xref: /openbmc/qemu/net/tap.c (revision b14df228)
1 /*
2  * QEMU System Emulator
3  *
4  * Copyright (c) 2003-2008 Fabrice Bellard
5  * Copyright (c) 2009 Red Hat, Inc.
6  *
7  * Permission is hereby granted, free of charge, to any person obtaining a copy
8  * of this software and associated documentation files (the "Software"), to deal
9  * in the Software without restriction, including without limitation the rights
10  * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
11  * copies of the Software, and to permit persons to whom the Software is
12  * furnished to do so, subject to the following conditions:
13  *
14  * The above copyright notice and this permission notice shall be included in
15  * all copies or substantial portions of the Software.
16  *
17  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
18  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
19  * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
20  * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
21  * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
22  * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
23  * THE SOFTWARE.
24  */
25 
26 #include "qemu/osdep.h"
27 #include "tap_int.h"
28 
29 
30 #include <sys/ioctl.h>
31 #include <sys/wait.h>
32 #include <sys/socket.h>
33 #include <net/if.h>
34 
35 #include "net/eth.h"
36 #include "net/net.h"
37 #include "clients.h"
38 #include "monitor/monitor.h"
39 #include "sysemu/sysemu.h"
40 #include "qapi/error.h"
41 #include "qemu/cutils.h"
42 #include "qemu/error-report.h"
43 #include "qemu/main-loop.h"
44 #include "qemu/sockets.h"
45 
46 #include "net/tap.h"
47 
48 #include "net/vhost_net.h"
49 
50 typedef struct TAPState {
51     NetClientState nc;
52     int fd;
53     char down_script[1024];
54     char down_script_arg[128];
55     uint8_t buf[NET_BUFSIZE];
56     bool read_poll;
57     bool write_poll;
58     bool using_vnet_hdr;
59     bool has_ufo;
60     bool enabled;
61     VHostNetState *vhost_net;
62     unsigned host_vnet_hdr_len;
63     Notifier exit;
64 } TAPState;
65 
66 static void launch_script(const char *setup_script, const char *ifname,
67                           int fd, Error **errp);
68 
69 static void tap_send(void *opaque);
70 static void tap_writable(void *opaque);
71 
72 static void tap_update_fd_handler(TAPState *s)
73 {
74     qemu_set_fd_handler(s->fd,
75                         s->read_poll && s->enabled ? tap_send : NULL,
76                         s->write_poll && s->enabled ? tap_writable : NULL,
77                         s);
78 }
79 
80 static void tap_read_poll(TAPState *s, bool enable)
81 {
82     s->read_poll = enable;
83     tap_update_fd_handler(s);
84 }
85 
86 static void tap_write_poll(TAPState *s, bool enable)
87 {
88     s->write_poll = enable;
89     tap_update_fd_handler(s);
90 }
91 
92 static void tap_writable(void *opaque)
93 {
94     TAPState *s = opaque;
95 
96     tap_write_poll(s, false);
97 
98     qemu_flush_queued_packets(&s->nc);
99 }
100 
101 static ssize_t tap_write_packet(TAPState *s, const struct iovec *iov, int iovcnt)
102 {
103     ssize_t len;
104 
105     do {
106         len = writev(s->fd, iov, iovcnt);
107     } while (len == -1 && errno == EINTR);
108 
109     if (len == -1 && errno == EAGAIN) {
110         tap_write_poll(s, true);
111         return 0;
112     }
113 
114     return len;
115 }
116 
117 static ssize_t tap_receive_iov(NetClientState *nc, const struct iovec *iov,
118                                int iovcnt)
119 {
120     TAPState *s = DO_UPCAST(TAPState, nc, nc);
121     const struct iovec *iovp = iov;
122     struct iovec iov_copy[iovcnt + 1];
123     struct virtio_net_hdr_mrg_rxbuf hdr = { };
124 
125     if (s->host_vnet_hdr_len && !s->using_vnet_hdr) {
126         iov_copy[0].iov_base = &hdr;
127         iov_copy[0].iov_len =  s->host_vnet_hdr_len;
128         memcpy(&iov_copy[1], iov, iovcnt * sizeof(*iov));
129         iovp = iov_copy;
130         iovcnt++;
131     }
132 
133     return tap_write_packet(s, iovp, iovcnt);
134 }
135 
136 static ssize_t tap_receive_raw(NetClientState *nc, const uint8_t *buf, size_t size)
137 {
138     TAPState *s = DO_UPCAST(TAPState, nc, nc);
139     struct iovec iov[2];
140     int iovcnt = 0;
141     struct virtio_net_hdr_mrg_rxbuf hdr = { };
142 
143     if (s->host_vnet_hdr_len) {
144         iov[iovcnt].iov_base = &hdr;
145         iov[iovcnt].iov_len  = s->host_vnet_hdr_len;
146         iovcnt++;
147     }
148 
149     iov[iovcnt].iov_base = (char *)buf;
150     iov[iovcnt].iov_len  = size;
151     iovcnt++;
152 
153     return tap_write_packet(s, iov, iovcnt);
154 }
155 
156 static ssize_t tap_receive(NetClientState *nc, const uint8_t *buf, size_t size)
157 {
158     TAPState *s = DO_UPCAST(TAPState, nc, nc);
159     struct iovec iov[1];
160 
161     if (s->host_vnet_hdr_len && !s->using_vnet_hdr) {
162         return tap_receive_raw(nc, buf, size);
163     }
164 
165     iov[0].iov_base = (char *)buf;
166     iov[0].iov_len  = size;
167 
168     return tap_write_packet(s, iov, 1);
169 }
170 
171 #ifndef __sun__
172 ssize_t tap_read_packet(int tapfd, uint8_t *buf, int maxlen)
173 {
174     return read(tapfd, buf, maxlen);
175 }
176 #endif
177 
178 static void tap_send_completed(NetClientState *nc, ssize_t len)
179 {
180     TAPState *s = DO_UPCAST(TAPState, nc, nc);
181     tap_read_poll(s, true);
182 }
183 
184 static void tap_send(void *opaque)
185 {
186     TAPState *s = opaque;
187     int size;
188     int packets = 0;
189 
190     while (true) {
191         uint8_t *buf = s->buf;
192         uint8_t min_pkt[ETH_ZLEN];
193         size_t min_pktsz = sizeof(min_pkt);
194 
195         size = tap_read_packet(s->fd, s->buf, sizeof(s->buf));
196         if (size <= 0) {
197             break;
198         }
199 
200         if (s->host_vnet_hdr_len && !s->using_vnet_hdr) {
201             buf  += s->host_vnet_hdr_len;
202             size -= s->host_vnet_hdr_len;
203         }
204 
205         if (net_peer_needs_padding(&s->nc)) {
206             if (eth_pad_short_frame(min_pkt, &min_pktsz, buf, size)) {
207                 buf = min_pkt;
208                 size = min_pktsz;
209             }
210         }
211 
212         size = qemu_send_packet_async(&s->nc, buf, size, tap_send_completed);
213         if (size == 0) {
214             tap_read_poll(s, false);
215             break;
216         } else if (size < 0) {
217             break;
218         }
219 
220         /*
221          * When the host keeps receiving more packets while tap_send() is
222          * running we can hog the QEMU global mutex.  Limit the number of
223          * packets that are processed per tap_send() callback to prevent
224          * stalling the guest.
225          */
226         packets++;
227         if (packets >= 50) {
228             break;
229         }
230     }
231 }
232 
233 static bool tap_has_ufo(NetClientState *nc)
234 {
235     TAPState *s = DO_UPCAST(TAPState, nc, nc);
236 
237     assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
238 
239     return s->has_ufo;
240 }
241 
242 static bool tap_has_vnet_hdr(NetClientState *nc)
243 {
244     TAPState *s = DO_UPCAST(TAPState, nc, nc);
245 
246     assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
247 
248     return !!s->host_vnet_hdr_len;
249 }
250 
251 static bool tap_has_vnet_hdr_len(NetClientState *nc, int len)
252 {
253     TAPState *s = DO_UPCAST(TAPState, nc, nc);
254 
255     assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
256 
257     return !!tap_probe_vnet_hdr_len(s->fd, len);
258 }
259 
260 static void tap_set_vnet_hdr_len(NetClientState *nc, int len)
261 {
262     TAPState *s = DO_UPCAST(TAPState, nc, nc);
263 
264     assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
265     assert(len == sizeof(struct virtio_net_hdr_mrg_rxbuf) ||
266            len == sizeof(struct virtio_net_hdr) ||
267            len == sizeof(struct virtio_net_hdr_v1_hash));
268 
269     tap_fd_set_vnet_hdr_len(s->fd, len);
270     s->host_vnet_hdr_len = len;
271 }
272 
273 static void tap_using_vnet_hdr(NetClientState *nc, bool using_vnet_hdr)
274 {
275     TAPState *s = DO_UPCAST(TAPState, nc, nc);
276 
277     assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
278     assert(!!s->host_vnet_hdr_len == using_vnet_hdr);
279 
280     s->using_vnet_hdr = using_vnet_hdr;
281 }
282 
283 static int tap_set_vnet_le(NetClientState *nc, bool is_le)
284 {
285     TAPState *s = DO_UPCAST(TAPState, nc, nc);
286 
287     return tap_fd_set_vnet_le(s->fd, is_le);
288 }
289 
290 static int tap_set_vnet_be(NetClientState *nc, bool is_be)
291 {
292     TAPState *s = DO_UPCAST(TAPState, nc, nc);
293 
294     return tap_fd_set_vnet_be(s->fd, is_be);
295 }
296 
297 static void tap_set_offload(NetClientState *nc, int csum, int tso4,
298                      int tso6, int ecn, int ufo)
299 {
300     TAPState *s = DO_UPCAST(TAPState, nc, nc);
301     if (s->fd < 0) {
302         return;
303     }
304 
305     tap_fd_set_offload(s->fd, csum, tso4, tso6, ecn, ufo);
306 }
307 
308 static void tap_exit_notify(Notifier *notifier, void *data)
309 {
310     TAPState *s = container_of(notifier, TAPState, exit);
311     Error *err = NULL;
312 
313     if (s->down_script[0]) {
314         launch_script(s->down_script, s->down_script_arg, s->fd, &err);
315         if (err) {
316             error_report_err(err);
317         }
318     }
319 }
320 
321 static void tap_cleanup(NetClientState *nc)
322 {
323     TAPState *s = DO_UPCAST(TAPState, nc, nc);
324 
325     if (s->vhost_net) {
326         vhost_net_cleanup(s->vhost_net);
327         g_free(s->vhost_net);
328         s->vhost_net = NULL;
329     }
330 
331     qemu_purge_queued_packets(nc);
332 
333     tap_exit_notify(&s->exit, NULL);
334     qemu_remove_exit_notifier(&s->exit);
335 
336     tap_read_poll(s, false);
337     tap_write_poll(s, false);
338     close(s->fd);
339     s->fd = -1;
340 }
341 
342 static void tap_poll(NetClientState *nc, bool enable)
343 {
344     TAPState *s = DO_UPCAST(TAPState, nc, nc);
345     tap_read_poll(s, enable);
346     tap_write_poll(s, enable);
347 }
348 
349 static bool tap_set_steering_ebpf(NetClientState *nc, int prog_fd)
350 {
351     TAPState *s = DO_UPCAST(TAPState, nc, nc);
352     assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
353 
354     return tap_fd_set_steering_ebpf(s->fd, prog_fd) == 0;
355 }
356 
357 int tap_get_fd(NetClientState *nc)
358 {
359     TAPState *s = DO_UPCAST(TAPState, nc, nc);
360     assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
361     return s->fd;
362 }
363 
364 /* fd support */
365 
366 static NetClientInfo net_tap_info = {
367     .type = NET_CLIENT_DRIVER_TAP,
368     .size = sizeof(TAPState),
369     .receive = tap_receive,
370     .receive_raw = tap_receive_raw,
371     .receive_iov = tap_receive_iov,
372     .poll = tap_poll,
373     .cleanup = tap_cleanup,
374     .has_ufo = tap_has_ufo,
375     .has_vnet_hdr = tap_has_vnet_hdr,
376     .has_vnet_hdr_len = tap_has_vnet_hdr_len,
377     .using_vnet_hdr = tap_using_vnet_hdr,
378     .set_offload = tap_set_offload,
379     .set_vnet_hdr_len = tap_set_vnet_hdr_len,
380     .set_vnet_le = tap_set_vnet_le,
381     .set_vnet_be = tap_set_vnet_be,
382     .set_steering_ebpf = tap_set_steering_ebpf,
383 };
384 
385 static TAPState *net_tap_fd_init(NetClientState *peer,
386                                  const char *model,
387                                  const char *name,
388                                  int fd,
389                                  int vnet_hdr)
390 {
391     NetClientState *nc;
392     TAPState *s;
393 
394     nc = qemu_new_net_client(&net_tap_info, peer, model, name);
395 
396     s = DO_UPCAST(TAPState, nc, nc);
397 
398     s->fd = fd;
399     s->host_vnet_hdr_len = vnet_hdr ? sizeof(struct virtio_net_hdr) : 0;
400     s->using_vnet_hdr = false;
401     s->has_ufo = tap_probe_has_ufo(s->fd);
402     s->enabled = true;
403     tap_set_offload(&s->nc, 0, 0, 0, 0, 0);
404     /*
405      * Make sure host header length is set correctly in tap:
406      * it might have been modified by another instance of qemu.
407      */
408     if (tap_probe_vnet_hdr_len(s->fd, s->host_vnet_hdr_len)) {
409         tap_fd_set_vnet_hdr_len(s->fd, s->host_vnet_hdr_len);
410     }
411     tap_read_poll(s, true);
412     s->vhost_net = NULL;
413 
414     s->exit.notify = tap_exit_notify;
415     qemu_add_exit_notifier(&s->exit);
416 
417     return s;
418 }
419 
420 static void launch_script(const char *setup_script, const char *ifname,
421                           int fd, Error **errp)
422 {
423     int pid, status;
424     char *args[3];
425     char **parg;
426 
427     /* try to launch network script */
428     pid = fork();
429     if (pid < 0) {
430         error_setg_errno(errp, errno, "could not launch network script %s",
431                          setup_script);
432         return;
433     }
434     if (pid == 0) {
435         int open_max = sysconf(_SC_OPEN_MAX), i;
436 
437         for (i = 3; i < open_max; i++) {
438             if (i != fd) {
439                 close(i);
440             }
441         }
442         parg = args;
443         *parg++ = (char *)setup_script;
444         *parg++ = (char *)ifname;
445         *parg = NULL;
446         execv(setup_script, args);
447         _exit(1);
448     } else {
449         while (waitpid(pid, &status, 0) != pid) {
450             /* loop */
451         }
452 
453         if (WIFEXITED(status) && WEXITSTATUS(status) == 0) {
454             return;
455         }
456         error_setg(errp, "network script %s failed with status %d",
457                    setup_script, status);
458     }
459 }
460 
461 static int recv_fd(int c)
462 {
463     int fd;
464     uint8_t msgbuf[CMSG_SPACE(sizeof(fd))];
465     struct msghdr msg = {
466         .msg_control = msgbuf,
467         .msg_controllen = sizeof(msgbuf),
468     };
469     struct cmsghdr *cmsg;
470     struct iovec iov;
471     uint8_t req[1];
472     ssize_t len;
473 
474     cmsg = CMSG_FIRSTHDR(&msg);
475     cmsg->cmsg_level = SOL_SOCKET;
476     cmsg->cmsg_type = SCM_RIGHTS;
477     cmsg->cmsg_len = CMSG_LEN(sizeof(fd));
478     msg.msg_controllen = cmsg->cmsg_len;
479 
480     iov.iov_base = req;
481     iov.iov_len = sizeof(req);
482 
483     msg.msg_iov = &iov;
484     msg.msg_iovlen = 1;
485 
486     len = recvmsg(c, &msg, 0);
487     if (len > 0) {
488         memcpy(&fd, CMSG_DATA(cmsg), sizeof(fd));
489         return fd;
490     }
491 
492     return len;
493 }
494 
495 static int net_bridge_run_helper(const char *helper, const char *bridge,
496                                  Error **errp)
497 {
498     sigset_t oldmask, mask;
499     g_autofree char *default_helper = NULL;
500     int pid, status;
501     char *args[5];
502     char **parg;
503     int sv[2];
504 
505     sigemptyset(&mask);
506     sigaddset(&mask, SIGCHLD);
507     sigprocmask(SIG_BLOCK, &mask, &oldmask);
508 
509     if (!helper) {
510         helper = default_helper = get_relocated_path(DEFAULT_BRIDGE_HELPER);
511     }
512 
513     if (socketpair(PF_UNIX, SOCK_STREAM, 0, sv) == -1) {
514         error_setg_errno(errp, errno, "socketpair() failed");
515         return -1;
516     }
517 
518     /* try to launch bridge helper */
519     pid = fork();
520     if (pid < 0) {
521         error_setg_errno(errp, errno, "Can't fork bridge helper");
522         return -1;
523     }
524     if (pid == 0) {
525         int open_max = sysconf(_SC_OPEN_MAX), i;
526         char *fd_buf = NULL;
527         char *br_buf = NULL;
528         char *helper_cmd = NULL;
529 
530         for (i = 3; i < open_max; i++) {
531             if (i != sv[1]) {
532                 close(i);
533             }
534         }
535 
536         fd_buf = g_strdup_printf("%s%d", "--fd=", sv[1]);
537 
538         if (strrchr(helper, ' ') || strrchr(helper, '\t')) {
539             /* assume helper is a command */
540 
541             if (strstr(helper, "--br=") == NULL) {
542                 br_buf = g_strdup_printf("%s%s", "--br=", bridge);
543             }
544 
545             helper_cmd = g_strdup_printf("%s %s %s %s", helper,
546                             "--use-vnet", fd_buf, br_buf ? br_buf : "");
547 
548             parg = args;
549             *parg++ = (char *)"sh";
550             *parg++ = (char *)"-c";
551             *parg++ = helper_cmd;
552             *parg++ = NULL;
553 
554             execv("/bin/sh", args);
555             g_free(helper_cmd);
556         } else {
557             /* assume helper is just the executable path name */
558 
559             br_buf = g_strdup_printf("%s%s", "--br=", bridge);
560 
561             parg = args;
562             *parg++ = (char *)helper;
563             *parg++ = (char *)"--use-vnet";
564             *parg++ = fd_buf;
565             *parg++ = br_buf;
566             *parg++ = NULL;
567 
568             execv(helper, args);
569         }
570         g_free(fd_buf);
571         g_free(br_buf);
572         _exit(1);
573 
574     } else {
575         int fd;
576         int saved_errno;
577 
578         close(sv[1]);
579 
580         do {
581             fd = recv_fd(sv[0]);
582         } while (fd == -1 && errno == EINTR);
583         saved_errno = errno;
584 
585         close(sv[0]);
586 
587         while (waitpid(pid, &status, 0) != pid) {
588             /* loop */
589         }
590         sigprocmask(SIG_SETMASK, &oldmask, NULL);
591         if (fd < 0) {
592             error_setg_errno(errp, saved_errno,
593                              "failed to recv file descriptor");
594             return -1;
595         }
596         if (!WIFEXITED(status) || WEXITSTATUS(status) != 0) {
597             error_setg(errp, "bridge helper failed");
598             return -1;
599         }
600         return fd;
601     }
602 }
603 
604 int net_init_bridge(const Netdev *netdev, const char *name,
605                     NetClientState *peer, Error **errp)
606 {
607     const NetdevBridgeOptions *bridge;
608     const char *helper, *br;
609     TAPState *s;
610     int fd, vnet_hdr;
611 
612     assert(netdev->type == NET_CLIENT_DRIVER_BRIDGE);
613     bridge = &netdev->u.bridge;
614     helper = bridge->has_helper ? bridge->helper : NULL;
615     br     = bridge->has_br     ? bridge->br     : DEFAULT_BRIDGE_INTERFACE;
616 
617     fd = net_bridge_run_helper(helper, br, errp);
618     if (fd == -1) {
619         return -1;
620     }
621 
622     if (!g_unix_set_fd_nonblocking(fd, true, NULL)) {
623         error_setg_errno(errp, errno, "Failed to set FD nonblocking");
624         return -1;
625     }
626     vnet_hdr = tap_probe_vnet_hdr(fd, errp);
627     if (vnet_hdr < 0) {
628         close(fd);
629         return -1;
630     }
631     s = net_tap_fd_init(peer, "bridge", name, fd, vnet_hdr);
632 
633     snprintf(s->nc.info_str, sizeof(s->nc.info_str), "helper=%s,br=%s", helper,
634              br);
635 
636     return 0;
637 }
638 
639 static int net_tap_init(const NetdevTapOptions *tap, int *vnet_hdr,
640                         const char *setup_script, char *ifname,
641                         size_t ifname_sz, int mq_required, Error **errp)
642 {
643     Error *err = NULL;
644     int fd, vnet_hdr_required;
645 
646     if (tap->has_vnet_hdr) {
647         *vnet_hdr = tap->vnet_hdr;
648         vnet_hdr_required = *vnet_hdr;
649     } else {
650         *vnet_hdr = 1;
651         vnet_hdr_required = 0;
652     }
653 
654     TFR(fd = tap_open(ifname, ifname_sz, vnet_hdr, vnet_hdr_required,
655                       mq_required, errp));
656     if (fd < 0) {
657         return -1;
658     }
659 
660     if (setup_script &&
661         setup_script[0] != '\0' &&
662         strcmp(setup_script, "no") != 0) {
663         launch_script(setup_script, ifname, fd, &err);
664         if (err) {
665             error_propagate(errp, err);
666             close(fd);
667             return -1;
668         }
669     }
670 
671     return fd;
672 }
673 
674 #define MAX_TAP_QUEUES 1024
675 
676 static void net_init_tap_one(const NetdevTapOptions *tap, NetClientState *peer,
677                              const char *model, const char *name,
678                              const char *ifname, const char *script,
679                              const char *downscript, const char *vhostfdname,
680                              int vnet_hdr, int fd, Error **errp)
681 {
682     Error *err = NULL;
683     TAPState *s = net_tap_fd_init(peer, model, name, fd, vnet_hdr);
684     int vhostfd;
685 
686     tap_set_sndbuf(s->fd, tap, &err);
687     if (err) {
688         error_propagate(errp, err);
689         return;
690     }
691 
692     if (tap->has_fd || tap->has_fds) {
693         snprintf(s->nc.info_str, sizeof(s->nc.info_str), "fd=%d", fd);
694     } else if (tap->has_helper) {
695         snprintf(s->nc.info_str, sizeof(s->nc.info_str), "helper=%s",
696                  tap->helper);
697     } else {
698         snprintf(s->nc.info_str, sizeof(s->nc.info_str),
699                  "ifname=%s,script=%s,downscript=%s", ifname, script,
700                  downscript);
701 
702         if (strcmp(downscript, "no") != 0) {
703             snprintf(s->down_script, sizeof(s->down_script), "%s", downscript);
704             snprintf(s->down_script_arg, sizeof(s->down_script_arg),
705                      "%s", ifname);
706         }
707     }
708 
709     if (tap->has_vhost ? tap->vhost :
710         vhostfdname || (tap->has_vhostforce && tap->vhostforce)) {
711         VhostNetOptions options;
712 
713         options.backend_type = VHOST_BACKEND_TYPE_KERNEL;
714         options.net_backend = &s->nc;
715         if (tap->has_poll_us) {
716             options.busyloop_timeout = tap->poll_us;
717         } else {
718             options.busyloop_timeout = 0;
719         }
720 
721         if (vhostfdname) {
722             vhostfd = monitor_fd_param(monitor_cur(), vhostfdname, &err);
723             if (vhostfd == -1) {
724                 if (tap->has_vhostforce && tap->vhostforce) {
725                     error_propagate(errp, err);
726                 } else {
727                     warn_report_err(err);
728                 }
729                 return;
730             }
731             if (!g_unix_set_fd_nonblocking(vhostfd, true, NULL)) {
732                 error_setg_errno(errp, errno, "%s: Can't use file descriptor %d",
733                                  name, fd);
734                 return;
735             }
736         } else {
737             vhostfd = open("/dev/vhost-net", O_RDWR);
738             if (vhostfd < 0) {
739                 if (tap->has_vhostforce && tap->vhostforce) {
740                     error_setg_errno(errp, errno,
741                                      "tap: open vhost char device failed");
742                 } else {
743                     warn_report("tap: open vhost char device failed: %s",
744                                 strerror(errno));
745                 }
746                 return;
747             }
748             if (!g_unix_set_fd_nonblocking(vhostfd, true, NULL)) {
749                 error_setg_errno(errp, errno, "Failed to set FD nonblocking");
750                 return;
751             }
752         }
753         options.opaque = (void *)(uintptr_t)vhostfd;
754         options.nvqs = 2;
755 
756         s->vhost_net = vhost_net_init(&options);
757         if (!s->vhost_net) {
758             if (tap->has_vhostforce && tap->vhostforce) {
759                 error_setg(errp, VHOST_NET_INIT_FAILED);
760             } else {
761                 warn_report(VHOST_NET_INIT_FAILED);
762             }
763             return;
764         }
765     } else if (vhostfdname) {
766         error_setg(errp, "vhostfd(s)= is not valid without vhost");
767     }
768 }
769 
770 static int get_fds(char *str, char *fds[], int max)
771 {
772     char *ptr = str, *this;
773     size_t len = strlen(str);
774     int i = 0;
775 
776     while (i < max && ptr < str + len) {
777         this = strchr(ptr, ':');
778 
779         if (this == NULL) {
780             fds[i] = g_strdup(ptr);
781         } else {
782             fds[i] = g_strndup(ptr, this - ptr);
783         }
784 
785         i++;
786         if (this == NULL) {
787             break;
788         } else {
789             ptr = this + 1;
790         }
791     }
792 
793     return i;
794 }
795 
796 int net_init_tap(const Netdev *netdev, const char *name,
797                  NetClientState *peer, Error **errp)
798 {
799     const NetdevTapOptions *tap;
800     int fd, vnet_hdr = 0, i = 0, queues;
801     /* for the no-fd, no-helper case */
802     const char *script;
803     const char *downscript;
804     Error *err = NULL;
805     const char *vhostfdname;
806     char ifname[128];
807     int ret = 0;
808 
809     assert(netdev->type == NET_CLIENT_DRIVER_TAP);
810     tap = &netdev->u.tap;
811     queues = tap->has_queues ? tap->queues : 1;
812     vhostfdname = tap->has_vhostfd ? tap->vhostfd : NULL;
813     script = tap->has_script ? tap->script : NULL;
814     downscript = tap->has_downscript ? tap->downscript : NULL;
815 
816     /* QEMU hubs do not support multiqueue tap, in this case peer is set.
817      * For -netdev, peer is always NULL. */
818     if (peer && (tap->has_queues || tap->has_fds || tap->has_vhostfds)) {
819         error_setg(errp, "Multiqueue tap cannot be used with hubs");
820         return -1;
821     }
822 
823     if (tap->has_fd) {
824         if (tap->has_ifname || tap->has_script || tap->has_downscript ||
825             tap->has_vnet_hdr || tap->has_helper || tap->has_queues ||
826             tap->has_fds || tap->has_vhostfds) {
827             error_setg(errp, "ifname=, script=, downscript=, vnet_hdr=, "
828                        "helper=, queues=, fds=, and vhostfds= "
829                        "are invalid with fd=");
830             return -1;
831         }
832 
833         fd = monitor_fd_param(monitor_cur(), tap->fd, errp);
834         if (fd == -1) {
835             return -1;
836         }
837 
838         if (!g_unix_set_fd_nonblocking(fd, true, NULL)) {
839             error_setg_errno(errp, errno, "%s: Can't use file descriptor %d",
840                              name, fd);
841             close(fd);
842             return -1;
843         }
844 
845         vnet_hdr = tap_probe_vnet_hdr(fd, errp);
846         if (vnet_hdr < 0) {
847             close(fd);
848             return -1;
849         }
850 
851         net_init_tap_one(tap, peer, "tap", name, NULL,
852                          script, downscript,
853                          vhostfdname, vnet_hdr, fd, &err);
854         if (err) {
855             error_propagate(errp, err);
856             close(fd);
857             return -1;
858         }
859     } else if (tap->has_fds) {
860         char **fds;
861         char **vhost_fds;
862         int nfds = 0, nvhosts = 0;
863 
864         if (tap->has_ifname || tap->has_script || tap->has_downscript ||
865             tap->has_vnet_hdr || tap->has_helper || tap->has_queues ||
866             tap->has_vhostfd) {
867             error_setg(errp, "ifname=, script=, downscript=, vnet_hdr=, "
868                        "helper=, queues=, and vhostfd= "
869                        "are invalid with fds=");
870             return -1;
871         }
872 
873         fds = g_new0(char *, MAX_TAP_QUEUES);
874         vhost_fds = g_new0(char *, MAX_TAP_QUEUES);
875 
876         nfds = get_fds(tap->fds, fds, MAX_TAP_QUEUES);
877         if (tap->has_vhostfds) {
878             nvhosts = get_fds(tap->vhostfds, vhost_fds, MAX_TAP_QUEUES);
879             if (nfds != nvhosts) {
880                 error_setg(errp, "The number of fds passed does not match "
881                            "the number of vhostfds passed");
882                 ret = -1;
883                 goto free_fail;
884             }
885         }
886 
887         for (i = 0; i < nfds; i++) {
888             fd = monitor_fd_param(monitor_cur(), fds[i], errp);
889             if (fd == -1) {
890                 ret = -1;
891                 goto free_fail;
892             }
893 
894             ret = g_unix_set_fd_nonblocking(fd, true, NULL);
895             if (!ret) {
896                 error_setg_errno(errp, errno, "%s: Can't use file descriptor %d",
897                                  name, fd);
898                 goto free_fail;
899             }
900 
901             if (i == 0) {
902                 vnet_hdr = tap_probe_vnet_hdr(fd, errp);
903                 if (vnet_hdr < 0) {
904                     ret = -1;
905                     goto free_fail;
906                 }
907             } else if (vnet_hdr != tap_probe_vnet_hdr(fd, NULL)) {
908                 error_setg(errp,
909                            "vnet_hdr not consistent across given tap fds");
910                 ret = -1;
911                 goto free_fail;
912             }
913 
914             net_init_tap_one(tap, peer, "tap", name, ifname,
915                              script, downscript,
916                              tap->has_vhostfds ? vhost_fds[i] : NULL,
917                              vnet_hdr, fd, &err);
918             if (err) {
919                 error_propagate(errp, err);
920                 ret = -1;
921                 goto free_fail;
922             }
923         }
924 
925 free_fail:
926         for (i = 0; i < nvhosts; i++) {
927             g_free(vhost_fds[i]);
928         }
929         for (i = 0; i < nfds; i++) {
930             g_free(fds[i]);
931         }
932         g_free(fds);
933         g_free(vhost_fds);
934         return ret;
935     } else if (tap->has_helper) {
936         if (tap->has_ifname || tap->has_script || tap->has_downscript ||
937             tap->has_vnet_hdr || tap->has_queues || tap->has_vhostfds) {
938             error_setg(errp, "ifname=, script=, downscript=, vnet_hdr=, "
939                        "queues=, and vhostfds= are invalid with helper=");
940             return -1;
941         }
942 
943         fd = net_bridge_run_helper(tap->helper,
944                                    tap->has_br ?
945                                    tap->br : DEFAULT_BRIDGE_INTERFACE,
946                                    errp);
947         if (fd == -1) {
948             return -1;
949         }
950 
951         if (!g_unix_set_fd_nonblocking(fd, true, NULL)) {
952             error_setg_errno(errp, errno, "Failed to set FD nonblocking");
953             return -1;
954         }
955         vnet_hdr = tap_probe_vnet_hdr(fd, errp);
956         if (vnet_hdr < 0) {
957             close(fd);
958             return -1;
959         }
960 
961         net_init_tap_one(tap, peer, "bridge", name, ifname,
962                          script, downscript, vhostfdname,
963                          vnet_hdr, fd, &err);
964         if (err) {
965             error_propagate(errp, err);
966             close(fd);
967             return -1;
968         }
969     } else {
970         g_autofree char *default_script = NULL;
971         g_autofree char *default_downscript = NULL;
972         if (tap->has_vhostfds) {
973             error_setg(errp, "vhostfds= is invalid if fds= wasn't specified");
974             return -1;
975         }
976 
977         if (!script) {
978             script = default_script = get_relocated_path(DEFAULT_NETWORK_SCRIPT);
979         }
980         if (!downscript) {
981             downscript = default_downscript =
982                                  get_relocated_path(DEFAULT_NETWORK_DOWN_SCRIPT);
983         }
984 
985         if (tap->has_ifname) {
986             pstrcpy(ifname, sizeof ifname, tap->ifname);
987         } else {
988             ifname[0] = '\0';
989         }
990 
991         for (i = 0; i < queues; i++) {
992             fd = net_tap_init(tap, &vnet_hdr, i >= 1 ? "no" : script,
993                               ifname, sizeof ifname, queues > 1, errp);
994             if (fd == -1) {
995                 return -1;
996             }
997 
998             if (queues > 1 && i == 0 && !tap->has_ifname) {
999                 if (tap_fd_get_ifname(fd, ifname)) {
1000                     error_setg(errp, "Fail to get ifname");
1001                     close(fd);
1002                     return -1;
1003                 }
1004             }
1005 
1006             net_init_tap_one(tap, peer, "tap", name, ifname,
1007                              i >= 1 ? "no" : script,
1008                              i >= 1 ? "no" : downscript,
1009                              vhostfdname, vnet_hdr, fd, &err);
1010             if (err) {
1011                 error_propagate(errp, err);
1012                 close(fd);
1013                 return -1;
1014             }
1015         }
1016     }
1017 
1018     return 0;
1019 }
1020 
1021 VHostNetState *tap_get_vhost_net(NetClientState *nc)
1022 {
1023     TAPState *s = DO_UPCAST(TAPState, nc, nc);
1024     assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
1025     return s->vhost_net;
1026 }
1027 
1028 int tap_enable(NetClientState *nc)
1029 {
1030     TAPState *s = DO_UPCAST(TAPState, nc, nc);
1031     int ret;
1032 
1033     if (s->enabled) {
1034         return 0;
1035     } else {
1036         ret = tap_fd_enable(s->fd);
1037         if (ret == 0) {
1038             s->enabled = true;
1039             tap_update_fd_handler(s);
1040         }
1041         return ret;
1042     }
1043 }
1044 
1045 int tap_disable(NetClientState *nc)
1046 {
1047     TAPState *s = DO_UPCAST(TAPState, nc, nc);
1048     int ret;
1049 
1050     if (s->enabled == 0) {
1051         return 0;
1052     } else {
1053         ret = tap_fd_disable(s->fd);
1054         if (ret == 0) {
1055             qemu_purge_queued_packets(nc);
1056             s->enabled = false;
1057             tap_update_fd_handler(s);
1058         }
1059         return ret;
1060     }
1061 }
1062