qemu_conf.c 61.4 KB
Newer Older
D
Daniel P. Berrange 已提交
1
/*
2
 * qemu_conf.c: QEMU configuration management
D
Daniel P. Berrange 已提交
3
 *
4
 * Copyright (C) 2006-2014 Red Hat, Inc.
D
Daniel P. Berrange 已提交
5 6 7 8 9 10 11 12 13 14 15 16 17
 * Copyright (C) 2006 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
18
 * License along with this library.  If not, see
O
Osier Yang 已提交
19
 * <http://www.gnu.org/licenses/>.
D
Daniel P. Berrange 已提交
20 21
 */

22
#include <config.h>
23

D
Daniel P. Berrange 已提交
24 25 26 27 28
#include <sys/types.h>
#include <sys/stat.h>
#include <unistd.h>
#include <fcntl.h>

29
#include "virerror.h"
30
#include "qemu_conf.h"
31
#include "qemu_capabilities.h"
32
#include "qemu_domain.h"
33
#include "qemu_firmware.h"
34
#include "qemu_security.h"
35
#include "viruuid.h"
36
#include "virbuffer.h"
37
#include "virconf.h"
38
#include "viralloc.h"
39
#include "datatypes.h"
40
#include "virxml.h"
41
#include "virlog.h"
42
#include "cpu/cpu.h"
43
#include "domain_nwfilter.h"
E
Eric Blake 已提交
44
#include "virfile.h"
45
#include "virsocket.h"
46
#include "virstring.h"
47
#include "storage_conf.h"
J
Ján Tomko 已提交
48
#include "virutil.h"
49
#include "configmake.h"
50

51 52
#define VIR_FROM_THIS VIR_FROM_QEMU

53 54
VIR_LOG_INIT("qemu.qemu_conf");

55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70
/* These are only defaults, they can be changed now in qemu.conf and
 * explicitly specified port is checked against these two (makes
 * sense to limit the values).
 *
 * This limitation is mentioned in qemu.conf, so bear in mind that the
 * configuration file should reflect any changes made to these values.
 */
#define QEMU_REMOTE_PORT_MIN 5900
#define QEMU_REMOTE_PORT_MAX 65535

#define QEMU_WEBSOCKET_PORT_MIN 5700
#define QEMU_WEBSOCKET_PORT_MAX 65535

#define QEMU_MIGRATION_PORT_MIN 49152
#define QEMU_MIGRATION_PORT_MAX 49215

71 72 73 74 75
static virClassPtr virQEMUDriverConfigClass;
static void virQEMUDriverConfigDispose(void *obj);

static int virQEMUConfigOnceInit(void)
{
76
    if (!VIR_CLASS_NEW(virQEMUDriverConfig, virClassForObject()))
77
        return -1;
78 79

    return 0;
80 81
}

82
VIR_ONCE_GLOBAL_INIT(virQEMUConfig);
83 84


85 86
static void
qemuDriverLock(virQEMUDriverPtr driver)
87 88 89
{
    virMutexLock(&driver->lock);
}
90 91
static void
qemuDriverUnlock(virQEMUDriverPtr driver)
92 93 94 95
{
    virMutexUnlock(&driver->lock);
}

96 97 98 99
#ifndef DEFAULT_LOADER_NVRAM
# define DEFAULT_LOADER_NVRAM \
    "/usr/share/OVMF/OVMF_CODE.fd:/usr/share/OVMF/OVMF_VARS.fd:" \
    "/usr/share/OVMF/OVMF_CODE.secboot.fd:/usr/share/OVMF/OVMF_VARS.fd:" \
100 101
    "/usr/share/AAVMF/AAVMF_CODE.fd:/usr/share/AAVMF/AAVMF_VARS.fd:" \
    "/usr/share/AAVMF/AAVMF32_CODE.fd:/usr/share/AAVMF/AAVMF32_VARS.fd"
102 103
#endif

104

105 106
virQEMUDriverConfigPtr virQEMUDriverConfigNew(bool privileged,
                                              const char *root)
107
{
108
    g_autoptr(virQEMUDriverConfig) cfg = NULL;
109 110 111 112 113 114 115

    if (virQEMUConfigInitialize() < 0)
        return NULL;

    if (!(cfg = virObjectNew(virQEMUDriverConfigClass)))
        return NULL;

116 117
    if (root) {
        cfg->uri = g_strdup_printf("qemu:///embed?root=%s", root);
118
        cfg->root = g_strdup(root);
119 120 121
    } else {
        cfg->uri = g_strdup(privileged ? "qemu:///system" : "qemu:///session");
    }
122 123 124

    if (privileged) {
        if (virGetUserID(QEMU_USER, &cfg->user) < 0)
125
            return NULL;
126
        if (virGetGroupID(QEMU_GROUP, &cfg->group) < 0)
127
            return NULL;
128
    } else {
129 130
        cfg->user = (uid_t)-1;
        cfg->group = (gid_t)-1;
131 132
    }
    cfg->dynamicOwnership = privileged;
133
    cfg->rememberOwner = privileged;
134

135
    cfg->cgroupControllers = -1; /* -1 == auto-detect */
136

137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154
    if (root != NULL) {
        cfg->logDir = g_strdup_printf("%s/log/qemu", root);
        cfg->swtpmLogDir = g_strdup_printf("%s/log/swtpm", root);
        cfg->configBaseDir = g_strdup_printf("%s/etc", root);
        cfg->stateDir = g_strdup_printf("%s/run/qemu", root);
        cfg->swtpmStateDir = g_strdup_printf("%s/run/swtpm", root);
        cfg->cacheDir = g_strdup_printf("%s/cache/qemu", root);
        cfg->libDir = g_strdup_printf("%s/lib/qemu", root);
        cfg->swtpmStorageDir = g_strdup_printf("%s/lib/swtpm", root);

        cfg->saveDir = g_strdup_printf("%s/save", cfg->libDir);
        cfg->snapshotDir = g_strdup_printf("%s/snapshot", cfg->libDir);
        cfg->checkpointDir = g_strdup_printf("%s/checkpoint", cfg->libDir);
        cfg->autoDumpPath = g_strdup_printf("%s/dump", cfg->libDir);
        cfg->channelTargetDir = g_strdup_printf("%s/channel/target", cfg->libDir);
        cfg->nvramDir = g_strdup_printf("%s/nvram", cfg->libDir);
        cfg->memoryBackingDir = g_strdup_printf("%s/ram", cfg->libDir);
    } else if (privileged) {
155
        cfg->logDir = g_strdup_printf("%s/log/libvirt/qemu", LOCALSTATEDIR);
156

157 158
        cfg->swtpmLogDir = g_strdup_printf("%s/log/swtpm/libvirt/qemu",
                                           LOCALSTATEDIR);
159

160
        cfg->configBaseDir = g_strdup(SYSCONFDIR "/libvirt");
D
Daniel P. Berrange 已提交
161

162
        cfg->stateDir = g_strdup_printf("%s/libvirt/qemu", RUNSTATEDIR);
163

164
        cfg->swtpmStateDir = g_strdup_printf("%s/libvirt/qemu/swtpm", RUNSTATEDIR);
165

166
        cfg->cacheDir = g_strdup_printf("%s/cache/libvirt/qemu", LOCALSTATEDIR);
167

168 169 170 171 172 173 174 175 176 177
        cfg->libDir = g_strdup_printf("%s/lib/libvirt/qemu", LOCALSTATEDIR);
        cfg->saveDir = g_strdup_printf("%s/save", cfg->libDir);
        cfg->snapshotDir = g_strdup_printf("%s/snapshot", cfg->libDir);
        cfg->checkpointDir = g_strdup_printf("%s/checkpoint", cfg->libDir);
        cfg->autoDumpPath = g_strdup_printf("%s/dump", cfg->libDir);
        cfg->channelTargetDir = g_strdup_printf("%s/channel/target", cfg->libDir);
        cfg->nvramDir = g_strdup_printf("%s/nvram", cfg->libDir);
        cfg->memoryBackingDir = g_strdup_printf("%s/ram", cfg->libDir);
        cfg->swtpmStorageDir = g_strdup_printf("%s/lib/libvirt/swtpm",
                                               LOCALSTATEDIR);
M
Martin Kletzander 已提交
178
        if (!virDoesUserExist("tss") ||
179
            virGetUserID("tss", &cfg->swtpm_user) < 0)
180
            cfg->swtpm_user = 0; /* fall back to root */
M
Martin Kletzander 已提交
181
        if (!virDoesGroupExist("tss") ||
182
            virGetGroupID("tss", &cfg->swtpm_group) < 0)
183
            cfg->swtpm_group = 0; /* fall back to root */
184
    } else {
185 186
        g_autofree char *rundir = NULL;
        g_autofree char *cachedir = NULL;
187 188 189

        cachedir = virGetUserCacheDirectory();

190 191 192
        cfg->logDir = g_strdup_printf("%s/qemu/log", cachedir);
        cfg->swtpmLogDir = g_strdup_printf("%s/qemu/log", cachedir);
        cfg->cacheDir = g_strdup_printf("%s/qemu/cache", cachedir);
193

194
        rundir = virGetUserRuntimeDirectory();
195
        cfg->stateDir = g_strdup_printf("%s/qemu/run", rundir);
196

197
        cfg->swtpmStateDir = g_strdup_printf("%s/swtpm", cfg->stateDir);
198

199
        cfg->configBaseDir = virGetUserConfigDirectory();
200

201 202 203 204 205 206 207 208 209 210 211 212
        cfg->libDir = g_strdup_printf("%s/qemu/lib", cfg->configBaseDir);
        cfg->saveDir = g_strdup_printf("%s/qemu/save", cfg->configBaseDir);
        cfg->snapshotDir = g_strdup_printf("%s/qemu/snapshot", cfg->configBaseDir);
        cfg->checkpointDir = g_strdup_printf("%s/qemu/checkpoint",
                                             cfg->configBaseDir);
        cfg->autoDumpPath = g_strdup_printf("%s/qemu/dump", cfg->configBaseDir);
        cfg->channelTargetDir = g_strdup_printf("%s/qemu/channel/target",
                                                cfg->configBaseDir);
        cfg->nvramDir = g_strdup_printf("%s/qemu/nvram", cfg->configBaseDir);
        cfg->memoryBackingDir = g_strdup_printf("%s/qemu/ram", cfg->configBaseDir);
        cfg->swtpmStorageDir = g_strdup_printf("%s/qemu/swtpm",
                                               cfg->configBaseDir);
213 214 215 216 217 218 219 220 221 222
    }

    if (privileged) {
        if (!virDoesUserExist("tss") ||
            virGetUserID("tss", &cfg->swtpm_user) < 0)
            cfg->swtpm_user = 0; /* fall back to root */
        if (!virDoesGroupExist("tss") ||
            virGetGroupID("tss", &cfg->swtpm_group) < 0)
            cfg->swtpm_group = 0; /* fall back to root */
    } else {
223 224
        cfg->swtpm_user = (uid_t)-1;
        cfg->swtpm_group = (gid_t)-1;
225 226
    }

227 228 229
    cfg->configDir = g_strdup_printf("%s/qemu", cfg->configBaseDir);
    cfg->autostartDir = g_strdup_printf("%s/qemu/autostart", cfg->configBaseDir);
    cfg->slirpStateDir = g_strdup_printf("%s/slirp", cfg->stateDir);
M
Marc-André Lureau 已提交
230
    cfg->dbusStateDir = g_strdup_printf("%s/dbus", cfg->stateDir);
231

232 233 234 235
    /* Set the default directory to find TLS X.509 certificates.
     * This will then be used as a fallback if the service specific
     * directory doesn't exist (although we don't check if this exists).
     */
236 237 238 239 240
    if (root == NULL) {
        cfg->defaultTLSx509certdir = g_strdup(SYSCONFDIR "pki/qemu");
    } else {
        cfg->defaultTLSx509certdir = g_strdup_printf("%s/etc/pki/qemu", root);
    }
241

242 243
    cfg->vncListen = g_strdup(VIR_LOOPBACK_IPV4_ADDR);
    cfg->spiceListen = g_strdup(VIR_LOOPBACK_IPV4_ADDR);
244 245 246 247

    cfg->remotePortMin = QEMU_REMOTE_PORT_MIN;
    cfg->remotePortMax = QEMU_REMOTE_PORT_MAX;

248 249 250
    cfg->webSocketPortMin = QEMU_WEBSOCKET_PORT_MIN;
    cfg->webSocketPortMax = QEMU_WEBSOCKET_PORT_MAX;

251 252 253
    cfg->migrationPortMin = QEMU_MIGRATION_PORT_MIN;
    cfg->migrationPortMax = QEMU_MIGRATION_PORT_MAX;

254
    /* For privileged driver, try and find hugetlbfs mounts automatically.
255
     * Non-privileged driver requires admin to create a dir for the
256
     * user, chown it, and then let user configure it manually. */
257
    if (privileged &&
258 259
        virFileFindHugeTLBFS(&cfg->hugetlbfs, &cfg->nhugetlbfs) < 0) {
        /* This however is not implemented on all platforms. */
260
        if (virGetLastErrorCode() != VIR_ERR_NO_SUPPORT)
261
            return NULL;
262
    }
263

264 265 266
    cfg->bridgeHelperName = g_strdup(QEMU_BRIDGE_HELPER);
    cfg->prHelperName = g_strdup(QEMU_PR_HELPER);
    cfg->slirpHelperName = g_strdup(QEMU_SLIRP_HELPER);
267
    cfg->dbusDaemonName = g_strdup(QEMU_DBUS_DAEMON);
268

269 270 271 272 273 274 275
    cfg->securityDefaultConfined = true;
    cfg->securityRequireConfined = false;

    cfg->keepAliveInterval = 5;
    cfg->keepAliveCount = 5;
    cfg->seccompSandbox = -1;

276
    cfg->logTimestamp = true;
277
    cfg->glusterDebugLevel = 4;
278
    cfg->stdioLogD = true;
279

280
    if (!(cfg->namespaces = virBitmapNew(QEMU_DOMAIN_NS_LAST)))
281
        return NULL;
282

283
    if (privileged &&
284
        qemuDomainNamespaceAvailable(QEMU_DOMAIN_NS_MOUNT) &&
285
        virBitmapSetBit(cfg->namespaces, QEMU_DOMAIN_NS_MOUNT) < 0)
286
        return NULL;
287

288 289 290
    if (virFirmwareParseList(DEFAULT_LOADER_NVRAM,
                             &cfg->firmwares,
                             &cfg->nfirmwares) < 0)
291
        return NULL;
292

J
Ján Tomko 已提交
293
    return g_steal_pointer(&cfg);
294 295 296 297 298 299 300
}


static void virQEMUDriverConfigDispose(void *obj)
{
    virQEMUDriverConfigPtr cfg = obj;

301
    virBitmapFree(cfg->namespaces);
302

303
    virStringListFree(cfg->cgroupDeviceACL);
304
    VIR_FREE(cfg->uri);
305
    VIR_FREE(cfg->root);
306 307 308 309 310

    VIR_FREE(cfg->configBaseDir);
    VIR_FREE(cfg->configDir);
    VIR_FREE(cfg->autostartDir);
    VIR_FREE(cfg->logDir);
311
    VIR_FREE(cfg->swtpmLogDir);
312
    VIR_FREE(cfg->stateDir);
313
    VIR_FREE(cfg->swtpmStateDir);
314
    VIR_FREE(cfg->slirpStateDir);
M
Marc-André Lureau 已提交
315
    VIR_FREE(cfg->dbusStateDir);
316 317 318 319 320

    VIR_FREE(cfg->libDir);
    VIR_FREE(cfg->cacheDir);
    VIR_FREE(cfg->saveDir);
    VIR_FREE(cfg->snapshotDir);
321
    VIR_FREE(cfg->checkpointDir);
322
    VIR_FREE(cfg->channelTargetDir);
323
    VIR_FREE(cfg->nvramDir);
324

325
    VIR_FREE(cfg->defaultTLSx509certdir);
326
    VIR_FREE(cfg->defaultTLSx509secretUUID);
327

328
    VIR_FREE(cfg->vncTLSx509certdir);
329
    VIR_FREE(cfg->vncTLSx509secretUUID);
330 331 332 333 334 335 336
    VIR_FREE(cfg->vncListen);
    VIR_FREE(cfg->vncPassword);
    VIR_FREE(cfg->vncSASLdir);

    VIR_FREE(cfg->spiceTLSx509certdir);
    VIR_FREE(cfg->spiceListen);
    VIR_FREE(cfg->spicePassword);
337
    VIR_FREE(cfg->spiceSASLdir);
338

339
    VIR_FREE(cfg->chardevTLSx509certdir);
340
    VIR_FREE(cfg->chardevTLSx509secretUUID);
341

342
    VIR_FREE(cfg->vxhsTLSx509certdir);
343
    VIR_FREE(cfg->nbdTLSx509certdir);
344

345 346 347
    VIR_FREE(cfg->migrateTLSx509certdir);
    VIR_FREE(cfg->migrateTLSx509secretUUID);

348 349 350 351 352
    while (cfg->nhugetlbfs) {
        cfg->nhugetlbfs--;
        VIR_FREE(cfg->hugetlbfs[cfg->nhugetlbfs].mnt_dir);
    }
    VIR_FREE(cfg->hugetlbfs);
353
    VIR_FREE(cfg->bridgeHelperName);
354
    VIR_FREE(cfg->prHelperName);
355
    VIR_FREE(cfg->slirpHelperName);
356
    VIR_FREE(cfg->dbusDaemonName);
357 358 359

    VIR_FREE(cfg->saveImageFormat);
    VIR_FREE(cfg->dumpImageFormat);
360
    VIR_FREE(cfg->snapshotImageFormat);
361 362
    VIR_FREE(cfg->autoDumpPath);

363
    virStringListFree(cfg->securityDriverNames);
364 365

    VIR_FREE(cfg->lockManagerName);
366

367
    virFirmwareFreeList(cfg->firmwares, cfg->nfirmwares);
368 369

    VIR_FREE(cfg->memoryBackingDir);
370
    VIR_FREE(cfg->swtpmStorageDir);
371 372

    virStringListFree(cfg->capabilityfilters);
373 374
}

375

376 377 378 379 380
static int
virQEMUDriverConfigHugeTLBFSInit(virHugeTLBFSPtr hugetlbfs,
                                 const char *path,
                                 bool deflt)
{
381 382
    hugetlbfs->mnt_dir = g_strdup(path);
    if (virFileGetHugepageSize(path, &hugetlbfs->size) < 0)
383
        return -1;
384 385

    hugetlbfs->deflt = deflt;
386
    return 0;
387 388 389
}


390 391 392 393 394 395 396 397
static int
virQEMUDriverConfigLoadDefaultTLSEntry(virQEMUDriverConfigPtr cfg,
                                       virConfPtr conf)
{
    int rv;

    if ((rv = virConfGetValueString(conf, "default_tls_x509_cert_dir", &cfg->defaultTLSx509certdir)) < 0)
        return -1;
398
    cfg->defaultTLSx509certdirPresent = (rv == 1);
399 400 401 402 403 404 405 406 407 408
    if (virConfGetValueBool(conf, "default_tls_x509_verify", &cfg->defaultTLSx509verify) < 0)
        return -1;
    if (virConfGetValueString(conf, "default_tls_x509_secret_uuid",
                              &cfg->defaultTLSx509secretUUID) < 0)
        return -1;

    return 0;
}


409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424
static int
virQEMUDriverConfigLoadVNCEntry(virQEMUDriverConfigPtr cfg,
                                virConfPtr conf)
{
    int rv;

    if (virConfGetValueBool(conf, "vnc_auto_unix_socket", &cfg->vncAutoUnixSocket) < 0)
        return -1;
    if (virConfGetValueBool(conf, "vnc_tls", &cfg->vncTLS) < 0)
        return -1;
    if ((rv = virConfGetValueBool(conf, "vnc_tls_x509_verify", &cfg->vncTLSx509verify)) < 0)
        return -1;
    if (rv == 1)
        cfg->vncTLSx509verifyPresent = true;
    if (virConfGetValueString(conf, "vnc_tls_x509_cert_dir", &cfg->vncTLSx509certdir) < 0)
        return -1;
425 426
    if (virConfGetValueString(conf, "vnc_tls_x509_secret_uuid", &cfg->vncTLSx509secretUUID) < 0)
        return -1;
427 428 429 430 431 432 433 434 435 436 437 438 439 440 441
    if (virConfGetValueString(conf, "vnc_listen", &cfg->vncListen) < 0)
        return -1;
    if (virConfGetValueString(conf, "vnc_password", &cfg->vncPassword) < 0)
        return -1;
    if (virConfGetValueBool(conf, "vnc_sasl", &cfg->vncSASL) < 0)
        return -1;
    if (virConfGetValueString(conf, "vnc_sasl_dir", &cfg->vncSASLdir) < 0)
        return -1;
    if (virConfGetValueBool(conf, "vnc_allow_host_audio", &cfg->vncAllowHostAudio) < 0)
        return -1;

    return 0;
}


442 443 444 445 446 447 448 449
static int
virQEMUDriverConfigLoadNographicsEntry(virQEMUDriverConfigPtr cfg,
                                       virConfPtr conf)
{
    return virConfGetValueBool(conf, "nographics_allow_host_audio", &cfg->nogfxAllowHostAudio);
}


450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472
static int
virQEMUDriverConfigLoadSPICEEntry(virQEMUDriverConfigPtr cfg,
                                  virConfPtr conf)
{
    if (virConfGetValueBool(conf, "spice_tls", &cfg->spiceTLS) < 0)
        return -1;
    if (virConfGetValueString(conf, "spice_tls_x509_cert_dir", &cfg->spiceTLSx509certdir) < 0)
        return -1;
    if (virConfGetValueBool(conf, "spice_sasl", &cfg->spiceSASL) < 0)
        return -1;
    if (virConfGetValueString(conf, "spice_sasl_dir", &cfg->spiceSASLdir) < 0)
        return -1;
    if (virConfGetValueString(conf, "spice_listen", &cfg->spiceListen) < 0)
        return -1;
    if (virConfGetValueString(conf, "spice_password", &cfg->spicePassword) < 0)
        return -1;
    if (virConfGetValueBool(conf, "spice_auto_unix_socket", &cfg->spiceAutoUnixSocket) < 0)
        return -1;

    return 0;
}


473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514
static int
virQEMUDriverConfigLoadSpecificTLSEntry(virQEMUDriverConfigPtr cfg,
                                        virConfPtr conf)
{
    int rv;

    if (virConfGetValueBool(conf, "vxhs_tls", &cfg->vxhsTLS) < 0)
        return -1;
    if (virConfGetValueString(conf, "vxhs_tls_x509_cert_dir", &cfg->vxhsTLSx509certdir) < 0)
        return -1;
    if (virConfGetValueBool(conf, "nbd_tls", &cfg->nbdTLS) < 0)
        return -1;
    if (virConfGetValueString(conf, "nbd_tls_x509_cert_dir", &cfg->nbdTLSx509certdir) < 0)
        return -1;

#define GET_CONFIG_TLS_CERTINFO(val) \
    do { \
        if ((rv = virConfGetValueBool(conf, #val "_tls_x509_verify", \
                                      &cfg->val## TLSx509verify)) < 0) \
            return -1; \
        if (rv == 1) \
            cfg->val## TLSx509verifyPresent = true; \
        if (virConfGetValueString(conf, #val "_tls_x509_cert_dir", \
                                  &cfg->val## TLSx509certdir) < 0) \
            return -1; \
        if (virConfGetValueString(conf, \
                                  #val "_tls_x509_secret_uuid", \
                                  &cfg->val## TLSx509secretUUID) < 0) \
            return -1; \
    } while (0)

    if (virConfGetValueBool(conf, "chardev_tls", &cfg->chardevTLS) < 0)
        return -1;
    GET_CONFIG_TLS_CERTINFO(chardev);

    GET_CONFIG_TLS_CERTINFO(migrate);

#undef GET_CONFIG_TLS_CERTINFO
    return 0;
}


515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585
static int
virQEMUDriverConfigLoadRemoteDisplayEntry(virQEMUDriverConfigPtr cfg,
                                          virConfPtr conf,
                                          const char *filename)
{
    if (virConfGetValueUInt(conf, "remote_websocket_port_min", &cfg->webSocketPortMin) < 0)
        return -1;
    if (cfg->webSocketPortMin < QEMU_WEBSOCKET_PORT_MIN) {
        /* if the port is too low, we can't get the display name
         * to tell to vnc (usually subtract 5700, e.g. localhost:1
         * for port 5701) */
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("%s: remote_websocket_port_min: port must be greater "
                         "than or equal to %d"),
                        filename, QEMU_WEBSOCKET_PORT_MIN);
        return -1;
    }

    if (virConfGetValueUInt(conf, "remote_websocket_port_max", &cfg->webSocketPortMax) < 0)
        return -1;
    if (cfg->webSocketPortMax > QEMU_WEBSOCKET_PORT_MAX ||
        cfg->webSocketPortMax < cfg->webSocketPortMin) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                        _("%s: remote_websocket_port_max: port must be between "
                          "the minimal port and %d"),
                       filename, QEMU_WEBSOCKET_PORT_MAX);
        return -1;
    }

    if (cfg->webSocketPortMin > cfg->webSocketPortMax) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                        _("%s: remote_websocket_port_min: min port must not be "
                          "greater than max port"), filename);
        return -1;
    }

    if (virConfGetValueUInt(conf, "remote_display_port_min", &cfg->remotePortMin) < 0)
        return -1;
    if (cfg->remotePortMin < QEMU_REMOTE_PORT_MIN) {
        /* if the port is too low, we can't get the display name
         * to tell to vnc (usually subtract 5900, e.g. localhost:1
         * for port 5901) */
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("%s: remote_display_port_min: port must be greater "
                         "than or equal to %d"),
                        filename, QEMU_REMOTE_PORT_MIN);
        return -1;
    }

    if (virConfGetValueUInt(conf, "remote_display_port_max", &cfg->remotePortMax) < 0)
        return -1;
    if (cfg->remotePortMax > QEMU_REMOTE_PORT_MAX ||
        cfg->remotePortMax < cfg->remotePortMin) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                        _("%s: remote_display_port_max: port must be between "
                          "the minimal port and %d"),
                       filename, QEMU_REMOTE_PORT_MAX);
        return -1;
    }

    if (cfg->remotePortMin > cfg->remotePortMax) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                        _("%s: remote_display_port_min: min port must not be "
                          "greater than max port"), filename);
        return -1;
    }

    return 0;
}


586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606
static int
virQEMUDriverConfigLoadSaveEntry(virQEMUDriverConfigPtr cfg,
                                 virConfPtr conf)
{
    if (virConfGetValueString(conf, "save_image_format", &cfg->saveImageFormat) < 0)
        return -1;
    if (virConfGetValueString(conf, "dump_image_format", &cfg->dumpImageFormat) < 0)
        return -1;
    if (virConfGetValueString(conf, "snapshot_image_format", &cfg->snapshotImageFormat) < 0)
        return -1;
    if (virConfGetValueString(conf, "auto_dump_path", &cfg->autoDumpPath) < 0)
        return -1;
    if (virConfGetValueBool(conf, "auto_dump_bypass_cache", &cfg->autoDumpBypassCache) < 0)
        return -1;
    if (virConfGetValueBool(conf, "auto_start_bypass_cache", &cfg->autoStartBypassCache) < 0)
        return -1;

    return 0;
}


607 608 609 610
static int
virQEMUDriverConfigLoadProcessEntry(virQEMUDriverConfigPtr cfg,
                                    virConfPtr conf)
{
611
    VIR_AUTOSTRINGLIST hugetlbfs = NULL;
612 613
    g_autofree char *stdioHandler = NULL;
    g_autofree char *corestr = NULL;
614 615 616 617
    size_t i;

    if (virConfGetValueStringList(conf, "hugetlbfs_mount", true,
                                  &hugetlbfs) < 0)
618
        return -1;
619 620 621 622 623 624 625 626 627 628 629
    if (hugetlbfs) {
        /* There already might be something autodetected. Avoid leaking it. */
        while (cfg->nhugetlbfs) {
            cfg->nhugetlbfs--;
            VIR_FREE(cfg->hugetlbfs[cfg->nhugetlbfs].mnt_dir);
        }
        VIR_FREE(cfg->hugetlbfs);

        cfg->nhugetlbfs = virStringListLength((const char *const *)hugetlbfs);
        if (hugetlbfs[0] &&
            VIR_ALLOC_N(cfg->hugetlbfs, cfg->nhugetlbfs) < 0)
630
            return -1;
631 632 633 634

        for (i = 0; hugetlbfs[i] != NULL; i++) {
            if (virQEMUDriverConfigHugeTLBFSInit(&cfg->hugetlbfs[i],
                                                 hugetlbfs[i], i != 0) < 0)
635
                return -1;
636 637 638 639
        }
    }

    if (virConfGetValueString(conf, "bridge_helper", &cfg->bridgeHelperName) < 0)
640
        return -1;
641 642

    if (virConfGetValueString(conf, "pr_helper", &cfg->prHelperName) < 0)
643
        return -1;
644

645 646 647
    if (virConfGetValueString(conf, "slirp_helper", &cfg->slirpHelperName) < 0)
        return -1;

648 649 650
    if (virConfGetValueString(conf, "dbus_daemon", &cfg->dbusDaemonName) < 0)
        return -1;

651
    if (virConfGetValueBool(conf, "set_process_name", &cfg->setProcessName) < 0)
652
        return -1;
653
    if (virConfGetValueUInt(conf, "max_processes", &cfg->maxProcesses) < 0)
654
        return -1;
655
    if (virConfGetValueUInt(conf, "max_files", &cfg->maxFiles) < 0)
656
        return -1;
657 658
    if (virConfGetValueUInt(conf, "max_threads_per_process", &cfg->maxThreadsPerProc) < 0)
        return -1;
659 660 661

    if (virConfGetValueType(conf, "max_core") == VIR_CONF_STRING) {
        if (virConfGetValueString(conf, "max_core", &corestr) < 0)
662
            return -1;
663 664 665 666 667 668
        if (STREQ(corestr, "unlimited")) {
            cfg->maxCore = ULLONG_MAX;
        } else {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("Unknown core size '%s'"),
                           corestr);
669
            return -1;
670 671
        }
    } else if (virConfGetValueULLong(conf, "max_core", &cfg->maxCore) < 0) {
672
        return -1;
673 674 675
    }

    if (virConfGetValueBool(conf, "dump_guest_core", &cfg->dumpGuestCore) < 0)
676
        return -1;
677
    if (virConfGetValueString(conf, "stdio_handler", &stdioHandler) < 0)
678
        return -1;
679 680 681 682 683 684 685 686 687
    if (stdioHandler) {
        if (STREQ(stdioHandler, "logd")) {
            cfg->stdioLogD = true;
        } else if (STREQ(stdioHandler, "file")) {
            cfg->stdioLogD = false;
        } else {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("Unknown stdio handler %s"),
                           stdioHandler);
688
            return -1;
689 690 691
        }
    }

692
    return 0;
693 694 695
}


696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721
static int
virQEMUDriverConfigLoadDeviceEntry(virQEMUDriverConfigPtr cfg,
                                   virConfPtr conf)
{
    bool tmp;
    int rv;

    if (virConfGetValueBool(conf, "mac_filter", &cfg->macFilter) < 0)
        return -1;

    if (virConfGetValueBool(conf, "relaxed_acs_check", &cfg->relaxedACS) < 0)
        return -1;
    if (virConfGetValueString(conf, "lock_manager", &cfg->lockManagerName) < 0)
        return -1;
    if ((rv = virConfGetValueBool(conf, "allow_disk_format_probing", &tmp)) < 0)
        return -1;
    if (rv == 1 && tmp) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("allow_disk_format_probing is no longer supported"));
        return -1;
    }

    return 0;
}


722 723 724 725 726 727 728 729 730 731 732 733 734 735 736
static int
virQEMUDriverConfigLoadRPCEntry(virQEMUDriverConfigPtr cfg,
                                virConfPtr conf)
{
    if (virConfGetValueUInt(conf, "max_queued", &cfg->maxQueuedJobs) < 0)
        return -1;
    if (virConfGetValueInt(conf, "keepalive_interval", &cfg->keepAliveInterval) < 0)
        return -1;
    if (virConfGetValueUInt(conf, "keepalive_count", &cfg->keepAliveCount) < 0)
        return -1;

    return 0;
}


737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791
static int
virQEMUDriverConfigLoadNetworkEntry(virQEMUDriverConfigPtr cfg,
                                    virConfPtr conf,
                                    const char *filename)
{
    if (virConfGetValueUInt(conf, "migration_port_min", &cfg->migrationPortMin) < 0)
        return -1;
    if (cfg->migrationPortMin <= 0) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("%s: migration_port_min: port must be greater than 0"),
                        filename);
        return -1;
    }

    if (virConfGetValueUInt(conf, "migration_port_max", &cfg->migrationPortMax) < 0)
        return -1;
    if (cfg->migrationPortMax > 65535 ||
        cfg->migrationPortMax < cfg->migrationPortMin) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                        _("%s: migration_port_max: port must be between "
                          "the minimal port %d and 65535"),
                       filename, cfg->migrationPortMin);
        return -1;
    }

    if (virConfGetValueString(conf, "migration_host", &cfg->migrateHost) < 0)
        return -1;
    virStringStripIPv6Brackets(cfg->migrateHost);
    if (cfg->migrateHost &&
        (STRPREFIX(cfg->migrateHost, "localhost") ||
         virSocketAddrIsNumericLocalhost(cfg->migrateHost))) {
        virReportError(VIR_ERR_CONF_SYNTAX,
                       _("migration_host must not be the address of"
                         " the local machine: %s"),
                       cfg->migrateHost);
        return -1;
    }

    if (virConfGetValueString(conf, "migration_address", &cfg->migrationAddress) < 0)
        return -1;
    virStringStripIPv6Brackets(cfg->migrationAddress);
    if (cfg->migrationAddress &&
        (STRPREFIX(cfg->migrationAddress, "localhost") ||
         virSocketAddrIsNumericLocalhost(cfg->migrationAddress))) {
        virReportError(VIR_ERR_CONF_SYNTAX,
                       _("migration_address must not be the address of"
                         " the local machine: %s"),
                       cfg->migrationAddress);
        return -1;
    }

    return 0;
}


792 793 794 795 796 797 798 799
static int
virQEMUDriverConfigLoadLogEntry(virQEMUDriverConfigPtr cfg,
                                virConfPtr conf)
{
    return virConfGetValueBool(conf, "log_timestamp", &cfg->logTimestamp);
}


800 801
static int
virQEMUDriverConfigLoadNVRAMEntry(virQEMUDriverConfigPtr cfg,
802 803
                                  virConfPtr conf,
                                  bool privileged)
804
{
805
    VIR_AUTOSTRINGLIST nvram = NULL;
806 807 808
    size_t i;

    if (virConfGetValueStringList(conf, "nvram", false, &nvram) < 0)
809
        return -1;
810
    if (nvram) {
811 812
        VIR_AUTOSTRINGLIST fwList = NULL;

813 814
        virFirmwareFreeList(cfg->firmwares, cfg->nfirmwares);

815 816 817 818 819 820 821 822 823 824 825
        if (qemuFirmwareFetchConfigs(&fwList, privileged) < 0)
            return -1;

        if (fwList) {
            VIR_WARN("Obsolete nvram variable is set while firmware metadata "
                     "files found. Note that the nvram config file variable is "
                     "going to be ignored.");
            cfg->nfirmwares = 0;
            return 0;
        }

826 827
        cfg->nfirmwares = virStringListLength((const char *const *)nvram);
        if (nvram[0] && VIR_ALLOC_N(cfg->firmwares, cfg->nfirmwares) < 0)
828
            return -1;
829 830 831

        for (i = 0; nvram[i] != NULL; i++) {
            if (VIR_ALLOC(cfg->firmwares[i]) < 0)
832
                return -1;
833
            if (virFirmwareParse(nvram[i], cfg->firmwares[i]) < 0)
834
                return -1;
835 836 837
        }
    }

838
    return 0;
839 840 841
}


842
static int
J
Ján Tomko 已提交
843 844
virQEMUDriverConfigLoadDebugEntry(virQEMUDriverConfigPtr cfg,
                                  virConfPtr conf)
845
{
J
Ján Tomko 已提交
846 847
    if (virConfGetValueUInt(conf, "gluster_debug_level", &cfg->glusterDebugLevel) < 0)
        return -1;
848 849
    if (virConfGetValueBool(conf, "virtiofsd_debug", &cfg->virtiofsdDebug) < 0)
        return -1;
J
Ján Tomko 已提交
850 851

    return 0;
852 853 854
}


855 856 857 858 859
static int
virQEMUDriverConfigLoadSecurityEntry(virQEMUDriverConfigPtr cfg,
                                     virConfPtr conf,
                                     bool privileged)
{
860 861
    VIR_AUTOSTRINGLIST controllers = NULL;
    VIR_AUTOSTRINGLIST namespaces = NULL;
862 863
    g_autofree char *user = NULL;
    g_autofree char *group = NULL;
864 865 866
    size_t i, j;

    if (virConfGetValueStringList(conf, "security_driver", true, &cfg->securityDriverNames) < 0)
867
        return -1;
868 869 870 871 872 873 874 875

    for (i = 0; cfg->securityDriverNames && cfg->securityDriverNames[i] != NULL; i++) {
        for (j = i + 1; cfg->securityDriverNames[j] != NULL; j++) {
            if (STREQ(cfg->securityDriverNames[i],
                      cfg->securityDriverNames[j])) {
                virReportError(VIR_ERR_CONF_SYNTAX,
                               _("Duplicate security driver %s"),
                               cfg->securityDriverNames[i]);
876
                return -1;
877 878 879 880 881
            }
        }
    }

    if (virConfGetValueBool(conf, "security_default_confined", &cfg->securityDefaultConfined) < 0)
882
        return -1;
883
    if (virConfGetValueBool(conf, "security_require_confined", &cfg->securityRequireConfined) < 0)
884
        return -1;
885 886

    if (virConfGetValueString(conf, "user", &user) < 0)
887
        return -1;
888
    if (user && virGetUserID(user, &cfg->user) < 0)
889
        return -1;
890 891

    if (virConfGetValueString(conf, "group", &group) < 0)
892
        return -1;
893
    if (group && virGetGroupID(group, &cfg->group) < 0)
894
        return -1;
895 896

    if (virConfGetValueBool(conf, "dynamic_ownership", &cfg->dynamicOwnership) < 0)
897
        return -1;
898

899 900 901
    if (virConfGetValueBool(conf, "remember_owner", &cfg->rememberOwner) < 0)
        return -1;

902 903
    if (virConfGetValueStringList(conf, "cgroup_controllers", false,
                                  &controllers) < 0)
904
        return -1;
905 906 907 908 909 910 911 912 913

    if (controllers) {
        cfg->cgroupControllers = 0;
        for (i = 0; controllers[i] != NULL; i++) {
            int ctl;
            if ((ctl = virCgroupControllerTypeFromString(controllers[i])) < 0) {
                virReportError(VIR_ERR_CONF_SYNTAX,
                               _("Unknown cgroup controller '%s'"),
                               controllers[i]);
914
                return -1;
915 916 917 918 919 920 921
            }
            cfg->cgroupControllers |= (1 << ctl);
        }
    }

    if (virConfGetValueStringList(conf, "cgroup_device_acl", false,
                                  &cfg->cgroupDeviceACL) < 0)
922
        return -1;
923 924

    if (virConfGetValueInt(conf, "seccomp_sandbox", &cfg->seccompSandbox) < 0)
925
        return -1;
926 927

    if (virConfGetValueStringList(conf, "namespaces", false, &namespaces) < 0)
928
        return -1;
929 930 931 932 933 934 935 936 937 938 939

    if (namespaces) {
        virBitmapClearAll(cfg->namespaces);

        for (i = 0; namespaces[i]; i++) {
            int ns = qemuDomainNamespaceTypeFromString(namespaces[i]);

            if (ns < 0) {
                virReportError(VIR_ERR_CONF_SYNTAX,
                               _("Unknown namespace: %s"),
                               namespaces[i]);
940
                return -1;
941 942 943 944 945
            }

            if (!privileged) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("cannot use namespaces in session mode"));
946
                return -1;
947 948 949 950 951 952
            }

            if (!qemuDomainNamespaceAvailable(ns)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("%s namespace is not available"),
                               namespaces[i]);
953
                return -1;
954 955 956 957 958 959
            }

            if (virBitmapSetBit(cfg->namespaces, ns) < 0) {
                virReportError(VIR_ERR_INTERNAL_ERROR,
                               _("Unable to enable namespace: %s"),
                               namespaces[i]);
960
                return -1;
961 962 963 964
            }
        }
    }

965
    return 0;
966 967 968
}


969 970 971 972 973 974 975 976
static int
virQEMUDriverConfigLoadMemoryEntry(virQEMUDriverConfigPtr cfg,
                                   virConfPtr conf)
{
    return virConfGetValueString(conf, "memory_backing_dir", &cfg->memoryBackingDir);
}


977 978 979 980
static int
virQEMUDriverConfigLoadSWTPMEntry(virQEMUDriverConfigPtr cfg,
                                  virConfPtr conf)
{
981 982
    g_autofree char *swtpm_user = NULL;
    g_autofree char *swtpm_group = NULL;
983 984

    if (virConfGetValueString(conf, "swtpm_user", &swtpm_user) < 0)
985
        return -1;
986
    if (swtpm_user && virGetUserID(swtpm_user, &cfg->swtpm_user) < 0)
987
        return -1;
988 989

    if (virConfGetValueString(conf, "swtpm_group", &swtpm_group) < 0)
990
        return -1;
991
    if (swtpm_group && virGetGroupID(swtpm_group, &cfg->swtpm_group) < 0)
992
        return -1;
993

994
    return 0;
995 996 997
}


998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009
static int
virQEMUDriverConfigLoadCapsFiltersEntry(virQEMUDriverConfigPtr cfg,
                                        virConfPtr conf)
{
    if (virConfGetValueStringList(conf, "capability_filters", false,
                                  &cfg->capabilityfilters) < 0)
        return -1;

    return 0;
}


1010
int virQEMUDriverConfigLoadFile(virQEMUDriverConfigPtr cfg,
1011 1012
                                const char *filename,
                                bool privileged)
1013
{
J
Ján Tomko 已提交
1014
    g_autoptr(virConf) conf = NULL;
1015

D
Daniel P. Berrange 已提交
1016 1017 1018
    /* Just check the file is readable before opening it, otherwise
     * libvirt emits an error.
     */
1019
    if (access(filename, R_OK) == -1) {
1020
        VIR_INFO("Could not read qemu config file %s", filename);
1021
        return 0;
1022
    }
D
Daniel P. Berrange 已提交
1023

1024
    if (!(conf = virConfReadFile(filename, 0)))
1025
        return -1;
D
Daniel P. Berrange 已提交
1026

1027
    if (virQEMUDriverConfigLoadDefaultTLSEntry(cfg, conf) < 0)
1028
        return -1;
1029

1030
    if (virQEMUDriverConfigLoadVNCEntry(cfg, conf) < 0)
1031
        return -1;
1032 1033

    if (virQEMUDriverConfigLoadNographicsEntry(cfg, conf) < 0)
1034
        return -1;
1035

1036
    if (virQEMUDriverConfigLoadSPICEEntry(cfg, conf) < 0)
1037
        return -1;
1038

1039
    if (virQEMUDriverConfigLoadSpecificTLSEntry(cfg, conf) < 0)
1040
        return -1;
1041

1042
    if (virQEMUDriverConfigLoadRemoteDisplayEntry(cfg, conf, filename) < 0)
1043
        return -1;
1044

1045
    if (virQEMUDriverConfigLoadSaveEntry(cfg, conf) < 0)
1046
        return -1;
1047

1048
    if (virQEMUDriverConfigLoadProcessEntry(cfg, conf) < 0)
1049
        return -1;
1050

1051
    if (virQEMUDriverConfigLoadDeviceEntry(cfg, conf) < 0)
1052
        return -1;
1053

1054
    if (virQEMUDriverConfigLoadRPCEntry(cfg, conf) < 0)
1055
        return -1;
1056

1057
    if (virQEMUDriverConfigLoadNetworkEntry(cfg, conf, filename) < 0)
1058
        return -1;
1059

1060
    if (virQEMUDriverConfigLoadLogEntry(cfg, conf) < 0)
1061
        return -1;
1062

1063
    if (virQEMUDriverConfigLoadNVRAMEntry(cfg, conf, privileged) < 0)
1064
        return -1;
1065

J
Ján Tomko 已提交
1066
    if (virQEMUDriverConfigLoadDebugEntry(cfg, conf) < 0)
1067
        return -1;
1068

1069
    if (virQEMUDriverConfigLoadSecurityEntry(cfg, conf, privileged) < 0)
1070
        return -1;
1071

1072
    if (virQEMUDriverConfigLoadMemoryEntry(cfg, conf) < 0)
1073
        return -1;
1074

1075
    if (virQEMUDriverConfigLoadSWTPMEntry(cfg, conf) < 0)
1076
        return -1;
1077

1078
    if (virQEMUDriverConfigLoadCapsFiltersEntry(cfg, conf) < 0)
1079
        return -1;
1080

1081
    return 0;
D
Daniel P. Berrange 已提交
1082
}
1083

1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094

/**
 * @cfg: Recently read config values
 *
 * Validate the recently read configuration values.
 *
 * Returns 0 on success, -1 on failure
 */
int
virQEMUDriverConfigValidate(virQEMUDriverConfigPtr cfg)
{
1095
    if (cfg->defaultTLSx509certdirPresent) {
1096 1097 1098 1099 1100 1101 1102 1103 1104
        if (!virFileExists(cfg->defaultTLSx509certdir)) {
            virReportError(VIR_ERR_CONF_SYNTAX,
                           _("default_tls_x509_cert_dir directory '%s' "
                             "does not exist"),
                           cfg->defaultTLSx509certdir);
            return -1;
        }
    }

1105
    if (cfg->vncTLSx509certdir &&
1106 1107 1108 1109 1110 1111 1112
        !virFileExists(cfg->vncTLSx509certdir)) {
        virReportError(VIR_ERR_CONF_SYNTAX,
                       _("vnc_tls_x509_cert_dir directory '%s' does not exist"),
                       cfg->vncTLSx509certdir);
        return -1;
    }

1113
    if (cfg->spiceTLSx509certdir &&
1114 1115 1116 1117 1118 1119 1120
        !virFileExists(cfg->spiceTLSx509certdir)) {
        virReportError(VIR_ERR_CONF_SYNTAX,
                       _("spice_tls_x509_cert_dir directory '%s' does not exist"),
                       cfg->spiceTLSx509certdir);
        return -1;
    }

1121
    if (cfg->chardevTLSx509certdir &&
1122 1123 1124 1125 1126 1127 1128
        !virFileExists(cfg->chardevTLSx509certdir)) {
        virReportError(VIR_ERR_CONF_SYNTAX,
                       _("chardev_tls_x509_cert_dir directory '%s' does not exist"),
                       cfg->chardevTLSx509certdir);
        return -1;
    }

1129
    if (cfg->migrateTLSx509certdir &&
1130 1131 1132 1133 1134
        !virFileExists(cfg->migrateTLSx509certdir)) {
        virReportError(VIR_ERR_CONF_SYNTAX,
                       _("migrate_tls_x509_cert_dir directory '%s' does not exist"),
                       cfg->migrateTLSx509certdir);
        return -1;
1135 1136
    }

1137
    if (cfg->vxhsTLSx509certdir &&
1138 1139 1140 1141 1142
        !virFileExists(cfg->vxhsTLSx509certdir)) {
        virReportError(VIR_ERR_CONF_SYNTAX,
                       _("vxhs_tls_x509_cert_dir directory '%s' does not exist"),
                       cfg->vxhsTLSx509certdir);
        return -1;
1143 1144
    }

1145
    if (cfg->nbdTLSx509certdir &&
1146 1147 1148 1149 1150 1151 1152
        !virFileExists(cfg->nbdTLSx509certdir)) {
        virReportError(VIR_ERR_CONF_SYNTAX,
                       _("nbd_tls_x509_cert_dir directory '%s' does not exist"),
                       cfg->nbdTLSx509certdir);
        return -1;
    }

1153 1154 1155 1156
    return 0;
}


1157 1158 1159
int
virQEMUDriverConfigSetDefaults(virQEMUDriverConfigPtr cfg)
{
1160 1161 1162 1163 1164
#define SET_TLS_SECRET_UUID_DEFAULT(val) \
    do { \
        if (!cfg->val## TLSx509certdir && \
            !cfg->val## TLSx509secretUUID && \
            cfg->defaultTLSx509secretUUID) { \
1165
            cfg->val## TLSx509secretUUID = g_strdup(cfg->defaultTLSx509secretUUID); \
1166 1167 1168
        } \
    } while (0)

1169
    SET_TLS_SECRET_UUID_DEFAULT(vnc);
1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186
    SET_TLS_SECRET_UUID_DEFAULT(chardev);
    SET_TLS_SECRET_UUID_DEFAULT(migrate);

#undef SET_TLS_SECRET_UUID_DEFAULT

    /*
     * If a "SYSCONFDIR" + "pki/libvirt-<val>" exists, then assume someone
     * has created a val specific area to place service specific certificates.
     *
     * If the service specific directory doesn't exist, 'assume' that the
     * user has created and populated the "SYSCONFDIR" + "pki/libvirt-default".
     */
#define SET_TLS_X509_CERT_DEFAULT(val) \
    do { \
        if (cfg->val ## TLSx509certdir) \
            break; \
        if (virFileExists(SYSCONFDIR "/pki/libvirt-"#val)) { \
1187
            cfg->val ## TLSx509certdir = g_strdup(SYSCONFDIR "/pki/libvirt-"#val); \
1188
        } else { \
1189
            cfg->val ## TLSx509certdir = g_strdup(cfg->defaultTLSx509certdir); \
1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201
        } \
    } while (0)

    SET_TLS_X509_CERT_DEFAULT(vnc);
    SET_TLS_X509_CERT_DEFAULT(spice);
    SET_TLS_X509_CERT_DEFAULT(chardev);
    SET_TLS_X509_CERT_DEFAULT(migrate);
    SET_TLS_X509_CERT_DEFAULT(vxhs);
    SET_TLS_X509_CERT_DEFAULT(nbd);

#undef SET_TLS_X509_CERT_DEFAULT

1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213
#define SET_TLS_VERIFY_DEFAULT(val) \
    do { \
        if (!cfg->val## TLSx509verifyPresent) \
            cfg->val## TLSx509verify = cfg->defaultTLSx509verify; \
    } while (0)

    SET_TLS_VERIFY_DEFAULT(vnc);
    SET_TLS_VERIFY_DEFAULT(chardev);
    SET_TLS_VERIFY_DEFAULT(migrate);

#undef SET_TLS_VERIFY_DEFAULT

1214
    return 0;
1215 1216 1217
}


1218 1219
virQEMUDriverConfigPtr virQEMUDriverGetConfig(virQEMUDriverPtr driver)
{
1220 1221 1222 1223 1224
    virQEMUDriverConfigPtr conf;
    qemuDriverLock(driver);
    conf = virObjectRef(driver->config);
    qemuDriverUnlock(driver);
    return conf;
1225 1226
}

1227 1228 1229 1230 1231 1232
bool
virQEMUDriverIsPrivileged(virQEMUDriverPtr driver)
{
    return driver->privileged;
}

1233
virDomainXMLOptionPtr
1234 1235
virQEMUDriverCreateXMLConf(virQEMUDriverPtr driver,
                           const char *defsecmodel)
1236
{
1237
    virQEMUDriverDomainDefParserConfig.priv = driver;
1238
    virQEMUDriverDomainDefParserConfig.defSecModel = defsecmodel;
1239
    return virDomainXMLOptionNew(&virQEMUDriverDomainDefParserConfig,
1240
                                 &virQEMUDriverPrivateDataCallbacks,
1241
                                 &virQEMUDriverDomainXMLNamespace,
1242
                                 &virQEMUDriverDomainABIStability,
1243
                                 &virQEMUDriverDomainSaveCookie);
1244 1245
}

1246

1247 1248 1249
virCapsHostNUMAPtr
virQEMUDriverGetHostNUMACaps(virQEMUDriverPtr driver)
{
1250 1251
    virCapsHostNUMAPtr hostnuma;

1252 1253 1254 1255 1256
    qemuDriverLock(driver);

    if (!driver->hostnuma)
        driver->hostnuma = virCapabilitiesHostNUMANewHost();

1257 1258
    hostnuma = driver->hostnuma;

1259 1260
    qemuDriverUnlock(driver);

1261 1262
    if (hostnuma)
        virCapabilitiesHostNUMARef(hostnuma);
1263

1264
    return hostnuma;
1265 1266 1267
}


1268 1269 1270
virCPUDefPtr
virQEMUDriverGetHostCPU(virQEMUDriverPtr driver)
{
1271 1272
    virCPUDefPtr hostcpu;

1273 1274 1275 1276 1277
    qemuDriverLock(driver);

    if (!driver->hostcpu)
        driver->hostcpu = virCPUProbeHost(virArchFromHost());

1278 1279
    hostcpu = driver->hostcpu;

1280 1281
    qemuDriverUnlock(driver);

1282 1283
    if (hostcpu)
        virCPUDefRef(hostcpu);
1284

1285
    return hostcpu;
1286 1287 1288
}


1289 1290
virCapsPtr virQEMUDriverCreateCapabilities(virQEMUDriverPtr driver)
{
1291
    size_t i, j;
1292
    g_autoptr(virCaps) caps = NULL;
1293
    g_autofree virSecurityManagerPtr *sec_managers = NULL;
1294
    /* Security driver data */
1295 1296 1297
    const char *doi, *model, *lbl, *type;
    const int virtTypes[] = {VIR_DOMAIN_VIRT_KVM,
                             VIR_DOMAIN_VIRT_QEMU,};
1298 1299

    /* Basic host arch / guest machine capabilities */
1300
    if (!(caps = virQEMUCapsInit(driver->qemuCapsCache)))
1301
        return NULL;
1302 1303 1304 1305

    if (virGetHostUUID(caps->host.host_uuid)) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       "%s", _("cannot get the host uuid"));
1306
        return NULL;
1307 1308 1309
    }

    /* access sec drivers and create a sec model for each one */
1310
    if (!(sec_managers = qemuSecurityGetNested(driver->securityManager)))
1311
        return NULL;
1312 1313 1314 1315 1316 1317 1318

    /* calculate length */
    for (i = 0; sec_managers[i]; i++)
        ;
    caps->host.nsecModels = i;

    if (VIR_ALLOC_N(caps->host.secModels, caps->host.nsecModels) < 0)
1319
        return NULL;
1320 1321

    for (i = 0; sec_managers[i]; i++) {
1322
        virCapsHostSecModelPtr sm = &caps->host.secModels[i];
1323 1324
        doi = qemuSecurityGetDOI(sec_managers[i]);
        model = qemuSecurityGetModel(sec_managers[i]);
1325 1326
        sm->model = g_strdup(model);
        sm->doi = g_strdup(doi);
1327

1328
        for (j = 0; j < G_N_ELEMENTS(virtTypes); j++) {
1329
            lbl = qemuSecurityGetBaseLabel(sec_managers[i], virtTypes[j]);
1330 1331 1332
            type = virDomainVirtTypeToString(virtTypes[j]);
            if (lbl &&
                virCapabilitiesHostSecModelAddBaseLabel(sm, type, lbl) < 0)
1333
                return NULL;
1334 1335
        }

1336 1337 1338 1339
        VIR_DEBUG("Initialized caps for security driver \"%s\" with "
                  "DOI \"%s\"", model, doi);
    }

1340
    caps->host.numa = virQEMUDriverGetHostNUMACaps(driver);
1341
    caps->host.cpu = virQEMUDriverGetHostCPU(driver);
J
Ján Tomko 已提交
1342
    return g_steal_pointer(&caps);
1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359
}


/**
 * virQEMUDriverGetCapabilities:
 *
 * Get a reference to the virCapsPtr instance for the
 * driver. If @refresh is true, the capabilities will be
 * rebuilt first
 *
 * The caller must release the reference with virObjetUnref
 *
 * Returns: a reference to a virCapsPtr instance or NULL
 */
virCapsPtr virQEMUDriverGetCapabilities(virQEMUDriverPtr driver,
                                        bool refresh)
{
1360
    virCapsPtr ret = NULL;
1361 1362 1363 1364 1365
    if (refresh) {
        virCapsPtr caps = NULL;
        if ((caps = virQEMUDriverCreateCapabilities(driver)) == NULL)
            return NULL;

1366
        qemuDriverLock(driver);
1367 1368
        virObjectUnref(driver->caps);
        driver->caps = caps;
1369 1370
    } else {
        qemuDriverLock(driver);
1371

1372 1373 1374 1375 1376 1377 1378
        if (driver->caps == NULL ||
            driver->caps->nguests == 0) {
            VIR_DEBUG("Capabilities didn't detect any guests. Forcing a "
                      "refresh.");
            qemuDriverUnlock(driver);
            return virQEMUDriverGetCapabilities(driver, true);
        }
1379 1380
    }

1381 1382 1383
    ret = virObjectRef(driver->caps);
    qemuDriverUnlock(driver);
    return ret;
1384 1385
}

1386 1387 1388 1389

/**
 * virQEMUDriverGetDomainCapabilities:
 *
1390 1391 1392 1393 1394
 * Get a reference to the virDomainCapsPtr instance from the virQEMUCapsPtr
 * domCapsCache. If there's no domcaps in the cache, create a new instance,
 * add it to the cache, and return a reference.
 *
 * The caller must release the reference with virObjetUnref
1395 1396 1397 1398 1399 1400 1401 1402 1403 1404
 *
 * Returns: a reference to a virDomainCapsPtr instance or NULL
 */
virDomainCapsPtr
virQEMUDriverGetDomainCapabilities(virQEMUDriverPtr driver,
                                   virQEMUCapsPtr qemuCaps,
                                   const char *machine,
                                   virArch arch,
                                   virDomainVirtType virttype)
{
1405
    g_autoptr(virQEMUDriverConfig) cfg = virQEMUDriverGetConfig(driver);
1406

1407 1408 1409 1410 1411 1412 1413 1414
    return virQEMUCapsGetDomainCapsCache(qemuCaps,
                                         machine,
                                         arch,
                                         virttype,
                                         driver->hostarch,
                                         driver->privileged,
                                         cfg->firmwares,
                                         cfg->nfirmwares);
1415 1416 1417
}


1418
struct _qemuSharedDeviceEntry {
1419 1420 1421 1422
    size_t ref;
    char **domains; /* array of domain names */
};

1423
/* Construct the hash key for sharedDevices as "major:minor" */
1424
char *
1425
qemuGetSharedDeviceKey(const char *device_path)
1426 1427 1428 1429 1430
{
    int maj, min;
    char *key = NULL;
    int rc;

1431
    if ((rc = virGetDeviceID(device_path, &maj, &min)) < 0) {
1432 1433
        virReportSystemError(-rc,
                             _("Unable to get minor number of device '%s'"),
1434
                             device_path);
1435 1436 1437
        return NULL;
    }

1438
    key = g_strdup_printf("%d:%d", maj, min);
1439 1440 1441 1442

    return key;
}

1443 1444 1445
/*
 * Make necessary checks for the need to check and for the current setting
 * of the 'unpriv_sgio' value for the device_path passed.
1446
 *
1447 1448 1449 1450 1451 1452
 * Returns:
 *  0 - Success
 * -1 - Some failure which would already have been messaged
 * -2 - Mismatch with the "shared" sgio setting - needs to be messaged
 *      by caller since it has context of which type of disk resource is
 *      being used and in the future the hostdev information.
1453 1454
 */
static int
1455 1456 1457
qemuCheckUnprivSGIO(virHashTablePtr sharedDevices,
                    const char *device_path,
                    int sgio)
1458
{
1459 1460
    g_autofree char *sysfs_path = NULL;
    g_autofree char *key = NULL;
1461
    int val;
1462

1463
    if (!(sysfs_path = virGetUnprivSGIOSysfsPath(device_path, NULL)))
1464
        return -1;
1465

1466
    /* It can't be conflict if unpriv_sgio is not supported by kernel. */
1467 1468
    if (!virFileExists(sysfs_path))
        return 0;
1469

1470
    if (!(key = qemuGetSharedDeviceKey(device_path)))
1471
        return -1;
1472

1473
    /* It can't be conflict if no other domain is sharing it. */
1474 1475
    if (!(virHashLookup(sharedDevices, key)))
        return 0;
1476

1477
    if (virGetDeviceUnprivSGIO(device_path, NULL, &val) < 0)
1478
        return -1;
1479

1480 1481 1482
    /* Error message on failure needs to be handled in caller
     * since there is more specific knowledge of device
     */
1483
    if (!((val == 0 &&
1484 1485
           (sgio == VIR_DOMAIN_DEVICE_SGIO_FILTERED ||
            sgio == VIR_DOMAIN_DEVICE_SGIO_DEFAULT)) ||
1486
          (val == 1 &&
1487
           sgio == VIR_DOMAIN_DEVICE_SGIO_UNFILTERED))) {
1488
        return -2;
1489 1490
    }

1491
    return 0;
1492
}
1493

1494

1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533
/* Check if a shared device's setting conflicts with the conf
 * used by other domain(s). Currently only checks the sgio
 * setting. Note that this should only be called for disk with
 * block source if the device type is disk.
 *
 * Returns 0 if no conflicts, otherwise returns -1.
 */
static int
qemuCheckSharedDisk(virHashTablePtr sharedDevices,
                    virDomainDiskDefPtr disk)
{
    int ret;

    if (disk->device != VIR_DOMAIN_DISK_DEVICE_LUN)
        return 0;

    if ((ret = qemuCheckUnprivSGIO(sharedDevices, disk->src->path,
                                   disk->sgio)) < 0) {
        if (ret == -2) {
            if (virDomainDiskGetType(disk) == VIR_STORAGE_TYPE_VOLUME) {
                virReportError(VIR_ERR_OPERATION_INVALID,
                               _("sgio of shared disk 'pool=%s' 'volume=%s' "
                                 "conflicts with other active domains"),
                               disk->src->srcpool->pool,
                               disk->src->srcpool->volume);
            } else {
                virReportError(VIR_ERR_OPERATION_INVALID,
                               _("sgio of shared disk '%s' conflicts with "
                                 "other active domains"),
                               disk->src->path);
            }
        }
        return -1;
    }

    return 0;
}


1534
bool
1535 1536 1537
qemuSharedDeviceEntryDomainExists(qemuSharedDeviceEntryPtr entry,
                                  const char *name,
                                  int *idx)
1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552
{
    size_t i;

    for (i = 0; i < entry->ref; i++) {
        if (STREQ(entry->domains[i], name)) {
            if (idx)
                *idx = i;
            return true;
        }
    }

    return false;
}

void
1553
qemuSharedDeviceEntryFree(void *payload)
1554
{
1555
    qemuSharedDeviceEntryPtr entry = payload;
1556 1557
    size_t i;

1558 1559 1560
    if (!entry)
        return;

1561
    for (i = 0; i < entry->ref; i++)
1562 1563 1564 1565 1566
        VIR_FREE(entry->domains[i]);
    VIR_FREE(entry->domains);
    VIR_FREE(entry);
}

1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578

static int
qemuSharedDeviceEntryInsert(virQEMUDriverPtr driver,
                            const char *key,
                            const char *name)
{
    qemuSharedDeviceEntry *entry = NULL;

    if ((entry = virHashLookup(driver->sharedDevices, key))) {
        /* Nothing to do if the shared scsi host device is already
         * recorded in the table.
         */
J
Ján Tomko 已提交
1579
        if (!qemuSharedDeviceEntryDomainExists(entry, name, NULL)) {
1580
            if (VIR_EXPAND_N(entry->domains, entry->ref, 1) < 0) {
J
Ján Tomko 已提交
1581 1582 1583 1584
                /* entry is owned by the hash table here */
                entry = NULL;
                goto error;
            }
1585
            entry->domains[entry->ref - 1] = g_strdup(name);
1586 1587 1588
        }
    } else {
        if (VIR_ALLOC(entry) < 0 ||
1589
            VIR_ALLOC_N(entry->domains, 1) < 0)
J
Ján Tomko 已提交
1590
            goto error;
1591

1592 1593
        entry->domains[0] = g_strdup(name);

1594 1595
        entry->ref = 1;

1596
        if (virHashAddEntry(driver->sharedDevices, key, entry) < 0)
J
Ján Tomko 已提交
1597
            goto error;
1598 1599
    }

J
Ján Tomko 已提交
1600
    return 0;
1601

J
Ján Tomko 已提交
1602
 error:
1603
    qemuSharedDeviceEntryFree(entry);
J
Ján Tomko 已提交
1604
    return -1;
1605 1606
}

1607

1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622
static int
qemuSharedDeviceEntryRemove(virQEMUDriverPtr driver,
                            const char *key,
                            const char *name)
{
    qemuSharedDeviceEntryPtr entry = NULL;
    int idx;

    if (!(entry = virHashLookup(driver->sharedDevices, key)))
        return -1;

    /* Nothing to do if the shared disk is not recored in the table. */
    if (!qemuSharedDeviceEntryDomainExists(entry, name, &idx))
        return 0;

1623 1624
    if (entry->ref != 1) {
        VIR_FREE(entry->domains[idx]);
1625
        VIR_DELETE_ELEMENT(entry->domains, idx, entry->ref);
1626
    } else {
1627
        ignore_value(virHashRemoveEntry(driver->sharedDevices, key));
1628
    }
1629 1630 1631 1632 1633 1634

    return 0;
}


static int
1635
qemuSharedDiskAddRemoveInternal(virQEMUDriverPtr driver,
1636 1637 1638
                                virDomainDiskDefPtr disk,
                                const char *name,
                                bool addDisk)
1639
{
1640
    g_autofree char *key = NULL;
1641
    int ret = -1;
1642

1643 1644 1645
    if (virStorageSourceIsEmpty(disk->src) ||
        !disk->src->shared ||
        !virStorageSourceIsBlockLocal(disk->src))
1646
        return 0;
1647

1648
    qemuDriverLock(driver);
1649

1650 1651 1652
    if (!(key = qemuGetSharedDeviceKey(virDomainDiskGetSource(disk))))
        goto cleanup;

1653 1654 1655
    if (addDisk) {
        if (qemuCheckSharedDisk(driver->sharedDevices, disk) < 0)
            goto cleanup;
1656

1657 1658 1659 1660 1661 1662
        if (qemuSharedDeviceEntryInsert(driver, key, name) < 0)
            goto cleanup;
    } else {
        if (qemuSharedDeviceEntryRemove(driver, key, name) < 0)
            goto cleanup;
    }
1663

1664
    ret = 0;
1665 1666 1667 1668 1669 1670
 cleanup:
    qemuDriverUnlock(driver);
    return ret;
}


1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684
/* qemuAddSharedDisk:
 * @driver: Pointer to qemu driver struct
 * @src: disk source
 * @name: The domain name
 *
 * Increase ref count and add the domain name into the list which
 * records all the domains that use the shared device if the entry
 * already exists, otherwise add a new entry.
 */
int
qemuAddSharedDisk(virQEMUDriverPtr driver,
                  virDomainDiskDefPtr disk,
                  const char *name)
{
1685
    return qemuSharedDiskAddRemoveInternal(driver, disk, name, true);
1686 1687 1688
}


1689 1690 1691 1692
static bool
qemuIsSharedHostdev(virDomainHostdevDefPtr hostdev)
{
    return (hostdev->shareable &&
1693 1694 1695
            (virHostdevIsSCSIDevice(hostdev) &&
             hostdev->source.subsys.u.scsi.protocol !=
             VIR_DOMAIN_HOSTDEV_SCSI_PROTOCOL_TYPE_ISCSI));
1696 1697 1698
}


1699
static char *
J
John Ferlan 已提交
1700
qemuGetHostdevPath(virDomainHostdevDefPtr hostdev)
1701 1702 1703
{
    virDomainHostdevSubsysSCSIPtr scsisrc = &hostdev->source.subsys.u.scsi;
    virDomainHostdevSubsysSCSIHostPtr scsihostsrc = &scsisrc->u.host;
1704
    g_autofree char *dev_name = NULL;
1705
    char *dev_path = NULL;
1706

1707 1708 1709 1710 1711
    if (!(dev_name = virSCSIDeviceGetDevName(NULL,
                                             scsihostsrc->adapter,
                                             scsihostsrc->bus,
                                             scsihostsrc->target,
                                             scsihostsrc->unit)))
1712
        return NULL;
1713

1714
    dev_path = g_strdup_printf("/dev/%s", dev_name);
J
John Ferlan 已提交
1715 1716 1717 1718
    return dev_path;
}


1719
static int
1720
qemuSharedHostdevAddRemoveInternal(virQEMUDriverPtr driver,
1721 1722 1723
                                   virDomainHostdevDefPtr hostdev,
                                   const char *name,
                                   bool addDevice)
1724
{
1725 1726
    g_autofree char *dev_path = NULL;
    g_autofree char *key = NULL;
1727 1728
    int ret = -1;

1729
    if (!qemuIsSharedHostdev(hostdev))
1730 1731
        return 0;

1732 1733 1734
    if (!(dev_path = qemuGetHostdevPath(hostdev)) ||
        !(key = qemuGetSharedDeviceKey(dev_path)))
        return -1;
1735 1736

    qemuDriverLock(driver);
1737 1738 1739 1740 1741 1742

    if (addDevice)
        ret = qemuSharedDeviceEntryInsert(driver, key, name);
    else
        ret = qemuSharedDeviceEntryRemove(driver, key, name);

1743 1744
    qemuDriverUnlock(driver);

1745
    return ret;
1746 1747
}

1748
static int
1749
qemuSharedDeviceAddRemoveInternal(virQEMUDriverPtr driver,
1750 1751 1752 1753 1754 1755 1756 1757 1758
                                  virDomainDeviceDefPtr dev,
                                  const char *name,
                                  bool addDevice)
{
    /* Currently the only conflicts we have to care about for
     * the shared disk and shared host device is "sgio" setting,
     * which is only valid for block disk and scsi host device.
     */
    if (dev->type == VIR_DOMAIN_DEVICE_DISK)
1759
        return qemuSharedDiskAddRemoveInternal(driver, dev->data.disk,
1760 1761
                                               name, addDevice);
    else if (dev->type == VIR_DOMAIN_DEVICE_HOSTDEV)
1762
        return qemuSharedHostdevAddRemoveInternal(driver, dev->data.hostdev,
1763 1764 1765 1766 1767
                                                  name, addDevice);
    else
        return 0;
}

1768

1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782
/* qemuAddSharedDevice:
 * @driver: Pointer to qemu driver struct
 * @dev: The device def
 * @name: The domain name
 *
 * Increase ref count and add the domain name into the list which
 * records all the domains that use the shared device if the entry
 * already exists, otherwise add a new entry.
 */
int
qemuAddSharedDevice(virQEMUDriverPtr driver,
                    virDomainDeviceDefPtr dev,
                    const char *name)
{
1783
    return qemuSharedDeviceAddRemoveInternal(driver, dev, name, true);
1784 1785
}

1786

1787
int
1788 1789 1790
qemuRemoveSharedDisk(virQEMUDriverPtr driver,
                     virDomainDiskDefPtr disk,
                     const char *name)
1791
{
1792
    return qemuSharedDiskAddRemoveInternal(driver, disk, name, false);
1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809
}


/* qemuRemoveSharedDevice:
 * @driver: Pointer to qemu driver struct
 * @device: The device def
 * @name: The domain name
 *
 * Decrease ref count and remove the domain name from the list which
 * records all the domains that use the shared device if ref is not
 * 1, otherwise remove the entry.
 */
int
qemuRemoveSharedDevice(virQEMUDriverPtr driver,
                       virDomainDeviceDefPtr dev,
                       const char *name)
{
1810
    return qemuSharedDeviceAddRemoveInternal(driver, dev, name, false);
1811 1812 1813
}


1814
int
1815
qemuSetUnprivSGIO(virDomainDeviceDefPtr dev)
1816
{
1817 1818
    virDomainDiskDefPtr disk = NULL;
    virDomainHostdevDefPtr hostdev = NULL;
1819
    g_autofree char *sysfs_path = NULL;
1820
    const char *path = NULL;
1821
    int val = -1;
1822 1823 1824 1825

    /* "sgio" is only valid for block disk; cdrom
     * and floopy disk can have empty source.
     */
1826 1827 1828
    if (dev->type == VIR_DOMAIN_DEVICE_DISK) {
        disk = dev->data.disk;

1829
        if (disk->device != VIR_DOMAIN_DISK_DEVICE_LUN ||
1830
            !virStorageSourceIsBlockLocal(disk->src))
1831 1832
            return 0;

1833
        path = virDomainDiskGetSource(disk);
1834 1835 1836
    } else if (dev->type == VIR_DOMAIN_DEVICE_HOSTDEV) {
        hostdev = dev->data.hostdev;

1837 1838
        if (!qemuIsSharedHostdev(hostdev))
            return 0;
1839

1840
        if (hostdev->source.subsys.u.scsi.sgio) {
1841 1842 1843
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("'sgio' is not supported for SCSI "
                             "generic device yet "));
1844
            return -1;
1845
        }
1846

1847
        return 0;
1848
    } else {
1849
        return 0;
1850
    }
1851

1852
    if (!(sysfs_path = virGetUnprivSGIOSysfsPath(path, NULL)))
1853
        return -1;
1854 1855

    /* By default, filter the SG_IO commands, i.e. set unpriv_sgio to 0.  */
1856
    val = (disk->sgio == VIR_DOMAIN_DEVICE_SGIO_UNFILTERED);
1857 1858 1859 1860 1861

    /* Do not do anything if unpriv_sgio is not supported by the kernel and the
     * whitelist is enabled.  But if requesting unfiltered access, always call
     * virSetDeviceUnprivSGIO, to report an error for unsupported unpriv_sgio.
     */
1862 1863
    if ((virFileExists(sysfs_path) || val == 1) &&
        virSetDeviceUnprivSGIO(path, NULL, val) < 0)
1864
        return -1;
1865

1866
    return 0;
1867
}
1868

1869 1870
int qemuDriverAllocateID(virQEMUDriverPtr driver)
{
J
Ján Tomko 已提交
1871
    return g_atomic_int_add(&driver->lastvmid, 1) + 1;
1872
}
1873

1874 1875

int
1876
qemuTranslateSnapshotDiskSourcePool(virDomainSnapshotDiskDefPtr def)
1877
{
1878
    if (def->src->type != VIR_STORAGE_TYPE_VOLUME)
1879 1880 1881 1882 1883 1884
        return 0;

    virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                   _("Snapshots are not yet supported with 'pool' volumes"));
    return -1;
}
1885 1886

char *
1887
qemuGetBaseHugepagePath(virHugeTLBFSPtr hugepage)
1888 1889 1890
{
    char *ret;

1891
    ret = g_strdup_printf("%s/libvirt/qemu", hugepage->mnt_dir);
1892 1893 1894 1895

    return ret;
}

1896

1897 1898 1899 1900
char *
qemuGetDomainHugepagePath(const virDomainDef *def,
                          virHugeTLBFSPtr hugepage)
{
1901 1902
    g_autofree char *base = qemuGetBaseHugepagePath(hugepage);
    g_autofree char *domPath = virDomainDefGetShortName(def);
1903
    char *ret = NULL;
1904 1905

    if (base && domPath)
1906
        ret = g_strdup_printf("%s/%s", base, domPath);
1907 1908 1909 1910
    return ret;
}


1911
/**
1912
 * qemuGetDomainHupageMemPath: Construct HP enabled memory backend path
1913 1914 1915 1916 1917 1918 1919
 *
 * The resulting path is stored at @memPath.
 *
 * Returns 0 on success,
 *        -1 otherwise.
 */
int
1920 1921 1922 1923
qemuGetDomainHupageMemPath(const virDomainDef *def,
                           virQEMUDriverConfigPtr cfg,
                           unsigned long long pagesize,
                           char **memPath)
1924 1925 1926 1927 1928 1929 1930 1931 1932 1933
{
    size_t i = 0;

    if (!cfg->nhugetlbfs) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       "%s", _("hugetlbfs filesystem is not mounted "
                               "or disabled by administrator config"));
        return -1;
    }

1934 1935 1936 1937
    for (i = 0; i < cfg->nhugetlbfs; i++) {
        if (cfg->hugetlbfs[i].size == pagesize)
            break;
    }
1938

1939 1940 1941 1942 1943 1944
    if (i == cfg->nhugetlbfs) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("Unable to find any usable hugetlbfs "
                         "mount for %llu KiB"),
                       pagesize);
        return -1;
1945 1946
    }

1947 1948 1949
    if (!(*memPath = qemuGetDomainHugepagePath(def, &cfg->hugetlbfs[i])))
        return -1;

1950 1951
    return 0;
}
1952 1953


1954
void
1955 1956 1957
qemuGetMemoryBackingBasePath(virQEMUDriverConfigPtr cfg,
                             char **path)
{
1958
    *path = g_strdup_printf("%s/libvirt/qemu", cfg->memoryBackingDir);
1959 1960 1961 1962 1963 1964 1965 1966
}


int
qemuGetMemoryBackingDomainPath(const virDomainDef *def,
                               virQEMUDriverConfigPtr cfg,
                               char **path)
{
1967 1968
    g_autofree char *shortName = NULL;
    g_autofree char *base = NULL;
1969

1970
    if (!(shortName = virDomainDefGetShortName(def)))
1971
        return -1;
1972

1973 1974 1975
    qemuGetMemoryBackingBasePath(cfg, &base);
    *path = g_strdup_printf("%s/%s", base, shortName);

1976
    return 0;
1977 1978 1979
}


1980 1981
/**
 * qemuGetMemoryBackingPath:
1982
 * @def: domain definition
1983
 * @cfg: the driver config
1984
 * @alias: memory object alias
1985 1986 1987 1988 1989 1990 1991 1992
 * @memPath: constructed path
 *
 * Constructs path to memory backing dir and stores it at @memPath.
 *
 * Returns: 0 on success,
 *          -1 otherwise (with error reported).
 */
int
1993 1994 1995
qemuGetMemoryBackingPath(const virDomainDef *def,
                         virQEMUDriverConfigPtr cfg,
                         const char *alias,
1996 1997
                         char **memPath)
{
1998
    g_autofree char *domainPath = NULL;
1999 2000 2001 2002 2003

    if (!alias) {
        /* This should never happen (TM) */
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("memory device alias is not assigned"));
2004
        return -1;
2005 2006
    }

2007
    if (qemuGetMemoryBackingDomainPath(def, cfg, &domainPath) < 0)
2008
        return -1;
2009

2010
    *memPath = g_strdup_printf("%s/%s", domainPath, alias);
2011
    return 0;
2012
}