bridge_driver.c 73.7 KB
Newer Older
1
/*
2
 * bridge_driver.c: core driver methods for managing network
3
 *
4
 * Copyright (C) 2006-2010 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45
 * Copyright (C) 2006 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this library; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307  USA
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 */

#include <config.h>

#include <sys/types.h>
#include <sys/poll.h>
#include <dirent.h>
#include <limits.h>
#include <string.h>
#include <stdio.h>
#include <stdarg.h>
#include <stdlib.h>
#include <unistd.h>
#include <errno.h>
#include <sys/utsname.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <signal.h>
#include <paths.h>
#include <pwd.h>
#include <stdio.h>
#include <sys/wait.h>
#include <sys/ioctl.h>

46
#include "virterror_internal.h"
47
#include "datatypes.h"
48
#include "bridge_driver.h"
49 50 51 52 53
#include "network_conf.h"
#include "driver.h"
#include "event.h"
#include "buf.h"
#include "util.h"
54
#include "command.h"
55 56 57 58
#include "memory.h"
#include "uuid.h"
#include "iptables.h"
#include "bridge.h"
59
#include "logging.h"
60
#include "dnsmasq.h"
61
#include "util/network.h"
62
#include "configmake.h"
63

64 65
#define NETWORK_PID_DIR LOCALSTATEDIR "/run/libvirt/network"
#define NETWORK_STATE_DIR LOCALSTATEDIR "/lib/libvirt/network"
66

67
#define DNSMASQ_STATE_DIR LOCALSTATEDIR "/lib/libvirt/dnsmasq"
68
#define RADVD_STATE_DIR LOCALSTATEDIR "/lib/libvirt/radvd"
69

70 71
#define VIR_FROM_THIS VIR_FROM_NETWORK

72
#define networkReportError(code, ...)                                   \
73
    virReportErrorHelper(NULL, VIR_FROM_NETWORK, code, __FILE__,        \
74
                         __FUNCTION__, __LINE__, __VA_ARGS__)
75

76 77
/* Main driver state */
struct network_driver {
78
    virMutex lock;
79

80
    virNetworkObjList networks;
81 82 83 84 85 86 87 88

    iptablesContext *iptables;
    brControl *brctl;
    char *networkConfigDir;
    char *networkAutostartDir;
    char *logDir;
};

89 90 91

static void networkDriverLock(struct network_driver *driver)
{
92
    virMutexLock(&driver->lock);
93 94 95
}
static void networkDriverUnlock(struct network_driver *driver)
{
96
    virMutexUnlock(&driver->lock);
97 98
}

99 100
static int networkShutdown(void);

101 102
static int networkStartNetworkDaemon(struct network_driver *driver,
                                     virNetworkObjPtr network);
103

104 105
static int networkShutdownNetworkDaemon(struct network_driver *driver,
                                        virNetworkObjPtr network);
106

107 108
static void networkReloadIptablesRules(struct network_driver *driver);

109 110
static struct network_driver *driverState = NULL;

111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129
static char *
networkRadvdPidfileBasename(const char *netname)
{
    /* this is simple but we want to be sure it's consistently done */
    char *pidfilebase;

    virAsprintf(&pidfilebase, "%s-radvd", netname);
    return pidfilebase;
}

static char *
networkRadvdConfigFileName(const char *netname)
{
    char *configfile;

    virAsprintf(&configfile, RADVD_STATE_DIR "/%s-radvd.conf",
                netname);
    return configfile;
}
130

131 132 133 134 135 136 137 138 139 140 141
static void
networkFindActiveConfigs(struct network_driver *driver) {
    unsigned int i;

    for (i = 0 ; i < driver->networks.count ; i++) {
        virNetworkObjPtr obj = driver->networks.objs[i];
        virNetworkDefPtr tmp;
        char *config;

        virNetworkObjLock(obj);

142
        if ((config = virNetworkConfigFile(NETWORK_STATE_DIR,
143 144 145 146 147 148 149 150 151 152 153 154
                                           obj->def->name)) == NULL) {
            virNetworkObjUnlock(obj);
            continue;
        }

        if (access(config, R_OK) < 0) {
            VIR_FREE(config);
            virNetworkObjUnlock(obj);
            continue;
        }

        /* Try and load the live config */
155
        tmp = virNetworkDefParseFile(config);
156 157 158 159 160 161 162 163 164 165 166
        VIR_FREE(config);
        if (tmp) {
            obj->newDef = obj->def;
            obj->def = tmp;
        }

        /* If bridge exists, then mark it active */
        if (obj->def->bridge &&
            brHasBridge(driver->brctl, obj->def->bridge) == 0) {
            obj->active = 1;

167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183
            /* Try and read dnsmasq/radvd pids if any */
            if (obj->def->ips && (obj->def->nips > 0)) {
                char *pidpath, *radvdpidbase;

                if (virFileReadPid(NETWORK_PID_DIR, obj->def->name,
                                   &obj->dnsmasqPid) == 0) {
                    /* Check that it's still alive */
                    if (kill(obj->dnsmasqPid, 0) != 0)
                        obj->dnsmasqPid = -1;
                    if (virAsprintf(&pidpath, "/proc/%d/exe", obj->dnsmasqPid) < 0) {
                        virReportOOMError();
                        goto cleanup;
                    }
                    if (virFileLinkPointsTo(pidpath, DNSMASQ) == 0)
                        obj->dnsmasqPid = -1;
                    VIR_FREE(pidpath);
                }
184

185
                if (!(radvdpidbase = networkRadvdPidfileBasename(obj->def->name))) {
186
                    virReportOOMError();
187 188
                    goto cleanup;
                }
189 190 191 192 193 194 195 196 197 198 199 200 201 202 203
                if (virFileReadPid(NETWORK_PID_DIR, radvdpidbase,
                                   &obj->radvdPid) == 0) {
                    /* Check that it's still alive */
                    if (kill(obj->radvdPid, 0) != 0)
                        obj->radvdPid = -1;
                    if (virAsprintf(&pidpath, "/proc/%d/exe", obj->radvdPid) < 0) {
                        virReportOOMError();
                        VIR_FREE(radvdpidbase);
                        goto cleanup;
                    }
                    if (virFileLinkPointsTo(pidpath, RADVD) == 0)
                        obj->radvdPid = -1;
                    VIR_FREE(pidpath);
                }
                VIR_FREE(radvdpidbase);
204 205 206
            }
        }

207
    cleanup:
208 209 210 211 212
        virNetworkObjUnlock(obj);
    }
}


213 214 215
static void
networkAutostartConfigs(struct network_driver *driver) {
    unsigned int i;
216

217
    for (i = 0 ; i < driver->networks.count ; i++) {
218
        virNetworkObjLock(driver->networks.objs[i]);
219
        if (driver->networks.objs[i]->autostart &&
D
Daniel P. Berrange 已提交
220
            !virNetworkObjIsActive(driver->networks.objs[i]) &&
221
            networkStartNetworkDaemon(driver, driver->networks.objs[i]) < 0) {
222
            /* failed to start but already logged */
223
        }
224
        virNetworkObjUnlock(driver->networks.objs[i]);
225 226 227 228 229 230 231 232 233
    }
}

/**
 * networkStartup:
 *
 * Initialization function for the QEmu daemon
 */
static int
234
networkStartup(int privileged) {
235 236
    uid_t uid = geteuid();
    char *base = NULL;
237
    int err;
238 239

    if (VIR_ALLOC(driverState) < 0)
240
        goto error;
241

242 243 244 245
    if (virMutexInit(&driverState->lock) < 0) {
        VIR_FREE(driverState);
        goto error;
    }
246 247
    networkDriverLock(driverState);

248
    if (privileged) {
249
        if (virAsprintf(&driverState->logDir,
250
                        "%s/log/libvirt/qemu", LOCALSTATEDIR) == -1)
251 252
            goto out_of_memory;

253
        if ((base = strdup (SYSCONFDIR "/libvirt")) == NULL)
254 255
            goto out_of_memory;
    } else {
256
        char *userdir = virGetUserDirectory(uid);
257 258 259

        if (!userdir)
            goto error;
260

261
        if (virAsprintf(&driverState->logDir,
262 263
                        "%s/.libvirt/qemu/log", userdir) == -1) {
            VIR_FREE(userdir);
264
            goto out_of_memory;
265
        }
266

267 268
        if (virAsprintf(&base, "%s/.libvirt", userdir) == -1) {
            VIR_FREE(userdir);
269 270
            goto out_of_memory;
        }
271
        VIR_FREE(userdir);
272 273 274 275 276
    }

    /* Configuration paths are either ~/.libvirt/qemu/... (session) or
     * /etc/libvirt/qemu/... (system).
     */
277
    if (virAsprintf(&driverState->networkConfigDir, "%s/qemu/networks", base) == -1)
278 279
        goto out_of_memory;

280 281
    if (virAsprintf(&driverState->networkAutostartDir, "%s/qemu/networks/autostart",
                    base) == -1)
282 283 284 285
        goto out_of_memory;

    VIR_FREE(base);

286
    if ((err = brInit(&driverState->brctl))) {
287
        virReportSystemError(err, "%s",
288 289 290 291 292
                             _("cannot initialize bridge support"));
        goto error;
    }

    if (!(driverState->iptables = iptablesContextNew())) {
293
        goto out_of_memory;
294 295 296
    }


297
    if (virNetworkLoadAllConfigs(&driverState->networks,
298
                                 driverState->networkConfigDir,
299 300 301
                                 driverState->networkAutostartDir) < 0)
        goto error;

302
    networkFindActiveConfigs(driverState);
303
    networkReloadIptablesRules(driverState);
304 305
    networkAutostartConfigs(driverState);

306 307
    networkDriverUnlock(driverState);

308 309
    return 0;

310
out_of_memory:
311
    virReportOOMError();
312 313

error:
314 315 316
    if (driverState)
        networkDriverUnlock(driverState);

317
    VIR_FREE(base);
318
    networkShutdown();
319 320 321 322 323 324 325 326 327 328 329
    return -1;
}

/**
 * networkReload:
 *
 * Function to restart the QEmu daemon, it will recheck the configuration
 * files and update its state and the networking
 */
static int
networkReload(void) {
330 331 332
    if (!driverState)
        return 0;

333
    networkDriverLock(driverState);
334
    virNetworkLoadAllConfigs(&driverState->networks,
335 336
                             driverState->networkConfigDir,
                             driverState->networkAutostartDir);
337
    networkReloadIptablesRules(driverState);
338
    networkAutostartConfigs(driverState);
339
    networkDriverUnlock(driverState);
340 341 342 343 344 345 346 347 348 349 350 351 352
    return 0;
}

/**
 * networkActive:
 *
 * Checks if the QEmu daemon is active, i.e. has an active domain or
 * an active network
 *
 * Returns 1 if active, 0 otherwise
 */
static int
networkActive(void) {
353
    unsigned int i;
354
    int active = 0;
355

356 357 358
    if (!driverState)
        return 0;

359
    networkDriverLock(driverState);
360 361
    for (i = 0 ; i < driverState->networks.count ; i++) {
        virNetworkObjPtr net = driverState->networks.objs[i];
362
        virNetworkObjLock(net);
D
Daniel P. Berrange 已提交
363
        if (virNetworkObjIsActive(net))
364
            active = 1;
365
        virNetworkObjUnlock(net);
366
    }
367
    networkDriverUnlock(driverState);
368
    return active;
369 370 371 372 373 374 375 376 377 378 379 380
}

/**
 * networkShutdown:
 *
 * Shutdown the QEmu daemon, it will stop all active domains and networks
 */
static int
networkShutdown(void) {
    if (!driverState)
        return -1;

381 382
    networkDriverLock(driverState);

383
    /* free inactive networks */
384
    virNetworkObjListFree(&driverState->networks);
385 386 387 388 389 390 391 392 393 394

    VIR_FREE(driverState->logDir);
    VIR_FREE(driverState->networkConfigDir);
    VIR_FREE(driverState->networkAutostartDir);

    if (driverState->brctl)
        brShutdown(driverState->brctl);
    if (driverState->iptables)
        iptablesContextFree(driverState->iptables);

395
    networkDriverUnlock(driverState);
396
    virMutexDestroy(&driverState->lock);
397

398 399 400 401 402 403
    VIR_FREE(driverState);

    return 0;
}


404
static int
405
networkSaveDnsmasqHostsfile(virNetworkIpDefPtr ipdef,
406 407 408 409 410 411
                            dnsmasqContext *dctx,
                            bool force)
{
    unsigned int i;

    if (! force && virFileExists(dctx->hostsfile->path))
412
        return 0;
413

414 415
    for (i = 0; i < ipdef->nhosts; i++) {
        virNetworkDHCPHostDefPtr host = &(ipdef->hosts[i]);
416 417
        if ((host->mac) && VIR_SOCKET_HAS_ADDR(&host->ip))
            dnsmasqAddDhcpHost(dctx, host->mac, &host->ip, host->name);
418 419 420
    }

    if (dnsmasqSave(dctx) < 0)
421
        return -1;
422

423
    return 0;
424 425 426
}


427
static int
428
networkBuildDnsmasqArgv(virNetworkObjPtr network,
429
                        virNetworkIpDefPtr ipdef,
430
                        const char *pidfile,
431 432
                        virCommandPtr cmd) {
    int r, ret = -1;
433
    int nbleases = 0;
434
    char *bridgeaddr;
435

436
    if (!(bridgeaddr = virSocketFormatAddr(&ipdef->address)))
437
        goto cleanup;
438
    /*
439
     * NB, be careful about syntax for dnsmasq options in long format.
440 441 442 443 444 445 446 447 448 449 450 451 452
     *
     * If the flag has a mandatory argument, it can be given using
     * either syntax:
     *
     *     --foo bar
     *     --foo=bar
     *
     * If the flag has a optional argument, it *must* be given using
     * the syntax:
     *
     *     --foo=bar
     *
     * It is hard to determine whether a flag is optional or not,
453 454
     * without reading the dnsmasq source :-( The manpage is not
     * very explicit on this.
455
     */
456 457 458 459 460

    /*
     * Needed to ensure dnsmasq uses same algorithm for processing
     * multiple namedriver entries in /etc/resolv.conf as GLibC.
     */
461
    virCommandAddArgList(cmd, "--strict-order", "--bind-interfaces", NULL);
462

463 464
    if (network->def->domain)
        virCommandAddArgList(cmd, "--domain", network->def->domain, NULL);
465

466
    virCommandAddArgPair(cmd, "--pid-file", pidfile);
467

468 469
    /* *no* conf file */
    virCommandAddArgList(cmd, "--conf-file=", "", NULL);
470 471 472 473 474 475 476

    /*
     * XXX does not actually work, due to some kind of
     * race condition setting up ipv6 addresses on the
     * interface. A sleep(10) makes it work, but that's
     * clearly not practical
     *
477
     * virCommandAddArg(cmd, "--interface");
478
     * virCommandAddArg(cmd, ipdef->bridge);
479
     */
480 481 482 483
    virCommandAddArgList(cmd,
                         "--listen-address", bridgeaddr,
                         "--except-interface", "lo",
                         NULL);
484

485 486
    for (r = 0 ; r < ipdef->nranges ; r++) {
        char *saddr = virSocketFormatAddr(&ipdef->ranges[r].start);
487
        if (!saddr)
488
            goto cleanup;
489
        char *eaddr = virSocketFormatAddr(&ipdef->ranges[r].end);
490 491
        if (!eaddr) {
            VIR_FREE(saddr);
492
            goto cleanup;
493
        }
494 495
        virCommandAddArg(cmd, "--dhcp-range");
        virCommandAddArgFormat(cmd, "%s,%s", saddr, eaddr);
496 497
        VIR_FREE(saddr);
        VIR_FREE(eaddr);
498 499
        nbleases += virSocketGetRange(&ipdef->ranges[r].start,
                                      &ipdef->ranges[r].end);
500 501
    }

502 503 504 505 506
    /*
     * For static-only DHCP, i.e. with no range but at least one host element,
     * we have to add a special --dhcp-range option to enable the service in
     * dnsmasq.
     */
507
    if (!ipdef->nranges && ipdef->nhosts) {
508 509
        virCommandAddArg(cmd, "--dhcp-range");
        virCommandAddArgFormat(cmd, "%s,static", bridgeaddr);
510 511
    }

512
    if (ipdef->nranges > 0) {
513
        virCommandAddArgFormat(cmd, "--dhcp-lease-max=%d", nbleases);
514 515
    }

516
    if (ipdef->nranges || ipdef->nhosts)
517
        virCommandAddArg(cmd, "--dhcp-no-override");
518

519
    if (ipdef->nhosts > 0) {
520 521 522 523 524 525
        dnsmasqContext *dctx = dnsmasqContextNew(network->def->name,
                                                 DNSMASQ_STATE_DIR);
        if (dctx == NULL) {
            virReportOOMError();
            goto cleanup;
        }
526

527
        if (networkSaveDnsmasqHostsfile(ipdef, dctx, false) < 0) {
528 529
            virCommandAddArgPair(cmd, "--dhcp-hostsfile",
                                 dctx->hostsfile->path);
530 531
        }
        dnsmasqContextFree(dctx);
532 533
    }

534
    if (ipdef->tftproot) {
535
        virCommandAddArgList(cmd, "--enable-tftp",
536
                             "--tftp-root", ipdef->tftproot,
537
                             NULL);
538
    }
539
    if (ipdef->bootfile) {
540
        virCommandAddArg(cmd, "--dhcp-boot");
541 542
        if (VIR_SOCKET_HAS_ADDR(&ipdef->bootserver)) {
            char *bootserver = virSocketFormatAddr(&ipdef->bootserver);
543 544 545 546

            if (!bootserver)
                goto cleanup;
            virCommandAddArgFormat(cmd, "%s%s%s",
547
                               ipdef->bootfile, ",,", bootserver);
548 549
            VIR_FREE(bootserver);
        } else {
550
            virCommandAddArg(cmd, ipdef->bootfile);
551
        }
552 553
    }

554 555 556 557
    ret = 0;
cleanup:
    VIR_FREE(bridgeaddr);
    return ret;
558 559 560
}

static int
561
networkStartDhcpDaemon(virNetworkObjPtr network)
562
{
563 564
    virCommandPtr cmd = NULL;
    char *pidfile = NULL;
565 566
    int ret = -1, err, ii;
    virNetworkIpDefPtr ipdef;
567 568

    network->dnsmasqPid = -1;
569

570 571 572 573 574 575 576
    /* Look for first IPv4 address that has dhcp defined. */
    /* We support dhcp config on 1 IPv4 interface only. */
    for (ii = 0;
         (ipdef = virNetworkDefGetIpByIndex(network->def, AF_INET, ii));
         ii++) {
        if (ipdef->nranges || ipdef->nhosts)
            break;
577
    }
578 579
    if (!ipdef)
        return 0;
580

L
Laine Stump 已提交
581
    if ((err = virFileMakePath(NETWORK_PID_DIR)) != 0) {
582
        virReportSystemError(err,
583 584
                             _("cannot create directory %s"),
                             NETWORK_PID_DIR);
585
        goto cleanup;
586
    }
L
Laine Stump 已提交
587
    if ((err = virFileMakePath(NETWORK_STATE_DIR)) != 0) {
588
        virReportSystemError(err,
589 590
                             _("cannot create directory %s"),
                             NETWORK_STATE_DIR);
591
        goto cleanup;
592 593 594
    }

    if (!(pidfile = virFilePid(NETWORK_PID_DIR, network->def->name))) {
595
        virReportOOMError();
596
        goto cleanup;
597 598
    }

599
    cmd = virCommandNew(DNSMASQ);
600
    if (networkBuildDnsmasqArgv(network, ipdef, pidfile, cmd) < 0) {
601
        goto cleanup;
602 603
    }

604
    if (virCommandRun(cmd, NULL) < 0)
605 606 607
        goto cleanup;

    /*
608 609 610 611 612
     * There really is no race here - when dnsmasq daemonizes, its
     * leader process stays around until its child has actually
     * written its pidfile. So by time virCommandRun exits it has
     * waitpid'd and guaranteed the proess has started and written a
     * pid
613 614 615 616 617
     */

    if (virFileReadPid(NETWORK_PID_DIR, network->def->name,
                       &network->dnsmasqPid) < 0)
        goto cleanup;
618

619 620 621
    ret = 0;
cleanup:
    VIR_FREE(pidfile);
622
    virCommandFree(cmd);
623 624 625
    return ret;
}

626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755
static int
networkStartRadvd(virNetworkObjPtr network)
{
    char *pidfile = NULL;
    char *radvdpidbase = NULL;
    virBuffer configbuf = VIR_BUFFER_INITIALIZER;;
    char *configstr = NULL;
    char *configfile = NULL;
    virCommandPtr cmd = NULL;
    int ret = -1, err, ii;
    virNetworkIpDefPtr ipdef;

    network->radvdPid = -1;

    if ((err = virFileMakePath(NETWORK_PID_DIR)) != 0) {
        virReportSystemError(err,
                             _("cannot create directory %s"),
                             NETWORK_PID_DIR);
        goto cleanup;
    }
    if ((err = virFileMakePath(RADVD_STATE_DIR)) != 0) {
        virReportSystemError(err,
                             _("cannot create directory %s"),
                             RADVD_STATE_DIR);
        goto cleanup;
    }

    /* construct pidfile name */
    if (!(radvdpidbase = networkRadvdPidfileBasename(network->def->name))) {
        virReportOOMError();
        goto cleanup;
    }
    if (!(pidfile = virFilePid(NETWORK_PID_DIR, radvdpidbase))) {
        virReportOOMError();
        goto cleanup;
    }

    /* create radvd config file appropriate for this network */
    virBufferVSprintf(&configbuf, "interface %s\n"
                      "{\n"
                      "  AdvSendAdvert on;\n"
                      "  AdvManagedFlag off;\n"
                      "  AdvOtherConfigFlag off;\n"
                      "\n",
                      network->def->bridge);
    for (ii = 0;
         (ipdef = virNetworkDefGetIpByIndex(network->def, AF_INET6, ii));
         ii++) {
        int prefix;
        char *netaddr;

        prefix = virNetworkIpDefPrefix(ipdef);
        if (prefix < 0) {
            networkReportError(VIR_ERR_INTERNAL_ERROR,
                               _("bridge  '%s' has an invalid prefix"),
                               network->def->bridge);
            goto cleanup;
        }
        if (!(netaddr = virSocketFormatAddr(&ipdef->address)))
            goto cleanup;
        virBufferVSprintf(&configbuf,
                          "  prefix %s/%d\n"
                          "  {\n"
                          "    AdvOnLink on;\n"
                          "    AdvAutonomous on;\n"
                          "    AdvRouterAddr off;\n"
                          "  };\n",
                          netaddr, prefix);
        VIR_FREE(netaddr);
    }

    virBufferAddLit(&configbuf, "};\n");

    if (virBufferError(&configbuf)) {
        virReportOOMError();
        goto cleanup;
    }
    if (!(configstr = virBufferContentAndReset(&configbuf))) {
        virReportOOMError();
        goto cleanup;
    }

    /* construct the filename */
    if (!(configfile = networkRadvdConfigFileName(network->def->name))) {
        virReportOOMError();
        goto cleanup;
    }
    /* write the file */
    if (virFileWriteStr(configfile, configstr, 0600) < 0) {
        virReportSystemError(errno,
                             _("couldn't write radvd config file '%s'"),
                             configfile);
        goto cleanup;
    }

    /* prevent radvd from daemonizing itself with "--debug 1", and use
     * a dummy pidfile name - virCommand will create the pidfile we
     * want to use (this is necessary because radvd's internal
     * daemonization and pidfile creation causes a race, and the
     * virFileReadPid() below will fail if we use them).
     * Unfortunately, it isn't possible to tell radvd to not create
     * its own pidfile, so we just let it do so, with a slightly
     * different name. Unused, but harmless.
     */
    cmd = virCommandNewArgList(RADVD, "--debug", "1",
                               "--config", configfile,
                               "--pidfile", NULL);
    virCommandAddArgFormat(cmd, "%s-bin", pidfile);

    virCommandSetPidFile(cmd, pidfile);
    virCommandDaemonize(cmd);

    if (virCommandRun(cmd, NULL) < 0)
        goto cleanup;

    if (virFileReadPid(NETWORK_PID_DIR, radvdpidbase,
                       &network->radvdPid) < 0)
        goto cleanup;

    ret = 0;
cleanup:
    virCommandFree(cmd);
    VIR_FREE(configfile);
    VIR_FREE(configstr);
    virBufferFreeAndReset(&configbuf);
    VIR_FREE(radvdpidbase);
    VIR_FREE(pidfile);
    return ret;
}

756
static int
757
networkAddMasqueradingIptablesRules(struct network_driver *driver,
758 759
                                    virNetworkObjPtr network,
                                    virNetworkIpDefPtr ipdef)
760 761
{
    int prefix = virNetworkIpDefPrefix(ipdef);
762 763 764 765 766 767 768

    if (prefix < 0) {
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Invalid prefix or netmask for '%s'"),
                           network->def->bridge);
        goto masqerr1;
    }
769

770
    /* allow forwarding packets from the bridge interface */
771
    if (iptablesAddForwardAllowOut(driver->iptables,
772
                                   &ipdef->address,
773
                                   prefix,
774 775 776 777 778
                                   network->def->bridge,
                                   network->def->forwardDev) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow forwarding from '%s'"),
                           network->def->bridge);
779 780 781
        goto masqerr1;
    }

782 783 784
    /* allow forwarding packets to the bridge interface if they are
     * part of an existing connection
     */
785
    if (iptablesAddForwardAllowRelatedIn(driver->iptables,
786
                                         &ipdef->address,
787
                                         prefix,
788 789 790 791 792
                                         network->def->bridge,
                                         network->def->forwardDev) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow forwarding to '%s'"),
                           network->def->bridge);
793 794 795
        goto masqerr2;
    }

796 797 798 799 800
    /*
     * Enable masquerading.
     *
     * We need to end up with 3 rules in the table in this order
     *
E
Eric Blake 已提交
801 802
     *  1. protocol=tcp with sport mapping restriction
     *  2. protocol=udp with sport mapping restriction
803 804 805
     *  3. generic any protocol
     *
     * The sport mappings are required, because default IPtables
E
Eric Blake 已提交
806
     * MASQUERADE maintain port numbers unchanged where possible.
807 808 809 810 811 812 813 814 815 816 817 818 819
     *
     * NFS can be configured to only "trust" port numbers < 1023.
     *
     * Guests using NAT thus need to be prevented from having port
     * numbers < 1023, otherwise they can bypass the NFS "security"
     * check on the source port number.
     *
     * Since we use '--insert' to add rules to the header of the
     * chain, we actually need to add them in the reverse of the
     * order just mentioned !
     */

    /* First the generic masquerade rule for other protocols */
820
    if (iptablesAddForwardMasquerade(driver->iptables,
821
                                     &ipdef->address,
822
                                     prefix,
823 824 825 826 827
                                     network->def->forwardDev,
                                     NULL) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to enable masquerading to '%s'"),
                           network->def->forwardDev ? network->def->forwardDev : NULL);
828 829 830
        goto masqerr3;
    }

831
    /* UDP with a source port restriction */
832
    if (iptablesAddForwardMasquerade(driver->iptables,
833
                                     &ipdef->address,
834
                                     prefix,
835 836 837 838 839
                                     network->def->forwardDev,
                                     "udp") < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to enable UDP masquerading to '%s'"),
                           network->def->forwardDev ? network->def->forwardDev : NULL);
840 841 842 843
        goto masqerr4;
    }

    /* TCP with a source port restriction */
844
    if (iptablesAddForwardMasquerade(driver->iptables,
845
                                     &ipdef->address,
846
                                     prefix,
847 848 849 850 851
                                     network->def->forwardDev,
                                     "tcp") < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to enable TCP masquerading to '%s'"),
                           network->def->forwardDev ? network->def->forwardDev : NULL);
852 853 854
        goto masqerr5;
    }

855
    return 0;
856

857 858
 masqerr5:
    iptablesRemoveForwardMasquerade(driver->iptables,
859
                                    &ipdef->address,
860
                                    prefix,
861 862 863 864
                                    network->def->forwardDev,
                                    "udp");
 masqerr4:
    iptablesRemoveForwardMasquerade(driver->iptables,
865
                                    &ipdef->address,
866
                                    prefix,
867 868
                                    network->def->forwardDev,
                                    NULL);
869 870
 masqerr3:
    iptablesRemoveForwardAllowRelatedIn(driver->iptables,
871
                                        &ipdef->address,
872
                                        prefix,
873 874
                                        network->def->bridge,
                                        network->def->forwardDev);
875 876
 masqerr2:
    iptablesRemoveForwardAllowOut(driver->iptables,
877
                                  &ipdef->address,
878
                                  prefix,
879 880 881
                                  network->def->bridge,
                                  network->def->forwardDev);
 masqerr1:
882
    return -1;
883 884
}

885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921
static void
networkRemoveMasqueradingIptablesRules(struct network_driver *driver,
                                       virNetworkObjPtr network,
                                       virNetworkIpDefPtr ipdef)
{
    int prefix = virNetworkIpDefPrefix(ipdef);

    if (prefix >= 0) {
        iptablesRemoveForwardMasquerade(driver->iptables,
                                        &ipdef->address,
                                        prefix,
                                        network->def->forwardDev,
                                        "tcp");
        iptablesRemoveForwardMasquerade(driver->iptables,
                                        &ipdef->address,
                                        prefix,
                                        network->def->forwardDev,
                                        "udp");
        iptablesRemoveForwardMasquerade(driver->iptables,
                                        &ipdef->address,
                                        prefix,
                                        network->def->forwardDev,
                                        NULL);

        iptablesRemoveForwardAllowRelatedIn(driver->iptables,
                                            &ipdef->address,
                                            prefix,
                                            network->def->bridge,
                                            network->def->forwardDev);
        iptablesRemoveForwardAllowOut(driver->iptables,
                                      &ipdef->address,
                                      prefix,
                                      network->def->bridge,
                                      network->def->forwardDev);
    }
}

922
static int
923
networkAddRoutingIptablesRules(struct network_driver *driver,
924
                               virNetworkObjPtr network,
925 926
                               virNetworkIpDefPtr ipdef)
{
927
    int prefix = virNetworkIpDefPrefix(ipdef);
928 929 930 931 932 933 934

    if (prefix < 0) {
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Invalid prefix or netmask for '%s'"),
                           network->def->bridge);
        goto routeerr1;
    }
935

936
    /* allow routing packets from the bridge interface */
937
    if (iptablesAddForwardAllowOut(driver->iptables,
938
                                   &ipdef->address,
939
                                   prefix,
940 941 942 943 944
                                   network->def->bridge,
                                   network->def->forwardDev) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow routing from '%s'"),
                           network->def->bridge);
945 946 947 948
        goto routeerr1;
    }

    /* allow routing packets to the bridge interface */
949
    if (iptablesAddForwardAllowIn(driver->iptables,
950
                                  &ipdef->address,
951
                                  prefix,
952 953 954 955 956
                                  network->def->bridge,
                                  network->def->forwardDev) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow routing to '%s'"),
                           network->def->bridge);
957 958 959
        goto routeerr2;
    }

960
    return 0;
961

962
routeerr2:
963
    iptablesRemoveForwardAllowOut(driver->iptables,
964
                                  &ipdef->address,
965
                                  prefix,
966 967
                                  network->def->bridge,
                                  network->def->forwardDev);
968
routeerr1:
969
    return -1;
970 971
}

972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993
static void
networkRemoveRoutingIptablesRules(struct network_driver *driver,
                                  virNetworkObjPtr network,
                                  virNetworkIpDefPtr ipdef)
{
    int prefix = virNetworkIpDefPrefix(ipdef);

    if (prefix >= 0) {
        iptablesRemoveForwardAllowIn(driver->iptables,
                                     &ipdef->address,
                                     prefix,
                                     network->def->bridge,
                                     network->def->forwardDev);

        iptablesRemoveForwardAllowOut(driver->iptables,
                                      &ipdef->address,
                                      prefix,
                                      network->def->bridge,
                                      network->def->forwardDev);
    }
}

994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052
/* Add all once/network rules required for IPv6 (if any IPv6 addresses are defined) */
static int
networkAddGeneralIp6tablesRules(struct network_driver *driver,
                               virNetworkObjPtr network)
{

    if (!virNetworkDefGetIpByIndex(network->def, AF_INET6, 0))
        return 0;

    /* Catch all rules to block forwarding to/from bridges */

    if (iptablesAddForwardRejectOut(driver->iptables, AF_INET6,
                                    network->def->bridge) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add ip6tables rule to block outbound traffic from '%s'"),
                           network->def->bridge);
        goto err1;
    }

    if (iptablesAddForwardRejectIn(driver->iptables, AF_INET6,
                                   network->def->bridge) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add ip6tables rule to block inbound traffic to '%s'"),
                           network->def->bridge);
        goto err2;
    }

    /* Allow traffic between guests on the same bridge */
    if (iptablesAddForwardAllowCross(driver->iptables, AF_INET6,
                                     network->def->bridge) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add ip6tables rule to allow cross bridge traffic on '%s'"),
                           network->def->bridge);
        goto err3;
    }

    return 0;

    /* unwind in reverse order from the point of failure */
err3:
    iptablesRemoveForwardRejectIn(driver->iptables, AF_INET6, network->def->bridge);
err2:
    iptablesRemoveForwardRejectOut(driver->iptables, AF_INET6, network->def->bridge);
err1:
    return -1;
}

static void
networkRemoveGeneralIp6tablesRules(struct network_driver *driver,
                                  virNetworkObjPtr network)
{
    if (!virNetworkDefGetIpByIndex(network->def, AF_INET6, 0))
        return;

    iptablesRemoveForwardAllowCross(driver->iptables, AF_INET6, network->def->bridge);
    iptablesRemoveForwardRejectIn(driver->iptables, AF_INET6, network->def->bridge);
    iptablesRemoveForwardRejectOut(driver->iptables, AF_INET6, network->def->bridge);
}

1053
static int
1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067
networkAddGeneralIptablesRules(struct network_driver *driver,
                               virNetworkObjPtr network)
{
    int ii;
    virNetworkIpDefPtr ipv4def;

    /* First look for first IPv4 address that has dhcp or tftpboot defined. */
    /* We support dhcp config on 1 IPv4 interface only. */
    for (ii = 0;
         (ipv4def = virNetworkDefGetIpByIndex(network->def, AF_INET, ii));
         ii++) {
        if (ipv4def->nranges || ipv4def->nhosts || ipv4def->tftproot)
            break;
    }
1068 1069

    /* allow DHCP requests through to dnsmasq */
1070

1071 1072
    if (iptablesAddTcpInput(driver->iptables, AF_INET,
                            network->def->bridge, 67) < 0) {
1073 1074 1075
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow DHCP requests from '%s'"),
                           network->def->bridge);
1076 1077 1078
        goto err1;
    }

1079 1080
    if (iptablesAddUdpInput(driver->iptables, AF_INET,
                            network->def->bridge, 67) < 0) {
1081 1082 1083
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow DHCP requests from '%s'"),
                           network->def->bridge);
1084 1085 1086
        goto err2;
    }

1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100
    /* If we are doing local DHCP service on this network, attempt to
     * add a rule that will fixup the checksum of DHCP response
     * packets back to the guests (but report failure without
     * aborting, since not all iptables implementations support it).
     */

    if (ipv4def && (ipv4def->nranges || ipv4def->nhosts) &&
        (iptablesAddOutputFixUdpChecksum(driver->iptables,
                                         network->def->bridge, 68) < 0)) {
        VIR_WARN("Could not add rule to fixup DHCP response checksums "
                 "on network '%s'.", network->def->name);
        VIR_WARN0("May need to update iptables package & kernel to support CHECKSUM rule.");
    }

1101
    /* allow DNS requests through to dnsmasq */
1102 1103
    if (iptablesAddTcpInput(driver->iptables, AF_INET,
                            network->def->bridge, 53) < 0) {
1104 1105 1106
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow DNS requests from '%s'"),
                           network->def->bridge);
1107 1108 1109
        goto err3;
    }

1110 1111
    if (iptablesAddUdpInput(driver->iptables, AF_INET,
                            network->def->bridge, 53) < 0) {
1112 1113 1114
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow DNS requests from '%s'"),
                           network->def->bridge);
1115 1116 1117
        goto err4;
    }

1118 1119
    /* allow TFTP requests through to dnsmasq if necessary */
    if (ipv4def && ipv4def->tftproot &&
1120 1121
        iptablesAddUdpInput(driver->iptables, AF_INET,
                            network->def->bridge, 69) < 0) {
1122 1123 1124
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow TFTP requests from '%s'"),
                           network->def->bridge);
1125
        goto err5;
1126 1127
    }

1128 1129
    /* Catch all rules to block forwarding to/from bridges */

1130 1131
    if (iptablesAddForwardRejectOut(driver->iptables, AF_INET,
                                    network->def->bridge) < 0) {
1132 1133 1134
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to block outbound traffic from '%s'"),
                           network->def->bridge);
1135
        goto err6;
1136 1137
    }

1138 1139
    if (iptablesAddForwardRejectIn(driver->iptables, AF_INET,
                                   network->def->bridge) < 0) {
1140 1141 1142
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to block inbound traffic to '%s'"),
                           network->def->bridge);
1143
        goto err7;
1144 1145 1146
    }

    /* Allow traffic between guests on the same bridge */
1147 1148
    if (iptablesAddForwardAllowCross(driver->iptables, AF_INET,
                                     network->def->bridge) < 0) {
1149 1150 1151
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow cross bridge traffic on '%s'"),
                           network->def->bridge);
1152
        goto err8;
1153 1154
    }

1155 1156 1157 1158 1159
    /* add IPv6 general rules, if needed */
    if (networkAddGeneralIp6tablesRules(driver, network) < 0) {
        goto err9;
    }

1160
    return 0;
1161

1162
    /* unwind in reverse order from the point of failure */
1163 1164
err9:
    iptablesRemoveForwardAllowCross(driver->iptables, AF_INET, network->def->bridge);
1165
err8:
1166
    iptablesRemoveForwardRejectIn(driver->iptables, AF_INET, network->def->bridge);
1167
err7:
1168
    iptablesRemoveForwardRejectOut(driver->iptables, AF_INET, network->def->bridge);
1169 1170
err6:
    if (ipv4def && ipv4def->tftproot) {
1171
        iptablesRemoveUdpInput(driver->iptables, AF_INET, network->def->bridge, 69);
1172
    }
1173
err5:
1174
    iptablesRemoveUdpInput(driver->iptables, AF_INET, network->def->bridge, 53);
1175
err4:
1176
    iptablesRemoveTcpInput(driver->iptables, AF_INET, network->def->bridge, 53);
1177
err3:
1178
    iptablesRemoveUdpInput(driver->iptables, AF_INET, network->def->bridge, 67);
1179
err2:
1180
    iptablesRemoveTcpInput(driver->iptables, AF_INET, network->def->bridge, 67);
1181
err1:
1182
    return -1;
1183 1184 1185
}

static void
1186 1187 1188 1189 1190
networkRemoveGeneralIptablesRules(struct network_driver *driver,
                                  virNetworkObjPtr network)
{
    int ii;
    virNetworkIpDefPtr ipv4def;
1191

1192 1193
    networkRemoveGeneralIp6tablesRules(driver, network);

1194 1195 1196 1197 1198
    for (ii = 0;
         (ipv4def = virNetworkDefGetIpByIndex(network->def, AF_INET, ii));
         ii++) {
        if (ipv4def->nranges || ipv4def->nhosts || ipv4def->tftproot)
            break;
1199
    }
1200

1201 1202 1203
    iptablesRemoveForwardAllowCross(driver->iptables, AF_INET, network->def->bridge);
    iptablesRemoveForwardRejectIn(driver->iptables, AF_INET, network->def->bridge);
    iptablesRemoveForwardRejectOut(driver->iptables, AF_INET, network->def->bridge);
1204
    if (ipv4def && ipv4def->tftproot) {
1205
        iptablesRemoveUdpInput(driver->iptables, AF_INET, network->def->bridge, 69);
1206
    }
1207 1208
    iptablesRemoveUdpInput(driver->iptables, AF_INET, network->def->bridge, 53);
    iptablesRemoveTcpInput(driver->iptables, AF_INET, network->def->bridge, 53);
1209 1210 1211 1212
    if (ipv4def && (ipv4def->nranges || ipv4def->nhosts)) {
        iptablesRemoveOutputFixUdpChecksum(driver->iptables,
                                           network->def->bridge, 68);
    }
1213 1214
    iptablesRemoveUdpInput(driver->iptables, AF_INET, network->def->bridge, 67);
    iptablesRemoveTcpInput(driver->iptables, AF_INET, network->def->bridge, 67);
1215 1216
}

1217 1218 1219 1220 1221
static int
networkAddIpSpecificIptablesRules(struct network_driver *driver,
                                  virNetworkObjPtr network,
                                  virNetworkIpDefPtr ipdef)
{
1222 1223 1224
    /* NB: in the case of IPv6, routing rules are added when the
     * forward mode is NAT. This is because IPv6 has no NAT.
     */
1225

1226 1227 1228 1229 1230 1231 1232 1233
    if (network->def->forwardType == VIR_NETWORK_FORWARD_NAT) {
        if (VIR_SOCKET_IS_FAMILY(&ipdef->address, AF_INET))
            return networkAddMasqueradingIptablesRules(driver, network, ipdef);
        else if (VIR_SOCKET_IS_FAMILY(&ipdef->address, AF_INET6))
            return networkAddRoutingIptablesRules(driver, network, ipdef);
    } else if (network->def->forwardType == VIR_NETWORK_FORWARD_ROUTE) {
        return networkAddRoutingIptablesRules(driver, network, ipdef);
    }
1234 1235 1236 1237 1238 1239 1240 1241
    return 0;
}

static void
networkRemoveIpSpecificIptablesRules(struct network_driver *driver,
                                     virNetworkObjPtr network,
                                     virNetworkIpDefPtr ipdef)
{
1242 1243 1244 1245 1246 1247
    if (network->def->forwardType == VIR_NETWORK_FORWARD_NAT) {
        if (VIR_SOCKET_IS_FAMILY(&ipdef->address, AF_INET))
            networkRemoveMasqueradingIptablesRules(driver, network, ipdef);
        else if (VIR_SOCKET_IS_FAMILY(&ipdef->address, AF_INET6))
            networkRemoveRoutingIptablesRules(driver, network, ipdef);
    } else if (network->def->forwardType == VIR_NETWORK_FORWARD_ROUTE) {
1248
        networkRemoveRoutingIptablesRules(driver, network, ipdef);
1249
    }
1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302
}

/* Add all rules for all ip addresses (and general rules) on a network */
static int
networkAddIptablesRules(struct network_driver *driver,
                        virNetworkObjPtr network)
{
    int ii;
    virNetworkIpDefPtr ipdef;

    /* Add "once per network" rules */
    if (networkAddGeneralIptablesRules(driver, network) < 0)
        return -1;

    for (ii = 0;
         (ipdef = virNetworkDefGetIpByIndex(network->def, AF_UNSPEC, ii));
         ii++) {
        /* Add address-specific iptables rules */
        if (networkAddIpSpecificIptablesRules(driver, network, ipdef) < 0) {
            goto err;
        }
    }
    return 0;

err:
    /* The final failed call to networkAddIpSpecificIptablesRules will
     * have removed any rules it created, but we need to remove those
     * added for previous IP addresses.
     */
    while ((--ii >= 0) &&
           (ipdef = virNetworkDefGetIpByIndex(network->def, AF_UNSPEC, ii))) {
        networkRemoveIpSpecificIptablesRules(driver, network, ipdef);
    }
    networkRemoveGeneralIptablesRules(driver, network);
    return -1;
}

/* Remove all rules for all ip addresses (and general rules) on a network */
static void
networkRemoveIptablesRules(struct network_driver *driver,
                           virNetworkObjPtr network)
{
    int ii;
    virNetworkIpDefPtr ipdef;

    for (ii = 0;
         (ipdef = virNetworkDefGetIpByIndex(network->def, AF_UNSPEC, ii));
         ii++) {
        networkRemoveIpSpecificIptablesRules(driver, network, ipdef);
    }
    networkRemoveGeneralIptablesRules(driver, network);
}

1303 1304 1305 1306 1307 1308 1309 1310 1311 1312
static void
networkReloadIptablesRules(struct network_driver *driver)
{
    unsigned int i;

    VIR_INFO0(_("Reloading iptables rules"));

    for (i = 0 ; i < driver->networks.count ; i++) {
        virNetworkObjLock(driver->networks.objs[i]);
        if (virNetworkObjIsActive(driver->networks.objs[i])) {
1313 1314 1315 1316
            networkRemoveIptablesRules(driver, driver->networks.objs[i]);
            if (networkAddIptablesRules(driver, driver->networks.objs[i]) < 0) {
                /* failed to add but already logged */
            }
1317 1318 1319 1320 1321
        }
        virNetworkObjUnlock(driver->networks.objs[i]);
    }
}

1322
/* Enable IP Forwarding. Return 0 for success, -1 for failure. */
1323
static int
1324
networkEnableIpForwarding(bool enableIPv4, bool enableIPv6)
1325
{
1326 1327 1328 1329 1330 1331
    int ret = 0;
    if (enableIPv4)
        ret = virFileWriteStr("/proc/sys/net/ipv4/ip_forward", "1\n", 0);
    if (enableIPv6 && ret == 0)
        ret = virFileWriteStr("/proc/sys/net/ipv6/conf/all/forwarding", "1\n", 0);
    return ret;
1332 1333
}

1334 1335
#define SYSCTL_PATH "/proc/sys"

1336 1337
static int
networkSetIPv6Sysctls(virNetworkObjPtr network)
1338 1339 1340 1341
{
    char *field = NULL;
    int ret = -1;

1342 1343 1344 1345 1346 1347 1348 1349 1350
    if (!virNetworkDefGetIpByIndex(network->def, AF_INET6, 0)) {
        /* Only set disable_ipv6 if there are no ipv6 addresses defined for
         * the network.
         */
        if (virAsprintf(&field, SYSCTL_PATH "/net/ipv6/conf/%s/disable_ipv6",
                        network->def->bridge) < 0) {
            virReportOOMError();
            goto cleanup;
        }
1351

1352 1353 1354 1355 1356 1357
        if (access(field, W_OK) < 0 && errno == ENOENT) {
            VIR_DEBUG("ipv6 appears to already be disabled on %s",
                      network->def->bridge);
            ret = 0;
            goto cleanup;
        }
1358

1359 1360 1361 1362 1363 1364 1365
        if (virFileWriteStr(field, "1", 0) < 0) {
            virReportSystemError(errno,
                                 _("cannot write to %s to disable IPv6 on bridge %s"),
                                 field, network->def->bridge);
            goto cleanup;
        }
        VIR_FREE(field);
1366 1367
    }

1368 1369 1370 1371 1372 1373 1374 1375 1376
    /* The rest of the ipv6 sysctl tunables should always be set,
     * whether or not we're using ipv6 on this bridge.
     */

    /* Prevent guests from hijacking the host network by sending out
     * their own router advertisements.
     */
    if (virAsprintf(&field, SYSCTL_PATH "/net/ipv6/conf/%s/accept_ra",
                    network->def->bridge) < 0) {
1377
        virReportOOMError();
1378 1379 1380
        goto cleanup;
    }

1381
    if (virFileWriteStr(field, "0", 0) < 0) {
1382
        virReportSystemError(errno,
1383 1384 1385 1386 1387
                             _("cannot disable %s"), field);
        goto cleanup;
    }
    VIR_FREE(field);

1388 1389 1390 1391 1392
    /* All interfaces used as a gateway (which is what this is, by
     * definition), must always have autoconf=0.
     */
    if (virAsprintf(&field, SYSCTL_PATH "/net/ipv6/conf/%s/autoconf",
                    network->def->bridge) < 0) {
1393
        virReportOOMError();
1394 1395 1396
        goto cleanup;
    }

1397
    if (virFileWriteStr(field, "1", 0) < 0) {
1398
        virReportSystemError(errno,
1399 1400 1401 1402 1403 1404 1405 1406 1407 1408
                             _("cannot enable %s"), field);
        goto cleanup;
    }

    ret = 0;
cleanup:
    VIR_FREE(field);
    return ret;
}

1409 1410 1411 1412 1413 1414
#define PROC_NET_ROUTE "/proc/net/route"

/* XXX: This function can be a lot more exhaustive, there are certainly
 *      other scenarios where we can ruin host network connectivity.
 * XXX: Using a proper library is preferred over parsing /proc
 */
1415 1416
static int
networkCheckRouteCollision(virNetworkObjPtr network)
1417
{
1418
    int ret = 0, len;
1419 1420 1421 1422 1423
    char *cur, *buf = NULL;
    enum {MAX_ROUTE_SIZE = 1024*64};

    /* Read whole routing table into memory */
    if ((len = virFileReadAll(PROC_NET_ROUTE, MAX_ROUTE_SIZE, &buf)) < 0)
1424
        goto out;
1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442

    /* Dropping the last character shouldn't hurt */
    if (len > 0)
        buf[len-1] = '\0';

    VIR_DEBUG("%s output:\n%s", PROC_NET_ROUTE, buf);

    if (!STRPREFIX (buf, "Iface"))
        goto out;

    /* First line is just headings, skip it */
    cur = strchr(buf, '\n');
    if (cur)
        cur++;

    while (cur) {
        char iface[17], dest[128], mask[128];
        unsigned int addr_val, mask_val;
1443 1444
        virNetworkIpDefPtr ipdef;
        int num, ii;
1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472

        /* NUL-terminate the line, so sscanf doesn't go beyond a newline.  */
        char *nl = strchr(cur, '\n');
        if (nl) {
            *nl++ = '\0';
        }

        num = sscanf(cur, "%16s %127s %*s %*s %*s %*s %*s %127s",
                     iface, dest, mask);
        cur = nl;

        if (num != 3) {
            VIR_DEBUG("Failed to parse %s", PROC_NET_ROUTE);
            continue;
        }

        if (virStrToLong_ui(dest, NULL, 16, &addr_val) < 0) {
            VIR_DEBUG("Failed to convert network address %s to uint", dest);
            continue;
        }

        if (virStrToLong_ui(mask, NULL, 16, &mask_val) < 0) {
            VIR_DEBUG("Failed to convert network mask %s to uint", mask);
            continue;
        }

        addr_val &= mask_val;

1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493 1494 1495 1496
        for (ii = 0;
             (ipdef = virNetworkDefGetIpByIndex(network->def, AF_INET, ii));
             ii++) {

            unsigned int net_dest;
            virSocketAddr netmask;

            if (virNetworkIpDefNetmask(ipdef, &netmask) < 0) {
                VIR_WARN("Failed to get netmask of '%s'",
                         network->def->bridge);
                continue;
            }

            net_dest = (ipdef->address.data.inet4.sin_addr.s_addr &
                        netmask.data.inet4.sin_addr.s_addr);

            if ((net_dest == addr_val) &&
                (netmask.data.inet4.sin_addr.s_addr == mask_val)) {
                networkReportError(VIR_ERR_INTERNAL_ERROR,
                                   _("Network is already in use by interface %s"),
                                   iface);
                ret = -1;
                goto out;
            }
1497 1498 1499 1500 1501 1502 1503 1504
        }
    }

out:
    VIR_FREE(buf);
    return ret;
}

1505 1506 1507 1508
static int
networkAddAddrToBridge(struct network_driver *driver,
                       virNetworkObjPtr network,
                       virNetworkIpDefPtr ipdef)
1509
{
1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534
    int prefix = virNetworkIpDefPrefix(ipdef);

    if (prefix < 0) {
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           _("bridge '%s' has an invalid netmask or IP address"),
                           network->def->bridge);
        return -1;
    }

    if (brAddInetAddress(driver->brctl, network->def->bridge,
                         &ipdef->address, prefix) < 0) {
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           _("cannot set IP address on bridge '%s'"),
                           network->def->bridge);
        return -1;
    }

    return 0;
}

static int
networkStartNetworkDaemon(struct network_driver *driver,
                          virNetworkObjPtr network)
{
    int ii, err;
1535
    bool v4present = false, v6present = false;
1536 1537
    virErrorPtr save_err = NULL;
    virNetworkIpDefPtr ipdef;
1538

D
Daniel P. Berrange 已提交
1539
    if (virNetworkObjIsActive(network)) {
1540 1541
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           "%s", _("network is already active"));
1542 1543 1544
        return -1;
    }

1545 1546
    /* Check to see if any network IP collides with an existing route */
    if (networkCheckRouteCollision(network) < 0)
1547 1548
        return -1;

1549
    /* Create and configure the bridge device */
1550
    if ((err = brAddBridge(driver->brctl, network->def->bridge))) {
1551
        virReportSystemError(err,
1552 1553
                             _("cannot create bridge '%s'"),
                             network->def->bridge);
1554 1555 1556
        return -1;
    }

1557
    /* Set bridge options */
1558 1559 1560 1561 1562
    if ((err = brSetForwardDelay(driver->brctl, network->def->bridge,
                                 network->def->delay))) {
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           _("cannot set forward delay on bridge '%s'"),
                           network->def->bridge);
1563
        goto err1;
1564 1565
    }

1566 1567
    if ((err = brSetEnableSTP(driver->brctl, network->def->bridge,
                              network->def->stp ? 1 : 0))) {
1568
        networkReportError(VIR_ERR_INTERNAL_ERROR,
1569 1570
                           _("cannot set STP '%s' on bridge '%s'"),
                           network->def->stp ? "on" : "off", network->def->bridge);
1571
        goto err1;
1572 1573
    }

1574 1575 1576 1577
    /* Disable IPv6 on the bridge if there are no IPv6 addresses
     * defined, and set other IPv6 sysctl tunables appropriately.
     */
    if (networkSetIPv6Sysctls(network) < 0)
1578
        goto err1;
1579

1580 1581 1582 1583 1584 1585 1586 1587 1588
    /* Add "once per network" rules */
    if (networkAddIptablesRules(driver, network) < 0)
        goto err1;

    for (ii = 0;
         (ipdef = virNetworkDefGetIpByIndex(network->def, AF_UNSPEC, ii));
         ii++) {
        if (VIR_SOCKET_IS_FAMILY(&ipdef->address, AF_INET))
            v4present = true;
1589 1590
        if (VIR_SOCKET_IS_FAMILY(&ipdef->address, AF_INET6))
            v6present = true;
1591

1592 1593 1594
        /* Add the IP address/netmask to the bridge */
        if (networkAddAddrToBridge(driver, network, ipdef) < 0) {
            goto err2;
1595
        }
1596 1597
    }

1598
    /* Bring up the bridge interface */
1599
    if ((err = brSetInterfaceUp(driver->brctl, network->def->bridge, 1))) {
1600
        virReportSystemError(err,
1601 1602
                             _("failed to bring the bridge '%s' up"),
                             network->def->bridge);
1603
        goto err2;
1604 1605
    }

1606
    /* If forwardType != NONE, turn on global IP forwarding */
1607
    if (network->def->forwardType != VIR_NETWORK_FORWARD_NONE &&
1608
        networkEnableIpForwarding(v4present, v6present) < 0) {
1609
        virReportSystemError(errno, "%s",
1610
                             _("failed to enable IP forwarding"));
1611
        goto err3;
1612 1613
    }

1614 1615 1616 1617

    /* start dnsmasq if there are any IPv4 addresses */
    if (v4present && networkStartDhcpDaemon(network) < 0)
        goto err3;
1618

1619 1620 1621 1622
    /* start radvd if there are any ipv6 addresses */
    if (v6present && networkStartRadvd(network) < 0)
        goto err4;

1623
    /* Persist the live configuration now we have bridge info  */
1624
    if (virNetworkSaveConfig(NETWORK_STATE_DIR, network->def) < 0) {
1625
        goto err5;
1626 1627
    }

1628 1629 1630 1631
    network->active = 1;

    return 0;

1632 1633 1634 1635 1636 1637 1638 1639 1640
 err5:
    if (!save_err)
        save_err = virSaveLastError();

    if (network->radvdPid > 0) {
        kill(network->radvdPid, SIGTERM);
        network->radvdPid = -1;
    }

1641 1642 1643 1644
 err4:
    if (!save_err)
        save_err = virSaveLastError();

1645 1646 1647 1648 1649
    if (network->dnsmasqPid > 0) {
        kill(network->dnsmasqPid, SIGTERM);
        network->dnsmasqPid = -1;
    }

1650 1651 1652
 err3:
    if (!save_err)
        save_err = virSaveLastError();
1653
    if ((err = brSetInterfaceUp(driver->brctl, network->def->bridge, 0))) {
1654
        char ebuf[1024];
1655
        VIR_WARN("Failed to bring down bridge '%s' : %s",
1656
                 network->def->bridge, virStrerror(err, ebuf, sizeof ebuf));
1657 1658
    }

1659 1660 1661 1662 1663 1664 1665 1666
 err2:
    if (!save_err)
        save_err = virSaveLastError();
    networkRemoveIptablesRules(driver, network);

 err1:
    if (!save_err)
        save_err = virSaveLastError();
1667
    if ((err = brDeleteBridge(driver->brctl, network->def->bridge))) {
1668
        char ebuf[1024];
1669
        VIR_WARN("Failed to delete bridge '%s' : %s",
1670
                 network->def->bridge, virStrerror(err, ebuf, sizeof ebuf));
1671 1672
    }

1673 1674 1675 1676
    if (save_err) {
        virSetError(save_err);
        virFreeError(save_err);
    }
1677 1678 1679 1680
    return -1;
}


1681 1682 1683
static int networkShutdownNetworkDaemon(struct network_driver *driver,
                                        virNetworkObjPtr network)
{
1684
    int err;
1685
    char *stateFile;
1686

1687
    VIR_INFO(_("Shutting down network '%s'"), network->def->name);
1688

D
Daniel P. Berrange 已提交
1689
    if (!virNetworkObjIsActive(network))
1690 1691
        return 0;

1692
    stateFile = virNetworkConfigFile(NETWORK_STATE_DIR, network->def->name);
1693 1694 1695 1696 1697 1698
    if (!stateFile)
        return -1;

    unlink(stateFile);
    VIR_FREE(stateFile);

1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711
    if (network->radvdPid > 0) {
        char *radvdpidbase;

        kill(network->radvdPid, SIGTERM);
        /* attempt to delete the pidfile we created */
        if (!(radvdpidbase = networkRadvdPidfileBasename(network->def->name))) {
            virReportOOMError();
        } else {
            virFileDeletePid(NETWORK_PID_DIR, radvdpidbase);
            VIR_FREE(radvdpidbase);
        }
    }

1712 1713 1714
    if (network->dnsmasqPid > 0)
        kill(network->dnsmasqPid, SIGTERM);

1715
    char ebuf[1024];
1716
    if ((err = brSetInterfaceUp(driver->brctl, network->def->bridge, 0))) {
1717
        VIR_WARN("Failed to bring down bridge '%s' : %s",
1718
                 network->def->bridge, virStrerror(err, ebuf, sizeof ebuf));
1719 1720
    }

1721 1722
    networkRemoveIptablesRules(driver, network);

1723
    if ((err = brDeleteBridge(driver->brctl, network->def->bridge))) {
1724
        VIR_WARN("Failed to delete bridge '%s' : %s",
1725
                 network->def->bridge, virStrerror(err, ebuf, sizeof ebuf));
1726 1727
    }

1728
    /* See if its still alive and really really kill it */
1729
    if (network->dnsmasqPid > 0 &&
1730
        (kill(network->dnsmasqPid, 0) == 0))
1731 1732
        kill(network->dnsmasqPid, SIGKILL);
    network->dnsmasqPid = -1;
1733 1734 1735 1736 1737 1738

    if (network->radvdPid > 0 &&
        (kill(network->radvdPid, 0) == 0))
        kill(network->radvdPid, SIGKILL);
    network->radvdPid = -1;

1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750
    network->active = 0;

    if (network->newDef) {
        virNetworkDefFree(network->def);
        network->def = network->newDef;
        network->newDef = NULL;
    }

    return 0;
}


1751 1752 1753 1754 1755
static virNetworkPtr networkLookupByUUID(virConnectPtr conn,
                                         const unsigned char *uuid) {
    struct network_driver *driver = conn->networkPrivateData;
    virNetworkObjPtr network;
    virNetworkPtr ret = NULL;
1756

1757
    networkDriverLock(driver);
1758
    network = virNetworkFindByUUID(&driver->networks, uuid);
1759
    networkDriverUnlock(driver);
1760
    if (!network) {
1761 1762
        networkReportError(VIR_ERR_NO_NETWORK,
                           "%s", _("no network with matching uuid"));
1763
        goto cleanup;
1764 1765
    }

1766 1767 1768
    ret = virGetNetwork(conn, network->def->name, network->def->uuid);

cleanup:
1769 1770
    if (network)
        virNetworkObjUnlock(network);
1771
    return ret;
1772 1773
}

1774 1775 1776 1777 1778 1779
static virNetworkPtr networkLookupByName(virConnectPtr conn,
                                         const char *name) {
    struct network_driver *driver = conn->networkPrivateData;
    virNetworkObjPtr network;
    virNetworkPtr ret = NULL;

1780
    networkDriverLock(driver);
1781
    network = virNetworkFindByName(&driver->networks, name);
1782
    networkDriverUnlock(driver);
1783
    if (!network) {
1784 1785
        networkReportError(VIR_ERR_NO_NETWORK,
                           _("no network with matching name '%s'"), name);
1786
        goto cleanup;
1787 1788
    }

1789 1790 1791
    ret = virGetNetwork(conn, network->def->name, network->def->uuid);

cleanup:
1792 1793
    if (network)
        virNetworkObjUnlock(network);
1794
    return ret;
1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812
}

static virDrvOpenStatus networkOpenNetwork(virConnectPtr conn,
                                           virConnectAuthPtr auth ATTRIBUTE_UNUSED,
                                           int flags ATTRIBUTE_UNUSED) {
    if (!driverState)
        return VIR_DRV_OPEN_DECLINED;

    conn->networkPrivateData = driverState;
    return VIR_DRV_OPEN_SUCCESS;
}

static int networkCloseNetwork(virConnectPtr conn) {
    conn->networkPrivateData = NULL;
    return 0;
}

static int networkNumNetworks(virConnectPtr conn) {
1813
    int nactive = 0, i;
1814
    struct network_driver *driver = conn->networkPrivateData;
1815

1816 1817 1818
    networkDriverLock(driver);
    for (i = 0 ; i < driver->networks.count ; i++) {
        virNetworkObjLock(driver->networks.objs[i]);
D
Daniel P. Berrange 已提交
1819
        if (virNetworkObjIsActive(driver->networks.objs[i]))
1820
            nactive++;
1821 1822 1823
        virNetworkObjUnlock(driver->networks.objs[i]);
    }
    networkDriverUnlock(driver);
1824

1825 1826 1827 1828
    return nactive;
}

static int networkListNetworks(virConnectPtr conn, char **const names, int nnames) {
1829
    struct network_driver *driver = conn->networkPrivateData;
1830
    int got = 0, i;
1831

1832
    networkDriverLock(driver);
1833
    for (i = 0 ; i < driver->networks.count && got < nnames ; i++) {
1834
        virNetworkObjLock(driver->networks.objs[i]);
D
Daniel P. Berrange 已提交
1835
        if (virNetworkObjIsActive(driver->networks.objs[i])) {
1836
            if (!(names[got] = strdup(driver->networks.objs[i]->def->name))) {
1837
                virNetworkObjUnlock(driver->networks.objs[i]);
1838
                virReportOOMError();
1839 1840 1841 1842
                goto cleanup;
            }
            got++;
        }
1843
        virNetworkObjUnlock(driver->networks.objs[i]);
1844
    }
1845 1846
    networkDriverUnlock(driver);

1847 1848 1849
    return got;

 cleanup:
1850
    networkDriverUnlock(driver);
1851 1852 1853 1854 1855 1856
    for (i = 0 ; i < got ; i++)
        VIR_FREE(names[i]);
    return -1;
}

static int networkNumDefinedNetworks(virConnectPtr conn) {
1857
    int ninactive = 0, i;
1858
    struct network_driver *driver = conn->networkPrivateData;
1859

1860 1861 1862
    networkDriverLock(driver);
    for (i = 0 ; i < driver->networks.count ; i++) {
        virNetworkObjLock(driver->networks.objs[i]);
D
Daniel P. Berrange 已提交
1863
        if (!virNetworkObjIsActive(driver->networks.objs[i]))
1864
            ninactive++;
1865 1866 1867
        virNetworkObjUnlock(driver->networks.objs[i]);
    }
    networkDriverUnlock(driver);
1868

1869 1870 1871 1872
    return ninactive;
}

static int networkListDefinedNetworks(virConnectPtr conn, char **const names, int nnames) {
1873
    struct network_driver *driver = conn->networkPrivateData;
1874
    int got = 0, i;
1875

1876
    networkDriverLock(driver);
1877
    for (i = 0 ; i < driver->networks.count && got < nnames ; i++) {
1878
        virNetworkObjLock(driver->networks.objs[i]);
D
Daniel P. Berrange 已提交
1879
        if (!virNetworkObjIsActive(driver->networks.objs[i])) {
1880
            if (!(names[got] = strdup(driver->networks.objs[i]->def->name))) {
1881
                virNetworkObjUnlock(driver->networks.objs[i]);
1882
                virReportOOMError();
1883 1884 1885 1886
                goto cleanup;
            }
            got++;
        }
1887
        virNetworkObjUnlock(driver->networks.objs[i]);
1888
    }
1889
    networkDriverUnlock(driver);
1890 1891 1892
    return got;

 cleanup:
1893
    networkDriverUnlock(driver);
1894 1895 1896 1897 1898
    for (i = 0 ; i < got ; i++)
        VIR_FREE(names[i]);
    return -1;
}

1899 1900 1901

static int networkIsActive(virNetworkPtr net)
{
1902
    struct network_driver *driver = net->conn->networkPrivateData;
1903 1904 1905 1906 1907 1908 1909
    virNetworkObjPtr obj;
    int ret = -1;

    networkDriverLock(driver);
    obj = virNetworkFindByUUID(&driver->networks, net->uuid);
    networkDriverUnlock(driver);
    if (!obj) {
1910
        networkReportError(VIR_ERR_NO_NETWORK, NULL);
1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922
        goto cleanup;
    }
    ret = virNetworkObjIsActive(obj);

cleanup:
    if (obj)
        virNetworkObjUnlock(obj);
    return ret;
}

static int networkIsPersistent(virNetworkPtr net)
{
1923
    struct network_driver *driver = net->conn->networkPrivateData;
1924 1925 1926 1927 1928 1929 1930
    virNetworkObjPtr obj;
    int ret = -1;

    networkDriverLock(driver);
    obj = virNetworkFindByUUID(&driver->networks, net->uuid);
    networkDriverUnlock(driver);
    if (!obj) {
1931
        networkReportError(VIR_ERR_NO_NETWORK, NULL);
1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942
        goto cleanup;
    }
    ret = obj->persistent;

cleanup:
    if (obj)
        virNetworkObjUnlock(obj);
    return ret;
}


1943
static virNetworkPtr networkCreate(virConnectPtr conn, const char *xml) {
1944
    struct network_driver *driver = conn->networkPrivateData;
1945
    virNetworkDefPtr def;
1946
    virNetworkObjPtr network = NULL;
1947
    virNetworkPtr ret = NULL;
1948

1949 1950
    networkDriverLock(driver);

1951
    if (!(def = virNetworkDefParseString(xml)))
1952
        goto cleanup;
1953

1954 1955 1956
    if (virNetworkObjIsDuplicate(&driver->networks, def, 1) < 0)
        goto cleanup;

1957
    if (virNetworkSetBridgeName(&driver->networks, def, 1))
1958 1959
        goto cleanup;

1960
    if (!(network = virNetworkAssignDef(&driver->networks,
1961 1962 1963
                                        def)))
        goto cleanup;
    def = NULL;
1964

1965
    if (networkStartNetworkDaemon(driver, network) < 0) {
1966 1967
        virNetworkRemoveInactive(&driver->networks,
                                 network);
1968
        network = NULL;
1969
        goto cleanup;
1970 1971
    }

1972 1973 1974 1975
    ret = virGetNetwork(conn, network->def->name, network->def->uuid);

cleanup:
    virNetworkDefFree(def);
1976 1977 1978
    if (network)
        virNetworkObjUnlock(network);
    networkDriverUnlock(driver);
1979
    return ret;
1980 1981 1982
}

static virNetworkPtr networkDefine(virConnectPtr conn, const char *xml) {
1983
    struct network_driver *driver = conn->networkPrivateData;
1984
    virNetworkIpDefPtr ipdef, ipv4def = NULL;
1985
    virNetworkDefPtr def;
1986
    virNetworkObjPtr network = NULL;
1987
    virNetworkPtr ret = NULL;
1988
    int ii;
1989

1990 1991
    networkDriverLock(driver);

1992
    if (!(def = virNetworkDefParseString(xml)))
1993
        goto cleanup;
1994

E
Eric Blake 已提交
1995
    if (virNetworkObjIsDuplicate(&driver->networks, def, 0) < 0)
1996 1997
        goto cleanup;

1998
    if (virNetworkSetBridgeName(&driver->networks, def, 1))
1999 2000
        goto cleanup;

2001
    if (!(network = virNetworkAssignDef(&driver->networks,
2002 2003 2004
                                        def)))
        goto cleanup;
    def = NULL;
2005

2006 2007
    network->persistent = 1;

2008
    if (virNetworkSaveConfig(driver->networkConfigDir,
2009
                             network->newDef ? network->newDef : network->def) < 0) {
2010 2011
        virNetworkRemoveInactive(&driver->networks,
                                 network);
2012
        network = NULL;
2013
        goto cleanup;
2014 2015
    }

2016
    /* We only support dhcp on one IPv4 address per defined network */
2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 2027 2028 2029 2030 2031 2032
    for (ii = 0;
         (ipdef = virNetworkDefGetIpByIndex(network->def, AF_UNSPEC, ii));
         ii++) {
        if (VIR_SOCKET_IS_FAMILY(&ipdef->address, AF_INET)) {
            if (ipdef->nranges || ipdef->nhosts) {
                if (ipv4def) {
                    networkReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                                       "%s", _("Multiple dhcp sections found. dhcp is supported only for a single IPv4 address on each network"));
                    goto cleanup;
                } else {
                    ipv4def = ipdef;
                }
            }
        }
    }
    if (ipv4def) {
2033 2034 2035 2036
        dnsmasqContext *dctx = dnsmasqContextNew(network->def->name, DNSMASQ_STATE_DIR);
        if (dctx == NULL)
            goto cleanup;

2037
        networkSaveDnsmasqHostsfile(ipv4def, dctx, true);
2038 2039 2040
        dnsmasqContextFree(dctx);
    }

2041 2042 2043 2044
    ret = virGetNetwork(conn, network->def->name, network->def->uuid);

cleanup:
    virNetworkDefFree(def);
2045 2046 2047
    if (network)
        virNetworkObjUnlock(network);
    networkDriverUnlock(driver);
2048
    return ret;
2049 2050 2051
}

static int networkUndefine(virNetworkPtr net) {
2052
    struct network_driver *driver = net->conn->networkPrivateData;
2053
    virNetworkObjPtr network;
2054 2055
    virNetworkIpDefPtr ipdef;
    bool dhcp_present = false, v6present = false;
2056
    int ret = -1, ii;
2057

2058 2059
    networkDriverLock(driver);

2060
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
2061
    if (!network) {
2062
        networkReportError(VIR_ERR_INVALID_NETWORK,
2063 2064
                           "%s", _("no network with matching uuid"));
        goto cleanup;
2065 2066
    }

D
Daniel P. Berrange 已提交
2067
    if (virNetworkObjIsActive(network)) {
2068
        networkReportError(VIR_ERR_INTERNAL_ERROR,
2069 2070
                           "%s", _("network is still active"));
        goto cleanup;
2071 2072
    }

2073
    if (virNetworkDeleteConfig(driver->networkConfigDir,
2074 2075
                               driver->networkAutostartDir,
                               network) < 0)
2076
        goto cleanup;
2077

2078 2079
    /* we only support dhcp on one IPv4 address per defined network */
    for (ii = 0;
2080
         (ipdef = virNetworkDefGetIpByIndex(network->def, AF_UNSPEC, ii));
2081
         ii++) {
2082 2083 2084 2085 2086 2087
        if (VIR_SOCKET_IS_FAMILY(&ipdef->address, AF_INET)) {
            if (ipdef->nranges || ipdef->nhosts)
                dhcp_present = true;
        } else if (VIR_SOCKET_IS_FAMILY(&ipdef->address, AF_INET6)) {
            v6present = true;
        }
2088
    }
2089 2090

    if (dhcp_present) {
2091 2092 2093 2094 2095 2096 2097 2098
        dnsmasqContext *dctx = dnsmasqContextNew(network->def->name, DNSMASQ_STATE_DIR);
        if (dctx == NULL)
            goto cleanup;

        dnsmasqDelete(dctx);
        dnsmasqContextFree(dctx);
    }

2099 2100 2101 2102 2103 2104 2105 2106 2107 2108 2109 2110 2111 2112 2113 2114 2115 2116 2117 2118 2119
    if (v6present) {
        char *configfile = networkRadvdConfigFileName(network->def->name);

        if (!configfile) {
            virReportOOMError();
            goto cleanup;
        }
        unlink(configfile);
        VIR_FREE(configfile);

        char *radvdpidbase = networkRadvdPidfileBasename(network->def->name);

        if (!(radvdpidbase)) {
            virReportOOMError();
            goto cleanup;
        }
        virFileDeletePid(NETWORK_PID_DIR, radvdpidbase);
        VIR_FREE(radvdpidbase);

    }

2120 2121
    virNetworkRemoveInactive(&driver->networks,
                             network);
2122
    network = NULL;
2123
    ret = 0;
2124

2125
cleanup:
2126 2127 2128
    if (network)
        virNetworkObjUnlock(network);
    networkDriverUnlock(driver);
2129
    return ret;
2130 2131 2132
}

static int networkStart(virNetworkPtr net) {
2133 2134 2135
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    int ret = -1;
2136

2137
    networkDriverLock(driver);
2138
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
2139

2140
    if (!network) {
2141
        networkReportError(VIR_ERR_INVALID_NETWORK,
2142 2143
                           "%s", _("no network with matching uuid"));
        goto cleanup;
2144 2145
    }

2146
    ret = networkStartNetworkDaemon(driver, network);
2147 2148

cleanup:
2149 2150
    if (network)
        virNetworkObjUnlock(network);
2151
    networkDriverUnlock(driver);
2152
    return ret;
2153 2154 2155
}

static int networkDestroy(virNetworkPtr net) {
2156 2157 2158
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    int ret = -1;
2159

2160
    networkDriverLock(driver);
2161
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
2162

2163
    if (!network) {
2164
        networkReportError(VIR_ERR_INVALID_NETWORK,
2165 2166
                           "%s", _("no network with matching uuid"));
        goto cleanup;
2167 2168
    }

D
Daniel P. Berrange 已提交
2169
    if (!virNetworkObjIsActive(network)) {
2170
        networkReportError(VIR_ERR_INTERNAL_ERROR,
2171 2172 2173 2174
                           "%s", _("network is not active"));
        goto cleanup;
    }

2175
    ret = networkShutdownNetworkDaemon(driver, network);
2176
    if (!network->persistent) {
2177 2178 2179 2180
        virNetworkRemoveInactive(&driver->networks,
                                 network);
        network = NULL;
    }
2181

2182
cleanup:
2183 2184
    if (network)
        virNetworkObjUnlock(network);
2185
    networkDriverUnlock(driver);
2186 2187 2188 2189
    return ret;
}

static char *networkDumpXML(virNetworkPtr net, int flags ATTRIBUTE_UNUSED) {
2190 2191 2192
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    char *ret = NULL;
2193

2194
    networkDriverLock(driver);
2195
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
2196 2197
    networkDriverUnlock(driver);

2198
    if (!network) {
2199
        networkReportError(VIR_ERR_INVALID_NETWORK,
2200 2201
                           "%s", _("no network with matching uuid"));
        goto cleanup;
2202 2203
    }

2204
    ret = virNetworkDefFormat(network->def);
2205 2206

cleanup:
2207 2208
    if (network)
        virNetworkObjUnlock(network);
2209
    return ret;
2210 2211 2212
}

static char *networkGetBridgeName(virNetworkPtr net) {
2213 2214 2215 2216
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    char *bridge = NULL;

2217
    networkDriverLock(driver);
2218
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
2219 2220
    networkDriverUnlock(driver);

2221
    if (!network) {
2222
        networkReportError(VIR_ERR_INVALID_NETWORK,
2223 2224
                           "%s", _("no network with matching id"));
        goto cleanup;
2225 2226
    }

2227
    if (!(network->def->bridge)) {
2228
        networkReportError(VIR_ERR_INTERNAL_ERROR,
2229 2230 2231 2232 2233
                           _("network '%s' does not have a bridge name."),
                           network->def->name);
        goto cleanup;
    }

2234
    bridge = strdup(network->def->bridge);
2235
    if (!bridge)
2236
        virReportOOMError();
2237 2238

cleanup:
2239 2240
    if (network)
        virNetworkObjUnlock(network);
2241 2242 2243 2244 2245
    return bridge;
}

static int networkGetAutostart(virNetworkPtr net,
                             int *autostart) {
2246 2247 2248
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    int ret = -1;
2249

2250
    networkDriverLock(driver);
2251
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
2252
    networkDriverUnlock(driver);
2253
    if (!network) {
2254 2255
        networkReportError(VIR_ERR_INVALID_NETWORK,
                           "%s", _("no network with matching uuid"));
2256
        goto cleanup;
2257 2258 2259
    }

    *autostart = network->autostart;
2260
    ret = 0;
2261

2262
cleanup:
2263 2264
    if (network)
        virNetworkObjUnlock(network);
2265
    return ret;
2266 2267 2268
}

static int networkSetAutostart(virNetworkPtr net,
2269
                               int autostart) {
2270 2271
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
2272
    char *configFile = NULL, *autostartLink = NULL;
2273
    int ret = -1;
2274

2275
    networkDriverLock(driver);
2276
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
2277

2278
    if (!network) {
2279 2280
        networkReportError(VIR_ERR_INVALID_NETWORK,
                           "%s", _("no network with matching uuid"));
2281
        goto cleanup;
2282 2283
    }

2284
    if (!network->persistent) {
2285 2286
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           "%s", _("cannot set autostart for transient network"));
2287 2288 2289
        goto cleanup;
    }

2290 2291
    autostart = (autostart != 0);

2292
    if (network->autostart != autostart) {
2293
        if ((configFile = virNetworkConfigFile(driver->networkConfigDir, network->def->name)) == NULL)
2294
            goto cleanup;
2295
        if ((autostartLink = virNetworkConfigFile(driver->networkAutostartDir, network->def->name)) == NULL)
2296 2297
            goto cleanup;

2298
        if (autostart) {
2299
            if (virFileMakePath(driver->networkAutostartDir)) {
2300
                virReportSystemError(errno,
2301 2302
                                     _("cannot create autostart directory '%s'"),
                                     driver->networkAutostartDir);
2303 2304
                goto cleanup;
            }
2305

2306
            if (symlink(configFile, autostartLink) < 0) {
2307
                virReportSystemError(errno,
2308
                                     _("Failed to create symlink '%s' to '%s'"),
2309
                                     autostartLink, configFile);
2310 2311 2312
                goto cleanup;
            }
        } else {
2313
            if (unlink(autostartLink) < 0 && errno != ENOENT && errno != ENOTDIR) {
2314
                virReportSystemError(errno,
2315
                                     _("Failed to delete symlink '%s'"),
2316
                                     autostartLink);
2317 2318
                goto cleanup;
            }
2319 2320
        }

2321
        network->autostart = autostart;
2322
    }
2323
    ret = 0;
2324

2325
cleanup:
2326 2327
    VIR_FREE(configFile);
    VIR_FREE(autostartLink);
2328 2329
    if (network)
        virNetworkObjUnlock(network);
2330
    networkDriverUnlock(driver);
2331
    return ret;
2332 2333 2334 2335 2336 2337 2338 2339 2340 2341 2342 2343 2344 2345 2346 2347 2348 2349 2350 2351 2352 2353
}


static virNetworkDriver networkDriver = {
    "Network",
    networkOpenNetwork, /* open */
    networkCloseNetwork, /* close */
    networkNumNetworks, /* numOfNetworks */
    networkListNetworks, /* listNetworks */
    networkNumDefinedNetworks, /* numOfDefinedNetworks */
    networkListDefinedNetworks, /* listDefinedNetworks */
    networkLookupByUUID, /* networkLookupByUUID */
    networkLookupByName, /* networkLookupByName */
    networkCreate, /* networkCreateXML */
    networkDefine, /* networkDefineXML */
    networkUndefine, /* networkUndefine */
    networkStart, /* networkCreate */
    networkDestroy, /* networkDestroy */
    networkDumpXML, /* networkDumpXML */
    networkGetBridgeName, /* networkGetBridgeName */
    networkGetAutostart, /* networkGetAutostart */
    networkSetAutostart, /* networkSetAutostart */
2354 2355
    networkIsActive,
    networkIsPersistent,
2356 2357 2358
};

static virStateDriver networkStateDriver = {
2359
    "Network",
2360 2361 2362 2363 2364 2365 2366 2367 2368 2369 2370
    networkStartup,
    networkShutdown,
    networkReload,
    networkActive,
};

int networkRegister(void) {
    virRegisterNetworkDriver(&networkDriver);
    virRegisterStateDriver(&networkStateDriver);
    return 0;
}