bridge_driver.c 58.6 KB
Newer Older
1
/*
2
 * bridge_driver.c: core driver methods for managing network
3
 *
4
 * Copyright (C) 2006-2010 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45
 * Copyright (C) 2006 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this library; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307  USA
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 */

#include <config.h>

#include <sys/types.h>
#include <sys/poll.h>
#include <dirent.h>
#include <limits.h>
#include <string.h>
#include <stdio.h>
#include <stdarg.h>
#include <stdlib.h>
#include <unistd.h>
#include <errno.h>
#include <sys/utsname.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <signal.h>
#include <paths.h>
#include <pwd.h>
#include <stdio.h>
#include <sys/wait.h>
#include <sys/ioctl.h>

46
#include "virterror_internal.h"
47
#include "datatypes.h"
48
#include "bridge_driver.h"
49 50 51 52 53
#include "network_conf.h"
#include "driver.h"
#include "event.h"
#include "buf.h"
#include "util.h"
54
#include "command.h"
55 56 57 58
#include "memory.h"
#include "uuid.h"
#include "iptables.h"
#include "bridge.h"
59
#include "logging.h"
60
#include "dnsmasq.h"
61
#include "util/network.h"
62
#include "configmake.h"
63

64 65
#define NETWORK_PID_DIR LOCALSTATEDIR "/run/libvirt/network"
#define NETWORK_STATE_DIR LOCALSTATEDIR "/lib/libvirt/network"
66

67
#define DNSMASQ_STATE_DIR LOCALSTATEDIR "/lib/libvirt/dnsmasq"
68

69 70
#define VIR_FROM_THIS VIR_FROM_NETWORK

71
#define networkReportError(code, ...)                                   \
72
    virReportErrorHelper(NULL, VIR_FROM_NETWORK, code, __FILE__,        \
73
                         __FUNCTION__, __LINE__, __VA_ARGS__)
74

75 76
/* Main driver state */
struct network_driver {
77
    virMutex lock;
78

79
    virNetworkObjList networks;
80 81 82 83 84 85 86 87

    iptablesContext *iptables;
    brControl *brctl;
    char *networkConfigDir;
    char *networkAutostartDir;
    char *logDir;
};

88 89 90

static void networkDriverLock(struct network_driver *driver)
{
91
    virMutexLock(&driver->lock);
92 93 94
}
static void networkDriverUnlock(struct network_driver *driver)
{
95
    virMutexUnlock(&driver->lock);
96 97
}

98 99
static int networkShutdown(void);

100 101
static int networkStartNetworkDaemon(struct network_driver *driver,
                                     virNetworkObjPtr network);
102

103 104
static int networkShutdownNetworkDaemon(struct network_driver *driver,
                                        virNetworkObjPtr network);
105

106 107
static void networkReloadIptablesRules(struct network_driver *driver);

108 109 110
static struct network_driver *driverState = NULL;


111 112 113 114 115 116 117 118 119 120 121
static void
networkFindActiveConfigs(struct network_driver *driver) {
    unsigned int i;

    for (i = 0 ; i < driver->networks.count ; i++) {
        virNetworkObjPtr obj = driver->networks.objs[i];
        virNetworkDefPtr tmp;
        char *config;

        virNetworkObjLock(obj);

122
        if ((config = virNetworkConfigFile(NETWORK_STATE_DIR,
123 124 125 126 127 128 129 130 131 132 133 134
                                           obj->def->name)) == NULL) {
            virNetworkObjUnlock(obj);
            continue;
        }

        if (access(config, R_OK) < 0) {
            VIR_FREE(config);
            virNetworkObjUnlock(obj);
            continue;
        }

        /* Try and load the live config */
135
        tmp = virNetworkDefParseFile(config);
136 137 138 139 140 141 142 143 144 145 146
        VIR_FREE(config);
        if (tmp) {
            obj->newDef = obj->def;
            obj->def = tmp;
        }

        /* If bridge exists, then mark it active */
        if (obj->def->bridge &&
            brHasBridge(driver->brctl, obj->def->bridge) == 0) {
            obj->active = 1;

147
            /* Finally try and read dnsmasq pid if any */
148
            if (obj->def->ips && (obj->def->nips > 0) &&
149 150 151 152 153 154 155 156 157 158
                virFileReadPid(NETWORK_PID_DIR, obj->def->name,
                               &obj->dnsmasqPid) == 0) {

                /* Check its still alive */
                if (kill(obj->dnsmasqPid, 0) != 0)
                    obj->dnsmasqPid = -1;

#ifdef __linux__
                char *pidpath;

159
                if (virAsprintf(&pidpath, "/proc/%d/exe", obj->dnsmasqPid) < 0) {
160
                    virReportOOMError();
161 162
                    goto cleanup;
                }
163 164 165 166 167 168 169
                if (virFileLinkPointsTo(pidpath, DNSMASQ) == 0)
                    obj->dnsmasqPid = -1;
                VIR_FREE(pidpath);
#endif
            }
        }

170
    cleanup:
171 172 173 174 175
        virNetworkObjUnlock(obj);
    }
}


176 177 178
static void
networkAutostartConfigs(struct network_driver *driver) {
    unsigned int i;
179

180
    for (i = 0 ; i < driver->networks.count ; i++) {
181
        virNetworkObjLock(driver->networks.objs[i]);
182
        if (driver->networks.objs[i]->autostart &&
D
Daniel P. Berrange 已提交
183
            !virNetworkObjIsActive(driver->networks.objs[i]) &&
184
            networkStartNetworkDaemon(driver, driver->networks.objs[i]) < 0) {
185
            /* failed to start but already logged */
186
        }
187
        virNetworkObjUnlock(driver->networks.objs[i]);
188 189 190 191 192 193 194 195 196
    }
}

/**
 * networkStartup:
 *
 * Initialization function for the QEmu daemon
 */
static int
197
networkStartup(int privileged) {
198 199
    uid_t uid = geteuid();
    char *base = NULL;
200
    int err;
201 202

    if (VIR_ALLOC(driverState) < 0)
203
        goto error;
204

205 206 207 208
    if (virMutexInit(&driverState->lock) < 0) {
        VIR_FREE(driverState);
        goto error;
    }
209 210
    networkDriverLock(driverState);

211
    if (privileged) {
212
        if (virAsprintf(&driverState->logDir,
213
                        "%s/log/libvirt/qemu", LOCALSTATEDIR) == -1)
214 215
            goto out_of_memory;

216
        if ((base = strdup (SYSCONFDIR "/libvirt")) == NULL)
217 218
            goto out_of_memory;
    } else {
219
        char *userdir = virGetUserDirectory(uid);
220 221 222

        if (!userdir)
            goto error;
223

224
        if (virAsprintf(&driverState->logDir,
225 226
                        "%s/.libvirt/qemu/log", userdir) == -1) {
            VIR_FREE(userdir);
227
            goto out_of_memory;
228
        }
229

230 231
        if (virAsprintf(&base, "%s/.libvirt", userdir) == -1) {
            VIR_FREE(userdir);
232 233
            goto out_of_memory;
        }
234
        VIR_FREE(userdir);
235 236 237 238 239
    }

    /* Configuration paths are either ~/.libvirt/qemu/... (session) or
     * /etc/libvirt/qemu/... (system).
     */
240
    if (virAsprintf(&driverState->networkConfigDir, "%s/qemu/networks", base) == -1)
241 242
        goto out_of_memory;

243 244
    if (virAsprintf(&driverState->networkAutostartDir, "%s/qemu/networks/autostart",
                    base) == -1)
245 246 247 248
        goto out_of_memory;

    VIR_FREE(base);

249
    if ((err = brInit(&driverState->brctl))) {
250
        virReportSystemError(err, "%s",
251 252 253 254 255
                             _("cannot initialize bridge support"));
        goto error;
    }

    if (!(driverState->iptables = iptablesContextNew())) {
256
        goto out_of_memory;
257 258 259
    }


260
    if (virNetworkLoadAllConfigs(&driverState->networks,
261
                                 driverState->networkConfigDir,
262 263 264
                                 driverState->networkAutostartDir) < 0)
        goto error;

265
    networkFindActiveConfigs(driverState);
266
    networkReloadIptablesRules(driverState);
267 268
    networkAutostartConfigs(driverState);

269 270
    networkDriverUnlock(driverState);

271 272
    return 0;

273
out_of_memory:
274
    virReportOOMError();
275 276

error:
277 278 279
    if (driverState)
        networkDriverUnlock(driverState);

280
    VIR_FREE(base);
281
    networkShutdown();
282 283 284 285 286 287 288 289 290 291 292
    return -1;
}

/**
 * networkReload:
 *
 * Function to restart the QEmu daemon, it will recheck the configuration
 * files and update its state and the networking
 */
static int
networkReload(void) {
293 294 295
    if (!driverState)
        return 0;

296
    networkDriverLock(driverState);
297
    virNetworkLoadAllConfigs(&driverState->networks,
298 299
                             driverState->networkConfigDir,
                             driverState->networkAutostartDir);
300
    networkReloadIptablesRules(driverState);
301
    networkAutostartConfigs(driverState);
302
    networkDriverUnlock(driverState);
303 304 305 306 307 308 309 310 311 312 313 314 315
    return 0;
}

/**
 * networkActive:
 *
 * Checks if the QEmu daemon is active, i.e. has an active domain or
 * an active network
 *
 * Returns 1 if active, 0 otherwise
 */
static int
networkActive(void) {
316
    unsigned int i;
317
    int active = 0;
318

319 320 321
    if (!driverState)
        return 0;

322
    networkDriverLock(driverState);
323 324
    for (i = 0 ; i < driverState->networks.count ; i++) {
        virNetworkObjPtr net = driverState->networks.objs[i];
325
        virNetworkObjLock(net);
D
Daniel P. Berrange 已提交
326
        if (virNetworkObjIsActive(net))
327
            active = 1;
328
        virNetworkObjUnlock(net);
329
    }
330
    networkDriverUnlock(driverState);
331
    return active;
332 333 334 335 336 337 338 339 340 341 342 343
}

/**
 * networkShutdown:
 *
 * Shutdown the QEmu daemon, it will stop all active domains and networks
 */
static int
networkShutdown(void) {
    if (!driverState)
        return -1;

344 345
    networkDriverLock(driverState);

346
    /* free inactive networks */
347
    virNetworkObjListFree(&driverState->networks);
348 349 350 351 352 353 354 355 356 357

    VIR_FREE(driverState->logDir);
    VIR_FREE(driverState->networkConfigDir);
    VIR_FREE(driverState->networkAutostartDir);

    if (driverState->brctl)
        brShutdown(driverState->brctl);
    if (driverState->iptables)
        iptablesContextFree(driverState->iptables);

358
    networkDriverUnlock(driverState);
359
    virMutexDestroy(&driverState->lock);
360

361 362 363 364 365 366
    VIR_FREE(driverState);

    return 0;
}


367
static int
368
networkSaveDnsmasqHostsfile(virNetworkIpDefPtr ipdef,
369 370 371 372 373 374
                            dnsmasqContext *dctx,
                            bool force)
{
    unsigned int i;

    if (! force && virFileExists(dctx->hostsfile->path))
375
        return 0;
376

377 378
    for (i = 0; i < ipdef->nhosts; i++) {
        virNetworkDHCPHostDefPtr host = &(ipdef->hosts[i]);
379 380
        if ((host->mac) && VIR_SOCKET_HAS_ADDR(&host->ip))
            dnsmasqAddDhcpHost(dctx, host->mac, &host->ip, host->name);
381 382 383
    }

    if (dnsmasqSave(dctx) < 0)
384
        return -1;
385

386
    return 0;
387 388 389
}


390
static int
391
networkBuildDnsmasqArgv(virNetworkObjPtr network,
392
                        virNetworkIpDefPtr ipdef,
393
                        const char *pidfile,
394 395
                        virCommandPtr cmd) {
    int r, ret = -1;
396
    int nbleases = 0;
397
    char *bridgeaddr;
398

399
    if (!(bridgeaddr = virSocketFormatAddr(&ipdef->address)))
400
        goto cleanup;
401
    /*
402
     * NB, be careful about syntax for dnsmasq options in long format.
403 404 405 406 407 408 409 410 411 412 413 414 415
     *
     * If the flag has a mandatory argument, it can be given using
     * either syntax:
     *
     *     --foo bar
     *     --foo=bar
     *
     * If the flag has a optional argument, it *must* be given using
     * the syntax:
     *
     *     --foo=bar
     *
     * It is hard to determine whether a flag is optional or not,
416 417
     * without reading the dnsmasq source :-( The manpage is not
     * very explicit on this.
418
     */
419 420 421 422 423

    /*
     * Needed to ensure dnsmasq uses same algorithm for processing
     * multiple namedriver entries in /etc/resolv.conf as GLibC.
     */
424
    virCommandAddArgList(cmd, "--strict-order", "--bind-interfaces", NULL);
425

426 427
    if (network->def->domain)
        virCommandAddArgList(cmd, "--domain", network->def->domain, NULL);
428

429
    virCommandAddArgPair(cmd, "--pid-file", pidfile);
430

431 432
    /* *no* conf file */
    virCommandAddArgList(cmd, "--conf-file=", "", NULL);
433 434 435 436 437 438 439

    /*
     * XXX does not actually work, due to some kind of
     * race condition setting up ipv6 addresses on the
     * interface. A sleep(10) makes it work, but that's
     * clearly not practical
     *
440
     * virCommandAddArg(cmd, "--interface");
441
     * virCommandAddArg(cmd, ipdef->bridge);
442
     */
443 444 445 446
    virCommandAddArgList(cmd,
                         "--listen-address", bridgeaddr,
                         "--except-interface", "lo",
                         NULL);
447

448 449
    for (r = 0 ; r < ipdef->nranges ; r++) {
        char *saddr = virSocketFormatAddr(&ipdef->ranges[r].start);
450
        if (!saddr)
451
            goto cleanup;
452
        char *eaddr = virSocketFormatAddr(&ipdef->ranges[r].end);
453 454
        if (!eaddr) {
            VIR_FREE(saddr);
455
            goto cleanup;
456
        }
457 458
        virCommandAddArg(cmd, "--dhcp-range");
        virCommandAddArgFormat(cmd, "%s,%s", saddr, eaddr);
459 460
        VIR_FREE(saddr);
        VIR_FREE(eaddr);
461 462
        nbleases += virSocketGetRange(&ipdef->ranges[r].start,
                                      &ipdef->ranges[r].end);
463 464
    }

465 466 467 468 469
    /*
     * For static-only DHCP, i.e. with no range but at least one host element,
     * we have to add a special --dhcp-range option to enable the service in
     * dnsmasq.
     */
470
    if (!ipdef->nranges && ipdef->nhosts) {
471 472
        virCommandAddArg(cmd, "--dhcp-range");
        virCommandAddArgFormat(cmd, "%s,static", bridgeaddr);
473 474
    }

475
    if (ipdef->nranges > 0) {
476
        virCommandAddArgFormat(cmd, "--dhcp-lease-max=%d", nbleases);
477 478
    }

479
    if (ipdef->nranges || ipdef->nhosts)
480
        virCommandAddArg(cmd, "--dhcp-no-override");
481

482
    if (ipdef->nhosts > 0) {
483 484 485 486 487 488
        dnsmasqContext *dctx = dnsmasqContextNew(network->def->name,
                                                 DNSMASQ_STATE_DIR);
        if (dctx == NULL) {
            virReportOOMError();
            goto cleanup;
        }
489

490
        if (networkSaveDnsmasqHostsfile(ipdef, dctx, false) < 0) {
491 492
            virCommandAddArgPair(cmd, "--dhcp-hostsfile",
                                 dctx->hostsfile->path);
493 494
        }
        dnsmasqContextFree(dctx);
495 496
    }

497
    if (ipdef->tftproot) {
498
        virCommandAddArgList(cmd, "--enable-tftp",
499
                             "--tftp-root", ipdef->tftproot,
500
                             NULL);
501
    }
502
    if (ipdef->bootfile) {
503
        virCommandAddArg(cmd, "--dhcp-boot");
504 505
        if (VIR_SOCKET_HAS_ADDR(&ipdef->bootserver)) {
            char *bootserver = virSocketFormatAddr(&ipdef->bootserver);
506 507 508 509

            if (!bootserver)
                goto cleanup;
            virCommandAddArgFormat(cmd, "%s%s%s",
510
                               ipdef->bootfile, ",,", bootserver);
511 512
            VIR_FREE(bootserver);
        } else {
513
            virCommandAddArg(cmd, ipdef->bootfile);
514
        }
515 516
    }

517 518 519 520
    ret = 0;
cleanup:
    VIR_FREE(bridgeaddr);
    return ret;
521 522 523
}

static int
524 525
dhcpStartDhcpDaemon(virNetworkObjPtr network,
                    virNetworkIpDefPtr ipdef)
526
{
527 528 529
    virCommandPtr cmd = NULL;
    char *pidfile = NULL;
    int ret = -1, err;
530 531

    network->dnsmasqPid = -1;
532

533
    if (!VIR_SOCKET_IS_FAMILY(&ipdef->address, AF_INET)) {
534
        networkReportError(VIR_ERR_INTERNAL_ERROR,
535
                           "%s", _("cannot start dhcp daemon without IPv4 address for server"));
536
        goto cleanup;
537 538
    }

L
Laine Stump 已提交
539
    if ((err = virFileMakePath(NETWORK_PID_DIR)) != 0) {
540
        virReportSystemError(err,
541 542
                             _("cannot create directory %s"),
                             NETWORK_PID_DIR);
543
        goto cleanup;
544
    }
L
Laine Stump 已提交
545
    if ((err = virFileMakePath(NETWORK_STATE_DIR)) != 0) {
546
        virReportSystemError(err,
547 548
                             _("cannot create directory %s"),
                             NETWORK_STATE_DIR);
549
        goto cleanup;
550 551 552
    }

    if (!(pidfile = virFilePid(NETWORK_PID_DIR, network->def->name))) {
553
        virReportOOMError();
554
        goto cleanup;
555 556
    }

557
    cmd = virCommandNew(DNSMASQ);
558
    if (networkBuildDnsmasqArgv(network, ipdef, pidfile, cmd) < 0) {
559
        goto cleanup;
560 561
    }

562
    if (virCommandRun(cmd, NULL) < 0)
563 564 565
        goto cleanup;

    /*
566 567 568 569 570
     * There really is no race here - when dnsmasq daemonizes, its
     * leader process stays around until its child has actually
     * written its pidfile. So by time virCommandRun exits it has
     * waitpid'd and guaranteed the proess has started and written a
     * pid
571 572 573 574 575
     */

    if (virFileReadPid(NETWORK_PID_DIR, network->def->name,
                       &network->dnsmasqPid) < 0)
        goto cleanup;
576

577 578 579
    ret = 0;
cleanup:
    VIR_FREE(pidfile);
580
    virCommandFree(cmd);
581 582 583 584
    return ret;
}

static int
585
networkAddMasqueradingIptablesRules(struct network_driver *driver,
586 587 588 589
                                      virNetworkObjPtr network,
                                      virNetworkIpDefPtr ipdef)
{
    int prefix = virNetworkIpDefPrefix(ipdef);
590 591 592 593 594 595 596

    if (prefix < 0) {
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Invalid prefix or netmask for '%s'"),
                           network->def->bridge);
        goto masqerr1;
    }
597

598
    /* allow forwarding packets from the bridge interface */
599
    if (iptablesAddForwardAllowOut(driver->iptables,
600
                                   &ipdef->address,
601
                                   prefix,
602 603 604 605 606
                                   network->def->bridge,
                                   network->def->forwardDev) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow forwarding from '%s'"),
                           network->def->bridge);
607 608 609 610
        goto masqerr1;
    }

    /* allow forwarding packets to the bridge interface if they are part of an existing connection */
611
    if (iptablesAddForwardAllowRelatedIn(driver->iptables,
612
                                         &ipdef->address,
613
                                         prefix,
614 615 616 617 618
                                         network->def->bridge,
                                         network->def->forwardDev) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow forwarding to '%s'"),
                           network->def->bridge);
619 620 621
        goto masqerr2;
    }

622 623 624 625 626
    /*
     * Enable masquerading.
     *
     * We need to end up with 3 rules in the table in this order
     *
E
Eric Blake 已提交
627 628
     *  1. protocol=tcp with sport mapping restriction
     *  2. protocol=udp with sport mapping restriction
629 630 631
     *  3. generic any protocol
     *
     * The sport mappings are required, because default IPtables
E
Eric Blake 已提交
632
     * MASQUERADE maintain port numbers unchanged where possible.
633 634 635 636 637 638 639 640 641 642 643 644 645
     *
     * NFS can be configured to only "trust" port numbers < 1023.
     *
     * Guests using NAT thus need to be prevented from having port
     * numbers < 1023, otherwise they can bypass the NFS "security"
     * check on the source port number.
     *
     * Since we use '--insert' to add rules to the header of the
     * chain, we actually need to add them in the reverse of the
     * order just mentioned !
     */

    /* First the generic masquerade rule for other protocols */
646
    if (iptablesAddForwardMasquerade(driver->iptables,
647
                                     &ipdef->address,
648
                                     prefix,
649 650 651 652 653
                                     network->def->forwardDev,
                                     NULL) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to enable masquerading to '%s'"),
                           network->def->forwardDev ? network->def->forwardDev : NULL);
654 655 656
        goto masqerr3;
    }

657
    /* UDP with a source port restriction */
658
    if (iptablesAddForwardMasquerade(driver->iptables,
659
                                     &ipdef->address,
660
                                     prefix,
661 662 663 664 665
                                     network->def->forwardDev,
                                     "udp") < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to enable UDP masquerading to '%s'"),
                           network->def->forwardDev ? network->def->forwardDev : NULL);
666 667 668 669
        goto masqerr4;
    }

    /* TCP with a source port restriction */
670
    if (iptablesAddForwardMasquerade(driver->iptables,
671
                                     &ipdef->address,
672
                                     prefix,
673 674 675 676 677
                                     network->def->forwardDev,
                                     "tcp") < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to enable TCP masquerading to '%s'"),
                           network->def->forwardDev ? network->def->forwardDev : NULL);
678 679 680
        goto masqerr5;
    }

681
    return 0;
682

683 684
 masqerr5:
    iptablesRemoveForwardMasquerade(driver->iptables,
685
                                    &ipdef->address,
686
                                    prefix,
687 688 689 690
                                    network->def->forwardDev,
                                    "udp");
 masqerr4:
    iptablesRemoveForwardMasquerade(driver->iptables,
691
                                    &ipdef->address,
692
                                    prefix,
693 694
                                    network->def->forwardDev,
                                    NULL);
695 696
 masqerr3:
    iptablesRemoveForwardAllowRelatedIn(driver->iptables,
697
                                        &ipdef->address,
698
                                        prefix,
699 700
                                        network->def->bridge,
                                        network->def->forwardDev);
701 702
 masqerr2:
    iptablesRemoveForwardAllowOut(driver->iptables,
703
                                  &ipdef->address,
704
                                  prefix,
705 706 707
                                  network->def->bridge,
                                  network->def->forwardDev);
 masqerr1:
708
    return -1;
709 710 711
}

static int
712
networkAddRoutingIptablesRules(struct network_driver *driver,
713 714 715
                               virNetworkObjPtr network,
                               virNetworkIpDefPtr ipdef) {
    int prefix = virNetworkIpDefPrefix(ipdef);
716 717 718 719 720 721 722

    if (prefix < 0) {
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Invalid prefix or netmask for '%s'"),
                           network->def->bridge);
        goto routeerr1;
    }
723

724
    /* allow routing packets from the bridge interface */
725
    if (iptablesAddForwardAllowOut(driver->iptables,
726
                                   &ipdef->address,
727
                                   prefix,
728 729 730 731 732
                                   network->def->bridge,
                                   network->def->forwardDev) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow routing from '%s'"),
                           network->def->bridge);
733 734 735 736
        goto routeerr1;
    }

    /* allow routing packets to the bridge interface */
737
    if (iptablesAddForwardAllowIn(driver->iptables,
738
                                  &ipdef->address,
739
                                  prefix,
740 741 742 743 744
                                  network->def->bridge,
                                  network->def->forwardDev) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow routing to '%s'"),
                           network->def->bridge);
745 746 747
        goto routeerr2;
    }

748
    return 0;
749 750 751 752


 routeerr2:
    iptablesRemoveForwardAllowOut(driver->iptables,
753
                                  &ipdef->address,
754
                                  prefix,
755 756 757
                                  network->def->bridge,
                                  network->def->forwardDev);
 routeerr1:
758
    return -1;
759 760 761
}

static int
762
networkAddIptablesRules(struct network_driver *driver,
763 764
                        virNetworkObjPtr network,
                        virNetworkIpDefPtr ipdef) {
765 766

    /* allow DHCP requests through to dnsmasq */
767 768 769 770
    if (iptablesAddTcpInput(driver->iptables, network->def->bridge, 67) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow DHCP requests from '%s'"),
                           network->def->bridge);
771 772 773
        goto err1;
    }

774 775 776 777
    if (iptablesAddUdpInput(driver->iptables, network->def->bridge, 67) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow DHCP requests from '%s'"),
                           network->def->bridge);
778 779 780 781
        goto err2;
    }

    /* allow DNS requests through to dnsmasq */
782 783 784 785
    if (iptablesAddTcpInput(driver->iptables, network->def->bridge, 53) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow DNS requests from '%s'"),
                           network->def->bridge);
786 787 788
        goto err3;
    }

789 790 791 792
    if (iptablesAddUdpInput(driver->iptables, network->def->bridge, 53) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow DNS requests from '%s'"),
                           network->def->bridge);
793 794 795
        goto err4;
    }

796
    /* allow TFTP requests through to dnsmasq */
797
    if (ipdef && ipdef->tftproot &&
798 799 800 801
        iptablesAddUdpInput(driver->iptables, network->def->bridge, 69) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow TFTP requests from '%s'"),
                           network->def->bridge);
802 803 804
        goto err4tftp;
    }

805 806 807

    /* Catch all rules to block forwarding to/from bridges */

808 809 810 811
    if (iptablesAddForwardRejectOut(driver->iptables, network->def->bridge) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to block outbound traffic from '%s'"),
                           network->def->bridge);
812 813 814
        goto err5;
    }

815 816 817 818
    if (iptablesAddForwardRejectIn(driver->iptables, network->def->bridge) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to block inbound traffic to '%s'"),
                           network->def->bridge);
819 820 821 822
        goto err6;
    }

    /* Allow traffic between guests on the same bridge */
823 824 825 826
    if (iptablesAddForwardAllowCross(driver->iptables, network->def->bridge) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow cross bridge traffic on '%s'"),
                           network->def->bridge);
827 828 829
        goto err7;
    }

830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853
    if (ipdef) {
        /* If masquerading is enabled, set up the rules*/
        if (network->def->forwardType == VIR_NETWORK_FORWARD_NAT &&
            networkAddMasqueradingIptablesRules(driver, network, ipdef) < 0)
            goto err8;
        /* else if routing is enabled, set up the rules*/
        else if (network->def->forwardType == VIR_NETWORK_FORWARD_ROUTE &&
                 networkAddRoutingIptablesRules(driver, network, ipdef) < 0)
            goto err8;

        /* If we are doing local DHCP service on this network, attempt to
         * add a rule that will fixup the checksum of DHCP response
         * packets back to the guests (but report failure without
         * aborting, since not all iptables implementations support it).
         */

        if (ipdef && (VIR_SOCKET_IS_FAMILY(&ipdef->address, AF_INET) ||
                      ipdef->nranges) &&
            (iptablesAddOutputFixUdpChecksum(driver->iptables,
                                             network->def->bridge, 68) < 0)) {
            VIR_WARN("Could not add rule to fixup DHCP response checksums "
                     "on network '%s'.", network->def->name);
            VIR_WARN0("May need to update iptables package & kernel to support CHECKSUM rule.");
        }
854 855
    }

856
    return 0;
857 858 859 860 861 862 863 864 865 866 867

 err8:
    iptablesRemoveForwardAllowCross(driver->iptables,
                                    network->def->bridge);
 err7:
    iptablesRemoveForwardRejectIn(driver->iptables,
                                  network->def->bridge);
 err6:
    iptablesRemoveForwardRejectOut(driver->iptables,
                                   network->def->bridge);
 err5:
868
    if (ipdef && ipdef->tftproot) {
869 870 871
        iptablesRemoveUdpInput(driver->iptables, network->def->bridge, 69);
    }
 err4tftp:
872 873 874 875 876 877 878 879
    iptablesRemoveUdpInput(driver->iptables, network->def->bridge, 53);
 err4:
    iptablesRemoveTcpInput(driver->iptables, network->def->bridge, 53);
 err3:
    iptablesRemoveUdpInput(driver->iptables, network->def->bridge, 67);
 err2:
    iptablesRemoveTcpInput(driver->iptables, network->def->bridge, 67);
 err1:
880
    return -1;
881 882 883 884
}

static void
networkRemoveIptablesRules(struct network_driver *driver,
885 886 887 888 889
                           virNetworkObjPtr network,
                           virNetworkIpDefPtr ipdef) {

    if (ipdef && (VIR_SOCKET_HAS_ADDR(&ipdef->address) ||
                  ipdef->nranges)) {
890 891 892
        iptablesRemoveOutputFixUdpChecksum(driver->iptables,
                                           network->def->bridge, 68);
    }
893 894
    if (ipdef && network->def->forwardType != VIR_NETWORK_FORWARD_NONE) {
        int prefix = virNetworkIpDefPrefix(ipdef);
895 896 897 898 899 900 901 902

        if (prefix < 0) {
            networkReportError(VIR_ERR_INTERNAL_ERROR,
                               _("Invalid prefix or netmask for '%s'"),
                               network->def->bridge);
            goto error;
        }

903 904
        if (network->def->forwardType == VIR_NETWORK_FORWARD_NAT) {
            iptablesRemoveForwardMasquerade(driver->iptables,
905
                                            &ipdef->address,
906
                                            prefix,
907 908 909
                                            network->def->forwardDev,
                                            "tcp");
            iptablesRemoveForwardMasquerade(driver->iptables,
910
                                            &ipdef->address,
911
                                            prefix,
912 913 914
                                            network->def->forwardDev,
                                            "udp");
            iptablesRemoveForwardMasquerade(driver->iptables,
915
                                            &ipdef->address,
916
                                            prefix,
917 918
                                            network->def->forwardDev,
                                            NULL);
919
            iptablesRemoveForwardAllowRelatedIn(driver->iptables,
920
                                                &ipdef->address,
921
                                                prefix,
922 923
                                                network->def->bridge,
                                                network->def->forwardDev);
924
        } else if (network->def->forwardType == VIR_NETWORK_FORWARD_ROUTE) {
925
            iptablesRemoveForwardAllowIn(driver->iptables,
926
                                         &ipdef->address,
927
                                         prefix,
928 929
                                         network->def->bridge,
                                         network->def->forwardDev);
930
        }
931 932

        iptablesRemoveForwardAllowOut(driver->iptables,
933
                                      &ipdef->address,
934
                                      prefix,
935 936 937
                                      network->def->bridge,
                                      network->def->forwardDev);
    }
938
error:
939 940 941
    iptablesRemoveForwardAllowCross(driver->iptables, network->def->bridge);
    iptablesRemoveForwardRejectIn(driver->iptables, network->def->bridge);
    iptablesRemoveForwardRejectOut(driver->iptables, network->def->bridge);
942
    if (ipdef && ipdef->tftproot)
943
        iptablesRemoveUdpInput(driver->iptables, network->def->bridge, 69);
944 945 946 947 948 949
    iptablesRemoveUdpInput(driver->iptables, network->def->bridge, 53);
    iptablesRemoveTcpInput(driver->iptables, network->def->bridge, 53);
    iptablesRemoveUdpInput(driver->iptables, network->def->bridge, 67);
    iptablesRemoveTcpInput(driver->iptables, network->def->bridge, 67);
}

950 951 952 953 954 955 956 957 958 959 960
static void
networkReloadIptablesRules(struct network_driver *driver)
{
    unsigned int i;

    VIR_INFO0(_("Reloading iptables rules"));

    for (i = 0 ; i < driver->networks.count ; i++) {
        virNetworkObjLock(driver->networks.objs[i]);

        if (virNetworkObjIsActive(driver->networks.objs[i])) {
961 962 963 964 965 966 967 968 969 970 971 972
           virNetworkIpDefPtr ipv4def;

           /* Find the one allowed IPv4 ip address in the definition */
           /* Even if none is found, we still call the functions below */
           ipv4def = virNetworkDefGetIpByIndex(driver->networks.objs[i]->def,
                                               AF_INET, 0);
           networkRemoveIptablesRules(driver, driver->networks.objs[i],
                                      ipv4def);
           if (networkAddIptablesRules(driver, driver->networks.objs[i],
                                       ipv4def) < 0) {
               /* failed to add but already logged */
           }
973 974 975 976 977 978
        }

        virNetworkObjUnlock(driver->networks.objs[i]);
    }
}

979
/* Enable IP Forwarding. Return 0 for success, -1 for failure. */
980 981 982
static int
networkEnableIpForwarding(void)
{
983
    return virFileWriteStr("/proc/sys/net/ipv4/ip_forward", "1\n", 0);
984 985
}

986 987
#define SYSCTL_PATH "/proc/sys"

988
static int networkDisableIPV6(virNetworkObjPtr network)
989 990 991 992 993
{
    char *field = NULL;
    int ret = -1;

    if (virAsprintf(&field, SYSCTL_PATH "/net/ipv6/conf/%s/disable_ipv6", network->def->bridge) < 0) {
994
        virReportOOMError();
995 996 997
        goto cleanup;
    }

998 999 1000 1001 1002 1003
    if (access(field, W_OK) < 0 && errno == ENOENT) {
        VIR_DEBUG("ipv6 appears to already be disabled on %s", network->def->bridge);
        ret = 0;
        goto cleanup;
    }

1004
    if (virFileWriteStr(field, "1", 0) < 0) {
1005
        virReportSystemError(errno,
1006 1007 1008 1009 1010 1011
                             _("cannot enable %s"), field);
        goto cleanup;
    }
    VIR_FREE(field);

    if (virAsprintf(&field, SYSCTL_PATH "/net/ipv6/conf/%s/accept_ra", network->def->bridge) < 0) {
1012
        virReportOOMError();
1013 1014 1015
        goto cleanup;
    }

1016
    if (virFileWriteStr(field, "0", 0) < 0) {
1017
        virReportSystemError(errno,
1018 1019 1020 1021 1022 1023
                             _("cannot disable %s"), field);
        goto cleanup;
    }
    VIR_FREE(field);

    if (virAsprintf(&field, SYSCTL_PATH "/net/ipv6/conf/%s/autoconf", network->def->bridge) < 0) {
1024
        virReportOOMError();
1025 1026 1027
        goto cleanup;
    }

1028
    if (virFileWriteStr(field, "1", 0) < 0) {
1029
        virReportSystemError(errno,
1030 1031 1032 1033 1034 1035 1036 1037 1038 1039
                             _("cannot enable %s"), field);
        goto cleanup;
    }

    ret = 0;
cleanup:
    VIR_FREE(field);
    return ret;
}

1040 1041 1042 1043 1044 1045
#define PROC_NET_ROUTE "/proc/net/route"

/* XXX: This function can be a lot more exhaustive, there are certainly
 *      other scenarios where we can ruin host network connectivity.
 * XXX: Using a proper library is preferred over parsing /proc
 */
1046 1047
static int networkCheckRouteCollision(virNetworkObjPtr network,
                                      virNetworkIpDefPtr ipdef)
1048 1049 1050
{
    int ret = -1, len;
    unsigned int net_dest;
1051
    virSocketAddr netmask;
1052 1053 1054
    char *cur, *buf = NULL;
    enum {MAX_ROUTE_SIZE = 1024*64};

1055
    if (!VIR_SOCKET_IS_FAMILY(&ipdef->address, AF_INET)) {
1056
        /* Only support collision check for IPv4 */
1057
        return 0;
1058 1059
    }

1060
    if (virNetworkIpDefNetmask(ipdef, &netmask) < 0) {
1061 1062 1063 1064 1065
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Failed to get netmask of '%s'"),
                           network->def->bridge);
    }

1066
    net_dest = (ipdef->address.data.inet4.sin_addr.s_addr &
1067
                netmask.data.inet4.sin_addr.s_addr);
1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119

    /* Read whole routing table into memory */
    if ((len = virFileReadAll(PROC_NET_ROUTE, MAX_ROUTE_SIZE, &buf)) < 0)
        goto error;

    /* Dropping the last character shouldn't hurt */
    if (len > 0)
        buf[len-1] = '\0';

    VIR_DEBUG("%s output:\n%s", PROC_NET_ROUTE, buf);

    if (!STRPREFIX (buf, "Iface"))
        goto out;

    /* First line is just headings, skip it */
    cur = strchr(buf, '\n');
    if (cur)
        cur++;

    while (cur) {
        char iface[17], dest[128], mask[128];
        unsigned int addr_val, mask_val;
        int num;

        /* NUL-terminate the line, so sscanf doesn't go beyond a newline.  */
        char *nl = strchr(cur, '\n');
        if (nl) {
            *nl++ = '\0';
        }

        num = sscanf(cur, "%16s %127s %*s %*s %*s %*s %*s %127s",
                     iface, dest, mask);
        cur = nl;

        if (num != 3) {
            VIR_DEBUG("Failed to parse %s", PROC_NET_ROUTE);
            continue;
        }

        if (virStrToLong_ui(dest, NULL, 16, &addr_val) < 0) {
            VIR_DEBUG("Failed to convert network address %s to uint", dest);
            continue;
        }

        if (virStrToLong_ui(mask, NULL, 16, &mask_val) < 0) {
            VIR_DEBUG("Failed to convert network mask %s to uint", mask);
            continue;
        }

        addr_val &= mask_val;

        if ((net_dest == addr_val) &&
1120
            (netmask.data.inet4.sin_addr.s_addr == mask_val)) {
1121
            networkReportError(VIR_ERR_INTERNAL_ERROR,
1122 1123
                               _("Network is already in use by interface %s"),
                               iface);
1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134
            goto error;
        }
    }

out:
    ret = 0;
error:
    VIR_FREE(buf);
    return ret;
}

1135 1136 1137
static int networkStartNetworkDaemon(struct network_driver *driver,
                                     virNetworkObjPtr network)
{
1138
    int err;
1139
    virErrorPtr save_err;
1140
    virNetworkIpDefPtr ipv4def;
1141

D
Daniel P. Berrange 已提交
1142
    if (virNetworkObjIsActive(network)) {
1143 1144
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           "%s", _("network is already active"));
1145 1146 1147
        return -1;
    }

1148 1149 1150
    /* find the one allowed IPv4 ip address in the definition */
    ipv4def = virNetworkDefGetIpByIndex(network->def, AF_INET, 0);

1151
    /* Check to see if network collides with an existing route */
1152
    if (ipv4def && networkCheckRouteCollision(network, ipv4def) < 0)
1153 1154
        return -1;

1155
    if ((err = brAddBridge(driver->brctl, network->def->bridge))) {
1156
        virReportSystemError(err,
1157 1158
                             _("cannot create bridge '%s'"),
                             network->def->bridge);
1159 1160 1161
        return -1;
    }

1162
    if (networkDisableIPV6(network) < 0)
1163 1164
        goto err_delbr;

1165 1166 1167 1168 1169
    if ((err = brSetForwardDelay(driver->brctl, network->def->bridge,
                                 network->def->delay))) {
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           _("cannot set forward delay on bridge '%s'"),
                           network->def->bridge);
1170 1171 1172
        goto err_delbr;
    }

1173 1174
    if ((err = brSetEnableSTP(driver->brctl, network->def->bridge,
                              network->def->stp ? 1 : 0))) {
1175
        networkReportError(VIR_ERR_INTERNAL_ERROR,
1176 1177
                           _("cannot set STP '%s' on bridge '%s'"),
                           network->def->stp ? "on" : "off", network->def->bridge);
1178 1179 1180
        goto err_delbr;
    }

1181 1182
    if (ipv4def) {
        int prefix = virNetworkIpDefPrefix(ipv4def);
1183 1184 1185 1186 1187 1188 1189 1190 1191

        if (prefix < 0) {
            networkReportError(VIR_ERR_INTERNAL_ERROR,
                               _("bridge '%s' has an invalid netmask or IP address"),
                               network->def->bridge);
            goto err_delbr;
        }

        if ((err = brAddInetAddress(driver->brctl, network->def->bridge,
1192
                                    &ipv4def->address, prefix))) {
1193 1194 1195 1196 1197
            networkReportError(VIR_ERR_INTERNAL_ERROR,
                               _("cannot set IP address on bridge '%s'"),
                               network->def->bridge);
            goto err_delbr;
        }
1198 1199
    }

1200
    if ((err = brSetInterfaceUp(driver->brctl, network->def->bridge, 1))) {
1201
        virReportSystemError(err,
1202 1203
                             _("failed to bring the bridge '%s' up"),
                             network->def->bridge);
1204 1205 1206
        goto err_delbr;
    }

1207
    if (ipv4def && networkAddIptablesRules(driver, network, ipv4def) < 0)
1208 1209 1210
        goto err_delbr1;

    if (network->def->forwardType != VIR_NETWORK_FORWARD_NONE &&
1211
        networkEnableIpForwarding() < 0) {
1212
        virReportSystemError(errno, "%s",
1213
                             _("failed to enable IP forwarding"));
1214 1215 1216
        goto err_delbr2;
    }

1217 1218 1219 1220 1221
    /*
     * Start the dhcp daemon for the 1st (and only supported) ipv4
     * address.
     */
    if (ipv4def && dhcpStartDhcpDaemon(network, ipv4def) < 0)
1222 1223
        goto err_delbr2;

1224
    /* Persist the live configuration now we have bridge info  */
1225
    if (virNetworkSaveConfig(NETWORK_STATE_DIR, network->def) < 0) {
1226 1227 1228
        goto err_kill;
    }

1229 1230 1231 1232
    network->active = 1;

    return 0;

1233 1234 1235 1236 1237 1238
 err_kill:
    if (network->dnsmasqPid > 0) {
        kill(network->dnsmasqPid, SIGTERM);
        network->dnsmasqPid = -1;
    }

1239
 err_delbr2:
1240
    save_err = virSaveLastError();
1241 1242
    if (ipv4def)
        networkRemoveIptablesRules(driver, network, ipv4def);
1243 1244 1245 1246
    if (save_err) {
        virSetError(save_err);
        virFreeError(save_err);
    }
1247 1248

 err_delbr1:
1249
    if ((err = brSetInterfaceUp(driver->brctl, network->def->bridge, 0))) {
1250
        char ebuf[1024];
1251
        VIR_WARN("Failed to bring down bridge '%s' : %s",
1252
                 network->def->bridge, virStrerror(err, ebuf, sizeof ebuf));
1253 1254 1255 1256
    }

 err_delbr:
    if ((err = brDeleteBridge(driver->brctl, network->def->bridge))) {
1257
        char ebuf[1024];
1258
        VIR_WARN("Failed to delete bridge '%s' : %s",
1259
                 network->def->bridge, virStrerror(err, ebuf, sizeof ebuf));
1260 1261 1262 1263 1264 1265
    }

    return -1;
}


1266 1267 1268
static int networkShutdownNetworkDaemon(struct network_driver *driver,
                                        virNetworkObjPtr network)
{
1269
    int err;
1270
    char *stateFile;
1271
    virNetworkIpDefPtr ipv4def;
1272

1273
    VIR_INFO(_("Shutting down network '%s'"), network->def->name);
1274

D
Daniel P. Berrange 已提交
1275
    if (!virNetworkObjIsActive(network))
1276 1277
        return 0;

1278
    stateFile = virNetworkConfigFile(NETWORK_STATE_DIR, network->def->name);
1279 1280 1281 1282 1283 1284
    if (!stateFile)
        return -1;

    unlink(stateFile);
    VIR_FREE(stateFile);

1285 1286 1287
    if (network->dnsmasqPid > 0)
        kill(network->dnsmasqPid, SIGTERM);

1288 1289 1290 1291
    /* find the one allowed IPv4 ip address in the definition */
    ipv4def = virNetworkDefGetIpByIndex(network->def, AF_INET, 0);
    if (ipv4def)
        networkRemoveIptablesRules(driver, network, ipv4def);
1292

1293
    char ebuf[1024];
1294
    if ((err = brSetInterfaceUp(driver->brctl, network->def->bridge, 0))) {
1295
        VIR_WARN("Failed to bring down bridge '%s' : %s",
1296
                 network->def->bridge, virStrerror(err, ebuf, sizeof ebuf));
1297 1298 1299
    }

    if ((err = brDeleteBridge(driver->brctl, network->def->bridge))) {
1300
        VIR_WARN("Failed to delete bridge '%s' : %s",
1301
                 network->def->bridge, virStrerror(err, ebuf, sizeof ebuf));
1302 1303
    }

1304
    /* See if its still alive and really really kill it */
1305
    if (network->dnsmasqPid > 0 &&
1306
        (kill(network->dnsmasqPid, 0) == 0))
1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321
        kill(network->dnsmasqPid, SIGKILL);

    network->dnsmasqPid = -1;
    network->active = 0;

    if (network->newDef) {
        virNetworkDefFree(network->def);
        network->def = network->newDef;
        network->newDef = NULL;
    }

    return 0;
}


1322 1323 1324 1325 1326
static virNetworkPtr networkLookupByUUID(virConnectPtr conn,
                                         const unsigned char *uuid) {
    struct network_driver *driver = conn->networkPrivateData;
    virNetworkObjPtr network;
    virNetworkPtr ret = NULL;
1327

1328
    networkDriverLock(driver);
1329
    network = virNetworkFindByUUID(&driver->networks, uuid);
1330
    networkDriverUnlock(driver);
1331
    if (!network) {
1332 1333
        networkReportError(VIR_ERR_NO_NETWORK,
                           "%s", _("no network with matching uuid"));
1334
        goto cleanup;
1335 1336
    }

1337 1338 1339
    ret = virGetNetwork(conn, network->def->name, network->def->uuid);

cleanup:
1340 1341
    if (network)
        virNetworkObjUnlock(network);
1342
    return ret;
1343 1344
}

1345 1346 1347 1348 1349 1350
static virNetworkPtr networkLookupByName(virConnectPtr conn,
                                         const char *name) {
    struct network_driver *driver = conn->networkPrivateData;
    virNetworkObjPtr network;
    virNetworkPtr ret = NULL;

1351
    networkDriverLock(driver);
1352
    network = virNetworkFindByName(&driver->networks, name);
1353
    networkDriverUnlock(driver);
1354
    if (!network) {
1355 1356
        networkReportError(VIR_ERR_NO_NETWORK,
                           _("no network with matching name '%s'"), name);
1357
        goto cleanup;
1358 1359
    }

1360 1361 1362
    ret = virGetNetwork(conn, network->def->name, network->def->uuid);

cleanup:
1363 1364
    if (network)
        virNetworkObjUnlock(network);
1365
    return ret;
1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383
}

static virDrvOpenStatus networkOpenNetwork(virConnectPtr conn,
                                           virConnectAuthPtr auth ATTRIBUTE_UNUSED,
                                           int flags ATTRIBUTE_UNUSED) {
    if (!driverState)
        return VIR_DRV_OPEN_DECLINED;

    conn->networkPrivateData = driverState;
    return VIR_DRV_OPEN_SUCCESS;
}

static int networkCloseNetwork(virConnectPtr conn) {
    conn->networkPrivateData = NULL;
    return 0;
}

static int networkNumNetworks(virConnectPtr conn) {
1384
    int nactive = 0, i;
1385
    struct network_driver *driver = conn->networkPrivateData;
1386

1387 1388 1389
    networkDriverLock(driver);
    for (i = 0 ; i < driver->networks.count ; i++) {
        virNetworkObjLock(driver->networks.objs[i]);
D
Daniel P. Berrange 已提交
1390
        if (virNetworkObjIsActive(driver->networks.objs[i]))
1391
            nactive++;
1392 1393 1394
        virNetworkObjUnlock(driver->networks.objs[i]);
    }
    networkDriverUnlock(driver);
1395

1396 1397 1398 1399
    return nactive;
}

static int networkListNetworks(virConnectPtr conn, char **const names, int nnames) {
1400
    struct network_driver *driver = conn->networkPrivateData;
1401
    int got = 0, i;
1402

1403
    networkDriverLock(driver);
1404
    for (i = 0 ; i < driver->networks.count && got < nnames ; i++) {
1405
        virNetworkObjLock(driver->networks.objs[i]);
D
Daniel P. Berrange 已提交
1406
        if (virNetworkObjIsActive(driver->networks.objs[i])) {
1407
            if (!(names[got] = strdup(driver->networks.objs[i]->def->name))) {
1408
                virNetworkObjUnlock(driver->networks.objs[i]);
1409
                virReportOOMError();
1410 1411 1412 1413
                goto cleanup;
            }
            got++;
        }
1414
        virNetworkObjUnlock(driver->networks.objs[i]);
1415
    }
1416 1417
    networkDriverUnlock(driver);

1418 1419 1420
    return got;

 cleanup:
1421
    networkDriverUnlock(driver);
1422 1423 1424 1425 1426 1427
    for (i = 0 ; i < got ; i++)
        VIR_FREE(names[i]);
    return -1;
}

static int networkNumDefinedNetworks(virConnectPtr conn) {
1428
    int ninactive = 0, i;
1429
    struct network_driver *driver = conn->networkPrivateData;
1430

1431 1432 1433
    networkDriverLock(driver);
    for (i = 0 ; i < driver->networks.count ; i++) {
        virNetworkObjLock(driver->networks.objs[i]);
D
Daniel P. Berrange 已提交
1434
        if (!virNetworkObjIsActive(driver->networks.objs[i]))
1435
            ninactive++;
1436 1437 1438
        virNetworkObjUnlock(driver->networks.objs[i]);
    }
    networkDriverUnlock(driver);
1439

1440 1441 1442 1443
    return ninactive;
}

static int networkListDefinedNetworks(virConnectPtr conn, char **const names, int nnames) {
1444
    struct network_driver *driver = conn->networkPrivateData;
1445
    int got = 0, i;
1446

1447
    networkDriverLock(driver);
1448
    for (i = 0 ; i < driver->networks.count && got < nnames ; i++) {
1449
        virNetworkObjLock(driver->networks.objs[i]);
D
Daniel P. Berrange 已提交
1450
        if (!virNetworkObjIsActive(driver->networks.objs[i])) {
1451
            if (!(names[got] = strdup(driver->networks.objs[i]->def->name))) {
1452
                virNetworkObjUnlock(driver->networks.objs[i]);
1453
                virReportOOMError();
1454 1455 1456 1457
                goto cleanup;
            }
            got++;
        }
1458
        virNetworkObjUnlock(driver->networks.objs[i]);
1459
    }
1460
    networkDriverUnlock(driver);
1461 1462 1463
    return got;

 cleanup:
1464
    networkDriverUnlock(driver);
1465 1466 1467 1468 1469
    for (i = 0 ; i < got ; i++)
        VIR_FREE(names[i]);
    return -1;
}

1470 1471 1472

static int networkIsActive(virNetworkPtr net)
{
1473
    struct network_driver *driver = net->conn->networkPrivateData;
1474 1475 1476 1477 1478 1479 1480
    virNetworkObjPtr obj;
    int ret = -1;

    networkDriverLock(driver);
    obj = virNetworkFindByUUID(&driver->networks, net->uuid);
    networkDriverUnlock(driver);
    if (!obj) {
1481
        networkReportError(VIR_ERR_NO_NETWORK, NULL);
1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493
        goto cleanup;
    }
    ret = virNetworkObjIsActive(obj);

cleanup:
    if (obj)
        virNetworkObjUnlock(obj);
    return ret;
}

static int networkIsPersistent(virNetworkPtr net)
{
1494
    struct network_driver *driver = net->conn->networkPrivateData;
1495 1496 1497 1498 1499 1500 1501
    virNetworkObjPtr obj;
    int ret = -1;

    networkDriverLock(driver);
    obj = virNetworkFindByUUID(&driver->networks, net->uuid);
    networkDriverUnlock(driver);
    if (!obj) {
1502
        networkReportError(VIR_ERR_NO_NETWORK, NULL);
1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513
        goto cleanup;
    }
    ret = obj->persistent;

cleanup:
    if (obj)
        virNetworkObjUnlock(obj);
    return ret;
}


1514
static virNetworkPtr networkCreate(virConnectPtr conn, const char *xml) {
1515
    struct network_driver *driver = conn->networkPrivateData;
1516
    virNetworkDefPtr def;
1517
    virNetworkObjPtr network = NULL;
1518
    virNetworkPtr ret = NULL;
1519

1520 1521
    networkDriverLock(driver);

1522
    if (!(def = virNetworkDefParseString(xml)))
1523
        goto cleanup;
1524

1525 1526 1527
    if (virNetworkObjIsDuplicate(&driver->networks, def, 1) < 0)
        goto cleanup;

1528
    if (virNetworkSetBridgeName(&driver->networks, def, 1))
1529 1530
        goto cleanup;

1531
    if (!(network = virNetworkAssignDef(&driver->networks,
1532 1533 1534
                                        def)))
        goto cleanup;
    def = NULL;
1535

1536
    if (networkStartNetworkDaemon(driver, network) < 0) {
1537 1538
        virNetworkRemoveInactive(&driver->networks,
                                 network);
1539
        network = NULL;
1540
        goto cleanup;
1541 1542
    }

1543 1544 1545 1546
    ret = virGetNetwork(conn, network->def->name, network->def->uuid);

cleanup:
    virNetworkDefFree(def);
1547 1548 1549
    if (network)
        virNetworkObjUnlock(network);
    networkDriverUnlock(driver);
1550
    return ret;
1551 1552 1553
}

static virNetworkPtr networkDefine(virConnectPtr conn, const char *xml) {
1554
    struct network_driver *driver = conn->networkPrivateData;
1555
    virNetworkIpDefPtr ipv4def;
1556
    virNetworkDefPtr def;
1557
    virNetworkObjPtr network = NULL;
1558
    virNetworkPtr ret = NULL;
1559

1560 1561
    networkDriverLock(driver);

1562
    if (!(def = virNetworkDefParseString(xml)))
1563
        goto cleanup;
1564

E
Eric Blake 已提交
1565
    if (virNetworkObjIsDuplicate(&driver->networks, def, 0) < 0)
1566 1567
        goto cleanup;

1568
    if (virNetworkSetBridgeName(&driver->networks, def, 1))
1569 1570
        goto cleanup;

1571
    if (!(network = virNetworkAssignDef(&driver->networks,
1572 1573 1574
                                        def)))
        goto cleanup;
    def = NULL;
1575

1576 1577
    network->persistent = 1;

1578
    if (virNetworkSaveConfig(driver->networkConfigDir,
1579
                             network->newDef ? network->newDef : network->def) < 0) {
1580 1581
        virNetworkRemoveInactive(&driver->networks,
                                 network);
1582
        network = NULL;
1583
        goto cleanup;
1584 1585
    }

1586 1587 1588 1589
    /* we only support dhcp on one IPv4 address per defined network */
    ipv4def = virNetworkDefGetIpByIndex(network->def, AF_INET, 0);

    if (ipv4def && ipv4def->nhosts > 0) {
1590 1591 1592 1593
        dnsmasqContext *dctx = dnsmasqContextNew(network->def->name, DNSMASQ_STATE_DIR);
        if (dctx == NULL)
            goto cleanup;

1594
        networkSaveDnsmasqHostsfile(ipv4def, dctx, true);
1595 1596 1597
        dnsmasqContextFree(dctx);
    }

1598 1599 1600 1601
    ret = virGetNetwork(conn, network->def->name, network->def->uuid);

cleanup:
    virNetworkDefFree(def);
1602 1603 1604
    if (network)
        virNetworkObjUnlock(network);
    networkDriverUnlock(driver);
1605
    return ret;
1606 1607 1608
}

static int networkUndefine(virNetworkPtr net) {
1609
    struct network_driver *driver = net->conn->networkPrivateData;
1610 1611
    virNetworkObjPtr network;
    virNetworkIpDefPtr ipv4def;
1612
    int ret = -1;
1613

1614 1615
    networkDriverLock(driver);

1616
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
1617
    if (!network) {
1618
        networkReportError(VIR_ERR_INVALID_NETWORK,
1619 1620
                           "%s", _("no network with matching uuid"));
        goto cleanup;
1621 1622
    }

D
Daniel P. Berrange 已提交
1623
    if (virNetworkObjIsActive(network)) {
1624
        networkReportError(VIR_ERR_INTERNAL_ERROR,
1625 1626
                           "%s", _("network is still active"));
        goto cleanup;
1627 1628
    }

1629
    if (virNetworkDeleteConfig(driver->networkConfigDir,
1630 1631
                               driver->networkAutostartDir,
                               network) < 0)
1632
        goto cleanup;
1633

1634 1635 1636 1637
    /* find the one allowed IPv4 ip address in the definition */
    ipv4def = virNetworkDefGetIpByIndex(network->def, AF_INET, 0);

    if (ipv4def && ipv4def->nhosts > 0) {
1638 1639 1640 1641 1642 1643 1644 1645
        dnsmasqContext *dctx = dnsmasqContextNew(network->def->name, DNSMASQ_STATE_DIR);
        if (dctx == NULL)
            goto cleanup;

        dnsmasqDelete(dctx);
        dnsmasqContextFree(dctx);
    }

1646 1647
    virNetworkRemoveInactive(&driver->networks,
                             network);
1648
    network = NULL;
1649
    ret = 0;
1650

1651
cleanup:
1652 1653 1654
    if (network)
        virNetworkObjUnlock(network);
    networkDriverUnlock(driver);
1655
    return ret;
1656 1657 1658
}

static int networkStart(virNetworkPtr net) {
1659 1660 1661
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    int ret = -1;
1662

1663
    networkDriverLock(driver);
1664
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
1665

1666
    if (!network) {
1667
        networkReportError(VIR_ERR_INVALID_NETWORK,
1668 1669
                           "%s", _("no network with matching uuid"));
        goto cleanup;
1670 1671
    }

1672
    ret = networkStartNetworkDaemon(driver, network);
1673 1674

cleanup:
1675 1676
    if (network)
        virNetworkObjUnlock(network);
1677
    networkDriverUnlock(driver);
1678
    return ret;
1679 1680 1681
}

static int networkDestroy(virNetworkPtr net) {
1682 1683 1684
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    int ret = -1;
1685

1686
    networkDriverLock(driver);
1687
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
1688

1689
    if (!network) {
1690
        networkReportError(VIR_ERR_INVALID_NETWORK,
1691 1692
                           "%s", _("no network with matching uuid"));
        goto cleanup;
1693 1694
    }

D
Daniel P. Berrange 已提交
1695
    if (!virNetworkObjIsActive(network)) {
1696
        networkReportError(VIR_ERR_INTERNAL_ERROR,
1697 1698 1699 1700
                           "%s", _("network is not active"));
        goto cleanup;
    }

1701
    ret = networkShutdownNetworkDaemon(driver, network);
1702
    if (!network->persistent) {
1703 1704 1705 1706
        virNetworkRemoveInactive(&driver->networks,
                                 network);
        network = NULL;
    }
1707

1708
cleanup:
1709 1710
    if (network)
        virNetworkObjUnlock(network);
1711
    networkDriverUnlock(driver);
1712 1713 1714 1715
    return ret;
}

static char *networkDumpXML(virNetworkPtr net, int flags ATTRIBUTE_UNUSED) {
1716 1717 1718
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    char *ret = NULL;
1719

1720
    networkDriverLock(driver);
1721
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
1722 1723
    networkDriverUnlock(driver);

1724
    if (!network) {
1725
        networkReportError(VIR_ERR_INVALID_NETWORK,
1726 1727
                           "%s", _("no network with matching uuid"));
        goto cleanup;
1728 1729
    }

1730
    ret = virNetworkDefFormat(network->def);
1731 1732

cleanup:
1733 1734
    if (network)
        virNetworkObjUnlock(network);
1735
    return ret;
1736 1737 1738
}

static char *networkGetBridgeName(virNetworkPtr net) {
1739 1740 1741 1742
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    char *bridge = NULL;

1743
    networkDriverLock(driver);
1744
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
1745 1746
    networkDriverUnlock(driver);

1747
    if (!network) {
1748
        networkReportError(VIR_ERR_INVALID_NETWORK,
1749 1750
                           "%s", _("no network with matching id"));
        goto cleanup;
1751 1752
    }

1753
    if (!(network->def->bridge)) {
1754
        networkReportError(VIR_ERR_INTERNAL_ERROR,
1755 1756 1757 1758 1759
                           _("network '%s' does not have a bridge name."),
                           network->def->name);
        goto cleanup;
    }

1760
    bridge = strdup(network->def->bridge);
1761
    if (!bridge)
1762
        virReportOOMError();
1763 1764

cleanup:
1765 1766
    if (network)
        virNetworkObjUnlock(network);
1767 1768 1769 1770 1771
    return bridge;
}

static int networkGetAutostart(virNetworkPtr net,
                             int *autostart) {
1772 1773 1774
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    int ret = -1;
1775

1776
    networkDriverLock(driver);
1777
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
1778
    networkDriverUnlock(driver);
1779
    if (!network) {
1780 1781
        networkReportError(VIR_ERR_INVALID_NETWORK,
                           "%s", _("no network with matching uuid"));
1782
        goto cleanup;
1783 1784 1785
    }

    *autostart = network->autostart;
1786
    ret = 0;
1787

1788
cleanup:
1789 1790
    if (network)
        virNetworkObjUnlock(network);
1791
    return ret;
1792 1793 1794
}

static int networkSetAutostart(virNetworkPtr net,
1795
                               int autostart) {
1796 1797
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
1798
    char *configFile = NULL, *autostartLink = NULL;
1799
    int ret = -1;
1800

1801
    networkDriverLock(driver);
1802
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
1803

1804
    if (!network) {
1805 1806
        networkReportError(VIR_ERR_INVALID_NETWORK,
                           "%s", _("no network with matching uuid"));
1807
        goto cleanup;
1808 1809
    }

1810
    if (!network->persistent) {
1811 1812
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           "%s", _("cannot set autostart for transient network"));
1813 1814 1815
        goto cleanup;
    }

1816 1817
    autostart = (autostart != 0);

1818
    if (network->autostart != autostart) {
1819
        if ((configFile = virNetworkConfigFile(driver->networkConfigDir, network->def->name)) == NULL)
1820
            goto cleanup;
1821
        if ((autostartLink = virNetworkConfigFile(driver->networkAutostartDir, network->def->name)) == NULL)
1822 1823
            goto cleanup;

1824
        if (autostart) {
1825
            if (virFileMakePath(driver->networkAutostartDir)) {
1826
                virReportSystemError(errno,
1827 1828
                                     _("cannot create autostart directory '%s'"),
                                     driver->networkAutostartDir);
1829 1830
                goto cleanup;
            }
1831

1832
            if (symlink(configFile, autostartLink) < 0) {
1833
                virReportSystemError(errno,
1834
                                     _("Failed to create symlink '%s' to '%s'"),
1835
                                     autostartLink, configFile);
1836 1837 1838
                goto cleanup;
            }
        } else {
1839
            if (unlink(autostartLink) < 0 && errno != ENOENT && errno != ENOTDIR) {
1840
                virReportSystemError(errno,
1841
                                     _("Failed to delete symlink '%s'"),
1842
                                     autostartLink);
1843 1844
                goto cleanup;
            }
1845 1846
        }

1847
        network->autostart = autostart;
1848
    }
1849
    ret = 0;
1850

1851
cleanup:
1852 1853
    VIR_FREE(configFile);
    VIR_FREE(autostartLink);
1854 1855
    if (network)
        virNetworkObjUnlock(network);
1856
    networkDriverUnlock(driver);
1857
    return ret;
1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879
}


static virNetworkDriver networkDriver = {
    "Network",
    networkOpenNetwork, /* open */
    networkCloseNetwork, /* close */
    networkNumNetworks, /* numOfNetworks */
    networkListNetworks, /* listNetworks */
    networkNumDefinedNetworks, /* numOfDefinedNetworks */
    networkListDefinedNetworks, /* listDefinedNetworks */
    networkLookupByUUID, /* networkLookupByUUID */
    networkLookupByName, /* networkLookupByName */
    networkCreate, /* networkCreateXML */
    networkDefine, /* networkDefineXML */
    networkUndefine, /* networkUndefine */
    networkStart, /* networkCreate */
    networkDestroy, /* networkDestroy */
    networkDumpXML, /* networkDumpXML */
    networkGetBridgeName, /* networkGetBridgeName */
    networkGetAutostart, /* networkGetAutostart */
    networkSetAutostart, /* networkSetAutostart */
1880 1881
    networkIsActive,
    networkIsPersistent,
1882 1883 1884
};

static virStateDriver networkStateDriver = {
1885
    "Network",
1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896
    networkStartup,
    networkShutdown,
    networkReload,
    networkActive,
};

int networkRegister(void) {
    virRegisterNetworkDriver(&networkDriver);
    virRegisterStateDriver(&networkStateDriver);
    return 0;
}