root / net.c @ 6ee093c9
History | View | Annotate | Download (79.9 kB)
1 |
/*
|
---|---|
2 |
* QEMU System Emulator
|
3 |
*
|
4 |
* Copyright (c) 2003-2008 Fabrice Bellard
|
5 |
*
|
6 |
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
7 |
* of this software and associated documentation files (the "Software"), to deal
|
8 |
* in the Software without restriction, including without limitation the rights
|
9 |
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
10 |
* copies of the Software, and to permit persons to whom the Software is
|
11 |
* furnished to do so, subject to the following conditions:
|
12 |
*
|
13 |
* The above copyright notice and this permission notice shall be included in
|
14 |
* all copies or substantial portions of the Software.
|
15 |
*
|
16 |
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
17 |
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
18 |
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
|
19 |
* THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
20 |
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
21 |
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
22 |
* THE SOFTWARE.
|
23 |
*/
|
24 |
#include <unistd.h> |
25 |
#include <fcntl.h> |
26 |
#include <signal.h> |
27 |
#include <time.h> |
28 |
#include <errno.h> |
29 |
#include <sys/time.h> |
30 |
#include <zlib.h> |
31 |
|
32 |
/* Needed early for CONFIG_BSD etc. */
|
33 |
#include "config-host.h" |
34 |
/* Needed early to override system queue definitions on BSD */
|
35 |
#include "sys-queue.h" |
36 |
|
37 |
#ifndef _WIN32
|
38 |
#include <sys/times.h> |
39 |
#include <sys/wait.h> |
40 |
#include <termios.h> |
41 |
#include <sys/mman.h> |
42 |
#include <sys/ioctl.h> |
43 |
#include <sys/resource.h> |
44 |
#include <sys/socket.h> |
45 |
#include <netinet/in.h> |
46 |
#include <net/if.h> |
47 |
#ifdef __NetBSD__
|
48 |
#include <net/if_tap.h> |
49 |
#endif
|
50 |
#ifdef __linux__
|
51 |
#include <linux/if_tun.h> |
52 |
#endif
|
53 |
#include <arpa/inet.h> |
54 |
#include <dirent.h> |
55 |
#include <netdb.h> |
56 |
#include <sys/select.h> |
57 |
#ifdef CONFIG_BSD
|
58 |
#include <sys/stat.h> |
59 |
#if defined(__FreeBSD__) || defined(__DragonFly__)
|
60 |
#include <libutil.h> |
61 |
#else
|
62 |
#include <util.h> |
63 |
#endif
|
64 |
#elif defined (__GLIBC__) && defined (__FreeBSD_kernel__)
|
65 |
#include <freebsd/stdlib.h> |
66 |
#else
|
67 |
#ifdef __linux__
|
68 |
#include <pty.h> |
69 |
#include <malloc.h> |
70 |
#include <linux/rtc.h> |
71 |
|
72 |
/* For the benefit of older linux systems which don't supply it,
|
73 |
we use a local copy of hpet.h. */
|
74 |
/* #include <linux/hpet.h> */
|
75 |
#include "hpet.h" |
76 |
|
77 |
#include <linux/ppdev.h> |
78 |
#include <linux/parport.h> |
79 |
#endif
|
80 |
#ifdef __sun__
|
81 |
#include <sys/stat.h> |
82 |
#include <sys/ethernet.h> |
83 |
#include <sys/sockio.h> |
84 |
#include <netinet/arp.h> |
85 |
#include <netinet/in.h> |
86 |
#include <netinet/in_systm.h> |
87 |
#include <netinet/ip.h> |
88 |
#include <netinet/ip_icmp.h> // must come after ip.h |
89 |
#include <netinet/udp.h> |
90 |
#include <netinet/tcp.h> |
91 |
#include <net/if.h> |
92 |
#include <syslog.h> |
93 |
#include <stropts.h> |
94 |
#endif
|
95 |
#endif
|
96 |
#endif
|
97 |
|
98 |
#if defined(__OpenBSD__)
|
99 |
#include <util.h> |
100 |
#endif
|
101 |
|
102 |
#if defined(CONFIG_VDE)
|
103 |
#include <libvdeplug.h> |
104 |
#endif
|
105 |
|
106 |
#include "qemu-common.h" |
107 |
#include "net.h" |
108 |
#include "monitor.h" |
109 |
#include "sysemu.h" |
110 |
#include "qemu-timer.h" |
111 |
#include "qemu-char.h" |
112 |
#include "audio/audio.h" |
113 |
#include "qemu_socket.h" |
114 |
#include "qemu-log.h" |
115 |
|
116 |
#include "slirp/libslirp.h" |
117 |
|
118 |
|
119 |
static VLANState *first_vlan;
|
120 |
|
121 |
/***********************************************************/
|
122 |
/* network device redirectors */
|
123 |
|
124 |
#if defined(DEBUG_NET) || defined(DEBUG_SLIRP)
|
125 |
static void hex_dump(FILE *f, const uint8_t *buf, int size) |
126 |
{ |
127 |
int len, i, j, c;
|
128 |
|
129 |
for(i=0;i<size;i+=16) { |
130 |
len = size - i; |
131 |
if (len > 16) |
132 |
len = 16;
|
133 |
fprintf(f, "%08x ", i);
|
134 |
for(j=0;j<16;j++) { |
135 |
if (j < len)
|
136 |
fprintf(f, " %02x", buf[i+j]);
|
137 |
else
|
138 |
fprintf(f, " ");
|
139 |
} |
140 |
fprintf(f, " ");
|
141 |
for(j=0;j<len;j++) { |
142 |
c = buf[i+j]; |
143 |
if (c < ' ' || c > '~') |
144 |
c = '.';
|
145 |
fprintf(f, "%c", c);
|
146 |
} |
147 |
fprintf(f, "\n");
|
148 |
} |
149 |
} |
150 |
#endif
|
151 |
|
152 |
static int parse_macaddr(uint8_t *macaddr, const char *p) |
153 |
{ |
154 |
int i;
|
155 |
char *last_char;
|
156 |
long int offset; |
157 |
|
158 |
errno = 0;
|
159 |
offset = strtol(p, &last_char, 0);
|
160 |
if (0 == errno && '\0' == *last_char && |
161 |
offset >= 0 && offset <= 0xFFFFFF) { |
162 |
macaddr[3] = (offset & 0xFF0000) >> 16; |
163 |
macaddr[4] = (offset & 0xFF00) >> 8; |
164 |
macaddr[5] = offset & 0xFF; |
165 |
return 0; |
166 |
} else {
|
167 |
for(i = 0; i < 6; i++) { |
168 |
macaddr[i] = strtol(p, (char **)&p, 16); |
169 |
if (i == 5) { |
170 |
if (*p != '\0') |
171 |
return -1; |
172 |
} else {
|
173 |
if (*p != ':' && *p != '-') |
174 |
return -1; |
175 |
p++; |
176 |
} |
177 |
} |
178 |
return 0; |
179 |
} |
180 |
|
181 |
return -1; |
182 |
} |
183 |
|
184 |
static int get_str_sep(char *buf, int buf_size, const char **pp, int sep) |
185 |
{ |
186 |
const char *p, *p1; |
187 |
int len;
|
188 |
p = *pp; |
189 |
p1 = strchr(p, sep); |
190 |
if (!p1)
|
191 |
return -1; |
192 |
len = p1 - p; |
193 |
p1++; |
194 |
if (buf_size > 0) { |
195 |
if (len > buf_size - 1) |
196 |
len = buf_size - 1;
|
197 |
memcpy(buf, p, len); |
198 |
buf[len] = '\0';
|
199 |
} |
200 |
*pp = p1; |
201 |
return 0; |
202 |
} |
203 |
|
204 |
int parse_host_src_port(struct sockaddr_in *haddr, |
205 |
struct sockaddr_in *saddr,
|
206 |
const char *input_str) |
207 |
{ |
208 |
char *str = strdup(input_str);
|
209 |
char *host_str = str;
|
210 |
char *src_str;
|
211 |
const char *src_str2; |
212 |
char *ptr;
|
213 |
|
214 |
/*
|
215 |
* Chop off any extra arguments at the end of the string which
|
216 |
* would start with a comma, then fill in the src port information
|
217 |
* if it was provided else use the "any address" and "any port".
|
218 |
*/
|
219 |
if ((ptr = strchr(str,','))) |
220 |
*ptr = '\0';
|
221 |
|
222 |
if ((src_str = strchr(input_str,'@'))) { |
223 |
*src_str = '\0';
|
224 |
src_str++; |
225 |
} |
226 |
|
227 |
if (parse_host_port(haddr, host_str) < 0) |
228 |
goto fail;
|
229 |
|
230 |
src_str2 = src_str; |
231 |
if (!src_str || *src_str == '\0') |
232 |
src_str2 = ":0";
|
233 |
|
234 |
if (parse_host_port(saddr, src_str2) < 0) |
235 |
goto fail;
|
236 |
|
237 |
free(str); |
238 |
return(0); |
239 |
|
240 |
fail:
|
241 |
free(str); |
242 |
return -1; |
243 |
} |
244 |
|
245 |
int parse_host_port(struct sockaddr_in *saddr, const char *str) |
246 |
{ |
247 |
char buf[512]; |
248 |
struct hostent *he;
|
249 |
const char *p, *r; |
250 |
int port;
|
251 |
|
252 |
p = str; |
253 |
if (get_str_sep(buf, sizeof(buf), &p, ':') < 0) |
254 |
return -1; |
255 |
saddr->sin_family = AF_INET; |
256 |
if (buf[0] == '\0') { |
257 |
saddr->sin_addr.s_addr = 0;
|
258 |
} else {
|
259 |
if (qemu_isdigit(buf[0])) { |
260 |
if (!inet_aton(buf, &saddr->sin_addr))
|
261 |
return -1; |
262 |
} else {
|
263 |
if ((he = gethostbyname(buf)) == NULL) |
264 |
return - 1; |
265 |
saddr->sin_addr = *(struct in_addr *)he->h_addr;
|
266 |
} |
267 |
} |
268 |
port = strtol(p, (char **)&r, 0); |
269 |
if (r == p)
|
270 |
return -1; |
271 |
saddr->sin_port = htons(port); |
272 |
return 0; |
273 |
} |
274 |
|
275 |
void qemu_format_nic_info_str(VLANClientState *vc, uint8_t macaddr[6]) |
276 |
{ |
277 |
snprintf(vc->info_str, sizeof(vc->info_str),
|
278 |
"model=%s,macaddr=%02x:%02x:%02x:%02x:%02x:%02x",
|
279 |
vc->model, |
280 |
macaddr[0], macaddr[1], macaddr[2], |
281 |
macaddr[3], macaddr[4], macaddr[5]); |
282 |
} |
283 |
|
284 |
static char *assign_name(VLANClientState *vc1, const char *model) |
285 |
{ |
286 |
VLANState *vlan; |
287 |
char buf[256]; |
288 |
int id = 0; |
289 |
|
290 |
for (vlan = first_vlan; vlan; vlan = vlan->next) {
|
291 |
VLANClientState *vc; |
292 |
|
293 |
for (vc = vlan->first_client; vc; vc = vc->next)
|
294 |
if (vc != vc1 && strcmp(vc->model, model) == 0) |
295 |
id++; |
296 |
} |
297 |
|
298 |
snprintf(buf, sizeof(buf), "%s.%d", model, id); |
299 |
|
300 |
return strdup(buf);
|
301 |
} |
302 |
|
303 |
VLANClientState *qemu_new_vlan_client(VLANState *vlan, |
304 |
const char *model, |
305 |
const char *name, |
306 |
NetCanReceive *can_receive, |
307 |
NetReceive *receive, |
308 |
NetReceiveIOV *receive_iov, |
309 |
NetCleanup *cleanup, |
310 |
void *opaque)
|
311 |
{ |
312 |
VLANClientState *vc, **pvc; |
313 |
vc = qemu_mallocz(sizeof(VLANClientState));
|
314 |
vc->model = strdup(model); |
315 |
if (name)
|
316 |
vc->name = strdup(name); |
317 |
else
|
318 |
vc->name = assign_name(vc, model); |
319 |
vc->can_receive = can_receive; |
320 |
vc->receive = receive; |
321 |
vc->receive_iov = receive_iov; |
322 |
vc->cleanup = cleanup; |
323 |
vc->opaque = opaque; |
324 |
vc->vlan = vlan; |
325 |
|
326 |
vc->next = NULL;
|
327 |
pvc = &vlan->first_client; |
328 |
while (*pvc != NULL) |
329 |
pvc = &(*pvc)->next; |
330 |
*pvc = vc; |
331 |
return vc;
|
332 |
} |
333 |
|
334 |
void qemu_del_vlan_client(VLANClientState *vc)
|
335 |
{ |
336 |
VLANClientState **pvc = &vc->vlan->first_client; |
337 |
|
338 |
while (*pvc != NULL) |
339 |
if (*pvc == vc) {
|
340 |
*pvc = vc->next; |
341 |
if (vc->cleanup) {
|
342 |
vc->cleanup(vc); |
343 |
} |
344 |
free(vc->name); |
345 |
free(vc->model); |
346 |
qemu_free(vc); |
347 |
break;
|
348 |
} else
|
349 |
pvc = &(*pvc)->next; |
350 |
} |
351 |
|
352 |
VLANClientState *qemu_find_vlan_client(VLANState *vlan, void *opaque)
|
353 |
{ |
354 |
VLANClientState **pvc = &vlan->first_client; |
355 |
|
356 |
while (*pvc != NULL) |
357 |
if ((*pvc)->opaque == opaque)
|
358 |
return *pvc;
|
359 |
else
|
360 |
pvc = &(*pvc)->next; |
361 |
|
362 |
return NULL; |
363 |
} |
364 |
|
365 |
static VLANClientState *
|
366 |
qemu_find_vlan_client_by_name(Monitor *mon, int vlan_id,
|
367 |
const char *client_str) |
368 |
{ |
369 |
VLANState *vlan; |
370 |
VLANClientState *vc; |
371 |
|
372 |
vlan = qemu_find_vlan(vlan_id, 0);
|
373 |
if (!vlan) {
|
374 |
monitor_printf(mon, "unknown VLAN %d\n", vlan_id);
|
375 |
return NULL; |
376 |
} |
377 |
|
378 |
for (vc = vlan->first_client; vc != NULL; vc = vc->next) { |
379 |
if (!strcmp(vc->name, client_str)) {
|
380 |
break;
|
381 |
} |
382 |
} |
383 |
if (!vc) {
|
384 |
monitor_printf(mon, "can't find device %s on VLAN %d\n",
|
385 |
client_str, vlan_id); |
386 |
} |
387 |
|
388 |
return vc;
|
389 |
} |
390 |
|
391 |
int qemu_can_send_packet(VLANClientState *sender)
|
392 |
{ |
393 |
VLANState *vlan = sender->vlan; |
394 |
VLANClientState *vc; |
395 |
|
396 |
for (vc = vlan->first_client; vc != NULL; vc = vc->next) { |
397 |
if (vc == sender) {
|
398 |
continue;
|
399 |
} |
400 |
|
401 |
/* no can_receive() handler, they can always receive */
|
402 |
if (!vc->can_receive || vc->can_receive(vc)) {
|
403 |
return 1; |
404 |
} |
405 |
} |
406 |
return 0; |
407 |
} |
408 |
|
409 |
static int |
410 |
qemu_deliver_packet(VLANClientState *sender, const uint8_t *buf, int size) |
411 |
{ |
412 |
VLANClientState *vc; |
413 |
int ret = -1; |
414 |
|
415 |
sender->vlan->delivering = 1;
|
416 |
|
417 |
for (vc = sender->vlan->first_client; vc != NULL; vc = vc->next) { |
418 |
ssize_t len; |
419 |
|
420 |
if (vc == sender) {
|
421 |
continue;
|
422 |
} |
423 |
|
424 |
if (vc->link_down) {
|
425 |
ret = size; |
426 |
continue;
|
427 |
} |
428 |
|
429 |
len = vc->receive(vc, buf, size); |
430 |
|
431 |
ret = (ret >= 0) ? ret : len;
|
432 |
} |
433 |
|
434 |
sender->vlan->delivering = 0;
|
435 |
|
436 |
return ret;
|
437 |
} |
438 |
|
439 |
void qemu_purge_queued_packets(VLANClientState *vc)
|
440 |
{ |
441 |
VLANPacket *packet, *next; |
442 |
|
443 |
TAILQ_FOREACH_SAFE(packet, &vc->vlan->send_queue, entry, next) { |
444 |
if (packet->sender == vc) {
|
445 |
TAILQ_REMOVE(&vc->vlan->send_queue, packet, entry); |
446 |
qemu_free(packet); |
447 |
} |
448 |
} |
449 |
} |
450 |
|
451 |
void qemu_flush_queued_packets(VLANClientState *vc)
|
452 |
{ |
453 |
while (!TAILQ_EMPTY(&vc->vlan->send_queue)) {
|
454 |
VLANPacket *packet; |
455 |
int ret;
|
456 |
|
457 |
packet = TAILQ_FIRST(&vc->vlan->send_queue); |
458 |
TAILQ_REMOVE(&vc->vlan->send_queue, packet, entry); |
459 |
|
460 |
ret = qemu_deliver_packet(packet->sender, packet->data, packet->size); |
461 |
if (ret == 0 && packet->sent_cb != NULL) { |
462 |
TAILQ_INSERT_HEAD(&vc->vlan->send_queue, packet, entry); |
463 |
break;
|
464 |
} |
465 |
|
466 |
if (packet->sent_cb)
|
467 |
packet->sent_cb(packet->sender, ret); |
468 |
|
469 |
qemu_free(packet); |
470 |
} |
471 |
} |
472 |
|
473 |
static void qemu_enqueue_packet(VLANClientState *sender, |
474 |
const uint8_t *buf, int size, |
475 |
NetPacketSent *sent_cb) |
476 |
{ |
477 |
VLANPacket *packet; |
478 |
|
479 |
packet = qemu_malloc(sizeof(VLANPacket) + size);
|
480 |
packet->sender = sender; |
481 |
packet->size = size; |
482 |
packet->sent_cb = sent_cb; |
483 |
memcpy(packet->data, buf, size); |
484 |
|
485 |
TAILQ_INSERT_TAIL(&sender->vlan->send_queue, packet, entry); |
486 |
} |
487 |
|
488 |
ssize_t qemu_send_packet_async(VLANClientState *sender, |
489 |
const uint8_t *buf, int size, |
490 |
NetPacketSent *sent_cb) |
491 |
{ |
492 |
int ret;
|
493 |
|
494 |
if (sender->link_down) {
|
495 |
return size;
|
496 |
} |
497 |
|
498 |
#ifdef DEBUG_NET
|
499 |
printf("vlan %d send:\n", sender->vlan->id);
|
500 |
hex_dump(stdout, buf, size); |
501 |
#endif
|
502 |
|
503 |
if (sender->vlan->delivering) {
|
504 |
qemu_enqueue_packet(sender, buf, size, NULL);
|
505 |
return size;
|
506 |
} |
507 |
|
508 |
ret = qemu_deliver_packet(sender, buf, size); |
509 |
if (ret == 0 && sent_cb != NULL) { |
510 |
qemu_enqueue_packet(sender, buf, size, sent_cb); |
511 |
return 0; |
512 |
} |
513 |
|
514 |
qemu_flush_queued_packets(sender); |
515 |
|
516 |
return ret;
|
517 |
} |
518 |
|
519 |
void qemu_send_packet(VLANClientState *vc, const uint8_t *buf, int size) |
520 |
{ |
521 |
qemu_send_packet_async(vc, buf, size, NULL);
|
522 |
} |
523 |
|
524 |
static ssize_t vc_sendv_compat(VLANClientState *vc, const struct iovec *iov, |
525 |
int iovcnt)
|
526 |
{ |
527 |
uint8_t buffer[4096];
|
528 |
size_t offset = 0;
|
529 |
int i;
|
530 |
|
531 |
for (i = 0; i < iovcnt; i++) { |
532 |
size_t len; |
533 |
|
534 |
len = MIN(sizeof(buffer) - offset, iov[i].iov_len);
|
535 |
memcpy(buffer + offset, iov[i].iov_base, len); |
536 |
offset += len; |
537 |
} |
538 |
|
539 |
return vc->receive(vc, buffer, offset);
|
540 |
} |
541 |
|
542 |
static ssize_t calc_iov_length(const struct iovec *iov, int iovcnt) |
543 |
{ |
544 |
size_t offset = 0;
|
545 |
int i;
|
546 |
|
547 |
for (i = 0; i < iovcnt; i++) |
548 |
offset += iov[i].iov_len; |
549 |
return offset;
|
550 |
} |
551 |
|
552 |
static int qemu_deliver_packet_iov(VLANClientState *sender, |
553 |
const struct iovec *iov, int iovcnt) |
554 |
{ |
555 |
VLANClientState *vc; |
556 |
int ret = -1; |
557 |
|
558 |
sender->vlan->delivering = 1;
|
559 |
|
560 |
for (vc = sender->vlan->first_client; vc != NULL; vc = vc->next) { |
561 |
ssize_t len; |
562 |
|
563 |
if (vc == sender) {
|
564 |
continue;
|
565 |
} |
566 |
|
567 |
if (vc->link_down) {
|
568 |
ret = calc_iov_length(iov, iovcnt); |
569 |
continue;
|
570 |
} |
571 |
|
572 |
if (vc->receive_iov) {
|
573 |
len = vc->receive_iov(vc, iov, iovcnt); |
574 |
} else {
|
575 |
len = vc_sendv_compat(vc, iov, iovcnt); |
576 |
} |
577 |
|
578 |
ret = (ret >= 0) ? ret : len;
|
579 |
} |
580 |
|
581 |
sender->vlan->delivering = 0;
|
582 |
|
583 |
return ret;
|
584 |
} |
585 |
|
586 |
static ssize_t qemu_enqueue_packet_iov(VLANClientState *sender,
|
587 |
const struct iovec *iov, int iovcnt, |
588 |
NetPacketSent *sent_cb) |
589 |
{ |
590 |
VLANPacket *packet; |
591 |
size_t max_len = 0;
|
592 |
int i;
|
593 |
|
594 |
max_len = calc_iov_length(iov, iovcnt); |
595 |
|
596 |
packet = qemu_malloc(sizeof(VLANPacket) + max_len);
|
597 |
packet->sender = sender; |
598 |
packet->sent_cb = sent_cb; |
599 |
packet->size = 0;
|
600 |
|
601 |
for (i = 0; i < iovcnt; i++) { |
602 |
size_t len = iov[i].iov_len; |
603 |
|
604 |
memcpy(packet->data + packet->size, iov[i].iov_base, len); |
605 |
packet->size += len; |
606 |
} |
607 |
|
608 |
TAILQ_INSERT_TAIL(&sender->vlan->send_queue, packet, entry); |
609 |
|
610 |
return packet->size;
|
611 |
} |
612 |
|
613 |
ssize_t qemu_sendv_packet_async(VLANClientState *sender, |
614 |
const struct iovec *iov, int iovcnt, |
615 |
NetPacketSent *sent_cb) |
616 |
{ |
617 |
int ret;
|
618 |
|
619 |
if (sender->link_down) {
|
620 |
return calc_iov_length(iov, iovcnt);
|
621 |
} |
622 |
|
623 |
if (sender->vlan->delivering) {
|
624 |
return qemu_enqueue_packet_iov(sender, iov, iovcnt, NULL); |
625 |
} |
626 |
|
627 |
ret = qemu_deliver_packet_iov(sender, iov, iovcnt); |
628 |
if (ret == 0 && sent_cb != NULL) { |
629 |
qemu_enqueue_packet_iov(sender, iov, iovcnt, sent_cb); |
630 |
return 0; |
631 |
} |
632 |
|
633 |
qemu_flush_queued_packets(sender); |
634 |
|
635 |
return ret;
|
636 |
} |
637 |
|
638 |
ssize_t |
639 |
qemu_sendv_packet(VLANClientState *vc, const struct iovec *iov, int iovcnt) |
640 |
{ |
641 |
return qemu_sendv_packet_async(vc, iov, iovcnt, NULL); |
642 |
} |
643 |
|
644 |
static void config_error(Monitor *mon, const char *fmt, ...) |
645 |
{ |
646 |
va_list ap; |
647 |
|
648 |
va_start(ap, fmt); |
649 |
if (mon) {
|
650 |
monitor_vprintf(mon, fmt, ap); |
651 |
} else {
|
652 |
fprintf(stderr, "qemu: ");
|
653 |
vfprintf(stderr, fmt, ap); |
654 |
exit(1);
|
655 |
} |
656 |
va_end(ap); |
657 |
} |
658 |
|
659 |
#if defined(CONFIG_SLIRP)
|
660 |
|
661 |
/* slirp network adapter */
|
662 |
|
663 |
#define SLIRP_CFG_HOSTFWD 1 |
664 |
#define SLIRP_CFG_LEGACY 2 |
665 |
|
666 |
struct slirp_config_str {
|
667 |
struct slirp_config_str *next;
|
668 |
int flags;
|
669 |
char str[1024]; |
670 |
int legacy_format;
|
671 |
}; |
672 |
|
673 |
typedef struct SlirpState { |
674 |
TAILQ_ENTRY(SlirpState) entry; |
675 |
VLANClientState *vc; |
676 |
Slirp *slirp; |
677 |
#ifndef _WIN32
|
678 |
char smb_dir[128]; |
679 |
#endif
|
680 |
} SlirpState; |
681 |
|
682 |
static struct slirp_config_str *slirp_configs; |
683 |
const char *legacy_tftp_prefix; |
684 |
const char *legacy_bootp_filename; |
685 |
static TAILQ_HEAD(slirp_stacks, SlirpState) slirp_stacks =
|
686 |
TAILQ_HEAD_INITIALIZER(slirp_stacks); |
687 |
|
688 |
static void slirp_hostfwd(SlirpState *s, Monitor *mon, const char *redir_str, |
689 |
int legacy_format);
|
690 |
static void slirp_guestfwd(SlirpState *s, Monitor *mon, const char *config_str, |
691 |
int legacy_format);
|
692 |
|
693 |
#ifndef _WIN32
|
694 |
static const char *legacy_smb_export; |
695 |
|
696 |
static void slirp_smb(SlirpState *s, Monitor *mon, const char *exported_dir, |
697 |
struct in_addr vserver_addr);
|
698 |
static void slirp_smb_cleanup(SlirpState *s); |
699 |
#else
|
700 |
static inline void slirp_smb_cleanup(SlirpState *s) { } |
701 |
#endif
|
702 |
|
703 |
int slirp_can_output(void *opaque) |
704 |
{ |
705 |
SlirpState *s = opaque; |
706 |
|
707 |
return qemu_can_send_packet(s->vc);
|
708 |
} |
709 |
|
710 |
void slirp_output(void *opaque, const uint8_t *pkt, int pkt_len) |
711 |
{ |
712 |
SlirpState *s = opaque; |
713 |
|
714 |
#ifdef DEBUG_SLIRP
|
715 |
printf("slirp output:\n");
|
716 |
hex_dump(stdout, pkt, pkt_len); |
717 |
#endif
|
718 |
qemu_send_packet(s->vc, pkt, pkt_len); |
719 |
} |
720 |
|
721 |
static ssize_t slirp_receive(VLANClientState *vc, const uint8_t *buf, size_t size) |
722 |
{ |
723 |
SlirpState *s = vc->opaque; |
724 |
|
725 |
#ifdef DEBUG_SLIRP
|
726 |
printf("slirp input:\n");
|
727 |
hex_dump(stdout, buf, size); |
728 |
#endif
|
729 |
slirp_input(s->slirp, buf, size); |
730 |
return size;
|
731 |
} |
732 |
|
733 |
static void net_slirp_cleanup(VLANClientState *vc) |
734 |
{ |
735 |
SlirpState *s = vc->opaque; |
736 |
|
737 |
slirp_cleanup(s->slirp); |
738 |
slirp_smb_cleanup(s); |
739 |
TAILQ_REMOVE(&slirp_stacks, s, entry); |
740 |
qemu_free(s); |
741 |
} |
742 |
|
743 |
static int net_slirp_init(Monitor *mon, VLANState *vlan, const char *model, |
744 |
const char *name, int restricted, |
745 |
const char *vnetwork, const char *vhost, |
746 |
const char *vhostname, const char *tftp_export, |
747 |
const char *bootfile, const char *vdhcp_start, |
748 |
const char *vnameserver, const char *smb_export, |
749 |
const char *vsmbserver) |
750 |
{ |
751 |
/* default settings according to historic slirp */
|
752 |
struct in_addr net = { .s_addr = htonl(0x0a000200) }; /* 10.0.2.0 */ |
753 |
struct in_addr mask = { .s_addr = htonl(0xffffff00) }; /* 255.255.255.0 */ |
754 |
struct in_addr host = { .s_addr = htonl(0x0a000202) }; /* 10.0.2.2 */ |
755 |
struct in_addr dhcp = { .s_addr = htonl(0x0a00020f) }; /* 10.0.2.15 */ |
756 |
struct in_addr dns = { .s_addr = htonl(0x0a000203) }; /* 10.0.2.3 */ |
757 |
#ifndef _WIN32
|
758 |
struct in_addr smbsrv = { .s_addr = 0 }; |
759 |
#endif
|
760 |
SlirpState *s; |
761 |
char buf[20]; |
762 |
uint32_t addr; |
763 |
int shift;
|
764 |
char *end;
|
765 |
|
766 |
if (!tftp_export) {
|
767 |
tftp_export = legacy_tftp_prefix; |
768 |
} |
769 |
if (!bootfile) {
|
770 |
bootfile = legacy_bootp_filename; |
771 |
} |
772 |
|
773 |
if (vnetwork) {
|
774 |
if (get_str_sep(buf, sizeof(buf), &vnetwork, '/') < 0) { |
775 |
if (!inet_aton(vnetwork, &net)) {
|
776 |
return -1; |
777 |
} |
778 |
addr = ntohl(net.s_addr); |
779 |
if (!(addr & 0x80000000)) { |
780 |
mask.s_addr = htonl(0xff000000); /* class A */ |
781 |
} else if ((addr & 0xfff00000) == 0xac100000) { |
782 |
mask.s_addr = htonl(0xfff00000); /* priv. 172.16.0.0/12 */ |
783 |
} else if ((addr & 0xc0000000) == 0x80000000) { |
784 |
mask.s_addr = htonl(0xffff0000); /* class B */ |
785 |
} else if ((addr & 0xffff0000) == 0xc0a80000) { |
786 |
mask.s_addr = htonl(0xffff0000); /* priv. 192.168.0.0/16 */ |
787 |
} else if ((addr & 0xffff0000) == 0xc6120000) { |
788 |
mask.s_addr = htonl(0xfffe0000); /* tests 198.18.0.0/15 */ |
789 |
} else if ((addr & 0xe0000000) == 0xe0000000) { |
790 |
mask.s_addr = htonl(0xffffff00); /* class C */ |
791 |
} else {
|
792 |
mask.s_addr = htonl(0xfffffff0); /* multicast/reserved */ |
793 |
} |
794 |
} else {
|
795 |
if (!inet_aton(buf, &net)) {
|
796 |
return -1; |
797 |
} |
798 |
shift = strtol(vnetwork, &end, 10);
|
799 |
if (*end != '\0') { |
800 |
if (!inet_aton(vnetwork, &mask)) {
|
801 |
return -1; |
802 |
} |
803 |
} else if (shift < 4 || shift > 32) { |
804 |
return -1; |
805 |
} else {
|
806 |
mask.s_addr = htonl(0xffffffff << (32 - shift)); |
807 |
} |
808 |
} |
809 |
net.s_addr &= mask.s_addr; |
810 |
host.s_addr = net.s_addr | (htonl(0x0202) & ~mask.s_addr);
|
811 |
dhcp.s_addr = net.s_addr | (htonl(0x020f) & ~mask.s_addr);
|
812 |
dns.s_addr = net.s_addr | (htonl(0x0203) & ~mask.s_addr);
|
813 |
} |
814 |
|
815 |
if (vhost && !inet_aton(vhost, &host)) {
|
816 |
return -1; |
817 |
} |
818 |
if ((host.s_addr & mask.s_addr) != net.s_addr) {
|
819 |
return -1; |
820 |
} |
821 |
|
822 |
if (vdhcp_start && !inet_aton(vdhcp_start, &dhcp)) {
|
823 |
return -1; |
824 |
} |
825 |
if ((dhcp.s_addr & mask.s_addr) != net.s_addr ||
|
826 |
dhcp.s_addr == host.s_addr || dhcp.s_addr == dns.s_addr) { |
827 |
return -1; |
828 |
} |
829 |
|
830 |
if (vnameserver && !inet_aton(vnameserver, &dns)) {
|
831 |
return -1; |
832 |
} |
833 |
if ((dns.s_addr & mask.s_addr) != net.s_addr ||
|
834 |
dns.s_addr == host.s_addr) { |
835 |
return -1; |
836 |
} |
837 |
|
838 |
#ifndef _WIN32
|
839 |
if (vsmbserver && !inet_aton(vsmbserver, &smbsrv)) {
|
840 |
return -1; |
841 |
} |
842 |
#endif
|
843 |
|
844 |
s = qemu_mallocz(sizeof(SlirpState));
|
845 |
s->slirp = slirp_init(restricted, net, mask, host, vhostname, |
846 |
tftp_export, bootfile, dhcp, dns, s); |
847 |
TAILQ_INSERT_TAIL(&slirp_stacks, s, entry); |
848 |
|
849 |
while (slirp_configs) {
|
850 |
struct slirp_config_str *config = slirp_configs;
|
851 |
|
852 |
if (config->flags & SLIRP_CFG_HOSTFWD) {
|
853 |
slirp_hostfwd(s, mon, config->str, |
854 |
config->flags & SLIRP_CFG_LEGACY); |
855 |
} else {
|
856 |
slirp_guestfwd(s, mon, config->str, |
857 |
config->flags & SLIRP_CFG_LEGACY); |
858 |
} |
859 |
slirp_configs = config->next; |
860 |
qemu_free(config); |
861 |
} |
862 |
#ifndef _WIN32
|
863 |
if (!smb_export) {
|
864 |
smb_export = legacy_smb_export; |
865 |
} |
866 |
if (smb_export) {
|
867 |
slirp_smb(s, mon, smb_export, smbsrv); |
868 |
} |
869 |
#endif
|
870 |
|
871 |
s->vc = qemu_new_vlan_client(vlan, model, name, NULL, slirp_receive, NULL, |
872 |
net_slirp_cleanup, s); |
873 |
snprintf(s->vc->info_str, sizeof(s->vc->info_str),
|
874 |
"net=%s, restricted=%c", inet_ntoa(net), restricted ? 'y' : 'n'); |
875 |
return 0; |
876 |
} |
877 |
|
878 |
static SlirpState *slirp_lookup(Monitor *mon, const char *vlan, |
879 |
const char *stack) |
880 |
{ |
881 |
VLANClientState *vc; |
882 |
|
883 |
if (vlan) {
|
884 |
vc = qemu_find_vlan_client_by_name(mon, strtol(vlan, NULL, 0), stack); |
885 |
if (!vc) {
|
886 |
return NULL; |
887 |
} |
888 |
if (strcmp(vc->model, "user")) { |
889 |
monitor_printf(mon, "invalid device specified\n");
|
890 |
return NULL; |
891 |
} |
892 |
return vc->opaque;
|
893 |
} else {
|
894 |
if (TAILQ_EMPTY(&slirp_stacks)) {
|
895 |
monitor_printf(mon, "user mode network stack not in use\n");
|
896 |
return NULL; |
897 |
} |
898 |
return TAILQ_FIRST(&slirp_stacks);
|
899 |
} |
900 |
} |
901 |
|
902 |
void net_slirp_hostfwd_remove(Monitor *mon, const QDict *qdict) |
903 |
{ |
904 |
struct in_addr host_addr = { .s_addr = INADDR_ANY };
|
905 |
int host_port;
|
906 |
char buf[256] = ""; |
907 |
const char *src_str, *p; |
908 |
SlirpState *s; |
909 |
int is_udp = 0; |
910 |
int err;
|
911 |
const char *arg1 = qdict_get_str(qdict, "arg1"); |
912 |
const char *arg2 = qdict_get_try_str(qdict, "arg2"); |
913 |
const char *arg3 = qdict_get_try_str(qdict, "arg3"); |
914 |
|
915 |
if (arg2) {
|
916 |
s = slirp_lookup(mon, arg1, arg2); |
917 |
src_str = arg3; |
918 |
} else {
|
919 |
s = slirp_lookup(mon, NULL, NULL); |
920 |
src_str = arg1; |
921 |
} |
922 |
if (!s) {
|
923 |
return;
|
924 |
} |
925 |
|
926 |
if (!src_str || !src_str[0]) |
927 |
goto fail_syntax;
|
928 |
|
929 |
p = src_str; |
930 |
get_str_sep(buf, sizeof(buf), &p, ':'); |
931 |
|
932 |
if (!strcmp(buf, "tcp") || buf[0] == '\0') { |
933 |
is_udp = 0;
|
934 |
} else if (!strcmp(buf, "udp")) { |
935 |
is_udp = 1;
|
936 |
} else {
|
937 |
goto fail_syntax;
|
938 |
} |
939 |
|
940 |
if (get_str_sep(buf, sizeof(buf), &p, ':') < 0) { |
941 |
goto fail_syntax;
|
942 |
} |
943 |
if (buf[0] != '\0' && !inet_aton(buf, &host_addr)) { |
944 |
goto fail_syntax;
|
945 |
} |
946 |
|
947 |
host_port = atoi(p); |
948 |
|
949 |
err = slirp_remove_hostfwd(TAILQ_FIRST(&slirp_stacks)->slirp, is_udp, |
950 |
host_addr, host_port); |
951 |
|
952 |
monitor_printf(mon, "host forwarding rule for %s %s\n", src_str,
|
953 |
err ? "removed" : "not found"); |
954 |
return;
|
955 |
|
956 |
fail_syntax:
|
957 |
monitor_printf(mon, "invalid format\n");
|
958 |
} |
959 |
|
960 |
static void slirp_hostfwd(SlirpState *s, Monitor *mon, const char *redir_str, |
961 |
int legacy_format)
|
962 |
{ |
963 |
struct in_addr host_addr = { .s_addr = INADDR_ANY };
|
964 |
struct in_addr guest_addr = { .s_addr = 0 }; |
965 |
int host_port, guest_port;
|
966 |
const char *p; |
967 |
char buf[256]; |
968 |
int is_udp;
|
969 |
char *end;
|
970 |
|
971 |
p = redir_str; |
972 |
if (!p || get_str_sep(buf, sizeof(buf), &p, ':') < 0) { |
973 |
goto fail_syntax;
|
974 |
} |
975 |
if (!strcmp(buf, "tcp") || buf[0] == '\0') { |
976 |
is_udp = 0;
|
977 |
} else if (!strcmp(buf, "udp")) { |
978 |
is_udp = 1;
|
979 |
} else {
|
980 |
goto fail_syntax;
|
981 |
} |
982 |
|
983 |
if (!legacy_format) {
|
984 |
if (get_str_sep(buf, sizeof(buf), &p, ':') < 0) { |
985 |
goto fail_syntax;
|
986 |
} |
987 |
if (buf[0] != '\0' && !inet_aton(buf, &host_addr)) { |
988 |
goto fail_syntax;
|
989 |
} |
990 |
} |
991 |
|
992 |
if (get_str_sep(buf, sizeof(buf), &p, legacy_format ? ':' : '-') < 0) { |
993 |
goto fail_syntax;
|
994 |
} |
995 |
host_port = strtol(buf, &end, 0);
|
996 |
if (*end != '\0' || host_port < 1 || host_port > 65535) { |
997 |
goto fail_syntax;
|
998 |
} |
999 |
|
1000 |
if (get_str_sep(buf, sizeof(buf), &p, ':') < 0) { |
1001 |
goto fail_syntax;
|
1002 |
} |
1003 |
if (buf[0] != '\0' && !inet_aton(buf, &guest_addr)) { |
1004 |
goto fail_syntax;
|
1005 |
} |
1006 |
|
1007 |
guest_port = strtol(p, &end, 0);
|
1008 |
if (*end != '\0' || guest_port < 1 || guest_port > 65535) { |
1009 |
goto fail_syntax;
|
1010 |
} |
1011 |
|
1012 |
if (slirp_add_hostfwd(s->slirp, is_udp, host_addr, host_port, guest_addr,
|
1013 |
guest_port) < 0) {
|
1014 |
config_error(mon, "could not set up host forwarding rule '%s'\n",
|
1015 |
redir_str); |
1016 |
} |
1017 |
return;
|
1018 |
|
1019 |
fail_syntax:
|
1020 |
config_error(mon, "invalid host forwarding rule '%s'\n", redir_str);
|
1021 |
} |
1022 |
|
1023 |
void net_slirp_hostfwd_add(Monitor *mon, const QDict *qdict) |
1024 |
{ |
1025 |
const char *redir_str; |
1026 |
SlirpState *s; |
1027 |
const char *arg1 = qdict_get_str(qdict, "arg1"); |
1028 |
const char *arg2 = qdict_get_try_str(qdict, "arg2"); |
1029 |
const char *arg3 = qdict_get_try_str(qdict, "arg3"); |
1030 |
|
1031 |
if (arg2) {
|
1032 |
s = slirp_lookup(mon, arg1, arg2); |
1033 |
redir_str = arg3; |
1034 |
} else {
|
1035 |
s = slirp_lookup(mon, NULL, NULL); |
1036 |
redir_str = arg1; |
1037 |
} |
1038 |
if (s) {
|
1039 |
slirp_hostfwd(s, mon, redir_str, 0);
|
1040 |
} |
1041 |
|
1042 |
} |
1043 |
|
1044 |
void net_slirp_redir(const char *redir_str) |
1045 |
{ |
1046 |
struct slirp_config_str *config;
|
1047 |
|
1048 |
if (TAILQ_EMPTY(&slirp_stacks)) {
|
1049 |
config = qemu_malloc(sizeof(*config));
|
1050 |
pstrcpy(config->str, sizeof(config->str), redir_str);
|
1051 |
config->flags = SLIRP_CFG_HOSTFWD | SLIRP_CFG_LEGACY; |
1052 |
config->next = slirp_configs; |
1053 |
slirp_configs = config; |
1054 |
return;
|
1055 |
} |
1056 |
|
1057 |
slirp_hostfwd(TAILQ_FIRST(&slirp_stacks), NULL, redir_str, 1); |
1058 |
} |
1059 |
|
1060 |
#ifndef _WIN32
|
1061 |
|
1062 |
/* automatic user mode samba server configuration */
|
1063 |
static void slirp_smb_cleanup(SlirpState *s) |
1064 |
{ |
1065 |
char cmd[128]; |
1066 |
|
1067 |
if (s->smb_dir[0] != '\0') { |
1068 |
snprintf(cmd, sizeof(cmd), "rm -rf %s", s->smb_dir); |
1069 |
system(cmd); |
1070 |
s->smb_dir[0] = '\0'; |
1071 |
} |
1072 |
} |
1073 |
|
1074 |
static void slirp_smb(SlirpState* s, Monitor *mon, const char *exported_dir, |
1075 |
struct in_addr vserver_addr)
|
1076 |
{ |
1077 |
static int instance; |
1078 |
char smb_conf[128]; |
1079 |
char smb_cmdline[128]; |
1080 |
FILE *f; |
1081 |
|
1082 |
snprintf(s->smb_dir, sizeof(s->smb_dir), "/tmp/qemu-smb.%ld-%d", |
1083 |
(long)getpid(), instance++);
|
1084 |
if (mkdir(s->smb_dir, 0700) < 0) { |
1085 |
config_error(mon, "could not create samba server dir '%s'\n",
|
1086 |
s->smb_dir); |
1087 |
return;
|
1088 |
} |
1089 |
snprintf(smb_conf, sizeof(smb_conf), "%s/%s", s->smb_dir, "smb.conf"); |
1090 |
|
1091 |
f = fopen(smb_conf, "w");
|
1092 |
if (!f) {
|
1093 |
slirp_smb_cleanup(s); |
1094 |
config_error(mon, "could not create samba server "
|
1095 |
"configuration file '%s'\n", smb_conf);
|
1096 |
return;
|
1097 |
} |
1098 |
fprintf(f, |
1099 |
"[global]\n"
|
1100 |
"private dir=%s\n"
|
1101 |
"smb ports=0\n"
|
1102 |
"socket address=127.0.0.1\n"
|
1103 |
"pid directory=%s\n"
|
1104 |
"lock directory=%s\n"
|
1105 |
"log file=%s/log.smbd\n"
|
1106 |
"smb passwd file=%s/smbpasswd\n"
|
1107 |
"security = share\n"
|
1108 |
"[qemu]\n"
|
1109 |
"path=%s\n"
|
1110 |
"read only=no\n"
|
1111 |
"guest ok=yes\n",
|
1112 |
s->smb_dir, |
1113 |
s->smb_dir, |
1114 |
s->smb_dir, |
1115 |
s->smb_dir, |
1116 |
s->smb_dir, |
1117 |
exported_dir |
1118 |
); |
1119 |
fclose(f); |
1120 |
|
1121 |
snprintf(smb_cmdline, sizeof(smb_cmdline), "%s -s %s", |
1122 |
SMBD_COMMAND, smb_conf); |
1123 |
|
1124 |
if (slirp_add_exec(s->slirp, 0, smb_cmdline, &vserver_addr, 139) < 0) { |
1125 |
slirp_smb_cleanup(s); |
1126 |
config_error(mon, "conflicting/invalid smbserver address\n");
|
1127 |
} |
1128 |
} |
1129 |
|
1130 |
/* automatic user mode samba server configuration (legacy interface) */
|
1131 |
void net_slirp_smb(const char *exported_dir) |
1132 |
{ |
1133 |
struct in_addr vserver_addr = { .s_addr = 0 }; |
1134 |
|
1135 |
if (legacy_smb_export) {
|
1136 |
fprintf(stderr, "-smb given twice\n");
|
1137 |
exit(1);
|
1138 |
} |
1139 |
legacy_smb_export = exported_dir; |
1140 |
if (!TAILQ_EMPTY(&slirp_stacks)) {
|
1141 |
slirp_smb(TAILQ_FIRST(&slirp_stacks), NULL, exported_dir,
|
1142 |
vserver_addr); |
1143 |
} |
1144 |
} |
1145 |
|
1146 |
#endif /* !defined(_WIN32) */ |
1147 |
|
1148 |
struct GuestFwd {
|
1149 |
CharDriverState *hd; |
1150 |
struct in_addr server;
|
1151 |
int port;
|
1152 |
Slirp *slirp; |
1153 |
}; |
1154 |
|
1155 |
static int guestfwd_can_read(void *opaque) |
1156 |
{ |
1157 |
struct GuestFwd *fwd = opaque;
|
1158 |
return slirp_socket_can_recv(fwd->slirp, fwd->server, fwd->port);
|
1159 |
} |
1160 |
|
1161 |
static void guestfwd_read(void *opaque, const uint8_t *buf, int size) |
1162 |
{ |
1163 |
struct GuestFwd *fwd = opaque;
|
1164 |
slirp_socket_recv(fwd->slirp, fwd->server, fwd->port, buf, size); |
1165 |
} |
1166 |
|
1167 |
static void slirp_guestfwd(SlirpState *s, Monitor *mon, const char *config_str, |
1168 |
int legacy_format)
|
1169 |
{ |
1170 |
struct in_addr server = { .s_addr = 0 }; |
1171 |
struct GuestFwd *fwd;
|
1172 |
const char *p; |
1173 |
char buf[128]; |
1174 |
char *end;
|
1175 |
int port;
|
1176 |
|
1177 |
p = config_str; |
1178 |
if (legacy_format) {
|
1179 |
if (get_str_sep(buf, sizeof(buf), &p, ':') < 0) { |
1180 |
goto fail_syntax;
|
1181 |
} |
1182 |
} else {
|
1183 |
if (get_str_sep(buf, sizeof(buf), &p, ':') < 0) { |
1184 |
goto fail_syntax;
|
1185 |
} |
1186 |
if (strcmp(buf, "tcp") && buf[0] != '\0') { |
1187 |
goto fail_syntax;
|
1188 |
} |
1189 |
if (get_str_sep(buf, sizeof(buf), &p, ':') < 0) { |
1190 |
goto fail_syntax;
|
1191 |
} |
1192 |
if (buf[0] != '\0' && !inet_aton(buf, &server)) { |
1193 |
goto fail_syntax;
|
1194 |
} |
1195 |
if (get_str_sep(buf, sizeof(buf), &p, '-') < 0) { |
1196 |
goto fail_syntax;
|
1197 |
} |
1198 |
} |
1199 |
port = strtol(buf, &end, 10);
|
1200 |
if (*end != '\0' || port < 1 || port > 65535) { |
1201 |
goto fail_syntax;
|
1202 |
} |
1203 |
|
1204 |
fwd = qemu_malloc(sizeof(struct GuestFwd)); |
1205 |
snprintf(buf, sizeof(buf), "guestfwd.tcp:%d", port); |
1206 |
fwd->hd = qemu_chr_open(buf, p, NULL);
|
1207 |
if (!fwd->hd) {
|
1208 |
config_error(mon, "could not open guest forwarding device '%s'\n",
|
1209 |
buf); |
1210 |
qemu_free(fwd); |
1211 |
return;
|
1212 |
} |
1213 |
|
1214 |
if (slirp_add_exec(s->slirp, 3, fwd->hd, &server, port) < 0) { |
1215 |
config_error(mon, "conflicting/invalid host:port in guest forwarding "
|
1216 |
"rule '%s'\n", config_str);
|
1217 |
qemu_free(fwd); |
1218 |
return;
|
1219 |
} |
1220 |
fwd->server = server; |
1221 |
fwd->port = port; |
1222 |
fwd->slirp = s->slirp; |
1223 |
|
1224 |
qemu_chr_add_handlers(fwd->hd, guestfwd_can_read, guestfwd_read, |
1225 |
NULL, fwd);
|
1226 |
return;
|
1227 |
|
1228 |
fail_syntax:
|
1229 |
config_error(mon, "invalid guest forwarding rule '%s'\n", config_str);
|
1230 |
} |
1231 |
|
1232 |
void do_info_usernet(Monitor *mon)
|
1233 |
{ |
1234 |
SlirpState *s; |
1235 |
|
1236 |
TAILQ_FOREACH(s, &slirp_stacks, entry) { |
1237 |
monitor_printf(mon, "VLAN %d (%s):\n", s->vc->vlan->id, s->vc->name);
|
1238 |
slirp_connection_info(s->slirp, mon); |
1239 |
} |
1240 |
} |
1241 |
|
1242 |
#endif /* CONFIG_SLIRP */ |
1243 |
|
1244 |
#if !defined(_WIN32)
|
1245 |
|
1246 |
typedef struct TAPState { |
1247 |
VLANClientState *vc; |
1248 |
int fd;
|
1249 |
char down_script[1024]; |
1250 |
char down_script_arg[128]; |
1251 |
uint8_t buf[4096];
|
1252 |
unsigned int read_poll : 1; |
1253 |
unsigned int write_poll : 1; |
1254 |
} TAPState; |
1255 |
|
1256 |
static int launch_script(const char *setup_script, const char *ifname, int fd); |
1257 |
|
1258 |
static int tap_can_send(void *opaque); |
1259 |
static void tap_send(void *opaque); |
1260 |
static void tap_writable(void *opaque); |
1261 |
|
1262 |
static void tap_update_fd_handler(TAPState *s) |
1263 |
{ |
1264 |
qemu_set_fd_handler2(s->fd, |
1265 |
s->read_poll ? tap_can_send : NULL,
|
1266 |
s->read_poll ? tap_send : NULL,
|
1267 |
s->write_poll ? tap_writable : NULL,
|
1268 |
s); |
1269 |
} |
1270 |
|
1271 |
static void tap_read_poll(TAPState *s, int enable) |
1272 |
{ |
1273 |
s->read_poll = !!enable; |
1274 |
tap_update_fd_handler(s); |
1275 |
} |
1276 |
|
1277 |
static void tap_write_poll(TAPState *s, int enable) |
1278 |
{ |
1279 |
s->write_poll = !!enable; |
1280 |
tap_update_fd_handler(s); |
1281 |
} |
1282 |
|
1283 |
static void tap_writable(void *opaque) |
1284 |
{ |
1285 |
TAPState *s = opaque; |
1286 |
|
1287 |
tap_write_poll(s, 0);
|
1288 |
|
1289 |
qemu_flush_queued_packets(s->vc); |
1290 |
} |
1291 |
|
1292 |
static ssize_t tap_receive_iov(VLANClientState *vc, const struct iovec *iov, |
1293 |
int iovcnt)
|
1294 |
{ |
1295 |
TAPState *s = vc->opaque; |
1296 |
ssize_t len; |
1297 |
|
1298 |
do {
|
1299 |
len = writev(s->fd, iov, iovcnt); |
1300 |
} while (len == -1 && errno == EINTR); |
1301 |
|
1302 |
if (len == -1 && errno == EAGAIN) { |
1303 |
tap_write_poll(s, 1);
|
1304 |
return 0; |
1305 |
} |
1306 |
|
1307 |
return len;
|
1308 |
} |
1309 |
|
1310 |
static ssize_t tap_receive(VLANClientState *vc, const uint8_t *buf, size_t size) |
1311 |
{ |
1312 |
TAPState *s = vc->opaque; |
1313 |
ssize_t len; |
1314 |
|
1315 |
do {
|
1316 |
len = write(s->fd, buf, size); |
1317 |
} while (len == -1 && (errno == EINTR || errno == EAGAIN)); |
1318 |
|
1319 |
return len;
|
1320 |
} |
1321 |
|
1322 |
static int tap_can_send(void *opaque) |
1323 |
{ |
1324 |
TAPState *s = opaque; |
1325 |
|
1326 |
return qemu_can_send_packet(s->vc);
|
1327 |
} |
1328 |
|
1329 |
#ifdef __sun__
|
1330 |
static ssize_t tap_read_packet(int tapfd, uint8_t *buf, int maxlen) |
1331 |
{ |
1332 |
struct strbuf sbuf;
|
1333 |
int f = 0; |
1334 |
|
1335 |
sbuf.maxlen = maxlen; |
1336 |
sbuf.buf = (char *)buf;
|
1337 |
|
1338 |
return getmsg(tapfd, NULL, &sbuf, &f) >= 0 ? sbuf.len : -1; |
1339 |
} |
1340 |
#else
|
1341 |
static ssize_t tap_read_packet(int tapfd, uint8_t *buf, int maxlen) |
1342 |
{ |
1343 |
return read(tapfd, buf, maxlen);
|
1344 |
} |
1345 |
#endif
|
1346 |
|
1347 |
static void tap_send_completed(VLANClientState *vc, ssize_t len) |
1348 |
{ |
1349 |
TAPState *s = vc->opaque; |
1350 |
tap_read_poll(s, 1);
|
1351 |
} |
1352 |
|
1353 |
static void tap_send(void *opaque) |
1354 |
{ |
1355 |
TAPState *s = opaque; |
1356 |
int size;
|
1357 |
|
1358 |
do {
|
1359 |
size = tap_read_packet(s->fd, s->buf, sizeof(s->buf));
|
1360 |
if (size <= 0) { |
1361 |
break;
|
1362 |
} |
1363 |
|
1364 |
size = qemu_send_packet_async(s->vc, s->buf, size, tap_send_completed); |
1365 |
if (size == 0) { |
1366 |
tap_read_poll(s, 0);
|
1367 |
} |
1368 |
} while (size > 0); |
1369 |
} |
1370 |
|
1371 |
#ifdef TUNSETSNDBUF
|
1372 |
/* sndbuf should be set to a value lower than the tx queue
|
1373 |
* capacity of any destination network interface.
|
1374 |
* Ethernet NICs generally have txqueuelen=1000, so 1Mb is
|
1375 |
* a good default, given a 1500 byte MTU.
|
1376 |
*/
|
1377 |
#define TAP_DEFAULT_SNDBUF 1024*1024 |
1378 |
|
1379 |
static void tap_set_sndbuf(TAPState *s, const char *sndbuf_str, Monitor *mon) |
1380 |
{ |
1381 |
int sndbuf = TAP_DEFAULT_SNDBUF;
|
1382 |
|
1383 |
if (sndbuf_str) {
|
1384 |
sndbuf = atoi(sndbuf_str); |
1385 |
} |
1386 |
|
1387 |
if (!sndbuf) {
|
1388 |
sndbuf = INT_MAX; |
1389 |
} |
1390 |
|
1391 |
if (ioctl(s->fd, TUNSETSNDBUF, &sndbuf) == -1 && sndbuf_str) { |
1392 |
config_error(mon, "TUNSETSNDBUF ioctl failed: %s\n",
|
1393 |
strerror(errno)); |
1394 |
} |
1395 |
} |
1396 |
#else
|
1397 |
static void tap_set_sndbuf(TAPState *s, const char *sndbuf_str, Monitor *mon) |
1398 |
{ |
1399 |
if (sndbuf_str) {
|
1400 |
config_error(mon, "No '-net tap,sndbuf=<nbytes>' support available\n");
|
1401 |
} |
1402 |
} |
1403 |
#endif /* TUNSETSNDBUF */ |
1404 |
|
1405 |
static void tap_cleanup(VLANClientState *vc) |
1406 |
{ |
1407 |
TAPState *s = vc->opaque; |
1408 |
|
1409 |
qemu_purge_queued_packets(vc); |
1410 |
|
1411 |
if (s->down_script[0]) |
1412 |
launch_script(s->down_script, s->down_script_arg, s->fd); |
1413 |
|
1414 |
tap_read_poll(s, 0);
|
1415 |
tap_write_poll(s, 0);
|
1416 |
close(s->fd); |
1417 |
qemu_free(s); |
1418 |
} |
1419 |
|
1420 |
/* fd support */
|
1421 |
|
1422 |
static TAPState *net_tap_fd_init(VLANState *vlan,
|
1423 |
const char *model, |
1424 |
const char *name, |
1425 |
int fd)
|
1426 |
{ |
1427 |
TAPState *s; |
1428 |
|
1429 |
s = qemu_mallocz(sizeof(TAPState));
|
1430 |
s->fd = fd; |
1431 |
s->vc = qemu_new_vlan_client(vlan, model, name, NULL, tap_receive,
|
1432 |
tap_receive_iov, tap_cleanup, s); |
1433 |
tap_read_poll(s, 1);
|
1434 |
snprintf(s->vc->info_str, sizeof(s->vc->info_str), "fd=%d", fd); |
1435 |
return s;
|
1436 |
} |
1437 |
|
1438 |
#if defined (CONFIG_BSD) || defined (__FreeBSD_kernel__)
|
1439 |
static int tap_open(char *ifname, int ifname_size) |
1440 |
{ |
1441 |
int fd;
|
1442 |
char *dev;
|
1443 |
struct stat s;
|
1444 |
|
1445 |
TFR(fd = open("/dev/tap", O_RDWR));
|
1446 |
if (fd < 0) { |
1447 |
fprintf(stderr, "warning: could not open /dev/tap: no virtual network emulation\n");
|
1448 |
return -1; |
1449 |
} |
1450 |
|
1451 |
fstat(fd, &s); |
1452 |
dev = devname(s.st_rdev, S_IFCHR); |
1453 |
pstrcpy(ifname, ifname_size, dev); |
1454 |
|
1455 |
fcntl(fd, F_SETFL, O_NONBLOCK); |
1456 |
return fd;
|
1457 |
} |
1458 |
#elif defined(__sun__)
|
1459 |
#define TUNNEWPPA (('T'<<16) | 0x0001) |
1460 |
/*
|
1461 |
* Allocate TAP device, returns opened fd.
|
1462 |
* Stores dev name in the first arg(must be large enough).
|
1463 |
*/
|
1464 |
static int tap_alloc(char *dev, size_t dev_size) |
1465 |
{ |
1466 |
int tap_fd, if_fd, ppa = -1; |
1467 |
static int ip_fd = 0; |
1468 |
char *ptr;
|
1469 |
|
1470 |
static int arp_fd = 0; |
1471 |
int ip_muxid, arp_muxid;
|
1472 |
struct strioctl strioc_if, strioc_ppa;
|
1473 |
int link_type = I_PLINK;;
|
1474 |
struct lifreq ifr;
|
1475 |
char actual_name[32] = ""; |
1476 |
|
1477 |
memset(&ifr, 0x0, sizeof(ifr)); |
1478 |
|
1479 |
if( *dev ){
|
1480 |
ptr = dev; |
1481 |
while( *ptr && !qemu_isdigit((int)*ptr) ) ptr++; |
1482 |
ppa = atoi(ptr); |
1483 |
} |
1484 |
|
1485 |
/* Check if IP device was opened */
|
1486 |
if( ip_fd )
|
1487 |
close(ip_fd); |
1488 |
|
1489 |
TFR(ip_fd = open("/dev/udp", O_RDWR, 0)); |
1490 |
if (ip_fd < 0) { |
1491 |
syslog(LOG_ERR, "Can't open /dev/ip (actually /dev/udp)");
|
1492 |
return -1; |
1493 |
} |
1494 |
|
1495 |
TFR(tap_fd = open("/dev/tap", O_RDWR, 0)); |
1496 |
if (tap_fd < 0) { |
1497 |
syslog(LOG_ERR, "Can't open /dev/tap");
|
1498 |
return -1; |
1499 |
} |
1500 |
|
1501 |
/* Assign a new PPA and get its unit number. */
|
1502 |
strioc_ppa.ic_cmd = TUNNEWPPA; |
1503 |
strioc_ppa.ic_timout = 0;
|
1504 |
strioc_ppa.ic_len = sizeof(ppa);
|
1505 |
strioc_ppa.ic_dp = (char *)&ppa;
|
1506 |
if ((ppa = ioctl (tap_fd, I_STR, &strioc_ppa)) < 0) |
1507 |
syslog (LOG_ERR, "Can't assign new interface");
|
1508 |
|
1509 |
TFR(if_fd = open("/dev/tap", O_RDWR, 0)); |
1510 |
if (if_fd < 0) { |
1511 |
syslog(LOG_ERR, "Can't open /dev/tap (2)");
|
1512 |
return -1; |
1513 |
} |
1514 |
if(ioctl(if_fd, I_PUSH, "ip") < 0){ |
1515 |
syslog(LOG_ERR, "Can't push IP module");
|
1516 |
return -1; |
1517 |
} |
1518 |
|
1519 |
if (ioctl(if_fd, SIOCGLIFFLAGS, &ifr) < 0) |
1520 |
syslog(LOG_ERR, "Can't get flags\n");
|
1521 |
|
1522 |
snprintf (actual_name, 32, "tap%d", ppa); |
1523 |
pstrcpy(ifr.lifr_name, sizeof(ifr.lifr_name), actual_name);
|
1524 |
|
1525 |
ifr.lifr_ppa = ppa; |
1526 |
/* Assign ppa according to the unit number returned by tun device */
|
1527 |
|
1528 |
if (ioctl (if_fd, SIOCSLIFNAME, &ifr) < 0) |
1529 |
syslog (LOG_ERR, "Can't set PPA %d", ppa);
|
1530 |
if (ioctl(if_fd, SIOCGLIFFLAGS, &ifr) <0) |
1531 |
syslog (LOG_ERR, "Can't get flags\n");
|
1532 |
/* Push arp module to if_fd */
|
1533 |
if (ioctl (if_fd, I_PUSH, "arp") < 0) |
1534 |
syslog (LOG_ERR, "Can't push ARP module (2)");
|
1535 |
|
1536 |
/* Push arp module to ip_fd */
|
1537 |
if (ioctl (ip_fd, I_POP, NULL) < 0) |
1538 |
syslog (LOG_ERR, "I_POP failed\n");
|
1539 |
if (ioctl (ip_fd, I_PUSH, "arp") < 0) |
1540 |
syslog (LOG_ERR, "Can't push ARP module (3)\n");
|
1541 |
/* Open arp_fd */
|
1542 |
TFR(arp_fd = open ("/dev/tap", O_RDWR, 0)); |
1543 |
if (arp_fd < 0) |
1544 |
syslog (LOG_ERR, "Can't open %s\n", "/dev/tap"); |
1545 |
|
1546 |
/* Set ifname to arp */
|
1547 |
strioc_if.ic_cmd = SIOCSLIFNAME; |
1548 |
strioc_if.ic_timout = 0;
|
1549 |
strioc_if.ic_len = sizeof(ifr);
|
1550 |
strioc_if.ic_dp = (char *)𝔦
|
1551 |
if (ioctl(arp_fd, I_STR, &strioc_if) < 0){ |
1552 |
syslog (LOG_ERR, "Can't set ifname to arp\n");
|
1553 |
} |
1554 |
|
1555 |
if((ip_muxid = ioctl(ip_fd, I_LINK, if_fd)) < 0){ |
1556 |
syslog(LOG_ERR, "Can't link TAP device to IP");
|
1557 |
return -1; |
1558 |
} |
1559 |
|
1560 |
if ((arp_muxid = ioctl (ip_fd, link_type, arp_fd)) < 0) |
1561 |
syslog (LOG_ERR, "Can't link TAP device to ARP");
|
1562 |
|
1563 |
close (if_fd); |
1564 |
|
1565 |
memset(&ifr, 0x0, sizeof(ifr)); |
1566 |
pstrcpy(ifr.lifr_name, sizeof(ifr.lifr_name), actual_name);
|
1567 |
ifr.lifr_ip_muxid = ip_muxid; |
1568 |
ifr.lifr_arp_muxid = arp_muxid; |
1569 |
|
1570 |
if (ioctl (ip_fd, SIOCSLIFMUXID, &ifr) < 0) |
1571 |
{ |
1572 |
ioctl (ip_fd, I_PUNLINK , arp_muxid); |
1573 |
ioctl (ip_fd, I_PUNLINK, ip_muxid); |
1574 |
syslog (LOG_ERR, "Can't set multiplexor id");
|
1575 |
} |
1576 |
|
1577 |
snprintf(dev, dev_size, "tap%d", ppa);
|
1578 |
return tap_fd;
|
1579 |
} |
1580 |
|
1581 |
static int tap_open(char *ifname, int ifname_size) |
1582 |
{ |
1583 |
char dev[10]=""; |
1584 |
int fd;
|
1585 |
if( (fd = tap_alloc(dev, sizeof(dev))) < 0 ){ |
1586 |
fprintf(stderr, "Cannot allocate TAP device\n");
|
1587 |
return -1; |
1588 |
} |
1589 |
pstrcpy(ifname, ifname_size, dev); |
1590 |
fcntl(fd, F_SETFL, O_NONBLOCK); |
1591 |
return fd;
|
1592 |
} |
1593 |
#elif defined (_AIX)
|
1594 |
static int tap_open(char *ifname, int ifname_size) |
1595 |
{ |
1596 |
fprintf (stderr, "no tap on AIX\n");
|
1597 |
return -1; |
1598 |
} |
1599 |
#else
|
1600 |
static int tap_open(char *ifname, int ifname_size) |
1601 |
{ |
1602 |
struct ifreq ifr;
|
1603 |
int fd, ret;
|
1604 |
|
1605 |
TFR(fd = open("/dev/net/tun", O_RDWR));
|
1606 |
if (fd < 0) { |
1607 |
fprintf(stderr, "warning: could not open /dev/net/tun: no virtual network emulation\n");
|
1608 |
return -1; |
1609 |
} |
1610 |
memset(&ifr, 0, sizeof(ifr)); |
1611 |
ifr.ifr_flags = IFF_TAP | IFF_NO_PI; |
1612 |
if (ifname[0] != '\0') |
1613 |
pstrcpy(ifr.ifr_name, IFNAMSIZ, ifname); |
1614 |
else
|
1615 |
pstrcpy(ifr.ifr_name, IFNAMSIZ, "tap%d");
|
1616 |
ret = ioctl(fd, TUNSETIFF, (void *) &ifr);
|
1617 |
if (ret != 0) { |
1618 |
fprintf(stderr, "warning: could not configure /dev/net/tun: no virtual network emulation\n");
|
1619 |
close(fd); |
1620 |
return -1; |
1621 |
} |
1622 |
pstrcpy(ifname, ifname_size, ifr.ifr_name); |
1623 |
fcntl(fd, F_SETFL, O_NONBLOCK); |
1624 |
return fd;
|
1625 |
} |
1626 |
#endif
|
1627 |
|
1628 |
static int launch_script(const char *setup_script, const char *ifname, int fd) |
1629 |
{ |
1630 |
sigset_t oldmask, mask; |
1631 |
int pid, status;
|
1632 |
char *args[3]; |
1633 |
char **parg;
|
1634 |
|
1635 |
sigemptyset(&mask); |
1636 |
sigaddset(&mask, SIGCHLD); |
1637 |
sigprocmask(SIG_BLOCK, &mask, &oldmask); |
1638 |
|
1639 |
/* try to launch network script */
|
1640 |
pid = fork(); |
1641 |
if (pid == 0) { |
1642 |
int open_max = sysconf(_SC_OPEN_MAX), i;
|
1643 |
|
1644 |
for (i = 0; i < open_max; i++) { |
1645 |
if (i != STDIN_FILENO &&
|
1646 |
i != STDOUT_FILENO && |
1647 |
i != STDERR_FILENO && |
1648 |
i != fd) { |
1649 |
close(i); |
1650 |
} |
1651 |
} |
1652 |
parg = args; |
1653 |
*parg++ = (char *)setup_script;
|
1654 |
*parg++ = (char *)ifname;
|
1655 |
*parg++ = NULL;
|
1656 |
execv(setup_script, args); |
1657 |
_exit(1);
|
1658 |
} else if (pid > 0) { |
1659 |
while (waitpid(pid, &status, 0) != pid) { |
1660 |
/* loop */
|
1661 |
} |
1662 |
sigprocmask(SIG_SETMASK, &oldmask, NULL);
|
1663 |
|
1664 |
if (WIFEXITED(status) && WEXITSTATUS(status) == 0) { |
1665 |
return 0; |
1666 |
} |
1667 |
} |
1668 |
fprintf(stderr, "%s: could not launch network script\n", setup_script);
|
1669 |
return -1; |
1670 |
} |
1671 |
|
1672 |
static TAPState *net_tap_init(VLANState *vlan, const char *model, |
1673 |
const char *name, const char *ifname1, |
1674 |
const char *setup_script, const char *down_script) |
1675 |
{ |
1676 |
TAPState *s; |
1677 |
int fd;
|
1678 |
char ifname[128]; |
1679 |
|
1680 |
if (ifname1 != NULL) |
1681 |
pstrcpy(ifname, sizeof(ifname), ifname1);
|
1682 |
else
|
1683 |
ifname[0] = '\0'; |
1684 |
TFR(fd = tap_open(ifname, sizeof(ifname)));
|
1685 |
if (fd < 0) |
1686 |
return NULL; |
1687 |
|
1688 |
if (!setup_script || !strcmp(setup_script, "no")) |
1689 |
setup_script = "";
|
1690 |
if (setup_script[0] != '\0' && |
1691 |
launch_script(setup_script, ifname, fd)) { |
1692 |
return NULL; |
1693 |
} |
1694 |
s = net_tap_fd_init(vlan, model, name, fd); |
1695 |
snprintf(s->vc->info_str, sizeof(s->vc->info_str),
|
1696 |
"ifname=%s,script=%s,downscript=%s",
|
1697 |
ifname, setup_script, down_script); |
1698 |
if (down_script && strcmp(down_script, "no")) { |
1699 |
snprintf(s->down_script, sizeof(s->down_script), "%s", down_script); |
1700 |
snprintf(s->down_script_arg, sizeof(s->down_script_arg), "%s", ifname); |
1701 |
} |
1702 |
return s;
|
1703 |
} |
1704 |
|
1705 |
#endif /* !_WIN32 */ |
1706 |
|
1707 |
#if defined(CONFIG_VDE)
|
1708 |
typedef struct VDEState { |
1709 |
VLANClientState *vc; |
1710 |
VDECONN *vde; |
1711 |
} VDEState; |
1712 |
|
1713 |
static void vde_to_qemu(void *opaque) |
1714 |
{ |
1715 |
VDEState *s = opaque; |
1716 |
uint8_t buf[4096];
|
1717 |
int size;
|
1718 |
|
1719 |
size = vde_recv(s->vde, (char *)buf, sizeof(buf), 0); |
1720 |
if (size > 0) { |
1721 |
qemu_send_packet(s->vc, buf, size); |
1722 |
} |
1723 |
} |
1724 |
|
1725 |
static ssize_t vde_receive(VLANClientState *vc, const uint8_t *buf, size_t size) |
1726 |
{ |
1727 |
VDEState *s = vc->opaque; |
1728 |
ssize_t ret; |
1729 |
|
1730 |
do {
|
1731 |
ret = vde_send(s->vde, (const char *)buf, size, 0); |
1732 |
} while (ret < 0 && errno == EINTR); |
1733 |
|
1734 |
return ret;
|
1735 |
} |
1736 |
|
1737 |
static void vde_cleanup(VLANClientState *vc) |
1738 |
{ |
1739 |
VDEState *s = vc->opaque; |
1740 |
qemu_set_fd_handler(vde_datafd(s->vde), NULL, NULL, NULL); |
1741 |
vde_close(s->vde); |
1742 |
qemu_free(s); |
1743 |
} |
1744 |
|
1745 |
static int net_vde_init(VLANState *vlan, const char *model, |
1746 |
const char *name, const char *sock, |
1747 |
int port, const char *group, int mode) |
1748 |
{ |
1749 |
VDEState *s; |
1750 |
char *init_group = strlen(group) ? (char *)group : NULL; |
1751 |
char *init_sock = strlen(sock) ? (char *)sock : NULL; |
1752 |
|
1753 |
struct vde_open_args args = {
|
1754 |
.port = port, |
1755 |
.group = init_group, |
1756 |
.mode = mode, |
1757 |
}; |
1758 |
|
1759 |
s = qemu_mallocz(sizeof(VDEState));
|
1760 |
s->vde = vde_open(init_sock, (char *)"QEMU", &args); |
1761 |
if (!s->vde){
|
1762 |
free(s); |
1763 |
return -1; |
1764 |
} |
1765 |
s->vc = qemu_new_vlan_client(vlan, model, name, NULL, vde_receive,
|
1766 |
NULL, vde_cleanup, s);
|
1767 |
qemu_set_fd_handler(vde_datafd(s->vde), vde_to_qemu, NULL, s);
|
1768 |
snprintf(s->vc->info_str, sizeof(s->vc->info_str), "sock=%s,fd=%d", |
1769 |
sock, vde_datafd(s->vde)); |
1770 |
return 0; |
1771 |
} |
1772 |
#endif
|
1773 |
|
1774 |
/* network connection */
|
1775 |
typedef struct NetSocketState { |
1776 |
VLANClientState *vc; |
1777 |
int fd;
|
1778 |
int state; /* 0 = getting length, 1 = getting data */ |
1779 |
unsigned int index; |
1780 |
unsigned int packet_len; |
1781 |
uint8_t buf[4096];
|
1782 |
struct sockaddr_in dgram_dst; /* contains inet host and port destination iff connectionless (SOCK_DGRAM) */ |
1783 |
} NetSocketState; |
1784 |
|
1785 |
typedef struct NetSocketListenState { |
1786 |
VLANState *vlan; |
1787 |
char *model;
|
1788 |
char *name;
|
1789 |
int fd;
|
1790 |
} NetSocketListenState; |
1791 |
|
1792 |
/* XXX: we consider we can send the whole packet without blocking */
|
1793 |
static ssize_t net_socket_receive(VLANClientState *vc, const uint8_t *buf, size_t size) |
1794 |
{ |
1795 |
NetSocketState *s = vc->opaque; |
1796 |
uint32_t len; |
1797 |
len = htonl(size); |
1798 |
|
1799 |
send_all(s->fd, (const uint8_t *)&len, sizeof(len)); |
1800 |
return send_all(s->fd, buf, size);
|
1801 |
} |
1802 |
|
1803 |
static ssize_t net_socket_receive_dgram(VLANClientState *vc, const uint8_t *buf, size_t size) |
1804 |
{ |
1805 |
NetSocketState *s = vc->opaque; |
1806 |
|
1807 |
return sendto(s->fd, (const void *)buf, size, 0, |
1808 |
(struct sockaddr *)&s->dgram_dst, sizeof(s->dgram_dst)); |
1809 |
} |
1810 |
|
1811 |
static void net_socket_send(void *opaque) |
1812 |
{ |
1813 |
NetSocketState *s = opaque; |
1814 |
int size, err;
|
1815 |
unsigned l;
|
1816 |
uint8_t buf1[4096];
|
1817 |
const uint8_t *buf;
|
1818 |
|
1819 |
size = recv(s->fd, (void *)buf1, sizeof(buf1), 0); |
1820 |
if (size < 0) { |
1821 |
err = socket_error(); |
1822 |
if (err != EWOULDBLOCK)
|
1823 |
goto eoc;
|
1824 |
} else if (size == 0) { |
1825 |
/* end of connection */
|
1826 |
eoc:
|
1827 |
qemu_set_fd_handler(s->fd, NULL, NULL, NULL); |
1828 |
closesocket(s->fd); |
1829 |
return;
|
1830 |
} |
1831 |
buf = buf1; |
1832 |
while (size > 0) { |
1833 |
/* reassemble a packet from the network */
|
1834 |
switch(s->state) {
|
1835 |
case 0: |
1836 |
l = 4 - s->index;
|
1837 |
if (l > size)
|
1838 |
l = size; |
1839 |
memcpy(s->buf + s->index, buf, l); |
1840 |
buf += l; |
1841 |
size -= l; |
1842 |
s->index += l; |
1843 |
if (s->index == 4) { |
1844 |
/* got length */
|
1845 |
s->packet_len = ntohl(*(uint32_t *)s->buf); |
1846 |
s->index = 0;
|
1847 |
s->state = 1;
|
1848 |
} |
1849 |
break;
|
1850 |
case 1: |
1851 |
l = s->packet_len - s->index; |
1852 |
if (l > size)
|
1853 |
l = size; |
1854 |
if (s->index + l <= sizeof(s->buf)) { |
1855 |
memcpy(s->buf + s->index, buf, l); |
1856 |
} else {
|
1857 |
fprintf(stderr, "serious error: oversized packet received,"
|
1858 |
"connection terminated.\n");
|
1859 |
s->state = 0;
|
1860 |
goto eoc;
|
1861 |
} |
1862 |
|
1863 |
s->index += l; |
1864 |
buf += l; |
1865 |
size -= l; |
1866 |
if (s->index >= s->packet_len) {
|
1867 |
qemu_send_packet(s->vc, s->buf, s->packet_len); |
1868 |
s->index = 0;
|
1869 |
s->state = 0;
|
1870 |
} |
1871 |
break;
|
1872 |
} |
1873 |
} |
1874 |
} |
1875 |
|
1876 |
static void net_socket_send_dgram(void *opaque) |
1877 |
{ |
1878 |
NetSocketState *s = opaque; |
1879 |
int size;
|
1880 |
|
1881 |
size = recv(s->fd, (void *)s->buf, sizeof(s->buf), 0); |
1882 |
if (size < 0) |
1883 |
return;
|
1884 |
if (size == 0) { |
1885 |
/* end of connection */
|
1886 |
qemu_set_fd_handler(s->fd, NULL, NULL, NULL); |
1887 |
return;
|
1888 |
} |
1889 |
qemu_send_packet(s->vc, s->buf, size); |
1890 |
} |
1891 |
|
1892 |
static int net_socket_mcast_create(struct sockaddr_in *mcastaddr) |
1893 |
{ |
1894 |
struct ip_mreq imr;
|
1895 |
int fd;
|
1896 |
int val, ret;
|
1897 |
if (!IN_MULTICAST(ntohl(mcastaddr->sin_addr.s_addr))) {
|
1898 |
fprintf(stderr, "qemu: error: specified mcastaddr \"%s\" (0x%08x) does not contain a multicast address\n",
|
1899 |
inet_ntoa(mcastaddr->sin_addr), |
1900 |
(int)ntohl(mcastaddr->sin_addr.s_addr));
|
1901 |
return -1; |
1902 |
|
1903 |
} |
1904 |
fd = socket(PF_INET, SOCK_DGRAM, 0);
|
1905 |
if (fd < 0) { |
1906 |
perror("socket(PF_INET, SOCK_DGRAM)");
|
1907 |
return -1; |
1908 |
} |
1909 |
|
1910 |
val = 1;
|
1911 |
ret=setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, |
1912 |
(const char *)&val, sizeof(val)); |
1913 |
if (ret < 0) { |
1914 |
perror("setsockopt(SOL_SOCKET, SO_REUSEADDR)");
|
1915 |
goto fail;
|
1916 |
} |
1917 |
|
1918 |
ret = bind(fd, (struct sockaddr *)mcastaddr, sizeof(*mcastaddr)); |
1919 |
if (ret < 0) { |
1920 |
perror("bind");
|
1921 |
goto fail;
|
1922 |
} |
1923 |
|
1924 |
/* Add host to multicast group */
|
1925 |
imr.imr_multiaddr = mcastaddr->sin_addr; |
1926 |
imr.imr_interface.s_addr = htonl(INADDR_ANY); |
1927 |
|
1928 |
ret = setsockopt(fd, IPPROTO_IP, IP_ADD_MEMBERSHIP, |
1929 |
(const char *)&imr, sizeof(struct ip_mreq)); |
1930 |
if (ret < 0) { |
1931 |
perror("setsockopt(IP_ADD_MEMBERSHIP)");
|
1932 |
goto fail;
|
1933 |
} |
1934 |
|
1935 |
/* Force mcast msgs to loopback (eg. several QEMUs in same host */
|
1936 |
val = 1;
|
1937 |
ret=setsockopt(fd, IPPROTO_IP, IP_MULTICAST_LOOP, |
1938 |
(const char *)&val, sizeof(val)); |
1939 |
if (ret < 0) { |
1940 |
perror("setsockopt(SOL_IP, IP_MULTICAST_LOOP)");
|
1941 |
goto fail;
|
1942 |
} |
1943 |
|
1944 |
socket_set_nonblock(fd); |
1945 |
return fd;
|
1946 |
fail:
|
1947 |
if (fd >= 0) |
1948 |
closesocket(fd); |
1949 |
return -1; |
1950 |
} |
1951 |
|
1952 |
static void net_socket_cleanup(VLANClientState *vc) |
1953 |
{ |
1954 |
NetSocketState *s = vc->opaque; |
1955 |
qemu_set_fd_handler(s->fd, NULL, NULL, NULL); |
1956 |
close(s->fd); |
1957 |
qemu_free(s); |
1958 |
} |
1959 |
|
1960 |
static NetSocketState *net_socket_fd_init_dgram(VLANState *vlan,
|
1961 |
const char *model, |
1962 |
const char *name, |
1963 |
int fd, int is_connected) |
1964 |
{ |
1965 |
struct sockaddr_in saddr;
|
1966 |
int newfd;
|
1967 |
socklen_t saddr_len; |
1968 |
NetSocketState *s; |
1969 |
|
1970 |
/* fd passed: multicast: "learn" dgram_dst address from bound address and save it
|
1971 |
* Because this may be "shared" socket from a "master" process, datagrams would be recv()
|
1972 |
* by ONLY ONE process: we must "clone" this dgram socket --jjo
|
1973 |
*/
|
1974 |
|
1975 |
if (is_connected) {
|
1976 |
if (getsockname(fd, (struct sockaddr *) &saddr, &saddr_len) == 0) { |
1977 |
/* must be bound */
|
1978 |
if (saddr.sin_addr.s_addr==0) { |
1979 |
fprintf(stderr, "qemu: error: init_dgram: fd=%d unbound, cannot setup multicast dst addr\n",
|
1980 |
fd); |
1981 |
return NULL; |
1982 |
} |
1983 |
/* clone dgram socket */
|
1984 |
newfd = net_socket_mcast_create(&saddr); |
1985 |
if (newfd < 0) { |
1986 |
/* error already reported by net_socket_mcast_create() */
|
1987 |
close(fd); |
1988 |
return NULL; |
1989 |
} |
1990 |
/* clone newfd to fd, close newfd */
|
1991 |
dup2(newfd, fd); |
1992 |
close(newfd); |
1993 |
|
1994 |
} else {
|
1995 |
fprintf(stderr, "qemu: error: init_dgram: fd=%d failed getsockname(): %s\n",
|
1996 |
fd, strerror(errno)); |
1997 |
return NULL; |
1998 |
} |
1999 |
} |
2000 |
|
2001 |
s = qemu_mallocz(sizeof(NetSocketState));
|
2002 |
s->fd = fd; |
2003 |
|
2004 |
s->vc = qemu_new_vlan_client(vlan, model, name, NULL, net_socket_receive_dgram,
|
2005 |
NULL, net_socket_cleanup, s);
|
2006 |
qemu_set_fd_handler(s->fd, net_socket_send_dgram, NULL, s);
|
2007 |
|
2008 |
/* mcast: save bound address as dst */
|
2009 |
if (is_connected) s->dgram_dst=saddr;
|
2010 |
|
2011 |
snprintf(s->vc->info_str, sizeof(s->vc->info_str),
|
2012 |
"socket: fd=%d (%s mcast=%s:%d)",
|
2013 |
fd, is_connected? "cloned" : "", |
2014 |
inet_ntoa(saddr.sin_addr), ntohs(saddr.sin_port)); |
2015 |
return s;
|
2016 |
} |
2017 |
|
2018 |
static void net_socket_connect(void *opaque) |
2019 |
{ |
2020 |
NetSocketState *s = opaque; |
2021 |
qemu_set_fd_handler(s->fd, net_socket_send, NULL, s);
|
2022 |
} |
2023 |
|
2024 |
static NetSocketState *net_socket_fd_init_stream(VLANState *vlan,
|
2025 |
const char *model, |
2026 |
const char *name, |
2027 |
int fd, int is_connected) |
2028 |
{ |
2029 |
NetSocketState *s; |
2030 |
s = qemu_mallocz(sizeof(NetSocketState));
|
2031 |
s->fd = fd; |
2032 |
s->vc = qemu_new_vlan_client(vlan, model, name, NULL, net_socket_receive,
|
2033 |
NULL, net_socket_cleanup, s);
|
2034 |
snprintf(s->vc->info_str, sizeof(s->vc->info_str),
|
2035 |
"socket: fd=%d", fd);
|
2036 |
if (is_connected) {
|
2037 |
net_socket_connect(s); |
2038 |
} else {
|
2039 |
qemu_set_fd_handler(s->fd, NULL, net_socket_connect, s);
|
2040 |
} |
2041 |
return s;
|
2042 |
} |
2043 |
|
2044 |
static NetSocketState *net_socket_fd_init(VLANState *vlan,
|
2045 |
const char *model, const char *name, |
2046 |
int fd, int is_connected) |
2047 |
{ |
2048 |
int so_type=-1, optlen=sizeof(so_type); |
2049 |
|
2050 |
if(getsockopt(fd, SOL_SOCKET, SO_TYPE, (char *)&so_type, |
2051 |
(socklen_t *)&optlen)< 0) {
|
2052 |
fprintf(stderr, "qemu: error: getsockopt(SO_TYPE) for fd=%d failed\n", fd);
|
2053 |
return NULL; |
2054 |
} |
2055 |
switch(so_type) {
|
2056 |
case SOCK_DGRAM:
|
2057 |
return net_socket_fd_init_dgram(vlan, model, name, fd, is_connected);
|
2058 |
case SOCK_STREAM:
|
2059 |
return net_socket_fd_init_stream(vlan, model, name, fd, is_connected);
|
2060 |
default:
|
2061 |
/* who knows ... this could be a eg. a pty, do warn and continue as stream */
|
2062 |
fprintf(stderr, "qemu: warning: socket type=%d for fd=%d is not SOCK_DGRAM or SOCK_STREAM\n", so_type, fd);
|
2063 |
return net_socket_fd_init_stream(vlan, model, name, fd, is_connected);
|
2064 |
} |
2065 |
return NULL; |
2066 |
} |
2067 |
|
2068 |
static void net_socket_accept(void *opaque) |
2069 |
{ |
2070 |
NetSocketListenState *s = opaque; |
2071 |
NetSocketState *s1; |
2072 |
struct sockaddr_in saddr;
|
2073 |
socklen_t len; |
2074 |
int fd;
|
2075 |
|
2076 |
for(;;) {
|
2077 |
len = sizeof(saddr);
|
2078 |
fd = accept(s->fd, (struct sockaddr *)&saddr, &len);
|
2079 |
if (fd < 0 && errno != EINTR) { |
2080 |
return;
|
2081 |
} else if (fd >= 0) { |
2082 |
break;
|
2083 |
} |
2084 |
} |
2085 |
s1 = net_socket_fd_init(s->vlan, s->model, s->name, fd, 1);
|
2086 |
if (!s1) {
|
2087 |
closesocket(fd); |
2088 |
} else {
|
2089 |
snprintf(s1->vc->info_str, sizeof(s1->vc->info_str),
|
2090 |
"socket: connection from %s:%d",
|
2091 |
inet_ntoa(saddr.sin_addr), ntohs(saddr.sin_port)); |
2092 |
} |
2093 |
} |
2094 |
|
2095 |
static int net_socket_listen_init(VLANState *vlan, |
2096 |
const char *model, |
2097 |
const char *name, |
2098 |
const char *host_str) |
2099 |
{ |
2100 |
NetSocketListenState *s; |
2101 |
int fd, val, ret;
|
2102 |
struct sockaddr_in saddr;
|
2103 |
|
2104 |
if (parse_host_port(&saddr, host_str) < 0) |
2105 |
return -1; |
2106 |
|
2107 |
s = qemu_mallocz(sizeof(NetSocketListenState));
|
2108 |
|
2109 |
fd = socket(PF_INET, SOCK_STREAM, 0);
|
2110 |
if (fd < 0) { |
2111 |
perror("socket");
|
2112 |
return -1; |
2113 |
} |
2114 |
socket_set_nonblock(fd); |
2115 |
|
2116 |
/* allow fast reuse */
|
2117 |
val = 1;
|
2118 |
setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, (const char *)&val, sizeof(val)); |
2119 |
|
2120 |
ret = bind(fd, (struct sockaddr *)&saddr, sizeof(saddr)); |
2121 |
if (ret < 0) { |
2122 |
perror("bind");
|
2123 |
return -1; |
2124 |
} |
2125 |
ret = listen(fd, 0);
|
2126 |
if (ret < 0) { |
2127 |
perror("listen");
|
2128 |
return -1; |
2129 |
} |
2130 |
s->vlan = vlan; |
2131 |
s->model = strdup(model); |
2132 |
s->name = name ? strdup(name) : NULL;
|
2133 |
s->fd = fd; |
2134 |
qemu_set_fd_handler(fd, net_socket_accept, NULL, s);
|
2135 |
return 0; |
2136 |
} |
2137 |
|
2138 |
static int net_socket_connect_init(VLANState *vlan, |
2139 |
const char *model, |
2140 |
const char *name, |
2141 |
const char *host_str) |
2142 |
{ |
2143 |
NetSocketState *s; |
2144 |
int fd, connected, ret, err;
|
2145 |
struct sockaddr_in saddr;
|
2146 |
|
2147 |
if (parse_host_port(&saddr, host_str) < 0) |
2148 |
return -1; |
2149 |
|
2150 |
fd = socket(PF_INET, SOCK_STREAM, 0);
|
2151 |
if (fd < 0) { |
2152 |
perror("socket");
|
2153 |
return -1; |
2154 |
} |
2155 |
socket_set_nonblock(fd); |
2156 |
|
2157 |
connected = 0;
|
2158 |
for(;;) {
|
2159 |
ret = connect(fd, (struct sockaddr *)&saddr, sizeof(saddr)); |
2160 |
if (ret < 0) { |
2161 |
err = socket_error(); |
2162 |
if (err == EINTR || err == EWOULDBLOCK) {
|
2163 |
} else if (err == EINPROGRESS) { |
2164 |
break;
|
2165 |
#ifdef _WIN32
|
2166 |
} else if (err == WSAEALREADY) { |
2167 |
break;
|
2168 |
#endif
|
2169 |
} else {
|
2170 |
perror("connect");
|
2171 |
closesocket(fd); |
2172 |
return -1; |
2173 |
} |
2174 |
} else {
|
2175 |
connected = 1;
|
2176 |
break;
|
2177 |
} |
2178 |
} |
2179 |
s = net_socket_fd_init(vlan, model, name, fd, connected); |
2180 |
if (!s)
|
2181 |
return -1; |
2182 |
snprintf(s->vc->info_str, sizeof(s->vc->info_str),
|
2183 |
"socket: connect to %s:%d",
|
2184 |
inet_ntoa(saddr.sin_addr), ntohs(saddr.sin_port)); |
2185 |
return 0; |
2186 |
} |
2187 |
|
2188 |
static int net_socket_mcast_init(VLANState *vlan, |
2189 |
const char *model, |
2190 |
const char *name, |
2191 |
const char *host_str) |
2192 |
{ |
2193 |
NetSocketState *s; |
2194 |
int fd;
|
2195 |
struct sockaddr_in saddr;
|
2196 |
|
2197 |
if (parse_host_port(&saddr, host_str) < 0) |
2198 |
return -1; |
2199 |
|
2200 |
|
2201 |
fd = net_socket_mcast_create(&saddr); |
2202 |
if (fd < 0) |
2203 |
return -1; |
2204 |
|
2205 |
s = net_socket_fd_init(vlan, model, name, fd, 0);
|
2206 |
if (!s)
|
2207 |
return -1; |
2208 |
|
2209 |
s->dgram_dst = saddr; |
2210 |
|
2211 |
snprintf(s->vc->info_str, sizeof(s->vc->info_str),
|
2212 |
"socket: mcast=%s:%d",
|
2213 |
inet_ntoa(saddr.sin_addr), ntohs(saddr.sin_port)); |
2214 |
return 0; |
2215 |
|
2216 |
} |
2217 |
|
2218 |
typedef struct DumpState { |
2219 |
VLANClientState *pcap_vc; |
2220 |
int fd;
|
2221 |
int pcap_caplen;
|
2222 |
} DumpState; |
2223 |
|
2224 |
#define PCAP_MAGIC 0xa1b2c3d4 |
2225 |
|
2226 |
struct pcap_file_hdr {
|
2227 |
uint32_t magic; |
2228 |
uint16_t version_major; |
2229 |
uint16_t version_minor; |
2230 |
int32_t thiszone; |
2231 |
uint32_t sigfigs; |
2232 |
uint32_t snaplen; |
2233 |
uint32_t linktype; |
2234 |
}; |
2235 |
|
2236 |
struct pcap_sf_pkthdr {
|
2237 |
struct {
|
2238 |
int32_t tv_sec; |
2239 |
int32_t tv_usec; |
2240 |
} ts; |
2241 |
uint32_t caplen; |
2242 |
uint32_t len; |
2243 |
}; |
2244 |
|
2245 |
static ssize_t dump_receive(VLANClientState *vc, const uint8_t *buf, size_t size) |
2246 |
{ |
2247 |
DumpState *s = vc->opaque; |
2248 |
struct pcap_sf_pkthdr hdr;
|
2249 |
int64_t ts; |
2250 |
int caplen;
|
2251 |
|
2252 |
/* Early return in case of previous error. */
|
2253 |
if (s->fd < 0) { |
2254 |
return size;
|
2255 |
} |
2256 |
|
2257 |
ts = muldiv64(qemu_get_clock(vm_clock), 1000000, get_ticks_per_sec());
|
2258 |
caplen = size > s->pcap_caplen ? s->pcap_caplen : size; |
2259 |
|
2260 |
hdr.ts.tv_sec = ts / 1000000;
|
2261 |
hdr.ts.tv_usec = ts % 1000000;
|
2262 |
hdr.caplen = caplen; |
2263 |
hdr.len = size; |
2264 |
if (write(s->fd, &hdr, sizeof(hdr)) != sizeof(hdr) || |
2265 |
write(s->fd, buf, caplen) != caplen) { |
2266 |
qemu_log("-net dump write error - stop dump\n");
|
2267 |
close(s->fd); |
2268 |
s->fd = -1;
|
2269 |
} |
2270 |
|
2271 |
return size;
|
2272 |
} |
2273 |
|
2274 |
static void net_dump_cleanup(VLANClientState *vc) |
2275 |
{ |
2276 |
DumpState *s = vc->opaque; |
2277 |
|
2278 |
close(s->fd); |
2279 |
qemu_free(s); |
2280 |
} |
2281 |
|
2282 |
static int net_dump_init(Monitor *mon, VLANState *vlan, const char *device, |
2283 |
const char *name, const char *filename, int len) |
2284 |
{ |
2285 |
struct pcap_file_hdr hdr;
|
2286 |
DumpState *s; |
2287 |
|
2288 |
s = qemu_malloc(sizeof(DumpState));
|
2289 |
|
2290 |
s->fd = open(filename, O_CREAT | O_WRONLY | O_BINARY, 0644);
|
2291 |
if (s->fd < 0) { |
2292 |
config_error(mon, "-net dump: can't open %s\n", filename);
|
2293 |
return -1; |
2294 |
} |
2295 |
|
2296 |
s->pcap_caplen = len; |
2297 |
|
2298 |
hdr.magic = PCAP_MAGIC; |
2299 |
hdr.version_major = 2;
|
2300 |
hdr.version_minor = 4;
|
2301 |
hdr.thiszone = 0;
|
2302 |
hdr.sigfigs = 0;
|
2303 |
hdr.snaplen = s->pcap_caplen; |
2304 |
hdr.linktype = 1;
|
2305 |
|
2306 |
if (write(s->fd, &hdr, sizeof(hdr)) < sizeof(hdr)) { |
2307 |
config_error(mon, "-net dump write error: %s\n", strerror(errno));
|
2308 |
close(s->fd); |
2309 |
qemu_free(s); |
2310 |
return -1; |
2311 |
} |
2312 |
|
2313 |
s->pcap_vc = qemu_new_vlan_client(vlan, device, name, NULL, dump_receive, NULL, |
2314 |
net_dump_cleanup, s); |
2315 |
snprintf(s->pcap_vc->info_str, sizeof(s->pcap_vc->info_str),
|
2316 |
"dump to %s (len=%d)", filename, len);
|
2317 |
return 0; |
2318 |
} |
2319 |
|
2320 |
/* find or alloc a new VLAN */
|
2321 |
VLANState *qemu_find_vlan(int id, int allocate) |
2322 |
{ |
2323 |
VLANState **pvlan, *vlan; |
2324 |
for(vlan = first_vlan; vlan != NULL; vlan = vlan->next) { |
2325 |
if (vlan->id == id)
|
2326 |
return vlan;
|
2327 |
} |
2328 |
if (!allocate) {
|
2329 |
return NULL; |
2330 |
} |
2331 |
vlan = qemu_mallocz(sizeof(VLANState));
|
2332 |
vlan->id = id; |
2333 |
TAILQ_INIT(&vlan->send_queue); |
2334 |
vlan->next = NULL;
|
2335 |
pvlan = &first_vlan; |
2336 |
while (*pvlan != NULL) |
2337 |
pvlan = &(*pvlan)->next; |
2338 |
*pvlan = vlan; |
2339 |
return vlan;
|
2340 |
} |
2341 |
|
2342 |
static int nic_get_free_idx(void) |
2343 |
{ |
2344 |
int index;
|
2345 |
|
2346 |
for (index = 0; index < MAX_NICS; index++) |
2347 |
if (!nd_table[index].used)
|
2348 |
return index;
|
2349 |
return -1; |
2350 |
} |
2351 |
|
2352 |
void qemu_check_nic_model(NICInfo *nd, const char *model) |
2353 |
{ |
2354 |
const char *models[2]; |
2355 |
|
2356 |
models[0] = model;
|
2357 |
models[1] = NULL; |
2358 |
|
2359 |
qemu_check_nic_model_list(nd, models, model); |
2360 |
} |
2361 |
|
2362 |
void qemu_check_nic_model_list(NICInfo *nd, const char * const *models, |
2363 |
const char *default_model) |
2364 |
{ |
2365 |
int i, exit_status = 0; |
2366 |
|
2367 |
if (!nd->model)
|
2368 |
nd->model = strdup(default_model); |
2369 |
|
2370 |
if (strcmp(nd->model, "?") != 0) { |
2371 |
for (i = 0 ; models[i]; i++) |
2372 |
if (strcmp(nd->model, models[i]) == 0) |
2373 |
return;
|
2374 |
|
2375 |
fprintf(stderr, "qemu: Unsupported NIC model: %s\n", nd->model);
|
2376 |
exit_status = 1;
|
2377 |
} |
2378 |
|
2379 |
fprintf(stderr, "qemu: Supported NIC models: ");
|
2380 |
for (i = 0 ; models[i]; i++) |
2381 |
fprintf(stderr, "%s%c", models[i], models[i+1] ? ',' : '\n'); |
2382 |
|
2383 |
exit(exit_status); |
2384 |
} |
2385 |
|
2386 |
static int net_handle_fd_param(Monitor *mon, const char *param) |
2387 |
{ |
2388 |
if (!qemu_isdigit(param[0])) { |
2389 |
int fd;
|
2390 |
|
2391 |
fd = monitor_get_fd(mon, param); |
2392 |
if (fd == -1) { |
2393 |
config_error(mon, "No file descriptor named %s found", param);
|
2394 |
return -1; |
2395 |
} |
2396 |
|
2397 |
return fd;
|
2398 |
} else {
|
2399 |
return strtol(param, NULL, 0); |
2400 |
} |
2401 |
} |
2402 |
|
2403 |
int net_client_init(Monitor *mon, const char *device, const char *p) |
2404 |
{ |
2405 |
char buf[1024]; |
2406 |
int vlan_id, ret;
|
2407 |
VLANState *vlan; |
2408 |
char *name = NULL; |
2409 |
|
2410 |
vlan_id = 0;
|
2411 |
if (get_param_value(buf, sizeof(buf), "vlan", p)) { |
2412 |
vlan_id = strtol(buf, NULL, 0); |
2413 |
} |
2414 |
vlan = qemu_find_vlan(vlan_id, 1);
|
2415 |
|
2416 |
if (get_param_value(buf, sizeof(buf), "name", p)) { |
2417 |
name = qemu_strdup(buf); |
2418 |
} |
2419 |
if (!strcmp(device, "nic")) { |
2420 |
static const char * const nic_params[] = { |
2421 |
"vlan", "name", "macaddr", "model", "addr", "id", "vectors", NULL |
2422 |
}; |
2423 |
NICInfo *nd; |
2424 |
uint8_t *macaddr; |
2425 |
int idx = nic_get_free_idx();
|
2426 |
|
2427 |
if (check_params(buf, sizeof(buf), nic_params, p) < 0) { |
2428 |
config_error(mon, "invalid parameter '%s' in '%s'\n", buf, p);
|
2429 |
ret = -1;
|
2430 |
goto out;
|
2431 |
} |
2432 |
if (idx == -1 || nb_nics >= MAX_NICS) { |
2433 |
config_error(mon, "Too Many NICs\n");
|
2434 |
ret = -1;
|
2435 |
goto out;
|
2436 |
} |
2437 |
nd = &nd_table[idx]; |
2438 |
macaddr = nd->macaddr; |
2439 |
macaddr[0] = 0x52; |
2440 |
macaddr[1] = 0x54; |
2441 |
macaddr[2] = 0x00; |
2442 |
macaddr[3] = 0x12; |
2443 |
macaddr[4] = 0x34; |
2444 |
macaddr[5] = 0x56 + idx; |
2445 |
|
2446 |
if (get_param_value(buf, sizeof(buf), "macaddr", p)) { |
2447 |
if (parse_macaddr(macaddr, buf) < 0) { |
2448 |
config_error(mon, "invalid syntax for ethernet address\n");
|
2449 |
ret = -1;
|
2450 |
goto out;
|
2451 |
} |
2452 |
} |
2453 |
if (get_param_value(buf, sizeof(buf), "model", p)) { |
2454 |
nd->model = strdup(buf); |
2455 |
} |
2456 |
if (get_param_value(buf, sizeof(buf), "addr", p)) { |
2457 |
nd->devaddr = strdup(buf); |
2458 |
} |
2459 |
if (get_param_value(buf, sizeof(buf), "id", p)) { |
2460 |
nd->id = strdup(buf); |
2461 |
} |
2462 |
nd->nvectors = NIC_NVECTORS_UNSPECIFIED; |
2463 |
if (get_param_value(buf, sizeof(buf), "vectors", p)) { |
2464 |
char *endptr;
|
2465 |
long vectors = strtol(buf, &endptr, 0); |
2466 |
if (*endptr) {
|
2467 |
config_error(mon, "invalid syntax for # of vectors\n");
|
2468 |
ret = -1;
|
2469 |
goto out;
|
2470 |
} |
2471 |
if (vectors < 0 || vectors > 0x7ffffff) { |
2472 |
config_error(mon, "invalid # of vectors\n");
|
2473 |
ret = -1;
|
2474 |
goto out;
|
2475 |
} |
2476 |
nd->nvectors = vectors; |
2477 |
} |
2478 |
nd->vlan = vlan; |
2479 |
nd->name = name; |
2480 |
nd->used = 1;
|
2481 |
name = NULL;
|
2482 |
nb_nics++; |
2483 |
vlan->nb_guest_devs++; |
2484 |
ret = idx; |
2485 |
} else
|
2486 |
if (!strcmp(device, "none")) { |
2487 |
if (*p != '\0') { |
2488 |
config_error(mon, "'none' takes no parameters\n");
|
2489 |
ret = -1;
|
2490 |
goto out;
|
2491 |
} |
2492 |
/* does nothing. It is needed to signal that no network cards
|
2493 |
are wanted */
|
2494 |
ret = 0;
|
2495 |
} else
|
2496 |
#ifdef CONFIG_SLIRP
|
2497 |
if (!strcmp(device, "user")) { |
2498 |
static const char * const slirp_params[] = { |
2499 |
"vlan", "name", "hostname", "restrict", "ip", "net", "host", |
2500 |
"tftp", "bootfile", "dhcpstart", "dns", "smb", "smbserver", |
2501 |
"hostfwd", "guestfwd", NULL |
2502 |
}; |
2503 |
struct slirp_config_str *config;
|
2504 |
int restricted = 0; |
2505 |
char *vnet = NULL; |
2506 |
char *vhost = NULL; |
2507 |
char *vhostname = NULL; |
2508 |
char *tftp_export = NULL; |
2509 |
char *bootfile = NULL; |
2510 |
char *vdhcp_start = NULL; |
2511 |
char *vnamesrv = NULL; |
2512 |
char *smb_export = NULL; |
2513 |
char *vsmbsrv = NULL; |
2514 |
const char *q; |
2515 |
|
2516 |
if (check_params(buf, sizeof(buf), slirp_params, p) < 0) { |
2517 |
config_error(mon, "invalid parameter '%s' in '%s'\n", buf, p);
|
2518 |
ret = -1;
|
2519 |
goto out;
|
2520 |
} |
2521 |
if (get_param_value(buf, sizeof(buf), "ip", p)) { |
2522 |
int vnet_buflen = strlen(buf) + strlen("/24") + 1; |
2523 |
/* emulate legacy parameter */
|
2524 |
vnet = qemu_malloc(vnet_buflen); |
2525 |
pstrcpy(vnet, vnet_buflen, buf); |
2526 |
pstrcat(vnet, vnet_buflen, "/24");
|
2527 |
} |
2528 |
if (get_param_value(buf, sizeof(buf), "net", p)) { |
2529 |
vnet = qemu_strdup(buf); |
2530 |
} |
2531 |
if (get_param_value(buf, sizeof(buf), "host", p)) { |
2532 |
vhost = qemu_strdup(buf); |
2533 |
} |
2534 |
if (get_param_value(buf, sizeof(buf), "hostname", p)) { |
2535 |
vhostname = qemu_strdup(buf); |
2536 |
} |
2537 |
if (get_param_value(buf, sizeof(buf), "restrict", p)) { |
2538 |
restricted = (buf[0] == 'y') ? 1 : 0; |
2539 |
} |
2540 |
if (get_param_value(buf, sizeof(buf), "dhcpstart", p)) { |
2541 |
vdhcp_start = qemu_strdup(buf); |
2542 |
} |
2543 |
if (get_param_value(buf, sizeof(buf), "dns", p)) { |
2544 |
vnamesrv = qemu_strdup(buf); |
2545 |
} |
2546 |
if (get_param_value(buf, sizeof(buf), "tftp", p)) { |
2547 |
tftp_export = qemu_strdup(buf); |
2548 |
} |
2549 |
if (get_param_value(buf, sizeof(buf), "bootfile", p)) { |
2550 |
bootfile = qemu_strdup(buf); |
2551 |
} |
2552 |
if (get_param_value(buf, sizeof(buf), "smb", p)) { |
2553 |
smb_export = qemu_strdup(buf); |
2554 |
if (get_param_value(buf, sizeof(buf), "smbserver", p)) { |
2555 |
vsmbsrv = qemu_strdup(buf); |
2556 |
} |
2557 |
} |
2558 |
q = p; |
2559 |
while (1) { |
2560 |
config = qemu_malloc(sizeof(*config));
|
2561 |
if (!get_next_param_value(config->str, sizeof(config->str), |
2562 |
"hostfwd", &q)) {
|
2563 |
break;
|
2564 |
} |
2565 |
config->flags = SLIRP_CFG_HOSTFWD; |
2566 |
config->next = slirp_configs; |
2567 |
slirp_configs = config; |
2568 |
config = NULL;
|
2569 |
} |
2570 |
q = p; |
2571 |
while (1) { |
2572 |
config = qemu_malloc(sizeof(*config));
|
2573 |
if (!get_next_param_value(config->str, sizeof(config->str), |
2574 |
"guestfwd", &q)) {
|
2575 |
break;
|
2576 |
} |
2577 |
config->flags = 0;
|
2578 |
config->next = slirp_configs; |
2579 |
slirp_configs = config; |
2580 |
config = NULL;
|
2581 |
} |
2582 |
qemu_free(config); |
2583 |
vlan->nb_host_devs++; |
2584 |
ret = net_slirp_init(mon, vlan, device, name, restricted, vnet, vhost, |
2585 |
vhostname, tftp_export, bootfile, vdhcp_start, |
2586 |
vnamesrv, smb_export, vsmbsrv); |
2587 |
qemu_free(vnet); |
2588 |
qemu_free(vhost); |
2589 |
qemu_free(vhostname); |
2590 |
qemu_free(tftp_export); |
2591 |
qemu_free(bootfile); |
2592 |
qemu_free(vdhcp_start); |
2593 |
qemu_free(vnamesrv); |
2594 |
qemu_free(smb_export); |
2595 |
qemu_free(vsmbsrv); |
2596 |
} else if (!strcmp(device, "channel")) { |
2597 |
if (TAILQ_EMPTY(&slirp_stacks)) {
|
2598 |
struct slirp_config_str *config;
|
2599 |
|
2600 |
config = qemu_malloc(sizeof(*config));
|
2601 |
pstrcpy(config->str, sizeof(config->str), p);
|
2602 |
config->flags = SLIRP_CFG_LEGACY; |
2603 |
config->next = slirp_configs; |
2604 |
slirp_configs = config; |
2605 |
} else {
|
2606 |
slirp_guestfwd(TAILQ_FIRST(&slirp_stacks), mon, p, 1);
|
2607 |
} |
2608 |
ret = 0;
|
2609 |
} else
|
2610 |
#endif
|
2611 |
#ifdef _WIN32
|
2612 |
if (!strcmp(device, "tap")) { |
2613 |
static const char * const tap_params[] = { |
2614 |
"vlan", "name", "ifname", NULL |
2615 |
}; |
2616 |
char ifname[64]; |
2617 |
|
2618 |
if (check_params(buf, sizeof(buf), tap_params, p) < 0) { |
2619 |
config_error(mon, "invalid parameter '%s' in '%s'\n", buf, p);
|
2620 |
ret = -1;
|
2621 |
goto out;
|
2622 |
} |
2623 |
if (get_param_value(ifname, sizeof(ifname), "ifname", p) <= 0) { |
2624 |
config_error(mon, "tap: no interface name\n");
|
2625 |
ret = -1;
|
2626 |
goto out;
|
2627 |
} |
2628 |
vlan->nb_host_devs++; |
2629 |
ret = tap_win32_init(vlan, device, name, ifname); |
2630 |
} else
|
2631 |
#elif defined (_AIX)
|
2632 |
#else
|
2633 |
if (!strcmp(device, "tap")) { |
2634 |
char ifname[64], chkbuf[64]; |
2635 |
char setup_script[1024], down_script[1024]; |
2636 |
TAPState *s; |
2637 |
int fd;
|
2638 |
vlan->nb_host_devs++; |
2639 |
if (get_param_value(buf, sizeof(buf), "fd", p) > 0) { |
2640 |
static const char * const fd_params[] = { |
2641 |
"vlan", "name", "fd", "sndbuf", NULL |
2642 |
}; |
2643 |
ret = -1;
|
2644 |
if (check_params(chkbuf, sizeof(chkbuf), fd_params, p) < 0) { |
2645 |
config_error(mon, "invalid parameter '%s' in '%s'\n", chkbuf, p);
|
2646 |
goto out;
|
2647 |
} |
2648 |
fd = net_handle_fd_param(mon, buf); |
2649 |
if (fd == -1) { |
2650 |
goto out;
|
2651 |
} |
2652 |
fcntl(fd, F_SETFL, O_NONBLOCK); |
2653 |
s = net_tap_fd_init(vlan, device, name, fd); |
2654 |
if (!s) {
|
2655 |
close(fd); |
2656 |
} |
2657 |
} else {
|
2658 |
static const char * const tap_params[] = { |
2659 |
"vlan", "name", "ifname", "script", "downscript", "sndbuf", NULL |
2660 |
}; |
2661 |
if (check_params(chkbuf, sizeof(chkbuf), tap_params, p) < 0) { |
2662 |
config_error(mon, "invalid parameter '%s' in '%s'\n", chkbuf, p);
|
2663 |
ret = -1;
|
2664 |
goto out;
|
2665 |
} |
2666 |
if (get_param_value(ifname, sizeof(ifname), "ifname", p) <= 0) { |
2667 |
ifname[0] = '\0'; |
2668 |
} |
2669 |
if (get_param_value(setup_script, sizeof(setup_script), "script", p) == 0) { |
2670 |
pstrcpy(setup_script, sizeof(setup_script), DEFAULT_NETWORK_SCRIPT);
|
2671 |
} |
2672 |
if (get_param_value(down_script, sizeof(down_script), "downscript", p) == 0) { |
2673 |
pstrcpy(down_script, sizeof(down_script), DEFAULT_NETWORK_DOWN_SCRIPT);
|
2674 |
} |
2675 |
s = net_tap_init(vlan, device, name, ifname, setup_script, down_script); |
2676 |
} |
2677 |
if (s != NULL) { |
2678 |
const char *sndbuf_str = NULL; |
2679 |
if (get_param_value(buf, sizeof(buf), "sndbuf", p)) { |
2680 |
sndbuf_str = buf; |
2681 |
} |
2682 |
tap_set_sndbuf(s, sndbuf_str, mon); |
2683 |
ret = 0;
|
2684 |
} else {
|
2685 |
ret = -1;
|
2686 |
} |
2687 |
} else
|
2688 |
#endif
|
2689 |
if (!strcmp(device, "socket")) { |
2690 |
char chkbuf[64]; |
2691 |
if (get_param_value(buf, sizeof(buf), "fd", p) > 0) { |
2692 |
static const char * const fd_params[] = { |
2693 |
"vlan", "name", "fd", NULL |
2694 |
}; |
2695 |
int fd;
|
2696 |
ret = -1;
|
2697 |
if (check_params(chkbuf, sizeof(chkbuf), fd_params, p) < 0) { |
2698 |
config_error(mon, "invalid parameter '%s' in '%s'\n", chkbuf, p);
|
2699 |
goto out;
|
2700 |
} |
2701 |
fd = net_handle_fd_param(mon, buf); |
2702 |
if (fd == -1) { |
2703 |
goto out;
|
2704 |
} |
2705 |
if (!net_socket_fd_init(vlan, device, name, fd, 1)) { |
2706 |
close(fd); |
2707 |
goto out;
|
2708 |
} |
2709 |
ret = 0;
|
2710 |
} else if (get_param_value(buf, sizeof(buf), "listen", p) > 0) { |
2711 |
static const char * const listen_params[] = { |
2712 |
"vlan", "name", "listen", NULL |
2713 |
}; |
2714 |
if (check_params(chkbuf, sizeof(chkbuf), listen_params, p) < 0) { |
2715 |
config_error(mon, "invalid parameter '%s' in '%s'\n", chkbuf, p);
|
2716 |
ret = -1;
|
2717 |
goto out;
|
2718 |
} |
2719 |
ret = net_socket_listen_init(vlan, device, name, buf); |
2720 |
} else if (get_param_value(buf, sizeof(buf), "connect", p) > 0) { |
2721 |
static const char * const connect_params[] = { |
2722 |
"vlan", "name", "connect", NULL |
2723 |
}; |
2724 |
if (check_params(chkbuf, sizeof(chkbuf), connect_params, p) < 0) { |
2725 |
config_error(mon, "invalid parameter '%s' in '%s'\n", chkbuf, p);
|
2726 |
ret = -1;
|
2727 |
goto out;
|
2728 |
} |
2729 |
ret = net_socket_connect_init(vlan, device, name, buf); |
2730 |
} else if (get_param_value(buf, sizeof(buf), "mcast", p) > 0) { |
2731 |
static const char * const mcast_params[] = { |
2732 |
"vlan", "name", "mcast", NULL |
2733 |
}; |
2734 |
if (check_params(chkbuf, sizeof(chkbuf), mcast_params, p) < 0) { |
2735 |
config_error(mon, "invalid parameter '%s' in '%s'\n", chkbuf, p);
|
2736 |
ret = -1;
|
2737 |
goto out;
|
2738 |
} |
2739 |
ret = net_socket_mcast_init(vlan, device, name, buf); |
2740 |
} else {
|
2741 |
config_error(mon, "Unknown socket options: %s\n", p);
|
2742 |
ret = -1;
|
2743 |
goto out;
|
2744 |
} |
2745 |
vlan->nb_host_devs++; |
2746 |
} else
|
2747 |
#ifdef CONFIG_VDE
|
2748 |
if (!strcmp(device, "vde")) { |
2749 |
static const char * const vde_params[] = { |
2750 |
"vlan", "name", "sock", "port", "group", "mode", NULL |
2751 |
}; |
2752 |
char vde_sock[1024], vde_group[512]; |
2753 |
int vde_port, vde_mode;
|
2754 |
|
2755 |
if (check_params(buf, sizeof(buf), vde_params, p) < 0) { |
2756 |
config_error(mon, "invalid parameter '%s' in '%s'\n", buf, p);
|
2757 |
ret = -1;
|
2758 |
goto out;
|
2759 |
} |
2760 |
vlan->nb_host_devs++; |
2761 |
if (get_param_value(vde_sock, sizeof(vde_sock), "sock", p) <= 0) { |
2762 |
vde_sock[0] = '\0'; |
2763 |
} |
2764 |
if (get_param_value(buf, sizeof(buf), "port", p) > 0) { |
2765 |
vde_port = strtol(buf, NULL, 10); |
2766 |
} else {
|
2767 |
vde_port = 0;
|
2768 |
} |
2769 |
if (get_param_value(vde_group, sizeof(vde_group), "group", p) <= 0) { |
2770 |
vde_group[0] = '\0'; |
2771 |
} |
2772 |
if (get_param_value(buf, sizeof(buf), "mode", p) > 0) { |
2773 |
vde_mode = strtol(buf, NULL, 8); |
2774 |
} else {
|
2775 |
vde_mode = 0700;
|
2776 |
} |
2777 |
ret = net_vde_init(vlan, device, name, vde_sock, vde_port, vde_group, vde_mode); |
2778 |
} else
|
2779 |
#endif
|
2780 |
if (!strcmp(device, "dump")) { |
2781 |
int len = 65536; |
2782 |
|
2783 |
if (get_param_value(buf, sizeof(buf), "len", p) > 0) { |
2784 |
len = strtol(buf, NULL, 0); |
2785 |
} |
2786 |
if (!get_param_value(buf, sizeof(buf), "file", p)) { |
2787 |
snprintf(buf, sizeof(buf), "qemu-vlan%d.pcap", vlan_id); |
2788 |
} |
2789 |
ret = net_dump_init(mon, vlan, device, name, buf, len); |
2790 |
} else {
|
2791 |
config_error(mon, "Unknown network device: %s\n", device);
|
2792 |
ret = -1;
|
2793 |
goto out;
|
2794 |
} |
2795 |
if (ret < 0) { |
2796 |
config_error(mon, "Could not initialize device '%s'\n", device);
|
2797 |
} |
2798 |
out:
|
2799 |
qemu_free(name); |
2800 |
return ret;
|
2801 |
} |
2802 |
|
2803 |
void net_client_uninit(NICInfo *nd)
|
2804 |
{ |
2805 |
nd->vlan->nb_guest_devs--; |
2806 |
nb_nics--; |
2807 |
nd->used = 0;
|
2808 |
free((void *)nd->model);
|
2809 |
} |
2810 |
|
2811 |
static int net_host_check_device(const char *device) |
2812 |
{ |
2813 |
int i;
|
2814 |
const char *valid_param_list[] = { "tap", "socket", "dump" |
2815 |
#ifdef CONFIG_SLIRP
|
2816 |
,"user"
|
2817 |
#endif
|
2818 |
#ifdef CONFIG_VDE
|
2819 |
,"vde"
|
2820 |
#endif
|
2821 |
}; |
2822 |
for (i = 0; i < sizeof(valid_param_list) / sizeof(char *); i++) { |
2823 |
if (!strncmp(valid_param_list[i], device,
|
2824 |
strlen(valid_param_list[i]))) |
2825 |
return 1; |
2826 |
} |
2827 |
|
2828 |
return 0; |
2829 |
} |
2830 |
|
2831 |
void net_host_device_add(Monitor *mon, const QDict *qdict) |
2832 |
{ |
2833 |
const char *device = qdict_get_str(qdict, "device"); |
2834 |
const char *opts = qdict_get_try_str(qdict, "opts"); |
2835 |
|
2836 |
if (!net_host_check_device(device)) {
|
2837 |
monitor_printf(mon, "invalid host network device %s\n", device);
|
2838 |
return;
|
2839 |
} |
2840 |
if (net_client_init(mon, device, opts ? opts : "") < 0) { |
2841 |
monitor_printf(mon, "adding host network device %s failed\n", device);
|
2842 |
} |
2843 |
} |
2844 |
|
2845 |
void net_host_device_remove(Monitor *mon, const QDict *qdict) |
2846 |
{ |
2847 |
VLANClientState *vc; |
2848 |
int vlan_id = qdict_get_int(qdict, "vlan_id"); |
2849 |
const char *device = qdict_get_str(qdict, "device"); |
2850 |
|
2851 |
vc = qemu_find_vlan_client_by_name(mon, vlan_id, device); |
2852 |
if (!vc) {
|
2853 |
return;
|
2854 |
} |
2855 |
if (!net_host_check_device(vc->model)) {
|
2856 |
monitor_printf(mon, "invalid host network device %s\n", device);
|
2857 |
return;
|
2858 |
} |
2859 |
qemu_del_vlan_client(vc); |
2860 |
} |
2861 |
|
2862 |
int net_client_parse(const char *str) |
2863 |
{ |
2864 |
const char *p; |
2865 |
char *q;
|
2866 |
char device[64]; |
2867 |
|
2868 |
p = str; |
2869 |
q = device; |
2870 |
while (*p != '\0' && *p != ',') { |
2871 |
if ((q - device) < sizeof(device) - 1) |
2872 |
*q++ = *p; |
2873 |
p++; |
2874 |
} |
2875 |
*q = '\0';
|
2876 |
if (*p == ',') |
2877 |
p++; |
2878 |
|
2879 |
return net_client_init(NULL, device, p); |
2880 |
} |
2881 |
|
2882 |
void net_set_boot_mask(int net_boot_mask) |
2883 |
{ |
2884 |
int i;
|
2885 |
|
2886 |
/* Only the first four NICs may be bootable */
|
2887 |
net_boot_mask = net_boot_mask & 0xF;
|
2888 |
|
2889 |
for (i = 0; i < nb_nics; i++) { |
2890 |
if (net_boot_mask & (1 << i)) { |
2891 |
nd_table[i].bootable = 1;
|
2892 |
net_boot_mask &= ~(1 << i);
|
2893 |
} |
2894 |
} |
2895 |
|
2896 |
if (net_boot_mask) {
|
2897 |
fprintf(stderr, "Cannot boot from non-existent NIC\n");
|
2898 |
exit(1);
|
2899 |
} |
2900 |
} |
2901 |
|
2902 |
void do_info_network(Monitor *mon)
|
2903 |
{ |
2904 |
VLANState *vlan; |
2905 |
VLANClientState *vc; |
2906 |
|
2907 |
for(vlan = first_vlan; vlan != NULL; vlan = vlan->next) { |
2908 |
monitor_printf(mon, "VLAN %d devices:\n", vlan->id);
|
2909 |
for(vc = vlan->first_client; vc != NULL; vc = vc->next) |
2910 |
monitor_printf(mon, " %s: %s\n", vc->name, vc->info_str);
|
2911 |
} |
2912 |
} |
2913 |
|
2914 |
void do_set_link(Monitor *mon, const QDict *qdict) |
2915 |
{ |
2916 |
VLANState *vlan; |
2917 |
VLANClientState *vc = NULL;
|
2918 |
const char *name = qdict_get_str(qdict, "name"); |
2919 |
const char *up_or_down = qdict_get_str(qdict, "up_or_down"); |
2920 |
|
2921 |
for (vlan = first_vlan; vlan != NULL; vlan = vlan->next) |
2922 |
for (vc = vlan->first_client; vc != NULL; vc = vc->next) |
2923 |
if (strcmp(vc->name, name) == 0) |
2924 |
goto done;
|
2925 |
done:
|
2926 |
|
2927 |
if (!vc) {
|
2928 |
monitor_printf(mon, "could not find network device '%s'\n", name);
|
2929 |
return;
|
2930 |
} |
2931 |
|
2932 |
if (strcmp(up_or_down, "up") == 0) |
2933 |
vc->link_down = 0;
|
2934 |
else if (strcmp(up_or_down, "down") == 0) |
2935 |
vc->link_down = 1;
|
2936 |
else
|
2937 |
monitor_printf(mon, "invalid link status '%s'; only 'up' or 'down' "
|
2938 |
"valid\n", up_or_down);
|
2939 |
|
2940 |
if (vc->link_status_changed)
|
2941 |
vc->link_status_changed(vc); |
2942 |
} |
2943 |
|
2944 |
void net_cleanup(void) |
2945 |
{ |
2946 |
VLANState *vlan; |
2947 |
|
2948 |
/* close network clients */
|
2949 |
for(vlan = first_vlan; vlan != NULL; vlan = vlan->next) { |
2950 |
VLANClientState *vc = vlan->first_client; |
2951 |
|
2952 |
while (vc) {
|
2953 |
VLANClientState *next = vc->next; |
2954 |
|
2955 |
qemu_del_vlan_client(vc); |
2956 |
|
2957 |
vc = next; |
2958 |
} |
2959 |
} |
2960 |
} |
2961 |
|
2962 |
void net_client_check(void) |
2963 |
{ |
2964 |
VLANState *vlan; |
2965 |
|
2966 |
for(vlan = first_vlan; vlan != NULL; vlan = vlan->next) { |
2967 |
if (vlan->nb_guest_devs == 0 && vlan->nb_host_devs == 0) |
2968 |
continue;
|
2969 |
if (vlan->nb_guest_devs == 0) |
2970 |
fprintf(stderr, "Warning: vlan %d with no nics\n", vlan->id);
|
2971 |
if (vlan->nb_host_devs == 0) |
2972 |
fprintf(stderr, |
2973 |
"Warning: vlan %d is not connected to host network\n",
|
2974 |
vlan->id); |
2975 |
} |
2976 |
} |