LEVEL) {
|
|
dhcp6_cleanup (self, CLEANUP_TYPE_DECONFIGURE, TRUE);
|
|
|
|
priv->dhcp6.mode = rdata->dhcp_level;
|
|
if (priv->dhcp6.mode != NM_NDISC_DHCP_LEVEL_NONE) {
|
|
_LOGD (LOGD_DEVICE | LOGD_DHCP6,
|
|
"Activation: Stage 3 of 5 (IP Configure Start) starting DHCPv6"
|
|
" as requested by IPv6 router...");
|
|
if (!dhcp6_start (self, FALSE)) {
|
|
if (priv->dhcp6.mode == NM_NDISC_DHCP_LEVEL_MANAGED) {
|
|
nm_device_state_changed (self, NM_DEVICE_STATE_FAILED,
|
|
NM_DEVICE_STATE_REASON_DHCP_START_FAILED);
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (changed & NM_NDISC_CONFIG_HOP_LIMIT)
|
|
nm_platform_sysctl_set_ip6_hop_limit_safe (nm_device_get_platform (self), nm_device_get_ip_iface (self), rdata->hop_limit);
|
|
|
|
if (changed & NM_NDISC_CONFIG_MTU) {
|
|
if (priv->ip6_mtu != rdata->mtu) {
|
|
_LOGD (LOGD_DEVICE, "mtu: set IPv6 MTU to %u", (guint) rdata->mtu);
|
|
priv->ip6_mtu = rdata->mtu;
|
|
}
|
|
}
|
|
|
|
nm_device_activate_schedule_ip6_config_result (self);
|
|
}
|
|
|
|
static void
|
|
ndisc_ra_timeout (NMNDisc *ndisc, NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
/* We don't want to stop listening for router advertisements completely,
|
|
* but instead let device activation continue activating. If an RA
|
|
* shows up later, we'll use it as long as the device is not disconnected.
|
|
*/
|
|
|
|
_LOGD (LOGD_IP6, "timed out waiting for IPv6 router advertisement");
|
|
if (priv->ip6_state == IP_CONF) {
|
|
/* If RA is our only source of addressing information and we don't
|
|
* ever receive one, then time out IPv6. But if there is other
|
|
* IPv6 configuration, like manual IPv6 addresses or external IPv6
|
|
* config, consider that sufficient for IPv6 success.
|
|
*/
|
|
if ( priv->ip6_config
|
|
&& nm_ip6_config_get_address_first_nontentative (priv->ip6_config, FALSE))
|
|
nm_device_activate_schedule_ip6_config_result (self);
|
|
else
|
|
nm_device_activate_schedule_ip6_config_timeout (self);
|
|
}
|
|
}
|
|
|
|
static gboolean
|
|
addrconf6_start_with_link_ready (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMUtilsIPv6IfaceId iid;
|
|
|
|
g_assert (priv->ndisc);
|
|
|
|
if (nm_device_get_ip_iface_identifier (self, &iid, FALSE)) {
|
|
_LOGD (LOGD_IP6, "addrconf6: using the device EUI-64 identifier");
|
|
nm_ndisc_set_iid (priv->ndisc, iid);
|
|
} else {
|
|
/* Don't abort the addrconf at this point -- if ndisc needs the iid
|
|
* it will notice this itself. */
|
|
_LOGI (LOGD_IP6, "addrconf6: no interface identifier; IPv6 adddress creation may fail");
|
|
}
|
|
|
|
/* Apply any manual configuration before starting RA */
|
|
if (!ip6_config_merge_and_apply (self, TRUE))
|
|
_LOGW (LOGD_IP6, "failed to apply manual IPv6 configuration");
|
|
|
|
/* XXX: These sysctls would probably be better set by the lndp ndisc itself. */
|
|
switch (nm_ndisc_get_node_type (priv->ndisc)) {
|
|
case NM_NDISC_NODE_TYPE_HOST:
|
|
/* Accepting prefixes from discovered routers. */
|
|
nm_device_ipv6_sysctl_set (self, "accept_ra", "1");
|
|
nm_device_ipv6_sysctl_set (self, "accept_ra_defrtr", "0");
|
|
nm_device_ipv6_sysctl_set (self, "accept_ra_pinfo", "0");
|
|
nm_device_ipv6_sysctl_set (self, "accept_ra_rtr_pref", "0");
|
|
break;
|
|
case NM_NDISC_NODE_TYPE_ROUTER:
|
|
/* We're the router. */
|
|
nm_device_ipv6_sysctl_set (self, "forwarding", "1");
|
|
nm_device_activate_schedule_ip6_config_result (self);
|
|
priv->needs_ip6_subnet = TRUE;
|
|
g_signal_emit (self, signals[IP6_SUBNET_NEEDED], 0);
|
|
break;
|
|
default:
|
|
g_assert_not_reached ();
|
|
}
|
|
|
|
priv->ndisc_changed_id = g_signal_connect (priv->ndisc,
|
|
NM_NDISC_CONFIG_RECEIVED,
|
|
G_CALLBACK (ndisc_config_changed),
|
|
self);
|
|
priv->ndisc_timeout_id = g_signal_connect (priv->ndisc,
|
|
NM_NDISC_RA_TIMEOUT,
|
|
G_CALLBACK (ndisc_ra_timeout),
|
|
self);
|
|
|
|
ndisc_set_router_config (priv->ndisc, self);
|
|
nm_ndisc_start (priv->ndisc);
|
|
return TRUE;
|
|
}
|
|
|
|
static NMNDiscNodeType
|
|
ndisc_node_type (NMDevice *self)
|
|
{
|
|
NMConnection *connection;
|
|
|
|
connection = nm_device_get_applied_connection (self);
|
|
g_assert (connection);
|
|
|
|
if (strcmp (nm_utils_get_ip_config_method (connection, NM_TYPE_SETTING_IP6_CONFIG),
|
|
NM_SETTING_IP4_CONFIG_METHOD_SHARED) == 0)
|
|
return NM_NDISC_NODE_TYPE_ROUTER;
|
|
else
|
|
return NM_NDISC_NODE_TYPE_HOST;
|
|
}
|
|
|
|
static gboolean
|
|
addrconf6_start (NMDevice *self, NMSettingIP6ConfigPrivacy use_tempaddr)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMConnection *connection;
|
|
NMActStageReturn ret;
|
|
NMSettingIP6Config *s_ip6 = NULL;
|
|
GError *error = NULL;
|
|
NMUtilsStableType stable_type;
|
|
const char *stable_id;
|
|
|
|
connection = nm_device_get_applied_connection (self);
|
|
g_assert (connection);
|
|
|
|
g_warn_if_fail (priv->ac_ip6_config == NULL);
|
|
if (priv->ac_ip6_config) {
|
|
g_object_unref (priv->ac_ip6_config);
|
|
priv->ac_ip6_config = NULL;
|
|
}
|
|
|
|
s_ip6 = NM_SETTING_IP6_CONFIG (nm_connection_get_setting_ip6_config (connection));
|
|
g_assert (s_ip6);
|
|
|
|
stable_id = _get_stable_id (self, connection, &stable_type);
|
|
if (stable_id) {
|
|
priv->ndisc = nm_lndp_ndisc_new (nm_device_get_platform (self),
|
|
nm_device_get_ip_ifindex (self),
|
|
nm_device_get_ip_iface (self),
|
|
stable_type,
|
|
stable_id,
|
|
nm_setting_ip6_config_get_addr_gen_mode (s_ip6),
|
|
ndisc_node_type (self),
|
|
&error);
|
|
}
|
|
if (!priv->ndisc) {
|
|
_LOGE (LOGD_IP6, "addrconf6: failed to start neighbor discovery: %s", error->message);
|
|
g_error_free (error);
|
|
return FALSE;
|
|
}
|
|
|
|
priv->ndisc_use_tempaddr = use_tempaddr;
|
|
|
|
if ( NM_IN_SET (use_tempaddr, NM_SETTING_IP6_CONFIG_PRIVACY_PREFER_TEMP_ADDR, NM_SETTING_IP6_CONFIG_PRIVACY_PREFER_PUBLIC_ADDR)
|
|
&& !nm_platform_check_support_kernel_extended_ifa_flags (nm_device_get_platform (self))) {
|
|
_LOGW (LOGD_IP6, "The kernel does not support extended IFA_FLAGS needed by NM for "
|
|
"IPv6 private addresses. This feature is not available");
|
|
}
|
|
|
|
if (!nm_setting_ip_config_get_may_fail (nm_connection_get_setting_ip6_config (connection)))
|
|
nm_device_add_pending_action (self, NM_PENDING_ACTION_AUTOCONF6, TRUE);
|
|
|
|
/* ensure link local is ready... */
|
|
ret = linklocal6_start (self);
|
|
if (ret == NM_ACT_STAGE_RETURN_POSTPONE) {
|
|
/* success; wait for the LL address to show up */
|
|
return TRUE;
|
|
}
|
|
|
|
/* success; already have the LL address; kick off neighbor discovery */
|
|
g_assert (ret == NM_ACT_STAGE_RETURN_SUCCESS);
|
|
return addrconf6_start_with_link_ready (self);
|
|
}
|
|
|
|
static void
|
|
addrconf6_cleanup (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
nm_clear_g_signal_handler (priv->ndisc, &priv->ndisc_changed_id);
|
|
nm_clear_g_signal_handler (priv->ndisc, &priv->ndisc_timeout_id);
|
|
|
|
nm_device_remove_pending_action (self, NM_PENDING_ACTION_AUTOCONF6, FALSE);
|
|
|
|
g_clear_object (&priv->ac_ip6_config);
|
|
g_clear_object (&priv->ndisc);
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static const char *ip6_properties_to_save[] = {
|
|
"accept_ra",
|
|
"accept_ra_defrtr",
|
|
"accept_ra_pinfo",
|
|
"accept_ra_rtr_pref",
|
|
"forwarding",
|
|
"disable_ipv6",
|
|
"hop_limit",
|
|
"use_tempaddr",
|
|
};
|
|
|
|
static void
|
|
save_ip6_properties (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
const char *ifname = nm_device_get_ip_iface (self);
|
|
char *value;
|
|
int i;
|
|
|
|
g_hash_table_remove_all (priv->ip6_saved_properties);
|
|
|
|
for (i = 0; i < G_N_ELEMENTS (ip6_properties_to_save); i++) {
|
|
value = nm_platform_sysctl_get (nm_device_get_platform (self), NMP_SYSCTL_PATHID_ABSOLUTE (nm_utils_ip6_property_path (ifname, ip6_properties_to_save[i])));
|
|
if (value) {
|
|
g_hash_table_insert (priv->ip6_saved_properties,
|
|
(char *) ip6_properties_to_save[i],
|
|
value);
|
|
}
|
|
}
|
|
}
|
|
|
|
static void
|
|
restore_ip6_properties (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
GHashTableIter iter;
|
|
gpointer key, value;
|
|
|
|
g_hash_table_iter_init (&iter, priv->ip6_saved_properties);
|
|
while (g_hash_table_iter_next (&iter, &key, &value)) {
|
|
/* Don't touch "disable_ipv6" if we're doing userland IPv6LL */
|
|
if (priv->nm_ipv6ll && strcmp (key, "disable_ipv6") == 0)
|
|
continue;
|
|
nm_device_ipv6_sysctl_set (self, key, value);
|
|
}
|
|
}
|
|
|
|
static inline void
|
|
set_disable_ipv6 (NMDevice *self, const char *value)
|
|
{
|
|
/* We only touch disable_ipv6 when NM is not managing the IPv6LL address */
|
|
if (NM_DEVICE_GET_PRIVATE (self)->nm_ipv6ll == FALSE)
|
|
nm_device_ipv6_sysctl_set (self, "disable_ipv6", value);
|
|
}
|
|
|
|
static inline void
|
|
set_nm_ipv6ll (NMDevice *self, gboolean enable)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
int ifindex = nm_device_get_ip_ifindex (self);
|
|
char *value;
|
|
|
|
if (!nm_platform_check_support_user_ipv6ll (nm_device_get_platform (self)))
|
|
return;
|
|
|
|
priv->nm_ipv6ll = enable;
|
|
if (ifindex > 0) {
|
|
NMPlatformError plerr;
|
|
const char *detail = enable ? "enable" : "disable";
|
|
|
|
_LOGD (LOGD_IP6, "will %s userland IPv6LL", detail);
|
|
plerr = nm_platform_link_set_user_ipv6ll_enabled (nm_device_get_platform (self), ifindex, enable);
|
|
if (plerr != NM_PLATFORM_ERROR_SUCCESS) {
|
|
_NMLOG (plerr == NM_PLATFORM_ERROR_NOT_FOUND ? LOGL_DEBUG : LOGL_WARN,
|
|
LOGD_IP6,
|
|
"failed to %s userspace IPv6LL address handling (%s)",
|
|
detail,
|
|
nm_platform_error_to_string (plerr));
|
|
}
|
|
|
|
if (enable) {
|
|
/* Bounce IPv6 to ensure the kernel stops IPv6LL address generation */
|
|
value = nm_platform_sysctl_get (nm_device_get_platform (self),
|
|
NMP_SYSCTL_PATHID_ABSOLUTE (nm_utils_ip6_property_path (nm_device_get_ip_iface (self), "disable_ipv6")));
|
|
if (g_strcmp0 (value, "0") == 0)
|
|
nm_device_ipv6_sysctl_set (self, "disable_ipv6", "1");
|
|
g_free (value);
|
|
|
|
/* Ensure IPv6 is enabled */
|
|
nm_device_ipv6_sysctl_set (self, "disable_ipv6", "0");
|
|
}
|
|
|
|
}
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static NMSettingIP6ConfigPrivacy
|
|
_ip6_privacy_clamp (NMSettingIP6ConfigPrivacy use_tempaddr)
|
|
{
|
|
switch (use_tempaddr) {
|
|
case NM_SETTING_IP6_CONFIG_PRIVACY_DISABLED:
|
|
case NM_SETTING_IP6_CONFIG_PRIVACY_PREFER_TEMP_ADDR:
|
|
case NM_SETTING_IP6_CONFIG_PRIVACY_PREFER_PUBLIC_ADDR:
|
|
return use_tempaddr;
|
|
default:
|
|
return NM_SETTING_IP6_CONFIG_PRIVACY_UNKNOWN;
|
|
}
|
|
}
|
|
|
|
static NMSettingIP6ConfigPrivacy
|
|
_ip6_privacy_get (NMDevice *self)
|
|
{
|
|
NMSettingIP6ConfigPrivacy ip6_privacy;
|
|
gs_free char *value = NULL;
|
|
NMConnection *connection;
|
|
|
|
g_return_val_if_fail (self, NM_SETTING_IP6_CONFIG_PRIVACY_UNKNOWN);
|
|
|
|
/* 1.) First look at the per-connection setting. If it is not -1 (unknown),
|
|
* use it. */
|
|
connection = nm_device_get_applied_connection (self);
|
|
if (connection) {
|
|
NMSettingIPConfig *s_ip6 = nm_connection_get_setting_ip6_config (connection);
|
|
|
|
if (s_ip6) {
|
|
ip6_privacy = nm_setting_ip6_config_get_ip6_privacy (NM_SETTING_IP6_CONFIG (s_ip6));
|
|
ip6_privacy = _ip6_privacy_clamp (ip6_privacy);
|
|
if (ip6_privacy != NM_SETTING_IP6_CONFIG_PRIVACY_UNKNOWN)
|
|
return ip6_privacy;
|
|
}
|
|
}
|
|
|
|
value = nm_config_data_get_connection_default (NM_CONFIG_GET_DATA,
|
|
"ipv6.ip6-privacy", self);
|
|
|
|
/* 2.) use the default value from the configuration. */
|
|
ip6_privacy = _nm_utils_ascii_str_to_int64 (value, 10,
|
|
NM_SETTING_IP6_CONFIG_PRIVACY_UNKNOWN,
|
|
NM_SETTING_IP6_CONFIG_PRIVACY_PREFER_TEMP_ADDR,
|
|
NM_SETTING_IP6_CONFIG_PRIVACY_UNKNOWN);
|
|
if (ip6_privacy != NM_SETTING_IP6_CONFIG_PRIVACY_UNKNOWN)
|
|
return ip6_privacy;
|
|
|
|
/* 3.) No valid default-value configured. Fallback to reading sysctl.
|
|
*
|
|
* Instead of reading static config files in /etc, just read the current sysctl value.
|
|
* This works as NM only writes to "/proc/sys/net/ipv6/conf/IFNAME/use_tempaddr", but leaves
|
|
* the "default" entry untouched. */
|
|
ip6_privacy = nm_platform_sysctl_get_int32 (nm_device_get_platform (self), NMP_SYSCTL_PATHID_ABSOLUTE ("/proc/sys/net/ipv6/conf/default/use_tempaddr"), NM_SETTING_IP6_CONFIG_PRIVACY_UNKNOWN);
|
|
return _ip6_privacy_clamp (ip6_privacy);
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static gboolean
|
|
ip6_requires_slaves (NMConnection *connection)
|
|
{
|
|
const char *method;
|
|
|
|
method = nm_utils_get_ip_config_method (connection, NM_TYPE_SETTING_IP6_CONFIG);
|
|
|
|
/* SLAAC, DHCP, and Link-Local depend on connectivity (and thus slaves)
|
|
* to complete addressing. SLAAC and DHCP need a peer to provide a prefix.
|
|
*/
|
|
return strcmp (method, NM_SETTING_IP6_CONFIG_METHOD_AUTO) == 0
|
|
|| strcmp (method, NM_SETTING_IP6_CONFIG_METHOD_DHCP) == 0;
|
|
}
|
|
|
|
static NMActStageReturn
|
|
act_stage3_ip6_config_start (NMDevice *self,
|
|
NMIP6Config **out_config,
|
|
NMDeviceStateReason *out_failure_reason)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMActStageReturn ret = NM_ACT_STAGE_RETURN_FAILURE;
|
|
NMConnection *connection;
|
|
const char *method;
|
|
NMSettingIP6ConfigPrivacy ip6_privacy = NM_SETTING_IP6_CONFIG_PRIVACY_UNKNOWN;
|
|
const char *ip6_privacy_str = "0";
|
|
GSList *slaves;
|
|
gboolean ready_slaves;
|
|
|
|
connection = nm_device_get_applied_connection (self);
|
|
g_return_val_if_fail (connection, NM_ACT_STAGE_RETURN_FAILURE);
|
|
|
|
if ( connection_ip6_method_requires_carrier (connection, NULL)
|
|
&& priv->is_master
|
|
&& !priv->carrier) {
|
|
_LOGI (LOGD_IP6 | LOGD_DEVICE,
|
|
"IPv6 config waiting until carrier is on");
|
|
return NM_ACT_STAGE_RETURN_IP_WAIT;
|
|
}
|
|
|
|
if (priv->is_master && ip6_requires_slaves (connection)) {
|
|
/* If the master has no ready slaves, and depends on slaves for
|
|
* a successful IPv6 attempt, then postpone IPv6 addressing.
|
|
*/
|
|
slaves = nm_device_master_get_slaves (self);
|
|
ready_slaves = NM_DEVICE_GET_CLASS (self)->have_any_ready_slaves (self, slaves);
|
|
g_slist_free (slaves);
|
|
|
|
if (ready_slaves == FALSE) {
|
|
_LOGI (LOGD_DEVICE | LOGD_IP6,
|
|
"IPv6 config waiting until slaves are ready");
|
|
return NM_ACT_STAGE_RETURN_IP_WAIT;
|
|
}
|
|
}
|
|
|
|
priv->dhcp6.mode = NM_NDISC_DHCP_LEVEL_NONE;
|
|
priv->dhcp6.num_tries_left = DHCP_NUM_TRIES_MAX;
|
|
|
|
method = nm_utils_get_ip_config_method (connection, NM_TYPE_SETTING_IP6_CONFIG);
|
|
|
|
if (strcmp (method, NM_SETTING_IP6_CONFIG_METHOD_IGNORE) == 0) {
|
|
if (!priv->master) {
|
|
gboolean old_nm_ipv6ll = priv->nm_ipv6ll;
|
|
|
|
/* When activating an IPv6 'ignore' connection we need to revert back
|
|
* to kernel IPv6LL, but the kernel won't actually assign an address
|
|
* to the interface until disable_ipv6 is bounced.
|
|
*/
|
|
set_nm_ipv6ll (self, FALSE);
|
|
if (old_nm_ipv6ll == TRUE)
|
|
nm_device_ipv6_sysctl_set (self, "disable_ipv6", "1");
|
|
restore_ip6_properties (self);
|
|
}
|
|
return NM_ACT_STAGE_RETURN_IP_DONE;
|
|
}
|
|
|
|
/* Ensure the MTU makes sense. If it was below 1280 the kernel would not
|
|
* expose any ipv6 sysctls or allow presence of any addresses on the interface,
|
|
* including LL, which * would make it impossible to autoconfigure MTU to a
|
|
* correct value. */
|
|
_commit_mtu (self, priv->ip4_config);
|
|
|
|
/* Any method past this point requires an IPv6LL address. Use NM-controlled
|
|
* IPv6LL if this is not an assumed connection, since assumed connections
|
|
* will already have IPv6 set up.
|
|
*/
|
|
if (!nm_device_sys_iface_state_is_external_or_assume (self))
|
|
set_nm_ipv6ll (self, TRUE);
|
|
|
|
/* Re-enable IPv6 on the interface */
|
|
set_disable_ipv6 (self, "0");
|
|
|
|
ip6_privacy = _ip6_privacy_get (self);
|
|
|
|
if ( strcmp (method, NM_SETTING_IP6_CONFIG_METHOD_AUTO) == 0
|
|
|| strcmp (method, NM_SETTING_IP6_CONFIG_METHOD_SHARED) == 0) {
|
|
if (!addrconf6_start (self, ip6_privacy)) {
|
|
/* IPv6 might be disabled; allow IPv4 to proceed */
|
|
ret = NM_ACT_STAGE_RETURN_IP_FAIL;
|
|
} else
|
|
ret = NM_ACT_STAGE_RETURN_POSTPONE;
|
|
} else if (strcmp (method, NM_SETTING_IP6_CONFIG_METHOD_LINK_LOCAL) == 0) {
|
|
ret = linklocal6_start (self);
|
|
} else if (strcmp (method, NM_SETTING_IP6_CONFIG_METHOD_DHCP) == 0) {
|
|
priv->dhcp6.mode = NM_NDISC_DHCP_LEVEL_MANAGED;
|
|
if (!dhcp6_start (self, TRUE)) {
|
|
/* IPv6 might be disabled; allow IPv4 to proceed */
|
|
ret = NM_ACT_STAGE_RETURN_IP_FAIL;
|
|
} else
|
|
ret = NM_ACT_STAGE_RETURN_POSTPONE;
|
|
} else if (strcmp (method, NM_SETTING_IP6_CONFIG_METHOD_MANUAL) == 0) {
|
|
ret = NM_ACT_STAGE_RETURN_SUCCESS;
|
|
} else
|
|
_LOGW (LOGD_IP6, "unhandled IPv6 config method '%s'; will fail", method);
|
|
|
|
if ( ret != NM_ACT_STAGE_RETURN_FAILURE
|
|
&& !nm_device_sys_iface_state_is_external_or_assume (self)) {
|
|
switch (ip6_privacy) {
|
|
case NM_SETTING_IP6_CONFIG_PRIVACY_UNKNOWN:
|
|
case NM_SETTING_IP6_CONFIG_PRIVACY_DISABLED:
|
|
ip6_privacy_str = "0";
|
|
break;
|
|
case NM_SETTING_IP6_CONFIG_PRIVACY_PREFER_PUBLIC_ADDR:
|
|
ip6_privacy_str = "1";
|
|
break;
|
|
case NM_SETTING_IP6_CONFIG_PRIVACY_PREFER_TEMP_ADDR:
|
|
ip6_privacy_str = "2";
|
|
break;
|
|
}
|
|
nm_device_ipv6_sysctl_set (self, "use_tempaddr", ip6_privacy_str);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* nm_device_activate_stage3_ip4_start:
|
|
* @self: the device
|
|
*
|
|
* Try starting IPv4 configuration.
|
|
*/
|
|
gboolean
|
|
nm_device_activate_stage3_ip4_start (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMActStageReturn ret;
|
|
NMDeviceStateReason failure_reason = NM_DEVICE_STATE_REASON_NONE;
|
|
NMIP4Config *ip4_config = NULL;
|
|
|
|
g_assert (priv->ip4_state == IP_WAIT);
|
|
|
|
/* Slaves stay in IP_CONFIG state until master is ready, and then
|
|
* they go directly to SECONDARIES without configuring IPv4.
|
|
*/
|
|
if (nm_active_connection_get_master (NM_ACTIVE_CONNECTION (priv->act_request)))
|
|
return TRUE;
|
|
|
|
_set_ip_state (self, AF_INET, IP_CONF);
|
|
ret = NM_DEVICE_GET_CLASS (self)->act_stage3_ip4_config_start (self, &ip4_config, &failure_reason);
|
|
if (ret == NM_ACT_STAGE_RETURN_SUCCESS) {
|
|
if (!ip4_config)
|
|
ip4_config = nm_ip4_config_new (nm_device_get_ip_ifindex (self));
|
|
nm_device_activate_schedule_ip4_config_result (self, ip4_config);
|
|
g_object_unref (ip4_config);
|
|
} else if (ret == NM_ACT_STAGE_RETURN_IP_DONE) {
|
|
_set_ip_state (self, AF_INET, IP_DONE);
|
|
check_ip_state (self, FALSE);
|
|
} else if (ret == NM_ACT_STAGE_RETURN_FAILURE) {
|
|
nm_device_state_changed (self, NM_DEVICE_STATE_FAILED, failure_reason);
|
|
return FALSE;
|
|
} else if (ret == NM_ACT_STAGE_RETURN_IP_FAIL) {
|
|
/* Activation not wanted */
|
|
_set_ip_state (self, AF_INET, IP_FAIL);
|
|
} else if (ret == NM_ACT_STAGE_RETURN_IP_WAIT) {
|
|
/* Wait for something to try IP config again */
|
|
_set_ip_state (self, AF_INET, IP_WAIT);
|
|
} else
|
|
g_assert (ret == NM_ACT_STAGE_RETURN_POSTPONE);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
* nm_device_activate_stage3_ip6_start:
|
|
* @self: the device
|
|
*
|
|
* Try starting IPv6 configuration.
|
|
*/
|
|
gboolean
|
|
nm_device_activate_stage3_ip6_start (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMActStageReturn ret;
|
|
NMDeviceStateReason failure_reason = NM_DEVICE_STATE_REASON_NONE;
|
|
NMIP6Config *ip6_config = NULL;
|
|
|
|
g_assert (priv->ip6_state == IP_WAIT);
|
|
|
|
/* Slaves stay in IP_CONFIG state until master is ready, and then
|
|
* they go directly to SECONDARIES without configuring IPv6.
|
|
*/
|
|
if (nm_active_connection_get_master (NM_ACTIVE_CONNECTION (priv->act_request)))
|
|
return TRUE;
|
|
|
|
_set_ip_state (self, AF_INET6, IP_CONF);
|
|
ret = NM_DEVICE_GET_CLASS (self)->act_stage3_ip6_config_start (self, &ip6_config, &failure_reason);
|
|
if (ret == NM_ACT_STAGE_RETURN_SUCCESS) {
|
|
if (!ip6_config)
|
|
ip6_config = nm_ip6_config_new (nm_device_get_ip_ifindex (self));
|
|
/* Here we get a static IPv6 config, like for Shared where it's
|
|
* autogenerated or from modems where it comes from ModemManager.
|
|
*/
|
|
g_warn_if_fail (priv->ac_ip6_config == NULL);
|
|
priv->ac_ip6_config = ip6_config;
|
|
nm_device_activate_schedule_ip6_config_result (self);
|
|
} else if (ret == NM_ACT_STAGE_RETURN_IP_DONE) {
|
|
_set_ip_state (self, AF_INET6, IP_DONE);
|
|
check_ip_state (self, FALSE);
|
|
} else if (ret == NM_ACT_STAGE_RETURN_FAILURE) {
|
|
nm_device_state_changed (self, NM_DEVICE_STATE_FAILED, failure_reason);
|
|
return FALSE;
|
|
} else if (ret == NM_ACT_STAGE_RETURN_IP_FAIL) {
|
|
/* Activation not wanted */
|
|
_set_ip_state (self, AF_INET6, IP_FAIL);
|
|
} else if (ret == NM_ACT_STAGE_RETURN_IP_WAIT) {
|
|
/* Wait for something to try IP config again */
|
|
_set_ip_state (self, AF_INET6, IP_WAIT);
|
|
} else
|
|
g_assert (ret == NM_ACT_STAGE_RETURN_POSTPONE);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/*
|
|
* activate_stage3_ip_config_start
|
|
*
|
|
* Begin automatic/manual IP configuration
|
|
*
|
|
*/
|
|
static void
|
|
activate_stage3_ip_config_start (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMActiveConnection *master;
|
|
NMDevice *master_device;
|
|
|
|
_set_ip_state (self, AF_INET, IP_WAIT);
|
|
_set_ip_state (self, AF_INET6, IP_WAIT);
|
|
|
|
nm_device_state_changed (self, NM_DEVICE_STATE_IP_CONFIG, NM_DEVICE_STATE_REASON_NONE);
|
|
|
|
/* Device should be up before we can do anything with it */
|
|
if (!nm_platform_link_is_up (nm_device_get_platform (self), nm_device_get_ip_ifindex (self)))
|
|
_LOGW (LOGD_DEVICE, "interface %s not up for IP configuration", nm_device_get_ip_iface (self));
|
|
|
|
/* If the device is a slave, then we don't do any IP configuration but we
|
|
* use the IP config stage to indicate to the master we're ready for
|
|
* enslavement. If the master is already activating, it will have tried to
|
|
* enslave us when we changed state to IP_CONFIG, causing us to queue a
|
|
* transition to SECONDARIES (or FAILED if the enslavement failed), with
|
|
* our IP states set to IP_DONE either way. If the master isn't yet
|
|
* activating, then they'll still be in IP_WAIT. Either way, we bail out
|
|
* of IP config here.
|
|
*/
|
|
master = nm_active_connection_get_master (NM_ACTIVE_CONNECTION (priv->act_request));
|
|
if (master) {
|
|
master_device = nm_active_connection_get_device (master);
|
|
if (priv->ip4_state == IP_WAIT && priv->ip6_state == IP_WAIT) {
|
|
_LOGI (LOGD_DEVICE, "Activation: connection '%s' waiting on master '%s'",
|
|
nm_connection_get_id (nm_device_get_applied_connection (self)),
|
|
master_device ? nm_device_get_iface (master_device) : "(unknown)");
|
|
}
|
|
return;
|
|
}
|
|
|
|
/* IPv4 */
|
|
if ( nm_device_activate_ip4_state_in_wait (self)
|
|
&& !nm_device_activate_stage3_ip4_start (self))
|
|
return;
|
|
|
|
/* IPv6 */
|
|
if ( nm_device_activate_ip6_state_in_wait (self)
|
|
&& !nm_device_activate_stage3_ip6_start (self))
|
|
return;
|
|
|
|
/* Proxy */
|
|
nm_device_set_proxy_config (self, NULL);
|
|
|
|
check_ip_state (self, TRUE);
|
|
}
|
|
|
|
static void
|
|
fw_change_zone_cb (NMFirewallManager *firewall_manager,
|
|
NMFirewallManagerCallId call_id,
|
|
GError *error,
|
|
gpointer user_data)
|
|
{
|
|
NMDevice *self = user_data;
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->fw_call != call_id)
|
|
g_return_if_reached ();
|
|
priv->fw_call = NULL;
|
|
|
|
if (nm_utils_error_is_cancelled (error, FALSE))
|
|
return;
|
|
|
|
switch (priv->fw_state) {
|
|
case FIREWALL_STATE_WAIT_STAGE_3:
|
|
priv->fw_state = FIREWALL_STATE_INITIALIZED;
|
|
nm_device_activate_schedule_stage3_ip_config_start (self);
|
|
break;
|
|
case FIREWALL_STATE_WAIT_IP_CONFIG:
|
|
priv->fw_state = FIREWALL_STATE_INITIALIZED;
|
|
if (priv->ip4_state == IP_DONE || priv->ip6_state == IP_DONE)
|
|
nm_device_start_ip_check (self);
|
|
break;
|
|
case FIREWALL_STATE_INITIALIZED:
|
|
break;
|
|
default:
|
|
g_return_if_reached ();
|
|
}
|
|
}
|
|
|
|
static void
|
|
fw_change_zone (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMConnection *applied_connection;
|
|
NMSettingConnection *s_con;
|
|
|
|
nm_assert (priv->fw_state >= FIREWALL_STATE_INITIALIZED);
|
|
|
|
applied_connection = nm_device_get_applied_connection (self);
|
|
nm_assert (applied_connection);
|
|
|
|
s_con = nm_connection_get_setting_connection (applied_connection);
|
|
nm_assert (s_con);
|
|
|
|
if (priv->fw_call) {
|
|
nm_firewall_manager_cancel_call (priv->fw_call);
|
|
nm_assert (!priv->fw_call);
|
|
}
|
|
|
|
if (G_UNLIKELY (!priv->fw_mgr))
|
|
priv->fw_mgr = g_object_ref (nm_firewall_manager_get ());
|
|
|
|
priv->fw_call = nm_firewall_manager_add_or_change_zone (priv->fw_mgr,
|
|
nm_device_get_ip_iface (self),
|
|
nm_setting_connection_get_zone (s_con),
|
|
FALSE, /* change zone */
|
|
fw_change_zone_cb,
|
|
self);
|
|
}
|
|
|
|
/*
|
|
* nm_device_activate_schedule_stage3_ip_config_start
|
|
*
|
|
* Schedule IP configuration start
|
|
*/
|
|
void
|
|
nm_device_activate_schedule_stage3_ip_config_start (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
g_return_if_fail (priv->act_request);
|
|
|
|
/* Add the interface to the specified firewall zone */
|
|
if (priv->fw_state == FIREWALL_STATE_UNMANAGED) {
|
|
if (!nm_device_sys_iface_state_is_external (self)) {
|
|
priv->fw_state = FIREWALL_STATE_WAIT_STAGE_3;
|
|
fw_change_zone (self);
|
|
return;
|
|
}
|
|
|
|
/* fake success. */
|
|
priv->fw_state = FIREWALL_STATE_INITIALIZED;
|
|
} else if (priv->fw_state == FIREWALL_STATE_WAIT_STAGE_3) {
|
|
/* a firewall call for stage3 is pending. Return and wait. */
|
|
return;
|
|
}
|
|
|
|
nm_assert (priv->fw_state == FIREWALL_STATE_INITIALIZED);
|
|
|
|
activation_source_schedule (self, activate_stage3_ip_config_start, AF_INET);
|
|
}
|
|
|
|
static NMActStageReturn
|
|
act_stage4_ip4_config_timeout (NMDevice *self, NMDeviceStateReason *out_failure_reason)
|
|
{
|
|
if (!get_ip_config_may_fail (self, AF_INET)) {
|
|
NM_SET_OUT (out_failure_reason, NM_DEVICE_STATE_REASON_IP_CONFIG_UNAVAILABLE);
|
|
return NM_ACT_STAGE_RETURN_FAILURE;
|
|
}
|
|
return NM_ACT_STAGE_RETURN_SUCCESS;
|
|
}
|
|
|
|
/*
|
|
* nm_device_activate_stage4_ip4_config_timeout
|
|
*
|
|
* Time out on retrieving the IPv4 config.
|
|
*
|
|
*/
|
|
static void
|
|
activate_stage4_ip4_config_timeout (NMDevice *self)
|
|
{
|
|
NMActStageReturn ret = NM_ACT_STAGE_RETURN_FAILURE;
|
|
NMDeviceStateReason failure_reason = NM_DEVICE_STATE_REASON_NONE;
|
|
|
|
ret = NM_DEVICE_GET_CLASS (self)->act_stage4_ip4_config_timeout (self, &failure_reason);
|
|
if (ret == NM_ACT_STAGE_RETURN_POSTPONE)
|
|
return;
|
|
else if (ret == NM_ACT_STAGE_RETURN_FAILURE) {
|
|
nm_device_state_changed (self, NM_DEVICE_STATE_FAILED, failure_reason);
|
|
return;
|
|
}
|
|
g_assert (ret == NM_ACT_STAGE_RETURN_SUCCESS);
|
|
|
|
_set_ip_state (self, AF_INET, IP_FAIL);
|
|
|
|
check_ip_state (self, FALSE);
|
|
}
|
|
|
|
/*
|
|
* nm_device_activate_schedule_ip4_config_timeout
|
|
*
|
|
* Deal with a timeout of the IPv4 configuration
|
|
*
|
|
*/
|
|
void
|
|
nm_device_activate_schedule_ip4_config_timeout (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
g_return_if_fail (priv->act_request);
|
|
|
|
activation_source_schedule (self, activate_stage4_ip4_config_timeout, AF_INET);
|
|
}
|
|
|
|
static NMActStageReturn
|
|
act_stage4_ip6_config_timeout (NMDevice *self, NMDeviceStateReason *out_failure_reason)
|
|
{
|
|
if (!get_ip_config_may_fail (self, AF_INET6)) {
|
|
NM_SET_OUT (out_failure_reason, NM_DEVICE_STATE_REASON_IP_CONFIG_UNAVAILABLE);
|
|
return NM_ACT_STAGE_RETURN_FAILURE;
|
|
}
|
|
|
|
return NM_ACT_STAGE_RETURN_SUCCESS;
|
|
}
|
|
|
|
/*
|
|
* activate_stage4_ip6_config_timeout
|
|
*
|
|
* Time out on retrieving the IPv6 config.
|
|
*
|
|
*/
|
|
static void
|
|
activate_stage4_ip6_config_timeout (NMDevice *self)
|
|
{
|
|
NMActStageReturn ret = NM_ACT_STAGE_RETURN_FAILURE;
|
|
NMDeviceStateReason failure_reason = NM_DEVICE_STATE_REASON_NONE;
|
|
|
|
ret = NM_DEVICE_GET_CLASS (self)->act_stage4_ip6_config_timeout (self, &failure_reason);
|
|
if (ret == NM_ACT_STAGE_RETURN_POSTPONE)
|
|
return;
|
|
if (ret == NM_ACT_STAGE_RETURN_FAILURE) {
|
|
nm_device_state_changed (self, NM_DEVICE_STATE_FAILED, failure_reason);
|
|
return;
|
|
}
|
|
g_assert (ret == NM_ACT_STAGE_RETURN_SUCCESS);
|
|
|
|
_set_ip_state (self, AF_INET6, IP_FAIL);
|
|
|
|
check_ip_state (self, FALSE);
|
|
}
|
|
|
|
/*
|
|
* nm_device_activate_schedule_ip6_config_timeout
|
|
*
|
|
* Deal with a timeout of the IPv6 configuration
|
|
*
|
|
*/
|
|
void
|
|
nm_device_activate_schedule_ip6_config_timeout (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
g_return_if_fail (priv->act_request);
|
|
|
|
activation_source_schedule (self, activate_stage4_ip6_config_timeout, AF_INET6);
|
|
}
|
|
|
|
static gboolean
|
|
share_init (NMDevice *self)
|
|
{
|
|
char *modules[] = { "ip_tables", "iptable_nat", "nf_nat_ftp", "nf_nat_irc",
|
|
"nf_nat_sip", "nf_nat_tftp", "nf_nat_pptp", "nf_nat_h323",
|
|
NULL };
|
|
char **iter;
|
|
int errsv;
|
|
|
|
if (!nm_platform_sysctl_set (nm_device_get_platform (self), NMP_SYSCTL_PATHID_ABSOLUTE ("/proc/sys/net/ipv4/ip_forward"), "1")) {
|
|
errsv = errno;
|
|
nm_log_err (LOGD_SHARING, "share: error enabling IPv4 forwarding: (%d) %s",
|
|
errsv, strerror (errsv));
|
|
return FALSE;
|
|
}
|
|
|
|
if (!nm_platform_sysctl_set (nm_device_get_platform (self), NMP_SYSCTL_PATHID_ABSOLUTE ("/proc/sys/net/ipv4/ip_dynaddr"), "1")) {
|
|
errsv = errno;
|
|
nm_log_err (LOGD_SHARING, "share: error enabling dynamic addresses: (%d) %s",
|
|
errsv, strerror (errsv));
|
|
}
|
|
|
|
for (iter = modules; *iter; iter++)
|
|
nm_utils_modprobe (NULL, FALSE, *iter, NULL);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
#define add_share_rule(req, table, ...) \
|
|
G_STMT_START { \
|
|
char *_cmd = g_strdup_printf (__VA_ARGS__); \
|
|
nm_act_request_add_share_rule (req, table, _cmd); \
|
|
g_free (_cmd); \
|
|
} G_STMT_END
|
|
|
|
static gboolean
|
|
start_sharing (NMDevice *self, NMIP4Config *config)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMActRequest *req;
|
|
GError *error = NULL;
|
|
char str_addr[INET_ADDRSTRLEN + 1];
|
|
char str_mask[INET_ADDRSTRLEN + 1];
|
|
guint32 netmask, network;
|
|
const NMPlatformIP4Address *ip4_addr;
|
|
const char *ip_iface;
|
|
|
|
g_return_val_if_fail (config != NULL, FALSE);
|
|
|
|
ip_iface = nm_device_get_ip_iface (self);
|
|
|
|
ip4_addr = nm_ip4_config_get_address (config, 0);
|
|
if (!ip4_addr || !ip4_addr->address)
|
|
return FALSE;
|
|
|
|
netmask = nm_utils_ip4_prefix_to_netmask (ip4_addr->plen);
|
|
if (!inet_ntop (AF_INET, &netmask, str_mask, sizeof (str_mask)))
|
|
return FALSE;
|
|
|
|
network = ip4_addr->address & netmask;
|
|
if (!inet_ntop (AF_INET, &network, str_addr, sizeof (str_addr)))
|
|
return FALSE;
|
|
|
|
if (!share_init (self))
|
|
return FALSE;
|
|
|
|
req = nm_device_get_act_request (self);
|
|
g_assert (req);
|
|
|
|
add_share_rule (req, "nat", "POSTROUTING --source %s/%s ! --destination %s/%s --jump MASQUERADE", str_addr, str_mask, str_addr, str_mask);
|
|
add_share_rule (req, "filter", "FORWARD --destination %s/%s --out-interface %s --match state --state ESTABLISHED,RELATED --jump ACCEPT", str_addr, str_mask, ip_iface);
|
|
add_share_rule (req, "filter", "FORWARD --source %s/%s --in-interface %s --jump ACCEPT", str_addr, str_mask, ip_iface);
|
|
add_share_rule (req, "filter", "FORWARD --in-interface %s --out-interface %s --jump ACCEPT", ip_iface, ip_iface);
|
|
add_share_rule (req, "filter", "FORWARD --out-interface %s --jump REJECT", ip_iface);
|
|
add_share_rule (req, "filter", "FORWARD --in-interface %s --jump REJECT", ip_iface);
|
|
add_share_rule (req, "filter", "INPUT --in-interface %s --protocol udp --destination-port 67 --jump ACCEPT", ip_iface);
|
|
add_share_rule (req, "filter", "INPUT --in-interface %s --protocol tcp --destination-port 67 --jump ACCEPT", ip_iface);
|
|
add_share_rule (req, "filter", "INPUT --in-interface %s --protocol udp --destination-port 53 --jump ACCEPT", ip_iface);
|
|
add_share_rule (req, "filter", "INPUT --in-interface %s --protocol tcp --destination-port 53 --jump ACCEPT", ip_iface);
|
|
|
|
nm_act_request_set_shared (req, TRUE);
|
|
|
|
if (!nm_dnsmasq_manager_start (priv->dnsmasq_manager, config, &error)) {
|
|
_LOGE (LOGD_SHARING, "share: (%s) failed to start dnsmasq: %s",
|
|
ip_iface, error->message);
|
|
g_error_free (error);
|
|
nm_act_request_set_shared (req, FALSE);
|
|
return FALSE;
|
|
}
|
|
|
|
priv->dnsmasq_state_id = g_signal_connect (priv->dnsmasq_manager, NM_DNS_MASQ_MANAGER_STATE_CHANGED,
|
|
G_CALLBACK (dnsmasq_state_changed_cb),
|
|
self);
|
|
return TRUE;
|
|
}
|
|
|
|
static void
|
|
arp_cleanup (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->arping.announcing) {
|
|
nm_arping_manager_destroy (priv->arping.announcing);
|
|
priv->arping.announcing = NULL;
|
|
}
|
|
}
|
|
|
|
static void
|
|
arp_announce (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMConnection *connection;
|
|
NMSettingIPConfig *s_ip4;
|
|
guint num, i;
|
|
const guint8 *hw_addr;
|
|
size_t hw_addr_len = 0;
|
|
|
|
arp_cleanup (self);
|
|
|
|
hw_addr = nm_platform_link_get_address (nm_device_get_platform (self),
|
|
nm_device_get_ip_ifindex (self),
|
|
&hw_addr_len);
|
|
|
|
if (!hw_addr_len || !hw_addr)
|
|
return;
|
|
|
|
/* We only care about manually-configured addresses; DHCP- and autoip-configured
|
|
* ones should already have been seen on the network at this point.
|
|
*/
|
|
connection = nm_device_get_applied_connection (self);
|
|
if (!connection)
|
|
return;
|
|
s_ip4 = nm_connection_get_setting_ip4_config (connection);
|
|
if (!s_ip4)
|
|
return;
|
|
num = nm_setting_ip_config_get_num_addresses (s_ip4);
|
|
if (num == 0)
|
|
return;
|
|
|
|
priv->arping.announcing = nm_arping_manager_new (nm_device_get_ip_ifindex (self));
|
|
|
|
for (i = 0; i < num; i++) {
|
|
NMIPAddress *ip = nm_setting_ip_config_get_address (s_ip4, i);
|
|
in_addr_t addr;
|
|
|
|
if (inet_pton (AF_INET, nm_ip_address_get_address (ip), &addr) == 1)
|
|
nm_arping_manager_add_address (priv->arping.announcing, addr);
|
|
else
|
|
g_warn_if_reached ();
|
|
}
|
|
|
|
nm_arping_manager_announce_addresses (priv->arping.announcing);
|
|
}
|
|
|
|
static void
|
|
activate_stage5_ip4_config_commit (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMActRequest *req;
|
|
const char *method;
|
|
NMConnection *connection;
|
|
int ip_ifindex;
|
|
|
|
req = nm_device_get_act_request (self);
|
|
g_assert (req);
|
|
connection = nm_act_request_get_applied_connection (req);
|
|
g_assert (connection);
|
|
|
|
/* Interface must be IFF_UP before IP config can be applied */
|
|
ip_ifindex = nm_device_get_ip_ifindex (self);
|
|
if (!nm_platform_link_is_up (nm_device_get_platform (self), ip_ifindex) && !nm_device_sys_iface_state_is_external_or_assume (self)) {
|
|
nm_platform_link_set_up (nm_device_get_platform (self), ip_ifindex, NULL);
|
|
if (!nm_platform_link_is_up (nm_device_get_platform (self), ip_ifindex))
|
|
_LOGW (LOGD_DEVICE, "interface %s not up for IP configuration", nm_device_get_ip_iface (self));
|
|
}
|
|
|
|
/* NULL to use the existing priv->dev_ip4_config */
|
|
if (!ip4_config_merge_and_apply (self, NULL, TRUE)) {
|
|
_LOGD (LOGD_DEVICE | LOGD_IP4, "Activation: Stage 5 of 5 (IPv4 Commit) failed");
|
|
nm_device_ip_method_failed (self, AF_INET, NM_DEVICE_STATE_REASON_CONFIG_FAILED);
|
|
return;
|
|
}
|
|
|
|
/* Start IPv4 sharing if we need it */
|
|
method = nm_utils_get_ip_config_method (connection, NM_TYPE_SETTING_IP4_CONFIG);
|
|
|
|
if (strcmp (method, NM_SETTING_IP4_CONFIG_METHOD_SHARED) == 0) {
|
|
if (!start_sharing (self, priv->ip4_config)) {
|
|
_LOGW (LOGD_SHARING, "Activation: Stage 5 of 5 (IPv4 Commit) start sharing failed.");
|
|
nm_device_ip_method_failed (self, AF_INET, NM_DEVICE_STATE_REASON_SHARED_START_FAILED);
|
|
return;
|
|
}
|
|
}
|
|
|
|
/* If IPv4 wasn't the first to complete, and DHCP was used, then ensure
|
|
* dispatcher scripts get the DHCP lease information.
|
|
*/
|
|
if ( priv->dhcp4.client
|
|
&& nm_device_activate_ip4_state_in_conf (self)
|
|
&& (nm_device_get_state (self) > NM_DEVICE_STATE_IP_CONFIG)) {
|
|
nm_dispatcher_call_device (NM_DISPATCHER_ACTION_DHCP4_CHANGE,
|
|
self,
|
|
NULL,
|
|
NULL, NULL, NULL);
|
|
}
|
|
|
|
arp_announce (self);
|
|
|
|
nm_device_remove_pending_action (self, NM_PENDING_ACTION_DHCP4, FALSE);
|
|
|
|
/* Enter the IP_CHECK state if this is the first method to complete */
|
|
_set_ip_state (self, AF_INET, IP_DONE);
|
|
check_ip_state (self, FALSE);
|
|
}
|
|
|
|
void
|
|
nm_device_activate_schedule_ip4_config_result (NMDevice *self, NMIP4Config *config)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
g_clear_object (&priv->dev_ip4_config);
|
|
if (config)
|
|
priv->dev_ip4_config = g_object_ref (config);
|
|
|
|
activation_source_schedule (self, activate_stage5_ip4_config_commit, AF_INET);
|
|
}
|
|
|
|
gboolean
|
|
nm_device_activate_ip4_state_in_conf (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (self != NULL, FALSE);
|
|
return NM_DEVICE_GET_PRIVATE (self)->ip4_state == IP_CONF;
|
|
}
|
|
|
|
gboolean
|
|
nm_device_activate_ip4_state_in_wait (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (self != NULL, FALSE);
|
|
return NM_DEVICE_GET_PRIVATE (self)->ip4_state == IP_WAIT;
|
|
}
|
|
|
|
gboolean
|
|
nm_device_activate_ip4_state_done (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (self != NULL, FALSE);
|
|
return NM_DEVICE_GET_PRIVATE (self)->ip4_state == IP_DONE;
|
|
}
|
|
|
|
/*
|
|
* Returns a NMIP6Config containing NM-configured addresses which
|
|
* have the tentative flag, or NULL if none is present.
|
|
*/
|
|
static NMIP6Config *
|
|
dad6_get_pending_addresses (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMIP6Config *confs[] = { priv->ac_ip6_config,
|
|
priv->dhcp6.ip6_config,
|
|
priv->con_ip6_config,
|
|
priv->wwan_ip6_config };
|
|
const NMPlatformIP6Address *addr, *pl_addr;
|
|
NMIP6Config *dad6_config = NULL;
|
|
guint i, j, num;
|
|
int ifindex;
|
|
|
|
ifindex = nm_device_get_ip_ifindex (self);
|
|
g_return_val_if_fail (ifindex > 0, NULL);
|
|
|
|
/* We are interested only in addresses that we have explicitly configured,
|
|
* not in externally added ones.
|
|
*/
|
|
for (i = 0; i < G_N_ELEMENTS (confs); i++) {
|
|
if (confs[i]) {
|
|
num = nm_ip6_config_get_num_addresses (confs[i]);
|
|
for (j = 0; j < num; j++) {
|
|
addr = nm_ip6_config_get_address (confs[i], j);
|
|
pl_addr = nm_platform_ip6_address_get (nm_device_get_platform (self),
|
|
ifindex,
|
|
addr->address,
|
|
addr->plen);
|
|
if ( pl_addr
|
|
&& NM_FLAGS_HAS (pl_addr->n_ifa_flags, IFA_F_TENTATIVE)
|
|
&& !NM_FLAGS_HAS (pl_addr->n_ifa_flags, IFA_F_DADFAILED)
|
|
&& !NM_FLAGS_HAS (pl_addr->n_ifa_flags, IFA_F_OPTIMISTIC)) {
|
|
_LOGt (LOGD_DEVICE, "IPv6 DAD: pending address %s",
|
|
nm_platform_ip6_address_to_string (pl_addr, NULL, 0));
|
|
|
|
if (!dad6_config)
|
|
dad6_config = nm_ip6_config_new (ifindex);
|
|
|
|
nm_ip6_config_add_address (dad6_config, pl_addr);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return dad6_config;
|
|
}
|
|
|
|
static void
|
|
activate_stage5_ip6_config_commit (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMActRequest *req;
|
|
const char *method;
|
|
NMConnection *connection;
|
|
int ip_ifindex;
|
|
int errsv;
|
|
|
|
req = nm_device_get_act_request (self);
|
|
g_assert (req);
|
|
connection = nm_act_request_get_applied_connection (req);
|
|
g_assert (connection);
|
|
|
|
/* Interface must be IFF_UP before IP config can be applied */
|
|
ip_ifindex = nm_device_get_ip_ifindex (self);
|
|
if (!nm_platform_link_is_up (nm_device_get_platform (self), ip_ifindex) && !nm_device_sys_iface_state_is_external_or_assume (self)) {
|
|
nm_platform_link_set_up (nm_device_get_platform (self), ip_ifindex, NULL);
|
|
if (!nm_platform_link_is_up (nm_device_get_platform (self), ip_ifindex))
|
|
_LOGW (LOGD_DEVICE, "interface %s not up for IP configuration", nm_device_get_ip_iface (self));
|
|
}
|
|
|
|
if (ip6_config_merge_and_apply (self, TRUE)) {
|
|
if ( priv->dhcp6.mode != NM_NDISC_DHCP_LEVEL_NONE
|
|
&& priv->ip6_state == IP_CONF) {
|
|
if (priv->dhcp6.ip6_config) {
|
|
/* If IPv6 wasn't the first IP to complete, and DHCP was used,
|
|
* then ensure dispatcher scripts get the DHCP lease information.
|
|
*/
|
|
nm_dispatcher_call_device (NM_DISPATCHER_ACTION_DHCP6_CHANGE,
|
|
self,
|
|
NULL,
|
|
NULL, NULL, NULL);
|
|
} else {
|
|
/* still waiting for first dhcp6 lease. */
|
|
return;
|
|
}
|
|
}
|
|
nm_device_remove_pending_action (self, NM_PENDING_ACTION_DHCP6, FALSE);
|
|
nm_device_remove_pending_action (self, NM_PENDING_ACTION_AUTOCONF6, FALSE);
|
|
|
|
/* Start IPv6 forwarding if we need it */
|
|
method = nm_utils_get_ip_config_method (connection, NM_TYPE_SETTING_IP6_CONFIG);
|
|
|
|
if (strcmp (method, NM_SETTING_IP6_CONFIG_METHOD_SHARED) == 0) {
|
|
if (!nm_platform_sysctl_set (nm_device_get_platform (self), NMP_SYSCTL_PATHID_ABSOLUTE ("/proc/sys/net/ipv6/conf/all/forwarding"), "1")) {
|
|
errsv = errno;
|
|
_LOGE (LOGD_SHARING, "share: error enabling IPv6 forwarding: (%d) %s", errsv, strerror (errsv));
|
|
nm_device_ip_method_failed (self, AF_INET6, NM_DEVICE_STATE_REASON_SHARED_START_FAILED);
|
|
}
|
|
}
|
|
|
|
/* Check if we have to wait for DAD */
|
|
if (priv->ip6_state == IP_CONF && !priv->dad6_ip6_config) {
|
|
priv->dad6_ip6_config = dad6_get_pending_addresses (self);
|
|
if (priv->dad6_ip6_config) {
|
|
_LOGD (LOGD_DEVICE | LOGD_IP6, "IPv6 DAD: waiting termination");
|
|
} else {
|
|
/* No tentative addresses, proceed right away */
|
|
_set_ip_state (self, AF_INET6, IP_DONE);
|
|
check_ip_state (self, FALSE);
|
|
}
|
|
}
|
|
} else {
|
|
_LOGW (LOGD_DEVICE | LOGD_IP6, "Activation: Stage 5 of 5 (IPv6 Commit) failed");
|
|
nm_device_ip_method_failed (self, AF_INET6, NM_DEVICE_STATE_REASON_CONFIG_FAILED);
|
|
}
|
|
}
|
|
|
|
void
|
|
nm_device_activate_schedule_ip6_config_result (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
/* If IP had previously failed, move it back to IP_CONF since we
|
|
* clearly now have configuration.
|
|
*/
|
|
if (priv->ip6_state == IP_FAIL)
|
|
_set_ip_state (self, AF_INET6, IP_CONF);
|
|
|
|
activation_source_schedule (self, activate_stage5_ip6_config_commit, AF_INET6);
|
|
}
|
|
|
|
gboolean
|
|
nm_device_activate_ip6_state_in_conf (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (self != NULL, FALSE);
|
|
return NM_DEVICE_GET_PRIVATE (self)->ip6_state == IP_CONF;
|
|
}
|
|
|
|
gboolean
|
|
nm_device_activate_ip6_state_in_wait (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (self != NULL, FALSE);
|
|
return NM_DEVICE_GET_PRIVATE (self)->ip6_state == IP_WAIT;
|
|
}
|
|
|
|
gboolean
|
|
nm_device_activate_ip6_state_done (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (self != NULL, FALSE);
|
|
return NM_DEVICE_GET_PRIVATE (self)->ip6_state == IP_DONE;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static void
|
|
act_request_set_cb (NMActRequest *act_request,
|
|
GParamSpec *pspec,
|
|
NMDevice *self)
|
|
{
|
|
_notify (self, PROP_ACTIVE_CONNECTION);
|
|
}
|
|
|
|
static void
|
|
act_request_set (NMDevice *self, NMActRequest *act_request)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
gs_unref_object NMActRequest *old_act_requst = NULL;
|
|
|
|
nm_assert (NM_IS_DEVICE (self));
|
|
nm_assert (!act_request || NM_IS_ACT_REQUEST (act_request));
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if ( !priv->act_request_public
|
|
&& priv->act_request == act_request)
|
|
return;
|
|
|
|
/* always clear the public flag. The few callers that set a new @act_request
|
|
* don't want that the property is public yet. */
|
|
priv->act_request_public = FALSE;
|
|
|
|
nm_clear_g_signal_handler (priv->act_request, &priv->act_request_id);
|
|
|
|
old_act_requst = priv->act_request;
|
|
priv->act_request = nm_g_object_ref (act_request);
|
|
|
|
if (act_request) {
|
|
priv->act_request_id = g_signal_connect (act_request,
|
|
"notify::"NM_EXPORTED_OBJECT_PATH,
|
|
G_CALLBACK (act_request_set_cb),
|
|
self);
|
|
|
|
switch (nm_active_connection_get_activation_type (NM_ACTIVE_CONNECTION (act_request))) {
|
|
case NM_ACTIVATION_TYPE_EXTERNAL:
|
|
break;
|
|
case NM_ACTIVATION_TYPE_ASSUME:
|
|
if (priv->sys_iface_state == NM_DEVICE_SYS_IFACE_STATE_EXTERNAL)
|
|
nm_device_sys_iface_state_set (self, NM_DEVICE_SYS_IFACE_STATE_ASSUME);
|
|
break;
|
|
case NM_ACTIVATION_TYPE_MANAGED:
|
|
if (NM_IN_SET_TYPED (NMDeviceSysIfaceState,
|
|
priv->sys_iface_state,
|
|
NM_DEVICE_SYS_IFACE_STATE_EXTERNAL,
|
|
NM_DEVICE_SYS_IFACE_STATE_ASSUME))
|
|
nm_device_sys_iface_state_set (self, NM_DEVICE_SYS_IFACE_STATE_MANAGED);
|
|
break;
|
|
}
|
|
}
|
|
|
|
_notify (self, PROP_ACTIVE_CONNECTION);
|
|
}
|
|
|
|
static void
|
|
dnsmasq_cleanup (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (!priv->dnsmasq_manager)
|
|
return;
|
|
|
|
nm_clear_g_signal_handler (priv->dnsmasq_manager, &priv->dnsmasq_state_id);
|
|
|
|
nm_dnsmasq_manager_stop (priv->dnsmasq_manager);
|
|
g_object_unref (priv->dnsmasq_manager);
|
|
priv->dnsmasq_manager = NULL;
|
|
}
|
|
|
|
static void
|
|
_update_ip4_address (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
guint32 addr;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
if ( priv->ip4_config
|
|
&& ip_config_valid (priv->state)
|
|
&& nm_ip4_config_get_num_addresses (priv->ip4_config)) {
|
|
addr = nm_ip4_config_get_address (priv->ip4_config, 0)->address;
|
|
if (addr != priv->ip4_address) {
|
|
priv->ip4_address = addr;
|
|
_notify (self, PROP_IP4_ADDRESS);
|
|
}
|
|
}
|
|
}
|
|
|
|
gboolean
|
|
nm_device_get_is_nm_owned (NMDevice *self)
|
|
{
|
|
return NM_DEVICE_GET_PRIVATE (self)->is_nm_owned;
|
|
}
|
|
|
|
/*
|
|
* delete_on_deactivate_link_delete
|
|
*
|
|
* Function will be queued with g_idle_add to call
|
|
* nm_platform_link_delete for the underlying resources
|
|
* of the device.
|
|
*/
|
|
static gboolean
|
|
delete_on_deactivate_link_delete (gpointer user_data)
|
|
{
|
|
DeleteOnDeactivateData *data = user_data;
|
|
NMDevice *self = data->device;
|
|
|
|
_LOGD (LOGD_DEVICE, "delete_on_deactivate: cleanup and delete virtual link #%d (id=%u)",
|
|
data->ifindex, data->idle_add_id);
|
|
|
|
if (data->device) {
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (data->device);
|
|
gs_free_error GError *error = NULL;
|
|
|
|
g_object_remove_weak_pointer (G_OBJECT (data->device), (void **) &data->device);
|
|
priv->delete_on_deactivate_data = NULL;
|
|
|
|
if (!nm_device_unrealize (data->device, TRUE, &error))
|
|
_LOGD (LOGD_DEVICE, "delete_on_deactivate: unrealizing %d failed (%s)", data->ifindex, error->message);
|
|
} else
|
|
nm_platform_link_delete (nm_device_get_platform (self), data->ifindex);
|
|
|
|
g_free (data);
|
|
return FALSE;
|
|
}
|
|
|
|
static void
|
|
delete_on_deactivate_unschedule (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->delete_on_deactivate_data) {
|
|
DeleteOnDeactivateData *data = priv->delete_on_deactivate_data;
|
|
|
|
priv->delete_on_deactivate_data = NULL;
|
|
|
|
g_source_remove (data->idle_add_id);
|
|
g_object_remove_weak_pointer (G_OBJECT (self), (void **) &data->device);
|
|
_LOGD (LOGD_DEVICE, "delete_on_deactivate: cancel cleanup and delete virtual link #%d (id=%u)",
|
|
data->ifindex, data->idle_add_id);
|
|
g_free (data);
|
|
}
|
|
}
|
|
|
|
static void
|
|
delete_on_deactivate_check_and_schedule (NMDevice *self, int ifindex)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
DeleteOnDeactivateData *data;
|
|
|
|
if (ifindex <= 0)
|
|
return;
|
|
if (!priv->is_nm_owned)
|
|
return;
|
|
if (priv->queued_act_request)
|
|
return;
|
|
if (!nm_device_is_software (self) || !nm_device_is_real (self))
|
|
return;
|
|
if (nm_device_get_state (self) == NM_DEVICE_STATE_UNMANAGED)
|
|
return;
|
|
if (nm_device_get_state (self) == NM_DEVICE_STATE_UNAVAILABLE)
|
|
return;
|
|
delete_on_deactivate_unschedule (self); /* always cancel and reschedule */
|
|
|
|
data = g_new (DeleteOnDeactivateData, 1);
|
|
g_object_add_weak_pointer (G_OBJECT (self), (void **) &data->device);
|
|
data->device = self;
|
|
data->ifindex = ifindex;
|
|
data->idle_add_id = g_idle_add (delete_on_deactivate_link_delete, data);
|
|
priv->delete_on_deactivate_data = data;
|
|
|
|
_LOGD (LOGD_DEVICE, "delete_on_deactivate: schedule cleanup and delete virtual link #%d (id=%u)",
|
|
ifindex, data->idle_add_id);
|
|
}
|
|
|
|
static void
|
|
_cleanup_ip4_pre (NMDevice *self, CleanupType cleanup_type)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
_set_ip_state (self, AF_INET, IP_NONE);
|
|
|
|
if (nm_clear_g_source (&priv->queued_ip4_config_id))
|
|
_LOGD (LOGD_DEVICE, "clearing queued IP4 config change");
|
|
priv->queued_ip4_config_pending = FALSE;
|
|
|
|
dhcp4_cleanup (self, cleanup_type, FALSE);
|
|
arp_cleanup (self);
|
|
dnsmasq_cleanup (self);
|
|
ipv4ll_cleanup (self);
|
|
}
|
|
|
|
static void
|
|
_cleanup_ip6_pre (NMDevice *self, CleanupType cleanup_type)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
_set_ip_state (self, AF_INET6, IP_NONE);
|
|
|
|
if (nm_clear_g_source (&priv->queued_ip6_config_id))
|
|
_LOGD (LOGD_DEVICE, "clearing queued IP6 config change");
|
|
priv->queued_ip6_config_pending = FALSE;
|
|
|
|
g_clear_object (&priv->dad6_ip6_config);
|
|
dhcp6_cleanup (self, cleanup_type, FALSE);
|
|
linklocal6_cleanup (self);
|
|
addrconf6_cleanup (self);
|
|
}
|
|
|
|
gboolean
|
|
_nm_device_hash_check_invalid_keys (GHashTable *hash, const char *setting_name,
|
|
GError **error, const char **argv)
|
|
{
|
|
guint found_keys = 0;
|
|
guint i;
|
|
|
|
nm_assert (hash && g_hash_table_size (hash) > 0);
|
|
nm_assert (argv && argv[0]);
|
|
|
|
#if NM_MORE_ASSERTS > 10
|
|
/* Assert that the keys are unique. */
|
|
{
|
|
gs_unref_hashtable GHashTable *check_dups = g_hash_table_new_full (g_str_hash, g_str_equal, NULL, NULL);
|
|
|
|
for (i = 0; argv[i]; i++) {
|
|
if (!nm_g_hash_table_add (check_dups, (char *) argv[i]))
|
|
nm_assert (FALSE);
|
|
}
|
|
nm_assert (g_hash_table_size (check_dups) > 0);
|
|
}
|
|
#endif
|
|
|
|
for (i = 0; argv[i]; i++) {
|
|
if (g_hash_table_contains (hash, argv[i]))
|
|
found_keys++;
|
|
}
|
|
|
|
if (found_keys != g_hash_table_size (hash)) {
|
|
GHashTableIter iter;
|
|
const char *k = NULL;
|
|
const char *first_invalid_key = NULL;
|
|
|
|
if (!error)
|
|
return FALSE;
|
|
|
|
g_hash_table_iter_init (&iter, hash);
|
|
while (g_hash_table_iter_next (&iter, (gpointer *) &k, NULL)) {
|
|
if (nm_utils_strv_find_first ((char **) argv, -1, k) < 0) {
|
|
first_invalid_key = k;
|
|
break;
|
|
}
|
|
}
|
|
if (setting_name) {
|
|
g_set_error (error,
|
|
NM_DEVICE_ERROR,
|
|
NM_DEVICE_ERROR_INCOMPATIBLE_CONNECTION,
|
|
"Can't reapply changes to '%s.%s' setting",
|
|
setting_name,
|
|
first_invalid_key);
|
|
} else {
|
|
g_set_error (error,
|
|
NM_DEVICE_ERROR,
|
|
NM_DEVICE_ERROR_INCOMPATIBLE_CONNECTION,
|
|
"Can't reapply any changes to '%s' setting",
|
|
first_invalid_key);
|
|
}
|
|
g_return_val_if_fail (first_invalid_key, FALSE);
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
void
|
|
nm_device_reactivate_ip4_config (NMDevice *self,
|
|
NMSettingIPConfig *s_ip4_old,
|
|
NMSettingIPConfig *s_ip4_new,
|
|
gboolean force_restart)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
const char *method_old, *method_new;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->ip4_state != IP_NONE) {
|
|
g_clear_object (&priv->con_ip4_config);
|
|
g_clear_object (&priv->ext_ip4_config);
|
|
priv->con_ip4_config = nm_ip4_config_new (nm_device_get_ip_ifindex (self));
|
|
nm_ip4_config_merge_setting (priv->con_ip4_config,
|
|
s_ip4_new,
|
|
nm_device_get_ip4_route_metric (self));
|
|
|
|
if (!force_restart) {
|
|
method_old = s_ip4_old
|
|
? nm_setting_ip_config_get_method (s_ip4_old)
|
|
: NM_SETTING_IP4_CONFIG_METHOD_DISABLED;
|
|
method_new = s_ip4_new
|
|
? nm_setting_ip_config_get_method (s_ip4_new)
|
|
: NM_SETTING_IP4_CONFIG_METHOD_DISABLED;
|
|
force_restart = !nm_streq0 (method_old, method_new);
|
|
}
|
|
|
|
if (force_restart) {
|
|
_cleanup_ip4_pre (self, CLEANUP_TYPE_DECONFIGURE);
|
|
_set_ip_state (self, AF_INET, IP_WAIT);
|
|
if (!nm_device_activate_stage3_ip4_start (self))
|
|
_LOGW (LOGD_IP4, "Failed to apply IPv4 configuration");
|
|
} else {
|
|
if (!ip4_config_merge_and_apply (self, NULL, TRUE))
|
|
_LOGW (LOGD_IP4, "Failed to reapply IPv4 configuration");
|
|
}
|
|
}
|
|
}
|
|
|
|
void
|
|
nm_device_reactivate_ip6_config (NMDevice *self,
|
|
NMSettingIPConfig *s_ip6_old,
|
|
NMSettingIPConfig *s_ip6_new,
|
|
gboolean force_restart)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
const char *method_old, *method_new;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->ip6_state != IP_NONE) {
|
|
g_clear_object (&priv->con_ip6_config);
|
|
g_clear_object (&priv->ext_ip6_config);
|
|
priv->con_ip6_config = nm_ip6_config_new (nm_device_get_ip_ifindex (self));
|
|
nm_ip6_config_merge_setting (priv->con_ip6_config,
|
|
s_ip6_new,
|
|
nm_device_get_ip6_route_metric (self));
|
|
|
|
if (!force_restart) {
|
|
method_old = s_ip6_old
|
|
? nm_setting_ip_config_get_method (s_ip6_old)
|
|
: NM_SETTING_IP6_CONFIG_METHOD_IGNORE;
|
|
method_new = s_ip6_new
|
|
? nm_setting_ip_config_get_method (s_ip6_new)
|
|
: NM_SETTING_IP6_CONFIG_METHOD_IGNORE;
|
|
force_restart = !nm_streq0 (method_old, method_new);
|
|
}
|
|
|
|
if (force_restart) {
|
|
_cleanup_ip6_pre (self, CLEANUP_TYPE_DECONFIGURE);
|
|
_set_ip_state (self, AF_INET6, IP_WAIT);
|
|
if (!nm_device_activate_stage3_ip6_start (self))
|
|
_LOGW (LOGD_IP6, "Failed to apply IPv6 configuration");
|
|
} else {
|
|
if (!ip6_config_merge_and_apply (self, TRUE))
|
|
_LOGW (LOGD_IP4, "Failed to reapply IPv6 configuration");
|
|
}
|
|
}
|
|
}
|
|
|
|
static void
|
|
_pacrunner_manager_send (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
nm_pacrunner_manager_remove_clear (priv->pacrunner_manager,
|
|
&priv->pacrunner_call_id);
|
|
|
|
if (!priv->pacrunner_manager)
|
|
priv->pacrunner_manager = g_object_ref (nm_pacrunner_manager_get ());
|
|
|
|
priv->pacrunner_call_id = nm_pacrunner_manager_send (priv->pacrunner_manager,
|
|
nm_device_get_ip_iface (self),
|
|
priv->proxy_config,
|
|
NULL,
|
|
NULL);
|
|
}
|
|
|
|
static void
|
|
reactivate_proxy_config (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (!priv->pacrunner_call_id)
|
|
return;
|
|
nm_device_set_proxy_config (self, priv->dhcp4.pac_url);
|
|
_pacrunner_manager_send (self);
|
|
}
|
|
|
|
static gboolean
|
|
can_reapply_change (NMDevice *self, const char *setting_name,
|
|
NMSetting *s_old, NMSetting *s_new,
|
|
GHashTable *diffs, GError **error)
|
|
{
|
|
if (nm_streq (setting_name, NM_SETTING_CONNECTION_SETTING_NAME)) {
|
|
/* Whitelist allowed properties from "connection" setting which are
|
|
* allowed to differ.
|
|
*
|
|
* This includes UUID, there is no principal problem with reapplying a
|
|
* connection and changing it's UUID. In fact, disallowing it makes it
|
|
* cumbersome for the user to reapply any connection but the original
|
|
* settings-connection. */
|
|
return nm_device_hash_check_invalid_keys (diffs,
|
|
NM_SETTING_CONNECTION_SETTING_NAME,
|
|
error,
|
|
NM_SETTING_CONNECTION_ID,
|
|
NM_SETTING_CONNECTION_UUID,
|
|
NM_SETTING_CONNECTION_STABLE_ID,
|
|
NM_SETTING_CONNECTION_AUTOCONNECT,
|
|
NM_SETTING_CONNECTION_ZONE,
|
|
NM_SETTING_CONNECTION_METERED,
|
|
NM_SETTING_CONNECTION_LLDP);
|
|
} else if (NM_IN_STRSET (setting_name,
|
|
NM_SETTING_IP4_CONFIG_SETTING_NAME,
|
|
NM_SETTING_IP6_CONFIG_SETTING_NAME,
|
|
NM_SETTING_PROXY_SETTING_NAME)) {
|
|
/* accept all */
|
|
return TRUE;
|
|
} else {
|
|
g_set_error (error,
|
|
NM_DEVICE_ERROR,
|
|
NM_DEVICE_ERROR_INCOMPATIBLE_CONNECTION,
|
|
"Can't reapply any changes to '%s' setting",
|
|
setting_name);
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
static void
|
|
reapply_connection (NMDevice *self, NMConnection *con_old, NMConnection *con_new)
|
|
{
|
|
|
|
}
|
|
|
|
/* check_and_reapply_connection:
|
|
* @connection: the new connection settings to be applied or %NULL to reapply
|
|
* the current settings connection
|
|
* @version_id: either zero, or the current version id for the applied
|
|
* connection.
|
|
* @audit_args: on return, a string representing the changes
|
|
* @error: the error if %FALSE is returned
|
|
*
|
|
* Change configuration of an already configured device if possible.
|
|
* Updates the device's applied connection upon success.
|
|
*
|
|
* Return: %FALSE if the new configuration can not be reapplied.
|
|
*/
|
|
static gboolean
|
|
check_and_reapply_connection (NMDevice *self,
|
|
NMConnection *connection,
|
|
guint64 version_id,
|
|
char **audit_args,
|
|
GError **error)
|
|
{
|
|
NMDeviceClass *klass = NM_DEVICE_GET_CLASS (self);
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMConnection *applied = nm_device_get_applied_connection (self);
|
|
gs_unref_object NMConnection *applied_clone = NULL;
|
|
gs_unref_hashtable GHashTable *diffs = NULL;
|
|
NMConnection *con_old, *con_new;
|
|
NMSettingIPConfig *s_ip4_old, *s_ip4_new;
|
|
NMSettingIPConfig *s_ip6_old, *s_ip6_new;
|
|
GHashTableIter iter;
|
|
|
|
if (priv->state != NM_DEVICE_STATE_ACTIVATED) {
|
|
g_set_error_literal (error,
|
|
NM_DEVICE_ERROR,
|
|
NM_DEVICE_ERROR_NOT_ACTIVE,
|
|
"Device is not activated");
|
|
return FALSE;
|
|
}
|
|
|
|
nm_connection_diff (connection,
|
|
applied,
|
|
NM_SETTING_COMPARE_FLAG_IGNORE_TIMESTAMP |
|
|
NM_SETTING_COMPARE_FLAG_IGNORE_SECRETS,
|
|
&diffs);
|
|
|
|
if (diffs && nm_audit_manager_audit_enabled (nm_audit_manager_get ()))
|
|
*audit_args = nm_utils_format_con_diff_for_audit (diffs);
|
|
else
|
|
*audit_args = NULL;
|
|
|
|
/**************************************************************************
|
|
* check for unsupported changes and reject to reapply
|
|
*************************************************************************/
|
|
if (diffs) {
|
|
char *setting_name;
|
|
GHashTable *setting_diff;
|
|
|
|
g_hash_table_iter_init (&iter, diffs);
|
|
while (g_hash_table_iter_next (&iter, (gpointer *) &setting_name, (gpointer *) &setting_diff)) {
|
|
if (!klass->can_reapply_change (self,
|
|
setting_name,
|
|
nm_connection_get_setting_by_name (applied, setting_name),
|
|
nm_connection_get_setting_by_name (connection, setting_name),
|
|
setting_diff,
|
|
error))
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
if ( version_id != 0
|
|
&& version_id != nm_active_connection_version_id_get ((NMActiveConnection *) priv->act_request)) {
|
|
g_set_error_literal (error,
|
|
NM_DEVICE_ERROR,
|
|
NM_DEVICE_ERROR_VERSION_ID_MISMATCH,
|
|
"Reapply failed because device changed in the meantime and the version-id mismatches");
|
|
return FALSE;
|
|
}
|
|
|
|
/**************************************************************************
|
|
* Update applied connection
|
|
*************************************************************************/
|
|
|
|
if (diffs)
|
|
nm_active_connection_version_id_bump ((NMActiveConnection *) priv->act_request);
|
|
|
|
_LOGD (LOGD_DEVICE, "reapply (version-id %llu%s)",
|
|
(unsigned long long) nm_active_connection_version_id_get (((NMActiveConnection *) priv->act_request)),
|
|
diffs ? "" : " (unmodified)");
|
|
|
|
if (diffs) {
|
|
NMConnection *connection_clean = connection;
|
|
gs_free NMConnection *connection_clean_free = NULL;
|
|
|
|
{
|
|
NMSettingConnection *s_con_a, *s_con_n;
|
|
|
|
/* we allow re-applying a connection with differing ID, UUID, STABLE_ID and AUTOCONNECT.
|
|
* This is for convenience but these values are not actually changeable. So, check
|
|
* if they changed, and if the did revert to the original values. */
|
|
s_con_a = nm_connection_get_setting_connection (applied);
|
|
s_con_n = nm_connection_get_setting_connection (connection);
|
|
|
|
if ( !nm_streq (nm_setting_connection_get_id (s_con_a), nm_setting_connection_get_id (s_con_n))
|
|
|| !nm_streq (nm_setting_connection_get_uuid (s_con_a), nm_setting_connection_get_uuid (s_con_n))
|
|
|| nm_setting_connection_get_autoconnect (s_con_a) != nm_setting_connection_get_autoconnect (s_con_n)
|
|
|| !nm_streq0 (nm_setting_connection_get_stable_id (s_con_a), nm_setting_connection_get_stable_id (s_con_n))) {
|
|
connection_clean_free = nm_simple_connection_new_clone (connection);
|
|
connection_clean = connection_clean_free;
|
|
s_con_n = nm_connection_get_setting_connection (connection);
|
|
g_object_set (s_con_n,
|
|
NM_SETTING_CONNECTION_ID, nm_setting_connection_get_id (s_con_a),
|
|
NM_SETTING_CONNECTION_UUID, nm_setting_connection_get_uuid (s_con_a),
|
|
NM_SETTING_CONNECTION_AUTOCONNECT, nm_setting_connection_get_autoconnect (s_con_a),
|
|
NM_SETTING_CONNECTION_STABLE_ID, nm_setting_connection_get_stable_id (s_con_a),
|
|
NULL);
|
|
}
|
|
}
|
|
|
|
con_old = applied_clone = nm_simple_connection_new_clone (applied);
|
|
con_new = applied;
|
|
nm_connection_replace_settings_from_connection (applied, connection_clean);
|
|
nm_connection_clear_secrets (applied);
|
|
} else
|
|
con_old = con_new = applied;
|
|
|
|
priv->v4_commit_first_time = TRUE;
|
|
priv->v6_commit_first_time = TRUE;
|
|
|
|
/**************************************************************************
|
|
* Reapply changes
|
|
*************************************************************************/
|
|
klass->reapply_connection (self, con_old, con_new);
|
|
|
|
nm_device_update_firewall_zone (self);
|
|
nm_device_update_metered (self);
|
|
lldp_init (self, FALSE);
|
|
|
|
s_ip4_old = nm_connection_get_setting_ip4_config (con_old);
|
|
s_ip4_new = nm_connection_get_setting_ip4_config (con_new);
|
|
s_ip6_old = nm_connection_get_setting_ip6_config (con_old);
|
|
s_ip6_new = nm_connection_get_setting_ip6_config (con_new);
|
|
|
|
nm_device_reactivate_ip4_config (self, s_ip4_old, s_ip4_new, TRUE);
|
|
nm_device_reactivate_ip6_config (self, s_ip6_old, s_ip6_new, TRUE);
|
|
|
|
reactivate_proxy_config (self);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
typedef struct {
|
|
NMConnection *connection;
|
|
guint64 version_id;
|
|
} ReapplyData;
|
|
|
|
static void
|
|
reapply_cb (NMDevice *self,
|
|
GDBusMethodInvocation *context,
|
|
NMAuthSubject *subject,
|
|
GError *error,
|
|
gpointer user_data)
|
|
{
|
|
ReapplyData *reapply_data = user_data;
|
|
guint64 version_id = 0;
|
|
gs_unref_object NMConnection *connection = NULL;
|
|
GError *local = NULL;
|
|
gs_free char *audit_args = NULL;
|
|
|
|
if (reapply_data) {
|
|
connection = reapply_data->connection;
|
|
version_id = reapply_data->version_id;
|
|
g_slice_free (ReapplyData, reapply_data);
|
|
}
|
|
|
|
if (error) {
|
|
nm_audit_log_device_op (NM_AUDIT_OP_DEVICE_REAPPLY, self, FALSE, NULL, subject, error->message);
|
|
g_dbus_method_invocation_return_gerror (context, error);
|
|
return;
|
|
}
|
|
|
|
if (!check_and_reapply_connection (self,
|
|
connection ? : (NMConnection *) nm_device_get_settings_connection (self),
|
|
version_id,
|
|
&audit_args,
|
|
&local)) {
|
|
nm_audit_log_device_op (NM_AUDIT_OP_DEVICE_REAPPLY, self, FALSE, audit_args, subject, local->message);
|
|
g_dbus_method_invocation_take_error (context, local);
|
|
local = NULL;
|
|
} else {
|
|
nm_audit_log_device_op (NM_AUDIT_OP_DEVICE_REAPPLY, self, TRUE, audit_args, subject, NULL);
|
|
g_dbus_method_invocation_return_value (context, NULL);
|
|
}
|
|
}
|
|
|
|
static void
|
|
impl_device_reapply (NMDevice *self,
|
|
GDBusMethodInvocation *context,
|
|
GVariant *settings,
|
|
guint64 version_id,
|
|
guint32 flags)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMSettingsConnection *settings_connection;
|
|
NMConnection *connection = NULL;
|
|
GError *error = NULL;
|
|
ReapplyData *reapply_data;
|
|
|
|
/* No flags supported as of now. */
|
|
if (flags != 0) {
|
|
error = g_error_new_literal (NM_DEVICE_ERROR,
|
|
NM_DEVICE_ERROR_FAILED,
|
|
"Invalid flags specified");
|
|
nm_audit_log_device_op (NM_AUDIT_OP_DEVICE_REAPPLY, self, FALSE, NULL, context, error->message);
|
|
g_dbus_method_invocation_take_error (context, error);
|
|
return;
|
|
}
|
|
|
|
if (priv->state != NM_DEVICE_STATE_ACTIVATED) {
|
|
error = g_error_new_literal (NM_DEVICE_ERROR,
|
|
NM_DEVICE_ERROR_NOT_ACTIVE,
|
|
"Device is not activated");
|
|
nm_audit_log_device_op (NM_AUDIT_OP_DEVICE_REAPPLY, self, FALSE, NULL, context, error->message);
|
|
g_dbus_method_invocation_take_error (context, error);
|
|
return;
|
|
}
|
|
|
|
settings_connection = nm_device_get_settings_connection (self);
|
|
g_return_if_fail (settings_connection);
|
|
|
|
if (settings && g_variant_n_children (settings)) {
|
|
/* New settings specified inline. */
|
|
connection = _nm_simple_connection_new_from_dbus (settings,
|
|
NM_SETTING_PARSE_FLAGS_STRICT
|
|
| NM_SETTING_PARSE_FLAGS_NORMALIZE,
|
|
&error);
|
|
if (!connection) {
|
|
g_prefix_error (&error, "The settings specified are invalid: ");
|
|
nm_audit_log_device_op (NM_AUDIT_OP_DEVICE_REAPPLY, self, FALSE, NULL, context, error->message);
|
|
g_dbus_method_invocation_take_error (context, error);
|
|
return;
|
|
}
|
|
nm_connection_clear_secrets (connection);
|
|
}
|
|
|
|
if (connection || version_id) {
|
|
reapply_data = g_slice_new (ReapplyData);
|
|
reapply_data->connection = connection;
|
|
reapply_data->version_id = version_id;
|
|
} else
|
|
reapply_data = NULL;
|
|
|
|
/* Ask the manager to authenticate this request for us */
|
|
g_signal_emit (self, signals[AUTH_REQUEST], 0,
|
|
context,
|
|
nm_device_get_applied_connection (self),
|
|
NM_AUTH_PERMISSION_NETWORK_CONTROL,
|
|
TRUE,
|
|
reapply_cb,
|
|
reapply_data);
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static void
|
|
get_applied_connection_cb (NMDevice *self,
|
|
GDBusMethodInvocation *context,
|
|
NMAuthSubject *subject,
|
|
GError *error,
|
|
gpointer user_data /* possibly dangling pointer */)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
NMConnection *applied_connection;
|
|
GVariant *settings;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
if (error) {
|
|
g_dbus_method_invocation_return_gerror (context, error);
|
|
return;
|
|
}
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
applied_connection = nm_device_get_applied_connection (self);
|
|
|
|
if (!applied_connection) {
|
|
error = g_error_new_literal (NM_DEVICE_ERROR,
|
|
NM_DEVICE_ERROR_NOT_ACTIVE,
|
|
"Device is not activated");
|
|
g_dbus_method_invocation_take_error (context, error);
|
|
return;
|
|
}
|
|
|
|
if (applied_connection != user_data) {
|
|
/* The applied connection changed due to a race. Reauthenticate. */
|
|
g_signal_emit (self, signals[AUTH_REQUEST], 0,
|
|
context,
|
|
applied_connection,
|
|
NM_AUTH_PERMISSION_NETWORK_CONTROL,
|
|
TRUE,
|
|
get_applied_connection_cb,
|
|
applied_connection /* no need take a ref. We will not dereference this pointer. */);
|
|
return;
|
|
}
|
|
|
|
settings = nm_connection_to_dbus (applied_connection, NM_CONNECTION_SERIALIZE_NO_SECRETS);
|
|
if (!settings)
|
|
settings = g_variant_new_array (G_VARIANT_TYPE ("{sa{sv}}"), NULL, 0);
|
|
|
|
g_dbus_method_invocation_return_value (context,
|
|
g_variant_new ("(@a{sa{sv}}t)",
|
|
settings,
|
|
nm_active_connection_version_id_get ((NMActiveConnection *) priv->act_request)));
|
|
}
|
|
|
|
static void
|
|
impl_device_get_applied_connection (NMDevice *self,
|
|
GDBusMethodInvocation *context,
|
|
guint32 flags)
|
|
{
|
|
NMConnection *applied_connection;
|
|
GError *error = NULL;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
/* No flags supported as of now. */
|
|
if (flags != 0) {
|
|
error = g_error_new_literal (NM_DEVICE_ERROR,
|
|
NM_DEVICE_ERROR_FAILED,
|
|
"Invalid flags specified");
|
|
g_dbus_method_invocation_take_error (context, error);
|
|
return;
|
|
}
|
|
|
|
applied_connection = nm_device_get_applied_connection (self);
|
|
if (!applied_connection) {
|
|
error = g_error_new_literal (NM_DEVICE_ERROR,
|
|
NM_DEVICE_ERROR_NOT_ACTIVE,
|
|
"Device is not activated");
|
|
g_dbus_method_invocation_take_error (context, error);
|
|
return;
|
|
}
|
|
|
|
/* Ask the manager to authenticate this request for us */
|
|
g_signal_emit (self, signals[AUTH_REQUEST], 0,
|
|
context,
|
|
applied_connection,
|
|
NM_AUTH_PERMISSION_NETWORK_CONTROL,
|
|
TRUE,
|
|
get_applied_connection_cb,
|
|
applied_connection /* no need take a ref. We will not dereference this pointer. */);
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static void
|
|
disconnect_cb (NMDevice *self,
|
|
GDBusMethodInvocation *context,
|
|
NMAuthSubject *subject,
|
|
GError *error,
|
|
gpointer user_data)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
GError *local = NULL;
|
|
|
|
if (error) {
|
|
g_dbus_method_invocation_return_gerror (context, error);
|
|
nm_audit_log_device_op (NM_AUDIT_OP_DEVICE_DISCONNECT, self, FALSE, NULL, subject, error->message);
|
|
return;
|
|
}
|
|
|
|
/* Authorized */
|
|
if (priv->state <= NM_DEVICE_STATE_DISCONNECTED) {
|
|
local = g_error_new_literal (NM_DEVICE_ERROR,
|
|
NM_DEVICE_ERROR_NOT_ACTIVE,
|
|
"Device is not active");
|
|
nm_audit_log_device_op (NM_AUDIT_OP_DEVICE_DISCONNECT, self, FALSE, NULL, subject, local->message);
|
|
g_dbus_method_invocation_take_error (context, local);
|
|
} else {
|
|
nm_device_set_autoconnect_intern (self, FALSE);
|
|
|
|
nm_device_state_changed (self,
|
|
NM_DEVICE_STATE_DEACTIVATING,
|
|
NM_DEVICE_STATE_REASON_USER_REQUESTED);
|
|
g_dbus_method_invocation_return_value (context, NULL);
|
|
nm_audit_log_device_op (NM_AUDIT_OP_DEVICE_DISCONNECT, self, TRUE, NULL, subject, NULL);
|
|
}
|
|
}
|
|
|
|
static void
|
|
_clear_queued_act_request (NMDevicePrivate *priv)
|
|
{
|
|
if (priv->queued_act_request) {
|
|
nm_active_connection_set_state ((NMActiveConnection *) priv->queued_act_request,
|
|
NM_ACTIVE_CONNECTION_STATE_DEACTIVATED,
|
|
NM_ACTIVE_CONNECTION_STATE_REASON_DEVICE_DISCONNECTED);
|
|
g_clear_object (&priv->queued_act_request);
|
|
}
|
|
}
|
|
|
|
static void
|
|
impl_device_disconnect (NMDevice *self, GDBusMethodInvocation *context)
|
|
{
|
|
NMConnection *connection;
|
|
GError *error = NULL;
|
|
|
|
if (NM_DEVICE_GET_PRIVATE (self)->act_request == NULL) {
|
|
error = g_error_new_literal (NM_DEVICE_ERROR,
|
|
NM_DEVICE_ERROR_NOT_ACTIVE,
|
|
"This device is not active");
|
|
g_dbus_method_invocation_take_error (context, error);
|
|
return;
|
|
}
|
|
|
|
connection = nm_device_get_applied_connection (self);
|
|
g_assert (connection);
|
|
|
|
/* Ask the manager to authenticate this request for us */
|
|
g_signal_emit (self, signals[AUTH_REQUEST], 0,
|
|
context,
|
|
connection,
|
|
NM_AUTH_PERMISSION_NETWORK_CONTROL,
|
|
TRUE,
|
|
disconnect_cb,
|
|
NULL);
|
|
}
|
|
|
|
static void
|
|
delete_cb (NMDevice *self,
|
|
GDBusMethodInvocation *context,
|
|
NMAuthSubject *subject,
|
|
GError *error,
|
|
gpointer user_data)
|
|
{
|
|
GError *local = NULL;
|
|
|
|
if (error) {
|
|
g_dbus_method_invocation_return_gerror (context, error);
|
|
nm_audit_log_device_op (NM_AUDIT_OP_DEVICE_DELETE, self, FALSE, NULL, subject, error->message);
|
|
return;
|
|
}
|
|
|
|
/* Authorized */
|
|
nm_audit_log_device_op (NM_AUDIT_OP_DEVICE_DELETE, self, TRUE, NULL, subject, NULL);
|
|
if (nm_device_unrealize (self, TRUE, &local))
|
|
g_dbus_method_invocation_return_value (context, NULL);
|
|
else
|
|
g_dbus_method_invocation_take_error (context, local);
|
|
}
|
|
|
|
static void
|
|
impl_device_delete (NMDevice *self, GDBusMethodInvocation *context)
|
|
{
|
|
GError *error = NULL;
|
|
|
|
if (!nm_device_is_software (self) || !nm_device_is_real (self)) {
|
|
error = g_error_new_literal (NM_DEVICE_ERROR,
|
|
NM_DEVICE_ERROR_NOT_SOFTWARE,
|
|
"This device is not a software device or is not realized");
|
|
g_dbus_method_invocation_take_error (context, error);
|
|
return;
|
|
}
|
|
|
|
/* Ask the manager to authenticate this request for us */
|
|
g_signal_emit (self, signals[AUTH_REQUEST], 0,
|
|
context,
|
|
NULL,
|
|
NM_AUTH_PERMISSION_NETWORK_CONTROL,
|
|
TRUE,
|
|
delete_cb,
|
|
NULL);
|
|
}
|
|
|
|
static gboolean
|
|
_device_activate (NMDevice *self, NMActRequest *req)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
NMConnection *connection;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
g_return_val_if_fail (NM_IS_ACT_REQUEST (req), FALSE);
|
|
g_return_val_if_fail (nm_device_get_managed (self, FALSE), FALSE);
|
|
|
|
/* Ensure the activation request is still valid; the master may have
|
|
* already failed in which case activation of this device should not proceed.
|
|
*/
|
|
if (nm_active_connection_get_state (NM_ACTIVE_CONNECTION (req)) >= NM_ACTIVE_CONNECTION_STATE_DEACTIVATING)
|
|
return FALSE;
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
connection = nm_act_request_get_applied_connection (req);
|
|
g_assert (connection);
|
|
|
|
_LOGI (LOGD_DEVICE, "Activation: starting connection '%s' (%s)",
|
|
nm_connection_get_id (connection),
|
|
nm_connection_get_uuid (connection));
|
|
|
|
delete_on_deactivate_unschedule (self);
|
|
|
|
act_request_set (self, req);
|
|
|
|
nm_device_activate_schedule_stage1_device_prepare (self);
|
|
return TRUE;
|
|
}
|
|
|
|
static void
|
|
_carrier_wait_check_queued_act_request (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMActRequest *queued_req;
|
|
|
|
if ( !priv->queued_act_request
|
|
|| !priv->queued_act_request_is_waiting_for_carrier)
|
|
return;
|
|
|
|
priv->queued_act_request_is_waiting_for_carrier = FALSE;
|
|
if (!priv->carrier) {
|
|
_LOGD (LOGD_DEVICE, "Cancel queued activation request as we have no carrier after timeout");
|
|
_clear_queued_act_request (priv);
|
|
} else {
|
|
_LOGD (LOGD_DEVICE, "Activate queued activation request as we now have carrier");
|
|
queued_req = priv->queued_act_request;
|
|
priv->queued_act_request = NULL;
|
|
_device_activate (self, queued_req);
|
|
g_object_unref (queued_req);
|
|
}
|
|
}
|
|
|
|
static gboolean
|
|
_carrier_wait_check_act_request_must_queue (NMDevice *self, NMActRequest *req)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMConnection *connection;
|
|
|
|
/* If we have carrier or if we are not waiting for it, the activation
|
|
* request is not blocked waiting for carrier. */
|
|
if (priv->carrier)
|
|
return FALSE;
|
|
if (priv->carrier_wait_id == 0)
|
|
return FALSE;
|
|
|
|
connection = nm_act_request_get_applied_connection (req);
|
|
if (!connection_requires_carrier (connection))
|
|
return FALSE;
|
|
|
|
if (!nm_device_check_connection_available (self, connection, NM_DEVICE_CHECK_CON_AVAILABLE_ALL, NULL)) {
|
|
/* We passed all @flags we have, and no @specific_object.
|
|
* This equals maximal availability, if a connection is not available
|
|
* in this case, it is not waiting for carrier.
|
|
*
|
|
* Actually, why are we even trying to activate it? Strange, but whatever
|
|
* the reason, don't wait for carrier.
|
|
*/
|
|
return FALSE;
|
|
}
|
|
|
|
if (nm_device_check_connection_available (self, connection, NM_DEVICE_CHECK_CON_AVAILABLE_ALL & ~_NM_DEVICE_CHECK_CON_AVAILABLE_FOR_USER_REQUEST_WAITING_CARRIER, NULL)) {
|
|
/* The connection was available with flags ALL, and it is still available
|
|
* if we pretend not to wait for carrier. That means that the
|
|
* connection is available now, and does not wait for carrier.
|
|
*
|
|
* Since the flags increase the availability of a connection, when checking
|
|
* ALL&~WAITING_CARRIER, it means that we certainly would wait for carrier. */
|
|
return FALSE;
|
|
}
|
|
|
|
/* The activation request must wait for carrier. */
|
|
return TRUE;
|
|
}
|
|
|
|
void
|
|
nm_device_steal_connection (NMDevice *self, NMSettingsConnection *connection)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
_LOGI (LOGD_DEVICE, "disconnecting connection '%s' for new activation request",
|
|
nm_settings_connection_get_id (connection));
|
|
|
|
if ( priv->queued_act_request
|
|
&& connection == nm_active_connection_get_settings_connection (NM_ACTIVE_CONNECTION (priv->queued_act_request)))
|
|
_clear_queued_act_request (priv);
|
|
|
|
if ( priv->act_request
|
|
&& connection == nm_active_connection_get_settings_connection (NM_ACTIVE_CONNECTION (priv->act_request))
|
|
&& priv->state < NM_DEVICE_STATE_DEACTIVATING)
|
|
nm_device_state_changed (self,
|
|
NM_DEVICE_STATE_DEACTIVATING,
|
|
NM_DEVICE_STATE_REASON_NEW_ACTIVATION);
|
|
}
|
|
|
|
void
|
|
nm_device_queue_activation (NMDevice *self, NMActRequest *req)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
gboolean must_queue;
|
|
|
|
must_queue = _carrier_wait_check_act_request_must_queue (self, req);
|
|
|
|
if (!priv->act_request && !must_queue && nm_device_is_real (self)) {
|
|
/* Just activate immediately */
|
|
if (!_device_activate (self, req))
|
|
g_assert_not_reached ();
|
|
return;
|
|
}
|
|
|
|
/* supercede any already-queued request */
|
|
_clear_queued_act_request (priv);
|
|
priv->queued_act_request = g_object_ref (req);
|
|
priv->queued_act_request_is_waiting_for_carrier = must_queue;
|
|
|
|
_LOGD (LOGD_DEVICE, "queue activation request waiting for %s", must_queue ? "carrier" : "currently active connection to disconnect");
|
|
|
|
/* Deactivate existing activation request first */
|
|
if (priv->act_request) {
|
|
_LOGI (LOGD_DEVICE, "disconnecting for new activation request.");
|
|
nm_device_state_changed (self,
|
|
NM_DEVICE_STATE_DEACTIVATING,
|
|
NM_DEVICE_STATE_REASON_NEW_ACTIVATION);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* nm_device_is_activating
|
|
*
|
|
* Return whether or not the device is currently activating itself.
|
|
*
|
|
*/
|
|
gboolean
|
|
nm_device_is_activating (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMDeviceState state;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
|
|
state = nm_device_get_state (self);
|
|
if (state >= NM_DEVICE_STATE_PREPARE && state <= NM_DEVICE_STATE_SECONDARIES)
|
|
return TRUE;
|
|
|
|
/* There's a small race between the time when stage 1 is scheduled
|
|
* and when the device actually sets STATE_PREPARE when the activation
|
|
* handler is actually run. If there's an activation handler scheduled
|
|
* we're activating anyway.
|
|
*/
|
|
return priv->act_handle4.id ? TRUE : FALSE;
|
|
}
|
|
|
|
NMProxyConfig *
|
|
nm_device_get_proxy_config (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), NULL);
|
|
|
|
return NM_DEVICE_GET_PRIVATE (self)->proxy_config;
|
|
}
|
|
|
|
static void
|
|
nm_device_set_proxy_config (NMDevice *self, const char *pac_url)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
NMConnection *connection;
|
|
NMSettingProxy *s_proxy = NULL;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
g_clear_object (&priv->proxy_config);
|
|
priv->proxy_config = nm_proxy_config_new ();
|
|
|
|
if (pac_url) {
|
|
nm_proxy_config_set_method (priv->proxy_config, NM_PROXY_CONFIG_METHOD_AUTO);
|
|
nm_proxy_config_set_pac_url (priv->proxy_config, pac_url);
|
|
_LOGD (LOGD_PROXY, "proxy: PAC url \"%s\"", pac_url);
|
|
} else
|
|
nm_proxy_config_set_method (priv->proxy_config, NM_PROXY_CONFIG_METHOD_NONE);
|
|
|
|
connection = nm_device_get_applied_connection (self);
|
|
if (connection)
|
|
s_proxy = nm_connection_get_setting_proxy (connection);
|
|
|
|
if (s_proxy)
|
|
nm_proxy_config_merge_setting (priv->proxy_config, s_proxy);
|
|
}
|
|
|
|
/* IP Configuration stuff */
|
|
NMDhcp4Config *
|
|
nm_device_get_dhcp4_config (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), NULL);
|
|
|
|
return NM_DEVICE_GET_PRIVATE (self)->dhcp4.config;
|
|
}
|
|
|
|
NMIP4Config *
|
|
nm_device_get_ip4_config (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), NULL);
|
|
|
|
return NM_DEVICE_GET_PRIVATE (self)->ip4_config;
|
|
}
|
|
|
|
|
|
static gboolean
|
|
nm_device_set_ip4_config (NMDevice *self,
|
|
NMIP4Config *new_config,
|
|
guint32 default_route_metric,
|
|
gboolean commit,
|
|
gboolean routes_full_sync)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
NMIP4Config *old_config = NULL;
|
|
gboolean has_changes = FALSE;
|
|
gboolean success = TRUE;
|
|
gboolean def_route_changed;
|
|
int ip_ifindex, config_ifindex;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
|
|
_LOGD (LOGD_IP4, "ip4-config: update (commit=%d, routes-full-sync=%d, new-config=%p)",
|
|
commit, routes_full_sync, new_config);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
ip_ifindex = nm_device_get_ip_ifindex (self);
|
|
|
|
if (new_config) {
|
|
config_ifindex = nm_ip4_config_get_ifindex (new_config);
|
|
if (config_ifindex > 0)
|
|
g_return_val_if_fail (ip_ifindex == config_ifindex, FALSE);
|
|
}
|
|
|
|
old_config = priv->ip4_config;
|
|
|
|
/* Always commit to nm-platform to update lifetimes */
|
|
if (commit && new_config) {
|
|
gboolean assumed = nm_device_sys_iface_state_is_external_or_assume (self);
|
|
|
|
_commit_mtu (self, new_config);
|
|
/* For assumed devices we must not touch the kernel-routes, such as the device-route.
|
|
* FIXME: this is wrong in case where "assumed" means "take-over-seamlessly". In this
|
|
* case, we should manage the device route, for example on new DHCP lease. */
|
|
success = nm_ip4_config_commit (new_config,
|
|
nm_device_get_platform (self),
|
|
nm_netns_get_route_manager (priv->netns),
|
|
ip_ifindex,
|
|
routes_full_sync,
|
|
assumed ? (gint64) -1 : (gint64) default_route_metric);
|
|
}
|
|
|
|
if (new_config) {
|
|
if (old_config) {
|
|
/* has_changes is set only on relevant changes, because when the configuration changes,
|
|
* this causes a re-read and reset. This should only happen for relevant changes */
|
|
nm_ip4_config_replace (old_config, new_config, &has_changes);
|
|
if (has_changes) {
|
|
_LOGD (LOGD_IP4, "ip4-config: update IP4Config instance (%s)",
|
|
nm_exported_object_get_path (NM_EXPORTED_OBJECT (old_config)));
|
|
}
|
|
} else {
|
|
has_changes = TRUE;
|
|
priv->ip4_config = g_object_ref (new_config);
|
|
|
|
if (success && !nm_exported_object_is_exported (NM_EXPORTED_OBJECT (new_config)))
|
|
nm_exported_object_export (NM_EXPORTED_OBJECT (new_config));
|
|
|
|
_LOGD (LOGD_IP4, "ip4-config: set IP4Config instance (%s)",
|
|
nm_exported_object_get_path (NM_EXPORTED_OBJECT (new_config)));
|
|
}
|
|
} else if (old_config) {
|
|
has_changes = TRUE;
|
|
priv->ip4_config = NULL;
|
|
_LOGD (LOGD_IP4, "ip4-config: clear IP4Config instance (%s)",
|
|
nm_exported_object_get_path (NM_EXPORTED_OBJECT (old_config)));
|
|
/* Device config is invalid if combined config is invalid */
|
|
g_clear_object (&priv->dev_ip4_config);
|
|
}
|
|
|
|
def_route_changed = nm_default_route_manager_ip4_update_default_route (nm_netns_get_default_route_manager (priv->netns), self);
|
|
concheck_periodic_update (self);
|
|
|
|
if (!nm_device_sys_iface_state_is_external_or_assume (self))
|
|
ip4_rp_filter_update (self);
|
|
|
|
if (has_changes) {
|
|
NMSettingsConnection *settings_connection;
|
|
|
|
_update_ip4_address (self);
|
|
|
|
if (old_config != priv->ip4_config)
|
|
_notify (self, PROP_IP4_CONFIG);
|
|
g_signal_emit (self, signals[IP4_CONFIG_CHANGED], 0, priv->ip4_config, old_config);
|
|
|
|
if (old_config != priv->ip4_config)
|
|
nm_exported_object_clear_and_unexport (&old_config);
|
|
|
|
if ( nm_device_sys_iface_state_is_external (self)
|
|
&& (settings_connection = nm_device_get_settings_connection (self))
|
|
&& nm_settings_connection_get_nm_generated (settings_connection)
|
|
&& nm_active_connection_get_activation_type (NM_ACTIVE_CONNECTION (priv->act_request)) == NM_ACTIVATION_TYPE_EXTERNAL) {
|
|
NMSetting *s_ip4;
|
|
|
|
g_object_freeze_notify (G_OBJECT (settings_connection));
|
|
|
|
nm_connection_remove_setting (NM_CONNECTION (settings_connection), NM_TYPE_SETTING_IP4_CONFIG);
|
|
s_ip4 = nm_ip4_config_create_setting (priv->ip4_config);
|
|
nm_connection_add_setting (NM_CONNECTION (settings_connection), s_ip4);
|
|
|
|
g_object_thaw_notify (G_OBJECT (settings_connection));
|
|
}
|
|
|
|
nm_device_queue_recheck_assume (self);
|
|
} else if (def_route_changed) {
|
|
_LOGD (LOGD_IP4, "ip4-config: default route changed");
|
|
g_signal_emit (self, signals[IP4_CONFIG_CHANGED], 0, priv->ip4_config, priv->ip4_config);
|
|
}
|
|
|
|
return success;
|
|
}
|
|
|
|
static gboolean
|
|
_replace_vpn_config_in_list (GSList **plist, GObject *old, GObject *new)
|
|
{
|
|
GSList *old_link;
|
|
|
|
/* Below, assert that @new is not yet tracked, but still behave
|
|
* correctly in any case. Don't complain for missing @old since
|
|
* it could have been removed when the parent device became
|
|
* unmanaged. */
|
|
|
|
if ( old
|
|
&& (old_link = g_slist_find (*plist, old))) {
|
|
if (old != new) {
|
|
if (new)
|
|
old_link->data = g_object_ref (new);
|
|
else
|
|
*plist = g_slist_delete_link (*plist, old_link);
|
|
g_object_unref (old);
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
if (new) {
|
|
if (!g_slist_find (*plist, new))
|
|
*plist = g_slist_append (*plist, g_object_ref (new));
|
|
else
|
|
g_return_val_if_reached (TRUE);
|
|
return TRUE;
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
void
|
|
nm_device_replace_vpn4_config (NMDevice *self, NMIP4Config *old, NMIP4Config *config)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (!_replace_vpn_config_in_list (&priv->vpn4_configs, (GObject *) old, (GObject *) config))
|
|
return;
|
|
|
|
/* NULL to use existing configs */
|
|
if (!ip4_config_merge_and_apply (self, NULL, TRUE))
|
|
_LOGW (LOGD_IP4, "failed to set VPN routes for device");
|
|
}
|
|
|
|
void
|
|
nm_device_set_wwan_ip4_config (NMDevice *self, NMIP4Config *config)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->wwan_ip4_config == config)
|
|
return;
|
|
|
|
g_clear_object (&priv->wwan_ip4_config);
|
|
if (config)
|
|
priv->wwan_ip4_config = g_object_ref (config);
|
|
|
|
/* NULL to use existing configs */
|
|
if (!ip4_config_merge_and_apply (self, NULL, TRUE))
|
|
_LOGW (LOGD_IP4, "failed to set WWAN IPv4 configuration");
|
|
}
|
|
|
|
static gboolean
|
|
nm_device_set_ip6_config (NMDevice *self,
|
|
NMIP6Config *new_config,
|
|
gboolean commit,
|
|
gboolean routes_full_sync)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
NMIP6Config *old_config = NULL;
|
|
gboolean has_changes = FALSE;
|
|
gboolean success = TRUE;
|
|
gboolean def_route_changed;
|
|
int ip_ifindex, config_ifindex;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
|
|
_LOGD (LOGD_IP6, "ip6-config: update (commit=%d, routes-full-sync=%d, new-config=%p)",
|
|
commit, routes_full_sync, new_config);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
ip_ifindex = nm_device_get_ip_ifindex (self);
|
|
|
|
if (new_config) {
|
|
config_ifindex = nm_ip6_config_get_ifindex (new_config);
|
|
if (config_ifindex > 0)
|
|
g_return_val_if_fail (ip_ifindex == config_ifindex, FALSE);
|
|
}
|
|
|
|
old_config = priv->ip6_config;
|
|
|
|
/* Always commit to nm-platform to update lifetimes */
|
|
if (commit && new_config) {
|
|
_commit_mtu (self, priv->ip4_config);
|
|
success = nm_ip6_config_commit (new_config,
|
|
nm_device_get_platform (self),
|
|
nm_netns_get_route_manager (priv->netns),
|
|
ip_ifindex,
|
|
routes_full_sync);
|
|
}
|
|
|
|
if (new_config) {
|
|
if (old_config) {
|
|
/* has_changes is set only on relevant changes, because when the configuration changes,
|
|
* this causes a re-read and reset. This should only happen for relevant changes */
|
|
nm_ip6_config_replace (old_config, new_config, &has_changes);
|
|
if (has_changes) {
|
|
_LOGD (LOGD_IP6, "ip6-config: update IP6Config instance (%s)",
|
|
nm_exported_object_get_path (NM_EXPORTED_OBJECT (old_config)));
|
|
}
|
|
} else {
|
|
has_changes = TRUE;
|
|
priv->ip6_config = g_object_ref (new_config);
|
|
|
|
if (success && !nm_exported_object_is_exported (NM_EXPORTED_OBJECT (new_config)))
|
|
nm_exported_object_export (NM_EXPORTED_OBJECT (new_config));
|
|
|
|
_LOGD (LOGD_IP6, "ip6-config: set IP6Config instance (%s)",
|
|
nm_exported_object_get_path (NM_EXPORTED_OBJECT (new_config)));
|
|
}
|
|
} else if (old_config) {
|
|
has_changes = TRUE;
|
|
priv->ip6_config = NULL;
|
|
priv->needs_ip6_subnet = FALSE;
|
|
_LOGD (LOGD_IP6, "ip6-config: clear IP6Config instance (%s)",
|
|
nm_exported_object_get_path (NM_EXPORTED_OBJECT (old_config)));
|
|
}
|
|
|
|
def_route_changed = nm_default_route_manager_ip6_update_default_route (nm_netns_get_default_route_manager (priv->netns), self);
|
|
|
|
if (has_changes) {
|
|
NMSettingsConnection *settings_connection;
|
|
|
|
if (old_config != priv->ip6_config)
|
|
_notify (self, PROP_IP6_CONFIG);
|
|
g_signal_emit (self, signals[IP6_CONFIG_CHANGED], 0, priv->ip6_config, old_config);
|
|
|
|
if (old_config != priv->ip6_config)
|
|
nm_exported_object_clear_and_unexport (&old_config);
|
|
|
|
if ( nm_device_sys_iface_state_is_external (self)
|
|
&& (settings_connection = nm_device_get_settings_connection (self))
|
|
&& nm_settings_connection_get_nm_generated (settings_connection)
|
|
&& nm_active_connection_get_activation_type (NM_ACTIVE_CONNECTION (priv->act_request)) == NM_ACTIVATION_TYPE_EXTERNAL) {
|
|
NMSetting *s_ip6;
|
|
|
|
g_object_freeze_notify (G_OBJECT (settings_connection));
|
|
|
|
nm_connection_remove_setting (NM_CONNECTION (settings_connection), NM_TYPE_SETTING_IP6_CONFIG);
|
|
s_ip6 = nm_ip6_config_create_setting (priv->ip6_config);
|
|
nm_connection_add_setting (NM_CONNECTION (settings_connection), s_ip6);
|
|
|
|
g_object_thaw_notify (G_OBJECT (settings_connection));
|
|
}
|
|
|
|
nm_device_queue_recheck_assume (self);
|
|
|
|
if (priv->ndisc)
|
|
ndisc_set_router_config (priv->ndisc, self);
|
|
} else if (def_route_changed) {
|
|
_LOGD (LOGD_IP6, "ip6-config: default route changed");
|
|
g_signal_emit (self, signals[IP6_CONFIG_CHANGED], 0, priv->ip6_config, priv->ip6_config);
|
|
}
|
|
|
|
return success;
|
|
}
|
|
|
|
void
|
|
nm_device_replace_vpn6_config (NMDevice *self, NMIP6Config *old, NMIP6Config *config)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (!_replace_vpn_config_in_list (&priv->vpn6_configs, (GObject *) old, (GObject *) config))
|
|
return;
|
|
|
|
/* NULL to use existing configs */
|
|
if (!ip6_config_merge_and_apply (self, TRUE))
|
|
_LOGW (LOGD_IP6, "failed to set VPN routes for device");
|
|
}
|
|
|
|
void
|
|
nm_device_set_wwan_ip6_config (NMDevice *self, NMIP6Config *config)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->wwan_ip6_config == config)
|
|
return;
|
|
|
|
g_clear_object (&priv->wwan_ip6_config);
|
|
if (config)
|
|
priv->wwan_ip6_config = g_object_ref (config);
|
|
|
|
/* NULL to use existing configs */
|
|
if (!ip6_config_merge_and_apply (self, TRUE))
|
|
_LOGW (LOGD_IP6, "failed to set WWAN IPv6 configuration");
|
|
}
|
|
|
|
NMDhcp6Config *
|
|
nm_device_get_dhcp6_config (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), NULL);
|
|
|
|
return NM_DEVICE_GET_PRIVATE (self)->dhcp6.config;
|
|
}
|
|
|
|
NMIP6Config *
|
|
nm_device_get_ip6_config (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), NULL);
|
|
|
|
return NM_DEVICE_GET_PRIVATE (self)->ip6_config;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static void
|
|
dispatcher_cleanup (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->dispatcher.call_id) {
|
|
nm_dispatcher_call_cancel (priv->dispatcher.call_id);
|
|
priv->dispatcher.call_id = 0;
|
|
priv->dispatcher.post_state = NM_DEVICE_STATE_UNKNOWN;
|
|
priv->dispatcher.post_state_reason = NM_DEVICE_STATE_REASON_NONE;
|
|
}
|
|
}
|
|
|
|
static void
|
|
dispatcher_complete_proceed_state (guint call_id, gpointer user_data)
|
|
{
|
|
NMDevice *self = NM_DEVICE (user_data);
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
g_return_if_fail (call_id == priv->dispatcher.call_id);
|
|
|
|
priv->dispatcher.call_id = 0;
|
|
nm_device_queue_state (self, priv->dispatcher.post_state,
|
|
priv->dispatcher.post_state_reason);
|
|
priv->dispatcher.post_state = NM_DEVICE_STATE_UNKNOWN;
|
|
priv->dispatcher.post_state_reason = NM_DEVICE_STATE_REASON_NONE;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static void
|
|
ip_check_pre_up (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->dispatcher.call_id != 0) {
|
|
g_warn_if_reached ();
|
|
dispatcher_cleanup (self);
|
|
}
|
|
|
|
priv->dispatcher.post_state = NM_DEVICE_STATE_SECONDARIES;
|
|
priv->dispatcher.post_state_reason = NM_DEVICE_STATE_REASON_NONE;
|
|
if (!nm_dispatcher_call_device (NM_DISPATCHER_ACTION_PRE_UP,
|
|
self,
|
|
NULL,
|
|
dispatcher_complete_proceed_state,
|
|
self,
|
|
&priv->dispatcher.call_id)) {
|
|
/* Just proceed on errors */
|
|
dispatcher_complete_proceed_state (0, self);
|
|
}
|
|
}
|
|
|
|
static void
|
|
ip_check_gw_ping_cleanup (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
nm_clear_g_source (&priv->gw_ping.watch);
|
|
nm_clear_g_source (&priv->gw_ping.timeout);
|
|
|
|
if (priv->gw_ping.pid) {
|
|
nm_utils_kill_child_async (priv->gw_ping.pid, SIGTERM, priv->gw_ping.log_domain, "ping", 1000, NULL, NULL);
|
|
priv->gw_ping.pid = 0;
|
|
}
|
|
|
|
g_clear_pointer (&priv->gw_ping.binary, g_free);
|
|
g_clear_pointer (&priv->gw_ping.address, g_free);
|
|
}
|
|
|
|
static gboolean
|
|
spawn_ping (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
gs_free char *str_timeout = NULL;
|
|
gs_free char *tmp_str = NULL;
|
|
const char *args[] = { priv->gw_ping.binary, "-I", nm_device_get_ip_iface (self),
|
|
"-c", "1", "-w", NULL, priv->gw_ping.address, NULL };
|
|
gs_free_error GError *error = NULL;
|
|
gboolean ret;
|
|
|
|
args[6] = str_timeout = g_strdup_printf ("%u", priv->gw_ping.deadline);
|
|
tmp_str = g_strjoinv (" ", (gchar **) args);
|
|
_LOGD (priv->gw_ping.log_domain, "ping: running '%s'", tmp_str);
|
|
|
|
ret = g_spawn_async ("/",
|
|
(gchar **) args,
|
|
NULL,
|
|
G_SPAWN_DO_NOT_REAP_CHILD,
|
|
NULL,
|
|
NULL,
|
|
&priv->gw_ping.pid,
|
|
&error);
|
|
|
|
if (!ret) {
|
|
_LOGW (priv->gw_ping.log_domain, "ping: could not spawn %s: %s",
|
|
priv->gw_ping.binary, error->message);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static gboolean
|
|
respawn_ping_cb (gpointer user_data)
|
|
{
|
|
NMDevice *self = NM_DEVICE (user_data);
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
priv->gw_ping.watch = 0;
|
|
|
|
if (spawn_ping (self)) {
|
|
priv->gw_ping.watch = g_child_watch_add (priv->gw_ping.pid,
|
|
ip_check_ping_watch_cb, self);
|
|
} else {
|
|
ip_check_gw_ping_cleanup (self);
|
|
ip_check_pre_up (self);
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
static void
|
|
ip_check_ping_watch_cb (GPid pid, gint status, gpointer user_data)
|
|
{
|
|
NMDevice *self = NM_DEVICE (user_data);
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMLogDomain log_domain = priv->gw_ping.log_domain;
|
|
gboolean success = FALSE;
|
|
|
|
if (!priv->gw_ping.watch)
|
|
return;
|
|
priv->gw_ping.watch = 0;
|
|
priv->gw_ping.pid = 0;
|
|
|
|
if (WIFEXITED (status)) {
|
|
if (WEXITSTATUS (status) == 0) {
|
|
_LOGD (log_domain, "ping: gateway ping succeeded");
|
|
success = TRUE;
|
|
} else {
|
|
_LOGW (log_domain, "ping: gateway ping failed with error code %d",
|
|
WEXITSTATUS (status));
|
|
}
|
|
} else
|
|
_LOGW (log_domain, "ping: stopped unexpectedly with status %d", status);
|
|
|
|
if (success) {
|
|
/* We've got connectivity, proceed to pre_up */
|
|
ip_check_gw_ping_cleanup (self);
|
|
ip_check_pre_up (self);
|
|
} else {
|
|
/* If ping exited with an error it may have returned early,
|
|
* wait 1 second and restart it */
|
|
priv->gw_ping.watch = g_timeout_add_seconds (1, respawn_ping_cb, self);
|
|
}
|
|
}
|
|
|
|
static gboolean
|
|
ip_check_ping_timeout_cb (gpointer user_data)
|
|
{
|
|
NMDevice *self = NM_DEVICE (user_data);
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
priv->gw_ping.timeout = 0;
|
|
|
|
_LOGW (priv->gw_ping.log_domain, "ping: gateway ping timed out");
|
|
|
|
ip_check_gw_ping_cleanup (self);
|
|
ip_check_pre_up (self);
|
|
return FALSE;
|
|
}
|
|
|
|
static gboolean
|
|
start_ping (NMDevice *self,
|
|
NMLogDomain log_domain,
|
|
const char *binary,
|
|
const char *address,
|
|
guint timeout)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
g_return_val_if_fail (priv->gw_ping.watch == 0, FALSE);
|
|
g_return_val_if_fail (priv->gw_ping.timeout == 0, FALSE);
|
|
|
|
priv->gw_ping.log_domain = log_domain;
|
|
priv->gw_ping.address = g_strdup (address);
|
|
priv->gw_ping.binary = g_strdup (binary);
|
|
priv->gw_ping.deadline = timeout + 10; /* the proper termination is enforced by a timer */
|
|
|
|
if (spawn_ping (self)) {
|
|
priv->gw_ping.watch = g_child_watch_add (priv->gw_ping.pid, ip_check_ping_watch_cb, self);
|
|
priv->gw_ping.timeout = g_timeout_add_seconds (timeout, ip_check_ping_timeout_cb, self);
|
|
return TRUE;
|
|
}
|
|
|
|
ip_check_gw_ping_cleanup (self);
|
|
return FALSE;
|
|
}
|
|
|
|
static void
|
|
nm_device_start_ip_check (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMConnection *connection;
|
|
NMSettingConnection *s_con;
|
|
guint timeout = 0;
|
|
const char *ping_binary = NULL;
|
|
char buf[INET6_ADDRSTRLEN] = { 0 };
|
|
NMLogDomain log_domain = LOGD_IP4;
|
|
|
|
/* Shouldn't be any active ping here, since IP_CHECK happens after the
|
|
* first IP method completes. Any subsequently completing IP method doesn't
|
|
* get checked.
|
|
*/
|
|
g_return_if_fail (!priv->gw_ping.watch);
|
|
g_return_if_fail (!priv->gw_ping.timeout);
|
|
g_return_if_fail (!priv->gw_ping.pid);
|
|
g_return_if_fail (priv->ip4_state == IP_DONE || priv->ip6_state == IP_DONE);
|
|
|
|
connection = nm_device_get_applied_connection (self);
|
|
g_assert (connection);
|
|
|
|
s_con = nm_connection_get_setting_connection (connection);
|
|
g_assert (s_con);
|
|
timeout = nm_setting_connection_get_gateway_ping_timeout (s_con);
|
|
|
|
if (timeout) {
|
|
if (priv->ip4_config && priv->ip4_state == IP_DONE) {
|
|
guint gw = 0;
|
|
|
|
ping_binary = nm_utils_find_helper ("ping", "/usr/bin/ping", NULL);
|
|
log_domain = LOGD_IP4;
|
|
|
|
gw = nm_ip4_config_get_gateway (priv->ip4_config);
|
|
if (gw && !inet_ntop (AF_INET, &gw, buf, sizeof (buf)))
|
|
buf[0] = '\0';
|
|
} else if (priv->ip6_config && priv->ip6_state == IP_DONE) {
|
|
const struct in6_addr *gw = NULL;
|
|
|
|
ping_binary = nm_utils_find_helper ("ping6", "/usr/bin/ping6", NULL);
|
|
log_domain = LOGD_IP6;
|
|
|
|
gw = nm_ip6_config_get_gateway (priv->ip6_config);
|
|
if (gw && !inet_ntop (AF_INET6, gw, buf, sizeof (buf)))
|
|
buf[0] = '\0';
|
|
}
|
|
}
|
|
|
|
if (buf[0])
|
|
start_ping (self, log_domain, ping_binary, buf, timeout);
|
|
|
|
/* If no ping was started, just advance to pre_up */
|
|
if (!priv->gw_ping.pid)
|
|
ip_check_pre_up (self);
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static gboolean
|
|
carrier_wait_timeout (gpointer user_data)
|
|
{
|
|
NMDevice *self = NM_DEVICE (user_data);
|
|
|
|
NM_DEVICE_GET_PRIVATE (self)->carrier_wait_id = 0;
|
|
nm_device_remove_pending_action (self, NM_PENDING_ACTION_CARRIER_WAIT, TRUE);
|
|
|
|
_carrier_wait_check_queued_act_request (self);
|
|
|
|
return G_SOURCE_REMOVE;
|
|
}
|
|
|
|
static gboolean
|
|
nm_device_is_up (NMDevice *self)
|
|
{
|
|
int ifindex;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
|
|
ifindex = nm_device_get_ip_ifindex (self);
|
|
return ifindex > 0 ? nm_platform_link_is_up (nm_device_get_platform (self), ifindex) : TRUE;
|
|
}
|
|
|
|
gboolean
|
|
nm_device_bring_up (NMDevice *self, gboolean block, gboolean *no_firmware)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
gboolean device_is_up = FALSE;
|
|
NMDeviceCapabilities capabilities;
|
|
int ifindex;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
|
|
NM_SET_OUT (no_firmware, FALSE);
|
|
|
|
if (!nm_device_get_enabled (self)) {
|
|
_LOGD (LOGD_PLATFORM, "bringing up device ignored due to disabled");
|
|
return FALSE;
|
|
}
|
|
|
|
ifindex = nm_device_get_ip_ifindex (self);
|
|
_LOGD (LOGD_PLATFORM, "bringing up device %d", ifindex);
|
|
if (ifindex <= 0) {
|
|
/* assume success. */
|
|
} else {
|
|
if (!nm_platform_link_set_up (nm_device_get_platform (self), ifindex, no_firmware))
|
|
return FALSE;
|
|
}
|
|
|
|
/* Store carrier immediately. */
|
|
if (nm_device_has_capability (self, NM_DEVICE_CAP_CARRIER_DETECT))
|
|
check_carrier (self);
|
|
|
|
device_is_up = nm_device_is_up (self);
|
|
if (block && !device_is_up) {
|
|
gint64 wait_until = nm_utils_get_monotonic_timestamp_us () + 10000 /* microseconds */;
|
|
|
|
do {
|
|
g_usleep (200);
|
|
if (!nm_platform_link_refresh (nm_device_get_platform (self), ifindex))
|
|
return FALSE;
|
|
device_is_up = nm_device_is_up (self);
|
|
} while (!device_is_up && nm_utils_get_monotonic_timestamp_us () < wait_until);
|
|
}
|
|
|
|
if (!device_is_up) {
|
|
if (block)
|
|
_LOGW (LOGD_PLATFORM, "device not up after timeout!");
|
|
else
|
|
_LOGD (LOGD_PLATFORM, "device not up immediately");
|
|
return FALSE;
|
|
}
|
|
|
|
/* some ethernet devices fail to report capabilities unless the device
|
|
* is up. Re-read the capabilities. */
|
|
capabilities = 0;
|
|
if (NM_DEVICE_GET_CLASS (self)->get_generic_capabilities)
|
|
capabilities |= NM_DEVICE_GET_CLASS (self)->get_generic_capabilities (self);
|
|
_add_capabilities (self, capabilities);
|
|
|
|
/* Devices that support carrier detect must be IFF_UP to report carrier
|
|
* changes; so after setting the device IFF_UP we must suppress startup
|
|
* complete (via a pending action) until either the carrier turns on, or
|
|
* a timeout is reached.
|
|
*/
|
|
if (nm_device_has_capability (self, NM_DEVICE_CAP_CARRIER_DETECT)) {
|
|
if (!nm_clear_g_source (&priv->carrier_wait_id))
|
|
nm_device_add_pending_action (self, NM_PENDING_ACTION_CARRIER_WAIT, TRUE);
|
|
priv->carrier_wait_id = g_timeout_add_seconds (5, carrier_wait_timeout, self);
|
|
}
|
|
|
|
/* Can only get HW address of some devices when they are up */
|
|
nm_device_update_hw_address (self);
|
|
|
|
_update_ip4_address (self);
|
|
|
|
/* when the link comes up, we must restore IP configuration if necessary. */
|
|
if (priv->ip4_state == IP_DONE) {
|
|
if (!ip4_config_merge_and_apply (self, NULL, TRUE))
|
|
_LOGW (LOGD_IP4, "failed applying IP4 config after bringing link up");
|
|
}
|
|
if (priv->ip6_state == IP_DONE) {
|
|
if (!ip6_config_merge_and_apply (self, TRUE))
|
|
_LOGW (LOGD_IP6, "failed applying IP6 config after bringing link up");
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
void
|
|
nm_device_take_down (NMDevice *self, gboolean block)
|
|
{
|
|
int ifindex;
|
|
gboolean device_is_up;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
ifindex = nm_device_get_ip_ifindex (self);
|
|
_LOGD (LOGD_PLATFORM, "taking down device %d", ifindex);
|
|
if (ifindex <= 0) {
|
|
/* devices without ifindex are always up. */
|
|
return;
|
|
}
|
|
|
|
if (!nm_platform_link_set_down (nm_device_get_platform (self), ifindex))
|
|
return;
|
|
|
|
device_is_up = nm_device_is_up (self);
|
|
if (block && device_is_up) {
|
|
gint64 wait_until = nm_utils_get_monotonic_timestamp_us () + 10000 /* microseconds */;
|
|
|
|
do {
|
|
g_usleep (200);
|
|
if (!nm_platform_link_refresh (nm_device_get_platform (self), ifindex))
|
|
return;
|
|
device_is_up = nm_device_is_up (self);
|
|
} while (device_is_up && nm_utils_get_monotonic_timestamp_us () < wait_until);
|
|
}
|
|
|
|
if (device_is_up) {
|
|
if (block)
|
|
_LOGW (LOGD_PLATFORM, "device not down after timeout!");
|
|
else
|
|
_LOGD (LOGD_PLATFORM, "device not down immediately");
|
|
}
|
|
}
|
|
|
|
void
|
|
nm_device_set_firmware_missing (NMDevice *self, gboolean new_missing)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
if (priv->firmware_missing != new_missing) {
|
|
priv->firmware_missing = new_missing;
|
|
_notify (self, PROP_FIRMWARE_MISSING);
|
|
}
|
|
}
|
|
|
|
gboolean
|
|
nm_device_get_firmware_missing (NMDevice *self)
|
|
{
|
|
return NM_DEVICE_GET_PRIVATE (self)->firmware_missing;
|
|
}
|
|
|
|
static NMIP4Config *
|
|
find_ip4_lease_config (NMDevice *self,
|
|
NMConnection *connection,
|
|
NMIP4Config *ext_ip4_config)
|
|
{
|
|
const char *ip_iface = nm_device_get_ip_iface (self);
|
|
int ip_ifindex = nm_device_get_ip_ifindex (self);
|
|
GSList *leases, *liter;
|
|
NMIP4Config *found = NULL;
|
|
|
|
g_return_val_if_fail (NM_IS_IP4_CONFIG (ext_ip4_config), NULL);
|
|
g_return_val_if_fail (NM_IS_CONNECTION (connection), NULL);
|
|
|
|
leases = nm_dhcp_manager_get_lease_ip_configs (nm_dhcp_manager_get (),
|
|
ip_iface,
|
|
ip_ifindex,
|
|
nm_connection_get_uuid (connection),
|
|
FALSE,
|
|
nm_device_get_ip4_route_metric (self));
|
|
for (liter = leases; liter && !found; liter = liter->next) {
|
|
NMIP4Config *lease_config = liter->data;
|
|
const NMPlatformIP4Address *address = nm_ip4_config_get_address (lease_config, 0);
|
|
guint32 gateway = nm_ip4_config_get_gateway (lease_config);
|
|
|
|
g_assert (address);
|
|
if (!nm_ip4_config_address_exists (ext_ip4_config, address))
|
|
continue;
|
|
if (gateway != nm_ip4_config_get_gateway (ext_ip4_config))
|
|
continue;
|
|
found = g_object_ref (lease_config);
|
|
}
|
|
|
|
g_slist_free_full (leases, g_object_unref);
|
|
return found;
|
|
}
|
|
|
|
static void
|
|
capture_lease_config (NMDevice *self,
|
|
NMIP4Config *ext_ip4_config,
|
|
NMIP4Config **out_ip4_config,
|
|
NMIP6Config *ext_ip6_config,
|
|
NMIP6Config **out_ip6_config)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMSettingsConnection *const*connections;
|
|
guint i;
|
|
gboolean dhcp_used = FALSE;
|
|
|
|
/* Ensure at least one address on the device has a non-infinite lifetime,
|
|
* otherwise DHCP cannot possibly be active on the device right now.
|
|
*/
|
|
if (ext_ip4_config && out_ip4_config) {
|
|
for (i = 0; i < nm_ip4_config_get_num_addresses (ext_ip4_config); i++) {
|
|
const NMPlatformIP4Address *addr = nm_ip4_config_get_address (ext_ip4_config, i);
|
|
|
|
if (addr->lifetime != NM_PLATFORM_LIFETIME_PERMANENT) {
|
|
dhcp_used = TRUE;
|
|
break;
|
|
}
|
|
}
|
|
} else if (ext_ip6_config && out_ip6_config) {
|
|
for (i = 0; i < nm_ip6_config_get_num_addresses (ext_ip6_config); i++) {
|
|
const NMPlatformIP6Address *addr = nm_ip6_config_get_address (ext_ip6_config, i);
|
|
|
|
if (addr->lifetime != NM_PLATFORM_LIFETIME_PERMANENT) {
|
|
dhcp_used = TRUE;
|
|
break;
|
|
}
|
|
}
|
|
} else {
|
|
g_return_if_fail ( (ext_ip6_config && out_ip6_config)
|
|
|| (ext_ip4_config && out_ip4_config));
|
|
}
|
|
|
|
if (!dhcp_used)
|
|
return;
|
|
|
|
connections = nm_settings_get_connections (priv->settings, NULL);
|
|
for (i = 0; connections[i]; i++) {
|
|
NMConnection *candidate = (NMConnection *) connections[i];
|
|
const char *method;
|
|
|
|
if (!nm_device_check_connection_compatible (self, candidate))
|
|
continue;
|
|
|
|
/* IPv4 leases */
|
|
method = nm_utils_get_ip_config_method (candidate, NM_TYPE_SETTING_IP4_CONFIG);
|
|
if (out_ip4_config && strcmp (method, NM_SETTING_IP4_CONFIG_METHOD_AUTO) == 0) {
|
|
*out_ip4_config = find_ip4_lease_config (self, candidate, ext_ip4_config);
|
|
if (*out_ip4_config)
|
|
return;
|
|
}
|
|
|
|
/* IPv6 leases */
|
|
method = nm_utils_get_ip_config_method (candidate, NM_TYPE_SETTING_IP6_CONFIG);
|
|
if (out_ip6_config && strcmp (method, NM_SETTING_IP6_CONFIG_METHOD_AUTO) == 0) {
|
|
/* FIXME: implement find_ip6_lease_config() */
|
|
}
|
|
}
|
|
}
|
|
|
|
static void
|
|
_ip4_config_intersect (gpointer value, gpointer user_data)
|
|
{
|
|
NMIP4Config *dst = (NMIP4Config *) value;
|
|
NMIP4Config *src = (NMIP4Config *) user_data;
|
|
|
|
nm_ip4_config_intersect (dst, src);
|
|
}
|
|
|
|
static void
|
|
_ip4_config_subtract (gpointer value, gpointer user_data)
|
|
{
|
|
NMIP4Config *dst = (NMIP4Config *) user_data;
|
|
NMIP4Config *src = (NMIP4Config *) value;
|
|
|
|
nm_ip4_config_subtract (dst, src);
|
|
}
|
|
|
|
static void
|
|
update_ip4_config (NMDevice *self, gboolean initial)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
int ifindex;
|
|
gboolean capture_resolv_conf;
|
|
|
|
/* If a commit is scheduled, this function would potentially interfere with
|
|
* it changing IP configurations before they are applied. Postpone the
|
|
* update in such case.
|
|
*/
|
|
if ( !initial
|
|
&& activation_source_is_scheduled (self,
|
|
activate_stage5_ip4_config_commit,
|
|
AF_INET)) {
|
|
priv->queued_ip4_config_pending = FALSE;
|
|
priv->queued_ip4_config_id = g_idle_add (queued_ip4_config_change, self);
|
|
_LOGT (LOGD_DEVICE, "IP4 update was postponed");
|
|
return;
|
|
}
|
|
|
|
ifindex = nm_device_get_ip_ifindex (self);
|
|
if (!ifindex)
|
|
return;
|
|
|
|
capture_resolv_conf = initial
|
|
&& nm_dns_manager_get_resolv_conf_explicit (nm_dns_manager_get ());
|
|
|
|
/* IPv4 */
|
|
g_clear_object (&priv->ext_ip4_config);
|
|
priv->ext_ip4_config = nm_ip4_config_capture (nm_device_get_platform (self),
|
|
ifindex,
|
|
capture_resolv_conf);
|
|
if (priv->ext_ip4_config) {
|
|
if (initial) {
|
|
g_clear_object (&priv->dev_ip4_config);
|
|
capture_lease_config (self, priv->ext_ip4_config, &priv->dev_ip4_config, NULL, NULL);
|
|
}
|
|
|
|
/* FIXME: ext_ip4_config does not contain routes with source==RTPROT_KERNEL.
|
|
* Hence, we will wrongly remove device-routes with metric=0 if they were added by
|
|
* the user on purpose. This should be fixed by also tracking and exposing
|
|
* kernel routes. */
|
|
|
|
/* This function was called upon external changes. Remove the configuration
|
|
* (addresses,routes) that is no longer present externally from the internal
|
|
* config. This way, we don't re-add addresses that were manually removed
|
|
* by the user. */
|
|
if (priv->con_ip4_config)
|
|
nm_ip4_config_intersect (priv->con_ip4_config, priv->ext_ip4_config);
|
|
if (priv->dev_ip4_config)
|
|
nm_ip4_config_intersect (priv->dev_ip4_config, priv->ext_ip4_config);
|
|
|
|
g_slist_foreach (priv->vpn4_configs, _ip4_config_intersect, priv->ext_ip4_config);
|
|
|
|
if (priv->wwan_ip4_config)
|
|
nm_ip4_config_intersect (priv->wwan_ip4_config, priv->ext_ip4_config);
|
|
|
|
/* Remove parts from ext_ip4_config to only contain the information that
|
|
* was configured externally -- we already have the same configuration from
|
|
* internal origins. */
|
|
if (priv->con_ip4_config)
|
|
nm_ip4_config_subtract (priv->ext_ip4_config, priv->con_ip4_config);
|
|
if (priv->dev_ip4_config)
|
|
nm_ip4_config_subtract (priv->ext_ip4_config, priv->dev_ip4_config);
|
|
|
|
g_slist_foreach (priv->vpn4_configs, _ip4_config_subtract, priv->ext_ip4_config);
|
|
|
|
if (priv->wwan_ip4_config)
|
|
nm_ip4_config_subtract (priv->ext_ip4_config, priv->wwan_ip4_config);
|
|
|
|
ip4_config_merge_and_apply (self, NULL, FALSE);
|
|
}
|
|
}
|
|
|
|
static void
|
|
_ip6_config_intersect (gpointer value, gpointer user_data)
|
|
{
|
|
NMIP6Config *dst = (NMIP6Config *) value;
|
|
NMIP6Config *src = (NMIP6Config *) user_data;
|
|
|
|
nm_ip6_config_intersect (dst, src);
|
|
}
|
|
|
|
static void
|
|
_ip6_config_subtract (gpointer value, gpointer user_data)
|
|
{
|
|
NMIP6Config *dst = (NMIP6Config *) user_data;
|
|
NMIP6Config *src = (NMIP6Config *) value;
|
|
|
|
nm_ip6_config_subtract (dst, src);
|
|
}
|
|
|
|
static void
|
|
update_ip6_config (NMDevice *self, gboolean initial)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
int ifindex;
|
|
gboolean capture_resolv_conf;
|
|
|
|
/* If a commit is scheduled, this function would potentially interfere with
|
|
* it changing IP configurations before they are applied. Postpone the
|
|
* update in such case.
|
|
*/
|
|
if ( !initial
|
|
&& activation_source_is_scheduled (self,
|
|
activate_stage5_ip6_config_commit,
|
|
AF_INET6)) {
|
|
priv->queued_ip6_config_pending = FALSE;
|
|
priv->queued_ip6_config_id = g_idle_add (queued_ip6_config_change, self);
|
|
_LOGT (LOGD_DEVICE, "IP6 update was postponed");
|
|
return;
|
|
}
|
|
|
|
ifindex = nm_device_get_ip_ifindex (self);
|
|
if (!ifindex)
|
|
return;
|
|
|
|
capture_resolv_conf = initial
|
|
&& nm_dns_manager_get_resolv_conf_explicit (nm_dns_manager_get ());
|
|
|
|
/* IPv6 */
|
|
g_clear_object (&priv->ext_ip6_config);
|
|
g_clear_object (&priv->ext_ip6_config_captured);
|
|
priv->ext_ip6_config_captured = nm_ip6_config_capture (nm_device_get_platform (self), ifindex, capture_resolv_conf, NM_SETTING_IP6_CONFIG_PRIVACY_UNKNOWN);
|
|
if (priv->ext_ip6_config_captured) {
|
|
|
|
priv->ext_ip6_config = nm_ip6_config_new_cloned (priv->ext_ip6_config_captured);
|
|
|
|
/* This function was called upon external changes. Remove the configuration
|
|
* (addresses,routes) that is no longer present externally from the internal
|
|
* config. This way, we don't re-add addresses that were manually removed
|
|
* by the user. */
|
|
if (priv->con_ip6_config)
|
|
nm_ip6_config_intersect (priv->con_ip6_config, priv->ext_ip6_config);
|
|
if (priv->ac_ip6_config)
|
|
nm_ip6_config_intersect (priv->ac_ip6_config, priv->ext_ip6_config);
|
|
if (priv->dhcp6.ip6_config)
|
|
nm_ip6_config_intersect (priv->dhcp6.ip6_config, priv->ext_ip6_config);
|
|
if (priv->wwan_ip6_config)
|
|
nm_ip6_config_intersect (priv->wwan_ip6_config, priv->ext_ip6_config);
|
|
g_slist_foreach (priv->vpn6_configs, _ip6_config_intersect, priv->ext_ip6_config);
|
|
|
|
/* Remove parts from ext_ip6_config to only contain the information that
|
|
* was configured externally -- we already have the same configuration from
|
|
* internal origins. */
|
|
if (priv->con_ip6_config)
|
|
nm_ip6_config_subtract (priv->ext_ip6_config, priv->con_ip6_config);
|
|
if (priv->ac_ip6_config)
|
|
nm_ip6_config_subtract (priv->ext_ip6_config, priv->ac_ip6_config);
|
|
if (priv->dhcp6.ip6_config)
|
|
nm_ip6_config_subtract (priv->ext_ip6_config, priv->dhcp6.ip6_config);
|
|
if (priv->wwan_ip6_config)
|
|
nm_ip6_config_subtract (priv->ext_ip6_config, priv->wwan_ip6_config);
|
|
g_slist_foreach (priv->vpn6_configs, _ip6_config_subtract, priv->ext_ip6_config);
|
|
|
|
ip6_config_merge_and_apply (self, FALSE);
|
|
}
|
|
|
|
if ( priv->linklocal6_timeout_id
|
|
&& priv->ext_ip6_config_captured
|
|
&& nm_ip6_config_get_address_first_nontentative (priv->ext_ip6_config_captured, TRUE)) {
|
|
/* linklocal6 is ready now, do the state transition... we are also
|
|
* invoked as g_idle_add, so no problems with reentrance doing it now.
|
|
*/
|
|
linklocal6_complete (self);
|
|
}
|
|
}
|
|
|
|
void
|
|
nm_device_capture_initial_config (NMDevice *self)
|
|
{
|
|
update_ip4_config (self, TRUE);
|
|
update_ip6_config (self, TRUE);
|
|
}
|
|
|
|
static gboolean
|
|
queued_ip4_config_change (gpointer user_data)
|
|
{
|
|
NMDevice *self = user_data;
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), G_SOURCE_REMOVE);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
nm_assert (!priv->queued_ip4_config_pending);
|
|
|
|
/* Wait for any queued state changes */
|
|
if (priv->queued_state.id)
|
|
return TRUE;
|
|
|
|
priv->queued_ip4_config_id = 0;
|
|
update_ip4_config (self, FALSE);
|
|
|
|
set_unmanaged_external_down (self, TRUE);
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
static gboolean
|
|
queued_ip6_config_change (gpointer user_data)
|
|
{
|
|
NMDevice *self = user_data;
|
|
NMDevicePrivate *priv;
|
|
GSList *iter;
|
|
gboolean need_ipv6ll = FALSE;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), G_SOURCE_REMOVE);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
nm_assert (!priv->queued_ip4_config_pending);
|
|
|
|
/* Wait for any queued state changes */
|
|
if (priv->queued_state.id)
|
|
return TRUE;
|
|
|
|
priv->queued_ip6_config_id = 0;
|
|
update_ip6_config (self, FALSE);
|
|
|
|
if (priv->state < NM_DEVICE_STATE_DEACTIVATING
|
|
&& nm_platform_link_get (nm_device_get_platform (self), priv->ifindex)) {
|
|
/* Handle DAD failures */
|
|
for (iter = priv->dad6_failed_addrs; iter; iter = g_slist_next (iter)) {
|
|
NMPlatformIP6Address *addr = iter->data;
|
|
|
|
if (addr->addr_source >= NM_IP_CONFIG_SOURCE_USER)
|
|
continue;
|
|
|
|
_LOGI (LOGD_IP6, "ipv6: duplicate address check failed for the %s address",
|
|
nm_platform_ip6_address_to_string (addr, NULL, 0));
|
|
|
|
if (IN6_IS_ADDR_LINKLOCAL (&addr->address))
|
|
need_ipv6ll = TRUE;
|
|
else if (priv->ndisc)
|
|
nm_ndisc_dad_failed (priv->ndisc, &addr->address);
|
|
}
|
|
|
|
/* If no IPv6 link-local address exists but other addresses do then we
|
|
* must add the LL address to remain conformant with RFC 3513 chapter 2.1
|
|
* ("Addressing Model"): "All interfaces are required to have at least
|
|
* one link-local unicast address".
|
|
*/
|
|
if (priv->ip6_config && nm_ip6_config_get_num_addresses (priv->ip6_config))
|
|
need_ipv6ll = TRUE;
|
|
|
|
if (need_ipv6ll)
|
|
check_and_add_ipv6ll_addr (self);
|
|
}
|
|
|
|
g_slist_free_full (priv->dad6_failed_addrs, g_free);
|
|
priv->dad6_failed_addrs = NULL;
|
|
|
|
/* Check if DAD is still pending */
|
|
if ( priv->ip6_state == IP_CONF
|
|
&& priv->dad6_ip6_config
|
|
&& priv->ext_ip6_config_captured) {
|
|
if (!nm_ip6_config_has_any_dad_pending (priv->ext_ip6_config_captured,
|
|
priv->dad6_ip6_config)) {
|
|
_LOGD (LOGD_DEVICE | LOGD_IP6, "IPv6 DAD terminated");
|
|
g_clear_object (&priv->dad6_ip6_config);
|
|
_set_ip_state (self, AF_INET6, IP_DONE);
|
|
check_ip_state (self, FALSE);
|
|
}
|
|
}
|
|
|
|
set_unmanaged_external_down (self, TRUE);
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
static void
|
|
device_ipx_changed (NMPlatform *platform,
|
|
int obj_type_i,
|
|
int ifindex,
|
|
gpointer platform_object,
|
|
int change_type_i,
|
|
NMDevice *self)
|
|
{
|
|
const NMPObjectType obj_type = obj_type_i;
|
|
const NMPlatformSignalChangeType change_type = change_type_i;
|
|
NMDevicePrivate *priv;
|
|
NMPlatformIP6Address *addr;
|
|
|
|
if (nm_device_get_ip_ifindex (self) != ifindex)
|
|
return;
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
switch (obj_type) {
|
|
case NMP_OBJECT_TYPE_IP4_ADDRESS:
|
|
case NMP_OBJECT_TYPE_IP4_ROUTE:
|
|
if (nm_device_get_unmanaged_flags (self, NM_UNMANAGED_PLATFORM_INIT)) {
|
|
priv->queued_ip4_config_pending = TRUE;
|
|
nm_assert_se (!nm_clear_g_source (&priv->queued_ip4_config_id));
|
|
} else if (!priv->queued_ip4_config_id) {
|
|
priv->queued_ip4_config_pending = FALSE;
|
|
priv->queued_ip4_config_id = g_idle_add (queued_ip4_config_change, self);
|
|
_LOGD (LOGD_DEVICE, "queued IP4 config change");
|
|
}
|
|
break;
|
|
case NMP_OBJECT_TYPE_IP6_ADDRESS:
|
|
addr = platform_object;
|
|
|
|
if ( priv->state > NM_DEVICE_STATE_DISCONNECTED
|
|
&& priv->state < NM_DEVICE_STATE_DEACTIVATING
|
|
&& ( (change_type == NM_PLATFORM_SIGNAL_CHANGED && addr->n_ifa_flags & IFA_F_DADFAILED)
|
|
|| (change_type == NM_PLATFORM_SIGNAL_REMOVED && addr->n_ifa_flags & IFA_F_TENTATIVE))) {
|
|
priv->dad6_failed_addrs = g_slist_append (priv->dad6_failed_addrs,
|
|
g_memdup (addr, sizeof (NMPlatformIP6Address)));
|
|
}
|
|
/* fall through */
|
|
case NMP_OBJECT_TYPE_IP6_ROUTE:
|
|
if (nm_device_get_unmanaged_flags (self, NM_UNMANAGED_PLATFORM_INIT)) {
|
|
priv->queued_ip6_config_pending = TRUE;
|
|
nm_assert_se (!nm_clear_g_source (&priv->queued_ip6_config_id));
|
|
} else if (!priv->queued_ip6_config_id) {
|
|
priv->queued_ip6_config_pending = FALSE;
|
|
priv->queued_ip6_config_id = g_idle_add (queued_ip6_config_change, self);
|
|
_LOGD (LOGD_DEVICE, "queued IP6 config change");
|
|
}
|
|
break;
|
|
default:
|
|
g_return_if_reached ();
|
|
}
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
NM_UTILS_FLAGS2STR_DEFINE (nm_unmanaged_flags2str, NMUnmanagedFlags,
|
|
NM_UTILS_FLAGS2STR (NM_UNMANAGED_SLEEPING, "sleeping"),
|
|
NM_UTILS_FLAGS2STR (NM_UNMANAGED_QUITTING, "quitting"),
|
|
NM_UTILS_FLAGS2STR (NM_UNMANAGED_PARENT, "parent"),
|
|
NM_UTILS_FLAGS2STR (NM_UNMANAGED_LOOPBACK, "loopback"),
|
|
NM_UTILS_FLAGS2STR (NM_UNMANAGED_PLATFORM_INIT, "platform-init"),
|
|
NM_UTILS_FLAGS2STR (NM_UNMANAGED_USER_EXPLICIT, "user-explicit"),
|
|
NM_UTILS_FLAGS2STR (NM_UNMANAGED_BY_DEFAULT, "by-default"),
|
|
NM_UTILS_FLAGS2STR (NM_UNMANAGED_USER_SETTINGS, "user-settings"),
|
|
NM_UTILS_FLAGS2STR (NM_UNMANAGED_USER_UDEV, "user-udev"),
|
|
NM_UTILS_FLAGS2STR (NM_UNMANAGED_EXTERNAL_DOWN, "external-down"),
|
|
NM_UTILS_FLAGS2STR (NM_UNMANAGED_IS_SLAVE, "is-slave"),
|
|
);
|
|
|
|
static const char *
|
|
_unmanaged_flags2str (NMUnmanagedFlags flags, NMUnmanagedFlags mask, char *buf, gsize len)
|
|
{
|
|
char buf2[512];
|
|
char *b;
|
|
char *tmp, *tmp2;
|
|
gsize l;
|
|
|
|
nm_utils_to_string_buffer_init (&buf, &len);
|
|
if (!len)
|
|
return buf;
|
|
|
|
b = buf;
|
|
|
|
mask |= flags;
|
|
|
|
nm_unmanaged_flags2str (flags, b, len);
|
|
l = strlen (b);
|
|
b += l;
|
|
len -= l;
|
|
|
|
nm_unmanaged_flags2str (mask & ~flags, buf2, sizeof (buf2));
|
|
if (buf2[0]) {
|
|
gboolean add_separator = l > 0;
|
|
|
|
tmp = buf2;
|
|
while (TRUE) {
|
|
if (add_separator)
|
|
nm_utils_strbuf_append_c (&b, &len, ',');
|
|
add_separator = TRUE;
|
|
|
|
tmp2 = strchr (tmp, ',');
|
|
if (tmp2)
|
|
tmp2[0] = '\0';
|
|
|
|
nm_utils_strbuf_append_c (&b, &len, '!');
|
|
nm_utils_strbuf_append_str (&b, &len, tmp);
|
|
if (!tmp2)
|
|
break;
|
|
|
|
tmp = &tmp2[1];
|
|
}
|
|
}
|
|
|
|
return buf;
|
|
}
|
|
|
|
static gboolean
|
|
_get_managed_by_flags(NMUnmanagedFlags flags, NMUnmanagedFlags mask, gboolean for_user_request)
|
|
{
|
|
/* Evaluate the managed state based on the unmanaged flags.
|
|
*
|
|
* Some flags are authoritative, meaning they always cause
|
|
* the device to be unmanaged (e.g. @NM_UNMANAGED_PLATFORM_INIT).
|
|
*
|
|
* OTOH, some flags can be overwritten. For example NM_UNMANAGED_USER_UDEV
|
|
* is ignored once NM_UNMANAGED_USER_EXPLICIT is set. The idea is that
|
|
* the flag from the configuration has no effect once the user explicitly
|
|
* touches the unmanaged flags. */
|
|
|
|
if (for_user_request) {
|
|
|
|
/* @for_user_request can make the result only ~more~ managed.
|
|
* If the flags already indicate a managed state for a non-user-request,
|
|
* then it is also managed for an explict user-request.
|
|
*
|
|
* Effectively, this check is redundant, as the code below already
|
|
* already ensures that. Still, express this invariant explictly here. */
|
|
if (_get_managed_by_flags (flags, mask, FALSE))
|
|
return TRUE;
|
|
|
|
/* A for-user-request, is effectively the same as pretending
|
|
* that user-dbus flag is cleared. */
|
|
mask |= NM_UNMANAGED_USER_EXPLICIT;
|
|
flags &= ~NM_UNMANAGED_USER_EXPLICIT;
|
|
}
|
|
|
|
if ( NM_FLAGS_ANY (mask, NM_UNMANAGED_USER_SETTINGS)
|
|
&& !NM_FLAGS_ANY (flags, NM_UNMANAGED_USER_SETTINGS)) {
|
|
/* NM_UNMANAGED_USER_SETTINGS can only explicitly unmanage a device. It cannot
|
|
* *manage* it. Having NM_UNMANAGED_USER_SETTINGS explicitly not set, is the
|
|
* same as having it not set at all. */
|
|
mask &= ~NM_UNMANAGED_USER_SETTINGS;
|
|
}
|
|
|
|
if (NM_FLAGS_ANY (mask, NM_UNMANAGED_USER_UDEV)) {
|
|
/* configuration from udev or nm-config overwrites the by-default flag
|
|
* which is based on the device type. */
|
|
flags &= ~NM_UNMANAGED_BY_DEFAULT;
|
|
|
|
/* configuration from udev overwrites external-down */
|
|
flags &= ~NM_UNMANAGED_EXTERNAL_DOWN;
|
|
}
|
|
|
|
if ( NM_FLAGS_HAS (mask, NM_UNMANAGED_IS_SLAVE)
|
|
&& !NM_FLAGS_HAS (flags, NM_UNMANAGED_IS_SLAVE)) {
|
|
/* for an enslaved device, by-default doesn't matter */
|
|
flags &= ~NM_UNMANAGED_BY_DEFAULT;
|
|
}
|
|
|
|
if (NM_FLAGS_HAS (mask, NM_UNMANAGED_USER_EXPLICIT)) {
|
|
/* if the device is managed by user-decision, certain other flags
|
|
* are ignored. */
|
|
|
|
flags &= ~( NM_UNMANAGED_BY_DEFAULT
|
|
| NM_UNMANAGED_USER_UDEV
|
|
| NM_UNMANAGED_EXTERNAL_DOWN);
|
|
}
|
|
|
|
return flags == NM_UNMANAGED_NONE;
|
|
}
|
|
|
|
/**
|
|
* nm_device_get_managed:
|
|
* @self: the #NMDevice
|
|
* @for_user_request: whether to check the flags for an explict user-request
|
|
*
|
|
* Whether the device is unmanaged according to the unmanaged flags.
|
|
*
|
|
* Returns: %TRUE if the device is unmanaged because of the flags.
|
|
*/
|
|
gboolean
|
|
nm_device_get_managed (NMDevice *self, gboolean for_user_request)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
|
|
if (!nm_device_is_real (self)) {
|
|
/* a unrealized device is always considered unmanaged. */
|
|
return FALSE;
|
|
}
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
return _get_managed_by_flags (priv->unmanaged_flags, priv->unmanaged_mask, for_user_request);
|
|
}
|
|
|
|
/**
|
|
* nm_device_get_unmanaged_mask:
|
|
* @self: the #NMDevice
|
|
* @flag: the unmanaged flags to check.
|
|
*
|
|
* Return the unmanaged flags mask set on this device.
|
|
*
|
|
* Returns: the flags of the device ( & @flag)
|
|
*/
|
|
NMUnmanagedFlags
|
|
nm_device_get_unmanaged_mask (NMDevice *self, NMUnmanagedFlags flag)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), NM_UNMANAGED_NONE);
|
|
g_return_val_if_fail (flag != NM_UNMANAGED_NONE, NM_UNMANAGED_NONE);
|
|
|
|
return NM_DEVICE_GET_PRIVATE (self)->unmanaged_mask & flag;
|
|
}
|
|
|
|
/**
|
|
* nm_device_get_unmanaged_flags:
|
|
* @self: the #NMDevice
|
|
* @flag: the unmanaged flags to check.
|
|
*
|
|
* Return the unmanaged flags of the device.
|
|
*
|
|
* Returns: the flags of the device ( & @flag)
|
|
*/
|
|
NMUnmanagedFlags
|
|
nm_device_get_unmanaged_flags (NMDevice *self, NMUnmanagedFlags flag)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), NM_UNMANAGED_NONE);
|
|
g_return_val_if_fail (flag != NM_UNMANAGED_NONE, NM_UNMANAGED_NONE);
|
|
|
|
return NM_DEVICE_GET_PRIVATE (self)->unmanaged_flags & flag;
|
|
}
|
|
|
|
/**
|
|
* _set_unmanaged_flags:
|
|
* @self: the #NMDevice instance
|
|
* @flags: which #NMUnmanagedFlags to set.
|
|
* @set_op: whether to set/clear/forget the flags. You can also pass
|
|
* boolean values %TRUE and %FALSE, which mean %NM_UNMAN_FLAG_OP_SET_UNMANAGED
|
|
* and %NM_UNMAN_FLAG_OP_SET_MANAGED, respectively.
|
|
* @allow_state_transition: if %FALSE, setting flags never triggers a device
|
|
* state change. If %TRUE, the device can change state, if it is real and
|
|
* switches from managed to unmanaged (or vice versa).
|
|
* @now: whether the state change should be immediate or delayed
|
|
* @reason: the device state reason passed to nm_device_state_changed() if
|
|
* the device becomes managed/unmanaged. This is only relevant if the
|
|
* device switches state and if @allow_state_transition is %TRUE.
|
|
*
|
|
* Set the unmanaged flags of the device.
|
|
**/
|
|
static void
|
|
_set_unmanaged_flags (NMDevice *self,
|
|
NMUnmanagedFlags flags,
|
|
NMUnmanFlagOp set_op,
|
|
gboolean allow_state_transition,
|
|
gboolean now,
|
|
NMDeviceStateReason reason)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
gboolean was_managed, transition_state;
|
|
NMUnmanagedFlags old_flags, old_mask;
|
|
NMDeviceState new_state;
|
|
const char *operation = NULL;
|
|
char str1[512];
|
|
char str2[512];
|
|
gboolean do_notify_has_pending_actions = FALSE;
|
|
gboolean had_pending_actions = FALSE;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
g_return_if_fail (flags);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (!priv->real)
|
|
allow_state_transition = FALSE;
|
|
was_managed = allow_state_transition && nm_device_get_managed (self, FALSE);
|
|
|
|
if ( NM_FLAGS_HAS (priv->unmanaged_flags, NM_UNMANAGED_PLATFORM_INIT)
|
|
&& NM_FLAGS_HAS (flags, NM_UNMANAGED_PLATFORM_INIT)
|
|
&& NM_IN_SET (set_op, NM_UNMAN_FLAG_OP_SET_MANAGED)) {
|
|
/* we are clearing the platform-init flags. This triggers additional actions. */
|
|
if (!NM_FLAGS_HAS (flags, NM_UNMANAGED_USER_SETTINGS)) {
|
|
gboolean unmanaged;
|
|
|
|
unmanaged = nm_device_spec_match_list (self,
|
|
nm_settings_get_unmanaged_specs (NM_DEVICE_GET_PRIVATE (self)->settings));
|
|
nm_device_set_unmanaged_flags (self,
|
|
NM_UNMANAGED_USER_SETTINGS,
|
|
!!unmanaged);
|
|
}
|
|
|
|
if (priv->queued_ip4_config_pending) {
|
|
priv->queued_ip4_config_pending = FALSE;
|
|
nm_assert_se (!nm_clear_g_source (&priv->queued_ip4_config_id));
|
|
priv->queued_ip4_config_id = g_idle_add (queued_ip4_config_change, self);
|
|
}
|
|
|
|
if (priv->queued_ip6_config_pending) {
|
|
priv->queued_ip6_config_pending = FALSE;
|
|
nm_assert_se (!nm_clear_g_source (&priv->queued_ip6_config_id));
|
|
priv->queued_ip6_config_id = g_idle_add (queued_ip6_config_change, self);
|
|
}
|
|
|
|
if (!priv->pending_actions) {
|
|
do_notify_has_pending_actions = TRUE;
|
|
had_pending_actions = nm_device_has_pending_action (self);
|
|
}
|
|
}
|
|
|
|
old_flags = priv->unmanaged_flags;
|
|
old_mask = priv->unmanaged_mask;
|
|
|
|
switch (set_op) {
|
|
case NM_UNMAN_FLAG_OP_FORGET:
|
|
priv->unmanaged_mask &= ~flags;
|
|
priv->unmanaged_flags &= ~flags;
|
|
operation = "forget";
|
|
break;
|
|
case NM_UNMAN_FLAG_OP_SET_UNMANAGED:
|
|
priv->unmanaged_mask |= flags;
|
|
priv->unmanaged_flags |= flags;
|
|
operation = "set-unmanaged";
|
|
break;
|
|
case NM_UNMAN_FLAG_OP_SET_MANAGED:
|
|
priv->unmanaged_mask |= flags;
|
|
priv->unmanaged_flags &= ~flags;
|
|
operation = "set-managed";
|
|
break;
|
|
default:
|
|
g_return_if_reached ();
|
|
}
|
|
|
|
if ( old_flags == priv->unmanaged_flags
|
|
&& old_mask == priv->unmanaged_mask)
|
|
return;
|
|
|
|
transition_state = allow_state_transition
|
|
&& was_managed != nm_device_get_managed (self, FALSE)
|
|
&& ( was_managed
|
|
|| ( !was_managed
|
|
&& nm_device_get_state (self) == NM_DEVICE_STATE_UNMANAGED));
|
|
|
|
_LOGD (LOGD_DEVICE, "unmanaged: flags set to [%s%s0x%0x/0x%x/%s%s], %s [%s=0x%0x]%s%s%s)",
|
|
_unmanaged_flags2str (priv->unmanaged_flags, priv->unmanaged_mask, str1, sizeof (str1)), \
|
|
(priv->unmanaged_flags | priv->unmanaged_mask) ? "=" : "", \
|
|
(guint) priv->unmanaged_flags, \
|
|
(guint) priv->unmanaged_mask, \
|
|
(_get_managed_by_flags (priv->unmanaged_flags, priv->unmanaged_mask, FALSE) \
|
|
? "managed" \
|
|
: (_get_managed_by_flags (priv->unmanaged_flags, priv->unmanaged_mask, TRUE) \
|
|
? "manageable" \
|
|
: "unmanaged")),
|
|
priv->real ? "" : "/unrealized",
|
|
operation,
|
|
nm_unmanaged_flags2str (flags, str2, sizeof (str2)),
|
|
flags,
|
|
NM_PRINT_FMT_QUOTED (allow_state_transition,
|
|
", reason ",
|
|
reason_to_string (reason),
|
|
transition_state ? ", transition-state" : "",
|
|
""));
|
|
|
|
if ( do_notify_has_pending_actions
|
|
&& had_pending_actions != nm_device_has_pending_action (self))
|
|
_notify (self, PROP_HAS_PENDING_ACTION);
|
|
|
|
if (transition_state) {
|
|
new_state = was_managed ? NM_DEVICE_STATE_UNMANAGED : NM_DEVICE_STATE_UNAVAILABLE;
|
|
if (now)
|
|
nm_device_state_changed (self, new_state, reason);
|
|
else
|
|
nm_device_queue_state (self, new_state, reason);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @self: the #NMDevice instance
|
|
* @flags: which #NMUnmanagedFlags to set.
|
|
* @set_op: whether to set/clear/forget the flags. You can also pass
|
|
* boolean values %TRUE and %FALSE, which mean %NM_UNMAN_FLAG_OP_SET_UNMANAGED
|
|
* and %NM_UNMAN_FLAG_OP_SET_MANAGED, respectively.
|
|
*
|
|
* Set the unmanaged flags of the device (does not trigger a state change).
|
|
**/
|
|
void
|
|
nm_device_set_unmanaged_flags (NMDevice *self,
|
|
NMUnmanagedFlags flags,
|
|
NMUnmanFlagOp set_op)
|
|
{
|
|
_set_unmanaged_flags (self, flags, set_op, FALSE, FALSE, NM_DEVICE_STATE_REASON_NONE);
|
|
}
|
|
|
|
/**
|
|
* nm_device_set_unmanaged_by_flags:
|
|
* @self: the #NMDevice instance
|
|
* @flags: which #NMUnmanagedFlags to set.
|
|
* @set_op: whether to set/clear/forget the flags. You can also pass
|
|
* boolean values %TRUE and %FALSE, which mean %NM_UNMAN_FLAG_OP_SET_UNMANAGED
|
|
* and %NM_UNMAN_FLAG_OP_SET_MANAGED, respectively.
|
|
* @reason: the device state reason passed to nm_device_state_changed() if
|
|
* the device becomes managed/unmanaged.
|
|
*
|
|
* Set the unmanaged flags of the device and possibly trigger a state change.
|
|
**/
|
|
void
|
|
nm_device_set_unmanaged_by_flags (NMDevice *self,
|
|
NMUnmanagedFlags flags,
|
|
NMUnmanFlagOp set_op,
|
|
NMDeviceStateReason reason)
|
|
{
|
|
_set_unmanaged_flags (self, flags, set_op, TRUE, TRUE, reason);
|
|
}
|
|
|
|
void
|
|
nm_device_set_unmanaged_by_flags_queue (NMDevice *self,
|
|
NMUnmanagedFlags flags,
|
|
NMUnmanFlagOp set_op,
|
|
NMDeviceStateReason reason)
|
|
{
|
|
_set_unmanaged_flags (self, flags, set_op, TRUE, FALSE, reason);
|
|
}
|
|
|
|
void
|
|
nm_device_set_unmanaged_by_user_settings (NMDevice *self)
|
|
{
|
|
gboolean unmanaged;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
if (nm_device_get_unmanaged_flags (self, NM_UNMANAGED_PLATFORM_INIT)) {
|
|
/* the device is already unmanaged due to platform-init.
|
|
*
|
|
* We want to delay evaluating the device spec, because it will freeze
|
|
* the permanent MAC address. That should not be done, before the platform
|
|
* link is fully initialized (via UDEV).
|
|
*
|
|
* Note that when clearing NM_UNMANAGED_PLATFORM_INIT, we will re-evaluate
|
|
* whether the device is unmanaged by user-settings. */
|
|
return;
|
|
}
|
|
|
|
unmanaged = nm_device_spec_match_list (self,
|
|
nm_settings_get_unmanaged_specs (NM_DEVICE_GET_PRIVATE (self)->settings));
|
|
|
|
nm_device_set_unmanaged_by_flags (self,
|
|
NM_UNMANAGED_USER_SETTINGS,
|
|
!!unmanaged,
|
|
unmanaged
|
|
? NM_DEVICE_STATE_REASON_NOW_UNMANAGED
|
|
: NM_DEVICE_STATE_REASON_NOW_MANAGED);
|
|
}
|
|
|
|
void
|
|
nm_device_set_unmanaged_by_user_udev (NMDevice *self)
|
|
{
|
|
int ifindex;
|
|
gboolean platform_unmanaged = FALSE;
|
|
|
|
ifindex = self->_priv->ifindex;
|
|
|
|
if ( ifindex <= 0
|
|
|| !nm_platform_link_get_unmanaged (nm_device_get_platform (self), ifindex, &platform_unmanaged))
|
|
return;
|
|
|
|
nm_device_set_unmanaged_by_flags (self,
|
|
NM_UNMANAGED_USER_UDEV,
|
|
platform_unmanaged,
|
|
NM_DEVICE_STATE_REASON_USER_REQUESTED);
|
|
}
|
|
|
|
void
|
|
nm_device_set_unmanaged_by_quitting (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
gboolean need_deactivate = nm_device_is_activating (self) ||
|
|
priv->state == NM_DEVICE_STATE_ACTIVATED;
|
|
|
|
/* It's OK to block here because we're quitting */
|
|
if (need_deactivate)
|
|
_set_state_full (self, NM_DEVICE_STATE_DEACTIVATING, NM_DEVICE_STATE_REASON_NOW_UNMANAGED, TRUE);
|
|
|
|
nm_device_set_unmanaged_by_flags (self,
|
|
NM_UNMANAGED_QUITTING,
|
|
TRUE,
|
|
need_deactivate ? NM_DEVICE_STATE_REASON_REMOVED
|
|
: NM_DEVICE_STATE_REASON_NOW_UNMANAGED);
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
void
|
|
nm_device_set_dhcp_timeout (NMDevice *self, guint32 timeout)
|
|
{
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
NM_DEVICE_GET_PRIVATE (self)->dhcp_timeout = timeout;
|
|
}
|
|
|
|
void
|
|
nm_device_set_dhcp_anycast_address (NMDevice *self, const char *addr)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
g_return_if_fail (!addr || nm_utils_hwaddr_valid (addr, ETH_ALEN));
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
g_free (priv->dhcp_anycast_address);
|
|
priv->dhcp_anycast_address = g_strdup (addr);
|
|
}
|
|
|
|
void
|
|
nm_device_reapply_settings_immediately (NMDevice *self)
|
|
{
|
|
NMConnection *applied_connection;
|
|
NMSettingsConnection *settings_connection;
|
|
NMDeviceState state;
|
|
NMSettingConnection *s_con_settings;
|
|
NMSettingConnection *s_con_applied;
|
|
const char *zone;
|
|
NMMetered metered;
|
|
guint64 version_id;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
state = nm_device_get_state (self);
|
|
if ( state <= NM_DEVICE_STATE_DISCONNECTED
|
|
|| state > NM_DEVICE_STATE_ACTIVATED)
|
|
return;
|
|
|
|
applied_connection = nm_device_get_applied_connection (self);
|
|
settings_connection = nm_device_get_settings_connection (self);
|
|
|
|
if (!nm_settings_connection_has_unmodified_applied_connection (settings_connection,
|
|
applied_connection,
|
|
NM_SETTING_COMPARE_FLAG_IGNORE_REAPPLY_IMMEDIATELY))
|
|
return;
|
|
|
|
s_con_settings = nm_connection_get_setting_connection ((NMConnection *) settings_connection);
|
|
s_con_applied = nm_connection_get_setting_connection (applied_connection);
|
|
|
|
if (g_strcmp0 ((zone = nm_setting_connection_get_zone (s_con_settings)),
|
|
nm_setting_connection_get_zone (s_con_applied)) != 0) {
|
|
|
|
version_id = nm_active_connection_version_id_bump ((NMActiveConnection *) self->_priv->act_request);
|
|
_LOGD (LOGD_DEVICE, "reapply setting: zone = %s%s%s (version-id %llu)", NM_PRINT_FMT_QUOTE_STRING (zone), (unsigned long long) version_id);
|
|
|
|
g_object_set (G_OBJECT (s_con_applied),
|
|
NM_SETTING_CONNECTION_ZONE, zone,
|
|
NULL);
|
|
|
|
nm_device_update_firewall_zone (self);
|
|
}
|
|
|
|
if ((metered = nm_setting_connection_get_metered (s_con_settings)) != nm_setting_connection_get_metered (s_con_applied)) {
|
|
|
|
version_id = nm_active_connection_version_id_bump ((NMActiveConnection *) self->_priv->act_request);
|
|
_LOGD (LOGD_DEVICE, "reapply setting: metered = %d (version-id %llu)", (int) metered, (unsigned long long) version_id);
|
|
|
|
g_object_set (G_OBJECT (s_con_applied),
|
|
NM_SETTING_CONNECTION_METERED, metered,
|
|
NULL);
|
|
|
|
nm_device_update_metered (self);
|
|
}
|
|
}
|
|
|
|
void
|
|
nm_device_update_firewall_zone (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if ( priv->fw_state >= FIREWALL_STATE_INITIALIZED
|
|
&& !nm_device_sys_iface_state_is_external (self))
|
|
fw_change_zone (self);
|
|
}
|
|
|
|
void
|
|
nm_device_update_metered (NMDevice *self)
|
|
{
|
|
#define NM_METERED_INVALID ((NMMetered) -1)
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMSettingConnection *setting;
|
|
NMMetered conn_value, value = NM_METERED_INVALID;
|
|
NMConnection *connection = NULL;
|
|
NMDeviceState state;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
state = nm_device_get_state (self);
|
|
if ( state <= NM_DEVICE_STATE_DISCONNECTED
|
|
|| state > NM_DEVICE_STATE_ACTIVATED)
|
|
value = NM_METERED_UNKNOWN;
|
|
|
|
if (value == NM_METERED_INVALID) {
|
|
connection = nm_device_get_applied_connection (self);
|
|
if (connection) {
|
|
setting = nm_connection_get_setting_connection (connection);
|
|
if (setting) {
|
|
conn_value = nm_setting_connection_get_metered (setting);
|
|
if (conn_value != NM_METERED_UNKNOWN)
|
|
value = conn_value;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* Try to guess a value using the metered flag in IP configuration */
|
|
if (value == NM_METERED_INVALID) {
|
|
if ( priv->ip4_config
|
|
&& priv->ip4_state == IP_DONE
|
|
&& nm_ip4_config_get_metered (priv->ip4_config))
|
|
value = NM_METERED_GUESS_YES;
|
|
}
|
|
|
|
/* Otherwise look at connection type */
|
|
if (value == NM_METERED_INVALID) {
|
|
if ( nm_connection_is_type (connection, NM_SETTING_GSM_SETTING_NAME)
|
|
|| nm_connection_is_type (connection, NM_SETTING_CDMA_SETTING_NAME))
|
|
value = NM_METERED_GUESS_YES;
|
|
else
|
|
value = NM_METERED_GUESS_NO;
|
|
}
|
|
|
|
if (value != priv->metered) {
|
|
_LOGD (LOGD_DEVICE, "set metered value %d", value);
|
|
priv->metered = value;
|
|
_notify (self, PROP_METERED);
|
|
}
|
|
}
|
|
|
|
static gboolean
|
|
_nm_device_check_connection_available (NMDevice *self,
|
|
NMConnection *connection,
|
|
NMDeviceCheckConAvailableFlags flags,
|
|
const char *specific_object)
|
|
{
|
|
NMDeviceState state;
|
|
|
|
/* an unrealized software device is always available, hardware devices never. */
|
|
if (!nm_device_is_real (self)) {
|
|
if (nm_device_is_software (self))
|
|
return nm_device_check_connection_compatible (self, connection);
|
|
return FALSE;
|
|
}
|
|
|
|
state = nm_device_get_state (self);
|
|
if (state < NM_DEVICE_STATE_UNMANAGED)
|
|
return FALSE;
|
|
if ( state < NM_DEVICE_STATE_UNAVAILABLE
|
|
&& ( ( !NM_FLAGS_ANY (flags, NM_DEVICE_CHECK_CON_AVAILABLE_FOR_USER_REQUEST)
|
|
&& !nm_device_get_managed (self, FALSE))
|
|
|| ( NM_FLAGS_ANY (flags, NM_DEVICE_CHECK_CON_AVAILABLE_FOR_USER_REQUEST)
|
|
&& !nm_device_get_managed (self, TRUE))))
|
|
return FALSE;
|
|
if ( state < NM_DEVICE_STATE_DISCONNECTED
|
|
&& !nm_device_is_software (self)
|
|
&& ( ( !NM_FLAGS_ANY (flags, NM_DEVICE_CHECK_CON_AVAILABLE_FOR_USER_REQUEST)
|
|
&& !nm_device_is_available (self, NM_DEVICE_CHECK_DEV_AVAILABLE_NONE))
|
|
|| ( NM_FLAGS_ANY (flags, NM_DEVICE_CHECK_CON_AVAILABLE_FOR_USER_REQUEST)
|
|
&& !nm_device_is_available (self, NM_DEVICE_CHECK_DEV_AVAILABLE_FOR_USER_REQUEST))))
|
|
return FALSE;
|
|
|
|
if (!nm_device_check_connection_compatible (self, connection))
|
|
return FALSE;
|
|
|
|
return NM_DEVICE_GET_CLASS (self)->check_connection_available (self, connection, flags, specific_object);
|
|
}
|
|
|
|
/**
|
|
* nm_device_check_connection_available():
|
|
* @self: the #NMDevice
|
|
* @connection: the #NMConnection to check for availability
|
|
* @flags: flags to affect the decision making of whether a connection
|
|
* is available. Adding a flag can only make a connection more available,
|
|
* not less.
|
|
* @specific_object: a device type dependent argument to further
|
|
* filter the result. Passing a non %NULL specific object can only reduce
|
|
* the availability of a connection.
|
|
*
|
|
* Check if @connection is available to be activated on @self.
|
|
*
|
|
* Returns: %TRUE if @connection can be activated on @self
|
|
*/
|
|
gboolean
|
|
nm_device_check_connection_available (NMDevice *self,
|
|
NMConnection *connection,
|
|
NMDeviceCheckConAvailableFlags flags,
|
|
const char *specific_object)
|
|
{
|
|
gboolean available;
|
|
|
|
available = _nm_device_check_connection_available (self, connection, flags, specific_object);
|
|
|
|
#if NM_MORE_ASSERTS >= 2
|
|
{
|
|
/* The meaning of the flags is so that *adding* a flag relaxes a condition, thus making
|
|
* the device *more* available. Assert against that requirement by testing all the flags. */
|
|
NMDeviceCheckConAvailableFlags i, j, k;
|
|
gboolean available_all[NM_DEVICE_CHECK_CON_AVAILABLE_ALL + 1] = { FALSE };
|
|
|
|
for (i = 0; i <= NM_DEVICE_CHECK_CON_AVAILABLE_ALL; i++)
|
|
available_all[i] = _nm_device_check_connection_available (self, connection, i, specific_object);
|
|
|
|
for (i = 0; i <= NM_DEVICE_CHECK_CON_AVAILABLE_ALL; i++) {
|
|
for (j = 1; j <= NM_DEVICE_CHECK_CON_AVAILABLE_ALL; j <<= 1) {
|
|
if (NM_FLAGS_HAS (i, j)) {
|
|
k = i & ~j;
|
|
nm_assert ( available_all[i] == available_all[k]
|
|
|| available_all[i]);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
#endif
|
|
|
|
return available;
|
|
}
|
|
|
|
static gboolean
|
|
available_connections_del_all (NMDevice *self)
|
|
{
|
|
if (g_hash_table_size (self->_priv->available_connections) == 0)
|
|
return FALSE;
|
|
g_hash_table_remove_all (self->_priv->available_connections);
|
|
return TRUE;
|
|
}
|
|
|
|
static gboolean
|
|
available_connections_add (NMDevice *self, NMConnection *connection)
|
|
{
|
|
return nm_g_hash_table_add (self->_priv->available_connections, g_object_ref (connection));
|
|
}
|
|
|
|
static gboolean
|
|
available_connections_del (NMDevice *self, NMConnection *connection)
|
|
{
|
|
return g_hash_table_remove (self->_priv->available_connections, connection);
|
|
}
|
|
|
|
static gboolean
|
|
check_connection_available (NMDevice *self,
|
|
NMConnection *connection,
|
|
NMDeviceCheckConAvailableFlags flags,
|
|
const char *specific_object)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE(self);
|
|
|
|
/* Connections which require a network connection are not available when
|
|
* the device has no carrier, even with ignore-carrer=TRUE.
|
|
*/
|
|
if ( priv->carrier
|
|
|| !connection_requires_carrier (connection))
|
|
return TRUE;
|
|
|
|
if ( NM_FLAGS_HAS (flags, _NM_DEVICE_CHECK_CON_AVAILABLE_FOR_USER_REQUEST_WAITING_CARRIER)
|
|
&& priv->carrier_wait_id != 0) {
|
|
/* The device has no carrier though the connection requires it.
|
|
*
|
|
* If we are still waiting for carrier, the connection is available
|
|
* for an explicit user-request. */
|
|
return TRUE;
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
void
|
|
nm_device_recheck_available_connections (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
NMSettingsConnection *const*connections;
|
|
gboolean changed = FALSE;
|
|
GHashTableIter h_iter;
|
|
NMConnection *connection;
|
|
guint i;
|
|
gs_unref_hashtable GHashTable *prune_list = NULL;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE(self);
|
|
|
|
if (g_hash_table_size (priv->available_connections) > 0) {
|
|
prune_list = g_hash_table_new (g_direct_hash, g_direct_equal);
|
|
g_hash_table_iter_init (&h_iter, priv->available_connections);
|
|
while (g_hash_table_iter_next (&h_iter, (gpointer *) &connection, NULL))
|
|
g_hash_table_add (prune_list, connection);
|
|
}
|
|
|
|
connections = nm_settings_get_connections (priv->settings, NULL);
|
|
for (i = 0; connections[i]; i++) {
|
|
connection = (NMConnection *) connections[i];
|
|
|
|
if (nm_device_check_connection_available (self,
|
|
connection,
|
|
NM_DEVICE_CHECK_CON_AVAILABLE_NONE,
|
|
NULL)) {
|
|
if (available_connections_add (self, connection))
|
|
changed = TRUE;
|
|
if (prune_list)
|
|
g_hash_table_remove (prune_list, connection);
|
|
}
|
|
}
|
|
|
|
if (prune_list) {
|
|
g_hash_table_iter_init (&h_iter, prune_list);
|
|
while (g_hash_table_iter_next (&h_iter, (gpointer *) &connection, NULL)) {
|
|
if (available_connections_del (self, connection))
|
|
changed = TRUE;
|
|
}
|
|
}
|
|
|
|
if (changed)
|
|
_notify (self, PROP_AVAILABLE_CONNECTIONS);
|
|
available_connections_check_delete_unrealized (self);
|
|
}
|
|
|
|
/**
|
|
* nm_device_get_best_connection:
|
|
* @self: the #NMDevice
|
|
* @specific_object: a specific object path if any
|
|
* @error: reason why no connection was returned
|
|
*
|
|
* Returns a connection that's most suitable for user-initiated activation
|
|
* of a device, optionally with a given specific object.
|
|
*
|
|
* Returns: the #NMSettingsConnection or %NULL (setting an @error)
|
|
*/
|
|
NMSettingsConnection *
|
|
nm_device_get_best_connection (NMDevice *self,
|
|
const char *specific_object,
|
|
GError **error)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMSettingsConnection *connection = NULL;
|
|
NMSettingsConnection *candidate;
|
|
guint64 best_timestamp = 0;
|
|
GHashTableIter iter;
|
|
|
|
g_hash_table_iter_init (&iter, priv->available_connections);
|
|
while (g_hash_table_iter_next (&iter, (gpointer) &candidate, NULL)) {
|
|
guint64 candidate_timestamp = 0;
|
|
|
|
/* If a specific object is given, only include connections that are
|
|
* compatible with it.
|
|
*/
|
|
if ( specific_object /* << Optimization: we know that the connection is available without @specific_object. */
|
|
&& !nm_device_check_connection_available (self,
|
|
NM_CONNECTION (candidate),
|
|
_NM_DEVICE_CHECK_CON_AVAILABLE_FOR_USER_REQUEST,
|
|
specific_object))
|
|
continue;
|
|
|
|
nm_settings_connection_get_timestamp (candidate, &candidate_timestamp);
|
|
if (!connection || (candidate_timestamp > best_timestamp)) {
|
|
connection = candidate;
|
|
best_timestamp = candidate_timestamp;
|
|
}
|
|
}
|
|
|
|
if (!connection) {
|
|
g_set_error (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_UNKNOWN_CONNECTION,
|
|
"The device '%s' has no connections available for activation.",
|
|
nm_device_get_iface (self));
|
|
}
|
|
|
|
return connection;
|
|
}
|
|
|
|
static void
|
|
cp_connection_added_or_updated (NMDevice *self, NMConnection *connection)
|
|
{
|
|
gboolean changed;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
g_return_if_fail (NM_IS_SETTINGS_CONNECTION (connection));
|
|
|
|
if (nm_device_check_connection_available (self,
|
|
connection,
|
|
_NM_DEVICE_CHECK_CON_AVAILABLE_FOR_USER_REQUEST,
|
|
NULL))
|
|
changed = available_connections_add (self, connection);
|
|
else
|
|
changed = available_connections_del (self, connection);
|
|
|
|
if (changed) {
|
|
_notify (self, PROP_AVAILABLE_CONNECTIONS);
|
|
available_connections_check_delete_unrealized (self);
|
|
}
|
|
}
|
|
|
|
static void
|
|
cp_connection_added (NMConnectionProvider *cp, NMConnection *connection, gpointer user_data)
|
|
{
|
|
cp_connection_added_or_updated (user_data, connection);
|
|
}
|
|
|
|
static void
|
|
cp_connection_updated (NMConnectionProvider *cp, NMConnection *connection, gboolean by_user, gpointer user_data)
|
|
{
|
|
cp_connection_added_or_updated (user_data, connection);
|
|
}
|
|
|
|
static void
|
|
cp_connection_removed (NMConnectionProvider *cp, NMConnection *connection, gpointer user_data)
|
|
{
|
|
NMDevice *self = user_data;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
if (available_connections_del (self, connection)) {
|
|
_notify (self, PROP_AVAILABLE_CONNECTIONS);
|
|
available_connections_check_delete_unrealized (self);
|
|
}
|
|
}
|
|
|
|
gboolean
|
|
nm_device_supports_vlans (NMDevice *self)
|
|
{
|
|
return nm_platform_link_supports_vlans (nm_device_get_platform (self), nm_device_get_ifindex (self));
|
|
}
|
|
|
|
/**
|
|
* nm_device_add_pending_action():
|
|
* @self: the #NMDevice to add the pending action to
|
|
* @action: a static string that identifies the action. The string instance must
|
|
* stay valid until the pending action is removed (that is, the string is
|
|
* not cloned, but ownership stays with the caller).
|
|
* @assert_not_yet_pending: if %TRUE, assert that the @action is currently not yet pending.
|
|
* Otherwise, ignore duplicate scheduling of the same action silently.
|
|
*
|
|
* Adds a pending action to the device.
|
|
*
|
|
* Returns: %TRUE if the action was added (and not already added before). %FALSE
|
|
* if the same action is already scheduled. In the latter case, the action was not scheduled
|
|
* a second time.
|
|
*/
|
|
gboolean
|
|
nm_device_add_pending_action (NMDevice *self, const char *action, gboolean assert_not_yet_pending)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
GSList *iter;
|
|
guint count = 0;
|
|
|
|
g_return_val_if_fail (action, FALSE);
|
|
|
|
/* Check if the action is already pending. Cannot add duplicate actions */
|
|
for (iter = priv->pending_actions; iter; iter = iter->next) {
|
|
if (!strcmp (action, iter->data)) {
|
|
if (assert_not_yet_pending) {
|
|
_LOGW (LOGD_DEVICE, "add_pending_action (%d): '%s' already pending",
|
|
count + g_slist_length (iter), action);
|
|
g_return_val_if_reached (FALSE);
|
|
} else {
|
|
_LOGD (LOGD_DEVICE, "add_pending_action (%d): '%s' already pending (expected)",
|
|
count + g_slist_length (iter), action);
|
|
}
|
|
return FALSE;
|
|
}
|
|
count++;
|
|
}
|
|
|
|
priv->pending_actions = g_slist_prepend (priv->pending_actions, (char *) action);
|
|
count++;
|
|
|
|
_LOGD (LOGD_DEVICE, "add_pending_action (%d): '%s'", count, action);
|
|
|
|
if (count == 1)
|
|
_notify (self, PROP_HAS_PENDING_ACTION);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
* nm_device_remove_pending_action():
|
|
* @self: the #NMDevice to remove the pending action from
|
|
* @action: a string that identifies the action.
|
|
* @assert_is_pending: if %TRUE, assert that the @action is pending.
|
|
* If %FALSE, don't do anything if the current action is not pending and
|
|
* return %FALSE.
|
|
*
|
|
* Removes a pending action previously added by nm_device_add_pending_action().
|
|
*
|
|
* Returns: whether the @action was pending and is now removed.
|
|
*/
|
|
gboolean
|
|
nm_device_remove_pending_action (NMDevice *self, const char *action, gboolean assert_is_pending)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
GSList *iter, *next;
|
|
guint count = 0;
|
|
|
|
g_return_val_if_fail (self, FALSE);
|
|
g_return_val_if_fail (action, FALSE);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
for (iter = priv->pending_actions; iter; iter = next) {
|
|
next = iter->next;
|
|
if (!strcmp (action, iter->data)) {
|
|
_LOGD (LOGD_DEVICE, "remove_pending_action (%d): '%s'",
|
|
count + g_slist_length (iter->next), /* length excluding 'iter' */
|
|
action);
|
|
priv->pending_actions = g_slist_delete_link (priv->pending_actions, iter);
|
|
if (priv->pending_actions == NULL)
|
|
_notify (self, PROP_HAS_PENDING_ACTION);
|
|
return TRUE;
|
|
}
|
|
count++;
|
|
}
|
|
|
|
if (assert_is_pending) {
|
|
_LOGW (LOGD_DEVICE, "remove_pending_action (%d): '%s' not pending", count, action);
|
|
g_return_val_if_reached (FALSE);
|
|
} else
|
|
_LOGD (LOGD_DEVICE, "remove_pending_action (%d): '%s' not pending (expected)", count, action);
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
gboolean
|
|
nm_device_has_pending_action (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->pending_actions)
|
|
return TRUE;
|
|
|
|
if (nm_device_get_unmanaged_flags (self, NM_UNMANAGED_PLATFORM_INIT)) {
|
|
/* as long as the platform link is not yet initialized, we have a pending
|
|
* action. */
|
|
return TRUE;
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static void
|
|
_cancel_activation (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->fw_call) {
|
|
nm_firewall_manager_cancel_call (priv->fw_call);
|
|
nm_assert (!priv->fw_call);
|
|
priv->fw_call = NULL;
|
|
priv->fw_state = FIREWALL_STATE_INITIALIZED;
|
|
}
|
|
|
|
ip_check_gw_ping_cleanup (self);
|
|
|
|
/* Break the activation chain */
|
|
activation_source_clear (self, AF_INET);
|
|
activation_source_clear (self, AF_INET6);
|
|
}
|
|
|
|
static void
|
|
_cleanup_generic_pre (NMDevice *self, CleanupType cleanup_type)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
_cancel_activation (self);
|
|
|
|
if ( cleanup_type == CLEANUP_TYPE_DECONFIGURE
|
|
&& priv->fw_state >= FIREWALL_STATE_INITIALIZED
|
|
&& priv->fw_mgr
|
|
&& !nm_device_sys_iface_state_is_external (self)) {
|
|
nm_firewall_manager_remove_from_zone (priv->fw_mgr,
|
|
nm_device_get_ip_iface (self),
|
|
NULL,
|
|
NULL,
|
|
NULL);
|
|
}
|
|
priv->fw_state = FIREWALL_STATE_UNMANAGED;
|
|
g_clear_object (&priv->fw_mgr);
|
|
|
|
queued_state_clear (self);
|
|
|
|
_cleanup_ip4_pre (self, cleanup_type);
|
|
_cleanup_ip6_pre (self, cleanup_type);
|
|
}
|
|
|
|
static void
|
|
_cleanup_generic_post (NMDevice *self, CleanupType cleanup_type)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (cleanup_type == CLEANUP_TYPE_DECONFIGURE) {
|
|
_update_default_route (self, AF_INET, FALSE, FALSE);
|
|
_update_default_route (self, AF_INET6, FALSE, FALSE);
|
|
} else {
|
|
_update_default_route (self, AF_INET, priv->default_route.v4_has, TRUE);
|
|
_update_default_route (self, AF_INET6, priv->default_route.v6_has, TRUE);
|
|
}
|
|
_update_default_route (self, AF_INET, FALSE, TRUE);
|
|
_update_default_route (self, AF_INET6, FALSE, TRUE);
|
|
|
|
priv->v4_commit_first_time = TRUE;
|
|
priv->v6_commit_first_time = TRUE;
|
|
|
|
priv->linklocal6_dad_counter = 0;
|
|
|
|
/* Clean up IP configs; this does not actually deconfigure the
|
|
* interface; the caller must flush routes and addresses explicitly.
|
|
*/
|
|
nm_device_set_ip4_config (self, NULL, 0, TRUE, TRUE);
|
|
nm_device_set_ip6_config (self, NULL, TRUE, TRUE);
|
|
g_clear_object (&priv->proxy_config);
|
|
g_clear_object (&priv->con_ip4_config);
|
|
g_clear_object (&priv->dev_ip4_config);
|
|
g_clear_object (&priv->ext_ip4_config);
|
|
g_clear_object (&priv->wwan_ip4_config);
|
|
g_clear_object (&priv->ip4_config);
|
|
g_clear_object (&priv->con_ip6_config);
|
|
g_clear_object (&priv->ac_ip6_config);
|
|
g_clear_object (&priv->ext_ip6_config);
|
|
g_clear_object (&priv->ext_ip6_config_captured);
|
|
g_clear_object (&priv->wwan_ip6_config);
|
|
g_clear_object (&priv->ip6_config);
|
|
g_clear_object (&priv->dad6_ip6_config);
|
|
|
|
g_slist_free_full (priv->vpn4_configs, g_object_unref);
|
|
priv->vpn4_configs = NULL;
|
|
g_slist_free_full (priv->vpn6_configs, g_object_unref);
|
|
priv->vpn6_configs = NULL;
|
|
|
|
/* We no longer accept the delegations. nm_device_set_ip6_config(NULL)
|
|
* above disables them. */
|
|
nm_assert (priv->needs_ip6_subnet == FALSE);
|
|
|
|
if (priv->act_request) {
|
|
nm_active_connection_set_default (NM_ACTIVE_CONNECTION (priv->act_request), FALSE);
|
|
|
|
priv->master_ready_handled = FALSE;
|
|
nm_clear_g_signal_handler (priv->act_request, &priv->master_ready_id);
|
|
|
|
act_request_set (self, NULL);
|
|
}
|
|
|
|
/* Clear legacy IPv4 address property */
|
|
if (priv->ip4_address) {
|
|
priv->ip4_address = 0;
|
|
_notify (self, PROP_IP4_ADDRESS);
|
|
}
|
|
|
|
if (cleanup_type == CLEANUP_TYPE_DECONFIGURE) {
|
|
/* Check if the device was deactivated, and if so, delete_link.
|
|
* Don't call delete_link synchronously because we are currently
|
|
* handling a state change -- which is not reentrant. */
|
|
delete_on_deactivate_check_and_schedule (self, nm_device_get_ip_ifindex (self));
|
|
}
|
|
|
|
/* ip_iface should be cleared after flushing all routes and addreses, since
|
|
* those are identified by ip_iface, not by iface (which might be a tty
|
|
* or ATM device).
|
|
*/
|
|
nm_device_set_ip_iface (self, NULL);
|
|
}
|
|
|
|
/*
|
|
* nm_device_cleanup
|
|
*
|
|
* Remove a device's routing table entries and IP addresses.
|
|
*
|
|
*/
|
|
static void
|
|
nm_device_cleanup (NMDevice *self, NMDeviceStateReason reason, CleanupType cleanup_type)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
int ifindex;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
if (reason == NM_DEVICE_STATE_REASON_NOW_MANAGED)
|
|
_LOGD (LOGD_DEVICE, "preparing device");
|
|
else
|
|
_LOGD (LOGD_DEVICE, "deactivating device (reason '%s') [%d]", reason_to_string (reason), reason);
|
|
|
|
/* Save whether or not we tried IPv6 for later */
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
_cleanup_generic_pre (self, cleanup_type);
|
|
|
|
/* Turn off kernel IPv6 */
|
|
if (cleanup_type == CLEANUP_TYPE_DECONFIGURE) {
|
|
set_disable_ipv6 (self, "1");
|
|
nm_device_ipv6_sysctl_set (self, "accept_ra", "0");
|
|
nm_device_ipv6_sysctl_set (self, "use_tempaddr", "0");
|
|
}
|
|
|
|
/* Call device type-specific deactivation */
|
|
if (NM_DEVICE_GET_CLASS (self)->deactivate)
|
|
NM_DEVICE_GET_CLASS (self)->deactivate (self);
|
|
|
|
if (cleanup_type == CLEANUP_TYPE_DECONFIGURE) {
|
|
/* master: release slaves */
|
|
nm_device_master_release_slaves (self);
|
|
|
|
/* slave: mark no longer enslaved */
|
|
if ( priv->master
|
|
&& nm_platform_link_get_master (nm_device_get_platform (self), priv->ifindex) <= 0)
|
|
nm_device_master_release_one_slave (priv->master, self, FALSE, NM_DEVICE_STATE_REASON_CONNECTION_ASSUMED);
|
|
|
|
/* Take out any entries in the routing table and any IP address the device had. */
|
|
ifindex = nm_device_get_ip_ifindex (self);
|
|
if (ifindex > 0) {
|
|
nm_route_manager_route_flush (nm_netns_get_route_manager (priv->netns), ifindex);
|
|
nm_platform_address_flush (nm_device_get_platform (self), ifindex);
|
|
}
|
|
}
|
|
|
|
if (priv->lldp_listener)
|
|
nm_lldp_listener_stop (priv->lldp_listener);
|
|
|
|
nm_device_update_metered (self);
|
|
|
|
/* during device cleanup, we want to reset the MAC address of the device
|
|
* to the initial state.
|
|
*
|
|
* We certainly want to do that when reaching the UNMANAGED state... */
|
|
if (nm_device_get_state (self) <= NM_DEVICE_STATE_UNMANAGED)
|
|
nm_device_hw_addr_reset (self, "unmanage");
|
|
else {
|
|
/* for other device states (UNAVAILABLE, DISCONNECTED), allow the
|
|
* device to overwrite the reset behavior, so that Wi-Fi can set
|
|
* a randomized MAC address used during scanning. */
|
|
NM_DEVICE_GET_CLASS (self)->deactivate_reset_hw_addr (self);
|
|
}
|
|
|
|
priv->mtu_initialized = FALSE;
|
|
if (priv->mtu_initial || priv->ip6_mtu_initial) {
|
|
ifindex = nm_device_get_ip_ifindex (self);
|
|
|
|
if ( ifindex > 0
|
|
&& cleanup_type == CLEANUP_TYPE_DECONFIGURE) {
|
|
_LOGT (LOGD_DEVICE, "mtu: reset device-mtu: %u, ipv6-mtu: %u, ifindex: %d",
|
|
(guint) priv->mtu_initial, (guint) priv->ip6_mtu_initial, ifindex);
|
|
if (priv->mtu_initial)
|
|
nm_platform_link_set_mtu (nm_device_get_platform (self), ifindex, priv->mtu_initial);
|
|
if (priv->ip6_mtu_initial) {
|
|
char sbuf[64];
|
|
|
|
nm_device_ipv6_sysctl_set (self, "mtu",
|
|
nm_sprintf_buf (sbuf, "%u", (unsigned) priv->ip6_mtu_initial));
|
|
}
|
|
}
|
|
priv->mtu_initial = 0;
|
|
priv->ip6_mtu_initial = 0;
|
|
}
|
|
|
|
_cleanup_generic_post (self, cleanup_type);
|
|
}
|
|
|
|
static void
|
|
deactivate_reset_hw_addr (NMDevice *self)
|
|
{
|
|
nm_device_hw_addr_reset (self, "deactivate");
|
|
}
|
|
|
|
static char *
|
|
find_dhcp4_address (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
guint i, n;
|
|
|
|
if (!priv->ip4_config)
|
|
return NULL;
|
|
|
|
n = nm_ip4_config_get_num_addresses (priv->ip4_config);
|
|
for (i = 0; i < n; i++) {
|
|
const NMPlatformIP4Address *a = nm_ip4_config_get_address (priv->ip4_config, i);
|
|
|
|
if (a->addr_source == NM_IP_CONFIG_SOURCE_DHCP)
|
|
return g_strdup (nm_utils_inet4_ntop (a->address, NULL));
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
void
|
|
nm_device_spawn_iface_helper (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
gboolean configured = FALSE;
|
|
NMConnection *connection;
|
|
GError *error = NULL;
|
|
const char *method;
|
|
GPtrArray *argv;
|
|
gs_free char *dhcp4_address = NULL;
|
|
char *logging_backend;
|
|
NMUtilsStableType stable_type;
|
|
const char *stable_id;
|
|
|
|
if (priv->state != NM_DEVICE_STATE_ACTIVATED)
|
|
return;
|
|
if (!nm_device_can_assume_connections (self))
|
|
return;
|
|
|
|
connection = nm_device_get_applied_connection (self);
|
|
g_assert (connection);
|
|
|
|
argv = g_ptr_array_sized_new (10);
|
|
g_ptr_array_set_free_func (argv, g_free);
|
|
|
|
g_ptr_array_add (argv, g_strdup (LIBEXECDIR "/nm-iface-helper"));
|
|
g_ptr_array_add (argv, g_strdup ("--ifname"));
|
|
g_ptr_array_add (argv, g_strdup (nm_device_get_ip_iface (self)));
|
|
g_ptr_array_add (argv, g_strdup ("--uuid"));
|
|
g_ptr_array_add (argv, g_strdup (nm_connection_get_uuid (connection)));
|
|
|
|
stable_id = _get_stable_id (self, connection, &stable_type);
|
|
if (stable_id && stable_type != NM_UTILS_STABLE_TYPE_UUID) {
|
|
g_ptr_array_add (argv, g_strdup ("--stable-id"));
|
|
g_ptr_array_add (argv, g_strdup_printf ("%d %s", (int) stable_type, stable_id));
|
|
}
|
|
|
|
logging_backend = nm_config_get_is_debug (nm_config_get ())
|
|
? g_strdup ("debug")
|
|
: nm_config_data_get_value (NM_CONFIG_GET_DATA_ORIG,
|
|
NM_CONFIG_KEYFILE_GROUP_LOGGING,
|
|
NM_CONFIG_KEYFILE_KEY_LOGGING_BACKEND,
|
|
NM_CONFIG_GET_VALUE_STRIP | NM_CONFIG_GET_VALUE_NO_EMPTY);
|
|
if (logging_backend) {
|
|
g_ptr_array_add (argv, g_strdup ("--logging-backend"));
|
|
g_ptr_array_add (argv, logging_backend);
|
|
}
|
|
|
|
g_ptr_array_add (argv, g_strdup ("--log-level"));
|
|
g_ptr_array_add (argv, g_strdup (nm_logging_level_to_string ()));
|
|
|
|
g_ptr_array_add (argv, g_strdup ("--log-domains"));
|
|
g_ptr_array_add (argv, g_strdup (nm_logging_domains_to_string ()));
|
|
|
|
dhcp4_address = find_dhcp4_address (self);
|
|
|
|
method = nm_utils_get_ip_config_method (connection, NM_TYPE_SETTING_IP4_CONFIG);
|
|
if (g_strcmp0 (method, NM_SETTING_IP4_CONFIG_METHOD_AUTO) == 0) {
|
|
NMSettingIPConfig *s_ip4;
|
|
|
|
s_ip4 = nm_connection_get_setting_ip4_config (connection);
|
|
g_assert (s_ip4);
|
|
|
|
g_ptr_array_add (argv, g_strdup ("--priority4"));
|
|
g_ptr_array_add (argv, g_strdup_printf ("%u", nm_device_get_ip4_route_metric (self)));
|
|
|
|
g_ptr_array_add (argv, g_strdup ("--dhcp4"));
|
|
g_ptr_array_add (argv, g_strdup (dhcp4_address));
|
|
if (nm_setting_ip_config_get_may_fail (s_ip4) == FALSE)
|
|
g_ptr_array_add (argv, g_strdup ("--dhcp4-required"));
|
|
|
|
if (priv->dhcp4.client) {
|
|
const char *hostname, *fqdn;
|
|
GBytes *client_id;
|
|
|
|
client_id = nm_dhcp_client_get_client_id (priv->dhcp4.client);
|
|
if (client_id) {
|
|
g_ptr_array_add (argv, g_strdup ("--dhcp4-clientid"));
|
|
g_ptr_array_add (argv,
|
|
_nm_utils_bin2str (g_bytes_get_data (client_id, NULL),
|
|
g_bytes_get_size (client_id),
|
|
FALSE));
|
|
}
|
|
|
|
hostname = nm_dhcp_client_get_hostname (priv->dhcp4.client);
|
|
if (hostname) {
|
|
g_ptr_array_add (argv, g_strdup ("--dhcp4-hostname"));
|
|
g_ptr_array_add (argv, g_strdup (hostname));
|
|
}
|
|
|
|
fqdn = nm_dhcp_client_get_fqdn (priv->dhcp4.client);
|
|
if (fqdn) {
|
|
g_ptr_array_add (argv, g_strdup ("--dhcp4-fqdn"));
|
|
g_ptr_array_add (argv, g_strdup (fqdn));
|
|
}
|
|
}
|
|
|
|
configured = TRUE;
|
|
}
|
|
|
|
method = nm_utils_get_ip_config_method (connection, NM_TYPE_SETTING_IP6_CONFIG);
|
|
if (g_strcmp0 (method, NM_SETTING_IP6_CONFIG_METHOD_AUTO) == 0) {
|
|
NMSettingIPConfig *s_ip6;
|
|
NMUtilsIPv6IfaceId iid = NM_UTILS_IPV6_IFACE_ID_INIT;
|
|
|
|
s_ip6 = nm_connection_get_setting_ip6_config (connection);
|
|
g_assert (s_ip6);
|
|
|
|
g_ptr_array_add (argv, g_strdup ("--priority6"));
|
|
g_ptr_array_add (argv, g_strdup_printf ("%u", nm_device_get_ip6_route_metric (self)));
|
|
|
|
g_ptr_array_add (argv, g_strdup ("--slaac"));
|
|
|
|
if (nm_setting_ip_config_get_may_fail (s_ip6) == FALSE)
|
|
g_ptr_array_add (argv, g_strdup ("--slaac-required"));
|
|
|
|
g_ptr_array_add (argv, g_strdup ("--slaac-tempaddr"));
|
|
g_ptr_array_add (argv, g_strdup_printf ("%d", priv->ndisc_use_tempaddr));
|
|
|
|
if (nm_device_get_ip_iface_identifier (self, &iid, FALSE)) {
|
|
g_ptr_array_add (argv, g_strdup ("--iid"));
|
|
g_ptr_array_add (argv,
|
|
_nm_utils_bin2str (iid.id_u8,
|
|
sizeof (NMUtilsIPv6IfaceId),
|
|
FALSE));
|
|
}
|
|
|
|
g_ptr_array_add (argv, g_strdup ("--addr-gen-mode"));
|
|
g_ptr_array_add (argv, g_strdup_printf ("%d", nm_setting_ip6_config_get_addr_gen_mode (NM_SETTING_IP6_CONFIG (s_ip6))));
|
|
|
|
configured = TRUE;
|
|
}
|
|
|
|
if (configured) {
|
|
GPid pid;
|
|
|
|
g_ptr_array_add (argv, NULL);
|
|
|
|
if (nm_logging_enabled (LOGL_DEBUG, LOGD_DEVICE)) {
|
|
char *tmp;
|
|
|
|
tmp = g_strjoinv (" ", (char **) argv->pdata);
|
|
_LOGD (LOGD_DEVICE, "running '%s'", tmp);
|
|
g_free (tmp);
|
|
}
|
|
|
|
if (g_spawn_async (NULL, (char **) argv->pdata, NULL,
|
|
G_SPAWN_DO_NOT_REAP_CHILD, NULL, NULL, &pid, &error)) {
|
|
_LOGI (LOGD_DEVICE, "spawned helper PID %u", (guint) pid);
|
|
} else {
|
|
_LOGW (LOGD_DEVICE, "failed to spawn helper: %s", error->message);
|
|
g_error_free (error);
|
|
}
|
|
}
|
|
|
|
g_ptr_array_unref (argv);
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static gboolean
|
|
ip_config_valid (NMDeviceState state)
|
|
{
|
|
return (state == NM_DEVICE_STATE_UNMANAGED) ||
|
|
(state >= NM_DEVICE_STATE_IP_CHECK &&
|
|
state <= NM_DEVICE_STATE_DEACTIVATING);
|
|
}
|
|
|
|
static void
|
|
notify_ip_properties (NMDevice *self)
|
|
{
|
|
_notify (self, PROP_IP_IFACE);
|
|
_notify (self, PROP_IP4_CONFIG);
|
|
_notify (self, PROP_DHCP4_CONFIG);
|
|
_notify (self, PROP_IP6_CONFIG);
|
|
_notify (self, PROP_DHCP6_CONFIG);
|
|
}
|
|
|
|
static void
|
|
ip6_managed_setup (NMDevice *self)
|
|
{
|
|
set_nm_ipv6ll (self, TRUE);
|
|
set_disable_ipv6 (self, "1");
|
|
nm_device_ipv6_sysctl_set (self, "accept_ra_defrtr", "0");
|
|
nm_device_ipv6_sysctl_set (self, "accept_ra_pinfo", "0");
|
|
nm_device_ipv6_sysctl_set (self, "accept_ra_rtr_pref", "0");
|
|
nm_device_ipv6_sysctl_set (self, "use_tempaddr", "0");
|
|
nm_device_ipv6_sysctl_set (self, "forwarding", "0");
|
|
}
|
|
|
|
static void
|
|
deactivate_async_ready (NMDevice *self,
|
|
GAsyncResult *res,
|
|
gpointer user_data)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMDeviceStateReason reason = GPOINTER_TO_UINT (user_data);
|
|
GError *error = NULL;
|
|
|
|
NM_DEVICE_GET_CLASS (self)->deactivate_async_finish (self, res, &error);
|
|
|
|
/* If operation cancelled, just return */
|
|
if ( g_error_matches (error, G_IO_ERROR, G_IO_ERROR_CANCELLED)
|
|
|| (priv->deactivating_cancellable && g_cancellable_is_cancelled (priv->deactivating_cancellable))) {
|
|
_LOGW (LOGD_DEVICE, "Deactivation cancelled");
|
|
} else {
|
|
/* In every other case, transition to the DISCONNECTED state */
|
|
if (error) {
|
|
_LOGW (LOGD_DEVICE, "Deactivation failed: %s",
|
|
error->message);
|
|
}
|
|
nm_device_queue_state (self, NM_DEVICE_STATE_DISCONNECTED, reason);
|
|
}
|
|
|
|
g_clear_object (&priv->deactivating_cancellable);
|
|
g_clear_error (&error);
|
|
}
|
|
|
|
static void
|
|
deactivate_dispatcher_complete (guint call_id, gpointer user_data)
|
|
{
|
|
NMDevice *self = NM_DEVICE (user_data);
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMDeviceStateReason reason;
|
|
|
|
g_return_if_fail (call_id == priv->dispatcher.call_id);
|
|
g_return_if_fail (priv->dispatcher.post_state == NM_DEVICE_STATE_DISCONNECTED);
|
|
|
|
reason = priv->dispatcher.post_state_reason;
|
|
|
|
priv->dispatcher.call_id = 0;
|
|
priv->dispatcher.post_state = NM_DEVICE_STATE_UNKNOWN;
|
|
priv->dispatcher.post_state_reason = NM_DEVICE_STATE_REASON_NONE;
|
|
|
|
if (nm_clear_g_cancellable (&priv->deactivating_cancellable))
|
|
g_warn_if_reached ();
|
|
|
|
if ( NM_DEVICE_GET_CLASS (self)->deactivate_async
|
|
&& NM_DEVICE_GET_CLASS (self)->deactivate_async_finish) {
|
|
priv->deactivating_cancellable = g_cancellable_new ();
|
|
NM_DEVICE_GET_CLASS (self)->deactivate_async (self,
|
|
priv->deactivating_cancellable,
|
|
(GAsyncReadyCallback) deactivate_async_ready,
|
|
GUINT_TO_POINTER (reason));
|
|
} else
|
|
nm_device_queue_state (self, NM_DEVICE_STATE_DISCONNECTED, reason);
|
|
}
|
|
|
|
static void
|
|
_set_state_full (NMDevice *self,
|
|
NMDeviceState state,
|
|
NMDeviceStateReason reason,
|
|
gboolean quitting)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
NMDeviceState old_state;
|
|
NMActRequest *req;
|
|
gboolean no_firmware = FALSE;
|
|
NMSettingsConnection *connection;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
/* Track re-entry */
|
|
g_warn_if_fail (priv->in_state_changed == FALSE);
|
|
|
|
old_state = priv->state;
|
|
|
|
/* Do nothing if state isn't changing, but as a special case allow
|
|
* re-setting UNAVAILABLE if the device is missing firmware so that we
|
|
* can retry device initialization.
|
|
*/
|
|
if ( (priv->state == state)
|
|
&& ( state != NM_DEVICE_STATE_UNAVAILABLE
|
|
|| !priv->firmware_missing)) {
|
|
_LOGD (LOGD_DEVICE, "state change: %s -> %s (reason '%s') [%d %d %d]%s",
|
|
state_to_string (old_state),
|
|
state_to_string (state),
|
|
reason_to_string (reason),
|
|
old_state,
|
|
state,
|
|
reason,
|
|
priv->firmware_missing ? " (missing firmware)" : "");
|
|
return;
|
|
}
|
|
|
|
_LOGI (LOGD_DEVICE, "state change: %s -> %s (reason '%s') [%d %d %d]",
|
|
state_to_string (old_state),
|
|
state_to_string (state),
|
|
reason_to_string (reason),
|
|
old_state,
|
|
state,
|
|
reason);
|
|
|
|
priv->in_state_changed = TRUE;
|
|
|
|
priv->state = state;
|
|
priv->state_reason = reason;
|
|
|
|
queued_state_clear (self);
|
|
|
|
dispatcher_cleanup (self);
|
|
if (priv->deactivating_cancellable)
|
|
g_cancellable_cancel (priv->deactivating_cancellable);
|
|
|
|
/* Cache the activation request for the dispatcher */
|
|
req = nm_g_object_ref (priv->act_request);
|
|
|
|
if ( state > NM_DEVICE_STATE_UNMANAGED
|
|
&& state <= NM_DEVICE_STATE_ACTIVATED
|
|
&& nm_device_state_reason_check (reason) == NM_DEVICE_STATE_REASON_NOW_MANAGED
|
|
&& NM_IN_SET_TYPED (NMDeviceSysIfaceState,
|
|
priv->sys_iface_state,
|
|
NM_DEVICE_SYS_IFACE_STATE_EXTERNAL,
|
|
NM_DEVICE_SYS_IFACE_STATE_ASSUME))
|
|
nm_device_sys_iface_state_set (self, NM_DEVICE_SYS_IFACE_STATE_MANAGED);
|
|
|
|
if (state <= NM_DEVICE_STATE_UNAVAILABLE) {
|
|
if (available_connections_del_all (self))
|
|
_notify (self, PROP_AVAILABLE_CONNECTIONS);
|
|
if (old_state > NM_DEVICE_STATE_UNAVAILABLE)
|
|
_clear_queued_act_request (priv);
|
|
}
|
|
|
|
/* Update the available connections list when a device first becomes available */
|
|
if (state >= NM_DEVICE_STATE_DISCONNECTED && old_state < NM_DEVICE_STATE_DISCONNECTED)
|
|
nm_device_recheck_available_connections (self);
|
|
|
|
if (state <= NM_DEVICE_STATE_DISCONNECTED || state > NM_DEVICE_STATE_DEACTIVATING) {
|
|
if (nm_clear_g_free (&priv->current_stable_id))
|
|
_LOGT (LOGD_DEVICE, "stable-id: clear");
|
|
}
|
|
|
|
/* Handle the new state here; but anything that could trigger
|
|
* another state change should be done below.
|
|
*/
|
|
switch (state) {
|
|
case NM_DEVICE_STATE_UNMANAGED:
|
|
nm_device_set_firmware_missing (self, FALSE);
|
|
if (old_state > NM_DEVICE_STATE_UNMANAGED) {
|
|
if (priv->sys_iface_state != NM_DEVICE_SYS_IFACE_STATE_MANAGED) {
|
|
nm_device_cleanup (self, reason,
|
|
priv->sys_iface_state == NM_DEVICE_SYS_IFACE_STATE_REMOVED
|
|
? CLEANUP_TYPE_REMOVED
|
|
: CLEANUP_TYPE_KEEP);
|
|
} else {
|
|
/* Clean up if the device is now unmanaged but was activated */
|
|
if (nm_device_get_act_request (self))
|
|
nm_device_cleanup (self, reason, CLEANUP_TYPE_DECONFIGURE);
|
|
nm_device_take_down (self, TRUE);
|
|
nm_device_hw_addr_reset (self, "unmanage");
|
|
set_nm_ipv6ll (self, FALSE);
|
|
restore_ip6_properties (self);
|
|
break;
|
|
}
|
|
}
|
|
break;
|
|
case NM_DEVICE_STATE_UNAVAILABLE:
|
|
if (old_state == NM_DEVICE_STATE_UNMANAGED) {
|
|
save_ip6_properties (self);
|
|
if (priv->sys_iface_state == NM_DEVICE_SYS_IFACE_STATE_MANAGED)
|
|
ip6_managed_setup (self);
|
|
}
|
|
|
|
if (priv->sys_iface_state == NM_DEVICE_SYS_IFACE_STATE_MANAGED) {
|
|
if (old_state == NM_DEVICE_STATE_UNMANAGED || priv->firmware_missing) {
|
|
if (!nm_device_bring_up (self, TRUE, &no_firmware) && no_firmware)
|
|
_LOGW (LOGD_PLATFORM, "firmware may be missing.");
|
|
nm_device_set_firmware_missing (self, no_firmware ? TRUE : FALSE);
|
|
}
|
|
|
|
/* Ensure the device gets deactivated in response to stuff like
|
|
* carrier changes or rfkill. But don't deactivate devices that are
|
|
* about to assume a connection since that defeats the purpose of
|
|
* assuming the device's existing connection.
|
|
*
|
|
* Note that we "deactivate" the device even when coming from
|
|
* UNMANAGED, to ensure that it's in a clean state.
|
|
*/
|
|
nm_device_cleanup (self, reason, CLEANUP_TYPE_DECONFIGURE);
|
|
}
|
|
break;
|
|
case NM_DEVICE_STATE_DISCONNECTED:
|
|
if (old_state > NM_DEVICE_STATE_DISCONNECTED) {
|
|
/* Ensure devices that previously assumed a connection now have
|
|
* userspace IPv6LL enabled.
|
|
*/
|
|
set_nm_ipv6ll (self, TRUE);
|
|
|
|
nm_device_cleanup (self, reason, CLEANUP_TYPE_DECONFIGURE);
|
|
} else if (old_state < NM_DEVICE_STATE_DISCONNECTED) {
|
|
if (priv->sys_iface_state == NM_DEVICE_SYS_IFACE_STATE_MANAGED) {
|
|
/* Ensure IPv6 is set up as it may not have been done when
|
|
* entering the UNAVAILABLE state depending on the reason.
|
|
*/
|
|
ip6_managed_setup (self);
|
|
}
|
|
}
|
|
break;
|
|
case NM_DEVICE_STATE_PREPARE:
|
|
nm_device_update_initial_hw_address (self);
|
|
break;
|
|
case NM_DEVICE_STATE_NEED_AUTH:
|
|
if (old_state > NM_DEVICE_STATE_NEED_AUTH) {
|
|
/* Clean up any half-done IP operations if the device's layer2
|
|
* finds out it needs authentication during IP config.
|
|
*/
|
|
_cleanup_ip4_pre (self, CLEANUP_TYPE_DECONFIGURE);
|
|
_cleanup_ip6_pre (self, CLEANUP_TYPE_DECONFIGURE);
|
|
}
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
|
|
/* Reset autoconnect flag when the device is activating or connected. */
|
|
if ( state >= NM_DEVICE_STATE_PREPARE
|
|
&& state <= NM_DEVICE_STATE_ACTIVATED)
|
|
nm_device_set_autoconnect_intern (self, TRUE);
|
|
|
|
_notify (self, PROP_STATE);
|
|
_notify (self, PROP_STATE_REASON);
|
|
g_signal_emit (self, signals[STATE_CHANGED], 0, (guint) state, (guint) old_state, (guint) reason);
|
|
|
|
/* Post-process the event after internal notification */
|
|
|
|
switch (state) {
|
|
case NM_DEVICE_STATE_UNAVAILABLE:
|
|
/* If the device can activate now (ie, it's got a carrier, the supplicant
|
|
* is active, or whatever) schedule a delayed transition to DISCONNECTED
|
|
* to get things rolling. The device can't transition immediately because
|
|
* we can't change states again from the state handler for a variety of
|
|
* reasons.
|
|
*/
|
|
if (nm_device_is_available (self, NM_DEVICE_CHECK_DEV_AVAILABLE_NONE)) {
|
|
nm_device_queue_recheck_available (self,
|
|
NM_DEVICE_STATE_REASON_NONE,
|
|
NM_DEVICE_STATE_REASON_NONE);
|
|
} else {
|
|
_LOGD (LOGD_DEVICE, "device not yet available for transition to DISCONNECTED");
|
|
}
|
|
break;
|
|
case NM_DEVICE_STATE_DEACTIVATING:
|
|
_cancel_activation (self);
|
|
|
|
/* We cache the ignore_carrier state to not react on config-reloads while the connection
|
|
* is active. But on deactivating, reset the ignore-carrier flag to the current state. */
|
|
priv->ignore_carrier = nm_config_data_get_ignore_carrier (NM_CONFIG_GET_DATA, self);
|
|
|
|
if (quitting) {
|
|
nm_dispatcher_call_device_sync (NM_DISPATCHER_ACTION_PRE_DOWN,
|
|
self, req);
|
|
} else {
|
|
priv->dispatcher.post_state = NM_DEVICE_STATE_DISCONNECTED;
|
|
priv->dispatcher.post_state_reason = reason;
|
|
if (!nm_dispatcher_call_device (NM_DISPATCHER_ACTION_PRE_DOWN,
|
|
self,
|
|
req,
|
|
deactivate_dispatcher_complete,
|
|
self,
|
|
&priv->dispatcher.call_id)) {
|
|
/* Just proceed on errors */
|
|
deactivate_dispatcher_complete (0, self);
|
|
}
|
|
}
|
|
|
|
nm_pacrunner_manager_remove_clear (priv->pacrunner_manager,
|
|
&priv->pacrunner_call_id);
|
|
break;
|
|
case NM_DEVICE_STATE_DISCONNECTED:
|
|
if ( priv->queued_act_request
|
|
&& !priv->queued_act_request_is_waiting_for_carrier) {
|
|
NMActRequest *queued_req;
|
|
gboolean success;
|
|
|
|
queued_req = priv->queued_act_request;
|
|
priv->queued_act_request = NULL;
|
|
success = _device_activate (self, queued_req);
|
|
g_object_unref (queued_req);
|
|
if (success)
|
|
break;
|
|
/* fall through */
|
|
}
|
|
break;
|
|
case NM_DEVICE_STATE_ACTIVATED:
|
|
_LOGI (LOGD_DEVICE, "Activation: successful, device activated.");
|
|
nm_device_update_metered (self);
|
|
nm_dispatcher_call_device (NM_DISPATCHER_ACTION_UP,
|
|
self,
|
|
req,
|
|
NULL, NULL, NULL);
|
|
|
|
if (priv->proxy_config)
|
|
_pacrunner_manager_send (self);
|
|
break;
|
|
case NM_DEVICE_STATE_FAILED:
|
|
/* Usually upon failure the activation chain is interrupted in
|
|
* one of the stages; but in some cases the device fails for
|
|
* external events (as a failure of master connection) while
|
|
* the activation sequence is running and so we need to ensure
|
|
* that the chain is terminated here.
|
|
*/
|
|
_cancel_activation (self);
|
|
|
|
if (nm_device_sys_iface_state_is_external_or_assume (self)) {
|
|
/* Avoid tearing down assumed connection, assume it's connected */
|
|
nm_device_queue_state (self,
|
|
NM_DEVICE_STATE_ACTIVATED,
|
|
NM_DEVICE_STATE_REASON_CONNECTION_ASSUMED);
|
|
break;
|
|
}
|
|
|
|
connection = nm_device_get_settings_connection (self);
|
|
_LOGW (LOGD_DEVICE | LOGD_WIFI,
|
|
"Activation: failed for connection '%s'",
|
|
connection ? nm_settings_connection_get_id (connection) : "<unknown>");
|
|
|
|
/* Notify any slaves of the unexpected failure */
|
|
nm_device_master_release_slaves (self);
|
|
|
|
/* If the connection doesn't yet have a timestamp, set it to zero so that
|
|
* we can distinguish between connections we've tried to activate and have
|
|
* failed (zero timestamp), connections that succeeded (non-zero timestamp),
|
|
* and those we haven't tried yet (no timestamp).
|
|
*/
|
|
if (connection && !nm_settings_connection_get_timestamp (connection, NULL))
|
|
nm_settings_connection_update_timestamp (connection, (guint64) 0, TRUE);
|
|
|
|
/* Schedule the transition to DISCONNECTED. The device can't transition
|
|
* immediately because we can't change states again from the state
|
|
* handler for a variety of reasons.
|
|
*/
|
|
nm_device_queue_state (self, NM_DEVICE_STATE_DISCONNECTED, NM_DEVICE_STATE_REASON_NONE);
|
|
break;
|
|
case NM_DEVICE_STATE_IP_CHECK:
|
|
if ( priv->fw_state >= FIREWALL_STATE_INITIALIZED
|
|
&& priv->ip_iface
|
|
&& !nm_device_sys_iface_state_is_external (self)) {
|
|
priv->fw_state = FIREWALL_STATE_WAIT_IP_CONFIG;
|
|
fw_change_zone (self);
|
|
} else
|
|
nm_device_start_ip_check (self);
|
|
|
|
/* IP-related properties are only valid when the device has IP configuration;
|
|
* now that it does, ensure their change notifications are emitted.
|
|
*/
|
|
notify_ip_properties (self);
|
|
break;
|
|
case NM_DEVICE_STATE_SECONDARIES:
|
|
ip_check_gw_ping_cleanup (self);
|
|
_LOGD (LOGD_DEVICE, "device entered SECONDARIES state");
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
|
|
if (state > NM_DEVICE_STATE_DISCONNECTED)
|
|
delete_on_deactivate_unschedule (self);
|
|
|
|
if ( (old_state == NM_DEVICE_STATE_ACTIVATED || old_state == NM_DEVICE_STATE_DEACTIVATING)
|
|
&& (state != NM_DEVICE_STATE_DEACTIVATING)) {
|
|
if (quitting) {
|
|
nm_dispatcher_call_device_sync (NM_DISPATCHER_ACTION_DOWN,
|
|
self, req);
|
|
} else {
|
|
nm_dispatcher_call_device (NM_DISPATCHER_ACTION_DOWN,
|
|
self,
|
|
req,
|
|
NULL, NULL, NULL);
|
|
}
|
|
}
|
|
|
|
/* IP-related properties are only valid when the device has IP configuration.
|
|
* If it no longer does, ensure their change notifications are emitted.
|
|
*/
|
|
if (ip_config_valid (old_state) && !ip_config_valid (state))
|
|
notify_ip_properties (self);
|
|
|
|
concheck_periodic_update (self);
|
|
|
|
/* Dispose of the cached activation request */
|
|
if (req)
|
|
g_object_unref (req);
|
|
|
|
priv->in_state_changed = FALSE;
|
|
|
|
if ((old_state > NM_DEVICE_STATE_UNMANAGED) != (state > NM_DEVICE_STATE_UNMANAGED))
|
|
_notify (self, PROP_MANAGED);
|
|
}
|
|
|
|
void
|
|
nm_device_state_changed (NMDevice *self,
|
|
NMDeviceState state,
|
|
NMDeviceStateReason reason)
|
|
{
|
|
_set_state_full (self, state, reason, FALSE);
|
|
}
|
|
|
|
static gboolean
|
|
queued_state_set (gpointer user_data)
|
|
{
|
|
NMDevice *self = NM_DEVICE (user_data);
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMDeviceState new_state;
|
|
NMDeviceStateReason new_reason;
|
|
|
|
nm_assert (priv->queued_state.id);
|
|
|
|
_LOGD (LOGD_DEVICE, "queue-state[%s, reason:%s, id:%u]: %s",
|
|
state_to_string (priv->queued_state.state),
|
|
reason_to_string (priv->queued_state.reason),
|
|
priv->queued_state.id,
|
|
"change state");
|
|
|
|
/* Clear queued state struct before triggering state change, since
|
|
* the state change may queue another state.
|
|
*/
|
|
priv->queued_state.id = 0;
|
|
new_state = priv->queued_state.state;
|
|
new_reason = priv->queued_state.reason;
|
|
|
|
nm_device_state_changed (self, new_state, new_reason);
|
|
nm_device_remove_pending_action (self, queued_state_to_string (new_state), TRUE);
|
|
|
|
return G_SOURCE_REMOVE;
|
|
}
|
|
|
|
void
|
|
nm_device_queue_state (NMDevice *self,
|
|
NMDeviceState state,
|
|
NMDeviceStateReason reason)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_if_fail (NM_IS_DEVICE (self));
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->queued_state.id && priv->queued_state.state == state) {
|
|
_LOGD (LOGD_DEVICE, "queue-state[%s, reason:%s, id:%u]: %s%s%s%s",
|
|
state_to_string (priv->queued_state.state),
|
|
reason_to_string (priv->queued_state.reason),
|
|
priv->queued_state.id,
|
|
"ignore queuing same state change",
|
|
NM_PRINT_FMT_QUOTED (priv->queued_state.reason != reason,
|
|
" (reason differs: ", reason_to_string (reason), ")", ""));
|
|
return;
|
|
}
|
|
|
|
/* Add pending action for the new state before clearing the queued states, so
|
|
* that we don't accidently pop all pending states and reach 'startup complete' */
|
|
nm_device_add_pending_action (self, queued_state_to_string (state), TRUE);
|
|
|
|
/* We should only ever have one delayed state transition at a time */
|
|
if (priv->queued_state.id) {
|
|
_LOGW (LOGD_DEVICE, "queue-state[%s, reason:%s, id:%u]: %s",
|
|
state_to_string (priv->queued_state.state),
|
|
reason_to_string (priv->queued_state.reason),
|
|
priv->queued_state.id,
|
|
"replace previously queued state change");
|
|
nm_clear_g_source (&priv->queued_state.id);
|
|
nm_device_remove_pending_action (self, queued_state_to_string (priv->queued_state.state), TRUE);
|
|
}
|
|
|
|
priv->queued_state.state = state;
|
|
priv->queued_state.reason = reason;
|
|
priv->queued_state.id = g_idle_add (queued_state_set, self);
|
|
|
|
_LOGD (LOGD_DEVICE, "queue-state[%s, reason:%s, id:%u]: %s",
|
|
state_to_string (state),
|
|
reason_to_string (reason),
|
|
priv->queued_state.id,
|
|
"queue state change");
|
|
}
|
|
|
|
static void
|
|
queued_state_clear (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (!priv->queued_state.id)
|
|
return;
|
|
|
|
_LOGD (LOGD_DEVICE, "queue-state[%s, reason:%s, id:%u]: %s",
|
|
state_to_string (priv->queued_state.state),
|
|
reason_to_string (priv->queued_state.reason),
|
|
priv->queued_state.id,
|
|
"clear queued state change");
|
|
nm_clear_g_source (&priv->queued_state.id);
|
|
nm_device_remove_pending_action (self, queued_state_to_string (priv->queued_state.state), TRUE);
|
|
}
|
|
|
|
NMDeviceState
|
|
nm_device_get_state (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), NM_DEVICE_STATE_UNKNOWN);
|
|
|
|
return NM_DEVICE_GET_PRIVATE (self)->state;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
/* NMConfigDevice interface related stuff */
|
|
|
|
const char *
|
|
nm_device_get_hw_address (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
char buf[NM_UTILS_HWADDR_LEN_MAX];
|
|
gsize l;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), NULL);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
nm_assert ( (!priv->hw_addr && priv->hw_addr_len == 0)
|
|
|| ( priv->hw_addr
|
|
&& _nm_utils_hwaddr_aton (priv->hw_addr, buf, sizeof (buf), &l)
|
|
&& l == priv->hw_addr_len));
|
|
|
|
return priv->hw_addr;
|
|
}
|
|
|
|
gboolean
|
|
nm_device_update_hw_address (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
const guint8 *hwaddr;
|
|
gsize hwaddrlen = 0;
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
if (priv->ifindex <= 0)
|
|
return FALSE;
|
|
|
|
hwaddr = nm_platform_link_get_address (nm_device_get_platform (self), priv->ifindex, &hwaddrlen);
|
|
|
|
if ( priv->type == NM_DEVICE_TYPE_ETHERNET
|
|
&& hwaddr
|
|
&& nm_utils_hwaddr_matches (hwaddr, hwaddrlen, nm_ip_addr_zero.addr_eth, sizeof (nm_ip_addr_zero.addr_eth)))
|
|
hwaddrlen = 0;
|
|
|
|
if (!hwaddrlen)
|
|
return FALSE;
|
|
|
|
if ( priv->hw_addr_len
|
|
&& priv->hw_addr_len != hwaddrlen) {
|
|
char s_buf[NM_UTILS_HWADDR_LEN_MAX_STR];
|
|
|
|
/* we cannot change the address length of a device once it is set (except
|
|
* unrealizing the device).
|
|
*
|
|
* The reason is that the permanent and initial MAC addresses also must have the
|
|
* same address length, so it's unclear what it would mean that the length changes. */
|
|
_LOGD (LOGD_PLATFORM | LOGD_DEVICE,
|
|
"hw-addr: read a MAC address with differing length (%s vs. %s)",
|
|
priv->hw_addr,
|
|
nm_utils_hwaddr_ntoa_buf (hwaddr, hwaddrlen, TRUE, s_buf, sizeof (s_buf)));
|
|
return FALSE;
|
|
}
|
|
|
|
if ( priv->hw_addr
|
|
&& nm_utils_hwaddr_matches (priv->hw_addr, -1, hwaddr, hwaddrlen))
|
|
return FALSE;
|
|
|
|
g_free (priv->hw_addr);
|
|
priv->hw_addr_len_ = hwaddrlen;
|
|
priv->hw_addr = nm_utils_hwaddr_ntoa (hwaddr, hwaddrlen);
|
|
|
|
_LOGD (LOGD_PLATFORM | LOGD_DEVICE, "hw-addr: hardware address now %s", priv->hw_addr);
|
|
_notify (self, PROP_HW_ADDRESS);
|
|
|
|
if ( !priv->hw_addr_initial
|
|
|| ( priv->hw_addr_type == HW_ADDR_TYPE_UNSET
|
|
&& priv->state < NM_DEVICE_STATE_PREPARE
|
|
&& !nm_device_is_activating (self))) {
|
|
/* when we get a hw_addr the first time or while the device
|
|
* is not activated (with no explict hw address set), always
|
|
* update our inital hw-address as well. */
|
|
nm_device_update_initial_hw_address (self);
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
void
|
|
nm_device_update_initial_hw_address (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if ( priv->hw_addr
|
|
&& !nm_streq0 (priv->hw_addr_initial, priv->hw_addr)) {
|
|
if ( priv->hw_addr_initial
|
|
&& priv->hw_addr_type != HW_ADDR_TYPE_UNSET) {
|
|
/* once we have the initial hw address set, we only allow
|
|
* update if the currenty type is "unset". */
|
|
return;
|
|
}
|
|
g_free (priv->hw_addr_initial);
|
|
priv->hw_addr_initial = g_strdup (priv->hw_addr);
|
|
_LOGD (LOGD_DEVICE, "hw-addr: update initial MAC address %s",
|
|
priv->hw_addr_initial);
|
|
}
|
|
}
|
|
|
|
void
|
|
nm_device_update_permanent_hw_address (NMDevice *self, gboolean force_freeze)
|
|
{
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
guint8 buf[NM_UTILS_HWADDR_LEN_MAX];
|
|
size_t len = 0;
|
|
gboolean success_read;
|
|
int ifindex;
|
|
const NMPlatformLink *pllink;
|
|
|
|
if (priv->hw_addr_perm) {
|
|
/* the permanent hardware address is only read once and not
|
|
* re-read later.
|
|
*
|
|
* Except during unrealize/realize cycles, where we clear the permanent
|
|
* hardware address during unrealization. */
|
|
return;
|
|
}
|
|
|
|
ifindex = priv->ifindex;
|
|
if (ifindex <= 0)
|
|
return;
|
|
|
|
/* the user is advised to configure stable MAC addresses for software devices via
|
|
* UDEV. Thus, check whether the link is fully initialized. */
|
|
pllink = nm_platform_link_get (nm_device_get_platform (self), ifindex);
|
|
if ( !pllink
|
|
|| !pllink->initialized) {
|
|
if (!force_freeze) {
|
|
/* we can afford to wait. Back off and leave the permanent MAC address
|
|
* undecided for now. */
|
|
return;
|
|
}
|
|
/* try to refresh the link just to give UDEV a bit more time... */
|
|
nm_platform_link_refresh (nm_device_get_platform (self), ifindex);
|
|
/* maybe the MAC address changed... */
|
|
nm_device_update_hw_address (self);
|
|
} else if (!priv->hw_addr_len)
|
|
nm_device_update_hw_address (self);
|
|
|
|
if (!priv->hw_addr_len) {
|
|
/* we need the current MAC address because we require the permanent MAC address
|
|
* to have the same length as the current address.
|
|
*
|
|
* Abort if there is no current MAC address. */
|
|
return;
|
|
}
|
|
|
|
success_read = nm_platform_link_get_permanent_address (nm_device_get_platform (self), ifindex, buf, &len);
|
|
if (success_read && priv->hw_addr_len == len) {
|
|
priv->hw_addr_perm_fake = FALSE;
|
|
priv->hw_addr_perm = nm_utils_hwaddr_ntoa (buf, len);
|
|
_LOGD (LOGD_DEVICE, "hw-addr: read permanent MAC address '%s'",
|
|
priv->hw_addr_perm);
|
|
goto notify_and_out;
|
|
}
|
|
|
|
/* we failed to read a permanent MAC address, thus we use a fake address,
|
|
* that is the current MAC address of the device.
|
|
*
|
|
* Note that the permanet MAC address of a NMDevice instance does not change
|
|
* after being set once. Thus, we use now a fake address and stick to that
|
|
* (until we unrealize the device). */
|
|
priv->hw_addr_perm_fake = TRUE;
|
|
|
|
/* We also persist our choice of the fake address to the device state
|
|
* file to use the same address on restart of NetworkManager.
|
|
* First, try to reload the address from the state file. */
|
|
{
|
|
gs_free NMConfigDeviceStateData *dev_state = NULL;
|
|
|
|
dev_state = nm_config_device_state_load (ifindex);
|
|
if ( dev_state
|
|
&& dev_state->perm_hw_addr_fake
|
|
&& nm_utils_hwaddr_aton (dev_state->perm_hw_addr_fake, buf, priv->hw_addr_len)
|
|
&& !nm_utils_hwaddr_matches (buf, priv->hw_addr_len, priv->hw_addr, -1)) {
|
|
_LOGD (LOGD_PLATFORM | LOGD_ETHER, "hw-addr: %s (use from statefile: %s, current: %s)",
|
|
success_read
|
|
? "read HW addr length of permanent MAC address differs"
|
|
: "unable to read permanent MAC address",
|
|
dev_state->perm_hw_addr_fake,
|
|
priv->hw_addr);
|
|
priv->hw_addr_perm = nm_utils_hwaddr_ntoa (buf, priv->hw_addr_len);
|
|
goto notify_and_out;
|
|
}
|
|
}
|
|
|
|
_LOGD (LOGD_PLATFORM | LOGD_ETHER, "hw-addr: %s (use current: %s)",
|
|
success_read
|
|
? "read HW addr length of permanent MAC address differs"
|
|
: "unable to read permanent MAC address",
|
|
priv->hw_addr);
|
|
priv->hw_addr_perm = g_strdup (priv->hw_addr);
|
|
|
|
notify_and_out:
|
|
_notify (self, PROP_PERM_HW_ADDRESS);
|
|
}
|
|
|
|
static const char *
|
|
_get_cloned_mac_address_setting (NMDevice *self, NMConnection *connection, gboolean is_wifi, char **out_addr)
|
|
{
|
|
NMSetting *setting;
|
|
const char *addr = NULL;
|
|
|
|
nm_assert (out_addr && !*out_addr);
|
|
|
|
setting = nm_connection_get_setting (connection,
|
|
is_wifi ? NM_TYPE_SETTING_WIRELESS : NM_TYPE_SETTING_WIRED);
|
|
if (setting) {
|
|
addr = is_wifi
|
|
? nm_setting_wireless_get_cloned_mac_address ((NMSettingWireless *) setting)
|
|
: nm_setting_wired_get_cloned_mac_address ((NMSettingWired *) setting);
|
|
}
|
|
|
|
if (!addr) {
|
|
gs_free char *a = NULL;
|
|
|
|
a = nm_config_data_get_connection_default (NM_CONFIG_GET_DATA,
|
|
is_wifi ? "wifi.cloned-mac-address" : "ethernet.cloned-mac-address",
|
|
self);
|
|
|
|
addr = NM_CLONED_MAC_PRESERVE;
|
|
|
|
if (!a) {
|
|
if (is_wifi) {
|
|
NMSettingMacRandomization v;
|
|
|
|
/* for backward compatibility, read the deprecated wifi.mac-address-randomization setting. */
|
|
a = nm_config_data_get_connection_default (NM_CONFIG_GET_DATA,
|
|
"wifi." NM_SETTING_WIRELESS_MAC_ADDRESS_RANDOMIZATION,
|
|
self);
|
|
v = _nm_utils_ascii_str_to_int64 (a, 10,
|
|
NM_SETTING_MAC_RANDOMIZATION_DEFAULT,
|
|
NM_SETTING_MAC_RANDOMIZATION_ALWAYS,
|
|
NM_SETTING_MAC_RANDOMIZATION_DEFAULT);
|
|
if (v == NM_SETTING_MAC_RANDOMIZATION_ALWAYS)
|
|
addr = NM_CLONED_MAC_RANDOM;
|
|
}
|
|
} else if ( NM_CLONED_MAC_IS_SPECIAL (a)
|
|
|| nm_utils_hwaddr_valid (a, ETH_ALEN))
|
|
addr = *out_addr = g_steal_pointer (&a);
|
|
}
|
|
|
|
return addr;
|
|
}
|
|
|
|
static const char *
|
|
_get_generate_mac_address_mask_setting (NMDevice *self, NMConnection *connection, gboolean is_wifi, char **out_value)
|
|
{
|
|
NMSetting *setting;
|
|
const char *value = NULL;
|
|
char *a;
|
|
|
|
nm_assert (out_value && !*out_value);
|
|
|
|
setting = nm_connection_get_setting (connection,
|
|
is_wifi ? NM_TYPE_SETTING_WIRELESS : NM_TYPE_SETTING_WIRED);
|
|
if (setting) {
|
|
value = is_wifi
|
|
? nm_setting_wireless_get_generate_mac_address_mask ((NMSettingWireless *) setting)
|
|
: nm_setting_wired_get_generate_mac_address_mask ((NMSettingWired *) setting);
|
|
if (value)
|
|
return value;
|
|
}
|
|
|
|
a = nm_config_data_get_connection_default (NM_CONFIG_GET_DATA,
|
|
is_wifi ? "wifi.generate-mac-address-mask" : "ethernet.generate-mac-mac-address-mask",
|
|
self);
|
|
if (!a)
|
|
return NULL;
|
|
*out_value = a;
|
|
return a;
|
|
}
|
|
|
|
gboolean
|
|
nm_device_hw_addr_is_explict (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
return !NM_IN_SET ((HwAddrType) priv->hw_addr_type,
|
|
HW_ADDR_TYPE_PERMANENT,
|
|
HW_ADDR_TYPE_UNSET);
|
|
}
|
|
|
|
static gboolean
|
|
_hw_addr_matches (NMDevice *self, const guint8 *addr, gsize addr_len)
|
|
{
|
|
const char *cur_addr;
|
|
|
|
cur_addr = nm_device_get_hw_address (self);
|
|
return cur_addr && nm_utils_hwaddr_matches (addr, addr_len, cur_addr, -1);
|
|
}
|
|
|
|
static gboolean
|
|
_hw_addr_set (NMDevice *self,
|
|
const char *const addr,
|
|
const char *const operation,
|
|
const char *const detail)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
gboolean success = FALSE;
|
|
NMPlatformError plerr;
|
|
guint8 addr_bytes[NM_UTILS_HWADDR_LEN_MAX];
|
|
gsize addr_len;
|
|
gboolean was_up;
|
|
|
|
nm_assert (NM_IS_DEVICE (self));
|
|
nm_assert (addr);
|
|
nm_assert (operation);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (!_nm_utils_hwaddr_aton (addr, addr_bytes, sizeof (addr_bytes), &addr_len))
|
|
g_return_val_if_reached (FALSE);
|
|
|
|
/* Do nothing if current MAC is same */
|
|
if (_hw_addr_matches (self, addr_bytes, addr_len)) {
|
|
_LOGT (LOGD_DEVICE, "set-hw-addr: no MAC address change needed (%s)", addr);
|
|
return TRUE;
|
|
}
|
|
|
|
if ( priv->hw_addr_len
|
|
&& priv->hw_addr_len != addr_len)
|
|
g_return_val_if_reached (FALSE);
|
|
|
|
_LOGT (LOGD_DEVICE, "set-hw-addr: setting MAC address to '%s' (%s, %s)...", addr, operation, detail);
|
|
|
|
was_up = nm_device_is_up (self);
|
|
if (was_up) {
|
|
/* Can't change MAC address while device is up */
|
|
nm_device_take_down (self, FALSE);
|
|
}
|
|
|
|
plerr = nm_platform_link_set_address (nm_device_get_platform (self), nm_device_get_ip_ifindex (self), addr_bytes, addr_len);
|
|
success = (plerr == NM_PLATFORM_ERROR_SUCCESS);
|
|
if (success) {
|
|
/* MAC address succesfully changed; update the current MAC to match */
|
|
nm_device_update_hw_address (self);
|
|
if (_hw_addr_matches (self, addr_bytes, addr_len)) {
|
|
_LOGI (LOGD_DEVICE, "set-hw-addr: %s MAC address to %s (%s)",
|
|
operation, addr, detail);
|
|
} else {
|
|
gint64 poll_end, now;
|
|
|
|
_LOGD (LOGD_DEVICE,
|
|
"set-hw-addr: new MAC address %s not successfully %s (%s) (refresh link)",
|
|
addr, operation, detail);
|
|
|
|
/* The platform call indicated success, however the address is not
|
|
* as expected. That is either due to a driver issue (brcmfmac, bgo#770456,
|
|
* rh#1374023) or a race where externally the MAC address was reset.
|
|
* The race is rather unlikely.
|
|
*
|
|
* The alternative would be to postpone the activation in case the
|
|
* MAC address is not yet ready and poll without blocking. However,
|
|
* that is rather complicated and it is not expected that this case
|
|
* happens for regular drivers.
|
|
* Note that brcmfmac can block NetworkManager for 500 msec while
|
|
* taking down the device. Let's add annother 100 msec to that.
|
|
*
|
|
* wait/poll up to 100 msec until it changes. */
|
|
|
|
poll_end = nm_utils_get_monotonic_timestamp_us () + (100 * 1000);
|
|
for (;;) {
|
|
if (!nm_platform_link_refresh (nm_device_get_platform (self), nm_device_get_ip_ifindex (self)))
|
|
goto handle_fail;
|
|
if (!nm_device_update_hw_address (self))
|
|
goto handle_wait;
|
|
if (!_hw_addr_matches (self, addr_bytes, addr_len))
|
|
goto handle_fail;
|
|
|
|
break;
|
|
handle_wait:
|
|
now = nm_utils_get_monotonic_timestamp_us ();
|
|
if (now < poll_end) {
|
|
g_usleep (NM_MIN (poll_end - now, 500));
|
|
continue;
|
|
}
|
|
handle_fail:
|
|
success = FALSE;
|
|
break;
|
|
}
|
|
|
|
if (success) {
|
|
_LOGI (LOGD_DEVICE, "set-hw-addr: %s MAC address to %s (%s)",
|
|
operation, addr, detail);
|
|
} else {
|
|
_LOGW (LOGD_DEVICE,
|
|
"set-hw-addr: new MAC address %s not successfully %s (%s)",
|
|
addr, operation, detail);
|
|
}
|
|
}
|
|
} else {
|
|
_NMLOG (plerr == NM_PLATFORM_ERROR_NOT_FOUND ? LOGL_DEBUG : LOGL_WARN,
|
|
LOGD_DEVICE, "set-hw-addr: failed to %s MAC address to %s (%s) (%s)",
|
|
operation, addr, detail,
|
|
nm_platform_error_to_string (plerr));
|
|
}
|
|
|
|
if (was_up) {
|
|
if (!nm_device_bring_up (self, TRUE, NULL))
|
|
return FALSE;
|
|
}
|
|
|
|
return success;
|
|
}
|
|
|
|
gboolean
|
|
nm_device_hw_addr_set (NMDevice *self,
|
|
const char *addr,
|
|
const char *detail,
|
|
gboolean set_permanent)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (!addr)
|
|
g_return_val_if_reached (FALSE);
|
|
|
|
if (set_permanent) {
|
|
/* The type is set to PERMANENT by NMDeviceVlan when taking the MAC
|
|
* address from the parent and by NMDeviceWifi when setting a random MAC
|
|
* address during scanning.
|
|
*/
|
|
priv->hw_addr_type = HW_ADDR_TYPE_PERMANENT;
|
|
}
|
|
|
|
return _hw_addr_set (self, addr, "set", detail);
|
|
}
|
|
|
|
/*
|
|
* _hw_addr_get_cloned:
|
|
* @self: a #NMDevice
|
|
* @connection: a #NMConnection
|
|
* @is_wifi: whether the device is Wi-Fi
|
|
* @preserve: (out): whether the address must be reset to initial one
|
|
* @hwaddr: (out): the cloned MAC address to set on interface
|
|
* @hwaddr_type: (out): the type of address to set
|
|
* @hwaddr_detail: (out): the detail (origin) of address to set
|
|
* @error: (out): on return, an error or %NULL
|
|
*
|
|
* Computes the MAC to be set on a interface. On success, one of the
|
|
* following exclusive conditions are verified:
|
|
*
|
|
* - @preserve is %TRUE: the address must be reset to the initial one
|
|
* - @hwaddr is not %NULL: the given address must be set on the device
|
|
* - @hwaddr is %NULL and @preserve is %FALSE: no action needed
|
|
*
|
|
* Returns: %FALSE in case of error in determining the cloned MAC address,
|
|
* %TRUE otherwise
|
|
*/
|
|
static gboolean
|
|
_hw_addr_get_cloned (NMDevice *self, NMConnection *connection, gboolean is_wifi,
|
|
gboolean *preserve, char **hwaddr, HwAddrType *hwaddr_type,
|
|
char **hwaddr_detail, GError **error)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
gs_free char *addr_setting_free = NULL;
|
|
gs_free char *hw_addr_generated = NULL;
|
|
gs_free char *generate_mac_address_mask_tmp = NULL;
|
|
const char *addr, *addr_setting;
|
|
char *addr_out;
|
|
HwAddrType type_out;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
g_return_val_if_fail (NM_IS_CONNECTION (connection), FALSE);
|
|
g_return_val_if_fail (!error || !*error, FALSE);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (!connection)
|
|
g_return_val_if_reached (FALSE);
|
|
|
|
addr = addr_setting = _get_cloned_mac_address_setting (self, connection, is_wifi, &addr_setting_free);
|
|
|
|
if (nm_streq (addr, NM_CLONED_MAC_PRESERVE)) {
|
|
/* "preserve" means to reset the initial MAC address. */
|
|
NM_SET_OUT (preserve, TRUE);
|
|
NM_SET_OUT (hwaddr, NULL);
|
|
NM_SET_OUT (hwaddr_type, HW_ADDR_TYPE_UNSET);
|
|
NM_SET_OUT (hwaddr_detail, g_steal_pointer (&addr_setting_free) ?: g_strdup (addr_setting));
|
|
return TRUE;
|
|
}
|
|
|
|
if (nm_streq (addr, NM_CLONED_MAC_PERMANENT)) {
|
|
addr = nm_device_get_permanent_hw_address (self);
|
|
if (!addr) {
|
|
g_set_error_literal (error,
|
|
NM_DEVICE_ERROR,
|
|
NM_DEVICE_ERROR_FAILED,
|
|
"failed to retrieve permanent address");
|
|
return FALSE;
|
|
}
|
|
addr_out = g_strdup (addr);
|
|
type_out = HW_ADDR_TYPE_PERMANENT;
|
|
} else if (NM_IN_STRSET (addr, NM_CLONED_MAC_RANDOM)) {
|
|
if (priv->hw_addr_type == HW_ADDR_TYPE_GENERATED) {
|
|
/* hm, we already use a generate MAC address. Most certainly, that is from the same
|
|
* activation request, so we should not create a new random address, instead keep
|
|
* the current. */
|
|
goto out_no_action;
|
|
}
|
|
hw_addr_generated = nm_utils_hw_addr_gen_random_eth (nm_device_get_initial_hw_address (self),
|
|
_get_generate_mac_address_mask_setting (self, connection,
|
|
is_wifi,
|
|
&generate_mac_address_mask_tmp));
|
|
if (!hw_addr_generated) {
|
|
g_set_error (error,
|
|
NM_DEVICE_ERROR,
|
|
NM_DEVICE_ERROR_FAILED,
|
|
"failed to generate %s MAC address", "random");
|
|
return FALSE;
|
|
}
|
|
|
|
addr_out = g_steal_pointer (&hw_addr_generated);
|
|
type_out = HW_ADDR_TYPE_GENERATED;
|
|
} else if (NM_IN_STRSET (addr, NM_CLONED_MAC_STABLE)) {
|
|
NMUtilsStableType stable_type;
|
|
const char *stable_id;
|
|
|
|
if (priv->hw_addr_type == HW_ADDR_TYPE_GENERATED) {
|
|
/* hm, we already use a generate MAC address. Most certainly, that is from the same
|
|
* activation request, so let's skip creating the stable address anew. */
|
|
goto out_no_action;
|
|
}
|
|
|
|
stable_id = _get_stable_id (self, connection, &stable_type);
|
|
if (stable_id) {
|
|
hw_addr_generated = nm_utils_hw_addr_gen_stable_eth (stable_type, stable_id,
|
|
nm_device_get_ip_iface (self),
|
|
nm_device_get_initial_hw_address (self),
|
|
_get_generate_mac_address_mask_setting (self, connection, is_wifi, &generate_mac_address_mask_tmp));
|
|
}
|
|
if (!hw_addr_generated) {
|
|
g_set_error (error,
|
|
NM_DEVICE_ERROR,
|
|
NM_DEVICE_ERROR_FAILED,
|
|
"failed to generate %s MAC address", "stable");
|
|
return FALSE;
|
|
}
|
|
|
|
addr_out = g_steal_pointer (&hw_addr_generated);
|
|
type_out = HW_ADDR_TYPE_GENERATED;
|
|
} else {
|
|
/* this must be a valid address. Otherwise, we shouldn't come here. */
|
|
if (!nm_utils_hwaddr_valid (addr, -1))
|
|
g_return_val_if_reached (FALSE);
|
|
|
|
addr_out = g_strdup (addr);
|
|
type_out = HW_ADDR_TYPE_EXPLICIT;
|
|
}
|
|
|
|
NM_SET_OUT (preserve, FALSE);
|
|
NM_SET_OUT (hwaddr, addr_out);
|
|
NM_SET_OUT (hwaddr_type, type_out);
|
|
NM_SET_OUT (hwaddr_detail, g_steal_pointer (&addr_setting_free) ?: g_strdup (addr_setting));
|
|
return TRUE;
|
|
out_no_action:
|
|
NM_SET_OUT (preserve, FALSE);
|
|
NM_SET_OUT (hwaddr, NULL);
|
|
NM_SET_OUT (hwaddr_type, HW_ADDR_TYPE_UNSET);
|
|
NM_SET_OUT (hwaddr_detail, NULL);
|
|
return TRUE;
|
|
}
|
|
|
|
gboolean
|
|
nm_device_hw_addr_get_cloned (NMDevice *self, NMConnection *connection, gboolean is_wifi,
|
|
char **hwaddr, gboolean *preserve, GError **error)
|
|
{
|
|
if (!_hw_addr_get_cloned (self, connection, is_wifi, preserve, hwaddr, NULL, NULL, error))
|
|
return FALSE;
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
gboolean
|
|
nm_device_hw_addr_set_cloned (NMDevice *self, NMConnection *connection, gboolean is_wifi)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
gboolean preserve = FALSE;
|
|
gs_free char *hwaddr = NULL;
|
|
gs_free char *detail = NULL;
|
|
HwAddrType type = HW_ADDR_TYPE_UNSET;
|
|
gs_free_error GError *error = NULL;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (!_hw_addr_get_cloned (self, connection, is_wifi, &preserve, &hwaddr, &type, &detail, &error)) {
|
|
_LOGW (LOGD_DEVICE, "set-hw-addr: %s", error->message);
|
|
return FALSE;
|
|
}
|
|
|
|
if (preserve)
|
|
return nm_device_hw_addr_reset (self, detail);
|
|
|
|
if (hwaddr) {
|
|
priv->hw_addr_type = type;
|
|
return _hw_addr_set (self, hwaddr, "set-cloned", detail);
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
gboolean
|
|
nm_device_hw_addr_reset (NMDevice *self, const char *detail)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
const char *addr;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if (priv->hw_addr_type == HW_ADDR_TYPE_UNSET)
|
|
return TRUE;
|
|
|
|
priv->hw_addr_type = HW_ADDR_TYPE_UNSET;
|
|
addr = nm_device_get_initial_hw_address (self);
|
|
if (!addr) {
|
|
/* as hw_addr_type is not UNSET, we expect that we can get an
|
|
* initial address to which to reset. */
|
|
g_return_val_if_reached (FALSE);
|
|
}
|
|
|
|
return _hw_addr_set (self, addr, "reset", detail);
|
|
}
|
|
|
|
const char *
|
|
nm_device_get_permanent_hw_address_full (NMDevice *self, gboolean force_freeze, gboolean *out_is_fake)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), NULL);
|
|
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if ( !priv->hw_addr_perm
|
|
&& force_freeze) {
|
|
/* somebody requests a permanent MAC address, but we don't have it set
|
|
* yet. We cannot delay it any longer and try to get it without waiting
|
|
* for UDEV. */
|
|
nm_device_update_permanent_hw_address (self, TRUE);
|
|
}
|
|
|
|
NM_SET_OUT (out_is_fake, priv->hw_addr_perm && priv->hw_addr_perm_fake);
|
|
return priv->hw_addr_perm;
|
|
}
|
|
|
|
const char *
|
|
nm_device_get_permanent_hw_address (NMDevice *self)
|
|
{
|
|
return nm_device_get_permanent_hw_address_full (self, TRUE, NULL);
|
|
}
|
|
|
|
const char *
|
|
nm_device_get_initial_hw_address (NMDevice *self)
|
|
{
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), NULL);
|
|
|
|
return NM_DEVICE_GET_PRIVATE (self)->hw_addr_initial;
|
|
}
|
|
|
|
/**
|
|
* nm_device_spec_match_list:
|
|
* @self: an #NMDevice
|
|
* @specs: (element-type utf8): a list of device specs
|
|
*
|
|
* Checks if @self matches any of the specifications in @specs. The
|
|
* currently-supported spec types are:
|
|
*
|
|
* "mac:00:11:22:33:44:55" - matches a device with the given
|
|
* hardware address
|
|
*
|
|
* "interface-name:foo0" - matches a device with the given
|
|
* interface name
|
|
*
|
|
* "s390-subchannels:00.11.22" - matches a device with the given
|
|
* z/VM / s390 subchannels.
|
|
*
|
|
* "*" - matches any device
|
|
*
|
|
* Returns: #TRUE if @self matches one of the specs in @specs
|
|
*/
|
|
gboolean
|
|
nm_device_spec_match_list (NMDevice *self, const GSList *specs)
|
|
{
|
|
NMDeviceClass *klass;
|
|
NMMatchSpecMatchType m;
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), FALSE);
|
|
|
|
klass = NM_DEVICE_GET_CLASS (self);
|
|
|
|
m = nm_match_spec_device (specs,
|
|
nm_device_get_iface (self),
|
|
nm_device_get_type_description (self),
|
|
nm_device_get_driver (self),
|
|
nm_device_get_driver_version (self),
|
|
nm_device_get_permanent_hw_address (self),
|
|
klass->get_s390_subchannels ? klass->get_s390_subchannels (self) : NULL);
|
|
return m == NM_MATCH_SPEC_MATCH;
|
|
}
|
|
|
|
guint
|
|
nm_device_get_supplicant_timeout (NMDevice *self)
|
|
{
|
|
NMConnection *connection;
|
|
NMSetting8021x *s_8021x;
|
|
gs_free char *value = NULL;
|
|
gint timeout;
|
|
#define SUPPLICANT_DEFAULT_TIMEOUT 25
|
|
|
|
g_return_val_if_fail (NM_IS_DEVICE (self), SUPPLICANT_DEFAULT_TIMEOUT);
|
|
|
|
connection = nm_device_get_applied_connection (self);
|
|
g_return_val_if_fail (connection, SUPPLICANT_DEFAULT_TIMEOUT);
|
|
s_8021x = nm_connection_get_setting_802_1x (connection);
|
|
if (s_8021x) {
|
|
timeout = nm_setting_802_1x_get_auth_timeout (s_8021x);
|
|
if (timeout > 0)
|
|
return timeout;
|
|
}
|
|
|
|
value = nm_config_data_get_connection_default (NM_CONFIG_GET_DATA,
|
|
"802-1x.auth-timeout",
|
|
self);
|
|
return _nm_utils_ascii_str_to_int64 (value, 10, 1, G_MAXINT32,
|
|
SUPPLICANT_DEFAULT_TIMEOUT);
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static const char *
|
|
_activation_func_to_string (ActivationHandleFunc func)
|
|
{
|
|
#define FUNC_TO_STRING_CHECK_AND_RETURN(func, f) \
|
|
G_STMT_START { \
|
|
if ((func) == (f)) \
|
|
return #f; \
|
|
} G_STMT_END
|
|
FUNC_TO_STRING_CHECK_AND_RETURN (func, activate_stage1_device_prepare);
|
|
FUNC_TO_STRING_CHECK_AND_RETURN (func, activate_stage2_device_config);
|
|
FUNC_TO_STRING_CHECK_AND_RETURN (func, activate_stage3_ip_config_start);
|
|
FUNC_TO_STRING_CHECK_AND_RETURN (func, activate_stage4_ip4_config_timeout);
|
|
FUNC_TO_STRING_CHECK_AND_RETURN (func, activate_stage4_ip6_config_timeout);
|
|
FUNC_TO_STRING_CHECK_AND_RETURN (func, activate_stage5_ip4_config_commit);
|
|
FUNC_TO_STRING_CHECK_AND_RETURN (func, activate_stage5_ip6_config_commit);
|
|
g_return_val_if_reached ("unknown");
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static void
|
|
nm_device_init (NMDevice *self)
|
|
{
|
|
NMDevicePrivate *priv;
|
|
|
|
priv = G_TYPE_INSTANCE_GET_PRIVATE (self, NM_TYPE_DEVICE, NMDevicePrivate);
|
|
|
|
self->_priv = priv;
|
|
|
|
priv->netns = g_object_ref (NM_NETNS_GET);
|
|
|
|
priv->type = NM_DEVICE_TYPE_UNKNOWN;
|
|
priv->capabilities = NM_DEVICE_CAP_NM_SUPPORTED;
|
|
priv->state = NM_DEVICE_STATE_UNMANAGED;
|
|
priv->state_reason = NM_DEVICE_STATE_REASON_NONE;
|
|
priv->dhcp_timeout = 0;
|
|
priv->rfkill_type = RFKILL_TYPE_UNKNOWN;
|
|
priv->unmanaged_flags = NM_UNMANAGED_PLATFORM_INIT;
|
|
priv->unmanaged_mask = priv->unmanaged_flags;
|
|
priv->available_connections = g_hash_table_new_full (g_direct_hash, g_direct_equal, g_object_unref, NULL);
|
|
priv->ip6_saved_properties = g_hash_table_new_full (g_str_hash, g_str_equal, NULL, g_free);
|
|
priv->sys_iface_state = NM_DEVICE_SYS_IFACE_STATE_EXTERNAL;
|
|
|
|
priv->default_route.v4_is_assumed = TRUE;
|
|
priv->default_route.v6_is_assumed = TRUE;
|
|
|
|
priv->v4_commit_first_time = TRUE;
|
|
priv->v6_commit_first_time = TRUE;
|
|
}
|
|
|
|
static GObject*
|
|
constructor (GType type,
|
|
guint n_construct_params,
|
|
GObjectConstructParam *construct_params)
|
|
{
|
|
GObject *object;
|
|
GObjectClass *klass;
|
|
NMDevice *self;
|
|
NMDevicePrivate *priv;
|
|
const NMPlatformLink *pllink;
|
|
|
|
klass = G_OBJECT_CLASS (nm_device_parent_class);
|
|
object = klass->constructor (type, n_construct_params, construct_params);
|
|
if (!object)
|
|
return NULL;
|
|
|
|
self = NM_DEVICE (object);
|
|
priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
if ( priv->iface
|
|
&& G_LIKELY (!nm_utils_get_testing ())) {
|
|
pllink = nm_platform_link_get_by_ifname (nm_device_get_platform (self), priv->iface);
|
|
|
|
if (pllink && link_type_compatible (self, pllink->type, NULL, NULL)) {
|
|
priv->ifindex = pllink->ifindex;
|
|
priv->up = NM_FLAGS_HAS (pllink->n_ifi_flags, IFF_UP);
|
|
}
|
|
}
|
|
|
|
if (priv->hw_addr_perm) {
|
|
guint8 buf[NM_UTILS_HWADDR_LEN_MAX];
|
|
gsize l;
|
|
|
|
if (!_nm_utils_hwaddr_aton (priv->hw_addr_perm, buf, sizeof (buf), &l)) {
|
|
g_clear_pointer (&priv->hw_addr_perm, g_free);
|
|
g_return_val_if_reached (object);
|
|
}
|
|
|
|
priv->hw_addr_len_ = l;
|
|
priv->hw_addr = nm_utils_hwaddr_ntoa (buf, l);
|
|
_LOGT (LOGD_DEVICE, "hw-addr: has permanent hw-address '%s'", priv->hw_addr_perm);
|
|
}
|
|
|
|
return object;
|
|
}
|
|
|
|
static void
|
|
constructed (GObject *object)
|
|
{
|
|
NMDevice *self = NM_DEVICE (object);
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMPlatform *platform;
|
|
|
|
if (NM_DEVICE_GET_CLASS (self)->get_generic_capabilities)
|
|
priv->capabilities |= NM_DEVICE_GET_CLASS (self)->get_generic_capabilities (self);
|
|
|
|
/* Watch for external IP config changes */
|
|
platform = nm_device_get_platform (self);
|
|
g_signal_connect (platform, NM_PLATFORM_SIGNAL_IP4_ADDRESS_CHANGED, G_CALLBACK (device_ipx_changed), self);
|
|
g_signal_connect (platform, NM_PLATFORM_SIGNAL_IP6_ADDRESS_CHANGED, G_CALLBACK (device_ipx_changed), self);
|
|
g_signal_connect (platform, NM_PLATFORM_SIGNAL_IP4_ROUTE_CHANGED, G_CALLBACK (device_ipx_changed), self);
|
|
g_signal_connect (platform, NM_PLATFORM_SIGNAL_IP6_ROUTE_CHANGED, G_CALLBACK (device_ipx_changed), self);
|
|
g_signal_connect (platform, NM_PLATFORM_SIGNAL_LINK_CHANGED, G_CALLBACK (link_changed_cb), self);
|
|
|
|
g_signal_connect (nm_netns_get_route_manager (priv->netns), NM_ROUTE_MANAGER_IP4_ROUTES_CHANGED,
|
|
G_CALLBACK (ip4_routes_changed_changed_cb), self);
|
|
|
|
priv->settings = g_object_ref (NM_SETTINGS_GET);
|
|
g_assert (priv->settings);
|
|
|
|
g_signal_connect (priv->settings,
|
|
NM_SETTINGS_SIGNAL_CONNECTION_ADDED,
|
|
G_CALLBACK (cp_connection_added),
|
|
self);
|
|
g_signal_connect (priv->settings,
|
|
NM_SETTINGS_SIGNAL_CONNECTION_UPDATED,
|
|
G_CALLBACK (cp_connection_updated),
|
|
self);
|
|
g_signal_connect (priv->settings,
|
|
NM_SETTINGS_SIGNAL_CONNECTION_REMOVED,
|
|
G_CALLBACK (cp_connection_removed),
|
|
self);
|
|
|
|
G_OBJECT_CLASS (nm_device_parent_class)->constructed (object);
|
|
|
|
_LOGD (LOGD_DEVICE, "constructed (%s)", G_OBJECT_TYPE_NAME (self));
|
|
}
|
|
|
|
static void
|
|
dispose (GObject *object)
|
|
{
|
|
NMDevice *self = NM_DEVICE (object);
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
NMPlatform *platform;
|
|
|
|
_LOGD (LOGD_DEVICE, "disposing");
|
|
|
|
nm_clear_g_cancellable (&priv->deactivating_cancellable);
|
|
|
|
_parent_set_ifindex (self, 0, FALSE);
|
|
|
|
platform = nm_device_get_platform (self);
|
|
g_signal_handlers_disconnect_by_func (platform, G_CALLBACK (device_ipx_changed), self);
|
|
g_signal_handlers_disconnect_by_func (platform, G_CALLBACK (link_changed_cb), self);
|
|
|
|
g_signal_handlers_disconnect_by_func (nm_netns_get_route_manager (priv->netns),
|
|
G_CALLBACK (ip4_routes_changed_changed_cb), self);
|
|
|
|
g_slist_free_full (priv->arping.dad_list, (GDestroyNotify) nm_arping_manager_destroy);
|
|
priv->arping.dad_list = NULL;
|
|
|
|
arp_cleanup (self);
|
|
|
|
nm_clear_g_signal_handler (nm_config_get (), &priv->config_changed_id);
|
|
|
|
dispatcher_cleanup (self);
|
|
|
|
nm_pacrunner_manager_remove_clear (priv->pacrunner_manager,
|
|
&priv->pacrunner_call_id);
|
|
g_clear_object (&priv->pacrunner_manager);
|
|
|
|
_cleanup_generic_pre (self, CLEANUP_TYPE_KEEP);
|
|
|
|
g_warn_if_fail (priv->slaves == NULL);
|
|
g_assert (priv->master_ready_id == 0);
|
|
|
|
/* Let the kernel manage IPv6LL again */
|
|
set_nm_ipv6ll (self, FALSE);
|
|
|
|
_cleanup_generic_post (self, CLEANUP_TYPE_KEEP);
|
|
|
|
g_hash_table_remove_all (priv->ip6_saved_properties);
|
|
|
|
nm_clear_g_source (&priv->recheck_assume_id);
|
|
nm_clear_g_source (&priv->recheck_available.call_id);
|
|
|
|
nm_clear_g_source (&priv->check_delete_unrealized_id);
|
|
|
|
nm_clear_g_source (&priv->stats.timeout_id);
|
|
|
|
link_disconnect_action_cancel (self);
|
|
|
|
if (priv->ifindex > 0) {
|
|
priv->ifindex = 0;
|
|
_notify (self, PROP_IFINDEX);
|
|
}
|
|
|
|
if (priv->settings) {
|
|
g_signal_handlers_disconnect_by_func (priv->settings, cp_connection_added, self);
|
|
g_signal_handlers_disconnect_by_func (priv->settings, cp_connection_updated, self);
|
|
g_signal_handlers_disconnect_by_func (priv->settings, cp_connection_removed, self);
|
|
}
|
|
|
|
available_connections_del_all (self);
|
|
|
|
nm_clear_g_source (&priv->carrier_wait_id);
|
|
|
|
_clear_queued_act_request (priv);
|
|
|
|
nm_clear_g_source (&priv->device_link_changed_id);
|
|
nm_clear_g_source (&priv->device_ip_link_changed_id);
|
|
|
|
if (priv->lldp_listener) {
|
|
g_signal_handlers_disconnect_by_func (priv->lldp_listener,
|
|
G_CALLBACK (lldp_neighbors_changed),
|
|
self);
|
|
nm_lldp_listener_stop (priv->lldp_listener);
|
|
g_clear_object (&priv->lldp_listener);
|
|
}
|
|
|
|
G_OBJECT_CLASS (nm_device_parent_class)->dispose (object);
|
|
|
|
if (nm_clear_g_source (&priv->queued_state.id)) {
|
|
/* FIXME: we'd expect the queud_state to be alredy cleared and this statement
|
|
* not being necessary. Add this check here to hopefully investigate crash
|
|
* rh#1270247. */
|
|
g_return_if_reached ();
|
|
}
|
|
}
|
|
|
|
static void
|
|
finalize (GObject *object)
|
|
{
|
|
NMDevice *self = NM_DEVICE (object);
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
_LOGD (LOGD_DEVICE, "finalize(): %s", G_OBJECT_TYPE_NAME (self));
|
|
|
|
g_free (priv->hw_addr);
|
|
g_free (priv->hw_addr_perm);
|
|
g_free (priv->hw_addr_initial);
|
|
g_slist_free (priv->pending_actions);
|
|
g_slist_free_full (priv->dad6_failed_addrs, g_free);
|
|
g_clear_pointer (&priv->physical_port_id, g_free);
|
|
g_free (priv->udi);
|
|
g_free (priv->iface);
|
|
g_free (priv->ip_iface);
|
|
g_free (priv->driver);
|
|
g_free (priv->driver_version);
|
|
g_free (priv->firmware_version);
|
|
g_free (priv->type_desc);
|
|
g_free (priv->type_description);
|
|
g_free (priv->dhcp_anycast_address);
|
|
g_free (priv->current_stable_id);
|
|
|
|
g_hash_table_unref (priv->ip6_saved_properties);
|
|
g_hash_table_unref (priv->available_connections);
|
|
|
|
G_OBJECT_CLASS (nm_device_parent_class)->finalize (object);
|
|
|
|
/* for testing, NMDeviceTest does not invoke NMDevice::constructed,
|
|
* and thus @settings might be unset. */
|
|
if (priv->settings)
|
|
g_object_unref (priv->settings);
|
|
|
|
g_object_unref (priv->netns);
|
|
}
|
|
|
|
static void
|
|
set_property (GObject *object, guint prop_id,
|
|
const GValue *value, GParamSpec *pspec)
|
|
{
|
|
NMDevice *self = (NMDevice *) object;
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
|
|
switch (prop_id) {
|
|
case PROP_UDI:
|
|
if (g_value_get_string (value)) {
|
|
g_free (priv->udi);
|
|
priv->udi = g_value_dup_string (value);
|
|
}
|
|
break;
|
|
case PROP_IFACE:
|
|
/* construct-only */
|
|
g_return_if_fail (!priv->iface);
|
|
priv->iface = g_value_dup_string (value);
|
|
break;
|
|
case PROP_DRIVER:
|
|
/* construct-only */
|
|
priv->driver = g_value_dup_string (value);
|
|
break;
|
|
case PROP_DRIVER_VERSION:
|
|
/* construct-only */
|
|
priv->driver_version = g_value_dup_string (value);
|
|
break;
|
|
case PROP_FIRMWARE_VERSION:
|
|
/* construct-only */
|
|
priv->firmware_version = g_value_dup_string (value);
|
|
break;
|
|
case PROP_IP4_ADDRESS:
|
|
priv->ip4_address = g_value_get_uint (value);
|
|
break;
|
|
case PROP_MANAGED:
|
|
if (nm_device_is_real (self)) {
|
|
gboolean managed;
|
|
NMDeviceStateReason reason;
|
|
|
|
managed = g_value_get_boolean (value);
|
|
if (managed)
|
|
reason = NM_DEVICE_STATE_REASON_CONNECTION_ASSUMED;
|
|
else {
|
|
reason = NM_DEVICE_STATE_REASON_REMOVED;
|
|
nm_device_sys_iface_state_set (self, NM_DEVICE_SYS_IFACE_STATE_REMOVED);
|
|
}
|
|
nm_device_set_unmanaged_by_flags (self,
|
|
NM_UNMANAGED_USER_EXPLICIT,
|
|
!managed,
|
|
reason);
|
|
}
|
|
break;
|
|
case PROP_AUTOCONNECT:
|
|
nm_device_set_autoconnect_both (self, g_value_get_boolean (value));
|
|
break;
|
|
case PROP_FIRMWARE_MISSING:
|
|
/* construct-only */
|
|
priv->firmware_missing = g_value_get_boolean (value);
|
|
break;
|
|
case PROP_NM_PLUGIN_MISSING:
|
|
/* construct-only */
|
|
priv->nm_plugin_missing = g_value_get_boolean (value);
|
|
break;
|
|
case PROP_DEVICE_TYPE:
|
|
/* construct-only */
|
|
nm_assert (priv->type == NM_DEVICE_TYPE_UNKNOWN);
|
|
priv->type = g_value_get_uint (value);
|
|
break;
|
|
case PROP_LINK_TYPE:
|
|
/* construct-only */
|
|
nm_assert (priv->link_type == NM_LINK_TYPE_NONE);
|
|
priv->link_type = g_value_get_uint (value);
|
|
break;
|
|
case PROP_TYPE_DESC:
|
|
/* construct-only */
|
|
priv->type_desc = g_value_dup_string (value);
|
|
break;
|
|
case PROP_RFKILL_TYPE:
|
|
/* construct-only */
|
|
priv->rfkill_type = g_value_get_uint (value);
|
|
break;
|
|
case PROP_IS_MASTER:
|
|
/* construct-only */
|
|
priv->is_master = g_value_get_boolean (value);
|
|
break;
|
|
case PROP_PERM_HW_ADDRESS:
|
|
/* construct-only */
|
|
priv->hw_addr_perm = g_value_dup_string (value);
|
|
break;
|
|
case PROP_REFRESH_RATE_MS:
|
|
_stats_set_refresh_rate (self, g_value_get_uint (value));
|
|
break;
|
|
default:
|
|
G_OBJECT_WARN_INVALID_PROPERTY_ID (object, prop_id, pspec);
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void
|
|
get_property (GObject *object, guint prop_id,
|
|
GValue *value, GParamSpec *pspec)
|
|
{
|
|
NMDevice *self = NM_DEVICE (object);
|
|
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
|
|
GPtrArray *array;
|
|
GHashTableIter iter;
|
|
NMConnection *connection;
|
|
GVariantBuilder array_builder;
|
|
|
|
switch (prop_id) {
|
|
case PROP_UDI:
|
|
g_value_set_string (value, priv->udi);
|
|
break;
|
|
case PROP_IFACE:
|
|
g_value_set_string (value, priv->iface);
|
|
break;
|
|
case PROP_IP_IFACE:
|
|
if (ip_config_valid (priv->state))
|
|
g_value_set_string (value, nm_device_get_ip_iface (self));
|
|
else
|
|
g_value_set_string (value, NULL);
|
|
break;
|
|
case PROP_IFINDEX:
|
|
g_value_set_int (value, priv->ifindex);
|
|
break;
|
|
case PROP_DRIVER:
|
|
g_value_set_string (value, priv->driver);
|
|
break;
|
|
case PROP_DRIVER_VERSION:
|
|
g_value_set_string (value, priv->driver_version);
|
|
break;
|
|
case PROP_FIRMWARE_VERSION:
|
|
g_value_set_string (value, priv->firmware_version);
|
|
break;
|
|
case PROP_CAPABILITIES:
|
|
g_value_set_uint (value, (priv->capabilities & ~NM_DEVICE_CAP_INTERNAL_MASK));
|
|
break;
|
|
case PROP_IP4_ADDRESS:
|
|
g_value_set_uint (value, priv->ip4_address);
|
|
break;
|
|
case PROP_CARRIER:
|
|
g_value_set_boolean (value, priv->carrier);
|
|
break;
|
|
case PROP_MTU:
|
|
g_value_set_uint (value, priv->mtu);
|
|
break;
|
|
case PROP_IP4_CONFIG:
|
|
nm_utils_g_value_set_object_path (value, ip_config_valid (priv->state) ? priv->ip4_config : NULL);
|
|
break;
|
|
case PROP_DHCP4_CONFIG:
|
|
nm_utils_g_value_set_object_path (value, ip_config_valid (priv->state) ? priv->dhcp4.config : NULL);
|
|
break;
|
|
case PROP_IP6_CONFIG:
|
|
nm_utils_g_value_set_object_path (value, ip_config_valid (priv->state) ? priv->ip6_config : NULL);
|
|
break;
|
|
case PROP_DHCP6_CONFIG:
|
|
nm_utils_g_value_set_object_path (value, ip_config_valid (priv->state) ? priv->dhcp6.config : NULL);
|
|
break;
|
|
case PROP_STATE:
|
|
g_value_set_uint (value, priv->state);
|
|
break;
|
|
case PROP_STATE_REASON:
|
|
g_value_take_variant (value,
|
|
g_variant_new ("(uu)", priv->state, priv->state_reason));
|
|
break;
|
|
case PROP_ACTIVE_CONNECTION:
|
|
nm_utils_g_value_set_object_path (value, priv->act_request_public ? priv->act_request : NULL);
|
|
break;
|
|
case PROP_DEVICE_TYPE:
|
|
g_value_set_uint (value, priv->type);
|
|
break;
|
|
case PROP_LINK_TYPE:
|
|
g_value_set_uint (value, priv->link_type);
|
|
break;
|
|
case PROP_MANAGED:
|
|
/* The managed state exposed on D-Bus only depends on the current device state alone. */
|
|
g_value_set_boolean (value, nm_device_get_state (self) > NM_DEVICE_STATE_UNMANAGED);
|
|
break;
|
|
case PROP_AUTOCONNECT:
|
|
g_value_set_boolean (value, nm_device_get_autoconnect (self));
|
|
break;
|
|
case PROP_FIRMWARE_MISSING:
|
|
g_value_set_boolean (value, priv->firmware_missing);
|
|
break;
|
|
case PROP_NM_PLUGIN_MISSING:
|
|
g_value_set_boolean (value, priv->nm_plugin_missing);
|
|
break;
|
|
case PROP_TYPE_DESC:
|
|
g_value_set_string (value, priv->type_desc);
|
|
break;
|
|
case PROP_RFKILL_TYPE:
|
|
g_value_set_uint (value, priv->rfkill_type);
|
|
break;
|
|
case PROP_AVAILABLE_CONNECTIONS:
|
|
array = g_ptr_array_sized_new (g_hash_table_size (priv->available_connections));
|
|
g_hash_table_iter_init (&iter, priv->available_connections);
|
|
while (g_hash_table_iter_next (&iter, (gpointer) &connection, NULL))
|
|
g_ptr_array_add (array, g_strdup (nm_connection_get_path (connection)));
|
|
g_ptr_array_add (array, NULL);
|
|
g_value_take_boxed (value, (char **) g_ptr_array_free (array, FALSE));
|
|
break;
|
|
case PROP_PHYSICAL_PORT_ID:
|
|
g_value_set_string (value, priv->physical_port_id);
|
|
break;
|
|
case PROP_IS_MASTER:
|
|
g_value_set_boolean (value, priv->is_master);
|
|
break;
|
|
case PROP_MASTER:
|
|
g_value_set_object (value, nm_device_get_master (self));
|
|
break;
|
|
case PROP_PARENT:
|
|
nm_utils_g_value_set_object_path (value, priv->parent_device);
|
|
break;
|
|
case PROP_HW_ADDRESS:
|
|
g_value_set_string (value, priv->hw_addr);
|
|
break;
|
|
case PROP_PERM_HW_ADDRESS: {
|
|
const char *perm_hw_addr;
|
|
gboolean perm_hw_addr_is_fake;
|
|
|
|
perm_hw_addr = nm_device_get_permanent_hw_address_full (self, FALSE, &perm_hw_addr_is_fake);
|
|
/* this property is exposed on D-Bus for NMDeviceEthernet and NMDeviceWifi. */
|
|
g_value_set_string (value, perm_hw_addr && !perm_hw_addr_is_fake ? perm_hw_addr : NULL);
|
|
break;
|
|
}
|
|
case PROP_HAS_PENDING_ACTION:
|
|
g_value_set_boolean (value, nm_device_has_pending_action (self));
|
|
break;
|
|
case PROP_METERED:
|
|
g_value_set_uint (value, priv->metered);
|
|
break;
|
|
case PROP_LLDP_NEIGHBORS:
|
|
if (priv->lldp_listener)
|
|
g_value_set_variant (value, nm_lldp_listener_get_neighbors (priv->lldp_listener));
|
|
else {
|
|
g_variant_builder_init (&array_builder, G_VARIANT_TYPE ("aa{sv}"));
|
|
g_value_take_variant (value, g_variant_builder_end (&array_builder));
|
|
}
|
|
break;
|
|
case PROP_REAL:
|
|
g_value_set_boolean (value, nm_device_is_real (self));
|
|
break;
|
|
case PROP_SLAVES: {
|
|
GSList *slave_iter;
|
|
char **slave_list;
|
|
guint i;
|
|
|
|
slave_list = g_new (char *, g_slist_length (priv->slaves) + 1);
|
|
for (slave_iter = priv->slaves, i = 0; slave_iter; slave_iter = slave_iter->next) {
|
|
SlaveInfo *info = slave_iter->data;
|
|
const char *path;
|
|
|
|
if (!NM_DEVICE_GET_PRIVATE (info->slave)->is_enslaved)
|
|
continue;
|
|
path = nm_exported_object_get_path ((NMExportedObject *) info->slave);
|
|
if (path)
|
|
slave_list[i++] = g_strdup (path);
|
|
}
|
|
slave_list[i] = NULL;
|
|
g_value_take_boxed (value, slave_list);
|
|
break;
|
|
}
|
|
case PROP_REFRESH_RATE_MS:
|
|
g_value_set_uint (value, priv->stats.refresh_rate_ms);
|
|
break;
|
|
case PROP_TX_BYTES:
|
|
g_value_set_uint64 (value, priv->stats.tx_bytes);
|
|
break;
|
|
case PROP_RX_BYTES:
|
|
g_value_set_uint64 (value, priv->stats.rx_bytes);
|
|
break;
|
|
case PROP_CONNECTIVITY:
|
|
g_value_set_uint (value, priv->connectivity_state);
|
|
break;
|
|
default:
|
|
G_OBJECT_WARN_INVALID_PROPERTY_ID (object, prop_id, pspec);
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void
|
|
nm_device_class_init (NMDeviceClass *klass)
|
|
{
|
|
GObjectClass *object_class = G_OBJECT_CLASS (klass);
|
|
NMExportedObjectClass *exported_object_class = NM_EXPORTED_OBJECT_CLASS (klass);
|
|
|
|
g_type_class_add_private (object_class, sizeof (NMDevicePrivate));
|
|
|
|
exported_object_class->export_path = NM_EXPORT_PATH_NUMBERED (NM_DBUS_PATH"/Devices");
|
|
|
|
object_class->dispose = dispose;
|
|
object_class->finalize = finalize;
|
|
object_class->set_property = set_property;
|
|
object_class->get_property = get_property;
|
|
object_class->constructor = constructor;
|
|
object_class->constructed = constructed;
|
|
|
|
klass->link_changed = link_changed;
|
|
|
|
klass->is_available = is_available;
|
|
klass->act_stage1_prepare = act_stage1_prepare;
|
|
klass->act_stage2_config = act_stage2_config;
|
|
klass->act_stage3_ip4_config_start = act_stage3_ip4_config_start;
|
|
klass->act_stage3_ip6_config_start = act_stage3_ip6_config_start;
|
|
klass->act_stage4_ip4_config_timeout = act_stage4_ip4_config_timeout;
|
|
klass->act_stage4_ip6_config_timeout = act_stage4_ip6_config_timeout;
|
|
klass->have_any_ready_slaves = have_any_ready_slaves;
|
|
|
|
klass->get_type_description = get_type_description;
|
|
klass->get_autoconnect_allowed = get_autoconnect_allowed;
|
|
klass->can_auto_connect = can_auto_connect;
|
|
klass->check_connection_compatible = check_connection_compatible;
|
|
klass->check_connection_available = check_connection_available;
|
|
klass->can_unmanaged_external_down = can_unmanaged_external_down;
|
|
klass->realize_start_notify = realize_start_notify;
|
|
klass->unrealize_notify = unrealize_notify;
|
|
klass->carrier_changed = carrier_changed;
|
|
klass->get_ip_iface_identifier = get_ip_iface_identifier;
|
|
klass->unmanaged_on_quit = unmanaged_on_quit;
|
|
klass->deactivate_reset_hw_addr = deactivate_reset_hw_addr;
|
|
klass->parent_changed_notify = parent_changed_notify;
|
|
klass->can_reapply_change = can_reapply_change;
|
|
klass->reapply_connection = reapply_connection;
|
|
|
|
obj_properties[PROP_UDI] =
|
|
g_param_spec_string (NM_DEVICE_UDI, "", "",
|
|
NULL,
|
|
G_PARAM_READWRITE | G_PARAM_CONSTRUCT |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_IFACE] =
|
|
g_param_spec_string (NM_DEVICE_IFACE, "", "",
|
|
NULL,
|
|
G_PARAM_READWRITE | G_PARAM_CONSTRUCT_ONLY |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_IP_IFACE] =
|
|
g_param_spec_string (NM_DEVICE_IP_IFACE, "", "",
|
|
NULL,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_DRIVER] =
|
|
g_param_spec_string (NM_DEVICE_DRIVER, "", "",
|
|
NULL,
|
|
G_PARAM_READWRITE | G_PARAM_CONSTRUCT_ONLY |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_DRIVER_VERSION] =
|
|
g_param_spec_string (NM_DEVICE_DRIVER_VERSION, "", "",
|
|
NULL,
|
|
G_PARAM_READWRITE | G_PARAM_CONSTRUCT_ONLY |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_FIRMWARE_VERSION] =
|
|
g_param_spec_string (NM_DEVICE_FIRMWARE_VERSION, "", "",
|
|
NULL,
|
|
G_PARAM_READWRITE | G_PARAM_CONSTRUCT_ONLY |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_CAPABILITIES] =
|
|
g_param_spec_uint (NM_DEVICE_CAPABILITIES, "", "",
|
|
0, G_MAXUINT32, NM_DEVICE_CAP_NONE,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_CARRIER] =
|
|
g_param_spec_boolean (NM_DEVICE_CARRIER, "", "",
|
|
FALSE,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_MTU] =
|
|
g_param_spec_uint (NM_DEVICE_MTU, "", "",
|
|
0, G_MAXUINT32, 1500,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_IP4_ADDRESS] =
|
|
g_param_spec_uint (NM_DEVICE_IP4_ADDRESS, "", "",
|
|
0, G_MAXUINT32, 0, /* FIXME */
|
|
G_PARAM_READWRITE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_IP4_CONFIG] =
|
|
g_param_spec_string (NM_DEVICE_IP4_CONFIG, "", "",
|
|
NULL,
|
|
G_PARAM_READWRITE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_DHCP4_CONFIG] =
|
|
g_param_spec_string (NM_DEVICE_DHCP4_CONFIG, "", "",
|
|
NULL,
|
|
G_PARAM_READWRITE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_IP6_CONFIG] =
|
|
g_param_spec_string (NM_DEVICE_IP6_CONFIG, "", "",
|
|
NULL,
|
|
G_PARAM_READWRITE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_DHCP6_CONFIG] =
|
|
g_param_spec_string (NM_DEVICE_DHCP6_CONFIG, "", "",
|
|
NULL,
|
|
G_PARAM_READWRITE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_STATE] =
|
|
g_param_spec_uint (NM_DEVICE_STATE, "", "",
|
|
0, G_MAXUINT32, NM_DEVICE_STATE_UNKNOWN,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_STATE_REASON] =
|
|
g_param_spec_variant (NM_DEVICE_STATE_REASON, "", "",
|
|
G_VARIANT_TYPE ("(uu)"),
|
|
NULL,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_ACTIVE_CONNECTION] =
|
|
g_param_spec_string (NM_DEVICE_ACTIVE_CONNECTION, "", "",
|
|
NULL,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_DEVICE_TYPE] =
|
|
g_param_spec_uint (NM_DEVICE_DEVICE_TYPE, "", "",
|
|
0, G_MAXUINT32, NM_DEVICE_TYPE_UNKNOWN,
|
|
G_PARAM_READWRITE | G_PARAM_CONSTRUCT_ONLY |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_LINK_TYPE] =
|
|
g_param_spec_uint (NM_DEVICE_LINK_TYPE, "", "",
|
|
0, G_MAXUINT32, NM_LINK_TYPE_NONE,
|
|
G_PARAM_READWRITE | G_PARAM_CONSTRUCT_ONLY |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_MANAGED] =
|
|
g_param_spec_boolean (NM_DEVICE_MANAGED, "", "",
|
|
FALSE,
|
|
G_PARAM_READWRITE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_AUTOCONNECT] =
|
|
g_param_spec_boolean (NM_DEVICE_AUTOCONNECT, "", "",
|
|
DEFAULT_AUTOCONNECT,
|
|
G_PARAM_READWRITE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_FIRMWARE_MISSING] =
|
|
g_param_spec_boolean (NM_DEVICE_FIRMWARE_MISSING, "", "",
|
|
FALSE,
|
|
G_PARAM_READWRITE | G_PARAM_CONSTRUCT_ONLY |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_NM_PLUGIN_MISSING] =
|
|
g_param_spec_boolean (NM_DEVICE_NM_PLUGIN_MISSING, "", "",
|
|
FALSE,
|
|
G_PARAM_READWRITE | G_PARAM_CONSTRUCT_ONLY |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_TYPE_DESC] =
|
|
g_param_spec_string (NM_DEVICE_TYPE_DESC, "", "",
|
|
NULL,
|
|
G_PARAM_READWRITE | G_PARAM_CONSTRUCT_ONLY |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_RFKILL_TYPE] =
|
|
g_param_spec_uint (NM_DEVICE_RFKILL_TYPE, "", "",
|
|
RFKILL_TYPE_WLAN,
|
|
RFKILL_TYPE_MAX,
|
|
RFKILL_TYPE_UNKNOWN,
|
|
G_PARAM_READWRITE | G_PARAM_CONSTRUCT_ONLY |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_IFINDEX] =
|
|
g_param_spec_int (NM_DEVICE_IFINDEX, "", "",
|
|
0, G_MAXINT, 0,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_AVAILABLE_CONNECTIONS] =
|
|
g_param_spec_boxed (NM_DEVICE_AVAILABLE_CONNECTIONS, "", "",
|
|
G_TYPE_STRV,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_PHYSICAL_PORT_ID] =
|
|
g_param_spec_string (NM_DEVICE_PHYSICAL_PORT_ID, "", "",
|
|
NULL,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_IS_MASTER] =
|
|
g_param_spec_boolean (NM_DEVICE_IS_MASTER, "", "",
|
|
FALSE,
|
|
G_PARAM_READWRITE | G_PARAM_CONSTRUCT_ONLY |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_MASTER] =
|
|
g_param_spec_object (NM_DEVICE_MASTER, "", "",
|
|
NM_TYPE_DEVICE,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_PARENT] =
|
|
g_param_spec_string (NM_DEVICE_PARENT, "", "",
|
|
NULL,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_HW_ADDRESS] =
|
|
g_param_spec_string (NM_DEVICE_HW_ADDRESS, "", "",
|
|
NULL,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_PERM_HW_ADDRESS] =
|
|
g_param_spec_string (NM_DEVICE_PERM_HW_ADDRESS, "", "",
|
|
NULL,
|
|
G_PARAM_READWRITE | G_PARAM_CONSTRUCT_ONLY |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_HAS_PENDING_ACTION] =
|
|
g_param_spec_boolean (NM_DEVICE_HAS_PENDING_ACTION, "", "",
|
|
FALSE,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
|
|
/**
|
|
* NMDevice:metered:
|
|
*
|
|
* Whether the connection is metered.
|
|
*
|
|
* Since: 1.2
|
|
**/
|
|
obj_properties[PROP_METERED] =
|
|
g_param_spec_uint (NM_DEVICE_METERED, "", "",
|
|
0, G_MAXUINT32, NM_METERED_UNKNOWN,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_LLDP_NEIGHBORS] =
|
|
g_param_spec_variant (NM_DEVICE_LLDP_NEIGHBORS, "", "",
|
|
G_VARIANT_TYPE ("aa{sv}"),
|
|
NULL,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_REAL] =
|
|
g_param_spec_boolean (NM_DEVICE_REAL, "", "",
|
|
FALSE,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_SLAVES] =
|
|
g_param_spec_boxed (NM_DEVICE_SLAVES, "", "",
|
|
G_TYPE_STRV,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
|
|
/* Statistics */
|
|
obj_properties[PROP_REFRESH_RATE_MS] =
|
|
g_param_spec_uint (NM_DEVICE_STATISTICS_REFRESH_RATE_MS, "", "",
|
|
0, UINT32_MAX, 0,
|
|
G_PARAM_READWRITE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_TX_BYTES] =
|
|
g_param_spec_uint64 (NM_DEVICE_STATISTICS_TX_BYTES, "", "",
|
|
0, UINT64_MAX, 0,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
obj_properties[PROP_RX_BYTES] =
|
|
g_param_spec_uint64 (NM_DEVICE_STATISTICS_RX_BYTES, "", "",
|
|
0, UINT64_MAX, 0,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
|
|
/* Connectivity */
|
|
obj_properties[PROP_CONNECTIVITY] =
|
|
g_param_spec_uint (NM_DEVICE_CONNECTIVITY, "", "",
|
|
NM_CONNECTIVITY_UNKNOWN, NM_CONNECTIVITY_FULL, NM_CONNECTIVITY_UNKNOWN,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS);
|
|
|
|
g_object_class_install_properties (object_class, _PROPERTY_ENUMS_LAST, obj_properties);
|
|
|
|
signals[STATE_CHANGED] =
|
|
g_signal_new (NM_DEVICE_STATE_CHANGED,
|
|
G_OBJECT_CLASS_TYPE (object_class),
|
|
G_SIGNAL_RUN_LAST,
|
|
G_STRUCT_OFFSET (NMDeviceClass, state_changed),
|
|
NULL, NULL, NULL,
|
|
G_TYPE_NONE, 3,
|
|
G_TYPE_UINT, G_TYPE_UINT, G_TYPE_UINT);
|
|
|
|
signals[AUTOCONNECT_ALLOWED] =
|
|
g_signal_new (NM_DEVICE_AUTOCONNECT_ALLOWED,
|
|
G_OBJECT_CLASS_TYPE (object_class),
|
|
G_SIGNAL_RUN_LAST,
|
|
0,
|
|
autoconnect_allowed_accumulator, NULL, NULL,
|
|
G_TYPE_BOOLEAN, 0);
|
|
|
|
signals[AUTH_REQUEST] =
|
|
g_signal_new (NM_DEVICE_AUTH_REQUEST,
|
|
G_OBJECT_CLASS_TYPE (object_class),
|
|
G_SIGNAL_RUN_FIRST,
|
|
0, NULL, NULL, NULL,
|
|
/* context, connection, permission, allow_interaction, callback, user_data */
|
|
G_TYPE_NONE, 6, G_TYPE_DBUS_METHOD_INVOCATION, NM_TYPE_CONNECTION, G_TYPE_STRING, G_TYPE_BOOLEAN, G_TYPE_POINTER, G_TYPE_POINTER);
|
|
|
|
signals[IP4_CONFIG_CHANGED] =
|
|
g_signal_new (NM_DEVICE_IP4_CONFIG_CHANGED,
|
|
G_OBJECT_CLASS_TYPE (object_class),
|
|
G_SIGNAL_RUN_FIRST,
|
|
0, NULL, NULL, NULL,
|
|
G_TYPE_NONE, 2, G_TYPE_OBJECT, G_TYPE_OBJECT);
|
|
|
|
signals[IP6_CONFIG_CHANGED] =
|
|
g_signal_new (NM_DEVICE_IP6_CONFIG_CHANGED,
|
|
G_OBJECT_CLASS_TYPE (object_class),
|
|
G_SIGNAL_RUN_FIRST,
|
|
0, NULL, NULL, NULL,
|
|
G_TYPE_NONE, 2, G_TYPE_OBJECT, G_TYPE_OBJECT);
|
|
|
|
signals[IP6_PREFIX_DELEGATED] =
|
|
g_signal_new (NM_DEVICE_IP6_PREFIX_DELEGATED,
|
|
G_OBJECT_CLASS_TYPE (object_class),
|
|
G_SIGNAL_RUN_FIRST,
|
|
0, NULL, NULL, NULL,
|
|
G_TYPE_NONE, 1, G_TYPE_POINTER);
|
|
|
|
signals[IP6_SUBNET_NEEDED] =
|
|
g_signal_new (NM_DEVICE_IP6_SUBNET_NEEDED,
|
|
G_OBJECT_CLASS_TYPE (object_class),
|
|
G_SIGNAL_RUN_FIRST,
|
|
0, NULL, NULL, NULL,
|
|
G_TYPE_NONE, 0);
|
|
|
|
signals[REMOVED] =
|
|
g_signal_new (NM_DEVICE_REMOVED,
|
|
G_OBJECT_CLASS_TYPE (object_class),
|
|
G_SIGNAL_RUN_FIRST,
|
|
0, NULL, NULL, NULL,
|
|
G_TYPE_NONE, 0);
|
|
|
|
signals[RECHECK_AUTO_ACTIVATE] =
|
|
g_signal_new (NM_DEVICE_RECHECK_AUTO_ACTIVATE,
|
|
G_OBJECT_CLASS_TYPE (object_class),
|
|
G_SIGNAL_RUN_FIRST,
|
|
0, NULL, NULL, NULL,
|
|
G_TYPE_NONE, 0);
|
|
|
|
signals[RECHECK_ASSUME] =
|
|
g_signal_new (NM_DEVICE_RECHECK_ASSUME,
|
|
G_OBJECT_CLASS_TYPE (object_class),
|
|
G_SIGNAL_RUN_FIRST,
|
|
0, NULL, NULL, NULL,
|
|
G_TYPE_NONE, 0);
|
|
|
|
nm_exported_object_class_add_interface (NM_EXPORTED_OBJECT_CLASS (klass),
|
|
NMDBUS_TYPE_DEVICE_SKELETON,
|
|
"Reapply", impl_device_reapply,
|
|
"GetAppliedConnection", impl_device_get_applied_connection,
|
|
"Disconnect", impl_device_disconnect,
|
|
"Delete", impl_device_delete,
|
|
NULL);
|
|
|
|
nm_exported_object_class_add_interface (NM_EXPORTED_OBJECT_CLASS (klass),
|
|
NMDBUS_TYPE_DEVICE_STATISTICS_SKELETON,
|
|
NULL);
|
|
}
|