bridge_driver.c 78.8 KB
Newer Older
1
/*
2
 * bridge_driver.c: core driver methods for managing network
3
 *
E
Eric Blake 已提交
4
 * Copyright (C) 2006-2011 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45
 * Copyright (C) 2006 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this library; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307  USA
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 */

#include <config.h>

#include <sys/types.h>
#include <sys/poll.h>
#include <dirent.h>
#include <limits.h>
#include <string.h>
#include <stdio.h>
#include <stdarg.h>
#include <stdlib.h>
#include <unistd.h>
#include <errno.h>
#include <sys/utsname.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <signal.h>
#include <paths.h>
#include <pwd.h>
#include <stdio.h>
#include <sys/wait.h>
#include <sys/ioctl.h>

46
#include "virterror_internal.h"
47
#include "datatypes.h"
48
#include "bridge_driver.h"
49 50 51 52 53
#include "network_conf.h"
#include "driver.h"
#include "event.h"
#include "buf.h"
#include "util.h"
54
#include "command.h"
55 56 57 58
#include "memory.h"
#include "uuid.h"
#include "iptables.h"
#include "bridge.h"
59
#include "logging.h"
60
#include "dnsmasq.h"
61
#include "util/network.h"
62
#include "configmake.h"
63

64 65
#define NETWORK_PID_DIR LOCALSTATEDIR "/run/libvirt/network"
#define NETWORK_STATE_DIR LOCALSTATEDIR "/lib/libvirt/network"
66

67
#define DNSMASQ_STATE_DIR LOCALSTATEDIR "/lib/libvirt/dnsmasq"
68
#define RADVD_STATE_DIR LOCALSTATEDIR "/lib/libvirt/radvd"
69

70 71
#define VIR_FROM_THIS VIR_FROM_NETWORK

72
#define networkReportError(code, ...)                                   \
73
    virReportErrorHelper(NULL, VIR_FROM_NETWORK, code, __FILE__,        \
74
                         __FUNCTION__, __LINE__, __VA_ARGS__)
75

76 77
/* Main driver state */
struct network_driver {
78
    virMutex lock;
79

80
    virNetworkObjList networks;
81 82 83 84 85 86 87 88

    iptablesContext *iptables;
    brControl *brctl;
    char *networkConfigDir;
    char *networkAutostartDir;
    char *logDir;
};

89 90 91

static void networkDriverLock(struct network_driver *driver)
{
92
    virMutexLock(&driver->lock);
93 94 95
}
static void networkDriverUnlock(struct network_driver *driver)
{
96
    virMutexUnlock(&driver->lock);
97 98
}

99 100
static int networkShutdown(void);

101 102
static int networkStartNetworkDaemon(struct network_driver *driver,
                                     virNetworkObjPtr network);
103

104 105
static int networkShutdownNetworkDaemon(struct network_driver *driver,
                                        virNetworkObjPtr network);
106

107 108
static void networkReloadIptablesRules(struct network_driver *driver);

109 110
static struct network_driver *driverState = NULL;

111 112 113 114 115 116 117 118 119 120
static char *
networkDnsmasqLeaseFileName(const char *netname)
{
    char *leasefile;

    virAsprintf(&leasefile, DNSMASQ_STATE_DIR "/%s.leases",
                netname);
    return leasefile;
}

121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139
static char *
networkRadvdPidfileBasename(const char *netname)
{
    /* this is simple but we want to be sure it's consistently done */
    char *pidfilebase;

    virAsprintf(&pidfilebase, "%s-radvd", netname);
    return pidfilebase;
}

static char *
networkRadvdConfigFileName(const char *netname)
{
    char *configfile;

    virAsprintf(&configfile, RADVD_STATE_DIR "/%s-radvd.conf",
                netname);
    return configfile;
}
140

141 142 143 144 145 146 147 148 149
static char *
networkBridgeDummyNicName(const char *brname)
{
    char *nicname;

    virAsprintf(&nicname, "%s-nic", brname);
    return nicname;
}

150 151 152 153 154 155 156 157 158 159 160
static void
networkFindActiveConfigs(struct network_driver *driver) {
    unsigned int i;

    for (i = 0 ; i < driver->networks.count ; i++) {
        virNetworkObjPtr obj = driver->networks.objs[i];
        virNetworkDefPtr tmp;
        char *config;

        virNetworkObjLock(obj);

161
        if ((config = virNetworkConfigFile(NETWORK_STATE_DIR,
162 163 164 165 166 167 168 169 170 171 172 173
                                           obj->def->name)) == NULL) {
            virNetworkObjUnlock(obj);
            continue;
        }

        if (access(config, R_OK) < 0) {
            VIR_FREE(config);
            virNetworkObjUnlock(obj);
            continue;
        }

        /* Try and load the live config */
174
        tmp = virNetworkDefParseFile(config);
175 176 177 178 179 180 181 182 183 184 185
        VIR_FREE(config);
        if (tmp) {
            obj->newDef = obj->def;
            obj->def = tmp;
        }

        /* If bridge exists, then mark it active */
        if (obj->def->bridge &&
            brHasBridge(driver->brctl, obj->def->bridge) == 0) {
            obj->active = 1;

186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202
            /* Try and read dnsmasq/radvd pids if any */
            if (obj->def->ips && (obj->def->nips > 0)) {
                char *pidpath, *radvdpidbase;

                if (virFileReadPid(NETWORK_PID_DIR, obj->def->name,
                                   &obj->dnsmasqPid) == 0) {
                    /* Check that it's still alive */
                    if (kill(obj->dnsmasqPid, 0) != 0)
                        obj->dnsmasqPid = -1;
                    if (virAsprintf(&pidpath, "/proc/%d/exe", obj->dnsmasqPid) < 0) {
                        virReportOOMError();
                        goto cleanup;
                    }
                    if (virFileLinkPointsTo(pidpath, DNSMASQ) == 0)
                        obj->dnsmasqPid = -1;
                    VIR_FREE(pidpath);
                }
203

204
                if (!(radvdpidbase = networkRadvdPidfileBasename(obj->def->name))) {
205
                    virReportOOMError();
206 207
                    goto cleanup;
                }
208 209 210 211 212 213 214 215 216 217 218 219 220 221 222
                if (virFileReadPid(NETWORK_PID_DIR, radvdpidbase,
                                   &obj->radvdPid) == 0) {
                    /* Check that it's still alive */
                    if (kill(obj->radvdPid, 0) != 0)
                        obj->radvdPid = -1;
                    if (virAsprintf(&pidpath, "/proc/%d/exe", obj->radvdPid) < 0) {
                        virReportOOMError();
                        VIR_FREE(radvdpidbase);
                        goto cleanup;
                    }
                    if (virFileLinkPointsTo(pidpath, RADVD) == 0)
                        obj->radvdPid = -1;
                    VIR_FREE(pidpath);
                }
                VIR_FREE(radvdpidbase);
223 224 225
            }
        }

226
    cleanup:
227 228 229 230 231
        virNetworkObjUnlock(obj);
    }
}


232 233 234
static void
networkAutostartConfigs(struct network_driver *driver) {
    unsigned int i;
235

236
    for (i = 0 ; i < driver->networks.count ; i++) {
237
        virNetworkObjLock(driver->networks.objs[i]);
238
        if (driver->networks.objs[i]->autostart &&
D
Daniel P. Berrange 已提交
239
            !virNetworkObjIsActive(driver->networks.objs[i]) &&
240
            networkStartNetworkDaemon(driver, driver->networks.objs[i]) < 0) {
241
            /* failed to start but already logged */
242
        }
243
        virNetworkObjUnlock(driver->networks.objs[i]);
244 245 246 247 248 249 250 251 252
    }
}

/**
 * networkStartup:
 *
 * Initialization function for the QEmu daemon
 */
static int
253
networkStartup(int privileged) {
254 255
    uid_t uid = geteuid();
    char *base = NULL;
256
    int err;
257 258

    if (VIR_ALLOC(driverState) < 0)
259
        goto error;
260

261 262 263 264
    if (virMutexInit(&driverState->lock) < 0) {
        VIR_FREE(driverState);
        goto error;
    }
265 266
    networkDriverLock(driverState);

267
    if (privileged) {
268
        if (virAsprintf(&driverState->logDir,
269
                        "%s/log/libvirt/qemu", LOCALSTATEDIR) == -1)
270 271
            goto out_of_memory;

272
        if ((base = strdup (SYSCONFDIR "/libvirt")) == NULL)
273 274
            goto out_of_memory;
    } else {
275
        char *userdir = virGetUserDirectory(uid);
276 277 278

        if (!userdir)
            goto error;
279

280
        if (virAsprintf(&driverState->logDir,
281 282
                        "%s/.libvirt/qemu/log", userdir) == -1) {
            VIR_FREE(userdir);
283
            goto out_of_memory;
284
        }
285

286 287
        if (virAsprintf(&base, "%s/.libvirt", userdir) == -1) {
            VIR_FREE(userdir);
288 289
            goto out_of_memory;
        }
290
        VIR_FREE(userdir);
291 292 293 294 295
    }

    /* Configuration paths are either ~/.libvirt/qemu/... (session) or
     * /etc/libvirt/qemu/... (system).
     */
296
    if (virAsprintf(&driverState->networkConfigDir, "%s/qemu/networks", base) == -1)
297 298
        goto out_of_memory;

299 300
    if (virAsprintf(&driverState->networkAutostartDir, "%s/qemu/networks/autostart",
                    base) == -1)
301 302 303 304
        goto out_of_memory;

    VIR_FREE(base);

305
    if ((err = brInit(&driverState->brctl))) {
306
        virReportSystemError(err, "%s",
307 308 309 310 311
                             _("cannot initialize bridge support"));
        goto error;
    }

    if (!(driverState->iptables = iptablesContextNew())) {
312
        goto out_of_memory;
313 314 315
    }


316
    if (virNetworkLoadAllConfigs(&driverState->networks,
317
                                 driverState->networkConfigDir,
318 319 320
                                 driverState->networkAutostartDir) < 0)
        goto error;

321
    networkFindActiveConfigs(driverState);
322
    networkReloadIptablesRules(driverState);
323 324
    networkAutostartConfigs(driverState);

325 326
    networkDriverUnlock(driverState);

327 328
    return 0;

329
out_of_memory:
330
    virReportOOMError();
331 332

error:
333 334 335
    if (driverState)
        networkDriverUnlock(driverState);

336
    VIR_FREE(base);
337
    networkShutdown();
338 339 340 341 342 343 344 345 346 347 348
    return -1;
}

/**
 * networkReload:
 *
 * Function to restart the QEmu daemon, it will recheck the configuration
 * files and update its state and the networking
 */
static int
networkReload(void) {
349 350 351
    if (!driverState)
        return 0;

352
    networkDriverLock(driverState);
353
    virNetworkLoadAllConfigs(&driverState->networks,
354 355
                             driverState->networkConfigDir,
                             driverState->networkAutostartDir);
356
    networkReloadIptablesRules(driverState);
357
    networkAutostartConfigs(driverState);
358
    networkDriverUnlock(driverState);
359 360 361 362 363 364 365 366 367 368 369 370 371
    return 0;
}

/**
 * networkActive:
 *
 * Checks if the QEmu daemon is active, i.e. has an active domain or
 * an active network
 *
 * Returns 1 if active, 0 otherwise
 */
static int
networkActive(void) {
372
    unsigned int i;
373
    int active = 0;
374

375 376 377
    if (!driverState)
        return 0;

378
    networkDriverLock(driverState);
379 380
    for (i = 0 ; i < driverState->networks.count ; i++) {
        virNetworkObjPtr net = driverState->networks.objs[i];
381
        virNetworkObjLock(net);
D
Daniel P. Berrange 已提交
382
        if (virNetworkObjIsActive(net))
383
            active = 1;
384
        virNetworkObjUnlock(net);
385
    }
386
    networkDriverUnlock(driverState);
387
    return active;
388 389 390 391 392 393 394 395 396 397 398 399
}

/**
 * networkShutdown:
 *
 * Shutdown the QEmu daemon, it will stop all active domains and networks
 */
static int
networkShutdown(void) {
    if (!driverState)
        return -1;

400 401
    networkDriverLock(driverState);

402
    /* free inactive networks */
403
    virNetworkObjListFree(&driverState->networks);
404 405 406 407 408 409 410 411 412 413

    VIR_FREE(driverState->logDir);
    VIR_FREE(driverState->networkConfigDir);
    VIR_FREE(driverState->networkAutostartDir);

    if (driverState->brctl)
        brShutdown(driverState->brctl);
    if (driverState->iptables)
        iptablesContextFree(driverState->iptables);

414
    networkDriverUnlock(driverState);
415
    virMutexDestroy(&driverState->lock);
416

417 418 419 420 421 422
    VIR_FREE(driverState);

    return 0;
}


423
static int
424
networkSaveDnsmasqHostsfile(virNetworkIpDefPtr ipdef,
425 426 427 428 429 430
                            dnsmasqContext *dctx,
                            bool force)
{
    unsigned int i;

    if (! force && virFileExists(dctx->hostsfile->path))
431
        return 0;
432

433 434
    for (i = 0; i < ipdef->nhosts; i++) {
        virNetworkDHCPHostDefPtr host = &(ipdef->hosts[i]);
435 436
        if ((host->mac) && VIR_SOCKET_HAS_ADDR(&host->ip))
            dnsmasqAddDhcpHost(dctx, host->mac, &host->ip, host->name);
437 438 439
    }

    if (dnsmasqSave(dctx) < 0)
440
        return -1;
441

442
    return 0;
443 444 445
}


446
static int
447
networkBuildDnsmasqArgv(virNetworkObjPtr network,
448
                        virNetworkIpDefPtr ipdef,
449
                        const char *pidfile,
450 451
                        virCommandPtr cmd) {
    int r, ret = -1;
452
    int nbleases = 0;
453 454
    int ii;
    virNetworkIpDefPtr tmpipdef;
455 456

    /*
457
     * NB, be careful about syntax for dnsmasq options in long format.
458 459 460 461 462 463 464 465 466 467 468 469 470
     *
     * If the flag has a mandatory argument, it can be given using
     * either syntax:
     *
     *     --foo bar
     *     --foo=bar
     *
     * If the flag has a optional argument, it *must* be given using
     * the syntax:
     *
     *     --foo=bar
     *
     * It is hard to determine whether a flag is optional or not,
471 472
     * without reading the dnsmasq source :-( The manpage is not
     * very explicit on this.
473
     */
474 475 476 477 478

    /*
     * Needed to ensure dnsmasq uses same algorithm for processing
     * multiple namedriver entries in /etc/resolv.conf as GLibC.
     */
479
    virCommandAddArgList(cmd, "--strict-order", "--bind-interfaces", NULL);
480

481 482
    if (network->def->domain)
        virCommandAddArgList(cmd, "--domain", network->def->domain, NULL);
483

484
    virCommandAddArgPair(cmd, "--pid-file", pidfile);
485

486
    /* *no* conf file */
487
    virCommandAddArg(cmd, "--conf-file=");
488

489 490 491
    virCommandAddArgList(cmd,
                         "--except-interface", "lo",
                         NULL);
492

493 494 495 496 497 498 499
    /* If this is an isolated network, set the default route option
     * (3) to be empty to avoid setting a default route that's
     * guaranteed to not work.
     */
    if (network->def->forwardType == VIR_NETWORK_FORWARD_NONE)
        virCommandAddArg(cmd, "--dhcp-option=3");

500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517
    /*
     * --interface does not actually work with dnsmasq < 2.47,
     * due to DAD for ipv6 addresses on the interface.
     *
     * virCommandAddArgList(cmd, "--interface", ipdef->bridge, NULL);
     *
     * So listen on all defined IPv[46] addresses
     */
    for (ii = 0;
         (tmpipdef = virNetworkDefGetIpByIndex(network->def, AF_UNSPEC, ii));
         ii++) {
        char *ipaddr = virSocketFormatAddr(&tmpipdef->address);
        if (!ipaddr)
            goto cleanup;
        virCommandAddArgList(cmd, "--listen-address", ipaddr, NULL);
        VIR_FREE(ipaddr);
    }

518
    if (ipdef) {
519 520 521 522 523 524 525 526 527 528 529
        for (r = 0 ; r < ipdef->nranges ; r++) {
            char *saddr = virSocketFormatAddr(&ipdef->ranges[r].start);
            if (!saddr)
                goto cleanup;
            char *eaddr = virSocketFormatAddr(&ipdef->ranges[r].end);
            if (!eaddr) {
                VIR_FREE(saddr);
                goto cleanup;
            }
            virCommandAddArg(cmd, "--dhcp-range");
            virCommandAddArgFormat(cmd, "%s,%s", saddr, eaddr);
530
            VIR_FREE(saddr);
531 532 533
            VIR_FREE(eaddr);
            nbleases += virSocketGetRange(&ipdef->ranges[r].start,
                                          &ipdef->ranges[r].end);
534
        }
535

536 537 538 539 540 541 542 543 544 545 546 547 548
        /*
         * For static-only DHCP, i.e. with no range but at least one host element,
         * we have to add a special --dhcp-range option to enable the service in
         * dnsmasq.
         */
        if (!ipdef->nranges && ipdef->nhosts) {
            char *bridgeaddr = virSocketFormatAddr(&ipdef->address);
            if (!bridgeaddr)
                goto cleanup;
            virCommandAddArg(cmd, "--dhcp-range");
            virCommandAddArgFormat(cmd, "%s,static", bridgeaddr);
            VIR_FREE(bridgeaddr);
        }
549

550
        if (ipdef->nranges > 0) {
551 552 553 554 555
            char *leasefile = networkDnsmasqLeaseFileName(network->def->name);
            if (!leasefile)
                goto cleanup;
            virCommandAddArgFormat(cmd, "--dhcp-leasefile=%s", leasefile);
            VIR_FREE(leasefile);
556 557
            virCommandAddArgFormat(cmd, "--dhcp-lease-max=%d", nbleases);
        }
558

559 560
        if (ipdef->nranges || ipdef->nhosts)
            virCommandAddArg(cmd, "--dhcp-no-override");
561

562 563 564 565 566 567 568
        if (ipdef->nhosts > 0) {
            dnsmasqContext *dctx = dnsmasqContextNew(network->def->name,
                                                     DNSMASQ_STATE_DIR);
            if (dctx == NULL) {
                virReportOOMError();
                goto cleanup;
            }
569

570 571 572 573 574
            if (networkSaveDnsmasqHostsfile(ipdef, dctx, false) == 0) {
                virCommandAddArgPair(cmd, "--dhcp-hostsfile",
                                     dctx->hostsfile->path);
            }
            dnsmasqContextFree(dctx);
575
        }
576

577 578 579 580 581 582 583 584 585
        if (ipdef->tftproot) {
            virCommandAddArgList(cmd, "--enable-tftp",
                                 "--tftp-root", ipdef->tftproot,
                                 NULL);
        }
        if (ipdef->bootfile) {
            virCommandAddArg(cmd, "--dhcp-boot");
            if (VIR_SOCKET_HAS_ADDR(&ipdef->bootserver)) {
                char *bootserver = virSocketFormatAddr(&ipdef->bootserver);
586

587 588 589 590 591 592 593 594
                if (!bootserver)
                    goto cleanup;
                virCommandAddArgFormat(cmd, "%s%s%s",
                                       ipdef->bootfile, ",,", bootserver);
                VIR_FREE(bootserver);
            } else {
                virCommandAddArg(cmd, ipdef->bootfile);
            }
595
        }
596 597
    }

598 599 600
    ret = 0;
cleanup:
    return ret;
601 602 603
}

static int
604
networkStartDhcpDaemon(virNetworkObjPtr network)
605
{
606 607
    virCommandPtr cmd = NULL;
    char *pidfile = NULL;
608 609
    int ret = -1, err, ii;
    virNetworkIpDefPtr ipdef;
610 611

    network->dnsmasqPid = -1;
612

613 614 615 616 617 618 619
    /* Look for first IPv4 address that has dhcp defined. */
    /* We support dhcp config on 1 IPv4 interface only. */
    for (ii = 0;
         (ipdef = virNetworkDefGetIpByIndex(network->def, AF_INET, ii));
         ii++) {
        if (ipdef->nranges || ipdef->nhosts)
            break;
620
    }
621
    /* If no IPv4 addresses had dhcp info, pick the first (if there were any). */
622
    if (!ipdef)
623 624 625 626 627 628 629 630
        ipdef = virNetworkDefGetIpByIndex(network->def, AF_INET, 0);

    /* If there are no IP addresses at all (v4 or v6), return now, since
     * there won't be any address for dnsmasq to listen on anyway.
     * If there are any addresses, even if no dhcp ranges or static entries,
     * we should continue and run dnsmasq, just for the DNS capabilities.
     */
    if (!virNetworkDefGetIpByIndex(network->def, AF_UNSPEC, 0))
631
        return 0;
632

L
Laine Stump 已提交
633
    if ((err = virFileMakePath(NETWORK_PID_DIR)) != 0) {
634
        virReportSystemError(err,
635 636
                             _("cannot create directory %s"),
                             NETWORK_PID_DIR);
637
        goto cleanup;
638
    }
L
Laine Stump 已提交
639
    if ((err = virFileMakePath(NETWORK_STATE_DIR)) != 0) {
640
        virReportSystemError(err,
641 642
                             _("cannot create directory %s"),
                             NETWORK_STATE_DIR);
643
        goto cleanup;
644 645 646
    }

    if (!(pidfile = virFilePid(NETWORK_PID_DIR, network->def->name))) {
647
        virReportOOMError();
648
        goto cleanup;
649 650
    }

651
    cmd = virCommandNew(DNSMASQ);
652
    if (networkBuildDnsmasqArgv(network, ipdef, pidfile, cmd) < 0) {
653
        goto cleanup;
654 655
    }

656
    if (virCommandRun(cmd, NULL) < 0)
657 658 659
        goto cleanup;

    /*
660 661 662 663 664
     * There really is no race here - when dnsmasq daemonizes, its
     * leader process stays around until its child has actually
     * written its pidfile. So by time virCommandRun exits it has
     * waitpid'd and guaranteed the proess has started and written a
     * pid
665 666 667 668 669
     */

    if (virFileReadPid(NETWORK_PID_DIR, network->def->name,
                       &network->dnsmasqPid) < 0)
        goto cleanup;
670

671 672 673
    ret = 0;
cleanup:
    VIR_FREE(pidfile);
674
    virCommandFree(cmd);
675 676 677
    return ret;
}

678 679 680 681 682 683 684 685 686 687 688 689 690 691
static int
networkStartRadvd(virNetworkObjPtr network)
{
    char *pidfile = NULL;
    char *radvdpidbase = NULL;
    virBuffer configbuf = VIR_BUFFER_INITIALIZER;;
    char *configstr = NULL;
    char *configfile = NULL;
    virCommandPtr cmd = NULL;
    int ret = -1, err, ii;
    virNetworkIpDefPtr ipdef;

    network->radvdPid = -1;

692 693 694 695 696 697 698 699
    if (access(RADVD, X_OK) < 0) {
        virReportSystemError(errno,
                             _("Cannot find %s - "
                               "Possibly the package isn't installed"),
                             RADVD);
        goto cleanup;
    }

700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815
    if ((err = virFileMakePath(NETWORK_PID_DIR)) != 0) {
        virReportSystemError(err,
                             _("cannot create directory %s"),
                             NETWORK_PID_DIR);
        goto cleanup;
    }
    if ((err = virFileMakePath(RADVD_STATE_DIR)) != 0) {
        virReportSystemError(err,
                             _("cannot create directory %s"),
                             RADVD_STATE_DIR);
        goto cleanup;
    }

    /* construct pidfile name */
    if (!(radvdpidbase = networkRadvdPidfileBasename(network->def->name))) {
        virReportOOMError();
        goto cleanup;
    }
    if (!(pidfile = virFilePid(NETWORK_PID_DIR, radvdpidbase))) {
        virReportOOMError();
        goto cleanup;
    }

    /* create radvd config file appropriate for this network */
    virBufferVSprintf(&configbuf, "interface %s\n"
                      "{\n"
                      "  AdvSendAdvert on;\n"
                      "  AdvManagedFlag off;\n"
                      "  AdvOtherConfigFlag off;\n"
                      "\n",
                      network->def->bridge);
    for (ii = 0;
         (ipdef = virNetworkDefGetIpByIndex(network->def, AF_INET6, ii));
         ii++) {
        int prefix;
        char *netaddr;

        prefix = virNetworkIpDefPrefix(ipdef);
        if (prefix < 0) {
            networkReportError(VIR_ERR_INTERNAL_ERROR,
                               _("bridge  '%s' has an invalid prefix"),
                               network->def->bridge);
            goto cleanup;
        }
        if (!(netaddr = virSocketFormatAddr(&ipdef->address)))
            goto cleanup;
        virBufferVSprintf(&configbuf,
                          "  prefix %s/%d\n"
                          "  {\n"
                          "    AdvOnLink on;\n"
                          "    AdvAutonomous on;\n"
                          "    AdvRouterAddr off;\n"
                          "  };\n",
                          netaddr, prefix);
        VIR_FREE(netaddr);
    }

    virBufferAddLit(&configbuf, "};\n");

    if (virBufferError(&configbuf)) {
        virReportOOMError();
        goto cleanup;
    }
    if (!(configstr = virBufferContentAndReset(&configbuf))) {
        virReportOOMError();
        goto cleanup;
    }

    /* construct the filename */
    if (!(configfile = networkRadvdConfigFileName(network->def->name))) {
        virReportOOMError();
        goto cleanup;
    }
    /* write the file */
    if (virFileWriteStr(configfile, configstr, 0600) < 0) {
        virReportSystemError(errno,
                             _("couldn't write radvd config file '%s'"),
                             configfile);
        goto cleanup;
    }

    /* prevent radvd from daemonizing itself with "--debug 1", and use
     * a dummy pidfile name - virCommand will create the pidfile we
     * want to use (this is necessary because radvd's internal
     * daemonization and pidfile creation causes a race, and the
     * virFileReadPid() below will fail if we use them).
     * Unfortunately, it isn't possible to tell radvd to not create
     * its own pidfile, so we just let it do so, with a slightly
     * different name. Unused, but harmless.
     */
    cmd = virCommandNewArgList(RADVD, "--debug", "1",
                               "--config", configfile,
                               "--pidfile", NULL);
    virCommandAddArgFormat(cmd, "%s-bin", pidfile);

    virCommandSetPidFile(cmd, pidfile);
    virCommandDaemonize(cmd);

    if (virCommandRun(cmd, NULL) < 0)
        goto cleanup;

    if (virFileReadPid(NETWORK_PID_DIR, radvdpidbase,
                       &network->radvdPid) < 0)
        goto cleanup;

    ret = 0;
cleanup:
    virCommandFree(cmd);
    VIR_FREE(configfile);
    VIR_FREE(configstr);
    virBufferFreeAndReset(&configbuf);
    VIR_FREE(radvdpidbase);
    VIR_FREE(pidfile);
    return ret;
}

816
static int
817
networkAddMasqueradingIptablesRules(struct network_driver *driver,
818 819
                                    virNetworkObjPtr network,
                                    virNetworkIpDefPtr ipdef)
820 821
{
    int prefix = virNetworkIpDefPrefix(ipdef);
822 823 824 825 826 827 828

    if (prefix < 0) {
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Invalid prefix or netmask for '%s'"),
                           network->def->bridge);
        goto masqerr1;
    }
829

830
    /* allow forwarding packets from the bridge interface */
831
    if (iptablesAddForwardAllowOut(driver->iptables,
832
                                   &ipdef->address,
833
                                   prefix,
834 835 836 837 838
                                   network->def->bridge,
                                   network->def->forwardDev) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow forwarding from '%s'"),
                           network->def->bridge);
839 840 841
        goto masqerr1;
    }

842 843 844
    /* allow forwarding packets to the bridge interface if they are
     * part of an existing connection
     */
845
    if (iptablesAddForwardAllowRelatedIn(driver->iptables,
846
                                         &ipdef->address,
847
                                         prefix,
848 849 850 851 852
                                         network->def->bridge,
                                         network->def->forwardDev) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow forwarding to '%s'"),
                           network->def->bridge);
853 854 855
        goto masqerr2;
    }

856 857 858 859 860
    /*
     * Enable masquerading.
     *
     * We need to end up with 3 rules in the table in this order
     *
E
Eric Blake 已提交
861 862
     *  1. protocol=tcp with sport mapping restriction
     *  2. protocol=udp with sport mapping restriction
863 864 865
     *  3. generic any protocol
     *
     * The sport mappings are required, because default IPtables
E
Eric Blake 已提交
866
     * MASQUERADE maintain port numbers unchanged where possible.
867 868 869 870 871 872 873 874 875 876 877 878 879
     *
     * NFS can be configured to only "trust" port numbers < 1023.
     *
     * Guests using NAT thus need to be prevented from having port
     * numbers < 1023, otherwise they can bypass the NFS "security"
     * check on the source port number.
     *
     * Since we use '--insert' to add rules to the header of the
     * chain, we actually need to add them in the reverse of the
     * order just mentioned !
     */

    /* First the generic masquerade rule for other protocols */
880
    if (iptablesAddForwardMasquerade(driver->iptables,
881
                                     &ipdef->address,
882
                                     prefix,
883 884 885 886 887
                                     network->def->forwardDev,
                                     NULL) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to enable masquerading to '%s'"),
                           network->def->forwardDev ? network->def->forwardDev : NULL);
888 889 890
        goto masqerr3;
    }

891
    /* UDP with a source port restriction */
892
    if (iptablesAddForwardMasquerade(driver->iptables,
893
                                     &ipdef->address,
894
                                     prefix,
895 896 897 898 899
                                     network->def->forwardDev,
                                     "udp") < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to enable UDP masquerading to '%s'"),
                           network->def->forwardDev ? network->def->forwardDev : NULL);
900 901 902 903
        goto masqerr4;
    }

    /* TCP with a source port restriction */
904
    if (iptablesAddForwardMasquerade(driver->iptables,
905
                                     &ipdef->address,
906
                                     prefix,
907 908 909 910 911
                                     network->def->forwardDev,
                                     "tcp") < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to enable TCP masquerading to '%s'"),
                           network->def->forwardDev ? network->def->forwardDev : NULL);
912 913 914
        goto masqerr5;
    }

915
    return 0;
916

917 918
 masqerr5:
    iptablesRemoveForwardMasquerade(driver->iptables,
919
                                    &ipdef->address,
920
                                    prefix,
921 922 923 924
                                    network->def->forwardDev,
                                    "udp");
 masqerr4:
    iptablesRemoveForwardMasquerade(driver->iptables,
925
                                    &ipdef->address,
926
                                    prefix,
927 928
                                    network->def->forwardDev,
                                    NULL);
929 930
 masqerr3:
    iptablesRemoveForwardAllowRelatedIn(driver->iptables,
931
                                        &ipdef->address,
932
                                        prefix,
933 934
                                        network->def->bridge,
                                        network->def->forwardDev);
935 936
 masqerr2:
    iptablesRemoveForwardAllowOut(driver->iptables,
937
                                  &ipdef->address,
938
                                  prefix,
939 940 941
                                  network->def->bridge,
                                  network->def->forwardDev);
 masqerr1:
942
    return -1;
943 944
}

945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981
static void
networkRemoveMasqueradingIptablesRules(struct network_driver *driver,
                                       virNetworkObjPtr network,
                                       virNetworkIpDefPtr ipdef)
{
    int prefix = virNetworkIpDefPrefix(ipdef);

    if (prefix >= 0) {
        iptablesRemoveForwardMasquerade(driver->iptables,
                                        &ipdef->address,
                                        prefix,
                                        network->def->forwardDev,
                                        "tcp");
        iptablesRemoveForwardMasquerade(driver->iptables,
                                        &ipdef->address,
                                        prefix,
                                        network->def->forwardDev,
                                        "udp");
        iptablesRemoveForwardMasquerade(driver->iptables,
                                        &ipdef->address,
                                        prefix,
                                        network->def->forwardDev,
                                        NULL);

        iptablesRemoveForwardAllowRelatedIn(driver->iptables,
                                            &ipdef->address,
                                            prefix,
                                            network->def->bridge,
                                            network->def->forwardDev);
        iptablesRemoveForwardAllowOut(driver->iptables,
                                      &ipdef->address,
                                      prefix,
                                      network->def->bridge,
                                      network->def->forwardDev);
    }
}

982
static int
983
networkAddRoutingIptablesRules(struct network_driver *driver,
984
                               virNetworkObjPtr network,
985 986
                               virNetworkIpDefPtr ipdef)
{
987
    int prefix = virNetworkIpDefPrefix(ipdef);
988 989 990 991 992 993 994

    if (prefix < 0) {
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Invalid prefix or netmask for '%s'"),
                           network->def->bridge);
        goto routeerr1;
    }
995

996
    /* allow routing packets from the bridge interface */
997
    if (iptablesAddForwardAllowOut(driver->iptables,
998
                                   &ipdef->address,
999
                                   prefix,
1000 1001 1002 1003 1004
                                   network->def->bridge,
                                   network->def->forwardDev) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow routing from '%s'"),
                           network->def->bridge);
1005 1006 1007 1008
        goto routeerr1;
    }

    /* allow routing packets to the bridge interface */
1009
    if (iptablesAddForwardAllowIn(driver->iptables,
1010
                                  &ipdef->address,
1011
                                  prefix,
1012 1013 1014 1015 1016
                                  network->def->bridge,
                                  network->def->forwardDev) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow routing to '%s'"),
                           network->def->bridge);
1017 1018 1019
        goto routeerr2;
    }

1020
    return 0;
1021

1022
routeerr2:
1023
    iptablesRemoveForwardAllowOut(driver->iptables,
1024
                                  &ipdef->address,
1025
                                  prefix,
1026 1027
                                  network->def->bridge,
                                  network->def->forwardDev);
1028
routeerr1:
1029
    return -1;
1030 1031
}

1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053
static void
networkRemoveRoutingIptablesRules(struct network_driver *driver,
                                  virNetworkObjPtr network,
                                  virNetworkIpDefPtr ipdef)
{
    int prefix = virNetworkIpDefPrefix(ipdef);

    if (prefix >= 0) {
        iptablesRemoveForwardAllowIn(driver->iptables,
                                     &ipdef->address,
                                     prefix,
                                     network->def->bridge,
                                     network->def->forwardDev);

        iptablesRemoveForwardAllowOut(driver->iptables,
                                      &ipdef->address,
                                      prefix,
                                      network->def->bridge,
                                      network->def->forwardDev);
    }
}

1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089
/* Add all once/network rules required for IPv6 (if any IPv6 addresses are defined) */
static int
networkAddGeneralIp6tablesRules(struct network_driver *driver,
                               virNetworkObjPtr network)
{

    if (!virNetworkDefGetIpByIndex(network->def, AF_INET6, 0))
        return 0;

    /* Catch all rules to block forwarding to/from bridges */

    if (iptablesAddForwardRejectOut(driver->iptables, AF_INET6,
                                    network->def->bridge) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add ip6tables rule to block outbound traffic from '%s'"),
                           network->def->bridge);
        goto err1;
    }

    if (iptablesAddForwardRejectIn(driver->iptables, AF_INET6,
                                   network->def->bridge) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add ip6tables rule to block inbound traffic to '%s'"),
                           network->def->bridge);
        goto err2;
    }

    /* Allow traffic between guests on the same bridge */
    if (iptablesAddForwardAllowCross(driver->iptables, AF_INET6,
                                     network->def->bridge) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add ip6tables rule to allow cross bridge traffic on '%s'"),
                           network->def->bridge);
        goto err3;
    }

1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106
    /* allow DNS over IPv6 */
    if (iptablesAddTcpInput(driver->iptables, AF_INET6,
                            network->def->bridge, 53) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add ip6tables rule to allow DNS requests from '%s'"),
                           network->def->bridge);
        goto err4;
    }

    if (iptablesAddUdpInput(driver->iptables, AF_INET6,
                            network->def->bridge, 53) < 0) {
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add ip6tables rule to allow DNS requests from '%s'"),
                           network->def->bridge);
        goto err5;
    }

1107 1108 1109
    return 0;

    /* unwind in reverse order from the point of failure */
1110 1111 1112 1113
err5:
    iptablesRemoveTcpInput(driver->iptables, AF_INET6, network->def->bridge, 53);
err4:
    iptablesRemoveForwardAllowCross(driver->iptables, AF_INET6, network->def->bridge);
1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133
err3:
    iptablesRemoveForwardRejectIn(driver->iptables, AF_INET6, network->def->bridge);
err2:
    iptablesRemoveForwardRejectOut(driver->iptables, AF_INET6, network->def->bridge);
err1:
    return -1;
}

static void
networkRemoveGeneralIp6tablesRules(struct network_driver *driver,
                                  virNetworkObjPtr network)
{
    if (!virNetworkDefGetIpByIndex(network->def, AF_INET6, 0))
        return;

    iptablesRemoveForwardAllowCross(driver->iptables, AF_INET6, network->def->bridge);
    iptablesRemoveForwardRejectIn(driver->iptables, AF_INET6, network->def->bridge);
    iptablesRemoveForwardRejectOut(driver->iptables, AF_INET6, network->def->bridge);
}

1134
static int
1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148
networkAddGeneralIptablesRules(struct network_driver *driver,
                               virNetworkObjPtr network)
{
    int ii;
    virNetworkIpDefPtr ipv4def;

    /* First look for first IPv4 address that has dhcp or tftpboot defined. */
    /* We support dhcp config on 1 IPv4 interface only. */
    for (ii = 0;
         (ipv4def = virNetworkDefGetIpByIndex(network->def, AF_INET, ii));
         ii++) {
        if (ipv4def->nranges || ipv4def->nhosts || ipv4def->tftproot)
            break;
    }
1149 1150

    /* allow DHCP requests through to dnsmasq */
1151

1152 1153
    if (iptablesAddTcpInput(driver->iptables, AF_INET,
                            network->def->bridge, 67) < 0) {
1154 1155 1156
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow DHCP requests from '%s'"),
                           network->def->bridge);
1157 1158 1159
        goto err1;
    }

1160 1161
    if (iptablesAddUdpInput(driver->iptables, AF_INET,
                            network->def->bridge, 67) < 0) {
1162 1163 1164
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow DHCP requests from '%s'"),
                           network->def->bridge);
1165 1166 1167
        goto err2;
    }

1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181
    /* If we are doing local DHCP service on this network, attempt to
     * add a rule that will fixup the checksum of DHCP response
     * packets back to the guests (but report failure without
     * aborting, since not all iptables implementations support it).
     */

    if (ipv4def && (ipv4def->nranges || ipv4def->nhosts) &&
        (iptablesAddOutputFixUdpChecksum(driver->iptables,
                                         network->def->bridge, 68) < 0)) {
        VIR_WARN("Could not add rule to fixup DHCP response checksums "
                 "on network '%s'.", network->def->name);
        VIR_WARN0("May need to update iptables package & kernel to support CHECKSUM rule.");
    }

1182
    /* allow DNS requests through to dnsmasq */
1183 1184
    if (iptablesAddTcpInput(driver->iptables, AF_INET,
                            network->def->bridge, 53) < 0) {
1185 1186 1187
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow DNS requests from '%s'"),
                           network->def->bridge);
1188 1189 1190
        goto err3;
    }

1191 1192
    if (iptablesAddUdpInput(driver->iptables, AF_INET,
                            network->def->bridge, 53) < 0) {
1193 1194 1195
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow DNS requests from '%s'"),
                           network->def->bridge);
1196 1197 1198
        goto err4;
    }

1199 1200
    /* allow TFTP requests through to dnsmasq if necessary */
    if (ipv4def && ipv4def->tftproot &&
1201 1202
        iptablesAddUdpInput(driver->iptables, AF_INET,
                            network->def->bridge, 69) < 0) {
1203 1204 1205
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow TFTP requests from '%s'"),
                           network->def->bridge);
1206
        goto err5;
1207 1208
    }

1209 1210
    /* Catch all rules to block forwarding to/from bridges */

1211 1212
    if (iptablesAddForwardRejectOut(driver->iptables, AF_INET,
                                    network->def->bridge) < 0) {
1213 1214 1215
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to block outbound traffic from '%s'"),
                           network->def->bridge);
1216
        goto err6;
1217 1218
    }

1219 1220
    if (iptablesAddForwardRejectIn(driver->iptables, AF_INET,
                                   network->def->bridge) < 0) {
1221 1222 1223
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to block inbound traffic to '%s'"),
                           network->def->bridge);
1224
        goto err7;
1225 1226 1227
    }

    /* Allow traffic between guests on the same bridge */
1228 1229
    if (iptablesAddForwardAllowCross(driver->iptables, AF_INET,
                                     network->def->bridge) < 0) {
1230 1231 1232
        networkReportError(VIR_ERR_SYSTEM_ERROR,
                           _("failed to add iptables rule to allow cross bridge traffic on '%s'"),
                           network->def->bridge);
1233
        goto err8;
1234 1235
    }

1236 1237 1238 1239 1240
    /* add IPv6 general rules, if needed */
    if (networkAddGeneralIp6tablesRules(driver, network) < 0) {
        goto err9;
    }

1241
    return 0;
1242

1243
    /* unwind in reverse order from the point of failure */
1244 1245
err9:
    iptablesRemoveForwardAllowCross(driver->iptables, AF_INET, network->def->bridge);
1246
err8:
1247
    iptablesRemoveForwardRejectIn(driver->iptables, AF_INET, network->def->bridge);
1248
err7:
1249
    iptablesRemoveForwardRejectOut(driver->iptables, AF_INET, network->def->bridge);
1250 1251
err6:
    if (ipv4def && ipv4def->tftproot) {
1252
        iptablesRemoveUdpInput(driver->iptables, AF_INET, network->def->bridge, 69);
1253
    }
1254
err5:
1255
    iptablesRemoveUdpInput(driver->iptables, AF_INET, network->def->bridge, 53);
1256
err4:
1257
    iptablesRemoveTcpInput(driver->iptables, AF_INET, network->def->bridge, 53);
1258
err3:
1259
    iptablesRemoveUdpInput(driver->iptables, AF_INET, network->def->bridge, 67);
1260
err2:
1261
    iptablesRemoveTcpInput(driver->iptables, AF_INET, network->def->bridge, 67);
1262
err1:
1263
    return -1;
1264 1265 1266
}

static void
1267 1268 1269 1270 1271
networkRemoveGeneralIptablesRules(struct network_driver *driver,
                                  virNetworkObjPtr network)
{
    int ii;
    virNetworkIpDefPtr ipv4def;
1272

1273 1274
    networkRemoveGeneralIp6tablesRules(driver, network);

1275 1276 1277 1278 1279
    for (ii = 0;
         (ipv4def = virNetworkDefGetIpByIndex(network->def, AF_INET, ii));
         ii++) {
        if (ipv4def->nranges || ipv4def->nhosts || ipv4def->tftproot)
            break;
1280
    }
1281

1282 1283 1284
    iptablesRemoveForwardAllowCross(driver->iptables, AF_INET, network->def->bridge);
    iptablesRemoveForwardRejectIn(driver->iptables, AF_INET, network->def->bridge);
    iptablesRemoveForwardRejectOut(driver->iptables, AF_INET, network->def->bridge);
1285
    if (ipv4def && ipv4def->tftproot) {
1286
        iptablesRemoveUdpInput(driver->iptables, AF_INET, network->def->bridge, 69);
1287
    }
1288 1289
    iptablesRemoveUdpInput(driver->iptables, AF_INET, network->def->bridge, 53);
    iptablesRemoveTcpInput(driver->iptables, AF_INET, network->def->bridge, 53);
1290 1291 1292 1293
    if (ipv4def && (ipv4def->nranges || ipv4def->nhosts)) {
        iptablesRemoveOutputFixUdpChecksum(driver->iptables,
                                           network->def->bridge, 68);
    }
1294 1295
    iptablesRemoveUdpInput(driver->iptables, AF_INET, network->def->bridge, 67);
    iptablesRemoveTcpInput(driver->iptables, AF_INET, network->def->bridge, 67);
1296 1297
}

1298 1299 1300 1301 1302
static int
networkAddIpSpecificIptablesRules(struct network_driver *driver,
                                  virNetworkObjPtr network,
                                  virNetworkIpDefPtr ipdef)
{
1303 1304 1305
    /* NB: in the case of IPv6, routing rules are added when the
     * forward mode is NAT. This is because IPv6 has no NAT.
     */
1306

1307 1308 1309 1310 1311 1312 1313 1314
    if (network->def->forwardType == VIR_NETWORK_FORWARD_NAT) {
        if (VIR_SOCKET_IS_FAMILY(&ipdef->address, AF_INET))
            return networkAddMasqueradingIptablesRules(driver, network, ipdef);
        else if (VIR_SOCKET_IS_FAMILY(&ipdef->address, AF_INET6))
            return networkAddRoutingIptablesRules(driver, network, ipdef);
    } else if (network->def->forwardType == VIR_NETWORK_FORWARD_ROUTE) {
        return networkAddRoutingIptablesRules(driver, network, ipdef);
    }
1315 1316 1317 1318 1319 1320 1321 1322
    return 0;
}

static void
networkRemoveIpSpecificIptablesRules(struct network_driver *driver,
                                     virNetworkObjPtr network,
                                     virNetworkIpDefPtr ipdef)
{
1323 1324 1325 1326 1327 1328
    if (network->def->forwardType == VIR_NETWORK_FORWARD_NAT) {
        if (VIR_SOCKET_IS_FAMILY(&ipdef->address, AF_INET))
            networkRemoveMasqueradingIptablesRules(driver, network, ipdef);
        else if (VIR_SOCKET_IS_FAMILY(&ipdef->address, AF_INET6))
            networkRemoveRoutingIptablesRules(driver, network, ipdef);
    } else if (network->def->forwardType == VIR_NETWORK_FORWARD_ROUTE) {
1329
        networkRemoveRoutingIptablesRules(driver, network, ipdef);
1330
    }
1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383
}

/* Add all rules for all ip addresses (and general rules) on a network */
static int
networkAddIptablesRules(struct network_driver *driver,
                        virNetworkObjPtr network)
{
    int ii;
    virNetworkIpDefPtr ipdef;

    /* Add "once per network" rules */
    if (networkAddGeneralIptablesRules(driver, network) < 0)
        return -1;

    for (ii = 0;
         (ipdef = virNetworkDefGetIpByIndex(network->def, AF_UNSPEC, ii));
         ii++) {
        /* Add address-specific iptables rules */
        if (networkAddIpSpecificIptablesRules(driver, network, ipdef) < 0) {
            goto err;
        }
    }
    return 0;

err:
    /* The final failed call to networkAddIpSpecificIptablesRules will
     * have removed any rules it created, but we need to remove those
     * added for previous IP addresses.
     */
    while ((--ii >= 0) &&
           (ipdef = virNetworkDefGetIpByIndex(network->def, AF_UNSPEC, ii))) {
        networkRemoveIpSpecificIptablesRules(driver, network, ipdef);
    }
    networkRemoveGeneralIptablesRules(driver, network);
    return -1;
}

/* Remove all rules for all ip addresses (and general rules) on a network */
static void
networkRemoveIptablesRules(struct network_driver *driver,
                           virNetworkObjPtr network)
{
    int ii;
    virNetworkIpDefPtr ipdef;

    for (ii = 0;
         (ipdef = virNetworkDefGetIpByIndex(network->def, AF_UNSPEC, ii));
         ii++) {
        networkRemoveIpSpecificIptablesRules(driver, network, ipdef);
    }
    networkRemoveGeneralIptablesRules(driver, network);
}

1384 1385 1386 1387 1388 1389 1390 1391 1392 1393
static void
networkReloadIptablesRules(struct network_driver *driver)
{
    unsigned int i;

    VIR_INFO0(_("Reloading iptables rules"));

    for (i = 0 ; i < driver->networks.count ; i++) {
        virNetworkObjLock(driver->networks.objs[i]);
        if (virNetworkObjIsActive(driver->networks.objs[i])) {
1394 1395 1396 1397
            networkRemoveIptablesRules(driver, driver->networks.objs[i]);
            if (networkAddIptablesRules(driver, driver->networks.objs[i]) < 0) {
                /* failed to add but already logged */
            }
1398 1399 1400 1401 1402
        }
        virNetworkObjUnlock(driver->networks.objs[i]);
    }
}

1403
/* Enable IP Forwarding. Return 0 for success, -1 for failure. */
1404
static int
1405
networkEnableIpForwarding(bool enableIPv4, bool enableIPv6)
1406
{
1407 1408 1409 1410 1411 1412
    int ret = 0;
    if (enableIPv4)
        ret = virFileWriteStr("/proc/sys/net/ipv4/ip_forward", "1\n", 0);
    if (enableIPv6 && ret == 0)
        ret = virFileWriteStr("/proc/sys/net/ipv6/conf/all/forwarding", "1\n", 0);
    return ret;
1413 1414
}

1415 1416
#define SYSCTL_PATH "/proc/sys"

1417 1418
static int
networkSetIPv6Sysctls(virNetworkObjPtr network)
1419 1420 1421 1422
{
    char *field = NULL;
    int ret = -1;

1423 1424 1425 1426 1427 1428 1429 1430 1431
    if (!virNetworkDefGetIpByIndex(network->def, AF_INET6, 0)) {
        /* Only set disable_ipv6 if there are no ipv6 addresses defined for
         * the network.
         */
        if (virAsprintf(&field, SYSCTL_PATH "/net/ipv6/conf/%s/disable_ipv6",
                        network->def->bridge) < 0) {
            virReportOOMError();
            goto cleanup;
        }
1432

1433 1434 1435 1436 1437 1438
        if (access(field, W_OK) < 0 && errno == ENOENT) {
            VIR_DEBUG("ipv6 appears to already be disabled on %s",
                      network->def->bridge);
            ret = 0;
            goto cleanup;
        }
1439

1440 1441 1442 1443 1444 1445 1446
        if (virFileWriteStr(field, "1", 0) < 0) {
            virReportSystemError(errno,
                                 _("cannot write to %s to disable IPv6 on bridge %s"),
                                 field, network->def->bridge);
            goto cleanup;
        }
        VIR_FREE(field);
1447 1448
    }

1449 1450 1451 1452 1453 1454 1455 1456 1457
    /* The rest of the ipv6 sysctl tunables should always be set,
     * whether or not we're using ipv6 on this bridge.
     */

    /* Prevent guests from hijacking the host network by sending out
     * their own router advertisements.
     */
    if (virAsprintf(&field, SYSCTL_PATH "/net/ipv6/conf/%s/accept_ra",
                    network->def->bridge) < 0) {
1458
        virReportOOMError();
1459 1460 1461
        goto cleanup;
    }

1462
    if (virFileWriteStr(field, "0", 0) < 0) {
1463
        virReportSystemError(errno,
1464 1465 1466 1467 1468
                             _("cannot disable %s"), field);
        goto cleanup;
    }
    VIR_FREE(field);

1469 1470 1471 1472 1473
    /* All interfaces used as a gateway (which is what this is, by
     * definition), must always have autoconf=0.
     */
    if (virAsprintf(&field, SYSCTL_PATH "/net/ipv6/conf/%s/autoconf",
                    network->def->bridge) < 0) {
1474
        virReportOOMError();
1475 1476 1477
        goto cleanup;
    }

1478
    if (virFileWriteStr(field, "1", 0) < 0) {
1479
        virReportSystemError(errno,
1480 1481 1482 1483 1484 1485 1486 1487 1488 1489
                             _("cannot enable %s"), field);
        goto cleanup;
    }

    ret = 0;
cleanup:
    VIR_FREE(field);
    return ret;
}

1490 1491 1492 1493 1494 1495
#define PROC_NET_ROUTE "/proc/net/route"

/* XXX: This function can be a lot more exhaustive, there are certainly
 *      other scenarios where we can ruin host network connectivity.
 * XXX: Using a proper library is preferred over parsing /proc
 */
1496 1497
static int
networkCheckRouteCollision(virNetworkObjPtr network)
1498
{
1499
    int ret = 0, len;
1500 1501 1502 1503 1504
    char *cur, *buf = NULL;
    enum {MAX_ROUTE_SIZE = 1024*64};

    /* Read whole routing table into memory */
    if ((len = virFileReadAll(PROC_NET_ROUTE, MAX_ROUTE_SIZE, &buf)) < 0)
1505
        goto out;
1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523

    /* Dropping the last character shouldn't hurt */
    if (len > 0)
        buf[len-1] = '\0';

    VIR_DEBUG("%s output:\n%s", PROC_NET_ROUTE, buf);

    if (!STRPREFIX (buf, "Iface"))
        goto out;

    /* First line is just headings, skip it */
    cur = strchr(buf, '\n');
    if (cur)
        cur++;

    while (cur) {
        char iface[17], dest[128], mask[128];
        unsigned int addr_val, mask_val;
1524 1525
        virNetworkIpDefPtr ipdef;
        int num, ii;
1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553

        /* NUL-terminate the line, so sscanf doesn't go beyond a newline.  */
        char *nl = strchr(cur, '\n');
        if (nl) {
            *nl++ = '\0';
        }

        num = sscanf(cur, "%16s %127s %*s %*s %*s %*s %*s %127s",
                     iface, dest, mask);
        cur = nl;

        if (num != 3) {
            VIR_DEBUG("Failed to parse %s", PROC_NET_ROUTE);
            continue;
        }

        if (virStrToLong_ui(dest, NULL, 16, &addr_val) < 0) {
            VIR_DEBUG("Failed to convert network address %s to uint", dest);
            continue;
        }

        if (virStrToLong_ui(mask, NULL, 16, &mask_val) < 0) {
            VIR_DEBUG("Failed to convert network mask %s to uint", mask);
            continue;
        }

        addr_val &= mask_val;

1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577
        for (ii = 0;
             (ipdef = virNetworkDefGetIpByIndex(network->def, AF_INET, ii));
             ii++) {

            unsigned int net_dest;
            virSocketAddr netmask;

            if (virNetworkIpDefNetmask(ipdef, &netmask) < 0) {
                VIR_WARN("Failed to get netmask of '%s'",
                         network->def->bridge);
                continue;
            }

            net_dest = (ipdef->address.data.inet4.sin_addr.s_addr &
                        netmask.data.inet4.sin_addr.s_addr);

            if ((net_dest == addr_val) &&
                (netmask.data.inet4.sin_addr.s_addr == mask_val)) {
                networkReportError(VIR_ERR_INTERNAL_ERROR,
                                   _("Network is already in use by interface %s"),
                                   iface);
                ret = -1;
                goto out;
            }
1578 1579 1580 1581 1582 1583 1584 1585
        }
    }

out:
    VIR_FREE(buf);
    return ret;
}

1586 1587 1588 1589
static int
networkAddAddrToBridge(struct network_driver *driver,
                       virNetworkObjPtr network,
                       virNetworkIpDefPtr ipdef)
1590
{
1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615
    int prefix = virNetworkIpDefPrefix(ipdef);

    if (prefix < 0) {
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           _("bridge '%s' has an invalid netmask or IP address"),
                           network->def->bridge);
        return -1;
    }

    if (brAddInetAddress(driver->brctl, network->def->bridge,
                         &ipdef->address, prefix) < 0) {
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           _("cannot set IP address on bridge '%s'"),
                           network->def->bridge);
        return -1;
    }

    return 0;
}

static int
networkStartNetworkDaemon(struct network_driver *driver,
                          virNetworkObjPtr network)
{
    int ii, err;
1616
    bool v4present = false, v6present = false;
1617 1618
    virErrorPtr save_err = NULL;
    virNetworkIpDefPtr ipdef;
1619
    char *macTapIfName;
1620

D
Daniel P. Berrange 已提交
1621
    if (virNetworkObjIsActive(network)) {
1622
        networkReportError(VIR_ERR_OPERATION_INVALID,
1623
                           "%s", _("network is already active"));
1624 1625 1626
        return -1;
    }

1627 1628
    /* Check to see if any network IP collides with an existing route */
    if (networkCheckRouteCollision(network) < 0)
1629 1630
        return -1;

1631
    /* Create and configure the bridge device */
1632
    if ((err = brAddBridge(driver->brctl, network->def->bridge))) {
1633
        virReportSystemError(err,
1634 1635
                             _("cannot create bridge '%s'"),
                             network->def->bridge);
1636 1637 1638
        return -1;
    }

1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662
    if (network->def->mac_specified) {
        /* To set a mac for the bridge, we need to define a dummy tap
         * device, set its mac, then attach it to the bridge. As long
         * as its mac address is lower than any other interface that
         * gets attached, the bridge will always maintain this mac
         * address.
         */
        macTapIfName = networkBridgeDummyNicName(network->def->bridge);
        if (!macTapIfName) {
            virReportOOMError();
            goto err0;
        }
        if ((err = brAddTap(driver->brctl, network->def->bridge,
                            &macTapIfName, network->def->mac, 0, false, NULL))) {
            virReportSystemError(err,
                                 _("cannot create dummy tap device '%s' to set mac"
                                   " address on bridge '%s'"),
                                 macTapIfName, network->def->bridge);
            VIR_FREE(macTapIfName);
            goto err0;
        }
        VIR_FREE(macTapIfName);
    }

1663
    /* Set bridge options */
E
Eric Blake 已提交
1664 1665
    if (brSetForwardDelay(driver->brctl, network->def->bridge,
                          network->def->delay)) {
1666 1667 1668
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           _("cannot set forward delay on bridge '%s'"),
                           network->def->bridge);
1669
        goto err1;
1670 1671
    }

E
Eric Blake 已提交
1672 1673
    if (brSetEnableSTP(driver->brctl, network->def->bridge,
                       network->def->stp ? 1 : 0)) {
1674
        networkReportError(VIR_ERR_INTERNAL_ERROR,
1675 1676
                           _("cannot set STP '%s' on bridge '%s'"),
                           network->def->stp ? "on" : "off", network->def->bridge);
1677
        goto err1;
1678 1679
    }

1680 1681 1682 1683
    /* Disable IPv6 on the bridge if there are no IPv6 addresses
     * defined, and set other IPv6 sysctl tunables appropriately.
     */
    if (networkSetIPv6Sysctls(network) < 0)
1684
        goto err1;
1685

1686 1687 1688 1689 1690 1691 1692 1693 1694
    /* Add "once per network" rules */
    if (networkAddIptablesRules(driver, network) < 0)
        goto err1;

    for (ii = 0;
         (ipdef = virNetworkDefGetIpByIndex(network->def, AF_UNSPEC, ii));
         ii++) {
        if (VIR_SOCKET_IS_FAMILY(&ipdef->address, AF_INET))
            v4present = true;
1695 1696
        if (VIR_SOCKET_IS_FAMILY(&ipdef->address, AF_INET6))
            v6present = true;
1697

1698 1699 1700
        /* Add the IP address/netmask to the bridge */
        if (networkAddAddrToBridge(driver, network, ipdef) < 0) {
            goto err2;
1701
        }
1702 1703
    }

1704
    /* Bring up the bridge interface */
1705
    if ((err = brSetInterfaceUp(driver->brctl, network->def->bridge, 1))) {
1706
        virReportSystemError(err,
1707 1708
                             _("failed to bring the bridge '%s' up"),
                             network->def->bridge);
1709
        goto err2;
1710 1711
    }

1712
    /* If forwardType != NONE, turn on global IP forwarding */
1713
    if (network->def->forwardType != VIR_NETWORK_FORWARD_NONE &&
1714
        networkEnableIpForwarding(v4present, v6present) < 0) {
1715
        virReportSystemError(errno, "%s",
1716
                             _("failed to enable IP forwarding"));
1717
        goto err3;
1718 1719
    }

1720

1721 1722
    /* start dnsmasq if there are any IP addresses (v4 or v6) */
    if ((v4present || v6present) && networkStartDhcpDaemon(network) < 0)
1723
        goto err3;
1724

1725 1726 1727 1728
    /* start radvd if there are any ipv6 addresses */
    if (v6present && networkStartRadvd(network) < 0)
        goto err4;

1729
    /* Persist the live configuration now we have bridge info  */
1730
    if (virNetworkSaveConfig(NETWORK_STATE_DIR, network->def) < 0) {
1731
        goto err5;
1732 1733
    }

1734 1735 1736 1737
    network->active = 1;

    return 0;

1738 1739 1740 1741 1742 1743 1744 1745 1746
 err5:
    if (!save_err)
        save_err = virSaveLastError();

    if (network->radvdPid > 0) {
        kill(network->radvdPid, SIGTERM);
        network->radvdPid = -1;
    }

1747 1748 1749 1750
 err4:
    if (!save_err)
        save_err = virSaveLastError();

1751 1752 1753 1754 1755
    if (network->dnsmasqPid > 0) {
        kill(network->dnsmasqPid, SIGTERM);
        network->dnsmasqPid = -1;
    }

1756 1757 1758
 err3:
    if (!save_err)
        save_err = virSaveLastError();
1759
    if ((err = brSetInterfaceUp(driver->brctl, network->def->bridge, 0))) {
1760
        char ebuf[1024];
1761
        VIR_WARN("Failed to bring down bridge '%s' : %s",
1762
                 network->def->bridge, virStrerror(err, ebuf, sizeof ebuf));
1763 1764
    }

1765 1766 1767 1768 1769 1770
 err2:
    if (!save_err)
        save_err = virSaveLastError();
    networkRemoveIptablesRules(driver, network);

 err1:
1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781
    if (!save_err)
        save_err = virSaveLastError();

    if ((err = brDeleteTap(driver->brctl, macTapIfName))) {
        char ebuf[1024];
        VIR_WARN("Failed to delete dummy tap device '%s' on bridge '%s' : %s",
                 macTapIfName, network->def->bridge,
                 virStrerror(err, ebuf, sizeof ebuf));
    }

 err0:
1782 1783
    if (!save_err)
        save_err = virSaveLastError();
1784
    if ((err = brDeleteBridge(driver->brctl, network->def->bridge))) {
1785
        char ebuf[1024];
1786
        VIR_WARN("Failed to delete bridge '%s' : %s",
1787
                 network->def->bridge, virStrerror(err, ebuf, sizeof ebuf));
1788 1789
    }

1790 1791 1792 1793
    if (save_err) {
        virSetError(save_err);
        virFreeError(save_err);
    }
1794 1795 1796 1797
    return -1;
}


1798 1799 1800
static int networkShutdownNetworkDaemon(struct network_driver *driver,
                                        virNetworkObjPtr network)
{
1801
    int err;
1802
    char *stateFile;
1803
    char *macTapIfName;
1804

1805
    VIR_INFO(_("Shutting down network '%s'"), network->def->name);
1806

D
Daniel P. Berrange 已提交
1807
    if (!virNetworkObjIsActive(network))
1808 1809
        return 0;

1810
    stateFile = virNetworkConfigFile(NETWORK_STATE_DIR, network->def->name);
1811 1812 1813 1814 1815 1816
    if (!stateFile)
        return -1;

    unlink(stateFile);
    VIR_FREE(stateFile);

1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829
    if (network->radvdPid > 0) {
        char *radvdpidbase;

        kill(network->radvdPid, SIGTERM);
        /* attempt to delete the pidfile we created */
        if (!(radvdpidbase = networkRadvdPidfileBasename(network->def->name))) {
            virReportOOMError();
        } else {
            virFileDeletePid(NETWORK_PID_DIR, radvdpidbase);
            VIR_FREE(radvdpidbase);
        }
    }

1830 1831 1832
    if (network->dnsmasqPid > 0)
        kill(network->dnsmasqPid, SIGTERM);

1833
    char ebuf[1024];
1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848

    if (network->def->mac_specified) {
        macTapIfName = networkBridgeDummyNicName(network->def->bridge);
        if (!macTapIfName) {
            virReportOOMError();
        } else {
            if ((err = brDeleteTap(driver->brctl, macTapIfName))) {
                VIR_WARN("Failed to delete dummy tap device '%s' on bridge '%s' : %s",
                         macTapIfName, network->def->bridge,
                         virStrerror(err, ebuf, sizeof ebuf));
            }
            VIR_FREE(macTapIfName);
        }
    }

1849
    if ((err = brSetInterfaceUp(driver->brctl, network->def->bridge, 0))) {
1850
        VIR_WARN("Failed to bring down bridge '%s' : %s",
1851
                 network->def->bridge, virStrerror(err, ebuf, sizeof ebuf));
1852 1853
    }

1854 1855
    networkRemoveIptablesRules(driver, network);

1856
    if ((err = brDeleteBridge(driver->brctl, network->def->bridge))) {
1857
        VIR_WARN("Failed to delete bridge '%s' : %s",
1858
                 network->def->bridge, virStrerror(err, ebuf, sizeof ebuf));
1859 1860
    }

1861
    /* See if its still alive and really really kill it */
1862
    if (network->dnsmasqPid > 0 &&
1863
        (kill(network->dnsmasqPid, 0) == 0))
1864 1865
        kill(network->dnsmasqPid, SIGKILL);
    network->dnsmasqPid = -1;
1866 1867 1868 1869 1870 1871

    if (network->radvdPid > 0 &&
        (kill(network->radvdPid, 0) == 0))
        kill(network->radvdPid, SIGKILL);
    network->radvdPid = -1;

1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883
    network->active = 0;

    if (network->newDef) {
        virNetworkDefFree(network->def);
        network->def = network->newDef;
        network->newDef = NULL;
    }

    return 0;
}


1884 1885 1886 1887 1888
static virNetworkPtr networkLookupByUUID(virConnectPtr conn,
                                         const unsigned char *uuid) {
    struct network_driver *driver = conn->networkPrivateData;
    virNetworkObjPtr network;
    virNetworkPtr ret = NULL;
1889

1890
    networkDriverLock(driver);
1891
    network = virNetworkFindByUUID(&driver->networks, uuid);
1892
    networkDriverUnlock(driver);
1893
    if (!network) {
1894 1895
        networkReportError(VIR_ERR_NO_NETWORK,
                           "%s", _("no network with matching uuid"));
1896
        goto cleanup;
1897 1898
    }

1899 1900 1901
    ret = virGetNetwork(conn, network->def->name, network->def->uuid);

cleanup:
1902 1903
    if (network)
        virNetworkObjUnlock(network);
1904
    return ret;
1905 1906
}

1907 1908 1909 1910 1911 1912
static virNetworkPtr networkLookupByName(virConnectPtr conn,
                                         const char *name) {
    struct network_driver *driver = conn->networkPrivateData;
    virNetworkObjPtr network;
    virNetworkPtr ret = NULL;

1913
    networkDriverLock(driver);
1914
    network = virNetworkFindByName(&driver->networks, name);
1915
    networkDriverUnlock(driver);
1916
    if (!network) {
1917 1918
        networkReportError(VIR_ERR_NO_NETWORK,
                           _("no network with matching name '%s'"), name);
1919
        goto cleanup;
1920 1921
    }

1922 1923 1924
    ret = virGetNetwork(conn, network->def->name, network->def->uuid);

cleanup:
1925 1926
    if (network)
        virNetworkObjUnlock(network);
1927
    return ret;
1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945
}

static virDrvOpenStatus networkOpenNetwork(virConnectPtr conn,
                                           virConnectAuthPtr auth ATTRIBUTE_UNUSED,
                                           int flags ATTRIBUTE_UNUSED) {
    if (!driverState)
        return VIR_DRV_OPEN_DECLINED;

    conn->networkPrivateData = driverState;
    return VIR_DRV_OPEN_SUCCESS;
}

static int networkCloseNetwork(virConnectPtr conn) {
    conn->networkPrivateData = NULL;
    return 0;
}

static int networkNumNetworks(virConnectPtr conn) {
1946
    int nactive = 0, i;
1947
    struct network_driver *driver = conn->networkPrivateData;
1948

1949 1950 1951
    networkDriverLock(driver);
    for (i = 0 ; i < driver->networks.count ; i++) {
        virNetworkObjLock(driver->networks.objs[i]);
D
Daniel P. Berrange 已提交
1952
        if (virNetworkObjIsActive(driver->networks.objs[i]))
1953
            nactive++;
1954 1955 1956
        virNetworkObjUnlock(driver->networks.objs[i]);
    }
    networkDriverUnlock(driver);
1957

1958 1959 1960 1961
    return nactive;
}

static int networkListNetworks(virConnectPtr conn, char **const names, int nnames) {
1962
    struct network_driver *driver = conn->networkPrivateData;
1963
    int got = 0, i;
1964

1965
    networkDriverLock(driver);
1966
    for (i = 0 ; i < driver->networks.count && got < nnames ; i++) {
1967
        virNetworkObjLock(driver->networks.objs[i]);
D
Daniel P. Berrange 已提交
1968
        if (virNetworkObjIsActive(driver->networks.objs[i])) {
1969
            if (!(names[got] = strdup(driver->networks.objs[i]->def->name))) {
1970
                virNetworkObjUnlock(driver->networks.objs[i]);
1971
                virReportOOMError();
1972 1973 1974 1975
                goto cleanup;
            }
            got++;
        }
1976
        virNetworkObjUnlock(driver->networks.objs[i]);
1977
    }
1978 1979
    networkDriverUnlock(driver);

1980 1981 1982
    return got;

 cleanup:
1983
    networkDriverUnlock(driver);
1984 1985 1986 1987 1988 1989
    for (i = 0 ; i < got ; i++)
        VIR_FREE(names[i]);
    return -1;
}

static int networkNumDefinedNetworks(virConnectPtr conn) {
1990
    int ninactive = 0, i;
1991
    struct network_driver *driver = conn->networkPrivateData;
1992

1993 1994 1995
    networkDriverLock(driver);
    for (i = 0 ; i < driver->networks.count ; i++) {
        virNetworkObjLock(driver->networks.objs[i]);
D
Daniel P. Berrange 已提交
1996
        if (!virNetworkObjIsActive(driver->networks.objs[i]))
1997
            ninactive++;
1998 1999 2000
        virNetworkObjUnlock(driver->networks.objs[i]);
    }
    networkDriverUnlock(driver);
2001

2002 2003 2004 2005
    return ninactive;
}

static int networkListDefinedNetworks(virConnectPtr conn, char **const names, int nnames) {
2006
    struct network_driver *driver = conn->networkPrivateData;
2007
    int got = 0, i;
2008

2009
    networkDriverLock(driver);
2010
    for (i = 0 ; i < driver->networks.count && got < nnames ; i++) {
2011
        virNetworkObjLock(driver->networks.objs[i]);
D
Daniel P. Berrange 已提交
2012
        if (!virNetworkObjIsActive(driver->networks.objs[i])) {
2013
            if (!(names[got] = strdup(driver->networks.objs[i]->def->name))) {
2014
                virNetworkObjUnlock(driver->networks.objs[i]);
2015
                virReportOOMError();
2016 2017 2018 2019
                goto cleanup;
            }
            got++;
        }
2020
        virNetworkObjUnlock(driver->networks.objs[i]);
2021
    }
2022
    networkDriverUnlock(driver);
2023 2024 2025
    return got;

 cleanup:
2026
    networkDriverUnlock(driver);
2027 2028 2029 2030 2031
    for (i = 0 ; i < got ; i++)
        VIR_FREE(names[i]);
    return -1;
}

2032 2033 2034

static int networkIsActive(virNetworkPtr net)
{
2035
    struct network_driver *driver = net->conn->networkPrivateData;
2036 2037 2038 2039 2040 2041 2042
    virNetworkObjPtr obj;
    int ret = -1;

    networkDriverLock(driver);
    obj = virNetworkFindByUUID(&driver->networks, net->uuid);
    networkDriverUnlock(driver);
    if (!obj) {
2043
        networkReportError(VIR_ERR_NO_NETWORK, NULL);
2044 2045 2046 2047 2048 2049 2050 2051 2052 2053 2054 2055
        goto cleanup;
    }
    ret = virNetworkObjIsActive(obj);

cleanup:
    if (obj)
        virNetworkObjUnlock(obj);
    return ret;
}

static int networkIsPersistent(virNetworkPtr net)
{
2056
    struct network_driver *driver = net->conn->networkPrivateData;
2057 2058 2059 2060 2061 2062 2063
    virNetworkObjPtr obj;
    int ret = -1;

    networkDriverLock(driver);
    obj = virNetworkFindByUUID(&driver->networks, net->uuid);
    networkDriverUnlock(driver);
    if (!obj) {
2064
        networkReportError(VIR_ERR_NO_NETWORK, NULL);
2065 2066 2067 2068 2069 2070 2071 2072 2073 2074 2075
        goto cleanup;
    }
    ret = obj->persistent;

cleanup:
    if (obj)
        virNetworkObjUnlock(obj);
    return ret;
}


2076
static virNetworkPtr networkCreate(virConnectPtr conn, const char *xml) {
2077
    struct network_driver *driver = conn->networkPrivateData;
2078
    virNetworkDefPtr def;
2079
    virNetworkObjPtr network = NULL;
2080
    virNetworkPtr ret = NULL;
2081

2082 2083
    networkDriverLock(driver);

2084
    if (!(def = virNetworkDefParseString(xml)))
2085
        goto cleanup;
2086

2087 2088 2089
    if (virNetworkObjIsDuplicate(&driver->networks, def, 1) < 0)
        goto cleanup;

2090
    if (virNetworkSetBridgeName(&driver->networks, def, 1))
2091 2092
        goto cleanup;

2093 2094
    virNetworkSetBridgeMacAddr(def);

2095
    if (!(network = virNetworkAssignDef(&driver->networks,
2096 2097 2098
                                        def)))
        goto cleanup;
    def = NULL;
2099

2100
    if (networkStartNetworkDaemon(driver, network) < 0) {
2101 2102
        virNetworkRemoveInactive(&driver->networks,
                                 network);
2103
        network = NULL;
2104
        goto cleanup;
2105 2106
    }

2107 2108 2109 2110
    ret = virGetNetwork(conn, network->def->name, network->def->uuid);

cleanup:
    virNetworkDefFree(def);
2111 2112 2113
    if (network)
        virNetworkObjUnlock(network);
    networkDriverUnlock(driver);
2114
    return ret;
2115 2116 2117
}

static virNetworkPtr networkDefine(virConnectPtr conn, const char *xml) {
2118
    struct network_driver *driver = conn->networkPrivateData;
2119
    virNetworkIpDefPtr ipdef, ipv4def = NULL;
2120
    virNetworkDefPtr def;
2121
    virNetworkObjPtr network = NULL;
2122
    virNetworkPtr ret = NULL;
2123
    int ii;
2124

2125 2126
    networkDriverLock(driver);

2127
    if (!(def = virNetworkDefParseString(xml)))
2128
        goto cleanup;
2129

E
Eric Blake 已提交
2130
    if (virNetworkObjIsDuplicate(&driver->networks, def, 0) < 0)
2131 2132
        goto cleanup;

2133
    if (virNetworkSetBridgeName(&driver->networks, def, 1))
2134 2135
        goto cleanup;

2136 2137
    virNetworkSetBridgeMacAddr(def);

2138
    if (!(network = virNetworkAssignDef(&driver->networks,
2139 2140 2141
                                        def)))
        goto cleanup;
    def = NULL;
2142

2143 2144
    network->persistent = 1;

2145
    if (virNetworkSaveConfig(driver->networkConfigDir,
2146
                             network->newDef ? network->newDef : network->def) < 0) {
2147 2148
        virNetworkRemoveInactive(&driver->networks,
                                 network);
2149
        network = NULL;
2150
        goto cleanup;
2151 2152
    }

2153
    /* We only support dhcp on one IPv4 address per defined network */
2154 2155 2156 2157 2158 2159 2160 2161 2162 2163 2164 2165 2166 2167 2168 2169
    for (ii = 0;
         (ipdef = virNetworkDefGetIpByIndex(network->def, AF_UNSPEC, ii));
         ii++) {
        if (VIR_SOCKET_IS_FAMILY(&ipdef->address, AF_INET)) {
            if (ipdef->nranges || ipdef->nhosts) {
                if (ipv4def) {
                    networkReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                                       "%s", _("Multiple dhcp sections found. dhcp is supported only for a single IPv4 address on each network"));
                    goto cleanup;
                } else {
                    ipv4def = ipdef;
                }
            }
        }
    }
    if (ipv4def) {
2170 2171 2172 2173
        dnsmasqContext *dctx = dnsmasqContextNew(network->def->name, DNSMASQ_STATE_DIR);
        if (dctx == NULL)
            goto cleanup;

2174
        networkSaveDnsmasqHostsfile(ipv4def, dctx, true);
2175 2176 2177
        dnsmasqContextFree(dctx);
    }

2178 2179 2180 2181
    ret = virGetNetwork(conn, network->def->name, network->def->uuid);

cleanup:
    virNetworkDefFree(def);
2182 2183 2184
    if (network)
        virNetworkObjUnlock(network);
    networkDriverUnlock(driver);
2185
    return ret;
2186 2187 2188
}

static int networkUndefine(virNetworkPtr net) {
2189
    struct network_driver *driver = net->conn->networkPrivateData;
2190
    virNetworkObjPtr network;
2191 2192
    virNetworkIpDefPtr ipdef;
    bool dhcp_present = false, v6present = false;
2193
    int ret = -1, ii;
2194

2195 2196
    networkDriverLock(driver);

2197
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
2198
    if (!network) {
2199
        networkReportError(VIR_ERR_NO_NETWORK,
2200 2201
                           "%s", _("no network with matching uuid"));
        goto cleanup;
2202 2203
    }

D
Daniel P. Berrange 已提交
2204
    if (virNetworkObjIsActive(network)) {
2205
        networkReportError(VIR_ERR_OPERATION_INVALID,
2206 2207
                           "%s", _("network is still active"));
        goto cleanup;
2208 2209
    }

2210
    if (virNetworkDeleteConfig(driver->networkConfigDir,
2211 2212
                               driver->networkAutostartDir,
                               network) < 0)
2213
        goto cleanup;
2214

2215 2216
    /* we only support dhcp on one IPv4 address per defined network */
    for (ii = 0;
2217
         (ipdef = virNetworkDefGetIpByIndex(network->def, AF_UNSPEC, ii));
2218
         ii++) {
2219 2220 2221 2222 2223 2224
        if (VIR_SOCKET_IS_FAMILY(&ipdef->address, AF_INET)) {
            if (ipdef->nranges || ipdef->nhosts)
                dhcp_present = true;
        } else if (VIR_SOCKET_IS_FAMILY(&ipdef->address, AF_INET6)) {
            v6present = true;
        }
2225
    }
2226 2227

    if (dhcp_present) {
2228
        char *leasefile;
2229 2230 2231 2232 2233 2234
        dnsmasqContext *dctx = dnsmasqContextNew(network->def->name, DNSMASQ_STATE_DIR);
        if (dctx == NULL)
            goto cleanup;

        dnsmasqDelete(dctx);
        dnsmasqContextFree(dctx);
2235 2236 2237 2238 2239 2240

        leasefile = networkDnsmasqLeaseFileName(network->def->name);
        if (!leasefile)
            goto cleanup;
        unlink(leasefile);
        VIR_FREE(leasefile);
2241 2242
    }

2243 2244 2245 2246 2247 2248 2249 2250 2251 2252 2253 2254 2255 2256 2257 2258 2259 2260 2261 2262 2263
    if (v6present) {
        char *configfile = networkRadvdConfigFileName(network->def->name);

        if (!configfile) {
            virReportOOMError();
            goto cleanup;
        }
        unlink(configfile);
        VIR_FREE(configfile);

        char *radvdpidbase = networkRadvdPidfileBasename(network->def->name);

        if (!(radvdpidbase)) {
            virReportOOMError();
            goto cleanup;
        }
        virFileDeletePid(NETWORK_PID_DIR, radvdpidbase);
        VIR_FREE(radvdpidbase);

    }

2264 2265
    virNetworkRemoveInactive(&driver->networks,
                             network);
2266
    network = NULL;
2267
    ret = 0;
2268

2269
cleanup:
2270 2271 2272
    if (network)
        virNetworkObjUnlock(network);
    networkDriverUnlock(driver);
2273
    return ret;
2274 2275 2276
}

static int networkStart(virNetworkPtr net) {
2277 2278 2279
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    int ret = -1;
2280

2281
    networkDriverLock(driver);
2282
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
2283

2284
    if (!network) {
2285
        networkReportError(VIR_ERR_NO_NETWORK,
2286 2287
                           "%s", _("no network with matching uuid"));
        goto cleanup;
2288 2289
    }

2290
    ret = networkStartNetworkDaemon(driver, network);
2291 2292

cleanup:
2293 2294
    if (network)
        virNetworkObjUnlock(network);
2295
    networkDriverUnlock(driver);
2296
    return ret;
2297 2298 2299
}

static int networkDestroy(virNetworkPtr net) {
2300 2301 2302
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    int ret = -1;
2303

2304
    networkDriverLock(driver);
2305
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
2306

2307
    if (!network) {
2308
        networkReportError(VIR_ERR_NO_NETWORK,
2309 2310
                           "%s", _("no network with matching uuid"));
        goto cleanup;
2311 2312
    }

D
Daniel P. Berrange 已提交
2313
    if (!virNetworkObjIsActive(network)) {
2314
        networkReportError(VIR_ERR_OPERATION_INVALID,
2315 2316 2317 2318
                           "%s", _("network is not active"));
        goto cleanup;
    }

2319
    ret = networkShutdownNetworkDaemon(driver, network);
2320
    if (!network->persistent) {
2321 2322 2323 2324
        virNetworkRemoveInactive(&driver->networks,
                                 network);
        network = NULL;
    }
2325

2326
cleanup:
2327 2328
    if (network)
        virNetworkObjUnlock(network);
2329
    networkDriverUnlock(driver);
2330 2331 2332 2333
    return ret;
}

static char *networkDumpXML(virNetworkPtr net, int flags ATTRIBUTE_UNUSED) {
2334 2335 2336
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    char *ret = NULL;
2337

2338
    networkDriverLock(driver);
2339
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
2340 2341
    networkDriverUnlock(driver);

2342
    if (!network) {
2343
        networkReportError(VIR_ERR_NO_NETWORK,
2344 2345
                           "%s", _("no network with matching uuid"));
        goto cleanup;
2346 2347
    }

2348
    ret = virNetworkDefFormat(network->def);
2349 2350

cleanup:
2351 2352
    if (network)
        virNetworkObjUnlock(network);
2353
    return ret;
2354 2355 2356
}

static char *networkGetBridgeName(virNetworkPtr net) {
2357 2358 2359 2360
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    char *bridge = NULL;

2361
    networkDriverLock(driver);
2362
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
2363 2364
    networkDriverUnlock(driver);

2365
    if (!network) {
2366
        networkReportError(VIR_ERR_NO_NETWORK,
2367 2368
                           "%s", _("no network with matching id"));
        goto cleanup;
2369 2370
    }

2371
    if (!(network->def->bridge)) {
2372
        networkReportError(VIR_ERR_INTERNAL_ERROR,
2373 2374 2375 2376 2377
                           _("network '%s' does not have a bridge name."),
                           network->def->name);
        goto cleanup;
    }

2378
    bridge = strdup(network->def->bridge);
2379
    if (!bridge)
2380
        virReportOOMError();
2381 2382

cleanup:
2383 2384
    if (network)
        virNetworkObjUnlock(network);
2385 2386 2387 2388 2389
    return bridge;
}

static int networkGetAutostart(virNetworkPtr net,
                             int *autostart) {
2390 2391 2392
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    int ret = -1;
2393

2394
    networkDriverLock(driver);
2395
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
2396
    networkDriverUnlock(driver);
2397
    if (!network) {
2398
        networkReportError(VIR_ERR_NO_NETWORK,
2399
                           "%s", _("no network with matching uuid"));
2400
        goto cleanup;
2401 2402 2403
    }

    *autostart = network->autostart;
2404
    ret = 0;
2405

2406
cleanup:
2407 2408
    if (network)
        virNetworkObjUnlock(network);
2409
    return ret;
2410 2411 2412
}

static int networkSetAutostart(virNetworkPtr net,
2413
                               int autostart) {
2414 2415
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
2416
    char *configFile = NULL, *autostartLink = NULL;
2417
    int ret = -1;
2418

2419
    networkDriverLock(driver);
2420
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
2421

2422
    if (!network) {
2423
        networkReportError(VIR_ERR_NO_NETWORK,
2424
                           "%s", _("no network with matching uuid"));
2425
        goto cleanup;
2426 2427
    }

2428
    if (!network->persistent) {
2429
        networkReportError(VIR_ERR_OPERATION_INVALID,
2430
                           "%s", _("cannot set autostart for transient network"));
2431 2432 2433
        goto cleanup;
    }

2434 2435
    autostart = (autostart != 0);

2436
    if (network->autostart != autostart) {
2437
        if ((configFile = virNetworkConfigFile(driver->networkConfigDir, network->def->name)) == NULL)
2438
            goto cleanup;
2439
        if ((autostartLink = virNetworkConfigFile(driver->networkAutostartDir, network->def->name)) == NULL)
2440 2441
            goto cleanup;

2442
        if (autostart) {
2443
            if (virFileMakePath(driver->networkAutostartDir)) {
2444
                virReportSystemError(errno,
2445 2446
                                     _("cannot create autostart directory '%s'"),
                                     driver->networkAutostartDir);
2447 2448
                goto cleanup;
            }
2449

2450
            if (symlink(configFile, autostartLink) < 0) {
2451
                virReportSystemError(errno,
2452
                                     _("Failed to create symlink '%s' to '%s'"),
2453
                                     autostartLink, configFile);
2454 2455 2456
                goto cleanup;
            }
        } else {
2457
            if (unlink(autostartLink) < 0 && errno != ENOENT && errno != ENOTDIR) {
2458
                virReportSystemError(errno,
2459
                                     _("Failed to delete symlink '%s'"),
2460
                                     autostartLink);
2461 2462
                goto cleanup;
            }
2463 2464
        }

2465
        network->autostart = autostart;
2466
    }
2467
    ret = 0;
2468

2469
cleanup:
2470 2471
    VIR_FREE(configFile);
    VIR_FREE(autostartLink);
2472 2473
    if (network)
        virNetworkObjUnlock(network);
2474
    networkDriverUnlock(driver);
2475
    return ret;
2476 2477 2478 2479 2480 2481 2482 2483 2484 2485 2486 2487 2488 2489 2490 2491 2492 2493 2494 2495 2496 2497
}


static virNetworkDriver networkDriver = {
    "Network",
    networkOpenNetwork, /* open */
    networkCloseNetwork, /* close */
    networkNumNetworks, /* numOfNetworks */
    networkListNetworks, /* listNetworks */
    networkNumDefinedNetworks, /* numOfDefinedNetworks */
    networkListDefinedNetworks, /* listDefinedNetworks */
    networkLookupByUUID, /* networkLookupByUUID */
    networkLookupByName, /* networkLookupByName */
    networkCreate, /* networkCreateXML */
    networkDefine, /* networkDefineXML */
    networkUndefine, /* networkUndefine */
    networkStart, /* networkCreate */
    networkDestroy, /* networkDestroy */
    networkDumpXML, /* networkDumpXML */
    networkGetBridgeName, /* networkGetBridgeName */
    networkGetAutostart, /* networkGetAutostart */
    networkSetAutostart, /* networkSetAutostart */
2498 2499
    networkIsActive,
    networkIsPersistent,
2500 2501 2502
};

static virStateDriver networkStateDriver = {
2503
    "Network",
2504 2505 2506 2507 2508 2509 2510 2511 2512 2513 2514
    networkStartup,
    networkShutdown,
    networkReload,
    networkActive,
};

int networkRegister(void) {
    virRegisterNetworkDriver(&networkDriver);
    virRegisterStateDriver(&networkStateDriver);
    return 0;
}