bridge_driver.c 55.9 KB
Newer Older
1
/*
2
 * bridge_driver.c: core driver methods for managing network
3
 *
4
 * Copyright (C) 2006-2010 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45
 * Copyright (C) 2006 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this library; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307  USA
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 */

#include <config.h>

#include <sys/types.h>
#include <sys/poll.h>
#include <dirent.h>
#include <limits.h>
#include <string.h>
#include <stdio.h>
#include <stdarg.h>
#include <stdlib.h>
#include <unistd.h>
#include <errno.h>
#include <sys/utsname.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <signal.h>
#include <paths.h>
#include <pwd.h>
#include <stdio.h>
#include <sys/wait.h>
#include <sys/ioctl.h>

46
#include "virterror_internal.h"
47
#include "datatypes.h"
48
#include "bridge_driver.h"
49 50 51 52 53 54 55 56 57
#include "network_conf.h"
#include "driver.h"
#include "event.h"
#include "buf.h"
#include "util.h"
#include "memory.h"
#include "uuid.h"
#include "iptables.h"
#include "bridge.h"
58
#include "logging.h"
59
#include "dnsmasq.h"
60
#include "util/network.h"
61

62 63
#define NETWORK_PID_DIR LOCAL_STATE_DIR "/run/libvirt/network"
#define NETWORK_STATE_DIR LOCAL_STATE_DIR "/lib/libvirt/network"
64

65
#define DNSMASQ_STATE_DIR LOCAL_STATE_DIR "/lib/libvirt/dnsmasq"
66

67 68
#define VIR_FROM_THIS VIR_FROM_NETWORK

69
#define networkReportError(code, ...)                                   \
70
    virReportErrorHelper(NULL, VIR_FROM_NETWORK, code, __FILE__,        \
71
                         __FUNCTION__, __LINE__, __VA_ARGS__)
72

73 74
/* Main driver state */
struct network_driver {
75
    virMutex lock;
76

77
    virNetworkObjList networks;
78 79 80 81 82 83 84 85

    iptablesContext *iptables;
    brControl *brctl;
    char *networkConfigDir;
    char *networkAutostartDir;
    char *logDir;
};

86 87 88

static void networkDriverLock(struct network_driver *driver)
{
89
    virMutexLock(&driver->lock);
90 91 92
}
static void networkDriverUnlock(struct network_driver *driver)
{
93
    virMutexUnlock(&driver->lock);
94 95
}

96 97
static int networkShutdown(void);

98 99
static int networkStartNetworkDaemon(struct network_driver *driver,
                                     virNetworkObjPtr network);
100

101 102
static int networkShutdownNetworkDaemon(struct network_driver *driver,
                                        virNetworkObjPtr network);
103

104 105
static void networkReloadIptablesRules(struct network_driver *driver);

106 107 108
static struct network_driver *driverState = NULL;


109 110 111 112 113 114 115 116 117 118 119
static void
networkFindActiveConfigs(struct network_driver *driver) {
    unsigned int i;

    for (i = 0 ; i < driver->networks.count ; i++) {
        virNetworkObjPtr obj = driver->networks.objs[i];
        virNetworkDefPtr tmp;
        char *config;

        virNetworkObjLock(obj);

120
        if ((config = virNetworkConfigFile(NETWORK_STATE_DIR,
121 122 123 124 125 126 127 128 129 130 131 132
                                           obj->def->name)) == NULL) {
            virNetworkObjUnlock(obj);
            continue;
        }

        if (access(config, R_OK) < 0) {
            VIR_FREE(config);
            virNetworkObjUnlock(obj);
            continue;
        }

        /* Try and load the live config */
133
        tmp = virNetworkDefParseFile(config);
134 135 136 137 138 139 140 141 142 143 144
        VIR_FREE(config);
        if (tmp) {
            obj->newDef = obj->def;
            obj->def = tmp;
        }

        /* If bridge exists, then mark it active */
        if (obj->def->bridge &&
            brHasBridge(driver->brctl, obj->def->bridge) == 0) {
            obj->active = 1;

145 146 147
            /* Finally try and read dnsmasq pid if any */
            if ((obj->def->ipAddress ||
                 obj->def->nranges) &&
148 149 150 151 152 153 154 155 156 157
                virFileReadPid(NETWORK_PID_DIR, obj->def->name,
                               &obj->dnsmasqPid) == 0) {

                /* Check its still alive */
                if (kill(obj->dnsmasqPid, 0) != 0)
                    obj->dnsmasqPid = -1;

#ifdef __linux__
                char *pidpath;

158
                if (virAsprintf(&pidpath, "/proc/%d/exe", obj->dnsmasqPid) < 0) {
159
                    virReportOOMError();
160 161
                    goto cleanup;
                }
162 163 164 165 166 167 168
                if (virFileLinkPointsTo(pidpath, DNSMASQ) == 0)
                    obj->dnsmasqPid = -1;
                VIR_FREE(pidpath);
#endif
            }
        }

169
    cleanup:
170 171 172 173 174
        virNetworkObjUnlock(obj);
    }
}


175 176 177
static void
networkAutostartConfigs(struct network_driver *driver) {
    unsigned int i;
178

179
    for (i = 0 ; i < driver->networks.count ; i++) {
180
        virNetworkObjLock(driver->networks.objs[i]);
181
        if (driver->networks.objs[i]->autostart &&
D
Daniel P. Berrange 已提交
182
            !virNetworkObjIsActive(driver->networks.objs[i]) &&
183
            networkStartNetworkDaemon(driver, driver->networks.objs[i]) < 0) {
184
            /* failed to start but already logged */
185
        }
186
        virNetworkObjUnlock(driver->networks.objs[i]);
187 188 189 190 191 192 193 194 195
    }
}

/**
 * networkStartup:
 *
 * Initialization function for the QEmu daemon
 */
static int
196
networkStartup(int privileged) {
197 198
    uid_t uid = geteuid();
    char *base = NULL;
199
    int err;
200 201

    if (VIR_ALLOC(driverState) < 0)
202
        goto error;
203

204 205 206 207
    if (virMutexInit(&driverState->lock) < 0) {
        VIR_FREE(driverState);
        goto error;
    }
208 209
    networkDriverLock(driverState);

210
    if (privileged) {
211 212
        if (virAsprintf(&driverState->logDir,
                        "%s/log/libvirt/qemu", LOCAL_STATE_DIR) == -1)
213 214 215 216 217
            goto out_of_memory;

        if ((base = strdup (SYSCONF_DIR "/libvirt")) == NULL)
            goto out_of_memory;
    } else {
218
        char *userdir = virGetUserDirectory(uid);
219 220 221

        if (!userdir)
            goto error;
222

223
        if (virAsprintf(&driverState->logDir,
224 225
                        "%s/.libvirt/qemu/log", userdir) == -1) {
            VIR_FREE(userdir);
226
            goto out_of_memory;
227
        }
228

229 230
        if (virAsprintf(&base, "%s/.libvirt", userdir) == -1) {
            VIR_FREE(userdir);
231 232
            goto out_of_memory;
        }
233
        VIR_FREE(userdir);
234 235 236 237 238
    }

    /* Configuration paths are either ~/.libvirt/qemu/... (session) or
     * /etc/libvirt/qemu/... (system).
     */
239
    if (virAsprintf(&driverState->networkConfigDir, "%s/qemu/networks", base) == -1)
240 241
        goto out_of_memory;

242 243
    if (virAsprintf(&driverState->networkAutostartDir, "%s/qemu/networks/autostart",
                    base) == -1)
244 245 246 247
        goto out_of_memory;

    VIR_FREE(base);

248
    if ((err = brInit(&driverState->brctl))) {
249
        virReportSystemError(err, "%s",
250 251 252 253 254
                             _("cannot initialize bridge support"));
        goto error;
    }

    if (!(driverState->iptables = iptablesContextNew())) {
255
        goto out_of_memory;
256 257 258
    }


259
    if (virNetworkLoadAllConfigs(&driverState->networks,
260
                                 driverState->networkConfigDir,
261 262 263
                                 driverState->networkAutostartDir) < 0)
        goto error;

264
    networkFindActiveConfigs(driverState);
265
    networkReloadIptablesRules(driverState);
266 267
    networkAutostartConfigs(driverState);

268 269
    networkDriverUnlock(driverState);

270 271
    return 0;

272
out_of_memory:
273
    virReportOOMError();
274 275

error:
276 277 278
    if (driverState)
        networkDriverUnlock(driverState);

279
    VIR_FREE(base);
280
    networkShutdown();
281 282 283 284 285 286 287 288 289 290 291
    return -1;
}

/**
 * networkReload:
 *
 * Function to restart the QEmu daemon, it will recheck the configuration
 * files and update its state and the networking
 */
static int
networkReload(void) {
292 293 294
    if (!driverState)
        return 0;

295
    networkDriverLock(driverState);
296
    virNetworkLoadAllConfigs(&driverState->networks,
297 298
                             driverState->networkConfigDir,
                             driverState->networkAutostartDir);
299
    networkReloadIptablesRules(driverState);
300
    networkAutostartConfigs(driverState);
301
    networkDriverUnlock(driverState);
302 303 304 305 306 307 308 309 310 311 312 313 314
    return 0;
}

/**
 * networkActive:
 *
 * Checks if the QEmu daemon is active, i.e. has an active domain or
 * an active network
 *
 * Returns 1 if active, 0 otherwise
 */
static int
networkActive(void) {
315
    unsigned int i;
316
    int active = 0;
317

318 319 320
    if (!driverState)
        return 0;

321
    networkDriverLock(driverState);
322 323
    for (i = 0 ; i < driverState->networks.count ; i++) {
        virNetworkObjPtr net = driverState->networks.objs[i];
324
        virNetworkObjLock(net);
D
Daniel P. Berrange 已提交
325
        if (virNetworkObjIsActive(net))
326
            active = 1;
327
        virNetworkObjUnlock(net);
328
    }
329
    networkDriverUnlock(driverState);
330
    return active;
331 332 333 334 335 336 337 338 339 340 341 342
}

/**
 * networkShutdown:
 *
 * Shutdown the QEmu daemon, it will stop all active domains and networks
 */
static int
networkShutdown(void) {
    if (!driverState)
        return -1;

343 344
    networkDriverLock(driverState);

345
    /* free inactive networks */
346
    virNetworkObjListFree(&driverState->networks);
347 348 349 350 351 352 353 354 355 356

    VIR_FREE(driverState->logDir);
    VIR_FREE(driverState->networkConfigDir);
    VIR_FREE(driverState->networkAutostartDir);

    if (driverState->brctl)
        brShutdown(driverState->brctl);
    if (driverState->iptables)
        iptablesContextFree(driverState->iptables);

357
    networkDriverUnlock(driverState);
358
    virMutexDestroy(&driverState->lock);
359

360 361 362 363 364 365
    VIR_FREE(driverState);

    return 0;
}


366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388
static int
networkSaveDnsmasqHostsfile(virNetworkObjPtr network,
                            dnsmasqContext *dctx,
                            bool force)
{
    unsigned int i;

    if (! force && virFileExists(dctx->hostsfile->path))
        return 1;

    for (i = 0 ; i < network->def->nhosts ; i++) {
        virNetworkDHCPHostDefPtr host = &(network->def->hosts[i]);
        if ((host->mac) && (host->ip))
            dnsmasqAddDhcpHost(dctx, host->mac, host->ip, host->name);
    }

    if (dnsmasqSave(dctx) < 0)
        return 0;

    return 1;
}


389
static int
390
networkBuildDnsmasqArgv(virNetworkObjPtr network,
391 392
                        const char *pidfile,
                        const char ***argv) {
393
    int i, len, r;
394
    int nbleases = 0;
395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415
    char *pidfileArg;
    char buf[1024];

    /*
     * NB, be careful about syntax for dnsmasq options in long format
     *
     * If the flag has a mandatory argument, it can be given using
     * either syntax:
     *
     *     --foo bar
     *     --foo=bar
     *
     * If the flag has a optional argument, it *must* be given using
     * the syntax:
     *
     *     --foo=bar
     *
     * It is hard to determine whether a flag is optional or not,
     * without reading the dnsmasq source :-( The manpages is not
     * very explicit on this
     */
416 417 418 419 420 421

    len =
        1 + /* dnsmasq */
        1 + /* --strict-order */
        1 + /* --bind-interfaces */
        (network->def->domain?2:0) + /* --domain name */
422
        2 + /* --pid-file /var/run/libvirt/network/$NAME.pid */
423 424 425 426 427
        2 + /* --conf-file "" */
        /*2 + *//* --interface virbr0 */
        2 + /* --except-interface lo */
        2 + /* --listen-address 10.0.0.1 */
        (2 * network->def->nranges) + /* --dhcp-range 10.0.0.2,10.0.0.254 */
428
        /* --dhcp-lease-max=xxx if needed */
429
        (network->def->nranges ? 1 : 0) +
430 431
        /* --dhcp-no-override if needed */
        (network->def->nranges ? 1 : 0) +
432 433
        /* --dhcp-hostsfile=/var/lib/dnsmasq/$NAME.hostsfile */
        (network->def->nhosts > 0 ? 1 : 0) +
434 435
        /* --enable-tftp --tftp-root /srv/tftp */
        (network->def->tftproot ? 3 : 0) +
436
        /* --dhcp-boot pxeboot.img[,,12.34.56.78] */
437
        (network->def->bootfile ? 2 : 0) +
438 439 440 441 442 443 444 445 446 447
        1;  /* NULL */

    if (VIR_ALLOC_N(*argv, len) < 0)
        goto no_memory;

#define APPEND_ARG(v, n, s) do {     \
        if (!((v)[(n)] = strdup(s))) \
            goto no_memory;          \
    } while (0)

448 449 450
#define APPEND_ARG_LIT(v, n, s) \
        (v)[(n)] = s

451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466
    i = 0;

    APPEND_ARG(*argv, i++, DNSMASQ);

    /*
     * Needed to ensure dnsmasq uses same algorithm for processing
     * multiple namedriver entries in /etc/resolv.conf as GLibC.
     */
    APPEND_ARG(*argv, i++, "--strict-order");
    APPEND_ARG(*argv, i++, "--bind-interfaces");

    if (network->def->domain) {
       APPEND_ARG(*argv, i++, "--domain");
       APPEND_ARG(*argv, i++, network->def->domain);
    }

467 468 469
    if (virAsprintf(&pidfileArg, "--pid-file=%s", pidfile) < 0)
        goto no_memory;
    APPEND_ARG_LIT(*argv, i++, pidfileArg);
470

471
    APPEND_ARG(*argv, i++, "--conf-file=");
472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495
    APPEND_ARG(*argv, i++, "");

    /*
     * XXX does not actually work, due to some kind of
     * race condition setting up ipv6 addresses on the
     * interface. A sleep(10) makes it work, but that's
     * clearly not practical
     *
     * APPEND_ARG(*argv, i++, "--interface");
     * APPEND_ARG(*argv, i++, network->def->bridge);
     */
    APPEND_ARG(*argv, i++, "--listen-address");
    APPEND_ARG(*argv, i++, network->def->ipAddress);

    APPEND_ARG(*argv, i++, "--except-interface");
    APPEND_ARG(*argv, i++, "lo");

    for (r = 0 ; r < network->def->nranges ; r++) {
        snprintf(buf, sizeof(buf), "%s,%s",
                 network->def->ranges[r].start,
                 network->def->ranges[r].end);

        APPEND_ARG(*argv, i++, "--dhcp-range");
        APPEND_ARG(*argv, i++, buf);
496 497 498 499 500 501
        nbleases += network->def->ranges[r].size;
    }

    if (network->def->nranges > 0) {
        snprintf(buf, sizeof(buf), "--dhcp-lease-max=%d", nbleases);
        APPEND_ARG(*argv, i++, buf);
502
        APPEND_ARG(*argv, i++, "--dhcp-no-override");
503 504
    }

505 506 507
    if (network->def->nhosts > 0) {
        dnsmasqContext *dctx = dnsmasqContextNew(network->def->name, DNSMASQ_STATE_DIR);
        char *hostsfileArg;
508

509 510 511 512 513 514 515 516 517 518 519 520
        if (dctx == NULL)
            goto no_memory;

        if (networkSaveDnsmasqHostsfile(network, dctx, false)) {
            if (virAsprintf(&hostsfileArg, "--dhcp-hostsfile=%s", dctx->hostsfile->path) < 0) {
                dnsmasqContextFree(dctx);
                goto no_memory;
            }
            APPEND_ARG_LIT(*argv, i++, hostsfileArg);
        }

        dnsmasqContextFree(dctx);
521 522
    }

523 524 525 526 527 528
    if (network->def->tftproot) {
        APPEND_ARG(*argv, i++, "--enable-tftp");
        APPEND_ARG(*argv, i++, "--tftp-root");
        APPEND_ARG(*argv, i++, network->def->tftproot);
    }
    if (network->def->bootfile) {
529 530 531 532 533
        snprintf(buf, sizeof(buf), "%s%s%s",
                 network->def->bootfile,
                 network->def->bootserver ? ",," : "",
                 network->def->bootserver ? network->def->bootserver : "");

534
        APPEND_ARG(*argv, i++, "--dhcp-boot");
535
        APPEND_ARG(*argv, i++, buf);
536 537
    }

538 539 540 541 542
#undef APPEND_ARG

    return 0;

 no_memory:
543
    if (*argv) {
544 545 546 547
        for (i = 0; (*argv)[i]; i++)
            VIR_FREE((*argv)[i]);
        VIR_FREE(*argv);
    }
548
    virReportOOMError();
549 550 551 552 553
    return -1;
}


static int
554
dhcpStartDhcpDaemon(virNetworkObjPtr network)
555 556
{
    const char **argv;
557 558 559 560
    char *pidfile;
    int ret = -1, i, err;

    network->dnsmasqPid = -1;
561 562

    if (network->def->ipAddress == NULL) {
563 564
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           "%s", _("cannot start dhcp daemon without IP address for server"));
565 566 567
        return -1;
    }

L
Laine Stump 已提交
568
    if ((err = virFileMakePath(NETWORK_PID_DIR)) != 0) {
569
        virReportSystemError(err,
570 571 572 573
                             _("cannot create directory %s"),
                             NETWORK_PID_DIR);
        return -1;
    }
L
Laine Stump 已提交
574
    if ((err = virFileMakePath(NETWORK_STATE_DIR)) != 0) {
575
        virReportSystemError(err,
576 577 578 579 580 581
                             _("cannot create directory %s"),
                             NETWORK_STATE_DIR);
        return -1;
    }

    if (!(pidfile = virFilePid(NETWORK_PID_DIR, network->def->name))) {
582
        virReportOOMError();
583 584 585
        return -1;
    }

586
    argv = NULL;
587
    if (networkBuildDnsmasqArgv(network, pidfile, &argv) < 0) {
588
        VIR_FREE(pidfile);
589
        return -1;
590 591
    }

592
    if (virRun(argv, NULL) < 0)
593 594 595 596 597 598 599 600 601 602 603 604 605
        goto cleanup;

    /*
     * There really is no race here - when dnsmasq daemonizes,
     * its leader process stays around until its child has
     * actually written its pidfile. So by time virRun exits
     * it has waitpid'd and guaranteed the proess has started
     * and written a pid
     */

    if (virFileReadPid(NETWORK_PID_DIR, network->def->name,
                       &network->dnsmasqPid) < 0)
        goto cleanup;
606

607
    ret = 0;
608

609 610
cleanup:
    VIR_FREE(pidfile);
611 612 613 614 615 616 617 618
    for (i = 0; argv[i]; i++)
        VIR_FREE(argv[i]);
    VIR_FREE(argv);

    return ret;
}

static int
619 620
networkAddMasqueradingIptablesRules(struct network_driver *driver,
                                    virNetworkObjPtr network) {
621 622 623 624 625 626
    int err;
    /* allow forwarding packets from the bridge interface */
    if ((err = iptablesAddForwardAllowOut(driver->iptables,
                                          network->def->network,
                                          network->def->bridge,
                                          network->def->forwardDev))) {
627
        virReportSystemError(err,
628 629
                             _("failed to add iptables rule to allow forwarding from '%s'"),
                             network->def->bridge);
630 631 632 633 634 635 636 637
        goto masqerr1;
    }

    /* allow forwarding packets to the bridge interface if they are part of an existing connection */
    if ((err = iptablesAddForwardAllowRelatedIn(driver->iptables,
                                         network->def->network,
                                         network->def->bridge,
                                         network->def->forwardDev))) {
638
        virReportSystemError(err,
639 640
                             _("failed to add iptables rule to allow forwarding to '%s'"),
                             network->def->bridge);
641 642 643
        goto masqerr2;
    }

644 645 646 647 648
    /*
     * Enable masquerading.
     *
     * We need to end up with 3 rules in the table in this order
     *
E
Eric Blake 已提交
649 650
     *  1. protocol=tcp with sport mapping restriction
     *  2. protocol=udp with sport mapping restriction
651 652 653
     *  3. generic any protocol
     *
     * The sport mappings are required, because default IPtables
E
Eric Blake 已提交
654
     * MASQUERADE maintain port numbers unchanged where possible.
655 656 657 658 659 660 661 662 663 664 665 666 667
     *
     * NFS can be configured to only "trust" port numbers < 1023.
     *
     * Guests using NAT thus need to be prevented from having port
     * numbers < 1023, otherwise they can bypass the NFS "security"
     * check on the source port number.
     *
     * Since we use '--insert' to add rules to the header of the
     * chain, we actually need to add them in the reverse of the
     * order just mentioned !
     */

    /* First the generic masquerade rule for other protocols */
668 669
    if ((err = iptablesAddForwardMasquerade(driver->iptables,
                                            network->def->network,
670 671
                                            network->def->forwardDev,
                                            NULL))) {
672
        virReportSystemError(err,
673
                             _("failed to add iptables rule to enable masquerading to '%s'"),
674
                             network->def->forwardDev ? network->def->forwardDev : NULL);
675 676 677
        goto masqerr3;
    }

678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699
    /* UDP with a source port restriction */
    if ((err = iptablesAddForwardMasquerade(driver->iptables,
                                            network->def->network,
                                            network->def->forwardDev,
                                            "udp"))) {
        virReportSystemError(err,
                             _("failed to add iptables rule to enable UDP masquerading to '%s'"),
                             network->def->forwardDev ? network->def->forwardDev : NULL);
        goto masqerr4;
    }

    /* TCP with a source port restriction */
    if ((err = iptablesAddForwardMasquerade(driver->iptables,
                                            network->def->network,
                                            network->def->forwardDev,
                                            "tcp"))) {
        virReportSystemError(err,
                             _("failed to add iptables rule to enable TCP masquerading to '%s'"),
                             network->def->forwardDev ? network->def->forwardDev : NULL);
        goto masqerr5;
    }

700 701
    return 1;

702 703 704 705 706 707 708 709 710 711
 masqerr5:
    iptablesRemoveForwardMasquerade(driver->iptables,
                                    network->def->network,
                                    network->def->forwardDev,
                                    "udp");
 masqerr4:
    iptablesRemoveForwardMasquerade(driver->iptables,
                                    network->def->network,
                                    network->def->forwardDev,
                                    NULL);
712 713 714 715 716 717 718 719 720 721 722 723 724 725 726
 masqerr3:
    iptablesRemoveForwardAllowRelatedIn(driver->iptables,
                                 network->def->network,
                                 network->def->bridge,
                                 network->def->forwardDev);
 masqerr2:
    iptablesRemoveForwardAllowOut(driver->iptables,
                                  network->def->network,
                                  network->def->bridge,
                                  network->def->forwardDev);
 masqerr1:
    return 0;
}

static int
727 728
networkAddRoutingIptablesRules(struct network_driver *driver,
                               virNetworkObjPtr network) {
729 730 731 732 733 734
    int err;
    /* allow routing packets from the bridge interface */
    if ((err = iptablesAddForwardAllowOut(driver->iptables,
                                          network->def->network,
                                          network->def->bridge,
                                          network->def->forwardDev))) {
735
        virReportSystemError(err,
736 737
                             _("failed to add iptables rule to allow routing from '%s'"),
                             network->def->bridge);
738 739 740 741 742 743 744 745
        goto routeerr1;
    }

    /* allow routing packets to the bridge interface */
    if ((err = iptablesAddForwardAllowIn(driver->iptables,
                                         network->def->network,
                                         network->def->bridge,
                                         network->def->forwardDev))) {
746
        virReportSystemError(err,
747 748
                             _("failed to add iptables rule to allow routing to '%s'"),
                             network->def->bridge);
749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764
        goto routeerr2;
    }

    return 1;


 routeerr2:
    iptablesRemoveForwardAllowOut(driver->iptables,
                                  network->def->network,
                                  network->def->bridge,
                                  network->def->forwardDev);
 routeerr1:
    return 0;
}

static int
765 766
networkAddIptablesRules(struct network_driver *driver,
                        virNetworkObjPtr network) {
767 768 769 770
    int err;

    /* allow DHCP requests through to dnsmasq */
    if ((err = iptablesAddTcpInput(driver->iptables, network->def->bridge, 67))) {
771
        virReportSystemError(err,
772 773
                             _("failed to add iptables rule to allow DHCP requests from '%s'"),
                             network->def->bridge);
774 775 776 777
        goto err1;
    }

    if ((err = iptablesAddUdpInput(driver->iptables, network->def->bridge, 67))) {
778
        virReportSystemError(err,
779 780
                             _("failed to add iptables rule to allow DHCP requests from '%s'"),
                             network->def->bridge);
781 782 783 784 785
        goto err2;
    }

    /* allow DNS requests through to dnsmasq */
    if ((err = iptablesAddTcpInput(driver->iptables, network->def->bridge, 53))) {
786
        virReportSystemError(err,
787 788
                             _("failed to add iptables rule to allow DNS requests from '%s'"),
                             network->def->bridge);
789 790 791 792
        goto err3;
    }

    if ((err = iptablesAddUdpInput(driver->iptables, network->def->bridge, 53))) {
793
        virReportSystemError(err,
794 795
                             _("failed to add iptables rule to allow DNS requests from '%s'"),
                             network->def->bridge);
796 797 798
        goto err4;
    }

799 800 801 802 803 804 805 806 807
    /* allow TFTP requests through to dnsmasq */
    if (network->def->tftproot &&
        (err = iptablesAddUdpInput(driver->iptables, network->def->bridge, 69))) {
        virReportSystemError(err,
                             _("failed to add iptables rule to allow TFTP requests from '%s'"),
                             network->def->bridge);
        goto err4tftp;
    }

808 809 810 811

    /* Catch all rules to block forwarding to/from bridges */

    if ((err = iptablesAddForwardRejectOut(driver->iptables, network->def->bridge))) {
812
        virReportSystemError(err,
813 814
                             _("failed to add iptables rule to block outbound traffic from '%s'"),
                             network->def->bridge);
815 816 817 818
        goto err5;
    }

    if ((err = iptablesAddForwardRejectIn(driver->iptables, network->def->bridge))) {
819
        virReportSystemError(err,
820 821
                             _("failed to add iptables rule to block inbound traffic to '%s'"),
                             network->def->bridge);
822 823 824 825 826
        goto err6;
    }

    /* Allow traffic between guests on the same bridge */
    if ((err = iptablesAddForwardAllowCross(driver->iptables, network->def->bridge))) {
827
        virReportSystemError(err,
828 829
                             _("failed to add iptables rule to allow cross bridge traffic on '%s'"),
                             network->def->bridge);
830 831 832 833 834 835
        goto err7;
    }


    /* If masquerading is enabled, set up the rules*/
    if (network->def->forwardType == VIR_NETWORK_FORWARD_NAT &&
836
        !networkAddMasqueradingIptablesRules(driver, network))
837 838 839
        goto err8;
    /* else if routing is enabled, set up the rules*/
    else if (network->def->forwardType == VIR_NETWORK_FORWARD_ROUTE &&
840
             !networkAddRoutingIptablesRules(driver, network))
841 842
        goto err8;

843 844 845 846 847 848 849 850 851 852 853 854 855 856
    /* If we are doing local DHCP service on this network, attempt to
     * add a rule that will fixup the checksum of DHCP response
     * packets back to the guests (but report failure without
     * aborting, since not all iptables implementations support it).
     */

    if ((network->def->ipAddress || network->def->nranges) &&
        (iptablesAddOutputFixUdpChecksum(driver->iptables,
                                         network->def->bridge, 68) != 0)) {
        VIR_WARN("Could not add rule to fixup DHCP response checksums "
                 "on network '%s'.", network->def->name);
        VIR_WARN0("May need to update iptables package & kernel to support CHECKSUM rule.");
    }

857 858 859 860 861 862 863 864 865 866 867 868
    return 1;

 err8:
    iptablesRemoveForwardAllowCross(driver->iptables,
                                    network->def->bridge);
 err7:
    iptablesRemoveForwardRejectIn(driver->iptables,
                                  network->def->bridge);
 err6:
    iptablesRemoveForwardRejectOut(driver->iptables,
                                   network->def->bridge);
 err5:
869 870 871 872
    if (network->def->tftproot) {
        iptablesRemoveUdpInput(driver->iptables, network->def->bridge, 69);
    }
 err4tftp:
873 874 875 876 877 878 879 880 881 882 883 884 885 886
    iptablesRemoveUdpInput(driver->iptables, network->def->bridge, 53);
 err4:
    iptablesRemoveTcpInput(driver->iptables, network->def->bridge, 53);
 err3:
    iptablesRemoveUdpInput(driver->iptables, network->def->bridge, 67);
 err2:
    iptablesRemoveTcpInput(driver->iptables, network->def->bridge, 67);
 err1:
    return 0;
}

static void
networkRemoveIptablesRules(struct network_driver *driver,
                         virNetworkObjPtr network) {
887 888 889 890
    if (network->def->ipAddress || network->def->nranges) {
        iptablesRemoveOutputFixUdpChecksum(driver->iptables,
                                           network->def->bridge, 68);
    }
891
    if (network->def->forwardType != VIR_NETWORK_FORWARD_NONE) {
892 893
        if (network->def->forwardType == VIR_NETWORK_FORWARD_NAT) {
            iptablesRemoveForwardMasquerade(driver->iptables,
894 895 896 897 898 899 900 901 902 903 904
                                            network->def->network,
                                            network->def->forwardDev,
                                            "tcp");
            iptablesRemoveForwardMasquerade(driver->iptables,
                                            network->def->network,
                                            network->def->forwardDev,
                                            "udp");
            iptablesRemoveForwardMasquerade(driver->iptables,
                                            network->def->network,
                                            network->def->forwardDev,
                                            NULL);
905 906 907 908
            iptablesRemoveForwardAllowRelatedIn(driver->iptables,
                                                network->def->network,
                                                network->def->bridge,
                                                network->def->forwardDev);
909
        } else if (network->def->forwardType == VIR_NETWORK_FORWARD_ROUTE)
910 911 912 913 914 915 916 917 918 919 920 921 922
            iptablesRemoveForwardAllowIn(driver->iptables,
                                         network->def->network,
                                         network->def->bridge,
                                         network->def->forwardDev);

        iptablesRemoveForwardAllowOut(driver->iptables,
                                      network->def->network,
                                      network->def->bridge,
                                      network->def->forwardDev);
    }
    iptablesRemoveForwardAllowCross(driver->iptables, network->def->bridge);
    iptablesRemoveForwardRejectIn(driver->iptables, network->def->bridge);
    iptablesRemoveForwardRejectOut(driver->iptables, network->def->bridge);
923
    iptablesRemoveUdpInput(driver->iptables, network->def->bridge, 69);
924 925 926 927 928 929
    iptablesRemoveUdpInput(driver->iptables, network->def->bridge, 53);
    iptablesRemoveTcpInput(driver->iptables, network->def->bridge, 53);
    iptablesRemoveUdpInput(driver->iptables, network->def->bridge, 67);
    iptablesRemoveTcpInput(driver->iptables, network->def->bridge, 67);
}

930 931 932 933 934 935 936 937 938 939 940 941
static void
networkReloadIptablesRules(struct network_driver *driver)
{
    unsigned int i;

    VIR_INFO0(_("Reloading iptables rules"));

    for (i = 0 ; i < driver->networks.count ; i++) {
        virNetworkObjLock(driver->networks.objs[i]);

        if (virNetworkObjIsActive(driver->networks.objs[i])) {
            networkRemoveIptablesRules(driver, driver->networks.objs[i]);
942
            if (!networkAddIptablesRules(driver, driver->networks.objs[i])) {
943 944 945 946 947 948 949 950
                /* failed to add but already logged */
            }
        }

        virNetworkObjUnlock(driver->networks.objs[i]);
    }
}

951
/* Enable IP Forwarding. Return 0 for success, -1 for failure. */
952 953 954
static int
networkEnableIpForwarding(void)
{
M
Mark McLoughlin 已提交
955
    return virFileWriteStr("/proc/sys/net/ipv4/ip_forward", "1\n");
956 957
}

958 959
#define SYSCTL_PATH "/proc/sys"

960
static int networkDisableIPV6(virNetworkObjPtr network)
961 962 963 964 965
{
    char *field = NULL;
    int ret = -1;

    if (virAsprintf(&field, SYSCTL_PATH "/net/ipv6/conf/%s/disable_ipv6", network->def->bridge) < 0) {
966
        virReportOOMError();
967 968 969
        goto cleanup;
    }

970 971 972 973 974 975
    if (access(field, W_OK) < 0 && errno == ENOENT) {
        VIR_DEBUG("ipv6 appears to already be disabled on %s", network->def->bridge);
        ret = 0;
        goto cleanup;
    }

976
    if (virFileWriteStr(field, "1") < 0) {
977
        virReportSystemError(errno,
978 979 980 981 982 983
                             _("cannot enable %s"), field);
        goto cleanup;
    }
    VIR_FREE(field);

    if (virAsprintf(&field, SYSCTL_PATH "/net/ipv6/conf/%s/accept_ra", network->def->bridge) < 0) {
984
        virReportOOMError();
985 986 987 988
        goto cleanup;
    }

    if (virFileWriteStr(field, "0") < 0) {
989
        virReportSystemError(errno,
990 991 992 993 994 995
                             _("cannot disable %s"), field);
        goto cleanup;
    }
    VIR_FREE(field);

    if (virAsprintf(&field, SYSCTL_PATH "/net/ipv6/conf/%s/autoconf", network->def->bridge) < 0) {
996
        virReportOOMError();
997 998 999 1000
        goto cleanup;
    }

    if (virFileWriteStr(field, "1") < 0) {
1001
        virReportSystemError(errno,
1002 1003 1004 1005 1006 1007 1008 1009 1010 1011
                             _("cannot enable %s"), field);
        goto cleanup;
    }

    ret = 0;
cleanup:
    VIR_FREE(field);
    return ret;
}

1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119
#define PROC_NET_ROUTE "/proc/net/route"

/* XXX: This function can be a lot more exhaustive, there are certainly
 *      other scenarios where we can ruin host network connectivity.
 * XXX: Using a proper library is preferred over parsing /proc
 */
static int networkCheckRouteCollision(virNetworkObjPtr network)
{
    int ret = -1, len;
    unsigned int net_dest;
    char *cur, *buf = NULL;
    enum {MAX_ROUTE_SIZE = 1024*64};
    virSocketAddr inaddress, innetmask;

    if (!network->def->ipAddress || !network->def->netmask)
        return 0;

    if (virSocketParseAddr(network->def->ipAddress, &inaddress, 0) < 0) {
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           _("cannot parse IP address '%s'"),
                           network->def->ipAddress);
        goto error;
    }

    if (virSocketParseAddr(network->def->netmask, &innetmask, 0) < 0) {
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           _("cannot parse netmask '%s'"),
                           network->def->netmask);
        goto error;
    }

    if (inaddress.stor.ss_family != AF_INET ||
        innetmask.stor.ss_family != AF_INET) {
        /* Only support collision check for IPv4 */
        goto out;
    }

    net_dest = (inaddress.inet4.sin_addr.s_addr &
                innetmask.inet4.sin_addr.s_addr);

    /* Read whole routing table into memory */
    if ((len = virFileReadAll(PROC_NET_ROUTE, MAX_ROUTE_SIZE, &buf)) < 0)
        goto error;

    /* Dropping the last character shouldn't hurt */
    if (len > 0)
        buf[len-1] = '\0';

    VIR_DEBUG("%s output:\n%s", PROC_NET_ROUTE, buf);

    if (!STRPREFIX (buf, "Iface"))
        goto out;

    /* First line is just headings, skip it */
    cur = strchr(buf, '\n');
    if (cur)
        cur++;

    while (cur) {
        char iface[17], dest[128], mask[128];
        unsigned int addr_val, mask_val;
        int num;

        /* NUL-terminate the line, so sscanf doesn't go beyond a newline.  */
        char *nl = strchr(cur, '\n');
        if (nl) {
            *nl++ = '\0';
        }

        num = sscanf(cur, "%16s %127s %*s %*s %*s %*s %*s %127s",
                     iface, dest, mask);
        cur = nl;

        if (num != 3) {
            VIR_DEBUG("Failed to parse %s", PROC_NET_ROUTE);
            continue;
        }

        if (virStrToLong_ui(dest, NULL, 16, &addr_val) < 0) {
            VIR_DEBUG("Failed to convert network address %s to uint", dest);
            continue;
        }

        if (virStrToLong_ui(mask, NULL, 16, &mask_val) < 0) {
            VIR_DEBUG("Failed to convert network mask %s to uint", mask);
            continue;
        }

        addr_val &= mask_val;

        if ((net_dest == addr_val) &&
            (innetmask.inet4.sin_addr.s_addr == mask_val)) {
            networkReportError(VIR_ERR_INTERNAL_ERROR,
                              _("Network %s/%s is already in use by "
                                "interface %s"),
                                network->def->ipAddress,
                                network->def->netmask, iface);
            goto error;
        }
    }

out:
    ret = 0;
error:
    VIR_FREE(buf);
    return ret;
}

1120 1121 1122
static int networkStartNetworkDaemon(struct network_driver *driver,
                                     virNetworkObjPtr network)
{
1123 1124
    int err;

D
Daniel P. Berrange 已提交
1125
    if (virNetworkObjIsActive(network)) {
1126 1127
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           "%s", _("network is already active"));
1128 1129 1130
        return -1;
    }

1131 1132 1133 1134
    /* Check to see if network collides with an existing route */
    if (networkCheckRouteCollision(network) < 0)
        return -1;

1135
    if ((err = brAddBridge(driver->brctl, network->def->bridge))) {
1136
        virReportSystemError(err,
1137 1138
                             _("cannot create bridge '%s'"),
                             network->def->bridge);
1139 1140 1141
        return -1;
    }

1142
    if (networkDisableIPV6(network) < 0)
1143 1144
        goto err_delbr;

1145 1146 1147 1148 1149 1150 1151 1152
    if (brSetForwardDelay(driver->brctl, network->def->bridge, network->def->delay) < 0)
        goto err_delbr;

    if (brSetEnableSTP(driver->brctl, network->def->bridge, network->def->stp ? 1 : 0) < 0)
        goto err_delbr;

    if (network->def->ipAddress &&
        (err = brSetInetAddress(driver->brctl, network->def->bridge, network->def->ipAddress))) {
1153
        virReportSystemError(err,
1154 1155
                             _("cannot set IP address on bridge '%s' to '%s'"),
                             network->def->bridge, network->def->ipAddress);
1156 1157 1158 1159 1160
        goto err_delbr;
    }

    if (network->def->netmask &&
        (err = brSetInetNetmask(driver->brctl, network->def->bridge, network->def->netmask))) {
1161
        virReportSystemError(err,
1162 1163
                             _("cannot set netmask on bridge '%s' to '%s'"),
                             network->def->bridge, network->def->netmask);
1164 1165 1166
        goto err_delbr;
    }

1167
    if ((err = brSetInterfaceUp(driver->brctl, network->def->bridge, 1))) {
1168
        virReportSystemError(err,
1169 1170
                             _("failed to bring the bridge '%s' up"),
                             network->def->bridge);
1171 1172 1173
        goto err_delbr;
    }

1174
    if (!networkAddIptablesRules(driver, network))
1175 1176 1177
        goto err_delbr1;

    if (network->def->forwardType != VIR_NETWORK_FORWARD_NONE &&
1178
        networkEnableIpForwarding() < 0) {
1179
        virReportSystemError(errno, "%s",
1180
                             _("failed to enable IP forwarding"));
1181 1182 1183
        goto err_delbr2;
    }

1184 1185
    if ((network->def->ipAddress ||
         network->def->nranges) &&
1186
        dhcpStartDhcpDaemon(network) < 0)
1187 1188
        goto err_delbr2;

1189 1190

    /* Persist the live configuration now we have bridge info  */
1191
    if (virNetworkSaveConfig(NETWORK_STATE_DIR, network->def) < 0) {
1192 1193 1194
        goto err_kill;
    }

1195 1196 1197 1198
    network->active = 1;

    return 0;

1199 1200 1201 1202 1203 1204
 err_kill:
    if (network->dnsmasqPid > 0) {
        kill(network->dnsmasqPid, SIGTERM);
        network->dnsmasqPid = -1;
    }

1205 1206 1207 1208
 err_delbr2:
    networkRemoveIptablesRules(driver, network);

 err_delbr1:
1209
    if ((err = brSetInterfaceUp(driver->brctl, network->def->bridge, 0))) {
1210
        char ebuf[1024];
1211
        VIR_WARN("Failed to bring down bridge '%s' : %s",
1212
                 network->def->bridge, virStrerror(err, ebuf, sizeof ebuf));
1213 1214 1215 1216
    }

 err_delbr:
    if ((err = brDeleteBridge(driver->brctl, network->def->bridge))) {
1217
        char ebuf[1024];
1218
        VIR_WARN("Failed to delete bridge '%s' : %s",
1219
                 network->def->bridge, virStrerror(err, ebuf, sizeof ebuf));
1220 1221 1222 1223 1224 1225
    }

    return -1;
}


1226 1227 1228
static int networkShutdownNetworkDaemon(struct network_driver *driver,
                                        virNetworkObjPtr network)
{
1229
    int err;
1230
    char *stateFile;
1231

1232
    VIR_INFO(_("Shutting down network '%s'"), network->def->name);
1233

D
Daniel P. Berrange 已提交
1234
    if (!virNetworkObjIsActive(network))
1235 1236
        return 0;

1237
    stateFile = virNetworkConfigFile(NETWORK_STATE_DIR, network->def->name);
1238 1239 1240 1241 1242 1243
    if (!stateFile)
        return -1;

    unlink(stateFile);
    VIR_FREE(stateFile);

1244 1245 1246 1247 1248
    if (network->dnsmasqPid > 0)
        kill(network->dnsmasqPid, SIGTERM);

    networkRemoveIptablesRules(driver, network);

1249
    char ebuf[1024];
1250
    if ((err = brSetInterfaceUp(driver->brctl, network->def->bridge, 0))) {
1251
        VIR_WARN("Failed to bring down bridge '%s' : %s",
1252
                 network->def->bridge, virStrerror(err, ebuf, sizeof ebuf));
1253 1254 1255
    }

    if ((err = brDeleteBridge(driver->brctl, network->def->bridge))) {
1256
        VIR_WARN("Failed to delete bridge '%s' : %s",
1257
                 network->def->bridge, virStrerror(err, ebuf, sizeof ebuf));
1258 1259
    }

1260
    /* See if its still alive and really really kill it */
1261
    if (network->dnsmasqPid > 0 &&
1262
        (kill(network->dnsmasqPid, 0) == 0))
1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277
        kill(network->dnsmasqPid, SIGKILL);

    network->dnsmasqPid = -1;
    network->active = 0;

    if (network->newDef) {
        virNetworkDefFree(network->def);
        network->def = network->newDef;
        network->newDef = NULL;
    }

    return 0;
}


1278 1279 1280 1281 1282
static virNetworkPtr networkLookupByUUID(virConnectPtr conn,
                                         const unsigned char *uuid) {
    struct network_driver *driver = conn->networkPrivateData;
    virNetworkObjPtr network;
    virNetworkPtr ret = NULL;
1283

1284
    networkDriverLock(driver);
1285
    network = virNetworkFindByUUID(&driver->networks, uuid);
1286
    networkDriverUnlock(driver);
1287
    if (!network) {
1288 1289
        networkReportError(VIR_ERR_NO_NETWORK,
                           "%s", _("no network with matching uuid"));
1290
        goto cleanup;
1291 1292
    }

1293 1294 1295
    ret = virGetNetwork(conn, network->def->name, network->def->uuid);

cleanup:
1296 1297
    if (network)
        virNetworkObjUnlock(network);
1298
    return ret;
1299 1300
}

1301 1302 1303 1304 1305 1306
static virNetworkPtr networkLookupByName(virConnectPtr conn,
                                         const char *name) {
    struct network_driver *driver = conn->networkPrivateData;
    virNetworkObjPtr network;
    virNetworkPtr ret = NULL;

1307
    networkDriverLock(driver);
1308
    network = virNetworkFindByName(&driver->networks, name);
1309
    networkDriverUnlock(driver);
1310
    if (!network) {
1311 1312
        networkReportError(VIR_ERR_NO_NETWORK,
                           _("no network with matching name '%s'"), name);
1313
        goto cleanup;
1314 1315
    }

1316 1317 1318
    ret = virGetNetwork(conn, network->def->name, network->def->uuid);

cleanup:
1319 1320
    if (network)
        virNetworkObjUnlock(network);
1321
    return ret;
1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339
}

static virDrvOpenStatus networkOpenNetwork(virConnectPtr conn,
                                           virConnectAuthPtr auth ATTRIBUTE_UNUSED,
                                           int flags ATTRIBUTE_UNUSED) {
    if (!driverState)
        return VIR_DRV_OPEN_DECLINED;

    conn->networkPrivateData = driverState;
    return VIR_DRV_OPEN_SUCCESS;
}

static int networkCloseNetwork(virConnectPtr conn) {
    conn->networkPrivateData = NULL;
    return 0;
}

static int networkNumNetworks(virConnectPtr conn) {
1340
    int nactive = 0, i;
1341
    struct network_driver *driver = conn->networkPrivateData;
1342

1343 1344 1345
    networkDriverLock(driver);
    for (i = 0 ; i < driver->networks.count ; i++) {
        virNetworkObjLock(driver->networks.objs[i]);
D
Daniel P. Berrange 已提交
1346
        if (virNetworkObjIsActive(driver->networks.objs[i]))
1347
            nactive++;
1348 1349 1350
        virNetworkObjUnlock(driver->networks.objs[i]);
    }
    networkDriverUnlock(driver);
1351

1352 1353 1354 1355
    return nactive;
}

static int networkListNetworks(virConnectPtr conn, char **const names, int nnames) {
1356
    struct network_driver *driver = conn->networkPrivateData;
1357
    int got = 0, i;
1358

1359
    networkDriverLock(driver);
1360
    for (i = 0 ; i < driver->networks.count && got < nnames ; i++) {
1361
        virNetworkObjLock(driver->networks.objs[i]);
D
Daniel P. Berrange 已提交
1362
        if (virNetworkObjIsActive(driver->networks.objs[i])) {
1363
            if (!(names[got] = strdup(driver->networks.objs[i]->def->name))) {
1364
                virNetworkObjUnlock(driver->networks.objs[i]);
1365
                virReportOOMError();
1366 1367 1368 1369
                goto cleanup;
            }
            got++;
        }
1370
        virNetworkObjUnlock(driver->networks.objs[i]);
1371
    }
1372 1373
    networkDriverUnlock(driver);

1374 1375 1376
    return got;

 cleanup:
1377
    networkDriverUnlock(driver);
1378 1379 1380 1381 1382 1383
    for (i = 0 ; i < got ; i++)
        VIR_FREE(names[i]);
    return -1;
}

static int networkNumDefinedNetworks(virConnectPtr conn) {
1384
    int ninactive = 0, i;
1385
    struct network_driver *driver = conn->networkPrivateData;
1386

1387 1388 1389
    networkDriverLock(driver);
    for (i = 0 ; i < driver->networks.count ; i++) {
        virNetworkObjLock(driver->networks.objs[i]);
D
Daniel P. Berrange 已提交
1390
        if (!virNetworkObjIsActive(driver->networks.objs[i]))
1391
            ninactive++;
1392 1393 1394
        virNetworkObjUnlock(driver->networks.objs[i]);
    }
    networkDriverUnlock(driver);
1395

1396 1397 1398 1399
    return ninactive;
}

static int networkListDefinedNetworks(virConnectPtr conn, char **const names, int nnames) {
1400
    struct network_driver *driver = conn->networkPrivateData;
1401
    int got = 0, i;
1402

1403
    networkDriverLock(driver);
1404
    for (i = 0 ; i < driver->networks.count && got < nnames ; i++) {
1405
        virNetworkObjLock(driver->networks.objs[i]);
D
Daniel P. Berrange 已提交
1406
        if (!virNetworkObjIsActive(driver->networks.objs[i])) {
1407
            if (!(names[got] = strdup(driver->networks.objs[i]->def->name))) {
1408
                virNetworkObjUnlock(driver->networks.objs[i]);
1409
                virReportOOMError();
1410 1411 1412 1413
                goto cleanup;
            }
            got++;
        }
1414
        virNetworkObjUnlock(driver->networks.objs[i]);
1415
    }
1416
    networkDriverUnlock(driver);
1417 1418 1419
    return got;

 cleanup:
1420
    networkDriverUnlock(driver);
1421 1422 1423 1424 1425
    for (i = 0 ; i < got ; i++)
        VIR_FREE(names[i]);
    return -1;
}

1426 1427 1428

static int networkIsActive(virNetworkPtr net)
{
1429
    struct network_driver *driver = net->conn->networkPrivateData;
1430 1431 1432 1433 1434 1435 1436
    virNetworkObjPtr obj;
    int ret = -1;

    networkDriverLock(driver);
    obj = virNetworkFindByUUID(&driver->networks, net->uuid);
    networkDriverUnlock(driver);
    if (!obj) {
1437
        networkReportError(VIR_ERR_NO_NETWORK, NULL);
1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449
        goto cleanup;
    }
    ret = virNetworkObjIsActive(obj);

cleanup:
    if (obj)
        virNetworkObjUnlock(obj);
    return ret;
}

static int networkIsPersistent(virNetworkPtr net)
{
1450
    struct network_driver *driver = net->conn->networkPrivateData;
1451 1452 1453 1454 1455 1456 1457
    virNetworkObjPtr obj;
    int ret = -1;

    networkDriverLock(driver);
    obj = virNetworkFindByUUID(&driver->networks, net->uuid);
    networkDriverUnlock(driver);
    if (!obj) {
1458
        networkReportError(VIR_ERR_NO_NETWORK, NULL);
1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469
        goto cleanup;
    }
    ret = obj->persistent;

cleanup:
    if (obj)
        virNetworkObjUnlock(obj);
    return ret;
}


1470
static virNetworkPtr networkCreate(virConnectPtr conn, const char *xml) {
1471
    struct network_driver *driver = conn->networkPrivateData;
1472
    virNetworkDefPtr def;
1473
    virNetworkObjPtr network = NULL;
1474
    virNetworkPtr ret = NULL;
1475

1476 1477
    networkDriverLock(driver);

1478
    if (!(def = virNetworkDefParseString(xml)))
1479
        goto cleanup;
1480

1481 1482 1483
    if (virNetworkObjIsDuplicate(&driver->networks, def, 1) < 0)
        goto cleanup;

1484
    if (virNetworkSetBridgeName(&driver->networks, def, 1))
1485 1486
        goto cleanup;

1487
    if (!(network = virNetworkAssignDef(&driver->networks,
1488 1489 1490
                                        def)))
        goto cleanup;
    def = NULL;
1491

1492
    if (networkStartNetworkDaemon(driver, network) < 0) {
1493 1494
        virNetworkRemoveInactive(&driver->networks,
                                 network);
1495
        network = NULL;
1496
        goto cleanup;
1497 1498
    }

1499 1500 1501 1502
    ret = virGetNetwork(conn, network->def->name, network->def->uuid);

cleanup:
    virNetworkDefFree(def);
1503 1504 1505
    if (network)
        virNetworkObjUnlock(network);
    networkDriverUnlock(driver);
1506
    return ret;
1507 1508 1509
}

static virNetworkPtr networkDefine(virConnectPtr conn, const char *xml) {
1510
    struct network_driver *driver = conn->networkPrivateData;
1511
    virNetworkDefPtr def;
1512
    virNetworkObjPtr network = NULL;
1513
    virNetworkPtr ret = NULL;
1514

1515 1516
    networkDriverLock(driver);

1517
    if (!(def = virNetworkDefParseString(xml)))
1518
        goto cleanup;
1519

E
Eric Blake 已提交
1520
    if (virNetworkObjIsDuplicate(&driver->networks, def, 0) < 0)
1521 1522
        goto cleanup;

1523
    if (virNetworkSetBridgeName(&driver->networks, def, 1))
1524 1525
        goto cleanup;

1526
    if (!(network = virNetworkAssignDef(&driver->networks,
1527 1528 1529
                                        def)))
        goto cleanup;
    def = NULL;
1530

1531 1532
    network->persistent = 1;

1533
    if (virNetworkSaveConfig(driver->networkConfigDir,
1534
                             network->newDef ? network->newDef : network->def) < 0) {
1535 1536
        virNetworkRemoveInactive(&driver->networks,
                                 network);
1537
        network = NULL;
1538
        goto cleanup;
1539 1540
    }

1541 1542 1543 1544 1545 1546 1547 1548 1549
    if (network->def->nhosts > 0) {
        dnsmasqContext *dctx = dnsmasqContextNew(network->def->name, DNSMASQ_STATE_DIR);
        if (dctx == NULL)
            goto cleanup;

        networkSaveDnsmasqHostsfile(network, dctx, true);
        dnsmasqContextFree(dctx);
    }

1550 1551 1552 1553
    ret = virGetNetwork(conn, network->def->name, network->def->uuid);

cleanup:
    virNetworkDefFree(def);
1554 1555 1556
    if (network)
        virNetworkObjUnlock(network);
    networkDriverUnlock(driver);
1557
    return ret;
1558 1559 1560
}

static int networkUndefine(virNetworkPtr net) {
1561
    struct network_driver *driver = net->conn->networkPrivateData;
1562
    virNetworkObjPtr network = NULL;
1563
    int ret = -1;
1564

1565 1566
    networkDriverLock(driver);

1567
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
1568
    if (!network) {
1569
        networkReportError(VIR_ERR_INVALID_NETWORK,
1570 1571
                           "%s", _("no network with matching uuid"));
        goto cleanup;
1572 1573
    }

D
Daniel P. Berrange 已提交
1574
    if (virNetworkObjIsActive(network)) {
1575
        networkReportError(VIR_ERR_INTERNAL_ERROR,
1576 1577
                           "%s", _("network is still active"));
        goto cleanup;
1578 1579
    }

1580
    if (virNetworkDeleteConfig(driver->networkConfigDir,
1581 1582
                               driver->networkAutostartDir,
                               network) < 0)
1583
        goto cleanup;
1584

1585 1586 1587 1588 1589 1590 1591 1592 1593
    if (network->def->nhosts > 0) {
        dnsmasqContext *dctx = dnsmasqContextNew(network->def->name, DNSMASQ_STATE_DIR);
        if (dctx == NULL)
            goto cleanup;

        dnsmasqDelete(dctx);
        dnsmasqContextFree(dctx);
    }

1594 1595
    virNetworkRemoveInactive(&driver->networks,
                             network);
1596
    network = NULL;
1597
    ret = 0;
1598

1599
cleanup:
1600 1601 1602
    if (network)
        virNetworkObjUnlock(network);
    networkDriverUnlock(driver);
1603
    return ret;
1604 1605 1606
}

static int networkStart(virNetworkPtr net) {
1607 1608 1609
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    int ret = -1;
1610

1611
    networkDriverLock(driver);
1612
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
1613

1614
    if (!network) {
1615
        networkReportError(VIR_ERR_INVALID_NETWORK,
1616 1617
                           "%s", _("no network with matching uuid"));
        goto cleanup;
1618 1619
    }

1620
    ret = networkStartNetworkDaemon(driver, network);
1621 1622

cleanup:
1623 1624
    if (network)
        virNetworkObjUnlock(network);
1625
    networkDriverUnlock(driver);
1626
    return ret;
1627 1628 1629
}

static int networkDestroy(virNetworkPtr net) {
1630 1631 1632
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    int ret = -1;
1633

1634
    networkDriverLock(driver);
1635
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
1636

1637
    if (!network) {
1638
        networkReportError(VIR_ERR_INVALID_NETWORK,
1639 1640
                           "%s", _("no network with matching uuid"));
        goto cleanup;
1641 1642
    }

D
Daniel P. Berrange 已提交
1643
    if (!virNetworkObjIsActive(network)) {
1644
        networkReportError(VIR_ERR_INTERNAL_ERROR,
1645 1646 1647 1648
                           "%s", _("network is not active"));
        goto cleanup;
    }

1649
    ret = networkShutdownNetworkDaemon(driver, network);
1650
    if (!network->persistent) {
1651 1652 1653 1654
        virNetworkRemoveInactive(&driver->networks,
                                 network);
        network = NULL;
    }
1655

1656
cleanup:
1657 1658
    if (network)
        virNetworkObjUnlock(network);
1659
    networkDriverUnlock(driver);
1660 1661 1662 1663
    return ret;
}

static char *networkDumpXML(virNetworkPtr net, int flags ATTRIBUTE_UNUSED) {
1664 1665 1666
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    char *ret = NULL;
1667

1668
    networkDriverLock(driver);
1669
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
1670 1671
    networkDriverUnlock(driver);

1672
    if (!network) {
1673
        networkReportError(VIR_ERR_INVALID_NETWORK,
1674 1675
                           "%s", _("no network with matching uuid"));
        goto cleanup;
1676 1677
    }

1678
    ret = virNetworkDefFormat(network->def);
1679 1680

cleanup:
1681 1682
    if (network)
        virNetworkObjUnlock(network);
1683
    return ret;
1684 1685 1686
}

static char *networkGetBridgeName(virNetworkPtr net) {
1687 1688 1689 1690
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    char *bridge = NULL;

1691
    networkDriverLock(driver);
1692
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
1693 1694
    networkDriverUnlock(driver);

1695
    if (!network) {
1696
        networkReportError(VIR_ERR_INVALID_NETWORK,
1697 1698
                           "%s", _("no network with matching id"));
        goto cleanup;
1699 1700
    }

1701
    if (!(network->def->bridge)) {
1702
        networkReportError(VIR_ERR_INTERNAL_ERROR,
1703 1704 1705 1706 1707
                           _("network '%s' does not have a bridge name."),
                           network->def->name);
        goto cleanup;
    }

1708
    bridge = strdup(network->def->bridge);
1709
    if (!bridge)
1710
        virReportOOMError();
1711 1712

cleanup:
1713 1714
    if (network)
        virNetworkObjUnlock(network);
1715 1716 1717 1718 1719
    return bridge;
}

static int networkGetAutostart(virNetworkPtr net,
                             int *autostart) {
1720 1721 1722
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    int ret = -1;
1723

1724
    networkDriverLock(driver);
1725
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
1726
    networkDriverUnlock(driver);
1727
    if (!network) {
1728 1729
        networkReportError(VIR_ERR_INVALID_NETWORK,
                           "%s", _("no network with matching uuid"));
1730
        goto cleanup;
1731 1732 1733
    }

    *autostart = network->autostart;
1734
    ret = 0;
1735

1736
cleanup:
1737 1738
    if (network)
        virNetworkObjUnlock(network);
1739
    return ret;
1740 1741 1742
}

static int networkSetAutostart(virNetworkPtr net,
1743
                               int autostart) {
1744 1745
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
1746
    char *configFile = NULL, *autostartLink = NULL;
1747
    int ret = -1;
1748

1749
    networkDriverLock(driver);
1750
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
1751

1752
    if (!network) {
1753 1754
        networkReportError(VIR_ERR_INVALID_NETWORK,
                           "%s", _("no network with matching uuid"));
1755
        goto cleanup;
1756 1757
    }

1758
    if (!network->persistent) {
1759 1760
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           "%s", _("cannot set autostart for transient network"));
1761 1762 1763
        goto cleanup;
    }

1764 1765
    autostart = (autostart != 0);

1766
    if (network->autostart != autostart) {
1767
        if ((configFile = virNetworkConfigFile(driver->networkConfigDir, network->def->name)) == NULL)
1768
            goto cleanup;
1769
        if ((autostartLink = virNetworkConfigFile(driver->networkAutostartDir, network->def->name)) == NULL)
1770 1771
            goto cleanup;

1772
        if (autostart) {
1773
            if (virFileMakePath(driver->networkAutostartDir)) {
1774
                virReportSystemError(errno,
1775 1776
                                     _("cannot create autostart directory '%s'"),
                                     driver->networkAutostartDir);
1777 1778
                goto cleanup;
            }
1779

1780
            if (symlink(configFile, autostartLink) < 0) {
1781
                virReportSystemError(errno,
1782
                                     _("Failed to create symlink '%s' to '%s'"),
1783
                                     autostartLink, configFile);
1784 1785 1786
                goto cleanup;
            }
        } else {
1787
            if (unlink(autostartLink) < 0 && errno != ENOENT && errno != ENOTDIR) {
1788
                virReportSystemError(errno,
1789
                                     _("Failed to delete symlink '%s'"),
1790
                                     autostartLink);
1791 1792
                goto cleanup;
            }
1793 1794
        }

1795
        network->autostart = autostart;
1796
    }
1797
    ret = 0;
1798

1799
cleanup:
1800 1801
    VIR_FREE(configFile);
    VIR_FREE(autostartLink);
1802 1803
    if (network)
        virNetworkObjUnlock(network);
1804
    networkDriverUnlock(driver);
1805
    return ret;
1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827
}


static virNetworkDriver networkDriver = {
    "Network",
    networkOpenNetwork, /* open */
    networkCloseNetwork, /* close */
    networkNumNetworks, /* numOfNetworks */
    networkListNetworks, /* listNetworks */
    networkNumDefinedNetworks, /* numOfDefinedNetworks */
    networkListDefinedNetworks, /* listDefinedNetworks */
    networkLookupByUUID, /* networkLookupByUUID */
    networkLookupByName, /* networkLookupByName */
    networkCreate, /* networkCreateXML */
    networkDefine, /* networkDefineXML */
    networkUndefine, /* networkUndefine */
    networkStart, /* networkCreate */
    networkDestroy, /* networkDestroy */
    networkDumpXML, /* networkDumpXML */
    networkGetBridgeName, /* networkGetBridgeName */
    networkGetAutostart, /* networkGetAutostart */
    networkSetAutostart, /* networkSetAutostart */
1828 1829
    networkIsActive,
    networkIsPersistent,
1830 1831 1832
};

static virStateDriver networkStateDriver = {
1833
    "Network",
1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844
    networkStartup,
    networkShutdown,
    networkReload,
    networkActive,
};

int networkRegister(void) {
    virRegisterNetworkDriver(&networkDriver);
    virRegisterStateDriver(&networkStateDriver);
    return 0;
}