qemu/net/tap.c
<<
>>
Prefs
   1/*
   2 * QEMU System Emulator
   3 *
   4 * Copyright (c) 2003-2008 Fabrice Bellard
   5 * Copyright (c) 2009 Red Hat, Inc.
   6 *
   7 * Permission is hereby granted, free of charge, to any person obtaining a copy
   8 * of this software and associated documentation files (the "Software"), to deal
   9 * in the Software without restriction, including without limitation the rights
  10 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  11 * copies of the Software, and to permit persons to whom the Software is
  12 * furnished to do so, subject to the following conditions:
  13 *
  14 * The above copyright notice and this permission notice shall be included in
  15 * all copies or substantial portions of the Software.
  16 *
  17 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  18 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  19 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
  20 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  21 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  22 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  23 * THE SOFTWARE.
  24 */
  25
  26#include "qemu/osdep.h"
  27#include "tap_int.h"
  28
  29
  30#include <sys/ioctl.h>
  31#include <sys/wait.h>
  32#include <sys/socket.h>
  33#include <net/if.h>
  34
  35#include "net/eth.h"
  36#include "net/net.h"
  37#include "clients.h"
  38#include "monitor/monitor.h"
  39#include "sysemu/sysemu.h"
  40#include "qapi/error.h"
  41#include "qemu/cutils.h"
  42#include "qemu/error-report.h"
  43#include "qemu/main-loop.h"
  44#include "qemu/sockets.h"
  45
  46#include "net/tap.h"
  47
  48#include "net/vhost_net.h"
  49
  50typedef struct TAPState {
  51    NetClientState nc;
  52    int fd;
  53    char down_script[1024];
  54    char down_script_arg[128];
  55    uint8_t buf[NET_BUFSIZE];
  56    bool read_poll;
  57    bool write_poll;
  58    bool using_vnet_hdr;
  59    bool has_ufo;
  60    bool enabled;
  61    VHostNetState *vhost_net;
  62    unsigned host_vnet_hdr_len;
  63    Notifier exit;
  64} TAPState;
  65
  66static void launch_script(const char *setup_script, const char *ifname,
  67                          int fd, Error **errp);
  68
  69static void tap_send(void *opaque);
  70static void tap_writable(void *opaque);
  71
  72static void tap_update_fd_handler(TAPState *s)
  73{
  74    qemu_set_fd_handler(s->fd,
  75                        s->read_poll && s->enabled ? tap_send : NULL,
  76                        s->write_poll && s->enabled ? tap_writable : NULL,
  77                        s);
  78}
  79
  80static void tap_read_poll(TAPState *s, bool enable)
  81{
  82    s->read_poll = enable;
  83    tap_update_fd_handler(s);
  84}
  85
  86static void tap_write_poll(TAPState *s, bool enable)
  87{
  88    s->write_poll = enable;
  89    tap_update_fd_handler(s);
  90}
  91
  92static void tap_writable(void *opaque)
  93{
  94    TAPState *s = opaque;
  95
  96    tap_write_poll(s, false);
  97
  98    qemu_flush_queued_packets(&s->nc);
  99}
 100
 101static ssize_t tap_write_packet(TAPState *s, const struct iovec *iov, int iovcnt)
 102{
 103    ssize_t len;
 104
 105    do {
 106        len = writev(s->fd, iov, iovcnt);
 107    } while (len == -1 && errno == EINTR);
 108
 109    if (len == -1 && errno == EAGAIN) {
 110        tap_write_poll(s, true);
 111        return 0;
 112    }
 113
 114    return len;
 115}
 116
 117static ssize_t tap_receive_iov(NetClientState *nc, const struct iovec *iov,
 118                               int iovcnt)
 119{
 120    TAPState *s = DO_UPCAST(TAPState, nc, nc);
 121    const struct iovec *iovp = iov;
 122    struct iovec iov_copy[iovcnt + 1];
 123    struct virtio_net_hdr_mrg_rxbuf hdr = { };
 124
 125    if (s->host_vnet_hdr_len && !s->using_vnet_hdr) {
 126        iov_copy[0].iov_base = &hdr;
 127        iov_copy[0].iov_len =  s->host_vnet_hdr_len;
 128        memcpy(&iov_copy[1], iov, iovcnt * sizeof(*iov));
 129        iovp = iov_copy;
 130        iovcnt++;
 131    }
 132
 133    return tap_write_packet(s, iovp, iovcnt);
 134}
 135
 136static ssize_t tap_receive_raw(NetClientState *nc, const uint8_t *buf, size_t size)
 137{
 138    TAPState *s = DO_UPCAST(TAPState, nc, nc);
 139    struct iovec iov[2];
 140    int iovcnt = 0;
 141    struct virtio_net_hdr_mrg_rxbuf hdr = { };
 142
 143    if (s->host_vnet_hdr_len) {
 144        iov[iovcnt].iov_base = &hdr;
 145        iov[iovcnt].iov_len  = s->host_vnet_hdr_len;
 146        iovcnt++;
 147    }
 148
 149    iov[iovcnt].iov_base = (char *)buf;
 150    iov[iovcnt].iov_len  = size;
 151    iovcnt++;
 152
 153    return tap_write_packet(s, iov, iovcnt);
 154}
 155
 156static ssize_t tap_receive(NetClientState *nc, const uint8_t *buf, size_t size)
 157{
 158    TAPState *s = DO_UPCAST(TAPState, nc, nc);
 159    struct iovec iov[1];
 160
 161    if (s->host_vnet_hdr_len && !s->using_vnet_hdr) {
 162        return tap_receive_raw(nc, buf, size);
 163    }
 164
 165    iov[0].iov_base = (char *)buf;
 166    iov[0].iov_len  = size;
 167
 168    return tap_write_packet(s, iov, 1);
 169}
 170
 171#ifndef __sun__
 172ssize_t tap_read_packet(int tapfd, uint8_t *buf, int maxlen)
 173{
 174    return read(tapfd, buf, maxlen);
 175}
 176#endif
 177
 178static void tap_send_completed(NetClientState *nc, ssize_t len)
 179{
 180    TAPState *s = DO_UPCAST(TAPState, nc, nc);
 181    tap_read_poll(s, true);
 182}
 183
 184static void tap_send(void *opaque)
 185{
 186    TAPState *s = opaque;
 187    int size;
 188    int packets = 0;
 189
 190    while (true) {
 191        uint8_t *buf = s->buf;
 192        uint8_t min_pkt[ETH_ZLEN];
 193        size_t min_pktsz = sizeof(min_pkt);
 194
 195        size = tap_read_packet(s->fd, s->buf, sizeof(s->buf));
 196        if (size <= 0) {
 197            break;
 198        }
 199
 200        if (s->host_vnet_hdr_len && !s->using_vnet_hdr) {
 201            buf  += s->host_vnet_hdr_len;
 202            size -= s->host_vnet_hdr_len;
 203        }
 204
 205        if (net_peer_needs_padding(&s->nc)) {
 206            if (eth_pad_short_frame(min_pkt, &min_pktsz, buf, size)) {
 207                buf = min_pkt;
 208                size = min_pktsz;
 209            }
 210        }
 211
 212        size = qemu_send_packet_async(&s->nc, buf, size, tap_send_completed);
 213        if (size == 0) {
 214            tap_read_poll(s, false);
 215            break;
 216        } else if (size < 0) {
 217            break;
 218        }
 219
 220        /*
 221         * When the host keeps receiving more packets while tap_send() is
 222         * running we can hog the QEMU global mutex.  Limit the number of
 223         * packets that are processed per tap_send() callback to prevent
 224         * stalling the guest.
 225         */
 226        packets++;
 227        if (packets >= 50) {
 228            break;
 229        }
 230    }
 231}
 232
 233static bool tap_has_ufo(NetClientState *nc)
 234{
 235    TAPState *s = DO_UPCAST(TAPState, nc, nc);
 236
 237    assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
 238
 239    return s->has_ufo;
 240}
 241
 242static bool tap_has_vnet_hdr(NetClientState *nc)
 243{
 244    TAPState *s = DO_UPCAST(TAPState, nc, nc);
 245
 246    assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
 247
 248    return !!s->host_vnet_hdr_len;
 249}
 250
 251static bool tap_has_vnet_hdr_len(NetClientState *nc, int len)
 252{
 253    TAPState *s = DO_UPCAST(TAPState, nc, nc);
 254
 255    assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
 256
 257    return !!tap_probe_vnet_hdr_len(s->fd, len);
 258}
 259
 260static void tap_set_vnet_hdr_len(NetClientState *nc, int len)
 261{
 262    TAPState *s = DO_UPCAST(TAPState, nc, nc);
 263
 264    assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
 265    assert(len == sizeof(struct virtio_net_hdr_mrg_rxbuf) ||
 266           len == sizeof(struct virtio_net_hdr) ||
 267           len == sizeof(struct virtio_net_hdr_v1_hash));
 268
 269    tap_fd_set_vnet_hdr_len(s->fd, len);
 270    s->host_vnet_hdr_len = len;
 271}
 272
 273static void tap_using_vnet_hdr(NetClientState *nc, bool using_vnet_hdr)
 274{
 275    TAPState *s = DO_UPCAST(TAPState, nc, nc);
 276
 277    assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
 278    assert(!!s->host_vnet_hdr_len == using_vnet_hdr);
 279
 280    s->using_vnet_hdr = using_vnet_hdr;
 281}
 282
 283static int tap_set_vnet_le(NetClientState *nc, bool is_le)
 284{
 285    TAPState *s = DO_UPCAST(TAPState, nc, nc);
 286
 287    return tap_fd_set_vnet_le(s->fd, is_le);
 288}
 289
 290static int tap_set_vnet_be(NetClientState *nc, bool is_be)
 291{
 292    TAPState *s = DO_UPCAST(TAPState, nc, nc);
 293
 294    return tap_fd_set_vnet_be(s->fd, is_be);
 295}
 296
 297static void tap_set_offload(NetClientState *nc, int csum, int tso4,
 298                     int tso6, int ecn, int ufo)
 299{
 300    TAPState *s = DO_UPCAST(TAPState, nc, nc);
 301    if (s->fd < 0) {
 302        return;
 303    }
 304
 305    tap_fd_set_offload(s->fd, csum, tso4, tso6, ecn, ufo);
 306}
 307
 308static void tap_exit_notify(Notifier *notifier, void *data)
 309{
 310    TAPState *s = container_of(notifier, TAPState, exit);
 311    Error *err = NULL;
 312
 313    if (s->down_script[0]) {
 314        launch_script(s->down_script, s->down_script_arg, s->fd, &err);
 315        if (err) {
 316            error_report_err(err);
 317        }
 318    }
 319}
 320
 321static void tap_cleanup(NetClientState *nc)
 322{
 323    TAPState *s = DO_UPCAST(TAPState, nc, nc);
 324
 325    if (s->vhost_net) {
 326        vhost_net_cleanup(s->vhost_net);
 327        g_free(s->vhost_net);
 328        s->vhost_net = NULL;
 329    }
 330
 331    qemu_purge_queued_packets(nc);
 332
 333    tap_exit_notify(&s->exit, NULL);
 334    qemu_remove_exit_notifier(&s->exit);
 335
 336    tap_read_poll(s, false);
 337    tap_write_poll(s, false);
 338    close(s->fd);
 339    s->fd = -1;
 340}
 341
 342static void tap_poll(NetClientState *nc, bool enable)
 343{
 344    TAPState *s = DO_UPCAST(TAPState, nc, nc);
 345    tap_read_poll(s, enable);
 346    tap_write_poll(s, enable);
 347}
 348
 349static bool tap_set_steering_ebpf(NetClientState *nc, int prog_fd)
 350{
 351    TAPState *s = DO_UPCAST(TAPState, nc, nc);
 352    assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
 353
 354    return tap_fd_set_steering_ebpf(s->fd, prog_fd) == 0;
 355}
 356
 357int tap_get_fd(NetClientState *nc)
 358{
 359    TAPState *s = DO_UPCAST(TAPState, nc, nc);
 360    assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
 361    return s->fd;
 362}
 363
 364/* fd support */
 365
 366static NetClientInfo net_tap_info = {
 367    .type = NET_CLIENT_DRIVER_TAP,
 368    .size = sizeof(TAPState),
 369    .receive = tap_receive,
 370    .receive_raw = tap_receive_raw,
 371    .receive_iov = tap_receive_iov,
 372    .poll = tap_poll,
 373    .cleanup = tap_cleanup,
 374    .has_ufo = tap_has_ufo,
 375    .has_vnet_hdr = tap_has_vnet_hdr,
 376    .has_vnet_hdr_len = tap_has_vnet_hdr_len,
 377    .using_vnet_hdr = tap_using_vnet_hdr,
 378    .set_offload = tap_set_offload,
 379    .set_vnet_hdr_len = tap_set_vnet_hdr_len,
 380    .set_vnet_le = tap_set_vnet_le,
 381    .set_vnet_be = tap_set_vnet_be,
 382    .set_steering_ebpf = tap_set_steering_ebpf,
 383};
 384
 385static TAPState *net_tap_fd_init(NetClientState *peer,
 386                                 const char *model,
 387                                 const char *name,
 388                                 int fd,
 389                                 int vnet_hdr)
 390{
 391    NetClientState *nc;
 392    TAPState *s;
 393
 394    nc = qemu_new_net_client(&net_tap_info, peer, model, name);
 395
 396    s = DO_UPCAST(TAPState, nc, nc);
 397
 398    s->fd = fd;
 399    s->host_vnet_hdr_len = vnet_hdr ? sizeof(struct virtio_net_hdr) : 0;
 400    s->using_vnet_hdr = false;
 401    s->has_ufo = tap_probe_has_ufo(s->fd);
 402    s->enabled = true;
 403    tap_set_offload(&s->nc, 0, 0, 0, 0, 0);
 404    /*
 405     * Make sure host header length is set correctly in tap:
 406     * it might have been modified by another instance of qemu.
 407     */
 408    if (tap_probe_vnet_hdr_len(s->fd, s->host_vnet_hdr_len)) {
 409        tap_fd_set_vnet_hdr_len(s->fd, s->host_vnet_hdr_len);
 410    }
 411    tap_read_poll(s, true);
 412    s->vhost_net = NULL;
 413
 414    s->exit.notify = tap_exit_notify;
 415    qemu_add_exit_notifier(&s->exit);
 416
 417    return s;
 418}
 419
 420static void launch_script(const char *setup_script, const char *ifname,
 421                          int fd, Error **errp)
 422{
 423    int pid, status;
 424    char *args[3];
 425    char **parg;
 426
 427    /* try to launch network script */
 428    pid = fork();
 429    if (pid < 0) {
 430        error_setg_errno(errp, errno, "could not launch network script %s",
 431                         setup_script);
 432        return;
 433    }
 434    if (pid == 0) {
 435        int open_max = sysconf(_SC_OPEN_MAX), i;
 436
 437        for (i = 3; i < open_max; i++) {
 438            if (i != fd) {
 439                close(i);
 440            }
 441        }
 442        parg = args;
 443        *parg++ = (char *)setup_script;
 444        *parg++ = (char *)ifname;
 445        *parg = NULL;
 446        execv(setup_script, args);
 447        _exit(1);
 448    } else {
 449        while (waitpid(pid, &status, 0) != pid) {
 450            /* loop */
 451        }
 452
 453        if (WIFEXITED(status) && WEXITSTATUS(status) == 0) {
 454            return;
 455        }
 456        error_setg(errp, "network script %s failed with status %d",
 457                   setup_script, status);
 458    }
 459}
 460
 461static int recv_fd(int c)
 462{
 463    int fd;
 464    uint8_t msgbuf[CMSG_SPACE(sizeof(fd))];
 465    struct msghdr msg = {
 466        .msg_control = msgbuf,
 467        .msg_controllen = sizeof(msgbuf),
 468    };
 469    struct cmsghdr *cmsg;
 470    struct iovec iov;
 471    uint8_t req[1];
 472    ssize_t len;
 473
 474    cmsg = CMSG_FIRSTHDR(&msg);
 475    cmsg->cmsg_level = SOL_SOCKET;
 476    cmsg->cmsg_type = SCM_RIGHTS;
 477    cmsg->cmsg_len = CMSG_LEN(sizeof(fd));
 478    msg.msg_controllen = cmsg->cmsg_len;
 479
 480    iov.iov_base = req;
 481    iov.iov_len = sizeof(req);
 482
 483    msg.msg_iov = &iov;
 484    msg.msg_iovlen = 1;
 485
 486    len = recvmsg(c, &msg, 0);
 487    if (len > 0) {
 488        memcpy(&fd, CMSG_DATA(cmsg), sizeof(fd));
 489        return fd;
 490    }
 491
 492    return len;
 493}
 494
 495static int net_bridge_run_helper(const char *helper, const char *bridge,
 496                                 Error **errp)
 497{
 498    sigset_t oldmask, mask;
 499    g_autofree char *default_helper = NULL;
 500    int pid, status;
 501    char *args[5];
 502    char **parg;
 503    int sv[2];
 504
 505    sigemptyset(&mask);
 506    sigaddset(&mask, SIGCHLD);
 507    sigprocmask(SIG_BLOCK, &mask, &oldmask);
 508
 509    if (!helper) {
 510        helper = default_helper = get_relocated_path(DEFAULT_BRIDGE_HELPER);
 511    }
 512
 513    if (socketpair(PF_UNIX, SOCK_STREAM, 0, sv) == -1) {
 514        error_setg_errno(errp, errno, "socketpair() failed");
 515        return -1;
 516    }
 517
 518    /* try to launch bridge helper */
 519    pid = fork();
 520    if (pid < 0) {
 521        error_setg_errno(errp, errno, "Can't fork bridge helper");
 522        return -1;
 523    }
 524    if (pid == 0) {
 525        int open_max = sysconf(_SC_OPEN_MAX), i;
 526        char *fd_buf = NULL;
 527        char *br_buf = NULL;
 528        char *helper_cmd = NULL;
 529
 530        for (i = 3; i < open_max; i++) {
 531            if (i != sv[1]) {
 532                close(i);
 533            }
 534        }
 535
 536        fd_buf = g_strdup_printf("%s%d", "--fd=", sv[1]);
 537
 538        if (strrchr(helper, ' ') || strrchr(helper, '\t')) {
 539            /* assume helper is a command */
 540
 541            if (strstr(helper, "--br=") == NULL) {
 542                br_buf = g_strdup_printf("%s%s", "--br=", bridge);
 543            }
 544
 545            helper_cmd = g_strdup_printf("%s %s %s %s", helper,
 546                            "--use-vnet", fd_buf, br_buf ? br_buf : "");
 547
 548            parg = args;
 549            *parg++ = (char *)"sh";
 550            *parg++ = (char *)"-c";
 551            *parg++ = helper_cmd;
 552            *parg++ = NULL;
 553
 554            execv("/bin/sh", args);
 555            g_free(helper_cmd);
 556        } else {
 557            /* assume helper is just the executable path name */
 558
 559            br_buf = g_strdup_printf("%s%s", "--br=", bridge);
 560
 561            parg = args;
 562            *parg++ = (char *)helper;
 563            *parg++ = (char *)"--use-vnet";
 564            *parg++ = fd_buf;
 565            *parg++ = br_buf;
 566            *parg++ = NULL;
 567
 568            execv(helper, args);
 569        }
 570        g_free(fd_buf);
 571        g_free(br_buf);
 572        _exit(1);
 573
 574    } else {
 575        int fd;
 576        int saved_errno;
 577
 578        close(sv[1]);
 579
 580        do {
 581            fd = recv_fd(sv[0]);
 582        } while (fd == -1 && errno == EINTR);
 583        saved_errno = errno;
 584
 585        close(sv[0]);
 586
 587        while (waitpid(pid, &status, 0) != pid) {
 588            /* loop */
 589        }
 590        sigprocmask(SIG_SETMASK, &oldmask, NULL);
 591        if (fd < 0) {
 592            error_setg_errno(errp, saved_errno,
 593                             "failed to recv file descriptor");
 594            return -1;
 595        }
 596        if (!WIFEXITED(status) || WEXITSTATUS(status) != 0) {
 597            error_setg(errp, "bridge helper failed");
 598            return -1;
 599        }
 600        return fd;
 601    }
 602}
 603
 604int net_init_bridge(const Netdev *netdev, const char *name,
 605                    NetClientState *peer, Error **errp)
 606{
 607    const NetdevBridgeOptions *bridge;
 608    const char *helper, *br;
 609    TAPState *s;
 610    int fd, vnet_hdr;
 611
 612    assert(netdev->type == NET_CLIENT_DRIVER_BRIDGE);
 613    bridge = &netdev->u.bridge;
 614    helper = bridge->has_helper ? bridge->helper : NULL;
 615    br     = bridge->has_br     ? bridge->br     : DEFAULT_BRIDGE_INTERFACE;
 616
 617    fd = net_bridge_run_helper(helper, br, errp);
 618    if (fd == -1) {
 619        return -1;
 620    }
 621
 622    if (!g_unix_set_fd_nonblocking(fd, true, NULL)) {
 623        error_setg_errno(errp, errno, "Failed to set FD nonblocking");
 624        return -1;
 625    }
 626    vnet_hdr = tap_probe_vnet_hdr(fd, errp);
 627    if (vnet_hdr < 0) {
 628        close(fd);
 629        return -1;
 630    }
 631    s = net_tap_fd_init(peer, "bridge", name, fd, vnet_hdr);
 632
 633    snprintf(s->nc.info_str, sizeof(s->nc.info_str), "helper=%s,br=%s", helper,
 634             br);
 635
 636    return 0;
 637}
 638
 639static int net_tap_init(const NetdevTapOptions *tap, int *vnet_hdr,
 640                        const char *setup_script, char *ifname,
 641                        size_t ifname_sz, int mq_required, Error **errp)
 642{
 643    Error *err = NULL;
 644    int fd, vnet_hdr_required;
 645
 646    if (tap->has_vnet_hdr) {
 647        *vnet_hdr = tap->vnet_hdr;
 648        vnet_hdr_required = *vnet_hdr;
 649    } else {
 650        *vnet_hdr = 1;
 651        vnet_hdr_required = 0;
 652    }
 653
 654    TFR(fd = tap_open(ifname, ifname_sz, vnet_hdr, vnet_hdr_required,
 655                      mq_required, errp));
 656    if (fd < 0) {
 657        return -1;
 658    }
 659
 660    if (setup_script &&
 661        setup_script[0] != '\0' &&
 662        strcmp(setup_script, "no") != 0) {
 663        launch_script(setup_script, ifname, fd, &err);
 664        if (err) {
 665            error_propagate(errp, err);
 666            close(fd);
 667            return -1;
 668        }
 669    }
 670
 671    return fd;
 672}
 673
 674#define MAX_TAP_QUEUES 1024
 675
 676static void net_init_tap_one(const NetdevTapOptions *tap, NetClientState *peer,
 677                             const char *model, const char *name,
 678                             const char *ifname, const char *script,
 679                             const char *downscript, const char *vhostfdname,
 680                             int vnet_hdr, int fd, Error **errp)
 681{
 682    Error *err = NULL;
 683    TAPState *s = net_tap_fd_init(peer, model, name, fd, vnet_hdr);
 684    int vhostfd;
 685
 686    tap_set_sndbuf(s->fd, tap, &err);
 687    if (err) {
 688        error_propagate(errp, err);
 689        return;
 690    }
 691
 692    if (tap->has_fd || tap->has_fds) {
 693        snprintf(s->nc.info_str, sizeof(s->nc.info_str), "fd=%d", fd);
 694    } else if (tap->has_helper) {
 695        snprintf(s->nc.info_str, sizeof(s->nc.info_str), "helper=%s",
 696                 tap->helper);
 697    } else {
 698        snprintf(s->nc.info_str, sizeof(s->nc.info_str),
 699                 "ifname=%s,script=%s,downscript=%s", ifname, script,
 700                 downscript);
 701
 702        if (strcmp(downscript, "no") != 0) {
 703            snprintf(s->down_script, sizeof(s->down_script), "%s", downscript);
 704            snprintf(s->down_script_arg, sizeof(s->down_script_arg),
 705                     "%s", ifname);
 706        }
 707    }
 708
 709    if (tap->has_vhost ? tap->vhost :
 710        vhostfdname || (tap->has_vhostforce && tap->vhostforce)) {
 711        VhostNetOptions options;
 712
 713        options.backend_type = VHOST_BACKEND_TYPE_KERNEL;
 714        options.net_backend = &s->nc;
 715        if (tap->has_poll_us) {
 716            options.busyloop_timeout = tap->poll_us;
 717        } else {
 718            options.busyloop_timeout = 0;
 719        }
 720
 721        if (vhostfdname) {
 722            vhostfd = monitor_fd_param(monitor_cur(), vhostfdname, &err);
 723            if (vhostfd == -1) {
 724                if (tap->has_vhostforce && tap->vhostforce) {
 725                    error_propagate(errp, err);
 726                } else {
 727                    warn_report_err(err);
 728                }
 729                return;
 730            }
 731            if (!g_unix_set_fd_nonblocking(vhostfd, true, NULL)) {
 732                error_setg_errno(errp, errno, "%s: Can't use file descriptor %d",
 733                                 name, fd);
 734                return;
 735            }
 736        } else {
 737            vhostfd = open("/dev/vhost-net", O_RDWR);
 738            if (vhostfd < 0) {
 739                if (tap->has_vhostforce && tap->vhostforce) {
 740                    error_setg_errno(errp, errno,
 741                                     "tap: open vhost char device failed");
 742                } else {
 743                    warn_report("tap: open vhost char device failed: %s",
 744                                strerror(errno));
 745                }
 746                return;
 747            }
 748            if (!g_unix_set_fd_nonblocking(vhostfd, true, NULL)) {
 749                error_setg_errno(errp, errno, "Failed to set FD nonblocking");
 750                return;
 751            }
 752        }
 753        options.opaque = (void *)(uintptr_t)vhostfd;
 754        options.nvqs = 2;
 755
 756        s->vhost_net = vhost_net_init(&options);
 757        if (!s->vhost_net) {
 758            if (tap->has_vhostforce && tap->vhostforce) {
 759                error_setg(errp, VHOST_NET_INIT_FAILED);
 760            } else {
 761                warn_report(VHOST_NET_INIT_FAILED);
 762            }
 763            return;
 764        }
 765    } else if (vhostfdname) {
 766        error_setg(errp, "vhostfd(s)= is not valid without vhost");
 767    }
 768}
 769
 770static int get_fds(char *str, char *fds[], int max)
 771{
 772    char *ptr = str, *this;
 773    size_t len = strlen(str);
 774    int i = 0;
 775
 776    while (i < max && ptr < str + len) {
 777        this = strchr(ptr, ':');
 778
 779        if (this == NULL) {
 780            fds[i] = g_strdup(ptr);
 781        } else {
 782            fds[i] = g_strndup(ptr, this - ptr);
 783        }
 784
 785        i++;
 786        if (this == NULL) {
 787            break;
 788        } else {
 789            ptr = this + 1;
 790        }
 791    }
 792
 793    return i;
 794}
 795
 796int net_init_tap(const Netdev *netdev, const char *name,
 797                 NetClientState *peer, Error **errp)
 798{
 799    const NetdevTapOptions *tap;
 800    int fd, vnet_hdr = 0, i = 0, queues;
 801    /* for the no-fd, no-helper case */
 802    const char *script;
 803    const char *downscript;
 804    Error *err = NULL;
 805    const char *vhostfdname;
 806    char ifname[128];
 807    int ret = 0;
 808
 809    assert(netdev->type == NET_CLIENT_DRIVER_TAP);
 810    tap = &netdev->u.tap;
 811    queues = tap->has_queues ? tap->queues : 1;
 812    vhostfdname = tap->has_vhostfd ? tap->vhostfd : NULL;
 813    script = tap->has_script ? tap->script : NULL;
 814    downscript = tap->has_downscript ? tap->downscript : NULL;
 815
 816    /* QEMU hubs do not support multiqueue tap, in this case peer is set.
 817     * For -netdev, peer is always NULL. */
 818    if (peer && (tap->has_queues || tap->has_fds || tap->has_vhostfds)) {
 819        error_setg(errp, "Multiqueue tap cannot be used with hubs");
 820        return -1;
 821    }
 822
 823    if (tap->has_fd) {
 824        if (tap->has_ifname || tap->has_script || tap->has_downscript ||
 825            tap->has_vnet_hdr || tap->has_helper || tap->has_queues ||
 826            tap->has_fds || tap->has_vhostfds) {
 827            error_setg(errp, "ifname=, script=, downscript=, vnet_hdr=, "
 828                       "helper=, queues=, fds=, and vhostfds= "
 829                       "are invalid with fd=");
 830            return -1;
 831        }
 832
 833        fd = monitor_fd_param(monitor_cur(), tap->fd, errp);
 834        if (fd == -1) {
 835            return -1;
 836        }
 837
 838        if (!g_unix_set_fd_nonblocking(fd, true, NULL)) {
 839            error_setg_errno(errp, errno, "%s: Can't use file descriptor %d",
 840                             name, fd);
 841            close(fd);
 842            return -1;
 843        }
 844
 845        vnet_hdr = tap_probe_vnet_hdr(fd, errp);
 846        if (vnet_hdr < 0) {
 847            close(fd);
 848            return -1;
 849        }
 850
 851        net_init_tap_one(tap, peer, "tap", name, NULL,
 852                         script, downscript,
 853                         vhostfdname, vnet_hdr, fd, &err);
 854        if (err) {
 855            error_propagate(errp, err);
 856            close(fd);
 857            return -1;
 858        }
 859    } else if (tap->has_fds) {
 860        char **fds;
 861        char **vhost_fds;
 862        int nfds = 0, nvhosts = 0;
 863
 864        if (tap->has_ifname || tap->has_script || tap->has_downscript ||
 865            tap->has_vnet_hdr || tap->has_helper || tap->has_queues ||
 866            tap->has_vhostfd) {
 867            error_setg(errp, "ifname=, script=, downscript=, vnet_hdr=, "
 868                       "helper=, queues=, and vhostfd= "
 869                       "are invalid with fds=");
 870            return -1;
 871        }
 872
 873        fds = g_new0(char *, MAX_TAP_QUEUES);
 874        vhost_fds = g_new0(char *, MAX_TAP_QUEUES);
 875
 876        nfds = get_fds(tap->fds, fds, MAX_TAP_QUEUES);
 877        if (tap->has_vhostfds) {
 878            nvhosts = get_fds(tap->vhostfds, vhost_fds, MAX_TAP_QUEUES);
 879            if (nfds != nvhosts) {
 880                error_setg(errp, "The number of fds passed does not match "
 881                           "the number of vhostfds passed");
 882                ret = -1;
 883                goto free_fail;
 884            }
 885        }
 886
 887        for (i = 0; i < nfds; i++) {
 888            fd = monitor_fd_param(monitor_cur(), fds[i], errp);
 889            if (fd == -1) {
 890                ret = -1;
 891                goto free_fail;
 892            }
 893
 894            ret = g_unix_set_fd_nonblocking(fd, true, NULL);
 895            if (!ret) {
 896                error_setg_errno(errp, errno, "%s: Can't use file descriptor %d",
 897                                 name, fd);
 898                goto free_fail;
 899            }
 900
 901            if (i == 0) {
 902                vnet_hdr = tap_probe_vnet_hdr(fd, errp);
 903                if (vnet_hdr < 0) {
 904                    ret = -1;
 905                    goto free_fail;
 906                }
 907            } else if (vnet_hdr != tap_probe_vnet_hdr(fd, NULL)) {
 908                error_setg(errp,
 909                           "vnet_hdr not consistent across given tap fds");
 910                ret = -1;
 911                goto free_fail;
 912            }
 913
 914            net_init_tap_one(tap, peer, "tap", name, ifname,
 915                             script, downscript,
 916                             tap->has_vhostfds ? vhost_fds[i] : NULL,
 917                             vnet_hdr, fd, &err);
 918            if (err) {
 919                error_propagate(errp, err);
 920                ret = -1;
 921                goto free_fail;
 922            }
 923        }
 924
 925free_fail:
 926        for (i = 0; i < nvhosts; i++) {
 927            g_free(vhost_fds[i]);
 928        }
 929        for (i = 0; i < nfds; i++) {
 930            g_free(fds[i]);
 931        }
 932        g_free(fds);
 933        g_free(vhost_fds);
 934        return ret;
 935    } else if (tap->has_helper) {
 936        if (tap->has_ifname || tap->has_script || tap->has_downscript ||
 937            tap->has_vnet_hdr || tap->has_queues || tap->has_vhostfds) {
 938            error_setg(errp, "ifname=, script=, downscript=, vnet_hdr=, "
 939                       "queues=, and vhostfds= are invalid with helper=");
 940            return -1;
 941        }
 942
 943        fd = net_bridge_run_helper(tap->helper,
 944                                   tap->has_br ?
 945                                   tap->br : DEFAULT_BRIDGE_INTERFACE,
 946                                   errp);
 947        if (fd == -1) {
 948            return -1;
 949        }
 950
 951        if (!g_unix_set_fd_nonblocking(fd, true, NULL)) {
 952            error_setg_errno(errp, errno, "Failed to set FD nonblocking");
 953            return -1;
 954        }
 955        vnet_hdr = tap_probe_vnet_hdr(fd, errp);
 956        if (vnet_hdr < 0) {
 957            close(fd);
 958            return -1;
 959        }
 960
 961        net_init_tap_one(tap, peer, "bridge", name, ifname,
 962                         script, downscript, vhostfdname,
 963                         vnet_hdr, fd, &err);
 964        if (err) {
 965            error_propagate(errp, err);
 966            close(fd);
 967            return -1;
 968        }
 969    } else {
 970        g_autofree char *default_script = NULL;
 971        g_autofree char *default_downscript = NULL;
 972        if (tap->has_vhostfds) {
 973            error_setg(errp, "vhostfds= is invalid if fds= wasn't specified");
 974            return -1;
 975        }
 976
 977        if (!script) {
 978            script = default_script = get_relocated_path(DEFAULT_NETWORK_SCRIPT);
 979        }
 980        if (!downscript) {
 981            downscript = default_downscript =
 982                                 get_relocated_path(DEFAULT_NETWORK_DOWN_SCRIPT);
 983        }
 984
 985        if (tap->has_ifname) {
 986            pstrcpy(ifname, sizeof ifname, tap->ifname);
 987        } else {
 988            ifname[0] = '\0';
 989        }
 990
 991        for (i = 0; i < queues; i++) {
 992            fd = net_tap_init(tap, &vnet_hdr, i >= 1 ? "no" : script,
 993                              ifname, sizeof ifname, queues > 1, errp);
 994            if (fd == -1) {
 995                return -1;
 996            }
 997
 998            if (queues > 1 && i == 0 && !tap->has_ifname) {
 999                if (tap_fd_get_ifname(fd, ifname)) {
1000                    error_setg(errp, "Fail to get ifname");
1001                    close(fd);
1002                    return -1;
1003                }
1004            }
1005
1006            net_init_tap_one(tap, peer, "tap", name, ifname,
1007                             i >= 1 ? "no" : script,
1008                             i >= 1 ? "no" : downscript,
1009                             vhostfdname, vnet_hdr, fd, &err);
1010            if (err) {
1011                error_propagate(errp, err);
1012                close(fd);
1013                return -1;
1014            }
1015        }
1016    }
1017
1018    return 0;
1019}
1020
1021VHostNetState *tap_get_vhost_net(NetClientState *nc)
1022{
1023    TAPState *s = DO_UPCAST(TAPState, nc, nc);
1024    assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
1025    return s->vhost_net;
1026}
1027
1028int tap_enable(NetClientState *nc)
1029{
1030    TAPState *s = DO_UPCAST(TAPState, nc, nc);
1031    int ret;
1032
1033    if (s->enabled) {
1034        return 0;
1035    } else {
1036        ret = tap_fd_enable(s->fd);
1037        if (ret == 0) {
1038            s->enabled = true;
1039            tap_update_fd_handler(s);
1040        }
1041        return ret;
1042    }
1043}
1044
1045int tap_disable(NetClientState *nc)
1046{
1047    TAPState *s = DO_UPCAST(TAPState, nc, nc);
1048    int ret;
1049
1050    if (s->enabled == 0) {
1051        return 0;
1052    } else {
1053        ret = tap_fd_disable(s->fd);
1054        if (ret == 0) {
1055            qemu_purge_queued_packets(nc);
1056            s->enabled = false;
1057            tap_update_fd_handler(s);
1058        }
1059        return ret;
1060    }
1061}
1062