diff options
author | Lubomir Rintel <lkundrak@v3.sk> | 2015-01-22 16:41:15 +0100 |
---|---|---|
committer | Lubomir Rintel <lkundrak@v3.sk> | 2015-03-23 15:13:02 +0100 |
commit | 85ee1f4a9c04cad8f2486f858efd5ca10cb09077 (patch) | |
tree | 84ce066514d52c1de663a87c3297a04a0a5ba418 /src/nm-auth-utils.c | |
parent | 4a0586955767537b7494f931ccaa93bbf59c36f9 (diff) | |
download | NetworkManager-85ee1f4a9c04cad8f2486f858efd5ca10cb09077.tar.gz |
platform: give the platform an opportunity to override default-unmanaged
Some out of tree drivers add Ethernet devices that are supposed to be managed
by other their tooling, e.g. VirtualBox or VMWare.
Rather than hardcoding their drivers (at least VirtualBox doesn't even set a
"driver" property in sysfs) or hardcoding a logic that identifies such devices
let's just add a possibility to blacklist them in udev. This makes it possible
for whoever who ships such a driver to ship rules that prevent NetworkManager
from managing the device itself.
Furthermore it makes it possible for the user with special needs leverage the
flexibility of udev rules to override the defaults. In the end the user can
decide to let NetworkManager manage default-unmanaged interfaces such as VEth
or turn on default-unmanaged for devices on a particular bus.
An udev rule for VirtualBox would look like this:
SUBSYSTEM=="net", ENV{INTERFACE}=="vboxnet[0-9]*", ENV{NM_UNMANAGED}="1"
Diffstat (limited to 'src/nm-auth-utils.c')
0 files changed, 0 insertions, 0 deletions