qemu_driver.c 401.8 KB
Newer Older
D
Daniel P. Berrange 已提交
1 2 3
/*
 * driver.c: core driver methods for managing qemu guests
 *
4
 * Copyright (C) 2006, 2007, 2008, 2009, 2010 Red Hat, Inc.
D
Daniel P. Berrange 已提交
5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
 * Copyright (C) 2006 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this library; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307  USA
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 */

24
#include <config.h>
25

D
Daniel P. Berrange 已提交
26 27
#include <sys/types.h>
#include <sys/poll.h>
28
#include <sys/time.h>
D
Daniel P. Berrange 已提交
29 30 31
#include <dirent.h>
#include <limits.h>
#include <string.h>
32
#include <stdbool.h>
D
Daniel P. Berrange 已提交
33 34 35 36 37
#include <stdio.h>
#include <stdarg.h>
#include <stdlib.h>
#include <unistd.h>
#include <errno.h>
38
#include <sys/utsname.h>
39 40 41 42
#include <sys/stat.h>
#include <fcntl.h>
#include <signal.h>
#include <paths.h>
43
#include <pwd.h>
44
#include <grp.h>
45
#include <stdio.h>
46
#include <sys/wait.h>
47
#include <sys/ioctl.h>
48
#include <sys/un.h>
D
Daniel P. Berrange 已提交
49

50

51
#include "virterror_internal.h"
52
#include "logging.h"
53
#include "datatypes.h"
54 55
#include "qemu_driver.h"
#include "qemu_conf.h"
56
#include "qemu_capabilities.h"
57
#include "qemu_command.h"
58
#include "qemu_monitor.h"
59
#include "qemu_bridge_filter.h"
60
#include "qemu_audit.h"
J
Jim Meyering 已提交
61
#include "c-ctype.h"
62
#include "event.h"
63
#include "buf.h"
64
#include "util.h"
65
#include "nodeinfo.h"
66
#include "stats_linux.h"
67
#include "capabilities.h"
68
#include "memory.h"
69
#include "uuid.h"
70
#include "domain_conf.h"
71 72
#include "node_device_conf.h"
#include "pci.h"
73
#include "hostusb.h"
74
#include "processinfo.h"
75 76
#include "qemu_security_stacked.h"
#include "qemu_security_dac.h"
77
#include "cgroup.h"
C
Chris Lalancette 已提交
78
#include "libvirt_internal.h"
79
#include "xml.h"
80
#include "cpu/cpu.h"
81
#include "macvtap.h"
82
#include "sysinfo.h"
83
#include "domain_nwfilter.h"
84
#include "hooks.h"
85
#include "storage_file.h"
86
#include "files.h"
87
#include "fdstream.h"
88
#include "configmake.h"
H
Hu Tao 已提交
89
#include "threadpool.h"
90

91 92
#define VIR_FROM_THIS VIR_FROM_QEMU

93 94 95
#define QEMU_VNC_PORT_MIN  5900
#define QEMU_VNC_PORT_MAX  65535

96 97
#define QEMU_NB_MEM_PARAM  3

98

99 100
#define timeval_to_ms(tv)       (((tv).tv_sec * 1000ull) + ((tv).tv_usec / 1000))

H
Hu Tao 已提交
101 102 103 104 105 106 107 108
struct watchdogEvent
{
    virDomainObjPtr vm;
    int action;
};

static void processWatchdogEvent(void *data, void *opaque);

109 110
static int qemudShutdown(void);

111 112
static void qemuDriverLock(struct qemud_driver *driver)
{
113
    virMutexLock(&driver->lock);
114 115 116
}
static void qemuDriverUnlock(struct qemud_driver *driver)
{
117
    virMutexUnlock(&driver->lock);
118 119
}

120 121 122
static void qemuDomainEventFlush(int timer, void *opaque);
static void qemuDomainEventQueue(struct qemud_driver *driver,
                                 virDomainEventPtr event);
123

J
Jiri Denemark 已提交
124 125
static int qemudDomainObjStart(virConnectPtr conn,
                               struct qemud_driver *driver,
126 127
                               virDomainObjPtr vm,
                               bool start_paused);
J
Jiri Denemark 已提交
128

129 130
static int qemudStartVMDaemon(virConnectPtr conn,
                              struct qemud_driver *driver,
131
                              virDomainObjPtr vm,
132
                              const char *migrateFrom,
133
                              bool start_paused,
134
                              int stdin_fd,
135 136
                              const char *stdin_path,
                              enum virVMOperationType vmop);
137

138
static void qemudShutdownVMDaemon(struct qemud_driver *driver,
139 140
                                  virDomainObjPtr vm,
                                  int migrated);
141

142
static int qemudDomainGetMaxVcpus(virDomainPtr dom);
143

144
static int qemuDetectVcpuPIDs(struct qemud_driver *driver,
145
                              virDomainObjPtr vm);
146

147 148 149
static int qemuUpdateActivePciHostdevs(struct qemud_driver *driver,
                                       virDomainDefPtr def);

150 151 152
static int qemudVMFiltersInstantiate(virConnectPtr conn,
                                     virDomainDefPtr def);

J
Jim Meyering 已提交
153
static struct qemud_driver *qemu_driver = NULL;
154

155

156 157 158 159 160 161 162 163 164
/*
 * obj must be locked before calling, qemud_driver must NOT be locked
 *
 * This must be called by anything that will change the VM state
 * in any way, or anything that will use the QEMU monitor.
 *
 * Upon successful return, the object will have its ref count increased,
 * successful calls must be followed by EndJob eventually
 */
165 166 167 168

/* Give up waiting for mutex after 30 seconds */
#define QEMU_JOB_WAIT_TIME (1000ull * 30)

169 170 171 172
static int qemuDomainObjBeginJob(virDomainObjPtr obj) ATTRIBUTE_RETURN_CHECK;
static int qemuDomainObjBeginJob(virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;
173 174 175 176
    struct timeval now;
    unsigned long long then;

    if (gettimeofday(&now, NULL) < 0) {
177
        virReportSystemError(errno, "%s",
178 179 180
                             _("cannot get time of day"));
        return -1;
    }
181
    then = timeval_to_ms(now) + QEMU_JOB_WAIT_TIME;
182 183 184 185

    virDomainObjRef(obj);

    while (priv->jobActive) {
186
        if (virCondWaitUntil(&priv->jobCond, &obj->lock, then) < 0) {
187
            virDomainObjUnref(obj);
188
            if (errno == ETIMEDOUT)
189 190
                qemuReportError(VIR_ERR_OPERATION_TIMEOUT,
                                "%s", _("cannot acquire state change lock"));
191
            else
192
                virReportSystemError(errno,
193
                                     "%s", _("cannot acquire job mutex"));
194 195 196
            return -1;
        }
    }
197 198
    priv->jobActive = QEMU_JOB_UNSPECIFIED;
    priv->jobSignals = 0;
199
    memset(&priv->jobSignalsData, 0, sizeof(priv->jobSignalsData));
200
    priv->jobStart = timeval_to_ms(now);
201
    memset(&priv->jobInfo, 0, sizeof(priv->jobInfo));
202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217

    return 0;
}

/*
 * obj must be locked before calling, qemud_driver must be locked
 *
 * This must be called by anything that will change the VM state
 * in any way, or anything that will use the QEMU monitor.
 */
static int qemuDomainObjBeginJobWithDriver(struct qemud_driver *driver,
                                           virDomainObjPtr obj) ATTRIBUTE_RETURN_CHECK;
static int qemuDomainObjBeginJobWithDriver(struct qemud_driver *driver,
                                           virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;
218 219 220 221
    struct timeval now;
    unsigned long long then;

    if (gettimeofday(&now, NULL) < 0) {
222
        virReportSystemError(errno, "%s",
223 224 225
                             _("cannot get time of day"));
        return -1;
    }
226
    then = timeval_to_ms(now) + QEMU_JOB_WAIT_TIME;
227 228 229 230 231

    virDomainObjRef(obj);
    qemuDriverUnlock(driver);

    while (priv->jobActive) {
232
        if (virCondWaitUntil(&priv->jobCond, &obj->lock, then) < 0) {
233
            virDomainObjUnref(obj);
234
            if (errno == ETIMEDOUT)
235 236
                qemuReportError(VIR_ERR_OPERATION_TIMEOUT,
                                "%s", _("cannot acquire state change lock"));
237
            else
238
                virReportSystemError(errno,
239
                                     "%s", _("cannot acquire job mutex"));
M
Matthias Bolte 已提交
240
            qemuDriverLock(driver);
241 242 243
            return -1;
        }
    }
244 245
    priv->jobActive = QEMU_JOB_UNSPECIFIED;
    priv->jobSignals = 0;
246
    memset(&priv->jobSignalsData, 0, sizeof(priv->jobSignalsData));
247
    priv->jobStart = timeval_to_ms(now);
248
    memset(&priv->jobInfo, 0, sizeof(priv->jobInfo));
249 250 251 252 253 254 255 256 257 258 259 260

    virDomainObjUnlock(obj);
    qemuDriverLock(driver);
    virDomainObjLock(obj);

    return 0;
}

/*
 * obj must be locked before calling, qemud_driver does not matter
 *
 * To be called after completing the work associated with the
261
 * earlier qemuDomainBeginJob() call
262 263 264
 *
 * Returns remaining refcount on 'obj', maybe 0 to indicated it
 * was deleted
265
 */
266
static int ATTRIBUTE_RETURN_CHECK qemuDomainObjEndJob(virDomainObjPtr obj)
267 268 269
{
    qemuDomainObjPrivatePtr priv = obj->privateData;

270 271
    priv->jobActive = QEMU_JOB_NONE;
    priv->jobSignals = 0;
272
    memset(&priv->jobSignalsData, 0, sizeof(priv->jobSignalsData));
273 274
    priv->jobStart = 0;
    memset(&priv->jobInfo, 0, sizeof(priv->jobInfo));
275 276
    virCondSignal(&priv->jobCond);

277
    return virDomainObjUnref(obj);
278 279 280 281 282 283 284
}


/*
 * obj must be locked before calling, qemud_driver must be unlocked
 *
 * To be called immediately before any QEMU monitor API call
285 286
 * Must have already called qemuDomainObjBeginJob(), and checked
 * that the VM is still active.
287 288 289
 *
 * To be followed with qemuDomainObjExitMonitor() once complete
 */
290 291 292 293 294
static void qemuDomainObjEnterMonitor(virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;

    qemuMonitorLock(priv->mon);
295
    qemuMonitorRef(priv->mon);
296
    virDomainObjUnlock(obj);
297 298 299
}


300 301
/* obj must NOT be locked before calling, qemud_driver must be unlocked
 *
302
 * Should be paired with an earlier qemuDomainObjEnterMonitor() call
303
 */
304 305 306
static void qemuDomainObjExitMonitor(virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;
307 308 309 310 311 312
    int refs;

    refs = qemuMonitorUnref(priv->mon);

    if (refs > 0)
        qemuMonitorUnlock(priv->mon);
313

314
    virDomainObjLock(obj);
315 316 317 318 319

    if (refs == 0) {
        virDomainObjUnref(obj);
        priv->mon = NULL;
    }
320 321 322 323 324 325 326
}


/*
 * obj must be locked before calling, qemud_driver must be locked
 *
 * To be called immediately before any QEMU monitor API call
327
 * Must have already called qemuDomainObjBeginJob().
328 329 330 331 332 333 334 335
 *
 * To be followed with qemuDomainObjExitMonitorWithDriver() once complete
 */
static void qemuDomainObjEnterMonitorWithDriver(struct qemud_driver *driver, virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;

    qemuMonitorLock(priv->mon);
336
    qemuMonitorRef(priv->mon);
337 338 339 340 341 342 343 344
    virDomainObjUnlock(obj);
    qemuDriverUnlock(driver);
}


/* obj must NOT be locked before calling, qemud_driver must be unlocked,
 * and will be locked after returning
 *
345
 * Should be paired with an earlier qemuDomainObjEnterMonitorWithDriver() call
346 347 348 349
 */
static void qemuDomainObjExitMonitorWithDriver(struct qemud_driver *driver, virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;
350 351 352 353 354 355
    int refs;

    refs = qemuMonitorUnref(priv->mon);

    if (refs > 0)
        qemuMonitorUnlock(priv->mon);
356 357 358

    qemuDriverLock(driver);
    virDomainObjLock(obj);
359 360 361 362 363

    if (refs == 0) {
        virDomainObjUnref(obj);
        priv->mon = NULL;
    }
364 365
}

366 367 368 369 370 371 372 373 374 375 376 377 378 379 380
static void qemuDomainObjEnterRemoteWithDriver(struct qemud_driver *driver,
                                               virDomainObjPtr obj)
{
    virDomainObjRef(obj);
    virDomainObjUnlock(obj);
    qemuDriverUnlock(driver);
}

static void qemuDomainObjExitRemoteWithDriver(struct qemud_driver *driver,
                                              virDomainObjPtr obj)
{
    qemuDriverLock(driver);
    virDomainObjLock(obj);
    virDomainObjUnref(obj);
}
381

H
Hu Tao 已提交
382 383 384 385 386 387 388 389 390 391 392 393 394 395 396
static int doStartCPUs(struct qemud_driver *driver, virDomainObjPtr vm, virConnectPtr conn)
{
    int ret;
    qemuDomainObjPrivatePtr priv = vm->privateData;

    qemuDomainObjEnterMonitorWithDriver(driver, vm);
    ret = qemuMonitorStartCPUs(priv->mon, conn);
    if (ret == 0) {
        vm->state = VIR_DOMAIN_RUNNING;
    }
    qemuDomainObjExitMonitorWithDriver(driver, vm);

    return ret;
}

H
Hu Tao 已提交
397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412
static int doStopCPUs(struct qemud_driver *driver, virDomainObjPtr vm)
{
    int ret;
    int oldState = vm->state;
    qemuDomainObjPrivatePtr priv = vm->privateData;

    vm->state = VIR_DOMAIN_PAUSED;
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
    ret = qemuMonitorStopCPUs(priv->mon);
    qemuDomainObjExitMonitorWithDriver(driver, vm);
    if (ret < 0) {
        vm->state = oldState;
    }
    return ret;
}

413 414 415 416 417
static int qemuCgroupControllerActive(struct qemud_driver *driver,
                                      int controller)
{
    if (driver->cgroup == NULL)
        return 0;
L
Lai Jiangshan 已提交
418 419
    if (!virCgroupMounted(driver->cgroup, controller))
        return 0;
420 421 422 423
    if (driver->cgroupControllers & (1 << controller))
        return 1;
    return 0;
}
424

425
static int
426
qemudLogFD(struct qemud_driver *driver, const char* name, bool append)
427 428 429
{
    char logfile[PATH_MAX];
    mode_t logmode;
G
Guido Günther 已提交
430
    int ret, fd = -1;
431

432 433
    if ((ret = snprintf(logfile, sizeof(logfile), "%s/%s.log",
                        driver->logDir, name))
G
Guido Günther 已提交
434
        < 0 || ret >= sizeof(logfile)) {
435
        virReportOOMError();
436 437 438 439
        return -1;
    }

    logmode = O_CREAT | O_WRONLY;
440
    /* Only logrotate files in /var/log, so only append if running privileged */
441
    if (driver->privileged || append)
442
        logmode |= O_APPEND;
443 444 445
    else
        logmode |= O_TRUNC;

446
    if ((fd = open(logfile, logmode, S_IRUSR | S_IWUSR)) < 0) {
447
        virReportSystemError(errno,
448 449
                             _("failed to create logfile %s"),
                             logfile);
450 451
        return -1;
    }
452
    if (virSetCloseExec(fd) < 0) {
453
        virReportSystemError(errno, "%s",
454
                             _("Unable to set VM logfile close-on-exec flag"));
455
        VIR_FORCE_CLOSE(fd);
456 457 458 459 460 461
        return -1;
    }
    return fd;
}


462
static int
463
qemudLogReadFD(const char* logDir, const char* name, off_t pos)
464 465 466 467 468 469 470
{
    char logfile[PATH_MAX];
    mode_t logmode = O_RDONLY;
    int ret, fd = -1;

    if ((ret = snprintf(logfile, sizeof(logfile), "%s/%s.log", logDir, name))
        < 0 || ret >= sizeof(logfile)) {
471 472 473
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("failed to build logfile name %s/%s.log"),
                        logDir, name);
474 475 476 477 478
        return -1;
    }


    if ((fd = open(logfile, logmode)) < 0) {
479
        virReportSystemError(errno,
480 481
                             _("failed to create logfile %s"),
                             logfile);
482 483
        return -1;
    }
484
    if (virSetCloseExec(fd) < 0) {
485
        virReportSystemError(errno, "%s",
486
                             _("Unable to set VM logfile close-on-exec flag"));
487
        VIR_FORCE_CLOSE(fd);
488 489
        return -1;
    }
490
    if (pos < 0 || lseek(fd, pos, SEEK_SET) < 0) {
491
        virReportSystemError(pos < 0 ? 0 : errno,
492 493
                             _("Unable to seek to %lld in %s"),
                             (long long) pos, logfile);
494
        VIR_FORCE_CLOSE(fd);
495 496 497 498 499
    }
    return fd;
}


500 501 502 503 504 505 506 507 508
struct qemuAutostartData {
    struct qemud_driver *driver;
    virConnectPtr conn;
};
static void
qemuAutostartDomain(void *payload, const char *name ATTRIBUTE_UNUSED, void *opaque)
{
    virDomainObjPtr vm = payload;
    struct qemuAutostartData *data = opaque;
509
    virErrorPtr err;
510 511

    virDomainObjLock(vm);
512 513 514 515 516 517 518 519 520
    virResetLastError();
    if (qemuDomainObjBeginJobWithDriver(data->driver, vm) < 0) {
        err = virGetLastError();
        VIR_ERROR(_("Failed to start job on VM '%s': %s"),
                  vm->def->name,
                  err ? err->message : _("unknown error"));
    } else {
        if (vm->autostart &&
            !virDomainObjIsActive(vm) &&
521
            qemudDomainObjStart(data->conn, data->driver, vm, false) < 0) {
522
            err = virGetLastError();
523
            VIR_ERROR(_("Failed to autostart VM '%s': %s"),
524
                      vm->def->name,
525
                      err ? err->message : _("unknown error"));
526
        }
527 528 529

        if (qemuDomainObjEndJob(vm) == 0)
            vm = NULL;
530
    }
531 532 533

    if (vm)
        virDomainObjUnlock(vm);
534 535
}

536 537
static void
qemudAutostartConfigs(struct qemud_driver *driver) {
538 539 540 541 542
    /* XXX: Figure out a better way todo this. The domain
     * startup code needs a connection handle in order
     * to lookup the bridge associated with a virtual
     * network
     */
543 544 545
    virConnectPtr conn = virConnectOpen(driver->privileged ?
                                        "qemu:///system" :
                                        "qemu:///session");
546
    /* Ignoring NULL conn which is mostly harmless here */
547
    struct qemuAutostartData data = { driver, conn };
548

549
    qemuDriverLock(driver);
550
    virHashForEach(driver->domains.objs, qemuAutostartDomain, &data);
551
    qemuDriverUnlock(driver);
552

553 554
    if (conn)
        virConnectClose(conn);
555 556
}

557 558 559 560 561 562 563 564 565

/**
 * qemudRemoveDomainStatus
 *
 * remove all state files of a domain from statedir
 *
 * Returns 0 on success
 */
static int
566
qemudRemoveDomainStatus(struct qemud_driver *driver,
567 568
                        virDomainObjPtr vm)
{
569
    char ebuf[1024];
570 571 572
    char *file = NULL;

    if (virAsprintf(&file, "%s/%s.xml", driver->stateDir, vm->def->name) < 0) {
573
        virReportOOMError();
D
Daniel Veillard 已提交
574
        return(-1);
575 576
    }

577
    if (unlink(file) < 0 && errno != ENOENT && errno != ENOTDIR)
578
        VIR_WARN("Failed to remove domain XML for %s: %s",
D
Daniel Veillard 已提交
579 580 581
                 vm->def->name, virStrerror(errno, ebuf, sizeof(ebuf)));
    VIR_FREE(file);

582
    if (virFileDeletePid(driver->stateDir, vm->def->name) != 0)
583
        VIR_WARN("Failed to remove PID file for %s: %s",
584
                 vm->def->name, virStrerror(errno, ebuf, sizeof(ebuf)));
585

D
Daniel Veillard 已提交
586

587
    return 0;
588 589
}

590 591 592 593 594 595 596 597 598 599 600 601 602

/*
 * This is a callback registered with a qemuMonitorPtr  instance,
 * and to be invoked when the monitor console hits an end of file
 * condition, or error, thus indicating VM shutdown should be
 * performed
 */
static void
qemuHandleMonitorEOF(qemuMonitorPtr mon ATTRIBUTE_UNUSED,
                     virDomainObjPtr vm,
                     int hasError) {
    struct qemud_driver *driver = qemu_driver;
    virDomainEventPtr event = NULL;
603
    qemuDomainObjPrivatePtr priv;
604

605
    VIR_DEBUG("Received EOF on %p '%s'", vm, vm->def->name);
606

607 608
    virDomainObjLock(vm);

609 610 611 612 613 614 615
    priv = vm->privateData;
    if (!hasError && priv->monJSON && !priv->gotShutdown) {
        VIR_DEBUG("Monitor connection to '%s' closed without SHUTDOWN event; "
                  "assuming the domain crashed", vm->def->name);
        hasError = 1;
    }

616 617 618 619 620 621
    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STOPPED,
                                     hasError ?
                                     VIR_DOMAIN_EVENT_STOPPED_FAILED :
                                     VIR_DOMAIN_EVENT_STOPPED_SHUTDOWN);

622
    qemudShutdownVMDaemon(driver, vm, 0);
623 624
    qemuDomainStopAudit(vm, hasError ? "failed" : "shutdown");

625 626 627 628 629 630 631 632 633 634 635 636 637
    if (!vm->persistent)
        virDomainRemoveInactive(&driver->domains, vm);
    else
        virDomainObjUnlock(vm);

    if (event) {
        qemuDriverLock(driver);
        qemuDomainEventQueue(driver, event);
        qemuDriverUnlock(driver);
    }
}


638 639 640
static virDomainDiskDefPtr
findDomainDiskByPath(virDomainObjPtr vm,
                     const char *path)
641 642 643 644 645 646 647
{
    int i;

    for (i = 0; i < vm->def->ndisks; i++) {
        virDomainDiskDefPtr disk;

        disk = vm->def->disks[i];
648 649
        if (disk->src != NULL && STREQ(disk->src, path))
            return disk;
650
    }
651 652 653 654

    qemuReportError(VIR_ERR_INTERNAL_ERROR,
                    _("no disk found with path %s"),
                    path);
655 656 657
    return NULL;
}

658 659 660 661 662 663
static virDomainDiskDefPtr
findDomainDiskByAlias(virDomainObjPtr vm,
                      const char *alias)
{
    int i;

664 665 666
    if (STRPREFIX(alias, QEMU_DRIVE_HOST_PREFIX))
        alias += strlen(QEMU_DRIVE_HOST_PREFIX);

667 668 669 670 671 672 673 674 675 676 677 678 679 680
    for (i = 0; i < vm->def->ndisks; i++) {
        virDomainDiskDefPtr disk;

        disk = vm->def->disks[i];
        if (disk->info.alias != NULL && STREQ(disk->info.alias, alias))
            return disk;
    }

    qemuReportError(VIR_ERR_INTERNAL_ERROR,
                    _("no disk found with alias %s"),
                    alias);
    return NULL;
}

681
static int
682 683 684 685
getVolumeQcowPassphrase(virConnectPtr conn,
                        virDomainDiskDefPtr disk,
                        char **secretRet,
                        size_t *secretLen)
686 687 688 689 690
{
    virSecretPtr secret;
    char *passphrase;
    unsigned char *data;
    size_t size;
691
    int ret = -1;
692
    virStorageEncryptionPtr enc;
693

694 695 696 697 698 699 700
    if (!disk->encryption) {
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("disk %s does not have any encryption information"),
                        disk->src);
        return -1;
    }
    enc = disk->encryption;
701 702

    if (!conn) {
703
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
704
                        "%s", _("cannot find secrets without a connection"));
705
        goto cleanup;
706 707 708 709 710
    }

    if (conn->secretDriver == NULL ||
        conn->secretDriver->lookupByUUID == NULL ||
        conn->secretDriver->getValue == NULL) {
711 712
        qemuReportError(VIR_ERR_NO_SUPPORT, "%s",
                        _("secret storage not supported"));
713
        goto cleanup;
714 715 716 717 718 719
    }

    if (enc->format != VIR_STORAGE_ENCRYPTION_FORMAT_QCOW ||
        enc->nsecrets != 1 ||
        enc->secrets[0]->type !=
        VIR_STORAGE_ENCRYPTION_SECRET_TYPE_PASSPHRASE) {
720
        qemuReportError(VIR_ERR_INVALID_DOMAIN,
721
                        _("invalid <encryption> for volume %s"), disk->src);
722
        goto cleanup;
723 724 725 726 727
    }

    secret = conn->secretDriver->lookupByUUID(conn,
                                              enc->secrets[0]->uuid);
    if (secret == NULL)
728
        goto cleanup;
729 730 731 732
    data = conn->secretDriver->getValue(secret, &size,
                                        VIR_SECRET_GET_VALUE_INTERNAL_CALL);
    virUnrefSecret(secret);
    if (data == NULL)
733
        goto cleanup;
734 735 736 737

    if (memchr(data, '\0', size) != NULL) {
        memset(data, 0, size);
        VIR_FREE(data);
738 739
        qemuReportError(VIR_ERR_INVALID_SECRET,
                        _("format='qcow' passphrase for %s must not contain a "
740
                          "'\\0'"), disk->src);
741
        goto cleanup;
742 743 744 745 746
    }

    if (VIR_ALLOC_N(passphrase, size + 1) < 0) {
        memset(data, 0, size);
        VIR_FREE(data);
747
        virReportOOMError();
748
        goto cleanup;
749 750 751 752 753 754 755 756 757 758
    }
    memcpy(passphrase, data, size);
    passphrase[size] = '\0';

    memset(data, 0, size);
    VIR_FREE(data);

    *secretRet = passphrase;
    *secretLen = size;

759 760 761
    ret = 0;

cleanup:
762 763
    return ret;
}
764

765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785
static int
findVolumeQcowPassphrase(qemuMonitorPtr mon ATTRIBUTE_UNUSED,
                         virConnectPtr conn,
                         virDomainObjPtr vm,
                         const char *path,
                         char **secretRet,
                         size_t *secretLen)
{
    virDomainDiskDefPtr disk;
    int ret = -1;

    virDomainObjLock(vm);
    disk = findDomainDiskByPath(vm, path);

    if (!disk)
        goto cleanup;

    ret = getVolumeQcowPassphrase(conn, disk, secretRet, secretLen);

cleanup:
    virDomainObjUnlock(vm);
786
    return ret;
787 788
}

789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810

static int
qemuHandleDomainReset(qemuMonitorPtr mon ATTRIBUTE_UNUSED,
                      virDomainObjPtr vm)
{
    struct qemud_driver *driver = qemu_driver;
    virDomainEventPtr event;

    virDomainObjLock(vm);
    event = virDomainEventRebootNewFromObj(vm);
    virDomainObjUnlock(vm);

    if (event) {
        qemuDriverLock(driver);
        qemuDomainEventQueue(driver, event);
        qemuDriverUnlock(driver);
    }

    return 0;
}


811 812 813 814 815 816 817 818 819 820 821 822
static int
qemuHandleDomainShutdown(qemuMonitorPtr mon ATTRIBUTE_UNUSED,
                         virDomainObjPtr vm)
{
    virDomainObjLock(vm);
    ((qemuDomainObjPrivatePtr) vm->privateData)->gotShutdown = true;
    virDomainObjUnlock(vm);

    return 0;
}


823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854
static int
qemuHandleDomainStop(qemuMonitorPtr mon ATTRIBUTE_UNUSED,
                     virDomainObjPtr vm)
{
    struct qemud_driver *driver = qemu_driver;
    virDomainEventPtr event = NULL;

    virDomainObjLock(vm);
    if (vm->state == VIR_DOMAIN_RUNNING) {
        VIR_DEBUG("Transitioned guest %s to paused state due to unknown event", vm->def->name);

        vm->state = VIR_DOMAIN_PAUSED;
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_SUSPENDED,
                                         VIR_DOMAIN_EVENT_SUSPENDED_PAUSED);

        if (virDomainSaveStatus(driver->caps, driver->stateDir, vm) < 0)
            VIR_WARN("Unable to save status on vm %s after IO error", vm->def->name);
    }
    virDomainObjUnlock(vm);

    if (event) {
        qemuDriverLock(driver);
        if (event)
            qemuDomainEventQueue(driver, event);
        qemuDriverUnlock(driver);
    }

    return 0;
}


855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883
static int
qemuHandleDomainRTCChange(qemuMonitorPtr mon ATTRIBUTE_UNUSED,
                          virDomainObjPtr vm,
                          long long offset)
{
    struct qemud_driver *driver = qemu_driver;
    virDomainEventPtr event;

    virDomainObjLock(vm);
    event = virDomainEventRTCChangeNewFromObj(vm, offset);

    if (vm->def->clock.offset == VIR_DOMAIN_CLOCK_OFFSET_VARIABLE)
        vm->def->clock.data.adjustment = offset;

    if (virDomainSaveStatus(driver->caps, driver->stateDir, vm) < 0)
        VIR_WARN0("unable to save domain status with RTC change");

    virDomainObjUnlock(vm);

    if (event) {
        qemuDriverLock(driver);
        qemuDomainEventQueue(driver, event);
        qemuDriverUnlock(driver);
    }

    return 0;
}


884 885 886 887 888 889
static int
qemuHandleDomainWatchdog(qemuMonitorPtr mon ATTRIBUTE_UNUSED,
                         virDomainObjPtr vm,
                         int action)
{
    struct qemud_driver *driver = qemu_driver;
890 891
    virDomainEventPtr watchdogEvent = NULL;
    virDomainEventPtr lifecycleEvent = NULL;
892 893

    virDomainObjLock(vm);
894 895 896 897 898 899 900 901 902 903 904 905 906 907
    watchdogEvent = virDomainEventWatchdogNewFromObj(vm, action);

    if (action == VIR_DOMAIN_EVENT_WATCHDOG_PAUSE &&
        vm->state == VIR_DOMAIN_RUNNING) {
        VIR_DEBUG("Transitioned guest %s to paused state due to watchdog", vm->def->name);

        vm->state = VIR_DOMAIN_PAUSED;
        lifecycleEvent = virDomainEventNewFromObj(vm,
                                                  VIR_DOMAIN_EVENT_SUSPENDED,
                                                  VIR_DOMAIN_EVENT_SUSPENDED_WATCHDOG);

        if (virDomainSaveStatus(driver->caps, driver->stateDir, vm) < 0)
            VIR_WARN("Unable to save status on vm %s after IO error", vm->def->name);
    }
H
Hu Tao 已提交
908 909 910 911 912 913 914 915 916 917 918

    if (vm->def->watchdog->action == VIR_DOMAIN_WATCHDOG_ACTION_DUMP) {
        struct watchdogEvent *wdEvent;
        if (VIR_ALLOC(wdEvent) == 0) {
            wdEvent->action = VIR_DOMAIN_WATCHDOG_ACTION_DUMP;
            wdEvent->vm = vm;
            ignore_value(virThreadPoolSendJob(driver->workerPool, wdEvent));
        } else
            virReportOOMError();
    }

919 920
    virDomainObjUnlock(vm);

921
    if (watchdogEvent || lifecycleEvent) {
922
        qemuDriverLock(driver);
923 924 925 926
        if (watchdogEvent)
            qemuDomainEventQueue(driver, watchdogEvent);
        if (lifecycleEvent)
            qemuDomainEventQueue(driver, lifecycleEvent);
927 928 929 930 931 932 933
        qemuDriverUnlock(driver);
    }

    return 0;
}


934 935 936 937
static int
qemuHandleDomainIOError(qemuMonitorPtr mon ATTRIBUTE_UNUSED,
                        virDomainObjPtr vm,
                        const char *diskAlias,
938 939
                        int action,
                        const char *reason)
940 941
{
    struct qemud_driver *driver = qemu_driver;
942
    virDomainEventPtr ioErrorEvent = NULL;
943
    virDomainEventPtr ioErrorEvent2 = NULL;
944
    virDomainEventPtr lifecycleEvent = NULL;
945 946 947 948 949 950 951 952 953 954 955 956 957 958 959
    const char *srcPath;
    const char *devAlias;
    virDomainDiskDefPtr disk;

    virDomainObjLock(vm);
    disk = findDomainDiskByAlias(vm, diskAlias);

    if (disk) {
        srcPath = disk->src;
        devAlias = disk->info.alias;
    } else {
        srcPath = "";
        devAlias = "";
    }

960
    ioErrorEvent = virDomainEventIOErrorNewFromObj(vm, srcPath, devAlias, action);
961
    ioErrorEvent2 = virDomainEventIOErrorReasonNewFromObj(vm, srcPath, devAlias, action, reason);
962 963 964 965 966 967 968 969 970 971 972 973 974

    if (action == VIR_DOMAIN_EVENT_IO_ERROR_PAUSE &&
        vm->state == VIR_DOMAIN_RUNNING) {
        VIR_DEBUG("Transitioned guest %s to paused state due to IO error", vm->def->name);

        vm->state = VIR_DOMAIN_PAUSED;
        lifecycleEvent = virDomainEventNewFromObj(vm,
                                                  VIR_DOMAIN_EVENT_SUSPENDED,
                                                  VIR_DOMAIN_EVENT_SUSPENDED_IOERROR);

        if (virDomainSaveStatus(driver->caps, driver->stateDir, vm) < 0)
            VIR_WARN("Unable to save status on vm %s after IO error", vm->def->name);
    }
975 976
    virDomainObjUnlock(vm);

977
    if (ioErrorEvent || ioErrorEvent2 || lifecycleEvent) {
978
        qemuDriverLock(driver);
979 980
        if (ioErrorEvent)
            qemuDomainEventQueue(driver, ioErrorEvent);
981 982
        if (ioErrorEvent2)
            qemuDomainEventQueue(driver, ioErrorEvent2);
983 984
        if (lifecycleEvent)
            qemuDomainEventQueue(driver, lifecycleEvent);
985 986 987 988 989 990 991
        qemuDriverUnlock(driver);
    }

    return 0;
}


992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083
static int
qemuHandleDomainGraphics(qemuMonitorPtr mon ATTRIBUTE_UNUSED,
                         virDomainObjPtr vm,
                         int phase,
                         int localFamily,
                         const char *localNode,
                         const char *localService,
                         int remoteFamily,
                         const char *remoteNode,
                         const char *remoteService,
                         const char *authScheme,
                         const char *x509dname,
                         const char *saslUsername)
{
    struct qemud_driver *driver = qemu_driver;
    virDomainEventPtr event;
    virDomainEventGraphicsAddressPtr localAddr = NULL;
    virDomainEventGraphicsAddressPtr remoteAddr = NULL;
    virDomainEventGraphicsSubjectPtr subject = NULL;
    int i;

    virDomainObjLock(vm);

    if (VIR_ALLOC(localAddr) < 0)
        goto no_memory;
    localAddr->family = localFamily;
    if (!(localAddr->service = strdup(localService)) ||
        !(localAddr->node = strdup(localNode)))
        goto no_memory;

    if (VIR_ALLOC(remoteAddr) < 0)
        goto no_memory;
    remoteAddr->family = remoteFamily;
    if (!(remoteAddr->service = strdup(remoteService)) ||
        !(remoteAddr->node = strdup(remoteNode)))
        goto no_memory;

    if (VIR_ALLOC(subject) < 0)
        goto no_memory;
    if (x509dname) {
        if (VIR_REALLOC_N(subject->identities, subject->nidentity+1) < 0)
            goto no_memory;
        if (!(subject->identities[subject->nidentity].type = strdup("x509dname")) ||
            !(subject->identities[subject->nidentity].name = strdup(x509dname)))
            goto no_memory;
        subject->nidentity++;
    }
    if (saslUsername) {
        if (VIR_REALLOC_N(subject->identities, subject->nidentity+1) < 0)
            goto no_memory;
        if (!(subject->identities[subject->nidentity].type = strdup("saslUsername")) ||
            !(subject->identities[subject->nidentity].name = strdup(saslUsername)))
            goto no_memory;
        subject->nidentity++;
    }

    event = virDomainEventGraphicsNewFromObj(vm, phase, localAddr, remoteAddr, authScheme, subject);
    virDomainObjUnlock(vm);

    if (event) {
        qemuDriverLock(driver);
        qemuDomainEventQueue(driver, event);
        qemuDriverUnlock(driver);
    }

    return 0;

no_memory:
    virReportOOMError();
    if (localAddr) {
        VIR_FREE(localAddr->service);
        VIR_FREE(localAddr->node);
        VIR_FREE(localAddr);
    }
    if (remoteAddr) {
        VIR_FREE(remoteAddr->service);
        VIR_FREE(remoteAddr->node);
        VIR_FREE(remoteAddr);
    }
    if (subject) {
        for (i = 0 ; i < subject->nidentity ; i++) {
            VIR_FREE(subject->identities[i].type);
            VIR_FREE(subject->identities[i].name);
        }
        VIR_FREE(subject->identities);
        VIR_FREE(subject);
    }

    return -1;
}


1084 1085 1086 1087 1088 1089 1090 1091 1092
static void qemuHandleMonitorDestroy(qemuMonitorPtr mon,
                                     virDomainObjPtr vm)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    if (priv->mon == mon)
        priv->mon = NULL;
    virDomainObjUnref(vm);
}

1093
static qemuMonitorCallbacks monitorCallbacks = {
1094
    .destroy = qemuHandleMonitorDestroy,
1095 1096
    .eofNotify = qemuHandleMonitorEOF,
    .diskSecretLookup = findVolumeQcowPassphrase,
1097
    .domainShutdown = qemuHandleDomainShutdown,
1098
    .domainStop = qemuHandleDomainStop,
1099
    .domainReset = qemuHandleDomainReset,
1100
    .domainRTCChange = qemuHandleDomainRTCChange,
1101
    .domainWatchdog = qemuHandleDomainWatchdog,
1102
    .domainIOError = qemuHandleDomainIOError,
1103
    .domainGraphics = qemuHandleDomainGraphics,
1104 1105
};

1106
static int
1107
qemuConnectMonitor(struct qemud_driver *driver, virDomainObjPtr vm)
1108
{
1109
    qemuDomainObjPrivatePtr priv = vm->privateData;
1110
    int ret = -1;
1111

1112 1113 1114 1115 1116 1117
    if (driver->securityDriver &&
        driver->securityDriver->domainSetSecuritySocketLabel &&
        driver->securityDriver->domainSetSecuritySocketLabel
          (driver->securityDriver,vm) < 0) {
        VIR_ERROR(_("Failed to set security context for monitor for %s"),
                  vm->def->name);
1118 1119 1120
        goto error;
    }

1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131
    /* Hold an extra reference because we can't allow 'vm' to be
     * deleted while the monitor is active */
    virDomainObjRef(vm);

    priv->mon = qemuMonitorOpen(vm,
                                priv->monConfig,
                                priv->monJSON,
                                &monitorCallbacks);

    if (priv->mon == NULL)
        virDomainObjUnref(vm);
1132

1133 1134 1135 1136 1137 1138
    if (driver->securityDriver &&
        driver->securityDriver->domainClearSecuritySocketLabel &&
        driver->securityDriver->domainClearSecuritySocketLabel
          (driver->securityDriver,vm) < 0) {
        VIR_ERROR(_("Failed to clear security context for monitor for %s"),
                  vm->def->name);
1139
        goto error;
1140
    }
1141

1142 1143 1144 1145 1146 1147
    if (priv->mon == NULL) {
        VIR_INFO("Failed to connect monitor for %s", vm->def->name);
        goto error;
    }


1148 1149 1150 1151
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
    ret = qemuMonitorSetCapabilities(priv->mon);
    qemuDomainObjExitMonitorWithDriver(driver, vm);

1152
error:
1153
    if (ret < 0)
1154 1155 1156
        qemuMonitorClose(priv->mon);

    return ret;
1157
}
1158

1159 1160 1161 1162
struct virReconnectDomainData {
    virConnectPtr conn;
    struct qemud_driver *driver;
};
1163 1164 1165
/*
 * Open an existing VM's monitor, re-detect VCPU threads
 * and re-reserve the security labels in use
1166
 */
1167 1168
static void
qemuReconnectDomain(void *payload, const char *name ATTRIBUTE_UNUSED, void *opaque)
1169
{
1170
    virDomainObjPtr obj = payload;
1171 1172
    struct virReconnectDomainData *data = opaque;
    struct qemud_driver *driver = data->driver;
1173
    qemuDomainObjPrivatePtr priv;
1174
    unsigned long long qemuCmdFlags;
1175
    virConnectPtr conn = data->conn;
1176 1177

    virDomainObjLock(obj);
1178

1179 1180
    VIR_DEBUG("Reconnect monitor to %p '%s'", obj, obj->def->name);

1181 1182
    priv = obj->privateData;

1183
    /* XXX check PID liveliness & EXE path */
1184
    if (qemuConnectMonitor(driver, obj) < 0)
1185
        goto error;
1186

1187 1188 1189 1190
    if (qemuUpdateActivePciHostdevs(driver, obj->def) < 0) {
        goto error;
    }

1191 1192 1193
    /* XXX we should be persisting the original flags in the XML
     * not re-detecting them, since the binary may have changed
     * since launch time */
1194 1195 1196
    if (qemuCapsExtractVersionInfo(obj->def->emulator,
                                   NULL,
                                   &qemuCmdFlags) >= 0 &&
1197
        (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)) {
1198 1199
        priv->persistentAddrs = 1;

1200 1201 1202 1203
        if (!(priv->pciaddrs = qemuDomainPCIAddressSetCreate(obj->def)) ||
            qemuAssignDevicePCISlots(obj->def, priv->pciaddrs) < 0)
            goto error;
    }
1204

1205
    if (driver->securityDriver &&
1206
        driver->securityDriver->domainReserveSecurityLabel &&
1207 1208
        driver->securityDriver->domainReserveSecurityLabel(driver->securityDriver,
                                                           obj) < 0)
1209
        goto error;
1210

1211 1212 1213
    if (qemudVMFiltersInstantiate(conn, obj->def))
        goto error;

1214 1215
    if (obj->def->id >= driver->nextvmid)
        driver->nextvmid = obj->def->id + 1;
1216

1217 1218
    virDomainObjUnlock(obj);
    return;
1219

1220
error:
1221 1222 1223
    /* We can't get the monitor back, so must kill the VM
     * to remove danger of it ending up running twice if
     * user tries to start it again later */
1224
    qemudShutdownVMDaemon(driver, obj, 0);
1225 1226 1227 1228
    if (!obj->persistent)
        virDomainRemoveInactive(&driver->domains, obj);
    else
        virDomainObjUnlock(obj);
1229
}
1230

1231
/**
1232
 * qemudReconnectDomains
1233 1234 1235 1236 1237
 *
 * Try to re-open the resources for live VMs that we care
 * about.
 */
static void
1238
qemuReconnectDomains(virConnectPtr conn, struct qemud_driver *driver)
1239
{
1240 1241
    struct virReconnectDomainData data = {conn, driver};
    virHashForEach(driver->domains.objs, qemuReconnectDomain, &data);
1242 1243
}

1244

1245 1246 1247 1248 1249 1250
static int
qemudSecurityInit(struct qemud_driver *qemud_drv)
{
    int ret;
    virSecurityDriverPtr security_drv;

1251 1252 1253
    qemuSecurityStackedSetDriver(qemud_drv);
    qemuSecurityDACSetDriver(qemud_drv);

1254
    ret = virSecurityDriverStartup(&security_drv,
1255 1256
                                   qemud_drv->securityDriverName,
                                   qemud_drv->allowDiskFormatProbing);
1257 1258 1259 1260
    if (ret == -1) {
        VIR_ERROR0(_("Failed to start security driver"));
        return -1;
    }
1261 1262 1263

    /* No primary security driver wanted to be enabled: just setup
     * the DAC driver on its own */
1264
    if (ret == -2) {
1265
        qemud_drv->securityDriver = &qemuDACSecurityDriver;
1266
        VIR_INFO0(_("No security driver available"));
1267 1268 1269 1270 1271
    } else {
        qemud_drv->securityPrimaryDriver = security_drv;
        qemud_drv->securitySecondaryDriver = &qemuDACSecurityDriver;
        qemud_drv->securityDriver = &qemuStackedSecurityDriver;
        VIR_INFO("Initialized security driver %s", security_drv->name);
1272 1273
    }

1274
    return 0;
1275
}
1276 1277


1278 1279
static virCapsPtr
qemuCreateCapabilities(virCapsPtr oldcaps,
1280
                       struct qemud_driver *driver)
1281 1282 1283 1284
{
    virCapsPtr caps;

    /* Basic host arch / guest machine capabilities */
1285
    if (!(caps = qemuCapsInit(oldcaps))) {
1286
        virReportOOMError();
1287 1288 1289
        return NULL;
    }

1290 1291 1292 1293 1294 1295 1296 1297
    if (driver->allowDiskFormatProbing) {
        caps->defaultDiskDriverName = NULL;
        caps->defaultDiskDriverType = NULL;
    } else {
        caps->defaultDiskDriverName = "qemu";
        caps->defaultDiskDriverType = "raw";
    }

1298 1299
    qemuDomainSetPrivateDataHooks(caps);
    qemuDomainSetNamespaceHooks(caps);
1300

1301 1302 1303 1304 1305
    if (virGetHostUUID(caps->host.host_uuid)) {
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                         "%s", _("cannot get the host uuid"));
        goto err_exit;
    }
1306 1307

    /* Security driver data */
1308
    if (driver->securityPrimaryDriver) {
1309 1310
        const char *doi, *model;

1311 1312
        doi = virSecurityDriverGetDOI(driver->securityPrimaryDriver);
        model = virSecurityDriverGetModel(driver->securityPrimaryDriver);
1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325

        if (!(caps->host.secModel.model = strdup(model)))
            goto no_memory;
        if (!(caps->host.secModel.doi = strdup(doi)))
            goto no_memory;

        VIR_DEBUG("Initialized caps for security driver \"%s\" with "
                  "DOI \"%s\"", model, doi);
    }

    return caps;

no_memory:
1326
    virReportOOMError();
1327
err_exit:
1328 1329 1330
    virCapabilitiesFree(caps);
    return NULL;
}
1331

C
Chris Lalancette 已提交
1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348
static void qemuDomainSnapshotLoad(void *payload,
                                   const char *name ATTRIBUTE_UNUSED,
                                   void *data)
{
    virDomainObjPtr vm = (virDomainObjPtr)payload;
    char *baseDir = (char *)data;
    char *snapDir = NULL;
    DIR *dir = NULL;
    struct dirent *entry;
    char *xmlStr;
    int ret;
    char *fullpath;
    virDomainSnapshotDefPtr def = NULL;
    char ebuf[1024];

    virDomainObjLock(vm);
    if (virAsprintf(&snapDir, "%s/%s", baseDir, vm->def->name) < 0) {
1349
        VIR_ERROR(_("Failed to allocate memory for snapshot directory for domain %s"),
C
Chris Lalancette 已提交
1350 1351 1352 1353 1354 1355 1356 1357 1358
                   vm->def->name);
        goto cleanup;
    }

    VIR_INFO("Scanning for snapshots for domain %s in %s", vm->def->name,
             snapDir);

    if (!(dir = opendir(snapDir))) {
        if (errno != ENOENT)
1359
            VIR_ERROR(_("Failed to open snapshot directory %s for domain %s: %s"),
C
Chris Lalancette 已提交
1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373
                      snapDir, vm->def->name,
                      virStrerror(errno, ebuf, sizeof(ebuf)));
        goto cleanup;
    }

    while ((entry = readdir(dir))) {
        if (entry->d_name[0] == '.')
            continue;

        /* NB: ignoring errors, so one malformed config doesn't
           kill the whole process */
        VIR_INFO("Loading snapshot file '%s'", entry->d_name);

        if (virAsprintf(&fullpath, "%s/%s", snapDir, entry->d_name) < 0) {
1374
            VIR_ERROR0(_("Failed to allocate memory for path"));
C
Chris Lalancette 已提交
1375 1376 1377 1378 1379 1380
            continue;
        }

        ret = virFileReadAll(fullpath, 1024*1024*1, &xmlStr);
        if (ret < 0) {
            /* Nothing we can do here, skip this one */
1381
            VIR_ERROR(_("Failed to read snapshot file %s: %s"), fullpath,
C
Chris Lalancette 已提交
1382
                      virStrerror(errno, ebuf, sizeof(ebuf)));
1383
            VIR_FREE(fullpath);
C
Chris Lalancette 已提交
1384 1385 1386 1387 1388 1389
            continue;
        }

        def = virDomainSnapshotDefParseString(xmlStr, 0);
        if (def == NULL) {
            /* Nothing we can do here, skip this one */
1390
            VIR_ERROR(_("Failed to parse snapshot XML from file '%s'"), fullpath);
1391
            VIR_FREE(fullpath);
C
Chris Lalancette 已提交
1392 1393 1394 1395
            VIR_FREE(xmlStr);
            continue;
        }

1396
        virDomainSnapshotAssignDef(&vm->snapshots, def);
C
Chris Lalancette 已提交
1397

1398
        VIR_FREE(fullpath);
C
Chris Lalancette 已提交
1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419
        VIR_FREE(xmlStr);
    }

    /* FIXME: qemu keeps internal track of snapshots.  We can get access
     * to this info via the "info snapshots" monitor command for running
     * domains, or via "qemu-img snapshot -l" for shutoff domains.  It would
     * be nice to update our internal state based on that, but there is a
     * a problem.  qemu doesn't track all of the same metadata that we do.
     * In particular we wouldn't be able to fill in the <parent>, which is
     * pretty important in our metadata.
     */

    virResetLastError();

cleanup:
    if (dir)
        closedir(dir);
    VIR_FREE(snapDir);
    virDomainObjUnlock(vm);
}

1420 1421 1422 1423 1424 1425
/**
 * qemudStartup:
 *
 * Initialization function for the QEmu daemon
 */
static int
1426
qemudStartup(int privileged) {
1427
    char *base = NULL;
D
Daniel P. Berrange 已提交
1428
    char driverConf[PATH_MAX];
1429
    int rc;
1430
    virConnectPtr conn = NULL;
1431

1432
    if (VIR_ALLOC(qemu_driver) < 0)
1433 1434
        return -1;

1435
    if (virMutexInit(&qemu_driver->lock) < 0) {
1436
        VIR_ERROR0(_("cannot initialize mutex"));
1437 1438 1439
        VIR_FREE(qemu_driver);
        return -1;
    }
1440
    qemuDriverLock(qemu_driver);
1441
    qemu_driver->privileged = privileged;
1442

1443 1444 1445
    /* Don't have a dom0 so start from 1 */
    qemu_driver->nextvmid = 1;

1446 1447 1448
    if (virDomainObjListInit(&qemu_driver->domains) < 0)
        goto out_of_memory;

1449
    /* Init callback list */
1450
    if (VIR_ALLOC(qemu_driver->domainEventCallbacks) < 0)
1451
        goto out_of_memory;
1452 1453 1454 1455 1456 1457
    if (!(qemu_driver->domainEventQueue = virDomainEventQueueNew()))
        goto out_of_memory;

    if ((qemu_driver->domainEventTimer =
         virEventAddTimeout(-1, qemuDomainEventFlush, qemu_driver, NULL)) < 0)
        goto error;
1458

1459 1460 1461 1462 1463
    /* Allocate bitmap for vnc port reservation */
    if ((qemu_driver->reservedVNCPorts =
         virBitmapAlloc(QEMU_VNC_PORT_MAX - QEMU_VNC_PORT_MIN)) == NULL)
        goto out_of_memory;

1464 1465 1466 1467
    /* read the host sysinfo */
    if (privileged)
        qemu_driver->hostsysinfo = virSysinfoRead();

1468
    if (privileged) {
1469
        if (virAsprintf(&qemu_driver->logDir,
1470
                        "%s/log/libvirt/qemu", LOCALSTATEDIR) == -1)
1471
            goto out_of_memory;
1472

1473
        if ((base = strdup (SYSCONFDIR "/libvirt")) == NULL)
1474
            goto out_of_memory;
1475 1476

        if (virAsprintf(&qemu_driver->stateDir,
1477
                      "%s/run/libvirt/qemu", LOCALSTATEDIR) == -1)
1478
            goto out_of_memory;
1479 1480

        if (virAsprintf(&qemu_driver->libDir,
1481
                      "%s/lib/libvirt/qemu", LOCALSTATEDIR) == -1)
1482 1483 1484
            goto out_of_memory;

        if (virAsprintf(&qemu_driver->cacheDir,
1485
                      "%s/cache/libvirt/qemu", LOCALSTATEDIR) == -1)
1486
            goto out_of_memory;
1487
        if (virAsprintf(&qemu_driver->saveDir,
1488
                      "%s/lib/libvirt/qemu/save", LOCALSTATEDIR) == -1)
1489
            goto out_of_memory;
C
Chris Lalancette 已提交
1490
        if (virAsprintf(&qemu_driver->snapshotDir,
1491
                        "%s/lib/libvirt/qemu/snapshot", LOCALSTATEDIR) == -1)
C
Chris Lalancette 已提交
1492
            goto out_of_memory;
H
Hu Tao 已提交
1493 1494 1495
        if (virAsprintf(&qemu_driver->autoDumpPath,
                        "%s/lib/libvirt/qemu/dump", LOCALSTATEDIR) == -1)
            goto out_of_memory;
1496
    } else {
1497
        uid_t uid = geteuid();
1498
        char *userdir = virGetUserDirectory(uid);
1499
        if (!userdir)
1500
            goto error;
1501

1502
        if (virAsprintf(&qemu_driver->logDir,
1503 1504
                        "%s/.libvirt/qemu/log", userdir) == -1) {
            VIR_FREE(userdir);
1505
            goto out_of_memory;
1506
        }
1507

1508 1509
        if (virAsprintf(&base, "%s/.libvirt", userdir) == -1) {
            VIR_FREE(userdir);
1510
            goto out_of_memory;
1511 1512
        }
        VIR_FREE(userdir);
1513 1514 1515

        if (virAsprintf(&qemu_driver->stateDir, "%s/qemu/run", base) == -1)
            goto out_of_memory;
1516 1517 1518 1519
        if (virAsprintf(&qemu_driver->libDir, "%s/qemu/lib", base) == -1)
            goto out_of_memory;
        if (virAsprintf(&qemu_driver->cacheDir, "%s/qemu/cache", base) == -1)
            goto out_of_memory;
1520 1521
        if (virAsprintf(&qemu_driver->saveDir, "%s/qemu/save", base) == -1)
            goto out_of_memory;
C
Chris Lalancette 已提交
1522 1523
        if (virAsprintf(&qemu_driver->snapshotDir, "%s/qemu/snapshot", base) == -1)
            goto out_of_memory;
H
Hu Tao 已提交
1524 1525
        if (virAsprintf(&qemu_driver->autoDumpPath, "%s/qemu/dump", base) == -1)
            goto out_of_memory;
1526 1527
    }

L
Laine Stump 已提交
1528
    if (virFileMakePath(qemu_driver->stateDir) != 0) {
1529
        char ebuf[1024];
1530
        VIR_ERROR(_("Failed to create state dir '%s': %s"),
1531
                  qemu_driver->stateDir, virStrerror(errno, ebuf, sizeof ebuf));
1532
        goto error;
1533
    }
L
Laine Stump 已提交
1534
    if (virFileMakePath(qemu_driver->libDir) != 0) {
1535
        char ebuf[1024];
1536
        VIR_ERROR(_("Failed to create lib dir '%s': %s"),
1537 1538 1539
                  qemu_driver->libDir, virStrerror(errno, ebuf, sizeof ebuf));
        goto error;
    }
L
Laine Stump 已提交
1540
    if (virFileMakePath(qemu_driver->cacheDir) != 0) {
1541
        char ebuf[1024];
1542
        VIR_ERROR(_("Failed to create cache dir '%s': %s"),
1543 1544 1545
                  qemu_driver->cacheDir, virStrerror(errno, ebuf, sizeof ebuf));
        goto error;
    }
1546 1547 1548 1549 1550 1551
    if (virFileMakePath(qemu_driver->saveDir) != 0) {
        char ebuf[1024];
        VIR_ERROR(_("Failed to create save dir '%s': %s"),
                  qemu_driver->saveDir, virStrerror(errno, ebuf, sizeof ebuf));
        goto error;
    }
C
Chris Lalancette 已提交
1552 1553 1554 1555 1556 1557
    if (virFileMakePath(qemu_driver->snapshotDir) != 0) {
        char ebuf[1024];
        VIR_ERROR(_("Failed to create save dir '%s': %s"),
                  qemu_driver->snapshotDir, virStrerror(errno, ebuf, sizeof ebuf));
        goto error;
    }
H
Hu Tao 已提交
1558 1559 1560 1561 1562 1563
    if (virFileMakePath(qemu_driver->autoDumpPath) != 0) {
        char ebuf[1024];
        VIR_ERROR(_("Failed to create dump dir '%s': %s"),
                  qemu_driver->autoDumpPath, virStrerror(errno, ebuf, sizeof ebuf));
        goto error;
    }
1564 1565 1566 1567

    /* Configuration paths are either ~/.libvirt/qemu/... (session) or
     * /etc/libvirt/qemu/... (system).
     */
D
Daniel P. Berrange 已提交
1568
    if (snprintf (driverConf, sizeof(driverConf), "%s/qemu.conf", base) == -1)
1569
        goto out_of_memory;
D
Daniel P. Berrange 已提交
1570
    driverConf[sizeof(driverConf)-1] = '\0';
1571

1572
    if (virAsprintf(&qemu_driver->configDir, "%s/qemu", base) == -1)
1573 1574
        goto out_of_memory;

1575
    if (virAsprintf(&qemu_driver->autostartDir, "%s/qemu/autostart", base) == -1)
1576 1577
        goto out_of_memory;

1578
    VIR_FREE(base);
1579

1580 1581 1582 1583 1584 1585 1586
    rc = virCgroupForDriver("qemu", &qemu_driver->cgroup, privileged, 1);
    if (rc < 0) {
        char buf[1024];
        VIR_WARN("Unable to create cgroup for driver: %s",
                 virStrerror(-rc, buf, sizeof(buf)));
    }

1587 1588 1589 1590
    if (qemudLoadDriverConfig(qemu_driver, driverConf) < 0) {
        goto error;
    }

1591 1592
    if (qemudSecurityInit(qemu_driver) < 0)
        goto error;
D
Daniel P. Berrange 已提交
1593

1594
    if ((qemu_driver->caps = qemuCreateCapabilities(NULL,
1595
                                                    qemu_driver)) == NULL)
1596
        goto error;
1597

1598
    if ((qemu_driver->activePciHostdevs = pciDeviceListNew()) == NULL)
1599 1600
        goto error;

1601 1602
    if (privileged) {
        if (chown(qemu_driver->libDir, qemu_driver->user, qemu_driver->group) < 0) {
1603
            virReportSystemError(errno,
1604 1605 1606 1607 1608
                                 _("unable to set ownership of '%s' to user %d:%d"),
                                 qemu_driver->libDir, qemu_driver->user, qemu_driver->group);
            goto error;
        }
        if (chown(qemu_driver->cacheDir, qemu_driver->user, qemu_driver->group) < 0) {
1609
            virReportSystemError(errno,
1610 1611 1612 1613
                                 _("unable to set ownership of '%s' to %d:%d"),
                                 qemu_driver->cacheDir, qemu_driver->user, qemu_driver->group);
            goto error;
        }
1614 1615 1616 1617 1618 1619
        if (chown(qemu_driver->saveDir, qemu_driver->user, qemu_driver->group) < 0) {
            virReportSystemError(errno,
                                 _("unable to set ownership of '%s' to %d:%d"),
                                 qemu_driver->saveDir, qemu_driver->user, qemu_driver->group);
            goto error;
        }
C
Chris Lalancette 已提交
1620 1621 1622 1623 1624 1625
        if (chown(qemu_driver->snapshotDir, qemu_driver->user, qemu_driver->group) < 0) {
            virReportSystemError(errno,
                                 _("unable to set ownership of '%s' to %d:%d"),
                                 qemu_driver->snapshotDir, qemu_driver->user, qemu_driver->group);
            goto error;
        }
1626 1627
    }

1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641
    /* If hugetlbfs is present, then we need to create a sub-directory within
     * it, since we can't assume the root mount point has permissions that
     * will let our spawned QEMU instances use it.
     *
     * NB the check for '/', since user may config "" to disable hugepages
     * even when mounted
     */
    if (qemu_driver->hugetlbfs_mount &&
        qemu_driver->hugetlbfs_mount[0] == '/') {
        char *mempath = NULL;
        if (virAsprintf(&mempath, "%s/libvirt/qemu", qemu_driver->hugetlbfs_mount) < 0)
            goto out_of_memory;

        if ((rc = virFileMakePath(mempath)) != 0) {
1642
            virReportSystemError(rc,
1643 1644 1645 1646 1647 1648
                                 _("unable to create hugepage path %s"), mempath);
            VIR_FREE(mempath);
            goto error;
        }
        if (qemu_driver->privileged &&
            chown(mempath, qemu_driver->user, qemu_driver->group) < 0) {
1649
            virReportSystemError(errno,
1650 1651 1652 1653 1654 1655 1656 1657 1658
                                 _("unable to set ownership on %s to %d:%d"),
                                 mempath, qemu_driver->user, qemu_driver->group);
            VIR_FREE(mempath);
            goto error;
        }

        qemu_driver->hugepage_path = mempath;
    }

1659
    /* Get all the running persistent or transient configs first */
1660
    if (virDomainLoadAllConfigs(qemu_driver->caps,
1661 1662 1663 1664 1665 1666
                                &qemu_driver->domains,
                                qemu_driver->stateDir,
                                NULL,
                                1, NULL, NULL) < 0)
        goto error;

1667 1668 1669 1670 1671
    conn = virConnectOpen(qemu_driver->privileged ?
                          "qemu:///system" :
                          "qemu:///session");

    qemuReconnectDomains(conn, qemu_driver);
1672 1673

    /* Then inactive persistent configs */
1674
    if (virDomainLoadAllConfigs(qemu_driver->caps,
1675 1676
                                &qemu_driver->domains,
                                qemu_driver->configDir,
1677
                                qemu_driver->autostartDir,
1678
                                0, NULL, NULL) < 0)
1679
        goto error;
C
Chris Lalancette 已提交
1680 1681 1682 1683 1684


    virHashForEach(qemu_driver->domains.objs, qemuDomainSnapshotLoad,
                   qemu_driver->snapshotDir);

1685 1686
    qemuDriverUnlock(qemu_driver);

1687 1688
    qemudAutostartConfigs(qemu_driver);

H
Hu Tao 已提交
1689 1690 1691 1692
    qemu_driver->workerPool = virThreadPoolNew(0, 1, processWatchdogEvent, qemu_driver);
    if (!qemu_driver->workerPool)
        goto error;

1693 1694
    if (conn)
        virConnectClose(conn);
1695

1696 1697
    return 0;

1698
out_of_memory:
1699
    virReportOOMError();
1700 1701 1702
error:
    if (qemu_driver)
        qemuDriverUnlock(qemu_driver);
1703 1704
    if (conn)
        virConnectClose(conn);
1705
    VIR_FREE(base);
1706
    qemudShutdown();
1707 1708 1709
    return -1;
}

1710 1711 1712 1713
static void qemudNotifyLoadDomain(virDomainObjPtr vm, int newVM, void *opaque)
{
    struct qemud_driver *driver = opaque;

1714 1715 1716 1717 1718 1719 1720 1721
    if (newVM) {
        virDomainEventPtr event =
            virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_DEFINED,
                                     VIR_DOMAIN_EVENT_DEFINED_ADDED);
        if (event)
            qemuDomainEventQueue(driver, event);
    }
1722 1723
}

1724 1725 1726 1727 1728 1729 1730 1731
/**
 * qemudReload:
 *
 * Function to restart the QEmu daemon, it will recheck the configuration
 * files and update its state and the networking
 */
static int
qemudReload(void) {
1732 1733 1734
    if (!qemu_driver)
        return 0;

1735
    qemuDriverLock(qemu_driver);
1736
    virDomainLoadAllConfigs(qemu_driver->caps,
1737 1738
                            &qemu_driver->domains,
                            qemu_driver->configDir,
1739
                            qemu_driver->autostartDir,
1740
                            0, qemudNotifyLoadDomain, qemu_driver);
1741
    qemuDriverUnlock(qemu_driver);
1742

1743
    qemudAutostartConfigs(qemu_driver);
1744 1745

    return 0;
1746 1747
}

1748 1749 1750 1751 1752 1753 1754 1755 1756 1757
/**
 * qemudActive:
 *
 * Checks if the QEmu daemon is active, i.e. has an active domain or
 * an active network
 *
 * Returns 1 if active, 0 otherwise
 */
static int
qemudActive(void) {
1758
    int active = 0;
1759

1760 1761 1762
    if (!qemu_driver)
        return 0;

1763
    /* XXX having to iterate here is not great because it requires many locks */
1764
    qemuDriverLock(qemu_driver);
1765
    active = virDomainObjListNumOfDomains(&qemu_driver->domains, 1);
1766 1767
    qemuDriverUnlock(qemu_driver);
    return active;
1768 1769
}

1770 1771 1772 1773 1774 1775 1776
/**
 * qemudShutdown:
 *
 * Shutdown the QEmu daemon, it will stop all active domains and networks
 */
static int
qemudShutdown(void) {
1777
    int i;
1778

1779
    if (!qemu_driver)
1780
        return -1;
1781

1782
    qemuDriverLock(qemu_driver);
1783
    pciDeviceListFree(qemu_driver->activePciHostdevs);
1784 1785
    virCapabilitiesFree(qemu_driver->caps);

1786
    virDomainObjListDeinit(&qemu_driver->domains);
1787
    virBitmapFree(qemu_driver->reservedVNCPorts);
1788

1789 1790
    virSysinfoDefFree(qemu_driver->hostsysinfo);

1791 1792
    VIR_FREE(qemu_driver->configDir);
    VIR_FREE(qemu_driver->autostartDir);
E
Eric Blake 已提交
1793
    VIR_FREE(qemu_driver->logDir);
1794
    VIR_FREE(qemu_driver->stateDir);
1795 1796
    VIR_FREE(qemu_driver->libDir);
    VIR_FREE(qemu_driver->cacheDir);
1797
    VIR_FREE(qemu_driver->saveDir);
C
Chris Lalancette 已提交
1798
    VIR_FREE(qemu_driver->snapshotDir);
H
Hu Tao 已提交
1799
    VIR_FREE(qemu_driver->autoDumpPath);
1800
    VIR_FREE(qemu_driver->vncTLSx509certdir);
J
Jim Meyering 已提交
1801
    VIR_FREE(qemu_driver->vncListen);
1802
    VIR_FREE(qemu_driver->vncPassword);
1803
    VIR_FREE(qemu_driver->vncSASLdir);
E
Eric Blake 已提交
1804 1805 1806
    VIR_FREE(qemu_driver->spiceTLSx509certdir);
    VIR_FREE(qemu_driver->spiceListen);
    VIR_FREE(qemu_driver->spicePassword);
1807 1808
    VIR_FREE(qemu_driver->hugetlbfs_mount);
    VIR_FREE(qemu_driver->hugepage_path);
E
Eric Blake 已提交
1809 1810 1811 1812 1813
    VIR_FREE(qemu_driver->securityDriverName);
    VIR_FREE(qemu_driver->saveImageFormat);
    VIR_FREE(qemu_driver->dumpImageFormat);

    ebtablesContextFree(qemu_driver->ebtables);
D
Daniel P. Berrange 已提交
1814

1815 1816 1817 1818 1819 1820
    if (qemu_driver->cgroupDeviceACL) {
        for (i = 0 ; qemu_driver->cgroupDeviceACL[i] != NULL ; i++)
            VIR_FREE(qemu_driver->cgroupDeviceACL[i]);
        VIR_FREE(qemu_driver->cgroupDeviceACL);
    }

1821 1822
    /* Free domain callback list */
    virDomainEventCallbackListFree(qemu_driver->domainEventCallbacks);
1823 1824 1825 1826
    virDomainEventQueueFree(qemu_driver->domainEventQueue);

    if (qemu_driver->domainEventTimer != -1)
        virEventRemoveTimeout(qemu_driver->domainEventTimer);
1827

1828 1829 1830
    if (qemu_driver->brctl)
        brShutdown(qemu_driver->brctl);

1831 1832
    virCgroupFree(&qemu_driver->cgroup);

1833
    qemuDriverUnlock(qemu_driver);
1834
    virMutexDestroy(&qemu_driver->lock);
H
Hu Tao 已提交
1835
    virThreadPoolFree(qemu_driver->workerPool);
1836
    VIR_FREE(qemu_driver);
1837 1838

    return 0;
1839 1840
}

1841
typedef int qemuLogHandleOutput(virDomainObjPtr vm,
1842 1843
                                const char *output,
                                int fd);
1844 1845 1846 1847 1848

/*
 * Returns -1 for error, 0 on success
 */
static int
1849
qemudReadLogOutput(virDomainObjPtr vm,
1850 1851
                   int fd,
                   char *buf,
G
Guido Günther 已提交
1852
                   size_t buflen,
1853
                   qemuLogHandleOutput func,
1854 1855 1856
                   const char *what,
                   int timeout)
{
1857
    int retries = (timeout*10);
1858
    int got = 0;
1859 1860 1861
    buf[0] = '\0';

    while (retries) {
1862
        ssize_t func_ret, ret;
1863
        int isdead = 0;
G
Guido Günther 已提交
1864

1865
        func_ret = func(vm, buf, fd);
1866

1867 1868
        if (kill(vm->pid, 0) == -1 && errno == ESRCH)
            isdead = 1;
1869

1870 1871
        /* Any failures should be detected before we read the log, so we
         * always have something useful to report on failure. */
1872 1873
        ret = saferead(fd, buf+got, buflen-got-1);
        if (ret < 0) {
1874
            virReportSystemError(errno,
1875 1876 1877 1878 1879
                                 _("Failure while reading %s log output"),
                                 what);
            return -1;
        }

1880 1881 1882
        got += ret;
        buf[got] = '\0';
        if (got == buflen-1) {
1883
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
1884 1885
                            _("Out of space while reading %s log output: %s"),
                            what, buf);
1886 1887 1888 1889
            return -1;
        }

        if (isdead) {
1890
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
1891 1892
                            _("Process exited while reading %s log output: %s"),
                            what, buf);
1893 1894 1895
            return -1;
        }

1896 1897
        if (func_ret <= 0)
            return func_ret;
1898 1899 1900 1901

        usleep(100*1000);
        retries--;
    }
1902

1903
    qemuReportError(VIR_ERR_INTERNAL_ERROR,
1904 1905
                    _("Timed out while reading %s log output: %s"),
                    what, buf);
1906 1907 1908
    return -1;
}

1909

1910 1911 1912 1913 1914 1915 1916 1917
/*
 * Look at a chunk of data from the QEMU stdout logs and try to
 * find a TTY device, as indicated by a line like
 *
 * char device redirected to /dev/pts/3
 *
 * Returns -1 for error, 0 success, 1 continue reading
 */
1918
static int
1919
qemudExtractTTYPath(const char *haystack,
1920 1921
                    size_t *offset,
                    char **path)
1922
{
1923
    static const char needle[] = "char device redirected to";
1924
    char *tmp, *dev;
1925

1926
    VIR_FREE(*path);
1927
    /* First look for our magic string */
1928 1929 1930 1931 1932
    if (!(tmp = strstr(haystack + *offset, needle))) {
        return 1;
    }
    tmp += sizeof(needle);
    dev = tmp;
1933

1934 1935 1936 1937 1938
    /*
     * And look for first whitespace character and nul terminate
     * to mark end of the pty path
     */
    while (*tmp) {
1939
        if (c_isspace(*tmp)) {
1940 1941
            *path = strndup(dev, tmp-dev);
            if (*path == NULL) {
1942
                virReportOOMError();
1943 1944
                return -1;
            }
1945

1946
            /* ... now further update offset till we get EOL */
1947
            *offset = tmp - haystack;
1948 1949
            return 0;
        }
1950
        tmp++;
1951 1952 1953 1954 1955
    }

    /*
     * We found a path, but didn't find any whitespace,
     * so it must be still incomplete - we should at
1956 1957
     * least see a \n - indicate that we want to carry
     * on trying again
1958
     */
1959
    return 1;
1960 1961
}

1962
static int
1963
qemudFindCharDevicePTYsMonitor(virDomainObjPtr vm,
1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978
                               virHashTablePtr paths)
{
    int i;

#define LOOKUP_PTYS(array, arraylen, idprefix)                            \
    for (i = 0 ; i < (arraylen) ; i++) {                                  \
        virDomainChrDefPtr chr = (array)[i];                              \
        if (chr->type == VIR_DOMAIN_CHR_TYPE_PTY) {                       \
            char id[16];                                                  \
                                                                          \
            if (snprintf(id, sizeof(id), idprefix "%i", i) >= sizeof(id)) \
                return -1;                                                \
                                                                          \
            const char *path = (const char *) virHashLookup(paths, id);   \
            if (path == NULL) {                                           \
1979 1980 1981
                if (chr->data.file.path == NULL) {                        \
                    /* neither the log output nor 'info chardev' had a */ \
                    /* pty path for this chardev, report an error */      \
1982 1983 1984
                    qemuReportError(VIR_ERR_INTERNAL_ERROR,               \
                                    _("no assigned pty for device %s"), id); \
                    return -1;                                            \
1985 1986 1987 1988 1989
                } else {                                                  \
                    /* 'info chardev' had no pty path for this chardev, */\
                    /* but the log output had, so we're fine */           \
                    continue;                                             \
                }                                                         \
1990 1991
            }                                                             \
                                                                          \
1992
            VIR_FREE(chr->data.file.path);                                \
1993
            chr->data.file.path = strdup(path);                           \
1994 1995
                                                                          \
            if (chr->data.file.path == NULL) {                            \
1996
                virReportOOMError();                                      \
1997 1998
                return -1;                                                \
            }                                                             \
1999 2000 2001 2002 2003 2004
        }                                                                 \
    }

    LOOKUP_PTYS(vm->def->serials,   vm->def->nserials,   "serial");
    LOOKUP_PTYS(vm->def->parallels, vm->def->nparallels, "parallel");
    LOOKUP_PTYS(vm->def->channels,  vm->def->nchannels,  "channel");
C
Cole Robinson 已提交
2005 2006
    if (vm->def->console)
        LOOKUP_PTYS(&vm->def->console, 1,  "console");
2007
#undef LOOKUP_PTYS
2008 2009 2010 2011

    return 0;
}

2012
static int
2013
qemudFindCharDevicePTYs(virDomainObjPtr vm,
2014 2015
                        const char *output,
                        int fd ATTRIBUTE_UNUSED)
2016
{
2017
    size_t offset = 0;
2018
    int ret, i;
2019 2020

    /* The order in which QEMU prints out the PTY paths is
2021 2022
       the order in which it procsses its serial and parallel
       device args. This code must match that ordering.... */
2023

2024
    /* first comes the serial devices */
2025 2026
    for (i = 0 ; i < vm->def->nserials ; i++) {
        virDomainChrDefPtr chr = vm->def->serials[i];
2027
        if (chr->type == VIR_DOMAIN_CHR_TYPE_PTY) {
2028
            if ((ret = qemudExtractTTYPath(output, &offset,
2029
                                           &chr->data.file.path)) != 0)
2030
                return ret;
2031 2032 2033
        }
    }

2034
    /* then the parallel devices */
2035 2036
    for (i = 0 ; i < vm->def->nparallels ; i++) {
        virDomainChrDefPtr chr = vm->def->parallels[i];
2037
        if (chr->type == VIR_DOMAIN_CHR_TYPE_PTY) {
2038
            if ((ret = qemudExtractTTYPath(output, &offset,
2039
                                           &chr->data.file.path)) != 0)
2040
                return ret;
2041 2042 2043
        }
    }

2044 2045 2046 2047
    /* then the channel devices */
    for (i = 0 ; i < vm->def->nchannels ; i++) {
        virDomainChrDefPtr chr = vm->def->channels[i];
        if (chr->type == VIR_DOMAIN_CHR_TYPE_PTY) {
2048
            if ((ret = qemudExtractTTYPath(output, &offset,
2049 2050 2051 2052 2053
                                           &chr->data.file.path)) != 0)
                return ret;
        }
    }

2054
    return 0;
2055 2056
}

2057 2058 2059 2060 2061
static void qemudFreePtyPath(void *payload, const char *name ATTRIBUTE_UNUSED)
{
    VIR_FREE(payload);
}

2062 2063 2064 2065 2066 2067 2068 2069 2070 2071 2072 2073 2074 2075
static void
qemuReadLogFD(int logfd, char *buf, int maxlen, int off)
{
    int ret;
    char *tmpbuf = buf + off;

    ret = saferead(logfd, tmpbuf, maxlen - off - 1);
    if (ret < 0) {
        ret = 0;
    }

    tmpbuf[ret] = '\0';
}

2076
static int
2077
qemudWaitForMonitor(struct qemud_driver* driver,
2078
                    virDomainObjPtr vm, off_t pos)
2079
{
2080
    char buf[4096] = ""; /* Plenty of space to get startup greeting */
2081
    int logfd;
2082
    int ret = -1;
2083
    virHashTablePtr paths = NULL;
2084

2085
    if ((logfd = qemudLogReadFD(driver->logDir, vm->def->name, pos)) < 0)
2086
        return -1;
2087

2088 2089 2090 2091
    if (qemudReadLogOutput(vm, logfd, buf, sizeof(buf),
                           qemudFindCharDevicePTYs,
                           "console", 30) < 0)
        goto closelog;
2092

2093
    VIR_DEBUG("Connect monitor to %p '%s'", vm, vm->def->name);
2094 2095 2096
    if (qemuConnectMonitor(driver, vm) < 0) {
        goto cleanup;
    }
2097

2098 2099 2100 2101
    /* Try to get the pty path mappings again via the monitor. This is much more
     * reliable if it's available.
     * Note that the monitor itself can be on a pty, so we still need to try the
     * log output method. */
2102
    paths = virHashCreate(0);
2103
    if (paths == NULL) {
2104
        virReportOOMError();
2105 2106 2107
        goto cleanup;
    }

2108
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
2109 2110
    qemuDomainObjPrivatePtr priv = vm->privateData;
    ret = qemuMonitorGetPtyPaths(priv->mon, paths);
2111
    qemuDomainObjExitMonitorWithDriver(driver, vm);
2112 2113 2114

    VIR_DEBUG("qemuMonitorGetPtyPaths returned %i", ret);
    if (ret == 0) {
2115
        ret = qemudFindCharDevicePTYsMonitor(vm, paths);
2116 2117 2118 2119 2120 2121 2122
    }

cleanup:
    if (paths) {
        virHashFree(paths, qemudFreePtyPath);
    }

2123 2124 2125 2126 2127 2128 2129 2130 2131 2132 2133
    if (kill(vm->pid, 0) == -1 && errno == ESRCH) {
        /* VM is dead, any other error raised in the interim is probably
         * not as important as the qemu cmdline output */
        qemuReadLogFD(logfd, buf, sizeof(buf), strlen(buf));
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("process exited while connecting to monitor: %s"),
                        buf);
        ret = -1;
    }

closelog:
2134
    if (VIR_CLOSE(logfd) < 0) {
2135
        char ebuf[4096];
2136
        VIR_WARN("Unable to close logfile: %s",
2137 2138 2139
                 virStrerror(errno, ebuf, sizeof ebuf));
    }

2140
    return ret;
2141 2142
}

2143
static int
2144
qemuDetectVcpuPIDs(struct qemud_driver *driver,
2145 2146 2147
                   virDomainObjPtr vm) {
    pid_t *cpupids = NULL;
    int ncpupids;
2148
    qemuDomainObjPrivatePtr priv = vm->privateData;
2149

2150
    if (vm->def->virtType != VIR_DOMAIN_VIRT_KVM) {
2151 2152
        priv->nvcpupids = 1;
        if (VIR_ALLOC_N(priv->vcpupids, priv->nvcpupids) < 0) {
2153
            virReportOOMError();
2154 2155
            return -1;
        }
2156
        priv->vcpupids[0] = vm->pid;
2157 2158 2159
        return 0;
    }

2160
    /* What follows is now all KVM specific */
2161

2162
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
2163
    if ((ncpupids = qemuMonitorGetCPUInfo(priv->mon, &cpupids)) < 0) {
2164
        qemuDomainObjExitMonitorWithDriver(driver, vm);
2165
        return -1;
2166
    }
2167
    qemuDomainObjExitMonitorWithDriver(driver, vm);
2168

2169 2170 2171
    /* Treat failure to get VCPU<->PID mapping as non-fatal */
    if (ncpupids == 0)
        return 0;
2172

2173
    if (ncpupids != vm->def->vcpus) {
2174
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
E
Eric Blake 已提交
2175 2176 2177
                        _("got wrong number of vCPU pids from QEMU monitor. "
                          "got %d, wanted %d"),
                        ncpupids, vm->def->vcpus);
2178 2179 2180
        VIR_FREE(cpupids);
        return -1;
    }
2181

2182 2183
    priv->nvcpupids = ncpupids;
    priv->vcpupids = cpupids;
2184 2185 2186
    return 0;
}

2187 2188 2189
/*
 * To be run between fork/exec of QEMU only
 */
2190
static int
2191 2192
qemudInitCpuAffinity(virDomainObjPtr vm)
{
2193
    int i, hostcpus, maxcpu = QEMUD_CPUMASK_LEN;
2194
    virNodeInfo nodeinfo;
2195 2196
    unsigned char *cpumap;
    int cpumaplen;
2197 2198

    DEBUG0("Setting CPU affinity");
2199

2200
    if (nodeGetInfo(NULL, &nodeinfo) < 0)
2201 2202 2203 2204
        return -1;

    /* setaffinity fails if you set bits for CPUs which
     * aren't present, so we have to limit ourselves */
2205 2206 2207
    hostcpus = VIR_NODEINFO_MAXCPUS(nodeinfo);
    if (maxcpu > hostcpus)
        maxcpu = hostcpus;
2208

2209 2210
    cpumaplen = VIR_CPU_MAPLEN(maxcpu);
    if (VIR_ALLOC_N(cpumap, cpumaplen) < 0) {
2211
        virReportOOMError();
2212 2213 2214
        return -1;
    }

D
Daniel P. Berrange 已提交
2215
    if (vm->def->cpumask) {
2216 2217 2218
        /* XXX why don't we keep 'cpumask' in the libvirt cpumap
         * format to start with ?!?! */
        for (i = 0 ; i < maxcpu && i < vm->def->cpumasklen ; i++)
D
Daniel P. Berrange 已提交
2219
            if (vm->def->cpumask[i])
2220
                VIR_USE_CPU(cpumap, i);
D
Daniel P. Berrange 已提交
2221
    } else {
2222 2223 2224 2225
        /* You may think this is redundant, but we can't assume libvirtd
         * itself is running on all pCPUs, so we need to explicitly set
         * the spawned QEMU instance to all pCPUs if no map is given in
         * its config file */
D
Daniel P. Berrange 已提交
2226
        for (i = 0 ; i < maxcpu ; i++)
2227
            VIR_USE_CPU(cpumap, i);
D
Daniel P. Berrange 已提交
2228
    }
2229

2230 2231 2232 2233 2234 2235 2236 2237
    /* We are pressuming we are running between fork/exec of QEMU
     * so use '0' to indicate our own process ID. No threads are
     * running at this point
     */
    if (virProcessInfoSetAffinity(0, /* Self */
                                  cpumap, cpumaplen, maxcpu) < 0) {
        VIR_FREE(cpumap);
        return -1;
2238
    }
2239
    VIR_FREE(cpumap);
2240 2241 2242 2243 2244

    return 0;
}


2245
static int
2246 2247 2248 2249
qemuInitPasswords(virConnectPtr conn,
                  struct qemud_driver *driver,
                  virDomainObjPtr vm,
                  unsigned long long qemuCmdFlags) {
2250
    int ret = 0;
2251
    qemuDomainObjPrivatePtr priv = vm->privateData;
2252

2253 2254
    if ((vm->def->ngraphics == 1) &&
        vm->def->graphics[0]->type == VIR_DOMAIN_GRAPHICS_TYPE_VNC &&
2255
        (vm->def->graphics[0]->data.vnc.auth.passwd || driver->vncPassword)) {
2256

2257
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
2258
        ret = qemuMonitorSetVNCPassword(priv->mon,
2259 2260
                                        vm->def->graphics[0]->data.vnc.auth.passwd ?
                                        vm->def->graphics[0]->data.vnc.auth.passwd :
2261
                                        driver->vncPassword);
2262
        qemuDomainObjExitMonitorWithDriver(driver, vm);
2263 2264
    }

2265 2266 2267 2268 2269 2270 2271 2272 2273 2274 2275 2276 2277 2278 2279 2280 2281 2282 2283 2284 2285 2286 2287
    if (ret < 0)
        goto cleanup;

    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        int i;

        for (i = 0 ; i < vm->def->ndisks ; i++) {
            char *secret;
            size_t secretLen;

            if (!vm->def->disks[i]->encryption ||
                !vm->def->disks[i]->src)
                continue;

            if (getVolumeQcowPassphrase(conn,
                                        vm->def->disks[i],
                                        &secret, &secretLen) < 0)
                goto cleanup;

            qemuDomainObjEnterMonitorWithDriver(driver, vm);
            ret = qemuMonitorSetDrivePassphrase(priv->mon,
                                                vm->def->disks[i]->info.alias,
                                                secret);
2288
            VIR_FREE(secret);
2289 2290 2291 2292 2293 2294 2295
            qemuDomainObjExitMonitorWithDriver(driver, vm);
            if (ret < 0)
                goto cleanup;
        }
    }

cleanup:
2296
    return ret;
2297 2298 2299
}


2300 2301 2302 2303 2304 2305 2306 2307 2308 2309 2310 2311
#define QEMU_PCI_VENDOR_INTEL     0x8086
#define QEMU_PCI_VENDOR_LSI_LOGIC 0x1000
#define QEMU_PCI_VENDOR_REDHAT    0x1af4
#define QEMU_PCI_VENDOR_CIRRUS    0x1013
#define QEMU_PCI_VENDOR_REALTEK   0x10ec
#define QEMU_PCI_VENDOR_AMD       0x1022
#define QEMU_PCI_VENDOR_ENSONIQ   0x1274
#define QEMU_PCI_VENDOR_VMWARE    0x15ad
#define QEMU_PCI_VENDOR_QEMU      0x1234

#define QEMU_PCI_PRODUCT_DISK_VIRTIO 0x1001

2312 2313
#define QEMU_PCI_PRODUCT_BALLOON_VIRTIO 0x1002

2314 2315 2316 2317 2318 2319 2320 2321 2322 2323 2324 2325 2326 2327 2328 2329 2330 2331 2332 2333 2334 2335 2336 2337 2338 2339 2340 2341 2342 2343 2344 2345 2346 2347 2348 2349 2350 2351 2352 2353 2354 2355 2356 2357 2358 2359 2360 2361 2362 2363 2364 2365 2366 2367 2368 2369 2370 2371 2372 2373 2374 2375 2376 2377 2378 2379 2380 2381 2382 2383 2384 2385 2386 2387 2388 2389 2390 2391 2392 2393 2394 2395 2396 2397 2398 2399 2400 2401 2402 2403 2404 2405 2406 2407 2408 2409 2410 2411 2412 2413 2414 2415 2416 2417 2418 2419 2420 2421 2422 2423 2424 2425 2426 2427 2428 2429 2430 2431 2432 2433 2434 2435 2436 2437 2438 2439 2440 2441 2442 2443 2444 2445 2446 2447 2448 2449 2450 2451 2452 2453 2454 2455 2456 2457 2458 2459 2460 2461 2462 2463 2464 2465 2466 2467 2468 2469 2470 2471 2472 2473 2474 2475 2476 2477 2478 2479 2480 2481 2482 2483 2484 2485 2486 2487 2488 2489 2490 2491 2492 2493 2494 2495 2496 2497 2498 2499 2500 2501 2502 2503 2504 2505 2506 2507 2508 2509 2510 2511 2512 2513 2514 2515 2516 2517 2518 2519 2520 2521
#define QEMU_PCI_PRODUCT_NIC_NE2K     0x8029
#define QEMU_PCI_PRODUCT_NIC_PCNET    0x2000
#define QEMU_PCI_PRODUCT_NIC_RTL8139  0x8139
#define QEMU_PCI_PRODUCT_NIC_E1000    0x100E
#define QEMU_PCI_PRODUCT_NIC_VIRTIO   0x1000

#define QEMU_PCI_PRODUCT_VGA_CIRRUS 0x00b8
#define QEMU_PCI_PRODUCT_VGA_VMWARE 0x0405
#define QEMU_PCI_PRODUCT_VGA_STDVGA 0x1111

#define QEMU_PCI_PRODUCT_AUDIO_AC97    0x2415
#define QEMU_PCI_PRODUCT_AUDIO_ES1370  0x5000

#define QEMU_PCI_PRODUCT_CONTROLLER_PIIX 0x7010
#define QEMU_PCI_PRODUCT_CONTROLLER_LSI  0x0012

#define QEMU_PCI_PRODUCT_WATCHDOG_I63000ESB 0x25ab

static int
qemuAssignNextPCIAddress(virDomainDeviceInfo *info,
                         int vendor,
                         int product,
                         qemuMonitorPCIAddress *addrs,
                         int naddrs)
{
    int found = 0;
    int i;

    VIR_DEBUG("Look for %x:%x out of %d", vendor, product, naddrs);

    for (i = 0 ; (i < naddrs) && !found; i++) {
        VIR_DEBUG("Maybe %x:%x", addrs[i].vendor, addrs[i].product);
        if (addrs[i].vendor == vendor &&
            addrs[i].product == product) {
            VIR_DEBUG("Match %d", i);
            found = 1;
            break;
        }
    }
    if (!found) {
        return -1;
    }

    /* Blank it out so this device isn't matched again */
    addrs[i].vendor = 0;
    addrs[i].product = 0;

    if (info->type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE)
        info->type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI;

    if (info->type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) {
        info->addr.pci.domain = addrs[i].addr.domain;
        info->addr.pci.bus = addrs[i].addr.bus;
        info->addr.pci.slot = addrs[i].addr.slot;
        info->addr.pci.function = addrs[i].addr.function;
    }

    return 0;
}

static int
qemuGetPCIDiskVendorProduct(virDomainDiskDefPtr def,
                            unsigned *vendor,
                            unsigned *product)
{
    switch (def->bus) {
    case VIR_DOMAIN_DISK_BUS_VIRTIO:
        *vendor = QEMU_PCI_VENDOR_REDHAT;
        *product = QEMU_PCI_PRODUCT_DISK_VIRTIO;
        break;

    default:
        return -1;
    }

    return 0;
}

static int
qemuGetPCINetVendorProduct(virDomainNetDefPtr def,
                            unsigned *vendor,
                            unsigned *product)
{
    if (!def->model)
        return -1;

    if (STREQ(def->model, "ne2k_pci")) {
        *vendor = QEMU_PCI_VENDOR_REALTEK;
        *product = QEMU_PCI_PRODUCT_NIC_NE2K;
    } else if (STREQ(def->model, "pcnet")) {
        *vendor = QEMU_PCI_VENDOR_AMD;
        *product = QEMU_PCI_PRODUCT_NIC_PCNET;
    } else if (STREQ(def->model, "rtl8139")) {
        *vendor = QEMU_PCI_VENDOR_REALTEK;
        *product = QEMU_PCI_PRODUCT_NIC_RTL8139;
    } else if (STREQ(def->model, "e1000")) {
        *vendor = QEMU_PCI_VENDOR_INTEL;
        *product = QEMU_PCI_PRODUCT_NIC_E1000;
    } else if (STREQ(def->model, "virtio")) {
        *vendor = QEMU_PCI_VENDOR_REDHAT;
        *product = QEMU_PCI_PRODUCT_NIC_VIRTIO;
    } else {
        VIR_INFO("Unexpected NIC model %s, cannot get PCI address",
                 def->model);
        return -1;
    }
    return 0;
}

static int
qemuGetPCIControllerVendorProduct(virDomainControllerDefPtr def,
                                  unsigned *vendor,
                                  unsigned *product)
{
    switch (def->type) {
    case VIR_DOMAIN_CONTROLLER_TYPE_SCSI:
        *vendor = QEMU_PCI_VENDOR_LSI_LOGIC;
        *product = QEMU_PCI_PRODUCT_CONTROLLER_LSI;
        break;

    case VIR_DOMAIN_CONTROLLER_TYPE_FDC:
        /* XXX we could put in the ISA bridge address, but
           that's not technically the FDC's address */
        return -1;

    case VIR_DOMAIN_CONTROLLER_TYPE_IDE:
        *vendor = QEMU_PCI_VENDOR_INTEL;
        *product = QEMU_PCI_PRODUCT_CONTROLLER_PIIX;
        break;

    default:
        VIR_INFO("Unexpected controller type %s, cannot get PCI address",
                 virDomainControllerTypeToString(def->type));
        return -1;
    }

    return 0;
}

static int
qemuGetPCIVideoVendorProduct(virDomainVideoDefPtr def,
                             unsigned *vendor,
                             unsigned *product)
{
    switch (def->type) {
    case VIR_DOMAIN_VIDEO_TYPE_CIRRUS:
        *vendor = QEMU_PCI_VENDOR_CIRRUS;
        *product = QEMU_PCI_PRODUCT_VGA_CIRRUS;
        break;

    case VIR_DOMAIN_VIDEO_TYPE_VGA:
        *vendor = QEMU_PCI_VENDOR_QEMU;
        *product = QEMU_PCI_PRODUCT_VGA_STDVGA;
        break;

    case VIR_DOMAIN_VIDEO_TYPE_VMVGA:
        *vendor = QEMU_PCI_VENDOR_VMWARE;
        *product = QEMU_PCI_PRODUCT_VGA_VMWARE;
        break;

    default:
        return -1;
    }
    return 0;
}

static int
qemuGetPCISoundVendorProduct(virDomainSoundDefPtr def,
                             unsigned *vendor,
                             unsigned *product)
{
    switch (def->model) {
    case VIR_DOMAIN_SOUND_MODEL_ES1370:
        *vendor = QEMU_PCI_VENDOR_ENSONIQ;
        *product = QEMU_PCI_PRODUCT_AUDIO_ES1370;
        break;

    case VIR_DOMAIN_SOUND_MODEL_AC97:
        *vendor = QEMU_PCI_VENDOR_INTEL;
        *product = QEMU_PCI_PRODUCT_AUDIO_AC97;
        break;

    default:
        return -1;
    }

    return 0;
}

static int
qemuGetPCIWatchdogVendorProduct(virDomainWatchdogDefPtr def,
                                unsigned *vendor,
                                unsigned *product)
{
    switch (def->model) {
    case VIR_DOMAIN_WATCHDOG_MODEL_I6300ESB:
        *vendor = QEMU_PCI_VENDOR_INTEL;
        *product = QEMU_PCI_PRODUCT_WATCHDOG_I63000ESB;
        break;

    default:
        return -1;
    }

    return 0;
}


2522 2523 2524 2525 2526 2527 2528 2529 2530 2531 2532 2533 2534 2535 2536 2537 2538 2539 2540
static int
qemuGetPCIMemballoonVendorProduct(virDomainMemballoonDefPtr def,
                                  unsigned *vendor,
                                  unsigned *product)
{
    switch (def->model) {
    case VIR_DOMAIN_MEMBALLOON_MODEL_VIRTIO:
        *vendor = QEMU_PCI_VENDOR_REDHAT;
        *product = QEMU_PCI_PRODUCT_BALLOON_VIRTIO;
        break;

    default:
        return -1;
    }

    return 0;
}


2541 2542 2543 2544 2545 2546 2547 2548 2549
/*
 * This entire method assumes that PCI devices in 'info pci'
 * match ordering of devices specified on the command line
 * wrt to devices of matching vendor+product
 *
 * XXXX this might not be a valid assumption if we assign
 * some static addrs on CLI. Have to check that...
 */
static int
2550
qemuDetectPCIAddresses(virDomainObjPtr vm,
2551 2552 2553 2554 2555 2556 2557 2558 2559 2560 2561 2562 2563 2564 2565 2566 2567
                       qemuMonitorPCIAddress *addrs,
                       int naddrs)
{
    unsigned int vendor = 0, product = 0;
    int i;

    /* XXX should all these vendor/product IDs be kept in the
     * actual device data structure instead ?
     */

    for (i = 0 ; i < vm->def->ndisks ; i++) {
        if (qemuGetPCIDiskVendorProduct(vm->def->disks[i], &vendor, &product) < 0)
            continue;

        if (qemuAssignNextPCIAddress(&(vm->def->disks[i]->info),
                                     vendor, product,
                                     addrs, naddrs) < 0) {
2568 2569 2570
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("cannot find PCI address for VirtIO disk %s"),
                            vm->def->disks[i]->dst);
2571 2572 2573 2574 2575 2576 2577 2578 2579 2580 2581
            return -1;
        }
    }

    for (i = 0 ; i < vm->def->nnets ; i++) {
        if (qemuGetPCINetVendorProduct(vm->def->nets[i], &vendor, &product) < 0)
            continue;

        if (qemuAssignNextPCIAddress(&(vm->def->nets[i]->info),
                                     vendor, product,
                                     addrs,  naddrs) < 0) {
2582 2583 2584
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("cannot find PCI address for %s NIC"),
                            vm->def->nets[i]->model);
2585 2586 2587 2588 2589 2590 2591 2592 2593 2594 2595
            return -1;
        }
    }

    for (i = 0 ; i < vm->def->ncontrollers ; i++) {
        if (qemuGetPCIControllerVendorProduct(vm->def->controllers[i], &vendor, &product) < 0)
            continue;

        if (qemuAssignNextPCIAddress(&(vm->def->controllers[i]->info),
                                     vendor, product,
                                     addrs,  naddrs) < 0) {
2596 2597 2598
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("cannot find PCI address for controller %s"),
                            virDomainControllerTypeToString(vm->def->controllers[i]->type));
2599 2600 2601 2602 2603 2604 2605 2606 2607 2608 2609
            return -1;
        }
    }

    for (i = 0 ; i < vm->def->nvideos ; i++) {
        if (qemuGetPCIVideoVendorProduct(vm->def->videos[i], &vendor, &product) < 0)
            continue;

        if (qemuAssignNextPCIAddress(&(vm->def->videos[i]->info),
                                     vendor, product,
                                     addrs,  naddrs) < 0) {
2610 2611 2612
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("cannot find PCI address for video adapter %s"),
                            virDomainVideoTypeToString(vm->def->videos[i]->type));
2613 2614 2615 2616 2617 2618 2619 2620 2621
            return -1;
        }
    }

    for (i = 0 ; i < vm->def->nsounds ; i++) {
        if (qemuGetPCISoundVendorProduct(vm->def->sounds[i], &vendor, &product) < 0)
            continue;

        if (qemuAssignNextPCIAddress(&(vm->def->sounds[i]->info),
2622
                                    vendor, product,
2623
                                     addrs,  naddrs) < 0) {
2624 2625 2626
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("cannot find PCI address for sound adapter %s"),
                            virDomainSoundModelTypeToString(vm->def->sounds[i]->model));
2627 2628 2629 2630 2631 2632 2633 2634 2635 2636
            return -1;
        }
    }


    if (vm->def->watchdog &&
        qemuGetPCIWatchdogVendorProduct(vm->def->watchdog, &vendor, &product) == 0) {
        if (qemuAssignNextPCIAddress(&(vm->def->watchdog->info),
                                     vendor, product,
                                     addrs,  naddrs) < 0) {
2637 2638 2639
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("cannot find PCI address for watchdog %s"),
                            virDomainWatchdogModelTypeToString(vm->def->watchdog->model));
2640 2641 2642 2643
            return -1;
        }
    }

2644 2645 2646 2647 2648 2649 2650 2651 2652 2653 2654 2655
    if (vm->def->memballoon &&
        qemuGetPCIMemballoonVendorProduct(vm->def->memballoon, &vendor, &product) == 0) {
        if (qemuAssignNextPCIAddress(&(vm->def->memballoon->info),
                                     vendor, product,
                                     addrs, naddrs) < 0) {
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("cannot find PCI address for balloon %s"),
                            virDomainMemballoonModelTypeToString(vm->def->memballoon->model));
            return -1;
        }
    }

2656 2657 2658 2659 2660 2661 2662 2663 2664 2665 2666 2667 2668 2669 2670 2671 2672 2673 2674 2675 2676 2677 2678 2679 2680 2681
    /* XXX console (virtio) */


    /* ... and now things we don't have in our xml */

    /* XXX USB controller ? */

    /* XXX what about other PCI devices (ie bridges) */

    return 0;
}

static int
qemuInitPCIAddresses(struct qemud_driver *driver,
                     virDomainObjPtr vm)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    int naddrs;
    int ret;
    qemuMonitorPCIAddress *addrs = NULL;

    qemuDomainObjEnterMonitorWithDriver(driver, vm);
    naddrs = qemuMonitorGetAllPCIAddresses(priv->mon,
                                           &addrs);
    qemuDomainObjExitMonitorWithDriver(driver, vm);

2682
    ret = qemuDetectPCIAddresses(vm, addrs, naddrs);
2683 2684 2685 2686 2687 2688

    VIR_FREE(addrs);

    return ret;
}

2689 2690 2691

static int qemudNextFreePort(struct qemud_driver *driver,
                             int startPort) {
2692 2693
    int i;

2694
    for (i = startPort ; i < QEMU_VNC_PORT_MAX; i++) {
2695 2696 2697
        int fd;
        int reuse = 1;
        struct sockaddr_in addr;
2698 2699 2700 2701 2702 2703 2704 2705 2706
        bool used = false;

        if (virBitmapGetBit(driver->reservedVNCPorts,
                            i - QEMU_VNC_PORT_MIN, &used) < 0)
            VIR_DEBUG("virBitmapGetBit failed on bit %d", i - QEMU_VNC_PORT_MIN);

        if (used)
            continue;

2707 2708 2709 2710 2711 2712 2713 2714
        addr.sin_family = AF_INET;
        addr.sin_port = htons(i);
        addr.sin_addr.s_addr = htonl(INADDR_ANY);
        fd = socket(PF_INET, SOCK_STREAM, 0);
        if (fd < 0)
            return -1;

        if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, (void*)&reuse, sizeof(reuse)) < 0) {
2715
            VIR_FORCE_CLOSE(fd);
2716 2717 2718 2719 2720
            break;
        }

        if (bind(fd, (struct sockaddr*)&addr, sizeof(addr)) == 0) {
            /* Not in use, lets grab it */
2721
            VIR_FORCE_CLOSE(fd);
2722 2723 2724 2725 2726 2727
            /* Add port to bitmap of reserved ports */
            if (virBitmapSetBit(driver->reservedVNCPorts,
                                i - QEMU_VNC_PORT_MIN) < 0) {
                VIR_DEBUG("virBitmapSetBit failed on bit %d",
                          i - QEMU_VNC_PORT_MIN);
            }
2728 2729
            return i;
        }
2730
        VIR_FORCE_CLOSE(fd);
2731 2732 2733 2734 2735 2736 2737 2738 2739 2740 2741

        if (errno == EADDRINUSE) {
            /* In use, try next */
            continue;
        }
        /* Some other bad failure, get out.. */
        break;
    }
    return -1;
}

2742 2743 2744 2745 2746 2747 2748 2749

static int
qemuAssignPCIAddresses(virDomainDefPtr def)
{
    int ret = -1;
    unsigned long long qemuCmdFlags = 0;
    qemuDomainPCIAddressSetPtr addrs = NULL;

2750 2751 2752
    if (qemuCapsExtractVersionInfo(def->emulator,
                                   NULL,
                                   &qemuCmdFlags) < 0)
2753 2754 2755 2756 2757 2758 2759 2760 2761 2762 2763 2764 2765 2766 2767 2768 2769 2770 2771
        goto cleanup;

    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (!(addrs = qemuDomainPCIAddressSetCreate(def)))
            goto cleanup;

        if (qemuAssignDevicePCISlots(def, addrs) < 0)
            goto cleanup;
    }

    ret = 0;

cleanup:
    qemuDomainPCIAddressSetFree(addrs);

    return ret;
}


2772
static pciDeviceList *
2773
qemuGetPciHostDeviceList(virDomainHostdevDefPtr *hostdevs, int nhostdevs)
2774 2775
{
    pciDeviceList *list;
2776 2777
    int i;

2778
    if (!(list = pciDeviceListNew()))
2779
        return NULL;
2780

2781 2782
    for (i = 0 ; i < nhostdevs ; i++) {
        virDomainHostdevDefPtr hostdev = hostdevs[i];
2783 2784 2785 2786 2787 2788 2789
        pciDevice *dev;

        if (hostdev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS)
            continue;
        if (hostdev->source.subsys.type != VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI)
            continue;

2790
        dev = pciGetDevice(hostdev->source.subsys.u.pci.domain,
2791 2792 2793
                           hostdev->source.subsys.u.pci.bus,
                           hostdev->source.subsys.u.pci.slot,
                           hostdev->source.subsys.u.pci.function);
2794
        if (!dev) {
2795
            pciDeviceListFree(list);
2796 2797
            return NULL;
        }
2798

2799 2800 2801
        if (pciDeviceListAdd(list, dev) < 0) {
            pciFreeDevice(dev);
            pciDeviceListFree(list);
2802
            return NULL;
2803 2804
        }

2805
        pciDeviceSetManaged(dev, hostdev->managed);
2806 2807
    }

2808 2809 2810 2811
    return list;
}

static int
2812 2813 2814 2815
qemuUpdateActivePciHostdevs(struct qemud_driver *driver,
                            virDomainDefPtr def)
{
    pciDeviceList *pcidevs;
2816
    int i;
2817
    int ret = -1;
2818 2819 2820 2821

    if (!def->nhostdevs)
        return 0;

2822
    if (!(pcidevs = qemuGetPciHostDeviceList(def->hostdevs, def->nhostdevs)))
2823 2824
        return -1;

2825 2826
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
2827 2828 2829
        pciDeviceListSteal(pcidevs, dev);
        if (pciDeviceListAdd(driver->activePciHostdevs, dev) < 0) {
            pciFreeDevice(dev);
2830
            goto cleanup;
2831 2832 2833
        }
    }

2834 2835 2836
    ret = 0;

cleanup:
2837
    pciDeviceListFree(pcidevs);
2838 2839 2840
    return ret;
}

2841

2842
static int
2843 2844 2845
qemuPrepareHostdevPCIDevices(struct qemud_driver *driver,
                             virDomainHostdevDefPtr *hostdevs,
                             int nhostdevs)
2846 2847 2848
{
    pciDeviceList *pcidevs;
    int i;
2849
    int ret = -1;
2850

2851
    if (!(pcidevs = qemuGetPciHostDeviceList(hostdevs, nhostdevs)))
2852 2853
        return -1;

2854
    /* We have to use 3 loops here. *All* devices must
2855 2856
     * be detached before we reset any of them, because
     * in some cases you have to reset the whole PCI,
2857 2858
     * which impacts all devices on it. Also, all devices
     * must be reset before being marked as active.
2859 2860 2861 2862 2863 2864 2865
     */

    /* XXX validate that non-managed device isn't in use, eg
     * by checking that device is either un-bound, or bound
     * to pci-stub.ko
     */

2866 2867
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
2868
        if (!pciDeviceIsAssignable(dev, !driver->relaxedACS))
2869 2870
            goto cleanup;

2871
        if (pciDeviceGetManaged(dev) &&
2872
            pciDettachDevice(dev, driver->activePciHostdevs) < 0)
2873 2874
            goto cleanup;
    }
2875 2876 2877

    /* Now that all the PCI hostdevs have be dettached, we can safely
     * reset them */
2878 2879
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
2880
        if (pciResetDevice(dev, driver->activePciHostdevs, pcidevs) < 0)
2881 2882
            goto cleanup;
    }
2883

2884
    /* Now mark all the devices as active */
2885 2886
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
2887 2888 2889
        pciDeviceListSteal(pcidevs, dev);
        if (pciDeviceListAdd(driver->activePciHostdevs, dev) < 0) {
            pciFreeDevice(dev);
2890 2891
            goto cleanup;
        }
2892 2893
    }

2894
    ret = 0;
2895

2896
cleanup:
2897
    pciDeviceListFree(pcidevs);
2898
    return ret;
2899 2900
}

2901 2902 2903 2904 2905 2906 2907
static int
qemuPrepareHostPCIDevices(struct qemud_driver *driver,
                          virDomainDefPtr def)
{
    return qemuPrepareHostdevPCIDevices(driver, def->hostdevs, def->nhostdevs);
}

2908 2909 2910 2911 2912 2913 2914 2915 2916 2917 2918

static int
qemuPrepareHostUSBDevices(struct qemud_driver *driver ATTRIBUTE_UNUSED,
                          virDomainDefPtr def)
{
    int i;
    for (i = 0 ; i < def->nhostdevs ; i++) {
        virDomainHostdevDefPtr hostdev = def->hostdevs[i];

        if (hostdev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS)
            continue;
2919
        if (hostdev->source.subsys.type != VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB)
2920 2921 2922 2923 2924 2925 2926 2927 2928 2929 2930 2931 2932 2933 2934 2935 2936 2937 2938 2939 2940 2941 2942 2943 2944 2945 2946 2947 2948 2949 2950 2951 2952 2953 2954 2955 2956 2957
            continue;

        /* Resolve a vendor/product to bus/device */
        if (hostdev->source.subsys.u.usb.vendor) {
            usbDevice *usb
                = usbFindDevice(hostdev->source.subsys.u.usb.vendor,
                                hostdev->source.subsys.u.usb.product);

            if (!usb)
                return -1;

            hostdev->source.subsys.u.usb.bus = usbDeviceGetBus(usb);
            hostdev->source.subsys.u.usb.device = usbDeviceGetDevno(usb);

            usbFreeDevice(usb);
        }
    }

    return 0;
}

static int
qemuPrepareHostDevices(struct qemud_driver *driver,
                       virDomainDefPtr def)
{
    if (!def->nhostdevs)
        return 0;

    if (qemuPrepareHostPCIDevices(driver, def) < 0)
        return -1;

    if (qemuPrepareHostUSBDevices(driver, def) < 0)
        return -1;

    return 0;
}


2958 2959 2960 2961 2962 2963 2964 2965 2966 2967 2968 2969 2970 2971 2972 2973
static int
qemuPrepareChardevDevice(virDomainDefPtr def ATTRIBUTE_UNUSED,
                         virDomainChrDefPtr dev,
                         void *opaque ATTRIBUTE_UNUSED)
{
    int fd;
    if (dev->type != VIR_DOMAIN_CHR_TYPE_FILE)
        return 0;

    if ((fd = open(dev->data.file.path, O_CREAT | O_APPEND, S_IRUSR|S_IWUSR)) < 0) {
        virReportSystemError(errno,
                             _("Unable to pre-create chardev file '%s'"),
                             dev->data.file.path);
        return -1;
    }

2974
    VIR_FORCE_CLOSE(fd);
2975 2976 2977 2978 2979

    return 0;
}


2980
static void
2981
qemudReattachPciDevice(pciDevice *dev, struct qemud_driver *driver)
2982 2983 2984
{
    int retries = 100;

2985 2986 2987 2988 2989 2990
    while (pciWaitForDeviceCleanup(dev, "kvm_assigned_device")
           && retries) {
        usleep(100*1000);
        retries--;
    }

2991
    if (pciDeviceGetManaged(dev)) {
2992
        if (pciReAttachDevice(dev, driver->activePciHostdevs) < 0) {
2993 2994
            virErrorPtr err = virGetLastError();
            VIR_ERROR(_("Failed to re-attach PCI device: %s"),
2995
                      err ? err->message : _("unknown error"));
2996 2997 2998 2999 3000
            virResetError(err);
        }
    }
}

3001
static void
3002 3003 3004
qemuDomainReAttachHostdevDevices(struct qemud_driver *driver,
                              virDomainHostdevDefPtr *hostdevs,
                              int nhostdevs)
3005
{
3006
    pciDeviceList *pcidevs;
3007 3008
    int i;

3009
    if (!(pcidevs = qemuGetPciHostDeviceList(hostdevs, nhostdevs))) {
3010
        virErrorPtr err = virGetLastError();
3011
        VIR_ERROR(_("Failed to allocate pciDeviceList: %s"),
3012
                  err ? err->message : _("unknown error"));
3013 3014
        virResetError(err);
        return;
3015 3016
    }

3017 3018
    /* Again 3 loops; mark all devices as inactive before reset
     * them and reset all the devices before re-attach */
3019

3020 3021
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
3022
        pciDeviceListDel(driver->activePciHostdevs, dev);
3023
    }
3024

3025 3026
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
3027
        if (pciResetDevice(dev, driver->activePciHostdevs, pcidevs) < 0) {
3028
            virErrorPtr err = virGetLastError();
3029
            VIR_ERROR(_("Failed to reset PCI device: %s"),
3030
                      err ? err->message : _("unknown error"));
3031 3032
            virResetError(err);
        }
3033
    }
3034

3035 3036
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
3037
        qemudReattachPciDevice(dev, driver);
3038
    }
3039

3040
    pciDeviceListFree(pcidevs);
3041 3042
}

3043 3044 3045 3046 3047 3048 3049 3050 3051 3052
static void
qemuDomainReAttachHostDevices(struct qemud_driver *driver,
                              virDomainDefPtr def)
{
    if (!def->nhostdevs)
        return;

    qemuDomainReAttachHostdevDevices(driver, def->hostdevs, def->nhostdevs);
}

3053 3054 3055 3056 3057 3058 3059 3060 3061 3062
static const char *const defaultDeviceACL[] = {
    "/dev/null", "/dev/full", "/dev/zero",
    "/dev/random", "/dev/urandom",
    "/dev/ptmx", "/dev/kvm", "/dev/kqemu",
    "/dev/rtc", "/dev/hpet", "/dev/net/tun",
    NULL,
};
#define DEVICE_PTY_MAJOR 136
#define DEVICE_SND_MAJOR 116

3063

3064 3065 3066 3067 3068 3069 3070
static int qemuSetupDiskPathAllow(virDomainDiskDefPtr disk ATTRIBUTE_UNUSED,
                                  const char *path,
                                  size_t depth ATTRIBUTE_UNUSED,
                                  void *opaque)
{
    virCgroupPtr cgroup = opaque;
    int rc;
3071

3072 3073 3074 3075 3076 3077 3078 3079 3080 3081 3082 3083 3084 3085
    VIR_DEBUG("Process path %s for disk", path);
    /* XXX RO vs RW */
    rc = virCgroupAllowDevicePath(cgroup, path);
    if (rc != 0) {
        /* Get this for non-block devices */
        if (rc == -EINVAL) {
            VIR_DEBUG("Ignoring EINVAL for %s", path);
        } else if (rc == -EACCES) { /* Get this for root squash NFS */
            VIR_DEBUG("Ignoring EACCES for %s", path);
        } else {
            virReportSystemError(-rc,
                                 _("Unable to allow access for disk path %s"),
                                 path);
            return -1;
3086
        }
3087
    }
3088 3089
    return 0;
}
3090 3091


3092 3093
static int qemuSetupDiskCgroup(struct qemud_driver *driver,
                               virCgroupPtr cgroup,
3094 3095 3096
                               virDomainDiskDefPtr disk)
{
    return virDomainDiskDefForeachPath(disk,
3097
                                       driver->allowDiskFormatProbing,
3098 3099 3100
                                       true,
                                       qemuSetupDiskPathAllow,
                                       cgroup);
3101 3102 3103
}


3104 3105 3106 3107
static int qemuTeardownDiskPathDeny(virDomainDiskDefPtr disk ATTRIBUTE_UNUSED,
                                    const char *path,
                                    size_t depth ATTRIBUTE_UNUSED,
                                    void *opaque)
3108
{
3109 3110
    virCgroupPtr cgroup = opaque;
    int rc;
3111

3112 3113 3114 3115 3116 3117 3118 3119 3120 3121 3122
    VIR_DEBUG("Process path %s for disk", path);
    /* XXX RO vs RW */
    rc = virCgroupDenyDevicePath(cgroup, path);
    if (rc != 0) {
        /* Get this for non-block devices */
        if (rc == -EINVAL) {
            VIR_DEBUG("Ignoring EINVAL for %s", path);
        } else if (rc == -EACCES) { /* Get this for root squash NFS */
            VIR_DEBUG("Ignoring EACCES for %s", path);
        } else {
            virReportSystemError(-rc,
3123
                                 _("Unable to deny access for disk path %s"),
3124 3125
                                 path);
            return -1;
3126
        }
3127
    }
3128 3129
    return 0;
}
3130 3131


3132 3133
static int qemuTeardownDiskCgroup(struct qemud_driver *driver,
                                  virCgroupPtr cgroup,
3134 3135 3136
                                  virDomainDiskDefPtr disk)
{
    return virDomainDiskDefForeachPath(disk,
3137
                                       driver->allowDiskFormatProbing,
3138 3139 3140
                                       true,
                                       qemuTeardownDiskPathDeny,
                                       cgroup);
3141 3142 3143
}


3144 3145 3146 3147 3148 3149 3150 3151 3152 3153 3154 3155 3156 3157 3158 3159 3160 3161 3162 3163 3164 3165 3166 3167
static int qemuSetupChardevCgroup(virDomainDefPtr def,
                                  virDomainChrDefPtr dev,
                                  void *opaque)
{
    virCgroupPtr cgroup = opaque;
    int rc;

    if (dev->type != VIR_DOMAIN_CHR_TYPE_DEV)
        return 0;


    VIR_DEBUG("Process path '%s' for disk", dev->data.file.path);
    rc = virCgroupAllowDevicePath(cgroup, dev->data.file.path);
    if (rc != 0) {
        virReportSystemError(-rc,
                             _("Unable to allow device %s for %s"),
                             dev->data.file.path, def->name);
        return -1;
    }

    return 0;
}


3168 3169 3170 3171 3172 3173 3174 3175 3176 3177 3178 3179 3180 3181 3182 3183 3184 3185 3186
static int qemuSetupHostUsbDeviceCgroup(usbDevice *dev ATTRIBUTE_UNUSED,
                                        const char *path,
                                        void *opaque)
{
    virCgroupPtr cgroup = opaque;
    int rc;

    VIR_DEBUG("Process path '%s' for USB device", path);
    rc = virCgroupAllowDevicePath(cgroup, path);
    if (rc != 0) {
        virReportSystemError(-rc,
                             _("Unable to allow device %s"),
                             path);
        return -1;
    }

    return 0;
}

3187
static int qemuSetupCgroup(struct qemud_driver *driver,
3188 3189 3190 3191
                           virDomainObjPtr vm)
{
    virCgroupPtr cgroup = NULL;
    int rc;
3192
    unsigned int i;
3193 3194 3195 3196
    const char *const *deviceACL =
        driver->cgroupDeviceACL ?
        (const char *const *)driver->cgroupDeviceACL :
        defaultDeviceACL;
3197 3198 3199 3200 3201 3202

    if (driver->cgroup == NULL)
        return 0; /* Not supported, so claim success */

    rc = virCgroupForDomain(driver->cgroup, vm->def->name, &cgroup, 1);
    if (rc != 0) {
3203
        virReportSystemError(-rc,
3204 3205 3206 3207 3208
                             _("Unable to create cgroup for %s"),
                             vm->def->name);
        goto cleanup;
    }

3209 3210
    if (qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_DEVICES)) {
        rc = virCgroupDenyAllDevices(cgroup);
3211
        if (rc != 0) {
3212 3213 3214 3215 3216
            if (rc == -EPERM) {
                VIR_WARN0("Group devices ACL is not accessible, disabling whitelisting");
                goto done;
            }

3217
            virReportSystemError(-rc,
3218
                                 _("Unable to deny all devices for %s"), vm->def->name);
3219 3220 3221
            goto cleanup;
        }

3222
        for (i = 0; i < vm->def->ndisks ; i++) {
3223
            if (qemuSetupDiskCgroup(driver, cgroup, vm->def->disks[i]) < 0)
3224 3225
                goto cleanup;
        }
3226

3227
        rc = virCgroupAllowDeviceMajor(cgroup, 'c', DEVICE_PTY_MAJOR);
3228
        if (rc != 0) {
3229
            virReportSystemError(-rc, "%s",
3230
                                 _("unable to allow /dev/pts/ devices"));
3231 3232 3233
            goto cleanup;
        }

3234 3235 3236
        if (vm->def->nsounds) {
            rc = virCgroupAllowDeviceMajor(cgroup, 'c', DEVICE_SND_MAJOR);
            if (rc != 0) {
3237
                virReportSystemError(-rc, "%s",
3238 3239 3240 3241 3242 3243 3244 3245 3246 3247
                                     _("unable to allow /dev/snd/ devices"));
                goto cleanup;
            }
        }

        for (i = 0; deviceACL[i] != NULL ; i++) {
            rc = virCgroupAllowDevicePath(cgroup,
                                          deviceACL[i]);
            if (rc < 0 &&
                rc != -ENOENT) {
3248
                virReportSystemError(-rc,
3249 3250 3251 3252
                                     _("unable to allow device %s"),
                                     deviceACL[i]);
                goto cleanup;
            }
3253
        }
3254 3255 3256 3257 3258 3259

        if (virDomainChrDefForeach(vm->def,
                                   true,
                                   qemuSetupChardevCgroup,
                                   cgroup) < 0)
            goto cleanup;
3260 3261 3262 3263 3264 3265 3266 3267 3268 3269 3270 3271 3272 3273 3274 3275 3276

        for (i = 0; i < vm->def->nhostdevs; i++) {
            virDomainHostdevDefPtr hostdev = vm->def->hostdevs[i];
            usbDevice *usb;

            if (hostdev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS)
                continue;
            if (hostdev->source.subsys.type != VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB)
                continue;

            if ((usb = usbGetDevice(hostdev->source.subsys.u.usb.bus,
                                    hostdev->source.subsys.u.usb.device)) == NULL)
                goto cleanup;

            if (usbDeviceFileIterate(usb, qemuSetupHostUsbDeviceCgroup, cgroup) < 0 )
                goto cleanup;
        }
3277 3278
    }

3279 3280 3281 3282 3283 3284 3285 3286 3287 3288 3289 3290 3291 3292 3293 3294 3295 3296 3297 3298 3299 3300 3301 3302 3303 3304 3305 3306 3307 3308 3309 3310 3311 3312
    if ((rc = qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_MEMORY))) {
        if (vm->def->mem.hard_limit != 0) {
            rc = virCgroupSetMemoryHardLimit(cgroup, vm->def->mem.hard_limit);
            if (rc != 0) {
                virReportSystemError(-rc,
                                     _("Unable to set memory hard limit for domain %s"),
                                     vm->def->name);
                goto cleanup;
            }
        }
        if (vm->def->mem.soft_limit != 0) {
            rc = virCgroupSetMemorySoftLimit(cgroup, vm->def->mem.soft_limit);
            if (rc != 0) {
                virReportSystemError(-rc,
                                     _("Unable to set memory soft limit for domain %s"),
                                     vm->def->name);
                goto cleanup;
            }
        }

        if (vm->def->mem.swap_hard_limit != 0) {
            rc = virCgroupSetSwapHardLimit(cgroup, vm->def->mem.swap_hard_limit);
            if (rc != 0) {
                virReportSystemError(-rc,
                                     _("Unable to set swap hard limit for domain %s"),
                                     vm->def->name);
                goto cleanup;
            }
        }
    } else {
        VIR_WARN("Memory cgroup is disabled in qemu configuration file: %s",
                 vm->def->name);
    }

3313
done:
3314 3315 3316 3317 3318 3319 3320 3321 3322 3323 3324 3325
    virCgroupFree(&cgroup);
    return 0;

cleanup:
    if (cgroup) {
        virCgroupRemove(cgroup);
        virCgroupFree(&cgroup);
    }
    return -1;
}


3326
static int qemuRemoveCgroup(struct qemud_driver *driver,
3327 3328
                            virDomainObjPtr vm,
                            int quiet)
3329 3330 3331 3332 3333 3334 3335 3336 3337
{
    virCgroupPtr cgroup;
    int rc;

    if (driver->cgroup == NULL)
        return 0; /* Not supported, so claim success */

    rc = virCgroupForDomain(driver->cgroup, vm->def->name, &cgroup, 0);
    if (rc != 0) {
3338
        if (!quiet)
3339 3340 3341
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("Unable to find cgroup for %s\n"),
                            vm->def->name);
3342 3343 3344 3345 3346 3347 3348 3349 3350 3351 3352 3353 3354 3355 3356 3357 3358 3359 3360 3361
        return rc;
    }

    rc = virCgroupRemove(cgroup);
    virCgroupFree(&cgroup);
    return rc;
}

static int qemuAddToCgroup(struct qemud_driver *driver,
                           virDomainDefPtr def)
{
    virCgroupPtr cgroup = NULL;
    int ret = -1;
    int rc;

    if (driver->cgroup == NULL)
        return 0; /* Not supported, so claim success */

    rc = virCgroupForDomain(driver->cgroup, def->name, &cgroup, 0);
    if (rc != 0) {
3362
        virReportSystemError(-rc,
3363 3364 3365 3366 3367 3368 3369
                             _("unable to find cgroup for domain %s"),
                             def->name);
        goto cleanup;
    }

    rc = virCgroupAddTask(cgroup, getpid());
    if (rc != 0) {
3370
        virReportSystemError(-rc,
3371 3372 3373 3374 3375 3376 3377 3378 3379 3380 3381 3382 3383 3384 3385 3386 3387
                             _("unable to add domain %s task %d to cgroup"),
                             def->name, getpid());
        goto cleanup;
    }

    ret = 0;

cleanup:
    virCgroupFree(&cgroup);
    return ret;
}


struct qemudHookData {
    virConnectPtr conn;
    virDomainObjPtr vm;
    struct qemud_driver *driver;
3388 3389 3390
};

static int qemudSecurityHook(void *data) {
3391 3392
    struct qemudHookData *h = data;

3393 3394 3395
    /* This must take place before exec(), so that all QEMU
     * memory allocation is on the correct NUMA node
     */
3396
    if (qemuAddToCgroup(h->driver, h->vm->def) < 0)
3397 3398
        return -1;

3399 3400 3401
    /* This must be done after cgroup placement to avoid resetting CPU
     * affinity */
    if (qemudInitCpuAffinity(h->vm) < 0)
3402
        return -1;
3403

3404 3405
    if (h->driver->securityDriver &&
        h->driver->securityDriver->domainSetSecurityProcessLabel &&
3406
        h->driver->securityDriver->domainSetSecurityProcessLabel(h->driver->securityDriver, h->vm) < 0)
3407 3408 3409
        return -1;

    return 0;
3410 3411
}

3412
static int
3413
qemuPrepareMonitorChr(struct qemud_driver *driver,
3414
                      virDomainChrDefPtr monConfig,
3415 3416
                      const char *vm)
{
3417
    monConfig->deviceType = VIR_DOMAIN_CHR_DEVICE_TYPE_MONITOR;
3418

3419 3420
    monConfig->type = VIR_DOMAIN_CHR_TYPE_UNIX;
    monConfig->data.nix.listen = 1;
3421

D
Daniel P. Berrange 已提交
3422
    if (!(monConfig->info.alias = strdup("monitor"))) {
3423
        virReportOOMError();
D
Daniel P. Berrange 已提交
3424 3425 3426
        return -1;
    }

3427
    if (virAsprintf(&monConfig->data.nix.path, "%s/%s.monitor",
3428
                    driver->libDir, vm) < 0) {
3429
        virReportOOMError();
3430 3431 3432 3433 3434 3435
        return -1;
    }

    return 0;
}

C
Chris Lalancette 已提交
3436 3437 3438 3439 3440
static int qemuDomainSnapshotSetActive(virDomainObjPtr vm,
                                       char *snapshotDir);
static int qemuDomainSnapshotSetInactive(virDomainObjPtr vm,
                                         char *snapshotDir);

3441

3442 3443
#define START_POSTFIX ": starting up\n"
#define SHUTDOWN_POSTFIX ": shutting down\n"
3444

3445 3446
static int qemudStartVMDaemon(virConnectPtr conn,
                              struct qemud_driver *driver,
3447
                              virDomainObjPtr vm,
3448
                              const char *migrateFrom,
3449
                              bool start_paused,
3450
                              int stdin_fd,
3451 3452
                              const char *stdin_path,
                              enum virVMOperationType vmop) {
E
Eric Blake 已提交
3453
    int ret;
3454
    unsigned long long qemuCmdFlags;
3455
    int pos = -1;
3456
    char ebuf[1024];
3457
    char *pidfile = NULL;
3458
    int logfile = -1;
3459
    char *timestamp;
3460
    qemuDomainObjPrivatePtr priv = vm->privateData;
E
Eric Blake 已提交
3461
    virCommandPtr cmd = NULL;
3462

3463
    struct qemudHookData hookData;
3464 3465 3466 3467
    hookData.conn = conn;
    hookData.vm = vm;
    hookData.driver = driver;

3468 3469
    DEBUG0("Beginning VM startup process");

D
Daniel P. Berrange 已提交
3470
    if (virDomainObjIsActive(vm)) {
3471 3472
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("VM is already active"));
3473 3474 3475
        return -1;
    }

3476 3477 3478 3479 3480
    /* Must be run before security labelling */
    DEBUG0("Preparing host devices");
    if (qemuPrepareHostDevices(driver, vm->def) < 0)
        goto cleanup;

3481 3482 3483 3484 3485 3486 3487
    DEBUG0("Preparing chr devices");
    if (virDomainChrDefForeach(vm->def,
                               true,
                               qemuPrepareChardevDevice,
                               NULL) < 0)
        goto cleanup;

3488 3489
    /* If you are using a SecurityDriver with dynamic labelling,
       then generate a security label for isolation */
3490
    DEBUG0("Generating domain security label (if required)");
3491
    if (driver->securityDriver &&
3492 3493 3494 3495 3496 3497 3498
        driver->securityDriver->domainGenSecurityLabel) {
        ret = driver->securityDriver->domainGenSecurityLabel(driver->securityDriver,
                                                             vm);
        qemuDomainSecurityLabelAudit(vm, ret >= 0);
        if (ret < 0)
            goto cleanup;
    }
3499

3500
    DEBUG0("Generating setting domain security labels (if required)");
3501 3502
    if (driver->securityDriver &&
        driver->securityDriver->domainSetSecurityAllLabel &&
3503 3504
        driver->securityDriver->domainSetSecurityAllLabel(driver->securityDriver,
                                                          vm, stdin_path) < 0) {
3505
        goto cleanup;
3506
    }
3507

3508 3509 3510
    /* Ensure no historical cgroup for this VM is lying around bogus
     * settings */
    DEBUG0("Ensuring no historical cgroup is lying around");
3511
    qemuRemoveCgroup(driver, vm, 1);
3512

3513 3514 3515
    if (vm->def->ngraphics == 1) {
        if (vm->def->graphics[0]->type == VIR_DOMAIN_GRAPHICS_TYPE_VNC &&
            vm->def->graphics[0]->data.vnc.autoport) {
3516
            int port = qemudNextFreePort(driver, QEMU_VNC_PORT_MIN);
3517 3518 3519 3520 3521 3522 3523 3524
            if (port < 0) {
                qemuReportError(VIR_ERR_INTERNAL_ERROR,
                                "%s", _("Unable to find an unused VNC port"));
                goto cleanup;
            }
            vm->def->graphics[0]->data.vnc.port = port;
        } else if (vm->def->graphics[0]->type == VIR_DOMAIN_GRAPHICS_TYPE_SPICE &&
                   vm->def->graphics[0]->data.spice.autoport) {
3525
            int port = qemudNextFreePort(driver, QEMU_VNC_PORT_MIN);
3526 3527
            int tlsPort = -1;
            if (port < 0) {
3528
                qemuReportError(VIR_ERR_INTERNAL_ERROR,
3529
                                "%s", _("Unable to find an unused SPICE port"));
3530 3531 3532
                goto cleanup;
            }

3533 3534 3535 3536 3537 3538 3539 3540 3541
            if (driver->spiceTLS) {
                tlsPort = qemudNextFreePort(driver, port + 1);
                if (tlsPort < 0) {
                    qemuReportError(VIR_ERR_INTERNAL_ERROR,
                                    "%s", _("Unable to find an unused SPICE TLS port"));
                    goto cleanup;
                }
            }

3542 3543
            vm->def->graphics[0]->data.spice.port = port;
            vm->def->graphics[0]->data.spice.tlsPort = tlsPort;
3544
        }
3545
    }
3546

L
Laine Stump 已提交
3547
    if (virFileMakePath(driver->logDir) != 0) {
3548
        virReportSystemError(errno,
3549 3550
                             _("cannot create log directory %s"),
                             driver->logDir);
3551
        goto cleanup;
3552 3553
    }

3554
    DEBUG0("Creating domain log file");
3555
    if ((logfile = qemudLogFD(driver, vm->def->name, false)) < 0)
3556
        goto cleanup;
3557

E
Eric Blake 已提交
3558
    DEBUG0("Determining emulator version");
3559 3560 3561
    if (qemuCapsExtractVersionInfo(vm->def->emulator,
                                   NULL,
                                   &qemuCmdFlags) < 0)
3562
        goto cleanup;
3563

3564
    DEBUG0("Setting up domain cgroup (if required)");
3565
    if (qemuSetupCgroup(driver, vm) < 0)
3566 3567
        goto cleanup;

3568
    if (VIR_ALLOC(priv->monConfig) < 0) {
3569
        virReportOOMError();
3570 3571 3572
        goto cleanup;
    }

3573
    DEBUG0("Preparing monitor state");
3574
    if (qemuPrepareMonitorChr(driver, priv->monConfig, vm->def->name) < 0)
3575
        goto cleanup;
3576

D
Daniel P. Berrange 已提交
3577 3578 3579
#if HAVE_YAJL
    if (qemuCmdFlags & QEMUD_CMD_FLAG_MONITOR_JSON)
        priv->monJSON = 1;
3580
    else
D
Daniel P. Berrange 已提交
3581
#endif
3582
        priv->monJSON = 0;
D
Daniel P. Berrange 已提交
3583

3584
    priv->monitor_warned = 0;
3585
    priv->gotShutdown = false;
3586

D
Daniel P. Berrange 已提交
3587
    if ((ret = virFileDeletePid(driver->stateDir, vm->def->name)) != 0) {
3588
        virReportSystemError(ret,
D
Daniel P. Berrange 已提交
3589 3590 3591 3592 3593
                             _("Cannot remove stale PID file for %s"),
                             vm->def->name);
        goto cleanup;
    }

3594
    if (!(pidfile = virFilePid(driver->stateDir, vm->def->name))) {
3595
        virReportSystemError(errno,
3596 3597 3598
                             "%s", _("Failed to build pidfile path."));
        goto cleanup;
    }
D
Daniel P. Berrange 已提交
3599

3600
    /*
M
Matthew Booth 已提交
3601
     * Normally PCI addresses are assigned in the virDomainCreate
3602 3603 3604 3605 3606
     * or virDomainDefine methods. We might still need to assign
     * some here to cope with the question of upgrades. Regardless
     * we also need to populate the PCi address set cache for later
     * use in hotplug
     */
3607
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
3608
        DEBUG0("Assigning domain PCI addresses");
3609
        /* Populate cache with current addresses */
3610 3611 3612 3613 3614 3615 3616
        if (priv->pciaddrs) {
            qemuDomainPCIAddressSetFree(priv->pciaddrs);
            priv->pciaddrs = NULL;
        }
        if (!(priv->pciaddrs = qemuDomainPCIAddressSetCreate(vm->def)))
            goto cleanup;

3617 3618

        /* Assign any remaining addresses */
3619 3620
        if (qemuAssignDevicePCISlots(vm->def, priv->pciaddrs) < 0)
            goto cleanup;
3621 3622 3623 3624

        priv->persistentAddrs = 1;
    } else {
        priv->persistentAddrs = 0;
3625 3626
    }

3627
    DEBUG0("Building emulator command line");
3628
    vm->def->id = driver->nextvmid++;
3629 3630 3631 3632
    if (!(cmd = qemuBuildCommandLine(conn, driver, vm->def, priv->monConfig,
                                     priv->monJSON != 0, qemuCmdFlags,
                                     migrateFrom,
                                     vm->current_snapshot, vmop)))
C
Chris Lalancette 已提交
3633 3634 3635
        goto cleanup;

    if (qemuDomainSnapshotSetInactive(vm, driver->snapshotDir) < 0)
3636
        goto cleanup;
3637

3638 3639 3640 3641 3642 3643 3644 3645 3646 3647 3648 3649 3650 3651 3652 3653
    /* now that we know it is about to start call the hook if present */
    if (virHookPresent(VIR_HOOK_DRIVER_QEMU)) {
        char *xml = virDomainDefFormat(vm->def, 0);
        int hookret;

        hookret = virHookCall(VIR_HOOK_DRIVER_QEMU, vm->def->name,
                    VIR_HOOK_QEMU_OP_START, VIR_HOOK_SUBOP_BEGIN, NULL, xml);
        VIR_FREE(xml);

        /*
         * If the script raised an error abort the launch
         */
        if (hookret < 0)
            goto cleanup;
    }

3654 3655 3656 3657 3658 3659 3660 3661 3662 3663 3664 3665 3666
    if ((timestamp = virTimestamp()) == NULL) {
        virReportOOMError();
        goto cleanup;
    } else {
        if (safewrite(logfile, timestamp, strlen(timestamp)) < 0 ||
            safewrite(logfile, START_POSTFIX, strlen(START_POSTFIX)) < 0) {
            VIR_WARN("Unable to write timestamp to logfile: %s",
                     virStrerror(errno, ebuf, sizeof ebuf));
        }

        VIR_FREE(timestamp);
    }

E
Eric Blake 已提交
3667
    virCommandWriteArgLog(cmd, logfile);
3668

3669
    if ((pos = lseek(logfile, 0, SEEK_END)) < 0)
3670
        VIR_WARN("Unable to seek to end of logfile: %s",
3671
                 virStrerror(errno, ebuf, sizeof ebuf));
3672

3673 3674
    VIR_DEBUG("Clear emulator capabilities: %d",
              driver->clearEmulatorCapabilities);
E
Eric Blake 已提交
3675 3676 3677 3678 3679
    if (driver->clearEmulatorCapabilities)
        virCommandClearCaps(cmd);

    VIR_WARN("Executing %s", vm->def->emulator);
    virCommandSetPreExecHook(cmd, qemudSecurityHook, &hookData);
3680 3681 3682 3683

    if (stdin_fd != -1)
        virCommandSetInputFD(cmd, stdin_fd);

E
Eric Blake 已提交
3684 3685 3686 3687 3688 3689 3690 3691
    virCommandSetOutputFD(cmd, &logfile);
    virCommandSetErrorFD(cmd, &logfile);
    virCommandNonblockingFDs(cmd);
    virCommandSetPidFile(cmd, pidfile);
    virCommandDaemonize(cmd);

    ret = virCommandRun(cmd, NULL);
    VIR_WARN("Executing done %s", vm->def->emulator);
3692
    VIR_FREE(pidfile);
G
Guido Günther 已提交
3693 3694 3695

    /* wait for qemu process to to show up */
    if (ret == 0) {
3696
        if (virFileReadPid(driver->stateDir, vm->def->name, &vm->pid)) {
3697 3698
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("Domain %s didn't show up\n"), vm->def->name);
3699
            ret = -1;
G
Guido Günther 已提交
3700
        }
E
Eric Blake 已提交
3701
#if 0
3702
    } else if (ret == -2) {
E
Eric Blake 已提交
3703 3704 3705 3706 3707
        /*
         * XXX this is bogus. It isn't safe to set vm->pid = child
         * because the child no longer exists.
         */

3708 3709 3710 3711 3712 3713 3714 3715 3716
        /* The virExec process that launches the daemon failed. Pending on
         * when it failed (we can't determine for sure), there may be
         * extra info in the domain log (if the hook failed for example).
         *
         * Pretend like things succeeded, and let 'WaitForMonitor' report
         * the log contents for us.
         */
        vm->pid = child;
        ret = 0;
E
Eric Blake 已提交
3717
#endif
3718
    }
3719

3720 3721 3722
    if (migrateFrom)
        start_paused = true;
    vm->state = start_paused ? VIR_DOMAIN_PAUSED : VIR_DOMAIN_RUNNING;
3723

3724
    if (ret == -1) /* The VM failed to start; tear filters before taps */
3725
        virDomainConfVMNWFilterTeardown(vm);
3726

3727
    if (ret == -1) /* The VM failed to start */
3728 3729
        goto cleanup;

3730
    DEBUG0("Waiting for monitor to show up");
3731
    if (qemudWaitForMonitor(driver, vm, pos) < 0)
3732
        goto cleanup;
3733

3734
    DEBUG0("Detecting VCPU PIDs");
3735
    if (qemuDetectVcpuPIDs(driver, vm) < 0)
3736
        goto cleanup;
3737

3738
    DEBUG0("Setting any required VM passwords");
3739
    if (qemuInitPasswords(conn, driver, vm, qemuCmdFlags) < 0)
3740
        goto cleanup;
3741

D
Daniel P. Berrange 已提交
3742 3743 3744
    /* If we have -device, then addresses are assigned explicitly.
     * If not, then we have to detect dynamic ones here */
    if (!(qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)) {
3745
        DEBUG0("Determining domain device PCI addresses");
D
Daniel P. Berrange 已提交
3746
        if (qemuInitPCIAddresses(driver, vm) < 0)
3747
            goto cleanup;
D
Daniel P. Berrange 已提交
3748
    }
3749

3750
    DEBUG0("Setting initial memory amount");
3751
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
3752
    if (qemuMonitorSetBalloon(priv->mon, vm->def->mem.cur_balloon) < 0) {
3753
        qemuDomainObjExitMonitorWithDriver(driver, vm);
3754
        goto cleanup;
3755
    }
H
Hu Tao 已提交
3756
    qemuDomainObjExitMonitorWithDriver(driver, vm);
3757

3758
    if (!start_paused) {
3759
        DEBUG0("Starting domain CPUs");
3760
        /* Allow the CPUS to start executing */
H
Hu Tao 已提交
3761
        if (doStartCPUs(driver, vm, conn) < 0) {
3762
            if (virGetLastError() == NULL)
3763 3764
                qemuReportError(VIR_ERR_INTERNAL_ERROR,
                                "%s", _("resume operation failed"));
3765
            goto cleanup;
3766 3767
        }
    }
3768

3769

3770
    DEBUG0("Writing domain status to disk");
3771
    if (virDomainSaveStatus(driver->caps, driver->stateDir, vm) < 0)
3772
        goto cleanup;
3773

3774 3775 3776 3777 3778
    /* Do this last, since it depends on domain being active */
    DEBUG0("Setting running domain def as transient");
    if (virDomainObjSetDefTransient(driver->caps, vm) < 0)
        goto cleanup;

E
Eric Blake 已提交
3779
    virCommandFree(cmd);
3780
    VIR_FORCE_CLOSE(logfile);
3781

3782
    return 0;
3783 3784

cleanup:
3785 3786 3787
    /* We jump here if we failed to start the VM for any reason, or
     * if we failed to initialize the now running VM. kill it off and
     * pretend we never started it */
E
Eric Blake 已提交
3788
    virCommandFree(cmd);
3789
    VIR_FORCE_CLOSE(logfile);
E
Eric Blake 已提交
3790
    qemudShutdownVMDaemon(driver, vm, 0);
3791 3792

    return -1;
3793 3794
}

3795
static void qemudShutdownVMDaemon(struct qemud_driver *driver,
3796 3797
                                  virDomainObjPtr vm,
                                  int migrated) {
D
Daniel P. Berrange 已提交
3798
    int ret;
3799
    int retries = 0;
3800
    qemuDomainObjPrivatePtr priv = vm->privateData;
3801
    virErrorPtr orig_err;
3802 3803
    virDomainDefPtr def;
    int i;
3804 3805 3806
    int logfile = -1;
    char *timestamp;
    char ebuf[1024];
D
Daniel P. Berrange 已提交
3807

3808 3809
    VIR_DEBUG("Shutting down VM '%s' pid=%d migrated=%d",
              vm->def->name, vm->pid, migrated);
3810

3811
    if ((logfile = qemudLogFD(driver, vm->def->name, true)) < 0) {
3812 3813 3814 3815 3816 3817 3818 3819 3820 3821 3822 3823 3824 3825 3826 3827 3828 3829 3830 3831 3832 3833 3834
        /* To not break the normal domain shutdown process, skip the
         * timestamp log writing if failed on opening log file. */
        VIR_WARN("Unable to open logfile: %s",
                  virStrerror(errno, ebuf, sizeof ebuf));
    } else {
        if ((timestamp = virTimestamp()) == NULL) {
            virReportOOMError();
        } else {
            if (safewrite(logfile, timestamp, strlen(timestamp)) < 0 ||
                safewrite(logfile, SHUTDOWN_POSTFIX,
                          strlen(SHUTDOWN_POSTFIX)) < 0) {
                VIR_WARN("Unable to write timestamp to logfile: %s",
                         virStrerror(errno, ebuf, sizeof ebuf));
            }

            VIR_FREE(timestamp);
        }

        if (VIR_CLOSE(logfile) < 0)
             VIR_WARN("Unable to close logfile: %s",
                      virStrerror(errno, ebuf, sizeof ebuf));
    }

3835 3836 3837 3838
    /* This method is routinely used in clean up paths. Disable error
     * reporting so we don't squash a legit error. */
    orig_err = virSaveLastError();

3839
    virDomainConfVMNWFilterTeardown(vm);
S
Stefan Berger 已提交
3840

3841
    if (driver->macFilter) {
3842
        def = vm->def;
3843 3844 3845 3846
        for (i = 0 ; i < def->nnets ; i++) {
            virDomainNetDefPtr net = def->nets[i];
            if (net->ifname == NULL)
                continue;
3847
            if ((errno = networkDisallowMacOnPort(driver, net->ifname,
3848
                                                  net->mac))) {
3849
                virReportSystemError(errno,
3850 3851 3852 3853 3854 3855
             _("failed to remove ebtables rule to allow MAC address on  '%s'"),
                                     net->ifname);
            }
        }
    }

3856
    /* This will safely handle a non-running guest with pid=0 or pid=-1*/
G
Guido Günther 已提交
3857 3858
    if (virKillProcess(vm->pid, 0) == 0 &&
        virKillProcess(vm->pid, SIGTERM) < 0)
3859
        virReportSystemError(errno,
3860 3861
                             _("Failed to send SIGTERM to %s (%d)"),
                             vm->def->name, vm->pid);
3862

3863 3864
    if (priv->mon)
        qemuMonitorClose(priv->mon);
3865

3866 3867 3868 3869 3870
    if (priv->monConfig) {
        if (priv->monConfig->type == VIR_DOMAIN_CHR_TYPE_UNIX)
            unlink(priv->monConfig->data.nix.path);
        virDomainChrDefFree(priv->monConfig);
        priv->monConfig = NULL;
3871 3872
    }

G
Guido Günther 已提交
3873 3874
    /* shut it off for sure */
    virKillProcess(vm->pid, SIGKILL);
3875

3876 3877 3878 3879 3880 3881 3882 3883 3884 3885
    /* now that we know it's stopped call the hook if present */
    if (virHookPresent(VIR_HOOK_DRIVER_QEMU)) {
        char *xml = virDomainDefFormat(vm->def, 0);

        /* we can't stop the operation even if the script raised an error */
        virHookCall(VIR_HOOK_DRIVER_QEMU, vm->def->name,
                    VIR_HOOK_QEMU_OP_STOPPED, VIR_HOOK_SUBOP_END, NULL, xml);
        VIR_FREE(xml);
    }

3886
    /* Reset Security Labels */
3887
    if (driver->securityDriver &&
3888
        driver->securityDriver->domainRestoreSecurityAllLabel)
3889 3890
        driver->securityDriver->domainRestoreSecurityAllLabel(driver->securityDriver,
                                                              vm, migrated);
3891 3892
    if (driver->securityDriver &&
        driver->securityDriver->domainReleaseSecurityLabel)
3893 3894
        driver->securityDriver->domainReleaseSecurityLabel(driver->securityDriver,
                                                           vm);
3895

3896 3897 3898 3899 3900 3901 3902
    /* Clear out dynamically assigned labels */
    if (vm->def->seclabel.type == VIR_DOMAIN_SECLABEL_DYNAMIC) {
        VIR_FREE(vm->def->seclabel.model);
        VIR_FREE(vm->def->seclabel.label);
        VIR_FREE(vm->def->seclabel.imagelabel);
    }

D
Daniel P. Berrange 已提交
3903
    virDomainDefClearDeviceAliases(vm->def);
3904 3905 3906 3907 3908
    if (!priv->persistentAddrs) {
        virDomainDefClearPCIAddresses(vm->def);
        qemuDomainPCIAddressSetFree(priv->pciaddrs);
        priv->pciaddrs = NULL;
    }
3909

3910
    qemuDomainReAttachHostDevices(driver, vm->def);
3911

S
Stefan Berger 已提交
3912 3913 3914 3915
#if WITH_MACVTAP
    def = vm->def;
    for (i = 0; i < def->nnets; i++) {
        virDomainNetDefPtr net = def->nets[i];
3916
        if (net->type == VIR_DOMAIN_NET_TYPE_DIRECT) {
3917
            delMacvtap(net->ifname, net->mac, net->data.direct.linkdev,
3918
                       &net->data.direct.virtPortProfile);
3919 3920
            VIR_FREE(net->ifname);
        }
S
Stefan Berger 已提交
3921 3922 3923
    }
#endif

3924
retry:
3925
    if ((ret = qemuRemoveCgroup(driver, vm, 0)) < 0) {
3926 3927 3928 3929 3930 3931 3932 3933
        if (ret == -EBUSY && (retries++ < 5)) {
            usleep(200*1000);
            goto retry;
        }
        VIR_WARN("Failed to remove cgroup for %s",
                 vm->def->name);
    }

3934
    qemudRemoveDomainStatus(driver, vm);
D
Daniel P. Berrange 已提交
3935

3936 3937 3938 3939 3940 3941
    /* Remove VNC port from port reservation bitmap, but only if it was
       reserved by the driver (autoport=yes)
    */
    if ((vm->def->ngraphics == 1) &&
        vm->def->graphics[0]->type == VIR_DOMAIN_GRAPHICS_TYPE_VNC &&
        vm->def->graphics[0]->data.vnc.autoport &&
3942
        vm->def->graphics[0]->data.vnc.port >= QEMU_VNC_PORT_MIN) {
3943 3944 3945 3946 3947 3948 3949 3950
        if (virBitmapClearBit(driver->reservedVNCPorts,
                              vm->def->graphics[0]->data.vnc.port - \
                              QEMU_VNC_PORT_MIN) < 0) {
            VIR_DEBUG("virBitmapClearBit failed on bit %d",
                      vm->def->graphics[0]->data.vnc.port - QEMU_VNC_PORT_MIN);
       }
    }

3951
    vm->pid = -1;
3952
    vm->def->id = -1;
3953
    vm->state = VIR_DOMAIN_SHUTOFF;
3954 3955
    VIR_FREE(priv->vcpupids);
    priv->nvcpupids = 0;
3956 3957

    if (vm->newDef) {
3958
        virDomainDefFree(vm->def);
3959
        vm->def = vm->newDef;
3960
        vm->def->id = -1;
3961 3962
        vm->newDef = NULL;
    }
3963 3964 3965 3966 3967

    if (orig_err) {
        virSetError(orig_err);
        virFreeError(orig_err);
    }
3968 3969
}

3970
static virDrvOpenStatus qemudOpen(virConnectPtr conn,
3971
                                  virConnectAuthPtr auth ATTRIBUTE_UNUSED,
3972
                                  int flags ATTRIBUTE_UNUSED) {
3973
    if (conn->uri == NULL) {
3974 3975 3976
        if (qemu_driver == NULL)
            return VIR_DRV_OPEN_DECLINED;

3977
        conn->uri = xmlParseURI(qemu_driver->privileged ?
3978 3979
                                "qemu:///system" :
                                "qemu:///session");
3980
        if (!conn->uri) {
3981
            virReportOOMError();
3982 3983
            return VIR_DRV_OPEN_ERROR;
        }
3984 3985 3986 3987 3988 3989 3990 3991 3992 3993
    } else {
        /* If URI isn't 'qemu' its definitely not for us */
        if (conn->uri->scheme == NULL ||
            STRNEQ(conn->uri->scheme, "qemu"))
            return VIR_DRV_OPEN_DECLINED;

        /* Allow remote driver to deal with URIs with hostname server */
        if (conn->uri->server != NULL)
            return VIR_DRV_OPEN_DECLINED;

3994
        if (qemu_driver == NULL) {
3995 3996
            qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                            _("qemu state driver is not active"));
3997 3998 3999
            return VIR_DRV_OPEN_ERROR;
        }

4000
        if (conn->uri->path == NULL) {
4001 4002 4003 4004 4005
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("no QEMU URI path given, try %s"),
                            qemu_driver->privileged
                            ? "qemu:///system"
                            : "qemu:///session");
4006 4007 4008
                return VIR_DRV_OPEN_ERROR;
        }

4009
        if (qemu_driver->privileged) {
4010 4011
            if (STRNEQ (conn->uri->path, "/system") &&
                STRNEQ (conn->uri->path, "/session")) {
4012 4013 4014
                qemuReportError(VIR_ERR_INTERNAL_ERROR,
                                _("unexpected QEMU URI path '%s', try qemu:///system"),
                                conn->uri->path);
4015 4016 4017 4018
                return VIR_DRV_OPEN_ERROR;
            }
        } else {
            if (STRNEQ (conn->uri->path, "/session")) {
4019 4020 4021
                qemuReportError(VIR_ERR_INTERNAL_ERROR,
                                _("unexpected QEMU URI path '%s', try qemu:///session"),
                                conn->uri->path);
4022 4023 4024
                return VIR_DRV_OPEN_ERROR;
            }
        }
4025 4026 4027 4028 4029 4030 4031
    }
    conn->privateData = qemu_driver;

    return VIR_DRV_OPEN_SUCCESS;
}

static int qemudClose(virConnectPtr conn) {
4032
    struct qemud_driver *driver = conn->privateData;
4033 4034

    /* Get rid of callbacks registered for this conn */
4035
    qemuDriverLock(driver);
4036
    virDomainEventCallbackListRemoveConn(conn, driver->domainEventCallbacks);
4037
    qemuDriverUnlock(driver);
4038 4039 4040 4041 4042 4043

    conn->privateData = NULL;

    return 0;
}

D
Daniel Veillard 已提交
4044 4045 4046 4047 4048
/* Which features are supported by this driver? */
static int
qemudSupportsFeature (virConnectPtr conn ATTRIBUTE_UNUSED, int feature)
{
    switch (feature) {
4049 4050 4051 4052 4053
    case VIR_DRV_FEATURE_MIGRATION_V2:
    case VIR_DRV_FEATURE_MIGRATION_P2P:
        return 1;
    default:
        return 0;
D
Daniel Veillard 已提交
4054 4055 4056
    }
}

4057
static const char *qemudGetType(virConnectPtr conn ATTRIBUTE_UNUSED) {
4058
    return "QEMU";
4059 4060
}

4061

4062 4063 4064 4065 4066 4067 4068 4069 4070 4071 4072 4073 4074
static int qemuIsSecure(virConnectPtr conn ATTRIBUTE_UNUSED)
{
    /* Trivially secure, since always inside the daemon */
    return 1;
}

static int qemuIsEncrypted(virConnectPtr conn ATTRIBUTE_UNUSED)
{
    /* Not encrypted, but remote driver takes care of that */
    return 0;
}


4075 4076 4077 4078
static int kvmGetMaxVCPUs(void) {
    int maxvcpus = 1;

    int r, fd;
4079

4080 4081
    fd = open(KVM_DEVICE, O_RDONLY);
    if (fd < 0) {
4082
        virReportSystemError(errno, _("Unable to open %s"), KVM_DEVICE);
4083
        return -1;
4084 4085 4086 4087 4088 4089
    }

    r = ioctl(fd, KVM_CHECK_EXTENSION, KVM_CAP_NR_VCPUS);
    if (r > 0)
        maxvcpus = r;

4090
    VIR_FORCE_CLOSE(fd);
4091 4092 4093 4094
    return maxvcpus;
}


4095
static int qemudGetMaxVCPUs(virConnectPtr conn ATTRIBUTE_UNUSED, const char *type) {
4096 4097 4098
    if (!type)
        return 16;

4099
    if (STRCASEEQ(type, "qemu"))
4100 4101
        return 16;

4102
    if (STRCASEEQ(type, "kvm"))
4103
        return kvmGetMaxVCPUs();
4104

4105
    if (STRCASEEQ(type, "kqemu"))
4106
        return 1;
4107

4108 4109
    qemuReportError(VIR_ERR_INVALID_ARG,
                    _("unknown type '%s'"), type);
4110 4111 4112
    return -1;
}

4113

4114
static char *qemudGetCapabilities(virConnectPtr conn) {
4115
    struct qemud_driver *driver = conn->privateData;
4116
    virCapsPtr caps = NULL;
4117
    char *xml = NULL;
4118

4119
    qemuDriverLock(driver);
4120

4121
    if ((caps = qemuCreateCapabilities(qemu_driver->caps,
4122
                                       qemu_driver)) == NULL) {
4123 4124 4125
        virCapabilitiesFree(caps);
        goto cleanup;
    }
4126

4127
    virCapabilitiesFree(qemu_driver->caps);
4128 4129 4130
    qemu_driver->caps = caps;

    if ((xml = virCapabilitiesFormatXML(driver->caps)) == NULL)
4131
        virReportOOMError();
4132 4133

cleanup:
4134
    qemuDriverUnlock(driver);
4135

4136
    return xml;
4137 4138 4139
}


4140
static int qemudGetProcessInfo(unsigned long long *cpuTime, int *lastCpu, int pid, int tid) {
D
Daniel P. Berrange 已提交
4141 4142
    char proc[PATH_MAX];
    FILE *pidinfo;
4143
    unsigned long long usertime, systime;
4144 4145
    int cpu;
    int ret;
D
Daniel P. Berrange 已提交
4146

4147 4148 4149 4150 4151 4152
    if (tid)
        ret = snprintf(proc, sizeof(proc), "/proc/%d/task/%d/stat", pid, tid);
    else
        ret = snprintf(proc, sizeof(proc), "/proc/%d/stat", pid);
    if (ret >= (int)sizeof(proc)) {
        errno = E2BIG;
D
Daniel P. Berrange 已提交
4153 4154 4155 4156 4157
        return -1;
    }

    if (!(pidinfo = fopen(proc, "r"))) {
        /* VM probably shut down, so fake 0 */
4158 4159 4160 4161
        if (cpuTime)
            *cpuTime = 0;
        if (lastCpu)
            *lastCpu = 0;
D
Daniel P. Berrange 已提交
4162 4163 4164
        return 0;
    }

4165 4166 4167 4168 4169 4170 4171 4172 4173 4174
    /* See 'man proc' for information about what all these fields are. We're
     * only interested in a very few of them */
    if (fscanf(pidinfo,
               /* pid -> stime */
               "%*d %*s %*c %*d %*d %*d %*d %*d %*u %*u %*u %*u %*u %llu %llu"
               /* cutime -> endcode */
               "%*d %*d %*d %*d %*d %*u %*u %*d %*u %*u %*u %*u"
               /* startstack -> processor */
               "%*u %*u %*u %*u %*u %*u %*u %*u %*u %*u %*d %d",
               &usertime, &systime, &cpu) != 3) {
4175
        VIR_FORCE_FCLOSE(pidinfo);
4176 4177
        VIR_WARN0("cannot parse process status data");
        errno = -EINVAL;
D
Daniel P. Berrange 已提交
4178 4179 4180 4181 4182 4183 4184 4185
        return -1;
    }

    /* We got jiffies
     * We want nanoseconds
     * _SC_CLK_TCK is jiffies per second
     * So calulate thus....
     */
4186 4187 4188 4189 4190
    if (cpuTime)
        *cpuTime = 1000ull * 1000ull * 1000ull * (usertime + systime) / (unsigned long long)sysconf(_SC_CLK_TCK);
    if (lastCpu)
        *lastCpu = cpu;

D
Daniel P. Berrange 已提交
4191

4192 4193
    VIR_DEBUG("Got status for %d/%d user=%llu sys=%llu cpu=%d",
              pid, tid, usertime, systime, cpu);
D
Daniel P. Berrange 已提交
4194

4195
    VIR_FORCE_FCLOSE(pidinfo);
D
Daniel P. Berrange 已提交
4196 4197 4198 4199 4200

    return 0;
}


4201
static virDomainPtr qemudDomainLookupByID(virConnectPtr conn,
4202
                                          int id) {
4203 4204 4205 4206
    struct qemud_driver *driver = conn->privateData;
    virDomainObjPtr vm;
    virDomainPtr dom = NULL;

4207
    qemuDriverLock(driver);
4208
    vm  = virDomainFindByID(&driver->domains, id);
4209
    qemuDriverUnlock(driver);
4210 4211

    if (!vm) {
4212 4213
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching id %d"), id);
4214
        goto cleanup;
4215 4216
    }

4217
    dom = virGetDomain(conn, vm->def->name, vm->def->uuid);
4218
    if (dom) dom->id = vm->def->id;
4219 4220

cleanup:
4221 4222
    if (vm)
        virDomainObjUnlock(vm);
4223 4224
    return dom;
}
4225

4226
static virDomainPtr qemudDomainLookupByUUID(virConnectPtr conn,
4227
                                            const unsigned char *uuid) {
4228 4229 4230
    struct qemud_driver *driver = conn->privateData;
    virDomainObjPtr vm;
    virDomainPtr dom = NULL;
4231

4232
    qemuDriverLock(driver);
4233
    vm = virDomainFindByUUID(&driver->domains, uuid);
4234 4235
    qemuDriverUnlock(driver);

4236
    if (!vm) {
4237 4238
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(uuid, uuidstr);
4239 4240
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
4241
        goto cleanup;
4242 4243
    }

4244
    dom = virGetDomain(conn, vm->def->name, vm->def->uuid);
4245
    if (dom) dom->id = vm->def->id;
4246 4247

cleanup:
4248 4249
    if (vm)
        virDomainObjUnlock(vm);
4250 4251
    return dom;
}
4252

4253
static virDomainPtr qemudDomainLookupByName(virConnectPtr conn,
4254
                                            const char *name) {
4255 4256 4257
    struct qemud_driver *driver = conn->privateData;
    virDomainObjPtr vm;
    virDomainPtr dom = NULL;
4258

4259
    qemuDriverLock(driver);
4260
    vm = virDomainFindByName(&driver->domains, name);
4261 4262
    qemuDriverUnlock(driver);

4263
    if (!vm) {
4264 4265
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching name '%s'"), name);
4266
        goto cleanup;
4267 4268
    }

4269
    dom = virGetDomain(conn, vm->def->name, vm->def->uuid);
4270
    if (dom) dom->id = vm->def->id;
4271 4272

cleanup:
4273 4274
    if (vm)
        virDomainObjUnlock(vm);
4275 4276 4277
    return dom;
}

4278 4279 4280 4281 4282 4283 4284 4285 4286 4287 4288

static int qemuDomainIsActive(virDomainPtr dom)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr obj;
    int ret = -1;

    qemuDriverLock(driver);
    obj = virDomainFindByUUID(&driver->domains, dom->uuid);
    qemuDriverUnlock(driver);
    if (!obj) {
4289
        qemuReportError(VIR_ERR_NO_DOMAIN, NULL);
4290 4291 4292 4293 4294 4295 4296 4297 4298 4299 4300 4301 4302 4303 4304 4305 4306 4307 4308 4309
        goto cleanup;
    }
    ret = virDomainObjIsActive(obj);

cleanup:
    if (obj)
        virDomainObjUnlock(obj);
    return ret;
}

static int qemuDomainIsPersistent(virDomainPtr dom)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr obj;
    int ret = -1;

    qemuDriverLock(driver);
    obj = virDomainFindByUUID(&driver->domains, dom->uuid);
    qemuDriverUnlock(driver);
    if (!obj) {
4310
        qemuReportError(VIR_ERR_NO_DOMAIN, NULL);
4311 4312 4313 4314 4315 4316 4317 4318 4319 4320
        goto cleanup;
    }
    ret = obj->persistent;

cleanup:
    if (obj)
        virDomainObjUnlock(obj);
    return ret;
}

4321 4322 4323 4324 4325 4326 4327 4328 4329 4330 4331 4332 4333 4334 4335 4336 4337 4338 4339 4340
static int qemuDomainIsUpdated(virDomainPtr dom)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr obj;
    int ret = -1;

    qemuDriverLock(driver);
    obj = virDomainFindByUUID(&driver->domains, dom->uuid);
    qemuDriverUnlock(driver);
    if (!obj) {
        qemuReportError(VIR_ERR_NO_DOMAIN, NULL);
        goto cleanup;
    }
    ret = obj->updated;

cleanup:
    if (obj)
        virDomainObjUnlock(obj);
    return ret;
}
4341

4342
static int qemudGetVersion(virConnectPtr conn, unsigned long *version) {
4343 4344 4345
    struct qemud_driver *driver = conn->privateData;
    int ret = -1;

4346
    qemuDriverLock(driver);
4347
    if (qemuCapsExtractVersion(driver->caps, &driver->qemuVersion) < 0)
4348
        goto cleanup;
4349

4350
    *version = driver->qemuVersion;
4351 4352 4353
    ret = 0;

cleanup:
4354
    qemuDriverUnlock(driver);
4355
    return ret;
D
Daniel P. Berrange 已提交
4356 4357
}

4358
static int qemudListDomains(virConnectPtr conn, int *ids, int nids) {
4359
    struct qemud_driver *driver = conn->privateData;
4360
    int n;
4361

4362
    qemuDriverLock(driver);
4363
    n = virDomainObjListGetActiveIDs(&driver->domains, ids, nids);
4364
    qemuDriverUnlock(driver);
4365

4366
    return n;
D
Daniel P. Berrange 已提交
4367
}
4368

4369
static int qemudNumDomains(virConnectPtr conn) {
4370
    struct qemud_driver *driver = conn->privateData;
4371
    int n;
4372

4373
    qemuDriverLock(driver);
4374
    n = virDomainObjListNumOfDomains(&driver->domains, 1);
4375
    qemuDriverUnlock(driver);
4376

4377
    return n;
D
Daniel P. Berrange 已提交
4378
}
4379

4380
static virDomainPtr qemudDomainCreate(virConnectPtr conn, const char *xml,
4381
                                      unsigned int flags) {
4382
    struct qemud_driver *driver = conn->privateData;
4383
    virDomainDefPtr def;
4384
    virDomainObjPtr vm = NULL;
4385
    virDomainPtr dom = NULL;
4386
    virDomainEventPtr event = NULL;
D
Daniel P. Berrange 已提交
4387

4388
    virCheckFlags(VIR_DOMAIN_START_PAUSED, NULL);
4389

4390
    qemuDriverLock(driver);
4391
    if (!(def = virDomainDefParseString(driver->caps, xml,
4392
                                        VIR_DOMAIN_XML_INACTIVE)))
4393
        goto cleanup;
4394

4395
    if (virSecurityDriverVerify(def) < 0)
4396 4397
        goto cleanup;

4398 4399
    if (virDomainObjIsDuplicate(&driver->domains, def, 1) < 0)
        goto cleanup;
4400

4401 4402 4403 4404 4405 4406
    if (qemudCanonicalizeMachine(driver, def) < 0)
        goto cleanup;

    if (qemuAssignPCIAddresses(def) < 0)
        goto cleanup;

4407
    if (!(vm = virDomainAssignDef(driver->caps,
4408
                                  &driver->domains,
4409
                                  def, false)))
4410 4411 4412
        goto cleanup;

    def = NULL;
D
Daniel P. Berrange 已提交
4413

4414 4415 4416
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup; /* XXXX free the 'vm' we created ? */

4417 4418
    if (qemudStartVMDaemon(conn, driver, vm, NULL,
                           (flags & VIR_DOMAIN_START_PAUSED) != 0,
4419
                           -1, NULL, VIR_VM_OP_CREATE) < 0) {
4420
        qemuDomainStartAudit(vm, "booted", false);
4421 4422 4423
        if (qemuDomainObjEndJob(vm) > 0)
            virDomainRemoveInactive(&driver->domains,
                                    vm);
4424
        vm = NULL;
4425
        goto cleanup;
D
Daniel P. Berrange 已提交
4426
    }
4427 4428 4429 4430

    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STARTED,
                                     VIR_DOMAIN_EVENT_STARTED_BOOTED);
4431
    qemuDomainStartAudit(vm, "booted", true);
D
Daniel P. Berrange 已提交
4432

4433
    dom = virGetDomain(conn, vm->def->name, vm->def->uuid);
4434
    if (dom) dom->id = vm->def->id;
4435

4436 4437 4438
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
4439

4440 4441
cleanup:
    virDomainDefFree(def);
4442 4443
    if (vm)
        virDomainObjUnlock(vm);
4444 4445
    if (event)
        qemuDomainEventQueue(driver, event);
4446
    qemuDriverUnlock(driver);
4447
    return dom;
D
Daniel P. Berrange 已提交
4448 4449 4450
}


4451
static int qemudDomainSuspend(virDomainPtr dom) {
4452 4453 4454
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
4455
    virDomainEventPtr event = NULL;
4456
    qemuDomainObjPrivatePtr priv;
4457

4458
    qemuDriverLock(driver);
4459
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4460

D
Daniel P. Berrange 已提交
4461
    if (!vm) {
4462 4463
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
4464 4465
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
4466
        goto cleanup;
D
Daniel P. Berrange 已提交
4467
    }
D
Daniel P. Berrange 已提交
4468
    if (!virDomainObjIsActive(vm)) {
4469 4470
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
4471
        goto cleanup;
D
Daniel P. Berrange 已提交
4472
    }
4473 4474 4475

    priv = vm->privateData;

4476
    if (priv->jobActive == QEMU_JOB_MIGRATION_OUT) {
4477 4478 4479 4480 4481 4482 4483 4484 4485 4486 4487 4488 4489 4490
        if (vm->state != VIR_DOMAIN_PAUSED) {
            VIR_DEBUG("Requesting domain pause on %s",
                      vm->def->name);
            priv->jobSignals |= QEMU_JOB_SIGNAL_SUSPEND;
        }
        ret = 0;
        goto cleanup;
    } else {
        if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
            goto cleanup;

        if (!virDomainObjIsActive(vm)) {
            qemuReportError(VIR_ERR_OPERATION_INVALID,
                            "%s", _("domain is not running"));
4491
            goto endjob;
4492
        }
4493
        if (vm->state != VIR_DOMAIN_PAUSED) {
H
Hu Tao 已提交
4494
            if (doStopCPUs(driver, vm) < 0) {
4495
                goto endjob;
4496
            }
4497 4498 4499 4500 4501 4502 4503
            event = virDomainEventNewFromObj(vm,
                                             VIR_DOMAIN_EVENT_SUSPENDED,
                                             VIR_DOMAIN_EVENT_SUSPENDED_PAUSED);
        }
        if (virDomainSaveStatus(driver->caps, driver->stateDir, vm) < 0)
            goto endjob;
        ret = 0;
D
Daniel P. Berrange 已提交
4504
    }
4505

4506
endjob:
4507 4508
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
4509

4510
cleanup:
4511 4512
    if (vm)
        virDomainObjUnlock(vm);
4513

4514
    if (event)
4515
        qemuDomainEventQueue(driver, event);
4516
    qemuDriverUnlock(driver);
4517
    return ret;
D
Daniel P. Berrange 已提交
4518 4519 4520
}


4521
static int qemudDomainResume(virDomainPtr dom) {
4522 4523 4524
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
4525
    virDomainEventPtr event = NULL;
4526

4527
    qemuDriverLock(driver);
4528
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4529

D
Daniel P. Berrange 已提交
4530
    if (!vm) {
4531 4532
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
4533 4534
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
4535
        goto cleanup;
D
Daniel P. Berrange 已提交
4536
    }
4537 4538 4539 4540

    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
4541
    if (!virDomainObjIsActive(vm)) {
4542 4543
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
4544
        goto endjob;
D
Daniel P. Berrange 已提交
4545
    }
4546
    if (vm->state == VIR_DOMAIN_PAUSED) {
H
Hu Tao 已提交
4547
        if (doStartCPUs(driver, vm, dom->conn) < 0) {
4548
            if (virGetLastError() == NULL)
4549 4550
                qemuReportError(VIR_ERR_OPERATION_FAILED,
                                "%s", _("resume operation failed"));
4551
            goto endjob;
4552
        }
4553 4554 4555
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_RESUMED,
                                         VIR_DOMAIN_EVENT_RESUMED_UNPAUSED);
D
Daniel P. Berrange 已提交
4556
    }
4557
    if (virDomainSaveStatus(driver->caps, driver->stateDir, vm) < 0)
4558
        goto endjob;
4559 4560
    ret = 0;

4561
endjob:
4562 4563
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
4564

4565
cleanup:
4566 4567
    if (vm)
        virDomainObjUnlock(vm);
4568
    if (event)
4569
        qemuDomainEventQueue(driver, event);
4570
    qemuDriverUnlock(driver);
4571
    return ret;
D
Daniel P. Berrange 已提交
4572 4573 4574
}


4575
static int qemudDomainShutdown(virDomainPtr dom) {
4576 4577 4578
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
4579

4580
    qemuDriverLock(driver);
4581
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4582 4583
    qemuDriverUnlock(driver);

4584
    if (!vm) {
4585 4586
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
4587 4588
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
4589
        goto cleanup;
4590 4591
    }

4592 4593 4594
    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
4595
    if (!virDomainObjIsActive(vm)) {
4596 4597
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
4598
        goto endjob;
4599 4600
    }

4601
    qemuDomainObjPrivatePtr priv = vm->privateData;
4602 4603 4604
    qemuDomainObjEnterMonitor(vm);
    ret = qemuMonitorSystemPowerdown(priv->mon);
    qemuDomainObjExitMonitor(vm);
4605

4606
endjob:
4607 4608
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
4609

4610
cleanup:
4611 4612
    if (vm)
        virDomainObjUnlock(vm);
4613
    return ret;
4614 4615 4616
}


4617
static int qemudDomainDestroy(virDomainPtr dom) {
4618 4619 4620
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
4621
    virDomainEventPtr event = NULL;
4622

4623
    qemuDriverLock(driver);
4624
    vm  = virDomainFindByUUID(&driver->domains, dom->uuid);
D
Daniel P. Berrange 已提交
4625
    if (!vm) {
4626 4627
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
4628 4629
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
4630
        goto cleanup;
D
Daniel P. Berrange 已提交
4631
    }
4632 4633 4634 4635

    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
4636
    if (!virDomainObjIsActive(vm)) {
4637 4638
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
4639
        goto endjob;
4640
    }
4641

4642
    qemudShutdownVMDaemon(driver, vm, 0);
4643 4644 4645
    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STOPPED,
                                     VIR_DOMAIN_EVENT_STOPPED_DESTROYED);
4646 4647
    qemuDomainStopAudit(vm, "destroyed");

4648
    if (!vm->persistent) {
4649 4650 4651
        if (qemuDomainObjEndJob(vm) > 0)
            virDomainRemoveInactive(&driver->domains,
                                    vm);
4652 4653
        vm = NULL;
    }
4654 4655
    ret = 0;

4656
endjob:
4657 4658 4659
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
4660

4661
cleanup:
4662 4663
    if (vm)
        virDomainObjUnlock(vm);
4664 4665
    if (event)
        qemuDomainEventQueue(driver, event);
4666
    qemuDriverUnlock(driver);
4667
    return ret;
D
Daniel P. Berrange 已提交
4668 4669 4670
}


4671
static char *qemudDomainGetOSType(virDomainPtr dom) {
4672 4673 4674
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    char *type = NULL;
4675

4676
    qemuDriverLock(driver);
4677
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4678
    qemuDriverUnlock(driver);
4679
    if (!vm) {
4680 4681
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
4682 4683
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
4684
        goto cleanup;
4685 4686
    }

4687
    if (!(type = strdup(vm->def->os.type)))
4688
        virReportOOMError();
4689 4690

cleanup:
4691 4692
    if (vm)
        virDomainObjUnlock(vm);
4693 4694 4695
    return type;
}

4696 4697
/* Returns max memory in kb, 0 if error */
static unsigned long qemudDomainGetMaxMemory(virDomainPtr dom) {
4698 4699 4700
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    unsigned long ret = 0;
4701

4702
    qemuDriverLock(driver);
4703
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4704 4705
    qemuDriverUnlock(driver);

4706
    if (!vm) {
4707 4708
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
4709 4710
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
4711
        goto cleanup;
4712 4713
    }

4714
    ret = vm->def->mem.max_balloon;
4715 4716

cleanup:
4717 4718
    if (vm)
        virDomainObjUnlock(vm);
4719
    return ret;
4720 4721 4722
}

static int qemudDomainSetMemory(virDomainPtr dom, unsigned long newmem) {
4723
    struct qemud_driver *driver = dom->conn->privateData;
4724
    qemuDomainObjPrivatePtr priv;
4725
    virDomainObjPtr vm;
4726
    int ret = -1, r;
4727

4728
    qemuDriverLock(driver);
4729
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4730
    qemuDriverUnlock(driver);
4731
    if (!vm) {
4732 4733
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
4734 4735
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
4736
        goto cleanup;
4737 4738
    }

4739
    if (newmem > vm->def->mem.max_balloon) {
4740 4741
        qemuReportError(VIR_ERR_INVALID_ARG,
                        "%s", _("cannot set memory higher than max memory"));
4742
        goto cleanup;
4743 4744
    }

4745 4746 4747
    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

4748 4749 4750 4751 4752 4753
    if (!virDomainObjIsActive(vm)) {
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
        goto endjob;
    }

4754 4755 4756 4757 4758 4759
    priv = vm->privateData;
    qemuDomainObjEnterMonitor(vm);
    r = qemuMonitorSetBalloon(priv->mon, newmem);
    qemuDomainObjExitMonitor(vm);
    if (r < 0)
        goto endjob;
4760

4761 4762 4763 4764 4765
    /* Lack of balloon support is a fatal error */
    if (r == 0) {
        qemuReportError(VIR_ERR_NO_SUPPORT,
                        "%s", _("cannot set memory of an active domain"));
        goto endjob;
4766
    }
4767

4768
    ret = 0;
4769
endjob:
4770 4771
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
4772

4773
cleanup:
4774 4775
    if (vm)
        virDomainObjUnlock(vm);
4776
    return ret;
4777 4778
}

4779
static int qemudDomainGetInfo(virDomainPtr dom,
4780
                              virDomainInfoPtr info) {
4781 4782 4783
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
4784 4785
    int err;
    unsigned long balloon;
4786

4787
    qemuDriverLock(driver);
4788
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4789
    qemuDriverUnlock(driver);
D
Daniel P. Berrange 已提交
4790
    if (!vm) {
4791 4792
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
4793 4794
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
4795
        goto cleanup;
D
Daniel P. Berrange 已提交
4796 4797
    }

4798
    info->state = vm->state;
D
Daniel P. Berrange 已提交
4799

D
Daniel P. Berrange 已提交
4800
    if (!virDomainObjIsActive(vm)) {
4801
        info->cpuTime = 0;
D
Daniel P. Berrange 已提交
4802
    } else {
4803
        if (qemudGetProcessInfo(&(info->cpuTime), NULL, vm->pid, 0) < 0) {
4804
            qemuReportError(VIR_ERR_OPERATION_FAILED, ("cannot read cputime for domain"));
4805
            goto cleanup;
D
Daniel P. Berrange 已提交
4806 4807 4808
        }
    }

4809
    info->maxMem = vm->def->mem.max_balloon;
4810

D
Daniel P. Berrange 已提交
4811
    if (virDomainObjIsActive(vm)) {
4812
        qemuDomainObjPrivatePtr priv = vm->privateData;
4813 4814 4815

        if ((vm->def->memballoon != NULL) &&
            (vm->def->memballoon->model == VIR_DOMAIN_MEMBALLOON_MODEL_NONE)) {
4816
            info->memory = vm->def->mem.max_balloon;
4817
        } else if (!priv->jobActive) {
4818 4819
            if (qemuDomainObjBeginJob(vm) < 0)
                goto cleanup;
4820 4821 4822 4823 4824 4825 4826 4827 4828
            if (!virDomainObjIsActive(vm))
                err = 0;
            else {
                qemuDomainObjEnterMonitor(vm);
                err = qemuMonitorGetBalloonInfo(priv->mon, &balloon);
                qemuDomainObjExitMonitor(vm);
            }
            if (qemuDomainObjEndJob(vm) == 0) {
                vm = NULL;
4829 4830 4831
                goto cleanup;
            }

4832 4833
            if (err < 0)
                goto cleanup;
4834 4835
            if (err == 0)
                /* Balloon not supported, so maxmem is always the allocation */
4836
                info->memory = vm->def->mem.max_balloon;
4837 4838 4839
            else
                info->memory = balloon;
        } else {
4840
            info->memory = vm->def->mem.cur_balloon;
4841
        }
4842
    } else {
4843
        info->memory = vm->def->mem.cur_balloon;
4844 4845
    }

4846
    info->nrVirtCpu = vm->def->vcpus;
4847 4848 4849
    ret = 0;

cleanup:
4850 4851
    if (vm)
        virDomainObjUnlock(vm);
4852
    return ret;
D
Daniel P. Berrange 已提交
4853 4854 4855
}


4856 4857 4858 4859 4860 4861 4862 4863 4864
/** qemuDomainMigrateOffline:
 * Pause domain for non-live migration.
 */
static int
qemuDomainMigrateOffline(struct qemud_driver *driver,
                         virDomainObjPtr vm)
{
    int ret;

H
Hu Tao 已提交
4865
    ret = doStopCPUs(driver, vm);
4866 4867 4868 4869 4870 4871 4872 4873
    if (ret == 0) {
        virDomainEventPtr event;

        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_SUSPENDED,
                                         VIR_DOMAIN_EVENT_SUSPENDED_MIGRATED);
        if (event)
            qemuDomainEventQueue(driver, event);
H
Hu Tao 已提交
4874
    }
4875 4876 4877 4878 4879

    return ret;
}


4880 4881 4882 4883 4884 4885 4886 4887 4888 4889 4890 4891 4892 4893
static int
qemuDomainWaitForMigrationComplete(struct qemud_driver *driver, virDomainObjPtr vm)
{
    int ret = -1;
    int status;
    unsigned long long memProcessed;
    unsigned long long memRemaining;
    unsigned long long memTotal;
    qemuDomainObjPrivatePtr priv = vm->privateData;

    priv->jobInfo.type = VIR_DOMAIN_JOB_UNBOUNDED;

    while (priv->jobInfo.type == VIR_DOMAIN_JOB_UNBOUNDED) {
        /* Poll every 50ms for progress & to allow cancellation */
4894
        struct timespec ts = { .tv_sec = 0, .tv_nsec = 50 * 1000 * 1000ull };
4895 4896
        struct timeval now;
        int rc;
O
Osier Yang 已提交
4897 4898 4899 4900 4901 4902 4903 4904 4905 4906 4907 4908 4909 4910 4911 4912
        const char *job;

        switch (priv->jobActive) {
            case QEMU_JOB_MIGRATION_OUT:
                job = _("migration job");
                break;
            case QEMU_JOB_SAVE:
                job = _("domain save job");
                break;
            case QEMU_JOB_DUMP:
                job = _("domain core dump job");
                break;
            default:
                job = _("job");
        }

4913

4914
        if (!virDomainObjIsActive(vm)) {
O
Osier Yang 已提交
4915 4916
            qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s: %s",
                            job, _("guest unexpectedly quit"));
4917 4918 4919
            goto cleanup;
        }

4920 4921
        if (priv->jobSignals & QEMU_JOB_SIGNAL_CANCEL) {
            priv->jobSignals ^= QEMU_JOB_SIGNAL_CANCEL;
O
Osier Yang 已提交
4922
            VIR_DEBUG0("Cancelling job at client request");
4923 4924 4925 4926
            qemuDomainObjEnterMonitorWithDriver(driver, vm);
            rc = qemuMonitorMigrateCancel(priv->mon);
            qemuDomainObjExitMonitorWithDriver(driver, vm);
            if (rc < 0) {
O
Osier Yang 已提交
4927
                VIR_WARN0("Unable to cancel job");
4928
            }
4929 4930 4931 4932 4933
        } else if (priv->jobSignals & QEMU_JOB_SIGNAL_SUSPEND) {
            priv->jobSignals ^= QEMU_JOB_SIGNAL_SUSPEND;
            VIR_DEBUG0("Pausing domain for non-live migration");
            if (qemuDomainMigrateOffline(driver, vm) < 0)
                VIR_WARN0("Unable to pause domain");
4934 4935 4936 4937 4938 4939 4940 4941 4942 4943 4944
        } else if (priv->jobSignals & QEMU_JOB_SIGNAL_MIGRATE_DOWNTIME) {
            unsigned long long ms = priv->jobSignalsData.migrateDowntime;

            priv->jobSignals ^= QEMU_JOB_SIGNAL_MIGRATE_DOWNTIME;
            priv->jobSignalsData.migrateDowntime = 0;
            VIR_DEBUG("Setting migration downtime to %llums", ms);
            qemuDomainObjEnterMonitorWithDriver(driver, vm);
            rc = qemuMonitorSetMigrationDowntime(priv->mon, ms);
            qemuDomainObjExitMonitorWithDriver(driver, vm);
            if (rc < 0)
                VIR_WARN0("Unable to set migration downtime");
4945 4946
        }

4947 4948 4949 4950
        /* Repeat check because the job signals might have caused
         * guest to die
         */
        if (!virDomainObjIsActive(vm)) {
O
Osier Yang 已提交
4951 4952
            qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s: %s",
                            job, _("guest unexpectedly quit"));
4953 4954 4955
            goto cleanup;
        }

4956 4957 4958 4959 4960 4961 4962 4963 4964 4965 4966 4967 4968 4969 4970 4971 4972 4973 4974
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
        rc = qemuMonitorGetMigrationStatus(priv->mon,
                                           &status,
                                           &memProcessed,
                                           &memRemaining,
                                           &memTotal);
        qemuDomainObjExitMonitorWithDriver(driver, vm);

        if (rc < 0) {
            priv->jobInfo.type = VIR_DOMAIN_JOB_FAILED;
            goto cleanup;
        }

        if (gettimeofday(&now, NULL) < 0) {
            priv->jobInfo.type = VIR_DOMAIN_JOB_FAILED;
            virReportSystemError(errno, "%s",
                                 _("cannot get time of day"));
            goto cleanup;
        }
4975
        priv->jobInfo.timeElapsed = timeval_to_ms(now) - priv->jobStart;
4976 4977 4978 4979 4980

        switch (status) {
        case QEMU_MONITOR_MIGRATION_STATUS_INACTIVE:
            priv->jobInfo.type = VIR_DOMAIN_JOB_NONE;
            qemuReportError(VIR_ERR_OPERATION_FAILED,
O
Osier Yang 已提交
4981
                            "%s: %s", job, _("is not active"));
4982 4983 4984 4985 4986 4987 4988 4989 4990 4991 4992 4993 4994 4995 4996 4997 4998 4999 5000 5001
            break;

        case QEMU_MONITOR_MIGRATION_STATUS_ACTIVE:
            priv->jobInfo.dataTotal = memTotal;
            priv->jobInfo.dataRemaining = memRemaining;
            priv->jobInfo.dataProcessed = memProcessed;

            priv->jobInfo.memTotal = memTotal;
            priv->jobInfo.memRemaining = memRemaining;
            priv->jobInfo.memProcessed = memProcessed;
            break;

        case QEMU_MONITOR_MIGRATION_STATUS_COMPLETED:
            priv->jobInfo.type = VIR_DOMAIN_JOB_COMPLETED;
            ret = 0;
            break;

        case QEMU_MONITOR_MIGRATION_STATUS_ERROR:
            priv->jobInfo.type = VIR_DOMAIN_JOB_FAILED;
            qemuReportError(VIR_ERR_OPERATION_FAILED,
O
Osier Yang 已提交
5002
                            "%s: %s", job, _("unexpectedly failed"));
5003 5004 5005 5006 5007
            break;

        case QEMU_MONITOR_MIGRATION_STATUS_CANCELLED:
            priv->jobInfo.type = VIR_DOMAIN_JOB_CANCELLED;
            qemuReportError(VIR_ERR_OPERATION_FAILED,
O
Osier Yang 已提交
5008
                            "%s: %s", job, _("canceled by client"));
5009 5010 5011 5012 5013 5014 5015 5016 5017 5018 5019 5020 5021 5022 5023 5024 5025
            break;
        }

        virDomainObjUnlock(vm);
        qemuDriverUnlock(driver);

        nanosleep(&ts, NULL);

        qemuDriverLock(driver);
        virDomainObjLock(vm);
    }

cleanup:
    return ret;
}


5026
#define QEMUD_SAVE_MAGIC "LibvirtQemudSave"
5027 5028 5029
#define QEMUD_SAVE_VERSION 2

enum qemud_save_formats {
5030 5031 5032
    QEMUD_SAVE_FORMAT_RAW = 0,
    QEMUD_SAVE_FORMAT_GZIP = 1,
    QEMUD_SAVE_FORMAT_BZIP2 = 2,
5033 5034
    /*
     * Deprecated by xz and never used as part of a release
5035
     * QEMUD_SAVE_FORMAT_LZMA
5036 5037
     */
    QEMUD_SAVE_FORMAT_XZ = 3,
5038
    QEMUD_SAVE_FORMAT_LZOP = 4,
5039 5040 5041
    /* Note: add new members only at the end.
       These values are used in the on-disk format.
       Do not change or re-use numbers. */
5042 5043

    QEMUD_SAVE_FORMAT_LAST
5044
};
5045

5046 5047 5048 5049 5050
VIR_ENUM_DECL(qemudSaveCompression)
VIR_ENUM_IMPL(qemudSaveCompression, QEMUD_SAVE_FORMAT_LAST,
              "raw",
              "gzip",
              "bzip2",
5051 5052
              "xz",
              "lzop")
5053

5054 5055 5056 5057 5058
struct qemud_save_header {
    char magic[sizeof(QEMUD_SAVE_MAGIC)-1];
    int version;
    int xml_len;
    int was_running;
5059 5060
    int compressed;
    int unused[15];
5061 5062
};

5063 5064 5065 5066 5067 5068 5069
struct fileOpHookData {
    virDomainPtr dom;
    const char *path;
    char *xml;
    struct qemud_save_header *header;
};

5070
/* return -errno on failure, or 0 on success */
5071 5072 5073 5074 5075
static int qemudDomainSaveFileOpHook(int fd, void *data) {
    struct fileOpHookData *hdata = data;
    int ret = 0;

    if (safewrite(fd, hdata->header, sizeof(*hdata->header)) != sizeof(*hdata->header)) {
5076
        ret = -errno;
5077
        qemuReportError(VIR_ERR_OPERATION_FAILED,
5078 5079
                        _("failed to write header to domain save file '%s'"),
                        hdata->path);
5080 5081 5082 5083
        goto endjob;
    }

    if (safewrite(fd, hdata->xml, hdata->header->xml_len) != hdata->header->xml_len) {
5084
        ret = -errno;
5085 5086 5087 5088 5089 5090 5091 5092
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                         _("failed to write xml to '%s'"), hdata->path);
        goto endjob;
    }
endjob:
    return ret;
}

5093 5094 5095
/* this internal function expects the driver lock to already be held on entry */
static int qemudDomainSaveFlag(struct qemud_driver *driver, virDomainPtr dom,
                               virDomainObjPtr vm, const char *path,
5096
                               int compressed)
5097
{
5098
    char *xml = NULL;
5099
    struct qemud_save_header header;
5100 5101
    struct fileOpHookData hdata;
    int bypassSecurityDriver = 0;
5102
    int ret = -1;
5103
    int rc;
5104
    virDomainEventPtr event = NULL;
5105
    qemuDomainObjPrivatePtr priv;
5106 5107
    struct stat sb;
    int is_reg = 0;
5108
    unsigned long long offset;
5109
    virCgroupPtr cgroup = NULL;
5110 5111 5112 5113 5114

    memset(&header, 0, sizeof(header));
    memcpy(header.magic, QEMUD_SAVE_MAGIC, sizeof(header.magic));
    header.version = QEMUD_SAVE_VERSION;

5115
    header.compressed = compressed;
5116

5117
    priv = vm->privateData;
5118

5119 5120 5121
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
5122
    if (!virDomainObjIsActive(vm)) {
5123 5124
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
5125
        goto endjob;
D
Daniel P. Berrange 已提交
5126
    }
5127

O
Osier Yang 已提交
5128 5129
    priv->jobActive = QEMU_JOB_SAVE;

5130 5131 5132
    memset(&priv->jobInfo, 0, sizeof(priv->jobInfo));
    priv->jobInfo.type = VIR_DOMAIN_JOB_UNBOUNDED;

5133 5134 5135
    /* Pause */
    if (vm->state == VIR_DOMAIN_RUNNING) {
        header.was_running = 1;
H
Hu Tao 已提交
5136
        if (doStopCPUs(driver, vm) < 0)
5137
            goto endjob;
5138 5139 5140 5141 5142 5143

        if (!virDomainObjIsActive(vm)) {
            qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                            _("guest unexpectedly quit"));
            goto endjob;
        }
5144 5145 5146
    }

    /* Get XML for the domain */
5147
    xml = virDomainDefFormat(vm->def, VIR_DOMAIN_XML_SECURE);
5148
    if (!xml) {
5149 5150
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("failed to get domain xml"));
5151
        goto endjob;
5152 5153 5154
    }
    header.xml_len = strlen(xml) + 1;

5155 5156 5157 5158 5159 5160 5161 5162 5163 5164 5165 5166 5167
    /* path might be a pre-existing block dev, in which case
     * we need to skip the create step, and also avoid unlink
     * in the failure case */
    if (stat(path, &sb) < 0) {
        /* Avoid throwing an error here, since it is possible
         * that with NFS we can't actually stat() the file.
         * The subsequent codepaths will still raise an error
         * if a truely fatal problem is hit */
        is_reg = 1;
    } else {
        is_reg = S_ISREG(sb.st_mode);
    }

5168 5169 5170 5171 5172
    offset = sizeof(header) + header.xml_len;

    /* Due to way we append QEMU state on our header with dd,
     * we need to ensure there's a 512 byte boundary. Unfortunately
     * we don't have an explicit offset in the header, so we fake
5173 5174
     * it by padding the XML string with NULLs.
     */
5175 5176 5177 5178 5179 5180 5181 5182 5183 5184 5185 5186 5187
    if (offset % QEMU_MONITOR_MIGRATE_TO_FILE_BS) {
        unsigned long long pad =
            QEMU_MONITOR_MIGRATE_TO_FILE_BS -
            (offset % QEMU_MONITOR_MIGRATE_TO_FILE_BS);

        if (VIR_REALLOC_N(xml, header.xml_len + pad) < 0) {
            virReportOOMError();
            goto endjob;
        }
        memset(xml + header.xml_len, 0, pad);
        offset += pad;
        header.xml_len += pad;
    }
5188

5189 5190 5191 5192 5193 5194
    /* Setup hook data needed by virFileOperation hook function */
    hdata.dom = dom;
    hdata.path = path;
    hdata.xml = xml;
    hdata.header = &header;

5195 5196
    /* Write header to file, followed by XML */

5197
    /* First try creating the file as root */
5198 5199 5200 5201
    if (!is_reg) {
        int fd = open(path, O_WRONLY | O_TRUNC);
        if (fd < 0) {
            virReportSystemError(errno, _("unable to open %s"), path);
5202 5203
            goto endjob;
        }
5204
        if (qemudDomainSaveFileOpHook(fd, &hdata) < 0) {
5205
            VIR_FORCE_CLOSE(fd);
5206 5207
            goto endjob;
        }
5208
        if (VIR_CLOSE(fd) < 0) {
5209
            virReportSystemError(errno, _("unable to close %s"), path);
5210 5211
            goto endjob;
        }
5212 5213 5214 5215 5216
    } else {
        if ((rc = virFileOperation(path, O_CREAT|O_TRUNC|O_WRONLY,
                                  S_IRUSR|S_IWUSR,
                                  getuid(), getgid(),
                                  qemudDomainSaveFileOpHook, &hdata,
5217
                                  0)) < 0) {
5218
            /* If we failed as root, and the error was permission-denied
5219 5220
               (EACCES or EPERM), assume it's on a network-connected share
               where root access is restricted (eg, root-squashed NFS). If the
5221 5222 5223 5224
               qemu user (driver->user) is non-root, just set a flag to
               bypass security driver shenanigans, and retry the operation
               after doing setuid to qemu user */

5225
            if (((rc != -EACCES) && (rc != -EPERM)) ||
5226
                driver->user == getuid()) {
5227
                virReportSystemError(-rc, _("Failed to create domain save file '%s'"),
5228 5229 5230
                                     path);
                goto endjob;
            }
5231

5232
            /* On Linux we can also verify the FS-type of the directory. */
5233 5234 5235 5236 5237 5238 5239 5240 5241 5242 5243 5244 5245 5246 5247 5248 5249 5250
            switch (virStorageFileIsSharedFS(path)) {
                case 1:
                   /* it was on a network share, so we'll continue
                    * as outlined above
                    */
                   break;

                case -1:
                   virReportSystemError(errno,
                                        _("Failed to create domain save file "
                                          "'%s': couldn't determine fs type"),
                                        path);
                   goto endjob;
                   break;

                case 0:
                default:
                   /* local file - log the error returned by virFileOperation */
5251
                   virReportSystemError(-rc,
5252 5253 5254 5255
                                        _("Failed to create domain save file '%s'"),
                                        path);
                   goto endjob;
                   break;
5256 5257 5258

            }

5259
            /* Retry creating the file as driver->user */
5260

5261 5262 5263 5264
            if ((rc = virFileOperation(path, O_CREAT|O_TRUNC|O_WRONLY,
                                       S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP,
                                       driver->user, driver->group,
                                       qemudDomainSaveFileOpHook, &hdata,
5265 5266
                                       VIR_FILE_OP_AS_UID)) < 0) {
                virReportSystemError(-rc, _("Error from child process creating '%s'"),
5267
                                 path);
5268 5269
                goto endjob;
            }
5270

5271 5272 5273
            /* Since we had to setuid to create the file, and the fstype
               is NFS, we assume it's a root-squashing NFS share, and that
               the security driver stuff would have failed anyway */
5274

5275 5276
            bypassSecurityDriver = 1;
        }
5277
    }
5278

5279

5280 5281 5282 5283 5284 5285 5286 5287 5288 5289 5290 5291 5292 5293 5294 5295 5296
    if (!is_reg &&
        qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_DEVICES)) {
        if (virCgroupForDomain(driver->cgroup, vm->def->name, &cgroup, 0) != 0) {
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("Unable to find cgroup for %s\n"),
                            vm->def->name);
            goto endjob;
        }
        rc = virCgroupAllowDevicePath(cgroup, path);
        if (rc != 0) {
            virReportSystemError(-rc,
                                 _("Unable to allow device %s for %s"),
                                 path, vm->def->name);
            goto endjob;
        }
    }

5297 5298
    if ((!bypassSecurityDriver) &&
        driver->securityDriver &&
5299
        driver->securityDriver->domainSetSavedStateLabel &&
5300 5301
        driver->securityDriver->domainSetSavedStateLabel(driver->securityDriver,
                                                         vm, path) == -1)
5302 5303
        goto endjob;

5304 5305
    if (header.compressed == QEMUD_SAVE_FORMAT_RAW) {
        const char *args[] = { "cat", NULL };
M
Matthias Bolte 已提交
5306
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
5307 5308 5309
        rc = qemuMonitorMigrateToFile(priv->mon,
                                      QEMU_MONITOR_MIGRATE_BACKGROUND,
                                      args, path, offset);
M
Matthias Bolte 已提交
5310
        qemuDomainObjExitMonitorWithDriver(driver, vm);
5311
    } else {
5312
        const char *prog = qemudSaveCompressionTypeToString(header.compressed);
5313 5314 5315 5316 5317
        const char *args[] = {
            prog,
            "-c",
            NULL
        };
M
Matthias Bolte 已提交
5318
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
5319 5320 5321
        rc = qemuMonitorMigrateToFile(priv->mon,
                                      QEMU_MONITOR_MIGRATE_BACKGROUND,
                                      args, path, offset);
M
Matthias Bolte 已提交
5322
        qemuDomainObjExitMonitorWithDriver(driver, vm);
5323 5324
    }

5325 5326 5327 5328 5329
    if (rc < 0)
        goto endjob;

    rc = qemuDomainWaitForMigrationComplete(driver, vm);

5330
    if (rc < 0)
5331
        goto endjob;
5332

5333 5334
    if ((!bypassSecurityDriver) &&
        driver->securityDriver &&
5335
        driver->securityDriver->domainRestoreSavedStateLabel &&
5336 5337
        driver->securityDriver->domainRestoreSavedStateLabel(driver->securityDriver,
                                                             vm, path) == -1)
5338
        VIR_WARN("failed to restore save state label on %s", path);
5339

5340 5341
    if (cgroup != NULL) {
        rc = virCgroupDenyDevicePath(cgroup, path);
5342 5343 5344
        if (rc != 0)
            VIR_WARN("Unable to deny device %s for %s %d",
                     path, vm->def->name, rc);
5345 5346
    }

5347 5348
    ret = 0;

5349
    /* Shut it down */
5350
    qemudShutdownVMDaemon(driver, vm, 0);
5351
    qemuDomainStopAudit(vm, "saved");
5352 5353 5354
    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STOPPED,
                                     VIR_DOMAIN_EVENT_STOPPED_SAVED);
5355
    if (!vm->persistent) {
5356 5357 5358
        if (qemuDomainObjEndJob(vm) > 0)
            virDomainRemoveInactive(&driver->domains,
                                    vm);
5359 5360
        vm = NULL;
    }
5361

5362
endjob:
5363
    if (vm) {
5364
        if (ret != 0) {
5365
            if (header.was_running && virDomainObjIsActive(vm)) {
H
Hu Tao 已提交
5366
                rc = doStartCPUs(driver, vm, dom->conn);
5367 5368 5369
                if (rc < 0)
                    VIR_WARN0("Unable to resume guest CPUs after save failure");
            }
5370

5371 5372 5373 5374 5375
            if (cgroup != NULL) {
                rc = virCgroupDenyDevicePath(cgroup, path);
                if (rc != 0)
                    VIR_WARN("Unable to deny device %s for %s: %d",
                             path, vm->def->name, rc);
5376
            }
5377 5378 5379 5380

            if ((!bypassSecurityDriver) &&
                driver->securityDriver &&
                driver->securityDriver->domainRestoreSavedStateLabel &&
5381 5382
                driver->securityDriver->domainRestoreSavedStateLabel(driver->securityDriver,
                                                                     vm, path) == -1)
5383
                VIR_WARN("failed to restore save state label on %s", path);
5384 5385
        }

5386
        if (qemuDomainObjEndJob(vm) == 0)
5387
            vm = NULL;
5388
    }
5389

5390 5391
cleanup:
    VIR_FREE(xml);
5392
    if (ret != 0 && is_reg)
5393
        unlink(path);
5394 5395
    if (event)
        qemuDomainEventQueue(driver, event);
5396
    virCgroupFree(&cgroup);
5397
    return ret;
D
Daniel P. Berrange 已提交
5398 5399
}

5400 5401 5402 5403 5404 5405 5406 5407 5408 5409 5410 5411 5412 5413 5414 5415
/* Returns true if a compression program is available in PATH */
static bool qemudCompressProgramAvailable(enum qemud_save_formats compress)
{
    const char *prog;
    char *c;

    if (compress == QEMUD_SAVE_FORMAT_RAW)
        return true;
    prog = qemudSaveCompressionTypeToString(compress);
    c = virFindFileInPath(prog);
    if (!c)
        return false;
    VIR_FREE(c);
    return true;
}

5416 5417 5418 5419
static int qemudDomainSave(virDomainPtr dom, const char *path)
{
    struct qemud_driver *driver = dom->conn->privateData;
    int compressed;
5420 5421 5422 5423
    int ret = -1;
    virDomainObjPtr vm = NULL;

    qemuDriverLock(driver);
5424 5425 5426 5427 5428 5429 5430 5431 5432 5433 5434

    if (driver->saveImageFormat == NULL)
        compressed = QEMUD_SAVE_FORMAT_RAW;
    else {
        compressed = qemudSaveCompressionTypeFromString(driver->saveImageFormat);
        if (compressed < 0) {
            qemuReportError(VIR_ERR_OPERATION_FAILED,
                            "%s", _("Invalid save image format specified "
                                    "in configuration file"));
            return -1;
        }
5435 5436 5437 5438 5439 5440
        if (!qemudCompressProgramAvailable(compressed)) {
            qemuReportError(VIR_ERR_OPERATION_FAILED,
                            "%s", _("Compression program for image format "
                                    "in configuration file isn't available"));
            return -1;
        }
5441 5442
    }

5443 5444 5445 5446 5447 5448 5449 5450 5451 5452 5453 5454 5455 5456 5457 5458 5459
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    ret = qemudDomainSaveFlag(driver, dom, vm, path, compressed);

cleanup:
    if (vm)
        virDomainObjUnlock(vm);
    qemuDriverUnlock(driver);

    return ret;
5460 5461 5462 5463 5464 5465 5466 5467 5468 5469 5470 5471 5472 5473 5474 5475 5476 5477 5478 5479 5480 5481 5482
}

static char *
qemuDomainManagedSavePath(struct qemud_driver *driver, virDomainObjPtr vm) {
    char *ret;

    if (virAsprintf(&ret, "%s/%s.save", driver->saveDir, vm->def->name) < 0) {
        virReportOOMError();
        return(NULL);
    }

    return(ret);
}

static int
qemuDomainManagedSave(virDomainPtr dom, unsigned int flags)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm = NULL;
    char *name = NULL;
    int ret = -1;
    int compressed;

5483
    virCheckFlags(0, -1);
5484 5485 5486 5487 5488 5489 5490 5491

    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
5492
        goto cleanup;
5493 5494 5495 5496
    }

    name = qemuDomainManagedSavePath(driver, vm);
    if (name == NULL)
5497
        goto cleanup;
5498 5499 5500 5501

    VIR_DEBUG("Saving state to %s", name);

    compressed = QEMUD_SAVE_FORMAT_RAW;
5502
    ret = qemudDomainSaveFlag(driver, dom, vm, name, compressed);
5503 5504 5505 5506 5507

cleanup:
    if (vm)
        virDomainObjUnlock(vm);
    qemuDriverUnlock(driver);
5508 5509 5510
    VIR_FREE(name);

    return ret;
5511 5512 5513 5514 5515 5516 5517 5518 5519 5520
}

static int
qemuDomainHasManagedSaveImage(virDomainPtr dom, unsigned int flags)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm = NULL;
    int ret = -1;
    char *name = NULL;

5521
    virCheckFlags(0, -1);
5522 5523 5524 5525 5526 5527 5528 5529 5530 5531 5532 5533 5534 5535 5536 5537 5538 5539 5540 5541 5542 5543 5544 5545 5546 5547 5548 5549 5550 5551 5552 5553 5554

    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    name = qemuDomainManagedSavePath(driver, vm);
    if (name == NULL)
        goto cleanup;

    ret = virFileExists(name);

cleanup:
    VIR_FREE(name);
    if (vm)
        virDomainObjUnlock(vm);
    qemuDriverUnlock(driver);
    return ret;
}

static int
qemuDomainManagedSaveRemove(virDomainPtr dom, unsigned int flags)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm = NULL;
    int ret = -1;
    char *name = NULL;

5555
    virCheckFlags(0, -1);
5556 5557 5558 5559 5560 5561 5562 5563 5564 5565 5566 5567 5568 5569 5570 5571 5572 5573 5574 5575 5576 5577 5578 5579

    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    name = qemuDomainManagedSavePath(driver, vm);
    if (name == NULL)
        goto cleanup;

    ret = unlink(name);

cleanup:
    VIR_FREE(name);
    if (vm)
        virDomainObjUnlock(vm);
    qemuDriverUnlock(driver);
    return ret;
}
D
Daniel P. Berrange 已提交
5580

H
Hu Tao 已提交
5581 5582 5583 5584 5585 5586 5587 5588 5589 5590 5591 5592 5593 5594 5595 5596 5597 5598 5599 5600 5601 5602 5603 5604 5605 5606 5607 5608 5609 5610 5611 5612 5613 5614 5615 5616 5617 5618 5619 5620 5621 5622 5623 5624 5625 5626 5627 5628 5629 5630 5631 5632 5633 5634 5635 5636 5637 5638 5639 5640 5641 5642 5643 5644 5645 5646 5647 5648 5649 5650 5651 5652
static int doCoreDump(struct qemud_driver *driver,
                      virDomainObjPtr vm,
                      const char *path,
                      enum qemud_save_formats compress)
{
    int fd = -1;
    int ret = -1;
    qemuDomainObjPrivatePtr priv;

    priv = vm->privateData;

    /* Create an empty file with appropriate ownership.  */
    if ((fd = open(path, O_CREAT|O_TRUNC|O_WRONLY, S_IRUSR|S_IWUSR)) < 0) {
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        _("failed to create '%s'"), path);
        goto cleanup;
    }

    if (VIR_CLOSE(fd) < 0) {
        virReportSystemError(errno,
                             _("unable to save file %s"),
                             path);
        goto cleanup;
    }

    if (driver->securityDriver &&
        driver->securityDriver->domainSetSavedStateLabel &&
        driver->securityDriver->domainSetSavedStateLabel(driver->securityDriver,
                                                         vm, path) == -1)
        goto cleanup;

    qemuDomainObjEnterMonitorWithDriver(driver, vm);
    if (compress == QEMUD_SAVE_FORMAT_RAW) {
        const char *args[] = {
            "cat",
            NULL,
        };
        ret = qemuMonitorMigrateToFile(priv->mon,
                                       QEMU_MONITOR_MIGRATE_BACKGROUND,
                                       args, path, 0);
    } else {
        const char *prog = qemudSaveCompressionTypeToString(compress);
        const char *args[] = {
            prog,
            "-c",
            NULL,
        };
        ret = qemuMonitorMigrateToFile(priv->mon,
                                       QEMU_MONITOR_MIGRATE_BACKGROUND,
                                       args, path, 0);
    }
    qemuDomainObjExitMonitorWithDriver(driver, vm);
    if (ret < 0)
        goto cleanup;

    ret = qemuDomainWaitForMigrationComplete(driver, vm);

    if (ret < 0)
        goto cleanup;

    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSavedStateLabel &&
        driver->securityDriver->domainRestoreSavedStateLabel(driver->securityDriver,
                                                             vm, path) == -1)
        goto cleanup;

cleanup:
    if (ret != 0)
        unlink(path);
    return ret;
}

5653 5654 5655 5656 5657
static enum qemud_save_formats
getCompressionType(struct qemud_driver *driver)
{
    int compress = QEMUD_SAVE_FORMAT_RAW;

5658 5659 5660 5661 5662 5663 5664
    /*
     * We reuse "save" flag for "dump" here. Then, we can support the same
     * format in "save" and "dump".
     */
    if (driver->dumpImageFormat) {
        compress = qemudSaveCompressionTypeFromString(driver->dumpImageFormat);
        if (compress < 0) {
5665 5666 5667 5668
            qemuReportError(VIR_ERR_OPERATION_FAILED, "%s",
                            _("Invalid dump image format specified in "
                              "configuration file, using raw"));
            return QEMUD_SAVE_FORMAT_RAW;
5669
        }
5670 5671 5672
        if (!qemudCompressProgramAvailable(compress)) {
            qemuReportError(VIR_ERR_OPERATION_FAILED,
                            "%s", _("Compression program for dump image format "
5673 5674 5675
                                    "in configuration file isn't available, "
                                    "using raw"));
            return QEMUD_SAVE_FORMAT_RAW;
5676
        }
5677
    }
5678 5679 5680 5681 5682 5683 5684 5685 5686
    return compress;
}

static int qemudDomainCoreDump(virDomainPtr dom,
                               const char *path,
                               int flags ATTRIBUTE_UNUSED) {
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int resume = 0, paused = 0;
H
Hu Tao 已提交
5687
    int ret = -1;
5688 5689 5690
    virDomainEventPtr event = NULL;
    qemuDomainObjPrivatePtr priv;

P
Paolo Bonzini 已提交
5691 5692 5693 5694 5695 5696
    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);

    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
5697 5698
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
P
Paolo Bonzini 已提交
5699 5700
        goto cleanup;
    }
5701
    priv = vm->privateData;
P
Paolo Bonzini 已提交
5702

5703
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
5704 5705
        goto cleanup;

D
Daniel P. Berrange 已提交
5706
    if (!virDomainObjIsActive(vm)) {
5707 5708
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
5709
        goto endjob;
P
Paolo Bonzini 已提交
5710 5711
    }

O
Osier Yang 已提交
5712 5713
    priv->jobActive = QEMU_JOB_DUMP;

P
Paolo Bonzini 已提交
5714 5715
    /* Migrate will always stop the VM, so the resume condition is
       independent of whether the stop command is issued.  */
P
Paolo Bonzini 已提交
5716 5717 5718
    resume = (vm->state == VIR_DOMAIN_RUNNING);

    /* Pause domain for non-live dump */
P
Paolo Bonzini 已提交
5719
    if (!(flags & VIR_DUMP_LIVE) && vm->state == VIR_DOMAIN_RUNNING) {
H
Hu Tao 已提交
5720
        if (doStopCPUs(driver, vm) < 0)
5721
            goto endjob;
P
Paolo Bonzini 已提交
5722
        paused = 1;
5723 5724 5725 5726 5727 5728

        if (!virDomainObjIsActive(vm)) {
            qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                            _("guest unexpectedly quit"));
            goto endjob;
        }
P
Paolo Bonzini 已提交
5729 5730
    }

H
Hu Tao 已提交
5731
    ret = doCoreDump(driver, vm, path, getCompressionType(driver));
5732 5733 5734 5735
    if (ret < 0)
        goto endjob;

    paused = 1;
5736 5737

endjob:
5738
    if ((ret == 0) && (flags & VIR_DUMP_CRASH)) {
5739
        qemudShutdownVMDaemon(driver, vm, 0);
5740
        qemuDomainStopAudit(vm, "crashed");
5741 5742 5743 5744 5745
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_STOPPED,
                                         VIR_DOMAIN_EVENT_STOPPED_CRASHED);
    }

P
Paolo Bonzini 已提交
5746 5747 5748
    /* Since the monitor is always attached to a pty for libvirt, it
       will support synchronous operations so we always get here after
       the migration is complete.  */
5749
    else if (resume && paused && virDomainObjIsActive(vm)) {
H
Hu Tao 已提交
5750
        if (doStartCPUs(driver, vm, dom->conn) < 0) {
5751
            if (virGetLastError() == NULL)
5752 5753
                qemuReportError(VIR_ERR_OPERATION_FAILED,
                                "%s", _("resuming after dump failed"));
P
Paolo Bonzini 已提交
5754 5755
        }
    }
5756

5757 5758
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
5759
    else if ((ret == 0) && (flags & VIR_DUMP_CRASH) && !vm->persistent) {
5760 5761 5762 5763
        virDomainRemoveInactive(&driver->domains,
                                vm);
        vm = NULL;
    }
5764 5765

cleanup:
P
Paolo Bonzini 已提交
5766 5767
    if (vm)
        virDomainObjUnlock(vm);
5768 5769
    if (event)
        qemuDomainEventQueue(driver, event);
5770
    qemuDriverUnlock(driver);
P
Paolo Bonzini 已提交
5771 5772 5773
    return ret;
}

H
Hu Tao 已提交
5774 5775 5776 5777 5778 5779 5780 5781 5782 5783 5784 5785 5786 5787 5788 5789 5790 5791 5792 5793 5794 5795 5796 5797 5798 5799 5800 5801 5802 5803 5804 5805 5806 5807 5808 5809 5810
static void processWatchdogEvent(void *data, void *opaque)
{
    int ret;
    struct watchdogEvent *wdEvent = data;
    struct qemud_driver *driver = opaque;

    switch (wdEvent->action) {
    case VIR_DOMAIN_WATCHDOG_ACTION_DUMP:
        {
            char *dumpfile;
            int i;

            i = virAsprintf(&dumpfile, "%s/%s-%u",
                            driver->autoDumpPath,
                            wdEvent->vm->def->name,
                            (unsigned int)time(NULL));

            qemuDriverLock(driver);
            virDomainObjLock(wdEvent->vm);

            if (qemuDomainObjBeginJobWithDriver(driver, wdEvent->vm) < 0)
                break;

            if (!virDomainObjIsActive(wdEvent->vm)) {
                qemuReportError(VIR_ERR_OPERATION_INVALID,
                                "%s", _("domain is not running"));
                break;
            }

            ret = doCoreDump(driver,
                             wdEvent->vm,
                             dumpfile,
                             getCompressionType(driver));
            if (ret < 0)
                qemuReportError(VIR_ERR_OPERATION_FAILED,
                                "%s", _("Dump failed"));

H
Hu Tao 已提交
5811
            ret = doStartCPUs(driver, wdEvent->vm, NULL);
H
Hu Tao 已提交
5812 5813 5814 5815 5816 5817 5818 5819 5820 5821 5822 5823 5824 5825 5826 5827 5828

            if (ret < 0)
                qemuReportError(VIR_ERR_OPERATION_FAILED,
                                "%s", _("Resuming after dump failed"));

            if (qemuDomainObjEndJob(wdEvent->vm) > 0)
                virDomainObjUnlock(wdEvent->vm);

            qemuDriverUnlock(driver);

            VIR_FREE(dumpfile);
        }
        break;
    }

    VIR_FREE(wdEvent);
}
P
Paolo Bonzini 已提交
5829

5830 5831 5832 5833 5834 5835
static int qemudDomainHotplugVcpus(virDomainObjPtr vm, unsigned int nvcpus)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    int i, rc;
    int ret = -1;

5836 5837
    qemuDomainObjEnterMonitor(vm);

5838 5839 5840 5841 5842 5843 5844 5845 5846 5847 5848 5849 5850 5851 5852 5853 5854 5855 5856 5857 5858 5859 5860 5861 5862 5863 5864 5865 5866 5867
    /* We need different branches here, because we want to offline
     * in reverse order to onlining, so any partial fail leaves us in a
     * reasonably sensible state */
    if (nvcpus > vm->def->vcpus) {
        for (i = vm->def->vcpus ; i < nvcpus ; i++) {
            /* Online new CPU */
            rc = qemuMonitorSetCPU(priv->mon, i, 1);
            if (rc == 0)
                goto unsupported;
            if (rc < 0)
                goto cleanup;

            vm->def->vcpus++;
        }
    } else {
        for (i = vm->def->vcpus - 1 ; i >= nvcpus ; i--) {
            /* Offline old CPU */
            rc = qemuMonitorSetCPU(priv->mon, i, 0);
            if (rc == 0)
                goto unsupported;
            if (rc < 0)
                goto cleanup;

            vm->def->vcpus--;
        }
    }

    ret = 0;

cleanup:
5868
    qemuDomainObjExitMonitor(vm);
5869 5870 5871 5872 5873 5874 5875 5876 5877
    return ret;

unsupported:
    qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                    _("cannot change vcpu count of this domain"));
    goto cleanup;
}


5878 5879 5880 5881
static int
qemudDomainSetVcpusFlags(virDomainPtr dom, unsigned int nvcpus,
                         unsigned int flags)
{
5882 5883
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
5884
    virDomainDefPtr persistentDef;
5885 5886
    const char * type;
    int max;
5887
    int ret = -1;
5888

5889 5890 5891 5892 5893 5894 5895 5896 5897 5898 5899 5900 5901 5902 5903 5904
    virCheckFlags(VIR_DOMAIN_VCPU_LIVE |
                  VIR_DOMAIN_VCPU_CONFIG |
                  VIR_DOMAIN_VCPU_MAXIMUM, -1);

    /* At least one of LIVE or CONFIG must be set.  MAXIMUM cannot be
     * mixed with LIVE.  */
    if ((flags & (VIR_DOMAIN_VCPU_LIVE | VIR_DOMAIN_VCPU_CONFIG)) == 0 ||
        (flags & (VIR_DOMAIN_VCPU_MAXIMUM | VIR_DOMAIN_VCPU_LIVE)) ==
         (VIR_DOMAIN_VCPU_MAXIMUM | VIR_DOMAIN_VCPU_LIVE)) {
        qemuReportError(VIR_ERR_INVALID_ARG,
                        _("invalid flag combination: (0x%x)"), flags);
        return -1;
    }
    if (!nvcpus || (unsigned short) nvcpus != nvcpus) {
        qemuReportError(VIR_ERR_INVALID_ARG,
                        _("argument out of range: %d"), nvcpus);
5905 5906 5907
        return -1;
    }

5908
    qemuDriverLock(driver);
5909
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
5910 5911
    qemuDriverUnlock(driver);

5912
    if (!vm) {
5913 5914
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
5915 5916
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
5917
        goto cleanup;
5918 5919
    }

5920 5921 5922
    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

5923
    if (!virDomainObjIsActive(vm) && (flags & VIR_DOMAIN_VCPU_LIVE)) {
5924 5925
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                         "%s", _("domain is not running"));
5926
        goto endjob;
5927 5928
    }

5929 5930 5931 5932 5933 5934
    if (!vm->persistent && (flags & VIR_DOMAIN_VCPU_CONFIG)) {
        qemuReportError(VIR_ERR_OPERATION_INVALID, "%s",
                        _("cannot change persistent config of a transient domain"));
        goto endjob;
    }

5935 5936 5937 5938 5939 5940 5941 5942 5943 5944 5945 5946 5947
    if (!(type = virDomainVirtTypeToString(vm->def->virtType))) {
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("unknown virt type in domain definition '%d'"),
                        vm->def->virtType);
        goto endjob;
    }

    if ((max = qemudGetMaxVCPUs(NULL, type)) < 0) {
        qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                        _("could not determine max vcpus for the domain"));
        goto endjob;
    }

C
Cole Robinson 已提交
5948
    if (!(flags & VIR_DOMAIN_VCPU_MAXIMUM) && vm->def->maxvcpus < max) {
5949 5950 5951
        max = vm->def->maxvcpus;
    }

5952 5953 5954 5955 5956 5957 5958
    if (nvcpus > max) {
        qemuReportError(VIR_ERR_INVALID_ARG,
                        _("requested vcpus is greater than max allowable"
                          " vcpus for the domain: %d > %d"), nvcpus, max);
        goto endjob;
    }

5959 5960 5961
    if (!(persistentDef = virDomainObjGetPersistentDef(driver->caps, vm)))
        goto endjob;

5962 5963
    switch (flags) {
    case VIR_DOMAIN_VCPU_MAXIMUM | VIR_DOMAIN_VCPU_CONFIG:
5964 5965 5966
        persistentDef->maxvcpus = nvcpus;
        if (nvcpus < persistentDef->vcpus)
            persistentDef->vcpus = nvcpus;
5967 5968 5969 5970
        ret = 0;
        break;

    case VIR_DOMAIN_VCPU_CONFIG:
5971
        persistentDef->vcpus = nvcpus;
5972 5973 5974 5975 5976 5977 5978 5979 5980
        ret = 0;
        break;

    case VIR_DOMAIN_VCPU_LIVE:
        ret = qemudDomainHotplugVcpus(vm, nvcpus);
        break;

    case VIR_DOMAIN_VCPU_LIVE | VIR_DOMAIN_VCPU_CONFIG:
        ret = qemudDomainHotplugVcpus(vm, nvcpus);
5981 5982 5983
        if (ret == 0) {
            persistentDef->vcpus = nvcpus;
        }
5984 5985
        break;
    }
5986

5987 5988 5989 5990
    /* Save the persistent config to disk */
    if (flags & VIR_DOMAIN_VCPU_CONFIG)
        ret = virDomainSaveConfig(driver->configDir, persistentDef);

5991 5992 5993
endjob:
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
5994

5995
cleanup:
5996 5997
    if (vm)
        virDomainObjUnlock(vm);
5998
    return ret;
5999 6000
}

6001 6002 6003 6004 6005 6006
static int
qemudDomainSetVcpus(virDomainPtr dom, unsigned int nvcpus)
{
    return qemudDomainSetVcpusFlags(dom, nvcpus, VIR_DOMAIN_VCPU_LIVE);
}

6007 6008 6009 6010 6011 6012

static int
qemudDomainPinVcpu(virDomainPtr dom,
                   unsigned int vcpu,
                   unsigned char *cpumap,
                   int maplen) {
6013 6014
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
6015
    int maxcpu, hostcpus;
6016
    virNodeInfo nodeinfo;
6017
    int ret = -1;
6018
    qemuDomainObjPrivatePtr priv;
6019

6020
    qemuDriverLock(driver);
6021
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
6022 6023
    qemuDriverUnlock(driver);

6024 6025 6026
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
6027 6028
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
6029 6030 6031
        goto cleanup;
    }

D
Daniel P. Berrange 已提交
6032
    if (!virDomainObjIsActive(vm)) {
6033 6034
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s",_("cannot pin vcpus on an inactive domain"));
6035
        goto cleanup;
6036 6037
    }

6038 6039 6040
    priv = vm->privateData;

    if (vcpu > (priv->nvcpupids-1)) {
6041 6042 6043
        qemuReportError(VIR_ERR_INVALID_ARG,
                        _("vcpu number out of range %d > %d"),
                        vcpu, priv->nvcpupids);
6044
        goto cleanup;
6045 6046
    }

6047
    if (nodeGetInfo(dom->conn, &nodeinfo) < 0)
6048
        goto cleanup;
6049

6050
    hostcpus = VIR_NODEINFO_MAXCPUS(nodeinfo);
6051
    maxcpu = maplen * 8;
6052 6053
    if (maxcpu > hostcpus)
        maxcpu = hostcpus;
6054

6055 6056
    if (priv->vcpupids != NULL) {
        if (virProcessInfoSetAffinity(priv->vcpupids[vcpu],
6057
                                      cpumap, maplen, maxcpu) < 0)
6058
            goto cleanup;
6059
    } else {
6060 6061
        qemuReportError(VIR_ERR_NO_SUPPORT,
                        "%s", _("cpu affinity is not supported"));
6062
        goto cleanup;
6063
    }
6064
    ret = 0;
6065

6066
cleanup:
6067 6068
    if (vm)
        virDomainObjUnlock(vm);
6069
    return ret;
6070 6071 6072 6073 6074 6075 6076 6077
}

static int
qemudDomainGetVcpus(virDomainPtr dom,
                    virVcpuInfoPtr info,
                    int maxinfo,
                    unsigned char *cpumaps,
                    int maplen) {
6078 6079
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
6080
    virNodeInfo nodeinfo;
6081
    int i, v, maxcpu, hostcpus;
6082
    int ret = -1;
6083
    qemuDomainObjPrivatePtr priv;
6084

6085
    qemuDriverLock(driver);
6086
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
6087 6088
    qemuDriverUnlock(driver);

6089 6090 6091
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
6092 6093
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
6094 6095 6096
        goto cleanup;
    }

D
Daniel P. Berrange 已提交
6097
    if (!virDomainObjIsActive(vm)) {
6098 6099 6100
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s",
                        _("cannot list vcpu pinning for an inactive domain"));
6101
        goto cleanup;
6102 6103
    }

6104 6105
    priv = vm->privateData;

6106
    if (nodeGetInfo(dom->conn, &nodeinfo) < 0)
6107
        goto cleanup;
6108

6109
    hostcpus = VIR_NODEINFO_MAXCPUS(nodeinfo);
6110
    maxcpu = maplen * 8;
6111 6112
    if (maxcpu > hostcpus)
        maxcpu = hostcpus;
6113 6114

    /* Clamp to actual number of vcpus */
6115 6116
    if (maxinfo > priv->nvcpupids)
        maxinfo = priv->nvcpupids;
6117

6118 6119 6120 6121 6122 6123
    if (maxinfo >= 1) {
        if (info != NULL) {
            memset(info, 0, sizeof(*info) * maxinfo);
            for (i = 0 ; i < maxinfo ; i++) {
                info[i].number = i;
                info[i].state = VIR_VCPU_RUNNING;
6124

6125
                if (priv->vcpupids != NULL &&
6126 6127 6128
                    qemudGetProcessInfo(&(info[i].cpuTime),
                                        &(info[i].cpu),
                                        vm->pid,
6129
                                        priv->vcpupids[i]) < 0) {
6130
                    virReportSystemError(errno, "%s",
6131 6132 6133
                                         _("cannot get vCPU placement & pCPU time"));
                    goto cleanup;
                }
6134
            }
6135 6136
        }

6137 6138
        if (cpumaps != NULL) {
            memset(cpumaps, 0, maplen * maxinfo);
6139
            if (priv->vcpupids != NULL) {
6140 6141 6142
                for (v = 0 ; v < maxinfo ; v++) {
                    unsigned char *cpumap = VIR_GET_CPUMAP(cpumaps, maplen, v);

6143
                    if (virProcessInfoGetAffinity(priv->vcpupids[v],
6144
                                                  cpumap, maplen, maxcpu) < 0)
6145
                        goto cleanup;
6146
                }
6147
            } else {
6148 6149
                qemuReportError(VIR_ERR_NO_SUPPORT,
                                "%s", _("cpu affinity is not available"));
6150
                goto cleanup;
6151 6152 6153
            }
        }
    }
6154
    ret = maxinfo;
6155

6156
cleanup:
6157 6158
    if (vm)
        virDomainObjUnlock(vm);
6159
    return ret;
6160 6161 6162
}


6163 6164 6165
static int
qemudDomainGetVcpusFlags(virDomainPtr dom, unsigned int flags)
{
6166 6167
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
6168
    virDomainDefPtr def;
6169
    int ret = -1;
6170

6171 6172 6173 6174 6175 6176 6177 6178
    virCheckFlags(VIR_DOMAIN_VCPU_LIVE |
                  VIR_DOMAIN_VCPU_CONFIG |
                  VIR_DOMAIN_VCPU_MAXIMUM, -1);

    /* Exactly one of LIVE or CONFIG must be set.  */
    if (!(flags & VIR_DOMAIN_VCPU_LIVE) == !(flags & VIR_DOMAIN_VCPU_CONFIG)) {
        qemuReportError(VIR_ERR_INVALID_ARG,
                        _("invalid flag combination: (0x%x)"), flags);
6179 6180 6181
        return -1;
    }

6182
    qemuDriverLock(driver);
6183
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
6184 6185
    qemuDriverUnlock(driver);

6186
    if (!vm) {
6187 6188
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
6189 6190
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
6191
        goto cleanup;
6192 6193
    }

6194 6195 6196 6197 6198 6199 6200 6201 6202
    if (flags & VIR_DOMAIN_VCPU_LIVE) {
        if (!virDomainObjIsActive(vm)) {
            qemuReportError(VIR_ERR_OPERATION_INVALID, "%s",
                            _("domain not active"));
            goto cleanup;
        }
        def = vm->def;
    } else {
        def = vm->newDef ? vm->newDef : vm->def;
6203 6204
    }

6205
    ret = (flags & VIR_DOMAIN_VCPU_MAXIMUM) ? def->maxvcpus : def->vcpus;
6206

6207
cleanup:
6208 6209
    if (vm)
        virDomainObjUnlock(vm);
6210 6211 6212
    return ret;
}

6213 6214 6215 6216 6217 6218 6219
static int
qemudDomainGetMaxVcpus(virDomainPtr dom)
{
    return qemudDomainGetVcpusFlags(dom, (VIR_DOMAIN_VCPU_LIVE |
                                          VIR_DOMAIN_VCPU_MAXIMUM));
}

6220 6221 6222 6223 6224 6225 6226 6227 6228
static int qemudDomainGetSecurityLabel(virDomainPtr dom, virSecurityLabelPtr seclabel)
{
    struct qemud_driver *driver = (struct qemud_driver *)dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;

    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);

6229 6230
    memset(seclabel, 0, sizeof(*seclabel));

6231 6232 6233
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
6234 6235
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
6236 6237 6238
        goto cleanup;
    }

6239
    if (!virDomainVirtTypeToString(vm->def->virtType)) {
6240 6241 6242
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("unknown virt type in domain definition '%d'"),
                        vm->def->virtType);
6243 6244 6245 6246 6247 6248 6249 6250 6251 6252 6253 6254 6255 6256 6257 6258 6259
        goto cleanup;
    }

    /*
     * Theoretically, the pid can be replaced during this operation and
     * return the label of a different process.  If atomicity is needed,
     * further validation will be required.
     *
     * Comment from Dan Berrange:
     *
     *   Well the PID as stored in the virDomainObjPtr can't be changed
     *   because you've got a locked object.  The OS level PID could have
     *   exited, though and in extreme circumstances have cycled through all
     *   PIDs back to ours. We could sanity check that our PID still exists
     *   after reading the label, by checking that our FD connecting to the
     *   QEMU monitor hasn't seen SIGHUP/ERR on poll().
     */
D
Daniel P. Berrange 已提交
6260
    if (virDomainObjIsActive(vm)) {
6261 6262 6263 6264 6265 6266 6267
        if (driver->securityDriver &&
            driver->securityDriver->domainGetSecurityProcessLabel &&
            driver->securityDriver->domainGetSecurityProcessLabel(driver->securityDriver,
                                                                  vm, seclabel) < 0) {
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            "%s", _("Failed to get security label"));
            goto cleanup;
6268 6269 6270 6271 6272 6273 6274 6275
        }
    }

    ret = 0;

cleanup:
    if (vm)
        virDomainObjUnlock(vm);
6276
    qemuDriverUnlock(driver);
6277 6278 6279
    return ret;
}

6280 6281
static int qemudNodeGetSecurityModel(virConnectPtr conn,
                                     virSecurityModelPtr secmodel)
6282 6283 6284
{
    struct qemud_driver *driver = (struct qemud_driver *)conn->privateData;
    char *p;
6285
    int ret = 0;
6286

6287
    qemuDriverLock(driver);
6288
    if (!driver->securityPrimaryDriver) {
6289
        memset(secmodel, 0, sizeof (*secmodel));
6290 6291
        goto cleanup;
    }
6292

6293 6294
    p = driver->caps->host.secModel.model;
    if (strlen(p) >= VIR_SECURITY_MODEL_BUFLEN-1) {
6295 6296 6297
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("security model string exceeds max %d bytes"),
                        VIR_SECURITY_MODEL_BUFLEN-1);
6298 6299
        ret = -1;
        goto cleanup;
6300 6301 6302 6303 6304
    }
    strcpy(secmodel->model, p);

    p = driver->caps->host.secModel.doi;
    if (strlen(p) >= VIR_SECURITY_DOI_BUFLEN-1) {
6305 6306 6307
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("security DOI string exceeds max %d bytes"),
                        VIR_SECURITY_DOI_BUFLEN-1);
6308 6309
        ret = -1;
        goto cleanup;
6310 6311
    }
    strcpy(secmodel->doi, p);
6312 6313 6314 6315

cleanup:
    qemuDriverUnlock(driver);
    return ret;
6316 6317
}

6318 6319 6320 6321 6322 6323 6324 6325 6326 6327 6328 6329 6330 6331 6332 6333 6334 6335 6336 6337 6338 6339 6340 6341 6342 6343 6344 6345 6346 6347 6348 6349 6350 6351
/* qemudOpenAsUID() - pipe/fork/setuid/open a file, and return the
   pipe fd to caller, so that it can read from the file. Also return
   the pid of the child process, so the caller can wait for it to exit
   after it's finished reading (to avoid a zombie, if nothing
   else). */

static int qemudOpenAsUID(const char *path, uid_t uid, pid_t *child_pid) {
    int pipefd[2];
    int fd = -1;

    *child_pid = -1;

    if (pipe(pipefd) < 0) {
        virReportSystemError(errno,
                             _("failed to create pipe to read '%s'"),
                             path);
        pipefd[0] = pipefd[1] = -1;
        goto parent_cleanup;
    }

    int forkRet = virFork(child_pid);

    if (*child_pid < 0) {
        virReportSystemError(errno,
                             _("failed to fork child to read '%s'"),
                             path);
        goto parent_cleanup;
    }

    if (*child_pid > 0) {

        /* parent */

        /* parent doesn't need the write side of the pipe */
6352
        VIR_FORCE_CLOSE(pipefd[1]);
6353 6354 6355 6356 6357 6358 6359 6360 6361 6362 6363

        if (forkRet < 0) {
            virReportSystemError(errno,
                                 _("failed in parent after forking child to read '%s'"),
                                 path);
            goto parent_cleanup;
        }
        /* caller gets the read side of the pipe */
        fd = pipefd[0];
        pipefd[0] = -1;
parent_cleanup:
6364 6365
        VIR_FORCE_CLOSE(pipefd[0]);
        VIR_FORCE_CLOSE(pipefd[1]);
6366 6367 6368 6369 6370 6371 6372 6373 6374 6375 6376 6377 6378 6379 6380 6381 6382 6383 6384 6385 6386 6387
        if ((fd < 0) && (*child_pid > 0)) {
            /* a child process was started and subsequently an error
               occurred in the parent, so we need to wait for it to
               exit, but its status is inconsequential. */
            while ((waitpid(*child_pid, NULL, 0) == -1)
                   && (errno == EINTR)) {
                /* empty */
            }
            *child_pid = -1;
        }
        return fd;
    }

    /* child */

    /* setuid to the qemu user, then open the file, read it,
       and stuff it into the pipe for the parent process to
       read */
    int exit_code;
    char *buf = NULL;
    size_t bufsize = 1024 * 1024;
    int bytesread;
6388
    struct passwd pwd, *pwd_result;
6389 6390

    /* child doesn't need the read side of the pipe */
6391
    VIR_FORCE_CLOSE(pipefd[0]);
6392 6393 6394 6395 6396 6397 6398 6399 6400

    if (forkRet < 0) {
        exit_code = errno;
        virReportSystemError(errno,
                             _("failed in child after forking to read '%s'"),
                             path);
        goto child_cleanup;
    }

6401 6402 6403 6404 6405 6406 6407 6408 6409 6410 6411 6412 6413 6414 6415 6416 6417 6418 6419 6420
    if (VIR_ALLOC_N(buf, bufsize) < 0) {
        exit_code = ENOMEM;
        virReportOOMError();
        goto child_cleanup;
    }

    exit_code = getpwuid_r(uid, &pwd, buf, bufsize, &pwd_result);
    if (pwd_result == NULL) {
        virReportSystemError(errno,
                             _("cannot getpwuid_r(%d) to read '%s'"),
                             uid, path);
        goto child_cleanup;
    }
    if (initgroups(pwd.pw_name, pwd.pw_gid) != 0) {
        exit_code = errno;
        virReportSystemError(errno,
                             _("cannot initgroups(\"%s\", %d) to read '%s'"),
                             pwd.pw_name, pwd.pw_gid, path);
        goto child_cleanup;
    }
6421 6422 6423 6424 6425 6426 6427 6428 6429 6430 6431 6432 6433 6434 6435 6436 6437 6438 6439 6440 6441 6442 6443 6444 6445 6446 6447 6448 6449 6450 6451 6452 6453 6454 6455
    if (setuid(uid) != 0) {
        exit_code = errno;
        virReportSystemError(errno,
                             _("cannot setuid(%d) to read '%s'"),
                             uid, path);
        goto child_cleanup;
    }
    if ((fd = open(path, O_RDONLY)) < 0) {
        exit_code = errno;
        virReportSystemError(errno,
                             _("cannot open '%s' as uid %d"),
                             path, uid);
        goto child_cleanup;
    }

    /* read from fd and write to pipefd[1] until EOF */
    do {
        if ((bytesread = saferead(fd, buf, bufsize)) < 0) {
            exit_code = errno;
            virReportSystemError(errno,
                                 _("child failed reading from '%s'"),
                                 path);
            goto child_cleanup;
        }
        if (safewrite(pipefd[1], buf, bytesread) != bytesread) {
            exit_code = errno;
            virReportSystemError(errno, "%s",
                                 _("child failed writing to pipe"));
            goto child_cleanup;
        }
    } while (bytesread > 0);
    exit_code = 0;

child_cleanup:
    VIR_FREE(buf);
6456 6457
    VIR_FORCE_CLOSE(fd);
    VIR_FORCE_CLOSE(pipefd[1]);
6458 6459 6460
    _exit(exit_code);
}

J
Jiri Denemark 已提交
6461 6462 6463 6464
static int qemudDomainSaveImageClose(int fd, pid_t read_pid, int *status)
{
    int ret = 0;

6465 6466 6467 6468
    if (VIR_CLOSE(fd) < 0) {
        virReportSystemError(errno, "%s",
                             _("cannot close file"));
    }
J
Jiri Denemark 已提交
6469 6470 6471 6472 6473 6474 6475 6476 6477 6478 6479 6480 6481 6482 6483 6484

    if (read_pid != -1) {
        /* reap the process that read the file */
        while ((ret = waitpid(read_pid, status, 0)) == -1
               && errno == EINTR) {
            /* empty */
        }
    } else if (status) {
        *status = 0;
    }

    return ret;
}

static int ATTRIBUTE_NONNULL(3) ATTRIBUTE_NONNULL(4) ATTRIBUTE_NONNULL(5)
qemudDomainSaveImageOpen(struct qemud_driver *driver,
6485 6486 6487 6488
                         const char *path,
                         virDomainDefPtr *ret_def,
                         struct qemud_save_header *ret_header,
                         pid_t *ret_read_pid)
J
Jiri Denemark 已提交
6489 6490
{
    int fd;
6491
    pid_t read_pid = -1;
6492
    struct qemud_save_header header;
J
Jiri Denemark 已提交
6493 6494
    char *xml = NULL;
    virDomainDefPtr def = NULL;
6495 6496

    if ((fd = open(path, O_RDONLY)) < 0) {
6497 6498 6499
        if ((driver->user == 0) || (getuid() != 0)) {
            qemuReportError(VIR_ERR_OPERATION_FAILED,
                            "%s", _("cannot read domain image"));
J
Jiri Denemark 已提交
6500
            goto error;
6501 6502 6503 6504 6505 6506 6507 6508
        }

        /* Opening as root failed, but qemu runs as a different user
           that might have better luck. Create a pipe, then fork a
           child process to run as the qemu user, which will hopefully
           have the necessary authority to read the file. */
        if ((fd = qemudOpenAsUID(path, driver->user, &read_pid)) < 0) {
            /* error already reported */
J
Jiri Denemark 已提交
6509
            goto error;
6510
        }
6511 6512 6513
    }

    if (saferead(fd, &header, sizeof(header)) != sizeof(header)) {
6514 6515
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("failed to read qemu header"));
J
Jiri Denemark 已提交
6516
        goto error;
6517 6518 6519
    }

    if (memcmp(header.magic, QEMUD_SAVE_MAGIC, sizeof(header.magic)) != 0) {
6520 6521
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("image magic is incorrect"));
J
Jiri Denemark 已提交
6522
        goto error;
6523 6524 6525
    }

    if (header.version > QEMUD_SAVE_VERSION) {
6526 6527 6528
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        _("image version is not supported (%d > %d)"),
                        header.version, QEMUD_SAVE_VERSION);
J
Jiri Denemark 已提交
6529
        goto error;
6530 6531
    }

6532 6533 6534
    if (header.xml_len <= 0) {
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        _("invalid XML length: %d"), header.xml_len);
J
Jiri Denemark 已提交
6535
        goto error;
6536 6537
    }

6538 6539
    if (VIR_ALLOC_N(xml, header.xml_len) < 0) {
        virReportOOMError();
J
Jiri Denemark 已提交
6540
        goto error;
6541 6542 6543
    }

    if (saferead(fd, xml, header.xml_len) != header.xml_len) {
6544 6545
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("failed to read XML"));
J
Jiri Denemark 已提交
6546
        goto error;
6547 6548 6549
    }

    /* Create a domain from this XML */
6550
    if (!(def = virDomainDefParseString(driver->caps, xml,
6551
                                        VIR_DOMAIN_XML_INACTIVE))) {
6552 6553
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("failed to parse XML"));
J
Jiri Denemark 已提交
6554
        goto error;
6555 6556
    }

J
Jiri Denemark 已提交
6557
    VIR_FREE(xml);
6558

J
Jiri Denemark 已提交
6559 6560 6561
    *ret_def = def;
    *ret_header = header;
    *ret_read_pid = read_pid;
6562

J
Jiri Denemark 已提交
6563
    return fd;
6564

J
Jiri Denemark 已提交
6565 6566 6567 6568 6569 6570 6571 6572 6573 6574 6575 6576 6577 6578 6579 6580 6581 6582 6583 6584 6585 6586 6587 6588 6589 6590
error:
    virDomainDefFree(def);
    VIR_FREE(xml);
    qemudDomainSaveImageClose(fd, read_pid, NULL);

    return -1;
}

static int ATTRIBUTE_NONNULL(6)
qemudDomainSaveImageStartVM(virConnectPtr conn,
                            struct qemud_driver *driver,
                            virDomainObjPtr vm,
                            int fd,
                            pid_t read_pid,
                            const struct qemud_save_header *header,
                            const char *path)
{
    int ret = -1;
    virDomainEventPtr event;
    int intermediatefd = -1;
    pid_t intermediate_pid = -1;
    int childstat;
    int wait_ret;
    int status;

    if (header->version == 2) {
6591
        const char *intermediate_argv[3] = { NULL, "-dc", NULL };
J
Jiri Denemark 已提交
6592
        const char *prog = qemudSaveCompressionTypeToString(header->compressed);
6593
        if (prog == NULL) {
6594 6595
            qemuReportError(VIR_ERR_OPERATION_FAILED,
                            _("Invalid compressed save format %d"),
J
Jiri Denemark 已提交
6596 6597
                            header->compressed);
            goto out;
6598
        }
6599

J
Jiri Denemark 已提交
6600
        if (header->compressed != QEMUD_SAVE_FORMAT_RAW) {
6601
            intermediate_argv[0] = prog;
6602 6603
            intermediatefd = fd;
            fd = -1;
6604
            if (virExec(intermediate_argv, NULL, NULL,
6605
                        &intermediate_pid, intermediatefd, &fd, NULL, 0) < 0) {
6606 6607 6608
                qemuReportError(VIR_ERR_INTERNAL_ERROR,
                                _("Failed to start decompression binary %s"),
                                intermediate_argv[0]);
J
Jiri Denemark 已提交
6609
                goto out;
6610 6611 6612
            }
        }
    }
J
Jiri Denemark 已提交
6613

6614
    /* Set the migration source and start it up. */
6615 6616
    ret = qemudStartVMDaemon(conn, driver, vm, "stdio", true, fd, path,
                             VIR_VM_OP_RESTORE);
J
Jiri Denemark 已提交
6617

6618 6619 6620
    if (intermediate_pid != -1) {
        /* Wait for intermediate process to exit */
        while (waitpid(intermediate_pid, &childstat, 0) == -1 &&
J
Jiri Denemark 已提交
6621 6622 6623
               errno == EINTR) {
            /* empty */
        }
6624
    }
6625
    VIR_FORCE_CLOSE(intermediatefd);
J
Jiri Denemark 已提交
6626 6627

    wait_ret = qemudDomainSaveImageClose(fd, read_pid, &status);
6628
    fd = -1;
6629 6630 6631 6632 6633 6634 6635 6636 6637 6638 6639 6640 6641 6642 6643 6644 6645 6646 6647 6648 6649
    if (read_pid != -1) {
        if (wait_ret == -1) {
            virReportSystemError(errno,
                                 _("failed to wait for process reading '%s'"),
                                 path);
            ret = -1;
        } else if (!WIFEXITED(status)) {
            qemuReportError(VIR_ERR_OPERATION_FAILED,
                            _("child process exited abnormally reading '%s'"),
                            path);
            ret = -1;
        } else {
            int exit_status = WEXITSTATUS(status);
            if (exit_status != 0) {
                virReportSystemError(exit_status,
                                     _("child process returned error reading '%s'"),
                                     path);
                ret = -1;
            }
        }
    }
J
Jiri Denemark 已提交
6650

6651 6652
    if (ret < 0) {
        qemuDomainStartAudit(vm, "restored", false);
J
Jiri Denemark 已提交
6653
        goto out;
6654
    }
6655

6656 6657 6658
    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STARTED,
                                     VIR_DOMAIN_EVENT_STARTED_RESTORED);
6659
    qemuDomainStartAudit(vm, "restored", true);
J
Jiri Denemark 已提交
6660 6661 6662
    if (event)
        qemuDomainEventQueue(driver, event);

6663

6664
    /* If it was running before, resume it now. */
J
Jiri Denemark 已提交
6665
    if (header->was_running) {
H
Hu Tao 已提交
6666
        if (doStartCPUs(driver, vm, conn) < 0) {
6667
            if (virGetLastError() == NULL)
6668 6669
                qemuReportError(VIR_ERR_OPERATION_FAILED,
                                "%s", _("failed to resume domain"));
J
Jiri Denemark 已提交
6670
            goto out;
6671
        }
6672 6673
        if (virDomainSaveStatus(driver->caps, driver->stateDir, vm) < 0) {
            VIR_WARN("Failed to save status on vm %s", vm->def->name);
J
Jiri Denemark 已提交
6674
            goto out;
6675
        }
6676
    }
J
Jiri Denemark 已提交
6677

6678
    ret = 0;
6679

J
Jiri Denemark 已提交
6680
out:
6681 6682
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSavedStateLabel &&
6683 6684
        driver->securityDriver->domainRestoreSavedStateLabel(driver->securityDriver,
                                                             vm, path) == -1)
6685 6686
        VIR_WARN("failed to restore save state label on %s", path);

J
Jiri Denemark 已提交
6687 6688 6689 6690 6691 6692 6693 6694 6695 6696 6697 6698 6699 6700 6701 6702 6703 6704 6705 6706 6707 6708 6709 6710 6711
    return ret;
}

static int qemudDomainRestore(virConnectPtr conn,
                              const char *path) {
    struct qemud_driver *driver = conn->privateData;
    virDomainDefPtr def = NULL;
    virDomainObjPtr vm = NULL;
    int fd = -1;
    pid_t read_pid = -1;
    int ret = -1;
    struct qemud_save_header header;

    qemuDriverLock(driver);

    fd = qemudDomainSaveImageOpen(driver, path, &def, &header, &read_pid);
    if (fd < 0)
        goto cleanup;

    if (virDomainObjIsDuplicate(&driver->domains, def, 1) < 0)
        goto cleanup;

    if (!(vm = virDomainAssignDef(driver->caps,
                                  &driver->domains,
                                  def, true))) {
6712
        /* virDomainAssignDef already set the error */
J
Jiri Denemark 已提交
6713 6714 6715 6716 6717 6718 6719 6720 6721 6722 6723
        goto cleanup;
    }
    def = NULL;

    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

    ret = qemudDomainSaveImageStartVM(conn, driver, vm, fd,
                                      read_pid, &header, path);

    if (qemuDomainObjEndJob(vm) == 0)
6724
        vm = NULL;
J
Jiri Denemark 已提交
6725 6726 6727 6728
    else if (ret < 0 && !vm->persistent) {
        virDomainRemoveInactive(&driver->domains, vm);
        vm = NULL;
    }
6729

6730 6731
cleanup:
    virDomainDefFree(def);
J
Jiri Denemark 已提交
6732
    qemudDomainSaveImageClose(fd, read_pid, NULL);
6733 6734 6735
    if (vm)
        virDomainObjUnlock(vm);
    qemuDriverUnlock(driver);
6736
    return ret;
D
Daniel P. Berrange 已提交
6737 6738
}

J
Jiri Denemark 已提交
6739 6740 6741 6742 6743 6744 6745 6746 6747 6748 6749 6750 6751 6752 6753 6754 6755 6756 6757 6758 6759 6760 6761 6762 6763 6764 6765 6766 6767 6768 6769 6770 6771 6772 6773 6774 6775 6776 6777 6778 6779
static int qemudDomainObjRestore(virConnectPtr conn,
                                 struct qemud_driver *driver,
                                 virDomainObjPtr vm,
                                 const char *path)
{
    virDomainDefPtr def = NULL;
    int fd = -1;
    pid_t read_pid = -1;
    int ret = -1;
    struct qemud_save_header header;

    fd = qemudDomainSaveImageOpen(driver, path, &def, &header, &read_pid);
    if (fd < 0)
        goto cleanup;

    if (STRNEQ(vm->def->name, def->name) ||
        memcmp(vm->def->uuid, def->uuid, VIR_UUID_BUFLEN)) {
        char vm_uuidstr[VIR_UUID_STRING_BUFLEN];
        char def_uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(vm->def->uuid, vm_uuidstr);
        virUUIDFormat(def->uuid, def_uuidstr);
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        _("cannot restore domain '%s' uuid %s from a file"
                          " which belongs to domain '%s' uuid %s"),
                        vm->def->name, vm_uuidstr,
                        def->name, def_uuidstr);
        goto cleanup;
    }

    virDomainObjAssignDef(vm, def, true);
    def = NULL;

    ret = qemudDomainSaveImageStartVM(conn, driver, vm, fd,
                                      read_pid, &header, path);

cleanup:
    virDomainDefFree(def);
    qemudDomainSaveImageClose(fd, read_pid, NULL);
    return ret;
}

D
Daniel P. Berrange 已提交
6780

6781 6782 6783 6784 6785 6786 6787 6788 6789 6790 6791 6792 6793 6794 6795 6796 6797 6798 6799 6800 6801 6802 6803 6804 6805 6806 6807 6808 6809 6810 6811 6812 6813 6814 6815 6816 6817 6818
static char *qemudVMDumpXML(struct qemud_driver *driver,
                            virDomainObjPtr vm,
                            int flags)
{
    char *ret = NULL;
    virCPUDefPtr cpu = NULL;
    virDomainDefPtr def;
    virCPUDefPtr def_cpu;

    if ((flags & VIR_DOMAIN_XML_INACTIVE) && vm->newDef)
        def = vm->newDef;
    else
        def = vm->def;
    def_cpu = def->cpu;

    /* Update guest CPU requirements according to host CPU */
    if ((flags & VIR_DOMAIN_XML_UPDATE_CPU) && def_cpu && def_cpu->model) {
        if (!driver->caps || !driver->caps->host.cpu) {
            qemuReportError(VIR_ERR_OPERATION_FAILED,
                            "%s", _("cannot get host CPU capabilities"));
            goto cleanup;
        }

        if (!(cpu = virCPUDefCopy(def_cpu))
            || cpuUpdate(cpu, driver->caps->host.cpu))
            goto cleanup;
        def->cpu = cpu;
    }

    ret = virDomainDefFormat(def, flags);

cleanup:
    def->cpu = def_cpu;
    virCPUDefFree(cpu);
    return ret;
}


6819
static char *qemudDomainDumpXML(virDomainPtr dom,
6820
                                int flags) {
6821 6822 6823
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    char *ret = NULL;
6824 6825
    unsigned long balloon;
    int err;
6826

6827
    qemuDriverLock(driver);
6828
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
6829

D
Daniel P. Berrange 已提交
6830
    if (!vm) {
6831 6832
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
6833 6834
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
6835
        goto cleanup;
D
Daniel P. Berrange 已提交
6836 6837
    }

6838 6839 6840 6841
    /* Refresh current memory based on balloon info if supported */
    if ((vm->def->memballoon != NULL) &&
        (vm->def->memballoon->model != VIR_DOMAIN_MEMBALLOON_MODEL_NONE) &&
        (virDomainObjIsActive(vm))) {
6842
        qemuDomainObjPrivatePtr priv = vm->privateData;
6843 6844 6845
        /* Don't delay if someone's using the monitor, just use
         * existing most recent data instead */
        if (!priv->jobActive) {
6846
            if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
6847 6848
                goto cleanup;

6849
            qemuDomainObjEnterMonitorWithDriver(driver, vm);
6850
            err = qemuMonitorGetBalloonInfo(priv->mon, &balloon);
6851
            qemuDomainObjExitMonitorWithDriver(driver, vm);
6852 6853 6854 6855
            if (qemuDomainObjEndJob(vm) == 0) {
                vm = NULL;
                goto cleanup;
            }
6856 6857 6858
            if (err < 0)
                goto cleanup;
            if (err > 0)
6859
                vm->def->mem.cur_balloon = balloon;
6860 6861
            /* err == 0 indicates no balloon support, so ignore it */
        }
6862
    }
6863

6864
    ret = qemudVMDumpXML(driver, vm, flags);
6865 6866

cleanup:
6867 6868
    if (vm)
        virDomainObjUnlock(vm);
6869
    qemuDriverUnlock(driver);
6870
    return ret;
D
Daniel P. Berrange 已提交
6871 6872 6873
}


6874 6875 6876 6877
static char *qemuDomainXMLFromNative(virConnectPtr conn,
                                     const char *format,
                                     const char *config,
                                     unsigned int flags ATTRIBUTE_UNUSED) {
6878
    struct qemud_driver *driver = conn->privateData;
6879 6880 6881 6882
    virDomainDefPtr def = NULL;
    char *xml = NULL;

    if (STRNEQ(format, QEMU_CONFIG_FORMAT_ARGV)) {
6883 6884
        qemuReportError(VIR_ERR_INVALID_ARG,
                        _("unsupported config type %s"), format);
6885 6886 6887
        goto cleanup;
    }

6888
    qemuDriverLock(driver);
6889
    def = qemuParseCommandLineString(driver->caps, config);
6890
    qemuDriverUnlock(driver);
6891 6892 6893
    if (!def)
        goto cleanup;

6894
    xml = virDomainDefFormat(def, VIR_DOMAIN_XML_INACTIVE);
6895 6896 6897 6898 6899 6900

cleanup:
    virDomainDefFree(def);
    return xml;
}

6901 6902 6903 6904 6905 6906
static char *qemuDomainXMLToNative(virConnectPtr conn,
                                   const char *format,
                                   const char *xmlData,
                                   unsigned int flags ATTRIBUTE_UNUSED) {
    struct qemud_driver *driver = conn->privateData;
    virDomainDefPtr def = NULL;
6907
    virDomainChrDef monConfig;
6908
    unsigned long long qemuCmdFlags;
E
Eric Blake 已提交
6909
    virCommandPtr cmd = NULL;
6910 6911 6912
    char *ret = NULL;
    int i;

6913 6914
    qemuDriverLock(driver);

6915
    if (STRNEQ(format, QEMU_CONFIG_FORMAT_ARGV)) {
6916 6917
        qemuReportError(VIR_ERR_INVALID_ARG,
                        _("unsupported config type %s"), format);
6918 6919 6920
        goto cleanup;
    }

6921
    def = virDomainDefParseString(driver->caps, xmlData, 0);
6922 6923 6924
    if (!def)
        goto cleanup;

6925 6926
    /* Since we're just exporting args, we can't do bridge/network/direct
     * setups, since libvirt will normally create TAP/macvtap devices
6927 6928 6929 6930 6931
     * directly. We convert those configs into generic 'ethernet'
     * config and assume the user has suitable 'ifup-qemu' scripts
     */
    for (i = 0 ; i < def->nnets ; i++) {
        virDomainNetDefPtr net = def->nets[i];
6932 6933
        if (net->type == VIR_DOMAIN_NET_TYPE_NETWORK ||
            net->type == VIR_DOMAIN_NET_TYPE_DIRECT) {
6934 6935 6936 6937 6938 6939 6940 6941 6942 6943 6944 6945 6946 6947 6948 6949 6950 6951 6952 6953 6954 6955 6956 6957
            VIR_FREE(net->data.network.name);

            memset(net, 0, sizeof *net);

            net->type = VIR_DOMAIN_NET_TYPE_ETHERNET;
            net->data.ethernet.dev = NULL;
            net->data.ethernet.script = NULL;
            net->data.ethernet.ipaddr = NULL;
        } else if (net->type == VIR_DOMAIN_NET_TYPE_BRIDGE) {
            char *brname = net->data.bridge.brname;
            char *script = net->data.bridge.script;
            char *ipaddr = net->data.bridge.ipaddr;

            memset(net, 0, sizeof *net);

            net->type = VIR_DOMAIN_NET_TYPE_ETHERNET;
            net->data.ethernet.dev = brname;
            net->data.ethernet.script = script;
            net->data.ethernet.ipaddr = ipaddr;
        }
    }
    for (i = 0 ; i < def->ngraphics ; i++) {
        if (def->graphics[i]->type == VIR_DOMAIN_GRAPHICS_TYPE_VNC &&
            def->graphics[i]->data.vnc.autoport)
6958
            def->graphics[i]->data.vnc.port = QEMU_VNC_PORT_MIN;
6959 6960
    }

6961 6962 6963
    if (qemuCapsExtractVersionInfo(def->emulator,
                                   NULL,
                                   &qemuCmdFlags) < 0)
6964 6965
        goto cleanup;

6966
    if (qemuPrepareMonitorChr(driver, &monConfig, def->name) < 0)
6967
        goto cleanup;
6968

6969 6970 6971
    if (!(cmd = qemuBuildCommandLine(conn, driver, def,
                                     &monConfig, false, qemuCmdFlags,
                                     NULL, NULL, VIR_VM_OP_NO_OP)))
6972 6973
        goto cleanup;

E
Eric Blake 已提交
6974
    ret = virCommandToString(cmd);
6975 6976

cleanup:
6977
    qemuDriverUnlock(driver);
6978

E
Eric Blake 已提交
6979
    virCommandFree(cmd);
6980 6981 6982 6983 6984
    virDomainDefFree(def);
    return ret;
}


6985
static int qemudListDefinedDomains(virConnectPtr conn,
6986
                            char **const names, int nnames) {
6987
    struct qemud_driver *driver = conn->privateData;
6988
    int n;
6989

6990
    qemuDriverLock(driver);
6991
    n = virDomainObjListGetInactiveNames(&driver->domains, names, nnames);
6992
    qemuDriverUnlock(driver);
6993
    return n;
D
Daniel P. Berrange 已提交
6994 6995
}

6996
static int qemudNumDefinedDomains(virConnectPtr conn) {
6997
    struct qemud_driver *driver = conn->privateData;
6998
    int n;
6999

7000
    qemuDriverLock(driver);
7001
    n = virDomainObjListNumOfDomains(&driver->domains, 0);
7002
    qemuDriverUnlock(driver);
7003

7004
    return n;
D
Daniel P. Berrange 已提交
7005 7006 7007
}


J
Jiri Denemark 已提交
7008 7009
static int qemudDomainObjStart(virConnectPtr conn,
                               struct qemud_driver *driver,
7010 7011
                               virDomainObjPtr vm,
                               bool start_paused)
J
Jiri Denemark 已提交
7012 7013 7014 7015 7016 7017 7018 7019 7020 7021 7022 7023 7024 7025 7026 7027 7028 7029 7030 7031
{
    int ret = -1;
    char *managed_save;

    /*
     * If there is a managed saved state restore it instead of starting
     * from scratch. In any case the old state is removed.
     */
    managed_save = qemuDomainManagedSavePath(driver, vm);
    if ((managed_save) && (virFileExists(managed_save))) {
        ret = qemudDomainObjRestore(conn, driver, vm, managed_save);

        if (unlink(managed_save) < 0) {
            VIR_WARN("Failed to remove the managed state %s", managed_save);
        }

        if (ret == 0)
            goto cleanup;
    }

7032 7033
    ret = qemudStartVMDaemon(conn, driver, vm, NULL, start_paused, -1, NULL,
                             VIR_VM_OP_CREATE);
7034 7035
    qemuDomainStartAudit(vm, "booted", ret >= 0);
    if (ret >= 0) {
J
Jiri Denemark 已提交
7036 7037 7038 7039 7040 7041 7042 7043 7044 7045 7046 7047 7048
        virDomainEventPtr event =
            virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STARTED,
                                     VIR_DOMAIN_EVENT_STARTED_BOOTED);
        if (event)
            qemuDomainEventQueue(driver, event);
    }

cleanup:
    VIR_FREE(managed_save);
    return ret;
}

7049 7050 7051
static int
qemudDomainStartWithFlags(virDomainPtr dom, unsigned int flags)
{
7052 7053 7054
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
7055

7056
    virCheckFlags(VIR_DOMAIN_START_PAUSED, -1);
7057

7058
    qemuDriverLock(driver);
7059
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
7060

7061
    if (!vm) {
7062 7063
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
7064 7065
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
7066
        goto cleanup;
7067 7068
    }

7069 7070 7071 7072
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

    if (virDomainObjIsActive(vm)) {
7073 7074
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is already running"));
7075 7076 7077
        goto endjob;
    }

7078 7079
    ret = qemudDomainObjStart(dom->conn, driver, vm,
                              (flags & VIR_DOMAIN_START_PAUSED) != 0);
7080

7081
endjob:
7082 7083
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
7084

7085
cleanup:
7086 7087
    if (vm)
        virDomainObjUnlock(vm);
7088
    qemuDriverUnlock(driver);
7089
    return ret;
D
Daniel P. Berrange 已提交
7090 7091
}

7092 7093 7094 7095 7096 7097
static int
qemudDomainStart(virDomainPtr dom)
{
    return qemudDomainStartWithFlags(dom, 0);
}

7098 7099 7100 7101 7102 7103 7104 7105 7106 7107 7108 7109 7110 7111 7112
static int
qemudCanonicalizeMachineFromInfo(virDomainDefPtr def,
                                 virCapsGuestDomainInfoPtr info,
                                 char **canonical)
{
    int i;

    *canonical = NULL;

    for (i = 0; i < info->nmachines; i++) {
        virCapsGuestMachinePtr machine = info->machines[i];

        if (!machine->canonical)
            continue;

7113
        if (STRNEQ(def->os.machine, machine->name))
7114 7115 7116
            continue;

        if (!(*canonical = strdup(machine->canonical))) {
7117
            virReportOOMError();
7118 7119 7120 7121 7122 7123 7124 7125 7126
            return -1;
        }

        break;
    }

    return 0;
}

7127 7128 7129 7130 7131 7132
static int
qemudCanonicalizeMachineDirect(virDomainDefPtr def, char **canonical)
{
    virCapsGuestMachinePtr *machines = NULL;
    int i, nmachines = 0;

7133
    if (qemuCapsProbeMachineTypes(def->emulator, &machines, &nmachines) < 0) {
7134
        virReportOOMError();
7135 7136 7137 7138 7139 7140 7141
        return -1;
    }

    for (i = 0; i < nmachines; i++) {
        if (!machines[i]->canonical)
            continue;

7142
        if (STRNEQ(def->os.machine, machines[i]->name))
7143 7144 7145 7146 7147 7148 7149 7150 7151 7152 7153 7154
            continue;

        *canonical = machines[i]->canonical;
        machines[i]->canonical = NULL;
        break;
    }

    virCapabilitiesFreeMachines(machines, nmachines);

    return 0;
}

7155 7156
int
qemudCanonicalizeMachine(struct qemud_driver *driver, virDomainDefPtr def)
7157 7158 7159 7160 7161 7162
{
    char *canonical = NULL;
    int i;

    for (i = 0; i < driver->caps->nguests; i++) {
        virCapsGuestPtr guest = driver->caps->guests[i];
7163
        virCapsGuestDomainInfoPtr info;
7164 7165 7166
        int j;

        for (j = 0; j < guest->arch.ndomains; j++) {
7167
            info = &guest->arch.domains[j]->info;
7168

7169 7170 7171 7172 7173 7174 7175 7176 7177
            if (!info->emulator || !STREQ(info->emulator, def->emulator))
                continue;

            if (!info->nmachines)
                info = &guest->arch.defaultInfo;

            if (qemudCanonicalizeMachineFromInfo(def, info, &canonical) < 0)
                return -1;
            goto out;
7178 7179
        }

7180 7181 7182 7183
        info = &guest->arch.defaultInfo;

        if (info->emulator && STREQ(info->emulator, def->emulator)) {
            if (qemudCanonicalizeMachineFromInfo(def, info, &canonical) < 0)
7184 7185 7186 7187
                return -1;
            goto out;
        }
    }
7188 7189 7190 7191

    if (qemudCanonicalizeMachineDirect(def, &canonical) < 0)
        return -1;

7192 7193 7194 7195 7196 7197 7198
out:
    if (canonical) {
        VIR_FREE(def->os.machine);
        def->os.machine = canonical;
    }
    return 0;
}
D
Daniel P. Berrange 已提交
7199

7200
static virDomainPtr qemudDomainDefine(virConnectPtr conn, const char *xml) {
7201
    struct qemud_driver *driver = conn->privateData;
7202
    virDomainDefPtr def;
7203
    virDomainObjPtr vm = NULL;
7204
    virDomainPtr dom = NULL;
7205
    virDomainEventPtr event = NULL;
7206
    int dupVM;
7207

7208
    qemuDriverLock(driver);
7209
    if (!(def = virDomainDefParseString(driver->caps, xml,
7210
                                        VIR_DOMAIN_XML_INACTIVE)))
7211
        goto cleanup;
7212

7213
    if (virSecurityDriverVerify(def) < 0)
7214 7215
        goto cleanup;

7216 7217
    if ((dupVM = virDomainObjIsDuplicate(&driver->domains, def, 0)) < 0)
        goto cleanup;
7218

7219
    if (qemudCanonicalizeMachine(driver, def) < 0)
7220 7221
        goto cleanup;

7222 7223 7224
    if (qemuAssignPCIAddresses(def) < 0)
        goto cleanup;

7225
    if (!(vm = virDomainAssignDef(driver->caps,
7226
                                  &driver->domains,
7227
                                  def, false))) {
7228
        goto cleanup;
7229
    }
7230
    def = NULL;
7231
    vm->persistent = 1;
7232

7233
    if (virDomainSaveConfig(driver->configDir,
7234
                            vm->newDef ? vm->newDef : vm->def) < 0) {
7235 7236
        virDomainRemoveInactive(&driver->domains,
                                vm);
7237
        vm = NULL;
7238
        goto cleanup;
7239 7240
    }

7241 7242
    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_DEFINED,
7243
                                     !dupVM ?
7244 7245
                                     VIR_DOMAIN_EVENT_DEFINED_ADDED :
                                     VIR_DOMAIN_EVENT_DEFINED_UPDATED);
7246

7247
    dom = virGetDomain(conn, vm->def->name, vm->def->uuid);
7248
    if (dom) dom->id = vm->def->id;
7249 7250

cleanup:
7251
    virDomainDefFree(def);
7252 7253
    if (vm)
        virDomainObjUnlock(vm);
7254 7255
    if (event)
        qemuDomainEventQueue(driver, event);
7256
    qemuDriverUnlock(driver);
7257
    return dom;
D
Daniel P. Berrange 已提交
7258 7259
}

7260
static int qemudDomainUndefine(virDomainPtr dom) {
7261 7262
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
7263
    virDomainEventPtr event = NULL;
7264
    int ret = -1;
D
Daniel P. Berrange 已提交
7265

7266
    qemuDriverLock(driver);
7267
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
7268

D
Daniel P. Berrange 已提交
7269
    if (!vm) {
7270 7271
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
7272 7273
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
7274
        goto cleanup;
D
Daniel P. Berrange 已提交
7275 7276
    }

D
Daniel P. Berrange 已提交
7277
    if (virDomainObjIsActive(vm)) {
7278 7279
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("cannot delete active domain"));
7280
        goto cleanup;
D
Daniel P. Berrange 已提交
7281 7282
    }

7283
    if (!vm->persistent) {
7284 7285
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("cannot undefine transient domain"));
7286
        goto cleanup;
7287 7288
    }

7289
    if (virDomainDeleteConfig(driver->configDir, driver->autostartDir, vm) < 0)
7290
        goto cleanup;
D
Daniel P. Berrange 已提交
7291

7292 7293 7294
    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_UNDEFINED,
                                     VIR_DOMAIN_EVENT_UNDEFINED_REMOVED);
7295

7296 7297
    virDomainRemoveInactive(&driver->domains,
                            vm);
7298
    vm = NULL;
7299
    ret = 0;
D
Daniel P. Berrange 已提交
7300

7301
cleanup:
7302 7303
    if (vm)
        virDomainObjUnlock(vm);
7304 7305
    if (event)
        qemuDomainEventQueue(driver, event);
7306
    qemuDriverUnlock(driver);
7307
    return ret;
D
Daniel P. Berrange 已提交
7308 7309
}

7310

7311
static int qemudDomainChangeEjectableMedia(struct qemud_driver *driver,
7312
                                           virDomainObjPtr vm,
7313
                                           virDomainDiskDefPtr disk,
7314 7315
                                           unsigned long long qemuCmdFlags,
                                           bool force)
7316
{
7317
    virDomainDiskDefPtr origdisk = NULL;
7318
    int i;
7319
    int ret;
7320
    char *driveAlias = NULL;
7321

7322
    origdisk = NULL;
7323
    for (i = 0 ; i < vm->def->ndisks ; i++) {
7324 7325
        if (vm->def->disks[i]->bus == disk->bus &&
            STREQ(vm->def->disks[i]->dst, disk->dst)) {
7326
            origdisk = vm->def->disks[i];
7327
            break;
7328
        }
7329 7330 7331
    }

    if (!origdisk) {
7332 7333 7334 7335
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("No device with bus '%s' and target '%s'"),
                        virDomainDiskBusTypeToString(disk->bus),
                        disk->dst);
7336 7337 7338
        return -1;
    }

7339
    if (!origdisk->info.alias) {
7340 7341
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("missing disk device alias name for %s"), origdisk->dst);
7342 7343
        return -1;
    }
7344

7345 7346
    if (origdisk->device != VIR_DOMAIN_DISK_DEVICE_FLOPPY &&
        origdisk->device != VIR_DOMAIN_DISK_DEVICE_CDROM) {
7347 7348 7349
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("Removable media not supported for %s device"),
                        virDomainDiskDeviceTypeToString(disk->device));
7350
        return -1;
7351
    }
7352

7353 7354
    if (driver->securityDriver &&
        driver->securityDriver->domainSetSecurityImageLabel &&
7355 7356
        driver->securityDriver->domainSetSecurityImageLabel(driver->securityDriver,
                                                            vm, disk) < 0)
7357 7358
        return -1;

7359 7360 7361
    if (!(driveAlias = qemuDeviceDriveHostAlias(origdisk, qemuCmdFlags)))
        goto error;

7362
    qemuDomainObjPrivatePtr priv = vm->privateData;
7363
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
7364
    if (disk->src) {
7365
        const char *format = NULL;
7366 7367 7368
        if (disk->type != VIR_DOMAIN_DISK_TYPE_DIR) {
            if (disk->driverType)
                format = disk->driverType;
7369 7370 7371
            else if (origdisk->driverType)
                format = origdisk->driverType;
        }
7372
        ret = qemuMonitorChangeMedia(priv->mon,
7373
                                     driveAlias,
7374
                                     disk->src, format);
7375
    } else {
7376
        ret = qemuMonitorEjectMedia(priv->mon, driveAlias, force);
7377
    }
7378
    qemuDomainObjExitMonitorWithDriver(driver, vm);
7379

7380 7381
    qemuDomainDiskAudit(vm, origdisk, disk, "update", ret >= 0);

7382 7383 7384 7385 7386
    if (ret < 0)
        goto error;

    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
7387 7388
        driver->securityDriver->domainRestoreSecurityImageLabel(driver->securityDriver,
                                                                vm, origdisk) < 0)
7389 7390 7391
        VIR_WARN("Unable to restore security label on ejected image %s", origdisk->src);

    VIR_FREE(origdisk->src);
7392 7393 7394 7395
    origdisk->src = disk->src;
    disk->src = NULL;
    origdisk->type = disk->type;

7396 7397
    VIR_FREE(driveAlias);

7398
    virDomainDiskDefFree(disk);
7399

7400
    return ret;
7401 7402

error:
7403
    VIR_FREE(driveAlias);
7404 7405
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
7406 7407
        driver->securityDriver->domainRestoreSecurityImageLabel(driver->securityDriver,
                                                                vm, disk) < 0)
7408
        VIR_WARN("Unable to restore security label on new media %s", disk->src);
7409
    return -1;
7410 7411
}

7412

7413
static int qemudDomainAttachPciDiskDevice(struct qemud_driver *driver,
7414
                                          virDomainObjPtr vm,
7415
                                          virDomainDiskDefPtr disk,
7416
                                          unsigned long long qemuCmdFlags)
7417
{
7418
    int i, ret;
7419
    const char* type = virDomainDiskBusTypeToString(disk->bus);
7420
    qemuDomainObjPrivatePtr priv = vm->privateData;
7421 7422
    char *devstr = NULL;
    char *drivestr = NULL;
7423 7424

    for (i = 0 ; i < vm->def->ndisks ; i++) {
7425
        if (STREQ(vm->def->disks[i]->dst, disk->dst)) {
7426 7427
            qemuReportError(VIR_ERR_OPERATION_FAILED,
                            _("target %s already exists"), disk->dst);
7428 7429 7430 7431
            return -1;
        }
    }

7432 7433
    if (driver->securityDriver &&
        driver->securityDriver->domainSetSecurityImageLabel &&
7434 7435
        driver->securityDriver->domainSetSecurityImageLabel(driver->securityDriver,
                                                            vm, disk) < 0)
7436 7437
        return -1;

7438
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
7439 7440
        if (qemuDomainPCIAddressEnsureAddr(priv->pciaddrs, &disk->info) < 0)
            goto error;
7441 7442
        if (qemuAssignDeviceDiskAlias(disk, qemuCmdFlags) < 0)
            goto error;
7443

7444 7445 7446
        if (!(drivestr = qemuBuildDriveStr(disk, 0, qemuCmdFlags)))
            goto error;

7447
        if (!(devstr = qemuBuildDriveDevStr(disk)))
7448 7449 7450
            goto error;
    }

7451
    if (VIR_REALLOC_N(vm->def->disks, vm->def->ndisks+1) < 0) {
7452
        virReportOOMError();
7453
        goto error;
7454 7455
    }

7456
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
7457 7458
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        ret = qemuMonitorAddDrive(priv->mon, drivestr);
7459 7460 7461
        if (ret == 0) {
            ret = qemuMonitorAddDevice(priv->mon, devstr);
            if (ret < 0) {
7462
                VIR_WARN("qemuMonitorAddDevice failed on %s (%s)",
7463 7464 7465 7466 7467
                         drivestr, devstr);
                /* XXX should call 'drive_del' on error but this does not
                   exist yet */
            }
        }
7468 7469 7470 7471 7472 7473 7474 7475 7476 7477 7478
    } else {
        virDomainDevicePCIAddress guestAddr;
        ret = qemuMonitorAddPCIDisk(priv->mon,
                                    disk->src,
                                    type,
                                    &guestAddr);
        if (ret == 0) {
            disk->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI;
            memcpy(&disk->info.addr.pci, &guestAddr, sizeof(guestAddr));
        }
    }
7479
    qemuDomainObjExitMonitorWithDriver(driver, vm);
7480

7481 7482
    qemuDomainDiskAudit(vm, NULL, disk, "attach", ret >= 0);

7483 7484
    if (ret < 0)
        goto error;
7485

7486
    virDomainDiskInsertPreAlloced(vm->def, disk);
7487

7488 7489 7490
    VIR_FREE(devstr);
    VIR_FREE(drivestr);

7491 7492 7493
    return 0;

error:
7494 7495 7496
    VIR_FREE(devstr);
    VIR_FREE(drivestr);

7497 7498 7499 7500 7501
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        (disk->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) &&
        qemuDomainPCIAddressReleaseAddr(priv->pciaddrs, &disk->info) < 0)
        VIR_WARN("Unable to release PCI address on %s", disk->src);

7502 7503
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
7504 7505
        driver->securityDriver->domainRestoreSecurityImageLabel(driver->securityDriver,
                                                                vm, disk) < 0)
7506
        VIR_WARN("Unable to restore security label on %s", disk->src);
7507 7508

    return -1;
7509
}
7510

7511

7512
static int qemudDomainAttachPciControllerDevice(struct qemud_driver *driver,
7513
                                                virDomainObjPtr vm,
7514
                                                virDomainControllerDefPtr controller,
7515
                                                unsigned long long qemuCmdFlags)
7516
{
7517 7518
    int i;
    int ret = -1;
7519
    const char* type = virDomainControllerTypeToString(controller->type);
7520
    char *devstr = NULL;
7521 7522 7523
    qemuDomainObjPrivatePtr priv = vm->privateData;

    for (i = 0 ; i < vm->def->ncontrollers ; i++) {
7524 7525
        if ((vm->def->controllers[i]->type == controller->type) &&
            (vm->def->controllers[i]->idx == controller->idx)) {
7526 7527 7528
            qemuReportError(VIR_ERR_OPERATION_FAILED,
                            _("target %s:%d already exists"),
                            type, controller->idx);
7529 7530 7531 7532
            return -1;
        }
    }

7533 7534 7535 7536 7537
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (qemuDomainPCIAddressEnsureAddr(priv->pciaddrs, &controller->info) < 0)
            goto cleanup;
        if (qemuAssignDeviceControllerAlias(controller) < 0)
            goto cleanup;
7538

7539 7540 7541 7542
        if (!(devstr = qemuBuildControllerDevStr(controller))) {
            virReportOOMError();
            goto cleanup;
        }
7543 7544
    }

7545
    if (VIR_REALLOC_N(vm->def->controllers, vm->def->ncontrollers+1) < 0) {
7546
        virReportOOMError();
7547
        goto cleanup;
7548 7549 7550
    }

    qemuDomainObjEnterMonitorWithDriver(driver, vm);
7551 7552 7553 7554 7555 7556 7557
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        ret = qemuMonitorAddDevice(priv->mon, devstr);
    } else {
        ret = qemuMonitorAttachPCIDiskController(priv->mon,
                                                 type,
                                                 &controller->info.addr.pci);
    }
7558 7559 7560
    qemuDomainObjExitMonitorWithDriver(driver, vm);

    if (ret == 0) {
7561 7562
        controller->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI;
        virDomainControllerInsertPreAlloced(vm->def, controller);
7563 7564
    }

7565
cleanup:
7566 7567 7568 7569 7570 7571
    if ((ret != 0) &&
        (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        (controller->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) &&
        qemuDomainPCIAddressReleaseAddr(priv->pciaddrs, &controller->info) < 0)
        VIR_WARN0("Unable to release PCI address on controller");

7572
    VIR_FREE(devstr);
7573 7574 7575
    return ret;
}

7576

7577
static virDomainControllerDefPtr
7578
qemuDomainFindOrCreateSCSIDiskController(struct qemud_driver *driver,
7579
                                         virDomainObjPtr vm,
7580
                                         int controller,
7581
                                         unsigned long long qemuCmdFlags)
7582 7583 7584 7585 7586 7587 7588 7589 7590 7591 7592 7593 7594
{
    int i;
    virDomainControllerDefPtr cont;
    for (i = 0 ; i < vm->def->ncontrollers ; i++) {
        cont = vm->def->controllers[i];

        if (cont->type != VIR_DOMAIN_CONTROLLER_TYPE_SCSI)
            continue;

        if (cont->idx == controller)
            return cont;
    }

W
Wolfgang Mauerer 已提交
7595
    /* No SCSI controller present, for backward compatibility we
7596 7597
     * now hotplug a controller */
    if (VIR_ALLOC(cont) < 0) {
7598
        virReportOOMError();
7599 7600 7601 7602
        return NULL;
    }
    cont->type = VIR_DOMAIN_CONTROLLER_TYPE_SCSI;
    cont->idx = 0;
7603
    cont->model = -1;
7604 7605

    VIR_INFO0("No SCSI controller present, hotplugging one");
7606
    if (qemudDomainAttachPciControllerDevice(driver,
7607
                                             vm, cont, qemuCmdFlags) < 0) {
7608 7609 7610
        VIR_FREE(cont);
        return NULL;
    }
7611 7612 7613 7614 7615 7616 7617 7618 7619

    if (!virDomainObjIsActive(vm)) {
        qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                        _("guest unexpectedly quit"));
        /* cont doesn't need freeing here, since the reference
         * now held in def->controllers */
        return NULL;
    }

7620 7621 7622
    return cont;
}

7623

7624
static int qemudDomainAttachSCSIDisk(struct qemud_driver *driver,
7625
                                     virDomainObjPtr vm,
7626
                                     virDomainDiskDefPtr disk,
7627
                                     unsigned long long qemuCmdFlags)
7628 7629 7630
{
    int i;
    qemuDomainObjPrivatePtr priv = vm->privateData;
7631
    virDomainControllerDefPtr cont = NULL;
7632
    char *drivestr = NULL;
7633
    char *devstr = NULL;
7634 7635 7636
    int ret = -1;

    for (i = 0 ; i < vm->def->ndisks ; i++) {
7637
        if (STREQ(vm->def->disks[i]->dst, disk->dst)) {
7638 7639
            qemuReportError(VIR_ERR_OPERATION_FAILED,
                            _("target %s already exists"), disk->dst);
7640
            return -1;
7641 7642 7643
        }
    }

7644 7645 7646

    if (driver->securityDriver &&
        driver->securityDriver->domainSetSecurityImageLabel &&
7647 7648
        driver->securityDriver->domainSetSecurityImageLabel(driver->securityDriver,
                                                            vm, disk) < 0)
7649 7650
        return -1;

7651
    /* We should have an address already, so make sure */
7652
    if (disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DRIVE) {
7653 7654 7655
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("unexpected disk address type %s"),
                        virDomainDeviceAddressTypeToString(disk->info.type));
7656
        goto error;
7657 7658
    }

7659 7660 7661
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (qemuAssignDeviceDiskAlias(disk, qemuCmdFlags) < 0)
            goto error;
7662
        if (!(devstr = qemuBuildDriveDevStr(disk)))
7663 7664 7665 7666 7667 7668
            goto error;
    }

    if (!(drivestr = qemuBuildDriveStr(disk, 0, qemuCmdFlags)))
        goto error;

7669
    for (i = 0 ; i <= disk->info.addr.drive.controller ; i++) {
7670
        cont = qemuDomainFindOrCreateSCSIDiskController(driver, vm, i, qemuCmdFlags);
7671
        if (!cont)
7672
            goto error;
7673 7674
    }

7675 7676 7677 7678 7679
    /* Tell clang that "cont" is non-NULL.
       This is because disk->info.addr.driver.controller is unsigned,
       and hence the above loop must iterate at least once.  */
    sa_assert (cont);

7680
    if (cont->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) {
7681 7682
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("SCSI controller %d was missing its PCI address"), cont->idx);
7683
        goto error;
7684 7685 7686
    }

    if (VIR_REALLOC_N(vm->def->disks, vm->def->ndisks+1) < 0) {
7687
        virReportOOMError();
7688
        goto error;
7689 7690 7691
    }

    qemuDomainObjEnterMonitorWithDriver(driver, vm);
7692
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
7693 7694 7695 7696
        ret = qemuMonitorAddDrive(priv->mon, drivestr);
        if (ret == 0) {
            ret = qemuMonitorAddDevice(priv->mon, devstr);
            if (ret < 0) {
7697
                VIR_WARN("qemuMonitorAddDevice failed on %s (%s)",
7698 7699 7700 7701 7702
                         drivestr, devstr);
                /* XXX should call 'drive_del' on error but this does not
                   exist yet */
            }
        }
7703 7704 7705 7706 7707 7708 7709 7710 7711 7712 7713 7714 7715
    } else {
        virDomainDeviceDriveAddress driveAddr;
        ret = qemuMonitorAttachDrive(priv->mon,
                                     drivestr,
                                     &cont->info.addr.pci,
                                     &driveAddr);
        if (ret == 0) {
            /* XXX we should probably validate that the addr matches
             * our existing defined addr instead of overwriting */
            disk->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DRIVE;
            memcpy(&disk->info.addr.drive, &driveAddr, sizeof(driveAddr));
        }
    }
7716 7717
    qemuDomainObjExitMonitorWithDriver(driver, vm);

7718 7719
    qemuDomainDiskAudit(vm, NULL, disk, "attach", ret >= 0);

7720 7721
    if (ret < 0)
        goto error;
7722

7723
    virDomainDiskInsertPreAlloced(vm->def, disk);
7724 7725

    VIR_FREE(devstr);
7726
    VIR_FREE(drivestr);
7727 7728 7729 7730

    return 0;

error:
7731
    VIR_FREE(devstr);
7732
    VIR_FREE(drivestr);
7733

7734 7735
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
7736 7737
        driver->securityDriver->domainRestoreSecurityImageLabel(driver->securityDriver,
                                                                vm, disk) < 0)
7738
        VIR_WARN("Unable to restore security label on %s", disk->src);
7739 7740

    return -1;
7741 7742
}

7743

7744
static int qemudDomainAttachUsbMassstorageDevice(struct qemud_driver *driver,
7745
                                                 virDomainObjPtr vm,
7746
                                                 virDomainDiskDefPtr disk,
7747
                                                 unsigned long long qemuCmdFlags)
7748
{
7749
    qemuDomainObjPrivatePtr priv = vm->privateData;
7750
    int i, ret;
7751 7752
    char *drivestr = NULL;
    char *devstr = NULL;
7753

7754
    for (i = 0 ; i < vm->def->ndisks ; i++) {
7755
        if (STREQ(vm->def->disks[i]->dst, disk->dst)) {
7756 7757
            qemuReportError(VIR_ERR_OPERATION_FAILED,
                            _("target %s already exists"), disk->dst);
7758 7759 7760 7761
            return -1;
        }
    }

7762 7763
    if (driver->securityDriver &&
        driver->securityDriver->domainSetSecurityImageLabel &&
7764 7765
        driver->securityDriver->domainSetSecurityImageLabel(driver->securityDriver,
                                                            vm, disk) < 0)
7766 7767
        return -1;

7768
    if (!disk->src) {
7769 7770
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("disk source path is missing"));
7771
        goto error;
7772 7773
    }

7774
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
7775 7776
        if (qemuAssignDeviceDiskAlias(disk, qemuCmdFlags) < 0)
            goto error;
7777 7778
        if (!(drivestr = qemuBuildDriveStr(disk, 0, qemuCmdFlags)))
            goto error;
7779
        if (!(devstr = qemuBuildDriveDevStr(disk)))
7780 7781 7782
            goto error;
    }

7783
    if (VIR_REALLOC_N(vm->def->disks, vm->def->ndisks+1) < 0) {
7784
        virReportOOMError();
7785
        goto error;
7786 7787
    }

7788
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
7789
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
7790 7791 7792 7793
        ret = qemuMonitorAddDrive(priv->mon, drivestr);
        if (ret == 0) {
            ret = qemuMonitorAddDevice(priv->mon, devstr);
            if (ret < 0) {
7794
                VIR_WARN("qemuMonitorAddDevice failed on %s (%s)",
7795 7796 7797 7798 7799
                         drivestr, devstr);
                /* XXX should call 'drive_del' on error but this does not
                   exist yet */
            }
        }
7800 7801 7802
    } else {
        ret = qemuMonitorAddUSBDisk(priv->mon, disk->src);
    }
7803
    qemuDomainObjExitMonitorWithDriver(driver, vm);
7804

7805 7806
    qemuDomainDiskAudit(vm, NULL, disk, "attach", ret >= 0);

7807 7808 7809
    if (ret < 0)
        goto error;

7810
    virDomainDiskInsertPreAlloced(vm->def, disk);
7811

7812 7813 7814
    VIR_FREE(devstr);
    VIR_FREE(drivestr);

7815 7816 7817
    return 0;

error:
7818 7819 7820
    VIR_FREE(devstr);
    VIR_FREE(drivestr);

7821 7822
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
7823 7824
        driver->securityDriver->domainRestoreSecurityImageLabel(driver->securityDriver,
                                                                vm, disk) < 0)
7825
        VIR_WARN("Unable to restore security label on %s", disk->src);
7826 7827

    return -1;
7828 7829
}

7830

7831
/* XXX conn required for network -> bridge resolution */
M
Mark McLoughlin 已提交
7832
static int qemudDomainAttachNetDevice(virConnectPtr conn,
7833
                                      struct qemud_driver *driver,
M
Mark McLoughlin 已提交
7834
                                      virDomainObjPtr vm,
7835
                                      virDomainNetDefPtr net,
7836
                                      unsigned long long qemuCmdFlags)
M
Mark McLoughlin 已提交
7837
{
7838
    qemuDomainObjPrivatePtr priv = vm->privateData;
7839
    char *tapfd_name = NULL;
7840
    int tapfd = -1;
7841
    char *nicstr = NULL;
7842
    char *netstr = NULL;
7843
    int ret = -1;
7844
    virDomainDevicePCIAddress guestAddr;
7845
    int vlan;
M
Mark McLoughlin 已提交
7846 7847

    if (!(qemuCmdFlags & QEMUD_CMD_FLAG_HOST_NET_ADD)) {
7848
        qemuReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
7849
                        _("installed qemu version does not support host_net_add"));
M
Mark McLoughlin 已提交
7850 7851 7852 7853 7854
        return -1;
    }

    if (net->type == VIR_DOMAIN_NET_TYPE_BRIDGE ||
        net->type == VIR_DOMAIN_NET_TYPE_NETWORK) {
7855
        if (priv->monConfig->type != VIR_DOMAIN_CHR_TYPE_UNIX) {
7856
            qemuReportError(VIR_ERR_CONFIG_UNSUPPORTED,
7857 7858 7859
                            _("network device type '%s' cannot be attached: "
                              "qemu is not using a unix socket monitor"),
                            virDomainNetTypeToString(net->type));
7860 7861 7862
            return -1;
        }

7863
        if ((tapfd = qemuNetworkIfaceConnect(conn, driver, net, qemuCmdFlags)) < 0)
7864
            return -1;
7865 7866
    } else if (net->type == VIR_DOMAIN_NET_TYPE_DIRECT) {
        if (priv->monConfig->type != VIR_DOMAIN_CHR_TYPE_UNIX) {
7867
            qemuReportError(VIR_ERR_CONFIG_UNSUPPORTED,
7868 7869 7870 7871 7872 7873
                            _("network device type '%s' cannot be attached: "
                            "qemu is not using a unix socket monitor"),
                            virDomainNetTypeToString(net->type));
            return -1;
        }

7874 7875 7876 7877
        if ((tapfd = qemuPhysIfaceConnect(conn, driver, net,
                                          qemuCmdFlags,
                                          vm->def->uuid,
                                          VIR_VM_OP_CREATE)) < 0)
7878
            return -1;
M
Mark McLoughlin 已提交
7879 7880
    }

7881 7882
    if (VIR_REALLOC_N(vm->def->nets, vm->def->nnets+1) < 0)
        goto no_memory;
M
Mark McLoughlin 已提交
7883

7884 7885 7886 7887 7888
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_NET_NAME) ||
        (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)) {
        if (qemuAssignDeviceNetAlias(vm->def, net, -1) < 0)
            goto cleanup;
    }
M
Mark McLoughlin 已提交
7889

7890 7891 7892 7893
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        qemuDomainPCIAddressEnsureAddr(priv->pciaddrs, &net->info) < 0)
        goto cleanup;

7894 7895 7896 7897 7898
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_NETDEV) &&
        (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)) {
        vlan = -1;
    } else {
        vlan = qemuDomainNetVLAN(net);
M
Mark McLoughlin 已提交
7899

7900
        if (vlan < 0) {
7901
            qemuReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
7902 7903 7904
                            _("Unable to attach network devices without vlan"));
            goto cleanup;
        }
7905 7906
    }

7907
    if (tapfd != -1) {
7908
        if (virAsprintf(&tapfd_name, "fd-%s", net->info.alias) < 0)
7909 7910
            goto no_memory;

7911
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
7912
        if (qemuMonitorSendFileHandle(priv->mon, tapfd_name, tapfd) < 0) {
7913
            qemuDomainObjExitMonitorWithDriver(driver, vm);
7914
            goto cleanup;
7915
        }
7916
        qemuDomainObjExitMonitorWithDriver(driver, vm);
7917 7918 7919 7920 7921 7922

        if (!virDomainObjIsActive(vm)) {
            qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                            _("guest unexpectedly quit"));
            goto cleanup;
        }
7923 7924
    }

7925
    /* FIXME - need to support vhost-net here (5th arg) */
7926 7927 7928 7929 7930 7931 7932 7933 7934 7935
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_NETDEV) &&
        (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)) {
        if (!(netstr = qemuBuildHostNetStr(net, ',',
                                           -1, tapfd_name, 0)))
            goto try_tapfd_close;
    } else {
        if (!(netstr = qemuBuildHostNetStr(net, ' ',
                                           vlan, tapfd_name, 0)))
            goto try_tapfd_close;
    }
M
Mark McLoughlin 已提交
7936

7937
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
7938 7939 7940 7941
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_NETDEV) &&
        (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)) {
        if (qemuMonitorAddNetdev(priv->mon, netstr) < 0) {
            qemuDomainObjExitMonitorWithDriver(driver, vm);
7942
            qemuDomainNetAudit(vm, NULL, net, "attach", false);
7943 7944 7945 7946 7947
            goto try_tapfd_close;
        }
    } else {
        if (qemuMonitorAddHostNetwork(priv->mon, netstr) < 0) {
            qemuDomainObjExitMonitorWithDriver(driver, vm);
7948
            qemuDomainNetAudit(vm, NULL, net, "attach", false);
7949 7950
            goto try_tapfd_close;
        }
7951
    }
7952
    qemuDomainObjExitMonitorWithDriver(driver, vm);
M
Mark McLoughlin 已提交
7953

7954
    VIR_FORCE_CLOSE(tapfd);
M
Mark McLoughlin 已提交
7955

7956 7957 7958 7959 7960 7961
    if (!virDomainObjIsActive(vm)) {
        qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                        _("guest unexpectedly quit"));
        goto cleanup;
    }

7962 7963 7964 7965 7966 7967 7968
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (!(nicstr = qemuBuildNicDevStr(net, vlan)))
            goto try_remove;
    } else {
        if (!(nicstr = qemuBuildNicStr(net, NULL, vlan)))
            goto try_remove;
    }
M
Mark McLoughlin 已提交
7969

7970
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
7971 7972 7973
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (qemuMonitorAddDevice(priv->mon, nicstr) < 0) {
            qemuDomainObjExitMonitorWithDriver(driver, vm);
7974
            qemuDomainNetAudit(vm, NULL, net, "attach", false);
7975 7976 7977 7978 7979 7980
            goto try_remove;
        }
    } else {
        if (qemuMonitorAddPCINetwork(priv->mon, nicstr,
                                     &guestAddr) < 0) {
            qemuDomainObjExitMonitorWithDriver(driver, vm);
7981
            qemuDomainNetAudit(vm, NULL, net, "attach", false);
7982 7983 7984 7985
            goto try_remove;
        }
        net->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI;
        memcpy(&net->info.addr.pci, &guestAddr, sizeof(guestAddr));
7986
    }
7987
    qemuDomainObjExitMonitorWithDriver(driver, vm);
7988

7989 7990
    qemuDomainNetAudit(vm, NULL, net, "attach", true);

7991
    ret = 0;
M
Mark McLoughlin 已提交
7992 7993 7994

    vm->def->nets[vm->def->nnets++] = net;

7995
cleanup:
7996 7997 7998 7999 8000 8001
    if ((ret != 0) &&
        (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        (net->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) &&
        qemuDomainPCIAddressReleaseAddr(priv->pciaddrs, &net->info) < 0)
        VIR_WARN0("Unable to release PCI address on NIC");

8002
    if (ret != 0)
8003
        virDomainConfNWFilterTeardown(net);
S
Stefan Berger 已提交
8004

8005 8006 8007
    VIR_FREE(nicstr);
    VIR_FREE(netstr);
    VIR_FREE(tapfd_name);
8008
    VIR_FORCE_CLOSE(tapfd);
8009

8010
    return ret;
8011

8012
try_remove:
8013
    if (!virDomainObjIsActive(vm))
8014 8015
        goto cleanup;

8016
    if (vlan < 0) {
8017 8018 8019 8020 8021 8022 8023
        if ((qemuCmdFlags & QEMUD_CMD_FLAG_NETDEV) &&
            (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)) {
            char *netdev_name;
            if (virAsprintf(&netdev_name, "host%s", net->info.alias) < 0)
                goto no_memory;
            qemuDomainObjEnterMonitorWithDriver(driver, vm);
            if (qemuMonitorRemoveNetdev(priv->mon, netdev_name) < 0)
8024
                VIR_WARN("Failed to remove network backend for netdev %s",
8025 8026 8027 8028
                         netdev_name);
            qemuDomainObjExitMonitorWithDriver(driver, vm);
            VIR_FREE(netdev_name);
        } else {
8029
            VIR_WARN0("Unable to remove network backend");
8030
        }
8031 8032 8033 8034
    } else {
        char *hostnet_name;
        if (virAsprintf(&hostnet_name, "host%s", net->info.alias) < 0)
            goto no_memory;
8035
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
8036
        if (qemuMonitorRemoveHostNetwork(priv->mon, vlan, hostnet_name) < 0)
8037
            VIR_WARN("Failed to remove network backend for vlan %d, net %s",
8038
                     vlan, hostnet_name);
8039
        qemuDomainObjExitMonitorWithDriver(driver, vm);
8040
        VIR_FREE(hostnet_name);
8041
    }
8042
    goto cleanup;
8043

8044
try_tapfd_close:
8045
    if (!virDomainObjIsActive(vm))
8046 8047
        goto cleanup;

8048
    if (tapfd_name) {
8049
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
8050
        if (qemuMonitorCloseFileHandle(priv->mon, tapfd_name) < 0)
8051
            VIR_WARN("Failed to close tapfd with '%s'", tapfd_name);
8052
        qemuDomainObjExitMonitorWithDriver(driver, vm);
8053
    }
8054

8055 8056
    goto cleanup;

8057
no_memory:
8058
    virReportOOMError();
8059
    goto cleanup;
M
Mark McLoughlin 已提交
8060 8061
}

8062

8063
static int qemudDomainAttachHostPciDevice(struct qemud_driver *driver,
8064
                                          virDomainObjPtr vm,
8065
                                          virDomainHostdevDefPtr hostdev,
8066
                                          unsigned long long qemuCmdFlags)
8067
{
8068
    qemuDomainObjPrivatePtr priv = vm->privateData;
8069
    int ret;
8070
    char *devstr = NULL;
8071 8072
    int configfd = -1;
    char *configfd_name = NULL;
8073 8074

    if (VIR_REALLOC_N(vm->def->hostdevs, vm->def->nhostdevs+1) < 0) {
8075
        virReportOOMError();
8076 8077 8078
        return -1;
    }

8079
    if (qemuPrepareHostdevPCIDevices(driver, &hostdev, 1) < 0)
8080
        return -1;
8081

8082
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
8083 8084
        if (qemuAssignDeviceHostdevAlias(vm->def, hostdev, -1) < 0)
            goto error;
8085 8086
        if (qemuDomainPCIAddressEnsureAddr(priv->pciaddrs, &hostdev->info) < 0)
            goto error;
8087
        if (qemuCmdFlags & QEMUD_CMD_FLAG_PCI_CONFIGFD) {
8088
            configfd = qemuOpenPCIConfig(hostdev);
8089 8090 8091 8092 8093 8094 8095 8096 8097 8098 8099 8100 8101 8102 8103 8104 8105 8106 8107 8108 8109 8110
            if (configfd >= 0) {
                if (virAsprintf(&configfd_name, "fd-%s",
                                hostdev->info.alias) < 0) {
                    virReportOOMError();
                    goto error;
                }

                qemuDomainObjEnterMonitorWithDriver(driver, vm);
                if (qemuMonitorSendFileHandle(priv->mon, configfd_name,
                                              configfd) < 0) {
                    qemuDomainObjExitMonitorWithDriver(driver, vm);
                    goto error;
                }
                qemuDomainObjExitMonitorWithDriver(driver, vm);
            }
        }

        if (!virDomainObjIsActive(vm)) {
            qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                            _("guest unexpectedly quit during hotplug"));
            goto error;
        }
8111

8112
        if (!(devstr = qemuBuildPCIHostdevDevStr(hostdev, configfd_name)))
8113
            goto error;
8114

8115
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
8116
        ret = qemuMonitorAddDevice(priv->mon, devstr);
8117 8118 8119 8120 8121
        qemuDomainObjExitMonitorWithDriver(driver, vm);
    } else {
        virDomainDevicePCIAddress guestAddr;

        qemuDomainObjEnterMonitorWithDriver(driver, vm);
8122 8123 8124
        ret = qemuMonitorAddPCIHostDevice(priv->mon,
                                          &hostdev->source.subsys.u.pci,
                                          &guestAddr);
8125 8126 8127 8128 8129
        qemuDomainObjExitMonitorWithDriver(driver, vm);

        hostdev->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI;
        memcpy(&hostdev->info.addr.pci, &guestAddr, sizeof(guestAddr));
    }
8130
    if (ret < 0)
8131
        goto error;
8132 8133 8134

    vm->def->hostdevs[vm->def->nhostdevs++] = hostdev;

8135
    VIR_FREE(devstr);
8136
    VIR_FREE(configfd_name);
8137
    VIR_FORCE_CLOSE(configfd);
8138

8139
    return 0;
8140 8141

error:
8142 8143 8144 8145 8146
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        (hostdev->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) &&
        qemuDomainPCIAddressReleaseAddr(priv->pciaddrs, &hostdev->info) < 0)
        VIR_WARN0("Unable to release PCI address on host device");

8147
    qemuDomainReAttachHostdevDevices(driver, &hostdev, 1);
8148 8149

    VIR_FREE(devstr);
8150
    VIR_FREE(configfd_name);
8151
    VIR_FORCE_CLOSE(configfd);
8152 8153

    return -1;
8154 8155
}

8156

8157
static int qemudDomainAttachHostUsbDevice(struct qemud_driver *driver,
M
Mark McLoughlin 已提交
8158
                                          virDomainObjPtr vm,
8159
                                          virDomainHostdevDefPtr hostdev,
8160
                                          unsigned long long qemuCmdFlags)
8161 8162
{
    int ret;
8163
    qemuDomainObjPrivatePtr priv = vm->privateData;
8164 8165
    char *devstr = NULL;

8166 8167 8168 8169 8170 8171
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (qemuAssignDeviceHostdevAlias(vm->def, hostdev, -1) < 0)
            goto error;
        if (!(devstr = qemuBuildUSBHostdevDevStr(hostdev)))
            goto error;
    }
8172

8173
    if (VIR_REALLOC_N(vm->def->hostdevs, vm->def->nhostdevs+1) < 0) {
8174
        virReportOOMError();
8175
        goto error;
8176
    }
8177

8178 8179 8180 8181 8182 8183 8184 8185 8186 8187 8188 8189 8190 8191 8192 8193 8194 8195 8196
    if (qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_DEVICES)) {
        virCgroupPtr cgroup = NULL;
        usbDevice *usb;

        if (virCgroupForDomain(driver->cgroup, vm->def->name, &cgroup, 0) !=0 ) {
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("Unable to find cgroup for %s\n"),
                            vm->def->name);
            goto error;
        }

        if ((usb = usbGetDevice(hostdev->source.subsys.u.usb.bus,
                                hostdev->source.subsys.u.usb.device)) == NULL)
            goto error;

        if (usbDeviceFileIterate(usb, qemuSetupHostUsbDeviceCgroup, cgroup) < 0 )
            goto error;
    }

8197
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
8198 8199 8200
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)
        ret = qemuMonitorAddDevice(priv->mon, devstr);
    else
8201
        ret = qemuMonitorAddUSBDeviceExact(priv->mon,
8202 8203
                                           hostdev->source.subsys.u.usb.bus,
                                           hostdev->source.subsys.u.usb.device);
8204
    qemuDomainObjExitMonitorWithDriver(driver, vm);
8205 8206 8207 8208
    if (ret < 0)
        goto error;

    vm->def->hostdevs[vm->def->nhostdevs++] = hostdev;
8209

8210
    VIR_FREE(devstr);
8211

8212 8213 8214 8215 8216
    return 0;

error:
    VIR_FREE(devstr);
    return -1;
8217 8218
}

8219

8220
static int qemudDomainAttachHostDevice(struct qemud_driver *driver,
M
Mark McLoughlin 已提交
8221
                                       virDomainObjPtr vm,
8222
                                       virDomainHostdevDefPtr hostdev,
8223
                                       unsigned long long qemuCmdFlags)
M
Mark McLoughlin 已提交
8224 8225
{
    if (hostdev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS) {
8226
        qemuReportError(VIR_ERR_CONFIG_UNSUPPORTED,
8227 8228
                        _("hostdev mode '%s' not supported"),
                        virDomainHostdevModeTypeToString(hostdev->mode));
M
Mark McLoughlin 已提交
8229 8230 8231
        return -1;
    }

8232 8233 8234 8235 8236 8237 8238 8239 8240 8241 8242 8243 8244 8245 8246 8247 8248
    /* Resolve USB product/vendor to bus/device */
    if (hostdev->source.subsys.type == VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB &&
        hostdev->source.subsys.u.usb.vendor) {
        usbDevice *usb
            = usbFindDevice(hostdev->source.subsys.u.usb.vendor,
                            hostdev->source.subsys.u.usb.product);

        if (!usb)
            return -1;

        hostdev->source.subsys.u.usb.bus = usbDeviceGetBus(usb);
        hostdev->source.subsys.u.usb.device = usbDeviceGetDevno(usb);

        usbFreeDevice(usb);
    }


8249
    if (driver->securityDriver &&
8250
        driver->securityDriver->domainSetSecurityHostdevLabel &&
8251 8252
        driver->securityDriver->domainSetSecurityHostdevLabel(driver->securityDriver,
                                                              vm, hostdev) < 0)
8253
        return -1;
M
Mark McLoughlin 已提交
8254 8255

    switch (hostdev->source.subsys.type) {
8256
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI:
8257
        if (qemudDomainAttachHostPciDevice(driver, vm,
8258
                                           hostdev, qemuCmdFlags) < 0)
8259 8260 8261
            goto error;
        break;

M
Mark McLoughlin 已提交
8262
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB:
8263
        if (qemudDomainAttachHostUsbDevice(driver, vm,
8264
                                           hostdev, qemuCmdFlags) < 0)
8265 8266 8267
            goto error;
        break;

M
Mark McLoughlin 已提交
8268
    default:
8269
        qemuReportError(VIR_ERR_CONFIG_UNSUPPORTED,
8270 8271
                        _("hostdev subsys type '%s' not supported"),
                        virDomainHostdevSubsysTypeToString(hostdev->source.subsys.type));
8272
        goto error;
M
Mark McLoughlin 已提交
8273
    }
8274 8275 8276 8277 8278 8279

    return 0;

error:
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityHostdevLabel &&
8280 8281
        driver->securityDriver->domainRestoreSecurityHostdevLabel(driver->securityDriver,
                                                                  vm, hostdev) < 0)
8282 8283 8284
        VIR_WARN0("Unable to restore host device labelling on hotplug fail");

    return -1;
M
Mark McLoughlin 已提交
8285 8286
}

8287

8288
static int qemudDomainAttachDevice(virDomainPtr dom,
8289 8290
                                   const char *xml)
{
8291 8292 8293
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    virDomainDeviceDefPtr dev = NULL;
8294
    unsigned long long qemuCmdFlags;
8295
    virCgroupPtr cgroup = NULL;
8296
    int ret = -1;
8297

8298
    qemuDriverLock(driver);
8299
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
8300
    if (!vm) {
8301 8302
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
8303 8304
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
8305
        goto cleanup;
8306 8307
    }

8308 8309 8310
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
8311
    if (!virDomainObjIsActive(vm)) {
8312 8313
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("cannot attach device on inactive domain"));
8314
        goto endjob;
8315 8316
    }

8317
    dev = virDomainDeviceDefParse(driver->caps, vm->def, xml,
8318
                                  VIR_DOMAIN_XML_INACTIVE);
8319
    if (dev == NULL)
8320
        goto endjob;
8321

8322 8323 8324
    if (qemuCapsExtractVersionInfo(vm->def->emulator,
                                   NULL,
                                   &qemuCmdFlags) < 0)
8325
        goto endjob;
8326

8327
    if (dev->type == VIR_DOMAIN_DEVICE_DISK) {
8328
        if (qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_DEVICES)) {
8329
            if (virCgroupForDomain(driver->cgroup, vm->def->name, &cgroup, 0) !=0 ) {
8330 8331 8332
                qemuReportError(VIR_ERR_INTERNAL_ERROR,
                                _("Unable to find cgroup for %s\n"),
                                vm->def->name);
8333
                goto endjob;
8334
            }
8335
            if (qemuSetupDiskCgroup(driver, cgroup, dev->data.disk) < 0)
8336
                goto endjob;
8337 8338
        }

8339
        switch (dev->data.disk->device) {
8340 8341
        case VIR_DOMAIN_DISK_DEVICE_CDROM:
        case VIR_DOMAIN_DISK_DEVICE_FLOPPY:
8342 8343
            ret = qemudDomainChangeEjectableMedia(driver, vm,
                                                  dev->data.disk,
8344 8345
                                                  qemuCmdFlags,
                                                  false);
8346 8347
            if (ret == 0)
                dev->data.disk = NULL;
8348
            break;
8349

8350 8351
        case VIR_DOMAIN_DISK_DEVICE_DISK:
            if (dev->data.disk->bus == VIR_DOMAIN_DISK_BUS_USB) {
8352
                ret = qemudDomainAttachUsbMassstorageDevice(driver, vm,
8353
                                                            dev->data.disk, qemuCmdFlags);
8354 8355
                if (ret == 0)
                    dev->data.disk = NULL;
8356
            } else if (dev->data.disk->bus == VIR_DOMAIN_DISK_BUS_VIRTIO) {
8357
                ret = qemudDomainAttachPciDiskDevice(driver, vm,
8358
                                                     dev->data.disk, qemuCmdFlags);
8359 8360
                if (ret == 0)
                    dev->data.disk = NULL;
8361
            } else if (dev->data.disk->bus == VIR_DOMAIN_DISK_BUS_SCSI) {
8362
                ret = qemudDomainAttachSCSIDisk(driver, vm,
8363
                                                dev->data.disk, qemuCmdFlags);
8364 8365
                if (ret == 0)
                    dev->data.disk = NULL;
8366
            } else {
8367
                qemuReportError(VIR_ERR_CONFIG_UNSUPPORTED,
8368 8369
                                _("disk bus '%s' cannot be hotplugged."),
                                virDomainDiskBusTypeToString(dev->data.disk->bus));
8370
                /* fallthrough */
8371 8372
            }
            break;
8373

8374
        default:
8375
            qemuReportError(VIR_ERR_CONFIG_UNSUPPORTED,
8376 8377
                            _("disk device type '%s' cannot be hotplugged"),
                            virDomainDiskDeviceTypeToString(dev->data.disk->device));
8378 8379
            /* Fallthrough */
        }
8380
        if (ret != 0 && cgroup) {
8381
            if (qemuTeardownDiskCgroup(driver, cgroup, dev->data.disk) < 0)
8382 8383
                VIR_WARN("Failed to teardown cgroup for disk path %s",
                         NULLSTR(dev->data.disk->src));
8384
        }
8385 8386
    } else if (dev->type == VIR_DOMAIN_DEVICE_CONTROLLER) {
        if (dev->data.controller->type == VIR_DOMAIN_CONTROLLER_TYPE_SCSI) {
8387
            ret = qemudDomainAttachPciControllerDevice(driver, vm,
8388
                                                       dev->data.controller, qemuCmdFlags);
8389 8390
            if (ret == 0)
                dev->data.controller = NULL;
8391
        } else {
8392
            qemuReportError(VIR_ERR_CONFIG_UNSUPPORTED,
8393 8394
                            _("disk controller bus '%s' cannot be hotplugged."),
                            virDomainControllerTypeToString(dev->data.controller->type));
8395 8396
            /* fallthrough */
        }
M
Mark McLoughlin 已提交
8397
    } else if (dev->type == VIR_DOMAIN_DEVICE_NET) {
8398 8399
        ret = qemudDomainAttachNetDevice(dom->conn, driver, vm,
                                         dev->data.net, qemuCmdFlags);
8400 8401
        if (ret == 0)
            dev->data.net = NULL;
M
Mark McLoughlin 已提交
8402
    } else if (dev->type == VIR_DOMAIN_DEVICE_HOSTDEV) {
8403
        ret = qemudDomainAttachHostDevice(driver, vm,
8404
                                          dev->data.hostdev, qemuCmdFlags);
8405 8406
        if (ret == 0)
            dev->data.hostdev = NULL;
8407
    } else {
8408
        qemuReportError(VIR_ERR_CONFIG_UNSUPPORTED,
8409 8410
                        _("device type '%s' cannot be attached"),
                        virDomainDeviceTypeToString(dev->type));
8411
        goto endjob;
8412 8413
    }

8414
    if (!ret && virDomainSaveStatus(driver->caps, driver->stateDir, vm) < 0)
8415 8416
        ret = -1;

8417
endjob:
8418 8419
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
8420

8421
cleanup:
8422 8423 8424
    if (cgroup)
        virCgroupFree(&cgroup);

8425
    virDomainDeviceDefFree(dev);
8426 8427
    if (vm)
        virDomainObjUnlock(vm);
8428
    qemuDriverUnlock(driver);
8429 8430 8431
    return ret;
}

8432 8433 8434 8435
static int qemudDomainAttachDeviceFlags(virDomainPtr dom,
                                        const char *xml,
                                        unsigned int flags) {
    if (flags & VIR_DOMAIN_DEVICE_MODIFY_CONFIG) {
8436 8437
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("cannot modify the persistent configuration of a domain"));
8438 8439 8440 8441 8442 8443
        return -1;
    }

    return qemudDomainAttachDevice(dom, xml);
}

8444

8445 8446 8447 8448 8449 8450 8451 8452 8453 8454 8455 8456 8457 8458 8459 8460 8461 8462 8463 8464 8465 8466 8467 8468 8469 8470 8471 8472 8473 8474 8475 8476 8477 8478 8479 8480 8481 8482 8483 8484 8485 8486 8487 8488 8489 8490 8491 8492
static virDomainGraphicsDefPtr qemuDomainFindGraphics(virDomainObjPtr vm,
                                                      virDomainGraphicsDefPtr dev)
{
    int i;

    for (i = 0 ; i < vm->def->ngraphics ; i++) {
        if (vm->def->graphics[i]->type == dev->type)
            return vm->def->graphics[i];
    }

    return NULL;
}


static int
qemuDomainChangeGraphics(struct qemud_driver *driver,
                         virDomainObjPtr vm,
                         virDomainGraphicsDefPtr dev)
{
    virDomainGraphicsDefPtr olddev = qemuDomainFindGraphics(vm, dev);
    qemuDomainObjPrivatePtr priv = vm->privateData;
    int ret = -1;

    if (!olddev) {
        qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                        _("cannot find existing graphics device to modify"));
        return -1;
    }

    switch (dev->type) {
    case VIR_DOMAIN_GRAPHICS_TYPE_VNC:
        if ((olddev->data.vnc.autoport != dev->data.vnc.autoport) ||
            (!dev->data.vnc.autoport && (olddev->data.vnc.port != dev->data.vnc.port))) {
            qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                            _("cannot change port settings on vnc graphics"));
            return -1;
        }
        if (STRNEQ_NULLABLE(olddev->data.vnc.listenAddr, dev->data.vnc.listenAddr)) {
            qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                            _("cannot change listen address setting on vnc graphics"));
            return -1;
        }
        if (STRNEQ_NULLABLE(olddev->data.vnc.keymap, dev->data.vnc.keymap)) {
            qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                            _("cannot change keymap setting on vnc graphics"));
            return -1;
        }

8493 8494
        if (STRNEQ_NULLABLE(olddev->data.vnc.auth.passwd, dev->data.vnc.auth.passwd)) {
            VIR_DEBUG("Updating password on VNC server %p %p", dev->data.vnc.auth.passwd, driver->vncPassword);
8495 8496
            qemuDomainObjEnterMonitorWithDriver(driver, vm);
            ret = qemuMonitorSetVNCPassword(priv->mon,
8497 8498
                                            dev->data.vnc.auth.passwd ?
                                            dev->data.vnc.auth.passwd :
8499 8500 8501 8502
                                            driver->vncPassword);
            qemuDomainObjExitMonitorWithDriver(driver, vm);

            /* Steal the new dev's  char * reference */
8503 8504 8505
            VIR_FREE(olddev->data.vnc.auth.passwd);
            olddev->data.vnc.auth.passwd = dev->data.vnc.auth.passwd;
            dev->data.vnc.auth.passwd = NULL;
8506 8507 8508 8509 8510 8511 8512 8513 8514 8515 8516 8517 8518 8519 8520 8521
        } else {
            ret = 0;
        }
        break;

    default:
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("unable to change config on '%s' graphics type"),
                        virDomainGraphicsTypeToString(dev->type));
        break;
    }

    return ret;
}


8522 8523 8524 8525 8526 8527 8528 8529 8530 8531
static int qemuDomainUpdateDeviceFlags(virDomainPtr dom,
                                       const char *xml,
                                       unsigned int flags)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    virDomainDeviceDefPtr dev = NULL;
    unsigned long long qemuCmdFlags;
    virCgroupPtr cgroup = NULL;
    int ret = -1;
8532
    bool force = (flags & VIR_DOMAIN_DEVICE_MODIFY_FORCE) != 0;
8533

8534 8535
    virCheckFlags(VIR_DOMAIN_DEVICE_MODIFY_CURRENT |
                  VIR_DOMAIN_DEVICE_MODIFY_LIVE |
8536 8537
                  VIR_DOMAIN_DEVICE_MODIFY_CONFIG |
                  VIR_DOMAIN_DEVICE_MODIFY_FORCE, -1);
8538

8539 8540 8541 8542 8543 8544 8545 8546 8547 8548 8549 8550 8551 8552 8553 8554 8555 8556 8557 8558 8559 8560 8561 8562 8563 8564 8565 8566 8567 8568
    if (flags & VIR_DOMAIN_DEVICE_MODIFY_CONFIG) {
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("cannot modify the persistent configuration of a domain"));
        return -1;
    }

    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

    if (!virDomainObjIsActive(vm)) {
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("cannot attach device on inactive domain"));
        goto endjob;
    }

    dev = virDomainDeviceDefParse(driver->caps, vm->def, xml,
                                  VIR_DOMAIN_XML_INACTIVE);
    if (dev == NULL)
        goto endjob;

8569 8570 8571
    if (qemuCapsExtractVersionInfo(vm->def->emulator,
                                   NULL,
                                   &qemuCmdFlags) < 0)
8572 8573 8574 8575 8576 8577 8578 8579 8580 8581 8582
        goto endjob;

    switch (dev->type) {
    case VIR_DOMAIN_DEVICE_DISK:
        if (qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_DEVICES)) {
            if (virCgroupForDomain(driver->cgroup, vm->def->name, &cgroup, 0) !=0 ) {
                qemuReportError(VIR_ERR_INTERNAL_ERROR,
                                _("Unable to find cgroup for %s\n"),
                                vm->def->name);
                goto endjob;
            }
8583
            if (qemuSetupDiskCgroup(driver, cgroup, dev->data.disk) < 0)
8584 8585 8586 8587 8588 8589
                goto endjob;
        }

        switch (dev->data.disk->device) {
        case VIR_DOMAIN_DISK_DEVICE_CDROM:
        case VIR_DOMAIN_DISK_DEVICE_FLOPPY:
8590 8591
            ret = qemudDomainChangeEjectableMedia(driver, vm,
                                                  dev->data.disk,
8592 8593
                                                  qemuCmdFlags,
                                                  force);
8594 8595 8596 8597 8598 8599
            if (ret == 0)
                dev->data.disk = NULL;
            break;


        default:
8600
            qemuReportError(VIR_ERR_CONFIG_UNSUPPORTED,
8601 8602 8603 8604 8605 8606
                            _("disk bus '%s' cannot be updated."),
                            virDomainDiskBusTypeToString(dev->data.disk->bus));
            break;
        }

        if (ret != 0 && cgroup) {
8607
            if (qemuTeardownDiskCgroup(driver, cgroup, dev->data.disk) < 0)
8608 8609
                VIR_WARN("Failed to teardown cgroup for disk path %s",
                         NULLSTR(dev->data.disk->src));
8610 8611 8612
        }
        break;

8613 8614 8615 8616
    case VIR_DOMAIN_DEVICE_GRAPHICS:
        ret = qemuDomainChangeGraphics(driver, vm, dev->data.graphics);
        break;

8617
    default:
8618
        qemuReportError(VIR_ERR_CONFIG_UNSUPPORTED,
8619 8620 8621 8622 8623 8624 8625 8626 8627 8628 8629 8630 8631 8632 8633 8634 8635 8636 8637 8638 8639 8640 8641 8642
                        _("disk device type '%s' cannot be updated"),
                        virDomainDiskDeviceTypeToString(dev->data.disk->device));
        break;
    }

    if (!ret && virDomainSaveStatus(driver->caps, driver->stateDir, vm) < 0)
        ret = -1;

endjob:
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;

cleanup:
    if (cgroup)
        virCgroupFree(&cgroup);

    virDomainDeviceDefFree(dev);
    if (vm)
        virDomainObjUnlock(vm);
    qemuDriverUnlock(driver);
    return ret;
}


E
Eric Blake 已提交
8643
static inline int qemudFindDisk(virDomainDefPtr def, const char *dst)
W
Wolfgang Mauerer 已提交
8644 8645 8646 8647 8648 8649 8650 8651 8652 8653 8654 8655 8656
{
    int i;

    for (i = 0 ; i < def->ndisks ; i++) {
        if (STREQ(def->disks[i]->dst, dst)) {
            return i;
        }
    }

    return -1;
}


8657
static int qemudDomainDetachPciDiskDevice(struct qemud_driver *driver,
8658
                                          virDomainObjPtr vm,
8659 8660
                                          virDomainDeviceDefPtr dev,
                                          unsigned long long qemuCmdFlags)
8661 8662 8663
{
    int i, ret = -1;
    virDomainDiskDefPtr detach = NULL;
8664
    qemuDomainObjPrivatePtr priv = vm->privateData;
8665
    virCgroupPtr cgroup = NULL;
8666
    char *drivestr = NULL;
8667

W
Wolfgang Mauerer 已提交
8668
    i = qemudFindDisk(vm->def, dev->data.disk->dst);
8669

W
Wolfgang Mauerer 已提交
8670
    if (i < 0) {
8671 8672
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        _("disk %s not found"), dev->data.disk->dst);
8673
        goto cleanup;
8674 8675
    }

W
Wolfgang Mauerer 已提交
8676 8677
    detach = vm->def->disks[i];

8678 8679 8680 8681 8682 8683 8684 8685 8686
    if (qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_DEVICES)) {
        if (virCgroupForDomain(driver->cgroup, vm->def->name, &cgroup, 0) != 0) {
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("Unable to find cgroup for %s\n"),
                            vm->def->name);
            goto cleanup;
        }
    }

8687 8688
    if (!virDomainDeviceAddressIsValid(&detach->info,
                                       VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI)) {
8689 8690
        qemuReportError(VIR_ERR_OPERATION_FAILED, "%s",
                        _("device cannot be detached without a PCI address"));
8691
        goto cleanup;
8692 8693
    }

8694 8695
    /* build the actual drive id string as the disk->info.alias doesn't
     * contain the QEMU_DRIVE_HOST_PREFIX that is passed to qemu */
8696 8697
    if (virAsprintf(&drivestr, "%s%s",
                    QEMU_DRIVE_HOST_PREFIX, detach->info.alias) < 0) {
8698 8699 8700 8701
        virReportOOMError();
        goto cleanup;
    }

8702
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
8703 8704 8705 8706 8707 8708 8709 8710 8711 8712 8713
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (qemuMonitorDelDevice(priv->mon, detach->info.alias) < 0) {
            qemuDomainObjExitMonitor(vm);
            goto cleanup;
        }
    } else {
        if (qemuMonitorRemovePCIDevice(priv->mon,
                                       &detach->info.addr.pci) < 0) {
            qemuDomainObjExitMonitor(vm);
            goto cleanup;
        }
8714
    }
8715 8716 8717 8718

    /* disconnect guest from host device */
    qemuMonitorDriveDel(priv->mon, drivestr);

8719
    qemuDomainObjExitMonitorWithDriver(driver, vm);
8720

8721 8722
    qemuDomainDiskAudit(vm, detach, NULL, "detach", ret >= 0);

8723 8724 8725 8726
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        qemuDomainPCIAddressReleaseAddr(priv->pciaddrs, &detach->info) < 0)
        VIR_WARN("Unable to release PCI address on %s", dev->data.disk->src);

8727
    virDomainDiskRemove(vm->def, i);
W
Wolfgang Mauerer 已提交
8728

8729 8730
    virDomainDiskDefFree(detach);

8731 8732
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
8733 8734
        driver->securityDriver->domainRestoreSecurityImageLabel(driver->securityDriver,
                                                                vm, dev->data.disk) < 0)
8735 8736
        VIR_WARN("Unable to restore security label on %s", dev->data.disk->src);

8737
    if (cgroup != NULL) {
8738
        if (qemuTeardownDiskCgroup(driver, cgroup, dev->data.disk) < 0)
8739 8740 8741 8742
            VIR_WARN("Failed to teardown cgroup for disk path %s",
                     NULLSTR(dev->data.disk->src));
    }

8743 8744 8745
    ret = 0;

cleanup:
8746
    VIR_FREE(drivestr);
8747 8748 8749 8750 8751 8752 8753 8754 8755 8756 8757
    return ret;
}

static int qemudDomainDetachSCSIDiskDevice(struct qemud_driver *driver,
                                           virDomainObjPtr vm,
                                           virDomainDeviceDefPtr dev,
                                           unsigned long long qemuCmdFlags)
{
    int i, ret = -1;
    virDomainDiskDefPtr detach = NULL;
    qemuDomainObjPrivatePtr priv = vm->privateData;
8758
    virCgroupPtr cgroup = NULL;
8759
    char *drivestr = NULL;
8760 8761 8762 8763 8764 8765 8766 8767 8768 8769

    i = qemudFindDisk(vm->def, dev->data.disk->dst);

    if (i < 0) {
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        _("disk %s not found"), dev->data.disk->dst);
        goto cleanup;
    }

    if (!(qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)) {
8770
        qemuReportError(VIR_ERR_OPERATION_FAILED, "%s",
8771 8772 8773 8774 8775 8776
                        _("Underlying qemu does not support SCSI disk removal"));
        goto cleanup;
    }

    detach = vm->def->disks[i];

8777 8778 8779 8780 8781 8782 8783 8784 8785
    if (qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_DEVICES)) {
        if (virCgroupForDomain(driver->cgroup, vm->def->name, &cgroup, 0) != 0) {
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("Unable to find cgroup for %s\n"),
                            vm->def->name);
            goto cleanup;
        }
    }

8786 8787
    /* build the actual drive id string as the disk->info.alias doesn't
     * contain the QEMU_DRIVE_HOST_PREFIX that is passed to qemu */
8788 8789
    if (virAsprintf(&drivestr, "%s%s",
                    QEMU_DRIVE_HOST_PREFIX, detach->info.alias) < 0) {
8790 8791 8792 8793
        virReportOOMError();
        goto cleanup;
    }

8794 8795 8796 8797 8798
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
    if (qemuMonitorDelDevice(priv->mon, detach->info.alias) < 0) {
        qemuDomainObjExitMonitor(vm);
        goto cleanup;
    }
8799 8800 8801 8802

    /* disconnect guest from host device */
    qemuMonitorDriveDel(priv->mon, drivestr);

8803 8804
    qemuDomainObjExitMonitorWithDriver(driver, vm);

8805 8806
    qemuDomainDiskAudit(vm, detach, NULL, "detach", ret >= 0);

8807
    virDomainDiskRemove(vm->def, i);
8808

8809
    virDomainDiskDefFree(detach);
8810

8811 8812
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
8813 8814
        driver->securityDriver->domainRestoreSecurityImageLabel(driver->securityDriver,
                                                                vm, dev->data.disk) < 0)
8815 8816
        VIR_WARN("Unable to restore security label on %s", dev->data.disk->src);

8817
    if (cgroup != NULL) {
8818
        if (qemuTeardownDiskCgroup(driver, cgroup, dev->data.disk) < 0)
8819 8820 8821 8822
            VIR_WARN("Failed to teardown cgroup for disk path %s",
                     NULLSTR(dev->data.disk->src));
    }

8823
    ret = 0;
8824 8825

cleanup:
8826
    VIR_FREE(drivestr);
8827
    virCgroupFree(&cgroup);
8828 8829 8830
    return ret;
}

8831
static int qemudDomainDetachPciControllerDevice(struct qemud_driver *driver,
8832
                                                virDomainObjPtr vm,
8833 8834
                                                virDomainDeviceDefPtr dev,
                                                unsigned long long qemuCmdFlags)
8835 8836 8837 8838 8839 8840 8841 8842 8843 8844 8845 8846 8847 8848
{
    int i, ret = -1;
    virDomainControllerDefPtr detach = NULL;
    qemuDomainObjPrivatePtr priv = vm->privateData;

    for (i = 0 ; i < vm->def->ncontrollers ; i++) {
        if ((vm->def->controllers[i]->type == dev->data.controller->type) &&
            (vm->def->controllers[i]->idx == dev->data.controller->idx)) {
            detach = vm->def->controllers[i];
            break;
        }
    }

    if (!detach) {
8849 8850 8851 8852
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        _("disk controller %s:%d not found"),
                        virDomainControllerTypeToString(dev->data.controller->type),
                        dev->data.controller->idx);
8853 8854 8855 8856 8857
        goto cleanup;
    }

    if (!virDomainDeviceAddressIsValid(&detach->info,
                                       VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI)) {
8858 8859
        qemuReportError(VIR_ERR_OPERATION_FAILED, "%s",
                        _("device cannot be detached without a PCI address"));
8860 8861 8862
        goto cleanup;
    }

8863 8864 8865 8866 8867
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (qemuAssignDeviceControllerAlias(detach) < 0)
            goto cleanup;
    }

8868
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
8869 8870 8871 8872 8873 8874 8875 8876 8877 8878 8879
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (qemuMonitorDelDevice(priv->mon, detach->info.alias)) {
            qemuDomainObjExitMonitor(vm);
            goto cleanup;
        }
    } else {
        if (qemuMonitorRemovePCIDevice(priv->mon,
                                       &detach->info.addr.pci) < 0) {
            qemuDomainObjExitMonitor(vm);
            goto cleanup;
        }
8880 8881 8882 8883 8884 8885 8886 8887 8888 8889 8890 8891 8892 8893 8894 8895
    }
    qemuDomainObjExitMonitorWithDriver(driver, vm);

    if (vm->def->ncontrollers > 1) {
        memmove(vm->def->controllers + i,
                vm->def->controllers + i + 1,
                sizeof(*vm->def->controllers) *
                (vm->def->ncontrollers - (i + 1)));
        vm->def->ncontrollers--;
        if (VIR_REALLOC_N(vm->def->controllers, vm->def->ncontrollers) < 0) {
            /* ignore, harmless */
        }
    } else {
        VIR_FREE(vm->def->controllers);
        vm->def->ncontrollers = 0;
    }
8896

8897 8898
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        qemuDomainPCIAddressReleaseAddr(priv->pciaddrs, &detach->info) < 0)
8899 8900
        VIR_WARN0("Unable to release PCI address on controller");

8901 8902 8903 8904 8905 8906 8907 8908
    virDomainControllerDefFree(detach);

    ret = 0;

cleanup:
    return ret;
}

8909
static int
8910
qemudDomainDetachNetDevice(struct qemud_driver *driver,
8911
                           virDomainObjPtr vm,
8912 8913
                           virDomainDeviceDefPtr dev,
                           unsigned long long qemuCmdFlags)
8914 8915 8916
{
    int i, ret = -1;
    virDomainNetDefPtr detach = NULL;
8917
    qemuDomainObjPrivatePtr priv = vm->privateData;
8918 8919
    int vlan;
    char *hostnet_name = NULL;
8920 8921 8922 8923 8924 8925 8926 8927 8928 8929 8930

    for (i = 0 ; i < vm->def->nnets ; i++) {
        virDomainNetDefPtr net = vm->def->nets[i];

        if (!memcmp(net->mac, dev->data.net->mac,  sizeof(net->mac))) {
            detach = net;
            break;
        }
    }

    if (!detach) {
8931 8932 8933 8934 8935
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        _("network device %02x:%02x:%02x:%02x:%02x:%02x not found"),
                        dev->data.net->mac[0], dev->data.net->mac[1],
                        dev->data.net->mac[2], dev->data.net->mac[3],
                        dev->data.net->mac[4], dev->data.net->mac[5]);
8936 8937 8938
        goto cleanup;
    }

8939 8940
    if (!virDomainDeviceAddressIsValid(&detach->info,
                                       VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI)) {
8941 8942
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("device cannot be detached without a PCI address"));
8943 8944 8945
        goto cleanup;
    }

8946
    if ((vlan = qemuDomainNetVLAN(detach)) < 0) {
8947 8948
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("unable to determine original VLAN"));
8949 8950 8951 8952
        goto cleanup;
    }

    if (virAsprintf(&hostnet_name, "host%s", detach->info.alias) < 0) {
8953
        virReportOOMError();
8954 8955 8956
        goto cleanup;
    }

8957
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
8958 8959 8960
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (qemuMonitorDelDevice(priv->mon, detach->info.alias) < 0) {
            qemuDomainObjExitMonitor(vm);
8961
            qemuDomainNetAudit(vm, detach, NULL, "detach", false);
8962 8963 8964 8965 8966 8967
            goto cleanup;
        }
    } else {
        if (qemuMonitorRemovePCIDevice(priv->mon,
                                       &detach->info.addr.pci) < 0) {
            qemuDomainObjExitMonitorWithDriver(driver, vm);
8968
            qemuDomainNetAudit(vm, detach, NULL, "detach", false);
8969 8970
            goto cleanup;
        }
8971
    }
8972

8973 8974 8975 8976
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_NETDEV) &&
        (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)) {
        if (qemuMonitorRemoveNetdev(priv->mon, hostnet_name) < 0) {
            qemuDomainObjExitMonitorWithDriver(driver, vm);
8977
            qemuDomainNetAudit(vm, detach, NULL, "detach", false);
8978 8979 8980 8981 8982
            goto cleanup;
        }
    } else {
        if (qemuMonitorRemoveHostNetwork(priv->mon, vlan, hostnet_name) < 0) {
            qemuDomainObjExitMonitorWithDriver(driver, vm);
8983
            qemuDomainNetAudit(vm, detach, NULL, "detach", false);
8984 8985
            goto cleanup;
        }
8986
    }
8987
    qemuDomainObjExitMonitorWithDriver(driver, vm);
8988

8989 8990
    qemuDomainNetAudit(vm, detach, NULL, "detach", true);

8991 8992 8993 8994
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        qemuDomainPCIAddressReleaseAddr(priv->pciaddrs, &detach->info) < 0)
        VIR_WARN0("Unable to release PCI address on NIC");

8995
    virDomainConfNWFilterTeardown(detach);
8996

8997
#if WITH_MACVTAP
8998
    if (detach->type == VIR_DOMAIN_NET_TYPE_DIRECT) {
8999
        delMacvtap(detach->ifname, detach->mac, detach->data.direct.linkdev,
9000
                   &detach->data.direct.virtPortProfile);
9001 9002
        VIR_FREE(detach->ifname);
    }
9003 9004
#endif

9005
    if ((driver->macFilter) && (detach->ifname != NULL)) {
9006
        if ((errno = networkDisallowMacOnPort(driver,
9007 9008
                                              detach->ifname,
                                              detach->mac))) {
9009
            virReportSystemError(errno,
9010 9011 9012 9013 9014
             _("failed to remove ebtables rule on  '%s'"),
                                 detach->ifname);
        }
    }

9015 9016 9017 9018 9019 9020 9021 9022 9023 9024
    if (vm->def->nnets > 1) {
        memmove(vm->def->nets + i,
                vm->def->nets + i + 1,
                sizeof(*vm->def->nets) *
                (vm->def->nnets - (i + 1)));
        vm->def->nnets--;
        if (VIR_REALLOC_N(vm->def->nets, vm->def->nnets) < 0) {
            /* ignore, harmless */
        }
    } else {
9025
        VIR_FREE(vm->def->nets);
9026
        vm->def->nnets = 0;
9027
    }
9028
    virDomainNetDefFree(detach);
9029

9030 9031 9032
    ret = 0;

cleanup:
9033
    VIR_FREE(hostnet_name);
9034 9035 9036
    return ret;
}

9037
static int qemudDomainDetachHostPciDevice(struct qemud_driver *driver,
9038
                                          virDomainObjPtr vm,
9039 9040
                                          virDomainDeviceDefPtr dev,
                                          unsigned long long qemuCmdFlags)
9041
{
9042
    virDomainHostdevDefPtr detach = NULL;
9043
    qemuDomainObjPrivatePtr priv = vm->privateData;
9044
    int i, ret;
9045
    pciDevice *pci;
9046 9047

    for (i = 0 ; i < vm->def->nhostdevs ; i++) {
9048 9049 9050 9051
        if (vm->def->hostdevs[i]->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS ||
            vm->def->hostdevs[i]->source.subsys.type != VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI)
            continue;

9052 9053 9054 9055 9056 9057 9058 9059 9060 9061 9062 9063 9064 9065 9066
        unsigned domain   = vm->def->hostdevs[i]->source.subsys.u.pci.domain;
        unsigned bus      = vm->def->hostdevs[i]->source.subsys.u.pci.bus;
        unsigned slot     = vm->def->hostdevs[i]->source.subsys.u.pci.slot;
        unsigned function = vm->def->hostdevs[i]->source.subsys.u.pci.function;

        if (dev->data.hostdev->source.subsys.u.pci.domain   == domain &&
            dev->data.hostdev->source.subsys.u.pci.bus      == bus &&
            dev->data.hostdev->source.subsys.u.pci.slot     == slot &&
            dev->data.hostdev->source.subsys.u.pci.function == function) {
            detach = vm->def->hostdevs[i];
            break;
        }
    }

    if (!detach) {
9067 9068 9069 9070 9071 9072
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        _("host pci device %.4x:%.2x:%.2x.%.1x not found"),
                        dev->data.hostdev->source.subsys.u.pci.domain,
                        dev->data.hostdev->source.subsys.u.pci.bus,
                        dev->data.hostdev->source.subsys.u.pci.slot,
                        dev->data.hostdev->source.subsys.u.pci.function);
9073 9074 9075
        return -1;
    }

9076 9077
    if (!virDomainDeviceAddressIsValid(&detach->info,
                                       VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI)) {
9078 9079
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("device cannot be detached without a PCI address"));
9080 9081 9082
        return -1;
    }

9083
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
9084 9085 9086 9087 9088 9089 9090 9091 9092 9093 9094
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (qemuMonitorDelDevice(priv->mon, detach->info.alias) < 0) {
            qemuDomainObjExitMonitor(vm);
            return -1;
        }
    } else {
        if (qemuMonitorRemovePCIDevice(priv->mon,
                                       &detach->info.addr.pci) < 0) {
            qemuDomainObjExitMonitorWithDriver(driver, vm);
            return -1;
        }
9095
    }
9096
    qemuDomainObjExitMonitorWithDriver(driver, vm);
9097 9098 9099

    ret = 0;

9100
    pci = pciGetDevice(detach->source.subsys.u.pci.domain,
9101 9102 9103 9104 9105 9106
                       detach->source.subsys.u.pci.bus,
                       detach->source.subsys.u.pci.slot,
                       detach->source.subsys.u.pci.function);
    if (!pci)
        ret = -1;
    else {
9107
        pciDeviceSetManaged(pci, detach->managed);
9108
        pciDeviceListDel(driver->activePciHostdevs, pci);
9109
        if (pciResetDevice(pci, driver->activePciHostdevs, NULL) < 0)
9110
            ret = -1;
9111
        qemudReattachPciDevice(pci, driver);
9112
        pciFreeDevice(pci);
9113 9114
    }

9115 9116
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        qemuDomainPCIAddressReleaseAddr(priv->pciaddrs, &detach->info) < 0)
9117
        VIR_WARN0("Unable to release PCI address on host device");
9118

9119 9120 9121 9122 9123 9124 9125 9126 9127 9128 9129 9130
    if (vm->def->nhostdevs > 1) {
        memmove(vm->def->hostdevs + i,
                vm->def->hostdevs + i + 1,
                sizeof(*vm->def->hostdevs) *
                (vm->def->nhostdevs - (i + 1)));
        vm->def->nhostdevs--;
        if (VIR_REALLOC_N(vm->def->hostdevs, vm->def->nhostdevs) < 0) {
            /* ignore, harmless */
        }
    } else {
        VIR_FREE(vm->def->hostdevs);
        vm->def->nhostdevs = 0;
9131
    }
9132
    virDomainHostdevDefFree(detach);
9133 9134 9135 9136

    return ret;
}

9137 9138 9139 9140 9141 9142 9143 9144 9145 9146 9147 9148 9149 9150 9151 9152
static int qemudDomainDetachHostUsbDevice(struct qemud_driver *driver,
                                          virDomainObjPtr vm,
                                          virDomainDeviceDefPtr dev,
                                          unsigned long long qemuCmdFlags)
{
    virDomainHostdevDefPtr detach = NULL;
    qemuDomainObjPrivatePtr priv = vm->privateData;
    int i, ret;

    for (i = 0 ; i < vm->def->nhostdevs ; i++) {
        if (vm->def->hostdevs[i]->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS ||
            vm->def->hostdevs[i]->source.subsys.type != VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB)
            continue;

        unsigned bus = vm->def->hostdevs[i]->source.subsys.u.usb.bus;
        unsigned device = vm->def->hostdevs[i]->source.subsys.u.usb.device;
9153 9154 9155 9156 9157 9158 9159 9160 9161 9162 9163 9164 9165 9166 9167 9168
        unsigned product = vm->def->hostdevs[i]->source.subsys.u.usb.product;
        unsigned vendor = vm->def->hostdevs[i]->source.subsys.u.usb.vendor;

        if (dev->data.hostdev->source.subsys.u.usb.bus &&
            dev->data.hostdev->source.subsys.u.usb.device) {
            if (dev->data.hostdev->source.subsys.u.usb.bus == bus &&
                dev->data.hostdev->source.subsys.u.usb.device == device) {
                detach = vm->def->hostdevs[i];
                break;
            }
        } else {
            if (dev->data.hostdev->source.subsys.u.usb.product == product &&
                dev->data.hostdev->source.subsys.u.usb.vendor == vendor) {
                detach = vm->def->hostdevs[i];
                break;
            }
9169 9170 9171 9172 9173 9174 9175 9176 9177 9178 9179 9180 9181 9182 9183 9184 9185 9186 9187 9188 9189 9190 9191 9192 9193 9194 9195 9196 9197 9198 9199 9200 9201 9202 9203 9204 9205 9206 9207 9208 9209 9210 9211 9212 9213 9214 9215 9216 9217 9218
        }
    }

    if (!detach) {
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        _("host usb device %03d.%03d not found"),
                        dev->data.hostdev->source.subsys.u.usb.bus,
                        dev->data.hostdev->source.subsys.u.usb.device);
        return -1;
    }

    if (!detach->info.alias) {
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("device cannot be detached without a device alias"));
        return -1;
    }

    if (!(qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)) {
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("device cannot be detached with this QEMU version"));
        return -1;
    }

    qemuDomainObjEnterMonitorWithDriver(driver, vm);
    if (qemuMonitorDelDevice(priv->mon, detach->info.alias) < 0) {
        qemuDomainObjExitMonitorWithDriver(driver, vm);
        return -1;
    }
    qemuDomainObjExitMonitorWithDriver(driver, vm);

    ret = 0;

    if (vm->def->nhostdevs > 1) {
        memmove(vm->def->hostdevs + i,
                vm->def->hostdevs + i + 1,
                sizeof(*vm->def->hostdevs) *
                (vm->def->nhostdevs - (i + 1)));
        vm->def->nhostdevs--;
        if (VIR_REALLOC_N(vm->def->hostdevs, vm->def->nhostdevs) < 0) {
            /* ignore, harmless */
        }
    } else {
        VIR_FREE(vm->def->hostdevs);
        vm->def->nhostdevs = 0;
    }
    virDomainHostdevDefFree(detach);

    return ret;
}

9219
static int qemudDomainDetachHostDevice(struct qemud_driver *driver,
9220
                                       virDomainObjPtr vm,
9221 9222
                                       virDomainDeviceDefPtr dev,
                                       unsigned long long qemuCmdFlags)
9223 9224 9225 9226 9227
{
    virDomainHostdevDefPtr hostdev = dev->data.hostdev;
    int ret;

    if (hostdev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS) {
9228
        qemuReportError(VIR_ERR_CONFIG_UNSUPPORTED,
9229 9230
                        _("hostdev mode '%s' not supported"),
                        virDomainHostdevModeTypeToString(hostdev->mode));
9231 9232 9233 9234 9235
        return -1;
    }

    switch (hostdev->source.subsys.type) {
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI:
9236
        ret = qemudDomainDetachHostPciDevice(driver, vm, dev, qemuCmdFlags);
9237
        break;
9238 9239 9240
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB:
        ret = qemudDomainDetachHostUsbDevice(driver, vm, dev, qemuCmdFlags);
        break;
9241
    default:
9242
        qemuReportError(VIR_ERR_CONFIG_UNSUPPORTED,
9243 9244
                        _("hostdev subsys type '%s' not supported"),
                        virDomainHostdevSubsysTypeToString(hostdev->source.subsys.type));
9245 9246 9247
        return -1;
    }

9248
    if (driver->securityDriver &&
9249
        driver->securityDriver->domainRestoreSecurityHostdevLabel &&
9250 9251
        driver->securityDriver->domainRestoreSecurityHostdevLabel(driver->securityDriver,
                                                                  vm, dev->data.hostdev) < 0)
9252
        VIR_WARN0("Failed to restore host device labelling");
9253

9254 9255 9256
    return ret;
}

9257 9258
static int qemudDomainDetachDevice(virDomainPtr dom,
                                   const char *xml) {
9259 9260
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
9261
    unsigned long long qemuCmdFlags;
9262 9263
    virDomainDeviceDefPtr dev = NULL;
    int ret = -1;
9264

9265
    qemuDriverLock(driver);
9266
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
9267
    if (!vm) {
9268 9269
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
9270 9271
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
9272
        goto cleanup;
9273 9274
    }

9275 9276 9277
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
9278
    if (!virDomainObjIsActive(vm)) {
9279 9280
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("cannot detach device on inactive domain"));
9281
        goto endjob;
9282 9283
    }

9284
    dev = virDomainDeviceDefParse(driver->caps, vm->def, xml,
9285
                                  VIR_DOMAIN_XML_INACTIVE);
9286
    if (dev == NULL)
9287
        goto endjob;
9288

9289 9290 9291
    if (qemuCapsExtractVersionInfo(vm->def->emulator,
                                   NULL,
                                   &qemuCmdFlags) < 0)
9292
        goto endjob;
9293 9294

    if (dev->type == VIR_DOMAIN_DEVICE_DISK &&
9295 9296 9297 9298 9299 9300 9301 9302 9303
        dev->data.disk->device == VIR_DOMAIN_DISK_DEVICE_DISK) {
        if (dev->data.disk->bus == VIR_DOMAIN_DISK_BUS_VIRTIO) {
            ret = qemudDomainDetachPciDiskDevice(driver, vm, dev, qemuCmdFlags);
        }
        else if (dev->data.disk->bus == VIR_DOMAIN_DISK_BUS_SCSI) {
            ret = qemudDomainDetachSCSIDiskDevice(driver, vm, dev,
                                                  qemuCmdFlags);
        }
        else {
9304
            qemuReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
9305 9306
                            _("This type of disk cannot be hot unplugged"));
        }
9307
    } else if (dev->type == VIR_DOMAIN_DEVICE_NET) {
9308
        ret = qemudDomainDetachNetDevice(driver, vm, dev, qemuCmdFlags);
9309 9310
    } else if (dev->type == VIR_DOMAIN_DEVICE_CONTROLLER) {
        if (dev->data.controller->type == VIR_DOMAIN_CONTROLLER_TYPE_SCSI) {
9311 9312
            ret = qemudDomainDetachPciControllerDevice(driver, vm, dev,
                                                       qemuCmdFlags);
9313
        } else {
9314
            qemuReportError(VIR_ERR_CONFIG_UNSUPPORTED,
9315 9316
                            _("disk controller bus '%s' cannot be hotunplugged."),
                            virDomainControllerTypeToString(dev->data.controller->type));
9317 9318
            /* fallthrough */
        }
9319
    } else if (dev->type == VIR_DOMAIN_DEVICE_HOSTDEV) {
9320
        ret = qemudDomainDetachHostDevice(driver, vm, dev, qemuCmdFlags);
9321
    } else {
9322
        qemuReportError(VIR_ERR_CONFIG_UNSUPPORTED,
9323
                        "%s", _("This type of device cannot be hot unplugged"));
9324
    }
9325

9326
    if (!ret && virDomainSaveStatus(driver->caps, driver->stateDir, vm) < 0)
9327 9328
        ret = -1;

9329
endjob:
9330 9331
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
9332

9333 9334
cleanup:
    virDomainDeviceDefFree(dev);
9335 9336
    if (vm)
        virDomainObjUnlock(vm);
9337
    qemuDriverUnlock(driver);
9338 9339 9340
    return ret;
}

9341 9342 9343 9344
static int qemudDomainDetachDeviceFlags(virDomainPtr dom,
                                        const char *xml,
                                        unsigned int flags) {
    if (flags & VIR_DOMAIN_DEVICE_MODIFY_CONFIG) {
9345 9346
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("cannot modify the persistent configuration of a domain"));
9347 9348 9349 9350 9351 9352
        return -1;
    }

    return qemudDomainDetachDevice(dom, xml);
}

9353
static int qemudDomainGetAutostart(virDomainPtr dom,
9354
                                   int *autostart) {
9355 9356 9357
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
9358

9359
    qemuDriverLock(driver);
9360
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
9361 9362
    qemuDriverUnlock(driver);

9363
    if (!vm) {
9364 9365
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
9366 9367
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
9368
        goto cleanup;
9369 9370 9371
    }

    *autostart = vm->autostart;
9372
    ret = 0;
9373

9374
cleanup:
9375 9376
    if (vm)
        virDomainObjUnlock(vm);
9377
    return ret;
9378 9379
}

9380
static int qemudDomainSetAutostart(virDomainPtr dom,
9381
                                   int autostart) {
9382 9383
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
9384 9385
    char *configFile = NULL, *autostartLink = NULL;
    int ret = -1;
9386

9387
    qemuDriverLock(driver);
9388
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
9389

9390
    if (!vm) {
9391 9392
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
9393 9394
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
9395
        goto cleanup;
9396 9397
    }

9398
    if (!vm->persistent) {
9399 9400
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("cannot set autostart for transient domain"));
9401
        goto cleanup;
9402 9403
    }

9404 9405
    autostart = (autostart != 0);

9406
    if (vm->autostart != autostart) {
9407
        if ((configFile = virDomainConfigFile(driver->configDir, vm->def->name)) == NULL)
9408
            goto cleanup;
9409
        if ((autostartLink = virDomainConfigFile(driver->autostartDir, vm->def->name)) == NULL)
9410
            goto cleanup;
9411

9412 9413
        if (autostart) {
            int err;
9414

9415
            if ((err = virFileMakePath(driver->autostartDir))) {
9416
                virReportSystemError(err,
9417 9418
                                     _("cannot create autostart directory %s"),
                                     driver->autostartDir);
9419 9420
                goto cleanup;
            }
9421

9422
            if (symlink(configFile, autostartLink) < 0) {
9423
                virReportSystemError(errno,
9424 9425
                                     _("Failed to create symlink '%s to '%s'"),
                                     autostartLink, configFile);
9426 9427 9428 9429
                goto cleanup;
            }
        } else {
            if (unlink(autostartLink) < 0 && errno != ENOENT && errno != ENOTDIR) {
9430
                virReportSystemError(errno,
9431 9432
                                     _("Failed to delete symlink '%s'"),
                                     autostartLink);
9433 9434
                goto cleanup;
            }
9435 9436
        }

9437
        vm->autostart = autostart;
9438
    }
9439
    ret = 0;
9440

9441 9442 9443
cleanup:
    VIR_FREE(configFile);
    VIR_FREE(autostartLink);
9444 9445
    if (vm)
        virDomainObjUnlock(vm);
9446
    qemuDriverUnlock(driver);
9447
    return ret;
9448 9449
}

9450 9451 9452 9453 9454

static char *qemuGetSchedulerType(virDomainPtr dom,
                                  int *nparams)
{
    struct qemud_driver *driver = dom->conn->privateData;
9455
    char *ret = NULL;
9456

9457
    qemuDriverLock(driver);
9458
    if (!qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_CPU)) {
9459 9460
        qemuReportError(VIR_ERR_NO_SUPPORT,
                        __FUNCTION__);
9461
        goto cleanup;
9462 9463 9464 9465 9466 9467 9468
    }

    if (nparams)
        *nparams = 1;

    ret = strdup("posix");
    if (!ret)
9469
        virReportOOMError();
9470 9471 9472

cleanup:
    qemuDriverUnlock(driver);
9473 9474 9475
    return ret;
}

9476 9477 9478 9479 9480 9481 9482 9483 9484 9485 9486 9487 9488 9489 9490 9491 9492 9493 9494 9495 9496 9497 9498 9499 9500 9501 9502 9503 9504 9505 9506 9507 9508 9509 9510 9511 9512 9513 9514 9515 9516 9517 9518 9519 9520 9521 9522 9523 9524 9525 9526 9527 9528 9529 9530 9531 9532 9533 9534 9535 9536 9537 9538 9539 9540 9541 9542

static int qemuDomainSetMemoryParameters(virDomainPtr dom,
                                         virMemoryParameterPtr params,
                                         int nparams,
                                         unsigned int flags ATTRIBUTE_UNUSED)
{
    struct qemud_driver *driver = dom->conn->privateData;
    int i;
    virCgroupPtr group = NULL;
    virDomainObjPtr vm = NULL;
    int ret = -1;

    qemuDriverLock(driver);
    if (!qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_MEMORY)) {
        qemuReportError(VIR_ERR_NO_SUPPORT,
                        __FUNCTION__);
        goto cleanup;
    }

    vm = virDomainFindByUUID(&driver->domains, dom->uuid);

    if (vm == NULL) {
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("No such domain %s"), dom->uuid);
        goto cleanup;
    }

    if (virCgroupForDomain(driver->cgroup, vm->def->name, &group, 0) != 0) {
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("cannot find cgroup for domain %s"), vm->def->name);
        goto cleanup;
    }

    ret = 0;
    for (i = 0; i < nparams; i++) {
        virMemoryParameterPtr param = &params[i];

        if (STREQ(param->field, VIR_DOMAIN_MEMORY_HARD_LIMIT)) {
            int rc;
            if (param->type != VIR_DOMAIN_MEMORY_PARAM_ULLONG) {
                qemuReportError(VIR_ERR_INVALID_ARG, "%s",
                                _("invalid type for memory hard_limit tunable, expected a 'ullong'"));
                ret = -1;
                continue;
            }

            rc = virCgroupSetMemoryHardLimit(group, params[i].value.ul);
            if (rc != 0) {
                virReportSystemError(-rc, "%s",
                                     _("unable to set memory hard_limit tunable"));
                ret = -1;
            }
        } else if (STREQ(param->field, VIR_DOMAIN_MEMORY_SOFT_LIMIT)) {
            int rc;
            if (param->type != VIR_DOMAIN_MEMORY_PARAM_ULLONG) {
                qemuReportError(VIR_ERR_INVALID_ARG, "%s",
                                _("invalid type for memory soft_limit tunable, expected a 'ullong'"));
                ret = -1;
                continue;
            }

            rc = virCgroupSetMemorySoftLimit(group, params[i].value.ul);
            if (rc != 0) {
                virReportSystemError(-rc, "%s",
                                     _("unable to set memory soft_limit tunable"));
                ret = -1;
            }
9543
        } else if (STREQ(param->field, VIR_DOMAIN_MEMORY_SWAP_HARD_LIMIT)) {
9544 9545 9546 9547 9548 9549 9550 9551 9552 9553 9554 9555 9556 9557 9558 9559 9560 9561 9562 9563 9564 9565 9566 9567 9568 9569 9570 9571 9572 9573 9574 9575 9576
            int rc;
            if (param->type != VIR_DOMAIN_MEMORY_PARAM_ULLONG) {
                qemuReportError(VIR_ERR_INVALID_ARG, "%s",
                                _("invalid type for swap_hard_limit tunable, expected a 'ullong'"));
                ret = -1;
                continue;
            }

            rc = virCgroupSetSwapHardLimit(group, params[i].value.ul);
            if (rc != 0) {
                virReportSystemError(-rc, "%s",
                                     _("unable to set swap_hard_limit tunable"));
                ret = -1;
            }
        } else if (STREQ(param->field, VIR_DOMAIN_MEMORY_MIN_GUARANTEE)) {
            qemuReportError(VIR_ERR_INVALID_ARG,
                            _("Memory tunable `%s' not implemented"), param->field);
            ret = -1;
        } else {
            qemuReportError(VIR_ERR_INVALID_ARG,
                            _("Parameter `%s' not supported"), param->field);
            ret = -1;
        }
    }

cleanup:
    virCgroupFree(&group);
    if (vm)
        virDomainObjUnlock(vm);
    qemuDriverUnlock(driver);
    return ret;
}

9577 9578 9579 9580 9581 9582 9583 9584 9585 9586 9587 9588 9589 9590 9591 9592 9593 9594 9595 9596 9597 9598 9599 9600 9601 9602 9603 9604 9605 9606 9607 9608 9609 9610 9611 9612 9613 9614 9615 9616 9617 9618 9619 9620 9621 9622 9623 9624 9625 9626 9627 9628 9629 9630 9631 9632 9633 9634 9635 9636
static int qemuDomainGetMemoryParameters(virDomainPtr dom,
                                         virMemoryParameterPtr params,
                                         int *nparams,
                                         unsigned int flags ATTRIBUTE_UNUSED)
{
    struct qemud_driver *driver = dom->conn->privateData;
    int i;
    virCgroupPtr group = NULL;
    virDomainObjPtr vm = NULL;
    unsigned long val;
    int ret = -1;
    int rc;

    qemuDriverLock(driver);

    if (!qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_MEMORY)) {
        qemuReportError(VIR_ERR_NO_SUPPORT,
                        __FUNCTION__);
        goto cleanup;
    }

    vm = virDomainFindByUUID(&driver->domains, dom->uuid);

    if (vm == NULL) {
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("No such domain %s"), dom->uuid);
        goto cleanup;
    }

    if ((*nparams) == 0) {
        /* Current number of memory parameters supported by cgroups */
        *nparams = QEMU_NB_MEM_PARAM;
        ret = 0;
        goto cleanup;
    }

    if ((*nparams) != QEMU_NB_MEM_PARAM) {
        qemuReportError(VIR_ERR_INVALID_ARG,
                        "%s", _("Invalid parameter count"));
        goto cleanup;
    }

    if (virCgroupForDomain(driver->cgroup, vm->def->name, &group, 0) != 0) {
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("cannot find cgroup for domain %s"), vm->def->name);
        goto cleanup;
    }

    for (i = 0; i < *nparams; i++) {
        virMemoryParameterPtr param = &params[i];
        val = 0;
        param->value.ul = 0;
        param->type = VIR_DOMAIN_MEMORY_PARAM_ULLONG;

        switch(i) {
        case 0: /* fill memory hard limit here */
            rc = virCgroupGetMemoryHardLimit(group, &val);
            if (rc != 0) {
                virReportSystemError(-rc, "%s",
                                     _("unable to get memory hard limit"));
9637
                goto cleanup;
9638 9639 9640 9641
            }
            if (virStrcpyStatic(param->field, VIR_DOMAIN_MEMORY_HARD_LIMIT) == NULL) {
                qemuReportError(VIR_ERR_INTERNAL_ERROR,
                                "%s", _("Field memory hard limit too long for destination"));
9642
                goto cleanup;
9643 9644 9645 9646 9647 9648 9649 9650 9651
            }
            param->value.ul = val;
            break;

        case 1: /* fill memory soft limit here */
            rc = virCgroupGetMemorySoftLimit(group, &val);
            if (rc != 0) {
                virReportSystemError(-rc, "%s",
                                     _("unable to get memory soft limit"));
9652
                goto cleanup;
9653 9654 9655 9656
            }
            if (virStrcpyStatic(param->field, VIR_DOMAIN_MEMORY_SOFT_LIMIT) == NULL) {
                qemuReportError(VIR_ERR_INTERNAL_ERROR,
                                "%s", _("Field memory soft limit too long for destination"));
9657
                goto cleanup;
9658 9659 9660 9661 9662 9663 9664 9665 9666
            }
            param->value.ul = val;
            break;

        case 2: /* fill swap hard limit here */
            rc = virCgroupGetSwapHardLimit(group, &val);
            if (rc != 0) {
                virReportSystemError(-rc, "%s",
                                     _("unable to get swap hard limit"));
9667
                goto cleanup;
9668
            }
9669
            if (virStrcpyStatic(param->field, VIR_DOMAIN_MEMORY_SWAP_HARD_LIMIT) == NULL) {
9670 9671
                qemuReportError(VIR_ERR_INTERNAL_ERROR,
                                "%s", _("Field swap hard limit too long for destination"));
9672
                goto cleanup;
9673 9674 9675 9676 9677 9678 9679 9680 9681 9682
            }
            param->value.ul = val;
            break;

        default:
            break;
            /* should not hit here */
        }
    }

9683 9684
    ret = 0;

9685 9686 9687 9688 9689 9690 9691 9692 9693
cleanup:
    if (group)
        virCgroupFree(&group);
    if (vm)
        virDomainObjUnlock(vm);
    qemuDriverUnlock(driver);
    return ret;
}

9694 9695 9696 9697 9698 9699 9700 9701 9702 9703
static int qemuSetSchedulerParameters(virDomainPtr dom,
                                      virSchedParameterPtr params,
                                      int nparams)
{
    struct qemud_driver *driver = dom->conn->privateData;
    int i;
    virCgroupPtr group = NULL;
    virDomainObjPtr vm = NULL;
    int ret = -1;

9704
    qemuDriverLock(driver);
9705
    if (!qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_CPU)) {
9706 9707
        qemuReportError(VIR_ERR_NO_SUPPORT,
                        __FUNCTION__);
9708
        goto cleanup;
9709 9710 9711 9712 9713
    }

    vm = virDomainFindByUUID(&driver->domains, dom->uuid);

    if (vm == NULL) {
9714 9715
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("No such domain %s"), dom->uuid);
9716 9717 9718 9719
        goto cleanup;
    }

    if (virCgroupForDomain(driver->cgroup, vm->def->name, &group, 0) != 0) {
9720 9721
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("cannot find cgroup for domain %s"), vm->def->name);
9722 9723 9724 9725 9726 9727 9728 9729 9730
        goto cleanup;
    }

    for (i = 0; i < nparams; i++) {
        virSchedParameterPtr param = &params[i];

        if (STREQ(param->field, "cpu_shares")) {
            int rc;
            if (param->type != VIR_DOMAIN_SCHED_FIELD_ULLONG) {
9731 9732
                qemuReportError(VIR_ERR_INVALID_ARG, "%s",
                                _("invalid type for cpu_shares tunable, expected a 'ullong'"));
9733 9734 9735 9736 9737
                goto cleanup;
            }

            rc = virCgroupSetCpuShares(group, params[i].value.ul);
            if (rc != 0) {
9738
                virReportSystemError(-rc, "%s",
9739 9740 9741 9742
                                     _("unable to set cpu shares tunable"));
                goto cleanup;
            }
        } else {
9743 9744
            qemuReportError(VIR_ERR_INVALID_ARG,
                            _("Invalid parameter `%s'"), param->field);
9745 9746 9747 9748 9749 9750 9751 9752 9753
            goto cleanup;
        }
    }
    ret = 0;

cleanup:
    virCgroupFree(&group);
    if (vm)
        virDomainObjUnlock(vm);
9754
    qemuDriverUnlock(driver);
9755 9756 9757 9758 9759 9760 9761 9762 9763 9764 9765 9766 9767 9768
    return ret;
}

static int qemuGetSchedulerParameters(virDomainPtr dom,
                                      virSchedParameterPtr params,
                                      int *nparams)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virCgroupPtr group = NULL;
    virDomainObjPtr vm = NULL;
    unsigned long long val;
    int ret = -1;
    int rc;

9769
    qemuDriverLock(driver);
9770
    if (!qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_CPU)) {
9771 9772
        qemuReportError(VIR_ERR_NO_SUPPORT,
                        __FUNCTION__);
9773
        goto cleanup;
9774 9775 9776
    }

    if ((*nparams) != 1) {
9777 9778
        qemuReportError(VIR_ERR_INVALID_ARG,
                        "%s", _("Invalid parameter count"));
9779
        goto cleanup;
9780 9781 9782 9783 9784
    }

    vm = virDomainFindByUUID(&driver->domains, dom->uuid);

    if (vm == NULL) {
9785 9786
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("No such domain %s"), dom->uuid);
9787 9788 9789 9790
        goto cleanup;
    }

    if (virCgroupForDomain(driver->cgroup, vm->def->name, &group, 0) != 0) {
9791 9792
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("cannot find cgroup for domain %s"), vm->def->name);
9793 9794 9795 9796 9797
        goto cleanup;
    }

    rc = virCgroupGetCpuShares(group, &val);
    if (rc != 0) {
9798
        virReportSystemError(-rc, "%s",
9799 9800 9801 9802 9803
                             _("unable to get cpu shares tunable"));
        goto cleanup;
    }
    params[0].value.ul = val;
    params[0].type = VIR_DOMAIN_SCHED_FIELD_ULLONG;
C
Chris Lalancette 已提交
9804
    if (virStrcpyStatic(params[0].field, "cpu_shares") == NULL) {
9805 9806
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("Field cpu_shares too long for destination"));
C
Chris Lalancette 已提交
9807 9808
        goto cleanup;
    }
9809 9810 9811 9812 9813 9814 9815

    ret = 0;

cleanup:
    virCgroupFree(&group);
    if (vm)
        virDomainObjUnlock(vm);
9816
    qemuDriverUnlock(driver);
9817 9818 9819 9820
    return ret;
}


9821 9822 9823 9824 9825 9826 9827 9828 9829
/* This uses the 'info blockstats' monitor command which was
 * integrated into both qemu & kvm in late 2007.  If the command is
 * not supported we detect this and return the appropriate error.
 */
static int
qemudDomainBlockStats (virDomainPtr dom,
                       const char *path,
                       struct _virDomainBlockStats *stats)
{
9830
    struct qemud_driver *driver = dom->conn->privateData;
9831
    int i, ret = -1;
9832
    virDomainObjPtr vm;
9833
    virDomainDiskDefPtr disk = NULL;
9834

9835
    qemuDriverLock(driver);
9836
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
9837
    qemuDriverUnlock(driver);
9838
    if (!vm) {
9839 9840
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
9841 9842
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
9843
        goto cleanup;
9844
    }
9845 9846 9847 9848

    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
9849
    if (!virDomainObjIsActive (vm)) {
9850 9851
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
9852
        goto endjob;
9853 9854
    }

9855 9856 9857 9858 9859 9860 9861 9862
    for (i = 0 ; i < vm->def->ndisks ; i++) {
        if (STREQ(path, vm->def->disks[i]->dst)) {
            disk = vm->def->disks[i];
            break;
        }
    }

    if (!disk) {
9863 9864
        qemuReportError(VIR_ERR_INVALID_ARG,
                        _("invalid path: %s"), path);
9865
        goto endjob;
9866 9867
    }

9868
    if (!disk->info.alias) {
9869 9870
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("missing disk device alias name for %s"), disk->dst);
9871
        goto endjob;
9872
    }
9873

9874
    qemuDomainObjPrivatePtr priv = vm->privateData;
9875 9876
    qemuDomainObjEnterMonitor(vm);
    ret = qemuMonitorGetBlockStatsInfo(priv->mon,
9877
                                       disk->info.alias,
9878 9879 9880 9881 9882 9883
                                       &stats->rd_req,
                                       &stats->rd_bytes,
                                       &stats->wr_req,
                                       &stats->wr_bytes,
                                       &stats->errs);
    qemuDomainObjExitMonitor(vm);
9884

9885
endjob:
9886 9887
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
9888

9889
cleanup:
9890 9891
    if (vm)
        virDomainObjUnlock(vm);
9892
    return ret;
9893 9894
}

9895
#ifdef __linux__
9896 9897 9898 9899 9900
static int
qemudDomainInterfaceStats (virDomainPtr dom,
                           const char *path,
                           struct _virDomainInterfaceStats *stats)
{
9901 9902
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
9903
    int i;
9904
    int ret = -1;
9905

9906
    qemuDriverLock(driver);
9907
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
9908 9909
    qemuDriverUnlock(driver);

9910
    if (!vm) {
9911 9912
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
9913 9914
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
9915
        goto cleanup;
9916 9917
    }

D
Daniel P. Berrange 已提交
9918
    if (!virDomainObjIsActive(vm)) {
9919 9920
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
9921
        goto cleanup;
9922 9923 9924
    }

    /* Check the path is one of the domain's network interfaces. */
9925 9926
    for (i = 0 ; i < vm->def->nnets ; i++) {
        if (vm->def->nets[i]->ifname &&
9927 9928 9929 9930
            STREQ (vm->def->nets[i]->ifname, path)) {
            ret = 0;
            break;
        }
9931 9932
    }

9933
    if (ret == 0)
9934
        ret = linuxDomainInterfaceStats(path, stats);
9935
    else
9936 9937
        qemuReportError(VIR_ERR_INVALID_ARG,
                        _("invalid path, '%s' is not a known interface"), path);
9938

9939
cleanup:
9940 9941
    if (vm)
        virDomainObjUnlock(vm);
9942 9943
    return ret;
}
9944
#else
9945 9946 9947 9948
static int
qemudDomainInterfaceStats (virDomainPtr dom,
                           const char *path ATTRIBUTE_UNUSED,
                           struct _virDomainInterfaceStats *stats ATTRIBUTE_UNUSED)
9949 9950
    qemuReportError(VIR_ERR_NO_SUPPORT,
                    "%s", __FUNCTION__);
9951 9952
    return -1;
}
9953
#endif
9954

9955 9956 9957 9958 9959 9960 9961 9962 9963 9964 9965 9966 9967 9968 9969 9970
static int
qemudDomainMemoryStats (virDomainPtr dom,
                        struct _virDomainMemoryStat *stats,
                        unsigned int nr_stats)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    unsigned int ret = -1;

    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
    qemuDriverUnlock(driver);

    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
9971 9972
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
9973 9974 9975
        goto cleanup;
    }

9976 9977 9978
    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

9979 9980 9981
    if (virDomainObjIsActive(vm)) {
        qemuDomainObjPrivatePtr priv = vm->privateData;
        qemuDomainObjEnterMonitor(vm);
9982
        ret = qemuMonitorGetMemoryStats(priv->mon, stats, nr_stats);
9983 9984
        qemuDomainObjExitMonitor(vm);
    } else {
9985 9986
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
9987 9988
    }

9989 9990 9991
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;

9992 9993 9994 9995 9996 9997
cleanup:
    if (vm)
        virDomainObjUnlock(vm);
    return ret;
}

9998 9999 10000 10001 10002 10003 10004
static int
qemudDomainBlockPeek (virDomainPtr dom,
                      const char *path,
                      unsigned long long offset, size_t size,
                      void *buffer,
                      unsigned int flags ATTRIBUTE_UNUSED)
{
10005 10006 10007
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int fd = -1, ret = -1, i;
10008

10009
    qemuDriverLock(driver);
10010
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
10011 10012
    qemuDriverUnlock(driver);

10013
    if (!vm) {
10014 10015
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
10016 10017
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
10018
        goto cleanup;
10019 10020 10021
    }

    if (!path || path[0] == '\0') {
10022 10023
        qemuReportError(VIR_ERR_INVALID_ARG,
                        "%s", _("NULL or empty path"));
10024
        goto cleanup;
10025 10026 10027
    }

    /* Check the path belongs to this domain. */
10028 10029
    for (i = 0 ; i < vm->def->ndisks ; i++) {
        if (vm->def->disks[i]->src != NULL &&
10030 10031 10032 10033
            STREQ (vm->def->disks[i]->src, path)) {
            ret = 0;
            break;
        }
10034 10035
    }

10036 10037 10038 10039 10040
    if (ret == 0) {
        ret = -1;
        /* The path is correct, now try to open it and get its size. */
        fd = open (path, O_RDONLY);
        if (fd == -1) {
10041 10042
            virReportSystemError(errno,
                                 _("%s: failed to open"), path);
10043 10044
            goto cleanup;
        }
10045

10046 10047 10048 10049 10050 10051
        /* Seek and read. */
        /* NB. Because we configure with AC_SYS_LARGEFILE, off_t should
         * be 64 bits on all platforms.
         */
        if (lseek (fd, offset, SEEK_SET) == (off_t) -1 ||
            saferead (fd, buffer, size) == (ssize_t) -1) {
10052 10053
            virReportSystemError(errno,
                                 _("%s: failed to seek or read"), path);
10054 10055 10056 10057 10058
            goto cleanup;
        }

        ret = 0;
    } else {
10059 10060
        qemuReportError(VIR_ERR_INVALID_ARG,
                        "%s", _("invalid path"));
10061 10062
    }

10063
cleanup:
10064
    VIR_FORCE_CLOSE(fd);
10065 10066
    if (vm)
        virDomainObjUnlock(vm);
10067 10068 10069
    return ret;
}

R
Richard W.M. Jones 已提交
10070 10071 10072 10073 10074 10075
static int
qemudDomainMemoryPeek (virDomainPtr dom,
                       unsigned long long offset, size_t size,
                       void *buffer,
                       unsigned int flags)
{
10076 10077
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
10078
    char *tmp = NULL;
R
Richard W.M. Jones 已提交
10079 10080
    int fd = -1, ret = -1;

10081
    qemuDriverLock(driver);
10082
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
10083
    qemuDriverUnlock(driver);
R
Richard W.M. Jones 已提交
10084 10085

    if (!vm) {
10086 10087
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
10088 10089
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
10090 10091 10092
        goto cleanup;
    }

10093
    if (flags != VIR_MEMORY_VIRTUAL && flags != VIR_MEMORY_PHYSICAL) {
10094 10095
        qemuReportError(VIR_ERR_INVALID_ARG,
                        "%s", _("flags parameter must be VIR_MEMORY_VIRTUAL or VIR_MEMORY_PHYSICAL"));
10096
        goto cleanup;
R
Richard W.M. Jones 已提交
10097 10098
    }

10099 10100 10101
    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
10102
    if (!virDomainObjIsActive(vm)) {
10103 10104
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
10105
        goto endjob;
R
Richard W.M. Jones 已提交
10106 10107
    }

10108
    if (virAsprintf(&tmp, "%s/qemu.mem.XXXXXX", driver->cacheDir) < 0) {
10109
        virReportOOMError();
10110
        goto endjob;
10111 10112
    }

R
Richard W.M. Jones 已提交
10113 10114
    /* Create a temporary filename. */
    if ((fd = mkstemp (tmp)) == -1) {
10115 10116
        virReportSystemError(errno,
                             _("mkstemp(\"%s\") failed"), tmp);
10117
        goto endjob;
R
Richard W.M. Jones 已提交
10118 10119
    }

10120
    qemuDomainObjPrivatePtr priv = vm->privateData;
10121
    qemuDomainObjEnterMonitor(vm);
10122
    if (flags == VIR_MEMORY_VIRTUAL) {
10123 10124
        if (qemuMonitorSaveVirtualMemory(priv->mon, offset, size, tmp) < 0) {
            qemuDomainObjExitMonitor(vm);
10125
            goto endjob;
10126
        }
10127
    } else {
10128 10129
        if (qemuMonitorSavePhysicalMemory(priv->mon, offset, size, tmp) < 0) {
            qemuDomainObjExitMonitor(vm);
10130
            goto endjob;
10131
        }
R
Richard W.M. Jones 已提交
10132
    }
10133
    qemuDomainObjExitMonitor(vm);
R
Richard W.M. Jones 已提交
10134 10135 10136

    /* Read the memory file into buffer. */
    if (saferead (fd, buffer, size) == (ssize_t) -1) {
10137 10138 10139
        virReportSystemError(errno,
                             _("failed to read temporary file "
                               "created with template %s"), tmp);
10140
        goto endjob;
R
Richard W.M. Jones 已提交
10141 10142 10143
    }

    ret = 0;
10144

10145
endjob:
10146 10147
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
10148

10149
cleanup:
10150
    VIR_FREE(tmp);
10151
    VIR_FORCE_CLOSE(fd);
R
Richard W.M. Jones 已提交
10152
    unlink (tmp);
10153 10154
    if (vm)
        virDomainObjUnlock(vm);
R
Richard W.M. Jones 已提交
10155 10156 10157
    return ret;
}

10158

10159 10160 10161 10162 10163 10164 10165 10166 10167 10168
static int qemuDomainGetBlockInfo(virDomainPtr dom,
                                  const char *path,
                                  virDomainBlockInfoPtr info,
                                  unsigned int flags) {
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
    int fd = -1;
    off_t end;
    virStorageFileMetadata meta;
10169
    virDomainDiskDefPtr disk = NULL;
10170 10171
    struct stat sb;
    int i;
10172
    int format;
10173 10174 10175 10176 10177 10178 10179 10180 10181 10182 10183 10184 10185 10186 10187 10188 10189 10190 10191 10192 10193 10194 10195 10196

    virCheckFlags(0, -1);

    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
    qemuDriverUnlock(driver);
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    if (!path || path[0] == '\0') {
        qemuReportError(VIR_ERR_INVALID_ARG,
                        "%s", _("NULL or empty path"));
        goto cleanup;
    }

    /* Check the path belongs to this domain. */
    for (i = 0 ; i < vm->def->ndisks ; i++) {
        if (vm->def->disks[i]->src != NULL &&
            STREQ (vm->def->disks[i]->src, path)) {
10197
            disk = vm->def->disks[i];
10198 10199 10200 10201
            break;
        }
    }

10202
    if (!disk) {
10203 10204 10205 10206 10207 10208 10209 10210 10211 10212 10213 10214 10215 10216
        qemuReportError(VIR_ERR_INVALID_ARG,
                        _("invalid path %s not assigned to domain"), path);
        goto cleanup;
    }

    /* The path is correct, now try to open it and get its size. */
    fd = open (path, O_RDONLY);
    if (fd == -1) {
        virReportSystemError(errno,
                             _("failed to open path '%s'"), path);
        goto cleanup;
    }

    /* Probe for magic formats */
10217 10218 10219 10220 10221 10222 10223 10224
    if (disk->driverType) {
        if ((format = virStorageFileFormatTypeFromString(disk->driverType)) < 0) {
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("unknown disk format %s for %s"),
                            disk->driverType, disk->src);
            goto cleanup;
        }
    } else {
10225 10226 10227 10228 10229 10230 10231
        if (driver->allowDiskFormatProbing) {
            if ((format = virStorageFileProbeFormat(disk->src)) < 0)
                goto cleanup;
        } else {
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("no disk format for %s and probing is disabled"),
                            disk->src);
10232
            goto cleanup;
10233
        }
10234 10235 10236 10237 10238
    }

    if (virStorageFileGetMetadataFromFD(path, fd,
                                        format,
                                        &meta) < 0)
10239 10240 10241 10242 10243 10244 10245 10246 10247 10248
        goto cleanup;

    /* Get info for normal formats */
    if (fstat(fd, &sb) < 0) {
        virReportSystemError(errno,
                             _("cannot stat file '%s'"), path);
        goto cleanup;
    }

    if (S_ISREG(sb.st_mode)) {
10249
#ifndef WIN32
10250 10251 10252 10253 10254 10255 10256 10257 10258 10259 10260 10261 10262 10263 10264 10265 10266 10267 10268 10269 10270 10271 10272 10273 10274 10275 10276 10277
        info->physical = (unsigned long long)sb.st_blocks *
            (unsigned long long)DEV_BSIZE;
#else
        info->physical = sb.st_size;
#endif
        /* Regular files may be sparse, so logical size (capacity) is not same
         * as actual physical above
         */
        info->capacity = sb.st_size;
    } else {
        /* NB. Because we configure with AC_SYS_LARGEFILE, off_t should
         * be 64 bits on all platforms.
         */
        end = lseek (fd, 0, SEEK_END);
        if (end == (off_t)-1) {
            virReportSystemError(errno,
                                 _("failed to seek to end of %s"), path);
            goto cleanup;
        }
        info->physical = end;
        info->capacity = end;
    }

    /* If the file we probed has a capacity set, then override
     * what we calculated from file/block extents */
    if (meta.capacity)
        info->capacity = meta.capacity;

10278
    /* Set default value .. */
10279 10280
    info->allocation = info->physical;

10281 10282 10283
    /* ..but if guest is running & not using raw
       disk format and on a block device, then query
       highest allocated extent from QEMU */
10284
    if (disk->type == VIR_DOMAIN_DISK_TYPE_BLOCK &&
10285
        format != VIR_STORAGE_FILE_RAW &&
10286 10287 10288 10289
        S_ISBLK(sb.st_mode)) {
        qemuDomainObjPrivatePtr priv = vm->privateData;
        if (qemuDomainObjBeginJob(vm) < 0)
            goto cleanup;
10290 10291 10292 10293 10294 10295 10296 10297 10298
        if (!virDomainObjIsActive(vm))
            ret = 0;
        else {
            qemuDomainObjEnterMonitor(vm);
            ret = qemuMonitorGetBlockExtent(priv->mon,
                                            disk->info.alias,
                                            &info->allocation);
            qemuDomainObjExitMonitor(vm);
        }
10299 10300 10301 10302 10303 10304

        if (qemuDomainObjEndJob(vm) == 0)
            vm = NULL;
    } else {
        ret = 0;
    }
10305 10306

cleanup:
10307
    VIR_FORCE_CLOSE(fd);
10308 10309 10310 10311 10312 10313
    if (vm)
        virDomainObjUnlock(vm);
    return ret;
}


10314
static int
10315 10316 10317 10318
qemuDomainEventRegister(virConnectPtr conn,
                        virConnectDomainEventCallback callback,
                        void *opaque,
                        virFreeCallback freecb)
10319
{
10320 10321 10322
    struct qemud_driver *driver = conn->privateData;
    int ret;

10323
    qemuDriverLock(driver);
10324 10325
    ret = virDomainEventCallbackListAdd(conn, driver->domainEventCallbacks,
                                        callback, opaque, freecb);
10326
    qemuDriverUnlock(driver);
10327

10328
    return ret;
10329 10330
}

10331

10332
static int
10333 10334
qemuDomainEventDeregister(virConnectPtr conn,
                          virConnectDomainEventCallback callback)
10335
{
10336 10337 10338
    struct qemud_driver *driver = conn->privateData;
    int ret;

10339
    qemuDriverLock(driver);
10340 10341 10342 10343 10344 10345
    if (driver->domainEventDispatching)
        ret = virDomainEventCallbackListMarkDelete(conn, driver->domainEventCallbacks,
                                                   callback);
    else
        ret = virDomainEventCallbackListRemove(conn, driver->domainEventCallbacks,
                                               callback);
10346
    qemuDriverUnlock(driver);
10347

10348
    return ret;
10349 10350
}

10351 10352 10353 10354 10355 10356 10357 10358 10359 10360 10361 10362 10363 10364 10365 10366 10367 10368 10369 10370 10371 10372 10373 10374 10375 10376 10377 10378 10379 10380 10381 10382 10383 10384 10385 10386 10387 10388 10389 10390 10391 10392 10393

static int
qemuDomainEventRegisterAny(virConnectPtr conn,
                           virDomainPtr dom,
                           int eventID,
                           virConnectDomainEventGenericCallback callback,
                           void *opaque,
                           virFreeCallback freecb)
{
    struct qemud_driver *driver = conn->privateData;
    int ret;

    qemuDriverLock(driver);
    ret = virDomainEventCallbackListAddID(conn,
                                          driver->domainEventCallbacks,
                                          dom, eventID,
                                          callback, opaque, freecb);
    qemuDriverUnlock(driver);

    return ret;
}


static int
qemuDomainEventDeregisterAny(virConnectPtr conn,
                             int callbackID)
{
    struct qemud_driver *driver = conn->privateData;
    int ret;

    qemuDriverLock(driver);
    if (driver->domainEventDispatching)
        ret = virDomainEventCallbackListMarkDeleteID(conn, driver->domainEventCallbacks,
                                                     callbackID);
    else
        ret = virDomainEventCallbackListRemoveID(conn, driver->domainEventCallbacks,
                                                 callbackID);
    qemuDriverUnlock(driver);

    return ret;
}


10394 10395
static void qemuDomainEventDispatchFunc(virConnectPtr conn,
                                        virDomainEventPtr event,
10396
                                        virConnectDomainEventGenericCallback cb,
10397 10398
                                        void *cbopaque,
                                        void *opaque)
10399
{
10400
    struct qemud_driver *driver = opaque;
10401

10402 10403 10404 10405 10406 10407 10408 10409 10410 10411 10412 10413 10414 10415 10416 10417 10418 10419 10420 10421 10422 10423 10424 10425 10426 10427 10428 10429 10430 10431 10432 10433 10434 10435 10436 10437 10438 10439 10440 10441 10442 10443 10444 10445
    /* Drop the lock whle dispatching, for sake of re-entrancy */
    qemuDriverUnlock(driver);
    virDomainEventDispatchDefaultFunc(conn, event, cb, cbopaque, NULL);
    qemuDriverLock(driver);
}

static void qemuDomainEventFlush(int timer ATTRIBUTE_UNUSED, void *opaque)
{
    struct qemud_driver *driver = opaque;
    virDomainEventQueue tempQueue;

    qemuDriverLock(driver);

    driver->domainEventDispatching = 1;

    /* Copy the queue, so we're reentrant safe */
    tempQueue.count = driver->domainEventQueue->count;
    tempQueue.events = driver->domainEventQueue->events;
    driver->domainEventQueue->count = 0;
    driver->domainEventQueue->events = NULL;

    virEventUpdateTimeout(driver->domainEventTimer, -1);
    virDomainEventQueueDispatch(&tempQueue,
                                driver->domainEventCallbacks,
                                qemuDomainEventDispatchFunc,
                                driver);

    /* Purge any deleted callbacks */
    virDomainEventCallbackListPurgeMarked(driver->domainEventCallbacks);

    driver->domainEventDispatching = 0;
    qemuDriverUnlock(driver);
}


/* driver must be locked before calling */
static void qemuDomainEventQueue(struct qemud_driver *driver,
                                 virDomainEventPtr event)
{
    if (virDomainEventQueuePush(driver->domainEventQueue,
                                event) < 0)
        virDomainEventFree(event);
    if (qemu_driver->domainEventQueue->count == 1)
        virEventUpdateTimeout(driver->domainEventTimer, 0);
10446 10447
}

D
Daniel Veillard 已提交
10448 10449
/* Migration support. */

10450 10451 10452 10453 10454
static bool ATTRIBUTE_NONNULL(1)
qemuDomainIsMigratable(virDomainDefPtr def)
{
    if (def->nhostdevs > 0) {
        qemuReportError(VIR_ERR_OPERATION_INVALID,
10455
            "%s", _("Domain with assigned host devices cannot be migrated"));
10456 10457 10458 10459 10460 10461
        return false;
    }

    return true;
}

C
Chris Lalancette 已提交
10462 10463 10464 10465 10466 10467 10468 10469 10470 10471 10472 10473 10474 10475 10476 10477 10478 10479 10480 10481 10482
/* Prepare is the first step, and it runs on the destination host.
 *
 * This version starts an empty VM listening on a localhost TCP port, and
 * sets up the corresponding virStream to handle the incoming data.
 */
static int
qemudDomainMigratePrepareTunnel(virConnectPtr dconn,
                                virStreamPtr st,
                                unsigned long flags,
                                const char *dname,
                                unsigned long resource ATTRIBUTE_UNUSED,
                                const char *dom_xml)
{
    struct qemud_driver *driver = dconn->privateData;
    virDomainDefPtr def = NULL;
    virDomainObjPtr vm = NULL;
    char *migrateFrom;
    virDomainEventPtr event = NULL;
    int ret = -1;
    int internalret;
    char *unixfile = NULL;
10483
    unsigned long long qemuCmdFlags;
10484 10485 10486 10487 10488 10489 10490 10491
    qemuDomainObjPrivatePtr priv = NULL;
    struct timeval now;

    if (gettimeofday(&now, NULL) < 0) {
        virReportSystemError(errno, "%s",
                             _("cannot get time of day"));
        return -1;
    }
C
Chris Lalancette 已提交
10492 10493 10494

    qemuDriverLock(driver);
    if (!dom_xml) {
10495 10496
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("no domain XML passed"));
C
Chris Lalancette 已提交
10497 10498 10499
        goto cleanup;
    }
    if (!(flags & VIR_MIGRATE_TUNNELLED)) {
10500
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
C
Chris Lalancette 已提交
10501 10502 10503 10504
                         "%s", _("PrepareTunnel called but no TUNNELLED flag set"));
        goto cleanup;
    }
    if (st == NULL) {
10505 10506
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("tunnelled migration requested but NULL stream passed"));
C
Chris Lalancette 已提交
10507 10508 10509 10510
        goto cleanup;
    }

    /* Parse the domain XML. */
10511
    if (!(def = virDomainDefParseString(driver->caps, dom_xml,
C
Chris Lalancette 已提交
10512
                                        VIR_DOMAIN_XML_INACTIVE))) {
10513 10514
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("failed to parse XML"));
C
Chris Lalancette 已提交
10515 10516 10517
        goto cleanup;
    }

10518 10519 10520
    if (!qemuDomainIsMigratable(def))
        goto cleanup;

C
Chris Lalancette 已提交
10521
    /* Target domain name, maybe renamed. */
10522 10523 10524 10525 10526 10527
    if (dname) {
        VIR_FREE(def->name);
        def->name = strdup(dname);
        if (def->name == NULL)
            goto cleanup;
    }
C
Chris Lalancette 已提交
10528

10529 10530
    if (virDomainObjIsDuplicate(&driver->domains, def, 1) < 0)
        goto cleanup;
C
Chris Lalancette 已提交
10531

10532
    if (!(vm = virDomainAssignDef(driver->caps,
C
Chris Lalancette 已提交
10533
                                  &driver->domains,
10534
                                  def, true))) {
10535
        /* virDomainAssignDef already set the error */
C
Chris Lalancette 已提交
10536 10537 10538
        goto cleanup;
    }
    def = NULL;
10539
    priv = vm->privateData;
C
Chris Lalancette 已提交
10540

10541 10542
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;
10543
    priv->jobActive = QEMU_JOB_MIGRATION_OUT;
10544

C
Chris Lalancette 已提交
10545 10546 10547 10548
    /* Domain starts inactive, even if the domain XML had an id field. */
    vm->def->id = -1;

    if (virAsprintf(&unixfile, "%s/qemu.tunnelmigrate.dest.%s",
10549
                    driver->libDir, vm->def->name) < 0) {
10550
        virReportOOMError();
10551
        goto endjob;
C
Chris Lalancette 已提交
10552 10553 10554 10555
    }
    unlink(unixfile);

    /* check that this qemu version supports the interactive exec */
10556
    if (qemuCapsExtractVersionInfo(vm->def->emulator, NULL, &qemuCmdFlags) < 0) {
10557 10558 10559
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("Cannot determine QEMU argv syntax %s"),
                        vm->def->emulator);
10560
        goto endjob;
C
Chris Lalancette 已提交
10561 10562 10563 10564 10565 10566
    }
    if (qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_UNIX)
        internalret = virAsprintf(&migrateFrom, "unix:%s", unixfile);
    else if (qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_EXEC)
        internalret = virAsprintf(&migrateFrom, "exec:nc -U -l %s", unixfile);
    else {
10567 10568
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("Destination qemu is too old to support tunnelled migration"));
10569
        goto endjob;
C
Chris Lalancette 已提交
10570 10571
    }
    if (internalret < 0) {
10572
        virReportOOMError();
10573
        goto endjob;
C
Chris Lalancette 已提交
10574 10575 10576 10577
    }
    /* Start the QEMU daemon, with the same command-line arguments plus
     * -incoming unix:/path/to/file or exec:nc -U /path/to/file
     */
10578
    internalret = qemudStartVMDaemon(dconn, driver, vm, migrateFrom, true,
10579
                                     -1, NULL, VIR_VM_OP_MIGRATE_IN_START);
C
Chris Lalancette 已提交
10580 10581
    VIR_FREE(migrateFrom);
    if (internalret < 0) {
10582
        qemuDomainStartAudit(vm, "migrated", false);
C
Chris Lalancette 已提交
10583 10584 10585 10586 10587 10588 10589
        /* Note that we don't set an error here because qemudStartVMDaemon
         * should have already done that.
         */
        if (!vm->persistent) {
            virDomainRemoveInactive(&driver->domains, vm);
            vm = NULL;
        }
10590
        goto endjob;
C
Chris Lalancette 已提交
10591 10592
    }

10593 10594 10595
    if (virFDStreamConnectUNIX(st,
                               unixfile,
                               false) < 0) {
10596
        qemuDomainStartAudit(vm, "migrated", false);
10597
        qemudShutdownVMDaemon(driver, vm, 0);
10598
        if (!vm->persistent) {
10599 10600
            if (qemuDomainObjEndJob(vm) > 0)
                virDomainRemoveInactive(&driver->domains, vm);
10601 10602
            vm = NULL;
        }
10603
        virReportSystemError(errno,
C
Chris Lalancette 已提交
10604 10605
                             _("cannot open unix socket '%s' for tunnelled migration"),
                             unixfile);
10606
        goto endjob;
C
Chris Lalancette 已提交
10607 10608
    }

10609
    qemuDomainStartAudit(vm, "migrated", true);
10610

C
Chris Lalancette 已提交
10611 10612 10613 10614 10615
    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STARTED,
                                     VIR_DOMAIN_EVENT_STARTED_MIGRATED);
    ret = 0;

10616
endjob:
10617 10618 10619
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
10620

10621 10622 10623 10624 10625 10626 10627 10628 10629
    /* We set a fake job active which is held across
     * API calls until the finish() call. This prevents
     * any other APIs being invoked while incoming
     * migration is taking place
     */
    if (vm &&
        virDomainObjIsActive(vm)) {
        priv->jobActive = QEMU_JOB_MIGRATION_IN;
        priv->jobInfo.type = VIR_DOMAIN_JOB_UNBOUNDED;
10630
        priv->jobStart = timeval_to_ms(now);
10631 10632
    }

C
Chris Lalancette 已提交
10633 10634
cleanup:
    virDomainDefFree(def);
10635 10636
    if (unixfile)
        unlink(unixfile);
C
Chris Lalancette 已提交
10637 10638 10639 10640 10641 10642 10643 10644 10645
    VIR_FREE(unixfile);
    if (vm)
        virDomainObjUnlock(vm);
    if (event)
        qemuDomainEventQueue(driver, event);
    qemuDriverUnlock(driver);
    return ret;
}

D
Daniel Veillard 已提交
10646 10647 10648 10649
/* Prepare is the first step, and it runs on the destination host.
 *
 * This starts an empty VM listening on a TCP port.
 */
10650
static int ATTRIBUTE_NONNULL (5)
D
Daniel Veillard 已提交
10651 10652 10653 10654 10655
qemudDomainMigratePrepare2 (virConnectPtr dconn,
                            char **cookie ATTRIBUTE_UNUSED,
                            int *cookielen ATTRIBUTE_UNUSED,
                            const char *uri_in,
                            char **uri_out,
C
Chris Lalancette 已提交
10656
                            unsigned long flags,
D
Daniel Veillard 已提交
10657 10658 10659 10660 10661
                            const char *dname,
                            unsigned long resource ATTRIBUTE_UNUSED,
                            const char *dom_xml)
{
    static int port = 0;
10662 10663
    struct qemud_driver *driver = dconn->privateData;
    virDomainDefPtr def = NULL;
D
Daniel Veillard 已提交
10664 10665
    virDomainObjPtr vm = NULL;
    int this_port;
C
Chris Lalancette 已提交
10666
    char *hostname = NULL;
D
Daniel Veillard 已提交
10667 10668
    char migrateFrom [64];
    const char *p;
10669
    virDomainEventPtr event = NULL;
10670
    int ret = -1;
10671
    int internalret;
10672 10673 10674 10675 10676 10677 10678 10679
    qemuDomainObjPrivatePtr priv = NULL;
    struct timeval now;

    if (gettimeofday(&now, NULL) < 0) {
        virReportSystemError(errno, "%s",
                             _("cannot get time of day"));
        return -1;
    }
10680

C
Chris Lalancette 已提交
10681 10682 10683 10684 10685 10686 10687 10688 10689
    virCheckFlags(VIR_MIGRATE_LIVE |
                  VIR_MIGRATE_PEER2PEER |
                  VIR_MIGRATE_TUNNELLED |
                  VIR_MIGRATE_PERSIST_DEST |
                  VIR_MIGRATE_UNDEFINE_SOURCE |
                  VIR_MIGRATE_PAUSED |
                  VIR_MIGRATE_NON_SHARED_DISK |
                  VIR_MIGRATE_NON_SHARED_INC, -1);

10690
    *uri_out = NULL;
D
Daniel Veillard 已提交
10691

10692
    qemuDriverLock(driver);
C
Chris Lalancette 已提交
10693 10694 10695 10696
    if (flags & VIR_MIGRATE_TUNNELLED) {
        /* this is a logical error; we never should have gotten here with
         * VIR_MIGRATE_TUNNELLED set
         */
10697 10698
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("Tunnelled migration requested but invalid RPC method called"));
C
Chris Lalancette 已提交
10699 10700 10701
        goto cleanup;
    }

D
Daniel Veillard 已提交
10702
    if (!dom_xml) {
10703 10704
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("no domain XML passed"));
10705
        goto cleanup;
D
Daniel Veillard 已提交
10706 10707 10708 10709 10710 10711 10712 10713 10714 10715 10716 10717 10718 10719 10720 10721 10722
    }

    /* The URI passed in may be NULL or a string "tcp://somehostname:port".
     *
     * If the URI passed in is NULL then we allocate a port number
     * from our pool of port numbers and return a URI of
     * "tcp://ourhostname:port".
     *
     * If the URI passed in is not NULL then we try to parse out the
     * port number and use that (note that the hostname is assumed
     * to be a correct hostname which refers to the target machine).
     */
    if (uri_in == NULL) {
        this_port = QEMUD_MIGRATION_FIRST_PORT + port++;
        if (port == QEMUD_MIGRATION_NUM_PORTS) port = 0;

        /* Get hostname */
C
Chris Lalancette 已提交
10723
        if ((hostname = virGetHostname(NULL)) == NULL)
10724
            goto cleanup;
D
Daniel Veillard 已提交
10725

C
Chris Lalancette 已提交
10726 10727 10728 10729 10730 10731
        if (STRPREFIX(hostname, "localhost")) {
            qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                            _("hostname on destination resolved to localhost, but migration requires an FQDN"));
            goto cleanup;
        }

10732 10733 10734 10735 10736
        /* XXX this really should have been a properly well-formed
         * URI, but we can't add in tcp:// now without breaking
         * compatability with old targets. We at least make the
         * new targets accept both syntaxes though.
         */
D
Daniel Veillard 已提交
10737
        /* Caller frees */
10738 10739
        internalret = virAsprintf(uri_out, "tcp:%s:%d", hostname, this_port);
        if (internalret < 0) {
10740
            virReportOOMError();
10741
            goto cleanup;
D
Daniel Veillard 已提交
10742 10743 10744 10745 10746 10747
        }
    } else {
        /* Check the URI starts with "tcp:".  We will escape the
         * URI when passing it to the qemu monitor, so bad
         * characters in hostname part don't matter.
         */
10748
        if (!STRPREFIX (uri_in, "tcp:")) {
10749 10750
            qemuReportError (VIR_ERR_INVALID_ARG,
                             "%s", _("only tcp URIs are supported for KVM/QEMU migrations"));
10751
            goto cleanup;
D
Daniel Veillard 已提交
10752 10753 10754 10755
        }

        /* Get the port number. */
        p = strrchr (uri_in, ':');
10756 10757 10758 10759 10760 10761 10762 10763
        if (p == strchr(uri_in, ':')) {
            /* Generate a port */
            this_port = QEMUD_MIGRATION_FIRST_PORT + port++;
            if (port == QEMUD_MIGRATION_NUM_PORTS)
                port = 0;

            /* Caller frees */
            if (virAsprintf(uri_out, "%s:%d", uri_in, this_port) < 0) {
10764
                virReportOOMError();
10765 10766 10767 10768 10769 10770 10771
                goto cleanup;
            }

        } else {
            p++; /* definitely has a ':' in it, see above */
            this_port = virParseNumber (&p);
            if (this_port == -1 || p-uri_in != strlen (uri_in)) {
10772 10773
                qemuReportError(VIR_ERR_INVALID_ARG,
                                "%s", _("URI ended with incorrect ':port'"));
10774 10775
                goto cleanup;
            }
D
Daniel Veillard 已提交
10776 10777 10778
        }
    }

10779
    if (*uri_out)
10780 10781
        VIR_DEBUG("Generated uri_out=%s", *uri_out);

D
Daniel Veillard 已提交
10782
    /* Parse the domain XML. */
10783
    if (!(def = virDomainDefParseString(driver->caps, dom_xml,
10784
                                        VIR_DOMAIN_XML_INACTIVE))) {
10785 10786
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("failed to parse XML"));
10787
        goto cleanup;
D
Daniel Veillard 已提交
10788 10789
    }

10790 10791 10792
    if (!qemuDomainIsMigratable(def))
        goto cleanup;

D
Daniel Veillard 已提交
10793
    /* Target domain name, maybe renamed. */
10794 10795 10796 10797 10798 10799
    if (dname) {
        VIR_FREE(def->name);
        def->name = strdup(dname);
        if (def->name == NULL)
            goto cleanup;
    }
D
Daniel Veillard 已提交
10800

10801 10802
    if (virDomainObjIsDuplicate(&driver->domains, def, 1) < 0)
        goto cleanup;
D
Daniel Veillard 已提交
10803

10804
    if (!(vm = virDomainAssignDef(driver->caps,
D
Daniel Veillard 已提交
10805
                                  &driver->domains,
10806
                                  def, true))) {
10807
        /* virDomainAssignDef already set the error */
10808
        goto cleanup;
D
Daniel Veillard 已提交
10809
    }
10810
    def = NULL;
10811
    priv = vm->privateData;
D
Daniel Veillard 已提交
10812

10813 10814
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;
10815
    priv->jobActive = QEMU_JOB_MIGRATION_OUT;
10816

D
Daniel Veillard 已提交
10817 10818 10819 10820 10821 10822 10823
    /* Domain starts inactive, even if the domain XML had an id field. */
    vm->def->id = -1;

    /* Start the QEMU daemon, with the same command-line arguments plus
     * -incoming tcp:0.0.0.0:port
     */
    snprintf (migrateFrom, sizeof (migrateFrom), "tcp:0.0.0.0:%d", this_port);
10824
    if (qemudStartVMDaemon (dconn, driver, vm, migrateFrom, true,
10825
                            -1, NULL, VIR_VM_OP_MIGRATE_IN_START) < 0) {
10826
        qemuDomainStartAudit(vm, "migrated", false);
10827 10828 10829
        /* Note that we don't set an error here because qemudStartVMDaemon
         * should have already done that.
         */
10830
        if (!vm->persistent) {
10831 10832
            if (qemuDomainObjEndJob(vm) > 0)
                virDomainRemoveInactive(&driver->domains, vm);
10833 10834
            vm = NULL;
        }
10835
        goto endjob;
D
Daniel Veillard 已提交
10836
    }
10837

10838
    qemuDomainStartAudit(vm, "migrated", true);
10839 10840 10841
    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STARTED,
                                     VIR_DOMAIN_EVENT_STARTED_MIGRATED);
10842
    ret = 0;
D
Daniel Veillard 已提交
10843

10844
endjob:
10845 10846 10847
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
10848

10849 10850 10851 10852 10853 10854 10855 10856 10857
    /* We set a fake job active which is held across
     * API calls until the finish() call. This prevents
     * any other APIs being invoked while incoming
     * migration is taking place
     */
    if (vm &&
        virDomainObjIsActive(vm)) {
        priv->jobActive = QEMU_JOB_MIGRATION_IN;
        priv->jobInfo.type = VIR_DOMAIN_JOB_UNBOUNDED;
10858
        priv->jobStart = timeval_to_ms(now);
10859 10860
    }

10861
cleanup:
C
Chris Lalancette 已提交
10862
    VIR_FREE(hostname);
10863
    virDomainDefFree(def);
C
Chris Lalancette 已提交
10864
    if (ret != 0)
10865
        VIR_FREE(*uri_out);
10866 10867
    if (vm)
        virDomainObjUnlock(vm);
10868 10869
    if (event)
        qemuDomainEventQueue(driver, event);
10870
    qemuDriverUnlock(driver);
10871
    return ret;
C
Chris Lalancette 已提交
10872 10873 10874

}

10875 10876 10877 10878

/* Perform migration using QEMU's native TCP migrate support,
 * not encrypted obviously
 */
10879
static int doNativeMigrate(struct qemud_driver *driver,
10880 10881
                           virDomainObjPtr vm,
                           const char *uri,
10882
                           unsigned int flags,
10883 10884 10885 10886
                           const char *dname ATTRIBUTE_UNUSED,
                           unsigned long resource)
{
    int ret = -1;
10887
    xmlURIPtr uribits = NULL;
10888
    qemuDomainObjPrivatePtr priv = vm->privateData;
10889
    unsigned int background_flags = QEMU_MONITOR_MIGRATE_BACKGROUND;
10890

10891 10892 10893 10894 10895
    /* Issue the migrate command. */
    if (STRPREFIX(uri, "tcp:") && !STRPREFIX(uri, "tcp://")) {
        /* HACK: source host generates bogus URIs, so fix them up */
        char *tmpuri;
        if (virAsprintf(&tmpuri, "tcp://%s", uri + strlen("tcp:")) < 0) {
10896
            virReportOOMError();
10897 10898 10899 10900 10901 10902 10903 10904
            goto cleanup;
        }
        uribits = xmlParseURI(tmpuri);
        VIR_FREE(tmpuri);
    } else {
        uribits = xmlParseURI(uri);
    }
    if (!uribits) {
10905 10906
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("cannot parse URI %s"), uri);
10907 10908 10909
        goto cleanup;
    }

10910
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
10911
    if (resource > 0 &&
10912
        qemuMonitorSetMigrationSpeed(priv->mon, resource) < 0) {
10913
        qemuDomainObjExitMonitorWithDriver(driver, vm);
10914
        goto cleanup;
10915
    }
10916

10917 10918 10919 10920 10921 10922 10923 10924
    if (flags & VIR_MIGRATE_NON_SHARED_DISK)
        background_flags |= QEMU_MONITOR_MIGRATE_NON_SHARED_DISK;

    if (flags & VIR_MIGRATE_NON_SHARED_INC)
        background_flags |= QEMU_MONITOR_MIGRATE_NON_SHARED_INC;

    if (qemuMonitorMigrateToHost(priv->mon, background_flags, uribits->server,
                                 uribits->port) < 0) {
10925
        qemuDomainObjExitMonitorWithDriver(driver, vm);
10926 10927
        goto cleanup;
    }
10928
    qemuDomainObjExitMonitorWithDriver(driver, vm);
10929

10930
    if (qemuDomainWaitForMigrationComplete(driver, vm) < 0)
10931 10932 10933 10934 10935 10936 10937 10938 10939 10940
        goto cleanup;

    ret = 0;

cleanup:
    xmlFreeURI(uribits);
    return ret;
}


10941 10942
#define TUNNEL_SEND_BUF_SIZE 65536

10943
static int doTunnelSendAll(virStreamPtr st,
10944 10945
                           int sock)
{
10946 10947 10948 10949 10950 10951 10952 10953
    char *buffer;
    int nbytes = TUNNEL_SEND_BUF_SIZE;

    if (VIR_ALLOC_N(buffer, TUNNEL_SEND_BUF_SIZE) < 0) {
        virReportOOMError();
        virStreamAbort(st);
        return -1;
    }
10954 10955 10956 10957 10958

    /* XXX should honour the 'resource' parameter here */
    for (;;) {
        nbytes = saferead(sock, buffer, nbytes);
        if (nbytes < 0) {
10959
            virReportSystemError(errno, "%s",
10960
                                 _("tunnelled migration failed to read from qemu"));
10961 10962
            virStreamAbort(st);
            VIR_FREE(buffer);
10963 10964 10965 10966 10967 10968 10969
            return -1;
        }
        else if (nbytes == 0)
            /* EOF; get out of here */
            break;

        if (virStreamSend(st, buffer, nbytes) < 0) {
10970 10971
            qemuReportError(VIR_ERR_OPERATION_FAILED, "%s",
                            _("Failed to write migration data to remote libvirtd"));
10972
            VIR_FREE(buffer);
10973 10974 10975 10976
            return -1;
        }
    }

10977 10978
    VIR_FREE(buffer);

10979 10980 10981 10982 10983 10984 10985
    if (virStreamFinish(st) < 0)
        /* virStreamFinish set the error for us */
        return -1;

    return 0;
}

C
Chris Lalancette 已提交
10986
static int doTunnelMigrate(virDomainPtr dom,
10987
                           struct qemud_driver *driver,
10988
                           virConnectPtr dconn,
C
Chris Lalancette 已提交
10989
                           virDomainObjPtr vm,
10990
                           const char *dom_xml,
C
Chris Lalancette 已提交
10991 10992 10993 10994 10995
                           const char *uri,
                           unsigned long flags,
                           const char *dname,
                           unsigned long resource)
{
10996
    qemuDomainObjPrivatePtr priv = vm->privateData;
10997 10998
    int client_sock = -1;
    int qemu_sock = -1;
C
Chris Lalancette 已提交
10999 11000
    struct sockaddr_un sa_qemu, sa_client;
    socklen_t addrlen;
11001
    virDomainPtr ddomain = NULL;
C
Chris Lalancette 已提交
11002
    int retval = -1;
11003
    virStreamPtr st = NULL;
C
Chris Lalancette 已提交
11004 11005
    char *unixfile = NULL;
    int internalret;
11006
    unsigned long long qemuCmdFlags;
C
Chris Lalancette 已提交
11007 11008
    int status;
    unsigned long long transferred, remaining, total;
11009
    unsigned int background_flags = QEMU_MONITOR_MIGRATE_BACKGROUND;
C
Chris Lalancette 已提交
11010

11011 11012 11013 11014 11015 11016 11017 11018
    /*
     * The order of operations is important here to avoid touching
     * the source VM until we are very sure we can successfully
     * start the migration operation.
     *
     *   1. setup local support infrastructure (eg sockets)
     *   2. setup destination fully
     *   3. start migration on source
C
Chris Lalancette 已提交
11019 11020
     */

11021

11022
    /* Stage 1. setup local support infrastructure */
C
Chris Lalancette 已提交
11023 11024

    if (virAsprintf(&unixfile, "%s/qemu.tunnelmigrate.src.%s",
11025
                    driver->libDir, vm->def->name) < 0) {
11026
        virReportOOMError();
11027
        goto cleanup;
C
Chris Lalancette 已提交
11028 11029 11030 11031
    }

    qemu_sock = socket(AF_UNIX, SOCK_STREAM, 0);
    if (qemu_sock < 0) {
11032
        virReportSystemError(errno, "%s",
C
Chris Lalancette 已提交
11033
                             _("cannot open tunnelled migration socket"));
11034
        goto cleanup;
C
Chris Lalancette 已提交
11035 11036 11037 11038 11039
    }
    memset(&sa_qemu, 0, sizeof(sa_qemu));
    sa_qemu.sun_family = AF_UNIX;
    if (virStrcpy(sa_qemu.sun_path, unixfile,
                  sizeof(sa_qemu.sun_path)) == NULL) {
11040 11041 11042
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("Unix socket '%s' too big for destination"),
                        unixfile);
11043
        goto cleanup;
C
Chris Lalancette 已提交
11044 11045 11046
    }
    unlink(unixfile);
    if (bind(qemu_sock, (struct sockaddr *)&sa_qemu, sizeof(sa_qemu)) < 0) {
11047
        virReportSystemError(errno,
C
Chris Lalancette 已提交
11048 11049
                             _("Cannot bind to unix socket '%s' for tunnelled migration"),
                             unixfile);
11050
        goto cleanup;
C
Chris Lalancette 已提交
11051 11052
    }
    if (listen(qemu_sock, 1) < 0) {
11053
        virReportSystemError(errno,
C
Chris Lalancette 已提交
11054 11055
                             _("Cannot listen on unix socket '%s' for tunnelled migration"),
                             unixfile);
11056
        goto cleanup;
C
Chris Lalancette 已提交
11057 11058
    }

11059 11060 11061 11062 11063 11064 11065
    if (chown(unixfile, qemu_driver->user, qemu_driver->group) < 0) {
        virReportSystemError(errno,
                             _("Cannot change unix socket '%s' owner"),
                             unixfile);
        goto cleanup;
    }

C
Chris Lalancette 已提交
11066
    /* check that this qemu version supports the unix migration */
11067
    if (qemuCapsExtractVersionInfo(vm->def->emulator, NULL, &qemuCmdFlags) < 0) {
11068 11069 11070
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("Cannot extract Qemu version from '%s'"),
                        vm->def->emulator);
11071 11072 11073 11074 11075
        goto cleanup;
    }

    if (!(qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_UNIX) &&
        !(qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_EXEC)) {
11076 11077
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("Source qemu is too old to support tunnelled migration"));
11078
        goto cleanup;
C
Chris Lalancette 已提交
11079
    }
11080 11081 11082 11083 11084 11085 11086 11087 11088 11089 11090 11091


    /* Stage 2. setup destination fully
     *
     * Once stage 2 has completed successfully, we *must* call finish
     * to cleanup the target whether we succeed or fail
     */
    st = virStreamNew(dconn, 0);
    if (st == NULL)
        /* virStreamNew only fails on OOM, and it reports the error itself */
        goto cleanup;

11092
    qemuDomainObjEnterRemoteWithDriver(driver, vm);
11093 11094 11095
    internalret = dconn->driver->domainMigratePrepareTunnel(dconn, st,
                                                            flags, dname,
                                                            resource, dom_xml);
11096
    qemuDomainObjExitRemoteWithDriver(driver, vm);
11097 11098 11099 11100 11101

    if (internalret < 0)
        /* domainMigratePrepareTunnel sets the error for us */
        goto cleanup;

11102 11103 11104 11105 11106 11107 11108 11109 11110
    /* the domain may have shutdown or crashed while we had the locks dropped
     * in qemuDomainObjEnterRemoteWithDriver, so check again
     */
    if (!virDomainObjIsActive(vm)) {
        qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                        _("guest unexpectedly quit"));
        goto cleanup;
    }

11111
    /*   3. start migration on source */
11112
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
11113 11114 11115 11116 11117 11118 11119 11120
    if (flags & VIR_MIGRATE_NON_SHARED_DISK)
        background_flags |= QEMU_MONITOR_MIGRATE_NON_SHARED_DISK;
    if (flags & VIR_MIGRATE_NON_SHARED_INC)
        background_flags |= QEMU_MONITOR_MIGRATE_NON_SHARED_INC;
    if (qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_UNIX){
        internalret = qemuMonitorMigrateToUnix(priv->mon, background_flags,
                                               unixfile);
    }
C
Chris Lalancette 已提交
11121 11122
    else if (qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_EXEC) {
        const char *args[] = { "nc", "-U", unixfile, NULL };
11123
        internalret = qemuMonitorMigrateToCommand(priv->mon, QEMU_MONITOR_MIGRATE_BACKGROUND, args);
11124 11125
    } else {
        internalret = -1;
C
Chris Lalancette 已提交
11126
    }
11127
    qemuDomainObjExitMonitorWithDriver(driver, vm);
C
Chris Lalancette 已提交
11128
    if (internalret < 0) {
11129 11130
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("tunnelled migration monitor command failed"));
11131
        goto finish;
C
Chris Lalancette 已提交
11132 11133
    }

11134 11135 11136 11137 11138 11139
    if (!virDomainObjIsActive(vm)) {
        qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                        _("guest unexpectedly quit"));
        goto cleanup;
    }

11140 11141 11142
    /* From this point onwards we *must* call cancel to abort the
     * migration on source if anything goes wrong */

C
Chris Lalancette 已提交
11143 11144 11145
    /* it is also possible that the migrate didn't fail initially, but
     * rather failed later on.  Check the output of "info migrate"
     */
11146
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
11147 11148
    if (qemuMonitorGetMigrationStatus(priv->mon,
                                      &status,
C
Chris Lalancette 已提交
11149 11150 11151
                                      &transferred,
                                      &remaining,
                                      &total) < 0) {
11152
        qemuDomainObjExitMonitorWithDriver(driver, vm);
11153
        goto cancel;
C
Chris Lalancette 已提交
11154
    }
11155
    qemuDomainObjExitMonitorWithDriver(driver, vm);
C
Chris Lalancette 已提交
11156 11157

    if (status == QEMU_MONITOR_MIGRATION_STATUS_ERROR) {
11158 11159
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s",_("migrate failed"));
11160
        goto cancel;
C
Chris Lalancette 已提交
11161 11162 11163 11164 11165 11166
    }

    addrlen = sizeof(sa_client);
    while ((client_sock = accept(qemu_sock, (struct sockaddr *)&sa_client, &addrlen)) < 0) {
        if (errno == EAGAIN || errno == EINTR)
            continue;
11167
        virReportSystemError(errno, "%s",
C
Chris Lalancette 已提交
11168
                             _("tunnelled migration failed to accept from qemu"));
11169
        goto cancel;
C
Chris Lalancette 已提交
11170 11171
    }

11172
    retval = doTunnelSendAll(st, client_sock);
11173

11174
cancel:
11175
    if (retval != 0 && virDomainObjIsActive(vm)) {
11176
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
11177
        qemuMonitorMigrateCancel(priv->mon);
11178
        qemuDomainObjExitMonitorWithDriver(driver, vm);
11179
    }
C
Chris Lalancette 已提交
11180

11181
finish:
C
Chris Lalancette 已提交
11182
    dname = dname ? dname : dom->name;
11183
    qemuDomainObjEnterRemoteWithDriver(driver, vm);
C
Chris Lalancette 已提交
11184 11185
    ddomain = dconn->driver->domainMigrateFinish2
        (dconn, dname, NULL, 0, uri, flags, retval);
11186
    qemuDomainObjExitRemoteWithDriver(driver, vm);
11187 11188

cleanup:
11189 11190
    VIR_FORCE_CLOSE(client_sock);
    VIR_FORCE_CLOSE(qemu_sock);
11191

C
Chris Lalancette 已提交
11192 11193 11194
    if (ddomain)
        virUnrefDomain(ddomain);

11195 11196 11197 11198
    if (unixfile) {
        unlink(unixfile);
        VIR_FREE(unixfile);
    }
C
Chris Lalancette 已提交
11199

11200 11201 11202
    if (st)
        /* don't call virStreamFree(), because that resets any pending errors */
        virUnrefStream(st);
11203 11204 11205 11206
    return retval;
}


11207 11208 11209 11210
/* This is essentially a simplified re-impl of
 * virDomainMigrateVersion2 from libvirt.c, but running in source
 * libvirtd context, instead of client app context */
static int doNonTunnelMigrate(virDomainPtr dom,
11211
                              struct qemud_driver *driver,
11212 11213 11214 11215 11216 11217 11218 11219 11220 11221 11222
                              virConnectPtr dconn,
                              virDomainObjPtr vm,
                              const char *dom_xml,
                              const char *uri ATTRIBUTE_UNUSED,
                              unsigned long flags,
                              const char *dname,
                              unsigned long resource)
{
    virDomainPtr ddomain = NULL;
    int retval = -1;
    char *uri_out = NULL;
11223
    int rc;
11224

11225
    qemuDomainObjEnterRemoteWithDriver(driver, vm);
11226 11227
    /* NB we don't pass 'uri' into this, since that's the libvirtd
     * URI in this context - so we let dest pick it */
11228 11229 11230 11231 11232 11233 11234 11235 11236
    rc = dconn->driver->domainMigratePrepare2(dconn,
                                              NULL, /* cookie */
                                              0, /* cookielen */
                                              NULL, /* uri */
                                              &uri_out,
                                              flags, dname,
                                              resource, dom_xml);
    qemuDomainObjExitRemoteWithDriver(driver, vm);
    if (rc < 0)
11237 11238 11239
        /* domainMigratePrepare2 sets the error for us */
        goto cleanup;

11240 11241 11242 11243 11244 11245 11246 11247 11248
    /* the domain may have shutdown or crashed while we had the locks dropped
     * in qemuDomainObjEnterRemoteWithDriver, so check again
     */
    if (!virDomainObjIsActive(vm)) {
        qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                        _("guest unexpectedly quit"));
        goto cleanup;
    }

11249
    if (uri_out == NULL) {
11250 11251
        qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                        _("domainMigratePrepare2 did not set uri"));
11252
        goto cleanup;
11253 11254
    }

11255
    if (doNativeMigrate(driver, vm, uri_out, flags, dname, resource) < 0)
11256 11257 11258 11259 11260 11261
        goto finish;

    retval = 0;

finish:
    dname = dname ? dname : dom->name;
11262
    qemuDomainObjEnterRemoteWithDriver(driver, vm);
11263 11264
    ddomain = dconn->driver->domainMigrateFinish2
        (dconn, dname, NULL, 0, uri_out, flags, retval);
11265
    qemuDomainObjExitRemoteWithDriver(driver, vm);
11266 11267 11268 11269 11270 11271 11272 11273 11274

    if (ddomain)
        virUnrefDomain(ddomain);

cleanup:
    return retval;
}


11275
static int doPeer2PeerMigrate(virDomainPtr dom,
11276
                              struct qemud_driver *driver,
11277 11278 11279 11280 11281 11282 11283 11284 11285
                              virDomainObjPtr vm,
                              const char *uri,
                              unsigned long flags,
                              const char *dname,
                              unsigned long resource)
{
    int ret = -1;
    virConnectPtr dconn = NULL;
    char *dom_xml;
11286
    bool p2p;
11287 11288 11289 11290 11291

    /* the order of operations is important here; we make sure the
     * destination side is completely setup before we touch the source
     */

11292
    qemuDomainObjEnterRemoteWithDriver(driver, vm);
11293
    dconn = virConnectOpen(uri);
11294
    qemuDomainObjExitRemoteWithDriver(driver, vm);
11295
    if (dconn == NULL) {
11296 11297
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        _("Failed to connect to remote libvirt URI %s"), uri);
11298 11299
        return -1;
    }
11300 11301 11302 11303 11304 11305

    qemuDomainObjEnterRemoteWithDriver(driver, vm);
    p2p = VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                   VIR_DRV_FEATURE_MIGRATION_P2P);
    qemuDomainObjExitRemoteWithDriver(driver, vm);
    if (!p2p) {
11306 11307
        qemuReportError(VIR_ERR_OPERATION_FAILED, "%s",
                        _("Destination libvirt does not support peer-to-peer migration protocol"));
11308 11309 11310
        goto cleanup;
    }

11311 11312 11313 11314 11315 11316 11317
    /* domain may have been stopped while we were talking to remote daemon */
    if (!virDomainObjIsActive(vm)) {
        qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                        _("guest unexpectedly quit"));
        goto cleanup;
    }

11318 11319 11320
    dom_xml = qemudVMDumpXML(driver, vm,
                             VIR_DOMAIN_XML_SECURE |
                             VIR_DOMAIN_XML_UPDATE_CPU);
11321
    if (!dom_xml) {
11322 11323
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("failed to get domain xml"));
11324 11325 11326
        goto cleanup;
    }

11327
    if (flags & VIR_MIGRATE_TUNNELLED)
11328
        ret = doTunnelMigrate(dom, driver, dconn, vm, dom_xml, uri, flags, dname, resource);
11329
    else
11330
        ret = doNonTunnelMigrate(dom, driver, dconn, vm, dom_xml, uri, flags, dname, resource);
11331 11332 11333

cleanup:
    VIR_FREE(dom_xml);
C
Chris Lalancette 已提交
11334 11335 11336
    /* don't call virConnectClose(), because that resets any pending errors */
    virUnrefConnect(dconn);

11337
    return ret;
D
Daniel Veillard 已提交
11338 11339
}

11340

D
Daniel Veillard 已提交
11341 11342 11343 11344 11345 11346
/* Perform is the second step, and it runs on the source host. */
static int
qemudDomainMigratePerform (virDomainPtr dom,
                           const char *cookie ATTRIBUTE_UNUSED,
                           int cookielen ATTRIBUTE_UNUSED,
                           const char *uri,
11347
                           unsigned long flags,
11348
                           const char *dname,
D
Daniel Veillard 已提交
11349 11350
                           unsigned long resource)
{
11351 11352
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
11353
    virDomainEventPtr event = NULL;
11354
    int ret = -1;
11355
    int resume = 0;
11356
    qemuDomainObjPrivatePtr priv;
D
Daniel Veillard 已提交
11357

C
Chris Lalancette 已提交
11358 11359 11360 11361 11362 11363 11364 11365 11366
    virCheckFlags(VIR_MIGRATE_LIVE |
                  VIR_MIGRATE_PEER2PEER |
                  VIR_MIGRATE_TUNNELLED |
                  VIR_MIGRATE_PERSIST_DEST |
                  VIR_MIGRATE_UNDEFINE_SOURCE |
                  VIR_MIGRATE_PAUSED |
                  VIR_MIGRATE_NON_SHARED_DISK |
                  VIR_MIGRATE_NON_SHARED_INC, -1);

11367
    qemuDriverLock(driver);
11368
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
D
Daniel Veillard 已提交
11369
    if (!vm) {
11370 11371
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
11372 11373
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
11374
        goto cleanup;
D
Daniel Veillard 已提交
11375
    }
11376
    priv = vm->privateData;
D
Daniel Veillard 已提交
11377

11378 11379
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;
11380
    priv->jobActive = QEMU_JOB_MIGRATION_OUT;
11381

D
Daniel P. Berrange 已提交
11382
    if (!virDomainObjIsActive(vm)) {
11383 11384
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
11385
        goto endjob;
D
Daniel Veillard 已提交
11386 11387
    }

11388 11389 11390
    memset(&priv->jobInfo, 0, sizeof(priv->jobInfo));
    priv->jobInfo.type = VIR_DOMAIN_JOB_UNBOUNDED;

11391
    resume = vm->state == VIR_DOMAIN_RUNNING;
11392
    if (!(flags & VIR_MIGRATE_LIVE) && vm->state == VIR_DOMAIN_RUNNING) {
11393
        if (qemuDomainMigrateOffline(driver, vm) < 0)
11394
            goto endjob;
11395 11396
    }

11397
    if ((flags & (VIR_MIGRATE_TUNNELLED | VIR_MIGRATE_PEER2PEER))) {
11398
        if (doPeer2PeerMigrate(dom, driver, vm, uri, flags, dname, resource) < 0)
11399
            /* doPeer2PeerMigrate already set the error, so just get out */
11400
            goto endjob;
11401
    } else {
11402
        if (doNativeMigrate(driver, vm, uri, flags, dname, resource) < 0)
11403
            goto endjob;
11404 11405
    }

D
Daniel Veillard 已提交
11406
    /* Clean up the source domain. */
11407
    qemudShutdownVMDaemon(driver, vm, 1);
11408
    qemuDomainStopAudit(vm, "migrated");
11409
    resume = 0;
11410 11411 11412 11413

    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STOPPED,
                                     VIR_DOMAIN_EVENT_STOPPED_MIGRATED);
C
Chris Lalancette 已提交
11414
    if (!vm->persistent || (flags & VIR_MIGRATE_UNDEFINE_SOURCE)) {
11415
        virDomainDeleteConfig(driver->configDir, driver->autostartDir, vm);
11416 11417
        if (qemuDomainObjEndJob(vm) > 0)
            virDomainRemoveInactive(&driver->domains, vm);
11418 11419
        vm = NULL;
    }
11420
    ret = 0;
D
Daniel Veillard 已提交
11421

11422
endjob:
11423
    if (resume && vm->state == VIR_DOMAIN_PAUSED) {
11424
        /* we got here through some sort of failure; start the domain again */
H
Hu Tao 已提交
11425
        if (doStartCPUs(driver, vm, dom->conn) < 0) {
11426 11427 11428 11429
            /* Hm, we already know we are in error here.  We don't want to
             * overwrite the previous error, though, so we just throw something
             * to the logs and hope for the best
             */
11430
            VIR_ERROR(_("Failed to resume guest %s after failure"),
11431
                      vm->def->name);
11432 11433 11434 11435 11436 11437
        }

        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_RESUMED,
                                         VIR_DOMAIN_EVENT_RESUMED_MIGRATED);
    }
11438 11439 11440
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
11441

11442
cleanup:
11443 11444
    if (vm)
        virDomainObjUnlock(vm);
11445 11446
    if (event)
        qemuDomainEventQueue(driver, event);
11447
    qemuDriverUnlock(driver);
11448
    return ret;
D
Daniel Veillard 已提交
11449 11450
}

11451
#if WITH_MACVTAP
11452 11453 11454 11455 11456 11457 11458 11459 11460 11461 11462 11463 11464 11465 11466 11467 11468 11469 11470 11471 11472 11473 11474 11475 11476 11477 11478 11479 11480 11481 11482 11483 11484 11485
static void
qemudVPAssociatePortProfiles(virDomainDefPtr def) {
    int i;
    int last_good_net = -1;
    virDomainNetDefPtr net;

    for (i = 0; i < def->nnets; i++) {
        net = def->nets[i];
        if (net->type == VIR_DOMAIN_NET_TYPE_DIRECT) {
            if (vpAssociatePortProfileId(net->ifname,
                                         net->mac,
                                         net->data.direct.linkdev,
                                         &net->data.direct.virtPortProfile,
                                         def->uuid,
                                         VIR_VM_OP_MIGRATE_IN_FINISH) != 0)
                goto err_exit;
        }
        last_good_net = i;
    }

    return;

err_exit:
    for (i = 0; i < last_good_net; i++) {
        net = def->nets[i];
        if (net->type == VIR_DOMAIN_NET_TYPE_DIRECT) {
            vpDisassociatePortProfileId(net->ifname,
                                        net->mac,
                                        net->data.direct.linkdev,
                                        &net->data.direct.virtPortProfile,
                                        VIR_VM_OP_MIGRATE_IN_FINISH);
        }
    }
}
11486 11487 11488 11489
#else /* !WITH_MACVTAP */
static void
qemudVPAssociatePortProfiles(virDomainDefPtr def ATTRIBUTE_UNUSED) { }
#endif /* WITH_MACVTAP */
11490

D
Daniel Veillard 已提交
11491 11492 11493 11494 11495 11496 11497
/* Finish is the third and final step, and it runs on the destination host. */
static virDomainPtr
qemudDomainMigrateFinish2 (virConnectPtr dconn,
                           const char *dname,
                           const char *cookie ATTRIBUTE_UNUSED,
                           int cookielen ATTRIBUTE_UNUSED,
                           const char *uri ATTRIBUTE_UNUSED,
C
Chris Lalancette 已提交
11498
                           unsigned long flags,
D
Daniel Veillard 已提交
11499 11500
                           int retcode)
{
11501 11502 11503
    struct qemud_driver *driver = dconn->privateData;
    virDomainObjPtr vm;
    virDomainPtr dom = NULL;
11504
    virDomainEventPtr event = NULL;
11505
    virErrorPtr orig_err;
C
Chris Lalancette 已提交
11506
    int newVM = 1;
11507
    qemuDomainObjPrivatePtr priv = NULL;
D
Daniel Veillard 已提交
11508

C
Chris Lalancette 已提交
11509 11510 11511 11512 11513 11514 11515 11516 11517
    virCheckFlags(VIR_MIGRATE_LIVE |
                  VIR_MIGRATE_PEER2PEER |
                  VIR_MIGRATE_TUNNELLED |
                  VIR_MIGRATE_PERSIST_DEST |
                  VIR_MIGRATE_UNDEFINE_SOURCE |
                  VIR_MIGRATE_PAUSED |
                  VIR_MIGRATE_NON_SHARED_DISK |
                  VIR_MIGRATE_NON_SHARED_INC, NULL);

11518 11519 11520
    /* Migration failed. Save the current error so nothing squashes it */
    orig_err = virSaveLastError();

11521
    qemuDriverLock(driver);
11522
    vm = virDomainFindByName(&driver->domains, dname);
D
Daniel Veillard 已提交
11523
    if (!vm) {
11524 11525
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching name '%s'"), dname);
11526
        goto cleanup;
D
Daniel Veillard 已提交
11527 11528
    }

11529 11530 11531 11532 11533 11534 11535 11536 11537
    priv = vm->privateData;
    if (priv->jobActive != QEMU_JOB_MIGRATION_IN) {
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("domain '%s' is not processing incoming migration"), dname);
        goto cleanup;
    }
    priv->jobActive = QEMU_JOB_NONE;
    memset(&priv->jobInfo, 0, sizeof(priv->jobInfo));

11538 11539 11540
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel Veillard 已提交
11541 11542 11543 11544
    /* Did the migration go as planned?  If yes, return the domain
     * object, but if no, clean up the empty qemu process.
     */
    if (retcode == 0) {
11545 11546 11547 11548 11549 11550
        if (!virDomainObjIsActive(vm)) {
            qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                            _("guest unexpectedly quit"));
            goto cleanup;
        }

11551 11552
        qemudVPAssociatePortProfiles(vm->def);

C
Chris Lalancette 已提交
11553 11554 11555 11556 11557
        if (flags & VIR_MIGRATE_PERSIST_DEST) {
            if (vm->persistent)
                newVM = 0;
            vm->persistent = 1;

11558
            if (virDomainSaveConfig(driver->configDir, vm->def) < 0) {
C
Chris Lalancette 已提交
11559 11560 11561 11562 11563 11564 11565 11566 11567 11568
                /* Hmpf.  Migration was successful, but making it persistent
                 * was not.  If we report successful, then when this domain
                 * shuts down, management tools are in for a surprise.  On the
                 * other hand, if we report failure, then the management tools
                 * might try to restart the domain on the source side, even
                 * though the domain is actually running on the destination.
                 * Return a NULL dom pointer, and hope that this is a rare
                 * situation and management tools are smart.
                 */
                vm = NULL;
11569
                goto endjob;
C
Chris Lalancette 已提交
11570 11571 11572 11573 11574 11575 11576 11577 11578
            }

            event = virDomainEventNewFromObj(vm,
                                             VIR_DOMAIN_EVENT_DEFINED,
                                             newVM ?
                                             VIR_DOMAIN_EVENT_DEFINED_ADDED :
                                             VIR_DOMAIN_EVENT_DEFINED_UPDATED);
            if (event)
                qemuDomainEventQueue(driver, event);
11579
            event = NULL;
C
Chris Lalancette 已提交
11580 11581

        }
D
Daniel Veillard 已提交
11582
        dom = virGetDomain (dconn, vm->def->name, vm->def->uuid);
11583

11584 11585 11586 11587 11588
        if (!(flags & VIR_MIGRATE_PAUSED)) {
            /* run 'cont' on the destination, which allows migration on qemu
             * >= 0.10.6 to work properly.  This isn't strictly necessary on
             * older qemu's, but it also doesn't hurt anything there
             */
H
Hu Tao 已提交
11589
            if (doStartCPUs(driver, vm, dconn) < 0) {
11590
                if (virGetLastError() == NULL)
11591 11592
                    qemuReportError(VIR_ERR_INTERNAL_ERROR,
                                    "%s", _("resume operation failed"));
11593 11594
                goto endjob;
            }
11595 11596
        }

11597 11598 11599
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_RESUMED,
                                         VIR_DOMAIN_EVENT_RESUMED_MIGRATED);
11600 11601 11602 11603 11604 11605
        if (vm->state == VIR_DOMAIN_PAUSED) {
            qemuDomainEventQueue(driver, event);
            event = virDomainEventNewFromObj(vm,
                                             VIR_DOMAIN_EVENT_SUSPENDED,
                                             VIR_DOMAIN_EVENT_SUSPENDED_PAUSED);
        }
11606 11607 11608 11609
        if (virDomainSaveStatus(driver->caps, driver->stateDir, vm) < 0) {
            VIR_WARN("Failed to save status on vm %s", vm->def->name);
            goto endjob;
        }
D
Daniel Veillard 已提交
11610
    } else {
11611
        qemudShutdownVMDaemon(driver, vm, 1);
11612
        qemuDomainStopAudit(vm, "failed");
11613 11614 11615
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_STOPPED,
                                         VIR_DOMAIN_EVENT_STOPPED_FAILED);
11616
        if (!vm->persistent) {
11617 11618
            if (qemuDomainObjEndJob(vm) > 0)
                virDomainRemoveInactive(&driver->domains, vm);
11619 11620
            vm = NULL;
        }
D
Daniel Veillard 已提交
11621
    }
11622

11623
endjob:
11624 11625 11626
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
11627

11628
cleanup:
11629 11630 11631 11632
    if (orig_err) {
        virSetError(orig_err);
        virFreeError(orig_err);
    }
11633 11634
    if (vm)
        virDomainObjUnlock(vm);
11635 11636
    if (event)
        qemuDomainEventQueue(driver, event);
11637
    qemuDriverUnlock(driver);
11638
    return dom;
D
Daniel Veillard 已提交
11639 11640
}

11641 11642 11643 11644 11645 11646 11647 11648 11649 11650 11651 11652 11653 11654 11655 11656
static int
qemudNodeDeviceGetPciInfo (virNodeDevicePtr dev,
                           unsigned *domain,
                           unsigned *bus,
                           unsigned *slot,
                           unsigned *function)
{
    virNodeDeviceDefPtr def = NULL;
    virNodeDevCapsDefPtr cap;
    char *xml = NULL;
    int ret = -1;

    xml = virNodeDeviceGetXMLDesc(dev, 0);
    if (!xml)
        goto out;

11657
    def = virNodeDeviceDefParseString(xml, EXISTING_DEVICE);
11658 11659 11660 11661 11662 11663 11664 11665 11666 11667 11668 11669 11670 11671 11672 11673 11674
    if (!def)
        goto out;

    cap = def->caps;
    while (cap) {
        if (cap->type == VIR_NODE_DEV_CAP_PCI_DEV) {
            *domain   = cap->data.pci_dev.domain;
            *bus      = cap->data.pci_dev.bus;
            *slot     = cap->data.pci_dev.slot;
            *function = cap->data.pci_dev.function;
            break;
        }

        cap = cap->next;
    }

    if (!cap) {
11675 11676
        qemuReportError(VIR_ERR_INVALID_ARG,
                        _("device %s is not a PCI device"), dev->name);
11677 11678 11679 11680 11681 11682 11683 11684 11685 11686 11687 11688 11689
        goto out;
    }

    ret = 0;
out:
    virNodeDeviceDefFree(def);
    VIR_FREE(xml);
    return ret;
}

static int
qemudNodeDeviceDettach (virNodeDevicePtr dev)
{
11690
    struct qemud_driver *driver = dev->conn->privateData;
11691 11692 11693 11694 11695 11696 11697
    pciDevice *pci;
    unsigned domain, bus, slot, function;
    int ret = -1;

    if (qemudNodeDeviceGetPciInfo(dev, &domain, &bus, &slot, &function) < 0)
        return -1;

11698
    pci = pciGetDevice(domain, bus, slot, function);
11699 11700 11701
    if (!pci)
        return -1;

11702 11703
    qemuDriverLock(driver);
    if (pciDettachDevice(pci, driver->activePciHostdevs) < 0)
11704 11705 11706 11707
        goto out;

    ret = 0;
out:
11708
    qemuDriverUnlock(driver);
11709
    pciFreeDevice(pci);
11710 11711 11712 11713 11714 11715
    return ret;
}

static int
qemudNodeDeviceReAttach (virNodeDevicePtr dev)
{
11716
    struct qemud_driver *driver = dev->conn->privateData;
11717 11718 11719 11720 11721 11722 11723
    pciDevice *pci;
    unsigned domain, bus, slot, function;
    int ret = -1;

    if (qemudNodeDeviceGetPciInfo(dev, &domain, &bus, &slot, &function) < 0)
        return -1;

11724
    pci = pciGetDevice(domain, bus, slot, function);
11725 11726 11727
    if (!pci)
        return -1;

11728 11729
    qemuDriverLock(driver);
    if (pciReAttachDevice(pci, driver->activePciHostdevs) < 0)
11730 11731 11732 11733
        goto out;

    ret = 0;
out:
11734
    qemuDriverUnlock(driver);
11735
    pciFreeDevice(pci);
11736 11737 11738 11739 11740 11741
    return ret;
}

static int
qemudNodeDeviceReset (virNodeDevicePtr dev)
{
11742
    struct qemud_driver *driver = dev->conn->privateData;
11743 11744 11745 11746 11747 11748 11749
    pciDevice *pci;
    unsigned domain, bus, slot, function;
    int ret = -1;

    if (qemudNodeDeviceGetPciInfo(dev, &domain, &bus, &slot, &function) < 0)
        return -1;

11750
    pci = pciGetDevice(domain, bus, slot, function);
11751 11752 11753
    if (!pci)
        return -1;

11754 11755
    qemuDriverLock(driver);

11756
    if (pciResetDevice(pci, driver->activePciHostdevs, NULL) < 0)
11757 11758 11759 11760
        goto out;

    ret = 0;
out:
11761
    qemuDriverUnlock(driver);
11762
    pciFreeDevice(pci);
11763 11764 11765
    return ret;
}

11766 11767 11768 11769 11770 11771 11772 11773 11774 11775 11776
static int
qemuCPUCompare(virConnectPtr conn,
               const char *xmlDesc,
               unsigned int flags ATTRIBUTE_UNUSED)
{
    struct qemud_driver *driver = conn->privateData;
    int ret = VIR_CPU_COMPARE_ERROR;

    qemuDriverLock(driver);

    if (!driver->caps || !driver->caps->host.cpu) {
11777 11778
        qemuReportError(VIR_ERR_NO_SUPPORT,
                        "%s", _("cannot get host CPU capabilities"));
11779 11780
    }
    else
11781
        ret = cpuCompareXML(driver->caps->host.cpu, xmlDesc);
11782 11783 11784 11785 11786 11787

    qemuDriverUnlock(driver);

    return ret;
}

11788

11789 11790 11791 11792 11793 11794 11795 11796 11797 11798 11799 11800 11801
static char *
qemuCPUBaseline(virConnectPtr conn ATTRIBUTE_UNUSED,
                const char **xmlCPUs,
                unsigned int ncpus,
                unsigned int flags ATTRIBUTE_UNUSED)
{
    char *cpu;

    cpu = cpuBaselineXML(xmlCPUs, ncpus, NULL, 0);

    return cpu;
}

11802 11803 11804 11805 11806 11807 11808 11809 11810 11811 11812 11813 11814 11815 11816 11817 11818 11819 11820 11821 11822 11823 11824

static int qemuDomainGetJobInfo(virDomainPtr dom,
                                virDomainJobInfoPtr info) {
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
    qemuDomainObjPrivatePtr priv;

    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
    qemuDriverUnlock(driver);
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    priv = vm->privateData;

    if (virDomainObjIsActive(vm)) {
        if (priv->jobActive) {
11825 11826
            struct timeval now;

11827
            memcpy(info, &priv->jobInfo, sizeof(*info));
11828 11829 11830 11831 11832 11833 11834 11835 11836 11837 11838

            /* Refresh elapsed time again just to ensure it
             * is fully updated. This is primarily for benefit
             * of incoming migration which we don't currently
             * monitor actively in the background thread
             */
            if (gettimeofday(&now, NULL) < 0) {
                virReportSystemError(errno, "%s",
                                     _("cannot get time of day"));
                goto cleanup;
            }
11839
            info->timeElapsed = timeval_to_ms(now) - priv->jobStart;
11840 11841 11842 11843 11844 11845 11846 11847 11848 11849 11850 11851 11852 11853 11854 11855 11856 11857 11858
        } else {
            memset(info, 0, sizeof(*info));
            info->type = VIR_DOMAIN_JOB_NONE;
        }
    } else {
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
        goto cleanup;
    }

    ret = 0;

cleanup:
    if (vm)
        virDomainObjUnlock(vm);
    return ret;
}


11859 11860 11861 11862 11863 11864 11865 11866 11867 11868 11869 11870 11871 11872 11873 11874 11875 11876 11877 11878 11879 11880
static int qemuDomainAbortJob(virDomainPtr dom) {
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
    qemuDomainObjPrivatePtr priv;

    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
    qemuDriverUnlock(driver);
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    priv = vm->privateData;

    if (virDomainObjIsActive(vm)) {
        if (priv->jobActive) {
            VIR_DEBUG("Requesting cancellation of job on vm %s", vm->def->name);
11881
            priv->jobSignals |= QEMU_JOB_SIGNAL_CANCEL;
11882 11883 11884 11885 11886 11887 11888 11889 11890 11891 11892 11893 11894 11895 11896 11897 11898 11899 11900 11901
        } else {
            qemuReportError(VIR_ERR_OPERATION_INVALID,
                            "%s", _("no job is active on the domain"));
            goto cleanup;
        }
    } else {
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
        goto cleanup;
    }

    ret = 0;

cleanup:
    if (vm)
        virDomainObjUnlock(vm);
    return ret;
}


11902 11903 11904 11905 11906 11907 11908 11909 11910 11911
static int
qemuDomainMigrateSetMaxDowntime(virDomainPtr dom,
                                unsigned long long downtime,
                                unsigned int flags)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    qemuDomainObjPrivatePtr priv;
    int ret = -1;

11912
    virCheckFlags(0, -1);
11913 11914 11915 11916 11917 11918 11919 11920 11921 11922 11923 11924 11925 11926 11927 11928 11929 11930 11931 11932

    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);

    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    if (!virDomainObjIsActive(vm)) {
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
        goto cleanup;
    }

    priv = vm->privateData;

11933
    if (priv->jobActive != QEMU_JOB_MIGRATION_OUT) {
11934 11935 11936 11937 11938 11939 11940 11941 11942 11943 11944 11945 11946 11947 11948 11949 11950
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not being migrated"));
        goto cleanup;
    }

    VIR_DEBUG("Requesting migration downtime change to %llums", downtime);
    priv->jobSignals |= QEMU_JOB_SIGNAL_MIGRATE_DOWNTIME;
    priv->jobSignalsData.migrateDowntime = downtime;
    ret = 0;

cleanup:
    if (vm)
        virDomainObjUnlock(vm);
    qemuDriverUnlock(driver);
    return ret;
}

C
Chris Lalancette 已提交
11951 11952 11953 11954 11955 11956 11957 11958 11959 11960 11961 11962 11963 11964 11965 11966 11967 11968 11969 11970 11971 11972 11973 11974 11975 11976 11977 11978 11979 11980 11981 11982 11983 11984 11985 11986 11987 11988 11989 11990 11991 11992 11993 11994 11995 11996 11997 11998 11999 12000 12001 12002 12003 12004 12005 12006 12007 12008 12009 12010 12011 12012 12013 12014 12015 12016
static char *qemuFindQemuImgBinary(void)
{
    char *ret;

    ret = virFindFileInPath("kvm-img");
    if (ret == NULL)
        ret = virFindFileInPath("qemu-img");
    if (ret == NULL)
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("unable to find kvm-img or qemu-img"));

    return ret;
}

static int qemuDomainSnapshotWriteSnapshotMetadata(virDomainObjPtr vm,
                                                   char *snapshotDir)
{
    int fd = -1;
    char *newxml = NULL;
    int ret = -1;
    char *snapDir = NULL;
    char *snapFile = NULL;
    int err;
    char uuidstr[VIR_UUID_STRING_BUFLEN];

    virUUIDFormat(vm->def->uuid, uuidstr);
    newxml = virDomainSnapshotDefFormat(uuidstr, vm->current_snapshot->def, 1);
    if (newxml == NULL) {
        virReportOOMError();
        return -1;
    }

    if (virAsprintf(&snapDir, "%s/%s", snapshotDir, vm->def->name) < 0) {
        virReportOOMError();
        goto cleanup;
    }
    err = virFileMakePath(snapDir);
    if (err < 0) {
        virReportSystemError(err, _("cannot create snapshot directory '%s'"),
                             snapDir);
        goto cleanup;
    }

    if (virAsprintf(&snapFile, "%s/%s.xml", snapDir,
                    vm->current_snapshot->def->name) < 0) {
        virReportOOMError();
        goto cleanup;
    }
    fd = open(snapFile, O_CREAT|O_TRUNC|O_WRONLY, S_IRUSR|S_IWUSR);
    if (fd < 0) {
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        _("failed to create snapshot file '%s'"), snapFile);
        goto cleanup;
    }
    if (safewrite(fd, newxml, strlen(newxml)) != strlen(newxml)) {
        virReportSystemError(errno, _("Failed to write snapshot data to %s"),
                             snapFile);
        goto cleanup;
    }

    ret = 0;

cleanup:
    VIR_FREE(snapFile);
    VIR_FREE(snapDir);
    VIR_FREE(newxml);
12017
    VIR_FORCE_CLOSE(fd);
C
Chris Lalancette 已提交
12018 12019 12020 12021 12022 12023 12024 12025 12026 12027 12028 12029 12030 12031 12032 12033 12034 12035 12036 12037 12038 12039 12040 12041 12042 12043 12044 12045 12046 12047 12048 12049 12050 12051 12052 12053 12054 12055 12056 12057 12058
    return ret;
}

static int qemuDomainSnapshotSetActive(virDomainObjPtr vm,
                                       char *snapshotDir)
{
    if (vm->current_snapshot) {
        vm->current_snapshot->def->active = 1;

        return qemuDomainSnapshotWriteSnapshotMetadata(vm, snapshotDir);
    }

    return 0;
}

static int qemuDomainSnapshotSetInactive(virDomainObjPtr vm,
                                         char *snapshotDir)
{
    if (vm->current_snapshot) {
        vm->current_snapshot->def->active = 0;

        return qemuDomainSnapshotWriteSnapshotMetadata(vm, snapshotDir);
    }

    return 0;
}


static int qemuDomainSnapshotIsAllowed(virDomainObjPtr vm)
{
    int i;

    /* FIXME: we need to figure out what else here might succeed; in
     * particular, if it's a raw device but on LVM, we could probably make
     * that succeed as well
     */
    for (i = 0; i < vm->def->ndisks; i++) {
        if (vm->def->disks[i]->device == VIR_DOMAIN_DISK_DEVICE_DISK &&
            (!vm->def->disks[i]->driverType ||
             STRNEQ(vm->def->disks[i]->driverType, "qcow2"))) {
            qemuReportError(VIR_ERR_OPERATION_INVALID,
12059 12060
                            _("Disk '%s' does not support snapshotting"),
                            vm->def->disks[i]->src);
C
Chris Lalancette 已提交
12061 12062 12063 12064 12065 12066 12067 12068 12069
            return 0;
        }
    }

    return 1;
}

static virDomainSnapshotPtr qemuDomainSnapshotCreateXML(virDomainPtr domain,
                                                        const char *xmlDesc,
12070
                                                        unsigned int flags)
C
Chris Lalancette 已提交
12071 12072 12073 12074 12075 12076 12077 12078 12079 12080
{
    struct qemud_driver *driver = domain->conn->privateData;
    virDomainObjPtr vm = NULL;
    virDomainSnapshotObjPtr snap = NULL;
    virDomainSnapshotPtr snapshot = NULL;
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    virDomainSnapshotDefPtr def;
    const char *qemuimgarg[] = { NULL, "snapshot", "-c", NULL, NULL, NULL };
    int i;

12081 12082
    virCheckFlags(0, NULL);

C
Chris Lalancette 已提交
12083 12084 12085 12086 12087 12088 12089 12090 12091 12092 12093 12094 12095 12096 12097 12098 12099 12100 12101 12102 12103 12104 12105 12106 12107 12108 12109 12110 12111 12112 12113 12114 12115 12116 12117 12118 12119 12120 12121 12122 12123 12124 12125 12126 12127 12128 12129 12130 12131 12132 12133 12134 12135 12136 12137 12138 12139 12140 12141 12142 12143
    qemuDriverLock(driver);
    virUUIDFormat(domain->uuid, uuidstr);
    vm = virDomainFindByUUID(&driver->domains, domain->uuid);
    if (!vm) {
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    /* in a perfect world, we would allow qemu to tell us this.  The problem
     * is that qemu only does this check device-by-device; so if you had a
     * domain that booted from a large qcow2 device, but had a secondary raw
     * device attached, you wouldn't find out that you can't snapshot your
     * guest until *after* it had spent the time to snapshot the boot device.
     * This is probably a bug in qemu, but we'll work around it here for now.
     */
    if (!qemuDomainSnapshotIsAllowed(vm))
        goto cleanup;

    if (!(def = virDomainSnapshotDefParseString(xmlDesc, 1)))
        goto cleanup;

    if (!(snap = virDomainSnapshotAssignDef(&vm->snapshots, def)))
        goto cleanup;

    /* actually do the snapshot */
    if (!virDomainObjIsActive(vm)) {
        qemuimgarg[0] = qemuFindQemuImgBinary();
        if (qemuimgarg[0] == NULL)
            /* qemuFindQemuImgBinary set the error */
            goto cleanup;

        qemuimgarg[3] = snap->def->name;

        for (i = 0; i < vm->def->ndisks; i++) {
            /* FIXME: we also need to handle LVM here */
            /* FIXME: if we fail halfway through this loop, we are in an
             * inconsistent state.  I'm not quite sure what to do about that
             */
            if (vm->def->disks[i]->device == VIR_DOMAIN_DISK_DEVICE_DISK) {
                if (!vm->def->disks[i]->driverType ||
                    STRNEQ(vm->def->disks[i]->driverType, "qcow2")) {
                    qemuReportError(VIR_ERR_OPERATION_INVALID,
                                    _("Disk device '%s' does not support snapshotting"),
                                    vm->def->disks[i]->info.alias);
                    goto cleanup;
                }

                qemuimgarg[4] = vm->def->disks[i]->src;

                if (virRun(qemuimgarg, NULL) < 0) {
                    virReportSystemError(errno,
                                         _("Failed to run '%s' to create snapshot '%s' from disk '%s'"),
                                         qemuimgarg[0], snap->def->name,
                                         vm->def->disks[i]->src);
                    goto cleanup;
                }
            }
        }
    }
    else {
12144 12145 12146 12147 12148
        qemuDomainObjPrivatePtr priv;
        int ret;

        if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
            goto cleanup;
C
Chris Lalancette 已提交
12149 12150
        priv = vm->privateData;
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
12151
        ret = qemuMonitorCreateSnapshot(priv->mon, def->name);
C
Chris Lalancette 已提交
12152
        qemuDomainObjExitMonitorWithDriver(driver, vm);
12153
        if (qemuDomainObjEndJob(vm) == 0) {
12154
            vm = NULL;
12155 12156
            goto cleanup;
        }
12157 12158
        if (ret < 0)
            goto cleanup;
C
Chris Lalancette 已提交
12159 12160 12161 12162 12163 12164 12165 12166 12167 12168 12169 12170 12171 12172 12173 12174 12175 12176 12177 12178 12179 12180 12181 12182 12183 12184 12185 12186 12187 12188 12189 12190 12191 12192 12193 12194
    }

    snap->def->state = vm->state;

    /* FIXME: if we fail after this point, there's not a whole lot we can
     * do; we've successfully taken the snapshot, and we are now running
     * on it, so we have to go forward the best we can
     */

    if (vm->current_snapshot) {
        def->parent = strdup(vm->current_snapshot->def->name);
        if (def->parent == NULL) {
            virReportOOMError();
            goto cleanup;
        }
    }

    /* Now we set the new current_snapshot for the domain */
    vm->current_snapshot = snap;

    if (qemuDomainSnapshotWriteSnapshotMetadata(vm, driver->snapshotDir) < 0)
        /* qemuDomainSnapshotWriteSnapshotMetadata set the error */
        goto cleanup;

    snapshot = virGetDomainSnapshot(domain, snap->def->name);

cleanup:
    VIR_FREE(qemuimgarg[0]);
    if (vm)
        virDomainObjUnlock(vm);
    qemuDriverUnlock(driver);
    return snapshot;
}

static int qemuDomainSnapshotListNames(virDomainPtr domain, char **names,
                                       int nameslen,
12195
                                       unsigned int flags)
C
Chris Lalancette 已提交
12196 12197 12198 12199 12200
{
    struct qemud_driver *driver = domain->conn->privateData;
    virDomainObjPtr vm = NULL;
    int n = -1;

12201 12202
    virCheckFlags(0, -1);

C
Chris Lalancette 已提交
12203 12204 12205 12206 12207 12208 12209 12210 12211 12212 12213 12214 12215 12216 12217 12218 12219 12220 12221 12222
    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, domain->uuid);
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(domain->uuid, uuidstr);
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    n = virDomainSnapshotObjListGetNames(&vm->snapshots, names, nameslen);

cleanup:
    if (vm)
        virDomainObjUnlock(vm);
    qemuDriverUnlock(driver);
    return n;
}

static int qemuDomainSnapshotNum(virDomainPtr domain,
12223
                                 unsigned int flags)
C
Chris Lalancette 已提交
12224 12225 12226 12227 12228
{
    struct qemud_driver *driver = domain->conn->privateData;
    virDomainObjPtr vm = NULL;
    int n = -1;

12229 12230
    virCheckFlags(0, -1);

C
Chris Lalancette 已提交
12231 12232 12233 12234 12235 12236 12237 12238 12239 12240 12241 12242 12243 12244 12245 12246 12247 12248 12249 12250 12251
    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, domain->uuid);
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(domain->uuid, uuidstr);
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    n = virDomainSnapshotObjListNum(&vm->snapshots);

cleanup:
    if (vm)
        virDomainObjUnlock(vm);
    qemuDriverUnlock(driver);
    return n;
}

static virDomainSnapshotPtr qemuDomainSnapshotLookupByName(virDomainPtr domain,
                                                           const char *name,
12252
                                                           unsigned int flags)
C
Chris Lalancette 已提交
12253 12254 12255 12256 12257 12258
{
    struct qemud_driver *driver = domain->conn->privateData;
    virDomainObjPtr vm;
    virDomainSnapshotObjPtr snap = NULL;
    virDomainSnapshotPtr snapshot = NULL;

12259 12260
    virCheckFlags(0, NULL);

C
Chris Lalancette 已提交
12261 12262 12263 12264 12265 12266 12267 12268 12269 12270 12271 12272 12273 12274 12275 12276 12277 12278 12279 12280 12281 12282 12283 12284 12285 12286 12287
    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, domain->uuid);
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(domain->uuid, uuidstr);
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    snap = virDomainSnapshotFindByName(&vm->snapshots, name);
    if (!snap) {
        qemuReportError(VIR_ERR_NO_DOMAIN_SNAPSHOT,
                        _("no snapshot with matching name '%s'"), name);
        goto cleanup;
    }

    snapshot = virGetDomainSnapshot(domain, snap->def->name);

cleanup:
    if (vm)
        virDomainObjUnlock(vm);
    qemuDriverUnlock(driver);
    return snapshot;
}

static int qemuDomainHasCurrentSnapshot(virDomainPtr domain,
12288
                                        unsigned int flags)
C
Chris Lalancette 已提交
12289 12290 12291 12292 12293
{
    struct qemud_driver *driver = domain->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;

12294 12295
    virCheckFlags(0, -1);

C
Chris Lalancette 已提交
12296 12297 12298 12299 12300 12301 12302 12303 12304 12305 12306 12307 12308 12309 12310 12311 12312 12313 12314 12315
    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, domain->uuid);
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(domain->uuid, uuidstr);
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    ret = (vm->current_snapshot != NULL);

cleanup:
    if (vm)
        virDomainObjUnlock(vm);
    qemuDriverUnlock(driver);
    return ret;
}

static virDomainSnapshotPtr qemuDomainSnapshotCurrent(virDomainPtr domain,
12316
                                                      unsigned int flags)
C
Chris Lalancette 已提交
12317 12318 12319 12320 12321
{
    struct qemud_driver *driver = domain->conn->privateData;
    virDomainObjPtr vm;
    virDomainSnapshotPtr snapshot = NULL;

12322 12323
    virCheckFlags(0, NULL);

C
Chris Lalancette 已提交
12324 12325 12326 12327 12328 12329 12330 12331 12332 12333 12334 12335 12336 12337 12338 12339 12340 12341 12342 12343 12344 12345 12346 12347 12348 12349
    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, domain->uuid);
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(domain->uuid, uuidstr);
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    if (!vm->current_snapshot) {
        qemuReportError(VIR_ERR_NO_DOMAIN_SNAPSHOT, "%s",
                        _("the domain does not have a current snapshot"));
        goto cleanup;
    }

    snapshot = virGetDomainSnapshot(domain, vm->current_snapshot->def->name);

cleanup:
    if (vm)
        virDomainObjUnlock(vm);
    qemuDriverUnlock(driver);
    return snapshot;
}

static char *qemuDomainSnapshotDumpXML(virDomainSnapshotPtr snapshot,
12350
                                       unsigned int flags)
C
Chris Lalancette 已提交
12351 12352 12353 12354 12355 12356 12357
{
    struct qemud_driver *driver = snapshot->domain->conn->privateData;
    virDomainObjPtr vm = NULL;
    char *xml = NULL;
    virDomainSnapshotObjPtr snap = NULL;
    char uuidstr[VIR_UUID_STRING_BUFLEN];

12358 12359
    virCheckFlags(0, NULL);

C
Chris Lalancette 已提交
12360 12361 12362 12363 12364 12365 12366 12367 12368 12369 12370 12371 12372 12373 12374 12375 12376 12377 12378 12379 12380 12381 12382 12383 12384 12385 12386
    qemuDriverLock(driver);
    virUUIDFormat(snapshot->domain->uuid, uuidstr);
    vm = virDomainFindByUUID(&driver->domains, snapshot->domain->uuid);
    if (!vm) {
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    snap = virDomainSnapshotFindByName(&vm->snapshots, snapshot->name);
    if (!snap) {
        qemuReportError(VIR_ERR_NO_DOMAIN_SNAPSHOT,
                        _("no domain snapshot with matching name '%s'"),
                        snapshot->name);
        goto cleanup;
    }

    xml = virDomainSnapshotDefFormat(uuidstr, snap->def, 0);

cleanup:
    if (vm)
        virDomainObjUnlock(vm);
    qemuDriverUnlock(driver);
    return xml;
}

static int qemuDomainRevertToSnapshot(virDomainSnapshotPtr snapshot,
12387
                                      unsigned int flags)
C
Chris Lalancette 已提交
12388 12389 12390 12391 12392 12393 12394 12395 12396 12397
{
    struct qemud_driver *driver = snapshot->domain->conn->privateData;
    virDomainObjPtr vm = NULL;
    int ret = -1;
    virDomainSnapshotObjPtr snap = NULL;
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    virDomainEventPtr event = NULL;
    qemuDomainObjPrivatePtr priv;
    int rc;

12398 12399
    virCheckFlags(0, -1);

C
Chris Lalancette 已提交
12400 12401 12402 12403 12404 12405 12406 12407 12408 12409 12410 12411 12412 12413 12414 12415 12416 12417 12418 12419 12420 12421 12422 12423 12424 12425 12426 12427 12428 12429 12430
    qemuDriverLock(driver);
    virUUIDFormat(snapshot->domain->uuid, uuidstr);
    vm = virDomainFindByUUID(&driver->domains, snapshot->domain->uuid);
    if (!vm) {
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    snap = virDomainSnapshotFindByName(&vm->snapshots, snapshot->name);
    if (!snap) {
        qemuReportError(VIR_ERR_NO_DOMAIN_SNAPSHOT,
                        _("no domain snapshot with matching name '%s'"),
                        snapshot->name);
        goto cleanup;
    }

    vm->current_snapshot = snap;

    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

    if (snap->def->state == VIR_DOMAIN_RUNNING
        || snap->def->state == VIR_DOMAIN_PAUSED) {

        if (virDomainObjIsActive(vm)) {
            priv = vm->privateData;
            qemuDomainObjEnterMonitorWithDriver(driver, vm);
            rc = qemuMonitorLoadSnapshot(priv->mon, snap->def->name);
            qemuDomainObjExitMonitorWithDriver(driver, vm);
            if (rc < 0)
12431
                goto endjob;
C
Chris Lalancette 已提交
12432 12433 12434
        }
        else {
            if (qemuDomainSnapshotSetActive(vm, driver->snapshotDir) < 0)
12435
                goto endjob;
C
Chris Lalancette 已提交
12436 12437

            rc = qemudStartVMDaemon(snapshot->domain->conn, driver, vm, NULL,
12438
                                    false, -1, NULL, VIR_VM_OP_CREATE);
12439
            qemuDomainStartAudit(vm, "from-snapshot", rc >= 0);
C
Chris Lalancette 已提交
12440
            if (qemuDomainSnapshotSetInactive(vm, driver->snapshotDir) < 0)
12441
                goto endjob;
C
Chris Lalancette 已提交
12442
            if (rc < 0)
12443
                goto endjob;
C
Chris Lalancette 已提交
12444 12445 12446 12447 12448 12449
        }

        if (snap->def->state == VIR_DOMAIN_PAUSED) {
            /* qemu unconditionally starts the domain running again after
             * loadvm, so let's pause it to keep consistency
             */
H
Hu Tao 已提交
12450 12451
            rc = doStopCPUs(driver, vm);
            if (rc < 0)
12452
                goto endjob;
C
Chris Lalancette 已提交
12453 12454 12455 12456 12457 12458 12459 12460 12461 12462 12463 12464 12465 12466 12467 12468 12469 12470
        }

        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_STARTED,
                                         VIR_DOMAIN_EVENT_STARTED_FROM_SNAPSHOT);
    }
    else {
        /* qemu is a little funny with running guests and the restoration
         * of snapshots.  If the snapshot was taken online,
         * then after a "loadvm" monitor command, the VM is set running
         * again.  If the snapshot was taken offline, then after a "loadvm"
         * monitor command the VM is left paused.  Unpausing it leads to
         * the memory state *before* the loadvm with the disk *after* the
         * loadvm, which obviously is bound to corrupt something.
         * Therefore we destroy the domain and set it to "off" in this case.
         */

        if (virDomainObjIsActive(vm)) {
12471
            qemudShutdownVMDaemon(driver, vm, 0);
12472
            qemuDomainStopAudit(vm, "from-snapshot");
C
Chris Lalancette 已提交
12473 12474 12475
            event = virDomainEventNewFromObj(vm,
                                             VIR_DOMAIN_EVENT_STOPPED,
                                             VIR_DOMAIN_EVENT_STOPPED_FROM_SNAPSHOT);
12476 12477 12478 12479
            if (!vm->persistent) {
                if (qemuDomainObjEndJob(vm) > 0)
                    virDomainRemoveInactive(&driver->domains, vm);
                vm = NULL;
12480
                goto cleanup;
12481
            }
C
Chris Lalancette 已提交
12482 12483 12484
        }

        if (qemuDomainSnapshotSetActive(vm, driver->snapshotDir) < 0)
12485
            goto endjob;
C
Chris Lalancette 已提交
12486 12487 12488 12489 12490 12491
    }

    vm->state = snap->def->state;

    ret = 0;

12492
endjob:
C
Chris Lalancette 已提交
12493 12494 12495
    if (vm && qemuDomainObjEndJob(vm) == 0)
        vm = NULL;

12496
cleanup:
C
Chris Lalancette 已提交
12497 12498 12499 12500 12501 12502 12503 12504 12505 12506 12507 12508 12509 12510 12511 12512 12513 12514 12515 12516 12517 12518 12519 12520 12521 12522 12523 12524 12525 12526 12527 12528 12529 12530 12531 12532 12533 12534 12535 12536 12537 12538 12539 12540 12541 12542 12543 12544 12545 12546 12547 12548 12549 12550 12551 12552 12553 12554 12555 12556 12557 12558 12559 12560 12561 12562 12563 12564 12565 12566 12567 12568 12569 12570 12571 12572 12573 12574 12575 12576 12577 12578 12579 12580 12581 12582 12583 12584 12585 12586 12587 12588 12589 12590 12591 12592 12593 12594 12595 12596 12597 12598 12599 12600 12601 12602 12603 12604 12605 12606 12607 12608 12609 12610 12611 12612 12613 12614 12615 12616 12617 12618 12619 12620 12621 12622 12623 12624 12625 12626 12627 12628 12629 12630
    if (event)
        qemuDomainEventQueue(driver, event);
    if (vm)
        virDomainObjUnlock(vm);
    qemuDriverUnlock(driver);

    return ret;
}

static int qemuDomainSnapshotDiscard(struct qemud_driver *driver,
                                     virDomainObjPtr vm,
                                     virDomainSnapshotObjPtr snap)
{
    const char *qemuimgarg[] = { NULL, "snapshot", "-d", NULL, NULL, NULL };
    char *snapFile = NULL;
    int ret = -1;
    int i;
    qemuDomainObjPrivatePtr priv;
    virDomainSnapshotObjPtr parentsnap;

    if (!virDomainObjIsActive(vm)) {
        qemuimgarg[0] = qemuFindQemuImgBinary();
        if (qemuimgarg[0] == NULL)
            /* qemuFindQemuImgBinary set the error */
            goto cleanup;

        qemuimgarg[3] = snap->def->name;

        for (i = 0; i < vm->def->ndisks; i++) {
            /* FIXME: we also need to handle LVM here */
            if (vm->def->disks[i]->device == VIR_DOMAIN_DISK_DEVICE_DISK) {
                if (!vm->def->disks[i]->driverType ||
                    STRNEQ(vm->def->disks[i]->driverType, "qcow2")) {
                    /* we continue on even in the face of error, since other
                     * disks in this VM may have this snapshot in place
                     */
                    continue;
                }

                qemuimgarg[4] = vm->def->disks[i]->src;

                if (virRun(qemuimgarg, NULL) < 0) {
                    /* we continue on even in the face of error, since other
                     * disks in this VM may have this snapshot in place
                     */
                    continue;
                }
            }
        }
    }
    else {
        priv = vm->privateData;
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
        /* we continue on even in the face of error */
        qemuMonitorDeleteSnapshot(priv->mon, snap->def->name);
        qemuDomainObjExitMonitorWithDriver(driver, vm);
    }

    if (snap == vm->current_snapshot) {
        if (snap->def->parent) {
            parentsnap = virDomainSnapshotFindByName(&vm->snapshots,
                                                     snap->def->parent);
            if (!parentsnap) {
                qemuReportError(VIR_ERR_NO_DOMAIN_SNAPSHOT,
                                _("no domain snapshot parent with matching name '%s'"),
                                snap->def->parent);
                goto cleanup;
            }

            /* Now we set the new current_snapshot for the domain */
            vm->current_snapshot = parentsnap;
        }
        else
            vm->current_snapshot = NULL;
    }

    if (virAsprintf(&snapFile, "%s/%s/%s.xml", driver->snapshotDir,
                    vm->def->name, snap->def->name) < 0) {
        virReportOOMError();
        goto cleanup;
    }
    unlink(snapFile);

    virDomainSnapshotObjListRemove(&vm->snapshots, snap);

    ret = 0;

cleanup:
    VIR_FREE(snapFile);
    VIR_FREE(qemuimgarg[0]);

    return ret;
}

struct snap_remove {
    struct qemud_driver *driver;
    virDomainObjPtr vm;
    char *parent;
    int err;
};

static void qemuDomainSnapshotDiscardChildren(void *payload,
                                              const char *name ATTRIBUTE_UNUSED,
                                              void *data)
{
    virDomainSnapshotObjPtr snap = payload;
    struct snap_remove *curr = data;
    struct snap_remove this;

    if (snap->def->parent && STREQ(snap->def->parent, curr->parent)) {
        this.driver = curr->driver;
        this.vm = curr->vm;
        this.parent = snap->def->name;
        this.err = 0;
        virHashForEach(curr->vm->snapshots.objs,
                       qemuDomainSnapshotDiscardChildren, &this);

        if (this.err)
            curr->err = this.err;
        else
            this.err = qemuDomainSnapshotDiscard(curr->driver, curr->vm, snap);
    }
}

static int qemuDomainSnapshotDelete(virDomainSnapshotPtr snapshot,
                                    unsigned int flags)
{
    struct qemud_driver *driver = snapshot->domain->conn->privateData;
    virDomainObjPtr vm = NULL;
    int ret = -1;
    virDomainSnapshotObjPtr snap = NULL;
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    struct snap_remove rem;

12631 12632
    virCheckFlags(VIR_DOMAIN_SNAPSHOT_DELETE_CHILDREN, -1);

C
Chris Lalancette 已提交
12633 12634 12635 12636 12637 12638 12639 12640 12641 12642 12643 12644 12645 12646 12647 12648 12649
    qemuDriverLock(driver);
    virUUIDFormat(snapshot->domain->uuid, uuidstr);
    vm = virDomainFindByUUID(&driver->domains, snapshot->domain->uuid);
    if (!vm) {
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    snap = virDomainSnapshotFindByName(&vm->snapshots, snapshot->name);
    if (!snap) {
        qemuReportError(VIR_ERR_NO_DOMAIN_SNAPSHOT,
                        _("no domain snapshot with matching name '%s'"),
                        snapshot->name);
        goto cleanup;
    }

12650 12651 12652
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

C
Chris Lalancette 已提交
12653 12654 12655 12656 12657 12658 12659 12660
    if (flags & VIR_DOMAIN_SNAPSHOT_DELETE_CHILDREN) {
        rem.driver = driver;
        rem.vm = vm;
        rem.parent = snap->def->name;
        rem.err = 0;
        virHashForEach(vm->snapshots.objs, qemuDomainSnapshotDiscardChildren,
                       &rem);
        if (rem.err < 0)
12661
            goto endjob;
C
Chris Lalancette 已提交
12662 12663 12664 12665
    }

    ret = qemuDomainSnapshotDiscard(driver, vm, snap);

12666 12667 12668 12669
endjob:
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;

C
Chris Lalancette 已提交
12670 12671 12672 12673 12674 12675
cleanup:
    if (vm)
        virDomainObjUnlock(vm);
    qemuDriverUnlock(driver);
    return ret;
}
12676

12677 12678 12679 12680 12681 12682 12683 12684 12685 12686 12687 12688 12689 12690 12691 12692 12693 12694 12695 12696 12697 12698 12699 12700 12701 12702 12703 12704 12705 12706 12707 12708 12709 12710 12711 12712 12713 12714 12715 12716 12717 12718 12719 12720 12721 12722 12723 12724 12725 12726 12727
static int qemuDomainMonitorCommand(virDomainPtr domain, const char *cmd,
                                    char **result, unsigned int flags)
{
    struct qemud_driver *driver = domain->conn->privateData;
    virDomainObjPtr vm = NULL;
    int ret = -1;
    qemuDomainObjPrivatePtr priv;

    virCheckFlags(0, -1);

    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, domain->uuid);
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(domain->uuid, uuidstr);
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    if (!virDomainObjIsActive(vm)) {
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
        goto cleanup;
   }

    priv = vm->privateData;

    if (!priv->monitor_warned) {
        VIR_INFO("Qemu monitor command '%s' executed; libvirt results may be unpredictable!",
                 cmd);
        priv->monitor_warned = 1;
    }

    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
    ret = qemuMonitorArbitraryCommand(priv->mon, cmd, result);
    qemuDomainObjExitMonitorWithDriver(driver, vm);
    if (qemuDomainObjEndJob(vm) == 0) {
        vm = NULL;
        goto cleanup;
    }

cleanup:
    if (vm)
        virDomainObjUnlock(vm);
    qemuDriverUnlock(driver);
    return ret;
}

12728 12729 12730 12731 12732 12733 12734 12735 12736 12737 12738 12739 12740 12741 12742 12743 12744 12745 12746 12747 12748 12749 12750 12751 12752 12753 12754 12755 12756 12757 12758 12759 12760 12761 12762 12763 12764 12765 12766 12767 12768 12769 12770 12771 12772 12773 12774 12775 12776 12777 12778 12779 12780 12781 12782 12783 12784 12785 12786 12787 12788 12789 12790 12791 12792 12793 12794 12795 12796 12797 12798 12799 12800 12801 12802 12803

static int
qemuDomainOpenConsole(virDomainPtr dom,
                      const char *devname,
                      virStreamPtr st,
                      unsigned int flags)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm = NULL;
    char uuidstr[VIR_UUID_STRING_BUFLEN];
    int ret = -1;
    int i;
    virDomainChrDefPtr chr = NULL;

    virCheckFlags(0, -1);

    qemuDriverLock(driver);
    virUUIDFormat(dom->uuid, uuidstr);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
    if (!vm) {
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    if (!virDomainObjIsActive(vm)) {
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
        goto cleanup;
    }

    if (devname) {
        if (vm->def->console &&
            STREQ(devname, vm->def->console->info.alias))
            chr = vm->def->console;
        for (i = 0 ; !chr && i < vm->def->nserials ; i++) {
            if (STREQ(devname, vm->def->serials[i]->info.alias))
                chr = vm->def->serials[i];
        }
        for (i = 0 ; !chr && i < vm->def->nparallels ; i++) {
            if (STREQ(devname, vm->def->parallels[i]->info.alias))
                chr = vm->def->parallels[i];
        }
    } else {
        if (vm->def->console)
            chr = vm->def->console;
        else if (vm->def->nserials)
            chr = vm->def->serials[0];
    }

    if (!chr) {
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("cannot find character device %s"),
                        NULLSTR(devname));
        goto cleanup;
    }

    if (chr->type != VIR_DOMAIN_CHR_TYPE_PTY) {
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("character device %s is not using a PTY"),
                        NULLSTR(devname));
        goto cleanup;
    }

    if (virFDStreamOpenFile(st, chr->data.file.path, O_RDWR) < 0)
        goto cleanup;

    ret = 0;
cleanup:
    if (vm)
        virDomainObjUnlock(vm);
    qemuDriverUnlock(driver);
    return ret;
}


12804 12805 12806 12807 12808
static virDriver qemuDriver = {
    VIR_DRV_QEMU,
    "QEMU",
    qemudOpen, /* open */
    qemudClose, /* close */
D
Daniel Veillard 已提交
12809
    qemudSupportsFeature, /* supports_feature */
12810 12811
    qemudGetType, /* type */
    qemudGetVersion, /* version */
12812
    NULL, /* libvirtVersion (impl. in libvirt.c) */
12813
    virGetHostname, /* getHostname */
12814
    qemudGetMaxVCPUs, /* getMaxVcpus */
12815
    nodeGetInfo, /* nodeGetInfo */
12816 12817 12818
    qemudGetCapabilities, /* getCapabilities */
    qemudListDomains, /* listDomains */
    qemudNumDomains, /* numOfDomains */
12819
    qemudDomainCreate, /* domainCreateXML */
12820 12821 12822 12823 12824
    qemudDomainLookupByID, /* domainLookupByID */
    qemudDomainLookupByUUID, /* domainLookupByUUID */
    qemudDomainLookupByName, /* domainLookupByName */
    qemudDomainSuspend, /* domainSuspend */
    qemudDomainResume, /* domainResume */
12825
    qemudDomainShutdown, /* domainShutdown */
12826 12827 12828
    NULL, /* domainReboot */
    qemudDomainDestroy, /* domainDestroy */
    qemudDomainGetOSType, /* domainGetOSType */
12829
    qemudDomainGetMaxMemory, /* domainGetMaxMemory */
12830
    NULL, /* domainSetMaxMemory */
12831
    qemudDomainSetMemory, /* domainSetMemory */
12832 12833 12834
    qemudDomainGetInfo, /* domainGetInfo */
    qemudDomainSave, /* domainSave */
    qemudDomainRestore, /* domainRestore */
P
Paolo Bonzini 已提交
12835
    qemudDomainCoreDump, /* domainCoreDump */
12836
    qemudDomainSetVcpus, /* domainSetVcpus */
12837 12838
    qemudDomainSetVcpusFlags, /* domainSetVcpusFlags */
    qemudDomainGetVcpusFlags, /* domainGetVcpusFlags */
12839 12840
    qemudDomainPinVcpu, /* domainPinVcpu */
    qemudDomainGetVcpus, /* domainGetVcpus */
12841
    qemudDomainGetMaxVcpus, /* domainGetMaxVcpus */
12842 12843
    qemudDomainGetSecurityLabel, /* domainGetSecurityLabel */
    qemudNodeGetSecurityModel, /* nodeGetSecurityModel */
12844
    qemudDomainDumpXML, /* domainDumpXML */
12845
    qemuDomainXMLFromNative, /* domainXmlFromNative */
12846
    qemuDomainXMLToNative, /* domainXMLToNative */
12847 12848
    qemudListDefinedDomains, /* listDefinedDomains */
    qemudNumDefinedDomains, /* numOfDefinedDomains */
12849
    qemudDomainStart, /* domainCreate */
12850
    qemudDomainStartWithFlags, /* domainCreateWithFlags */
12851 12852
    qemudDomainDefine, /* domainDefineXML */
    qemudDomainUndefine, /* domainUndefine */
12853
    qemudDomainAttachDevice, /* domainAttachDevice */
12854
    qemudDomainAttachDeviceFlags, /* domainAttachDeviceFlags */
12855
    qemudDomainDetachDevice, /* domainDetachDevice */
12856
    qemudDomainDetachDeviceFlags, /* domainDetachDeviceFlags */
12857
    qemuDomainUpdateDeviceFlags, /* domainUpdateDeviceFlags */
12858 12859
    qemudDomainGetAutostart, /* domainGetAutostart */
    qemudDomainSetAutostart, /* domainSetAutostart */
12860 12861 12862
    qemuGetSchedulerType, /* domainGetSchedulerType */
    qemuGetSchedulerParameters, /* domainGetSchedulerParameters */
    qemuSetSchedulerParameters, /* domainSetSchedulerParameters */
D
Daniel Veillard 已提交
12863 12864
    NULL, /* domainMigratePrepare (v1) */
    qemudDomainMigratePerform, /* domainMigratePerform */
12865
    NULL, /* domainMigrateFinish */
12866
    qemudDomainBlockStats, /* domainBlockStats */
12867
    qemudDomainInterfaceStats, /* domainInterfaceStats */
12868
    qemudDomainMemoryStats, /* domainMemoryStats */
12869
    qemudDomainBlockPeek, /* domainBlockPeek */
R
Richard W.M. Jones 已提交
12870
    qemudDomainMemoryPeek, /* domainMemoryPeek */
12871
    qemuDomainGetBlockInfo, /* domainGetBlockInfo */
12872 12873
    nodeGetCellsFreeMemory, /* nodeGetCellsFreeMemory */
    nodeGetFreeMemory,  /* getFreeMemory */
12874 12875
    qemuDomainEventRegister, /* domainEventRegister */
    qemuDomainEventDeregister, /* domainEventDeregister */
D
Daniel Veillard 已提交
12876 12877
    qemudDomainMigratePrepare2, /* domainMigratePrepare2 */
    qemudDomainMigrateFinish2, /* domainMigrateFinish2 */
12878 12879 12880
    qemudNodeDeviceDettach, /* nodeDeviceDettach */
    qemudNodeDeviceReAttach, /* nodeDeviceReAttach */
    qemudNodeDeviceReset, /* nodeDeviceReset */
C
Chris Lalancette 已提交
12881
    qemudDomainMigratePrepareTunnel, /* domainMigratePrepareTunnel */
12882 12883 12884 12885
    qemuIsEncrypted, /* isEncrypted */
    qemuIsSecure, /* isSecure */
    qemuDomainIsActive, /* domainIsActive */
    qemuDomainIsPersistent, /* domainIsPersistent */
12886
    qemuDomainIsUpdated, /* domainIsUpdated */
12887
    qemuCPUCompare, /* cpuCompare */
12888
    qemuCPUBaseline, /* cpuBaseline */
12889
    qemuDomainGetJobInfo, /* domainGetJobInfo */
12890
    qemuDomainAbortJob, /* domainAbortJob */
12891
    qemuDomainMigrateSetMaxDowntime, /* domainMigrateSetMaxDowntime */
12892 12893
    qemuDomainEventRegisterAny, /* domainEventRegisterAny */
    qemuDomainEventDeregisterAny, /* domainEventDeregisterAny */
12894 12895 12896
    qemuDomainManagedSave, /* domainManagedSave */
    qemuDomainHasManagedSaveImage, /* domainHasManagedSaveImage */
    qemuDomainManagedSaveRemove, /* domainManagedSaveRemove */
C
Chris Lalancette 已提交
12897 12898 12899 12900 12901 12902 12903 12904 12905
    qemuDomainSnapshotCreateXML, /* domainSnapshotCreateXML */
    qemuDomainSnapshotDumpXML, /* domainSnapshotDumpXML */
    qemuDomainSnapshotNum, /* domainSnapshotNum */
    qemuDomainSnapshotListNames, /* domainSnapshotListNames */
    qemuDomainSnapshotLookupByName, /* domainSnapshotLookupByName */
    qemuDomainHasCurrentSnapshot, /* domainHasCurrentSnapshot */
    qemuDomainSnapshotCurrent, /* domainSnapshotCurrent */
    qemuDomainRevertToSnapshot, /* domainRevertToSnapshot */
    qemuDomainSnapshotDelete, /* domainSnapshotDelete */
12906
    qemuDomainMonitorCommand, /* qemuDomainMonitorCommand */
12907
    qemuDomainSetMemoryParameters, /* domainSetMemoryParameters */
12908
    qemuDomainGetMemoryParameters, /* domainGetMemoryParameters */
12909
    qemuDomainOpenConsole, /* domainOpenConsole */
12910 12911 12912
};


12913
static virStateDriver qemuStateDriver = {
12914
    .name = "QEMU",
12915 12916 12917 12918
    .initialize = qemudStartup,
    .cleanup = qemudShutdown,
    .reload = qemudReload,
    .active = qemudActive,
12919
};
12920

S
Stefan Berger 已提交
12921
static int
12922
qemudVMFilterRebuild(virConnectPtr conn ATTRIBUTE_UNUSED,
S
Stefan Berger 已提交
12923 12924 12925
                     virHashIterator iter, void *data)
{
    virHashForEach(qemu_driver->domains.objs, iter, data);
12926

S
Stefan Berger 已提交
12927 12928 12929
    return 0;
}

12930 12931 12932 12933 12934 12935 12936 12937 12938 12939 12940 12941 12942 12943 12944 12945 12946 12947 12948 12949 12950 12951
static int
qemudVMFiltersInstantiate(virConnectPtr conn,
                          virDomainDefPtr def)
{
    int err = 0;
    int i;

    if (!conn)
        return 1;

    for (i = 0 ; i < def->nnets ; i++) {
        virDomainNetDefPtr net = def->nets[i];
        if ((net->filter) && (net->ifname)) {
           if (virDomainConfNWFilterInstantiate(conn, net)) {
                err = 1;
                break;
            }
        }
    }

    return err;
}
S
Stefan Berger 已提交
12952

12953 12954 12955 12956 12957 12958 12959 12960 12961 12962 12963 12964 12965

static void
qemudVMDriverLock(void) {
    qemuDriverLock(qemu_driver);
};


static void
qemudVMDriverUnlock(void) {
    qemuDriverUnlock(qemu_driver);
};


S
Stefan Berger 已提交
12966 12967 12968
static virNWFilterCallbackDriver qemuCallbackDriver = {
    .name = "QEMU",
    .vmFilterRebuild = qemudVMFilterRebuild,
12969 12970
    .vmDriverLock = qemudVMDriverLock,
    .vmDriverUnlock = qemudVMDriverUnlock,
S
Stefan Berger 已提交
12971 12972
};

12973
int qemuRegister(void) {
12974 12975
    virRegisterDriver(&qemuDriver);
    virRegisterStateDriver(&qemuStateDriver);
S
Stefan Berger 已提交
12976
    virNWFilterRegisterCallbackDriver(&qemuCallbackDriver);
12977 12978
    return 0;
}