]> git.proxmox.com Git - qemu.git/blob - net.c
fefed6c0c6a63aeaf163f67385d2bc2d3a4fe42e
[qemu.git] / net.c
1 /*
2 * QEMU System Emulator
3 *
4 * Copyright (c) 2003-2008 Fabrice Bellard
5 *
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
24 #include <unistd.h>
25 #include <fcntl.h>
26 #include <signal.h>
27 #include <time.h>
28 #include <errno.h>
29 #include <sys/time.h>
30 #include <zlib.h>
31
32 /* Needed early for CONFIG_BSD etc. */
33 #include "config-host.h"
34
35 #ifndef _WIN32
36 #include <sys/times.h>
37 #include <sys/wait.h>
38 #include <termios.h>
39 #include <sys/mman.h>
40 #include <sys/ioctl.h>
41 #include <sys/resource.h>
42 #include <sys/socket.h>
43 #include <netinet/in.h>
44 #include <net/if.h>
45 #ifdef __NetBSD__
46 #include <net/if_tap.h>
47 #endif
48 #ifdef __linux__
49 #include "tap-linux.h"
50 #endif
51 #include <arpa/inet.h>
52 #include <dirent.h>
53 #include <netdb.h>
54 #include <sys/select.h>
55 #ifdef CONFIG_BSD
56 #include <sys/stat.h>
57 #if defined(__FreeBSD__) || defined(__DragonFly__)
58 #include <libutil.h>
59 #else
60 #include <util.h>
61 #endif
62 #elif defined (__GLIBC__) && defined (__FreeBSD_kernel__)
63 #include <freebsd/stdlib.h>
64 #else
65 #ifdef __linux__
66 #include <pty.h>
67 #include <malloc.h>
68 #include <linux/rtc.h>
69
70 /* For the benefit of older linux systems which don't supply it,
71 we use a local copy of hpet.h. */
72 /* #include <linux/hpet.h> */
73 #include "hpet.h"
74
75 #include <linux/ppdev.h>
76 #include <linux/parport.h>
77 #endif
78 #ifdef __sun__
79 #include <sys/stat.h>
80 #include <sys/ethernet.h>
81 #include <sys/sockio.h>
82 #include <netinet/arp.h>
83 #include <netinet/in.h>
84 #include <netinet/in_systm.h>
85 #include <netinet/ip.h>
86 #include <netinet/ip_icmp.h> // must come after ip.h
87 #include <netinet/udp.h>
88 #include <netinet/tcp.h>
89 #include <net/if.h>
90 #include <syslog.h>
91 #include <stropts.h>
92 #endif
93 #endif
94 #endif
95
96 #if defined(__OpenBSD__)
97 #include <util.h>
98 #endif
99
100 #if defined(CONFIG_VDE)
101 #include <libvdeplug.h>
102 #endif
103
104 #include "qemu-common.h"
105 #include "net.h"
106 #include "monitor.h"
107 #include "sysemu.h"
108 #include "qemu-timer.h"
109 #include "qemu-char.h"
110 #include "audio/audio.h"
111 #include "qemu_socket.h"
112 #include "qemu-log.h"
113 #include "qemu-config.h"
114
115 #include "slirp/libslirp.h"
116
117 static QTAILQ_HEAD(, VLANState) vlans;
118 static QTAILQ_HEAD(, VLANClientState) non_vlan_clients;
119
120 /***********************************************************/
121 /* network device redirectors */
122
123 #if defined(DEBUG_NET) || defined(DEBUG_SLIRP)
124 static void hex_dump(FILE *f, const uint8_t *buf, int size)
125 {
126 int len, i, j, c;
127
128 for(i=0;i<size;i+=16) {
129 len = size - i;
130 if (len > 16)
131 len = 16;
132 fprintf(f, "%08x ", i);
133 for(j=0;j<16;j++) {
134 if (j < len)
135 fprintf(f, " %02x", buf[i+j]);
136 else
137 fprintf(f, " ");
138 }
139 fprintf(f, " ");
140 for(j=0;j<len;j++) {
141 c = buf[i+j];
142 if (c < ' ' || c > '~')
143 c = '.';
144 fprintf(f, "%c", c);
145 }
146 fprintf(f, "\n");
147 }
148 }
149 #endif
150
151 static int parse_macaddr(uint8_t *macaddr, const char *p)
152 {
153 int i;
154 char *last_char;
155 long int offset;
156
157 errno = 0;
158 offset = strtol(p, &last_char, 0);
159 if (0 == errno && '\0' == *last_char &&
160 offset >= 0 && offset <= 0xFFFFFF) {
161 macaddr[3] = (offset & 0xFF0000) >> 16;
162 macaddr[4] = (offset & 0xFF00) >> 8;
163 macaddr[5] = offset & 0xFF;
164 return 0;
165 } else {
166 for(i = 0; i < 6; i++) {
167 macaddr[i] = strtol(p, (char **)&p, 16);
168 if (i == 5) {
169 if (*p != '\0')
170 return -1;
171 } else {
172 if (*p != ':' && *p != '-')
173 return -1;
174 p++;
175 }
176 }
177 return 0;
178 }
179
180 return -1;
181 }
182
183 static int get_str_sep(char *buf, int buf_size, const char **pp, int sep)
184 {
185 const char *p, *p1;
186 int len;
187 p = *pp;
188 p1 = strchr(p, sep);
189 if (!p1)
190 return -1;
191 len = p1 - p;
192 p1++;
193 if (buf_size > 0) {
194 if (len > buf_size - 1)
195 len = buf_size - 1;
196 memcpy(buf, p, len);
197 buf[len] = '\0';
198 }
199 *pp = p1;
200 return 0;
201 }
202
203 int parse_host_src_port(struct sockaddr_in *haddr,
204 struct sockaddr_in *saddr,
205 const char *input_str)
206 {
207 char *str = strdup(input_str);
208 char *host_str = str;
209 char *src_str;
210 const char *src_str2;
211 char *ptr;
212
213 /*
214 * Chop off any extra arguments at the end of the string which
215 * would start with a comma, then fill in the src port information
216 * if it was provided else use the "any address" and "any port".
217 */
218 if ((ptr = strchr(str,',')))
219 *ptr = '\0';
220
221 if ((src_str = strchr(input_str,'@'))) {
222 *src_str = '\0';
223 src_str++;
224 }
225
226 if (parse_host_port(haddr, host_str) < 0)
227 goto fail;
228
229 src_str2 = src_str;
230 if (!src_str || *src_str == '\0')
231 src_str2 = ":0";
232
233 if (parse_host_port(saddr, src_str2) < 0)
234 goto fail;
235
236 free(str);
237 return(0);
238
239 fail:
240 free(str);
241 return -1;
242 }
243
244 int parse_host_port(struct sockaddr_in *saddr, const char *str)
245 {
246 char buf[512];
247 struct hostent *he;
248 const char *p, *r;
249 int port;
250
251 p = str;
252 if (get_str_sep(buf, sizeof(buf), &p, ':') < 0)
253 return -1;
254 saddr->sin_family = AF_INET;
255 if (buf[0] == '\0') {
256 saddr->sin_addr.s_addr = 0;
257 } else {
258 if (qemu_isdigit(buf[0])) {
259 if (!inet_aton(buf, &saddr->sin_addr))
260 return -1;
261 } else {
262 if ((he = gethostbyname(buf)) == NULL)
263 return - 1;
264 saddr->sin_addr = *(struct in_addr *)he->h_addr;
265 }
266 }
267 port = strtol(p, (char **)&r, 0);
268 if (r == p)
269 return -1;
270 saddr->sin_port = htons(port);
271 return 0;
272 }
273
274 void qemu_format_nic_info_str(VLANClientState *vc, uint8_t macaddr[6])
275 {
276 snprintf(vc->info_str, sizeof(vc->info_str),
277 "model=%s,macaddr=%02x:%02x:%02x:%02x:%02x:%02x",
278 vc->model,
279 macaddr[0], macaddr[1], macaddr[2],
280 macaddr[3], macaddr[4], macaddr[5]);
281 }
282
283 void qemu_macaddr_default_if_unset(MACAddr *macaddr)
284 {
285 static int index = 0;
286 static const MACAddr zero = { .a = { 0,0,0,0,0,0 } };
287
288 if (memcmp(macaddr, &zero, sizeof(zero)) != 0)
289 return;
290 macaddr->a[0] = 0x52;
291 macaddr->a[1] = 0x54;
292 macaddr->a[2] = 0x00;
293 macaddr->a[3] = 0x12;
294 macaddr->a[4] = 0x34;
295 macaddr->a[5] = 0x56 + index++;
296 }
297
298 static char *assign_name(VLANClientState *vc1, const char *model)
299 {
300 VLANState *vlan;
301 char buf[256];
302 int id = 0;
303
304 QTAILQ_FOREACH(vlan, &vlans, next) {
305 VLANClientState *vc;
306
307 QTAILQ_FOREACH(vc, &vlan->clients, next) {
308 if (vc != vc1 && strcmp(vc->model, model) == 0) {
309 id++;
310 }
311 }
312 }
313
314 snprintf(buf, sizeof(buf), "%s.%d", model, id);
315
316 return qemu_strdup(buf);
317 }
318
319 static ssize_t qemu_deliver_packet(VLANClientState *sender,
320 unsigned flags,
321 const uint8_t *data,
322 size_t size,
323 void *opaque);
324 static ssize_t qemu_deliver_packet_iov(VLANClientState *sender,
325 unsigned flags,
326 const struct iovec *iov,
327 int iovcnt,
328 void *opaque);
329
330 VLANClientState *qemu_new_vlan_client(net_client_type type,
331 VLANState *vlan,
332 VLANClientState *peer,
333 const char *model,
334 const char *name,
335 NetCanReceive *can_receive,
336 NetReceive *receive,
337 NetReceiveIOV *receive_iov,
338 NetCleanup *cleanup,
339 void *opaque)
340 {
341 VLANClientState *vc;
342
343 vc = qemu_mallocz(sizeof(VLANClientState));
344
345 vc->type = type;
346 vc->model = qemu_strdup(model);
347 if (name)
348 vc->name = qemu_strdup(name);
349 else
350 vc->name = assign_name(vc, model);
351 vc->can_receive = can_receive;
352 vc->receive = receive;
353 vc->receive_iov = receive_iov;
354 vc->cleanup = cleanup;
355 vc->opaque = opaque;
356
357 if (vlan) {
358 assert(!peer);
359 vc->vlan = vlan;
360 QTAILQ_INSERT_TAIL(&vc->vlan->clients, vc, next);
361 } else {
362 if (peer) {
363 vc->peer = peer;
364 peer->peer = vc;
365 }
366 QTAILQ_INSERT_TAIL(&non_vlan_clients, vc, next);
367
368 vc->send_queue = qemu_new_net_queue(qemu_deliver_packet,
369 qemu_deliver_packet_iov,
370 vc);
371 }
372
373 return vc;
374 }
375
376 void qemu_del_vlan_client(VLANClientState *vc)
377 {
378 if (vc->vlan) {
379 QTAILQ_REMOVE(&vc->vlan->clients, vc, next);
380 } else {
381 if (vc->send_queue) {
382 qemu_del_net_queue(vc->send_queue);
383 }
384 QTAILQ_REMOVE(&non_vlan_clients, vc, next);
385 if (vc->peer) {
386 vc->peer->peer = NULL;
387 }
388 }
389
390 if (vc->cleanup) {
391 vc->cleanup(vc);
392 }
393
394 qemu_free(vc->name);
395 qemu_free(vc->model);
396 qemu_free(vc);
397 }
398
399 VLANClientState *qemu_find_vlan_client(VLANState *vlan, void *opaque)
400 {
401 VLANClientState *vc;
402
403 QTAILQ_FOREACH(vc, &vlan->clients, next) {
404 if (vc->opaque == opaque) {
405 return vc;
406 }
407 }
408
409 return NULL;
410 }
411
412 static VLANClientState *
413 qemu_find_vlan_client_by_name(Monitor *mon, int vlan_id,
414 const char *client_str)
415 {
416 VLANState *vlan;
417 VLANClientState *vc;
418
419 vlan = qemu_find_vlan(vlan_id, 0);
420 if (!vlan) {
421 monitor_printf(mon, "unknown VLAN %d\n", vlan_id);
422 return NULL;
423 }
424
425 QTAILQ_FOREACH(vc, &vlan->clients, next) {
426 if (!strcmp(vc->name, client_str)) {
427 break;
428 }
429 }
430 if (!vc) {
431 monitor_printf(mon, "can't find device %s on VLAN %d\n",
432 client_str, vlan_id);
433 }
434
435 return vc;
436 }
437
438 int qemu_can_send_packet(VLANClientState *sender)
439 {
440 VLANState *vlan = sender->vlan;
441 VLANClientState *vc;
442
443 if (sender->peer) {
444 if (!sender->peer->can_receive ||
445 sender->peer->can_receive(sender->peer)) {
446 return 1;
447 } else {
448 return 0;
449 }
450 }
451
452 if (!sender->vlan) {
453 return 1;
454 }
455
456 QTAILQ_FOREACH(vc, &vlan->clients, next) {
457 if (vc == sender) {
458 continue;
459 }
460
461 /* no can_receive() handler, they can always receive */
462 if (!vc->can_receive || vc->can_receive(vc)) {
463 return 1;
464 }
465 }
466 return 0;
467 }
468
469 static ssize_t qemu_deliver_packet(VLANClientState *sender,
470 unsigned flags,
471 const uint8_t *data,
472 size_t size,
473 void *opaque)
474 {
475 VLANClientState *vc = opaque;
476
477 if (vc->link_down) {
478 return size;
479 }
480
481 return vc->receive(vc, data, size);
482 }
483
484 static ssize_t qemu_vlan_deliver_packet(VLANClientState *sender,
485 unsigned flags,
486 const uint8_t *buf,
487 size_t size,
488 void *opaque)
489 {
490 VLANState *vlan = opaque;
491 VLANClientState *vc;
492 int ret = -1;
493
494 QTAILQ_FOREACH(vc, &vlan->clients, next) {
495 ssize_t len;
496
497 if (vc == sender) {
498 continue;
499 }
500
501 if (vc->link_down) {
502 ret = size;
503 continue;
504 }
505
506 len = vc->receive(vc, buf, size);
507
508 ret = (ret >= 0) ? ret : len;
509 }
510
511 return ret;
512 }
513
514 void qemu_purge_queued_packets(VLANClientState *vc)
515 {
516 NetQueue *queue;
517
518 if (!vc->peer && !vc->vlan) {
519 return;
520 }
521
522 if (vc->peer) {
523 queue = vc->peer->send_queue;
524 } else {
525 queue = vc->vlan->send_queue;
526 }
527
528 qemu_net_queue_purge(queue, vc);
529 }
530
531 void qemu_flush_queued_packets(VLANClientState *vc)
532 {
533 NetQueue *queue;
534
535 if (vc->vlan) {
536 queue = vc->vlan->send_queue;
537 } else {
538 queue = vc->send_queue;
539 }
540
541 qemu_net_queue_flush(queue);
542 }
543
544 ssize_t qemu_send_packet_async(VLANClientState *sender,
545 const uint8_t *buf, int size,
546 NetPacketSent *sent_cb)
547 {
548 NetQueue *queue;
549
550 #ifdef DEBUG_NET
551 printf("qemu_send_packet_async:\n");
552 hex_dump(stdout, buf, size);
553 #endif
554
555 if (sender->link_down || (!sender->peer && !sender->vlan)) {
556 return size;
557 }
558
559 if (sender->peer) {
560 queue = sender->peer->send_queue;
561 } else {
562 queue = sender->vlan->send_queue;
563 }
564
565 return qemu_net_queue_send(queue, sender,
566 QEMU_NET_PACKET_FLAG_NONE,
567 buf, size, sent_cb);
568 }
569
570 void qemu_send_packet(VLANClientState *vc, const uint8_t *buf, int size)
571 {
572 qemu_send_packet_async(vc, buf, size, NULL);
573 }
574
575 static ssize_t vc_sendv_compat(VLANClientState *vc, const struct iovec *iov,
576 int iovcnt)
577 {
578 uint8_t buffer[4096];
579 size_t offset = 0;
580 int i;
581
582 for (i = 0; i < iovcnt; i++) {
583 size_t len;
584
585 len = MIN(sizeof(buffer) - offset, iov[i].iov_len);
586 memcpy(buffer + offset, iov[i].iov_base, len);
587 offset += len;
588 }
589
590 return vc->receive(vc, buffer, offset);
591 }
592
593 static ssize_t calc_iov_length(const struct iovec *iov, int iovcnt)
594 {
595 size_t offset = 0;
596 int i;
597
598 for (i = 0; i < iovcnt; i++)
599 offset += iov[i].iov_len;
600 return offset;
601 }
602
603 static ssize_t qemu_deliver_packet_iov(VLANClientState *sender,
604 unsigned flags,
605 const struct iovec *iov,
606 int iovcnt,
607 void *opaque)
608 {
609 VLANClientState *vc = opaque;
610
611 if (vc->link_down) {
612 return calc_iov_length(iov, iovcnt);
613 }
614
615 if (vc->receive_iov) {
616 return vc->receive_iov(vc, iov, iovcnt);
617 } else {
618 return vc_sendv_compat(vc, iov, iovcnt);
619 }
620 }
621
622 static ssize_t qemu_vlan_deliver_packet_iov(VLANClientState *sender,
623 unsigned flags,
624 const struct iovec *iov,
625 int iovcnt,
626 void *opaque)
627 {
628 VLANState *vlan = opaque;
629 VLANClientState *vc;
630 ssize_t ret = -1;
631
632 QTAILQ_FOREACH(vc, &vlan->clients, next) {
633 ssize_t len;
634
635 if (vc == sender) {
636 continue;
637 }
638
639 if (vc->link_down) {
640 ret = calc_iov_length(iov, iovcnt);
641 continue;
642 }
643
644 if (vc->receive_iov) {
645 len = vc->receive_iov(vc, iov, iovcnt);
646 } else {
647 len = vc_sendv_compat(vc, iov, iovcnt);
648 }
649
650 ret = (ret >= 0) ? ret : len;
651 }
652
653 return ret;
654 }
655
656 ssize_t qemu_sendv_packet_async(VLANClientState *sender,
657 const struct iovec *iov, int iovcnt,
658 NetPacketSent *sent_cb)
659 {
660 NetQueue *queue;
661
662 if (sender->link_down || (!sender->peer && !sender->vlan)) {
663 return calc_iov_length(iov, iovcnt);
664 }
665
666 if (sender->peer) {
667 queue = sender->peer->send_queue;
668 } else {
669 queue = sender->vlan->send_queue;
670 }
671
672 return qemu_net_queue_send_iov(queue, sender,
673 QEMU_NET_PACKET_FLAG_NONE,
674 iov, iovcnt, sent_cb);
675 }
676
677 ssize_t
678 qemu_sendv_packet(VLANClientState *vc, const struct iovec *iov, int iovcnt)
679 {
680 return qemu_sendv_packet_async(vc, iov, iovcnt, NULL);
681 }
682
683 #if defined(CONFIG_SLIRP)
684
685 /* slirp network adapter */
686
687 #define SLIRP_CFG_HOSTFWD 1
688 #define SLIRP_CFG_LEGACY 2
689
690 struct slirp_config_str {
691 struct slirp_config_str *next;
692 int flags;
693 char str[1024];
694 int legacy_format;
695 };
696
697 typedef struct SlirpState {
698 QTAILQ_ENTRY(SlirpState) entry;
699 VLANClientState *vc;
700 Slirp *slirp;
701 #ifndef _WIN32
702 char smb_dir[128];
703 #endif
704 } SlirpState;
705
706 static struct slirp_config_str *slirp_configs;
707 const char *legacy_tftp_prefix;
708 const char *legacy_bootp_filename;
709 static QTAILQ_HEAD(slirp_stacks, SlirpState) slirp_stacks =
710 QTAILQ_HEAD_INITIALIZER(slirp_stacks);
711
712 static int slirp_hostfwd(SlirpState *s, const char *redir_str,
713 int legacy_format);
714 static int slirp_guestfwd(SlirpState *s, const char *config_str,
715 int legacy_format);
716
717 #ifndef _WIN32
718 static const char *legacy_smb_export;
719
720 static int slirp_smb(SlirpState *s, const char *exported_dir,
721 struct in_addr vserver_addr);
722 static void slirp_smb_cleanup(SlirpState *s);
723 #else
724 static inline void slirp_smb_cleanup(SlirpState *s) { }
725 #endif
726
727 int slirp_can_output(void *opaque)
728 {
729 SlirpState *s = opaque;
730
731 return qemu_can_send_packet(s->vc);
732 }
733
734 void slirp_output(void *opaque, const uint8_t *pkt, int pkt_len)
735 {
736 SlirpState *s = opaque;
737
738 #ifdef DEBUG_SLIRP
739 printf("slirp output:\n");
740 hex_dump(stdout, pkt, pkt_len);
741 #endif
742 qemu_send_packet(s->vc, pkt, pkt_len);
743 }
744
745 static ssize_t slirp_receive(VLANClientState *vc, const uint8_t *buf, size_t size)
746 {
747 SlirpState *s = vc->opaque;
748
749 #ifdef DEBUG_SLIRP
750 printf("slirp input:\n");
751 hex_dump(stdout, buf, size);
752 #endif
753 slirp_input(s->slirp, buf, size);
754 return size;
755 }
756
757 static void net_slirp_cleanup(VLANClientState *vc)
758 {
759 SlirpState *s = vc->opaque;
760
761 slirp_cleanup(s->slirp);
762 slirp_smb_cleanup(s);
763 QTAILQ_REMOVE(&slirp_stacks, s, entry);
764 qemu_free(s);
765 }
766
767 static int net_slirp_init(VLANState *vlan, const char *model,
768 const char *name, int restricted,
769 const char *vnetwork, const char *vhost,
770 const char *vhostname, const char *tftp_export,
771 const char *bootfile, const char *vdhcp_start,
772 const char *vnameserver, const char *smb_export,
773 const char *vsmbserver)
774 {
775 /* default settings according to historic slirp */
776 struct in_addr net = { .s_addr = htonl(0x0a000200) }; /* 10.0.2.0 */
777 struct in_addr mask = { .s_addr = htonl(0xffffff00) }; /* 255.255.255.0 */
778 struct in_addr host = { .s_addr = htonl(0x0a000202) }; /* 10.0.2.2 */
779 struct in_addr dhcp = { .s_addr = htonl(0x0a00020f) }; /* 10.0.2.15 */
780 struct in_addr dns = { .s_addr = htonl(0x0a000203) }; /* 10.0.2.3 */
781 #ifndef _WIN32
782 struct in_addr smbsrv = { .s_addr = 0 };
783 #endif
784 SlirpState *s;
785 char buf[20];
786 uint32_t addr;
787 int shift;
788 char *end;
789 struct slirp_config_str *config;
790
791 if (!tftp_export) {
792 tftp_export = legacy_tftp_prefix;
793 }
794 if (!bootfile) {
795 bootfile = legacy_bootp_filename;
796 }
797
798 if (vnetwork) {
799 if (get_str_sep(buf, sizeof(buf), &vnetwork, '/') < 0) {
800 if (!inet_aton(vnetwork, &net)) {
801 return -1;
802 }
803 addr = ntohl(net.s_addr);
804 if (!(addr & 0x80000000)) {
805 mask.s_addr = htonl(0xff000000); /* class A */
806 } else if ((addr & 0xfff00000) == 0xac100000) {
807 mask.s_addr = htonl(0xfff00000); /* priv. 172.16.0.0/12 */
808 } else if ((addr & 0xc0000000) == 0x80000000) {
809 mask.s_addr = htonl(0xffff0000); /* class B */
810 } else if ((addr & 0xffff0000) == 0xc0a80000) {
811 mask.s_addr = htonl(0xffff0000); /* priv. 192.168.0.0/16 */
812 } else if ((addr & 0xffff0000) == 0xc6120000) {
813 mask.s_addr = htonl(0xfffe0000); /* tests 198.18.0.0/15 */
814 } else if ((addr & 0xe0000000) == 0xe0000000) {
815 mask.s_addr = htonl(0xffffff00); /* class C */
816 } else {
817 mask.s_addr = htonl(0xfffffff0); /* multicast/reserved */
818 }
819 } else {
820 if (!inet_aton(buf, &net)) {
821 return -1;
822 }
823 shift = strtol(vnetwork, &end, 10);
824 if (*end != '\0') {
825 if (!inet_aton(vnetwork, &mask)) {
826 return -1;
827 }
828 } else if (shift < 4 || shift > 32) {
829 return -1;
830 } else {
831 mask.s_addr = htonl(0xffffffff << (32 - shift));
832 }
833 }
834 net.s_addr &= mask.s_addr;
835 host.s_addr = net.s_addr | (htonl(0x0202) & ~mask.s_addr);
836 dhcp.s_addr = net.s_addr | (htonl(0x020f) & ~mask.s_addr);
837 dns.s_addr = net.s_addr | (htonl(0x0203) & ~mask.s_addr);
838 }
839
840 if (vhost && !inet_aton(vhost, &host)) {
841 return -1;
842 }
843 if ((host.s_addr & mask.s_addr) != net.s_addr) {
844 return -1;
845 }
846
847 if (vdhcp_start && !inet_aton(vdhcp_start, &dhcp)) {
848 return -1;
849 }
850 if ((dhcp.s_addr & mask.s_addr) != net.s_addr ||
851 dhcp.s_addr == host.s_addr || dhcp.s_addr == dns.s_addr) {
852 return -1;
853 }
854
855 if (vnameserver && !inet_aton(vnameserver, &dns)) {
856 return -1;
857 }
858 if ((dns.s_addr & mask.s_addr) != net.s_addr ||
859 dns.s_addr == host.s_addr) {
860 return -1;
861 }
862
863 #ifndef _WIN32
864 if (vsmbserver && !inet_aton(vsmbserver, &smbsrv)) {
865 return -1;
866 }
867 #endif
868
869 s = qemu_mallocz(sizeof(SlirpState));
870 s->slirp = slirp_init(restricted, net, mask, host, vhostname,
871 tftp_export, bootfile, dhcp, dns, s);
872 QTAILQ_INSERT_TAIL(&slirp_stacks, s, entry);
873
874 for (config = slirp_configs; config; config = config->next) {
875 if (config->flags & SLIRP_CFG_HOSTFWD) {
876 if (slirp_hostfwd(s, config->str,
877 config->flags & SLIRP_CFG_LEGACY) < 0)
878 return -1;
879 } else {
880 if (slirp_guestfwd(s, config->str,
881 config->flags & SLIRP_CFG_LEGACY) < 0)
882 return -1;
883 }
884 }
885 #ifndef _WIN32
886 if (!smb_export) {
887 smb_export = legacy_smb_export;
888 }
889 if (smb_export) {
890 if (slirp_smb(s, smb_export, smbsrv) < 0)
891 return -1;
892 }
893 #endif
894
895 s->vc = qemu_new_vlan_client(NET_CLIENT_TYPE_SLIRP,
896 vlan, NULL, model, name, NULL,
897 slirp_receive, NULL,
898 net_slirp_cleanup, s);
899 snprintf(s->vc->info_str, sizeof(s->vc->info_str),
900 "net=%s, restricted=%c", inet_ntoa(net), restricted ? 'y' : 'n');
901 return 0;
902 }
903
904 static SlirpState *slirp_lookup(Monitor *mon, const char *vlan,
905 const char *stack)
906 {
907 VLANClientState *vc;
908
909 if (vlan) {
910 vc = qemu_find_vlan_client_by_name(mon, strtol(vlan, NULL, 0), stack);
911 if (!vc) {
912 return NULL;
913 }
914 if (strcmp(vc->model, "user")) {
915 monitor_printf(mon, "invalid device specified\n");
916 return NULL;
917 }
918 return vc->opaque;
919 } else {
920 if (QTAILQ_EMPTY(&slirp_stacks)) {
921 monitor_printf(mon, "user mode network stack not in use\n");
922 return NULL;
923 }
924 return QTAILQ_FIRST(&slirp_stacks);
925 }
926 }
927
928 void net_slirp_hostfwd_remove(Monitor *mon, const QDict *qdict)
929 {
930 struct in_addr host_addr = { .s_addr = INADDR_ANY };
931 int host_port;
932 char buf[256] = "";
933 const char *src_str, *p;
934 SlirpState *s;
935 int is_udp = 0;
936 int err;
937 const char *arg1 = qdict_get_str(qdict, "arg1");
938 const char *arg2 = qdict_get_try_str(qdict, "arg2");
939 const char *arg3 = qdict_get_try_str(qdict, "arg3");
940
941 if (arg2) {
942 s = slirp_lookup(mon, arg1, arg2);
943 src_str = arg3;
944 } else {
945 s = slirp_lookup(mon, NULL, NULL);
946 src_str = arg1;
947 }
948 if (!s) {
949 return;
950 }
951
952 if (!src_str || !src_str[0])
953 goto fail_syntax;
954
955 p = src_str;
956 get_str_sep(buf, sizeof(buf), &p, ':');
957
958 if (!strcmp(buf, "tcp") || buf[0] == '\0') {
959 is_udp = 0;
960 } else if (!strcmp(buf, "udp")) {
961 is_udp = 1;
962 } else {
963 goto fail_syntax;
964 }
965
966 if (get_str_sep(buf, sizeof(buf), &p, ':') < 0) {
967 goto fail_syntax;
968 }
969 if (buf[0] != '\0' && !inet_aton(buf, &host_addr)) {
970 goto fail_syntax;
971 }
972
973 host_port = atoi(p);
974
975 err = slirp_remove_hostfwd(QTAILQ_FIRST(&slirp_stacks)->slirp, is_udp,
976 host_addr, host_port);
977
978 monitor_printf(mon, "host forwarding rule for %s %s\n", src_str,
979 err ? "removed" : "not found");
980 return;
981
982 fail_syntax:
983 monitor_printf(mon, "invalid format\n");
984 }
985
986 static int slirp_hostfwd(SlirpState *s, const char *redir_str,
987 int legacy_format)
988 {
989 struct in_addr host_addr = { .s_addr = INADDR_ANY };
990 struct in_addr guest_addr = { .s_addr = 0 };
991 int host_port, guest_port;
992 const char *p;
993 char buf[256];
994 int is_udp;
995 char *end;
996
997 p = redir_str;
998 if (!p || get_str_sep(buf, sizeof(buf), &p, ':') < 0) {
999 goto fail_syntax;
1000 }
1001 if (!strcmp(buf, "tcp") || buf[0] == '\0') {
1002 is_udp = 0;
1003 } else if (!strcmp(buf, "udp")) {
1004 is_udp = 1;
1005 } else {
1006 goto fail_syntax;
1007 }
1008
1009 if (!legacy_format) {
1010 if (get_str_sep(buf, sizeof(buf), &p, ':') < 0) {
1011 goto fail_syntax;
1012 }
1013 if (buf[0] != '\0' && !inet_aton(buf, &host_addr)) {
1014 goto fail_syntax;
1015 }
1016 }
1017
1018 if (get_str_sep(buf, sizeof(buf), &p, legacy_format ? ':' : '-') < 0) {
1019 goto fail_syntax;
1020 }
1021 host_port = strtol(buf, &end, 0);
1022 if (*end != '\0' || host_port < 1 || host_port > 65535) {
1023 goto fail_syntax;
1024 }
1025
1026 if (get_str_sep(buf, sizeof(buf), &p, ':') < 0) {
1027 goto fail_syntax;
1028 }
1029 if (buf[0] != '\0' && !inet_aton(buf, &guest_addr)) {
1030 goto fail_syntax;
1031 }
1032
1033 guest_port = strtol(p, &end, 0);
1034 if (*end != '\0' || guest_port < 1 || guest_port > 65535) {
1035 goto fail_syntax;
1036 }
1037
1038 if (slirp_add_hostfwd(s->slirp, is_udp, host_addr, host_port, guest_addr,
1039 guest_port) < 0) {
1040 qemu_error("could not set up host forwarding rule '%s'\n",
1041 redir_str);
1042 return -1;
1043 }
1044 return 0;
1045
1046 fail_syntax:
1047 qemu_error("invalid host forwarding rule '%s'\n", redir_str);
1048 return -1;
1049 }
1050
1051 void net_slirp_hostfwd_add(Monitor *mon, const QDict *qdict)
1052 {
1053 const char *redir_str;
1054 SlirpState *s;
1055 const char *arg1 = qdict_get_str(qdict, "arg1");
1056 const char *arg2 = qdict_get_try_str(qdict, "arg2");
1057 const char *arg3 = qdict_get_try_str(qdict, "arg3");
1058
1059 if (arg2) {
1060 s = slirp_lookup(mon, arg1, arg2);
1061 redir_str = arg3;
1062 } else {
1063 s = slirp_lookup(mon, NULL, NULL);
1064 redir_str = arg1;
1065 }
1066 if (s) {
1067 slirp_hostfwd(s, redir_str, 0);
1068 }
1069
1070 }
1071
1072 int net_slirp_redir(const char *redir_str)
1073 {
1074 struct slirp_config_str *config;
1075
1076 if (QTAILQ_EMPTY(&slirp_stacks)) {
1077 config = qemu_malloc(sizeof(*config));
1078 pstrcpy(config->str, sizeof(config->str), redir_str);
1079 config->flags = SLIRP_CFG_HOSTFWD | SLIRP_CFG_LEGACY;
1080 config->next = slirp_configs;
1081 slirp_configs = config;
1082 return 0;
1083 }
1084
1085 return slirp_hostfwd(QTAILQ_FIRST(&slirp_stacks), redir_str, 1);
1086 }
1087
1088 #ifndef _WIN32
1089
1090 /* automatic user mode samba server configuration */
1091 static void slirp_smb_cleanup(SlirpState *s)
1092 {
1093 char cmd[128];
1094
1095 if (s->smb_dir[0] != '\0') {
1096 snprintf(cmd, sizeof(cmd), "rm -rf %s", s->smb_dir);
1097 system(cmd);
1098 s->smb_dir[0] = '\0';
1099 }
1100 }
1101
1102 static int slirp_smb(SlirpState* s, const char *exported_dir,
1103 struct in_addr vserver_addr)
1104 {
1105 static int instance;
1106 char smb_conf[128];
1107 char smb_cmdline[128];
1108 FILE *f;
1109
1110 snprintf(s->smb_dir, sizeof(s->smb_dir), "/tmp/qemu-smb.%ld-%d",
1111 (long)getpid(), instance++);
1112 if (mkdir(s->smb_dir, 0700) < 0) {
1113 qemu_error("could not create samba server dir '%s'\n", s->smb_dir);
1114 return -1;
1115 }
1116 snprintf(smb_conf, sizeof(smb_conf), "%s/%s", s->smb_dir, "smb.conf");
1117
1118 f = fopen(smb_conf, "w");
1119 if (!f) {
1120 slirp_smb_cleanup(s);
1121 qemu_error("could not create samba server configuration file '%s'\n",
1122 smb_conf);
1123 return -1;
1124 }
1125 fprintf(f,
1126 "[global]\n"
1127 "private dir=%s\n"
1128 "smb ports=0\n"
1129 "socket address=127.0.0.1\n"
1130 "pid directory=%s\n"
1131 "lock directory=%s\n"
1132 "log file=%s/log.smbd\n"
1133 "smb passwd file=%s/smbpasswd\n"
1134 "security = share\n"
1135 "[qemu]\n"
1136 "path=%s\n"
1137 "read only=no\n"
1138 "guest ok=yes\n",
1139 s->smb_dir,
1140 s->smb_dir,
1141 s->smb_dir,
1142 s->smb_dir,
1143 s->smb_dir,
1144 exported_dir
1145 );
1146 fclose(f);
1147
1148 snprintf(smb_cmdline, sizeof(smb_cmdline), "%s -s %s",
1149 SMBD_COMMAND, smb_conf);
1150
1151 if (slirp_add_exec(s->slirp, 0, smb_cmdline, &vserver_addr, 139) < 0) {
1152 slirp_smb_cleanup(s);
1153 qemu_error("conflicting/invalid smbserver address\n");
1154 return -1;
1155 }
1156 return 0;
1157 }
1158
1159 /* automatic user mode samba server configuration (legacy interface) */
1160 int net_slirp_smb(const char *exported_dir)
1161 {
1162 struct in_addr vserver_addr = { .s_addr = 0 };
1163
1164 if (legacy_smb_export) {
1165 fprintf(stderr, "-smb given twice\n");
1166 return -1;
1167 }
1168 legacy_smb_export = exported_dir;
1169 if (!QTAILQ_EMPTY(&slirp_stacks)) {
1170 return slirp_smb(QTAILQ_FIRST(&slirp_stacks), exported_dir,
1171 vserver_addr);
1172 }
1173 return 0;
1174 }
1175
1176 #endif /* !defined(_WIN32) */
1177
1178 struct GuestFwd {
1179 CharDriverState *hd;
1180 struct in_addr server;
1181 int port;
1182 Slirp *slirp;
1183 };
1184
1185 static int guestfwd_can_read(void *opaque)
1186 {
1187 struct GuestFwd *fwd = opaque;
1188 return slirp_socket_can_recv(fwd->slirp, fwd->server, fwd->port);
1189 }
1190
1191 static void guestfwd_read(void *opaque, const uint8_t *buf, int size)
1192 {
1193 struct GuestFwd *fwd = opaque;
1194 slirp_socket_recv(fwd->slirp, fwd->server, fwd->port, buf, size);
1195 }
1196
1197 static int slirp_guestfwd(SlirpState *s, const char *config_str,
1198 int legacy_format)
1199 {
1200 struct in_addr server = { .s_addr = 0 };
1201 struct GuestFwd *fwd;
1202 const char *p;
1203 char buf[128];
1204 char *end;
1205 int port;
1206
1207 p = config_str;
1208 if (legacy_format) {
1209 if (get_str_sep(buf, sizeof(buf), &p, ':') < 0) {
1210 goto fail_syntax;
1211 }
1212 } else {
1213 if (get_str_sep(buf, sizeof(buf), &p, ':') < 0) {
1214 goto fail_syntax;
1215 }
1216 if (strcmp(buf, "tcp") && buf[0] != '\0') {
1217 goto fail_syntax;
1218 }
1219 if (get_str_sep(buf, sizeof(buf), &p, ':') < 0) {
1220 goto fail_syntax;
1221 }
1222 if (buf[0] != '\0' && !inet_aton(buf, &server)) {
1223 goto fail_syntax;
1224 }
1225 if (get_str_sep(buf, sizeof(buf), &p, '-') < 0) {
1226 goto fail_syntax;
1227 }
1228 }
1229 port = strtol(buf, &end, 10);
1230 if (*end != '\0' || port < 1 || port > 65535) {
1231 goto fail_syntax;
1232 }
1233
1234 fwd = qemu_malloc(sizeof(struct GuestFwd));
1235 snprintf(buf, sizeof(buf), "guestfwd.tcp:%d", port);
1236 fwd->hd = qemu_chr_open(buf, p, NULL);
1237 if (!fwd->hd) {
1238 qemu_error("could not open guest forwarding device '%s'\n", buf);
1239 qemu_free(fwd);
1240 return -1;
1241 }
1242
1243 if (slirp_add_exec(s->slirp, 3, fwd->hd, &server, port) < 0) {
1244 qemu_error("conflicting/invalid host:port in guest forwarding "
1245 "rule '%s'\n", config_str);
1246 qemu_free(fwd);
1247 return -1;
1248 }
1249 fwd->server = server;
1250 fwd->port = port;
1251 fwd->slirp = s->slirp;
1252
1253 qemu_chr_add_handlers(fwd->hd, guestfwd_can_read, guestfwd_read,
1254 NULL, fwd);
1255 return 0;
1256
1257 fail_syntax:
1258 qemu_error("invalid guest forwarding rule '%s'\n", config_str);
1259 return -1;
1260 }
1261
1262 void do_info_usernet(Monitor *mon)
1263 {
1264 SlirpState *s;
1265
1266 QTAILQ_FOREACH(s, &slirp_stacks, entry) {
1267 monitor_printf(mon, "VLAN %d (%s):\n", s->vc->vlan->id, s->vc->name);
1268 slirp_connection_info(s->slirp, mon);
1269 }
1270 }
1271
1272 #endif /* CONFIG_SLIRP */
1273
1274 #if defined(_WIN32)
1275 int tap_has_vnet_hdr(VLANClientState *vc)
1276 {
1277 return 0;
1278 }
1279 void tap_using_vnet_hdr(VLANClientState *vc, int using_vnet_hdr)
1280 {
1281 }
1282 #else /* !defined(_WIN32) */
1283
1284 /* Maximum GSO packet size (64k) plus plenty of room for
1285 * the ethernet and virtio_net headers
1286 */
1287 #define TAP_BUFSIZE (4096 + 65536)
1288
1289 typedef struct TAPState {
1290 VLANClientState *vc;
1291 int fd;
1292 char down_script[1024];
1293 char down_script_arg[128];
1294 uint8_t buf[TAP_BUFSIZE];
1295 unsigned int read_poll : 1;
1296 unsigned int write_poll : 1;
1297 unsigned int has_vnet_hdr : 1;
1298 unsigned int using_vnet_hdr : 1;
1299 } TAPState;
1300
1301 static int launch_script(const char *setup_script, const char *ifname, int fd);
1302
1303 static int tap_can_send(void *opaque);
1304 static void tap_send(void *opaque);
1305 static void tap_writable(void *opaque);
1306
1307 static void tap_update_fd_handler(TAPState *s)
1308 {
1309 qemu_set_fd_handler2(s->fd,
1310 s->read_poll ? tap_can_send : NULL,
1311 s->read_poll ? tap_send : NULL,
1312 s->write_poll ? tap_writable : NULL,
1313 s);
1314 }
1315
1316 static void tap_read_poll(TAPState *s, int enable)
1317 {
1318 s->read_poll = !!enable;
1319 tap_update_fd_handler(s);
1320 }
1321
1322 static void tap_write_poll(TAPState *s, int enable)
1323 {
1324 s->write_poll = !!enable;
1325 tap_update_fd_handler(s);
1326 }
1327
1328 static void tap_writable(void *opaque)
1329 {
1330 TAPState *s = opaque;
1331
1332 tap_write_poll(s, 0);
1333
1334 qemu_flush_queued_packets(s->vc);
1335 }
1336
1337 static ssize_t tap_write_packet(TAPState *s, const struct iovec *iov, int iovcnt)
1338 {
1339 ssize_t len;
1340
1341 do {
1342 len = writev(s->fd, iov, iovcnt);
1343 } while (len == -1 && errno == EINTR);
1344
1345 if (len == -1 && errno == EAGAIN) {
1346 tap_write_poll(s, 1);
1347 return 0;
1348 }
1349
1350 return len;
1351 }
1352
1353 static ssize_t tap_receive_iov(VLANClientState *vc, const struct iovec *iov,
1354 int iovcnt)
1355 {
1356 TAPState *s = vc->opaque;
1357 const struct iovec *iovp = iov;
1358 struct iovec iov_copy[iovcnt + 1];
1359 struct virtio_net_hdr hdr = { 0, };
1360
1361 if (s->has_vnet_hdr && !s->using_vnet_hdr) {
1362 iov_copy[0].iov_base = &hdr;
1363 iov_copy[0].iov_len = sizeof(hdr);
1364 memcpy(&iov_copy[1], iov, iovcnt * sizeof(*iov));
1365 iovp = iov_copy;
1366 iovcnt++;
1367 }
1368
1369 return tap_write_packet(s, iovp, iovcnt);
1370 }
1371
1372 static ssize_t tap_receive(VLANClientState *vc, const uint8_t *buf, size_t size)
1373 {
1374 TAPState *s = vc->opaque;
1375 struct iovec iov[2];
1376 int iovcnt = 0;
1377 struct virtio_net_hdr hdr = { 0, };
1378
1379 if (s->has_vnet_hdr && !s->using_vnet_hdr) {
1380 iov[iovcnt].iov_base = &hdr;
1381 iov[iovcnt].iov_len = sizeof(hdr);
1382 iovcnt++;
1383 }
1384
1385 iov[iovcnt].iov_base = (char *)buf;
1386 iov[iovcnt].iov_len = size;
1387 iovcnt++;
1388
1389 return tap_write_packet(s, iov, iovcnt);
1390 }
1391
1392 static int tap_can_send(void *opaque)
1393 {
1394 TAPState *s = opaque;
1395
1396 return qemu_can_send_packet(s->vc);
1397 }
1398
1399 #ifdef __sun__
1400 static ssize_t tap_read_packet(int tapfd, uint8_t *buf, int maxlen)
1401 {
1402 struct strbuf sbuf;
1403 int f = 0;
1404
1405 sbuf.maxlen = maxlen;
1406 sbuf.buf = (char *)buf;
1407
1408 return getmsg(tapfd, NULL, &sbuf, &f) >= 0 ? sbuf.len : -1;
1409 }
1410 #else
1411 static ssize_t tap_read_packet(int tapfd, uint8_t *buf, int maxlen)
1412 {
1413 return read(tapfd, buf, maxlen);
1414 }
1415 #endif
1416
1417 static void tap_send_completed(VLANClientState *vc, ssize_t len)
1418 {
1419 TAPState *s = vc->opaque;
1420 tap_read_poll(s, 1);
1421 }
1422
1423 static void tap_send(void *opaque)
1424 {
1425 TAPState *s = opaque;
1426 int size;
1427
1428 do {
1429 uint8_t *buf = s->buf;
1430
1431 size = tap_read_packet(s->fd, s->buf, sizeof(s->buf));
1432 if (size <= 0) {
1433 break;
1434 }
1435
1436 if (s->has_vnet_hdr && !s->using_vnet_hdr) {
1437 buf += sizeof(struct virtio_net_hdr);
1438 size -= sizeof(struct virtio_net_hdr);
1439 }
1440
1441 size = qemu_send_packet_async(s->vc, buf, size, tap_send_completed);
1442 if (size == 0) {
1443 tap_read_poll(s, 0);
1444 }
1445 } while (size > 0);
1446 }
1447
1448 /* sndbuf should be set to a value lower than the tx queue
1449 * capacity of any destination network interface.
1450 * Ethernet NICs generally have txqueuelen=1000, so 1Mb is
1451 * a good default, given a 1500 byte MTU.
1452 */
1453 #define TAP_DEFAULT_SNDBUF 1024*1024
1454
1455 static int tap_set_sndbuf(TAPState *s, QemuOpts *opts)
1456 {
1457 int sndbuf;
1458
1459 sndbuf = qemu_opt_get_size(opts, "sndbuf", TAP_DEFAULT_SNDBUF);
1460 if (!sndbuf) {
1461 sndbuf = INT_MAX;
1462 }
1463
1464 if (ioctl(s->fd, TUNSETSNDBUF, &sndbuf) == -1 && qemu_opt_get(opts, "sndbuf")) {
1465 qemu_error("TUNSETSNDBUF ioctl failed: %s\n", strerror(errno));
1466 return -1;
1467 }
1468 return 0;
1469 }
1470
1471 int tap_has_vnet_hdr(VLANClientState *vc)
1472 {
1473 TAPState *s = vc->opaque;
1474
1475 assert(vc->type == NET_CLIENT_TYPE_TAP);
1476
1477 return s->has_vnet_hdr;
1478 }
1479
1480 void tap_using_vnet_hdr(VLANClientState *vc, int using_vnet_hdr)
1481 {
1482 TAPState *s = vc->opaque;
1483
1484 using_vnet_hdr = using_vnet_hdr != 0;
1485
1486 assert(vc->type == NET_CLIENT_TYPE_TAP);
1487 assert(s->has_vnet_hdr == using_vnet_hdr);
1488
1489 s->using_vnet_hdr = using_vnet_hdr;
1490 }
1491
1492 static int tap_probe_vnet_hdr(int fd)
1493 {
1494 struct ifreq ifr;
1495
1496 if (ioctl(fd, TUNGETIFF, &ifr) != 0) {
1497 qemu_error("TUNGETIFF ioctl() failed: %s\n", strerror(errno));
1498 return 0;
1499 }
1500
1501 return ifr.ifr_flags & IFF_VNET_HDR;
1502 }
1503
1504 static void tap_cleanup(VLANClientState *vc)
1505 {
1506 TAPState *s = vc->opaque;
1507
1508 qemu_purge_queued_packets(vc);
1509
1510 if (s->down_script[0])
1511 launch_script(s->down_script, s->down_script_arg, s->fd);
1512
1513 tap_read_poll(s, 0);
1514 tap_write_poll(s, 0);
1515 close(s->fd);
1516 qemu_free(s);
1517 }
1518
1519 /* fd support */
1520
1521 static TAPState *net_tap_fd_init(VLANState *vlan,
1522 const char *model,
1523 const char *name,
1524 int fd,
1525 int vnet_hdr)
1526 {
1527 TAPState *s;
1528
1529 s = qemu_mallocz(sizeof(TAPState));
1530 s->fd = fd;
1531 s->has_vnet_hdr = vnet_hdr != 0;
1532 s->using_vnet_hdr = 0;
1533 s->vc = qemu_new_vlan_client(NET_CLIENT_TYPE_TAP,
1534 vlan, NULL, model, name, NULL,
1535 tap_receive, tap_receive_iov,
1536 tap_cleanup, s);
1537 tap_read_poll(s, 1);
1538 return s;
1539 }
1540
1541 #if defined (CONFIG_BSD) || defined (__FreeBSD_kernel__)
1542 static int tap_open(char *ifname, int ifname_size,
1543 int *vnet_hdr, int vnet_hdr_required)
1544 {
1545 int fd;
1546 char *dev;
1547 struct stat s;
1548
1549 TFR(fd = open("/dev/tap", O_RDWR));
1550 if (fd < 0) {
1551 fprintf(stderr, "warning: could not open /dev/tap: no virtual network emulation\n");
1552 return -1;
1553 }
1554
1555 fstat(fd, &s);
1556 dev = devname(s.st_rdev, S_IFCHR);
1557 pstrcpy(ifname, ifname_size, dev);
1558
1559 fcntl(fd, F_SETFL, O_NONBLOCK);
1560 return fd;
1561 }
1562 #elif defined(__sun__)
1563 #define TUNNEWPPA (('T'<<16) | 0x0001)
1564 /*
1565 * Allocate TAP device, returns opened fd.
1566 * Stores dev name in the first arg(must be large enough).
1567 */
1568 static int tap_alloc(char *dev, size_t dev_size)
1569 {
1570 int tap_fd, if_fd, ppa = -1;
1571 static int ip_fd = 0;
1572 char *ptr;
1573
1574 static int arp_fd = 0;
1575 int ip_muxid, arp_muxid;
1576 struct strioctl strioc_if, strioc_ppa;
1577 int link_type = I_PLINK;;
1578 struct lifreq ifr;
1579 char actual_name[32] = "";
1580
1581 memset(&ifr, 0x0, sizeof(ifr));
1582
1583 if( *dev ){
1584 ptr = dev;
1585 while( *ptr && !qemu_isdigit((int)*ptr) ) ptr++;
1586 ppa = atoi(ptr);
1587 }
1588
1589 /* Check if IP device was opened */
1590 if( ip_fd )
1591 close(ip_fd);
1592
1593 TFR(ip_fd = open("/dev/udp", O_RDWR, 0));
1594 if (ip_fd < 0) {
1595 syslog(LOG_ERR, "Can't open /dev/ip (actually /dev/udp)");
1596 return -1;
1597 }
1598
1599 TFR(tap_fd = open("/dev/tap", O_RDWR, 0));
1600 if (tap_fd < 0) {
1601 syslog(LOG_ERR, "Can't open /dev/tap");
1602 return -1;
1603 }
1604
1605 /* Assign a new PPA and get its unit number. */
1606 strioc_ppa.ic_cmd = TUNNEWPPA;
1607 strioc_ppa.ic_timout = 0;
1608 strioc_ppa.ic_len = sizeof(ppa);
1609 strioc_ppa.ic_dp = (char *)&ppa;
1610 if ((ppa = ioctl (tap_fd, I_STR, &strioc_ppa)) < 0)
1611 syslog (LOG_ERR, "Can't assign new interface");
1612
1613 TFR(if_fd = open("/dev/tap", O_RDWR, 0));
1614 if (if_fd < 0) {
1615 syslog(LOG_ERR, "Can't open /dev/tap (2)");
1616 return -1;
1617 }
1618 if(ioctl(if_fd, I_PUSH, "ip") < 0){
1619 syslog(LOG_ERR, "Can't push IP module");
1620 return -1;
1621 }
1622
1623 if (ioctl(if_fd, SIOCGLIFFLAGS, &ifr) < 0)
1624 syslog(LOG_ERR, "Can't get flags\n");
1625
1626 snprintf (actual_name, 32, "tap%d", ppa);
1627 pstrcpy(ifr.lifr_name, sizeof(ifr.lifr_name), actual_name);
1628
1629 ifr.lifr_ppa = ppa;
1630 /* Assign ppa according to the unit number returned by tun device */
1631
1632 if (ioctl (if_fd, SIOCSLIFNAME, &ifr) < 0)
1633 syslog (LOG_ERR, "Can't set PPA %d", ppa);
1634 if (ioctl(if_fd, SIOCGLIFFLAGS, &ifr) <0)
1635 syslog (LOG_ERR, "Can't get flags\n");
1636 /* Push arp module to if_fd */
1637 if (ioctl (if_fd, I_PUSH, "arp") < 0)
1638 syslog (LOG_ERR, "Can't push ARP module (2)");
1639
1640 /* Push arp module to ip_fd */
1641 if (ioctl (ip_fd, I_POP, NULL) < 0)
1642 syslog (LOG_ERR, "I_POP failed\n");
1643 if (ioctl (ip_fd, I_PUSH, "arp") < 0)
1644 syslog (LOG_ERR, "Can't push ARP module (3)\n");
1645 /* Open arp_fd */
1646 TFR(arp_fd = open ("/dev/tap", O_RDWR, 0));
1647 if (arp_fd < 0)
1648 syslog (LOG_ERR, "Can't open %s\n", "/dev/tap");
1649
1650 /* Set ifname to arp */
1651 strioc_if.ic_cmd = SIOCSLIFNAME;
1652 strioc_if.ic_timout = 0;
1653 strioc_if.ic_len = sizeof(ifr);
1654 strioc_if.ic_dp = (char *)&ifr;
1655 if (ioctl(arp_fd, I_STR, &strioc_if) < 0){
1656 syslog (LOG_ERR, "Can't set ifname to arp\n");
1657 }
1658
1659 if((ip_muxid = ioctl(ip_fd, I_LINK, if_fd)) < 0){
1660 syslog(LOG_ERR, "Can't link TAP device to IP");
1661 return -1;
1662 }
1663
1664 if ((arp_muxid = ioctl (ip_fd, link_type, arp_fd)) < 0)
1665 syslog (LOG_ERR, "Can't link TAP device to ARP");
1666
1667 close (if_fd);
1668
1669 memset(&ifr, 0x0, sizeof(ifr));
1670 pstrcpy(ifr.lifr_name, sizeof(ifr.lifr_name), actual_name);
1671 ifr.lifr_ip_muxid = ip_muxid;
1672 ifr.lifr_arp_muxid = arp_muxid;
1673
1674 if (ioctl (ip_fd, SIOCSLIFMUXID, &ifr) < 0)
1675 {
1676 ioctl (ip_fd, I_PUNLINK , arp_muxid);
1677 ioctl (ip_fd, I_PUNLINK, ip_muxid);
1678 syslog (LOG_ERR, "Can't set multiplexor id");
1679 }
1680
1681 snprintf(dev, dev_size, "tap%d", ppa);
1682 return tap_fd;
1683 }
1684
1685 static int tap_open(char *ifname, int ifname_size,
1686 int *vnet_hdr, int vnet_hdr_required)
1687 {
1688 char dev[10]="";
1689 int fd;
1690 if( (fd = tap_alloc(dev, sizeof(dev))) < 0 ){
1691 fprintf(stderr, "Cannot allocate TAP device\n");
1692 return -1;
1693 }
1694 pstrcpy(ifname, ifname_size, dev);
1695 fcntl(fd, F_SETFL, O_NONBLOCK);
1696 return fd;
1697 }
1698 #elif defined (_AIX)
1699 static int tap_open(char *ifname, int ifname_size,
1700 int *vnet_hdr, int vnet_hdr_required)
1701 {
1702 fprintf (stderr, "no tap on AIX\n");
1703 return -1;
1704 }
1705 #else
1706 static int tap_open(char *ifname, int ifname_size,
1707 int *vnet_hdr, int vnet_hdr_required)
1708 {
1709 struct ifreq ifr;
1710 int fd, ret;
1711
1712 TFR(fd = open("/dev/net/tun", O_RDWR));
1713 if (fd < 0) {
1714 fprintf(stderr, "warning: could not open /dev/net/tun: no virtual network emulation\n");
1715 return -1;
1716 }
1717 memset(&ifr, 0, sizeof(ifr));
1718 ifr.ifr_flags = IFF_TAP | IFF_NO_PI;
1719
1720 if (*vnet_hdr) {
1721 unsigned int features;
1722
1723 if (ioctl(fd, TUNGETFEATURES, &features) == 0 &&
1724 features & IFF_VNET_HDR) {
1725 *vnet_hdr = 1;
1726 ifr.ifr_flags |= IFF_VNET_HDR;
1727 }
1728
1729 if (vnet_hdr_required && !*vnet_hdr) {
1730 qemu_error("vnet_hdr=1 requested, but no kernel "
1731 "support for IFF_VNET_HDR available");
1732 close(fd);
1733 return -1;
1734 }
1735 }
1736
1737 if (ifname[0] != '\0')
1738 pstrcpy(ifr.ifr_name, IFNAMSIZ, ifname);
1739 else
1740 pstrcpy(ifr.ifr_name, IFNAMSIZ, "tap%d");
1741 ret = ioctl(fd, TUNSETIFF, (void *) &ifr);
1742 if (ret != 0) {
1743 fprintf(stderr, "warning: could not configure /dev/net/tun: no virtual network emulation\n");
1744 close(fd);
1745 return -1;
1746 }
1747 pstrcpy(ifname, ifname_size, ifr.ifr_name);
1748 fcntl(fd, F_SETFL, O_NONBLOCK);
1749 return fd;
1750 }
1751 #endif
1752
1753 static int launch_script(const char *setup_script, const char *ifname, int fd)
1754 {
1755 sigset_t oldmask, mask;
1756 int pid, status;
1757 char *args[3];
1758 char **parg;
1759
1760 sigemptyset(&mask);
1761 sigaddset(&mask, SIGCHLD);
1762 sigprocmask(SIG_BLOCK, &mask, &oldmask);
1763
1764 /* try to launch network script */
1765 pid = fork();
1766 if (pid == 0) {
1767 int open_max = sysconf(_SC_OPEN_MAX), i;
1768
1769 for (i = 0; i < open_max; i++) {
1770 if (i != STDIN_FILENO &&
1771 i != STDOUT_FILENO &&
1772 i != STDERR_FILENO &&
1773 i != fd) {
1774 close(i);
1775 }
1776 }
1777 parg = args;
1778 *parg++ = (char *)setup_script;
1779 *parg++ = (char *)ifname;
1780 *parg++ = NULL;
1781 execv(setup_script, args);
1782 _exit(1);
1783 } else if (pid > 0) {
1784 while (waitpid(pid, &status, 0) != pid) {
1785 /* loop */
1786 }
1787 sigprocmask(SIG_SETMASK, &oldmask, NULL);
1788
1789 if (WIFEXITED(status) && WEXITSTATUS(status) == 0) {
1790 return 0;
1791 }
1792 }
1793 fprintf(stderr, "%s: could not launch network script\n", setup_script);
1794 return -1;
1795 }
1796
1797 static int net_tap_init(QemuOpts *opts, int *vnet_hdr)
1798 {
1799 int fd, vnet_hdr_required;
1800 char ifname[128] = {0,};
1801 const char *setup_script;
1802
1803 if (qemu_opt_get(opts, "ifname")) {
1804 pstrcpy(ifname, sizeof(ifname), qemu_opt_get(opts, "ifname"));
1805 }
1806
1807 *vnet_hdr = qemu_opt_get_bool(opts, "vnet_hdr", 1);
1808 if (qemu_opt_get(opts, "vnet_hdr")) {
1809 vnet_hdr_required = *vnet_hdr;
1810 } else {
1811 vnet_hdr_required = 0;
1812 }
1813
1814 TFR(fd = tap_open(ifname, sizeof(ifname), vnet_hdr, vnet_hdr_required));
1815 if (fd < 0) {
1816 return -1;
1817 }
1818
1819 setup_script = qemu_opt_get(opts, "script");
1820 if (setup_script &&
1821 setup_script[0] != '\0' &&
1822 strcmp(setup_script, "no") != 0 &&
1823 launch_script(setup_script, ifname, fd)) {
1824 close(fd);
1825 return -1;
1826 }
1827
1828 qemu_opt_set(opts, "ifname", ifname);
1829
1830 return fd;
1831 }
1832
1833 #endif /* !_WIN32 */
1834
1835 #if defined(CONFIG_VDE)
1836 typedef struct VDEState {
1837 VLANClientState *vc;
1838 VDECONN *vde;
1839 } VDEState;
1840
1841 static void vde_to_qemu(void *opaque)
1842 {
1843 VDEState *s = opaque;
1844 uint8_t buf[4096];
1845 int size;
1846
1847 size = vde_recv(s->vde, (char *)buf, sizeof(buf), 0);
1848 if (size > 0) {
1849 qemu_send_packet(s->vc, buf, size);
1850 }
1851 }
1852
1853 static ssize_t vde_receive(VLANClientState *vc, const uint8_t *buf, size_t size)
1854 {
1855 VDEState *s = vc->opaque;
1856 ssize_t ret;
1857
1858 do {
1859 ret = vde_send(s->vde, (const char *)buf, size, 0);
1860 } while (ret < 0 && errno == EINTR);
1861
1862 return ret;
1863 }
1864
1865 static void vde_cleanup(VLANClientState *vc)
1866 {
1867 VDEState *s = vc->opaque;
1868 qemu_set_fd_handler(vde_datafd(s->vde), NULL, NULL, NULL);
1869 vde_close(s->vde);
1870 qemu_free(s);
1871 }
1872
1873 static int net_vde_init(VLANState *vlan, const char *model,
1874 const char *name, const char *sock,
1875 int port, const char *group, int mode)
1876 {
1877 VDEState *s;
1878 char *init_group = (char *)group;
1879 char *init_sock = (char *)sock;
1880
1881 struct vde_open_args args = {
1882 .port = port,
1883 .group = init_group,
1884 .mode = mode,
1885 };
1886
1887 s = qemu_mallocz(sizeof(VDEState));
1888 s->vde = vde_open(init_sock, (char *)"QEMU", &args);
1889 if (!s->vde){
1890 free(s);
1891 return -1;
1892 }
1893 s->vc = qemu_new_vlan_client(NET_CLIENT_TYPE_VDE,
1894 vlan, NULL, model, name, NULL,
1895 vde_receive, NULL,
1896 vde_cleanup, s);
1897 qemu_set_fd_handler(vde_datafd(s->vde), vde_to_qemu, NULL, s);
1898 snprintf(s->vc->info_str, sizeof(s->vc->info_str), "sock=%s,fd=%d",
1899 sock, vde_datafd(s->vde));
1900 return 0;
1901 }
1902 #endif
1903
1904 /* network connection */
1905 typedef struct NetSocketState {
1906 VLANClientState *vc;
1907 int fd;
1908 int state; /* 0 = getting length, 1 = getting data */
1909 unsigned int index;
1910 unsigned int packet_len;
1911 uint8_t buf[4096];
1912 struct sockaddr_in dgram_dst; /* contains inet host and port destination iff connectionless (SOCK_DGRAM) */
1913 } NetSocketState;
1914
1915 typedef struct NetSocketListenState {
1916 VLANState *vlan;
1917 char *model;
1918 char *name;
1919 int fd;
1920 } NetSocketListenState;
1921
1922 /* XXX: we consider we can send the whole packet without blocking */
1923 static ssize_t net_socket_receive(VLANClientState *vc, const uint8_t *buf, size_t size)
1924 {
1925 NetSocketState *s = vc->opaque;
1926 uint32_t len;
1927 len = htonl(size);
1928
1929 send_all(s->fd, (const uint8_t *)&len, sizeof(len));
1930 return send_all(s->fd, buf, size);
1931 }
1932
1933 static ssize_t net_socket_receive_dgram(VLANClientState *vc, const uint8_t *buf, size_t size)
1934 {
1935 NetSocketState *s = vc->opaque;
1936
1937 return sendto(s->fd, (const void *)buf, size, 0,
1938 (struct sockaddr *)&s->dgram_dst, sizeof(s->dgram_dst));
1939 }
1940
1941 static void net_socket_send(void *opaque)
1942 {
1943 NetSocketState *s = opaque;
1944 int size, err;
1945 unsigned l;
1946 uint8_t buf1[4096];
1947 const uint8_t *buf;
1948
1949 size = recv(s->fd, (void *)buf1, sizeof(buf1), 0);
1950 if (size < 0) {
1951 err = socket_error();
1952 if (err != EWOULDBLOCK)
1953 goto eoc;
1954 } else if (size == 0) {
1955 /* end of connection */
1956 eoc:
1957 qemu_set_fd_handler(s->fd, NULL, NULL, NULL);
1958 closesocket(s->fd);
1959 return;
1960 }
1961 buf = buf1;
1962 while (size > 0) {
1963 /* reassemble a packet from the network */
1964 switch(s->state) {
1965 case 0:
1966 l = 4 - s->index;
1967 if (l > size)
1968 l = size;
1969 memcpy(s->buf + s->index, buf, l);
1970 buf += l;
1971 size -= l;
1972 s->index += l;
1973 if (s->index == 4) {
1974 /* got length */
1975 s->packet_len = ntohl(*(uint32_t *)s->buf);
1976 s->index = 0;
1977 s->state = 1;
1978 }
1979 break;
1980 case 1:
1981 l = s->packet_len - s->index;
1982 if (l > size)
1983 l = size;
1984 if (s->index + l <= sizeof(s->buf)) {
1985 memcpy(s->buf + s->index, buf, l);
1986 } else {
1987 fprintf(stderr, "serious error: oversized packet received,"
1988 "connection terminated.\n");
1989 s->state = 0;
1990 goto eoc;
1991 }
1992
1993 s->index += l;
1994 buf += l;
1995 size -= l;
1996 if (s->index >= s->packet_len) {
1997 qemu_send_packet(s->vc, s->buf, s->packet_len);
1998 s->index = 0;
1999 s->state = 0;
2000 }
2001 break;
2002 }
2003 }
2004 }
2005
2006 static void net_socket_send_dgram(void *opaque)
2007 {
2008 NetSocketState *s = opaque;
2009 int size;
2010
2011 size = recv(s->fd, (void *)s->buf, sizeof(s->buf), 0);
2012 if (size < 0)
2013 return;
2014 if (size == 0) {
2015 /* end of connection */
2016 qemu_set_fd_handler(s->fd, NULL, NULL, NULL);
2017 return;
2018 }
2019 qemu_send_packet(s->vc, s->buf, size);
2020 }
2021
2022 static int net_socket_mcast_create(struct sockaddr_in *mcastaddr)
2023 {
2024 struct ip_mreq imr;
2025 int fd;
2026 int val, ret;
2027 if (!IN_MULTICAST(ntohl(mcastaddr->sin_addr.s_addr))) {
2028 fprintf(stderr, "qemu: error: specified mcastaddr \"%s\" (0x%08x) does not contain a multicast address\n",
2029 inet_ntoa(mcastaddr->sin_addr),
2030 (int)ntohl(mcastaddr->sin_addr.s_addr));
2031 return -1;
2032
2033 }
2034 fd = socket(PF_INET, SOCK_DGRAM, 0);
2035 if (fd < 0) {
2036 perror("socket(PF_INET, SOCK_DGRAM)");
2037 return -1;
2038 }
2039
2040 val = 1;
2041 ret=setsockopt(fd, SOL_SOCKET, SO_REUSEADDR,
2042 (const char *)&val, sizeof(val));
2043 if (ret < 0) {
2044 perror("setsockopt(SOL_SOCKET, SO_REUSEADDR)");
2045 goto fail;
2046 }
2047
2048 ret = bind(fd, (struct sockaddr *)mcastaddr, sizeof(*mcastaddr));
2049 if (ret < 0) {
2050 perror("bind");
2051 goto fail;
2052 }
2053
2054 /* Add host to multicast group */
2055 imr.imr_multiaddr = mcastaddr->sin_addr;
2056 imr.imr_interface.s_addr = htonl(INADDR_ANY);
2057
2058 ret = setsockopt(fd, IPPROTO_IP, IP_ADD_MEMBERSHIP,
2059 (const char *)&imr, sizeof(struct ip_mreq));
2060 if (ret < 0) {
2061 perror("setsockopt(IP_ADD_MEMBERSHIP)");
2062 goto fail;
2063 }
2064
2065 /* Force mcast msgs to loopback (eg. several QEMUs in same host */
2066 val = 1;
2067 ret=setsockopt(fd, IPPROTO_IP, IP_MULTICAST_LOOP,
2068 (const char *)&val, sizeof(val));
2069 if (ret < 0) {
2070 perror("setsockopt(SOL_IP, IP_MULTICAST_LOOP)");
2071 goto fail;
2072 }
2073
2074 socket_set_nonblock(fd);
2075 return fd;
2076 fail:
2077 if (fd >= 0)
2078 closesocket(fd);
2079 return -1;
2080 }
2081
2082 static void net_socket_cleanup(VLANClientState *vc)
2083 {
2084 NetSocketState *s = vc->opaque;
2085 qemu_set_fd_handler(s->fd, NULL, NULL, NULL);
2086 close(s->fd);
2087 qemu_free(s);
2088 }
2089
2090 static NetSocketState *net_socket_fd_init_dgram(VLANState *vlan,
2091 const char *model,
2092 const char *name,
2093 int fd, int is_connected)
2094 {
2095 struct sockaddr_in saddr;
2096 int newfd;
2097 socklen_t saddr_len;
2098 NetSocketState *s;
2099
2100 /* fd passed: multicast: "learn" dgram_dst address from bound address and save it
2101 * Because this may be "shared" socket from a "master" process, datagrams would be recv()
2102 * by ONLY ONE process: we must "clone" this dgram socket --jjo
2103 */
2104
2105 if (is_connected) {
2106 if (getsockname(fd, (struct sockaddr *) &saddr, &saddr_len) == 0) {
2107 /* must be bound */
2108 if (saddr.sin_addr.s_addr==0) {
2109 fprintf(stderr, "qemu: error: init_dgram: fd=%d unbound, cannot setup multicast dst addr\n",
2110 fd);
2111 return NULL;
2112 }
2113 /* clone dgram socket */
2114 newfd = net_socket_mcast_create(&saddr);
2115 if (newfd < 0) {
2116 /* error already reported by net_socket_mcast_create() */
2117 close(fd);
2118 return NULL;
2119 }
2120 /* clone newfd to fd, close newfd */
2121 dup2(newfd, fd);
2122 close(newfd);
2123
2124 } else {
2125 fprintf(stderr, "qemu: error: init_dgram: fd=%d failed getsockname(): %s\n",
2126 fd, strerror(errno));
2127 return NULL;
2128 }
2129 }
2130
2131 s = qemu_mallocz(sizeof(NetSocketState));
2132 s->fd = fd;
2133
2134 s->vc = qemu_new_vlan_client(NET_CLIENT_TYPE_SOCKET,
2135 vlan, NULL, model, name, NULL,
2136 net_socket_receive_dgram, NULL,
2137 net_socket_cleanup, s);
2138 qemu_set_fd_handler(s->fd, net_socket_send_dgram, NULL, s);
2139
2140 /* mcast: save bound address as dst */
2141 if (is_connected) s->dgram_dst=saddr;
2142
2143 snprintf(s->vc->info_str, sizeof(s->vc->info_str),
2144 "socket: fd=%d (%s mcast=%s:%d)",
2145 fd, is_connected? "cloned" : "",
2146 inet_ntoa(saddr.sin_addr), ntohs(saddr.sin_port));
2147 return s;
2148 }
2149
2150 static void net_socket_connect(void *opaque)
2151 {
2152 NetSocketState *s = opaque;
2153 qemu_set_fd_handler(s->fd, net_socket_send, NULL, s);
2154 }
2155
2156 static NetSocketState *net_socket_fd_init_stream(VLANState *vlan,
2157 const char *model,
2158 const char *name,
2159 int fd, int is_connected)
2160 {
2161 NetSocketState *s;
2162 s = qemu_mallocz(sizeof(NetSocketState));
2163 s->fd = fd;
2164 s->vc = qemu_new_vlan_client(NET_CLIENT_TYPE_SOCKET,
2165 vlan, NULL, model, name, NULL,
2166 net_socket_receive, NULL,
2167 net_socket_cleanup, s);
2168 snprintf(s->vc->info_str, sizeof(s->vc->info_str),
2169 "socket: fd=%d", fd);
2170 if (is_connected) {
2171 net_socket_connect(s);
2172 } else {
2173 qemu_set_fd_handler(s->fd, NULL, net_socket_connect, s);
2174 }
2175 return s;
2176 }
2177
2178 static NetSocketState *net_socket_fd_init(VLANState *vlan,
2179 const char *model, const char *name,
2180 int fd, int is_connected)
2181 {
2182 int so_type = -1, optlen=sizeof(so_type);
2183
2184 if(getsockopt(fd, SOL_SOCKET, SO_TYPE, (char *)&so_type,
2185 (socklen_t *)&optlen)< 0) {
2186 fprintf(stderr, "qemu: error: getsockopt(SO_TYPE) for fd=%d failed\n", fd);
2187 return NULL;
2188 }
2189 switch(so_type) {
2190 case SOCK_DGRAM:
2191 return net_socket_fd_init_dgram(vlan, model, name, fd, is_connected);
2192 case SOCK_STREAM:
2193 return net_socket_fd_init_stream(vlan, model, name, fd, is_connected);
2194 default:
2195 /* who knows ... this could be a eg. a pty, do warn and continue as stream */
2196 fprintf(stderr, "qemu: warning: socket type=%d for fd=%d is not SOCK_DGRAM or SOCK_STREAM\n", so_type, fd);
2197 return net_socket_fd_init_stream(vlan, model, name, fd, is_connected);
2198 }
2199 return NULL;
2200 }
2201
2202 static void net_socket_accept(void *opaque)
2203 {
2204 NetSocketListenState *s = opaque;
2205 NetSocketState *s1;
2206 struct sockaddr_in saddr;
2207 socklen_t len;
2208 int fd;
2209
2210 for(;;) {
2211 len = sizeof(saddr);
2212 fd = accept(s->fd, (struct sockaddr *)&saddr, &len);
2213 if (fd < 0 && errno != EINTR) {
2214 return;
2215 } else if (fd >= 0) {
2216 break;
2217 }
2218 }
2219 s1 = net_socket_fd_init(s->vlan, s->model, s->name, fd, 1);
2220 if (!s1) {
2221 closesocket(fd);
2222 } else {
2223 snprintf(s1->vc->info_str, sizeof(s1->vc->info_str),
2224 "socket: connection from %s:%d",
2225 inet_ntoa(saddr.sin_addr), ntohs(saddr.sin_port));
2226 }
2227 }
2228
2229 static int net_socket_listen_init(VLANState *vlan,
2230 const char *model,
2231 const char *name,
2232 const char *host_str)
2233 {
2234 NetSocketListenState *s;
2235 int fd, val, ret;
2236 struct sockaddr_in saddr;
2237
2238 if (parse_host_port(&saddr, host_str) < 0)
2239 return -1;
2240
2241 s = qemu_mallocz(sizeof(NetSocketListenState));
2242
2243 fd = socket(PF_INET, SOCK_STREAM, 0);
2244 if (fd < 0) {
2245 perror("socket");
2246 return -1;
2247 }
2248 socket_set_nonblock(fd);
2249
2250 /* allow fast reuse */
2251 val = 1;
2252 setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, (const char *)&val, sizeof(val));
2253
2254 ret = bind(fd, (struct sockaddr *)&saddr, sizeof(saddr));
2255 if (ret < 0) {
2256 perror("bind");
2257 return -1;
2258 }
2259 ret = listen(fd, 0);
2260 if (ret < 0) {
2261 perror("listen");
2262 return -1;
2263 }
2264 s->vlan = vlan;
2265 s->model = qemu_strdup(model);
2266 s->name = name ? qemu_strdup(name) : NULL;
2267 s->fd = fd;
2268 qemu_set_fd_handler(fd, net_socket_accept, NULL, s);
2269 return 0;
2270 }
2271
2272 static int net_socket_connect_init(VLANState *vlan,
2273 const char *model,
2274 const char *name,
2275 const char *host_str)
2276 {
2277 NetSocketState *s;
2278 int fd, connected, ret, err;
2279 struct sockaddr_in saddr;
2280
2281 if (parse_host_port(&saddr, host_str) < 0)
2282 return -1;
2283
2284 fd = socket(PF_INET, SOCK_STREAM, 0);
2285 if (fd < 0) {
2286 perror("socket");
2287 return -1;
2288 }
2289 socket_set_nonblock(fd);
2290
2291 connected = 0;
2292 for(;;) {
2293 ret = connect(fd, (struct sockaddr *)&saddr, sizeof(saddr));
2294 if (ret < 0) {
2295 err = socket_error();
2296 if (err == EINTR || err == EWOULDBLOCK) {
2297 } else if (err == EINPROGRESS) {
2298 break;
2299 #ifdef _WIN32
2300 } else if (err == WSAEALREADY) {
2301 break;
2302 #endif
2303 } else {
2304 perror("connect");
2305 closesocket(fd);
2306 return -1;
2307 }
2308 } else {
2309 connected = 1;
2310 break;
2311 }
2312 }
2313 s = net_socket_fd_init(vlan, model, name, fd, connected);
2314 if (!s)
2315 return -1;
2316 snprintf(s->vc->info_str, sizeof(s->vc->info_str),
2317 "socket: connect to %s:%d",
2318 inet_ntoa(saddr.sin_addr), ntohs(saddr.sin_port));
2319 return 0;
2320 }
2321
2322 static int net_socket_mcast_init(VLANState *vlan,
2323 const char *model,
2324 const char *name,
2325 const char *host_str)
2326 {
2327 NetSocketState *s;
2328 int fd;
2329 struct sockaddr_in saddr;
2330
2331 if (parse_host_port(&saddr, host_str) < 0)
2332 return -1;
2333
2334
2335 fd = net_socket_mcast_create(&saddr);
2336 if (fd < 0)
2337 return -1;
2338
2339 s = net_socket_fd_init(vlan, model, name, fd, 0);
2340 if (!s)
2341 return -1;
2342
2343 s->dgram_dst = saddr;
2344
2345 snprintf(s->vc->info_str, sizeof(s->vc->info_str),
2346 "socket: mcast=%s:%d",
2347 inet_ntoa(saddr.sin_addr), ntohs(saddr.sin_port));
2348 return 0;
2349
2350 }
2351
2352 typedef struct DumpState {
2353 VLANClientState *pcap_vc;
2354 int fd;
2355 int pcap_caplen;
2356 } DumpState;
2357
2358 #define PCAP_MAGIC 0xa1b2c3d4
2359
2360 struct pcap_file_hdr {
2361 uint32_t magic;
2362 uint16_t version_major;
2363 uint16_t version_minor;
2364 int32_t thiszone;
2365 uint32_t sigfigs;
2366 uint32_t snaplen;
2367 uint32_t linktype;
2368 };
2369
2370 struct pcap_sf_pkthdr {
2371 struct {
2372 int32_t tv_sec;
2373 int32_t tv_usec;
2374 } ts;
2375 uint32_t caplen;
2376 uint32_t len;
2377 };
2378
2379 static ssize_t dump_receive(VLANClientState *vc, const uint8_t *buf, size_t size)
2380 {
2381 DumpState *s = vc->opaque;
2382 struct pcap_sf_pkthdr hdr;
2383 int64_t ts;
2384 int caplen;
2385
2386 /* Early return in case of previous error. */
2387 if (s->fd < 0) {
2388 return size;
2389 }
2390
2391 ts = muldiv64(qemu_get_clock(vm_clock), 1000000, get_ticks_per_sec());
2392 caplen = size > s->pcap_caplen ? s->pcap_caplen : size;
2393
2394 hdr.ts.tv_sec = ts / 1000000;
2395 hdr.ts.tv_usec = ts % 1000000;
2396 hdr.caplen = caplen;
2397 hdr.len = size;
2398 if (write(s->fd, &hdr, sizeof(hdr)) != sizeof(hdr) ||
2399 write(s->fd, buf, caplen) != caplen) {
2400 qemu_log("-net dump write error - stop dump\n");
2401 close(s->fd);
2402 s->fd = -1;
2403 }
2404
2405 return size;
2406 }
2407
2408 static void net_dump_cleanup(VLANClientState *vc)
2409 {
2410 DumpState *s = vc->opaque;
2411
2412 close(s->fd);
2413 qemu_free(s);
2414 }
2415
2416 static int net_dump_init(VLANState *vlan, const char *device,
2417 const char *name, const char *filename, int len)
2418 {
2419 struct pcap_file_hdr hdr;
2420 DumpState *s;
2421
2422 s = qemu_malloc(sizeof(DumpState));
2423
2424 s->fd = open(filename, O_CREAT | O_WRONLY | O_BINARY, 0644);
2425 if (s->fd < 0) {
2426 qemu_error("-net dump: can't open %s\n", filename);
2427 return -1;
2428 }
2429
2430 s->pcap_caplen = len;
2431
2432 hdr.magic = PCAP_MAGIC;
2433 hdr.version_major = 2;
2434 hdr.version_minor = 4;
2435 hdr.thiszone = 0;
2436 hdr.sigfigs = 0;
2437 hdr.snaplen = s->pcap_caplen;
2438 hdr.linktype = 1;
2439
2440 if (write(s->fd, &hdr, sizeof(hdr)) < sizeof(hdr)) {
2441 qemu_error("-net dump write error: %s\n", strerror(errno));
2442 close(s->fd);
2443 qemu_free(s);
2444 return -1;
2445 }
2446
2447 s->pcap_vc = qemu_new_vlan_client(NET_CLIENT_TYPE_DUMP,
2448 vlan, NULL, device, name, NULL,
2449 dump_receive, NULL,
2450 net_dump_cleanup, s);
2451 snprintf(s->pcap_vc->info_str, sizeof(s->pcap_vc->info_str),
2452 "dump to %s (len=%d)", filename, len);
2453 return 0;
2454 }
2455
2456 /* find or alloc a new VLAN */
2457 VLANState *qemu_find_vlan(int id, int allocate)
2458 {
2459 VLANState *vlan;
2460
2461 QTAILQ_FOREACH(vlan, &vlans, next) {
2462 if (vlan->id == id) {
2463 return vlan;
2464 }
2465 }
2466
2467 if (!allocate) {
2468 return NULL;
2469 }
2470
2471 vlan = qemu_mallocz(sizeof(VLANState));
2472 vlan->id = id;
2473 QTAILQ_INIT(&vlan->clients);
2474
2475 vlan->send_queue = qemu_new_net_queue(qemu_vlan_deliver_packet,
2476 qemu_vlan_deliver_packet_iov,
2477 vlan);
2478
2479 QTAILQ_INSERT_TAIL(&vlans, vlan, next);
2480
2481 return vlan;
2482 }
2483
2484 VLANClientState *qemu_find_netdev(const char *id)
2485 {
2486 VLANClientState *vc;
2487
2488 QTAILQ_FOREACH(vc, &non_vlan_clients, next) {
2489 if (!strcmp(vc->name, id)) {
2490 return vc;
2491 }
2492 }
2493
2494 return NULL;
2495 }
2496
2497 static int nic_get_free_idx(void)
2498 {
2499 int index;
2500
2501 for (index = 0; index < MAX_NICS; index++)
2502 if (!nd_table[index].used)
2503 return index;
2504 return -1;
2505 }
2506
2507 int qemu_show_nic_models(const char *arg, const char *const *models)
2508 {
2509 int i;
2510
2511 if (!arg || strcmp(arg, "?"))
2512 return 0;
2513
2514 fprintf(stderr, "qemu: Supported NIC models: ");
2515 for (i = 0 ; models[i]; i++)
2516 fprintf(stderr, "%s%c", models[i], models[i+1] ? ',' : '\n');
2517 return 1;
2518 }
2519
2520 void qemu_check_nic_model(NICInfo *nd, const char *model)
2521 {
2522 const char *models[2];
2523
2524 models[0] = model;
2525 models[1] = NULL;
2526
2527 if (qemu_show_nic_models(nd->model, models))
2528 exit(0);
2529 if (qemu_find_nic_model(nd, models, model) < 0)
2530 exit(1);
2531 }
2532
2533 int qemu_find_nic_model(NICInfo *nd, const char * const *models,
2534 const char *default_model)
2535 {
2536 int i;
2537
2538 if (!nd->model)
2539 nd->model = qemu_strdup(default_model);
2540
2541 for (i = 0 ; models[i]; i++) {
2542 if (strcmp(nd->model, models[i]) == 0)
2543 return i;
2544 }
2545
2546 qemu_error("qemu: Unsupported NIC model: %s\n", nd->model);
2547 return -1;
2548 }
2549
2550 static int net_handle_fd_param(Monitor *mon, const char *param)
2551 {
2552 if (!qemu_isdigit(param[0])) {
2553 int fd;
2554
2555 fd = monitor_get_fd(mon, param);
2556 if (fd == -1) {
2557 qemu_error("No file descriptor named %s found", param);
2558 return -1;
2559 }
2560
2561 return fd;
2562 } else {
2563 return strtol(param, NULL, 0);
2564 }
2565 }
2566
2567 static int net_init_nic(QemuOpts *opts,
2568 Monitor *mon,
2569 const char *name,
2570 VLANState *vlan)
2571 {
2572 int idx;
2573 NICInfo *nd;
2574 const char *netdev;
2575
2576 idx = nic_get_free_idx();
2577 if (idx == -1 || nb_nics >= MAX_NICS) {
2578 qemu_error("Too Many NICs\n");
2579 return -1;
2580 }
2581
2582 nd = &nd_table[idx];
2583
2584 memset(nd, 0, sizeof(*nd));
2585
2586 if ((netdev = qemu_opt_get(opts, "netdev"))) {
2587 nd->netdev = qemu_find_netdev(netdev);
2588 if (!nd->netdev) {
2589 qemu_error("netdev '%s' not found\n", netdev);
2590 return -1;
2591 }
2592 } else {
2593 assert(vlan);
2594 nd->vlan = vlan;
2595 }
2596 if (name) {
2597 nd->name = qemu_strdup(name);
2598 }
2599 if (qemu_opt_get(opts, "model")) {
2600 nd->model = qemu_strdup(qemu_opt_get(opts, "model"));
2601 }
2602 if (qemu_opt_get(opts, "addr")) {
2603 nd->devaddr = qemu_strdup(qemu_opt_get(opts, "addr"));
2604 }
2605
2606 nd->macaddr[0] = 0x52;
2607 nd->macaddr[1] = 0x54;
2608 nd->macaddr[2] = 0x00;
2609 nd->macaddr[3] = 0x12;
2610 nd->macaddr[4] = 0x34;
2611 nd->macaddr[5] = 0x56 + idx;
2612
2613 if (qemu_opt_get(opts, "macaddr") &&
2614 parse_macaddr(nd->macaddr, qemu_opt_get(opts, "macaddr")) < 0) {
2615 qemu_error("invalid syntax for ethernet address\n");
2616 return -1;
2617 }
2618
2619 nd->nvectors = qemu_opt_get_number(opts, "vectors", NIC_NVECTORS_UNSPECIFIED);
2620 if (nd->nvectors != NIC_NVECTORS_UNSPECIFIED &&
2621 (nd->nvectors < 0 || nd->nvectors > 0x7ffffff)) {
2622 qemu_error("invalid # of vectors: %d\n", nd->nvectors);
2623 return -1;
2624 }
2625
2626 nd->used = 1;
2627 if (vlan) {
2628 nd->vlan->nb_guest_devs++;
2629 }
2630 nb_nics++;
2631
2632 return idx;
2633 }
2634
2635 #if defined(CONFIG_SLIRP)
2636 static int net_init_slirp_configs(const char *name, const char *value, void *opaque)
2637 {
2638 struct slirp_config_str *config;
2639
2640 if (strcmp(name, "hostfwd") != 0 && strcmp(name, "guestfwd") != 0) {
2641 return 0;
2642 }
2643
2644 config = qemu_mallocz(sizeof(*config));
2645
2646 pstrcpy(config->str, sizeof(config->str), value);
2647
2648 if (!strcmp(name, "hostfwd")) {
2649 config->flags = SLIRP_CFG_HOSTFWD;
2650 }
2651
2652 config->next = slirp_configs;
2653 slirp_configs = config;
2654
2655 return 0;
2656 }
2657
2658 static int net_init_slirp(QemuOpts *opts,
2659 Monitor *mon,
2660 const char *name,
2661 VLANState *vlan)
2662 {
2663 struct slirp_config_str *config;
2664 const char *vhost;
2665 const char *vhostname;
2666 const char *vdhcp_start;
2667 const char *vnamesrv;
2668 const char *tftp_export;
2669 const char *bootfile;
2670 const char *smb_export;
2671 const char *vsmbsrv;
2672 char *vnet = NULL;
2673 int restricted = 0;
2674 int ret;
2675
2676 vhost = qemu_opt_get(opts, "host");
2677 vhostname = qemu_opt_get(opts, "hostname");
2678 vdhcp_start = qemu_opt_get(opts, "dhcpstart");
2679 vnamesrv = qemu_opt_get(opts, "dns");
2680 tftp_export = qemu_opt_get(opts, "tftp");
2681 bootfile = qemu_opt_get(opts, "bootfile");
2682 smb_export = qemu_opt_get(opts, "smb");
2683 vsmbsrv = qemu_opt_get(opts, "smbserver");
2684
2685 if (qemu_opt_get(opts, "ip")) {
2686 const char *ip = qemu_opt_get(opts, "ip");
2687 int l = strlen(ip) + strlen("/24") + 1;
2688
2689 vnet = qemu_malloc(l);
2690
2691 /* emulate legacy ip= parameter */
2692 pstrcpy(vnet, l, ip);
2693 pstrcat(vnet, l, "/24");
2694 }
2695
2696 if (qemu_opt_get(opts, "net")) {
2697 if (vnet) {
2698 qemu_free(vnet);
2699 }
2700 vnet = qemu_strdup(qemu_opt_get(opts, "net"));
2701 }
2702
2703 if (qemu_opt_get(opts, "restrict") &&
2704 qemu_opt_get(opts, "restrict")[0] == 'y') {
2705 restricted = 1;
2706 }
2707
2708 qemu_opt_foreach(opts, net_init_slirp_configs, NULL, 0);
2709
2710 ret = net_slirp_init(vlan, "user", name, restricted, vnet, vhost,
2711 vhostname, tftp_export, bootfile, vdhcp_start,
2712 vnamesrv, smb_export, vsmbsrv);
2713
2714 while (slirp_configs) {
2715 config = slirp_configs;
2716 slirp_configs = config->next;
2717 qemu_free(config);
2718 }
2719
2720 if (ret != -1 && vlan) {
2721 vlan->nb_host_devs++;
2722 }
2723
2724 qemu_free(vnet);
2725
2726 return ret;
2727 }
2728 #endif /* CONFIG_SLIRP */
2729
2730 #ifdef _WIN32
2731 static int net_init_tap_win32(QemuOpts *opts,
2732 Monitor *mon,
2733 const char *name,
2734 VLANState *vlan)
2735 {
2736 const char *ifname;
2737
2738 ifname = qemu_opt_get(opts, "ifname");
2739
2740 if (!ifname) {
2741 qemu_error("tap: no interface name\n");
2742 return -1;
2743 }
2744
2745 if (tap_win32_init(vlan, "tap", name, ifname) == -1) {
2746 return -1;
2747 }
2748
2749 if (vlan) {
2750 vlan->nb_host_devs++;
2751 }
2752
2753 return 0;
2754 }
2755 #elif !defined(_AIX)
2756 static int net_init_tap(QemuOpts *opts,
2757 Monitor *mon,
2758 const char *name,
2759 VLANState *vlan)
2760 {
2761 TAPState *s;
2762 int fd, vnet_hdr;
2763
2764 if (qemu_opt_get(opts, "fd")) {
2765 if (qemu_opt_get(opts, "ifname") ||
2766 qemu_opt_get(opts, "script") ||
2767 qemu_opt_get(opts, "downscript") ||
2768 qemu_opt_get(opts, "vnet_hdr")) {
2769 qemu_error("ifname=, script=, downscript= and vnet_hdr= is invalid with fd=\n");
2770 return -1;
2771 }
2772
2773 fd = net_handle_fd_param(mon, qemu_opt_get(opts, "fd"));
2774 if (fd == -1) {
2775 return -1;
2776 }
2777
2778 fcntl(fd, F_SETFL, O_NONBLOCK);
2779
2780 vnet_hdr = tap_probe_vnet_hdr(fd);
2781 } else {
2782 if (!qemu_opt_get(opts, "script")) {
2783 qemu_opt_set(opts, "script", DEFAULT_NETWORK_SCRIPT);
2784 }
2785
2786 if (!qemu_opt_get(opts, "downscript")) {
2787 qemu_opt_set(opts, "downscript", DEFAULT_NETWORK_DOWN_SCRIPT);
2788 }
2789
2790 fd = net_tap_init(opts, &vnet_hdr);
2791 }
2792
2793 s = net_tap_fd_init(vlan, "tap", name, fd, vnet_hdr);
2794 if (!s) {
2795 close(fd);
2796 return -1;
2797 }
2798
2799 if (tap_set_sndbuf(s, opts) < 0) {
2800 return -1;
2801 }
2802
2803 if (qemu_opt_get(opts, "fd")) {
2804 snprintf(s->vc->info_str, sizeof(s->vc->info_str), "fd=%d", fd);
2805 } else {
2806 const char *ifname, *script, *downscript;
2807
2808 ifname = qemu_opt_get(opts, "ifname");
2809 script = qemu_opt_get(opts, "script");
2810 downscript = qemu_opt_get(opts, "downscript");
2811
2812 snprintf(s->vc->info_str, sizeof(s->vc->info_str),
2813 "ifname=%s,script=%s,downscript=%s",
2814 ifname, script, downscript);
2815
2816 if (strcmp(downscript, "no") != 0) {
2817 snprintf(s->down_script, sizeof(s->down_script), "%s", downscript);
2818 snprintf(s->down_script_arg, sizeof(s->down_script_arg), "%s", ifname);
2819 }
2820 }
2821
2822 if (vlan) {
2823 vlan->nb_host_devs++;
2824 }
2825
2826 return 0;
2827 }
2828 #endif
2829
2830 static int net_init_socket(QemuOpts *opts,
2831 Monitor *mon,
2832 const char *name,
2833 VLANState *vlan)
2834 {
2835 if (qemu_opt_get(opts, "fd")) {
2836 int fd;
2837
2838 if (qemu_opt_get(opts, "listen") ||
2839 qemu_opt_get(opts, "connect") ||
2840 qemu_opt_get(opts, "mcast")) {
2841 qemu_error("listen=, connect= and mcast= is invalid with fd=\n");
2842 return -1;
2843 }
2844
2845 fd = net_handle_fd_param(mon, qemu_opt_get(opts, "fd"));
2846 if (fd == -1) {
2847 return -1;
2848 }
2849
2850 if (!net_socket_fd_init(vlan, "socket", name, fd, 1)) {
2851 close(fd);
2852 return -1;
2853 }
2854 } else if (qemu_opt_get(opts, "listen")) {
2855 const char *listen;
2856
2857 if (qemu_opt_get(opts, "fd") ||
2858 qemu_opt_get(opts, "connect") ||
2859 qemu_opt_get(opts, "mcast")) {
2860 qemu_error("fd=, connect= and mcast= is invalid with listen=\n");
2861 return -1;
2862 }
2863
2864 listen = qemu_opt_get(opts, "listen");
2865
2866 if (net_socket_listen_init(vlan, "socket", name, listen) == -1) {
2867 return -1;
2868 }
2869 } else if (qemu_opt_get(opts, "connect")) {
2870 const char *connect;
2871
2872 if (qemu_opt_get(opts, "fd") ||
2873 qemu_opt_get(opts, "listen") ||
2874 qemu_opt_get(opts, "mcast")) {
2875 qemu_error("fd=, listen= and mcast= is invalid with connect=\n");
2876 return -1;
2877 }
2878
2879 connect = qemu_opt_get(opts, "connect");
2880
2881 if (net_socket_connect_init(vlan, "socket", name, connect) == -1) {
2882 return -1;
2883 }
2884 } else if (qemu_opt_get(opts, "mcast")) {
2885 const char *mcast;
2886
2887 if (qemu_opt_get(opts, "fd") ||
2888 qemu_opt_get(opts, "connect") ||
2889 qemu_opt_get(opts, "listen")) {
2890 qemu_error("fd=, connect= and listen= is invalid with mcast=\n");
2891 return -1;
2892 }
2893
2894 mcast = qemu_opt_get(opts, "mcast");
2895
2896 if (net_socket_mcast_init(vlan, "socket", name, mcast) == -1) {
2897 return -1;
2898 }
2899 } else {
2900 qemu_error("-socket requires fd=, listen=, connect= or mcast=\n");
2901 return -1;
2902 }
2903
2904 if (vlan) {
2905 vlan->nb_host_devs++;
2906 }
2907
2908 return 0;
2909 }
2910
2911 #ifdef CONFIG_VDE
2912 static int net_init_vde(QemuOpts *opts,
2913 Monitor *mon,
2914 const char *name,
2915 VLANState *vlan)
2916 {
2917 const char *sock;
2918 const char *group;
2919 int port, mode;
2920
2921 sock = qemu_opt_get(opts, "sock");
2922 group = qemu_opt_get(opts, "group");
2923
2924 port = qemu_opt_get_number(opts, "port", 0);
2925 mode = qemu_opt_get_number(opts, "mode", 0700);
2926
2927 if (net_vde_init(vlan, "vde", name, sock, port, group, mode) == -1) {
2928 return -1;
2929 }
2930
2931 if (vlan) {
2932 vlan->nb_host_devs++;
2933 }
2934
2935 return 0;
2936 }
2937 #endif
2938
2939 static int net_init_dump(QemuOpts *opts,
2940 Monitor *mon,
2941 const char *name,
2942 VLANState *vlan)
2943 {
2944 int len;
2945 const char *file;
2946 char def_file[128];
2947
2948 assert(vlan);
2949
2950 file = qemu_opt_get(opts, "file");
2951 if (!file) {
2952 snprintf(def_file, sizeof(def_file), "qemu-vlan%d.pcap", vlan->id);
2953 file = def_file;
2954 }
2955
2956 len = qemu_opt_get_size(opts, "len", 65536);
2957
2958 return net_dump_init(vlan, "dump", name, file, len);
2959 }
2960
2961 #define NET_COMMON_PARAMS_DESC \
2962 { \
2963 .name = "type", \
2964 .type = QEMU_OPT_STRING, \
2965 .help = "net client type (nic, tap etc.)", \
2966 }, { \
2967 .name = "vlan", \
2968 .type = QEMU_OPT_NUMBER, \
2969 .help = "vlan number", \
2970 }, { \
2971 .name = "name", \
2972 .type = QEMU_OPT_STRING, \
2973 .help = "identifier for monitor commands", \
2974 }
2975
2976 typedef int (*net_client_init_func)(QemuOpts *opts,
2977 Monitor *mon,
2978 const char *name,
2979 VLANState *vlan);
2980
2981 /* magic number, but compiler will warn if too small */
2982 #define NET_MAX_DESC 20
2983
2984 static struct {
2985 const char *type;
2986 net_client_init_func init;
2987 QemuOptDesc desc[NET_MAX_DESC];
2988 } net_client_types[] = {
2989 {
2990 .type = "none",
2991 .desc = {
2992 NET_COMMON_PARAMS_DESC,
2993 { /* end of list */ }
2994 },
2995 }, {
2996 .type = "nic",
2997 .init = net_init_nic,
2998 .desc = {
2999 NET_COMMON_PARAMS_DESC,
3000 {
3001 .name = "netdev",
3002 .type = QEMU_OPT_STRING,
3003 .help = "id of -netdev to connect to",
3004 },
3005 {
3006 .name = "macaddr",
3007 .type = QEMU_OPT_STRING,
3008 .help = "MAC address",
3009 }, {
3010 .name = "model",
3011 .type = QEMU_OPT_STRING,
3012 .help = "device model (e1000, rtl8139, virtio etc.)",
3013 }, {
3014 .name = "addr",
3015 .type = QEMU_OPT_STRING,
3016 .help = "PCI device address",
3017 }, {
3018 .name = "vectors",
3019 .type = QEMU_OPT_NUMBER,
3020 .help = "number of MSI-x vectors, 0 to disable MSI-X",
3021 },
3022 { /* end of list */ }
3023 },
3024 #ifdef CONFIG_SLIRP
3025 }, {
3026 .type = "user",
3027 .init = net_init_slirp,
3028 .desc = {
3029 NET_COMMON_PARAMS_DESC,
3030 {
3031 .name = "hostname",
3032 .type = QEMU_OPT_STRING,
3033 .help = "client hostname reported by the builtin DHCP server",
3034 }, {
3035 .name = "restrict",
3036 .type = QEMU_OPT_STRING,
3037 .help = "isolate the guest from the host (y|yes|n|no)",
3038 }, {
3039 .name = "ip",
3040 .type = QEMU_OPT_STRING,
3041 .help = "legacy parameter, use net= instead",
3042 }, {
3043 .name = "net",
3044 .type = QEMU_OPT_STRING,
3045 .help = "IP address and optional netmask",
3046 }, {
3047 .name = "host",
3048 .type = QEMU_OPT_STRING,
3049 .help = "guest-visible address of the host",
3050 }, {
3051 .name = "tftp",
3052 .type = QEMU_OPT_STRING,
3053 .help = "root directory of the built-in TFTP server",
3054 }, {
3055 .name = "bootfile",
3056 .type = QEMU_OPT_STRING,
3057 .help = "BOOTP filename, for use with tftp=",
3058 }, {
3059 .name = "dhcpstart",
3060 .type = QEMU_OPT_STRING,
3061 .help = "the first of the 16 IPs the built-in DHCP server can assign",
3062 }, {
3063 .name = "dns",
3064 .type = QEMU_OPT_STRING,
3065 .help = "guest-visible address of the virtual nameserver",
3066 }, {
3067 .name = "smb",
3068 .type = QEMU_OPT_STRING,
3069 .help = "root directory of the built-in SMB server",
3070 }, {
3071 .name = "smbserver",
3072 .type = QEMU_OPT_STRING,
3073 .help = "IP address of the built-in SMB server",
3074 }, {
3075 .name = "hostfwd",
3076 .type = QEMU_OPT_STRING,
3077 .help = "guest port number to forward incoming TCP or UDP connections",
3078 }, {
3079 .name = "guestfwd",
3080 .type = QEMU_OPT_STRING,
3081 .help = "IP address and port to forward guest TCP connections",
3082 },
3083 { /* end of list */ }
3084 },
3085 #endif
3086 #ifdef _WIN32
3087 }, {
3088 .type = "tap",
3089 .init = net_init_tap_win32,
3090 .desc = {
3091 NET_COMMON_PARAMS_DESC,
3092 {
3093 .name = "ifname",
3094 .type = QEMU_OPT_STRING,
3095 .help = "interface name",
3096 },
3097 { /* end of list */ }
3098 },
3099 #elif !defined(_AIX)
3100 }, {
3101 .type = "tap",
3102 .init = net_init_tap,
3103 .desc = {
3104 NET_COMMON_PARAMS_DESC,
3105 {
3106 .name = "fd",
3107 .type = QEMU_OPT_STRING,
3108 .help = "file descriptor of an already opened tap",
3109 }, {
3110 .name = "ifname",
3111 .type = QEMU_OPT_STRING,
3112 .help = "interface name",
3113 }, {
3114 .name = "script",
3115 .type = QEMU_OPT_STRING,
3116 .help = "script to initialize the interface",
3117 }, {
3118 .name = "downscript",
3119 .type = QEMU_OPT_STRING,
3120 .help = "script to shut down the interface",
3121 }, {
3122 .name = "sndbuf",
3123 .type = QEMU_OPT_SIZE,
3124 .help = "send buffer limit"
3125 }, {
3126 .name = "vnet_hdr",
3127 .type = QEMU_OPT_BOOL,
3128 .help = "enable the IFF_VNET_HDR flag on the tap interface"
3129 },
3130 { /* end of list */ }
3131 },
3132 #endif
3133 }, {
3134 .type = "socket",
3135 .init = net_init_socket,
3136 .desc = {
3137 NET_COMMON_PARAMS_DESC,
3138 {
3139 .name = "fd",
3140 .type = QEMU_OPT_STRING,
3141 .help = "file descriptor of an already opened socket",
3142 }, {
3143 .name = "listen",
3144 .type = QEMU_OPT_STRING,
3145 .help = "port number, and optional hostname, to listen on",
3146 }, {
3147 .name = "connect",
3148 .type = QEMU_OPT_STRING,
3149 .help = "port number, and optional hostname, to connect to",
3150 }, {
3151 .name = "mcast",
3152 .type = QEMU_OPT_STRING,
3153 .help = "UDP multicast address and port number",
3154 },
3155 { /* end of list */ }
3156 },
3157 #ifdef CONFIG_VDE
3158 }, {
3159 .type = "vde",
3160 .init = net_init_vde,
3161 .desc = {
3162 NET_COMMON_PARAMS_DESC,
3163 {
3164 .name = "sock",
3165 .type = QEMU_OPT_STRING,
3166 .help = "socket path",
3167 }, {
3168 .name = "port",
3169 .type = QEMU_OPT_NUMBER,
3170 .help = "port number",
3171 }, {
3172 .name = "group",
3173 .type = QEMU_OPT_STRING,
3174 .help = "group owner of socket",
3175 }, {
3176 .name = "mode",
3177 .type = QEMU_OPT_NUMBER,
3178 .help = "permissions for socket",
3179 },
3180 { /* end of list */ }
3181 },
3182 #endif
3183 }, {
3184 .type = "dump",
3185 .init = net_init_dump,
3186 .desc = {
3187 NET_COMMON_PARAMS_DESC,
3188 {
3189 .name = "len",
3190 .type = QEMU_OPT_SIZE,
3191 .help = "per-packet size limit (64k default)",
3192 }, {
3193 .name = "file",
3194 .type = QEMU_OPT_STRING,
3195 .help = "dump file path (default is qemu-vlan0.pcap)",
3196 },
3197 { /* end of list */ }
3198 },
3199 },
3200 { /* end of list */ }
3201 };
3202
3203 int net_client_init(Monitor *mon, QemuOpts *opts, int is_netdev)
3204 {
3205 const char *name;
3206 const char *type;
3207 int i;
3208
3209 type = qemu_opt_get(opts, "type");
3210 if (!type) {
3211 qemu_error("No type specified for -net\n");
3212 return -1;
3213 }
3214
3215 if (is_netdev) {
3216 if (strcmp(type, "tap") != 0 &&
3217 #ifdef CONFIG_SLIRP
3218 strcmp(type, "user") != 0 &&
3219 #endif
3220 #ifdef CONFIG_VDE
3221 strcmp(type, "vde") != 0 &&
3222 #endif
3223 strcmp(type, "socket") != 0) {
3224 qemu_error("The '%s' network backend type is not valid with -netdev\n",
3225 type);
3226 return -1;
3227 }
3228
3229 if (qemu_opt_get(opts, "vlan")) {
3230 qemu_error("The 'vlan' parameter is not valid with -netdev\n");
3231 return -1;
3232 }
3233 if (qemu_opt_get(opts, "name")) {
3234 qemu_error("The 'name' parameter is not valid with -netdev\n");
3235 return -1;
3236 }
3237 if (!qemu_opts_id(opts)) {
3238 qemu_error("The id= parameter is required with -netdev\n");
3239 return -1;
3240 }
3241 }
3242
3243 name = qemu_opts_id(opts);
3244 if (!name) {
3245 name = qemu_opt_get(opts, "name");
3246 }
3247
3248 for (i = 0; net_client_types[i].type != NULL; i++) {
3249 if (!strcmp(net_client_types[i].type, type)) {
3250 VLANState *vlan = NULL;
3251
3252 if (qemu_opts_validate(opts, &net_client_types[i].desc[0]) == -1) {
3253 return -1;
3254 }
3255
3256 /* Do not add to a vlan if it's a -netdev or a nic with a
3257 * netdev= parameter. */
3258 if (!(is_netdev ||
3259 (strcmp(type, "nic") == 0 && qemu_opt_get(opts, "netdev")))) {
3260 vlan = qemu_find_vlan(qemu_opt_get_number(opts, "vlan", 0), 1);
3261 }
3262
3263 if (net_client_types[i].init) {
3264 return net_client_types[i].init(opts, mon, name, vlan);
3265 } else {
3266 return 0;
3267 }
3268 }
3269 }
3270
3271 qemu_error("Invalid -net type '%s'\n", type);
3272 return -1;
3273 }
3274
3275 void net_client_uninit(NICInfo *nd)
3276 {
3277 if (nd->vlan) {
3278 nd->vlan->nb_guest_devs--;
3279 }
3280 nb_nics--;
3281
3282 qemu_free(nd->model);
3283 qemu_free(nd->name);
3284 qemu_free(nd->devaddr);
3285
3286 nd->used = 0;
3287 }
3288
3289 static int net_host_check_device(const char *device)
3290 {
3291 int i;
3292 const char *valid_param_list[] = { "tap", "socket", "dump"
3293 #ifdef CONFIG_SLIRP
3294 ,"user"
3295 #endif
3296 #ifdef CONFIG_VDE
3297 ,"vde"
3298 #endif
3299 };
3300 for (i = 0; i < sizeof(valid_param_list) / sizeof(char *); i++) {
3301 if (!strncmp(valid_param_list[i], device,
3302 strlen(valid_param_list[i])))
3303 return 1;
3304 }
3305
3306 return 0;
3307 }
3308
3309 void net_host_device_add(Monitor *mon, const QDict *qdict)
3310 {
3311 const char *device = qdict_get_str(qdict, "device");
3312 const char *opts_str = qdict_get_try_str(qdict, "opts");
3313 QemuOpts *opts;
3314
3315 if (!net_host_check_device(device)) {
3316 monitor_printf(mon, "invalid host network device %s\n", device);
3317 return;
3318 }
3319
3320 opts = qemu_opts_parse(&qemu_net_opts, opts_str ? opts_str : "", NULL);
3321 if (!opts) {
3322 monitor_printf(mon, "parsing network options '%s' failed\n",
3323 opts_str ? opts_str : "");
3324 return;
3325 }
3326
3327 qemu_opt_set(opts, "type", device);
3328
3329 if (net_client_init(mon, opts, 0) < 0) {
3330 monitor_printf(mon, "adding host network device %s failed\n", device);
3331 }
3332 }
3333
3334 void net_host_device_remove(Monitor *mon, const QDict *qdict)
3335 {
3336 VLANClientState *vc;
3337 int vlan_id = qdict_get_int(qdict, "vlan_id");
3338 const char *device = qdict_get_str(qdict, "device");
3339
3340 vc = qemu_find_vlan_client_by_name(mon, vlan_id, device);
3341 if (!vc) {
3342 return;
3343 }
3344 if (!net_host_check_device(vc->model)) {
3345 monitor_printf(mon, "invalid host network device %s\n", device);
3346 return;
3347 }
3348 qemu_del_vlan_client(vc);
3349 }
3350
3351 void net_set_boot_mask(int net_boot_mask)
3352 {
3353 int i;
3354
3355 /* Only the first four NICs may be bootable */
3356 net_boot_mask = net_boot_mask & 0xF;
3357
3358 for (i = 0; i < nb_nics; i++) {
3359 if (net_boot_mask & (1 << i)) {
3360 nd_table[i].bootable = 1;
3361 net_boot_mask &= ~(1 << i);
3362 }
3363 }
3364
3365 if (net_boot_mask) {
3366 fprintf(stderr, "Cannot boot from non-existent NIC\n");
3367 exit(1);
3368 }
3369 }
3370
3371 void do_info_network(Monitor *mon)
3372 {
3373 VLANState *vlan;
3374
3375 QTAILQ_FOREACH(vlan, &vlans, next) {
3376 VLANClientState *vc;
3377
3378 monitor_printf(mon, "VLAN %d devices:\n", vlan->id);
3379
3380 QTAILQ_FOREACH(vc, &vlan->clients, next) {
3381 monitor_printf(mon, " %s: %s\n", vc->name, vc->info_str);
3382 }
3383 }
3384 }
3385
3386 void do_set_link(Monitor *mon, const QDict *qdict)
3387 {
3388 VLANState *vlan;
3389 VLANClientState *vc = NULL;
3390 const char *name = qdict_get_str(qdict, "name");
3391 const char *up_or_down = qdict_get_str(qdict, "up_or_down");
3392
3393 QTAILQ_FOREACH(vlan, &vlans, next) {
3394 QTAILQ_FOREACH(vc, &vlan->clients, next) {
3395 if (strcmp(vc->name, name) == 0) {
3396 goto done;
3397 }
3398 }
3399 }
3400 done:
3401
3402 if (!vc) {
3403 monitor_printf(mon, "could not find network device '%s'\n", name);
3404 return;
3405 }
3406
3407 if (strcmp(up_or_down, "up") == 0)
3408 vc->link_down = 0;
3409 else if (strcmp(up_or_down, "down") == 0)
3410 vc->link_down = 1;
3411 else
3412 monitor_printf(mon, "invalid link status '%s'; only 'up' or 'down' "
3413 "valid\n", up_or_down);
3414
3415 if (vc->link_status_changed)
3416 vc->link_status_changed(vc);
3417 }
3418
3419 void net_cleanup(void)
3420 {
3421 VLANState *vlan;
3422 VLANClientState *vc, *next_vc;
3423
3424 QTAILQ_FOREACH(vlan, &vlans, next) {
3425 QTAILQ_FOREACH_SAFE(vc, &vlan->clients, next, next_vc) {
3426 qemu_del_vlan_client(vc);
3427 }
3428 }
3429
3430 QTAILQ_FOREACH_SAFE(vc, &non_vlan_clients, next, next_vc) {
3431 qemu_del_vlan_client(vc);
3432 }
3433 }
3434
3435 static void net_check_clients(void)
3436 {
3437 VLANState *vlan;
3438
3439 QTAILQ_FOREACH(vlan, &vlans, next) {
3440 if (vlan->nb_guest_devs == 0 && vlan->nb_host_devs == 0)
3441 continue;
3442 if (vlan->nb_guest_devs == 0)
3443 fprintf(stderr, "Warning: vlan %d with no nics\n", vlan->id);
3444 if (vlan->nb_host_devs == 0)
3445 fprintf(stderr,
3446 "Warning: vlan %d is not connected to host network\n",
3447 vlan->id);
3448 }
3449 }
3450
3451 static int net_init_client(QemuOpts *opts, void *dummy)
3452 {
3453 if (net_client_init(NULL, opts, 0) < 0)
3454 return -1;
3455 return 0;
3456 }
3457
3458 static int net_init_netdev(QemuOpts *opts, void *dummy)
3459 {
3460 return net_client_init(NULL, opts, 1);
3461 }
3462
3463 int net_init_clients(void)
3464 {
3465 if (QTAILQ_EMPTY(&qemu_net_opts.head)) {
3466 /* if no clients, we use a default config */
3467 qemu_opts_set(&qemu_net_opts, NULL, "type", "nic");
3468 #ifdef CONFIG_SLIRP
3469 qemu_opts_set(&qemu_net_opts, NULL, "type", "user");
3470 #endif
3471 }
3472
3473 QTAILQ_INIT(&vlans);
3474 QTAILQ_INIT(&non_vlan_clients);
3475
3476 if (qemu_opts_foreach(&qemu_netdev_opts, net_init_netdev, NULL, 1) == -1)
3477 return -1;
3478
3479 if (qemu_opts_foreach(&qemu_net_opts, net_init_client, NULL, 1) == -1) {
3480 return -1;
3481 }
3482
3483 net_check_clients();
3484
3485 return 0;
3486 }
3487
3488 int net_client_parse(QemuOptsList *opts_list, const char *optarg)
3489 {
3490 #if defined(CONFIG_SLIRP)
3491 /* handle legacy -net channel,port:chr */
3492 if (!strcmp(opts_list->name, "net") &&
3493 !strncmp(optarg, "channel,", strlen("channel,"))) {
3494 int ret;
3495
3496 optarg += strlen("channel,");
3497
3498 if (QTAILQ_EMPTY(&slirp_stacks)) {
3499 struct slirp_config_str *config;
3500
3501 config = qemu_malloc(sizeof(*config));
3502 pstrcpy(config->str, sizeof(config->str), optarg);
3503 config->flags = SLIRP_CFG_LEGACY;
3504 config->next = slirp_configs;
3505 slirp_configs = config;
3506 ret = 0;
3507 } else {
3508 ret = slirp_guestfwd(QTAILQ_FIRST(&slirp_stacks), optarg, 1);
3509 }
3510
3511 return ret;
3512 }
3513 #endif
3514 if (!qemu_opts_parse(opts_list, optarg, "type")) {
3515 return -1;
3516 }
3517
3518 return 0;
3519 }