xref: /openbmc/qemu/net/tap.c (revision c49b67f72b1a875ca355a170759303b0faa959ca)
1  /*
2   * QEMU System Emulator
3   *
4   * Copyright (c) 2003-2008 Fabrice Bellard
5   * Copyright (c) 2009 Red Hat, Inc.
6   *
7   * Permission is hereby granted, free of charge, to any person obtaining a copy
8   * of this software and associated documentation files (the "Software"), to deal
9   * in the Software without restriction, including without limitation the rights
10   * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
11   * copies of the Software, and to permit persons to whom the Software is
12   * furnished to do so, subject to the following conditions:
13   *
14   * The above copyright notice and this permission notice shall be included in
15   * all copies or substantial portions of the Software.
16   *
17   * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
18   * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
19   * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
20   * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
21   * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
22   * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
23   * THE SOFTWARE.
24   */
25  
26  #include "qemu/osdep.h"
27  #include "tap_int.h"
28  
29  
30  #include <sys/ioctl.h>
31  #include <sys/wait.h>
32  #include <sys/socket.h>
33  #include <net/if.h>
34  
35  #include "net/eth.h"
36  #include "net/net.h"
37  #include "clients.h"
38  #include "monitor/monitor.h"
39  #include "sysemu/sysemu.h"
40  #include "qapi/error.h"
41  #include "qemu/cutils.h"
42  #include "qemu/error-report.h"
43  #include "qemu/main-loop.h"
44  #include "qemu/sockets.h"
45  
46  #include "net/tap.h"
47  
48  #include "net/vhost_net.h"
49  
50  typedef struct TAPState {
51      NetClientState nc;
52      int fd;
53      char down_script[1024];
54      char down_script_arg[128];
55      uint8_t buf[NET_BUFSIZE];
56      bool read_poll;
57      bool write_poll;
58      bool using_vnet_hdr;
59      bool has_ufo;
60      bool enabled;
61      VHostNetState *vhost_net;
62      unsigned host_vnet_hdr_len;
63      Notifier exit;
64  } TAPState;
65  
66  static void launch_script(const char *setup_script, const char *ifname,
67                            int fd, Error **errp);
68  
69  static void tap_send(void *opaque);
70  static void tap_writable(void *opaque);
71  
72  static void tap_update_fd_handler(TAPState *s)
73  {
74      qemu_set_fd_handler(s->fd,
75                          s->read_poll && s->enabled ? tap_send : NULL,
76                          s->write_poll && s->enabled ? tap_writable : NULL,
77                          s);
78  }
79  
80  static void tap_read_poll(TAPState *s, bool enable)
81  {
82      s->read_poll = enable;
83      tap_update_fd_handler(s);
84  }
85  
86  static void tap_write_poll(TAPState *s, bool enable)
87  {
88      s->write_poll = enable;
89      tap_update_fd_handler(s);
90  }
91  
92  static void tap_writable(void *opaque)
93  {
94      TAPState *s = opaque;
95  
96      tap_write_poll(s, false);
97  
98      qemu_flush_queued_packets(&s->nc);
99  }
100  
101  static ssize_t tap_write_packet(TAPState *s, const struct iovec *iov, int iovcnt)
102  {
103      ssize_t len;
104  
105      do {
106          len = writev(s->fd, iov, iovcnt);
107      } while (len == -1 && errno == EINTR);
108  
109      if (len == -1 && errno == EAGAIN) {
110          tap_write_poll(s, true);
111          return 0;
112      }
113  
114      return len;
115  }
116  
117  static ssize_t tap_receive_iov(NetClientState *nc, const struct iovec *iov,
118                                 int iovcnt)
119  {
120      TAPState *s = DO_UPCAST(TAPState, nc, nc);
121      const struct iovec *iovp = iov;
122      struct iovec iov_copy[iovcnt + 1];
123      struct virtio_net_hdr_mrg_rxbuf hdr = { };
124  
125      if (s->host_vnet_hdr_len && !s->using_vnet_hdr) {
126          iov_copy[0].iov_base = &hdr;
127          iov_copy[0].iov_len =  s->host_vnet_hdr_len;
128          memcpy(&iov_copy[1], iov, iovcnt * sizeof(*iov));
129          iovp = iov_copy;
130          iovcnt++;
131      }
132  
133      return tap_write_packet(s, iovp, iovcnt);
134  }
135  
136  static ssize_t tap_receive_raw(NetClientState *nc, const uint8_t *buf, size_t size)
137  {
138      TAPState *s = DO_UPCAST(TAPState, nc, nc);
139      struct iovec iov[2];
140      int iovcnt = 0;
141      struct virtio_net_hdr_mrg_rxbuf hdr = { };
142  
143      if (s->host_vnet_hdr_len) {
144          iov[iovcnt].iov_base = &hdr;
145          iov[iovcnt].iov_len  = s->host_vnet_hdr_len;
146          iovcnt++;
147      }
148  
149      iov[iovcnt].iov_base = (char *)buf;
150      iov[iovcnt].iov_len  = size;
151      iovcnt++;
152  
153      return tap_write_packet(s, iov, iovcnt);
154  }
155  
156  static ssize_t tap_receive(NetClientState *nc, const uint8_t *buf, size_t size)
157  {
158      TAPState *s = DO_UPCAST(TAPState, nc, nc);
159      struct iovec iov[1];
160  
161      if (s->host_vnet_hdr_len && !s->using_vnet_hdr) {
162          return tap_receive_raw(nc, buf, size);
163      }
164  
165      iov[0].iov_base = (char *)buf;
166      iov[0].iov_len  = size;
167  
168      return tap_write_packet(s, iov, 1);
169  }
170  
171  #ifndef __sun__
172  ssize_t tap_read_packet(int tapfd, uint8_t *buf, int maxlen)
173  {
174      return read(tapfd, buf, maxlen);
175  }
176  #endif
177  
178  static void tap_send_completed(NetClientState *nc, ssize_t len)
179  {
180      TAPState *s = DO_UPCAST(TAPState, nc, nc);
181      tap_read_poll(s, true);
182  }
183  
184  static void tap_send(void *opaque)
185  {
186      TAPState *s = opaque;
187      int size;
188      int packets = 0;
189  
190      while (true) {
191          uint8_t *buf = s->buf;
192          uint8_t min_pkt[ETH_ZLEN];
193          size_t min_pktsz = sizeof(min_pkt);
194  
195          size = tap_read_packet(s->fd, s->buf, sizeof(s->buf));
196          if (size <= 0) {
197              break;
198          }
199  
200          if (s->host_vnet_hdr_len && !s->using_vnet_hdr) {
201              buf  += s->host_vnet_hdr_len;
202              size -= s->host_vnet_hdr_len;
203          }
204  
205          if (net_peer_needs_padding(&s->nc)) {
206              if (eth_pad_short_frame(min_pkt, &min_pktsz, buf, size)) {
207                  buf = min_pkt;
208                  size = min_pktsz;
209              }
210          }
211  
212          size = qemu_send_packet_async(&s->nc, buf, size, tap_send_completed);
213          if (size == 0) {
214              tap_read_poll(s, false);
215              break;
216          } else if (size < 0) {
217              break;
218          }
219  
220          /*
221           * When the host keeps receiving more packets while tap_send() is
222           * running we can hog the QEMU global mutex.  Limit the number of
223           * packets that are processed per tap_send() callback to prevent
224           * stalling the guest.
225           */
226          packets++;
227          if (packets >= 50) {
228              break;
229          }
230      }
231  }
232  
233  static bool tap_has_ufo(NetClientState *nc)
234  {
235      TAPState *s = DO_UPCAST(TAPState, nc, nc);
236  
237      assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
238  
239      return s->has_ufo;
240  }
241  
242  static bool tap_has_vnet_hdr(NetClientState *nc)
243  {
244      TAPState *s = DO_UPCAST(TAPState, nc, nc);
245  
246      assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
247  
248      return !!s->host_vnet_hdr_len;
249  }
250  
251  static bool tap_has_vnet_hdr_len(NetClientState *nc, int len)
252  {
253      TAPState *s = DO_UPCAST(TAPState, nc, nc);
254  
255      assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
256  
257      return !!tap_probe_vnet_hdr_len(s->fd, len);
258  }
259  
260  static void tap_set_vnet_hdr_len(NetClientState *nc, int len)
261  {
262      TAPState *s = DO_UPCAST(TAPState, nc, nc);
263  
264      assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
265      assert(len == sizeof(struct virtio_net_hdr_mrg_rxbuf) ||
266             len == sizeof(struct virtio_net_hdr) ||
267             len == sizeof(struct virtio_net_hdr_v1_hash));
268  
269      tap_fd_set_vnet_hdr_len(s->fd, len);
270      s->host_vnet_hdr_len = len;
271  }
272  
273  static void tap_using_vnet_hdr(NetClientState *nc, bool using_vnet_hdr)
274  {
275      TAPState *s = DO_UPCAST(TAPState, nc, nc);
276  
277      assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
278      assert(!!s->host_vnet_hdr_len == using_vnet_hdr);
279  
280      s->using_vnet_hdr = using_vnet_hdr;
281  }
282  
283  static int tap_set_vnet_le(NetClientState *nc, bool is_le)
284  {
285      TAPState *s = DO_UPCAST(TAPState, nc, nc);
286  
287      return tap_fd_set_vnet_le(s->fd, is_le);
288  }
289  
290  static int tap_set_vnet_be(NetClientState *nc, bool is_be)
291  {
292      TAPState *s = DO_UPCAST(TAPState, nc, nc);
293  
294      return tap_fd_set_vnet_be(s->fd, is_be);
295  }
296  
297  static void tap_set_offload(NetClientState *nc, int csum, int tso4,
298                       int tso6, int ecn, int ufo)
299  {
300      TAPState *s = DO_UPCAST(TAPState, nc, nc);
301      if (s->fd < 0) {
302          return;
303      }
304  
305      tap_fd_set_offload(s->fd, csum, tso4, tso6, ecn, ufo);
306  }
307  
308  static void tap_exit_notify(Notifier *notifier, void *data)
309  {
310      TAPState *s = container_of(notifier, TAPState, exit);
311      Error *err = NULL;
312  
313      if (s->down_script[0]) {
314          launch_script(s->down_script, s->down_script_arg, s->fd, &err);
315          if (err) {
316              error_report_err(err);
317          }
318      }
319  }
320  
321  static void tap_cleanup(NetClientState *nc)
322  {
323      TAPState *s = DO_UPCAST(TAPState, nc, nc);
324  
325      if (s->vhost_net) {
326          vhost_net_cleanup(s->vhost_net);
327          g_free(s->vhost_net);
328          s->vhost_net = NULL;
329      }
330  
331      qemu_purge_queued_packets(nc);
332  
333      tap_exit_notify(&s->exit, NULL);
334      qemu_remove_exit_notifier(&s->exit);
335  
336      tap_read_poll(s, false);
337      tap_write_poll(s, false);
338      close(s->fd);
339      s->fd = -1;
340  }
341  
342  static void tap_poll(NetClientState *nc, bool enable)
343  {
344      TAPState *s = DO_UPCAST(TAPState, nc, nc);
345      tap_read_poll(s, enable);
346      tap_write_poll(s, enable);
347  }
348  
349  static bool tap_set_steering_ebpf(NetClientState *nc, int prog_fd)
350  {
351      TAPState *s = DO_UPCAST(TAPState, nc, nc);
352      assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
353  
354      return tap_fd_set_steering_ebpf(s->fd, prog_fd) == 0;
355  }
356  
357  int tap_get_fd(NetClientState *nc)
358  {
359      TAPState *s = DO_UPCAST(TAPState, nc, nc);
360      assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
361      return s->fd;
362  }
363  
364  /* fd support */
365  
366  static NetClientInfo net_tap_info = {
367      .type = NET_CLIENT_DRIVER_TAP,
368      .size = sizeof(TAPState),
369      .receive = tap_receive,
370      .receive_raw = tap_receive_raw,
371      .receive_iov = tap_receive_iov,
372      .poll = tap_poll,
373      .cleanup = tap_cleanup,
374      .has_ufo = tap_has_ufo,
375      .has_vnet_hdr = tap_has_vnet_hdr,
376      .has_vnet_hdr_len = tap_has_vnet_hdr_len,
377      .using_vnet_hdr = tap_using_vnet_hdr,
378      .set_offload = tap_set_offload,
379      .set_vnet_hdr_len = tap_set_vnet_hdr_len,
380      .set_vnet_le = tap_set_vnet_le,
381      .set_vnet_be = tap_set_vnet_be,
382      .set_steering_ebpf = tap_set_steering_ebpf,
383  };
384  
385  static TAPState *net_tap_fd_init(NetClientState *peer,
386                                   const char *model,
387                                   const char *name,
388                                   int fd,
389                                   int vnet_hdr)
390  {
391      NetClientState *nc;
392      TAPState *s;
393  
394      nc = qemu_new_net_client(&net_tap_info, peer, model, name);
395  
396      s = DO_UPCAST(TAPState, nc, nc);
397  
398      s->fd = fd;
399      s->host_vnet_hdr_len = vnet_hdr ? sizeof(struct virtio_net_hdr) : 0;
400      s->using_vnet_hdr = false;
401      s->has_ufo = tap_probe_has_ufo(s->fd);
402      s->enabled = true;
403      tap_set_offload(&s->nc, 0, 0, 0, 0, 0);
404      /*
405       * Make sure host header length is set correctly in tap:
406       * it might have been modified by another instance of qemu.
407       */
408      if (tap_probe_vnet_hdr_len(s->fd, s->host_vnet_hdr_len)) {
409          tap_fd_set_vnet_hdr_len(s->fd, s->host_vnet_hdr_len);
410      }
411      tap_read_poll(s, true);
412      s->vhost_net = NULL;
413  
414      s->exit.notify = tap_exit_notify;
415      qemu_add_exit_notifier(&s->exit);
416  
417      return s;
418  }
419  
420  static void launch_script(const char *setup_script, const char *ifname,
421                            int fd, Error **errp)
422  {
423      int pid, status;
424      char *args[3];
425      char **parg;
426  
427      /* try to launch network script */
428      pid = fork();
429      if (pid < 0) {
430          error_setg_errno(errp, errno, "could not launch network script %s",
431                           setup_script);
432          return;
433      }
434      if (pid == 0) {
435          int open_max = sysconf(_SC_OPEN_MAX), i;
436  
437          for (i = 3; i < open_max; i++) {
438              if (i != fd) {
439                  close(i);
440              }
441          }
442          parg = args;
443          *parg++ = (char *)setup_script;
444          *parg++ = (char *)ifname;
445          *parg = NULL;
446          execv(setup_script, args);
447          _exit(1);
448      } else {
449          while (waitpid(pid, &status, 0) != pid) {
450              /* loop */
451          }
452  
453          if (WIFEXITED(status) && WEXITSTATUS(status) == 0) {
454              return;
455          }
456          error_setg(errp, "network script %s failed with status %d",
457                     setup_script, status);
458      }
459  }
460  
461  static int recv_fd(int c)
462  {
463      int fd;
464      uint8_t msgbuf[CMSG_SPACE(sizeof(fd))];
465      struct msghdr msg = {
466          .msg_control = msgbuf,
467          .msg_controllen = sizeof(msgbuf),
468      };
469      struct cmsghdr *cmsg;
470      struct iovec iov;
471      uint8_t req[1];
472      ssize_t len;
473  
474      cmsg = CMSG_FIRSTHDR(&msg);
475      cmsg->cmsg_level = SOL_SOCKET;
476      cmsg->cmsg_type = SCM_RIGHTS;
477      cmsg->cmsg_len = CMSG_LEN(sizeof(fd));
478      msg.msg_controllen = cmsg->cmsg_len;
479  
480      iov.iov_base = req;
481      iov.iov_len = sizeof(req);
482  
483      msg.msg_iov = &iov;
484      msg.msg_iovlen = 1;
485  
486      len = recvmsg(c, &msg, 0);
487      if (len > 0) {
488          memcpy(&fd, CMSG_DATA(cmsg), sizeof(fd));
489          return fd;
490      }
491  
492      return len;
493  }
494  
495  static int net_bridge_run_helper(const char *helper, const char *bridge,
496                                   Error **errp)
497  {
498      sigset_t oldmask, mask;
499      g_autofree char *default_helper = NULL;
500      int pid, status;
501      char *args[5];
502      char **parg;
503      int sv[2];
504  
505      sigemptyset(&mask);
506      sigaddset(&mask, SIGCHLD);
507      sigprocmask(SIG_BLOCK, &mask, &oldmask);
508  
509      if (!helper) {
510          helper = default_helper = get_relocated_path(DEFAULT_BRIDGE_HELPER);
511      }
512  
513      if (socketpair(PF_UNIX, SOCK_STREAM, 0, sv) == -1) {
514          error_setg_errno(errp, errno, "socketpair() failed");
515          return -1;
516      }
517  
518      /* try to launch bridge helper */
519      pid = fork();
520      if (pid < 0) {
521          error_setg_errno(errp, errno, "Can't fork bridge helper");
522          return -1;
523      }
524      if (pid == 0) {
525          int open_max = sysconf(_SC_OPEN_MAX), i;
526          char *fd_buf = NULL;
527          char *br_buf = NULL;
528          char *helper_cmd = NULL;
529  
530          for (i = 3; i < open_max; i++) {
531              if (i != sv[1]) {
532                  close(i);
533              }
534          }
535  
536          fd_buf = g_strdup_printf("%s%d", "--fd=", sv[1]);
537  
538          if (strrchr(helper, ' ') || strrchr(helper, '\t')) {
539              /* assume helper is a command */
540  
541              if (strstr(helper, "--br=") == NULL) {
542                  br_buf = g_strdup_printf("%s%s", "--br=", bridge);
543              }
544  
545              helper_cmd = g_strdup_printf("%s %s %s %s", helper,
546                              "--use-vnet", fd_buf, br_buf ? br_buf : "");
547  
548              parg = args;
549              *parg++ = (char *)"sh";
550              *parg++ = (char *)"-c";
551              *parg++ = helper_cmd;
552              *parg++ = NULL;
553  
554              execv("/bin/sh", args);
555              g_free(helper_cmd);
556          } else {
557              /* assume helper is just the executable path name */
558  
559              br_buf = g_strdup_printf("%s%s", "--br=", bridge);
560  
561              parg = args;
562              *parg++ = (char *)helper;
563              *parg++ = (char *)"--use-vnet";
564              *parg++ = fd_buf;
565              *parg++ = br_buf;
566              *parg++ = NULL;
567  
568              execv(helper, args);
569          }
570          g_free(fd_buf);
571          g_free(br_buf);
572          _exit(1);
573  
574      } else {
575          int fd;
576          int saved_errno;
577  
578          close(sv[1]);
579  
580          do {
581              fd = recv_fd(sv[0]);
582          } while (fd == -1 && errno == EINTR);
583          saved_errno = errno;
584  
585          close(sv[0]);
586  
587          while (waitpid(pid, &status, 0) != pid) {
588              /* loop */
589          }
590          sigprocmask(SIG_SETMASK, &oldmask, NULL);
591          if (fd < 0) {
592              error_setg_errno(errp, saved_errno,
593                               "failed to recv file descriptor");
594              return -1;
595          }
596          if (!WIFEXITED(status) || WEXITSTATUS(status) != 0) {
597              error_setg(errp, "bridge helper failed");
598              return -1;
599          }
600          return fd;
601      }
602  }
603  
604  int net_init_bridge(const Netdev *netdev, const char *name,
605                      NetClientState *peer, Error **errp)
606  {
607      const NetdevBridgeOptions *bridge;
608      const char *helper, *br;
609      TAPState *s;
610      int fd, vnet_hdr;
611  
612      assert(netdev->type == NET_CLIENT_DRIVER_BRIDGE);
613      bridge = &netdev->u.bridge;
614      helper = bridge->has_helper ? bridge->helper : NULL;
615      br     = bridge->has_br     ? bridge->br     : DEFAULT_BRIDGE_INTERFACE;
616  
617      fd = net_bridge_run_helper(helper, br, errp);
618      if (fd == -1) {
619          return -1;
620      }
621  
622      if (!g_unix_set_fd_nonblocking(fd, true, NULL)) {
623          error_setg_errno(errp, errno, "Failed to set FD nonblocking");
624          return -1;
625      }
626      vnet_hdr = tap_probe_vnet_hdr(fd, errp);
627      if (vnet_hdr < 0) {
628          close(fd);
629          return -1;
630      }
631      s = net_tap_fd_init(peer, "bridge", name, fd, vnet_hdr);
632  
633      snprintf(s->nc.info_str, sizeof(s->nc.info_str), "helper=%s,br=%s", helper,
634               br);
635  
636      return 0;
637  }
638  
639  static int net_tap_init(const NetdevTapOptions *tap, int *vnet_hdr,
640                          const char *setup_script, char *ifname,
641                          size_t ifname_sz, int mq_required, Error **errp)
642  {
643      Error *err = NULL;
644      int fd, vnet_hdr_required;
645  
646      if (tap->has_vnet_hdr) {
647          *vnet_hdr = tap->vnet_hdr;
648          vnet_hdr_required = *vnet_hdr;
649      } else {
650          *vnet_hdr = 1;
651          vnet_hdr_required = 0;
652      }
653  
654      TFR(fd = tap_open(ifname, ifname_sz, vnet_hdr, vnet_hdr_required,
655                        mq_required, errp));
656      if (fd < 0) {
657          return -1;
658      }
659  
660      if (setup_script &&
661          setup_script[0] != '\0' &&
662          strcmp(setup_script, "no") != 0) {
663          launch_script(setup_script, ifname, fd, &err);
664          if (err) {
665              error_propagate(errp, err);
666              close(fd);
667              return -1;
668          }
669      }
670  
671      return fd;
672  }
673  
674  #define MAX_TAP_QUEUES 1024
675  
676  static void net_init_tap_one(const NetdevTapOptions *tap, NetClientState *peer,
677                               const char *model, const char *name,
678                               const char *ifname, const char *script,
679                               const char *downscript, const char *vhostfdname,
680                               int vnet_hdr, int fd, Error **errp)
681  {
682      Error *err = NULL;
683      TAPState *s = net_tap_fd_init(peer, model, name, fd, vnet_hdr);
684      int vhostfd;
685  
686      tap_set_sndbuf(s->fd, tap, &err);
687      if (err) {
688          error_propagate(errp, err);
689          return;
690      }
691  
692      if (tap->has_fd || tap->has_fds) {
693          snprintf(s->nc.info_str, sizeof(s->nc.info_str), "fd=%d", fd);
694      } else if (tap->has_helper) {
695          snprintf(s->nc.info_str, sizeof(s->nc.info_str), "helper=%s",
696                   tap->helper);
697      } else {
698          snprintf(s->nc.info_str, sizeof(s->nc.info_str),
699                   "ifname=%s,script=%s,downscript=%s", ifname, script,
700                   downscript);
701  
702          if (strcmp(downscript, "no") != 0) {
703              snprintf(s->down_script, sizeof(s->down_script), "%s", downscript);
704              snprintf(s->down_script_arg, sizeof(s->down_script_arg),
705                       "%s", ifname);
706          }
707      }
708  
709      if (tap->has_vhost ? tap->vhost :
710          vhostfdname || (tap->has_vhostforce && tap->vhostforce)) {
711          VhostNetOptions options;
712  
713          options.backend_type = VHOST_BACKEND_TYPE_KERNEL;
714          options.net_backend = &s->nc;
715          if (tap->has_poll_us) {
716              options.busyloop_timeout = tap->poll_us;
717          } else {
718              options.busyloop_timeout = 0;
719          }
720  
721          if (vhostfdname) {
722              vhostfd = monitor_fd_param(monitor_cur(), vhostfdname, &err);
723              if (vhostfd == -1) {
724                  if (tap->has_vhostforce && tap->vhostforce) {
725                      error_propagate(errp, err);
726                  } else {
727                      warn_report_err(err);
728                  }
729                  return;
730              }
731              if (!g_unix_set_fd_nonblocking(vhostfd, true, NULL)) {
732                  error_setg_errno(errp, errno, "%s: Can't use file descriptor %d",
733                                   name, fd);
734                  return;
735              }
736          } else {
737              vhostfd = open("/dev/vhost-net", O_RDWR);
738              if (vhostfd < 0) {
739                  if (tap->has_vhostforce && tap->vhostforce) {
740                      error_setg_errno(errp, errno,
741                                       "tap: open vhost char device failed");
742                  } else {
743                      warn_report("tap: open vhost char device failed: %s",
744                                  strerror(errno));
745                  }
746                  return;
747              }
748              if (!g_unix_set_fd_nonblocking(vhostfd, true, NULL)) {
749                  error_setg_errno(errp, errno, "Failed to set FD nonblocking");
750                  return;
751              }
752          }
753          options.opaque = (void *)(uintptr_t)vhostfd;
754          options.nvqs = 2;
755  
756          s->vhost_net = vhost_net_init(&options);
757          if (!s->vhost_net) {
758              if (tap->has_vhostforce && tap->vhostforce) {
759                  error_setg(errp, VHOST_NET_INIT_FAILED);
760              } else {
761                  warn_report(VHOST_NET_INIT_FAILED);
762              }
763              return;
764          }
765      } else if (vhostfdname) {
766          error_setg(errp, "vhostfd(s)= is not valid without vhost");
767      }
768  }
769  
770  static int get_fds(char *str, char *fds[], int max)
771  {
772      char *ptr = str, *this;
773      size_t len = strlen(str);
774      int i = 0;
775  
776      while (i < max && ptr < str + len) {
777          this = strchr(ptr, ':');
778  
779          if (this == NULL) {
780              fds[i] = g_strdup(ptr);
781          } else {
782              fds[i] = g_strndup(ptr, this - ptr);
783          }
784  
785          i++;
786          if (this == NULL) {
787              break;
788          } else {
789              ptr = this + 1;
790          }
791      }
792  
793      return i;
794  }
795  
796  int net_init_tap(const Netdev *netdev, const char *name,
797                   NetClientState *peer, Error **errp)
798  {
799      const NetdevTapOptions *tap;
800      int fd, vnet_hdr = 0, i = 0, queues;
801      /* for the no-fd, no-helper case */
802      const char *script;
803      const char *downscript;
804      Error *err = NULL;
805      const char *vhostfdname;
806      char ifname[128];
807      int ret = 0;
808  
809      assert(netdev->type == NET_CLIENT_DRIVER_TAP);
810      tap = &netdev->u.tap;
811      queues = tap->has_queues ? tap->queues : 1;
812      vhostfdname = tap->has_vhostfd ? tap->vhostfd : NULL;
813      script = tap->has_script ? tap->script : NULL;
814      downscript = tap->has_downscript ? tap->downscript : NULL;
815  
816      /* QEMU hubs do not support multiqueue tap, in this case peer is set.
817       * For -netdev, peer is always NULL. */
818      if (peer && (tap->has_queues || tap->has_fds || tap->has_vhostfds)) {
819          error_setg(errp, "Multiqueue tap cannot be used with hubs");
820          return -1;
821      }
822  
823      if (tap->has_fd) {
824          if (tap->has_ifname || tap->has_script || tap->has_downscript ||
825              tap->has_vnet_hdr || tap->has_helper || tap->has_queues ||
826              tap->has_fds || tap->has_vhostfds) {
827              error_setg(errp, "ifname=, script=, downscript=, vnet_hdr=, "
828                         "helper=, queues=, fds=, and vhostfds= "
829                         "are invalid with fd=");
830              return -1;
831          }
832  
833          fd = monitor_fd_param(monitor_cur(), tap->fd, errp);
834          if (fd == -1) {
835              return -1;
836          }
837  
838          if (!g_unix_set_fd_nonblocking(fd, true, NULL)) {
839              error_setg_errno(errp, errno, "%s: Can't use file descriptor %d",
840                               name, fd);
841              close(fd);
842              return -1;
843          }
844  
845          vnet_hdr = tap_probe_vnet_hdr(fd, errp);
846          if (vnet_hdr < 0) {
847              close(fd);
848              return -1;
849          }
850  
851          net_init_tap_one(tap, peer, "tap", name, NULL,
852                           script, downscript,
853                           vhostfdname, vnet_hdr, fd, &err);
854          if (err) {
855              error_propagate(errp, err);
856              close(fd);
857              return -1;
858          }
859      } else if (tap->has_fds) {
860          char **fds;
861          char **vhost_fds;
862          int nfds = 0, nvhosts = 0;
863  
864          if (tap->has_ifname || tap->has_script || tap->has_downscript ||
865              tap->has_vnet_hdr || tap->has_helper || tap->has_queues ||
866              tap->has_vhostfd) {
867              error_setg(errp, "ifname=, script=, downscript=, vnet_hdr=, "
868                         "helper=, queues=, and vhostfd= "
869                         "are invalid with fds=");
870              return -1;
871          }
872  
873          fds = g_new0(char *, MAX_TAP_QUEUES);
874          vhost_fds = g_new0(char *, MAX_TAP_QUEUES);
875  
876          nfds = get_fds(tap->fds, fds, MAX_TAP_QUEUES);
877          if (tap->has_vhostfds) {
878              nvhosts = get_fds(tap->vhostfds, vhost_fds, MAX_TAP_QUEUES);
879              if (nfds != nvhosts) {
880                  error_setg(errp, "The number of fds passed does not match "
881                             "the number of vhostfds passed");
882                  ret = -1;
883                  goto free_fail;
884              }
885          }
886  
887          for (i = 0; i < nfds; i++) {
888              fd = monitor_fd_param(monitor_cur(), fds[i], errp);
889              if (fd == -1) {
890                  ret = -1;
891                  goto free_fail;
892              }
893  
894              ret = g_unix_set_fd_nonblocking(fd, true, NULL);
895              if (!ret) {
896                  error_setg_errno(errp, errno, "%s: Can't use file descriptor %d",
897                                   name, fd);
898                  goto free_fail;
899              }
900  
901              if (i == 0) {
902                  vnet_hdr = tap_probe_vnet_hdr(fd, errp);
903                  if (vnet_hdr < 0) {
904                      ret = -1;
905                      goto free_fail;
906                  }
907              } else if (vnet_hdr != tap_probe_vnet_hdr(fd, NULL)) {
908                  error_setg(errp,
909                             "vnet_hdr not consistent across given tap fds");
910                  ret = -1;
911                  goto free_fail;
912              }
913  
914              net_init_tap_one(tap, peer, "tap", name, ifname,
915                               script, downscript,
916                               tap->has_vhostfds ? vhost_fds[i] : NULL,
917                               vnet_hdr, fd, &err);
918              if (err) {
919                  error_propagate(errp, err);
920                  ret = -1;
921                  goto free_fail;
922              }
923          }
924  
925  free_fail:
926          for (i = 0; i < nvhosts; i++) {
927              g_free(vhost_fds[i]);
928          }
929          for (i = 0; i < nfds; i++) {
930              g_free(fds[i]);
931          }
932          g_free(fds);
933          g_free(vhost_fds);
934          return ret;
935      } else if (tap->has_helper) {
936          if (tap->has_ifname || tap->has_script || tap->has_downscript ||
937              tap->has_vnet_hdr || tap->has_queues || tap->has_vhostfds) {
938              error_setg(errp, "ifname=, script=, downscript=, vnet_hdr=, "
939                         "queues=, and vhostfds= are invalid with helper=");
940              return -1;
941          }
942  
943          fd = net_bridge_run_helper(tap->helper,
944                                     tap->has_br ?
945                                     tap->br : DEFAULT_BRIDGE_INTERFACE,
946                                     errp);
947          if (fd == -1) {
948              return -1;
949          }
950  
951          if (!g_unix_set_fd_nonblocking(fd, true, NULL)) {
952              error_setg_errno(errp, errno, "Failed to set FD nonblocking");
953              return -1;
954          }
955          vnet_hdr = tap_probe_vnet_hdr(fd, errp);
956          if (vnet_hdr < 0) {
957              close(fd);
958              return -1;
959          }
960  
961          net_init_tap_one(tap, peer, "bridge", name, ifname,
962                           script, downscript, vhostfdname,
963                           vnet_hdr, fd, &err);
964          if (err) {
965              error_propagate(errp, err);
966              close(fd);
967              return -1;
968          }
969      } else {
970          g_autofree char *default_script = NULL;
971          g_autofree char *default_downscript = NULL;
972          if (tap->has_vhostfds) {
973              error_setg(errp, "vhostfds= is invalid if fds= wasn't specified");
974              return -1;
975          }
976  
977          if (!script) {
978              script = default_script = get_relocated_path(DEFAULT_NETWORK_SCRIPT);
979          }
980          if (!downscript) {
981              downscript = default_downscript =
982                                   get_relocated_path(DEFAULT_NETWORK_DOWN_SCRIPT);
983          }
984  
985          if (tap->has_ifname) {
986              pstrcpy(ifname, sizeof ifname, tap->ifname);
987          } else {
988              ifname[0] = '\0';
989          }
990  
991          for (i = 0; i < queues; i++) {
992              fd = net_tap_init(tap, &vnet_hdr, i >= 1 ? "no" : script,
993                                ifname, sizeof ifname, queues > 1, errp);
994              if (fd == -1) {
995                  return -1;
996              }
997  
998              if (queues > 1 && i == 0 && !tap->has_ifname) {
999                  if (tap_fd_get_ifname(fd, ifname)) {
1000                      error_setg(errp, "Fail to get ifname");
1001                      close(fd);
1002                      return -1;
1003                  }
1004              }
1005  
1006              net_init_tap_one(tap, peer, "tap", name, ifname,
1007                               i >= 1 ? "no" : script,
1008                               i >= 1 ? "no" : downscript,
1009                               vhostfdname, vnet_hdr, fd, &err);
1010              if (err) {
1011                  error_propagate(errp, err);
1012                  close(fd);
1013                  return -1;
1014              }
1015          }
1016      }
1017  
1018      return 0;
1019  }
1020  
1021  VHostNetState *tap_get_vhost_net(NetClientState *nc)
1022  {
1023      TAPState *s = DO_UPCAST(TAPState, nc, nc);
1024      assert(nc->info->type == NET_CLIENT_DRIVER_TAP);
1025      return s->vhost_net;
1026  }
1027  
1028  int tap_enable(NetClientState *nc)
1029  {
1030      TAPState *s = DO_UPCAST(TAPState, nc, nc);
1031      int ret;
1032  
1033      if (s->enabled) {
1034          return 0;
1035      } else {
1036          ret = tap_fd_enable(s->fd);
1037          if (ret == 0) {
1038              s->enabled = true;
1039              tap_update_fd_handler(s);
1040          }
1041          return ret;
1042      }
1043  }
1044  
1045  int tap_disable(NetClientState *nc)
1046  {
1047      TAPState *s = DO_UPCAST(TAPState, nc, nc);
1048      int ret;
1049  
1050      if (s->enabled == 0) {
1051          return 0;
1052      } else {
1053          ret = tap_fd_disable(s->fd);
1054          if (ret == 0) {
1055              qemu_purge_queued_packets(nc);
1056              s->enabled = false;
1057              tap_update_fd_handler(s);
1058          }
1059          return ret;
1060      }
1061  }
1062