bridge_driver.c 182.7 KB
Newer Older
1
/*
2
 * bridge_driver.c: core driver methods for managing network
3
 *
4
 * Copyright (C) 2006-2016 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16 17
 * Copyright (C) 2006 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
18
 * License along with this library.  If not, see
O
Osier Yang 已提交
19
 * <http://www.gnu.org/licenses/>.
20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 */

#include <config.h>

#include <sys/types.h>
#include <sys/poll.h>
#include <limits.h>
#include <string.h>
#include <stdio.h>
#include <stdarg.h>
#include <stdlib.h>
#include <unistd.h>
#include <errno.h>
#include <sys/utsname.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <signal.h>
#include <pwd.h>
#include <sys/wait.h>
#include <sys/ioctl.h>
42
#include <net/if.h>
43
#include <dirent.h>
44 45 46
#if HAVE_SYS_SYSCTL_H
# include <sys/sysctl.h>
#endif
47

48
#include "virerror.h"
49
#include "datatypes.h"
50
#include "bridge_driver.h"
51
#include "bridge_driver_platform.h"
52
#include "network_conf.h"
53
#include "device_conf.h"
54
#include "driver.h"
55
#include "virbuffer.h"
56
#include "virpidfile.h"
57
#include "vircommand.h"
58
#include "viralloc.h"
59
#include "viruuid.h"
60
#include "viriptables.h"
61
#include "virlog.h"
62
#include "virdnsmasq.h"
63
#include "configmake.h"
64
#include "virnetdev.h"
65
#include "virnetdevip.h"
66 67
#include "virnetdevbridge.h"
#include "virnetdevtap.h"
68
#include "virnetdevvportprofile.h"
69
#include "virpci.h"
70
#include "virdbus.h"
71
#include "virfile.h"
72
#include "virstring.h"
73
#include "viraccessapicheck.h"
74
#include "network_event.h"
75
#include "virhook.h"
76
#include "virjson.h"
77

78
#define VIR_FROM_THIS VIR_FROM_NETWORK
79
#define MAX_BRIDGE_ID 256
80

81 82 83 84 85 86 87
/**
 * VIR_NETWORK_DHCP_LEASE_FILE_SIZE_MAX:
 *
 * Macro providing the upper limit on the size of leases file
 */
#define VIR_NETWORK_DHCP_LEASE_FILE_SIZE_MAX (32 * 1024 * 1024)

88 89
#define SYSCTL_PATH "/proc/sys"

90 91
VIR_LOG_INIT("network.bridge_driver");

92
static virNetworkDriverStatePtr network_driver;
93

94 95 96 97 98 99 100 101
static virNetworkDriverStatePtr
networkGetDriver(void)
{
    /* Maybe one day we can store @network_driver in the
     * connection object, but until then, it's just a global
     * variable which is returned. */
    return network_driver;
}
102

103
static void networkDriverLock(virNetworkDriverStatePtr driver)
104
{
105
    virMutexLock(&driver->lock);
106
}
107
static void networkDriverUnlock(virNetworkDriverStatePtr driver)
108
{
109
    virMutexUnlock(&driver->lock);
110 111
}

112 113 114 115
static dnsmasqCapsPtr
networkGetDnsmasqCaps(virNetworkDriverStatePtr driver)
{
    dnsmasqCapsPtr ret;
116
    networkDriverLock(driver);
117
    ret = virObjectRef(driver->dnsmasqCaps);
118
    networkDriverUnlock(driver);
119 120 121 122 123 124 125 126 127 128 129
    return ret;
}

static int
networkDnsmasqCapsRefresh(virNetworkDriverStatePtr driver)
{
    dnsmasqCapsPtr caps;

    if (!(caps = dnsmasqCapsNewFromBinary(DNSMASQ)))
        return -1;

130
    networkDriverLock(driver);
131 132
    virObjectUnref(driver->dnsmasqCaps);
    driver->dnsmasqCaps = caps;
133
    networkDriverUnlock(driver);
134 135 136
    return 0;
}

137
static int networkStateCleanup(void);
138

139 140
static int networkStartNetwork(virNetworkDriverStatePtr driver,
                               virNetworkObjPtr network);
141

142 143
static int networkShutdownNetwork(virNetworkDriverStatePtr driver,
                                  virNetworkObjPtr network);
144

145 146
static int networkStartNetworkVirtual(virNetworkDriverStatePtr driver,
                                      virNetworkObjPtr network);
147

148 149
static int networkShutdownNetworkVirtual(virNetworkDriverStatePtr driver,
                                         virNetworkObjPtr network);
150

151
static int networkStartNetworkExternal(virNetworkObjPtr network);
152

153
static int networkShutdownNetworkExternal(virNetworkObjPtr network);
154

155 156
static void networkReloadFirewallRules(virNetworkDriverStatePtr driver);
static void networkRefreshDaemons(virNetworkDriverStatePtr driver);
157

158 159 160 161 162
static int networkPlugBandwidth(virNetworkObjPtr net,
                                virDomainNetDefPtr iface);
static int networkUnplugBandwidth(virNetworkObjPtr net,
                                  virDomainNetDefPtr iface);

163
static void networkNetworkObjTaint(virNetworkObjPtr net,
164
                                   virNetworkTaintFlags taint);
165

166 167 168
static virNetworkObjPtr
networkObjFromNetwork(virNetworkPtr net)
{
169
    virNetworkDriverStatePtr driver = networkGetDriver();
170 171 172
    virNetworkObjPtr network;
    char uuidstr[VIR_UUID_STRING_BUFLEN];

173
    network = virNetworkObjFindByUUID(driver->networks, net->uuid);
174 175 176 177 178 179 180 181 182 183
    if (!network) {
        virUUIDFormat(net->uuid, uuidstr);
        virReportError(VIR_ERR_NO_NETWORK,
                       _("no network with matching uuid '%s' (%s)"),
                       uuidstr, net->name);
    }

    return network;
}

184 185 186
static int
networkRunHook(virNetworkObjPtr network,
               virDomainDefPtr dom,
187
               virDomainNetDefPtr iface,
188 189 190 191 192 193 194 195 196
               int op,
               int sub_op)
{
    virBuffer buf = VIR_BUFFER_INITIALIZER;
    char *xml = NULL, *net_xml = NULL, *dom_xml = NULL;
    int hookret;
    int ret = -1;

    if (virHookPresent(VIR_HOOK_DRIVER_NETWORK)) {
197 198 199 200 201 202
        if (!network) {
            VIR_DEBUG("Not running hook as @network is NULL");
            ret = 0;
            goto cleanup;
        }

203 204
        virBufferAddLit(&buf, "<hookData>\n");
        virBufferAdjustIndent(&buf, 2);
205
        if (iface && virDomainNetDefFormat(&buf, iface, NULL, 0) < 0)
206
            goto cleanup;
207 208
        if (virNetworkDefFormatBuf(&buf, network->def, 0) < 0)
            goto cleanup;
209
        if (dom && virDomainDefFormatInternal(dom, NULL, 0, &buf) < 0)
210 211 212 213 214
            goto cleanup;

        virBufferAdjustIndent(&buf, -2);
        virBufferAddLit(&buf, "</hookData>");

215
        if (virBufferCheckError(&buf) < 0)
216 217
            goto cleanup;

218
        xml = virBufferContentAndReset(&buf);
219 220 221 222 223 224 225 226
        hookret = virHookCall(VIR_HOOK_DRIVER_NETWORK, network->def->name,
                              op, sub_op, NULL, xml, NULL);

        /*
         * If the script raised an error, pass it to the callee.
         */
        if (hookret < 0)
            goto cleanup;
227 228

        networkNetworkObjTaint(network, VIR_NETWORK_TAINT_HOOK);
229 230 231
    }

    ret = 0;
232
 cleanup:
233 234 235 236 237 238 239
    virBufferFreeAndReset(&buf);
    VIR_FREE(xml);
    VIR_FREE(net_xml);
    VIR_FREE(dom_xml);
    return ret;
}

240
static char *
241 242
networkDnsmasqLeaseFileNameDefault(virNetworkDriverStatePtr driver,
                                   const char *netname)
243 244 245
{
    char *leasefile;

246
    ignore_value(virAsprintf(&leasefile, "%s/%s.leases",
247
                             driver->dnsmasqStateDir, netname));
248 249 250
    return leasefile;
}

251
static char *
252 253
networkDnsmasqLeaseFileNameCustom(virNetworkDriverStatePtr driver,
                                  const char *bridge)
254 255 256 257
{
    char *leasefile;

    ignore_value(virAsprintf(&leasefile, "%s/%s.status",
258
                             driver->dnsmasqStateDir, bridge));
259 260 261
    return leasefile;
}

262
static char *
263 264
networkDnsmasqConfigFileName(virNetworkDriverStatePtr driver,
                             const char *netname)
265 266 267
{
    char *conffile;

268
    ignore_value(virAsprintf(&conffile, "%s/%s.conf",
269
                             driver->dnsmasqStateDir, netname));
270 271 272
    return conffile;
}

273 274 275 276 277 278
static char *
networkRadvdPidfileBasename(const char *netname)
{
    /* this is simple but we want to be sure it's consistently done */
    char *pidfilebase;

279
    ignore_value(virAsprintf(&pidfilebase, "%s-radvd", netname));
280 281 282 283
    return pidfilebase;
}

static char *
284 285
networkRadvdConfigFileName(virNetworkDriverStatePtr driver,
                           const char *netname)
286 287 288
{
    char *configfile;

289
    ignore_value(virAsprintf(&configfile, "%s/%s-radvd.conf",
290
                             driver->radvdStateDir, netname));
291 292
    return configfile;
}
293

M
Michal Privoznik 已提交
294 295 296 297 298 299 300 301 302 303 304
static char *
networkMacMgrFileName(virNetworkDriverStatePtr driver,
                      const char *bridge)
{
    char *filename;

    ignore_value(virAsprintf(&filename, "%s/%s.macs",
                             driver->dnsmasqStateDir, bridge));
    return filename;
}

305 306
/* do needed cleanup steps and remove the network from the list */
static int
307 308
networkRemoveInactive(virNetworkDriverStatePtr driver,
                      virNetworkObjPtr net)
309 310
{
    char *leasefile = NULL;
311
    char *customleasefile = NULL;
312
    char *radvdconfigfile = NULL;
313
    char *configfile = NULL;
314
    char *radvdpidbase = NULL;
315
    char *statusfile = NULL;
M
Michal Privoznik 已提交
316
    char *macMapFile = NULL;
317 318 319 320 321 322
    dnsmasqContext *dctx = NULL;
    virNetworkDefPtr def = virNetworkObjGetPersistentDef(net);

    int ret = -1;

    /* remove the (possibly) existing dnsmasq and radvd files */
323
    if (!(dctx = dnsmasqContextNew(def->name,
324
                                   driver->dnsmasqStateDir))) {
325
        goto cleanup;
326
    }
327

328
    if (!(leasefile = networkDnsmasqLeaseFileNameDefault(driver, def->name)))
329 330
        goto cleanup;

331
    if (!(customleasefile = networkDnsmasqLeaseFileNameCustom(driver, def->bridge)))
332 333
        goto cleanup;

334
    if (!(radvdconfigfile = networkRadvdConfigFileName(driver, def->name)))
335
        goto cleanup;
336 337

    if (!(radvdpidbase = networkRadvdPidfileBasename(def->name)))
338
        goto cleanup;
339

340
    if (!(configfile = networkDnsmasqConfigFileName(driver, def->name)))
341
        goto cleanup;
342

343
    if (!(statusfile = virNetworkConfigFile(driver->stateDir, def->name)))
344
        goto cleanup;
345

M
Michal Privoznik 已提交
346 347 348
    if (!(macMapFile = networkMacMgrFileName(driver, def->bridge)))
        goto cleanup;

349 350 351
    /* dnsmasq */
    dnsmasqDelete(dctx);
    unlink(leasefile);
352
    unlink(customleasefile);
353
    unlink(configfile);
354

M
Michal Privoznik 已提交
355 356 357
    /* MAC map manager */
    unlink(macMapFile);

358 359
    /* radvd */
    unlink(radvdconfigfile);
360
    virPidFileDelete(driver->pidDir, radvdpidbase);
361

362 363 364
    /* remove status file */
    unlink(statusfile);

365
    /* remove the network definition */
366
    virNetworkRemoveInactive(driver->networks, net);
367 368 369

    ret = 0;

370
 cleanup:
371
    VIR_FREE(leasefile);
372
    VIR_FREE(configfile);
373
    VIR_FREE(customleasefile);
374 375
    VIR_FREE(radvdconfigfile);
    VIR_FREE(radvdpidbase);
376
    VIR_FREE(statusfile);
M
Michal Privoznik 已提交
377
    VIR_FREE(macMapFile);
378 379 380 381
    dnsmasqContextFree(dctx);
    return ret;
}

M
Michal Privoznik 已提交
382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441
static int
networkMacMgrAdd(virNetworkDriverStatePtr driver,
                 virNetworkObjPtr network,
                 const char *domain,
                 const virMacAddr *mac)
{
    char macStr[VIR_MAC_STRING_BUFLEN];
    char *file = NULL;
    int ret = -1;

    if (!network->macmap)
        return 0;

    virMacAddrFormat(mac, macStr);

    if (!(file = networkMacMgrFileName(driver, network->def->bridge)))
        goto cleanup;

    if (virMacMapAdd(network->macmap, domain, macStr) < 0)
        goto cleanup;

    if (virMacMapWriteFile(network->macmap, file) < 0)
        goto cleanup;

    ret = 0;
 cleanup:
    VIR_FREE(file);
    return ret;
}

static int
networkMacMgrDel(virNetworkDriverStatePtr driver,
                 virNetworkObjPtr network,
                 const char *domain,
                 const virMacAddr *mac)
{
    char macStr[VIR_MAC_STRING_BUFLEN];
    char *file = NULL;
    int ret = -1;

    if (!network->macmap)
        return 0;

    virMacAddrFormat(mac, macStr);

    if (!(file = networkMacMgrFileName(driver, network->def->bridge)))
        goto cleanup;

    if (virMacMapRemove(network->macmap, domain, macStr) < 0)
        goto cleanup;

    if (virMacMapWriteFile(network->macmap, file) < 0)
        goto cleanup;

    ret = 0;
 cleanup:
    VIR_FREE(file);
    return ret;
}

442 443 444
static char *
networkBridgeDummyNicName(const char *brname)
{
445
    static const char dummyNicSuffix[] = "-nic";
446 447
    char *nicname;

448 449 450 451 452 453 454
    if (strlen(brname) + sizeof(dummyNicSuffix) > IFNAMSIZ) {
        /* because the length of an ifname is limited to IFNAMSIZ-1
         * (usually 15), and we're adding 4 more characters, we must
         * truncate the original name to 11 to fit. In order to catch
         * a possible numeric ending (eg virbr0, virbr1, etc), we grab
         * the first 8 and last 3 characters of the string.
         */
455 456 457 458 459
        ignore_value(virAsprintf(&nicname, "%.*s%s%s",
                                 /* space for last 3 chars + "-nic" + NULL */
                                 (int)(IFNAMSIZ - (3 + sizeof(dummyNicSuffix))),
                                 brname, brname + strlen(brname) - 3,
                                 dummyNicSuffix));
460
    } else {
461
        ignore_value(virAsprintf(&nicname, "%s%s", brname, dummyNicSuffix));
462
    }
463 464 465
    return nicname;
}

466 467
static int
networkUpdateState(virNetworkObjPtr obj,
468
                   void *opaque)
469
{
470
    virNetworkDriverStatePtr driver = opaque;
471
    dnsmasqCapsPtr dnsmasq_caps = networkGetDnsmasqCaps(driver);
472
    int ret = -1;
473

474
    virObjectLock(obj);
475
    if (!virNetworkObjIsActive(obj)) {
476 477
        ret = 0;
        goto cleanup;
478
    }
479

480 481 482 483
    switch (obj->def->forward.type) {
    case VIR_NETWORK_FORWARD_NONE:
    case VIR_NETWORK_FORWARD_NAT:
    case VIR_NETWORK_FORWARD_ROUTE:
484
    case VIR_NETWORK_FORWARD_OPEN:
485 486 487 488
        /* If bridge doesn't exist, then mark it inactive */
        if (!(obj->def->bridge && virNetDevExists(obj->def->bridge) == 1))
            obj->active = 0;
        break;
489

490
    case VIR_NETWORK_FORWARD_BRIDGE:
491 492
        if (obj->def->bridge) {
            if (virNetDevExists(obj->def->bridge) != 1)
493 494
                obj->active = 0;
            break;
495
        }
496 497 498 499 500 501 502 503 504
        /* intentionally drop through to common case for all
         * macvtap networks (forward='bridge' with no bridge
         * device defined is macvtap using its 'bridge' mode)
         */
    case VIR_NETWORK_FORWARD_PRIVATE:
    case VIR_NETWORK_FORWARD_VEPA:
    case VIR_NETWORK_FORWARD_PASSTHROUGH:
        /* so far no extra checks */
        break;
505

506 507 508
    case VIR_NETWORK_FORWARD_HOSTDEV:
        /* so far no extra checks */
        break;
509
    }
510

511 512 513
    /* Try and read dnsmasq/radvd pids of active networks */
    if (obj->active && obj->def->ips && (obj->def->nips > 0)) {
        char *radvdpidbase;
M
Michal Privoznik 已提交
514
        char *macMapFile;
515

516 517 518
        ignore_value(virPidFileReadIfAlive(driver->pidDir,
                                           obj->def->name,
                                           &obj->dnsmasqPid,
519
                                           dnsmasqCapsGetBinaryPath(dnsmasq_caps)));
M
Michal Privoznik 已提交
520

521 522 523
        radvdpidbase = networkRadvdPidfileBasename(obj->def->name);
        if (!radvdpidbase)
            goto cleanup;
524

525 526 527 528
        ignore_value(virPidFileReadIfAlive(driver->pidDir,
                                           radvdpidbase,
                                           &obj->radvdPid, RADVD));
        VIR_FREE(radvdpidbase);
M
Michal Privoznik 已提交
529 530 531 532 533 534 535 536 537 538 539

        if (!(macMapFile = networkMacMgrFileName(driver, obj->def->bridge)))
            goto cleanup;

        if (virFileExists(macMapFile) &&
            !(obj->macmap = virMacMapNew(macMapFile))) {
            VIR_FREE(macMapFile);
            goto cleanup;
        }

        VIR_FREE(macMapFile);
540
    }
541

542 543
    ret = 0;
 cleanup:
544
    virObjectUnlock(obj);
545
    virObjectUnref(dnsmasq_caps);
546 547
    return ret;
}
548

549

550 551
static int
networkAutostartConfig(virNetworkObjPtr net,
552
                       void *opaque)
553
{
554
    virNetworkDriverStatePtr driver = opaque;
555
    int ret = -1;
556

557
    virObjectLock(net);
558 559
    if (net->autostart &&
        !virNetworkObjIsActive(net) &&
560
        networkStartNetwork(driver, net) < 0)
561 562 563 564
        goto cleanup;

    ret = 0;
 cleanup:
565
    virObjectUnlock(net);
566
    return ret;
567 568
}

569 570 571
#if HAVE_FIREWALLD
static DBusHandlerResult
firewalld_dbus_filter_bridge(DBusConnection *connection ATTRIBUTE_UNUSED,
572
                             DBusMessage *message, void *user_data)
573
{
574 575
    virNetworkDriverStatePtr driver = user_data;

576 577 578 579 580 581
    if (dbus_message_is_signal(message, DBUS_INTERFACE_DBUS,
                               "NameOwnerChanged") ||
        dbus_message_is_signal(message, "org.fedoraproject.FirewallD1",
                               "Reloaded"))
    {
        VIR_DEBUG("Reload in bridge_driver because of firewalld.");
582
        networkReloadFirewallRules(driver);
583 584 585 586 587 588
    }

    return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
}
#endif

589
static int
590
networkMigrateStateFiles(virNetworkDriverStatePtr driver)
591 592 593 594 595 596 597 598 599 600 601 602 603
{
    /* Due to a change in location of network state xml beginning in
     * libvirt 1.2.4 (from /var/lib/libvirt/network to
     * /var/run/libvirt/network), we must check for state files in two
     * locations. Anything found in the old location must be written
     * to the new location, then erased from the old location. (Note
     * that we read/write the file rather than calling rename()
     * because the old and new state directories are likely in
     * different filesystems).
     */
    int ret = -1;
    const char *oldStateDir = LOCALSTATEDIR "/lib/libvirt/network";
    DIR *dir;
604
    int direrr;
605 606 607
    struct dirent *entry;
    char *oldPath = NULL, *newPath = NULL;
    char *contents = NULL;
J
Ján Tomko 已提交
608
    int rc;
609

J
Ján Tomko 已提交
610 611
    if ((rc = virDirOpenIfExists(&dir, oldStateDir)) <= 0)
        return rc;
612 613 614 615 616 617 618

    if (virFileMakePath(driver->stateDir) < 0) {
        virReportSystemError(errno, _("cannot create directory %s"),
                             driver->stateDir);
        goto cleanup;
    }

619
    while ((direrr = virDirRead(dir, &entry, oldStateDir)) > 0) {
620 621 622
        if (entry->d_type != DT_UNKNOWN &&
            entry->d_type != DT_REG)
            continue;
623 624 625

        if (virAsprintf(&oldPath, "%s/%s",
                        oldStateDir, entry->d_name) < 0)
J
Ján Tomko 已提交
626
            goto cleanup;
627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643

        if (entry->d_type == DT_UNKNOWN) {
            struct stat st;

            if (lstat(oldPath, &st) < 0) {
                virReportSystemError(errno,
                                     _("failed to stat network status file '%s'"),
                                     oldPath);
                goto cleanup;
            }

            if (!S_ISREG(st.st_mode)) {
                VIR_FREE(oldPath);
                continue;
            }
        }

644
        if (virFileReadAll(oldPath, 1024*1024, &contents) < 0)
J
Ján Tomko 已提交
645
            goto cleanup;
646 647 648

        if (virAsprintf(&newPath, "%s/%s",
                        driver->stateDir, entry->d_name) < 0)
J
Ján Tomko 已提交
649
            goto cleanup;
650 651 652 653 654 655 656 657 658 659 660 661
        if (virFileWriteStr(newPath, contents, S_IRUSR | S_IWUSR) < 0) {
            virReportSystemError(errno,
                                 _("failed to write network status file '%s'"),
                                 newPath);
            goto cleanup;
        }

        unlink(oldPath);
        VIR_FREE(oldPath);
        VIR_FREE(newPath);
        VIR_FREE(contents);
    }
662
    if (direrr < 0)
J
Ján Tomko 已提交
663
        goto cleanup;
664 665 666

    ret = 0;
 cleanup:
J
Ján Tomko 已提交
667
    VIR_DIR_CLOSE(dir);
668 669 670 671 672 673
    VIR_FREE(oldPath);
    VIR_FREE(newPath);
    VIR_FREE(contents);
    return ret;
}

674
/**
675
 * networkStateInitialize:
676 677 678 679
 *
 * Initialization function for the QEmu daemon
 */
static int
680 681 682
networkStateInitialize(bool privileged,
                       virStateInhibitCallback callback ATTRIBUTE_UNUSED,
                       void *opaque ATTRIBUTE_UNUSED)
683
{
684 685 686
    int ret = -1;
    char *configdir = NULL;
    char *rundir = NULL;
687 688 689
#ifdef HAVE_FIREWALLD
    DBusConnection *sysbus = NULL;
#endif
690

691
    if (VIR_ALLOC(network_driver) < 0)
692
        goto error;
693

694 695
    if (virMutexInit(&network_driver->lock) < 0) {
        VIR_FREE(network_driver);
696 697
        goto error;
    }
698

699 700 701 702
    /* configuration/state paths are one of
     * ~/.config/libvirt/... (session/unprivileged)
     * /etc/libvirt/... && /var/(run|lib)/libvirt/... (system/privileged).
     */
703
    if (privileged) {
704
        if (VIR_STRDUP(network_driver->networkConfigDir,
705
                       SYSCONFDIR "/libvirt/qemu/networks") < 0 ||
706
            VIR_STRDUP(network_driver->networkAutostartDir,
707
                       SYSCONFDIR "/libvirt/qemu/networks/autostart") < 0 ||
708
            VIR_STRDUP(network_driver->stateDir,
709
                       LOCALSTATEDIR "/run/libvirt/network") < 0 ||
710
            VIR_STRDUP(network_driver->pidDir,
711
                       LOCALSTATEDIR "/run/libvirt/network") < 0 ||
712
            VIR_STRDUP(network_driver->dnsmasqStateDir,
713
                       LOCALSTATEDIR "/lib/libvirt/dnsmasq") < 0 ||
714
            VIR_STRDUP(network_driver->radvdStateDir,
715 716
                       LOCALSTATEDIR "/lib/libvirt/radvd") < 0)
            goto error;
717 718 719 720 721

        /* migration from old to new location is only applicable for
         * privileged mode - unprivileged mode directories haven't
         * changed location.
         */
722
        if (networkMigrateStateFiles(network_driver) < 0)
723
            goto error;
724
    } else {
725 726 727
        configdir = virGetUserConfigDirectory();
        rundir = virGetUserRuntimeDirectory();
        if (!(configdir && rundir))
728
            goto error;
729

730
        if ((virAsprintf(&network_driver->networkConfigDir,
731
                         "%s/qemu/networks", configdir) < 0) ||
732
            (virAsprintf(&network_driver->networkAutostartDir,
733
                         "%s/qemu/networks/autostart", configdir) < 0) ||
734
            (virAsprintf(&network_driver->stateDir,
735
                         "%s/network/lib", rundir) < 0) ||
736
            (virAsprintf(&network_driver->pidDir,
737
                         "%s/network/run", rundir) < 0) ||
738
            (virAsprintf(&network_driver->dnsmasqStateDir,
739
                         "%s/dnsmasq/lib", rundir) < 0) ||
740
            (virAsprintf(&network_driver->radvdStateDir,
741
                         "%s/radvd/lib", rundir) < 0)) {
742
            goto error;
743
        }
744 745
    }

746
    if (virFileMakePath(network_driver->stateDir) < 0) {
747 748
        virReportSystemError(errno,
                             _("cannot create directory %s"),
749
                             network_driver->stateDir);
750 751 752
        goto error;
    }

753
    /* if this fails now, it will be retried later with dnsmasqCapsRefresh() */
754
    network_driver->dnsmasqCaps = dnsmasqCapsNewFromBinary(DNSMASQ);
755

756
    if (!(network_driver->networks = virNetworkObjListNew()))
757 758
        goto error;

759 760
    if (virNetworkLoadAllState(network_driver->networks,
                               network_driver->stateDir) < 0)
761 762
        goto error;

763 764 765
    if (virNetworkLoadAllConfigs(network_driver->networks,
                                 network_driver->networkConfigDir,
                                 network_driver->networkAutostartDir) < 0)
766 767
        goto error;

768 769 770 771
    /* Update the internal status of all allegedly active
     * networks according to external conditions on the host
     * (i.e. anything that isn't stored directly in each
     * network's state file). */
772
    virNetworkObjListForEach(network_driver->networks,
773
                             networkUpdateState,
774 775
                             network_driver);
    virNetworkObjListPrune(network_driver->networks,
776 777
                           VIR_CONNECT_LIST_NETWORKS_INACTIVE |
                           VIR_CONNECT_LIST_NETWORKS_TRANSIENT);
778 779
    networkReloadFirewallRules(network_driver);
    networkRefreshDaemons(network_driver);
780

781
    network_driver->networkEventState = virObjectEventStateNew();
782

783 784 785
#ifdef HAVE_FIREWALLD
    if (!(sysbus = virDBusGetSystemBus())) {
        VIR_WARN("DBus not available, disabling firewalld support "
786
                 "in bridge_network_driver: %s", virGetLastErrorMessage());
787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803
    } else {
        /* add matches for
         * NameOwnerChanged on org.freedesktop.DBus for firewalld start/stop
         * Reloaded on org.fedoraproject.FirewallD1 for firewalld reload
         */
        dbus_bus_add_match(sysbus,
                           "type='signal'"
                           ",interface='"DBUS_INTERFACE_DBUS"'"
                           ",member='NameOwnerChanged'"
                           ",arg0='org.fedoraproject.FirewallD1'",
                           NULL);
        dbus_bus_add_match(sysbus,
                           "type='signal'"
                           ",interface='org.fedoraproject.FirewallD1'"
                           ",member='Reloaded'",
                           NULL);
        dbus_connection_add_filter(sysbus, firewalld_dbus_filter_bridge,
804
                                   network_driver, NULL);
805 806 807
    }
#endif

808
    ret = 0;
809
 cleanup:
810 811 812
    VIR_FREE(configdir);
    VIR_FREE(rundir);
    return ret;
813

814
 error:
815
    networkStateCleanup();
816
    goto cleanup;
817 818
}

819 820 821 822 823 824 825 826
/**
 * networkStateAutoStart:
 *
 * Function to AutoStart the bridge configs
 */
static void
networkStateAutoStart(void)
{
827
    if (!network_driver)
828 829
        return;

830
    virNetworkObjListForEach(network_driver->networks,
831
                             networkAutostartConfig,
832
                             network_driver);
833 834
}

835
/**
836
 * networkStateReload:
837 838 839 840 841
 *
 * Function to restart the QEmu daemon, it will recheck the configuration
 * files and update its state and the networking
 */
static int
842 843
networkStateReload(void)
{
844
    if (!network_driver)
845 846
        return 0;

847 848 849 850 851 852 853 854
    virNetworkLoadAllState(network_driver->networks,
                           network_driver->stateDir);
    virNetworkLoadAllConfigs(network_driver->networks,
                             network_driver->networkConfigDir,
                             network_driver->networkAutostartDir);
    networkReloadFirewallRules(network_driver);
    networkRefreshDaemons(network_driver);
    virNetworkObjListForEach(network_driver->networks,
855
                             networkAutostartConfig,
856
                             network_driver);
857 858 859 860 861
    return 0;
}


/**
862
 * networkStateCleanup:
863 864 865 866
 *
 * Shutdown the QEmu daemon, it will stop all active domains and networks
 */
static int
867 868
networkStateCleanup(void)
{
869
    if (!network_driver)
870 871
        return -1;

872
    virObjectUnref(network_driver->networkEventState);
873

874
    /* free inactive networks */
875
    virObjectUnref(network_driver->networks);
876

877 878 879 880 881 882
    VIR_FREE(network_driver->networkConfigDir);
    VIR_FREE(network_driver->networkAutostartDir);
    VIR_FREE(network_driver->stateDir);
    VIR_FREE(network_driver->pidDir);
    VIR_FREE(network_driver->dnsmasqStateDir);
    VIR_FREE(network_driver->radvdStateDir);
883

884
    virObjectUnref(network_driver->dnsmasqCaps);
885

886
    virMutexDestroy(&network_driver->lock);
887

888
    VIR_FREE(network_driver);
889 890 891 892 893

    return 0;
}


894 895 896 897 898 899 900
/* networkKillDaemon:
 *
 * kill the specified pid/name, and wait a bit to make sure it's dead.
 */
static int
networkKillDaemon(pid_t pid, const char *daemonName, const char *networkName)
{
901 902
    size_t i;
    int ret = -1;
903 904 905 906 907 908 909
    const char *signame = "TERM";

    /* send SIGTERM, then wait up to 3 seconds for the process to
     * disappear, send SIGKILL, then wait for up to another 2
     * seconds. If that fails, log a warning and continue, hoping
     * for the best.
     */
910
    for (i = 0; i < 25; i++) {
911
        int signum = 0;
912
        if (i == 0) {
913
            signum = SIGTERM;
914
        } else if (i == 15) {
915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949
            signum = SIGKILL;
            signame = "KILL";
        }
        if (kill(pid, signum) < 0) {
            if (errno == ESRCH) {
                ret = 0;
            } else {
                char ebuf[1024];
                VIR_WARN("Failed to terminate %s process %d "
                         "for network '%s' with SIG%s: %s",
                         daemonName, pid, networkName, signame,
                         virStrerror(errno, ebuf, sizeof(ebuf)));
            }
            goto cleanup;
        }
        /* NB: since networks have no reference count like
         * domains, there is no safe way to unlock the network
         * object temporarily, and so we can't follow the
         * procedure used by the qemu driver of 1) unlock driver
         * 2) sleep, 3) add ref to object 4) unlock object, 5)
         * re-lock driver, 6) re-lock object. We may need to add
         * that functionality eventually, but for now this
         * function is rarely used and, at worst, leaving the
         * network driver locked during this loop of sleeps will
         * have the effect of holding up any other thread trying
         * to make modifications to a network for up to 5 seconds;
         * since modifications to networks are much less common
         * than modifications to domains, this seems a reasonable
         * tradeoff in exchange for less code disruption.
         */
        usleep(20 * 1000);
    }
    VIR_WARN("Timed out waiting after SIG%s to %s process %d "
             "(network '%s')",
             signame, daemonName, pid, networkName);
950
 cleanup:
951 952 953
    return ret;
}

J
Ján Tomko 已提交
954 955 956
/* the following does not build a file, it builds a list
 * which is later saved into a file
 */
G
Gene Czarcinski 已提交
957

958
static int
G
Gene Czarcinski 已提交
959
networkBuildDnsmasqDhcpHostsList(dnsmasqContext *dctx,
960
                                 virNetworkIPDefPtr ipdef)
961
{
962
    size_t i;
G
Gene Czarcinski 已提交
963
    bool ipv6 = false;
964

G
Gene Czarcinski 已提交
965 966
    if (VIR_SOCKET_ADDR_IS_FAMILY(&ipdef->address, AF_INET6))
        ipv6 = true;
967 968
    for (i = 0; i < ipdef->nhosts; i++) {
        virNetworkDHCPHostDefPtr host = &(ipdef->hosts[i]);
G
Gene Czarcinski 已提交
969
        if (VIR_SOCKET_ADDR_VALID(&host->ip))
970 971
            if (dnsmasqAddDhcpHost(dctx, host->mac, &host->ip,
                                   host->name, host->id, ipv6) < 0)
972
                return -1;
973
    }
974

G
Gene Czarcinski 已提交
975 976 977 978 979 980 981
    return 0;
}

static int
networkBuildDnsmasqHostsList(dnsmasqContext *dctx,
                             virNetworkDNSDefPtr dnsdef)
{
982
    size_t i, j;
G
Gene Czarcinski 已提交
983

984 985
    if (dnsdef) {
        for (i = 0; i < dnsdef->nhosts; i++) {
986
            virNetworkDNSHostDefPtr host = &(dnsdef->hosts[i]);
987
            if (VIR_SOCKET_ADDR_VALID(&host->ip)) {
988
                for (j = 0; j < host->nnames; j++)
989 990
                    if (dnsmasqAddHost(dctx, &host->ip, host->names[j]) < 0)
                        return -1;
991 992
            }
        }
993 994
    }

995
    return 0;
996 997 998
}


999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035
static int
networkDnsmasqConfLocalPTRs(virBufferPtr buf,
                            virNetworkDefPtr def)
{
    virNetworkIPDefPtr ip;
    size_t i;
    char *ptr = NULL;
    int rc;

    for (i = 0; i < def->nips; i++) {
        ip = def->ips + i;

        if (ip->localPTR != VIR_TRISTATE_BOOL_YES)
            continue;

        if ((rc = virSocketAddrPTRDomain(&ip->address,
                                         virNetworkIPDefPrefix(ip),
                                         &ptr)) < 0) {
            if (rc == -2) {
                int family = VIR_SOCKET_ADDR_FAMILY(&ip->address);
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("PTR domain for %s network with prefix %u "
                                 "cannot be automatically created"),
                               (family == AF_INET) ? "IPv4" : "IPv6",
                               virNetworkIPDefPrefix(ip));
            }
            return -1;
        }

        virBufferAsprintf(buf, "local=/%s/\n", ptr);
        VIR_FREE(ptr);
    }

    return 0;
}


1036 1037
int
networkDnsmasqConfContents(virNetworkObjPtr network,
1038 1039 1040 1041
                           const char *pidfile,
                           char **configstr,
                           dnsmasqContext *dctx,
                           dnsmasqCapsPtr caps ATTRIBUTE_UNUSED)
1042
{
1043
    virBuffer configbuf = VIR_BUFFER_INITIALIZER;
1044
    int r, ret = -1;
1045
    int nbleases = 0;
1046
    size_t i;
1047
    virNetworkDNSDefPtr dns = &network->def->dns;
1048
    bool wantDNS = dns->enable != VIR_TRISTATE_BOOL_NO;
1049
    virNetworkIPDefPtr tmpipdef, ipdef, ipv4def, ipv6def;
G
Gene Czarcinski 已提交
1050
    bool ipv6SLAAC;
1051
    char *saddr = NULL, *eaddr = NULL;
1052

1053 1054
    *configstr = NULL;

1055
    /*
1056 1057 1058
     * All dnsmasq parameters are put into a configuration file, except the
     * command line --conf-file=parameter which specifies the location of
     * configuration file.
1059
     *
1060 1061
     * All dnsmasq conf-file parameters must be specified as "foo=bar"
     * as oppose to "--foo bar" which was acceptable on the command line.
1062
     */
1063 1064 1065 1066 1067 1068

    /*
     * Needed to ensure dnsmasq uses same algorithm for processing
     * multiple namedriver entries in /etc/resolv.conf as GLibC.
     */

1069
    /* create dnsmasq config file appropriate for this network */
1070 1071

    /* Don't forget to update networkxml2conftest :-) */
1072
    virBufferAsprintf(&configbuf,
1073 1074 1075 1076 1077 1078 1079
                      "##WARNING:  THIS IS AN AUTO-GENERATED FILE. "
                      "CHANGES TO IT ARE LIKELY TO BE\n"
                      "##OVERWRITTEN AND LOST.  Changes to this "
                      "configuration should be made using:\n"
                      "##    virsh net-edit %s\n"
                      "## or other application using the libvirt API.\n"
                      "##\n## dnsmasq conf file created by libvirt\n"
1080
                      "strict-order\n",
1081 1082
                      network->def->name);

1083 1084 1085 1086 1087 1088 1089
    /* if dns is disabled, set its listening port to 0, which
     * tells dnsmasq to not listen
     */
    if (!wantDNS)
        virBufferAddLit(&configbuf, "port=0\n");

    if (wantDNS && network->def->dns.forwarders) {
1090 1091 1092 1093 1094 1095 1096 1097 1098
        /* addNoResolv should be set to true if there are any entries
         * that specify an IP address for requests, but no domain
         * qualifier (implying that all requests otherwise "unclaimed"
         * should be sent to that address). if it is still false when
         * we've looked at all entries, it means we still need the
         * host's resolv.conf for some cases.
         */
        bool addNoResolv = false;

1099
        for (i = 0; i < network->def->dns.nfwds; i++) {
1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110
            virNetworkDNSForwarderPtr fwd = &network->def->dns.forwarders[i];

            virBufferAddLit(&configbuf, "server=");
            if (fwd->domain)
                virBufferAsprintf(&configbuf, "/%s/", fwd->domain);
            if (VIR_SOCKET_ADDR_VALID(&fwd->addr)) {
                char *addr = virSocketAddrFormat(&fwd->addr);

                if (!addr)
                    goto cleanup;
                virBufferAsprintf(&configbuf, "%s\n", addr);
1111
                VIR_FREE(addr);
1112 1113
                if (!fwd->domain)
                    addNoResolv = true;
1114 1115 1116 1117
            } else {
                /* "don't forward requests for this domain" */
                virBufferAddLit(&configbuf, "#\n");
            }
1118
        }
1119 1120
        if (addNoResolv)
            virBufferAddLit(&configbuf, "no-resolv\n");
1121 1122
    }

1123
    if (network->def->domain) {
1124 1125 1126 1127 1128
        if (network->def->domainLocalOnly == VIR_TRISTATE_BOOL_YES) {
            virBufferAsprintf(&configbuf,
                              "local=/%s/\n",
                              network->def->domain);
        }
1129
        virBufferAsprintf(&configbuf,
1130 1131 1132 1133
                          "domain=%s\n"
                          "expand-hosts\n",
                          network->def->domain);
    }
1134

1135 1136 1137 1138
    if (wantDNS &&
        networkDnsmasqConfLocalPTRs(&configbuf, network->def) < 0)
        goto cleanup;

1139
    if (wantDNS && network->def->dns.forwardPlainNames == VIR_TRISTATE_BOOL_NO) {
1140 1141 1142 1143
        virBufferAddLit(&configbuf, "domain-needed\n");
        /* need to specify local=// whether or not a domain is
         * specified, unless the config says we should forward "plain"
         * names (i.e. not fully qualified, no '.' characters)
1144
         */
1145
        virBufferAddLit(&configbuf, "local=//\n");
1146
    }
1147

1148
    if (pidfile)
1149
        virBufferAsprintf(&configbuf, "pid-file=%s\n", pidfile);
1150

1151
    /* dnsmasq will *always* listen on localhost unless told otherwise */
P
Pavel Timofeev 已提交
1152
#ifdef __linux__
1153
    virBufferAddLit(&configbuf, "except-interface=lo\n");
P
Pavel Timofeev 已提交
1154 1155 1156 1157
#else
    /* BSD family OSes and Solaris call loopback interface as lo0 */
    virBufferAddLit(&configbuf, "except-interface=lo0\n");
#endif
1158

1159 1160 1161 1162 1163 1164 1165 1166
    if (dnsmasqCapsGet(caps, DNSMASQ_CAPS_BIND_DYNAMIC)) {
        /* using --bind-dynamic with only --interface (no
         * --listen-address) prevents dnsmasq from responding to dns
         * queries that arrive on some interface other than our bridge
         * interface (in other words, requests originating somewhere
         * other than one of the virtual guests connected directly to
         * this network). This was added in response to CVE 2012-3411.
         */
1167
        virBufferAsprintf(&configbuf,
1168 1169 1170
                          "bind-dynamic\n"
                          "interface=%s\n",
                          network->def->bridge);
1171
    } else {
1172
        virBufferAddLit(&configbuf, "bind-interfaces\n");
1173 1174 1175 1176 1177 1178 1179 1180
        /*
         * --interface does not actually work with dnsmasq < 2.47,
         * due to DAD for ipv6 addresses on the interface.
         *
         * virCommandAddArgList(cmd, "--interface", network->def->bridge, NULL);
         *
         * So listen on all defined IPv[46] addresses
         */
1181
        for (i = 0;
1182
             (tmpipdef = virNetworkDefGetIPByIndex(network->def, AF_UNSPEC, i));
1183
             i++) {
1184 1185 1186 1187
            char *ipaddr = virSocketAddrFormat(&tmpipdef->address);

            if (!ipaddr)
                goto cleanup;
1188

1189
            /* also part of CVE 2012-3411 - if the host's version of
1190
             * dnsmasq doesn't have bind-dynamic, only allow listening on
1191 1192
             * private/local IP addresses (see RFC1918/RFC3484/RFC4193)
             */
1193 1194
            if (!dnsmasqCapsGet(caps, DNSMASQ_CAPS_BINDTODEVICE) &&
                !virSocketAddrIsPrivate(&tmpipdef->address)) {
1195 1196 1197 1198
                unsigned long version = dnsmasqCapsGetVersion(caps);

                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("Publicly routable address %s is prohibited. "
1199
                                 "The version of dnsmasq on this host (%d.%d) "
1200 1201 1202 1203
                                 "doesn't support the bind-dynamic option or "
                                 "use SO_BINDTODEVICE on listening sockets, "
                                 "one of which is required for safe operation "
                                 "on a publicly routable subnet "
1204 1205 1206 1207 1208 1209
                                 "(see CVE-2012-3411). You must either "
                                 "upgrade dnsmasq, or use a private/local "
                                 "subnet range for this network "
                                 "(as described in RFC1918/RFC3484/RFC4193)."),
                               ipaddr, (int)version / 1000000,
                               (int)(version % 1000000) / 1000);
1210
                VIR_FREE(ipaddr);
1211 1212
                goto cleanup;
            }
1213
            virBufferAsprintf(&configbuf, "listen-address=%s\n", ipaddr);
1214 1215 1216
            VIR_FREE(ipaddr);
        }
    }
1217

1218 1219
    /* If this is an isolated network, set the default route option
     * (3) to be empty to avoid setting a default route that's
1220
     * guaranteed to not work, and set no-resolv so that no dns
1221 1222 1223
     * requests are forwarded on to the dns server listed in the
     * host's /etc/resolv.conf (since this could be used as a channel
     * to build a connection to the outside).
1224 1225 1226
     * IPv6 RA always contains an implicit default route
     * via the sender's link-local address. The only thing we can do
     * is set the lifetime of this route to 0, i.e. disable it.
1227
     */
1228
    if (network->def->forward.type == VIR_NETWORK_FORWARD_NONE) {
1229
        virBufferAddLit(&configbuf, "dhcp-option=3\n"
1230
                        "no-resolv\n");
1231 1232 1233 1234
        if (dnsmasqCapsGet(caps, DNSMASQ_CAPS_RA_PARAM)) {
            /* interface=* (any), interval=0 (default), lifetime=0 (seconds) */
            virBufferAddLit(&configbuf, "ra-param=*,0,0\n");
        }
1235
    }
1236

1237 1238 1239 1240 1241
    if (wantDNS) {
        for (i = 0; i < dns->ntxts; i++) {
            virBufferAsprintf(&configbuf, "txt-record=%s,%s\n",
                              dns->txts[i].name,
                              dns->txts[i].value);
1242
        }
1243

1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266
        for (i = 0; i < dns->nsrvs; i++) {
            /* service/protocol are required, and should have been validated
             * by the parser.
             */
            if (!dns->srvs[i].service) {
                virReportError(VIR_ERR_INTERNAL_ERROR,
                               _("Missing required 'service' "
                                 "attribute in SRV record of network '%s'"),
                               network->def->name);
                goto cleanup;
            }
            if (!dns->srvs[i].protocol) {
                virReportError(VIR_ERR_INTERNAL_ERROR,
                               _("Missing required 'service' "
                                 "attribute in SRV record of network '%s'"),
                               network->def->name);
                goto cleanup;
            }
            /* RFC2782 requires that service and protocol be preceded by
             * an underscore.
             */
            virBufferAsprintf(&configbuf, "srv-host=_%s._%s",
                              dns->srvs[i].service, dns->srvs[i].protocol);
1267

1268 1269 1270 1271 1272 1273 1274
            /* domain is optional - it defaults to the domain of this network */
            if (dns->srvs[i].domain)
                virBufferAsprintf(&configbuf, ".%s", dns->srvs[i].domain);

            /* If target is empty or ".", that means "the service is
             * decidedly not available at this domain" (RFC2782). In that
             * case, any port, priority, or weight is irrelevant.
1275
             */
1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295
            if (dns->srvs[i].target && STRNEQ(dns->srvs[i].target, ".")) {

                virBufferAsprintf(&configbuf, ",%s", dns->srvs[i].target);
                /* port, priority, and weight are optional, but are
                 * identified by their position in the line. If an item is
                 * unspecified, but something later in the line *is*
                 * specified, we need to give the default value for the
                 * unspecified item. (According to the dnsmasq manpage,
                 * the default for port is 1).
                 */
                if (dns->srvs[i].port ||
                    dns->srvs[i].priority || dns->srvs[i].weight)
                    virBufferAsprintf(&configbuf, ",%d",
                                      dns->srvs[i].port ? dns->srvs[i].port : 1);
                if (dns->srvs[i].priority || dns->srvs[i].weight)
                    virBufferAsprintf(&configbuf, ",%d", dns->srvs[i].priority);
                if (dns->srvs[i].weight)
                    virBufferAsprintf(&configbuf, ",%d", dns->srvs[i].weight);
            }
            virBufferAddLit(&configbuf, "\n");
1296
        }
1297 1298
    }

G
Gene Czarcinski 已提交
1299
    /* Find the first dhcp for both IPv4 and IPv6 */
1300
    for (i = 0, ipv4def = NULL, ipv6def = NULL, ipv6SLAAC = false;
1301
         (ipdef = virNetworkDefGetIPByIndex(network->def, AF_UNSPEC, i));
1302
         i++) {
G
Gene Czarcinski 已提交
1303 1304 1305 1306
        if (VIR_SOCKET_ADDR_IS_FAMILY(&ipdef->address, AF_INET)) {
            if (ipdef->nranges || ipdef->nhosts) {
                if (ipv4def) {
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
1307 1308
                                   _("For IPv4, multiple DHCP definitions "
                                     "cannot be specified."));
G
Gene Czarcinski 已提交
1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319
                    goto cleanup;
                } else {
                    ipv4def = ipdef;
                }
            }
        }
        if (VIR_SOCKET_ADDR_IS_FAMILY(&ipdef->address, AF_INET6)) {
            if (ipdef->nranges || ipdef->nhosts) {
                if (!DNSMASQ_DHCPv6_SUPPORT(caps)) {
                    unsigned long version = dnsmasqCapsGetVersion(caps);
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
1320 1321 1322 1323 1324 1325 1326 1327 1328
                                   _("The version of dnsmasq on this host "
                                     "(%d.%d) doesn't adequately support "
                                     "IPv6 dhcp range or dhcp host "
                                     "specification. Version %d.%d or later "
                                     "is required."),
                                   (int)version / 1000000,
                                   (int)(version % 1000000) / 1000,
                                   DNSMASQ_DHCPv6_MAJOR_REQD,
                                   DNSMASQ_DHCPv6_MINOR_REQD);
G
Gene Czarcinski 已提交
1329 1330 1331 1332
                    goto cleanup;
                }
                if (ipv6def) {
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
1333 1334
                                   _("For IPv6, multiple DHCP definitions "
                                     "cannot be specified."));
G
Gene Czarcinski 已提交
1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347
                    goto cleanup;
                } else {
                    ipv6def = ipdef;
                }
            } else {
                ipv6SLAAC = true;
            }
        }
    }

    if (ipv6def && ipv6SLAAC) {
        VIR_WARN("For IPv6, when DHCP is specified for one address, then "
                 "state-full Router Advertising will occur.  The additional "
1348 1349 1350 1351
                 "IPv6 addresses specified require manually configured guest "
                 "network to work properly since both state-full (DHCP) "
                 "and state-less (SLAAC) addressing are not supported "
                 "on the same network interface.");
G
Gene Czarcinski 已提交
1352 1353 1354 1355 1356
    }

    ipdef = ipv4def ? ipv4def : ipv6def;

    while (ipdef) {
1357 1358
        int prefix;

1359
        prefix = virNetworkIPDefPrefix(ipdef);
1360 1361 1362 1363 1364 1365
        if (prefix < 0) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("bridge '%s' has an invalid prefix"),
                           network->def->bridge);
            goto cleanup;
        }
1366
        for (r = 0; r < ipdef->nranges; r++) {
1367 1368
            int thisRange;

1369 1370
            if (!(saddr = virSocketAddrFormat(&ipdef->ranges[r].start)) ||
                !(eaddr = virSocketAddrFormat(&ipdef->ranges[r].end)))
1371
                goto cleanup;
1372

1373
            virBufferAsprintf(&configbuf, "dhcp-range=%s,%s",
1374
                              saddr, eaddr);
1375
            if (VIR_SOCKET_ADDR_IS_FAMILY(&ipdef->address, AF_INET6))
1376
                virBufferAsprintf(&configbuf, ",%d", prefix);
1377 1378
            virBufferAddLit(&configbuf, "\n");

1379
            VIR_FREE(saddr);
1380
            VIR_FREE(eaddr);
1381
            thisRange = virSocketAddrGetRange(&ipdef->ranges[r].start,
1382 1383
                                              &ipdef->ranges[r].end,
                                              &ipdef->address,
1384
                                              virNetworkIPDefPrefix(ipdef));
1385 1386 1387
            if (thisRange < 0)
                goto cleanup;
            nbleases += thisRange;
1388
        }
1389

1390
        /*
1391 1392 1393 1394
         * For static-only DHCP, i.e. with no range but at least one
         * host element, we have to add a special --dhcp-range option
         * to enable the service in dnsmasq. (this is for dhcp-hosts=
         * support)
1395 1396
         */
        if (!ipdef->nranges && ipdef->nhosts) {
1397
            char *bridgeaddr = virSocketAddrFormat(&ipdef->address);
1398 1399
            if (!bridgeaddr)
                goto cleanup;
1400 1401 1402
            virBufferAsprintf(&configbuf, "dhcp-range=%s,static",
                              bridgeaddr);
            if (VIR_SOCKET_ADDR_IS_FAMILY(&ipdef->address, AF_INET6))
1403
                virBufferAsprintf(&configbuf, ",%d", prefix);
1404
            virBufferAddLit(&configbuf, "\n");
1405 1406
            VIR_FREE(bridgeaddr);
        }
1407

G
Gene Czarcinski 已提交
1408 1409
        if (networkBuildDnsmasqDhcpHostsList(dctx, ipdef) < 0)
            goto cleanup;
1410

G
Gene Czarcinski 已提交
1411 1412
        /* Note: the following is IPv4 only */
        if (VIR_SOCKET_ADDR_IS_FAMILY(&ipdef->address, AF_INET)) {
1413
            if (ipdef->nranges || ipdef->nhosts) {
1414
                virBufferAddLit(&configbuf, "dhcp-no-override\n");
1415 1416
                virBufferAddLit(&configbuf, "dhcp-authoritative\n");
            }
1417

G
Gene Czarcinski 已提交
1418
            if (ipdef->tftproot) {
1419 1420
                virBufferAddLit(&configbuf, "enable-tftp\n");
                virBufferAsprintf(&configbuf, "tftp-root=%s\n", ipdef->tftproot);
G
Gene Czarcinski 已提交
1421
            }
1422

G
Gene Czarcinski 已提交
1423 1424 1425
            if (ipdef->bootfile) {
                if (VIR_SOCKET_ADDR_VALID(&ipdef->bootserver)) {
                    char *bootserver = virSocketAddrFormat(&ipdef->bootserver);
1426

1427
                    if (!bootserver)
G
Gene Czarcinski 已提交
1428
                        goto cleanup;
1429
                    virBufferAsprintf(&configbuf, "dhcp-boot=%s%s%s\n",
1430
                                      ipdef->bootfile, ",,", bootserver);
G
Gene Czarcinski 已提交
1431 1432
                    VIR_FREE(bootserver);
                } else {
1433
                    virBufferAsprintf(&configbuf, "dhcp-boot=%s\n", ipdef->bootfile);
G
Gene Czarcinski 已提交
1434 1435 1436 1437 1438
                }
            }
        }
        ipdef = (ipdef == ipv6def) ? NULL : ipv6def;
    }
1439

1440
    if (nbleases > 0)
1441
        virBufferAsprintf(&configbuf, "dhcp-lease-max=%d\n", nbleases);
1442

G
Gene Czarcinski 已提交
1443 1444
    /* this is done once per interface */
    if (networkBuildDnsmasqHostsList(dctx, dns) < 0)
1445
        goto cleanup;
G
Gene Czarcinski 已提交
1446 1447 1448 1449 1450 1451

    /* Even if there are currently no static hosts, if we're
     * listening for DHCP, we should write a 0-length hosts
     * file to allow for runtime additions.
     */
    if (ipv4def || ipv6def)
1452 1453
        virBufferAsprintf(&configbuf, "dhcp-hostsfile=%s\n",
                          dctx->hostsfile->path);
G
Gene Czarcinski 已提交
1454

1455 1456
    /* Likewise, always create this file and put it on the
     * commandline, to allow for runtime additions.
G
Gene Czarcinski 已提交
1457
     */
1458 1459 1460 1461
    if (wantDNS) {
        virBufferAsprintf(&configbuf, "addn-hosts=%s\n",
                          dctx->addnhostsfile->path);
    }
G
Gene Czarcinski 已提交
1462 1463 1464

    /* Are we doing RA instead of radvd? */
    if (DNSMASQ_RA_SUPPORT(caps)) {
1465
        if (ipv6def) {
1466
            virBufferAddLit(&configbuf, "enable-ra\n");
1467
        } else {
1468
            for (i = 0;
1469
                 (ipdef = virNetworkDefGetIPByIndex(network->def, AF_INET6, i));
1470
                 i++) {
G
Gene Czarcinski 已提交
1471 1472 1473 1474
                if (!(ipdef->nranges || ipdef->nhosts)) {
                    char *bridgeaddr = virSocketAddrFormat(&ipdef->address);
                    if (!bridgeaddr)
                        goto cleanup;
1475 1476
                    virBufferAsprintf(&configbuf,
                                      "dhcp-range=%s,ra-only\n", bridgeaddr);
G
Gene Czarcinski 已提交
1477 1478
                    VIR_FREE(bridgeaddr);
                }
1479
            }
1480
        }
1481 1482
    }

1483 1484 1485
    if (!(*configstr = virBufferContentAndReset(&configbuf)))
        goto cleanup;

1486
    ret = 0;
G
Gene Czarcinski 已提交
1487

1488
 cleanup:
1489 1490
    VIR_FREE(saddr);
    VIR_FREE(eaddr);
1491
    virBufferFreeAndReset(&configbuf);
1492
    return ret;
1493 1494
}

1495
/* build the dnsmasq command line */
1496 1497 1498
static int ATTRIBUTE_NONNULL(3)
networkBuildDhcpDaemonCommandLine(virNetworkDriverStatePtr driver,
                                  virNetworkObjPtr network,
1499
                                  virCommandPtr *cmdout,
1500 1501
                                  char *pidfile,
                                  dnsmasqContext *dctx)
1502
{
1503
    dnsmasqCapsPtr dnsmasq_caps = networkGetDnsmasqCaps(driver);
1504
    virCommandPtr cmd = NULL;
G
Gene Czarcinski 已提交
1505
    int ret = -1;
1506 1507
    char *configfile = NULL;
    char *configstr = NULL;
1508
    char *leaseshelper_path = NULL;
1509 1510

    network->dnsmasqPid = -1;
1511

1512
    if (networkDnsmasqConfContents(network, pidfile, &configstr,
1513
                                   dctx, dnsmasq_caps) < 0)
1514 1515 1516 1517 1518
        goto cleanup;
    if (!configstr)
        goto cleanup;

    /* construct the filename */
1519
    if (!(configfile = networkDnsmasqConfigFileName(driver, network->def->name)))
1520 1521 1522 1523 1524
        goto cleanup;

    /* Write the file */
    if (virFileWriteStr(configfile, configstr, 0600) < 0) {
        virReportSystemError(errno,
J
Ján Tomko 已提交
1525 1526
                             _("couldn't write dnsmasq config file '%s'"),
                             configfile);
1527 1528 1529
        goto cleanup;
    }

1530 1531
    /* This helper is used to create custom leases file for libvirt */
    if (!(leaseshelper_path = virFileFindResource("libvirt_leaseshelper",
1532
                                                  abs_topbuilddir "/src",
1533 1534 1535
                                                  LIBEXECDIR)))
        goto cleanup;

1536
    cmd = virCommandNew(dnsmasqCapsGetBinaryPath(dnsmasq_caps));
1537
    virCommandAddArgFormat(cmd, "--conf-file=%s", configfile);
1538 1539
    /* Libvirt gains full control of leases database */
    virCommandAddArgFormat(cmd, "--leasefile-ro");
1540
    virCommandAddArgFormat(cmd, "--dhcp-script=%s", leaseshelper_path);
1541
    virCommandAddEnvPair(cmd, "VIR_BRIDGE_NAME", network->def->bridge);
1542

1543
    *cmdout = cmd;
1544
    ret = 0;
1545
 cleanup:
1546
    virObjectUnref(dnsmasq_caps);
1547 1548
    VIR_FREE(configfile);
    VIR_FREE(configstr);
1549
    VIR_FREE(leaseshelper_path);
1550 1551 1552 1553
    return ret;
}

static int
1554 1555
networkStartDhcpDaemon(virNetworkDriverStatePtr driver,
                       virNetworkObjPtr network)
1556
{
1557 1558 1559
    virNetworkIPDefPtr ipdef;
    size_t i;
    bool needDnsmasq = false;
1560 1561 1562
    virCommandPtr cmd = NULL;
    char *pidfile = NULL;
    int ret = -1;
1563
    dnsmasqContext *dctx = NULL;
1564

1565
    /* see if there are any IP addresses that need a dhcp server */
1566 1567 1568
    i = 0;
    while ((ipdef = virNetworkDefGetIPByIndex(network->def, AF_UNSPEC, i))) {
        i++;
1569 1570 1571 1572
        if (ipdef->nranges || ipdef->nhosts)
            needDnsmasq = true;
    }

1573 1574 1575 1576 1577 1578
    if (i == 0) {
        /* no IP addresses at all, so we don't need to run */
        ret = 0;
        goto cleanup;
    }

1579
    if (!needDnsmasq && network->def->dns.enable == VIR_TRISTATE_BOOL_NO) {
1580
        /* no DHCP services needed, and user disabled DNS service */
1581 1582 1583 1584
        ret = 0;
        goto cleanup;
    }

1585
    if (virFileMakePath(driver->pidDir) < 0) {
1586
        virReportSystemError(errno,
1587
                             _("cannot create directory %s"),
1588
                             driver->pidDir);
1589
        goto cleanup;
1590 1591
    }

1592
    if (!(pidfile = virPidFileBuildPath(driver->pidDir,
1593
                                        network->def->name)))
1594
        goto cleanup;
1595

1596
    if (virFileMakePath(driver->dnsmasqStateDir) < 0) {
1597
        virReportSystemError(errno,
1598
                             _("cannot create directory %s"),
1599
                             driver->dnsmasqStateDir);
1600 1601 1602
        goto cleanup;
    }

1603
    dctx = dnsmasqContextNew(network->def->name, driver->dnsmasqStateDir);
1604 1605 1606
    if (dctx == NULL)
        goto cleanup;

1607
    if (networkDnsmasqCapsRefresh(driver) < 0)
1608
        goto cleanup;
1609

1610
    ret = networkBuildDhcpDaemonCommandLine(driver, network, &cmd, pidfile, dctx);
1611 1612 1613 1614 1615
    if (ret < 0)
        goto cleanup;

    ret = dnsmasqSave(dctx);
    if (ret < 0)
1616
        goto cleanup;
1617

G
Guido Günther 已提交
1618
    ret = virCommandRun(cmd, NULL);
1619
    if (ret < 0)
1620 1621 1622
        goto cleanup;

    /*
1623 1624 1625 1626 1627
     * There really is no race here - when dnsmasq daemonizes, its
     * leader process stays around until its child has actually
     * written its pidfile. So by time virCommandRun exits it has
     * waitpid'd and guaranteed the proess has started and written a
     * pid
1628 1629
     */

1630
    ret = virPidFileRead(driver->pidDir, network->def->name,
1631 1632
                         &network->dnsmasqPid);
    if (ret < 0)
1633
        goto cleanup;
1634

1635
    ret = 0;
1636
 cleanup:
1637
    VIR_FREE(pidfile);
1638
    virCommandFree(cmd);
1639
    dnsmasqContextFree(dctx);
1640 1641 1642
    return ret;
}

1643 1644
/* networkRefreshDhcpDaemon:
 *  Update dnsmasq config files, then send a SIGHUP so that it rereads
G
Gene Czarcinski 已提交
1645 1646
 *  them.   This only works for the dhcp-hostsfile and the
 *  addn-hosts file.
1647 1648 1649
 *
 *  Returns 0 on success, -1 on failure.
 */
1650
static int
1651 1652
networkRefreshDhcpDaemon(virNetworkDriverStatePtr driver,
                         virNetworkObjPtr network)
1653
{
1654 1655
    int ret = -1;
    size_t i;
1656
    virNetworkIPDefPtr ipdef, ipv4def, ipv6def;
1657
    dnsmasqContext *dctx = NULL;
1658

G
Gene Czarcinski 已提交
1659
    /* if no IP addresses specified, nothing to do */
1660
    if (!virNetworkDefGetIPByIndex(network->def, AF_UNSPEC, 0))
G
Gene Czarcinski 已提交
1661 1662
        return 0;

1663 1664
    /* if there's no running dnsmasq, just start it */
    if (network->dnsmasqPid <= 0 || (kill(network->dnsmasqPid, 0) < 0))
1665
        return networkStartDhcpDaemon(driver, network);
1666

G
Gene Czarcinski 已提交
1667
    VIR_INFO("Refreshing dnsmasq for network %s", network->def->bridge);
1668
    if (!(dctx = dnsmasqContextNew(network->def->name,
1669
                                   driver->dnsmasqStateDir))) {
G
Gene Czarcinski 已提交
1670
        goto cleanup;
1671
    }
G
Gene Czarcinski 已提交
1672 1673 1674 1675 1676 1677

    /* Look for first IPv4 address that has dhcp defined.
     * We only support dhcp-host config on one IPv4 subnetwork
     * and on one IPv6 subnetwork.
     */
    ipv4def = NULL;
1678
    for (i = 0;
1679
         (ipdef = virNetworkDefGetIPByIndex(network->def, AF_INET, i));
1680
         i++) {
G
Gene Czarcinski 已提交
1681 1682
        if (!ipv4def && (ipdef->nranges || ipdef->nhosts))
            ipv4def = ipdef;
1683 1684
    }

G
Gene Czarcinski 已提交
1685
    ipv6def = NULL;
1686
    for (i = 0;
1687
         (ipdef = virNetworkDefGetIPByIndex(network->def, AF_INET6, i));
1688
         i++) {
G
Gene Czarcinski 已提交
1689 1690
        if (!ipv6def && (ipdef->nranges || ipdef->nhosts))
            ipv6def = ipdef;
1691 1692
    }

G
Gene Czarcinski 已提交
1693
    if (ipv4def && (networkBuildDnsmasqDhcpHostsList(dctx, ipv4def) < 0))
J
Ján Tomko 已提交
1694
        goto cleanup;
G
Gene Czarcinski 已提交
1695 1696

    if (ipv6def && (networkBuildDnsmasqDhcpHostsList(dctx, ipv6def) < 0))
J
Ján Tomko 已提交
1697
        goto cleanup;
1698

G
Gene Czarcinski 已提交
1699
    if (networkBuildDnsmasqHostsList(dctx, &network->def->dns) < 0)
J
Ján Tomko 已提交
1700
        goto cleanup;
1701 1702

    if ((ret = dnsmasqSave(dctx)) < 0)
1703
        goto cleanup;
1704 1705

    ret = kill(network->dnsmasqPid, SIGHUP);
1706
 cleanup:
1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718
    dnsmasqContextFree(dctx);
    return ret;
}

/* networkRestartDhcpDaemon:
 *
 * kill and restart dnsmasq, in order to update any config that is on
 * the dnsmasq commandline (and any placed in separate config files).
 *
 *  Returns 0 on success, -1 on failure.
 */
static int
1719 1720
networkRestartDhcpDaemon(virNetworkDriverStatePtr driver,
                         virNetworkObjPtr network)
1721 1722 1723 1724 1725 1726
{
    /* if there is a running dnsmasq, kill it */
    if (network->dnsmasqPid > 0) {
        networkKillDaemon(network->dnsmasqPid, "dnsmasq",
                          network->def->name);
        network->dnsmasqPid = -1;
1727
    }
1728
    /* now start dnsmasq if it should be started */
1729
    return networkStartDhcpDaemon(driver, network);
1730 1731
}

G
Gene Czarcinski 已提交
1732 1733 1734 1735 1736 1737
static char radvd1[] = "  AdvOtherConfigFlag off;\n\n";
static char radvd2[] = "    AdvAutonomous off;\n";
static char radvd3[] = "    AdvOnLink on;\n"
                       "    AdvAutonomous on;\n"
                       "    AdvRouterAddr off;\n";

1738 1739 1740
static int
networkRadvdConfContents(virNetworkObjPtr network, char **configstr)
{
E
Eric Blake 已提交
1741
    virBuffer configbuf = VIR_BUFFER_INITIALIZER;
1742 1743
    int ret = -1;
    size_t i;
1744
    virNetworkIPDefPtr ipdef;
G
Gene Czarcinski 已提交
1745
    bool v6present = false, dhcp6 = false;
1746 1747

    *configstr = NULL;
1748

G
Gene Czarcinski 已提交
1749
    /* Check if DHCPv6 is needed */
1750
    for (i = 0;
1751
         (ipdef = virNetworkDefGetIPByIndex(network->def, AF_INET6, i));
1752
         i++) {
G
Gene Czarcinski 已提交
1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765
        v6present = true;
        if (ipdef->nranges || ipdef->nhosts) {
            dhcp6 = true;
            break;
        }
    }

    /* If there are no IPv6 addresses, then we are done */
    if (!v6present) {
        ret = 0;
        goto cleanup;
    }

1766 1767 1768
    /* create radvd config file appropriate for this network;
     * IgnoreIfMissing allows radvd to start even when the bridge is down
     */
1769
    virBufferAsprintf(&configbuf, "interface %s\n"
1770 1771
                      "{\n"
                      "  AdvSendAdvert on;\n"
1772
                      "  IgnoreIfMissing on;\n"
G
Gene Czarcinski 已提交
1773 1774 1775 1776 1777
                      "  AdvManagedFlag %s;\n"
                      "%s",
                      network->def->bridge,
                      dhcp6 ? "on" : "off",
                      dhcp6 ? "\n" : radvd1);
1778 1779

    /* add a section for each IPv6 address in the config */
1780
    for (i = 0;
1781
         (ipdef = virNetworkDefGetIPByIndex(network->def, AF_INET6, i));
1782
         i++) {
1783 1784 1785
        int prefix;
        char *netaddr;

1786
        prefix = virNetworkIPDefPrefix(ipdef);
1787
        if (prefix < 0) {
1788 1789 1790
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("bridge '%s' has an invalid prefix"),
                           network->def->bridge);
1791 1792
            goto cleanup;
        }
1793
        if (!(netaddr = virSocketAddrFormat(&ipdef->address)))
1794
            goto cleanup;
1795
        virBufferAsprintf(&configbuf,
1796
                          "  prefix %s/%d\n"
G
Gene Czarcinski 已提交
1797 1798 1799
                          "  {\n%s  };\n",
                          netaddr, prefix,
                          dhcp6 ? radvd2 : radvd3);
1800 1801 1802
        VIR_FREE(netaddr);
    }

1803
    virBufferAddLit(&configbuf, "};\n");
1804

1805
    if (virBufferCheckError(&configbuf) < 0)
1806
        goto cleanup;
1807

1808 1809
    *configstr = virBufferContentAndReset(&configbuf);

1810
    ret = 0;
1811
 cleanup:
1812 1813 1814 1815
    virBufferFreeAndReset(&configbuf);
    return ret;
}

1816
/* write file and return its name (which must be freed by caller) */
1817
static int
1818 1819 1820
networkRadvdConfWrite(virNetworkDriverStatePtr driver,
                      virNetworkObjPtr network,
                      char **configFile)
1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835
{
    int ret = -1;
    char *configStr = NULL;
    char *myConfigFile = NULL;

    if (!configFile)
        configFile = &myConfigFile;

    *configFile = NULL;

    if (networkRadvdConfContents(network, &configStr) < 0)
        goto cleanup;

    if (!configStr) {
        ret = 0;
1836 1837 1838 1839
        goto cleanup;
    }

    /* construct the filename */
1840
    if (!(*configFile = networkRadvdConfigFileName(driver, network->def->name)))
1841 1842
        goto cleanup;
    /* write the file */
1843
    if (virFileWriteStr(*configFile, configStr, 0600) < 0) {
1844 1845
        virReportSystemError(errno,
                             _("couldn't write radvd config file '%s'"),
1846 1847 1848 1849 1850
                             *configFile);
        goto cleanup;
    }

    ret = 0;
1851
 cleanup:
1852 1853 1854 1855 1856 1857
    VIR_FREE(configStr);
    VIR_FREE(myConfigFile);
    return ret;
}

static int
1858 1859
networkStartRadvd(virNetworkDriverStatePtr driver,
                  virNetworkObjPtr network)
1860
{
1861
    dnsmasqCapsPtr dnsmasq_caps = networkGetDnsmasqCaps(driver);
1862 1863 1864 1865 1866 1867 1868 1869
    char *pidfile = NULL;
    char *radvdpidbase = NULL;
    char *configfile = NULL;
    virCommandPtr cmd = NULL;
    int ret = -1;

    network->radvdPid = -1;

G
Gene Czarcinski 已提交
1870
    /* Is dnsmasq handling RA? */
1871
    if (DNSMASQ_RA_SUPPORT(dnsmasq_caps)) {
G
Gene Czarcinski 已提交
1872 1873 1874 1875
        ret = 0;
        goto cleanup;
    }

1876
    if (!virNetworkDefGetIPByIndex(network->def, AF_INET6, 0)) {
1877 1878 1879 1880 1881 1882 1883 1884 1885 1886
        /* no IPv6 addresses, so we don't need to run radvd */
        ret = 0;
        goto cleanup;
    }

    if (!virFileIsExecutable(RADVD)) {
        virReportSystemError(errno,
                             _("Cannot find %s - "
                               "Possibly the package isn't installed"),
                             RADVD);
1887 1888 1889
        goto cleanup;
    }

1890
    if (virFileMakePath(driver->pidDir) < 0) {
1891 1892
        virReportSystemError(errno,
                             _("cannot create directory %s"),
1893
                             driver->pidDir);
1894 1895
        goto cleanup;
    }
1896
    if (virFileMakePath(driver->radvdStateDir) < 0) {
1897 1898
        virReportSystemError(errno,
                             _("cannot create directory %s"),
1899
                             driver->radvdStateDir);
1900 1901 1902 1903
        goto cleanup;
    }

    /* construct pidfile name */
1904
    if (!(radvdpidbase = networkRadvdPidfileBasename(network->def->name)))
1905
        goto cleanup;
1906
    if (!(pidfile = virPidFileBuildPath(driver->pidDir, radvdpidbase)))
1907 1908
        goto cleanup;

1909
    if (networkRadvdConfWrite(driver, network, &configfile) < 0)
1910 1911
        goto cleanup;

1912 1913 1914 1915
    /* prevent radvd from daemonizing itself with "--debug 1", and use
     * a dummy pidfile name - virCommand will create the pidfile we
     * want to use (this is necessary because radvd's internal
     * daemonization and pidfile creation causes a race, and the
1916
     * virPidFileRead() below will fail if we use them).
1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931
     * Unfortunately, it isn't possible to tell radvd to not create
     * its own pidfile, so we just let it do so, with a slightly
     * different name. Unused, but harmless.
     */
    cmd = virCommandNewArgList(RADVD, "--debug", "1",
                               "--config", configfile,
                               "--pidfile", NULL);
    virCommandAddArgFormat(cmd, "%s-bin", pidfile);

    virCommandSetPidFile(cmd, pidfile);
    virCommandDaemonize(cmd);

    if (virCommandRun(cmd, NULL) < 0)
        goto cleanup;

1932
    if (virPidFileRead(driver->pidDir, radvdpidbase, &network->radvdPid) < 0)
1933 1934 1935
        goto cleanup;

    ret = 0;
1936
 cleanup:
1937
    virObjectUnref(dnsmasq_caps);
1938 1939 1940 1941 1942 1943 1944
    virCommandFree(cmd);
    VIR_FREE(configfile);
    VIR_FREE(radvdpidbase);
    VIR_FREE(pidfile);
    return ret;
}

1945
static int
1946 1947
networkRefreshRadvd(virNetworkDriverStatePtr driver,
                    virNetworkObjPtr network)
1948
{
1949
    dnsmasqCapsPtr dnsmasq_caps = networkGetDnsmasqCaps(driver);
G
Gene Czarcinski 已提交
1950 1951 1952
    char *radvdpidbase;

    /* Is dnsmasq handling RA? */
1953 1954
    if (DNSMASQ_RA_SUPPORT(dnsmasq_caps)) {
        virObjectUnref(dnsmasq_caps);
G
Gene Czarcinski 已提交
1955 1956 1957 1958 1959 1960 1961
        if (network->radvdPid <= 0)
            return 0;
        /* radvd should not be running but in case it is */
        if ((networkKillDaemon(network->radvdPid, "radvd",
                               network->def->name) >= 0) &&
            ((radvdpidbase = networkRadvdPidfileBasename(network->def->name))
             != NULL)) {
1962
            virPidFileDelete(driver->pidDir, radvdpidbase);
G
Gene Czarcinski 已提交
1963 1964 1965 1966 1967
            VIR_FREE(radvdpidbase);
        }
        network->radvdPid = -1;
        return 0;
    }
1968
    virObjectUnref(dnsmasq_caps);
G
Gene Czarcinski 已提交
1969

1970 1971
    /* if there's no running radvd, just start it */
    if (network->radvdPid <= 0 || (kill(network->radvdPid, 0) < 0))
1972
        return networkStartRadvd(driver, network);
1973

1974
    if (!virNetworkDefGetIPByIndex(network->def, AF_INET6, 0)) {
1975 1976 1977 1978
        /* no IPv6 addresses, so we don't need to run radvd */
        return 0;
    }

1979
    if (networkRadvdConfWrite(driver, network, NULL) < 0)
1980 1981 1982 1983 1984
        return -1;

    return kill(network->radvdPid, SIGHUP);
}

1985 1986
#if 0
/* currently unused, so it causes a build error unless we #if it out */
1987
static int
1988
networkRestartRadvd(virNetworkObjPtr network)
1989 1990 1991 1992 1993 1994 1995 1996 1997
{
    char *radvdpidbase;

    /* if there is a running radvd, kill it */
    if (network->radvdPid > 0) {
        /* essentially ignore errors from the following two functions,
         * since there's really no better recovery to be done than to
         * just push ahead (and that may be exactly what's needed).
         */
G
Gene Czarcinski 已提交
1998
        if ((networkKillDaemon(network->radvdPid, "radvd",
1999 2000 2001
                               network->def->name) >= 0) &&
            ((radvdpidbase = networkRadvdPidfileBasename(network->def->name))
             != NULL)) {
2002
            virPidFileDelete(driver->pidDir, radvdpidbase);
2003 2004 2005 2006 2007 2008 2009 2010 2011
            VIR_FREE(radvdpidbase);
        }
        network->radvdPid = -1;
    }
    /* now start radvd if it should be started */
    return networkStartRadvd(network);
}
#endif /* #if 0 */

2012 2013
static int
networkRefreshDaemonsHelper(virNetworkObjPtr net,
2014
                            void *opaque)
2015
{
2016
    virNetworkDriverStatePtr driver = opaque;
2017

2018
    virObjectLock(net);
2019 2020 2021
    if (virNetworkObjIsActive(net) &&
        ((net->def->forward.type == VIR_NETWORK_FORWARD_NONE) ||
         (net->def->forward.type == VIR_NETWORK_FORWARD_NAT) ||
2022 2023
         (net->def->forward.type == VIR_NETWORK_FORWARD_ROUTE) ||
         (net->def->forward.type == VIR_NETWORK_FORWARD_OPEN))) {
2024 2025 2026 2027 2028 2029
        /* Only the three L3 network types that are configured by
         * libvirt will have a dnsmasq or radvd daemon associated
         * with them.  Here we send a SIGHUP to an existing
         * dnsmasq and/or radvd, or restart them if they've
         * disappeared.
         */
2030 2031
        networkRefreshDhcpDaemon(driver, net);
        networkRefreshRadvd(driver, net);
2032
    }
2033
    virObjectUnlock(net);
2034 2035 2036
    return 0;
}

2037 2038 2039 2040
/* SIGHUP/restart any dnsmasq or radvd daemons.
 * This should be called when libvirtd is restarted.
 */
static void
2041
networkRefreshDaemons(virNetworkDriverStatePtr driver)
2042 2043
{
    VIR_INFO("Refreshing network daemons");
2044 2045
    virNetworkObjListForEach(driver->networks,
                             networkRefreshDaemonsHelper,
2046
                             driver);
2047
}
2048

2049 2050 2051 2052 2053
static int
networkReloadFirewallRulesHelper(virNetworkObjPtr net,
                                 void *opaque ATTRIBUTE_UNUSED)
{

2054
    virObjectLock(net);
2055 2056 2057 2058
    if (virNetworkObjIsActive(net) &&
        ((net->def->forward.type == VIR_NETWORK_FORWARD_NONE) ||
         (net->def->forward.type == VIR_NETWORK_FORWARD_NAT) ||
         (net->def->forward.type == VIR_NETWORK_FORWARD_ROUTE))) {
2059 2060 2061 2062
        /* Only three of the L3 network types that are configured by
         * libvirt need to have iptables rules reloaded. The 4th L3
         * network type, forward='open', doesn't need this because it
         * has no iptables rules.
2063 2064 2065 2066
         */
        networkRemoveFirewallRules(net->def);
        if (networkAddFirewallRules(net->def) < 0) {
            /* failed to add but already logged */
2067 2068
        }
    }
2069
    virObjectUnlock(net);
2070
    return 0;
2071 2072
}

2073
static void
2074
networkReloadFirewallRules(virNetworkDriverStatePtr driver)
2075
{
2076
    VIR_INFO("Reloading iptables rules");
2077 2078 2079
    virNetworkObjListForEach(driver->networks,
                             networkReloadFirewallRulesHelper,
                             NULL);
2080 2081
}

2082
/* Enable IP Forwarding. Return 0 for success, -1 for failure. */
2083
static int
2084
networkEnableIPForwarding(bool enableIPv4, bool enableIPv6)
2085
{
2086
    int ret = 0;
2087 2088 2089 2090
#ifdef HAVE_SYSCTLBYNAME
    int enabled = 1;
    if (enableIPv4)
        ret = sysctlbyname("net.inet.ip.forwarding", NULL, 0,
J
Ján Tomko 已提交
2091
                           &enabled, sizeof(enabled));
2092 2093
    if (enableIPv6 && ret == 0)
        ret = sysctlbyname("net.inet6.ip6.forwarding", NULL, 0,
J
Ján Tomko 已提交
2094
                           &enabled, sizeof(enabled));
2095
#else
2096
    if (enableIPv4)
2097
        ret = virFileWriteStr(SYSCTL_PATH "/net/ipv4/ip_forward", "1\n", 0);
2098
    if (enableIPv6 && ret == 0)
2099 2100
        ret = virFileWriteStr(SYSCTL_PATH "/net/ipv6/conf/all/forwarding", "1\n", 0);

2101
#endif
2102
    return ret;
2103 2104
}

2105 2106
static int
networkSetIPv6Sysctls(virNetworkObjPtr network)
2107 2108 2109
{
    char *field = NULL;
    int ret = -1;
2110
    bool enableIPv6 =  !!virNetworkDefGetIPByIndex(network->def, AF_INET6, 0);
2111

2112 2113 2114 2115 2116 2117 2118
    /* set disable_ipv6 if there are no ipv6 addresses defined for the
     * network. But also unset it if there *are* ipv6 addresses, as we
     * can't be sure of its default value.
     */
    if (virAsprintf(&field, SYSCTL_PATH "/net/ipv6/conf/%s/disable_ipv6",
                    network->def->bridge) < 0)
       goto cleanup;
2119

2120 2121
    if (access(field, W_OK) < 0 && errno == ENOENT) {
        if (!enableIPv6)
2122 2123
            VIR_DEBUG("ipv6 appears to already be disabled on %s",
                      network->def->bridge);
2124 2125 2126
        ret = 0;
        goto cleanup;
    }
2127

2128 2129 2130 2131 2132
    if (virFileWriteStr(field, enableIPv6 ? "0" : "1", 0) < 0) {
        virReportSystemError(errno,
                             _("cannot write to %s to enable/disable IPv6 "
                               "on bridge %s"), field, network->def->bridge);
        goto cleanup;
2133
    }
2134
    VIR_FREE(field);
2135

2136 2137
    /* The rest of the ipv6 sysctl tunables should always be set the
     * same, whether or not we're using ipv6 on this bridge.
2138 2139 2140 2141 2142 2143
     */

    /* Prevent guests from hijacking the host network by sending out
     * their own router advertisements.
     */
    if (virAsprintf(&field, SYSCTL_PATH "/net/ipv6/conf/%s/accept_ra",
2144
                    network->def->bridge) < 0)
2145 2146
        goto cleanup;

2147
    if (virFileWriteStr(field, "0", 0) < 0) {
2148
        virReportSystemError(errno,
2149 2150 2151 2152 2153
                             _("cannot disable %s"), field);
        goto cleanup;
    }
    VIR_FREE(field);

2154 2155 2156 2157
    /* All interfaces used as a gateway (which is what this is, by
     * definition), must always have autoconf=0.
     */
    if (virAsprintf(&field, SYSCTL_PATH "/net/ipv6/conf/%s/autoconf",
2158
                    network->def->bridge) < 0)
2159 2160
        goto cleanup;

2161
    if (virFileWriteStr(field, "0", 0) < 0) {
2162
        virReportSystemError(errno,
2163
                             _("cannot disable %s"), field);
2164 2165 2166 2167
        goto cleanup;
    }

    ret = 0;
2168
 cleanup:
2169 2170 2171 2172
    VIR_FREE(field);
    return ret;
}

2173
/* add an IP address to a bridge */
2174
static int
D
Daniel P. Berrange 已提交
2175
networkAddAddrToBridge(virNetworkObjPtr network,
2176
                       virNetworkIPDefPtr ipdef)
2177
{
2178
    int prefix = virNetworkIPDefPrefix(ipdef);
2179 2180

    if (prefix < 0) {
2181 2182 2183
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("bridge '%s' has an invalid netmask or IP address"),
                       network->def->bridge);
2184 2185 2186
        return -1;
    }

2187 2188
    if (virNetDevIPAddrAdd(network->def->bridge,
                           &ipdef->address, NULL, prefix) < 0)
2189 2190 2191 2192 2193
        return -1;

    return 0;
}

2194 2195 2196 2197 2198 2199 2200 2201 2202 2203 2204 2205 2206 2207 2208 2209 2210 2211 2212 2213 2214 2215 2216

static int
networkStartHandleMACTableManagerMode(virNetworkObjPtr network,
                                      const char *macTapIfName)
{
    const char *brname = network->def->bridge;

    if (brname &&
        network->def->macTableManager
        == VIR_NETWORK_BRIDGE_MAC_TABLE_MANAGER_LIBVIRT) {
        if (virNetDevBridgeSetVlanFiltering(brname, true) < 0)
            return -1;
        if (macTapIfName) {
            if (virNetDevBridgePortSetLearning(brname, macTapIfName, false) < 0)
                return -1;
            if (virNetDevBridgePortSetUnicastFlood(brname, macTapIfName, false) < 0)
                return -1;
        }
    }
    return 0;
}


2217 2218 2219
/* add an IP (static) route to a bridge */
static int
networkAddRouteToBridge(virNetworkObjPtr network,
2220
                        virNetDevIPRoutePtr routedef)
2221
{
2222 2223 2224 2225
    int prefix = virNetDevIPRouteGetPrefix(routedef);
    unsigned int metric = virNetDevIPRouteGetMetric(routedef);
    virSocketAddrPtr addr = virNetDevIPRouteGetAddress(routedef);
    virSocketAddrPtr gateway = virNetDevIPRouteGetGateway(routedef);
2226 2227 2228 2229 2230 2231 2232 2233 2234

    if (prefix < 0) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("network '%s' has an invalid netmask "
                         "or IP address in route definition"),
                       network->def->name);
        return -1;
    }

2235 2236
    if (virNetDevIPRouteAdd(network->def->bridge, addr,
                            prefix, gateway, metric) < 0) {
2237 2238 2239 2240 2241
        return -1;
    }
    return 0;
}

2242 2243 2244
static int
networkWaitDadFinish(virNetworkObjPtr network)
{
2245
    virNetworkIPDefPtr ipdef;
2246 2247 2248 2249 2250 2251
    virSocketAddrPtr *addrs = NULL, addr = NULL;
    size_t naddrs = 0;
    int ret = -1;

    VIR_DEBUG("Begin waiting for IPv6 DAD on network %s", network->def->name);

2252
    while ((ipdef = virNetworkDefGetIPByIndex(network->def,
2253 2254 2255 2256 2257 2258
                                              AF_INET6, naddrs))) {
        addr = &ipdef->address;
        if (VIR_APPEND_ELEMENT_COPY(addrs, naddrs, addr) < 0)
            goto cleanup;
    }

2259
    ret = (naddrs == 0) ? 0 : virNetDevIPWaitDadFinish(addrs, naddrs);
2260 2261 2262 2263 2264 2265 2266 2267

 cleanup:
    VIR_FREE(addrs);
    VIR_DEBUG("Finished waiting for IPv6 DAD on network %s with status %d",
              network->def->name, ret);
    return ret;
}

2268
static int
2269 2270
networkStartNetworkVirtual(virNetworkDriverStatePtr driver,
                           virNetworkObjPtr network)
2271
{
2272
    size_t i;
2273
    bool v4present = false, v6present = false;
2274
    virErrorPtr save_err = NULL;
2275
    virNetworkIPDefPtr ipdef;
2276
    virNetDevIPRoutePtr routedef;
2277
    char *macTapIfName = NULL;
M
Michal Privoznik 已提交
2278
    char *macMapFile = NULL;
2279
    int tapfd = -1;
2280

2281
    /* Check to see if any network IP collides with an existing route */
2282
    if (networkCheckRouteCollision(network->def) < 0)
2283 2284
        return -1;

2285
    /* Create and configure the bridge device */
2286 2287 2288 2289 2290 2291 2292 2293 2294 2295 2296 2297 2298 2299
    if (!network->def->bridge) {
        /* bridge name can only be empty if the config files were
         * edited directly. Otherwise networkValidate() (called after
         * parsing the XML from networkCreateXML() and
         * networkDefine()) guarantees we will have a valid bridge
         * name before this point. Since hand editing of the config
         * files is explicitly prohibited we can, with clear
         * conscience, log an error and fail at this point.
         */
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("network '%s' has no bridge name defined"),
                       network->def->name);
        return -1;
    }
2300
    if (virNetDevBridgeCreate(network->def->bridge) < 0)
2301 2302
        return -1;

2303 2304 2305 2306 2307 2308 2309 2310
    if (network->def->mac_specified) {
        /* To set a mac for the bridge, we need to define a dummy tap
         * device, set its mac, then attach it to the bridge. As long
         * as its mac address is lower than any other interface that
         * gets attached, the bridge will always maintain this mac
         * address.
         */
        macTapIfName = networkBridgeDummyNicName(network->def->bridge);
2311
        if (!macTapIfName)
2312
            goto err0;
2313
        /* Keep tun fd open and interface up to allow for IPv6 DAD to happen */
2314
        if (virNetDevTapCreateInBridgePort(network->def->bridge,
2315
                                           &macTapIfName, &network->def->mac,
2316
                                           NULL, NULL, &tapfd, 1, NULL, NULL,
2317
                                           network->def->mtu, NULL,
2318 2319 2320
                                           VIR_NETDEV_TAP_CREATE_USE_MAC_FOR_BRIDGE |
                                           VIR_NETDEV_TAP_CREATE_IFUP |
                                           VIR_NETDEV_TAP_CREATE_PERSIST) < 0) {
2321 2322 2323 2324 2325
            VIR_FREE(macTapIfName);
            goto err0;
        }
    }

M
Michal Privoznik 已提交
2326 2327 2328 2329
    if (!(macMapFile = networkMacMgrFileName(driver, network->def->bridge)) ||
        !(network->macmap = virMacMapNew(macMapFile)))
        goto err1;

2330
    /* Set bridge options */
2331 2332 2333 2334

    /* delay is configured in seconds, but virNetDevBridgeSetSTPDelay
     * expects milliseconds
     */
2335
    if (virNetDevBridgeSetSTPDelay(network->def->bridge,
2336
                                   network->def->delay * 1000) < 0)
2337
        goto err1;
2338

2339
    if (virNetDevBridgeSetSTP(network->def->bridge,
2340
                              network->def->stp ? true : false) < 0)
2341
        goto err1;
2342

2343 2344 2345 2346
    /* Disable IPv6 on the bridge if there are no IPv6 addresses
     * defined, and set other IPv6 sysctl tunables appropriately.
     */
    if (networkSetIPv6Sysctls(network) < 0)
2347
        goto err1;
2348

2349
    /* Add "once per network" rules */
2350 2351
    if (network->def->forward.type != VIR_NETWORK_FORWARD_OPEN &&
        networkAddFirewallRules(network->def) < 0)
2352 2353
        goto err1;

2354
    for (i = 0;
2355
         (ipdef = virNetworkDefGetIPByIndex(network->def, AF_UNSPEC, i));
2356
         i++) {
2357
        if (VIR_SOCKET_ADDR_IS_FAMILY(&ipdef->address, AF_INET))
2358
            v4present = true;
2359
        if (VIR_SOCKET_ADDR_IS_FAMILY(&ipdef->address, AF_INET6))
2360
            v6present = true;
2361

2362
        /* Add the IP address/netmask to the bridge */
2363
        if (networkAddAddrToBridge(network, ipdef) < 0)
2364
            goto err2;
2365 2366
    }

2367 2368 2369
    if (networkStartHandleMACTableManagerMode(network, macTapIfName) < 0)
        goto err2;

2370
    /* Bring up the bridge interface */
2371
    if (virNetDevSetOnline(network->def->bridge, 1) < 0)
2372
        goto err2;
2373

2374
    for (i = 0; i < network->def->nroutes; i++) {
2375 2376 2377
        virSocketAddrPtr gateway = NULL;

        routedef = network->def->routes[i];
2378
        gateway = virNetDevIPRouteGetGateway(routedef);
2379

2380 2381 2382
        /* Add the IP route to the bridge */
        /* ignore errors, error msg will be generated */
        /* but libvirt will not know and net-destroy will work. */
2383
        if (VIR_SOCKET_ADDR_VALID(gateway)) {
2384 2385 2386 2387 2388 2389 2390
            if (networkAddRouteToBridge(network, routedef) < 0) {
                /* an error occurred adding the static route */
                continue; /* for now, do nothing */
            }
        }
    }

2391 2392
    /* If forward.type != NONE, turn on global IP forwarding */
    if (network->def->forward.type != VIR_NETWORK_FORWARD_NONE &&
2393
        networkEnableIPForwarding(v4present, v6present) < 0) {
2394
        virReportSystemError(errno, "%s",
2395
                             _("failed to enable IP forwarding"));
2396
        goto err3;
2397 2398
    }

2399

2400
    /* start dnsmasq if there are any IP addresses (v4 or v6) */
2401
    if ((v4present || v6present) &&
2402
        networkStartDhcpDaemon(driver, network) < 0)
2403
        goto err3;
2404

2405
    /* start radvd if there are any ipv6 addresses */
2406
    if (v6present && networkStartRadvd(driver, network) < 0)
2407 2408
        goto err4;

2409 2410 2411 2412 2413 2414 2415 2416
    /* dnsmasq does not wait for DAD to complete before daemonizing,
     * so we need to wait for it ourselves.
     */
    if (v6present && networkWaitDadFinish(network) < 0)
        goto err4;

    /* DAD has finished, dnsmasq is now bound to the
     * bridge's IPv6 address, so we can set the dummy tun down.
2417 2418 2419 2420 2421 2422 2423
     */
    if (tapfd >= 0) {
        if (virNetDevSetOnline(macTapIfName, false) < 0)
            goto err4;
        VIR_FORCE_CLOSE(tapfd);
    }

2424
    if (virNetDevBandwidthSet(network->def->bridge,
2425
                              network->def->bandwidth, true) < 0)
2426 2427
        goto err5;

2428
    VIR_FREE(macTapIfName);
M
Michal Privoznik 已提交
2429
    VIR_FREE(macMapFile);
2430 2431 2432

    return 0;

2433
 err5:
2434 2435
    if (network->def->bandwidth)
       virNetDevBandwidthClear(network->def->bridge);
2436

2437 2438 2439 2440
 err4:
    if (!save_err)
        save_err = virSaveLastError();

2441 2442 2443 2444 2445
    if (network->dnsmasqPid > 0) {
        kill(network->dnsmasqPid, SIGTERM);
        network->dnsmasqPid = -1;
    }

2446 2447 2448
 err3:
    if (!save_err)
        save_err = virSaveLastError();
2449
    ignore_value(virNetDevSetOnline(network->def->bridge, 0));
2450

2451 2452 2453
 err2:
    if (!save_err)
        save_err = virSaveLastError();
2454 2455
    if (network->def->forward.type != VIR_NETWORK_FORWARD_OPEN)
        networkRemoveFirewallRules(network->def);
2456 2457

 err1:
2458 2459 2460
    if (!save_err)
        save_err = virSaveLastError();

H
Hu Tao 已提交
2461
    if (macTapIfName) {
2462
        VIR_FORCE_CLOSE(tapfd);
2463
        ignore_value(virNetDevTapDelete(macTapIfName, NULL));
H
Hu Tao 已提交
2464 2465
        VIR_FREE(macTapIfName);
    }
M
Michal Privoznik 已提交
2466
    VIR_FREE(macMapFile);
2467 2468

 err0:
2469 2470
    if (!save_err)
        save_err = virSaveLastError();
2471
    ignore_value(virNetDevBridgeDelete(network->def->bridge));
2472

2473 2474 2475 2476
    if (save_err) {
        virSetError(save_err);
        virFreeError(save_err);
    }
2477
    /* coverity[leaked_handle] - 'tapfd' is not leaked */
2478 2479 2480
    return -1;
}

2481 2482 2483
static int
networkShutdownNetworkVirtual(virNetworkDriverStatePtr driver,
                              virNetworkObjPtr network)
2484
{
2485 2486
    if (network->def->bandwidth)
        virNetDevBandwidthClear(network->def->bridge);
2487

M
Michal Privoznik 已提交
2488 2489
    virObjectUnref(network->macmap);

2490 2491 2492 2493 2494
    if (network->radvdPid > 0) {
        char *radvdpidbase;

        kill(network->radvdPid, SIGTERM);
        /* attempt to delete the pidfile we created */
2495
        if ((radvdpidbase = networkRadvdPidfileBasename(network->def->name))) {
2496
            virPidFileDelete(driver->pidDir, radvdpidbase);
2497 2498 2499 2500
            VIR_FREE(radvdpidbase);
        }
    }

2501 2502 2503
    if (network->dnsmasqPid > 0)
        kill(network->dnsmasqPid, SIGTERM);

2504
    if (network->def->mac_specified) {
2505
        char *macTapIfName = networkBridgeDummyNicName(network->def->bridge);
2506
        if (macTapIfName) {
2507
            ignore_value(virNetDevTapDelete(macTapIfName, NULL));
2508 2509 2510 2511
            VIR_FREE(macTapIfName);
        }
    }

2512
    ignore_value(virNetDevSetOnline(network->def->bridge, 0));
2513

2514 2515
    if (network->def->forward.type != VIR_NETWORK_FORWARD_OPEN)
        networkRemoveFirewallRules(network->def);
2516

2517
    ignore_value(virNetDevBridgeDelete(network->def->bridge));
2518

2519
    /* See if its still alive and really really kill it */
2520
    if (network->dnsmasqPid > 0 &&
2521
        (kill(network->dnsmasqPid, 0) == 0))
2522 2523
        kill(network->dnsmasqPid, SIGKILL);
    network->dnsmasqPid = -1;
2524 2525 2526 2527 2528 2529

    if (network->radvdPid > 0 &&
        (kill(network->radvdPid, 0) == 0))
        kill(network->radvdPid, SIGKILL);
    network->radvdPid = -1;

2530 2531 2532
    return 0;
}

2533

2534 2535 2536 2537 2538 2539 2540 2541 2542 2543 2544 2545 2546 2547 2548 2549 2550 2551 2552 2553 2554
static int
networkStartNetworkBridge(virNetworkObjPtr network)
{
    /* put anything here that needs to be done each time a network of
     * type BRIDGE, is started. On failure, undo anything you've done,
     * and return -1. On success return 0.
     */
    return networkStartHandleMACTableManagerMode(network, NULL);
}

static int
networkShutdownNetworkBridge(virNetworkObjPtr network ATTRIBUTE_UNUSED)
{
    /* put anything here that needs to be done each time a network of
     * type BRIDGE is shutdown. On failure, undo anything you've done,
     * and return -1. On success return 0.
     */
    return 0;
}


2555 2556 2557 2558 2559 2560 2561 2562 2563
/* networkCreateInterfacePool:
 * @netdef: the original NetDef from the network
 *
 * Creates an implicit interface pool of VF's when a PF dev is given
 */
static int
networkCreateInterfacePool(virNetworkDefPtr netdef)
{
    size_t numVirtFns = 0;
2564
    unsigned int maxVirtFns = 0;
2565 2566 2567 2568 2569 2570
    char **vfNames = NULL;
    virPCIDeviceAddressPtr *virtFns;

    int ret = -1;
    size_t i;

2571 2572 2573
    if (netdef->forward.npfs == 0 || netdef->forward.nifs > 0)
       return 0;

2574 2575
    if ((virNetDevGetVirtualFunctions(netdef->forward.pfs->dev, &vfNames,
                                      &virtFns, &numVirtFns, &maxVirtFns)) < 0) {
2576 2577 2578 2579 2580 2581 2582 2583 2584 2585 2586 2587 2588 2589 2590 2591 2592 2593 2594 2595 2596 2597 2598 2599 2600 2601 2602 2603 2604 2605 2606 2607 2608 2609 2610 2611 2612 2613 2614 2615 2616 2617 2618 2619 2620 2621
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("Could not get Virtual functions on %s"),
                       netdef->forward.pfs->dev);
        goto cleanup;
    }

    if (VIR_ALLOC_N(netdef->forward.ifs, numVirtFns) < 0)
        goto cleanup;

    for (i = 0; i < numVirtFns; i++) {
        virPCIDeviceAddressPtr thisVirtFn = virtFns[i];
        const char *thisName = vfNames[i];
        virNetworkForwardIfDefPtr thisIf
            = &netdef->forward.ifs[netdef->forward.nifs];

        switch (netdef->forward.type) {
        case VIR_NETWORK_FORWARD_BRIDGE:
        case VIR_NETWORK_FORWARD_PRIVATE:
        case VIR_NETWORK_FORWARD_VEPA:
        case VIR_NETWORK_FORWARD_PASSTHROUGH:
            if (thisName) {
                if (VIR_STRDUP(thisIf->device.dev, thisName) < 0)
                    goto cleanup;
                thisIf->type = VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV;
                netdef->forward.nifs++;
            } else {
                VIR_WARN("VF %zu of SRIOV PF %s couldn't be added to the "
                         "interface pool because it isn't bound "
                         "to a network driver - possibly in use elsewhere",
                         i, netdef->forward.pfs->dev);
            }
            break;

        case VIR_NETWORK_FORWARD_HOSTDEV:
            /* VF's are always PCI devices */
            thisIf->type = VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_PCI;
            thisIf->device.pci.domain = thisVirtFn->domain;
            thisIf->device.pci.bus = thisVirtFn->bus;
            thisIf->device.pci.slot = thisVirtFn->slot;
            thisIf->device.pci.function = thisVirtFn->function;
            netdef->forward.nifs++;
            break;

        case VIR_NETWORK_FORWARD_NONE:
        case VIR_NETWORK_FORWARD_NAT:
        case VIR_NETWORK_FORWARD_ROUTE:
2622
        case VIR_NETWORK_FORWARD_OPEN:
2623 2624 2625 2626 2627 2628 2629 2630 2631 2632 2633 2634 2635 2636 2637 2638 2639 2640 2641 2642 2643 2644 2645 2646 2647 2648 2649 2650 2651 2652 2653 2654 2655 2656 2657 2658 2659 2660 2661 2662
        case VIR_NETWORK_FORWARD_LAST:
            /* by definition these will never be encountered here */
            break;
        }
    }

    if (netdef->forward.nifs == 0) {
        /* If we don't get at least one interface in the pool, declare
         * failure
         */
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("No usable Vf's present on SRIOV PF %s"),
                       netdef->forward.pfs->dev);
        goto cleanup;
    }

    ret = 0;
 cleanup:
    if (ret < 0) {
        /* free all the entries made before error */
        for (i = 0; i < netdef->forward.nifs; i++) {
            if (netdef->forward.ifs[i].type
                == VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV)
                VIR_FREE(netdef->forward.ifs[i].device.dev);
        }
        netdef->forward.nifs = 0;
    }
    if (netdef->forward.nifs == 0)
        VIR_FREE(netdef->forward.ifs);

    for (i = 0; i < numVirtFns; i++) {
        VIR_FREE(vfNames[i]);
        VIR_FREE(virtFns[i]);
    }
    VIR_FREE(vfNames);
    VIR_FREE(virtFns);
    return ret;
}


2663
static int
2664
networkStartNetworkExternal(virNetworkObjPtr network)
2665 2666
{
    /* put anything here that needs to be done each time a network of
2667
     * type BRIDGE, PRIVATE, VEPA, HOSTDEV or PASSTHROUGH is started. On
2668 2669 2670
     * failure, undo anything you've done, and return -1. On success
     * return 0.
     */
2671
    return networkCreateInterfacePool(network->def);
2672 2673
}

2674
static int networkShutdownNetworkExternal(virNetworkObjPtr network ATTRIBUTE_UNUSED)
2675 2676
{
    /* put anything here that needs to be done each time a network of
2677
     * type BRIDGE, PRIVATE, VEPA, HOSTDEV or PASSTHROUGH is shutdown. On
2678 2679 2680 2681 2682 2683 2684
     * failure, undo anything you've done, and return -1. On success
     * return 0.
     */
    return 0;
}

static int
2685 2686
networkStartNetwork(virNetworkDriverStatePtr driver,
                    virNetworkObjPtr network)
2687
{
2688 2689 2690
    int ret = -1;

    VIR_DEBUG("driver=%p, network=%p", driver, network);
2691 2692

    if (virNetworkObjIsActive(network)) {
2693 2694
        virReportError(VIR_ERR_OPERATION_INVALID,
                       "%s", _("network is already active"));
2695
        return ret;
2696 2697
    }

2698 2699 2700
    VIR_DEBUG("Beginning network startup process");

    VIR_DEBUG("Setting current network def as transient");
2701
    if (virNetworkObjSetDefTransient(network, true) < 0)
2702
        goto cleanup;
2703

2704 2705
    /* Run an early hook to set-up missing devices.
     * If the script raised an error abort the launch. */
2706
    if (networkRunHook(network, NULL, NULL,
2707 2708 2709 2710
                       VIR_HOOK_NETWORK_OP_START,
                       VIR_HOOK_SUBOP_BEGIN) < 0)
        goto cleanup;

2711
    switch (network->def->forward.type) {
2712 2713 2714 2715

    case VIR_NETWORK_FORWARD_NONE:
    case VIR_NETWORK_FORWARD_NAT:
    case VIR_NETWORK_FORWARD_ROUTE:
2716
    case VIR_NETWORK_FORWARD_OPEN:
2717
        if (networkStartNetworkVirtual(driver, network) < 0)
2718
            goto cleanup;
2719 2720 2721
        break;

    case VIR_NETWORK_FORWARD_BRIDGE:
2722 2723 2724 2725 2726 2727 2728 2729 2730
        if (network->def->bridge) {
            if (networkStartNetworkBridge(network) < 0)
                goto cleanup;
            break;
        }
        /* intentionally fall through to the macvtap/direct case for
         * VIR_NETWORK_FORWARD_BRIDGE with no bridge device defined
         * (since that is macvtap bridge mode).
         */
2731 2732
        ATTRIBUTE_FALLTHROUGH;

2733 2734 2735
    case VIR_NETWORK_FORWARD_PRIVATE:
    case VIR_NETWORK_FORWARD_VEPA:
    case VIR_NETWORK_FORWARD_PASSTHROUGH:
2736
    case VIR_NETWORK_FORWARD_HOSTDEV:
2737
        if (networkStartNetworkExternal(network) < 0)
2738
            goto cleanup;
2739 2740 2741
        break;
    }

2742
    /* finally we can call the 'started' hook script if any */
2743
    if (networkRunHook(network, NULL, NULL,
2744 2745 2746 2747
                       VIR_HOOK_NETWORK_OP_STARTED,
                       VIR_HOOK_SUBOP_BEGIN) < 0)
        goto cleanup;

2748 2749 2750
    /* Persist the live configuration now that anything autogenerated
     * is setup.
     */
2751
    VIR_DEBUG("Writing network status to disk");
2752
    if (virNetworkSaveStatus(driver->stateDir, network) < 0)
2753
        goto cleanup;
2754 2755

    network->active = 1;
2756 2757
    VIR_INFO("Network '%s' started up", network->def->name);
    ret = 0;
2758

2759
 cleanup:
2760
    if (ret < 0) {
2761
        virNetworkObjUnsetDefTransient(network);
2762 2763
        virErrorPtr save_err = virSaveLastError();
        int save_errno = errno;
2764
        networkShutdownNetwork(driver, network);
2765 2766 2767 2768 2769 2770 2771
        virSetError(save_err);
        virFreeError(save_err);
        errno = save_errno;
    }
    return ret;
}

2772 2773 2774
static int
networkShutdownNetwork(virNetworkDriverStatePtr driver,
                       virNetworkObjPtr network)
2775 2776 2777 2778 2779 2780 2781 2782 2783
{
    int ret = 0;
    char *stateFile;

    VIR_INFO("Shutting down network '%s'", network->def->name);

    if (!virNetworkObjIsActive(network))
        return 0;

2784
    stateFile = virNetworkConfigFile(driver->stateDir,
2785
                                     network->def->name);
2786 2787 2788 2789 2790 2791
    if (!stateFile)
        return -1;

    unlink(stateFile);
    VIR_FREE(stateFile);

2792
    switch (network->def->forward.type) {
2793 2794 2795 2796

    case VIR_NETWORK_FORWARD_NONE:
    case VIR_NETWORK_FORWARD_NAT:
    case VIR_NETWORK_FORWARD_ROUTE:
2797
    case VIR_NETWORK_FORWARD_OPEN:
2798
        ret = networkShutdownNetworkVirtual(driver, network);
2799 2800 2801
        break;

    case VIR_NETWORK_FORWARD_BRIDGE:
2802 2803 2804 2805 2806 2807 2808 2809
        if (network->def->bridge) {
            ret = networkShutdownNetworkBridge(network);
            break;
        }
        /* intentionally fall through to the macvtap/direct case for
         * VIR_NETWORK_FORWARD_BRIDGE with no bridge device defined
         * (since that is macvtap bridge mode).
         */
2810 2811
        ATTRIBUTE_FALLTHROUGH;

2812 2813 2814
    case VIR_NETWORK_FORWARD_PRIVATE:
    case VIR_NETWORK_FORWARD_VEPA:
    case VIR_NETWORK_FORWARD_PASSTHROUGH:
2815
    case VIR_NETWORK_FORWARD_HOSTDEV:
2816
        ret = networkShutdownNetworkExternal(network);
2817 2818 2819
        break;
    }

2820
    /* now that we know it's stopped call the hook if present */
2821
    networkRunHook(network, NULL, NULL, VIR_HOOK_NETWORK_OP_STOPPED,
2822 2823
                   VIR_HOOK_SUBOP_END);

2824
    network->active = 0;
2825
    virNetworkObjUnsetDefTransient(network);
2826
    return ret;
2827 2828 2829
}


2830
static virNetworkPtr networkLookupByUUID(virConnectPtr conn,
2831 2832
                                         const unsigned char *uuid)
{
2833
    virNetworkDriverStatePtr driver = networkGetDriver();
2834 2835
    virNetworkObjPtr network;
    virNetworkPtr ret = NULL;
2836

2837
    network = virNetworkObjFindByUUID(driver->networks, uuid);
2838
    if (!network) {
2839 2840
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(uuid, uuidstr);
2841
        virReportError(VIR_ERR_NO_NETWORK,
2842 2843
                       _("no network with matching uuid '%s'"),
                       uuidstr);
2844
        goto cleanup;
2845 2846
    }

2847 2848 2849
    if (virNetworkLookupByUUIDEnsureACL(conn, network->def) < 0)
        goto cleanup;

2850 2851
    ret = virGetNetwork(conn, network->def->name, network->def->uuid);

2852
 cleanup:
2853
    virNetworkObjEndAPI(&network);
2854
    return ret;
2855 2856
}

2857
static virNetworkPtr networkLookupByName(virConnectPtr conn,
2858 2859
                                         const char *name)
{
2860
    virNetworkDriverStatePtr driver = networkGetDriver();
2861 2862 2863
    virNetworkObjPtr network;
    virNetworkPtr ret = NULL;

2864
    network = virNetworkObjFindByName(driver->networks, name);
2865
    if (!network) {
2866 2867
        virReportError(VIR_ERR_NO_NETWORK,
                       _("no network with matching name '%s'"), name);
2868
        goto cleanup;
2869 2870
    }

2871 2872 2873
    if (virNetworkLookupByNameEnsureACL(conn, network->def) < 0)
        goto cleanup;

2874 2875
    ret = virGetNetwork(conn, network->def->name, network->def->uuid);

2876
 cleanup:
2877
    virNetworkObjEndAPI(&network);
2878
    return ret;
2879 2880
}

2881 2882
static int networkConnectNumOfNetworks(virConnectPtr conn)
{
2883
    virNetworkDriverStatePtr driver = networkGetDriver();
2884
    int nactive;
2885

2886 2887 2888
    if (virConnectNumOfNetworksEnsureACL(conn) < 0)
        return -1;

2889 2890 2891 2892
    nactive = virNetworkObjListNumOfNetworks(driver->networks,
                                             true,
                                             virConnectNumOfNetworksCheckACL,
                                             conn);
2893

2894 2895 2896
    return nactive;
}

2897 2898 2899 2900 2901
static int networkConnectListNetworks(virConnectPtr conn,
                                      char **const names,
                                      int nnames)
{
    virNetworkDriverStatePtr driver = networkGetDriver();
2902
    int got = 0;
2903

2904 2905 2906
    if (virConnectListNetworksEnsureACL(conn) < 0)
        return -1;

2907 2908 2909 2910
    got = virNetworkObjListGetNames(driver->networks,
                                    true, names, nnames,
                                    virConnectListNetworksCheckACL,
                                    conn);
2911

2912 2913 2914
    return got;
}

2915 2916
static int networkConnectNumOfDefinedNetworks(virConnectPtr conn)
{
2917
    virNetworkDriverStatePtr driver = networkGetDriver();
2918
    int ninactive = 0;
2919

2920 2921 2922
    if (virConnectNumOfDefinedNetworksEnsureACL(conn) < 0)
        return -1;

2923 2924 2925 2926
    ninactive = virNetworkObjListNumOfNetworks(driver->networks,
                                               false,
                                               virConnectNumOfDefinedNetworksCheckACL,
                                               conn);
2927

2928 2929 2930
    return ninactive;
}

2931 2932 2933
static int networkConnectListDefinedNetworks(virConnectPtr conn, char **const names, int nnames)
{
    virNetworkDriverStatePtr driver = networkGetDriver();
2934
    int got = 0;
2935

2936 2937 2938
    if (virConnectListDefinedNetworksEnsureACL(conn) < 0)
        return -1;

2939 2940 2941 2942
    got = virNetworkObjListGetNames(driver->networks,
                                    false, names, nnames,
                                    virConnectListDefinedNetworksCheckACL,
                                    conn);
2943 2944 2945
    return got;
}

2946
static int
2947 2948 2949
networkConnectListAllNetworks(virConnectPtr conn,
                              virNetworkPtr **nets,
                              unsigned int flags)
2950
{
2951
    virNetworkDriverStatePtr driver = networkGetDriver();
2952 2953 2954 2955
    int ret = -1;

    virCheckFlags(VIR_CONNECT_LIST_NETWORKS_FILTERS_ALL, -1);

2956 2957 2958
    if (virConnectListAllNetworksEnsureACL(conn) < 0)
        goto cleanup;

2959
    ret = virNetworkObjListExport(conn, driver->networks, nets,
2960 2961
                                  virConnectListAllNetworksCheckACL,
                                  flags);
2962

2963
 cleanup:
2964 2965
    return ret;
}
2966

2967 2968 2969 2970 2971 2972 2973 2974
static int
networkConnectNetworkEventRegisterAny(virConnectPtr conn,
                                      virNetworkPtr net,
                                      int eventID,
                                      virConnectNetworkEventGenericCallback callback,
                                      void *opaque,
                                      virFreeCallback freecb)
{
2975
    virNetworkDriverStatePtr driver = networkGetDriver();
2976 2977 2978 2979 2980 2981
    int ret = -1;

    if (virConnectNetworkEventRegisterAnyEnsureACL(conn) < 0)
        goto cleanup;

    if (virNetworkEventStateRegisterID(conn, driver->networkEventState,
2982
                                       net, eventID, callback,
2983 2984 2985
                                       opaque, freecb, &ret) < 0)
        ret = -1;

2986
 cleanup:
2987 2988 2989 2990 2991 2992 2993
    return ret;
}

static int
networkConnectNetworkEventDeregisterAny(virConnectPtr conn,
                                        int callbackID)
{
2994
    virNetworkDriverStatePtr driver = networkGetDriver();
2995 2996 2997 2998 2999
    int ret = -1;

    if (virConnectNetworkEventDeregisterAnyEnsureACL(conn) < 0)
        goto cleanup;

3000 3001 3002 3003 3004 3005
    if (virObjectEventStateDeregisterID(conn,
                                        driver->networkEventState,
                                        callbackID) < 0)
        goto cleanup;

    ret = 0;
3006

3007
 cleanup:
3008 3009 3010
    return ret;
}

3011 3012 3013 3014 3015
static int networkIsActive(virNetworkPtr net)
{
    virNetworkObjPtr obj;
    int ret = -1;

3016 3017
    if (!(obj = networkObjFromNetwork(net)))
        return ret;
3018 3019 3020 3021

    if (virNetworkIsActiveEnsureACL(net->conn, obj->def) < 0)
        goto cleanup;

3022 3023
    ret = virNetworkObjIsActive(obj);

3024
 cleanup:
3025
    virNetworkObjEndAPI(&obj);
3026 3027 3028 3029 3030 3031 3032 3033
    return ret;
}

static int networkIsPersistent(virNetworkPtr net)
{
    virNetworkObjPtr obj;
    int ret = -1;

3034 3035
    if (!(obj = networkObjFromNetwork(net)))
        return ret;
3036 3037 3038 3039

    if (virNetworkIsPersistentEnsureACL(net->conn, obj->def) < 0)
        goto cleanup;

3040 3041
    ret = obj->persistent;

3042
 cleanup:
3043
    virNetworkObjEndAPI(&obj);
3044 3045 3046 3047
    return ret;
}


3048 3049
/*
 * networkFindUnusedBridgeName() - try to find a bridge name that is
3050 3051 3052
 * unused by the currently configured libvirt networks, as well as by
 * the host system itself (possibly created by someone/something other
 * than libvirt). Set this network's name to that new name.
3053 3054 3055 3056 3057 3058 3059 3060
 */
static int
networkFindUnusedBridgeName(virNetworkObjListPtr nets,
                            virNetworkDefPtr def)
{

    int ret = -1, id = 0;
    char *newname = NULL;
3061 3062 3063 3064 3065
    const char *templ = "virbr%d";
    const char *p;

    if (def->bridge &&
        (p = strchr(def->bridge, '%')) == strrchr(def->bridge, '%') &&
3066
        p && p[1] == 'd')
3067
        templ = def->bridge;
3068 3069 3070 3071

    do {
        if (virAsprintf(&newname, templ, id) < 0)
            goto cleanup;
3072 3073 3074 3075 3076 3077 3078
        /* check if this name is used in another libvirt network or
         * there is an existing device with that name. ignore errors
         * from virNetDevExists(), just in case it isn't implemented
         * on this platform (probably impossible).
         */
        if (!(virNetworkBridgeInUse(nets, newname, def->name) ||
              virNetDevExists(newname) == 1)) {
3079 3080 3081 3082 3083 3084 3085 3086 3087 3088 3089 3090 3091 3092 3093 3094 3095 3096 3097 3098 3099 3100 3101 3102 3103 3104 3105 3106 3107 3108 3109 3110 3111 3112 3113 3114 3115 3116 3117 3118 3119 3120 3121 3122 3123 3124 3125 3126 3127 3128 3129 3130
            VIR_FREE(def->bridge); /*could contain template */
            def->bridge = newname;
            ret = 0;
            goto cleanup;
        }
        VIR_FREE(newname);
    } while (++id <= MAX_BRIDGE_ID);

    virReportError(VIR_ERR_INTERNAL_ERROR,
                   _("Bridge generation exceeded max id %d"),
                   MAX_BRIDGE_ID);
    ret = 0;
 cleanup:
    if (ret < 0)
        VIR_FREE(newname);
    return ret;
}



/*
 * networkValidateBridgeName() - if no bridge name is set, or if the
 * bridge name contains a %d (indicating that this is a template for
 * the actual name) try to set an appropriate bridge name.  If a
 * bridge name *is* set, make sure it doesn't conflict with any other
 * network's bridge name.
 */
static int
networkBridgeNameValidate(virNetworkObjListPtr nets,
                          virNetworkDefPtr def)
{
    int ret = -1;

    if (def->bridge && !strstr(def->bridge, "%d")) {
        if (virNetworkBridgeInUse(nets, def->bridge, def->name)) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("bridge name '%s' already in use."),
                           def->bridge);
            goto cleanup;
        }
    } else {
        /* Allocate a bridge name */
        if (networkFindUnusedBridgeName(nets, def) < 0)
            goto cleanup;
    }

    ret = 0;
 cleanup:
    return ret;
}


3131
static int
3132
networkValidate(virNetworkDriverStatePtr driver,
3133
                virNetworkDefPtr def)
3134
{
3135
    size_t i, j;
3136 3137
    bool vlanUsed, vlanAllowed, badVlanUse = false;
    virPortGroupDefPtr defaultPortGroup = NULL;
3138
    virNetworkIPDefPtr ipdef;
G
Gene Czarcinski 已提交
3139
    bool ipv4def = false, ipv6def = false;
3140
    bool bandwidthAllowed = true;
3141
    bool usesInterface = false, usesAddress = false;
3142

3143 3144 3145
    if (virXMLCheckIllegalChars("name", def->name, "\n") < 0)
        return -1;

3146 3147 3148
    /* Only the three L3 network types that are configured by libvirt
     * need to have a bridge device name / mac address provided
     */
3149 3150
    if (def->forward.type == VIR_NETWORK_FORWARD_NONE ||
        def->forward.type == VIR_NETWORK_FORWARD_NAT ||
3151 3152
        def->forward.type == VIR_NETWORK_FORWARD_ROUTE ||
        def->forward.type == VIR_NETWORK_FORWARD_OPEN) {
3153

3154 3155 3156 3157
        /* if no bridge name was given in the config, find a name
         * unused by any other libvirt networks and assign it.
         */
        if (networkBridgeNameValidate(driver->networks, def) < 0)
3158 3159 3160
            return -1;

        virNetworkSetBridgeMacAddr(def);
3161 3162
    } else {
        /* They are also the only types that currently support setting
3163 3164
         * a MAC or IP address for the host-side device (bridge), DNS
         * configuration, or network-wide bandwidth limits.
3165
         */
3166 3167 3168 3169 3170 3171 3172 3173
        if (def->mac_specified) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("Unsupported <mac> element in network %s "
                             "with forward mode='%s'"),
                           def->name,
                           virNetworkForwardTypeToString(def->forward.type));
            return -1;
        }
3174
        if (virNetworkDefGetIPByIndex(def, AF_UNSPEC, 0)) {
3175 3176 3177 3178
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("Unsupported <ip> element in network %s "
                             "with forward mode='%s'"),
                           def->name,
3179
                           virNetworkForwardTypeToString(def->forward.type));
3180 3181
            return -1;
        }
3182
        if (def->dns.ntxts || def->dns.nhosts || def->dns.nsrvs) {
3183 3184 3185 3186
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("Unsupported <dns> element in network %s "
                             "with forward mode='%s'"),
                           def->name,
3187
                           virNetworkForwardTypeToString(def->forward.type));
3188 3189 3190 3191 3192 3193 3194
            return -1;
        }
        if (def->domain) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("Unsupported <domain> element in network %s "
                             "with forward mode='%s'"),
                           def->name,
3195
                           virNetworkForwardTypeToString(def->forward.type));
3196 3197
            return -1;
        }
3198 3199 3200 3201 3202 3203 3204 3205
        if (def->bandwidth) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("Unsupported network-wide <bandwidth> element "
                             "in network %s with forward mode='%s'"),
                           def->name,
                           virNetworkForwardTypeToString(def->forward.type));
            return -1;
        }
3206
        bandwidthAllowed = false;
3207 3208
    }

3209 3210 3211 3212 3213 3214 3215 3216 3217 3218 3219 3220 3221 3222 3223 3224 3225 3226 3227 3228 3229 3230 3231 3232 3233 3234 3235 3236 3237 3238 3239 3240 3241 3242
    /* we support configs with a single PF defined:
     *   <pf dev='eth0'/>
     * or with a list of netdev names:
     *   <interface dev='eth9'/>
     * OR a list of PCI addresses
     *   <address type='pci' domain='0' bus='4' slot='0' function='1'/>
     * but not any combination of those.
     *
     * Since <interface> and <address> are for some strange reason
     * stored in the same array, we need to cycle through it and check
     * the type of each.
     */
    for (i = 0; i < def->forward.nifs; i++) {
        switch ((virNetworkForwardHostdevDeviceType)
                def->forward.ifs[i].type) {
        case VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV:
            usesInterface = true;
            break;
        case VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_PCI:
            usesAddress = true;
            break;
        case VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NONE:
        case VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_LAST:
            break;
        }
    }
    if ((def->forward.npfs > 0) + usesInterface + usesAddress > 1) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("<address>, <interface>, and <pf> elements of "
                         "<forward> in network %s are mutually exclusive"),
                       def->name);
        return -1;
    }

G
Gene Czarcinski 已提交
3243 3244 3245
    /* We only support dhcp on one IPv4 address and
     * on one IPv6 address per defined network
     */
3246
    for (i = 0;
3247
         (ipdef = virNetworkDefGetIPByIndex(def, AF_UNSPEC, i));
3248
         i++) {
G
Gene Czarcinski 已提交
3249 3250 3251 3252 3253
        if (VIR_SOCKET_ADDR_IS_FAMILY(&ipdef->address, AF_INET)) {
            if (ipdef->nranges || ipdef->nhosts) {
                if (ipv4def) {
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("Multiple IPv4 dhcp sections found -- "
3254 3255
                                 "dhcp is supported only for a "
                                 "single IPv4 address on each network"));
G
Gene Czarcinski 已提交
3256 3257 3258 3259 3260 3261 3262 3263 3264 3265 3266 3267 3268 3269 3270 3271 3272
                    return -1;
                } else {
                    ipv4def = true;
                }
            }
        }
        if (VIR_SOCKET_ADDR_IS_FAMILY(&ipdef->address, AF_INET6)) {
            if (ipdef->nranges || ipdef->nhosts) {
                if (ipv6def) {
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("Multiple IPv6 dhcp sections found -- "
                                 "dhcp is supported only for a "
                                 "single IPv6 address on each network"));
                    return -1;
                } else {
                    ipv6def = true;
                }
3273 3274 3275
            }
        }
    }
3276 3277 3278 3279 3280 3281

    /* The only type of networks that currently support transparent
     * vlan configuration are those using hostdev sr-iov devices from
     * a pool, and those using an Open vSwitch bridge.
     */

3282 3283 3284
    vlanAllowed = (def->forward.type == VIR_NETWORK_FORWARD_HOSTDEV ||
                   def->forward.type == VIR_NETWORK_FORWARD_PASSTHROUGH ||
                   (def->forward.type == VIR_NETWORK_FORWARD_BRIDGE &&
J
Ján Tomko 已提交
3285 3286
                    def->virtPortProfile &&
                    def->virtPortProfile->virtPortType
3287
                    == VIR_NETDEV_VPORT_PROFILE_OPENVSWITCH));
3288 3289

    vlanUsed = def->vlan.nTags > 0;
3290 3291
    for (i = 0; i < def->nPortGroups; i++) {
        if (vlanUsed || def->portGroups[i].vlan.nTags > 0) {
3292 3293 3294 3295 3296
            /* anyone using this portgroup will get a vlan tag. Verify
             * that they will also be using an openvswitch connection,
             * as that is the only type of network that currently
             * supports a vlan tag.
             */
3297
            if (def->portGroups[i].virtPortProfile) {
3298
                if (def->forward.type != VIR_NETWORK_FORWARD_BRIDGE ||
3299
                    def->portGroups[i].virtPortProfile->virtPortType
3300 3301 3302 3303 3304 3305 3306
                    != VIR_NETDEV_VPORT_PROFILE_OPENVSWITCH) {
                    badVlanUse = true;
                }
            } else if (!vlanAllowed) {
                /* virtualport taken from base network definition */
                badVlanUse = true;
            }
3307
        }
3308
        if (def->portGroups[i].isDefault) {
3309 3310 3311 3312 3313
            if (defaultPortGroup) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("network '%s' has multiple default "
                                 "<portgroup> elements (%s and %s), "
                                 "but only one default is allowed"),
3314
                               def->name, defaultPortGroup->name,
3315
                               def->portGroups[i].name);
3316
                return -1;
3317
            }
3318
            defaultPortGroup = &def->portGroups[i];
3319
        }
3320 3321 3322 3323 3324 3325 3326 3327 3328
        for (j = i + 1; j < def->nPortGroups; j++) {
            if (STREQ(def->portGroups[i].name, def->portGroups[j].name)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("multiple <portgroup> elements with the "
                                 "same name (%s) in network '%s'"),
                               def->portGroups[i].name, def->name);
                return -1;
            }
        }
3329 3330 3331 3332 3333 3334 3335 3336
        if (def->portGroups[i].bandwidth && !bandwidthAllowed) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("Unsupported <bandwidth> element in network '%s' "
                             "in portgroup '%s' with forward mode='%s'"),
                           def->name, def->portGroups[i].name,
                           virNetworkForwardTypeToString(def->forward.type));
            return -1;
        }
3337
    }
3338 3339 3340 3341 3342 3343 3344
    if (badVlanUse ||
        (vlanUsed && !vlanAllowed && !defaultPortGroup)) {
        /* NB: if defaultPortGroup is set, we don't directly look at
         * vlanUsed && !vlanAllowed, because the network will never be
         * used without having a portgroup added in, so all necessary
         * checks were done in the loop above.
         */
3345 3346 3347 3348 3349 3350
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("<vlan> element specified for network %s, "
                         "whose type doesn't support vlan configuration"),
                       def->name);
        return -1;
    }
3351 3352 3353 3354 3355 3356 3357 3358 3359 3360 3361 3362 3363 3364

    if (def->forward.type == VIR_NETWORK_FORWARD_HOSTDEV) {
        for (i = 0; i < def->nPortGroups; i++) {
            if (def->portGroups[i].bandwidth) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("unsupported <bandwidth> element "
                                 "in <portgroup name='%s'> of "
                                 "network '%s' with forward mode='%s'"),
                               def->portGroups[i].name, def->name,
                               virNetworkForwardTypeToString(def->forward.type));
                return -1;
            }
        }
    }
3365 3366 3367
    return 0;
}

3368 3369
static virNetworkPtr networkCreateXML(virConnectPtr conn, const char *xml)
{
3370
    virNetworkDriverStatePtr driver = networkGetDriver();
3371
    virNetworkDefPtr def;
3372
    virNetworkObjPtr network = NULL;
3373
    virNetworkPtr ret = NULL;
3374
    virObjectEventPtr event = NULL;
3375

3376
    if (!(def = virNetworkDefParseString(xml)))
3377
        goto cleanup;
3378

3379 3380 3381
    if (virNetworkCreateXMLEnsureACL(conn, def) < 0)
        goto cleanup;

3382
    if (networkValidate(driver, def) < 0)
J
Ján Tomko 已提交
3383
        goto cleanup;
3384

3385 3386 3387
    /* NB: even though this transient network hasn't yet been started,
     * we assign the def with live = true in anticipation that it will
     * be started momentarily.
3388
     */
3389 3390 3391
    if (!(network = virNetworkAssignDef(driver->networks, def,
                                        VIR_NETWORK_OBJ_LIST_ADD_LIVE |
                                        VIR_NETWORK_OBJ_LIST_ADD_CHECK_LIVE)))
3392 3393
        goto cleanup;
    def = NULL;
3394

3395
    if (networkStartNetwork(driver, network) < 0) {
3396
        virNetworkRemoveInactive(driver->networks,
3397
                                 network);
3398
        goto cleanup;
3399 3400
    }

3401 3402
    event = virNetworkEventLifecycleNew(network->def->name,
                                        network->def->uuid,
3403 3404
                                        VIR_NETWORK_EVENT_STARTED,
                                        0);
3405

3406
    VIR_INFO("Creating network '%s'", network->def->name);
3407 3408
    ret = virGetNetwork(conn, network->def->name, network->def->uuid);

3409
 cleanup:
3410
    virNetworkDefFree(def);
3411 3412
    if (event)
        virObjectEventStateQueue(driver->networkEventState, event);
3413
    virNetworkObjEndAPI(&network);
3414
    return ret;
3415 3416
}

3417 3418
static virNetworkPtr networkDefineXML(virConnectPtr conn, const char *xml)
{
3419
    virNetworkDriverStatePtr driver = networkGetDriver();
3420
    virNetworkDefPtr def = NULL;
3421
    bool freeDef = true;
3422
    virNetworkObjPtr network = NULL;
3423
    virNetworkPtr ret = NULL;
3424
    virObjectEventPtr event = NULL;
3425

3426
    if (!(def = virNetworkDefParseString(xml)))
3427
        goto cleanup;
3428

3429 3430 3431
    if (virNetworkDefineXMLEnsureACL(conn, def) < 0)
        goto cleanup;

3432
    if (networkValidate(driver, def) < 0)
J
Ján Tomko 已提交
3433
        goto cleanup;
3434

3435
    if (!(network = virNetworkAssignDef(driver->networks, def, 0)))
J
Ján Tomko 已提交
3436
        goto cleanup;
3437

3438
    /* def was assigned to network object */
3439
    freeDef = false;
3440 3441

    if (virNetworkSaveConfig(driver->networkConfigDir, def) < 0) {
3442
        if (!virNetworkObjIsActive(network)) {
3443
            virNetworkRemoveInactive(driver->networks, network);
3444 3445
            goto cleanup;
        }
3446 3447 3448 3449 3450
        /* if network was active already, just undo new persistent
         * definition by making it transient.
         * XXX - this isn't necessarily the correct thing to do.
         */
        virNetworkObjAssignDef(network, NULL, false);
3451 3452 3453
        goto cleanup;
    }

3454
    event = virNetworkEventLifecycleNew(def->name, def->uuid,
3455 3456
                                        VIR_NETWORK_EVENT_DEFINED,
                                        0);
3457

3458 3459
    VIR_INFO("Defining network '%s'", def->name);
    ret = virGetNetwork(conn, def->name, def->uuid);
3460

3461
 cleanup:
3462 3463
    if (event)
        virObjectEventStateQueue(driver->networkEventState, event);
3464
    if (freeDef)
J
Ján Tomko 已提交
3465
        virNetworkDefFree(def);
3466
    virNetworkObjEndAPI(&network);
3467
    return ret;
3468 3469
}

3470
static int
3471 3472
networkUndefine(virNetworkPtr net)
{
3473
    virNetworkDriverStatePtr driver = networkGetDriver();
3474
    virNetworkObjPtr network;
3475
    int ret = -1;
3476
    bool active = false;
3477
    virObjectEventPtr event = NULL;
3478

3479
    if (!(network = networkObjFromNetwork(net)))
3480
        goto cleanup;
3481

3482 3483 3484
    if (virNetworkUndefineEnsureACL(net->conn, network->def) < 0)
        goto cleanup;

3485 3486
    if (virNetworkObjIsActive(network))
        active = true;
3487

3488 3489 3490 3491 3492 3493
    if (!network->persistent) {
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("can't undefine transient network"));
        goto cleanup;
    }

3494
    /* remove autostart link */
3495
    if (virNetworkDeleteConfig(driver->networkConfigDir,
3496 3497
                               driver->networkAutostartDir,
                               network) < 0)
3498
        goto cleanup;
3499

3500 3501
    event = virNetworkEventLifecycleNew(network->def->name,
                                        network->def->uuid,
3502 3503
                                        VIR_NETWORK_EVENT_UNDEFINED,
                                        0);
3504

3505
    VIR_INFO("Undefining network '%s'", network->def->name);
3506
    if (!active) {
3507
        if (networkRemoveInactive(driver, network) < 0)
3508
            goto cleanup;
3509 3510 3511 3512 3513 3514
    } else {

        /* if the network still exists, it was active, and we need to make
         * it transient (by deleting the persistent def)
         */
        virNetworkObjAssignDef(network, NULL, false);
3515 3516
    }

3517
    ret = 0;
3518

3519
 cleanup:
3520 3521
    if (event)
        virObjectEventStateQueue(driver->networkEventState, event);
3522
    virNetworkObjEndAPI(&network);
3523
    return ret;
3524 3525
}

3526 3527 3528 3529 3530 3531 3532 3533
static int
networkUpdate(virNetworkPtr net,
              unsigned int command,
              unsigned int section,
              int parentIndex,
              const char *xml,
              unsigned int flags)
{
3534
    virNetworkDriverStatePtr driver = networkGetDriver();
3535
    virNetworkObjPtr network = NULL;
3536 3537
    int isActive, ret = -1;
    size_t i;
3538
    virNetworkIPDefPtr ipdef;
3539
    bool oldDhcpActive = false;
3540
    bool needFirewallRefresh = false;
3541

3542 3543 3544 3545 3546

    virCheckFlags(VIR_NETWORK_UPDATE_AFFECT_LIVE |
                  VIR_NETWORK_UPDATE_AFFECT_CONFIG,
                  -1);

3547
    if (!(network = networkObjFromNetwork(net)))
3548 3549
        goto cleanup;

3550 3551 3552
    if (virNetworkUpdateEnsureACL(net->conn, network->def, flags) < 0)
        goto cleanup;

3553
    /* see if we are listening for dhcp pre-modification */
3554
    for (i = 0;
3555
         (ipdef = virNetworkDefGetIPByIndex(network->def, AF_INET, i));
3556
         i++) {
3557 3558 3559 3560 3561 3562
        if (ipdef->nranges || ipdef->nhosts) {
            oldDhcpActive = true;
            break;
        }
    }

3563 3564
    /* VIR_NETWORK_UPDATE_AFFECT_CURRENT means "change LIVE if network
     * is active, else change CONFIG
J
Ján Tomko 已提交
3565
     */
3566
    isActive = virNetworkObjIsActive(network);
3567 3568
    if ((flags & (VIR_NETWORK_UPDATE_AFFECT_LIVE |
                  VIR_NETWORK_UPDATE_AFFECT_CONFIG)) ==
3569 3570 3571 3572 3573 3574 3575
        VIR_NETWORK_UPDATE_AFFECT_CURRENT) {
        if (isActive)
            flags |= VIR_NETWORK_UPDATE_AFFECT_LIVE;
        else
            flags |= VIR_NETWORK_UPDATE_AFFECT_CONFIG;
    }

3576 3577 3578 3579 3580 3581 3582 3583 3584 3585 3586 3587 3588 3589 3590 3591 3592
    if (isActive && (flags & VIR_NETWORK_UPDATE_AFFECT_LIVE)) {
        /* Take care of anything that must be done before updating the
         * live NetworkDef.
         */
        if (network->def->forward.type == VIR_NETWORK_FORWARD_NONE ||
            network->def->forward.type == VIR_NETWORK_FORWARD_NAT ||
            network->def->forward.type == VIR_NETWORK_FORWARD_ROUTE) {
            switch (section) {
            case VIR_NETWORK_SECTION_FORWARD:
            case VIR_NETWORK_SECTION_FORWARD_INTERFACE:
            case VIR_NETWORK_SECTION_IP:
            case VIR_NETWORK_SECTION_IP_DHCP_RANGE:
            case VIR_NETWORK_SECTION_IP_DHCP_HOST:
                /* these could affect the firewall rules, so remove the
                 * old rules (and remember to load new ones after the
                 * update).
                 */
3593 3594 3595 3596
                if (network->def->forward.type != VIR_NETWORK_FORWARD_OPEN) {
                    networkRemoveFirewallRules(network->def);
                    needFirewallRefresh = true;
                }
3597 3598 3599 3600 3601 3602 3603
                break;
            default:
                break;
            }
        }
    }

3604
    /* update the network config in memory/on disk */
3605 3606
    if (virNetworkObjUpdate(network, command, section, parentIndex, xml, flags) < 0) {
        if (needFirewallRefresh)
3607
            ignore_value(networkAddFirewallRules(network->def));
3608 3609 3610
        goto cleanup;
    }

3611
    if (needFirewallRefresh && networkAddFirewallRules(network->def) < 0)
3612 3613 3614 3615 3616 3617 3618 3619 3620 3621 3622 3623 3624 3625 3626 3627 3628 3629 3630
        goto cleanup;

    if (flags & VIR_NETWORK_UPDATE_AFFECT_CONFIG) {
        /* save updated persistent config to disk */
        if (virNetworkSaveConfig(driver->networkConfigDir,
                                 virNetworkObjGetPersistentDef(network)) < 0) {
            goto cleanup;
        }
    }

    if (isActive && (flags & VIR_NETWORK_UPDATE_AFFECT_LIVE)) {
        /* rewrite dnsmasq host files, restart dnsmasq, update iptables
         * rules, etc, according to which section was modified. Note that
         * some sections require multiple actions, so a single switch
         * statement is inadequate.
         */
        if (section == VIR_NETWORK_SECTION_BRIDGE ||
            section == VIR_NETWORK_SECTION_DOMAIN ||
            section == VIR_NETWORK_SECTION_IP ||
3631 3632 3633 3634 3635 3636 3637 3638
            section == VIR_NETWORK_SECTION_IP_DHCP_RANGE ||
            section == VIR_NETWORK_SECTION_DNS_TXT ||
            section == VIR_NETWORK_SECTION_DNS_SRV) {
            /* these sections all change things on the dnsmasq
             * commandline (i.e. in the .conf file), so we need to
             * kill and restart dnsmasq, because dnsmasq sets its uid
             * to "nobody" after it starts, and is unable to re-read
             * the conf file (owned by root, mode 600)
3639
             */
3640
            if (networkRestartDhcpDaemon(driver, network) < 0)
3641 3642
                goto cleanup;

3643 3644 3645 3646 3647 3648 3649 3650
        } else if (section == VIR_NETWORK_SECTION_IP_DHCP_HOST) {
            /* if we previously weren't listening for dhcp and now we
             * are (or vice-versa) then we need to do a restart,
             * otherwise we just need to do a refresh (redo the config
             * files and send SIGHUP)
             */
            bool newDhcpActive = false;

3651
            for (i = 0;
3652
                 (ipdef = virNetworkDefGetIPByIndex(network->def, AF_INET, i));
3653
                 i++) {
3654 3655 3656 3657 3658 3659 3660
                if (ipdef->nranges || ipdef->nhosts) {
                    newDhcpActive = true;
                    break;
                }
            }

            if ((newDhcpActive != oldDhcpActive &&
3661 3662
                 networkRestartDhcpDaemon(driver, network) < 0) ||
                networkRefreshDhcpDaemon(driver, network) < 0) {
3663 3664 3665
                goto cleanup;
            }

3666 3667 3668 3669
        } else if (section == VIR_NETWORK_SECTION_DNS_HOST) {
            /* this section only changes data in an external file
             * (not the .conf file) so we can just update the config
             * files and send SIGHUP to dnsmasq.
3670
             */
3671
            if (networkRefreshDhcpDaemon(driver, network) < 0)
3672 3673 3674 3675 3676 3677 3678 3679
                goto cleanup;

        }

        if (section == VIR_NETWORK_SECTION_IP) {
            /* only a change in IP addresses will affect radvd, and all of radvd's
             * config is stored in the conf file which will be re-read with a SIGHUP.
             */
3680
            if (networkRefreshRadvd(driver, network) < 0)
3681 3682 3683 3684
                goto cleanup;
        }

        /* save current network state to disk */
3685
        if ((ret = virNetworkSaveStatus(driver->stateDir,
3686
                                        network)) < 0) {
3687
            goto cleanup;
3688
        }
3689
    }
3690 3691 3692 3693 3694 3695

    /* call the 'updated' network hook script */
    if (networkRunHook(network, NULL, NULL, VIR_HOOK_NETWORK_OP_UPDATED,
                       VIR_HOOK_SUBOP_BEGIN) < 0)
        goto cleanup;

3696
    ret = 0;
3697
 cleanup:
3698
    virNetworkObjEndAPI(&network);
3699 3700 3701
    return ret;
}

3702 3703
static int networkCreate(virNetworkPtr net)
{
3704
    virNetworkDriverStatePtr driver = networkGetDriver();
3705 3706
    virNetworkObjPtr network;
    int ret = -1;
3707
    virObjectEventPtr event = NULL;
3708

3709
    if (!(network = networkObjFromNetwork(net)))
3710
        goto cleanup;
3711

3712 3713 3714
    if (virNetworkCreateEnsureACL(net->conn, network->def) < 0)
        goto cleanup;

3715
    if ((ret = networkStartNetwork(driver, network)) < 0)
3716
        goto cleanup;
3717

3718 3719
    event = virNetworkEventLifecycleNew(network->def->name,
                                        network->def->uuid,
3720 3721
                                        VIR_NETWORK_EVENT_STARTED,
                                        0);
3722

3723
 cleanup:
3724 3725
    if (event)
        virObjectEventStateQueue(driver->networkEventState, event);
3726
    virNetworkObjEndAPI(&network);
3727
    return ret;
3728 3729
}

3730 3731
static int networkDestroy(virNetworkPtr net)
{
3732
    virNetworkDriverStatePtr driver = networkGetDriver();
3733 3734
    virNetworkObjPtr network;
    int ret = -1;
3735
    virObjectEventPtr event = NULL;
3736

3737
    if (!(network = networkObjFromNetwork(net)))
3738
        goto cleanup;
3739

3740 3741 3742
    if (virNetworkDestroyEnsureACL(net->conn, network->def) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
3743
    if (!virNetworkObjIsActive(network)) {
3744
        virReportError(VIR_ERR_OPERATION_INVALID,
3745 3746
                       _("network '%s' is not active"),
                       network->def->name);
3747 3748 3749
        goto cleanup;
    }

3750
    if ((ret = networkShutdownNetwork(driver, network)) < 0)
3751 3752
        goto cleanup;

3753 3754
    event = virNetworkEventLifecycleNew(network->def->name,
                                        network->def->uuid,
3755 3756
                                        VIR_NETWORK_EVENT_STOPPED,
                                        0);
3757

3758
    if (!network->persistent &&
3759
        networkRemoveInactive(driver, network) < 0) {
3760 3761
        ret = -1;
        goto cleanup;
3762
    }
3763

3764
 cleanup:
3765 3766
    if (event)
        virObjectEventStateQueue(driver->networkEventState, event);
3767
    virNetworkObjEndAPI(&network);
3768 3769 3770
    return ret;
}

3771
static char *networkGetXMLDesc(virNetworkPtr net,
3772
                               unsigned int flags)
3773
{
3774
    virNetworkObjPtr network;
3775
    virNetworkDefPtr def;
3776
    char *ret = NULL;
3777

3778
    virCheckFlags(VIR_NETWORK_XML_INACTIVE, NULL);
3779

3780 3781
    if (!(network = networkObjFromNetwork(net)))
        return ret;
3782

3783 3784 3785
    if (virNetworkGetXMLDescEnsureACL(net->conn, network->def) < 0)
        goto cleanup;

3786 3787 3788 3789 3790 3791
    if ((flags & VIR_NETWORK_XML_INACTIVE) && network->newDef)
        def = network->newDef;
    else
        def = network->def;

    ret = virNetworkDefFormat(def, flags);
3792

3793
 cleanup:
3794
    virNetworkObjEndAPI(&network);
3795
    return ret;
3796 3797 3798
}

static char *networkGetBridgeName(virNetworkPtr net) {
3799 3800 3801
    virNetworkObjPtr network;
    char *bridge = NULL;

3802 3803
    if (!(network = networkObjFromNetwork(net)))
        return bridge;
3804

3805 3806 3807
    if (virNetworkGetBridgeNameEnsureACL(net->conn, network->def) < 0)
        goto cleanup;

3808
    if (!(network->def->bridge)) {
3809 3810 3811
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("network '%s' does not have a bridge name."),
                       network->def->name);
3812 3813 3814
        goto cleanup;
    }

3815
    ignore_value(VIR_STRDUP(bridge, network->def->bridge));
3816

3817
 cleanup:
3818
    virNetworkObjEndAPI(&network);
3819 3820 3821 3822
    return bridge;
}

static int networkGetAutostart(virNetworkPtr net,
J
Ján Tomko 已提交
3823
                               int *autostart)
3824
{
3825 3826
    virNetworkObjPtr network;
    int ret = -1;
3827

3828 3829
    if (!(network = networkObjFromNetwork(net)))
        return ret;
3830

3831 3832 3833
    if (virNetworkGetAutostartEnsureACL(net->conn, network->def) < 0)
        goto cleanup;

3834
    *autostart = network->autostart;
3835
    ret = 0;
3836

3837
 cleanup:
3838
    virNetworkObjEndAPI(&network);
3839
    return ret;
3840 3841 3842
}

static int networkSetAutostart(virNetworkPtr net,
3843 3844
                               int autostart)
{
3845
    virNetworkDriverStatePtr driver = networkGetDriver();
3846
    virNetworkObjPtr network;
3847
    char *configFile = NULL, *autostartLink = NULL;
3848
    int ret = -1;
3849

3850

3851
    if (!(network = networkObjFromNetwork(net)))
3852
        goto cleanup;
3853

3854 3855 3856
    if (virNetworkSetAutostartEnsureACL(net->conn, network->def) < 0)
        goto cleanup;

3857
    if (!network->persistent) {
3858 3859
        virReportError(VIR_ERR_OPERATION_INVALID,
                       "%s", _("cannot set autostart for transient network"));
3860 3861 3862
        goto cleanup;
    }

3863 3864
    autostart = (autostart != 0);

3865
    if (network->autostart != autostart) {
3866
        if ((configFile = virNetworkConfigFile(driver->networkConfigDir, network->def->name)) == NULL)
3867
            goto cleanup;
3868
        if ((autostartLink = virNetworkConfigFile(driver->networkAutostartDir, network->def->name)) == NULL)
3869 3870
            goto cleanup;

3871
        if (autostart) {
3872
            if (virFileMakePath(driver->networkAutostartDir) < 0) {
3873
                virReportSystemError(errno,
3874 3875
                                     _("cannot create autostart directory '%s'"),
                                     driver->networkAutostartDir);
3876 3877
                goto cleanup;
            }
3878

3879
            if (symlink(configFile, autostartLink) < 0) {
3880
                virReportSystemError(errno,
3881
                                     _("Failed to create symlink '%s' to '%s'"),
3882
                                     autostartLink, configFile);
3883 3884 3885
                goto cleanup;
            }
        } else {
3886
            if (unlink(autostartLink) < 0 && errno != ENOENT && errno != ENOTDIR) {
3887
                virReportSystemError(errno,
3888
                                     _("Failed to delete symlink '%s'"),
3889
                                     autostartLink);
3890 3891
                goto cleanup;
            }
3892 3893
        }

3894
        network->autostart = autostart;
3895
    }
3896
    ret = 0;
3897

3898
 cleanup:
3899 3900
    VIR_FREE(configFile);
    VIR_FREE(autostartLink);
3901
    virNetworkObjEndAPI(&network);
3902
    return ret;
3903 3904
}

3905
static int
3906 3907 3908 3909
networkGetDHCPLeases(virNetworkPtr network,
                     const char *mac,
                     virNetworkDHCPLeasePtr **leases,
                     unsigned int flags)
3910
{
3911
    virNetworkDriverStatePtr driver = networkGetDriver();
3912 3913 3914
    size_t i, j;
    size_t nleases = 0;
    int rv = -1;
3915
    ssize_t size = 0;
3916 3917 3918 3919 3920 3921 3922 3923 3924 3925 3926
    int custom_lease_file_len = 0;
    bool need_results = !!leases;
    long long currtime = 0;
    long long expirytime_tmp = -1;
    bool ipv6 = false;
    char *lease_entries = NULL;
    char *custom_lease_file = NULL;
    const char *ip_tmp = NULL;
    const char *mac_tmp = NULL;
    virJSONValuePtr lease_tmp = NULL;
    virJSONValuePtr leases_array = NULL;
3927
    virNetworkIPDefPtr ipdef_tmp = NULL;
3928 3929
    virNetworkDHCPLeasePtr lease = NULL;
    virNetworkDHCPLeasePtr *leases_ret = NULL;
3930
    virNetworkObjPtr obj;
3931
    virMacAddr mac_addr;
3932 3933 3934

    virCheckFlags(0, -1);

3935 3936 3937 3938 3939 3940
    /* only to check if the MAC is valid */
    if (mac && virMacAddrParse(mac, &mac_addr) < 0) {
        virReportError(VIR_ERR_INVALID_MAC, "%s", mac);
        return -1;
    }

3941 3942 3943 3944 3945
    if (!(obj = networkObjFromNetwork(network)))
        return -1;

    if (virNetworkGetDHCPLeasesEnsureACL(network->conn, obj->def) < 0)
        goto cleanup;
3946 3947

    /* Retrieve custom leases file location */
3948
    custom_lease_file = networkDnsmasqLeaseFileNameCustom(driver, obj->def->bridge);
3949 3950 3951 3952 3953 3954 3955 3956 3957 3958 3959 3960 3961 3962 3963 3964 3965 3966 3967 3968 3969 3970 3971 3972 3973 3974 3975 3976 3977 3978 3979 3980 3981 3982 3983 3984 3985 3986 3987 3988 3989 3990 3991

    /* Read entire contents */
    if ((custom_lease_file_len = virFileReadAll(custom_lease_file,
                                                VIR_NETWORK_DHCP_LEASE_FILE_SIZE_MAX,
                                                &lease_entries)) < 0) {
        /* Even though src/network/leaseshelper.c guarantees the existence of
         * leases file (even if no leases are present), and the control reaches
         * here, instead of reporting error, return 0 leases */
        rv = 0;
        goto error;
    }

    if (custom_lease_file_len) {
        if (!(leases_array = virJSONValueFromString(lease_entries))) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("invalid json in file: %s"), custom_lease_file);
            goto error;
        }

        if ((size = virJSONValueArraySize(leases_array)) < 0) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("couldn't fetch array of leases"));
            goto error;
        }
    }

    currtime = (long long) time(NULL);

    for (i = 0; i < size; i++) {
        if (!(lease_tmp = virJSONValueArrayGet(leases_array, i))) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("failed to parse json"));
            goto error;
        }

        if (!(mac_tmp = virJSONValueObjectGetString(lease_tmp, "mac-address"))) {
            /* leaseshelper program guarantees that lease will be stored only if
             * mac-address is known otherwise not */
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("found lease without mac-address"));
            goto error;
        }

3992
        if (mac && virMacAddrCompare(mac, mac_tmp))
3993 3994 3995 3996 3997 3998 3999 4000 4001 4002 4003 4004 4005 4006 4007 4008 4009 4010 4011 4012 4013 4014 4015 4016 4017 4018 4019 4020 4021 4022 4023 4024 4025 4026 4027 4028 4029 4030 4031 4032 4033
            continue;

        if (virJSONValueObjectGetNumberLong(lease_tmp, "expiry-time", &expirytime_tmp) < 0) {
            /* A lease cannot be present without expiry-time */
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("found lease without expiry-time"));
            goto error;
        }

        /* Do not report expired lease */
        if (expirytime_tmp < currtime)
            continue;

        if (need_results) {
            if (VIR_ALLOC(lease) < 0)
                goto error;

            lease->expirytime = expirytime_tmp;

            if (!(ip_tmp = virJSONValueObjectGetString(lease_tmp, "ip-address"))) {
                /* A lease without ip-address makes no sense */
                virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                               _("found lease without ip-address"));
                goto error;
            }

            /* Unlike IPv4, IPv6 uses ':' instead of '.' as separator */
            ipv6 = strchr(ip_tmp, ':') ? true : false;
            lease->type = ipv6 ? VIR_IP_ADDR_TYPE_IPV6 : VIR_IP_ADDR_TYPE_IPV4;

            /* Obtain prefix */
            for (j = 0; j < obj->def->nips; j++) {
                ipdef_tmp = &obj->def->ips[j];

                if (ipv6 && VIR_SOCKET_ADDR_IS_FAMILY(&ipdef_tmp->address,
                                                      AF_INET6)) {
                    lease->prefix = ipdef_tmp->prefix;
                    break;
                }
                if (!ipv6 && VIR_SOCKET_ADDR_IS_FAMILY(&ipdef_tmp->address,
                                                      AF_INET)) {
4034
                    lease->prefix = virSocketAddrGetIPPrefix(&ipdef_tmp->address,
4035 4036 4037 4038 4039 4040 4041 4042
                                                             &ipdef_tmp->netmask,
                                                             ipdef_tmp->prefix);
                    break;
                }
            }

            if ((VIR_STRDUP(lease->mac, mac_tmp) < 0) ||
                (VIR_STRDUP(lease->ipaddr, ip_tmp) < 0) ||
4043
                (VIR_STRDUP(lease->iface, obj->def->bridge) < 0))
4044 4045 4046 4047 4048 4049 4050 4051 4052 4053 4054 4055 4056 4057 4058 4059 4060 4061 4062 4063 4064 4065 4066 4067 4068 4069 4070 4071 4072 4073 4074 4075
                goto error;

            /* Fields that can be NULL */
            if ((VIR_STRDUP(lease->iaid,
                            virJSONValueObjectGetString(lease_tmp, "iaid")) < 0) ||
                (VIR_STRDUP(lease->clientid,
                            virJSONValueObjectGetString(lease_tmp, "client-id")) < 0) ||
                (VIR_STRDUP(lease->hostname,
                            virJSONValueObjectGetString(lease_tmp, "hostname")) < 0))
                goto error;

            if (VIR_INSERT_ELEMENT(leases_ret, nleases, nleases, lease) < 0)
                goto error;

        } else {
            nleases++;
        }

        VIR_FREE(lease);
    }

    if (leases_ret) {
        /* NULL terminated array */
        ignore_value(VIR_REALLOC_N(leases_ret, nleases + 1));
        *leases = leases_ret;
        leases_ret = NULL;
    }

    rv = nleases;

 cleanup:
    VIR_FREE(lease);
4076
    VIR_FREE(lease_entries);
4077 4078
    VIR_FREE(custom_lease_file);
    virJSONValueFree(leases_array);
4079

4080
    virNetworkObjEndAPI(&obj);
4081

4082 4083 4084 4085 4086 4087 4088 4089 4090 4091 4092
    return rv;

 error:
    if (leases_ret) {
        for (i = 0; i < nleases; i++)
            virNetworkDHCPLeaseFree(leases_ret[i]);
        VIR_FREE(leases_ret);
    }
    goto cleanup;
}

4093 4094

static virNetworkDriver networkDriver = {
4095
    .name = "bridge",
4096 4097 4098 4099 4100
    .connectNumOfNetworks = networkConnectNumOfNetworks, /* 0.2.0 */
    .connectListNetworks = networkConnectListNetworks, /* 0.2.0 */
    .connectNumOfDefinedNetworks = networkConnectNumOfDefinedNetworks, /* 0.2.0 */
    .connectListDefinedNetworks = networkConnectListDefinedNetworks, /* 0.2.0 */
    .connectListAllNetworks = networkConnectListAllNetworks, /* 0.10.2 */
4101 4102
    .connectNetworkEventRegisterAny = networkConnectNetworkEventRegisterAny, /* 1.2.1 */
    .connectNetworkEventDeregisterAny = networkConnectNetworkEventDeregisterAny, /* 1.2.1 */
4103 4104
    .networkLookupByUUID = networkLookupByUUID, /* 0.2.0 */
    .networkLookupByName = networkLookupByName, /* 0.2.0 */
4105 4106
    .networkCreateXML = networkCreateXML, /* 0.2.0 */
    .networkDefineXML = networkDefineXML, /* 0.2.0 */
4107
    .networkUndefine = networkUndefine, /* 0.2.0 */
4108
    .networkUpdate = networkUpdate, /* 0.10.2 */
4109
    .networkCreate = networkCreate, /* 0.2.0 */
4110 4111 4112 4113 4114 4115 4116
    .networkDestroy = networkDestroy, /* 0.2.0 */
    .networkGetXMLDesc = networkGetXMLDesc, /* 0.2.0 */
    .networkGetBridgeName = networkGetBridgeName, /* 0.2.0 */
    .networkGetAutostart = networkGetAutostart, /* 0.2.1 */
    .networkSetAutostart = networkSetAutostart, /* 0.2.1 */
    .networkIsActive = networkIsActive, /* 0.7.3 */
    .networkIsPersistent = networkIsPersistent, /* 0.7.3 */
4117
    .networkGetDHCPLeases = networkGetDHCPLeases, /* 1.2.6 */
4118 4119 4120
};

static virStateDriver networkStateDriver = {
4121
    .name = "bridge",
4122
    .stateInitialize  = networkStateInitialize,
4123
    .stateAutoStart  = networkStateAutoStart,
4124 4125
    .stateCleanup = networkStateCleanup,
    .stateReload = networkStateReload,
4126 4127
};

4128 4129
int networkRegister(void)
{
4130
    if (virSetSharedNetworkDriver(&networkDriver) < 0)
4131
        return -1;
4132 4133
    if (virRegisterStateDriver(&networkStateDriver) < 0)
        return -1;
4134 4135
    return 0;
}
4136 4137 4138

/********************************************************/

4139 4140 4141 4142 4143 4144 4145 4146 4147 4148 4149 4150 4151 4152 4153 4154 4155 4156 4157 4158 4159 4160 4161 4162 4163 4164 4165 4166 4167 4168 4169 4170 4171 4172 4173
/* A unified function to log network connections and disconnections */

static void
networkLogAllocation(virNetworkDefPtr netdef,
                     virDomainNetType actualType,
                     virNetworkForwardIfDefPtr dev,
                     virDomainNetDefPtr iface,
                     bool inUse)
{
    char macStr[VIR_MAC_STRING_BUFLEN];
    const char *verb = inUse ? "using" : "releasing";

    if (!dev) {
        VIR_INFO("MAC %s %s network %s (%d connections)",
                 virMacAddrFormat(&iface->mac, macStr), verb,
                 netdef->name, netdef->connections);
    } else {
        if (actualType == VIR_DOMAIN_NET_TYPE_HOSTDEV) {
            VIR_INFO("MAC %s %s network %s (%d connections) "
                     "physical device %04x:%02x:%02x.%x (%d connections)",
                     virMacAddrFormat(&iface->mac, macStr), verb,
                     netdef->name, netdef->connections,
                     dev->device.pci.domain, dev->device.pci.bus,
                     dev->device.pci.slot, dev->device.pci.function,
                     dev->connections);
        } else {
            VIR_INFO("MAC %s %s network %s (%d connections) "
                     "physical device %s (%d connections)",
                     virMacAddrFormat(&iface->mac, macStr), verb,
                     netdef->name, netdef->connections,
                     dev->device.dev, dev->connections);
        }
    }
}

4174 4175 4176 4177 4178 4179 4180 4181 4182
/* Private API to deal with logical switch capabilities.
 * These functions are exported so that other parts of libvirt can
 * call them, but are not part of the public API and not in the
 * driver's function table. If we ever have more than one network
 * driver, we will need to present these functions via a second
 * "backend" function table.
 */

/* networkAllocateActualDevice:
4183
 * @dom: domain definition that @iface belongs to
4184 4185 4186 4187 4188 4189 4190 4191 4192 4193 4194
 * @iface: the original NetDef from the domain
 *
 * Looks up the network reference by iface, allocates a physical
 * device from that network (if appropriate), and returns with the
 * virDomainActualNetDef filled in accordingly. If there are no
 * changes to be made in the netdef, then just leave the actualdef
 * empty.
 *
 * Returns 0 on success, -1 on failure.
 */
int
4195 4196
networkAllocateActualDevice(virDomainDefPtr dom,
                            virDomainNetDefPtr iface)
4197
{
4198
    virNetworkDriverStatePtr driver = networkGetDriver();
4199
    virDomainNetType actualType = iface->type;
4200 4201
    virNetworkObjPtr network = NULL;
    virNetworkDefPtr netdef = NULL;
4202
    virNetDevBandwidthPtr bandwidth = NULL;
4203 4204 4205
    virPortGroupDefPtr portgroup = NULL;
    virNetDevVPortProfilePtr virtport = iface->virtPortProfile;
    virNetDevVlanPtr vlan = NULL;
4206
    virNetworkForwardIfDefPtr dev = NULL;
4207
    size_t i;
4208 4209 4210
    int ret = -1;

    if (iface->type != VIR_DOMAIN_NET_TYPE_NETWORK)
4211
        goto validate;
4212 4213 4214 4215

    virDomainActualNetDefFree(iface->data.network.actual);
    iface->data.network.actual = NULL;

4216
    network = virNetworkObjFindByName(driver->networks, iface->data.network.name);
4217
    if (!network) {
4218 4219 4220
        virReportError(VIR_ERR_NO_NETWORK,
                       _("no network with matching name '%s'"),
                       iface->data.network.name);
4221
        goto error;
4222 4223
    }
    netdef = network->def;
4224

4225 4226 4227 4228 4229 4230 4231
    if (!virNetworkObjIsActive(network)) {
        virReportError(VIR_ERR_OPERATION_INVALID,
                       _("network '%s' is not active"),
                       netdef->name);
        goto error;
    }

4232 4233 4234
    if (VIR_ALLOC(iface->data.network.actual) < 0)
        goto error;

4235 4236 4237
    /* portgroup can be present for any type of network, in particular
     * for bandwidth information, so we need to check for that and
     * fill it in appropriately for all forward types.
J
Ján Tomko 已提交
4238
     */
4239 4240 4241 4242 4243 4244
    portgroup = virPortGroupFindByName(netdef, iface->data.network.portgroup);

    /* If there is already interface-specific bandwidth, just use that
     * (already in NetDef). Otherwise, if there is bandwidth info in
     * the portgroup, fill that into the ActualDef.
     */
4245 4246 4247 4248 4249 4250

    if (iface->bandwidth)
        bandwidth = iface->bandwidth;
    else if (portgroup && portgroup->bandwidth)
        bandwidth = portgroup->bandwidth;

4251 4252
    if (bandwidth && virNetDevBandwidthCopy(&iface->data.network.actual->bandwidth,
                                            bandwidth) < 0)
4253
        goto error;
4254

4255 4256 4257 4258 4259 4260 4261 4262
    /* copy appropriate vlan info to actualNet */
    if (iface->vlan.nTags > 0)
        vlan = &iface->vlan;
    else if (portgroup && portgroup->vlan.nTags > 0)
        vlan = &portgroup->vlan;
    else if (netdef->vlan.nTags > 0)
        vlan = &netdef->vlan;

4263 4264
    if (vlan && virNetDevVlanCopy(&iface->data.network.actual->vlan, vlan) < 0)
        goto error;
4265

4266 4267 4268 4269 4270 4271 4272 4273 4274 4275
    if (iface->trustGuestRxFilters)
       iface->data.network.actual->trustGuestRxFilters
          = iface->trustGuestRxFilters;
    else if (portgroup && portgroup->trustGuestRxFilters)
       iface->data.network.actual->trustGuestRxFilters
          = portgroup->trustGuestRxFilters;
    else if (netdef->trustGuestRxFilters)
       iface->data.network.actual->trustGuestRxFilters
          = netdef->trustGuestRxFilters;

4276 4277
    if ((netdef->forward.type == VIR_NETWORK_FORWARD_NONE) ||
        (netdef->forward.type == VIR_NETWORK_FORWARD_NAT) ||
4278 4279
        (netdef->forward.type == VIR_NETWORK_FORWARD_ROUTE) ||
        (netdef->forward.type == VIR_NETWORK_FORWARD_OPEN)) {
4280
        /* for these forward types, the actual net type really *is*
4281
         * NETWORK; we just keep the info from the portgroup in
4282
         * iface->data.network.actual
J
Ján Tomko 已提交
4283
         */
4284
        iface->data.network.actual->type = VIR_DOMAIN_NET_TYPE_NETWORK;
4285

4286
        /* we also store the bridge device and macTableManager settings
4287 4288 4289 4290 4291 4292 4293
         * in iface->data.network.actual->data.bridge for later use
         * after the domain's tap device is created (to attach to the
         * bridge and set flood/learning mode on the tap device)
         */
        if (VIR_STRDUP(iface->data.network.actual->data.bridge.brname,
                       netdef->bridge) < 0)
            goto error;
4294 4295
        iface->data.network.actual->data.bridge.macTableManager
           = netdef->macTableManager;
4296

4297 4298 4299
        if (networkPlugBandwidth(network, iface) < 0)
            goto error;

4300
    } else if ((netdef->forward.type == VIR_NETWORK_FORWARD_BRIDGE) &&
4301
               netdef->bridge) {
4302 4303 4304 4305 4306

        /* <forward type='bridge'/> <bridge name='xxx'/>
         * is VIR_DOMAIN_NET_TYPE_BRIDGE
         */

4307
        iface->data.network.actual->type = actualType = VIR_DOMAIN_NET_TYPE_BRIDGE;
4308 4309
        if (VIR_STRDUP(iface->data.network.actual->data.bridge.brname,
                       netdef->bridge) < 0)
4310
            goto error;
4311 4312
        iface->data.network.actual->data.bridge.macTableManager
           = netdef->macTableManager;
4313

4314 4315 4316 4317 4318 4319 4320 4321
        /* merge virtualports from interface, network, and portgroup to
         * arrive at actual virtualport to use
         */
        if (virNetDevVPortProfileMerge3(&iface->data.network.actual->virtPortProfile,
                                        iface->virtPortProfile,
                                        netdef->virtPortProfile,
                                        portgroup
                                        ? portgroup->virtPortProfile : NULL) < 0) {
4322
            goto error;
4323 4324 4325 4326 4327 4328 4329 4330 4331 4332
        }
        virtport = iface->data.network.actual->virtPortProfile;
        if (virtport) {
            /* only type='openvswitch' is allowed for bridges */
            if (virtport->virtPortType != VIR_NETDEV_VPORT_PROFILE_OPENVSWITCH) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("<virtualport type='%s'> not supported for network "
                                 "'%s' which uses a bridge device"),
                               virNetDevVPortTypeToString(virtport->virtPortType),
                               netdef->name);
4333
                goto error;
4334 4335 4336
            }
        }

4337
    } else if (netdef->forward.type == VIR_NETWORK_FORWARD_HOSTDEV) {
4338

4339
        virDomainHostdevSubsysPCIBackendType backend;
4340

4341
        iface->data.network.actual->type = actualType = VIR_DOMAIN_NET_TYPE_HOSTDEV;
4342
        if (networkCreateInterfacePool(netdef) < 0)
4343 4344 4345
            goto error;

        /* pick first dev with 0 connections */
4346 4347 4348
        for (i = 0; i < netdef->forward.nifs; i++) {
            if (netdef->forward.ifs[i].connections == 0) {
                dev = &netdef->forward.ifs[i];
4349 4350 4351 4352 4353 4354 4355 4356 4357 4358 4359 4360 4361 4362
                break;
            }
        }
        if (!dev) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("network '%s' requires exclusive access "
                             "to interfaces, but none are available"),
                           netdef->name);
            goto error;
        }
        iface->data.network.actual->data.hostdev.def.parent.type = VIR_DOMAIN_DEVICE_NET;
        iface->data.network.actual->data.hostdev.def.parent.data.net = iface;
        iface->data.network.actual->data.hostdev.def.info = &iface->info;
        iface->data.network.actual->data.hostdev.def.mode = VIR_DOMAIN_HOSTDEV_MODE_SUBSYS;
4363
        iface->data.network.actual->data.hostdev.def.managed = netdef->forward.managed ? 1 : 0;
4364
        iface->data.network.actual->data.hostdev.def.source.subsys.type = dev->type;
4365
        iface->data.network.actual->data.hostdev.def.source.subsys.u.pci.addr = dev->device.pci;
4366

E
Eric Blake 已提交
4367
        switch (netdef->forward.driverName) {
4368
        case VIR_NETWORK_FORWARD_DRIVER_NAME_DEFAULT:
4369
            backend = VIR_DOMAIN_HOSTDEV_PCI_BACKEND_DEFAULT;
4370 4371
            break;
        case VIR_NETWORK_FORWARD_DRIVER_NAME_KVM:
4372
            backend = VIR_DOMAIN_HOSTDEV_PCI_BACKEND_KVM;
4373 4374
            break;
        case VIR_NETWORK_FORWARD_DRIVER_NAME_VFIO:
4375
            backend = VIR_DOMAIN_HOSTDEV_PCI_BACKEND_VFIO;
4376 4377 4378 4379 4380 4381 4382 4383 4384 4385 4386
            break;
        default:
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("unrecognized driver name value %d "
                             " in network '%s'"),
                           netdef->forward.driverName, netdef->name);
            goto error;
        }
        iface->data.network.actual->data.hostdev.def.source.subsys.u.pci.backend
            = backend;

4387 4388 4389 4390 4391 4392 4393 4394 4395 4396 4397 4398 4399 4400 4401 4402 4403 4404 4405 4406 4407 4408 4409 4410 4411
        /* merge virtualports from interface, network, and portgroup to
         * arrive at actual virtualport to use
         */
        if (virNetDevVPortProfileMerge3(&iface->data.network.actual->virtPortProfile,
                                        iface->virtPortProfile,
                                        netdef->virtPortProfile,
                                        portgroup
                                        ? portgroup->virtPortProfile : NULL) < 0) {
            goto error;
        }
        virtport = iface->data.network.actual->virtPortProfile;
        if (virtport) {
            /* make sure type is supported for hostdev connections */
            if (virtport->virtPortType != VIR_NETDEV_VPORT_PROFILE_8021QBG &&
                virtport->virtPortType != VIR_NETDEV_VPORT_PROFILE_8021QBH) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("<virtualport type='%s'> not supported for network "
                                 "'%s' which uses an SR-IOV Virtual Function "
                                 "via PCI passthrough"),
                               virNetDevVPortTypeToString(virtport->virtPortType),
                               netdef->name);
                goto error;
            }
        }

4412 4413 4414 4415
    } else if ((netdef->forward.type == VIR_NETWORK_FORWARD_BRIDGE) ||
               (netdef->forward.type == VIR_NETWORK_FORWARD_PRIVATE) ||
               (netdef->forward.type == VIR_NETWORK_FORWARD_VEPA) ||
               (netdef->forward.type == VIR_NETWORK_FORWARD_PASSTHROUGH)) {
4416 4417 4418 4419 4420 4421

        /* <forward type='bridge|private|vepa|passthrough'> are all
         * VIR_DOMAIN_NET_TYPE_DIRECT.
         */

        /* Set type=direct and appropriate <source mode='xxx'/> */
4422
        iface->data.network.actual->type = actualType = VIR_DOMAIN_NET_TYPE_DIRECT;
4423
        switch (netdef->forward.type) {
4424
        case VIR_NETWORK_FORWARD_BRIDGE:
4425
            iface->data.network.actual->data.direct.mode = VIR_NETDEV_MACVLAN_MODE_BRIDGE;
4426 4427
            break;
        case VIR_NETWORK_FORWARD_PRIVATE:
4428
            iface->data.network.actual->data.direct.mode = VIR_NETDEV_MACVLAN_MODE_PRIVATE;
4429 4430
            break;
        case VIR_NETWORK_FORWARD_VEPA:
4431
            iface->data.network.actual->data.direct.mode = VIR_NETDEV_MACVLAN_MODE_VEPA;
4432 4433
            break;
        case VIR_NETWORK_FORWARD_PASSTHROUGH:
4434
            iface->data.network.actual->data.direct.mode = VIR_NETDEV_MACVLAN_MODE_PASSTHRU;
4435 4436 4437
            break;
        }

4438 4439 4440 4441 4442 4443 4444 4445
        /* merge virtualports from interface, network, and portgroup to
         * arrive at actual virtualport to use
         */
        if (virNetDevVPortProfileMerge3(&iface->data.network.actual->virtPortProfile,
                                        iface->virtPortProfile,
                                        netdef->virtPortProfile,
                                        portgroup
                                        ? portgroup->virtPortProfile : NULL) < 0) {
4446
            goto error;
4447
        }
4448
        virtport = iface->data.network.actual->virtPortProfile;
4449
        if (virtport) {
4450 4451 4452 4453 4454 4455 4456 4457
            /* make sure type is supported for macvtap connections */
            if (virtport->virtPortType != VIR_NETDEV_VPORT_PROFILE_8021QBG &&
                virtport->virtPortType != VIR_NETDEV_VPORT_PROFILE_8021QBH) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("<virtualport type='%s'> not supported for network "
                                 "'%s' which uses a macvtap device"),
                               virNetDevVPortTypeToString(virtport->virtPortType),
                               netdef->name);
4458
                goto error;
4459 4460
            }
        }
4461

4462 4463 4464
        /* If there is only a single device, just return it (caller will detect
         * any error if exclusive use is required but could not be acquired).
         */
4465
        if ((netdef->forward.nifs <= 0) && (netdef->forward.npfs <= 0)) {
4466 4467 4468 4469
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("network '%s' uses a direct mode, but "
                             "has no forward dev and no interface pool"),
                           netdef->name);
4470
            goto error;
4471 4472 4473
        } else {
            /* pick an interface from the pool */

4474
            if (networkCreateInterfacePool(netdef) < 0)
4475 4476
                goto error;

4477 4478 4479 4480 4481
            /* PASSTHROUGH mode, and PRIVATE Mode + 802.1Qbh both
             * require exclusive access to a device, so current
             * connections count must be 0.  Other modes can share, so
             * just search for the one with the lowest number of
             * connections.
4482
             */
4483 4484
            if ((netdef->forward.type == VIR_NETWORK_FORWARD_PASSTHROUGH) ||
                ((netdef->forward.type == VIR_NETWORK_FORWARD_PRIVATE) &&
4485 4486 4487
                 iface->data.network.actual->virtPortProfile &&
                 (iface->data.network.actual->virtPortProfile->virtPortType
                  == VIR_NETDEV_VPORT_PROFILE_8021QBH))) {
4488

4489
                /* pick first dev with 0 connections */
4490 4491 4492
                for (i = 0; i < netdef->forward.nifs; i++) {
                    if (netdef->forward.ifs[i].connections == 0) {
                        dev = &netdef->forward.ifs[i];
4493 4494 4495 4496 4497
                        break;
                    }
                }
            } else {
                /* pick least used dev */
4498
                dev = &netdef->forward.ifs[0];
4499 4500 4501
                for (i = 1; i < netdef->forward.nifs; i++) {
                    if (netdef->forward.ifs[i].connections < dev->connections)
                        dev = &netdef->forward.ifs[i];
4502 4503 4504 4505
                }
            }
            /* dev points at the physical device we want to use */
            if (!dev) {
4506 4507 4508 4509
                virReportError(VIR_ERR_INTERNAL_ERROR,
                               _("network '%s' requires exclusive access "
                                 "to interfaces, but none are available"),
                               netdef->name);
4510
                goto error;
4511
            }
4512 4513
            if (VIR_STRDUP(iface->data.network.actual->data.direct.linkdev,
                           dev->device.dev) < 0)
4514
                goto error;
4515 4516 4517
        }
    }

M
Michal Privoznik 已提交
4518 4519 4520
    if (networkMacMgrAdd(driver, network, dom->name, &iface->mac) < 0)
        goto error;

4521
    if (virNetDevVPortProfileCheckComplete(virtport, true) < 0)
4522
        goto error;
4523

4524
 validate:
4525 4526 4527 4528 4529
    /* make sure that everything now specified for the device is
     * actually supported on this type of network. NB: network,
     * netdev, and iface->data.network.actual may all be NULL.
     */

4530
    if (virDomainNetGetActualVlan(iface)) {
4531 4532 4533 4534
        /* vlan configuration via libvirt is only supported for PCI
         * Passthrough SR-IOV devices (hostdev or macvtap passthru
         * mode) and openvswitch bridges. Otherwise log an error and
         * fail
4535 4536
         */
        if (!(actualType == VIR_DOMAIN_NET_TYPE_HOSTDEV ||
4537 4538 4539
              (actualType == VIR_DOMAIN_NET_TYPE_DIRECT &&
               virDomainNetGetActualDirectMode(iface)
               == VIR_NETDEV_MACVLAN_MODE_PASSTHRU) ||
4540 4541 4542 4543 4544 4545 4546 4547 4548 4549 4550 4551 4552 4553 4554 4555 4556 4557 4558
              (actualType == VIR_DOMAIN_NET_TYPE_BRIDGE &&
               virtport && virtport->virtPortType
               == VIR_NETDEV_VPORT_PROFILE_OPENVSWITCH))) {
            if (netdef) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("an interface connecting to network '%s' "
                                 "is requesting a vlan tag, but that is not "
                                 "supported for this type of network"),
                               netdef->name);
            } else {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("an interface of type '%s' "
                                 "is requesting a vlan tag, but that is not "
                                 "supported for this type of connection"),
                               virDomainNetTypeToString(iface->type));
            }
            goto error;
        }
    }
4559 4560 4561 4562 4563 4564 4565 4566 4567 4568 4569
    if (virDomainNetGetActualBandwidth(iface)) {
        /* bandwidth configuration via libvirt is not supported for
         * hostdev network devices
         */
        if (actualType == VIR_DOMAIN_NET_TYPE_HOSTDEV) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("bandwidth settings are not supported "
                             "for hostdev interfaces"));
            goto error;
        }
    }
4570 4571 4572

    if (netdef) {
        netdef->connections++;
4573
        if (dev)
4574 4575 4576 4577 4578 4579
            dev->connections++;
        /* finally we can call the 'plugged' hook script if any */
        if (networkRunHook(network, dom, iface,
                           VIR_HOOK_NETWORK_OP_IFACE_PLUGGED,
                           VIR_HOOK_SUBOP_BEGIN) < 0) {
            /* adjust for failure */
4580
            netdef->connections--;
4581 4582 4583 4584
            if (dev)
                dev->connections--;
            goto error;
        }
4585
        networkLogAllocation(netdef, actualType, dev, iface, true);
4586 4587
    }

4588
    ret = 0;
4589

4590
 cleanup:
4591
    virNetworkObjEndAPI(&network);
4592 4593
    return ret;

4594
 error:
4595
    if (iface->type == VIR_DOMAIN_NET_TYPE_NETWORK) {
4596 4597 4598
        virDomainActualNetDefFree(iface->data.network.actual);
        iface->data.network.actual = NULL;
    }
4599
    goto cleanup;
4600 4601 4602
}

/* networkNotifyActualDevice:
4603
 * @dom: domain definition that @iface belongs to
4604 4605 4606 4607 4608 4609 4610 4611 4612 4613
 * @iface:  the domain's NetDef with an "actual" device already filled in.
 *
 * Called to notify the network driver when libvirtd is restarted and
 * finds an already running domain. If appropriate it will force an
 * allocation of the actual->direct.linkdev to get everything back in
 * order.
 *
 * Returns 0 on success, -1 on failure.
 */
int
4614 4615
networkNotifyActualDevice(virDomainDefPtr dom,
                          virDomainNetDefPtr iface)
4616
{
4617
    virNetworkDriverStatePtr driver = networkGetDriver();
4618
    virDomainNetType actualType = virDomainNetGetActualType(iface);
4619 4620
    virNetworkObjPtr network;
    virNetworkDefPtr netdef;
4621
    virNetworkForwardIfDefPtr dev = NULL;
4622 4623
    size_t i;
    int ret = -1;
4624 4625

    if (iface->type != VIR_DOMAIN_NET_TYPE_NETWORK)
J
Ján Tomko 已提交
4626
        return 0;
4627

4628
    network = virNetworkObjFindByName(driver->networks, iface->data.network.name);
4629
    if (!network) {
4630 4631 4632
        virReportError(VIR_ERR_NO_NETWORK,
                       _("no network with matching name '%s'"),
                       iface->data.network.name);
4633 4634 4635 4636
        goto error;
    }
    netdef = network->def;

4637 4638 4639 4640 4641 4642 4643 4644 4645 4646 4647
    /* if we're restarting libvirtd after an upgrade from a version
     * that didn't save bridge name in actualNetDef for
     * actualType==network, we need to copy it in so that it will be
     * available in all cases
     */
    if (actualType == VIR_DOMAIN_NET_TYPE_NETWORK &&
        !iface->data.network.actual->data.bridge.brname &&
        (VIR_STRDUP(iface->data.network.actual->data.bridge.brname,
                    netdef->bridge) < 0))
            goto error;

4648
    if (!iface->data.network.actual ||
4649 4650
        (actualType != VIR_DOMAIN_NET_TYPE_DIRECT &&
         actualType != VIR_DOMAIN_NET_TYPE_HOSTDEV)) {
4651 4652
        VIR_DEBUG("Nothing to claim from network %s", iface->data.network.name);
        goto success;
4653 4654
    }

4655
    if (networkCreateInterfacePool(netdef) < 0)
4656
        goto error;
4657

4658
    if (netdef->forward.nifs == 0) {
4659
        virReportError(VIR_ERR_INTERNAL_ERROR,
4660 4661
                       _("network '%s' uses a direct or hostdev mode, "
                         "but has no forward dev and no interface pool"),
4662
                       netdef->name);
4663
        goto error;
4664
    }
4665

4666 4667
    if (actualType == VIR_DOMAIN_NET_TYPE_DIRECT) {
        const char *actualDev;
4668

4669 4670 4671 4672 4673 4674 4675 4676 4677
        actualDev = virDomainNetGetActualDirectDev(iface);
        if (!actualDev) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("the interface uses a direct mode, "
                             "but has no source dev"));
            goto error;
        }

        /* find the matching interface and increment its connections */
4678 4679
        for (i = 0; i < netdef->forward.nifs; i++) {
            if (netdef->forward.ifs[i].type
4680
                == VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV &&
4681 4682
                STREQ(actualDev, netdef->forward.ifs[i].device.dev)) {
                dev = &netdef->forward.ifs[i];
4683 4684 4685 4686 4687
                break;
            }
        }
        /* dev points at the physical device we want to use */
        if (!dev) {
4688
            virReportError(VIR_ERR_INTERNAL_ERROR,
4689 4690
                           _("network '%s' doesn't have dev='%s' "
                             "in use by domain"),
4691
                           netdef->name, actualDev);
4692
            goto error;
4693 4694
        }

4695
        /* PASSTHROUGH mode and PRIVATE Mode + 802.1Qbh both require
4696 4697
         * exclusive access to a device, so current connections count
         * must be 0 in those cases.
4698
         */
4699
        if ((dev->connections > 0) &&
4700 4701
            ((netdef->forward.type == VIR_NETWORK_FORWARD_PASSTHROUGH) ||
             ((netdef->forward.type == VIR_NETWORK_FORWARD_PRIVATE) &&
4702 4703
              iface->data.network.actual->virtPortProfile &&
              (iface->data.network.actual->virtPortProfile->virtPortType
4704
               == VIR_NETDEV_VPORT_PROFILE_8021QBH)))) {
4705
            virReportError(VIR_ERR_INTERNAL_ERROR,
4706 4707
                           _("network '%s' claims dev='%s' is already in "
                             "use by a different domain"),
4708
                           netdef->name, actualDev);
4709
            goto error;
4710
        }
4711 4712 4713 4714 4715 4716 4717 4718 4719 4720 4721 4722
    }  else /* if (actualType == VIR_DOMAIN_NET_TYPE_HOSTDEV) */ {
        virDomainHostdevDefPtr hostdev;

        hostdev = virDomainNetGetActualHostdev(iface);
        if (!hostdev) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("the interface uses a hostdev mode, "
                             "but has no hostdev"));
            goto error;
        }

        /* find the matching interface and increment its connections */
4723 4724
        for (i = 0; i < netdef->forward.nifs; i++) {
            if (netdef->forward.ifs[i].type
4725
                == VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_PCI &&
4726
                virPCIDeviceAddressEqual(&hostdev->source.subsys.u.pci.addr,
4727 4728
                                         &netdef->forward.ifs[i].device.pci)) {
                dev = &netdef->forward.ifs[i];
4729 4730 4731 4732 4733 4734 4735 4736 4737
                break;
            }
        }
        /* dev points at the physical device we want to use */
        if (!dev) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("network '%s' doesn't have "
                             "PCI device %04x:%02x:%02x.%x in use by domain"),
                           netdef->name,
4738 4739 4740 4741
                           hostdev->source.subsys.u.pci.addr.domain,
                           hostdev->source.subsys.u.pci.addr.bus,
                           hostdev->source.subsys.u.pci.addr.slot,
                           hostdev->source.subsys.u.pci.addr.function);
J
Ján Tomko 已提交
4742
            goto error;
4743 4744 4745 4746 4747 4748 4749
        }

        /* PASSTHROUGH mode, PRIVATE Mode + 802.1Qbh, and hostdev (PCI
         * passthrough) all require exclusive access to a device, so
         * current connections count must be 0 in those cases.
         */
        if ((dev->connections > 0) &&
4750
            netdef->forward.type == VIR_NETWORK_FORWARD_HOSTDEV) {
4751 4752 4753 4754 4755 4756 4757 4758 4759
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("network '%s' claims the PCI device at "
                             "domain=%d bus=%d slot=%d function=%d "
                             "is already in use by a different domain"),
                           netdef->name,
                           dev->device.pci.domain, dev->device.pci.bus,
                           dev->device.pci.slot, dev->device.pci.function);
            goto error;
        }
4760 4761
    }

4762
 success:
4763
    netdef->connections++;
4764 4765
    if (dev)
        dev->connections++;
4766 4767 4768 4769 4770 4771 4772 4773 4774
    /* finally we can call the 'plugged' hook script if any */
    if (networkRunHook(network, dom, iface, VIR_HOOK_NETWORK_OP_IFACE_PLUGGED,
                       VIR_HOOK_SUBOP_BEGIN) < 0) {
        /* adjust for failure */
        if (dev)
            dev->connections--;
        netdef->connections--;
        goto error;
    }
4775
    networkLogAllocation(netdef, actualType, dev, iface, true);
4776

4777
    ret = 0;
4778
 cleanup:
4779
    virNetworkObjEndAPI(&network);
4780
    return ret;
4781

4782
 error:
4783
    goto cleanup;
4784 4785 4786
}


4787

4788
/* networkReleaseActualDevice:
4789
 * @dom: domain definition that @iface belongs to
4790 4791 4792 4793 4794 4795 4796 4797 4798 4799
 * @iface:  a domain's NetDef (interface definition)
 *
 * Given a domain <interface> element that previously had its <actual>
 * element filled in (and possibly a physical device allocated to it),
 * free up the physical device for use by someone else, and free the
 * virDomainActualNetDef.
 *
 * Returns 0 on success, -1 on failure.
 */
int
4800 4801
networkReleaseActualDevice(virDomainDefPtr dom,
                           virDomainNetDefPtr iface)
4802
{
4803
    virNetworkDriverStatePtr driver = networkGetDriver();
4804
    virDomainNetType actualType = virDomainNetGetActualType(iface);
4805
    virNetworkObjPtr network;
4806
    virNetworkDefPtr netdef;
4807
    virNetworkForwardIfDefPtr dev = NULL;
4808 4809
    size_t i;
    int ret = -1;
4810 4811

    if (iface->type != VIR_DOMAIN_NET_TYPE_NETWORK)
J
Ján Tomko 已提交
4812
        return 0;
4813

4814
    network = virNetworkObjFindByName(driver->networks, iface->data.network.name);
4815
    if (!network) {
4816 4817 4818
        virReportError(VIR_ERR_NO_NETWORK,
                       _("no network with matching name '%s'"),
                       iface->data.network.name);
4819 4820 4821 4822
        goto error;
    }
    netdef = network->def;

4823 4824
    if (iface->data.network.actual &&
        (netdef->forward.type == VIR_NETWORK_FORWARD_NONE ||
4825
         netdef->forward.type == VIR_NETWORK_FORWARD_NAT ||
4826 4827
         netdef->forward.type == VIR_NETWORK_FORWARD_ROUTE ||
         netdef->forward.type == VIR_NETWORK_FORWARD_OPEN) &&
4828 4829 4830
        networkUnplugBandwidth(network, iface) < 0)
        goto error;

4831 4832 4833
    if ((!iface->data.network.actual) ||
        ((actualType != VIR_DOMAIN_NET_TYPE_DIRECT) &&
         (actualType != VIR_DOMAIN_NET_TYPE_HOSTDEV))) {
4834 4835
        VIR_DEBUG("Nothing to release to network %s", iface->data.network.name);
        goto success;
4836 4837
    }

4838
    if (netdef->forward.nifs == 0) {
4839
        virReportError(VIR_ERR_INTERNAL_ERROR,
4840
                       _("network '%s' uses a direct/hostdev mode, but "
4841 4842
                         "has no forward dev and no interface pool"),
                       netdef->name);
4843
        goto error;
4844 4845 4846 4847 4848 4849 4850 4851 4852 4853 4854 4855
    }

    if (actualType == VIR_DOMAIN_NET_TYPE_DIRECT) {
        const char *actualDev;

        actualDev = virDomainNetGetActualDirectDev(iface);
        if (!actualDev) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("the interface uses a direct mode, "
                             "but has no source dev"));
            goto error;
        }
4856

4857 4858
        for (i = 0; i < netdef->forward.nifs; i++) {
            if (netdef->forward.ifs[i].type
4859
                == VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV &&
4860 4861
                STREQ(actualDev, netdef->forward.ifs[i].device.dev)) {
                dev = &netdef->forward.ifs[i];
4862 4863 4864
                break;
            }
        }
4865

4866
        if (!dev) {
4867
            virReportError(VIR_ERR_INTERNAL_ERROR,
4868 4869
                           _("network '%s' doesn't have dev='%s' "
                             "in use by domain"),
4870
                           netdef->name, actualDev);
4871
            goto error;
4872
        }
4873 4874 4875 4876 4877 4878 4879 4880 4881 4882
    } else /* if (actualType == VIR_DOMAIN_NET_TYPE_HOSTDEV) */ {
        virDomainHostdevDefPtr hostdev;

        hostdev = virDomainNetGetActualHostdev(iface);
        if (!hostdev) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           "%s", _("the interface uses a hostdev mode, but has no hostdev"));
            goto error;
        }

4883 4884
        for (i = 0; i < netdef->forward.nifs; i++) {
            if (netdef->forward.ifs[i].type
4885
                == VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_PCI &&
4886
                virPCIDeviceAddressEqual(&hostdev->source.subsys.u.pci.addr,
4887 4888
                                         &netdef->forward.ifs[i].device.pci)) {
                dev = &netdef->forward.ifs[i];
4889 4890 4891 4892 4893 4894 4895 4896 4897
                break;
            }
        }

        if (!dev) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("network '%s' doesn't have "
                             "PCI device %04x:%02x:%02x.%x in use by domain"),
                           netdef->name,
4898 4899 4900 4901
                           hostdev->source.subsys.u.pci.addr.domain,
                           hostdev->source.subsys.u.pci.addr.bus,
                           hostdev->source.subsys.u.pci.addr.slot,
                           hostdev->source.subsys.u.pci.addr.function);
J
Ján Tomko 已提交
4902
            goto error;
4903
        }
J
Ján Tomko 已提交
4904
    }
4905

4906
 success:
M
Michal Privoznik 已提交
4907 4908
    networkMacMgrDel(driver, network, dom->name, &iface->mac);

4909
    if (iface->data.network.actual) {
4910
        netdef->connections--;
4911 4912
        if (dev)
            dev->connections--;
4913 4914 4915
        /* finally we can call the 'unplugged' hook script if any */
        networkRunHook(network, dom, iface, VIR_HOOK_NETWORK_OP_IFACE_UNPLUGGED,
                       VIR_HOOK_SUBOP_BEGIN);
4916
        networkLogAllocation(netdef, actualType, dev, iface, false);
4917
    }
4918
    ret = 0;
4919
 cleanup:
4920
    virNetworkObjEndAPI(&network);
4921 4922 4923 4924
    if (iface->type == VIR_DOMAIN_NET_TYPE_NETWORK) {
        virDomainActualNetDefFree(iface->data.network.actual);
        iface->data.network.actual = NULL;
    }
4925
    return ret;
4926

4927
 error:
4928
    goto cleanup;
4929
}
4930 4931 4932 4933 4934 4935

/*
 * networkGetNetworkAddress:
 * @netname: the name of a network
 * @netaddr: string representation of IP address for that network.
 *
4936
 * Attempt to return an IP address associated with the named
4937 4938 4939 4940
 * network. If a libvirt virtual network, that will be provided in the
 * configuration. For host bridge and direct (macvtap) networks, we
 * must do an ioctl to learn the address.
 *
4941
 * Note: This function returns the first IP address it finds. It might
4942 4943 4944 4945 4946 4947 4948 4949 4950 4951 4952
 * be useful if it was more flexible, but the current use (getting a
 * listen address for qemu's vnc/spice graphics server) can only use a
 * single address anyway.
 *
 * Returns 0 on success, and puts a string (which must be free'd by
 * the caller) into *netaddr. Returns -1 on failure or -2 if
 * completely unsupported.
 */
int
networkGetNetworkAddress(const char *netname, char **netaddr)
{
4953
    virNetworkDriverStatePtr driver = networkGetDriver();
4954
    int ret = -1;
4955
    virNetworkObjPtr network;
4956
    virNetworkDefPtr netdef;
4957
    virNetworkIPDefPtr ipdef;
4958 4959
    virSocketAddr addr;
    virSocketAddrPtr addrptr = NULL;
4960
    char *dev_name = NULL;
4961 4962

    *netaddr = NULL;
4963
    network = virNetworkObjFindByName(driver->networks, netname);
4964
    if (!network) {
4965 4966 4967
        virReportError(VIR_ERR_NO_NETWORK,
                       _("no network with matching name '%s'"),
                       netname);
4968
        goto cleanup;
4969 4970 4971
    }
    netdef = network->def;

4972
    switch (netdef->forward.type) {
4973 4974 4975
    case VIR_NETWORK_FORWARD_NONE:
    case VIR_NETWORK_FORWARD_NAT:
    case VIR_NETWORK_FORWARD_ROUTE:
4976
    case VIR_NETWORK_FORWARD_OPEN:
4977
        ipdef = virNetworkDefGetIPByIndex(netdef, AF_UNSPEC, 0);
4978
        if (!ipdef) {
4979
            virReportError(VIR_ERR_INTERNAL_ERROR,
4980
                           _("network '%s' doesn't have an IP address"),
4981
                           netdef->name);
4982
            goto cleanup;
4983 4984 4985 4986 4987
        }
        addrptr = &ipdef->address;
        break;

    case VIR_NETWORK_FORWARD_BRIDGE:
4988
        if ((dev_name = netdef->bridge))
4989 4990
            break;
        /*
4991 4992
         * fall through if netdef->bridge wasn't set, since that is
         * macvtap bridge mode network.
4993
         */
4994 4995
        ATTRIBUTE_FALLTHROUGH;

4996 4997 4998
    case VIR_NETWORK_FORWARD_PRIVATE:
    case VIR_NETWORK_FORWARD_VEPA:
    case VIR_NETWORK_FORWARD_PASSTHROUGH:
4999 5000
        if ((netdef->forward.nifs > 0) && netdef->forward.ifs)
            dev_name = netdef->forward.ifs[0].device.dev;
5001

5002
        if (!dev_name) {
5003 5004 5005
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("network '%s' has no associated interface or bridge"),
                           netdef->name);
5006
            goto cleanup;
5007 5008 5009 5010
        }
        break;
    }

5011
    if (dev_name) {
5012
        if (virNetDevIPAddrGet(dev_name, &addr) < 0)
5013
            goto cleanup;
5014
        addrptr = &addr;
5015 5016
    }

5017 5018
    if (!(addrptr &&
          (*netaddr = virSocketAddrFormat(addrptr)))) {
5019
        goto cleanup;
5020 5021
    }

5022
    ret = 0;
5023
 cleanup:
5024
    virNetworkObjEndAPI(&network);
5025 5026
    return ret;
}
5027

5028 5029 5030 5031 5032 5033 5034 5035 5036 5037 5038 5039 5040 5041 5042 5043 5044 5045 5046 5047 5048 5049 5050 5051 5052 5053 5054 5055 5056 5057 5058 5059 5060 5061
/* networkGetActualType:
 * @dom: domain definition that @iface belongs to
 * @iface: the original NetDef from the domain
 *
 * Looks up the network reference by iface, and returns the actual
 * type of the connection without allocating any resources.
 *
 * Returns 0 on success, -1 on failure.
 */
int
networkGetActualType(virDomainNetDefPtr iface)
{
    virNetworkDriverStatePtr driver = networkGetDriver();
    virNetworkObjPtr network = NULL;
    virNetworkDefPtr netdef = NULL;
    int ret = -1;

    if (!driver || iface->type != VIR_DOMAIN_NET_TYPE_NETWORK)
        return iface->type;

    if (iface->data.network.actual)
        return iface->data.network.actual->type;

    network = virNetworkObjFindByName(driver->networks, iface->data.network.name);
    if (!network) {
        virReportError(VIR_ERR_NO_NETWORK,
                       _("no network with matching name '%s'"),
                       iface->data.network.name);
        return -1;
    }
    netdef = network->def;

    if ((netdef->forward.type == VIR_NETWORK_FORWARD_NONE) ||
        (netdef->forward.type == VIR_NETWORK_FORWARD_NAT) ||
5062 5063
        (netdef->forward.type == VIR_NETWORK_FORWARD_ROUTE) ||
        (netdef->forward.type == VIR_NETWORK_FORWARD_OPEN)) {
5064 5065 5066 5067 5068 5069 5070 5071 5072 5073 5074 5075 5076 5077 5078 5079 5080 5081 5082 5083 5084 5085 5086 5087 5088 5089 5090 5091 5092 5093 5094 5095 5096 5097 5098 5099 5100
        /* for these forward types, the actual net type really *is*
         * NETWORK; we just keep the info from the portgroup in
         * iface->data.network.actual
         */
        ret = VIR_DOMAIN_NET_TYPE_NETWORK;

    } else if ((netdef->forward.type == VIR_NETWORK_FORWARD_BRIDGE) &&
               netdef->bridge) {

        /* <forward type='bridge'/> <bridge name='xxx'/>
         * is VIR_DOMAIN_NET_TYPE_BRIDGE
         */

        ret = VIR_DOMAIN_NET_TYPE_BRIDGE;

    } else if (netdef->forward.type == VIR_NETWORK_FORWARD_HOSTDEV) {

        ret = VIR_DOMAIN_NET_TYPE_HOSTDEV;

    } else if ((netdef->forward.type == VIR_NETWORK_FORWARD_BRIDGE) ||
               (netdef->forward.type == VIR_NETWORK_FORWARD_PRIVATE) ||
               (netdef->forward.type == VIR_NETWORK_FORWARD_VEPA) ||
               (netdef->forward.type == VIR_NETWORK_FORWARD_PASSTHROUGH)) {

        /* <forward type='bridge|private|vepa|passthrough'> are all
         * VIR_DOMAIN_NET_TYPE_DIRECT.
         */

        ret = VIR_DOMAIN_NET_TYPE_DIRECT;

    }

    virNetworkObjEndAPI(&network);
    return ret;
}


5101 5102 5103
/**
 * networkCheckBandwidth:
 * @net: network QoS
5104
 * @ifaceBand: interface QoS (may be NULL if no QoS)
5105
 * @oldBandwidth: new interface QoS (may be NULL if no QoS)
5106
 * @ifaceMac: interface MAC (used in error messages for identification)
5107 5108
 * @new_rate: new rate for non guaranteed class
 *
5109 5110 5111 5112 5113 5114 5115 5116
 * Function checks if @ifaceBand can be satisfied on @net. However, sometimes it
 * may happen that the interface that @ifaceBand corresponds to is already
 * plugged into the @net and the bandwidth is to be updated. In that case we
 * need to check if new bandwidth can be satisfied. If that's the case
 * @ifaceBand should point to new bandwidth settings and @oldBandwidth to
 * current ones. If you want to suppress this functionality just pass
 * @oldBandwidth == NULL.
 *
5117 5118 5119 5120 5121 5122
 * Returns: -1 if plugging would overcommit network QoS
 *           0 if plugging is safe (@new_rate updated)
 *           1 if no QoS is set (@new_rate untouched)
 */
static int
networkCheckBandwidth(virNetworkObjPtr net,
5123
                      virNetDevBandwidthPtr ifaceBand,
5124
                      virNetDevBandwidthPtr oldBandwidth,
5125
                      virMacAddr ifaceMac,
5126 5127 5128 5129 5130 5131 5132 5133
                      unsigned long long *new_rate)
{
    int ret = -1;
    virNetDevBandwidthPtr netBand = net->def->bandwidth;
    unsigned long long tmp_floor_sum = net->floor_sum;
    unsigned long long tmp_new_rate = 0;
    char ifmac[VIR_MAC_STRING_BUFLEN];

5134
    virMacAddrFormat(&ifaceMac, ifmac);
5135 5136 5137 5138 5139 5140 5141 5142 5143 5144

    if (ifaceBand && ifaceBand->in && ifaceBand->in->floor &&
        !(netBand && netBand->in)) {
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                       _("Invalid use of 'floor' on interface with MAC "
                         "address %s - network '%s' has no inbound QoS set"),
                       ifmac, net->def->name);
        return -1;
    }

5145 5146
    if (((!ifaceBand || !ifaceBand->in || !ifaceBand->in->floor) &&
         (!oldBandwidth || !oldBandwidth->in || !oldBandwidth->in->floor)) ||
5147 5148
        !netBand || !netBand->in) {
        /* no QoS required, claim success */
5149
        return 1;
5150
    }
5151 5152

    tmp_new_rate = netBand->in->average;
5153 5154 5155 5156
    if (oldBandwidth && oldBandwidth->in)
        tmp_floor_sum -= oldBandwidth->in->floor;
    if (ifaceBand && ifaceBand->in)
        tmp_floor_sum += ifaceBand->in->floor;
5157 5158 5159 5160 5161 5162 5163 5164 5165 5166 5167 5168 5169 5170 5171 5172 5173 5174 5175 5176 5177 5178 5179 5180 5181

    /* check against peak */
    if (netBand->in->peak) {
        tmp_new_rate = netBand->in->peak;
        if (tmp_floor_sum > netBand->in->peak) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("Cannot plug '%s' interface into '%s' because it "
                             "would overcommit 'peak' on network '%s'"),
                           ifmac,
                           net->def->bridge,
                           net->def->name);
            goto cleanup;
        }
    } else if (tmp_floor_sum > netBand->in->average) {
        /* tmp_floor_sum can be between 'average' and 'peak' iff 'peak' is set.
         * Otherwise, tmp_floor_sum must be below 'average'. */
        virReportError(VIR_ERR_OPERATION_INVALID,
                       _("Cannot plug '%s' interface into '%s' because it "
                         "would overcommit 'average' on network '%s'"),
                       ifmac,
                       net->def->bridge,
                       net->def->name);
        goto cleanup;
    }

5182 5183
    if (new_rate)
        *new_rate = tmp_new_rate;
5184 5185
    ret = 0;

5186
 cleanup:
5187 5188 5189 5190 5191 5192 5193 5194 5195 5196 5197 5198 5199 5200 5201 5202
    return ret;
}

/**
 * networkNextClassID:
 * @net: network object
 *
 * Find next free class ID. @net is supposed
 * to be locked already. If there is a free ID,
 * it is marked as used and returned.
 *
 * Returns next free class ID or -1 if none is available.
 */
static ssize_t
networkNextClassID(virNetworkObjPtr net)
{
5203
    ssize_t ret = 0;
5204

5205
    ret = virBitmapNextClearBit(net->class_id, -1);
5206

5207
    if (ret < 0 || virBitmapSetBit(net->class_id, ret) < 0)
5208 5209 5210 5211 5212
        return -1;

    return ret;
}

5213

5214
static int
5215 5216 5217 5218
networkPlugBandwidthImpl(virNetworkObjPtr net,
                         virDomainNetDefPtr iface,
                         virNetDevBandwidthPtr ifaceBand,
                         unsigned long long new_rate)
5219
{
5220
    virNetworkDriverStatePtr driver = networkGetDriver();
5221
    ssize_t class_id = 0;
5222 5223
    int plug_ret;
    int ret = -1;
5224 5225 5226 5227 5228 5229 5230 5231

    /* generate new class_id */
    if ((class_id = networkNextClassID(net)) < 0) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("Could not generate next class ID"));
        goto cleanup;
    }

5232 5233
    plug_ret = virNetDevBandwidthPlug(net->def->bridge, net->def->bandwidth,
                                      &iface->mac, ifaceBand, class_id);
5234 5235 5236 5237 5238 5239 5240 5241
    if (plug_ret < 0) {
        ignore_value(virNetDevBandwidthUnplug(net->def->bridge, class_id));
        goto cleanup;
    }

    /* QoS was set, generate new class ID */
    iface->data.network.actual->class_id = class_id;
    /* update sum of 'floor'-s of attached NICs */
5242
    net->floor_sum += ifaceBand->in->floor;
5243
    /* update status file */
5244
    if (virNetworkSaveStatus(driver->stateDir, net) < 0) {
5245
        ignore_value(virBitmapClearBit(net->class_id, class_id));
5246
        net->floor_sum -= ifaceBand->in->floor;
5247 5248 5249 5250
        iface->data.network.actual->class_id = 0;
        ignore_value(virNetDevBandwidthUnplug(net->def->bridge, class_id));
        goto cleanup;
    }
5251 5252
    /* update rate for non guaranteed NICs */
    new_rate -= net->floor_sum;
5253
    if (virNetDevBandwidthUpdateRate(net->def->bridge, 2,
5254 5255 5256 5257 5258
                                     net->def->bandwidth, new_rate) < 0)
        VIR_WARN("Unable to update rate for 1:2 class on %s bridge",
                 net->def->bridge);

    ret = 0;
5259 5260 5261 5262 5263 5264 5265 5266 5267 5268 5269 5270 5271 5272 5273 5274 5275 5276 5277 5278 5279 5280 5281 5282 5283 5284 5285 5286 5287 5288 5289 5290 5291 5292 5293 5294 5295 5296 5297 5298
 cleanup:
    return ret;
}


static int
networkPlugBandwidth(virNetworkObjPtr net,
                     virDomainNetDefPtr iface)
{
    int ret = -1;
    int plug_ret;
    unsigned long long new_rate = 0;
    char ifmac[VIR_MAC_STRING_BUFLEN];
    virNetDevBandwidthPtr ifaceBand = virDomainNetGetActualBandwidth(iface);

    if ((plug_ret = networkCheckBandwidth(net, ifaceBand, NULL,
                                          iface->mac, &new_rate)) < 0) {
        /* helper reported error */
        goto cleanup;
    }

    if (plug_ret > 0) {
        /* no QoS needs to be set; claim success */
        ret = 0;
        goto cleanup;
    }

    virMacAddrFormat(&iface->mac, ifmac);
    if (iface->type != VIR_DOMAIN_NET_TYPE_NETWORK ||
        !iface->data.network.actual) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("Cannot set bandwidth on interface '%s' of type %d"),
                       ifmac, iface->type);
        goto cleanup;
    }

    if (networkPlugBandwidthImpl(net, iface, ifaceBand, new_rate) < 0)
        goto cleanup;

    ret = 0;
5299

5300
 cleanup:
5301 5302 5303 5304 5305 5306 5307
    return ret;
}

static int
networkUnplugBandwidth(virNetworkObjPtr net,
                       virDomainNetDefPtr iface)
{
5308
    virNetworkDriverStatePtr driver = networkGetDriver();
5309 5310
    int ret = 0;
    unsigned long long new_rate;
5311
    virNetDevBandwidthPtr ifaceBand = virDomainNetGetActualBandwidth(iface);
5312 5313 5314

    if (iface->data.network.actual &&
        iface->data.network.actual->class_id) {
5315 5316 5317 5318 5319
        if (!net->def->bandwidth || !net->def->bandwidth->in) {
            VIR_WARN("Network %s has no bandwidth but unplug requested",
                     net->def->name);
            goto cleanup;
        }
5320 5321 5322 5323 5324 5325 5326 5327 5328 5329 5330
        /* we must remove class from bridge */
        new_rate = net->def->bandwidth->in->average;

        if (net->def->bandwidth->in->peak > 0)
            new_rate = net->def->bandwidth->in->peak;

        ret = virNetDevBandwidthUnplug(net->def->bridge,
                                       iface->data.network.actual->class_id);
        if (ret < 0)
            goto cleanup;
        /* update sum of 'floor'-s of attached NICs */
5331
        net->floor_sum -= ifaceBand->in->floor;
5332 5333 5334 5335
        /* return class ID */
        ignore_value(virBitmapClearBit(net->class_id,
                                       iface->data.network.actual->class_id));
        /* update status file */
5336
        if (virNetworkSaveStatus(driver->stateDir, net) < 0) {
5337
            net->floor_sum += ifaceBand->in->floor;
5338 5339 5340 5341
            ignore_value(virBitmapSetBit(net->class_id,
                                         iface->data.network.actual->class_id));
            goto cleanup;
        }
5342 5343
        /* update rate for non guaranteed NICs */
        new_rate -= net->floor_sum;
5344
        if (virNetDevBandwidthUpdateRate(net->def->bridge, 2,
5345 5346 5347 5348 5349 5350 5351
                                         net->def->bandwidth, new_rate) < 0)
            VIR_WARN("Unable to update rate for 1:2 class on %s bridge",
                     net->def->bridge);
        /* no class is associated any longer */
        iface->data.network.actual->class_id = 0;
    }

5352
 cleanup:
5353 5354
    return ret;
}
5355 5356 5357

static void
networkNetworkObjTaint(virNetworkObjPtr net,
5358
                       virNetworkTaintFlags taint)
5359 5360 5361 5362 5363 5364 5365 5366 5367 5368 5369
{
    if (virNetworkObjTaint(net, taint)) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(net->def->uuid, uuidstr);

        VIR_WARN("Network name='%s' uuid=%s is tainted: %s",
                 net->def->name,
                 uuidstr,
                 virNetworkTaintTypeToString(taint));
    }
}
5370 5371 5372 5373 5374 5375


static bool
networkBandwidthGenericChecks(virDomainNetDefPtr iface,
                              virNetDevBandwidthPtr newBandwidth)
{
5376
    virNetDevBandwidthPtr ifaceBand;
5377 5378 5379 5380 5381 5382 5383 5384
    unsigned long long old_floor, new_floor;

    if (virDomainNetGetActualType(iface) != VIR_DOMAIN_NET_TYPE_NETWORK) {
        /* This is not an interface that's plugged into a network.
         * We don't care. Thus from our POV bandwidth change is allowed. */
        return false;
    }

5385
    ifaceBand = virDomainNetGetActualBandwidth(iface);
5386 5387 5388 5389 5390 5391 5392 5393 5394 5395 5396 5397 5398 5399 5400 5401 5402 5403 5404 5405 5406 5407 5408 5409 5410 5411 5412 5413 5414 5415 5416 5417 5418 5419 5420 5421 5422 5423 5424 5425
    old_floor = new_floor = 0;

    if (ifaceBand && ifaceBand->in)
        old_floor = ifaceBand->in->floor;
    if (newBandwidth && newBandwidth->in)
        new_floor = newBandwidth->in->floor;

    return new_floor != old_floor;
}


bool
networkBandwidthChangeAllowed(virDomainNetDefPtr iface,
                              virNetDevBandwidthPtr newBandwidth)
{
    virNetworkDriverStatePtr driver = networkGetDriver();
    virNetworkObjPtr network = NULL;
    virNetDevBandwidthPtr ifaceBand = virDomainNetGetActualBandwidth(iface);
    bool ret = false;

    if (!networkBandwidthGenericChecks(iface, newBandwidth))
        return true;

    network = virNetworkObjFindByName(driver->networks, iface->data.network.name);
    if (!network) {
        virReportError(VIR_ERR_NO_NETWORK,
                       _("no network with matching name '%s'"),
                       iface->data.network.name);
        return false;
    }

    if (networkCheckBandwidth(network, newBandwidth, ifaceBand, iface->mac, NULL) < 0)
        goto cleanup;

    ret = true;

 cleanup:
    virNetworkObjEndAPI(&network);
    return ret;
}
5426 5427 5428 5429 5430 5431 5432 5433 5434 5435 5436 5437 5438 5439 5440 5441 5442 5443 5444 5445 5446 5447 5448 5449 5450 5451 5452 5453 5454 5455 5456 5457 5458 5459 5460 5461 5462 5463


int
networkBandwidthUpdate(virDomainNetDefPtr iface,
                       virNetDevBandwidthPtr newBandwidth)
{
    virNetworkDriverStatePtr driver = networkGetDriver();
    virNetworkObjPtr network = NULL;
    virNetDevBandwidthPtr ifaceBand = virDomainNetGetActualBandwidth(iface);
    unsigned long long new_rate = 0;
    int plug_ret;
    int ret = -1;

    if (!networkBandwidthGenericChecks(iface, newBandwidth))
        return 0;

    network = virNetworkObjFindByName(driver->networks, iface->data.network.name);
    if (!network) {
        virReportError(VIR_ERR_NO_NETWORK,
                       _("no network with matching name '%s'"),
                       iface->data.network.name);
        return ret;
    }

    if ((plug_ret = networkCheckBandwidth(network, newBandwidth, ifaceBand,
                                          iface->mac, &new_rate)) < 0) {
        /* helper reported error */
        goto cleanup;
    }

    if (plug_ret > 0) {
        /* no QoS needs to be set; claim success */
        ret = 0;
        goto cleanup;
    }

    /* Okay, there are three possible scenarios: */

5464 5465
    if (ifaceBand && ifaceBand->in && ifaceBand->in->floor &&
        newBandwidth && newBandwidth->in && newBandwidth->in->floor) {
5466 5467 5468 5469 5470 5471 5472 5473 5474 5475 5476 5477 5478 5479 5480 5481 5482 5483 5484 5485 5486 5487 5488 5489 5490 5491 5492 5493 5494 5495 5496 5497 5498 5499 5500 5501 5502 5503 5504 5505 5506 5507
        /* Either we just need to update @floor .. */

        if (virNetDevBandwidthUpdateRate(network->def->bridge,
                                         iface->data.network.actual->class_id,
                                         network->def->bandwidth,
                                         newBandwidth->in->floor) < 0)
            goto cleanup;

        network->floor_sum -= ifaceBand->in->floor;
        network->floor_sum += newBandwidth->in->floor;
        new_rate -= network->floor_sum;

        if (virNetDevBandwidthUpdateRate(network->def->bridge, 2,
                                         network->def->bandwidth, new_rate) < 0 ||
            virNetworkSaveStatus(driver->stateDir, network) < 0) {
            /* Ouch, rollback */
            network->floor_sum -= newBandwidth->in->floor;
            network->floor_sum += ifaceBand->in->floor;

            ignore_value(virNetDevBandwidthUpdateRate(network->def->bridge,
                                                      iface->data.network.actual->class_id,
                                                      network->def->bandwidth,
                                                      ifaceBand->in->floor));
            goto cleanup;
        }
    } else if (newBandwidth->in && newBandwidth->in->floor) {
        /* .. or we need to plug in new .. */

        if (networkPlugBandwidthImpl(network, iface, newBandwidth, new_rate) < 0)
            goto cleanup;
    } else {
        /* .. or unplug old. */

        if (networkUnplugBandwidth(network, iface) < 0)
            goto cleanup;
    }

    ret = 0;
 cleanup:
    virNetworkObjEndAPI(&network);
    return ret;
}