bridge_driver.c 55.7 KB
Newer Older
1
/*
2
 * bridge_driver.c: core driver methods for managing network
3
 *
4
 * Copyright (C) 2006-2010 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45
 * Copyright (C) 2006 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this library; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307  USA
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 */

#include <config.h>

#include <sys/types.h>
#include <sys/poll.h>
#include <dirent.h>
#include <limits.h>
#include <string.h>
#include <stdio.h>
#include <stdarg.h>
#include <stdlib.h>
#include <unistd.h>
#include <errno.h>
#include <sys/utsname.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <signal.h>
#include <paths.h>
#include <pwd.h>
#include <stdio.h>
#include <sys/wait.h>
#include <sys/ioctl.h>

46
#include "virterror_internal.h"
47
#include "datatypes.h"
48
#include "bridge_driver.h"
49 50 51 52 53 54 55 56 57
#include "network_conf.h"
#include "driver.h"
#include "event.h"
#include "buf.h"
#include "util.h"
#include "memory.h"
#include "uuid.h"
#include "iptables.h"
#include "bridge.h"
58
#include "logging.h"
59
#include "dnsmasq.h"
60
#include "util/network.h"
61

62 63
#define NETWORK_PID_DIR LOCAL_STATE_DIR "/run/libvirt/network"
#define NETWORK_STATE_DIR LOCAL_STATE_DIR "/lib/libvirt/network"
64

65
#define DNSMASQ_STATE_DIR LOCAL_STATE_DIR "/lib/libvirt/dnsmasq"
66

67 68
#define VIR_FROM_THIS VIR_FROM_NETWORK

69
#define networkReportError(code, ...)                                   \
70
    virReportErrorHelper(NULL, VIR_FROM_NETWORK, code, __FILE__,        \
71
                         __FUNCTION__, __LINE__, __VA_ARGS__)
72

73 74
/* Main driver state */
struct network_driver {
75
    virMutex lock;
76

77
    virNetworkObjList networks;
78 79 80 81 82 83 84 85

    iptablesContext *iptables;
    brControl *brctl;
    char *networkConfigDir;
    char *networkAutostartDir;
    char *logDir;
};

86 87 88

static void networkDriverLock(struct network_driver *driver)
{
89
    virMutexLock(&driver->lock);
90 91 92
}
static void networkDriverUnlock(struct network_driver *driver)
{
93
    virMutexUnlock(&driver->lock);
94 95
}

96 97
static int networkShutdown(void);

98 99
static int networkStartNetworkDaemon(struct network_driver *driver,
                                     virNetworkObjPtr network);
100

101 102
static int networkShutdownNetworkDaemon(struct network_driver *driver,
                                        virNetworkObjPtr network);
103

104 105
static void networkReloadIptablesRules(struct network_driver *driver);

106 107 108
static struct network_driver *driverState = NULL;


109 110 111 112 113 114 115 116 117 118 119
static void
networkFindActiveConfigs(struct network_driver *driver) {
    unsigned int i;

    for (i = 0 ; i < driver->networks.count ; i++) {
        virNetworkObjPtr obj = driver->networks.objs[i];
        virNetworkDefPtr tmp;
        char *config;

        virNetworkObjLock(obj);

120
        if ((config = virNetworkConfigFile(NETWORK_STATE_DIR,
121 122 123 124 125 126 127 128 129 130 131 132
                                           obj->def->name)) == NULL) {
            virNetworkObjUnlock(obj);
            continue;
        }

        if (access(config, R_OK) < 0) {
            VIR_FREE(config);
            virNetworkObjUnlock(obj);
            continue;
        }

        /* Try and load the live config */
133
        tmp = virNetworkDefParseFile(config);
134 135 136 137 138 139 140 141 142 143 144
        VIR_FREE(config);
        if (tmp) {
            obj->newDef = obj->def;
            obj->def = tmp;
        }

        /* If bridge exists, then mark it active */
        if (obj->def->bridge &&
            brHasBridge(driver->brctl, obj->def->bridge) == 0) {
            obj->active = 1;

145 146 147
            /* Finally try and read dnsmasq pid if any */
            if ((obj->def->ipAddress ||
                 obj->def->nranges) &&
148 149 150 151 152 153 154 155 156 157
                virFileReadPid(NETWORK_PID_DIR, obj->def->name,
                               &obj->dnsmasqPid) == 0) {

                /* Check its still alive */
                if (kill(obj->dnsmasqPid, 0) != 0)
                    obj->dnsmasqPid = -1;

#ifdef __linux__
                char *pidpath;

158
                if (virAsprintf(&pidpath, "/proc/%d/exe", obj->dnsmasqPid) < 0) {
159
                    virReportOOMError();
160 161
                    goto cleanup;
                }
162 163 164 165 166 167 168
                if (virFileLinkPointsTo(pidpath, DNSMASQ) == 0)
                    obj->dnsmasqPid = -1;
                VIR_FREE(pidpath);
#endif
            }
        }

169
    cleanup:
170 171 172 173 174
        virNetworkObjUnlock(obj);
    }
}


175 176 177
static void
networkAutostartConfigs(struct network_driver *driver) {
    unsigned int i;
178

179
    for (i = 0 ; i < driver->networks.count ; i++) {
180
        virNetworkObjLock(driver->networks.objs[i]);
181
        if (driver->networks.objs[i]->autostart &&
D
Daniel P. Berrange 已提交
182
            !virNetworkObjIsActive(driver->networks.objs[i]) &&
183
            networkStartNetworkDaemon(driver, driver->networks.objs[i]) < 0) {
184
            /* failed to start but already logged */
185
        }
186
        virNetworkObjUnlock(driver->networks.objs[i]);
187 188 189 190 191 192 193 194 195
    }
}

/**
 * networkStartup:
 *
 * Initialization function for the QEmu daemon
 */
static int
196
networkStartup(int privileged) {
197 198
    uid_t uid = geteuid();
    char *base = NULL;
199
    int err;
200 201

    if (VIR_ALLOC(driverState) < 0)
202
        goto error;
203

204 205 206 207
    if (virMutexInit(&driverState->lock) < 0) {
        VIR_FREE(driverState);
        goto error;
    }
208 209
    networkDriverLock(driverState);

210
    if (privileged) {
211 212
        if (virAsprintf(&driverState->logDir,
                        "%s/log/libvirt/qemu", LOCAL_STATE_DIR) == -1)
213 214 215 216 217
            goto out_of_memory;

        if ((base = strdup (SYSCONF_DIR "/libvirt")) == NULL)
            goto out_of_memory;
    } else {
218
        char *userdir = virGetUserDirectory(uid);
219 220 221

        if (!userdir)
            goto error;
222

223
        if (virAsprintf(&driverState->logDir,
224 225
                        "%s/.libvirt/qemu/log", userdir) == -1) {
            VIR_FREE(userdir);
226
            goto out_of_memory;
227
        }
228

229 230
        if (virAsprintf(&base, "%s/.libvirt", userdir) == -1) {
            VIR_FREE(userdir);
231 232
            goto out_of_memory;
        }
233
        VIR_FREE(userdir);
234 235 236 237 238
    }

    /* Configuration paths are either ~/.libvirt/qemu/... (session) or
     * /etc/libvirt/qemu/... (system).
     */
239
    if (virAsprintf(&driverState->networkConfigDir, "%s/qemu/networks", base) == -1)
240 241
        goto out_of_memory;

242 243
    if (virAsprintf(&driverState->networkAutostartDir, "%s/qemu/networks/autostart",
                    base) == -1)
244 245 246 247
        goto out_of_memory;

    VIR_FREE(base);

248
    if ((err = brInit(&driverState->brctl))) {
249
        virReportSystemError(err, "%s",
250 251 252 253 254
                             _("cannot initialize bridge support"));
        goto error;
    }

    if (!(driverState->iptables = iptablesContextNew())) {
255
        goto out_of_memory;
256 257 258
    }


259
    if (virNetworkLoadAllConfigs(&driverState->networks,
260
                                 driverState->networkConfigDir,
261 262 263
                                 driverState->networkAutostartDir) < 0)
        goto error;

264
    networkFindActiveConfigs(driverState);
265
    networkReloadIptablesRules(driverState);
266 267
    networkAutostartConfigs(driverState);

268 269
    networkDriverUnlock(driverState);

270 271
    return 0;

272
out_of_memory:
273
    virReportOOMError();
274 275

error:
276 277 278
    if (driverState)
        networkDriverUnlock(driverState);

279
    VIR_FREE(base);
280
    networkShutdown();
281 282 283 284 285 286 287 288 289 290 291
    return -1;
}

/**
 * networkReload:
 *
 * Function to restart the QEmu daemon, it will recheck the configuration
 * files and update its state and the networking
 */
static int
networkReload(void) {
292 293 294
    if (!driverState)
        return 0;

295
    networkDriverLock(driverState);
296
    virNetworkLoadAllConfigs(&driverState->networks,
297 298
                             driverState->networkConfigDir,
                             driverState->networkAutostartDir);
299
    networkReloadIptablesRules(driverState);
300
    networkAutostartConfigs(driverState);
301
    networkDriverUnlock(driverState);
302 303 304 305 306 307 308 309 310 311 312 313 314
    return 0;
}

/**
 * networkActive:
 *
 * Checks if the QEmu daemon is active, i.e. has an active domain or
 * an active network
 *
 * Returns 1 if active, 0 otherwise
 */
static int
networkActive(void) {
315
    unsigned int i;
316
    int active = 0;
317

318 319 320
    if (!driverState)
        return 0;

321
    networkDriverLock(driverState);
322 323
    for (i = 0 ; i < driverState->networks.count ; i++) {
        virNetworkObjPtr net = driverState->networks.objs[i];
324
        virNetworkObjLock(net);
D
Daniel P. Berrange 已提交
325
        if (virNetworkObjIsActive(net))
326
            active = 1;
327
        virNetworkObjUnlock(net);
328
    }
329
    networkDriverUnlock(driverState);
330
    return active;
331 332 333 334 335 336 337 338 339 340 341 342
}

/**
 * networkShutdown:
 *
 * Shutdown the QEmu daemon, it will stop all active domains and networks
 */
static int
networkShutdown(void) {
    if (!driverState)
        return -1;

343 344
    networkDriverLock(driverState);

345
    /* free inactive networks */
346
    virNetworkObjListFree(&driverState->networks);
347 348 349 350 351 352 353 354 355 356

    VIR_FREE(driverState->logDir);
    VIR_FREE(driverState->networkConfigDir);
    VIR_FREE(driverState->networkAutostartDir);

    if (driverState->brctl)
        brShutdown(driverState->brctl);
    if (driverState->iptables)
        iptablesContextFree(driverState->iptables);

357
    networkDriverUnlock(driverState);
358
    virMutexDestroy(&driverState->lock);
359

360 361 362 363 364 365
    VIR_FREE(driverState);

    return 0;
}


366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388
static int
networkSaveDnsmasqHostsfile(virNetworkObjPtr network,
                            dnsmasqContext *dctx,
                            bool force)
{
    unsigned int i;

    if (! force && virFileExists(dctx->hostsfile->path))
        return 1;

    for (i = 0 ; i < network->def->nhosts ; i++) {
        virNetworkDHCPHostDefPtr host = &(network->def->hosts[i]);
        if ((host->mac) && (host->ip))
            dnsmasqAddDhcpHost(dctx, host->mac, host->ip, host->name);
    }

    if (dnsmasqSave(dctx) < 0)
        return 0;

    return 1;
}


389
static int
390
networkBuildDnsmasqArgv(virNetworkObjPtr network,
391 392
                        const char *pidfile,
                        const char ***argv) {
393
    int i, len, r;
394
    int nbleases = 0;
395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415
    char *pidfileArg;
    char buf[1024];

    /*
     * NB, be careful about syntax for dnsmasq options in long format
     *
     * If the flag has a mandatory argument, it can be given using
     * either syntax:
     *
     *     --foo bar
     *     --foo=bar
     *
     * If the flag has a optional argument, it *must* be given using
     * the syntax:
     *
     *     --foo=bar
     *
     * It is hard to determine whether a flag is optional or not,
     * without reading the dnsmasq source :-( The manpages is not
     * very explicit on this
     */
416 417 418 419 420 421

    len =
        1 + /* dnsmasq */
        1 + /* --strict-order */
        1 + /* --bind-interfaces */
        (network->def->domain?2:0) + /* --domain name */
422
        2 + /* --pid-file /var/run/libvirt/network/$NAME.pid */
423 424 425 426 427
        2 + /* --conf-file "" */
        /*2 + *//* --interface virbr0 */
        2 + /* --except-interface lo */
        2 + /* --listen-address 10.0.0.1 */
        (2 * network->def->nranges) + /* --dhcp-range 10.0.0.2,10.0.0.254 */
428 429
        /* --dhcp-lease-max=xxx if needed */
        (network->def->nranges ? 0 : 1) +
430 431
        /* --dhcp-hostsfile=/var/lib/dnsmasq/$NAME.hostsfile */
        (network->def->nhosts > 0 ? 1 : 0) +
432 433
        /* --enable-tftp --tftp-root /srv/tftp */
        (network->def->tftproot ? 3 : 0) +
434
        /* --dhcp-boot pxeboot.img[,,12.34.56.78] */
435
        (network->def->bootfile ? 2 : 0) +
436 437 438 439 440 441 442 443 444 445
        1;  /* NULL */

    if (VIR_ALLOC_N(*argv, len) < 0)
        goto no_memory;

#define APPEND_ARG(v, n, s) do {     \
        if (!((v)[(n)] = strdup(s))) \
            goto no_memory;          \
    } while (0)

446 447 448
#define APPEND_ARG_LIT(v, n, s) \
        (v)[(n)] = s

449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464
    i = 0;

    APPEND_ARG(*argv, i++, DNSMASQ);

    /*
     * Needed to ensure dnsmasq uses same algorithm for processing
     * multiple namedriver entries in /etc/resolv.conf as GLibC.
     */
    APPEND_ARG(*argv, i++, "--strict-order");
    APPEND_ARG(*argv, i++, "--bind-interfaces");

    if (network->def->domain) {
       APPEND_ARG(*argv, i++, "--domain");
       APPEND_ARG(*argv, i++, network->def->domain);
    }

465 466 467
    if (virAsprintf(&pidfileArg, "--pid-file=%s", pidfile) < 0)
        goto no_memory;
    APPEND_ARG_LIT(*argv, i++, pidfileArg);
468

469
    APPEND_ARG(*argv, i++, "--conf-file=");
470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493
    APPEND_ARG(*argv, i++, "");

    /*
     * XXX does not actually work, due to some kind of
     * race condition setting up ipv6 addresses on the
     * interface. A sleep(10) makes it work, but that's
     * clearly not practical
     *
     * APPEND_ARG(*argv, i++, "--interface");
     * APPEND_ARG(*argv, i++, network->def->bridge);
     */
    APPEND_ARG(*argv, i++, "--listen-address");
    APPEND_ARG(*argv, i++, network->def->ipAddress);

    APPEND_ARG(*argv, i++, "--except-interface");
    APPEND_ARG(*argv, i++, "lo");

    for (r = 0 ; r < network->def->nranges ; r++) {
        snprintf(buf, sizeof(buf), "%s,%s",
                 network->def->ranges[r].start,
                 network->def->ranges[r].end);

        APPEND_ARG(*argv, i++, "--dhcp-range");
        APPEND_ARG(*argv, i++, buf);
494 495 496 497 498 499
        nbleases += network->def->ranges[r].size;
    }

    if (network->def->nranges > 0) {
        snprintf(buf, sizeof(buf), "--dhcp-lease-max=%d", nbleases);
        APPEND_ARG(*argv, i++, buf);
500 501
    }

502 503 504
    if (network->def->nhosts > 0) {
        dnsmasqContext *dctx = dnsmasqContextNew(network->def->name, DNSMASQ_STATE_DIR);
        char *hostsfileArg;
505

506 507 508 509 510 511 512 513 514 515 516 517
        if (dctx == NULL)
            goto no_memory;

        if (networkSaveDnsmasqHostsfile(network, dctx, false)) {
            if (virAsprintf(&hostsfileArg, "--dhcp-hostsfile=%s", dctx->hostsfile->path) < 0) {
                dnsmasqContextFree(dctx);
                goto no_memory;
            }
            APPEND_ARG_LIT(*argv, i++, hostsfileArg);
        }

        dnsmasqContextFree(dctx);
518 519
    }

520 521 522 523 524 525
    if (network->def->tftproot) {
        APPEND_ARG(*argv, i++, "--enable-tftp");
        APPEND_ARG(*argv, i++, "--tftp-root");
        APPEND_ARG(*argv, i++, network->def->tftproot);
    }
    if (network->def->bootfile) {
526 527 528 529 530
        snprintf(buf, sizeof(buf), "%s%s%s",
                 network->def->bootfile,
                 network->def->bootserver ? ",," : "",
                 network->def->bootserver ? network->def->bootserver : "");

531
        APPEND_ARG(*argv, i++, "--dhcp-boot");
532
        APPEND_ARG(*argv, i++, buf);
533 534
    }

535 536 537 538 539
#undef APPEND_ARG

    return 0;

 no_memory:
540
    if (*argv) {
541 542 543 544
        for (i = 0; (*argv)[i]; i++)
            VIR_FREE((*argv)[i]);
        VIR_FREE(*argv);
    }
545
    virReportOOMError();
546 547 548 549 550
    return -1;
}


static int
551
dhcpStartDhcpDaemon(virNetworkObjPtr network)
552 553
{
    const char **argv;
554 555 556 557
    char *pidfile;
    int ret = -1, i, err;

    network->dnsmasqPid = -1;
558 559

    if (network->def->ipAddress == NULL) {
560 561
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           "%s", _("cannot start dhcp daemon without IP address for server"));
562 563 564
        return -1;
    }

L
Laine Stump 已提交
565
    if ((err = virFileMakePath(NETWORK_PID_DIR)) != 0) {
566
        virReportSystemError(err,
567 568 569 570
                             _("cannot create directory %s"),
                             NETWORK_PID_DIR);
        return -1;
    }
L
Laine Stump 已提交
571
    if ((err = virFileMakePath(NETWORK_STATE_DIR)) != 0) {
572
        virReportSystemError(err,
573 574 575 576 577 578
                             _("cannot create directory %s"),
                             NETWORK_STATE_DIR);
        return -1;
    }

    if (!(pidfile = virFilePid(NETWORK_PID_DIR, network->def->name))) {
579
        virReportOOMError();
580 581 582
        return -1;
    }

583
    argv = NULL;
584
    if (networkBuildDnsmasqArgv(network, pidfile, &argv) < 0) {
585
        VIR_FREE(pidfile);
586
        return -1;
587 588
    }

589
    if (virRun(argv, NULL) < 0)
590 591 592 593 594 595 596 597 598 599 600 601 602
        goto cleanup;

    /*
     * There really is no race here - when dnsmasq daemonizes,
     * its leader process stays around until its child has
     * actually written its pidfile. So by time virRun exits
     * it has waitpid'd and guaranteed the proess has started
     * and written a pid
     */

    if (virFileReadPid(NETWORK_PID_DIR, network->def->name,
                       &network->dnsmasqPid) < 0)
        goto cleanup;
603

604
    ret = 0;
605

606 607
cleanup:
    VIR_FREE(pidfile);
608 609 610 611 612 613 614 615
    for (i = 0; argv[i]; i++)
        VIR_FREE(argv[i]);
    VIR_FREE(argv);

    return ret;
}

static int
616 617
networkAddMasqueradingIptablesRules(struct network_driver *driver,
                                    virNetworkObjPtr network) {
618 619 620 621 622 623
    int err;
    /* allow forwarding packets from the bridge interface */
    if ((err = iptablesAddForwardAllowOut(driver->iptables,
                                          network->def->network,
                                          network->def->bridge,
                                          network->def->forwardDev))) {
624
        virReportSystemError(err,
625 626
                             _("failed to add iptables rule to allow forwarding from '%s'"),
                             network->def->bridge);
627 628 629 630 631 632 633 634
        goto masqerr1;
    }

    /* allow forwarding packets to the bridge interface if they are part of an existing connection */
    if ((err = iptablesAddForwardAllowRelatedIn(driver->iptables,
                                         network->def->network,
                                         network->def->bridge,
                                         network->def->forwardDev))) {
635
        virReportSystemError(err,
636 637
                             _("failed to add iptables rule to allow forwarding to '%s'"),
                             network->def->bridge);
638 639 640
        goto masqerr2;
    }

641 642 643 644 645
    /*
     * Enable masquerading.
     *
     * We need to end up with 3 rules in the table in this order
     *
E
Eric Blake 已提交
646 647
     *  1. protocol=tcp with sport mapping restriction
     *  2. protocol=udp with sport mapping restriction
648 649 650
     *  3. generic any protocol
     *
     * The sport mappings are required, because default IPtables
E
Eric Blake 已提交
651
     * MASQUERADE maintain port numbers unchanged where possible.
652 653 654 655 656 657 658 659 660 661 662 663 664
     *
     * NFS can be configured to only "trust" port numbers < 1023.
     *
     * Guests using NAT thus need to be prevented from having port
     * numbers < 1023, otherwise they can bypass the NFS "security"
     * check on the source port number.
     *
     * Since we use '--insert' to add rules to the header of the
     * chain, we actually need to add them in the reverse of the
     * order just mentioned !
     */

    /* First the generic masquerade rule for other protocols */
665 666
    if ((err = iptablesAddForwardMasquerade(driver->iptables,
                                            network->def->network,
667 668
                                            network->def->forwardDev,
                                            NULL))) {
669
        virReportSystemError(err,
670
                             _("failed to add iptables rule to enable masquerading to '%s'"),
671
                             network->def->forwardDev ? network->def->forwardDev : NULL);
672 673 674
        goto masqerr3;
    }

675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696
    /* UDP with a source port restriction */
    if ((err = iptablesAddForwardMasquerade(driver->iptables,
                                            network->def->network,
                                            network->def->forwardDev,
                                            "udp"))) {
        virReportSystemError(err,
                             _("failed to add iptables rule to enable UDP masquerading to '%s'"),
                             network->def->forwardDev ? network->def->forwardDev : NULL);
        goto masqerr4;
    }

    /* TCP with a source port restriction */
    if ((err = iptablesAddForwardMasquerade(driver->iptables,
                                            network->def->network,
                                            network->def->forwardDev,
                                            "tcp"))) {
        virReportSystemError(err,
                             _("failed to add iptables rule to enable TCP masquerading to '%s'"),
                             network->def->forwardDev ? network->def->forwardDev : NULL);
        goto masqerr5;
    }

697 698
    return 1;

699 700 701 702 703 704 705 706 707 708
 masqerr5:
    iptablesRemoveForwardMasquerade(driver->iptables,
                                    network->def->network,
                                    network->def->forwardDev,
                                    "udp");
 masqerr4:
    iptablesRemoveForwardMasquerade(driver->iptables,
                                    network->def->network,
                                    network->def->forwardDev,
                                    NULL);
709 710 711 712 713 714 715 716 717 718 719 720 721 722 723
 masqerr3:
    iptablesRemoveForwardAllowRelatedIn(driver->iptables,
                                 network->def->network,
                                 network->def->bridge,
                                 network->def->forwardDev);
 masqerr2:
    iptablesRemoveForwardAllowOut(driver->iptables,
                                  network->def->network,
                                  network->def->bridge,
                                  network->def->forwardDev);
 masqerr1:
    return 0;
}

static int
724 725
networkAddRoutingIptablesRules(struct network_driver *driver,
                               virNetworkObjPtr network) {
726 727 728 729 730 731
    int err;
    /* allow routing packets from the bridge interface */
    if ((err = iptablesAddForwardAllowOut(driver->iptables,
                                          network->def->network,
                                          network->def->bridge,
                                          network->def->forwardDev))) {
732
        virReportSystemError(err,
733 734
                             _("failed to add iptables rule to allow routing from '%s'"),
                             network->def->bridge);
735 736 737 738 739 740 741 742
        goto routeerr1;
    }

    /* allow routing packets to the bridge interface */
    if ((err = iptablesAddForwardAllowIn(driver->iptables,
                                         network->def->network,
                                         network->def->bridge,
                                         network->def->forwardDev))) {
743
        virReportSystemError(err,
744 745
                             _("failed to add iptables rule to allow routing to '%s'"),
                             network->def->bridge);
746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761
        goto routeerr2;
    }

    return 1;


 routeerr2:
    iptablesRemoveForwardAllowOut(driver->iptables,
                                  network->def->network,
                                  network->def->bridge,
                                  network->def->forwardDev);
 routeerr1:
    return 0;
}

static int
762 763
networkAddIptablesRules(struct network_driver *driver,
                        virNetworkObjPtr network) {
764 765 766 767
    int err;

    /* allow DHCP requests through to dnsmasq */
    if ((err = iptablesAddTcpInput(driver->iptables, network->def->bridge, 67))) {
768
        virReportSystemError(err,
769 770
                             _("failed to add iptables rule to allow DHCP requests from '%s'"),
                             network->def->bridge);
771 772 773 774
        goto err1;
    }

    if ((err = iptablesAddUdpInput(driver->iptables, network->def->bridge, 67))) {
775
        virReportSystemError(err,
776 777
                             _("failed to add iptables rule to allow DHCP requests from '%s'"),
                             network->def->bridge);
778 779 780 781 782
        goto err2;
    }

    /* allow DNS requests through to dnsmasq */
    if ((err = iptablesAddTcpInput(driver->iptables, network->def->bridge, 53))) {
783
        virReportSystemError(err,
784 785
                             _("failed to add iptables rule to allow DNS requests from '%s'"),
                             network->def->bridge);
786 787 788 789
        goto err3;
    }

    if ((err = iptablesAddUdpInput(driver->iptables, network->def->bridge, 53))) {
790
        virReportSystemError(err,
791 792
                             _("failed to add iptables rule to allow DNS requests from '%s'"),
                             network->def->bridge);
793 794 795
        goto err4;
    }

796 797 798 799 800 801 802 803 804
    /* allow TFTP requests through to dnsmasq */
    if (network->def->tftproot &&
        (err = iptablesAddUdpInput(driver->iptables, network->def->bridge, 69))) {
        virReportSystemError(err,
                             _("failed to add iptables rule to allow TFTP requests from '%s'"),
                             network->def->bridge);
        goto err4tftp;
    }

805 806 807 808

    /* Catch all rules to block forwarding to/from bridges */

    if ((err = iptablesAddForwardRejectOut(driver->iptables, network->def->bridge))) {
809
        virReportSystemError(err,
810 811
                             _("failed to add iptables rule to block outbound traffic from '%s'"),
                             network->def->bridge);
812 813 814 815
        goto err5;
    }

    if ((err = iptablesAddForwardRejectIn(driver->iptables, network->def->bridge))) {
816
        virReportSystemError(err,
817 818
                             _("failed to add iptables rule to block inbound traffic to '%s'"),
                             network->def->bridge);
819 820 821 822 823
        goto err6;
    }

    /* Allow traffic between guests on the same bridge */
    if ((err = iptablesAddForwardAllowCross(driver->iptables, network->def->bridge))) {
824
        virReportSystemError(err,
825 826
                             _("failed to add iptables rule to allow cross bridge traffic on '%s'"),
                             network->def->bridge);
827 828 829 830 831 832
        goto err7;
    }


    /* If masquerading is enabled, set up the rules*/
    if (network->def->forwardType == VIR_NETWORK_FORWARD_NAT &&
833
        !networkAddMasqueradingIptablesRules(driver, network))
834 835 836
        goto err8;
    /* else if routing is enabled, set up the rules*/
    else if (network->def->forwardType == VIR_NETWORK_FORWARD_ROUTE &&
837
             !networkAddRoutingIptablesRules(driver, network))
838 839
        goto err8;

840 841 842 843 844 845 846 847 848 849 850 851 852 853
    /* If we are doing local DHCP service on this network, attempt to
     * add a rule that will fixup the checksum of DHCP response
     * packets back to the guests (but report failure without
     * aborting, since not all iptables implementations support it).
     */

    if ((network->def->ipAddress || network->def->nranges) &&
        (iptablesAddOutputFixUdpChecksum(driver->iptables,
                                         network->def->bridge, 68) != 0)) {
        VIR_WARN("Could not add rule to fixup DHCP response checksums "
                 "on network '%s'.", network->def->name);
        VIR_WARN0("May need to update iptables package & kernel to support CHECKSUM rule.");
    }

854 855 856 857 858 859 860 861 862 863 864 865
    return 1;

 err8:
    iptablesRemoveForwardAllowCross(driver->iptables,
                                    network->def->bridge);
 err7:
    iptablesRemoveForwardRejectIn(driver->iptables,
                                  network->def->bridge);
 err6:
    iptablesRemoveForwardRejectOut(driver->iptables,
                                   network->def->bridge);
 err5:
866 867 868 869
    if (network->def->tftproot) {
        iptablesRemoveUdpInput(driver->iptables, network->def->bridge, 69);
    }
 err4tftp:
870 871 872 873 874 875 876 877 878 879 880 881 882 883
    iptablesRemoveUdpInput(driver->iptables, network->def->bridge, 53);
 err4:
    iptablesRemoveTcpInput(driver->iptables, network->def->bridge, 53);
 err3:
    iptablesRemoveUdpInput(driver->iptables, network->def->bridge, 67);
 err2:
    iptablesRemoveTcpInput(driver->iptables, network->def->bridge, 67);
 err1:
    return 0;
}

static void
networkRemoveIptablesRules(struct network_driver *driver,
                         virNetworkObjPtr network) {
884 885 886 887
    if (network->def->ipAddress || network->def->nranges) {
        iptablesRemoveOutputFixUdpChecksum(driver->iptables,
                                           network->def->bridge, 68);
    }
888
    if (network->def->forwardType != VIR_NETWORK_FORWARD_NONE) {
889 890
        if (network->def->forwardType == VIR_NETWORK_FORWARD_NAT) {
            iptablesRemoveForwardMasquerade(driver->iptables,
891 892 893 894 895 896 897 898 899 900 901
                                            network->def->network,
                                            network->def->forwardDev,
                                            "tcp");
            iptablesRemoveForwardMasquerade(driver->iptables,
                                            network->def->network,
                                            network->def->forwardDev,
                                            "udp");
            iptablesRemoveForwardMasquerade(driver->iptables,
                                            network->def->network,
                                            network->def->forwardDev,
                                            NULL);
902 903 904 905
            iptablesRemoveForwardAllowRelatedIn(driver->iptables,
                                                network->def->network,
                                                network->def->bridge,
                                                network->def->forwardDev);
906
        } else if (network->def->forwardType == VIR_NETWORK_FORWARD_ROUTE)
907 908 909 910 911 912 913 914 915 916 917 918 919
            iptablesRemoveForwardAllowIn(driver->iptables,
                                         network->def->network,
                                         network->def->bridge,
                                         network->def->forwardDev);

        iptablesRemoveForwardAllowOut(driver->iptables,
                                      network->def->network,
                                      network->def->bridge,
                                      network->def->forwardDev);
    }
    iptablesRemoveForwardAllowCross(driver->iptables, network->def->bridge);
    iptablesRemoveForwardRejectIn(driver->iptables, network->def->bridge);
    iptablesRemoveForwardRejectOut(driver->iptables, network->def->bridge);
920
    iptablesRemoveUdpInput(driver->iptables, network->def->bridge, 69);
921 922 923 924 925 926
    iptablesRemoveUdpInput(driver->iptables, network->def->bridge, 53);
    iptablesRemoveTcpInput(driver->iptables, network->def->bridge, 53);
    iptablesRemoveUdpInput(driver->iptables, network->def->bridge, 67);
    iptablesRemoveTcpInput(driver->iptables, network->def->bridge, 67);
}

927 928 929 930 931 932 933 934 935 936 937 938
static void
networkReloadIptablesRules(struct network_driver *driver)
{
    unsigned int i;

    VIR_INFO0(_("Reloading iptables rules"));

    for (i = 0 ; i < driver->networks.count ; i++) {
        virNetworkObjLock(driver->networks.objs[i]);

        if (virNetworkObjIsActive(driver->networks.objs[i])) {
            networkRemoveIptablesRules(driver, driver->networks.objs[i]);
939
            if (!networkAddIptablesRules(driver, driver->networks.objs[i])) {
940 941 942 943 944 945 946 947
                /* failed to add but already logged */
            }
        }

        virNetworkObjUnlock(driver->networks.objs[i]);
    }
}

948
/* Enable IP Forwarding. Return 0 for success, -1 for failure. */
949 950 951
static int
networkEnableIpForwarding(void)
{
M
Mark McLoughlin 已提交
952
    return virFileWriteStr("/proc/sys/net/ipv4/ip_forward", "1\n");
953 954
}

955 956
#define SYSCTL_PATH "/proc/sys"

957
static int networkDisableIPV6(virNetworkObjPtr network)
958 959 960 961 962
{
    char *field = NULL;
    int ret = -1;

    if (virAsprintf(&field, SYSCTL_PATH "/net/ipv6/conf/%s/disable_ipv6", network->def->bridge) < 0) {
963
        virReportOOMError();
964 965 966
        goto cleanup;
    }

967 968 969 970 971 972
    if (access(field, W_OK) < 0 && errno == ENOENT) {
        VIR_DEBUG("ipv6 appears to already be disabled on %s", network->def->bridge);
        ret = 0;
        goto cleanup;
    }

973
    if (virFileWriteStr(field, "1") < 0) {
974
        virReportSystemError(errno,
975 976 977 978 979 980
                             _("cannot enable %s"), field);
        goto cleanup;
    }
    VIR_FREE(field);

    if (virAsprintf(&field, SYSCTL_PATH "/net/ipv6/conf/%s/accept_ra", network->def->bridge) < 0) {
981
        virReportOOMError();
982 983 984 985
        goto cleanup;
    }

    if (virFileWriteStr(field, "0") < 0) {
986
        virReportSystemError(errno,
987 988 989 990 991 992
                             _("cannot disable %s"), field);
        goto cleanup;
    }
    VIR_FREE(field);

    if (virAsprintf(&field, SYSCTL_PATH "/net/ipv6/conf/%s/autoconf", network->def->bridge) < 0) {
993
        virReportOOMError();
994 995 996 997
        goto cleanup;
    }

    if (virFileWriteStr(field, "1") < 0) {
998
        virReportSystemError(errno,
999 1000 1001 1002 1003 1004 1005 1006 1007 1008
                             _("cannot enable %s"), field);
        goto cleanup;
    }

    ret = 0;
cleanup:
    VIR_FREE(field);
    return ret;
}

1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116
#define PROC_NET_ROUTE "/proc/net/route"

/* XXX: This function can be a lot more exhaustive, there are certainly
 *      other scenarios where we can ruin host network connectivity.
 * XXX: Using a proper library is preferred over parsing /proc
 */
static int networkCheckRouteCollision(virNetworkObjPtr network)
{
    int ret = -1, len;
    unsigned int net_dest;
    char *cur, *buf = NULL;
    enum {MAX_ROUTE_SIZE = 1024*64};
    virSocketAddr inaddress, innetmask;

    if (!network->def->ipAddress || !network->def->netmask)
        return 0;

    if (virSocketParseAddr(network->def->ipAddress, &inaddress, 0) < 0) {
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           _("cannot parse IP address '%s'"),
                           network->def->ipAddress);
        goto error;
    }

    if (virSocketParseAddr(network->def->netmask, &innetmask, 0) < 0) {
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           _("cannot parse netmask '%s'"),
                           network->def->netmask);
        goto error;
    }

    if (inaddress.stor.ss_family != AF_INET ||
        innetmask.stor.ss_family != AF_INET) {
        /* Only support collision check for IPv4 */
        goto out;
    }

    net_dest = (inaddress.inet4.sin_addr.s_addr &
                innetmask.inet4.sin_addr.s_addr);

    /* Read whole routing table into memory */
    if ((len = virFileReadAll(PROC_NET_ROUTE, MAX_ROUTE_SIZE, &buf)) < 0)
        goto error;

    /* Dropping the last character shouldn't hurt */
    if (len > 0)
        buf[len-1] = '\0';

    VIR_DEBUG("%s output:\n%s", PROC_NET_ROUTE, buf);

    if (!STRPREFIX (buf, "Iface"))
        goto out;

    /* First line is just headings, skip it */
    cur = strchr(buf, '\n');
    if (cur)
        cur++;

    while (cur) {
        char iface[17], dest[128], mask[128];
        unsigned int addr_val, mask_val;
        int num;

        /* NUL-terminate the line, so sscanf doesn't go beyond a newline.  */
        char *nl = strchr(cur, '\n');
        if (nl) {
            *nl++ = '\0';
        }

        num = sscanf(cur, "%16s %127s %*s %*s %*s %*s %*s %127s",
                     iface, dest, mask);
        cur = nl;

        if (num != 3) {
            VIR_DEBUG("Failed to parse %s", PROC_NET_ROUTE);
            continue;
        }

        if (virStrToLong_ui(dest, NULL, 16, &addr_val) < 0) {
            VIR_DEBUG("Failed to convert network address %s to uint", dest);
            continue;
        }

        if (virStrToLong_ui(mask, NULL, 16, &mask_val) < 0) {
            VIR_DEBUG("Failed to convert network mask %s to uint", mask);
            continue;
        }

        addr_val &= mask_val;

        if ((net_dest == addr_val) &&
            (innetmask.inet4.sin_addr.s_addr == mask_val)) {
            networkReportError(VIR_ERR_INTERNAL_ERROR,
                              _("Network %s/%s is already in use by "
                                "interface %s"),
                                network->def->ipAddress,
                                network->def->netmask, iface);
            goto error;
        }
    }

out:
    ret = 0;
error:
    VIR_FREE(buf);
    return ret;
}

1117 1118 1119
static int networkStartNetworkDaemon(struct network_driver *driver,
                                     virNetworkObjPtr network)
{
1120 1121
    int err;

D
Daniel P. Berrange 已提交
1122
    if (virNetworkObjIsActive(network)) {
1123 1124
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           "%s", _("network is already active"));
1125 1126 1127
        return -1;
    }

1128 1129 1130 1131
    /* Check to see if network collides with an existing route */
    if (networkCheckRouteCollision(network) < 0)
        return -1;

1132
    if ((err = brAddBridge(driver->brctl, network->def->bridge))) {
1133
        virReportSystemError(err,
1134 1135
                             _("cannot create bridge '%s'"),
                             network->def->bridge);
1136 1137 1138
        return -1;
    }

1139
    if (networkDisableIPV6(network) < 0)
1140 1141
        goto err_delbr;

1142 1143 1144 1145 1146 1147 1148 1149
    if (brSetForwardDelay(driver->brctl, network->def->bridge, network->def->delay) < 0)
        goto err_delbr;

    if (brSetEnableSTP(driver->brctl, network->def->bridge, network->def->stp ? 1 : 0) < 0)
        goto err_delbr;

    if (network->def->ipAddress &&
        (err = brSetInetAddress(driver->brctl, network->def->bridge, network->def->ipAddress))) {
1150
        virReportSystemError(err,
1151 1152
                             _("cannot set IP address on bridge '%s' to '%s'"),
                             network->def->bridge, network->def->ipAddress);
1153 1154 1155 1156 1157
        goto err_delbr;
    }

    if (network->def->netmask &&
        (err = brSetInetNetmask(driver->brctl, network->def->bridge, network->def->netmask))) {
1158
        virReportSystemError(err,
1159 1160
                             _("cannot set netmask on bridge '%s' to '%s'"),
                             network->def->bridge, network->def->netmask);
1161 1162 1163
        goto err_delbr;
    }

1164
    if ((err = brSetInterfaceUp(driver->brctl, network->def->bridge, 1))) {
1165
        virReportSystemError(err,
1166 1167
                             _("failed to bring the bridge '%s' up"),
                             network->def->bridge);
1168 1169 1170
        goto err_delbr;
    }

1171
    if (!networkAddIptablesRules(driver, network))
1172 1173 1174
        goto err_delbr1;

    if (network->def->forwardType != VIR_NETWORK_FORWARD_NONE &&
1175
        networkEnableIpForwarding() < 0) {
1176
        virReportSystemError(errno, "%s",
1177
                             _("failed to enable IP forwarding"));
1178 1179 1180
        goto err_delbr2;
    }

1181 1182
    if ((network->def->ipAddress ||
         network->def->nranges) &&
1183
        dhcpStartDhcpDaemon(network) < 0)
1184 1185
        goto err_delbr2;

1186 1187

    /* Persist the live configuration now we have bridge info  */
1188
    if (virNetworkSaveConfig(NETWORK_STATE_DIR, network->def) < 0) {
1189 1190 1191
        goto err_kill;
    }

1192 1193 1194 1195
    network->active = 1;

    return 0;

1196 1197 1198 1199 1200 1201
 err_kill:
    if (network->dnsmasqPid > 0) {
        kill(network->dnsmasqPid, SIGTERM);
        network->dnsmasqPid = -1;
    }

1202 1203 1204 1205
 err_delbr2:
    networkRemoveIptablesRules(driver, network);

 err_delbr1:
1206
    if ((err = brSetInterfaceUp(driver->brctl, network->def->bridge, 0))) {
1207
        char ebuf[1024];
1208
        VIR_WARN("Failed to bring down bridge '%s' : %s",
1209
                 network->def->bridge, virStrerror(err, ebuf, sizeof ebuf));
1210 1211 1212 1213
    }

 err_delbr:
    if ((err = brDeleteBridge(driver->brctl, network->def->bridge))) {
1214
        char ebuf[1024];
1215
        VIR_WARN("Failed to delete bridge '%s' : %s",
1216
                 network->def->bridge, virStrerror(err, ebuf, sizeof ebuf));
1217 1218 1219 1220 1221 1222
    }

    return -1;
}


1223 1224 1225
static int networkShutdownNetworkDaemon(struct network_driver *driver,
                                        virNetworkObjPtr network)
{
1226
    int err;
1227
    char *stateFile;
1228

1229
    VIR_INFO(_("Shutting down network '%s'"), network->def->name);
1230

D
Daniel P. Berrange 已提交
1231
    if (!virNetworkObjIsActive(network))
1232 1233
        return 0;

1234
    stateFile = virNetworkConfigFile(NETWORK_STATE_DIR, network->def->name);
1235 1236 1237 1238 1239 1240
    if (!stateFile)
        return -1;

    unlink(stateFile);
    VIR_FREE(stateFile);

1241 1242 1243 1244 1245
    if (network->dnsmasqPid > 0)
        kill(network->dnsmasqPid, SIGTERM);

    networkRemoveIptablesRules(driver, network);

1246
    char ebuf[1024];
1247
    if ((err = brSetInterfaceUp(driver->brctl, network->def->bridge, 0))) {
1248
        VIR_WARN("Failed to bring down bridge '%s' : %s",
1249
                 network->def->bridge, virStrerror(err, ebuf, sizeof ebuf));
1250 1251 1252
    }

    if ((err = brDeleteBridge(driver->brctl, network->def->bridge))) {
1253
        VIR_WARN("Failed to delete bridge '%s' : %s",
1254
                 network->def->bridge, virStrerror(err, ebuf, sizeof ebuf));
1255 1256
    }

1257
    /* See if its still alive and really really kill it */
1258
    if (network->dnsmasqPid > 0 &&
1259
        (kill(network->dnsmasqPid, 0) == 0))
1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274
        kill(network->dnsmasqPid, SIGKILL);

    network->dnsmasqPid = -1;
    network->active = 0;

    if (network->newDef) {
        virNetworkDefFree(network->def);
        network->def = network->newDef;
        network->newDef = NULL;
    }

    return 0;
}


1275 1276 1277 1278 1279
static virNetworkPtr networkLookupByUUID(virConnectPtr conn,
                                         const unsigned char *uuid) {
    struct network_driver *driver = conn->networkPrivateData;
    virNetworkObjPtr network;
    virNetworkPtr ret = NULL;
1280

1281
    networkDriverLock(driver);
1282
    network = virNetworkFindByUUID(&driver->networks, uuid);
1283
    networkDriverUnlock(driver);
1284
    if (!network) {
1285 1286
        networkReportError(VIR_ERR_NO_NETWORK,
                           "%s", _("no network with matching uuid"));
1287
        goto cleanup;
1288 1289
    }

1290 1291 1292
    ret = virGetNetwork(conn, network->def->name, network->def->uuid);

cleanup:
1293 1294
    if (network)
        virNetworkObjUnlock(network);
1295
    return ret;
1296 1297
}

1298 1299 1300 1301 1302 1303
static virNetworkPtr networkLookupByName(virConnectPtr conn,
                                         const char *name) {
    struct network_driver *driver = conn->networkPrivateData;
    virNetworkObjPtr network;
    virNetworkPtr ret = NULL;

1304
    networkDriverLock(driver);
1305
    network = virNetworkFindByName(&driver->networks, name);
1306
    networkDriverUnlock(driver);
1307
    if (!network) {
1308 1309
        networkReportError(VIR_ERR_NO_NETWORK,
                           _("no network with matching name '%s'"), name);
1310
        goto cleanup;
1311 1312
    }

1313 1314 1315
    ret = virGetNetwork(conn, network->def->name, network->def->uuid);

cleanup:
1316 1317
    if (network)
        virNetworkObjUnlock(network);
1318
    return ret;
1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336
}

static virDrvOpenStatus networkOpenNetwork(virConnectPtr conn,
                                           virConnectAuthPtr auth ATTRIBUTE_UNUSED,
                                           int flags ATTRIBUTE_UNUSED) {
    if (!driverState)
        return VIR_DRV_OPEN_DECLINED;

    conn->networkPrivateData = driverState;
    return VIR_DRV_OPEN_SUCCESS;
}

static int networkCloseNetwork(virConnectPtr conn) {
    conn->networkPrivateData = NULL;
    return 0;
}

static int networkNumNetworks(virConnectPtr conn) {
1337
    int nactive = 0, i;
1338
    struct network_driver *driver = conn->networkPrivateData;
1339

1340 1341 1342
    networkDriverLock(driver);
    for (i = 0 ; i < driver->networks.count ; i++) {
        virNetworkObjLock(driver->networks.objs[i]);
D
Daniel P. Berrange 已提交
1343
        if (virNetworkObjIsActive(driver->networks.objs[i]))
1344
            nactive++;
1345 1346 1347
        virNetworkObjUnlock(driver->networks.objs[i]);
    }
    networkDriverUnlock(driver);
1348

1349 1350 1351 1352
    return nactive;
}

static int networkListNetworks(virConnectPtr conn, char **const names, int nnames) {
1353
    struct network_driver *driver = conn->networkPrivateData;
1354
    int got = 0, i;
1355

1356
    networkDriverLock(driver);
1357
    for (i = 0 ; i < driver->networks.count && got < nnames ; i++) {
1358
        virNetworkObjLock(driver->networks.objs[i]);
D
Daniel P. Berrange 已提交
1359
        if (virNetworkObjIsActive(driver->networks.objs[i])) {
1360
            if (!(names[got] = strdup(driver->networks.objs[i]->def->name))) {
1361
                virNetworkObjUnlock(driver->networks.objs[i]);
1362
                virReportOOMError();
1363 1364 1365 1366
                goto cleanup;
            }
            got++;
        }
1367
        virNetworkObjUnlock(driver->networks.objs[i]);
1368
    }
1369 1370
    networkDriverUnlock(driver);

1371 1372 1373
    return got;

 cleanup:
1374
    networkDriverUnlock(driver);
1375 1376 1377 1378 1379 1380
    for (i = 0 ; i < got ; i++)
        VIR_FREE(names[i]);
    return -1;
}

static int networkNumDefinedNetworks(virConnectPtr conn) {
1381
    int ninactive = 0, i;
1382
    struct network_driver *driver = conn->networkPrivateData;
1383

1384 1385 1386
    networkDriverLock(driver);
    for (i = 0 ; i < driver->networks.count ; i++) {
        virNetworkObjLock(driver->networks.objs[i]);
D
Daniel P. Berrange 已提交
1387
        if (!virNetworkObjIsActive(driver->networks.objs[i]))
1388
            ninactive++;
1389 1390 1391
        virNetworkObjUnlock(driver->networks.objs[i]);
    }
    networkDriverUnlock(driver);
1392

1393 1394 1395 1396
    return ninactive;
}

static int networkListDefinedNetworks(virConnectPtr conn, char **const names, int nnames) {
1397
    struct network_driver *driver = conn->networkPrivateData;
1398
    int got = 0, i;
1399

1400
    networkDriverLock(driver);
1401
    for (i = 0 ; i < driver->networks.count && got < nnames ; i++) {
1402
        virNetworkObjLock(driver->networks.objs[i]);
D
Daniel P. Berrange 已提交
1403
        if (!virNetworkObjIsActive(driver->networks.objs[i])) {
1404
            if (!(names[got] = strdup(driver->networks.objs[i]->def->name))) {
1405
                virNetworkObjUnlock(driver->networks.objs[i]);
1406
                virReportOOMError();
1407 1408 1409 1410
                goto cleanup;
            }
            got++;
        }
1411
        virNetworkObjUnlock(driver->networks.objs[i]);
1412
    }
1413
    networkDriverUnlock(driver);
1414 1415 1416
    return got;

 cleanup:
1417
    networkDriverUnlock(driver);
1418 1419 1420 1421 1422
    for (i = 0 ; i < got ; i++)
        VIR_FREE(names[i]);
    return -1;
}

1423 1424 1425

static int networkIsActive(virNetworkPtr net)
{
1426
    struct network_driver *driver = net->conn->networkPrivateData;
1427 1428 1429 1430 1431 1432 1433
    virNetworkObjPtr obj;
    int ret = -1;

    networkDriverLock(driver);
    obj = virNetworkFindByUUID(&driver->networks, net->uuid);
    networkDriverUnlock(driver);
    if (!obj) {
1434
        networkReportError(VIR_ERR_NO_NETWORK, NULL);
1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446
        goto cleanup;
    }
    ret = virNetworkObjIsActive(obj);

cleanup:
    if (obj)
        virNetworkObjUnlock(obj);
    return ret;
}

static int networkIsPersistent(virNetworkPtr net)
{
1447
    struct network_driver *driver = net->conn->networkPrivateData;
1448 1449 1450 1451 1452 1453 1454
    virNetworkObjPtr obj;
    int ret = -1;

    networkDriverLock(driver);
    obj = virNetworkFindByUUID(&driver->networks, net->uuid);
    networkDriverUnlock(driver);
    if (!obj) {
1455
        networkReportError(VIR_ERR_NO_NETWORK, NULL);
1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466
        goto cleanup;
    }
    ret = obj->persistent;

cleanup:
    if (obj)
        virNetworkObjUnlock(obj);
    return ret;
}


1467
static virNetworkPtr networkCreate(virConnectPtr conn, const char *xml) {
1468
    struct network_driver *driver = conn->networkPrivateData;
1469
    virNetworkDefPtr def;
1470
    virNetworkObjPtr network = NULL;
1471
    virNetworkPtr ret = NULL;
1472

1473 1474
    networkDriverLock(driver);

1475
    if (!(def = virNetworkDefParseString(xml)))
1476
        goto cleanup;
1477

1478 1479 1480
    if (virNetworkObjIsDuplicate(&driver->networks, def, 1) < 0)
        goto cleanup;

1481
    if (virNetworkSetBridgeName(&driver->networks, def, 1))
1482 1483
        goto cleanup;

1484
    if (!(network = virNetworkAssignDef(&driver->networks,
1485 1486 1487
                                        def)))
        goto cleanup;
    def = NULL;
1488

1489
    if (networkStartNetworkDaemon(driver, network) < 0) {
1490 1491
        virNetworkRemoveInactive(&driver->networks,
                                 network);
1492
        network = NULL;
1493
        goto cleanup;
1494 1495
    }

1496 1497 1498 1499
    ret = virGetNetwork(conn, network->def->name, network->def->uuid);

cleanup:
    virNetworkDefFree(def);
1500 1501 1502
    if (network)
        virNetworkObjUnlock(network);
    networkDriverUnlock(driver);
1503
    return ret;
1504 1505 1506
}

static virNetworkPtr networkDefine(virConnectPtr conn, const char *xml) {
1507
    struct network_driver *driver = conn->networkPrivateData;
1508
    virNetworkDefPtr def;
1509
    virNetworkObjPtr network = NULL;
1510
    virNetworkPtr ret = NULL;
1511

1512 1513
    networkDriverLock(driver);

1514
    if (!(def = virNetworkDefParseString(xml)))
1515
        goto cleanup;
1516

E
Eric Blake 已提交
1517
    if (virNetworkObjIsDuplicate(&driver->networks, def, 0) < 0)
1518 1519
        goto cleanup;

1520
    if (virNetworkSetBridgeName(&driver->networks, def, 1))
1521 1522
        goto cleanup;

1523
    if (!(network = virNetworkAssignDef(&driver->networks,
1524 1525 1526
                                        def)))
        goto cleanup;
    def = NULL;
1527

1528 1529
    network->persistent = 1;

1530
    if (virNetworkSaveConfig(driver->networkConfigDir,
1531
                             network->newDef ? network->newDef : network->def) < 0) {
1532 1533
        virNetworkRemoveInactive(&driver->networks,
                                 network);
1534
        network = NULL;
1535
        goto cleanup;
1536 1537
    }

1538 1539 1540 1541 1542 1543 1544 1545 1546
    if (network->def->nhosts > 0) {
        dnsmasqContext *dctx = dnsmasqContextNew(network->def->name, DNSMASQ_STATE_DIR);
        if (dctx == NULL)
            goto cleanup;

        networkSaveDnsmasqHostsfile(network, dctx, true);
        dnsmasqContextFree(dctx);
    }

1547 1548 1549 1550
    ret = virGetNetwork(conn, network->def->name, network->def->uuid);

cleanup:
    virNetworkDefFree(def);
1551 1552 1553
    if (network)
        virNetworkObjUnlock(network);
    networkDriverUnlock(driver);
1554
    return ret;
1555 1556 1557
}

static int networkUndefine(virNetworkPtr net) {
1558
    struct network_driver *driver = net->conn->networkPrivateData;
1559
    virNetworkObjPtr network = NULL;
1560
    int ret = -1;
1561

1562 1563
    networkDriverLock(driver);

1564
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
1565
    if (!network) {
1566
        networkReportError(VIR_ERR_INVALID_NETWORK,
1567 1568
                           "%s", _("no network with matching uuid"));
        goto cleanup;
1569 1570
    }

D
Daniel P. Berrange 已提交
1571
    if (virNetworkObjIsActive(network)) {
1572
        networkReportError(VIR_ERR_INTERNAL_ERROR,
1573 1574
                           "%s", _("network is still active"));
        goto cleanup;
1575 1576
    }

1577
    if (virNetworkDeleteConfig(driver->networkConfigDir,
1578 1579
                               driver->networkAutostartDir,
                               network) < 0)
1580
        goto cleanup;
1581

1582 1583 1584 1585 1586 1587 1588 1589 1590
    if (network->def->nhosts > 0) {
        dnsmasqContext *dctx = dnsmasqContextNew(network->def->name, DNSMASQ_STATE_DIR);
        if (dctx == NULL)
            goto cleanup;

        dnsmasqDelete(dctx);
        dnsmasqContextFree(dctx);
    }

1591 1592
    virNetworkRemoveInactive(&driver->networks,
                             network);
1593
    network = NULL;
1594
    ret = 0;
1595

1596
cleanup:
1597 1598 1599
    if (network)
        virNetworkObjUnlock(network);
    networkDriverUnlock(driver);
1600
    return ret;
1601 1602 1603
}

static int networkStart(virNetworkPtr net) {
1604 1605 1606
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    int ret = -1;
1607

1608
    networkDriverLock(driver);
1609
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
1610

1611
    if (!network) {
1612
        networkReportError(VIR_ERR_INVALID_NETWORK,
1613 1614
                           "%s", _("no network with matching uuid"));
        goto cleanup;
1615 1616
    }

1617
    ret = networkStartNetworkDaemon(driver, network);
1618 1619

cleanup:
1620 1621
    if (network)
        virNetworkObjUnlock(network);
1622
    networkDriverUnlock(driver);
1623
    return ret;
1624 1625 1626
}

static int networkDestroy(virNetworkPtr net) {
1627 1628 1629
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    int ret = -1;
1630

1631
    networkDriverLock(driver);
1632
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
1633

1634
    if (!network) {
1635
        networkReportError(VIR_ERR_INVALID_NETWORK,
1636 1637
                           "%s", _("no network with matching uuid"));
        goto cleanup;
1638 1639
    }

D
Daniel P. Berrange 已提交
1640
    if (!virNetworkObjIsActive(network)) {
1641
        networkReportError(VIR_ERR_INTERNAL_ERROR,
1642 1643 1644 1645
                           "%s", _("network is not active"));
        goto cleanup;
    }

1646
    ret = networkShutdownNetworkDaemon(driver, network);
1647
    if (!network->persistent) {
1648 1649 1650 1651
        virNetworkRemoveInactive(&driver->networks,
                                 network);
        network = NULL;
    }
1652

1653
cleanup:
1654 1655
    if (network)
        virNetworkObjUnlock(network);
1656
    networkDriverUnlock(driver);
1657 1658 1659 1660
    return ret;
}

static char *networkDumpXML(virNetworkPtr net, int flags ATTRIBUTE_UNUSED) {
1661 1662 1663
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    char *ret = NULL;
1664

1665
    networkDriverLock(driver);
1666
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
1667 1668
    networkDriverUnlock(driver);

1669
    if (!network) {
1670
        networkReportError(VIR_ERR_INVALID_NETWORK,
1671 1672
                           "%s", _("no network with matching uuid"));
        goto cleanup;
1673 1674
    }

1675
    ret = virNetworkDefFormat(network->def);
1676 1677

cleanup:
1678 1679
    if (network)
        virNetworkObjUnlock(network);
1680
    return ret;
1681 1682 1683
}

static char *networkGetBridgeName(virNetworkPtr net) {
1684 1685 1686 1687
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    char *bridge = NULL;

1688
    networkDriverLock(driver);
1689
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
1690 1691
    networkDriverUnlock(driver);

1692
    if (!network) {
1693
        networkReportError(VIR_ERR_INVALID_NETWORK,
1694 1695
                           "%s", _("no network with matching id"));
        goto cleanup;
1696 1697
    }

1698
    if (!(network->def->bridge)) {
1699
        networkReportError(VIR_ERR_INTERNAL_ERROR,
1700 1701 1702 1703 1704
                           _("network '%s' does not have a bridge name."),
                           network->def->name);
        goto cleanup;
    }

1705
    bridge = strdup(network->def->bridge);
1706
    if (!bridge)
1707
        virReportOOMError();
1708 1709

cleanup:
1710 1711
    if (network)
        virNetworkObjUnlock(network);
1712 1713 1714 1715 1716
    return bridge;
}

static int networkGetAutostart(virNetworkPtr net,
                             int *autostart) {
1717 1718 1719
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
    int ret = -1;
1720

1721
    networkDriverLock(driver);
1722
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
1723
    networkDriverUnlock(driver);
1724
    if (!network) {
1725 1726
        networkReportError(VIR_ERR_INVALID_NETWORK,
                           "%s", _("no network with matching uuid"));
1727
        goto cleanup;
1728 1729 1730
    }

    *autostart = network->autostart;
1731
    ret = 0;
1732

1733
cleanup:
1734 1735
    if (network)
        virNetworkObjUnlock(network);
1736
    return ret;
1737 1738 1739
}

static int networkSetAutostart(virNetworkPtr net,
1740
                               int autostart) {
1741 1742
    struct network_driver *driver = net->conn->networkPrivateData;
    virNetworkObjPtr network;
1743
    char *configFile = NULL, *autostartLink = NULL;
1744
    int ret = -1;
1745

1746
    networkDriverLock(driver);
1747
    network = virNetworkFindByUUID(&driver->networks, net->uuid);
1748

1749
    if (!network) {
1750 1751
        networkReportError(VIR_ERR_INVALID_NETWORK,
                           "%s", _("no network with matching uuid"));
1752
        goto cleanup;
1753 1754
    }

1755
    if (!network->persistent) {
1756 1757
        networkReportError(VIR_ERR_INTERNAL_ERROR,
                           "%s", _("cannot set autostart for transient network"));
1758 1759 1760
        goto cleanup;
    }

1761 1762
    autostart = (autostart != 0);

1763
    if (network->autostart != autostart) {
1764
        if ((configFile = virNetworkConfigFile(driver->networkConfigDir, network->def->name)) == NULL)
1765
            goto cleanup;
1766
        if ((autostartLink = virNetworkConfigFile(driver->networkAutostartDir, network->def->name)) == NULL)
1767 1768
            goto cleanup;

1769
        if (autostart) {
1770
            if (virFileMakePath(driver->networkAutostartDir)) {
1771
                virReportSystemError(errno,
1772 1773
                                     _("cannot create autostart directory '%s'"),
                                     driver->networkAutostartDir);
1774 1775
                goto cleanup;
            }
1776

1777
            if (symlink(configFile, autostartLink) < 0) {
1778
                virReportSystemError(errno,
1779
                                     _("Failed to create symlink '%s' to '%s'"),
1780
                                     autostartLink, configFile);
1781 1782 1783
                goto cleanup;
            }
        } else {
1784
            if (unlink(autostartLink) < 0 && errno != ENOENT && errno != ENOTDIR) {
1785
                virReportSystemError(errno,
1786
                                     _("Failed to delete symlink '%s'"),
1787
                                     autostartLink);
1788 1789
                goto cleanup;
            }
1790 1791
        }

1792
        network->autostart = autostart;
1793
    }
1794
    ret = 0;
1795

1796
cleanup:
1797 1798
    VIR_FREE(configFile);
    VIR_FREE(autostartLink);
1799 1800
    if (network)
        virNetworkObjUnlock(network);
1801
    networkDriverUnlock(driver);
1802
    return ret;
1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824
}


static virNetworkDriver networkDriver = {
    "Network",
    networkOpenNetwork, /* open */
    networkCloseNetwork, /* close */
    networkNumNetworks, /* numOfNetworks */
    networkListNetworks, /* listNetworks */
    networkNumDefinedNetworks, /* numOfDefinedNetworks */
    networkListDefinedNetworks, /* listDefinedNetworks */
    networkLookupByUUID, /* networkLookupByUUID */
    networkLookupByName, /* networkLookupByName */
    networkCreate, /* networkCreateXML */
    networkDefine, /* networkDefineXML */
    networkUndefine, /* networkUndefine */
    networkStart, /* networkCreate */
    networkDestroy, /* networkDestroy */
    networkDumpXML, /* networkDumpXML */
    networkGetBridgeName, /* networkGetBridgeName */
    networkGetAutostart, /* networkGetAutostart */
    networkSetAutostart, /* networkSetAutostart */
1825 1826
    networkIsActive,
    networkIsPersistent,
1827 1828 1829
};

static virStateDriver networkStateDriver = {
1830
    "Network",
1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841
    networkStartup,
    networkShutdown,
    networkReload,
    networkActive,
};

int networkRegister(void) {
    virRegisterNetworkDriver(&networkDriver);
    virRegisterStateDriver(&networkStateDriver);
    return 0;
}