mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2025-01-01 10:35:27 +00:00
95b9db4ee2
Currently, we are mixing: #if HAVE_BLAH with #if WITH_BLAH.
Things got way better with Pavel's work on meson, but apparently,
mixing these two lead to confusing and easy to miss bugs (see
31fb929eca
for instance). While we were forced to use HAVE_
prefix with autotools, we are free to chose our own prefix with
meson and since WITH_ prefix appears to be more popular let's use
it everywhere.
Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
3375 lines
97 KiB
C
3375 lines
97 KiB
C
/*
|
|
* Copyright (C) 2007-2016 Red Hat, Inc.
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library. If not, see
|
|
* <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include <config.h>
|
|
|
|
#include "virnetdev.h"
|
|
#include "viralloc.h"
|
|
#include "virnetlink.h"
|
|
#include "virmacaddr.h"
|
|
#include "virfile.h"
|
|
#include "virerror.h"
|
|
#include "vircommand.h"
|
|
#include "virpci.h"
|
|
#include "virlog.h"
|
|
#include "virstring.h"
|
|
#include "virutil.h"
|
|
#include "virjson.h"
|
|
|
|
#ifndef WIN32
|
|
# include <sys/ioctl.h>
|
|
#endif
|
|
#include <fcntl.h>
|
|
|
|
#ifdef __linux__
|
|
# include <linux/sockios.h>
|
|
# include <linux/if_vlan.h>
|
|
# define VIR_NETDEV_FAMILY AF_UNIX
|
|
#elif defined(WITH_STRUCT_IFREQ) && defined(AF_LOCAL)
|
|
# define VIR_NETDEV_FAMILY AF_LOCAL
|
|
#else
|
|
# undef WITH_STRUCT_IFREQ
|
|
#endif
|
|
|
|
#if defined(SIOCETHTOOL) && defined(WITH_STRUCT_IFREQ)
|
|
# include <linux/types.h>
|
|
# include <linux/ethtool.h>
|
|
#endif
|
|
|
|
#if WITH_DECL_LINK_ADDR
|
|
# include <sys/sockio.h>
|
|
# include <net/if_dl.h>
|
|
#endif
|
|
|
|
#if WITH_LINUX_DEVLINK_H
|
|
# include <linux/devlink.h>
|
|
#endif
|
|
|
|
#ifndef IFNAMSIZ
|
|
# define IFNAMSIZ 16
|
|
#endif
|
|
|
|
#define VIR_FROM_THIS VIR_FROM_NONE
|
|
|
|
VIR_LOG_INIT("util.netdev");
|
|
|
|
#define PROC_NET_DEV_MCAST "/proc/net/dev_mcast"
|
|
#define MAX_MCAST_SIZE 50*14336
|
|
#define VIR_MCAST_NAME_LEN (IFNAMSIZ + 1)
|
|
#define VIR_MCAST_TOKEN_DELIMS " \n"
|
|
|
|
#if defined(SIOCSIFFLAGS) && defined(WITH_STRUCT_IFREQ)
|
|
# define VIR_IFF_UP IFF_UP
|
|
# define VIR_IFF_PROMISC IFF_PROMISC
|
|
# define VIR_IFF_MULTICAST IFF_MULTICAST
|
|
# define VIR_IFF_ALLMULTI IFF_ALLMULTI
|
|
#else
|
|
# define VIR_IFF_UP 0
|
|
# define VIR_IFF_PROMISC 0
|
|
# define VIR_IFF_MULTICAST 0
|
|
# define VIR_IFF_ALLMULTI 0
|
|
#endif
|
|
|
|
#define RESOURCE_FILE_LEN 4096
|
|
#if WITH_DECL_ETHTOOL_GFEATURES
|
|
# define TX_UDP_TNL 25
|
|
# define GFEATURES_SIZE 2
|
|
# define FEATURE_WORD(blocks, index, field) ((blocks)[(index) / 32U].field)
|
|
# define FEATURE_FIELD_FLAG(index) (1U << (index) % 32U)
|
|
# define FEATURE_BIT_IS_SET(blocks, index, field) \
|
|
(FEATURE_WORD(blocks, index, field) & FEATURE_FIELD_FLAG(index))
|
|
#endif
|
|
|
|
typedef enum {
|
|
VIR_MCAST_TYPE_INDEX_TOKEN,
|
|
VIR_MCAST_TYPE_NAME_TOKEN,
|
|
VIR_MCAST_TYPE_USERS_TOKEN,
|
|
VIR_MCAST_TYPE_GLOBAL_TOKEN,
|
|
VIR_MCAST_TYPE_ADDR_TOKEN,
|
|
|
|
VIR_MCAST_TYPE_LAST
|
|
} virMCastType;
|
|
|
|
typedef struct _virNetDevMcastEntry virNetDevMcastEntry;
|
|
typedef virNetDevMcastEntry *virNetDevMcastEntryPtr;
|
|
struct _virNetDevMcastEntry {
|
|
int idx;
|
|
char name[VIR_MCAST_NAME_LEN];
|
|
int users;
|
|
bool global;
|
|
virMacAddr macaddr;
|
|
};
|
|
|
|
static void
|
|
virNetDevMcastEntryFree(virNetDevMcastEntryPtr entry)
|
|
{
|
|
VIR_FREE(entry);
|
|
}
|
|
|
|
G_DEFINE_AUTOPTR_CLEANUP_FUNC(virNetDevMcastEntry, virNetDevMcastEntryFree);
|
|
|
|
typedef struct _virNetDevMcastList virNetDevMcastList;
|
|
typedef virNetDevMcastList *virNetDevMcastListPtr;
|
|
struct _virNetDevMcastList {
|
|
size_t nentries;
|
|
virNetDevMcastEntryPtr *entries;
|
|
};
|
|
|
|
#if defined(WITH_STRUCT_IFREQ)
|
|
static int virNetDevSetupControlFull(const char *ifname,
|
|
struct ifreq *ifr,
|
|
int domain,
|
|
int type)
|
|
{
|
|
int fd;
|
|
|
|
if (ifr && ifname) {
|
|
memset(ifr, 0, sizeof(*ifr));
|
|
|
|
if (virStrcpyStatic(ifr->ifr_name, ifname) < 0) {
|
|
virReportSystemError(ERANGE,
|
|
_("Network interface name '%s' is too long"),
|
|
ifname);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
if ((fd = socket(domain, type, 0)) < 0) {
|
|
virReportSystemError(errno, "%s",
|
|
_("Cannot open network interface control socket"));
|
|
return -1;
|
|
}
|
|
|
|
if (virSetInherit(fd, false) < 0) {
|
|
virReportSystemError(errno, "%s",
|
|
_("Cannot set close-on-exec flag for socket"));
|
|
VIR_FORCE_CLOSE(fd);
|
|
return -1;
|
|
}
|
|
|
|
return fd;
|
|
}
|
|
|
|
|
|
int
|
|
virNetDevSetupControl(const char *ifname,
|
|
struct ifreq *ifr)
|
|
{
|
|
return virNetDevSetupControlFull(ifname, ifr, VIR_NETDEV_FAMILY, SOCK_DGRAM);
|
|
}
|
|
#else /* !WITH_STRUCT_IFREQ */
|
|
int
|
|
virNetDevSetupControl(const char *ifname G_GNUC_UNUSED,
|
|
void *ifr G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Network device configuration is not supported "
|
|
"on this platform"));
|
|
return -1;
|
|
}
|
|
#endif /* WITH_STRUCT_IFREQ */
|
|
|
|
|
|
#if defined(SIOCGIFFLAGS) && defined(WITH_STRUCT_IFREQ)
|
|
/**
|
|
* virNetDevExists:
|
|
* @ifname
|
|
*
|
|
* Check if the network device @ifname exists
|
|
*
|
|
* Returns 1 if it exists, 0 if it does not, -1 on error
|
|
*/
|
|
int virNetDevExists(const char *ifname)
|
|
{
|
|
struct ifreq ifr;
|
|
VIR_AUTOCLOSE fd = -1;
|
|
|
|
if ((fd = virNetDevSetupControl(ifname, &ifr)) < 0)
|
|
return -1;
|
|
|
|
if (ioctl(fd, SIOCGIFFLAGS, &ifr)) {
|
|
if (errno == ENODEV || errno == ENXIO)
|
|
return 0;
|
|
|
|
virReportSystemError(errno, _("Unable to check interface flags for %s"),
|
|
ifname);
|
|
return -1;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
#else
|
|
int virNetDevExists(const char *ifname)
|
|
{
|
|
virReportSystemError(ENOSYS,
|
|
_("Unable to check interface %s"), ifname);
|
|
return -1;
|
|
}
|
|
#endif
|
|
|
|
|
|
#if defined(SIOCGIFHWADDR) && defined(SIOCSIFHWADDR) && \
|
|
defined(WITH_STRUCT_IFREQ)
|
|
/**
|
|
* virNetDevSetMACInternal:
|
|
* @ifname: interface name to set MTU for
|
|
* @macaddr: MAC address
|
|
* @quiet: true if a failure to set MAC address with
|
|
* errno == EADDRNOTAVAIL || errno == EPERM
|
|
* should be silent (still returns error, but without log)
|
|
*
|
|
* This function sets the @macaddr for a given interface @ifname.
|
|
*
|
|
* Returns 0 in case of success or -1 on failure
|
|
*/
|
|
static int
|
|
virNetDevSetMACInternal(const char *ifname,
|
|
const virMacAddr *macaddr,
|
|
bool quiet)
|
|
{
|
|
struct ifreq ifr;
|
|
char macstr[VIR_MAC_STRING_BUFLEN];
|
|
VIR_AUTOCLOSE fd = -1;
|
|
|
|
if ((fd = virNetDevSetupControl(ifname, &ifr)) < 0)
|
|
return -1;
|
|
|
|
/* To fill ifr.ifr_hdaddr.sa_family field */
|
|
if (ioctl(fd, SIOCGIFHWADDR, &ifr) < 0) {
|
|
virReportSystemError(errno, _("Cannot get interface MAC on '%s'"),
|
|
ifname);
|
|
|
|
VIR_DEBUG("SIOCSIFHWADDR %s get MAC - Fail", ifname);
|
|
return -1;
|
|
}
|
|
|
|
virMacAddrGetRaw(macaddr, (unsigned char *)ifr.ifr_hwaddr.sa_data);
|
|
|
|
if (ioctl(fd, SIOCSIFHWADDR, &ifr) < 0) {
|
|
|
|
if (quiet &&
|
|
(errno == EADDRNOTAVAIL || errno == EPERM)) {
|
|
VIR_DEBUG("SIOCSIFHWADDR %s MAC=%s - Fail",
|
|
ifname, virMacAddrFormat(macaddr, macstr));
|
|
return -1;
|
|
}
|
|
|
|
virReportSystemError(errno,
|
|
_("Cannot set interface MAC to %s on '%s'"),
|
|
virMacAddrFormat(macaddr, macstr), ifname);
|
|
return -1;
|
|
}
|
|
|
|
VIR_DEBUG("SIOCSIFHWADDR %s MAC=%s - Success",
|
|
ifname, virMacAddrFormat(macaddr, macstr));
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
#elif defined(SIOCSIFLLADDR) && defined(WITH_STRUCT_IFREQ) && \
|
|
WITH_DECL_LINK_ADDR
|
|
|
|
|
|
static int
|
|
virNetDevSetMACInternal(const char *ifname,
|
|
const virMacAddr *macaddr,
|
|
bool quiet)
|
|
{
|
|
struct ifreq ifr;
|
|
struct sockaddr_dl sdl;
|
|
char mac[VIR_MAC_STRING_BUFLEN + 1] = ":";
|
|
VIR_AUTOCLOSE s = -1;
|
|
|
|
if ((s = virNetDevSetupControl(ifname, &ifr)) < 0)
|
|
return -1;
|
|
|
|
virMacAddrFormat(macaddr, mac + 1);
|
|
sdl.sdl_len = sizeof(sdl);
|
|
link_addr(mac, &sdl);
|
|
|
|
memcpy(ifr.ifr_addr.sa_data, sdl.sdl_data, VIR_MAC_BUFLEN);
|
|
ifr.ifr_addr.sa_len = VIR_MAC_BUFLEN;
|
|
|
|
if (ioctl(s, SIOCSIFLLADDR, &ifr) < 0) {
|
|
if (quiet &&
|
|
(errno == EADDRNOTAVAIL || errno == EPERM)) {
|
|
VIR_DEBUG("SIOCSIFLLADDR %s MAC=%s - Fail", ifname, mac + 1);
|
|
return -1;
|
|
}
|
|
|
|
virReportSystemError(errno,
|
|
_("Cannot set interface MAC to %s on '%s'"),
|
|
mac + 1, ifname);
|
|
return -1;
|
|
}
|
|
|
|
VIR_DEBUG("SIOCSIFLLADDR %s MAC=%s - Success", ifname, mac + 1);
|
|
return 0;
|
|
}
|
|
|
|
|
|
#else
|
|
|
|
|
|
static int
|
|
virNetDevSetMACInternal(const char *ifname,
|
|
const virMacAddr *macaddr G_GNUC_UNUSED,
|
|
bool quiet G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS,
|
|
_("Cannot set interface MAC on '%s'"),
|
|
ifname);
|
|
return -1;
|
|
}
|
|
|
|
|
|
#endif
|
|
|
|
|
|
int
|
|
virNetDevSetMAC(const char *ifname,
|
|
const virMacAddr *macaddr)
|
|
{
|
|
return virNetDevSetMACInternal(ifname, macaddr, false);
|
|
}
|
|
|
|
|
|
#if defined(SIOCGIFHWADDR) && defined(WITH_STRUCT_IFREQ)
|
|
/**
|
|
* virNetDevGetMAC:
|
|
* @ifname: interface name to set MTU for
|
|
* @macaddr: MAC address
|
|
*
|
|
* This function gets the @macaddr for a given interface @ifname.
|
|
*
|
|
* Returns 0 in case of success or -1 on failure
|
|
*/
|
|
int virNetDevGetMAC(const char *ifname,
|
|
virMacAddrPtr macaddr)
|
|
{
|
|
struct ifreq ifr;
|
|
VIR_AUTOCLOSE fd = -1;
|
|
|
|
if ((fd = virNetDevSetupControl(ifname, &ifr)) < 0)
|
|
return -1;
|
|
|
|
if (ioctl(fd, SIOCGIFHWADDR, &ifr) < 0) {
|
|
virReportSystemError(errno,
|
|
_("Cannot get interface MAC on '%s'"),
|
|
ifname);
|
|
return -1;
|
|
}
|
|
|
|
virMacAddrSetRaw(macaddr, (unsigned char *)ifr.ifr_hwaddr.sa_data);
|
|
|
|
return 0;
|
|
}
|
|
#else
|
|
int virNetDevGetMAC(const char *ifname,
|
|
virMacAddrPtr macaddr G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS,
|
|
_("Cannot get interface MAC on '%s'"),
|
|
ifname);
|
|
return -1;
|
|
}
|
|
#endif
|
|
|
|
|
|
#if defined(SIOCGIFMTU) && defined(WITH_STRUCT_IFREQ)
|
|
/**
|
|
* virNetDevGetMTU:
|
|
* @ifname: interface name get MTU for
|
|
*
|
|
* This function gets the @mtu value set for a given interface @ifname.
|
|
*
|
|
* Returns the MTU value in case of success, or -1 on failure.
|
|
*/
|
|
int virNetDevGetMTU(const char *ifname)
|
|
{
|
|
struct ifreq ifr;
|
|
VIR_AUTOCLOSE fd = -1;
|
|
|
|
if ((fd = virNetDevSetupControl(ifname, &ifr)) < 0)
|
|
return -1;
|
|
|
|
if (ioctl(fd, SIOCGIFMTU, &ifr) < 0) {
|
|
virReportSystemError(errno,
|
|
_("Cannot get interface MTU on '%s'"),
|
|
ifname);
|
|
return -1;
|
|
}
|
|
|
|
return ifr.ifr_mtu;
|
|
}
|
|
#else
|
|
int virNetDevGetMTU(const char *ifname)
|
|
{
|
|
virReportSystemError(ENOSYS,
|
|
_("Cannot get interface MTU on '%s'"),
|
|
ifname);
|
|
return -1;
|
|
}
|
|
#endif
|
|
|
|
|
|
#if defined(SIOCSIFMTU) && defined(WITH_STRUCT_IFREQ)
|
|
/**
|
|
* virNetDevSetMTU:
|
|
* @ifname: interface name to set MTU for
|
|
* @mtu: MTU value
|
|
*
|
|
* This function sets the @mtu for a given interface @ifname. Typically
|
|
* used on a tap device to set up for Jumbo Frames.
|
|
*
|
|
* Returns 0 in case of success, or -1 on failure
|
|
*/
|
|
int virNetDevSetMTU(const char *ifname, int mtu)
|
|
{
|
|
struct ifreq ifr;
|
|
VIR_AUTOCLOSE fd = -1;
|
|
|
|
if ((fd = virNetDevSetupControl(ifname, &ifr)) < 0)
|
|
return -1;
|
|
|
|
ifr.ifr_mtu = mtu;
|
|
|
|
if (ioctl(fd, SIOCSIFMTU, &ifr) < 0) {
|
|
virReportSystemError(errno,
|
|
_("Cannot set interface MTU on '%s'"),
|
|
ifname);
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
#else
|
|
int virNetDevSetMTU(const char *ifname, int mtu G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS,
|
|
_("Cannot set interface MTU on '%s'"),
|
|
ifname);
|
|
return -1;
|
|
}
|
|
#endif
|
|
|
|
|
|
/**
|
|
* virNetDevSetMTUFromDevice:
|
|
* @ifname: name of the interface whose MTU we want to set
|
|
* @otherifname: name of the interface whose MTU we want to copy
|
|
*
|
|
* Sets the interface mtu to the same MTU as another interface
|
|
*
|
|
* Returns 0 in case of success, or -1 on failure
|
|
*/
|
|
int virNetDevSetMTUFromDevice(const char *ifname,
|
|
const char *otherifname)
|
|
{
|
|
int mtu = virNetDevGetMTU(otherifname);
|
|
|
|
if (mtu < 0)
|
|
return -1;
|
|
|
|
return virNetDevSetMTU(ifname, mtu);
|
|
}
|
|
|
|
|
|
/**
|
|
* virNetDevSetNamespace:
|
|
* @ifname: name of device
|
|
* @pidInNs: PID of process in target net namespace
|
|
*
|
|
* Moves the given device into the target net namespace specified by the given
|
|
* pid using this command:
|
|
* ip link set @iface netns @pidInNs
|
|
*
|
|
* Returns 0 on success or -1 in case of error
|
|
*/
|
|
int virNetDevSetNamespace(const char *ifname, pid_t pidInNs)
|
|
{
|
|
g_autofree char *pid = NULL;
|
|
g_autofree char *phy = NULL;
|
|
g_autofree char *phy_path = NULL;
|
|
g_autoptr(virCommand) cmd = NULL;
|
|
int len;
|
|
|
|
pid = g_strdup_printf("%lld", (long long) pidInNs);
|
|
|
|
/* The 802.11 wireless devices only move together with their PHY. */
|
|
if (virNetDevSysfsFile(&phy_path, ifname, "phy80211/name") < 0)
|
|
return -1;
|
|
|
|
if ((len = virFileReadAllQuiet(phy_path, 1024, &phy)) <= 0) {
|
|
/* Not a wireless device. */
|
|
cmd = virCommandNewArgList("ip", "link",
|
|
"set", ifname, "netns", pid, NULL);
|
|
} else {
|
|
/* Remove a line break. */
|
|
phy[len - 1] = '\0';
|
|
|
|
cmd = virCommandNewArgList("iw", "phy", phy,
|
|
"set", "netns", pid, NULL);
|
|
}
|
|
|
|
if (virCommandRun(cmd, NULL) < 0)
|
|
return -1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
#if defined(SIOCSIFNAME) && defined(WITH_STRUCT_IFREQ)
|
|
/**
|
|
* virNetDevSetName:
|
|
* @ifname: name of device
|
|
* @newifname: new name of @ifname
|
|
*
|
|
* Changes the name of the given device.
|
|
*
|
|
* Returns 0 on success, -1 on error
|
|
*/
|
|
int virNetDevSetName(const char* ifname, const char *newifname)
|
|
{
|
|
struct ifreq ifr;
|
|
VIR_AUTOCLOSE fd = -1;
|
|
|
|
if ((fd = virNetDevSetupControl(ifname, &ifr)) < 0)
|
|
return -1;
|
|
|
|
# ifdef WITH_STRUCT_IFREQ_IFR_NEWNAME
|
|
if (virStrcpyStatic(ifr.ifr_newname, newifname) < 0) {
|
|
virReportSystemError(ERANGE,
|
|
_("Network interface name '%s' is too long"),
|
|
newifname);
|
|
return -1;
|
|
}
|
|
# else
|
|
ifr.ifr_data = (caddr_t)newifname;
|
|
# endif
|
|
|
|
if (ioctl(fd, SIOCSIFNAME, &ifr)) {
|
|
virReportSystemError(errno,
|
|
_("Unable to rename '%s' to '%s'"),
|
|
ifname, newifname);
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
#else
|
|
int virNetDevSetName(const char* ifname, const char *newifname)
|
|
{
|
|
virReportSystemError(ENOSYS,
|
|
_("Cannot rename interface '%s' to '%s' on this platform"),
|
|
ifname, newifname);
|
|
return -1;
|
|
}
|
|
#endif
|
|
|
|
|
|
#if defined(SIOCSIFFLAGS) && defined(WITH_STRUCT_IFREQ)
|
|
static int
|
|
virNetDevSetIFFlag(const char *ifname, int flag, bool val)
|
|
{
|
|
struct ifreq ifr;
|
|
int ifflags;
|
|
VIR_AUTOCLOSE fd = -1;
|
|
|
|
if ((fd = virNetDevSetupControl(ifname, &ifr)) < 0)
|
|
return -1;
|
|
|
|
if (ioctl(fd, SIOCGIFFLAGS, &ifr) < 0) {
|
|
virReportSystemError(errno,
|
|
_("Cannot get interface flags on '%s'"),
|
|
ifname);
|
|
return -1;
|
|
}
|
|
|
|
if (val)
|
|
ifflags = ifr.ifr_flags | flag;
|
|
else
|
|
ifflags = ifr.ifr_flags & ~flag;
|
|
|
|
if (ifr.ifr_flags != ifflags) {
|
|
ifr.ifr_flags = ifflags;
|
|
if (ioctl(fd, SIOCSIFFLAGS, &ifr) < 0) {
|
|
virReportSystemError(errno,
|
|
_("Cannot set interface flags on '%s'"),
|
|
ifname);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
#else
|
|
static int
|
|
virNetDevSetIFFlag(const char *ifname,
|
|
int flag G_GNUC_UNUSED,
|
|
bool val G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS,
|
|
_("Cannot set interface flags on '%s'"),
|
|
ifname);
|
|
return -1;
|
|
}
|
|
#endif
|
|
|
|
|
|
|
|
/**
|
|
* virNetDevSetOnline:
|
|
* @ifname: the interface name
|
|
* @online: true for up, false for down
|
|
*
|
|
* Function to control if an interface is activated (up, true) or not (down, false)
|
|
*
|
|
* Returns 0 in case of success or -1 on error.
|
|
*/
|
|
int
|
|
virNetDevSetOnline(const char *ifname,
|
|
bool online)
|
|
{
|
|
return virNetDevSetIFFlag(ifname, VIR_IFF_UP, online);
|
|
}
|
|
|
|
/**
|
|
* virNetDevSetPromiscuous:
|
|
* @ifname: the interface name
|
|
* @promiscuous: true for receive all packets, false for do not receive
|
|
* all packets
|
|
*
|
|
* Function to control if an interface is to receive all
|
|
* packets (receive all, true) or not (do not receive all, false)
|
|
*
|
|
* Returns 0 in case of success or -1 on error.
|
|
*/
|
|
int
|
|
virNetDevSetPromiscuous(const char *ifname,
|
|
bool promiscuous)
|
|
{
|
|
return virNetDevSetIFFlag(ifname, VIR_IFF_PROMISC, promiscuous);
|
|
}
|
|
|
|
/**
|
|
* virNetDevSetRcvMulti:
|
|
* @ifname: the interface name
|
|
* @:receive true for receive multicast packets, false for do not receive
|
|
* multicast packets
|
|
*
|
|
* Function to control if an interface is to receive multicast
|
|
* packets in which it is interested (receive, true)
|
|
* or not (do not receive, false)
|
|
*
|
|
* Returns 0 in case of success or -1 on error.
|
|
*/
|
|
int
|
|
virNetDevSetRcvMulti(const char *ifname,
|
|
bool receive)
|
|
{
|
|
return virNetDevSetIFFlag(ifname, VIR_IFF_MULTICAST, receive);
|
|
}
|
|
|
|
/**
|
|
* virNetDevSetRcvAllMulti:
|
|
* @ifname: the interface name
|
|
* @:receive true for receive all packets, false for do not receive all packets
|
|
*
|
|
* Function to control if an interface is to receive all multicast
|
|
* packets (receive, true) or not (do not receive, false)
|
|
*
|
|
* Returns 0 in case of success or -1 on error.
|
|
*/
|
|
int
|
|
virNetDevSetRcvAllMulti(const char *ifname,
|
|
bool receive)
|
|
{
|
|
return virNetDevSetIFFlag(ifname, VIR_IFF_ALLMULTI, receive);
|
|
}
|
|
|
|
|
|
#if defined(SIOCGIFFLAGS) && defined(WITH_STRUCT_IFREQ)
|
|
static int
|
|
virNetDevGetIFFlag(const char *ifname, int flag, bool *val)
|
|
{
|
|
struct ifreq ifr;
|
|
VIR_AUTOCLOSE fd = -1;
|
|
|
|
if ((fd = virNetDevSetupControl(ifname, &ifr)) < 0)
|
|
return -1;
|
|
|
|
if (ioctl(fd, SIOCGIFFLAGS, &ifr) < 0) {
|
|
virReportSystemError(errno,
|
|
_("Cannot get interface flags on '%s'"),
|
|
ifname);
|
|
return -1;
|
|
}
|
|
|
|
*val = (ifr.ifr_flags & flag) ? true : false;
|
|
return 0;
|
|
}
|
|
#else
|
|
static int
|
|
virNetDevGetIFFlag(const char *ifname,
|
|
int flag G_GNUC_UNUSED,
|
|
bool *val G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS,
|
|
_("Cannot get interface flags on '%s'"),
|
|
ifname);
|
|
return -1;
|
|
}
|
|
#endif
|
|
|
|
|
|
/**
|
|
* virNetDevGetOnline:
|
|
* @ifname: the interface name
|
|
* @online: where to store the status
|
|
*
|
|
* Function to query if an interface is activated (true) or not (false)
|
|
*
|
|
* Returns 0 in case of success or an errno code in case of failure.
|
|
*/
|
|
int
|
|
virNetDevGetOnline(const char *ifname,
|
|
bool *online)
|
|
{
|
|
return virNetDevGetIFFlag(ifname, VIR_IFF_UP, online);
|
|
}
|
|
|
|
/**
|
|
* virNetDevIsPromiscuous:
|
|
* @ifname: the interface name
|
|
* @promiscuous: where to store the status
|
|
*
|
|
* Function to query if an interface is receiving all packets (true) or
|
|
* not (false)
|
|
*
|
|
* Returns 0 in case of success or an errno code in case of failure.
|
|
*/
|
|
int
|
|
virNetDevGetPromiscuous(const char *ifname,
|
|
bool *promiscuous)
|
|
{
|
|
return virNetDevGetIFFlag(ifname, VIR_IFF_PROMISC, promiscuous);
|
|
}
|
|
|
|
/**
|
|
* virNetDevIsRcvMulti:
|
|
* @ifname: the interface name
|
|
* @receive where to store the status
|
|
*
|
|
* Function to query whether an interface is receiving multicast packets (true)
|
|
* in which it is interested, or not (false)
|
|
*
|
|
* Returns 0 in case of success or -1 on error.
|
|
*/
|
|
int
|
|
virNetDevGetRcvMulti(const char *ifname,
|
|
bool *receive)
|
|
{
|
|
return virNetDevGetIFFlag(ifname, VIR_IFF_MULTICAST, receive);
|
|
}
|
|
|
|
/**
|
|
* virNetDevIsRcvAllMulti:
|
|
* @ifname: the interface name
|
|
* @:receive where to store the status
|
|
*
|
|
* Function to query whether an interface is receiving all multicast
|
|
* packets (receiving, true) or not (is not receiving, false)
|
|
*
|
|
* Returns 0 in case of success or -1 on error.
|
|
*/
|
|
int
|
|
virNetDevGetRcvAllMulti(const char *ifname,
|
|
bool *receive)
|
|
{
|
|
return virNetDevGetIFFlag(ifname, VIR_IFF_ALLMULTI, receive);
|
|
}
|
|
|
|
#if defined(WITH_IF_INDEXTONAME)
|
|
char *virNetDevGetName(int ifindex)
|
|
{
|
|
char name[IFNAMSIZ];
|
|
|
|
memset(&name, 0, sizeof(name));
|
|
|
|
if (!if_indextoname(ifindex, name)) {
|
|
virReportSystemError(errno,
|
|
_("Failed to convert interface index %d to a name"),
|
|
ifindex);
|
|
return NULL;
|
|
}
|
|
|
|
return g_strdup(name);
|
|
}
|
|
#else
|
|
char *virNetDevGetName(int ifindex)
|
|
{
|
|
virReportSystemError(ENOSYS,
|
|
_("Cannot get interface name for index '%i'"),
|
|
ifindex);
|
|
return NULL;
|
|
}
|
|
#endif
|
|
|
|
/**
|
|
* virNetDevGetIndex:
|
|
* @ifname : Name of the interface whose index is to be found
|
|
* @ifindex: Pointer to int where the index will be written into
|
|
*
|
|
* Get the index of an interface given its name.
|
|
*
|
|
* Returns 0 on success, -1 on failure
|
|
*/
|
|
#if defined(SIOCGIFINDEX) && defined(WITH_STRUCT_IFREQ)
|
|
int virNetDevGetIndex(const char *ifname, int *ifindex)
|
|
{
|
|
struct ifreq ifreq;
|
|
VIR_AUTOCLOSE fd = socket(VIR_NETDEV_FAMILY, SOCK_DGRAM, 0);
|
|
|
|
if (fd < 0) {
|
|
virReportSystemError(errno, "%s",
|
|
_("Unable to open control socket"));
|
|
return -1;
|
|
}
|
|
|
|
memset(&ifreq, 0, sizeof(ifreq));
|
|
|
|
if (virStrcpyStatic(ifreq.ifr_name, ifname) < 0) {
|
|
virReportSystemError(ERANGE,
|
|
_("invalid interface name %s"),
|
|
ifname);
|
|
return -1;
|
|
}
|
|
|
|
if (ioctl(fd, SIOCGIFINDEX, &ifreq) < 0) {
|
|
virReportSystemError(errno,
|
|
_("Unable to get index for interface %s"), ifname);
|
|
return -1;
|
|
}
|
|
|
|
# ifdef WITH_STRUCT_IFREQ_IFR_INDEX
|
|
*ifindex = ifreq.ifr_index;
|
|
# else
|
|
*ifindex = ifreq.ifr_ifindex;
|
|
# endif
|
|
return 0;
|
|
}
|
|
#else /* ! SIOCGIFINDEX */
|
|
int virNetDevGetIndex(const char *ifname G_GNUC_UNUSED,
|
|
int *ifindex G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Unable to get interface index on this platform"));
|
|
return -1;
|
|
}
|
|
#endif /* ! SIOCGIFINDEX */
|
|
|
|
|
|
#if defined(__linux__) && defined(WITH_LIBNL)
|
|
/**
|
|
* virNetDevGetMaster:
|
|
* @ifname: name of interface we're interested in
|
|
* @master: used to return a string containing the name of @ifname's "master"
|
|
* (this is the bridge or bond device that this device is attached to)
|
|
*
|
|
* Returns 0 on success, -1 on failure (if @ifname has no master
|
|
* @master will be NULL, but return value will still be 0 (success)).
|
|
*/
|
|
int
|
|
virNetDevGetMaster(const char *ifname, char **master)
|
|
{
|
|
g_autofree void *nlData = NULL;
|
|
struct nlattr *tb[IFLA_MAX + 1] = {NULL, };
|
|
|
|
*master = NULL;
|
|
|
|
if (virNetlinkDumpLink(ifname, -1, &nlData, tb, 0, 0) < 0)
|
|
return -1;
|
|
|
|
if (tb[IFLA_MASTER]) {
|
|
if (!(*master = virNetDevGetName(*(int *)RTA_DATA(tb[IFLA_MASTER]))))
|
|
return -1;
|
|
}
|
|
|
|
VIR_DEBUG("IFLA_MASTER for %s is %s", ifname, *master ? *master : "(none)");
|
|
return 0;
|
|
}
|
|
|
|
|
|
#else
|
|
|
|
|
|
int
|
|
virNetDevGetMaster(const char *ifname G_GNUC_UNUSED,
|
|
char **master G_GNUC_UNUSED)
|
|
{
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("Unable to get device master from netlink on this platform"));
|
|
return -1;
|
|
}
|
|
|
|
|
|
#endif /* defined(__linux__) && defined(WITH_LIBNL) */
|
|
|
|
|
|
#if defined(SIOCGIFVLAN) && defined(WITH_STRUCT_IFREQ) && WITH_DECL_GET_VLAN_VID_CMD
|
|
int virNetDevGetVLanID(const char *ifname, int *vlanid)
|
|
{
|
|
struct vlan_ioctl_args vlanargs = {
|
|
.cmd = GET_VLAN_VID_CMD,
|
|
};
|
|
VIR_AUTOCLOSE fd = socket(PF_PACKET, SOCK_DGRAM, 0);
|
|
|
|
if (fd < 0) {
|
|
virReportSystemError(errno, "%s",
|
|
_("Unable to open control socket"));
|
|
return -1;
|
|
}
|
|
|
|
if (virStrcpyStatic(vlanargs.device1, ifname) < 0) {
|
|
virReportSystemError(ERANGE,
|
|
_("invalid interface name %s"),
|
|
ifname);
|
|
return -1;
|
|
}
|
|
|
|
if (ioctl(fd, SIOCGIFVLAN, &vlanargs) != 0) {
|
|
virReportSystemError(errno,
|
|
_("Unable to get VLAN for interface %s"), ifname);
|
|
return -1;
|
|
}
|
|
|
|
*vlanid = vlanargs.u.VID;
|
|
return 0;
|
|
}
|
|
#else /* ! SIOCGIFVLAN */
|
|
int virNetDevGetVLanID(const char *ifname G_GNUC_UNUSED,
|
|
int *vlanid G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Unable to get VLAN on this platform"));
|
|
return -1;
|
|
}
|
|
#endif /* ! SIOCGIFVLAN */
|
|
|
|
|
|
/**
|
|
* virNetDevValidateConfig:
|
|
* @ifname: Name of the interface
|
|
* @macaddr: expected MAC address of the interface; not checked if NULL
|
|
* @ifindex: expected index of the interface; not checked if '-1'
|
|
*
|
|
* Determine whether a given interface is still available. If so,
|
|
* it must have the given MAC address and if an interface index is
|
|
* passed, it must also match the interface index.
|
|
*
|
|
* Returns 1 if the config matches, 0 if the config does not match, or interface does not exist, -1 on error
|
|
*/
|
|
#if defined(SIOCGIFHWADDR) && defined(WITH_STRUCT_IFREQ)
|
|
int virNetDevValidateConfig(const char *ifname,
|
|
const virMacAddr *macaddr, int ifindex)
|
|
{
|
|
struct ifreq ifr;
|
|
int idx;
|
|
int rc;
|
|
VIR_AUTOCLOSE fd = -1;
|
|
|
|
if ((rc = virNetDevExists(ifname)) < 0)
|
|
return -1;
|
|
if (rc == 0)
|
|
return 0;
|
|
|
|
if (macaddr != NULL) {
|
|
if ((fd = virNetDevSetupControl(ifname, &ifr)) < 0)
|
|
return -1;
|
|
|
|
if (ioctl(fd, SIOCGIFHWADDR, &ifr) < 0) {
|
|
if (errno == ENODEV)
|
|
return 0;
|
|
|
|
virReportSystemError(errno,
|
|
_("could not get MAC address of interface %s"),
|
|
ifname);
|
|
return -1;
|
|
}
|
|
|
|
if (virMacAddrCmpRaw(macaddr,
|
|
(unsigned char *)ifr.ifr_hwaddr.sa_data) != 0)
|
|
return 0;
|
|
}
|
|
|
|
if (ifindex != -1) {
|
|
if (virNetDevGetIndex(ifname, &idx) < 0)
|
|
return -1;
|
|
if (idx != ifindex)
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
#else
|
|
int virNetDevValidateConfig(const char *ifname G_GNUC_UNUSED,
|
|
const virMacAddr *macaddr G_GNUC_UNUSED,
|
|
int ifindex G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Unable to check interface config on this platform"));
|
|
return -1;
|
|
}
|
|
#endif
|
|
|
|
|
|
#ifdef __linux__
|
|
|
|
int
|
|
virNetDevSysfsFile(char **pf_sysfs_device_link, const char *ifname,
|
|
const char *file)
|
|
{
|
|
*pf_sysfs_device_link = g_strdup_printf(SYSFS_NET_DIR "%s/%s", ifname, file);
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
virNetDevSysfsDeviceFile(char **pf_sysfs_device_link, const char *ifname,
|
|
const char *file)
|
|
{
|
|
*pf_sysfs_device_link = g_strdup_printf(SYSFS_NET_DIR "%s/device/%s", ifname,
|
|
file);
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* Determine if the device path specified in devpath is a PCI Device
|
|
* by resolving the 'subsystem'-link in devpath and looking for
|
|
* 'pci' in the last component. For more information see the rules
|
|
* for accessing sysfs in the kernel docs
|
|
*
|
|
* https://www.kernel.org/doc/html/latest/admin-guide/sysfs-rules.html
|
|
*
|
|
* Returns true if devpath's subsystem is pci, false otherwise.
|
|
*/
|
|
static bool
|
|
virNetDevIsPCIDevice(const char *devpath)
|
|
{
|
|
g_autofree char *subsys_link = NULL;
|
|
g_autofree char *abs_path = NULL;
|
|
g_autofree char *subsys = NULL;
|
|
|
|
subsys_link = g_strdup_printf("%s/subsystem", devpath);
|
|
|
|
if (!virFileExists(subsys_link))
|
|
return false;
|
|
|
|
if (virFileResolveLink(subsys_link, &abs_path) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("Unable to resolve device subsystem symlink %s"),
|
|
subsys_link);
|
|
return false;
|
|
}
|
|
|
|
subsys = g_path_get_basename(abs_path);
|
|
return STRPREFIX(subsys, "pci");
|
|
}
|
|
|
|
static virPCIDevicePtr
|
|
virNetDevGetPCIDevice(const char *devName)
|
|
{
|
|
g_autofree char *vfSysfsDevicePath = NULL;
|
|
g_autoptr(virPCIDeviceAddress) vfPCIAddr = NULL;
|
|
|
|
if (virNetDevSysfsFile(&vfSysfsDevicePath, devName, "device") < 0)
|
|
return NULL;
|
|
|
|
if (!virNetDevIsPCIDevice(vfSysfsDevicePath))
|
|
return NULL;
|
|
|
|
vfPCIAddr = virPCIGetDeviceAddressFromSysfsLink(vfSysfsDevicePath);
|
|
if (!vfPCIAddr)
|
|
return NULL;
|
|
|
|
return virPCIDeviceNew(vfPCIAddr->domain, vfPCIAddr->bus,
|
|
vfPCIAddr->slot, vfPCIAddr->function);
|
|
}
|
|
|
|
|
|
/**
|
|
* virNetDevGetPhysPortID:
|
|
*
|
|
* @ifname: name of a netdev
|
|
*
|
|
* @physPortID: pointer to char* that will receive @ifname's
|
|
* phys_port_id from sysfs (null terminated
|
|
* string). Could be NULL if @ifname's net driver doesn't
|
|
* support phys_port_id (most netdev drivers
|
|
* don't). Caller is responsible for freeing the string
|
|
* when finished.
|
|
*
|
|
* Returns 0 on success or -1 on failure.
|
|
*/
|
|
int
|
|
virNetDevGetPhysPortID(const char *ifname,
|
|
char **physPortID)
|
|
{
|
|
g_autofree char *physPortIDFile = NULL;
|
|
|
|
*physPortID = NULL;
|
|
|
|
if (virNetDevSysfsFile(&physPortIDFile, ifname, "phys_port_id") < 0)
|
|
return -1;
|
|
|
|
/* a failure to read just means the driver doesn't support
|
|
* phys_port_id, so set success now and ignore the return from
|
|
* virFileReadAllQuiet().
|
|
*/
|
|
|
|
ignore_value(virFileReadAllQuiet(physPortIDFile, 1024, physPortID));
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* virNetDevGetVirtualFunctions:
|
|
*
|
|
* @pfname : name of the physical function interface name
|
|
* @vfname: array that will hold the interface names of the virtual_functions
|
|
* @n_vfname: pointer to the number of virtual functions
|
|
*
|
|
* Returns 0 on success and -1 on failure
|
|
*/
|
|
|
|
int
|
|
virNetDevGetVirtualFunctions(const char *pfname,
|
|
char ***vfname,
|
|
virPCIDeviceAddressPtr **virt_fns,
|
|
size_t *n_vfname,
|
|
unsigned int *max_vfs)
|
|
{
|
|
int ret = -1;
|
|
size_t i;
|
|
g_autofree char *pf_sysfs_device_link = NULL;
|
|
g_autofree char *pfPhysPortID = NULL;
|
|
|
|
*virt_fns = NULL;
|
|
*n_vfname = 0;
|
|
*max_vfs = 0;
|
|
|
|
if (virNetDevGetPhysPortID(pfname, &pfPhysPortID) < 0)
|
|
goto cleanup;
|
|
|
|
if (virNetDevSysfsFile(&pf_sysfs_device_link, pfname, "device") < 0)
|
|
goto cleanup;
|
|
|
|
if (virPCIGetVirtualFunctions(pf_sysfs_device_link, virt_fns,
|
|
n_vfname, max_vfs) < 0)
|
|
goto cleanup;
|
|
|
|
if (VIR_ALLOC_N(*vfname, *n_vfname) < 0)
|
|
goto cleanup;
|
|
|
|
for (i = 0; i < *n_vfname; i++) {
|
|
g_autofree char *pciConfigAddr = NULL;
|
|
g_autofree char *pci_sysfs_device_link = NULL;
|
|
|
|
if (!(pciConfigAddr = virPCIDeviceAddressAsString((*virt_fns)[i])))
|
|
goto cleanup;
|
|
|
|
if (virPCIGetSysfsFile(pciConfigAddr, &pci_sysfs_device_link) < 0) {
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Failed to get PCI SYSFS file"));
|
|
goto cleanup;
|
|
}
|
|
|
|
if (virPCIGetNetName(pci_sysfs_device_link, 0,
|
|
pfPhysPortID, &((*vfname)[i])) < 0) {
|
|
goto cleanup;
|
|
}
|
|
|
|
if (!(*vfname)[i])
|
|
VIR_INFO("VF does not have an interface name");
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
if (ret < 0) {
|
|
virStringListFreeCount(*vfname, *n_vfname);
|
|
|
|
for (i = 0; i < *n_vfname; i++)
|
|
VIR_FREE((*virt_fns)[i]);
|
|
VIR_FREE(*virt_fns);
|
|
*vfname = NULL;
|
|
*n_vfname = 0;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* virNetDevIsVirtualFunction:
|
|
* @ifname : name of the interface
|
|
*
|
|
* Checks if an interface is a SRIOV virtual function.
|
|
*
|
|
* Returns 1 if interface is SRIOV virtual function, 0 if not and -1 if error
|
|
*
|
|
*/
|
|
int
|
|
virNetDevIsVirtualFunction(const char *ifname)
|
|
{
|
|
g_autofree char *if_sysfs_device_link = NULL;
|
|
|
|
if (virNetDevSysfsFile(&if_sysfs_device_link, ifname, "device") < 0)
|
|
return -1;
|
|
|
|
return virPCIIsVirtualFunction(if_sysfs_device_link);
|
|
}
|
|
|
|
/**
|
|
* virNetDevGetVirtualFunctionIndex
|
|
*
|
|
* @pfname : name of the physical function interface name
|
|
* @vfname : name of the virtual function interface name
|
|
* @vf_index : Pointer to int. Contains vf index of interface upon successful
|
|
* return
|
|
*
|
|
* Returns 0 on success, -1 on failure
|
|
*
|
|
*/
|
|
int
|
|
virNetDevGetVirtualFunctionIndex(const char *pfname, const char *vfname,
|
|
int *vf_index)
|
|
{
|
|
g_autofree char *pf_sysfs_device_link = NULL;
|
|
g_autofree char *vf_sysfs_device_link = NULL;
|
|
|
|
if (virNetDevSysfsFile(&pf_sysfs_device_link, pfname, "device") < 0)
|
|
return -1;
|
|
|
|
if (virNetDevSysfsFile(&vf_sysfs_device_link, vfname, "device") < 0)
|
|
return -1;
|
|
|
|
return virPCIGetVirtualFunctionIndex(pf_sysfs_device_link,
|
|
vf_sysfs_device_link,
|
|
vf_index);
|
|
}
|
|
|
|
/**
|
|
* virNetDevGetPhysicalFunction
|
|
*
|
|
* @ifname : name of the physical function interface name
|
|
* @pfname : Contains sriov physical function for interface ifname
|
|
* upon successful return
|
|
*
|
|
* Returns 0 on success, -1 on failure
|
|
*
|
|
*/
|
|
int
|
|
virNetDevGetPhysicalFunction(const char *ifname, char **pfname)
|
|
{
|
|
g_autofree char *physfn_sysfs_path = NULL;
|
|
g_autofree char *vfPhysPortID = NULL;
|
|
|
|
if (virNetDevGetPhysPortID(ifname, &vfPhysPortID) < 0)
|
|
return -1;
|
|
|
|
if (virNetDevSysfsDeviceFile(&physfn_sysfs_path, ifname, "physfn") < 0)
|
|
return -1;
|
|
|
|
if (virPCIGetNetName(physfn_sysfs_path, 0,
|
|
vfPhysPortID, pfname) < 0) {
|
|
return -1;
|
|
}
|
|
|
|
if (!*pfname) {
|
|
/* The SRIOV standard does not require VF netdevs to have
|
|
* the netdev assigned to a PF. */
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("The PF device for VF %s has no network device name"),
|
|
ifname);
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* virNetDevPFGetVF:
|
|
*
|
|
* @pfname: netdev name of the physical function (PF)
|
|
* @vf: virtual function (VF) number for the device of interest
|
|
* @vfname: name of the physical function interface name
|
|
*
|
|
* Finds the netdev name of VF# @vf of SRIOV PF @pfname, and puts it
|
|
* in @vfname. The caller must free @vfname when it's finished with
|
|
* it.
|
|
*
|
|
* Returns 0 on success, -1 on failure
|
|
*
|
|
* NB: if the VF has no netdev name, that is *not* considered an
|
|
* error; *vfname simply gets a NULL and the return value is 0
|
|
* (success).
|
|
*/
|
|
int
|
|
virNetDevPFGetVF(const char *pfname, int vf, char **vfname)
|
|
{
|
|
g_autofree char *virtfnName = NULL;
|
|
g_autofree char *virtfnSysfsPath = NULL;
|
|
g_autofree char *pfPhysPortID = NULL;
|
|
|
|
/* a VF may have multiple "ports", each one having its own netdev,
|
|
* and each netdev having a different phys_port_id. Be sure we get
|
|
* the VF netdev with a phys_port_id matchine that of pfname
|
|
*/
|
|
if (virNetDevGetPhysPortID(pfname, &pfPhysPortID) < 0)
|
|
return -1;
|
|
|
|
virtfnName = g_strdup_printf("virtfn%d", vf);
|
|
|
|
/* this provides the path to the VF's directory in sysfs,
|
|
* e.g. "/sys/class/net/enp2s0f0/virtfn3"
|
|
*/
|
|
if (virNetDevSysfsDeviceFile(&virtfnSysfsPath, pfname, virtfnName) < 0)
|
|
return -1;
|
|
|
|
/* and this gets the netdev name associated with it, which is a
|
|
* directory entry in [virtfnSysfsPath]/net,
|
|
* e.g. "/sys/class/net/enp2s0f0/virtfn3/net/enp2s11f4" - in this
|
|
* example the VF for enp2s0f0 vf#3 is "enp2s11f4". (If the VF
|
|
* isn't bound to a netdev driver, it won't have a netdev name,
|
|
* and vfname will be NULL).
|
|
*/
|
|
return virPCIGetNetName(virtfnSysfsPath, 0, pfPhysPortID, vfname);
|
|
}
|
|
|
|
|
|
/**
|
|
* virNetDevGetVirtualFunctionInfo:
|
|
* @vfname: name of the virtual function interface
|
|
* @pfname: name of the physical function
|
|
* @vf: vf index
|
|
*
|
|
* Returns 0 on success, -errno on failure.
|
|
*
|
|
*/
|
|
int
|
|
virNetDevGetVirtualFunctionInfo(const char *vfname, char **pfname,
|
|
int *vf)
|
|
{
|
|
int ret = -1;
|
|
|
|
if (virNetDevGetPhysicalFunction(vfname, pfname) < 0)
|
|
return -1;
|
|
|
|
if (virNetDevGetVirtualFunctionIndex(*pfname, vfname, vf) < 0)
|
|
goto cleanup;
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
if (ret < 0)
|
|
VIR_FREE(*pfname);
|
|
return ret;
|
|
}
|
|
|
|
#else /* !__linux__ */
|
|
int
|
|
virNetDevGetPhysPortID(const char *ifname G_GNUC_UNUSED,
|
|
char **physPortID)
|
|
{
|
|
/* this actually should never be called, and is just here to
|
|
* satisfy the linker.
|
|
*/
|
|
*physPortID = NULL;
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
virNetDevGetVirtualFunctions(const char *pfname G_GNUC_UNUSED,
|
|
char ***vfname G_GNUC_UNUSED,
|
|
virPCIDeviceAddressPtr **virt_fns G_GNUC_UNUSED,
|
|
size_t *n_vfname G_GNUC_UNUSED,
|
|
unsigned int *max_vfs G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Unable to get virtual functions on this platform"));
|
|
return -1;
|
|
}
|
|
|
|
int
|
|
virNetDevIsVirtualFunction(const char *ifname G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Unable to check virtual function status on this platform"));
|
|
return -1;
|
|
}
|
|
|
|
int
|
|
virNetDevGetVirtualFunctionIndex(const char *pfname G_GNUC_UNUSED,
|
|
const char *vfname G_GNUC_UNUSED,
|
|
int *vf_index G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Unable to get virtual function index on this platform"));
|
|
return -1;
|
|
}
|
|
|
|
int
|
|
virNetDevGetPhysicalFunction(const char *ifname G_GNUC_UNUSED,
|
|
char **pfname G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Unable to get physical function status on this platform"));
|
|
return -1;
|
|
}
|
|
|
|
int
|
|
virNetDevPFGetVF(const char *pfname G_GNUC_UNUSED,
|
|
int vf G_GNUC_UNUSED,
|
|
char **vfname G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Unable to get virtual function name on this platform"));
|
|
return -1;
|
|
}
|
|
|
|
int
|
|
virNetDevGetVirtualFunctionInfo(const char *vfname G_GNUC_UNUSED,
|
|
char **pfname G_GNUC_UNUSED,
|
|
int *vf G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Unable to get virtual function info on this platform"));
|
|
return -1;
|
|
}
|
|
|
|
int
|
|
virNetDevSysfsFile(char **pf_sysfs_device_link G_GNUC_UNUSED,
|
|
const char *ifname G_GNUC_UNUSED,
|
|
const char *file G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Unable to get sysfs info on this platform"));
|
|
return -1;
|
|
}
|
|
|
|
|
|
#endif /* !__linux__ */
|
|
#if defined(__linux__) && defined(WITH_LIBNL) && defined(IFLA_VF_MAX)
|
|
|
|
|
|
static virMacAddr zeroMAC = { .addr = { 0, 0, 0, 0, 0, 0 } };
|
|
|
|
/* if a net driver doesn't allow setting MAC to all 0, try setting
|
|
* to this (the only bit that is set is the "locally administered" bit")
|
|
*/
|
|
static virMacAddr altZeroMAC = { .addr = { 2, 0, 0, 0, 0, 0 } };
|
|
|
|
|
|
static struct nla_policy ifla_vf_policy[IFLA_VF_MAX+1] = {
|
|
[IFLA_VF_MAC] = { .type = NLA_UNSPEC,
|
|
.maxlen = sizeof(struct ifla_vf_mac) },
|
|
[IFLA_VF_VLAN] = { .type = NLA_UNSPEC,
|
|
.maxlen = sizeof(struct ifla_vf_vlan) },
|
|
};
|
|
|
|
|
|
static int
|
|
virNetDevSetVfConfig(const char *ifname, int vf,
|
|
const virMacAddr *macaddr, int vlanid,
|
|
bool *allowRetry)
|
|
{
|
|
int rc = -1;
|
|
char macstr[VIR_MAC_STRING_BUFLEN];
|
|
g_autofree struct nlmsghdr *resp = NULL;
|
|
struct nlmsgerr *err;
|
|
unsigned int recvbuflen = 0;
|
|
struct nl_msg *nl_msg;
|
|
struct nlattr *vfinfolist, *vfinfo;
|
|
struct ifinfomsg ifinfo = {
|
|
.ifi_family = AF_UNSPEC,
|
|
.ifi_index = -1,
|
|
};
|
|
|
|
if (!macaddr && vlanid < 0)
|
|
return -1;
|
|
|
|
nl_msg = nlmsg_alloc_simple(RTM_SETLINK, NLM_F_REQUEST);
|
|
if (!nl_msg) {
|
|
virReportOOMError();
|
|
return rc;
|
|
}
|
|
|
|
if (nlmsg_append(nl_msg, &ifinfo, sizeof(ifinfo), NLMSG_ALIGNTO) < 0)
|
|
goto buffer_too_small;
|
|
|
|
if (ifname &&
|
|
nla_put(nl_msg, IFLA_IFNAME, strlen(ifname)+1, ifname) < 0)
|
|
goto buffer_too_small;
|
|
|
|
|
|
if (!(vfinfolist = nla_nest_start(nl_msg, IFLA_VFINFO_LIST)))
|
|
goto buffer_too_small;
|
|
|
|
if (!(vfinfo = nla_nest_start(nl_msg, IFLA_VF_INFO)))
|
|
goto buffer_too_small;
|
|
|
|
if (macaddr) {
|
|
struct ifla_vf_mac ifla_vf_mac = {
|
|
.vf = vf,
|
|
.mac = { 0, },
|
|
};
|
|
|
|
virMacAddrGetRaw(macaddr, ifla_vf_mac.mac);
|
|
|
|
if (nla_put(nl_msg, IFLA_VF_MAC, sizeof(ifla_vf_mac),
|
|
&ifla_vf_mac) < 0)
|
|
goto buffer_too_small;
|
|
}
|
|
|
|
if (vlanid >= 0) {
|
|
struct ifla_vf_vlan ifla_vf_vlan = {
|
|
.vf = vf,
|
|
.vlan = vlanid,
|
|
.qos = 0,
|
|
};
|
|
|
|
if (nla_put(nl_msg, IFLA_VF_VLAN, sizeof(ifla_vf_vlan),
|
|
&ifla_vf_vlan) < 0)
|
|
goto buffer_too_small;
|
|
}
|
|
|
|
nla_nest_end(nl_msg, vfinfo);
|
|
nla_nest_end(nl_msg, vfinfolist);
|
|
|
|
if (virNetlinkCommand(nl_msg, &resp, &recvbuflen, 0, 0,
|
|
NETLINK_ROUTE, 0) < 0)
|
|
goto cleanup;
|
|
|
|
if (recvbuflen < NLMSG_LENGTH(0) || resp == NULL)
|
|
goto malformed_resp;
|
|
|
|
switch (resp->nlmsg_type) {
|
|
case NLMSG_ERROR:
|
|
err = (struct nlmsgerr *)NLMSG_DATA(resp);
|
|
if (resp->nlmsg_len < NLMSG_LENGTH(sizeof(*err)))
|
|
goto malformed_resp;
|
|
|
|
/* if allowRetry is true and the error was EINVAL, then
|
|
* silently return a failure so the caller can retry with a
|
|
* different MAC address
|
|
*/
|
|
if (err->error == -EINVAL && *allowRetry &&
|
|
macaddr && !virMacAddrCmp(macaddr, &zeroMAC)) {
|
|
goto cleanup;
|
|
} else if (err->error) {
|
|
/* other errors are permanent */
|
|
virReportSystemError(-err->error,
|
|
_("Cannot set interface MAC/vlanid to %s/%d "
|
|
"for ifname %s vf %d"),
|
|
(macaddr
|
|
? virMacAddrFormat(macaddr, macstr)
|
|
: "(unchanged)"),
|
|
vlanid,
|
|
ifname ? ifname : "(unspecified)",
|
|
vf);
|
|
*allowRetry = false; /* no use retrying */
|
|
goto cleanup;
|
|
}
|
|
break;
|
|
|
|
case NLMSG_DONE:
|
|
break;
|
|
|
|
default:
|
|
goto malformed_resp;
|
|
}
|
|
|
|
rc = 0;
|
|
cleanup:
|
|
VIR_DEBUG("RTM_SETLINK %s vf %d MAC=%s vlanid=%d - %s",
|
|
ifname, vf,
|
|
macaddr ? virMacAddrFormat(macaddr, macstr) : "(unchanged)",
|
|
vlanid, rc < 0 ? "Fail" : "Success");
|
|
|
|
nlmsg_free(nl_msg);
|
|
return rc;
|
|
|
|
malformed_resp:
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("malformed netlink response message"));
|
|
goto cleanup;
|
|
|
|
buffer_too_small:
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("allocated netlink buffer is too small"));
|
|
goto cleanup;
|
|
}
|
|
|
|
static int
|
|
virNetDevParseVfConfig(struct nlattr **tb, int32_t vf, virMacAddrPtr mac,
|
|
int *vlanid)
|
|
{
|
|
int rc = -1;
|
|
struct ifla_vf_mac *vf_mac;
|
|
struct ifla_vf_vlan *vf_vlan;
|
|
struct nlattr *tb_vf_info = {NULL, };
|
|
struct nlattr *tb_vf[IFLA_VF_MAX+1];
|
|
int rem;
|
|
|
|
if (!tb[IFLA_VFINFO_LIST]) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("missing IFLA_VF_INFO in netlink response"));
|
|
return rc;
|
|
}
|
|
|
|
nla_for_each_nested(tb_vf_info, tb[IFLA_VFINFO_LIST], rem) {
|
|
if (nla_type(tb_vf_info) != IFLA_VF_INFO)
|
|
continue;
|
|
|
|
if (nla_parse_nested(tb_vf, IFLA_VF_MAX, tb_vf_info,
|
|
ifla_vf_policy)) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("error parsing IFLA_VF_INFO"));
|
|
return rc;
|
|
}
|
|
|
|
if (mac && tb[IFLA_VF_MAC]) {
|
|
vf_mac = RTA_DATA(tb_vf[IFLA_VF_MAC]);
|
|
if (vf_mac && vf_mac->vf == vf) {
|
|
virMacAddrSetRaw(mac, vf_mac->mac);
|
|
rc = 0;
|
|
}
|
|
}
|
|
|
|
if (vlanid && tb[IFLA_VF_VLAN]) {
|
|
vf_vlan = RTA_DATA(tb_vf[IFLA_VF_VLAN]);
|
|
if (vf_vlan && vf_vlan->vf == vf) {
|
|
*vlanid = vf_vlan->vlan;
|
|
rc = 0;
|
|
}
|
|
}
|
|
|
|
if (rc == 0)
|
|
break;
|
|
}
|
|
if (rc < 0)
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("couldn't find IFLA_VF_INFO for VF %d "
|
|
"in netlink response"), vf);
|
|
return rc;
|
|
}
|
|
|
|
static int
|
|
virNetDevGetVfConfig(const char *ifname, int vf, virMacAddrPtr mac,
|
|
int *vlanid)
|
|
{
|
|
g_autofree void *nlData = NULL;
|
|
struct nlattr *tb[IFLA_MAX + 1] = {NULL, };
|
|
int ifindex = -1;
|
|
|
|
if (virNetlinkDumpLink(ifname, ifindex, &nlData, tb, 0, 0) < 0)
|
|
return -1;
|
|
|
|
return virNetDevParseVfConfig(tb, vf, mac, vlanid);
|
|
}
|
|
|
|
|
|
# define VIR_NETDEV_KEYNAME_ADMIN_MAC "adminMac"
|
|
# define VIR_NETDEV_KEYNAME_VLAN_TAG "vlanTag"
|
|
# define VIR_NETDEV_KEYNAME_MAC "mac"
|
|
|
|
/**
|
|
* virNetDevSaveNetConfig:
|
|
* @linkdev: name of the interface
|
|
* @vf: vf index if linkdev is a pf
|
|
* @stateDir: directory to store old net config
|
|
* @saveVlan: false if we shouldn't attempt to save vlan tag info
|
|
* (eg for interfaces using 802.1Qbg, since it handles
|
|
* vlan tags internally)
|
|
*
|
|
* Save current MAC address and (if linkdev itself is a VF, or if @vf
|
|
* >= 0) the "admin MAC address" and vlan tag the device described by
|
|
* @linkdev:@vf to @stateDir. (the "admin MAC address" is stored in
|
|
* the PF, and is what the VF MAC will be initialized to the next time
|
|
* its driver is reloaded (either on host or guest).
|
|
*
|
|
* File Format:
|
|
*
|
|
* The file is in json format and will contain 1 or more of the
|
|
* following values:
|
|
*
|
|
* "mac" - VF MAC address (or missing if VF has no host net driver)
|
|
* "vlanTag" - a single vlan tag id
|
|
* "adminMac" - admin MAC address (stored in the PF)
|
|
*
|
|
* For example:
|
|
*
|
|
* {"mac": "9A:11:22:33:44:55",
|
|
* "vlanTag": "42",
|
|
* "adminMac": "00:00:00:00:00:00"
|
|
* }
|
|
*
|
|
* File Name:
|
|
*
|
|
* If the device is a VF and we're allowed to save vlan tag info, the
|
|
* file will be named ${pfDevName_vf#{vf} (e.g. "enp2s0f0_vf5") and
|
|
* will contain at least "adminMac" and "vlanTag" (if the device was bound
|
|
* to a net driver on the host prior to use, it will also have "mac"..
|
|
* If the device isn't a VF, or we're not allowed to save vlan tag
|
|
* info, the file will be named ${linkdev} (e.g. "enp3s0f0") and will
|
|
* contain just linkdev's MAC address.
|
|
*
|
|
* Returns 0 on success, -1 on failure
|
|
*
|
|
*/
|
|
int
|
|
virNetDevSaveNetConfig(const char *linkdev, int vf,
|
|
const char *stateDir,
|
|
bool saveVlan)
|
|
{
|
|
const char *pfDevName = NULL;
|
|
g_autofree char *pfDevOrig = NULL;
|
|
g_autofree char *vfDevOrig = NULL;
|
|
virMacAddr oldMAC;
|
|
char MACStr[VIR_MAC_STRING_BUFLEN];
|
|
int oldVlanTag = -1;
|
|
g_autofree char *filePath = NULL;
|
|
g_autofree char *fileStr = NULL;
|
|
g_autoptr(virJSONValue) configJSON = NULL;
|
|
|
|
if (vf >= 0) {
|
|
/* linkdev is the PF */
|
|
pfDevName = linkdev;
|
|
|
|
/* linkdev should get the VF's netdev name (or NULL if none) */
|
|
if (virNetDevPFGetVF(pfDevName, vf, &vfDevOrig) < 0)
|
|
return -1;
|
|
|
|
linkdev = vfDevOrig;
|
|
saveVlan = true;
|
|
|
|
} else if (virNetDevIsVirtualFunction(linkdev) == 1) {
|
|
/* when vf is -1, linkdev might be a standard netdevice (not
|
|
* SRIOV), or it might be an SRIOV VF. If it's a VF, normalize
|
|
* it to PF + VFname
|
|
*/
|
|
|
|
if (virNetDevGetVirtualFunctionInfo(linkdev, &pfDevOrig, &vf) < 0)
|
|
return -1;
|
|
pfDevName = pfDevOrig;
|
|
}
|
|
|
|
if (pfDevName) {
|
|
bool pfIsOnline;
|
|
|
|
/* Assure that PF is online before trying to use it to set
|
|
* anything up for this VF. It *should* be online already,
|
|
* but if it isn't online the changes made to the VF via the
|
|
* PF won't take effect, yet there will be no error
|
|
* reported. In the case that the PF isn't online, we need to
|
|
* fail and report the error, rather than automatically
|
|
* setting it online, since setting an unconfigured interface
|
|
* online automatically turns on IPv6 autoconfig, which may
|
|
* not be what the admin expects, so we require them to
|
|
* explicitly enable the PF in the host system network config.
|
|
*/
|
|
if (virNetDevGetOnline(pfDevName, &pfIsOnline) < 0)
|
|
return -1;
|
|
|
|
if (!pfIsOnline) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("Unable to configure VF %d of PF '%s' "
|
|
"because the PF is not online. Please "
|
|
"change host network config to put the "
|
|
"PF online."),
|
|
vf, pfDevName);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
configJSON = virJSONValueNewObject();
|
|
|
|
/* if there is a PF, it's now in pfDevName, and linkdev is either
|
|
* the VF's name, or NULL (if the VF isn't bound to a net driver
|
|
* on the host)
|
|
*/
|
|
|
|
if (pfDevName && saveVlan) {
|
|
filePath = g_strdup_printf("%s/%s_vf%d", stateDir, pfDevName, vf);
|
|
|
|
/* get admin MAC and vlan tag */
|
|
if (virNetDevGetVfConfig(pfDevName, vf, &oldMAC, &oldVlanTag) < 0)
|
|
return -1;
|
|
|
|
if (virJSONValueObjectAppendString(configJSON,
|
|
VIR_NETDEV_KEYNAME_ADMIN_MAC,
|
|
virMacAddrFormat(&oldMAC, MACStr)) < 0 ||
|
|
virJSONValueObjectAppendNumberInt(configJSON,
|
|
VIR_NETDEV_KEYNAME_VLAN_TAG,
|
|
oldVlanTag) < 0) {
|
|
return -1;
|
|
}
|
|
|
|
} else {
|
|
filePath = g_strdup_printf("%s/%s", stateDir, linkdev);
|
|
}
|
|
|
|
if (linkdev) {
|
|
if (virNetDevGetMAC(linkdev, &oldMAC) < 0)
|
|
return -1;
|
|
|
|
/* for interfaces with no pfDevName (i.e. not a VF, this will
|
|
* be the only value in the file.
|
|
*/
|
|
if (virJSONValueObjectAppendString(configJSON, VIR_NETDEV_KEYNAME_MAC,
|
|
virMacAddrFormat(&oldMAC, MACStr)) < 0)
|
|
return -1;
|
|
}
|
|
|
|
if (!(fileStr = virJSONValueToString(configJSON, true)))
|
|
return -1;
|
|
|
|
if (virFileWriteStr(filePath, fileStr, O_CREAT|O_TRUNC|O_WRONLY) < 0) {
|
|
virReportSystemError(errno, _("Unable to preserve mac/vlan tag "
|
|
"for device = %s, vf = %d"), linkdev, vf);
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* virNetDevReadNetConfig:
|
|
* @linkdev: name of the interface
|
|
* @vf: vf index if linkdev is a pf
|
|
* @stateDir: directory where net config is stored
|
|
* @adminMAC: returns admin MAC to store in the PF (if this is a VF)
|
|
* @MAC: returns MAC to set on device immediately
|
|
*
|
|
* Read saved MAC address and (if linkdev itself is a VF, or if @vf >=
|
|
* 0) "admin MAC address" and vlan tag of the device described by
|
|
* @linkdev:@vf from a file in @stateDir. (see virNetDevSaveNetConfig
|
|
* for details of file name and format).
|
|
*
|
|
* Returns 0 on success, -1 on failure. It is *NOT* considered failure
|
|
* if no file is found to read. In that case, adminMAC, vlan, and MAC
|
|
* are set to NULL, and success is returned.
|
|
*
|
|
* The caller MUST free adminMAC, vlan, and MAC when it is finished
|
|
* with them (they will be NULL if they weren't found in the file)
|
|
*
|
|
*/
|
|
int
|
|
virNetDevReadNetConfig(const char *linkdev, int vf,
|
|
const char *stateDir,
|
|
virMacAddrPtr *adminMAC,
|
|
virNetDevVlanPtr *vlan,
|
|
virMacAddrPtr *MAC)
|
|
{
|
|
int ret = -1;
|
|
const char *pfDevName = NULL;
|
|
g_autofree char *pfDevOrig = NULL;
|
|
g_autofree char *vfDevOrig = NULL;
|
|
g_autofree char *filePath = NULL;
|
|
g_autofree char *fileStr = NULL;
|
|
g_autoptr(virJSONValue) configJSON = NULL;
|
|
const char *MACStr = NULL;
|
|
const char *adminMACStr = NULL;
|
|
int vlanTag = -1;
|
|
|
|
*adminMAC = NULL;
|
|
*vlan = NULL;
|
|
*MAC = NULL;
|
|
|
|
if (vf >= 0) {
|
|
/* linkdev is the PF */
|
|
pfDevName = linkdev;
|
|
|
|
/* linkdev should get the VF's netdev name (or NULL if none) */
|
|
if (virNetDevPFGetVF(pfDevName, vf, &vfDevOrig) < 0)
|
|
goto cleanup;
|
|
|
|
linkdev = vfDevOrig;
|
|
|
|
} else if (virNetDevIsVirtualFunction(linkdev) == 1) {
|
|
/* when vf is -1, linkdev might be a standard netdevice (not
|
|
* SRIOV), or it might be an SRIOV VF. If it's a VF, normalize
|
|
* it to PF + VFname
|
|
*/
|
|
|
|
if (virNetDevGetVirtualFunctionInfo(linkdev, &pfDevOrig, &vf) < 0)
|
|
goto cleanup;
|
|
pfDevName = pfDevOrig;
|
|
}
|
|
|
|
/* if there is a PF, it's now in pfDevName, and linkdev is either
|
|
* the VF's name, or NULL (if the VF isn't bound to a net driver
|
|
* on the host)
|
|
*/
|
|
|
|
if (pfDevName) {
|
|
filePath = g_strdup_printf("%s/%s_vf%d", stateDir, pfDevName, vf);
|
|
|
|
if (linkdev && !virFileExists(filePath)) {
|
|
/* the device may have been stored in a file named for the
|
|
* VF due to saveVlan == false (or an older version of
|
|
* libvirt), so reset filePath and pfDevName so we'll try
|
|
* the other filename.
|
|
*/
|
|
VIR_FREE(filePath);
|
|
pfDevName = NULL;
|
|
}
|
|
}
|
|
|
|
if (!pfDevName)
|
|
filePath = g_strdup_printf("%s/%s", stateDir, linkdev);
|
|
|
|
if (!virFileExists(filePath)) {
|
|
/* having no file to read is not necessarily an error, so we
|
|
* just return success, but with MAC, adminMAC, and vlan set to NULL
|
|
*/
|
|
ret = 0;
|
|
goto cleanup;
|
|
}
|
|
|
|
if (virFileReadAll(filePath, 128, &fileStr) < 0)
|
|
goto cleanup;
|
|
|
|
if (strchr("0123456789abcdefABCDEF", fileStr[0])) {
|
|
const char *vlanStr = NULL;
|
|
|
|
/* old version of file - just two lines of text. Line 1 is the
|
|
* MAC address (or if line 2 is present, line 1 is adminMAC),
|
|
* and line 2 (if present) is the vlan tag
|
|
*/
|
|
|
|
if ((vlanStr = strchr(fileStr, '\n'))) {
|
|
char *endptr;
|
|
|
|
/* if there are 2 lines, the first is adminMAC */
|
|
adminMACStr = fileStr;
|
|
vlanStr++;
|
|
|
|
if ((virStrToLong_i(vlanStr, &endptr, 10, &vlanTag) < 0) ||
|
|
(endptr && *endptr != '\n' && *endptr != 0)) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("cannot parse vlan tag '%s' from file '%s'"),
|
|
vlanStr, filePath);
|
|
goto cleanup;
|
|
}
|
|
} else {
|
|
/* if there is only one line, it is MAC */
|
|
MACStr = fileStr;
|
|
}
|
|
} else {
|
|
/* if it doesn't start with a hex digit, it is a modern
|
|
* version of the config file - JSON format as described in
|
|
* preamble to virNetDevSaveNetConfig()
|
|
*/
|
|
if (!(configJSON = virJSONValueFromString(fileStr))) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("invalid json in net device saved "
|
|
"config file '%s': '%.60s'"),
|
|
filePath, fileStr);
|
|
goto cleanup;
|
|
}
|
|
|
|
MACStr = virJSONValueObjectGetString(configJSON,
|
|
VIR_NETDEV_KEYNAME_MAC);
|
|
adminMACStr = virJSONValueObjectGetString(configJSON,
|
|
VIR_NETDEV_KEYNAME_ADMIN_MAC);
|
|
ignore_value(virJSONValueObjectGetNumberInt(configJSON,
|
|
VIR_NETDEV_KEYNAME_VLAN_TAG,
|
|
&vlanTag));
|
|
|
|
if (!(MACStr || adminMACStr)) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("network device saved config file '%s' "
|
|
"has unexpected contents, missing both "
|
|
"'MAC' and 'adminMAC': '%.60s'"),
|
|
filePath, fileStr);
|
|
goto cleanup;
|
|
}
|
|
}
|
|
|
|
if (MACStr) {
|
|
if (VIR_ALLOC(*MAC) < 0)
|
|
goto cleanup;
|
|
|
|
if (virMacAddrParse(MACStr, *MAC) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("cannot parse MAC address '%s' from file '%s'"),
|
|
MACStr, filePath);
|
|
goto cleanup;
|
|
}
|
|
}
|
|
|
|
if (adminMACStr) {
|
|
if (VIR_ALLOC(*adminMAC) < 0)
|
|
goto cleanup;
|
|
|
|
if (virMacAddrParse(adminMACStr, *adminMAC) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("cannot parse MAC address '%s' from file '%s'"),
|
|
adminMACStr, filePath);
|
|
goto cleanup;
|
|
}
|
|
}
|
|
|
|
if (vlanTag != -1) {
|
|
/* construct a simple virNetDevVlan object with a single tag */
|
|
if (VIR_ALLOC(*vlan) < 0)
|
|
goto cleanup;
|
|
if (VIR_ALLOC((*vlan)->tag) < 0)
|
|
goto cleanup;
|
|
(*vlan)->nTags = 1;
|
|
(*vlan)->tag[0] = vlanTag;
|
|
}
|
|
|
|
/* we won't need the file again */
|
|
unlink(filePath);
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
if (ret < 0) {
|
|
VIR_FREE(*adminMAC);
|
|
VIR_FREE(*MAC);
|
|
VIR_FREE(*vlan);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
/**
|
|
* virNetDevSetNetConfig:
|
|
* @linkdev: name of the interface
|
|
* @vf: vf index if linkdev is a PF
|
|
* @adminMAC: new admin MAC address (will be stored in PF and
|
|
* used for next initialization of VF driver)
|
|
* @vlan: new vlan tag info (or NULL)
|
|
* @MAC: new MAC address to set on the device immediately
|
|
* @setVlan: true to enable setting vlan tag (even if @vlan is NULL,
|
|
* the interface vlan tag will be set to 0).
|
|
*
|
|
*
|
|
* Set new MAC address and (optionally) admin MAC and vlan tag of
|
|
* @linkdev VF# @vf.
|
|
*
|
|
* Returns 0 on success, -1 on failure
|
|
*
|
|
*/
|
|
int
|
|
virNetDevSetNetConfig(const char *linkdev, int vf,
|
|
const virMacAddr *adminMAC,
|
|
const virNetDevVlan *vlan,
|
|
const virMacAddr *MAC,
|
|
bool setVlan)
|
|
{
|
|
char MACStr[VIR_MAC_STRING_BUFLEN];
|
|
const char *pfDevName = NULL;
|
|
g_autofree char *pfDevOrig = NULL;
|
|
g_autofree char *vfDevOrig = NULL;
|
|
int vlanTag = -1;
|
|
g_autoptr(virPCIDevice) vfPCIDevice = NULL;
|
|
|
|
if (vf >= 0) {
|
|
/* linkdev is the PF */
|
|
pfDevName = linkdev;
|
|
|
|
/* linkdev should get the VF's netdev name (or NULL if none) */
|
|
if (virNetDevPFGetVF(pfDevName, vf, &vfDevOrig) < 0)
|
|
return -1;
|
|
|
|
linkdev = vfDevOrig;
|
|
|
|
} else if (virNetDevIsVirtualFunction(linkdev) == 1) {
|
|
/* when vf is -1, linkdev might be a standard netdevice (not
|
|
* SRIOV), or it might be an SRIOV VF. If it's a VF, normalize
|
|
* it to PF + VFname
|
|
*/
|
|
|
|
if (virNetDevGetVirtualFunctionInfo(linkdev, &pfDevOrig, &vf))
|
|
return -1;
|
|
pfDevName = pfDevOrig;
|
|
}
|
|
|
|
|
|
if (!pfDevName) {
|
|
/* if it's not SRIOV, then we can't set the admin MAC address
|
|
* or vlan tag
|
|
*/
|
|
if (adminMAC) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
_("admin MAC can only be set for SR-IOV VFs, but "
|
|
"%s is not a VF"), linkdev);
|
|
return -1;
|
|
}
|
|
|
|
if (vlan) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
|
_("vlan can only be set for SR-IOV VFs, but "
|
|
"%s is not a VF"), linkdev);
|
|
return -1;
|
|
}
|
|
|
|
} else {
|
|
if (vlan) {
|
|
if (vlan->nTags != 1 || vlan->trunk) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("vlan trunking is not supported "
|
|
"by SR-IOV network devices"));
|
|
return -1;
|
|
}
|
|
|
|
if (!setVlan) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("vlan tag set for interface %s but "
|
|
"caller requested it not be set"));
|
|
return -1;
|
|
}
|
|
|
|
vlanTag = vlan->tag[0];
|
|
|
|
} else if (setVlan) {
|
|
vlanTag = 0; /* assure any existing vlan tag is reset */
|
|
}
|
|
}
|
|
|
|
if (MAC) {
|
|
int setMACrc;
|
|
|
|
if (!linkdev) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("VF %d of PF '%s' is not bound to a net driver, "
|
|
"so its MAC address cannot be set to %s"),
|
|
vf, pfDevName, virMacAddrFormat(MAC, MACStr));
|
|
return -1;
|
|
}
|
|
|
|
setMACrc = virNetDevSetMACInternal(linkdev, MAC, !!pfDevOrig);
|
|
if (setMACrc < 0) {
|
|
bool allowRetry = false;
|
|
int retries = 100;
|
|
|
|
/* if pfDevOrig == NULL, this isn't a VF, so we've failed */
|
|
if (!pfDevOrig ||
|
|
(errno != EADDRNOTAVAIL && errno != EPERM))
|
|
return -1;
|
|
|
|
/* Otherwise this is a VF, and virNetDevSetMAC failed with
|
|
* EADDRNOTAVAIL/EPERM, which could be due to the
|
|
* "administratively set" flag being set in the PF for
|
|
* this VF. When this happens, we can attempt to use an
|
|
* alternate method to set the VF MAC: first set it into
|
|
* the admin MAC for this VF in the PF, then unbind/rebind
|
|
* the VF from its net driver. This causes the VF's MAC to
|
|
* be initialized to whatever was stored in the admin MAC.
|
|
*/
|
|
|
|
if (virNetDevSetVfConfig(pfDevName, vf,
|
|
MAC, vlanTag, &allowRetry) < 0) {
|
|
return -1;
|
|
}
|
|
|
|
/* admin MAC is set, now we need to construct a virPCIDevice
|
|
* object so we can call virPCIDeviceRebind()
|
|
*/
|
|
if (!(vfPCIDevice = virNetDevGetPCIDevice(linkdev)))
|
|
return -1;
|
|
|
|
/* Rebind the device. This should set the proper MAC address */
|
|
if (virPCIDeviceRebind(vfPCIDevice) < 0)
|
|
return -1;
|
|
|
|
/* Wait until virNetDevGetIndex for the VF netdev returns success.
|
|
* This indicates that the device is ready to be used. If we don't
|
|
* wait, then upcoming operations on the VF may fail.
|
|
*/
|
|
while (retries-- > 0 && !virNetDevExists(linkdev))
|
|
g_usleep(1000);
|
|
}
|
|
|
|
if (pfDevOrig && setMACrc == 0) {
|
|
/* if pfDevOrig is set, it that the caller was *really*
|
|
* only interested in setting the MAC of the VF itself,
|
|
* *not* the admin MAC via the PF. In those cases, the
|
|
* adminMAC was only provided in case we need to set the
|
|
* VF's MAC by temporarily unbinding/rebinding the VF's
|
|
* net driver with the admin MAC set to the desired MAC,
|
|
* and then want to restore the admin MAC to its original
|
|
* setting when we're finished. We would only need to do
|
|
* that if the virNetDevSetMAC() above had failed; since
|
|
* setMACrc == 0, we know it didn't fail and we don't need
|
|
* to set the adminMAC, so we are NULLing it out here to
|
|
* avoid that below.
|
|
|
|
* (NB: since setting the admin MAC sets the
|
|
* "administratively set" flag for the VF in the PF's
|
|
* driver, which prevents any future changes to the VF's
|
|
* MAC address, we want to avoid setting the admin MAC as
|
|
* much as possible.)
|
|
*/
|
|
adminMAC = NULL;
|
|
}
|
|
}
|
|
|
|
if (adminMAC || vlanTag >= 0) {
|
|
/* Set vlanTag and admin MAC using an RTM_SETLINK request sent to
|
|
* PFdevname+VF#, if mac != NULL this will set the "admin MAC" via
|
|
* the PF, *not* the actual VF MAC - the admin MAC only takes
|
|
* effect the next time the VF's driver is initialized (either in
|
|
* guest or host). if there is a vlanTag to set, it will take
|
|
* effect immediately though.
|
|
*/
|
|
bool allowRetry = true;
|
|
|
|
if (virNetDevSetVfConfig(pfDevName, vf,
|
|
adminMAC, vlanTag, &allowRetry) < 0) {
|
|
/* allowRetry will still be true if the failure was due to
|
|
* trying to set the MAC address to all 0. In that case,
|
|
* we can retry with "altZeroMAC", which is just an all-0 MAC
|
|
* with the "locally administered" bit set.
|
|
*/
|
|
if (!allowRetry)
|
|
return -1;
|
|
|
|
allowRetry = false;
|
|
if (virNetDevSetVfConfig(pfDevName, vf,
|
|
&altZeroMAC, vlanTag, &allowRetry) < 0) {
|
|
return -1;
|
|
}
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
#else /* defined(__linux__) && defined(WITH_LIBNL) && defined(IFLA_VF_MAX) */
|
|
|
|
|
|
int
|
|
virNetDevSaveNetConfig(const char *linkdev G_GNUC_UNUSED,
|
|
int vf G_GNUC_UNUSED,
|
|
const char *stateDir G_GNUC_UNUSED,
|
|
bool saveVlan G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Unable to save net device config on this platform"));
|
|
return -1;
|
|
}
|
|
|
|
|
|
int
|
|
virNetDevReadNetConfig(const char *linkdev G_GNUC_UNUSED,
|
|
int vf G_GNUC_UNUSED,
|
|
const char *stateDir G_GNUC_UNUSED,
|
|
virMacAddrPtr *adminMAC G_GNUC_UNUSED,
|
|
virNetDevVlanPtr *vlan G_GNUC_UNUSED,
|
|
virMacAddrPtr *MAC G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Unable to read net device config on this platform"));
|
|
return -1;
|
|
}
|
|
|
|
|
|
int
|
|
virNetDevSetNetConfig(const char *linkdev G_GNUC_UNUSED,
|
|
int vf G_GNUC_UNUSED,
|
|
const virMacAddr *adminMAC G_GNUC_UNUSED,
|
|
const virNetDevVlan *vlan G_GNUC_UNUSED,
|
|
const virMacAddr *MAC G_GNUC_UNUSED,
|
|
bool setVlan G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Unable to set net device config on this platform"));
|
|
return -1;
|
|
}
|
|
|
|
|
|
#endif /* defined(__linux__) && defined(WITH_LIBNL) && defined(IFLA_VF_MAX) */
|
|
|
|
VIR_ENUM_IMPL(virNetDevIfState,
|
|
VIR_NETDEV_IF_STATE_LAST,
|
|
"" /* value of zero means no state */,
|
|
"unknown", "notpresent",
|
|
"down", "lowerlayerdown",
|
|
"testing", "dormant", "up",
|
|
);
|
|
|
|
VIR_ENUM_IMPL(virNetDevFeature,
|
|
VIR_NET_DEV_FEAT_LAST,
|
|
"rx",
|
|
"tx",
|
|
"sg",
|
|
"tso",
|
|
"gso",
|
|
"gro",
|
|
"lro",
|
|
"rxvlan",
|
|
"txvlan",
|
|
"ntuple",
|
|
"rxhash",
|
|
"rdma",
|
|
"txudptnl",
|
|
"switchdev",
|
|
);
|
|
|
|
#ifdef __linux__
|
|
int
|
|
virNetDevGetLinkInfo(const char *ifname,
|
|
virNetDevIfLinkPtr lnk)
|
|
{
|
|
g_autofree char *path = NULL;
|
|
g_autofree char *buf = NULL;
|
|
char *tmp;
|
|
int tmp_state;
|
|
unsigned int tmp_speed;
|
|
|
|
if (virNetDevSysfsFile(&path, ifname, "operstate") < 0)
|
|
return -1;
|
|
|
|
/* The device may have been removed or moved by the time we got here.
|
|
* Obviously attempting to get LinkInfo on a no longer existing device
|
|
* is useless, so stop processing. If we got here via the udev monitor
|
|
* a remove or move event will follow and we will be able to get valid
|
|
* LinkInfo at that time */
|
|
if (!virFileExists(path)) {
|
|
VIR_INFO("The interface '%s' was removed before we could query it.",
|
|
ifname);
|
|
return -1;
|
|
}
|
|
|
|
if (virFileReadAll(path, 1024, &buf) < 0) {
|
|
virReportSystemError(errno,
|
|
_("unable to read: %s"),
|
|
path);
|
|
return -1;
|
|
}
|
|
|
|
if (!(tmp = strchr(buf, '\n'))) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("Unable to parse: %s"),
|
|
buf);
|
|
return -1;
|
|
}
|
|
|
|
*tmp = '\0';
|
|
|
|
/* We shouldn't allow 0 here, because
|
|
* virInterfaceState enum starts from 1. */
|
|
if ((tmp_state = virNetDevIfStateTypeFromString(buf)) <= 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("Unable to parse: %s"),
|
|
buf);
|
|
return -1;
|
|
}
|
|
|
|
lnk->state = tmp_state;
|
|
|
|
/* Shortcut to avoid some kernel issues. If link is not up several drivers
|
|
* report several misleading values. While igb reports 65535, realtek goes
|
|
* with 10. To avoid muddying XML with insane values, don't report link
|
|
* speed if that's the case. */
|
|
if (lnk->state != VIR_NETDEV_IF_STATE_UP) {
|
|
lnk->speed = 0;
|
|
return 0;
|
|
}
|
|
|
|
VIR_FREE(path);
|
|
VIR_FREE(buf);
|
|
|
|
if (virNetDevSysfsFile(&path, ifname, "speed") < 0)
|
|
return -1;
|
|
|
|
if (virFileReadAllQuiet(path, 1024, &buf) < 0) {
|
|
/* Some devices doesn't report speed, in which case we get EINVAL */
|
|
if (errno == EINVAL)
|
|
return 0;
|
|
virReportSystemError(errno,
|
|
_("unable to read: %s"),
|
|
path);
|
|
return -1;
|
|
}
|
|
|
|
if (virStrToLong_ui(buf, &tmp, 10, &tmp_speed) < 0 ||
|
|
*tmp != '\n') {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("Unable to parse: %s"),
|
|
buf);
|
|
return -1;
|
|
}
|
|
|
|
lnk->speed = tmp_speed;
|
|
|
|
return 0;
|
|
}
|
|
|
|
#else
|
|
|
|
int
|
|
virNetDevGetLinkInfo(const char *ifname,
|
|
virNetDevIfLinkPtr lnk)
|
|
{
|
|
/* Port me */
|
|
VIR_DEBUG("Getting link info on %s is not implemented on this platform",
|
|
ifname);
|
|
lnk->speed = lnk->state = 0;
|
|
return 0;
|
|
}
|
|
#endif /* defined(__linux__) */
|
|
|
|
|
|
#if defined(SIOCADDMULTI) && defined(WITH_STRUCT_IFREQ) && \
|
|
defined(WITH_STRUCT_IFREQ_IFR_HWADDR)
|
|
/**
|
|
* virNetDevAddMulti:
|
|
* @ifname: interface name to which to add multicast MAC address
|
|
* @macaddr: MAC address
|
|
*
|
|
* This function adds the @macaddr to the multicast list for a given interface
|
|
* @ifname.
|
|
*
|
|
* Returns 0 in case of success or -1 on failure
|
|
*/
|
|
int virNetDevAddMulti(const char *ifname,
|
|
virMacAddrPtr macaddr)
|
|
{
|
|
struct ifreq ifr;
|
|
VIR_AUTOCLOSE fd = -1;
|
|
|
|
if ((fd = virNetDevSetupControl(ifname, &ifr)) < 0)
|
|
return -1;
|
|
|
|
ifr.ifr_hwaddr.sa_family = AF_UNSPEC;
|
|
virMacAddrGetRaw(macaddr, (unsigned char *)ifr.ifr_hwaddr.sa_data);
|
|
|
|
if (ioctl(fd, SIOCADDMULTI, &ifr) < 0) {
|
|
char macstr[VIR_MAC_STRING_BUFLEN];
|
|
virReportSystemError(errno,
|
|
_("Cannot add multicast MAC %s on '%s' interface"),
|
|
virMacAddrFormat(macaddr, macstr), ifname);
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
#else
|
|
int virNetDevAddMulti(const char *ifname G_GNUC_UNUSED,
|
|
virMacAddrPtr macaddr G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Unable to add address to interface "
|
|
"multicast list on this platform"));
|
|
return -1;
|
|
}
|
|
#endif
|
|
|
|
#if defined(SIOCDELMULTI) && defined(WITH_STRUCT_IFREQ) && \
|
|
defined(WITH_STRUCT_IFREQ_IFR_HWADDR)
|
|
/**
|
|
* virNetDevDelMulti:
|
|
* @ifname: interface name from which to delete the multicast MAC address
|
|
* @macaddr: MAC address
|
|
*
|
|
* This function deletes the @macaddr from the multicast list for a given
|
|
* interface @ifname.
|
|
*
|
|
* Returns 0 in case of success or -1 on failure
|
|
*/
|
|
int virNetDevDelMulti(const char *ifname,
|
|
virMacAddrPtr macaddr)
|
|
{
|
|
struct ifreq ifr;
|
|
VIR_AUTOCLOSE fd = -1;
|
|
|
|
if ((fd = virNetDevSetupControl(ifname, &ifr)) < 0)
|
|
return -1;
|
|
|
|
ifr.ifr_hwaddr.sa_family = AF_UNSPEC;
|
|
virMacAddrGetRaw(macaddr, (unsigned char *)ifr.ifr_hwaddr.sa_data);
|
|
|
|
if (ioctl(fd, SIOCDELMULTI, &ifr) < 0) {
|
|
char macstr[VIR_MAC_STRING_BUFLEN];
|
|
virReportSystemError(errno,
|
|
_("Cannot add multicast MAC %s on '%s' interface"),
|
|
virMacAddrFormat(macaddr, macstr), ifname);
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
#else
|
|
int virNetDevDelMulti(const char *ifname G_GNUC_UNUSED,
|
|
virMacAddrPtr macaddr G_GNUC_UNUSED)
|
|
{
|
|
virReportSystemError(ENOSYS, "%s",
|
|
_("Unable to delete address from interface "
|
|
"multicast list on this platform"));
|
|
return -1;
|
|
}
|
|
#endif
|
|
|
|
static int virNetDevParseMcast(char *buf, virNetDevMcastEntryPtr mcast)
|
|
{
|
|
int ifindex;
|
|
int num;
|
|
char *next;
|
|
char *token;
|
|
char *saveptr;
|
|
char *endptr;
|
|
|
|
for (ifindex = VIR_MCAST_TYPE_INDEX_TOKEN, next = buf; ifindex < VIR_MCAST_TYPE_LAST; ifindex++,
|
|
next = NULL) {
|
|
token = strtok_r(next, VIR_MCAST_TOKEN_DELIMS, &saveptr);
|
|
|
|
if (token == NULL) {
|
|
virReportSystemError(EINVAL,
|
|
_("failed to parse multicast address from '%s'"),
|
|
buf);
|
|
return -1;
|
|
}
|
|
|
|
switch ((virMCastType)ifindex) {
|
|
case VIR_MCAST_TYPE_INDEX_TOKEN:
|
|
if (virStrToLong_i(token, &endptr, 10, &num) < 0) {
|
|
virReportSystemError(EINVAL,
|
|
_("Failed to parse interface index from '%s'"),
|
|
buf);
|
|
return -1;
|
|
|
|
}
|
|
mcast->idx = num;
|
|
break;
|
|
case VIR_MCAST_TYPE_NAME_TOKEN:
|
|
if (virStrcpy(mcast->name, token, VIR_MCAST_NAME_LEN) < 0) {
|
|
virReportSystemError(EINVAL,
|
|
_("Failed to parse network device name from '%s'"),
|
|
buf);
|
|
return -1;
|
|
}
|
|
break;
|
|
case VIR_MCAST_TYPE_USERS_TOKEN:
|
|
if (virStrToLong_i(token, &endptr, 10, &num) < 0) {
|
|
virReportSystemError(EINVAL,
|
|
_("Failed to parse users from '%s'"),
|
|
buf);
|
|
return -1;
|
|
|
|
}
|
|
mcast->users = num;
|
|
break;
|
|
case VIR_MCAST_TYPE_GLOBAL_TOKEN:
|
|
if (virStrToLong_i(token, &endptr, 10, &num) < 0) {
|
|
virReportSystemError(EINVAL,
|
|
_("Failed to parse users from '%s'"),
|
|
buf);
|
|
return -1;
|
|
|
|
}
|
|
mcast->global = num;
|
|
break;
|
|
case VIR_MCAST_TYPE_ADDR_TOKEN:
|
|
if (virMacAddrParseHex((const char*)token,
|
|
&mcast->macaddr) < 0) {
|
|
virReportSystemError(EINVAL,
|
|
_("Failed to parse MAC address from '%s'"),
|
|
buf);
|
|
}
|
|
break;
|
|
|
|
/* coverity[dead_error_begin] */
|
|
case VIR_MCAST_TYPE_LAST:
|
|
break;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
static void virNetDevMcastListClear(virNetDevMcastListPtr mcast)
|
|
{
|
|
size_t i;
|
|
|
|
for (i = 0; i < mcast->nentries; i++)
|
|
VIR_FREE(mcast->entries[i]);
|
|
VIR_FREE(mcast->entries);
|
|
mcast->nentries = 0;
|
|
}
|
|
|
|
|
|
static int virNetDevGetMcastList(const char *ifname,
|
|
virNetDevMcastListPtr mcast)
|
|
{
|
|
char *cur = NULL;
|
|
g_autofree char *buf = NULL;
|
|
char *next = NULL;
|
|
int len;
|
|
g_autoptr(virNetDevMcastEntry) entry = NULL;
|
|
|
|
mcast->entries = NULL;
|
|
mcast->nentries = 0;
|
|
|
|
/* Read entire multicast table into memory */
|
|
if ((len = virFileReadAll(PROC_NET_DEV_MCAST, MAX_MCAST_SIZE, &buf)) <= 0)
|
|
return -1;
|
|
|
|
cur = buf;
|
|
while (cur) {
|
|
if (!entry && VIR_ALLOC(entry) < 0)
|
|
return -1;
|
|
|
|
next = strchr(cur, '\n');
|
|
if (next)
|
|
next++;
|
|
if (virNetDevParseMcast(cur, entry))
|
|
return -1;
|
|
|
|
/* Only return global multicast MAC addresses for
|
|
* specified interface */
|
|
if (entry->global && STREQ(ifname, entry->name)) {
|
|
if (VIR_APPEND_ELEMENT(mcast->entries, mcast->nentries, entry))
|
|
return -1;
|
|
} else {
|
|
memset(entry, 0, sizeof(virNetDevMcastEntry));
|
|
}
|
|
cur = next && ((next - buf) < len) ? next : NULL;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
VIR_ENUM_IMPL(virNetDevRxFilterMode,
|
|
VIR_NETDEV_RX_FILTER_MODE_LAST,
|
|
"none",
|
|
"normal",
|
|
"all",
|
|
);
|
|
|
|
|
|
static int virNetDevGetMulticastTable(const char *ifname,
|
|
virNetDevRxFilterPtr filter)
|
|
{
|
|
size_t i;
|
|
int ret = -1;
|
|
virNetDevMcastList mcast;
|
|
filter->multicast.nTable = 0;
|
|
filter->multicast.table = NULL;
|
|
|
|
if (virNetDevGetMcastList(ifname, &mcast) < 0)
|
|
goto cleanup;
|
|
|
|
if (mcast.nentries > 0) {
|
|
if (VIR_ALLOC_N(filter->multicast.table, mcast.nentries) < 0)
|
|
goto cleanup;
|
|
|
|
for (i = 0; i < mcast.nentries; i++) {
|
|
virMacAddrSet(&filter->multicast.table[i],
|
|
&mcast.entries[i]->macaddr);
|
|
}
|
|
|
|
filter->multicast.nTable = mcast.nentries;
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
virNetDevMcastListClear(&mcast);
|
|
return ret;
|
|
}
|
|
|
|
|
|
virNetDevRxFilterPtr
|
|
virNetDevRxFilterNew(void)
|
|
{
|
|
virNetDevRxFilterPtr filter;
|
|
|
|
if (VIR_ALLOC(filter) < 0)
|
|
return NULL;
|
|
return filter;
|
|
}
|
|
|
|
|
|
void
|
|
virNetDevRxFilterFree(virNetDevRxFilterPtr filter)
|
|
{
|
|
if (filter) {
|
|
VIR_FREE(filter->name);
|
|
VIR_FREE(filter->unicast.table);
|
|
VIR_FREE(filter->multicast.table);
|
|
VIR_FREE(filter->vlan.table);
|
|
VIR_FREE(filter);
|
|
}
|
|
}
|
|
|
|
|
|
/**
|
|
* virNetDevGetRxFilter:
|
|
* This function supplies the RX filter list for a given device interface
|
|
*
|
|
* @ifname: Name of the interface
|
|
* @filter: The RX filter list
|
|
*
|
|
* Returns 0 or -1 on failure.
|
|
*/
|
|
int virNetDevGetRxFilter(const char *ifname,
|
|
virNetDevRxFilterPtr *filter)
|
|
{
|
|
int ret = -1;
|
|
bool receive = false;
|
|
virNetDevRxFilterPtr fil = virNetDevRxFilterNew();
|
|
|
|
if (!fil)
|
|
goto cleanup;
|
|
|
|
if (virNetDevGetMAC(ifname, &fil->mac))
|
|
goto cleanup;
|
|
|
|
if (virNetDevGetMulticastTable(ifname, fil))
|
|
goto cleanup;
|
|
|
|
if (virNetDevGetPromiscuous(ifname, &fil->promiscuous))
|
|
goto cleanup;
|
|
|
|
if (virNetDevGetRcvAllMulti(ifname, &receive))
|
|
goto cleanup;
|
|
|
|
if (receive) {
|
|
fil->multicast.mode = VIR_NETDEV_RX_FILTER_MODE_ALL;
|
|
} else {
|
|
if (virNetDevGetRcvMulti(ifname, &receive))
|
|
goto cleanup;
|
|
|
|
if (receive)
|
|
fil->multicast.mode = VIR_NETDEV_RX_FILTER_MODE_NORMAL;
|
|
else
|
|
fil->multicast.mode = VIR_NETDEV_RX_FILTER_MODE_NONE;
|
|
}
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
if (ret < 0) {
|
|
virNetDevRxFilterFree(fil);
|
|
fil = NULL;
|
|
}
|
|
|
|
*filter = fil;
|
|
return ret;
|
|
}
|
|
|
|
#if defined(SIOCETHTOOL) && defined(WITH_STRUCT_IFREQ)
|
|
|
|
/**
|
|
* virNetDevRDMAFeature
|
|
* This function checks for the availability of RDMA feature
|
|
* and add it to bitmap
|
|
*
|
|
* @ifname: name of the interface
|
|
* @out: add RDMA feature if exist to bitmap
|
|
*
|
|
* Returns 0 on success, -1 on failure.
|
|
*/
|
|
static int
|
|
virNetDevRDMAFeature(const char *ifname,
|
|
virBitmapPtr *out)
|
|
{
|
|
g_autofree char *eth_devpath = NULL;
|
|
g_autofree char *eth_res_buf = NULL;
|
|
DIR *dirp = NULL;
|
|
struct dirent *dp;
|
|
int ret = -1;
|
|
|
|
if (!virFileExists(SYSFS_INFINIBAND_DIR))
|
|
return 0;
|
|
|
|
if (virDirOpen(&dirp, SYSFS_INFINIBAND_DIR) < 0)
|
|
return -1;
|
|
|
|
eth_devpath = g_strdup_printf(SYSFS_NET_DIR "%s/device/resource", ifname);
|
|
|
|
/* If /sys/class/net/<ifname>/device/resource doesn't exist it is not a PCI
|
|
* device and therefore it will not have RDMA. */
|
|
if (!virFileExists(eth_devpath)) {
|
|
ret = 0;
|
|
goto cleanup;
|
|
}
|
|
|
|
if (virFileReadAll(eth_devpath, RESOURCE_FILE_LEN, ð_res_buf) < 0)
|
|
goto cleanup;
|
|
|
|
while (virDirRead(dirp, &dp, SYSFS_INFINIBAND_DIR) > 0) {
|
|
g_autofree char *ib_res_buf = NULL;
|
|
g_autofree char *ib_devpath = g_strdup_printf(SYSFS_INFINIBAND_DIR "%s/device/resource",
|
|
dp->d_name);
|
|
|
|
if (virFileReadAll(ib_devpath, RESOURCE_FILE_LEN, &ib_res_buf) > 0 &&
|
|
STREQ(eth_res_buf, ib_res_buf)) {
|
|
ignore_value(virBitmapSetBit(*out, VIR_NET_DEV_FEAT_RDMA));
|
|
break;
|
|
}
|
|
}
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
VIR_DIR_CLOSE(dirp);
|
|
return ret;
|
|
}
|
|
|
|
|
|
/**
|
|
* virNetDevSendEthtoolIoctl
|
|
* This function sends ethtool ioctl request
|
|
*
|
|
* @fd: socket to operate on
|
|
* @ifr: struct ifreq with the command
|
|
*
|
|
* Returns 0 on success, -1 on failure.
|
|
*/
|
|
static int
|
|
virNetDevSendEthtoolIoctl(int fd, struct ifreq *ifr)
|
|
{
|
|
int ret = -1;
|
|
|
|
ret = ioctl(fd, SIOCETHTOOL, ifr);
|
|
if (ret != 0) {
|
|
switch (errno) {
|
|
case EINVAL: /* kernel doesn't support SIOCETHTOOL */
|
|
VIR_DEBUG("ethtool ioctl: invalid request");
|
|
break;
|
|
case EOPNOTSUPP: /* kernel doesn't support specific feature */
|
|
VIR_DEBUG("ethtool ioctl: request not supported");
|
|
break;
|
|
default:
|
|
virReportSystemError(errno, "%s", _("ethtool ioctl error"));
|
|
break;
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
struct virNetDevEthtoolFeatureCmd {
|
|
const int cmd;
|
|
const virNetDevFeature feat;
|
|
};
|
|
|
|
|
|
/**
|
|
* virNetDevFeatureAvailable
|
|
* This function checks for the availability of a network device feature
|
|
*
|
|
* @fd: socket to operate on
|
|
* @ifr: struct ifreq with the command
|
|
* @cmd: reference to an ethtool command structure
|
|
*
|
|
* Returns true if the feature is available, false otherwise.
|
|
*/
|
|
static bool
|
|
virNetDevFeatureAvailable(int fd, struct ifreq *ifr, struct ethtool_value *cmd)
|
|
{
|
|
ifr->ifr_data = (void*)cmd;
|
|
if (virNetDevSendEthtoolIoctl(fd, ifr) == 0 &&
|
|
cmd->data > 0)
|
|
return true;
|
|
return false;
|
|
}
|
|
|
|
|
|
static void
|
|
virNetDevGetEthtoolFeatures(virBitmapPtr bitmap,
|
|
int fd,
|
|
struct ifreq *ifr)
|
|
{
|
|
size_t i;
|
|
struct ethtool_value cmd = { 0 };
|
|
|
|
/* legacy ethtool getters */
|
|
struct virNetDevEthtoolFeatureCmd ethtool_cmds[] = {
|
|
{ETHTOOL_GRXCSUM, VIR_NET_DEV_FEAT_GRXCSUM},
|
|
{ETHTOOL_GTXCSUM, VIR_NET_DEV_FEAT_GTXCSUM},
|
|
{ETHTOOL_GSG, VIR_NET_DEV_FEAT_GSG},
|
|
{ETHTOOL_GTSO, VIR_NET_DEV_FEAT_GTSO},
|
|
# if WITH_DECL_ETHTOOL_GGSO
|
|
{ETHTOOL_GGSO, VIR_NET_DEV_FEAT_GGSO},
|
|
# endif
|
|
# if WITH_DECL_ETHTOOL_GGRO
|
|
{ETHTOOL_GGRO, VIR_NET_DEV_FEAT_GGRO},
|
|
# endif
|
|
};
|
|
|
|
# if WITH_DECL_ETHTOOL_GFLAGS
|
|
/* ethtool masks */
|
|
struct virNetDevEthtoolFeatureCmd flags[] = {
|
|
# if WITH_DECL_ETH_FLAG_LRO
|
|
{ETH_FLAG_LRO, VIR_NET_DEV_FEAT_LRO},
|
|
# endif
|
|
# if WITH_DECL_ETH_FLAG_TXVLAN
|
|
{ETH_FLAG_RXVLAN, VIR_NET_DEV_FEAT_RXVLAN},
|
|
{ETH_FLAG_TXVLAN, VIR_NET_DEV_FEAT_TXVLAN},
|
|
# endif
|
|
# if WITH_DECL_ETH_FLAG_NTUBLE
|
|
{ETH_FLAG_NTUPLE, VIR_NET_DEV_FEAT_NTUPLE},
|
|
# endif
|
|
# if WITH_DECL_ETH_FLAG_RXHASH
|
|
{ETH_FLAG_RXHASH, VIR_NET_DEV_FEAT_RXHASH},
|
|
# endif
|
|
};
|
|
# endif
|
|
|
|
for (i = 0; i < G_N_ELEMENTS(ethtool_cmds); i++) {
|
|
cmd.cmd = ethtool_cmds[i].cmd;
|
|
if (virNetDevFeatureAvailable(fd, ifr, &cmd))
|
|
ignore_value(virBitmapSetBit(bitmap, ethtool_cmds[i].feat));
|
|
}
|
|
|
|
# if WITH_DECL_ETHTOOL_GFLAGS
|
|
cmd.cmd = ETHTOOL_GFLAGS;
|
|
if (virNetDevFeatureAvailable(fd, ifr, &cmd)) {
|
|
for (i = 0; i < G_N_ELEMENTS(flags); i++) {
|
|
if (cmd.data & flags[i].cmd)
|
|
ignore_value(virBitmapSetBit(bitmap, flags[i].feat));
|
|
}
|
|
}
|
|
# endif
|
|
}
|
|
|
|
|
|
# if WITH_DECL_DEVLINK_CMD_ESWITCH_GET
|
|
|
|
/**
|
|
* virNetDevGetFamilyId:
|
|
* This function supplies the devlink family id
|
|
*
|
|
* @family_name: the name of the family to query
|
|
* @family_id: family ID
|
|
*
|
|
* Returns: 0 if no family was found,
|
|
* 1 if family was found (@family_id is set),
|
|
* -1 otherwise
|
|
*/
|
|
static int
|
|
virNetDevGetFamilyId(const char *family_name,
|
|
uint32_t *family_id)
|
|
{
|
|
struct nl_msg *nl_msg = NULL;
|
|
g_autofree struct nlmsghdr *resp = NULL;
|
|
struct genlmsghdr gmsgh = {
|
|
.cmd = CTRL_CMD_GETFAMILY,
|
|
.version = DEVLINK_GENL_VERSION,
|
|
.reserved = 0,
|
|
};
|
|
struct nlattr *tb[CTRL_ATTR_MAX + 1] = {NULL, };
|
|
unsigned int recvbuflen;
|
|
int ret = -1;
|
|
|
|
if (!(nl_msg = nlmsg_alloc_simple(GENL_ID_CTRL,
|
|
NLM_F_REQUEST | NLM_F_ACK))) {
|
|
virReportOOMError();
|
|
goto cleanup;
|
|
}
|
|
|
|
if (nlmsg_append(nl_msg, &gmsgh, sizeof(gmsgh), NLMSG_ALIGNTO) < 0)
|
|
goto cleanup;
|
|
|
|
if (nla_put_string(nl_msg, CTRL_ATTR_FAMILY_NAME, family_name) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("allocated netlink buffer is too small"));
|
|
goto cleanup;
|
|
}
|
|
|
|
if (virNetlinkCommand(nl_msg, &resp, &recvbuflen, 0, 0, NETLINK_GENERIC, 0) < 0)
|
|
goto cleanup;
|
|
|
|
if (nlmsg_parse(resp, sizeof(struct nlmsghdr), tb, CTRL_ATTR_MAX, NULL) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("malformed netlink response message"));
|
|
goto cleanup;
|
|
}
|
|
|
|
if (tb[CTRL_ATTR_FAMILY_ID] == NULL) {
|
|
ret = 0;
|
|
goto cleanup;
|
|
}
|
|
|
|
*family_id = *(uint32_t *)RTA_DATA(tb[CTRL_ATTR_FAMILY_ID]);
|
|
ret = 1;
|
|
|
|
cleanup:
|
|
nlmsg_free(nl_msg);
|
|
return ret;
|
|
}
|
|
|
|
|
|
/**
|
|
* virNetDevSwitchdevFeature
|
|
* This function checks for the availability of Switchdev feature
|
|
* and add it to bitmap
|
|
*
|
|
* @ifname: name of the interface
|
|
* @out: add Switchdev feature if exist to bitmap
|
|
*
|
|
* Returns 0 on success, -1 on failure.
|
|
*/
|
|
static int
|
|
virNetDevSwitchdevFeature(const char *ifname,
|
|
virBitmapPtr *out)
|
|
{
|
|
struct nl_msg *nl_msg = NULL;
|
|
g_autofree struct nlmsghdr *resp = NULL;
|
|
unsigned int recvbuflen;
|
|
struct nlattr *tb[DEVLINK_ATTR_MAX + 1] = {NULL, };
|
|
g_autoptr(virPCIDevice) pci_device_ptr = NULL;
|
|
struct genlmsghdr gmsgh = {
|
|
.cmd = DEVLINK_CMD_ESWITCH_GET,
|
|
.version = DEVLINK_GENL_VERSION,
|
|
.reserved = 0,
|
|
};
|
|
const char *pci_name;
|
|
g_autofree char *pfname = NULL;
|
|
int is_vf = -1;
|
|
int ret = -1;
|
|
uint32_t family_id;
|
|
int rv;
|
|
|
|
if ((is_vf = virNetDevIsVirtualFunction(ifname)) < 0)
|
|
return ret;
|
|
|
|
if (is_vf == 1) {
|
|
/* Ignore error if PF does not have netdev assigned.
|
|
* In that case pfname == NULL. */
|
|
if (virNetDevGetPhysicalFunction(ifname, &pfname) < 0)
|
|
virResetLastError();
|
|
}
|
|
|
|
pci_device_ptr = pfname ? virNetDevGetPCIDevice(pfname) :
|
|
virNetDevGetPCIDevice(ifname);
|
|
/* No PCI device, then no feature bit to check/add */
|
|
if (pci_device_ptr == NULL)
|
|
return 0;
|
|
|
|
if ((rv = virNetDevGetFamilyId(DEVLINK_GENL_NAME, &family_id)) <= 0)
|
|
return rv;
|
|
|
|
if (!(nl_msg = nlmsg_alloc_simple(family_id,
|
|
NLM_F_REQUEST | NLM_F_ACK))) {
|
|
virReportOOMError();
|
|
goto cleanup;
|
|
}
|
|
|
|
if (nlmsg_append(nl_msg, &gmsgh, sizeof(gmsgh), NLMSG_ALIGNTO) < 0)
|
|
goto cleanup;
|
|
|
|
pci_name = virPCIDeviceGetName(pci_device_ptr);
|
|
|
|
if (nla_put(nl_msg, DEVLINK_ATTR_BUS_NAME, strlen("pci")+1, "pci") < 0 ||
|
|
nla_put(nl_msg, DEVLINK_ATTR_DEV_NAME, strlen(pci_name)+1, pci_name) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("allocated netlink buffer is too small"));
|
|
goto cleanup;
|
|
}
|
|
|
|
if (virNetlinkCommand(nl_msg, &resp, &recvbuflen, 0, 0, NETLINK_GENERIC, 0) < 0)
|
|
goto cleanup;
|
|
|
|
if (nlmsg_parse(resp, sizeof(struct genlmsghdr), tb, DEVLINK_ATTR_MAX, NULL) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("malformed netlink response message"));
|
|
goto cleanup;
|
|
}
|
|
|
|
if (tb[DEVLINK_ATTR_ESWITCH_MODE] &&
|
|
*(int *)RTA_DATA(tb[DEVLINK_ATTR_ESWITCH_MODE]) == DEVLINK_ESWITCH_MODE_SWITCHDEV) {
|
|
ignore_value(virBitmapSetBit(*out, VIR_NET_DEV_FEAT_SWITCHDEV));
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
nlmsg_free(nl_msg);
|
|
return ret;
|
|
}
|
|
# else
|
|
static int
|
|
virNetDevSwitchdevFeature(const char *ifname G_GNUC_UNUSED,
|
|
virBitmapPtr *out G_GNUC_UNUSED)
|
|
{
|
|
return 0;
|
|
}
|
|
# endif
|
|
|
|
|
|
# if WITH_DECL_ETHTOOL_GFEATURES
|
|
/**
|
|
* virNetDevGFeatureAvailable
|
|
* This function checks for the availability of a network device gfeature
|
|
*
|
|
* @fd: socket to operate on
|
|
* @ifr: struct ifreq with the command
|
|
* @cmd: reference to an ethtool command structure
|
|
*
|
|
* Returns true if the feature is available, false otherwise.
|
|
*/
|
|
static bool
|
|
virNetDevGFeatureAvailable(int fd,
|
|
struct ifreq *ifr,
|
|
struct ethtool_gfeatures *cmd)
|
|
{
|
|
ifr->ifr_data = (void*)cmd;
|
|
if (virNetDevSendEthtoolIoctl(fd, ifr) == 0)
|
|
return !!FEATURE_BIT_IS_SET(cmd->features, TX_UDP_TNL, active);
|
|
return false;
|
|
}
|
|
|
|
|
|
static int
|
|
virNetDevGetEthtoolGFeatures(virBitmapPtr bitmap,
|
|
int fd,
|
|
struct ifreq *ifr)
|
|
{
|
|
g_autofree struct ethtool_gfeatures *g_cmd = NULL;
|
|
|
|
if (VIR_ALLOC_VAR(g_cmd,
|
|
struct ethtool_get_features_block, GFEATURES_SIZE) < 0)
|
|
return -1;
|
|
|
|
g_cmd->cmd = ETHTOOL_GFEATURES;
|
|
g_cmd->size = GFEATURES_SIZE;
|
|
if (virNetDevGFeatureAvailable(fd, ifr, g_cmd))
|
|
ignore_value(virBitmapSetBit(bitmap, VIR_NET_DEV_FEAT_TXUDPTNL));
|
|
return 0;
|
|
}
|
|
# else
|
|
static int
|
|
virNetDevGetEthtoolGFeatures(virBitmapPtr bitmap G_GNUC_UNUSED,
|
|
int fd G_GNUC_UNUSED,
|
|
struct ifreq *ifr G_GNUC_UNUSED)
|
|
{
|
|
return 0;
|
|
}
|
|
# endif
|
|
|
|
|
|
# if WITH_DECL_ETHTOOL_SCOALESCE && WITH_DECL_ETHTOOL_GCOALESCE
|
|
/**
|
|
* virNetDevSetCoalesce:
|
|
* @ifname: interface name to modify
|
|
* @coalesce: Coalesce settings to set or update
|
|
* @update: Whether this is an update for existing settings or not
|
|
*
|
|
* This function sets the various coalesce settings for a given interface
|
|
* @ifname and updates them back into @coalesce.
|
|
*
|
|
* Returns 0 in case of success or -1 on failure
|
|
*/
|
|
int virNetDevSetCoalesce(const char *ifname,
|
|
virNetDevCoalescePtr coalesce,
|
|
bool update)
|
|
{
|
|
struct ifreq ifr;
|
|
struct ethtool_coalesce coal = {0};
|
|
VIR_AUTOCLOSE fd = -1;
|
|
|
|
if (!coalesce && !update)
|
|
return 0;
|
|
|
|
if (coalesce) {
|
|
coal = (struct ethtool_coalesce) {
|
|
.rx_max_coalesced_frames = coalesce->rx_max_coalesced_frames,
|
|
.rx_coalesce_usecs_irq = coalesce->rx_coalesce_usecs_irq,
|
|
.rx_max_coalesced_frames_irq = coalesce->rx_max_coalesced_frames_irq,
|
|
.tx_coalesce_usecs = coalesce->tx_coalesce_usecs,
|
|
.tx_max_coalesced_frames = coalesce->tx_max_coalesced_frames,
|
|
.tx_coalesce_usecs_irq = coalesce->tx_coalesce_usecs_irq,
|
|
.tx_max_coalesced_frames_irq = coalesce->tx_max_coalesced_frames_irq,
|
|
.stats_block_coalesce_usecs = coalesce->stats_block_coalesce_usecs,
|
|
.use_adaptive_rx_coalesce = coalesce->use_adaptive_rx_coalesce,
|
|
.use_adaptive_tx_coalesce = coalesce->use_adaptive_tx_coalesce,
|
|
.pkt_rate_low = coalesce->pkt_rate_low,
|
|
.rx_coalesce_usecs_low = coalesce->rx_coalesce_usecs_low,
|
|
.rx_max_coalesced_frames_low = coalesce->rx_max_coalesced_frames_low,
|
|
.tx_coalesce_usecs_low = coalesce->tx_coalesce_usecs_low,
|
|
.tx_max_coalesced_frames_low = coalesce->tx_max_coalesced_frames_low,
|
|
.pkt_rate_high = coalesce->pkt_rate_high,
|
|
.rx_coalesce_usecs_high = coalesce->rx_coalesce_usecs_high,
|
|
.rx_max_coalesced_frames_high = coalesce->rx_max_coalesced_frames_high,
|
|
.tx_coalesce_usecs_high = coalesce->tx_coalesce_usecs_high,
|
|
.tx_max_coalesced_frames_high = coalesce->tx_max_coalesced_frames_high,
|
|
.rate_sample_interval = coalesce->rate_sample_interval,
|
|
};
|
|
}
|
|
|
|
coal.cmd = ETHTOOL_SCOALESCE;
|
|
|
|
if ((fd = virNetDevSetupControl(ifname, &ifr)) < 0)
|
|
return -1;
|
|
|
|
ifr.ifr_data = (void *) &coal;
|
|
|
|
if (virNetDevSendEthtoolIoctl(fd, &ifr) < 0) {
|
|
virReportSystemError(errno,
|
|
_("Cannot set coalesce info on '%s'"),
|
|
ifname);
|
|
return -1;
|
|
}
|
|
|
|
if (coalesce) {
|
|
coal = (struct ethtool_coalesce) {
|
|
.cmd = ETHTOOL_GCOALESCE,
|
|
};
|
|
|
|
/* Don't fail if the update itself fails */
|
|
if (virNetDevSendEthtoolIoctl(fd, &ifr) == 0) {
|
|
coalesce->rx_max_coalesced_frames = coal.rx_max_coalesced_frames;
|
|
coalesce->rx_coalesce_usecs_irq = coal.rx_coalesce_usecs_irq;
|
|
coalesce->rx_max_coalesced_frames_irq = coal.rx_max_coalesced_frames_irq;
|
|
coalesce->tx_coalesce_usecs = coal.tx_coalesce_usecs;
|
|
coalesce->tx_max_coalesced_frames = coal.tx_max_coalesced_frames;
|
|
coalesce->tx_coalesce_usecs_irq = coal.tx_coalesce_usecs_irq;
|
|
coalesce->tx_max_coalesced_frames_irq = coal.tx_max_coalesced_frames_irq;
|
|
coalesce->stats_block_coalesce_usecs = coal.stats_block_coalesce_usecs;
|
|
coalesce->use_adaptive_rx_coalesce = coal.use_adaptive_rx_coalesce;
|
|
coalesce->use_adaptive_tx_coalesce = coal.use_adaptive_tx_coalesce;
|
|
coalesce->pkt_rate_low = coal.pkt_rate_low;
|
|
coalesce->rx_coalesce_usecs_low = coal.rx_coalesce_usecs_low;
|
|
coalesce->rx_max_coalesced_frames_low = coal.rx_max_coalesced_frames_low;
|
|
coalesce->tx_coalesce_usecs_low = coal.tx_coalesce_usecs_low;
|
|
coalesce->tx_max_coalesced_frames_low = coal.tx_max_coalesced_frames_low;
|
|
coalesce->pkt_rate_high = coal.pkt_rate_high;
|
|
coalesce->rx_coalesce_usecs_high = coal.rx_coalesce_usecs_high;
|
|
coalesce->rx_max_coalesced_frames_high = coal.rx_max_coalesced_frames_high;
|
|
coalesce->tx_coalesce_usecs_high = coal.tx_coalesce_usecs_high;
|
|
coalesce->tx_max_coalesced_frames_high = coal.tx_max_coalesced_frames_high;
|
|
coalesce->rate_sample_interval = coal.rate_sample_interval;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
# else
|
|
int virNetDevSetCoalesce(const char *ifname,
|
|
virNetDevCoalescePtr coalesce,
|
|
bool update)
|
|
{
|
|
if (!coalesce && !update)
|
|
return 0;
|
|
|
|
virReportSystemError(ENOSYS,
|
|
_("Cannot set coalesce info on interface '%s'"),
|
|
ifname);
|
|
return -1;
|
|
}
|
|
# endif
|
|
|
|
|
|
/**
|
|
* virNetDevGetFeatures:
|
|
* This function gets the nic offloads features available for ifname
|
|
*
|
|
* @ifname: name of the interface
|
|
* @out: bitmap of the available virNetDevFeature feature bits
|
|
*
|
|
* Returns 0 on success or if called from session mode, -1 on failure.
|
|
* If called from session mode, an empty bitmap is returned.
|
|
*/
|
|
int
|
|
virNetDevGetFeatures(const char *ifname,
|
|
virBitmapPtr *out)
|
|
{
|
|
struct ifreq ifr;
|
|
VIR_AUTOCLOSE fd = -1;
|
|
|
|
if (!(*out = virBitmapNew(VIR_NET_DEV_FEAT_LAST)))
|
|
return -1;
|
|
|
|
if ((fd = virNetDevSetupControl(ifname, &ifr)) < 0)
|
|
return -1;
|
|
|
|
virNetDevGetEthtoolFeatures(*out, fd, &ifr);
|
|
|
|
if (virNetDevGetEthtoolGFeatures(*out, fd, &ifr) < 0)
|
|
return -1;
|
|
|
|
if (virNetDevRDMAFeature(ifname, out) < 0)
|
|
return -1;
|
|
|
|
if (virNetDevSwitchdevFeature(ifname, out) < 0)
|
|
return -1;
|
|
|
|
return 0;
|
|
}
|
|
#else
|
|
int
|
|
virNetDevGetFeatures(const char *ifname G_GNUC_UNUSED,
|
|
virBitmapPtr *out G_GNUC_UNUSED)
|
|
{
|
|
VIR_DEBUG("Getting network device features on %s is not implemented on this platform",
|
|
ifname);
|
|
return 0;
|
|
}
|
|
|
|
int virNetDevSetCoalesce(const char *ifname,
|
|
virNetDevCoalescePtr coalesce,
|
|
bool update)
|
|
{
|
|
if (!coalesce && !update)
|
|
return 0;
|
|
|
|
virReportSystemError(ENOSYS,
|
|
_("Cannot set coalesce info on interface '%s'"),
|
|
ifname);
|
|
return -1;
|
|
}
|
|
#endif
|
|
|
|
|
|
/**
|
|
* virNetDevRunEthernetScript:
|
|
* @ifname: the interface name
|
|
* @script: the script name
|
|
*
|
|
* This function executes script for new tap device created by libvirt.
|
|
* Returns 0 in case of success or -1 on failure
|
|
*/
|
|
int
|
|
virNetDevRunEthernetScript(const char *ifname, const char *script)
|
|
{
|
|
g_autoptr(virCommand) cmd = NULL;
|
|
|
|
/* Not a bug! Previously we did accept script="" as a NO-OP. */
|
|
if (STREQ(script, ""))
|
|
return 0;
|
|
|
|
cmd = virCommandNew(script);
|
|
virCommandAddArgFormat(cmd, "%s", ifname);
|
|
virCommandClearCaps(cmd);
|
|
#ifdef CAP_NET_ADMIN
|
|
virCommandAllowCap(cmd, CAP_NET_ADMIN);
|
|
#endif
|
|
virCommandAddEnvPassCommon(cmd);
|
|
|
|
return virCommandRun(cmd, NULL);
|
|
}
|